content
stringlengths
1
15.9M
\section{Introduction}\label{sec:Intro} A holomorphic vector bundle $E$ over a compact complex manifold $X$ is said to be ample if $\mathcal{O}_{\mathbb{P}(E^{*})}(1)$ is ample over $\mathbb{P}(E^{*})$. Ample vector bundles play an important role in algebraic geometry because of the various vanishing theorems that follow from ampleness; these vanishing theorems have numerous geometric consequences. It is therefore of interest to find criteria for ampleness. For any line bundle $L$ over a projective manifold $X$, the Nakai-Moizeshon criterion given a numerical criterion for ampleness of $L$ \cite{NM}. It says that $L$ is ample if $c_1(L)^k.Y>0$ for every dimensional subvariety $Y$ of dimension $k$ of $X$. However, no numerical criterion can exist for deciding the ampleness of vector bundles \cite{FL}. Notwithstanding this negative result, Schneider and Tancredi proved the following criterion (that is not purely numerical) for rank two vector bundles over surfaces. \begin{theorem}[{\cite[p.~134, Theorem]{ScTa}}] Let $E$ be a rank two holomorphic vector bundle over a compact complex surface $X$. Assume that $c_1(E)\,>\,0$ and that $E$ is semistable with respect to $\det(E)$. Suppose $E\big\vert_C$ is ample for every closed curve $C\, \subset\, X$, and $$(c_1(E)^2-2c_2(E)).X\,>\, 0,\ \ c_2(E).X\,>\,0.$$ Then $E$ is ample. \label{thm:ST} \end{theorem} This result and its improvements carried out in \cite{ScTa2} are useful in studying the ampleness of cotangent bundles \cite{Sc}. They also find use in an approach of Demailly to the Green-Griffiths-Lang conjecture \cite{Dem}. In this paper we aim to generalise this theorem to other ranks and dimensions for further possible applications. We were motivated by the following result of L\"ubke \cite{Lub}. \begin{theorem}[{\cite[p.~313, Theorem 2.1]{Lub}}] Let $(E,\, h)$ be a holomorphic Hermitian rank $r$ vector bundle over a compact K\"ahler manifold $(X,\, \omega)$. Suppose $F_h \wedge \omega^{n-1}\,=\,-\sqrt{-1}\lambda \omega^n$, where $F_h$ is the curvature of the Chern connection of $h$ and $\lambda\,>\,0$ is a constant. Assume that $$c_1(E,\,h)\,=\,\frac{r\lambda}{2\pi} \omega .$$ Suppose there exists a positive function $\psi$ such that either of the following holds: \begin{enumerate} \item $n\,=\,2$ and $c_1^2(E,h)-\frac{2r(r-1)}{r^2-2r+2}c_2(E,\,h)\,=\,\psi \omega^2$, or \item $r\,=\,2$ and $c_1^2(E,h)-\frac{4(n-1)^2}{n^2-2n+2}c_2(E,\,h)\,=\,\psi \omega^2$. \end{enumerate} Then $h$ is Griffiths-positively curved, i.e., $\langle v,\,\sqrt{-1}F_h v\rangle$ is a K\"ahler form whenever $v\,\neq\, 0$ is a vector in $E$. \label{thm:Lub} \end{theorem} \indent The following is the main result of this paper. \begin{theorem} Let $E$ be a holomorphic vector bundle of rank $r$ over a compact complex manifold $X$ of dimension $n$. Suppose $c_1(E)\,>\,0$ and $E$ is semistable with respect to $\det(E)$. Also assume that $E$ restricted to every codimension one hypersurface in $X$ is ample. Assume that $s_n(E).X\,>\,0$, where $s_n(E)$ be the signed $n^{th}$ Segre class. Then $E$ is ample if any one of the following conditions hold: \begin{enumerate} \item $n\,=\,2$,\, $r\,=\,2$,\, $(c_1^2(E)-2c_2(E)).X\,>\,0$. \item $r\,=\,2$,\, $n\,\geq\, 4$,\, $(2s_n(E)-c_1(E)^n).X\,>\,0$. \item $n\,=\,2$,\, $r\,=\,3$,\, $(c_1^2(E)-\frac{12}{5}c_2(E)).X\,>\,0$. \item $n\,=\,3$,\, $r\,=\,2$,\, $c_1(E)(c_1^2(E)-\frac{16}{5}c_2(E)).X\,>\,0$. \end{enumerate} \label{thm:Mainthm} \end{theorem} The proof of Theorem \ref{thm:Mainthm} (in Section \ref{sec:proof}) uses the existence of approximately Hermitian-Einstein metrics on semistable bundles \cite{Kob}. In Section \ref{sec:counter} we provide examples to indicate that L\"ubke's Chern class inequality in Theorem \ref{thm:Lub} cannot be dispensed with for $n=2$ (and arbitrary $r$). For $n\geq 4$ and $r=2$, our Chern class conditions are very different from those in L\"ubke's theorem and it is not clear to us whether either set of conditions is optimal. \section{Proof of Theorem \ref{thm:Mainthm}}\label{sec:proof} In this section, we prove Theorem \ref{thm:Mainthm}. The first case is actually the main theorem in \cite[p.~134, Theorem]{ScTa}. We shall prove the other three cases, for which the Nakai-Moishezon criterion will be used \cite{NM}. Our aim is to show that $c_1(\mathcal{O})(1)^d.Y\,>\,0$ for every subvariety $Y$ of $\mathbb{P}(E^{*})$ of dimension $d$. Let $$ \pi\, \,:\,\, \mathbb{P}(E^{*})\, \longrightarrow\, X $$ be the natural projection. \medskip \noindent \textbf{When $r\,=\,2,\, n\,\geq\, 4$:}\,\, If $\pi(Y)$ is a point, we are done trivially. If $\pi(Y)$ has dimension less than $n$, then since $E$ restricted to $\pi(Y)$ is ample, we are done. So assume that $\pi(Y)\,=\, X$. Then either $Y\,=\, \mathbb{P}(E^*)$ or it is a divisor in $\mathbb{P}(E^*)$. If $Y\,=\, \mathbb{P}(E^*)$, then $c_1(\mathcal{O})(1)^{n+1}.Y\,=\,s_n(E).X\,>\, 0$ by assumption. If $Y$ is a divisor in $\mathbb{P}(E^*)$, then $$[Y]\,=\,\mathcal{O}(m)\otimes \pi^*F\, ,$$ where $m\,\geq\, 0$ and $F$ is a line bundle on $X$. Akin to \cite{ScTa}, positivity holds if $m\,=\,0$ and that if $m\,>\, 0$, then $c_1(F^*)\cup c_1(E)^{n-1}\,\leq \,\frac{m}{2}c_1(E)^{n}$. Thus, $$c_1(\mathcal{O})(1)^n.Y\,=\,ms_n(E).X -c_1(F^*).c_1(E)^{n-1}\,\geq\, \frac{m}{2}(2s_n(E)-c_1(E)^n).X \,>\,0$$ by assumption. \medskip \noindent \textbf{When $n\,=\,2,\, r\,=\,3$:}\,\, As before, we are done when $\dim \pi(Y)\,=\,0,\, 1$. If $\dim \pi(Y)\,=\,2$, then $\dim Y$ is $2,\,3 \ or \ 4$. We address these three cases separately. \medskip \noindent \textbf{Subcase 1:\, $\dim Y\,=\,4$:}\, In this case, we have $c_1(\mathcal{O})(1)^4.Y \,=\, (c_1^2(E)-c_2(E)).X\,>\,0$. \medskip \noindent \textbf{Subcase 2:\, $\dim Y \,=\,3$:}\, Note that $Y$ is a divisor in $\mathbb{P}(E^*)$. Just as above, we are done when $m\,=\,0$, and if $m\,>\,0$ we see that $$c_1(\mathcal{O})(1)^3.Y\,\geq\, \frac{m}{2}(c_1(E)^2-c_2(E)).X\,>\,0.$$ \medskip \noindent \textbf{Subcase 3:\, $\dim(Y)\,=\,2$:}\, In this case we shall compute the intersection number differentio-geometrically by choosing an appropriate smooth metric $h$ on $E$ and considering the Chern-Weil representative of the induced metric $\widetilde{h}$ on $\mathcal{O}(1)$. Let $$S\,\, \subset\,\, X$$ be the Zariski closed proper subset such that $Y\setminus \pi^{-1}(S)$ is an $m$-sheeted \'etale cover of $X\setminus S$. We can find finitely many analytic open subsets $U_i\,\subset\, X$ such that \begin{itemize} \item $\bigcup_i U_i\,=\, X\setminus S$, \item $E$ is trivial over $U_i$, and \item $\pi^{-1}(U_i)$ is a disjoint union of $m$-copies of $U_i$. \end{itemize} Moreover, over each copy of $U_i$ in $\pi^{-1}(U_i)$ we can find a trivialisation of $E$ such that this copy is $U_i \times (1,\,0,\,0)\,\subset\, \mathbb{P}(E^*)$. Denote by $e_1$ the section corresponding to $(1,\,0,\,0)$. The following lemma, which is a pointwise assertion, will be used. \begin{lemma}\label{lem:pointwiseinequality} For all $1\,>\,\epsilon\,>\,0$ let $\Theta_{\epsilon}$ be a (normalised) Chern curvature endomorphism of a Hermitian holomorphic rank $3$ Hermitian vector bundle $(E,\, h_{\epsilon})$ at a point $p$ on a surface. Take $v\,\in\, E_p$. Suppose $\omega$ is a K\"ahler form at $p$ and $c_1(h_{\epsilon})\,=\,\omega$. Moreover, assume that there exists a constant $K$ (independent of $\epsilon$) such that \begin{gather} \Theta_{\epsilon}\wedge \omega \,=\, \frac{1}{3} \omega^2 + \frac{B_{\epsilon}}{2} \omega^2, \label{eq:approximateHE} \end{gather} where $B_{\epsilon}$ is a tracefree endomorphism such that $\big\vert (B_{\epsilon})_i^j \big\vert \,\leq\, \epsilon$ for all $i,\, j$. Then \begin{gather} c_1^2(h_{\epsilon})-\frac{12}{5}c_2 (h_{\epsilon})\,\leq\, \frac{9}{2} \left(\frac{\langle v,\, \Theta_{\epsilon} v \rangle_{h_{\epsilon}}}{\langle v,\, v\rangle_{h_{\epsilon}}}\right)^2+27\epsilon\omega^2. \label{ineq:pointwiseinequality} \end{gather} \end{lemma} \begin{proof} Since the statement does not depend on the choice of trivialisation and choice of coordinates, we can assume that $h_{\epsilon}$ is given by the identity matrix at this point $p$, in other words, $h_{\epsilon}$ is the trivial Hermitian structure. Moreover, without loss of generality, we assume that $v\,=\,(1,\,0,\,0)$. Lastly, we can choose coordinates so that $$\omega\,=\,\Theta_1 ^1 + \Theta_2^2+\Theta_3^3\,=\, \sqrt{-1} dz^1 \wedge d\overline{z}^1+\sqrt{-1}dz^2\wedge d\overline{z}^2,$$ and $\Theta_1^1 \,=\, \sqrt{-1} \mu_1 dz^1 \wedge d\overline{z}^1+\sqrt{-1}\mu_2 dz^2\wedge d\overline{z}^2$. By the approximate Hermitian-Einstein condition \eqref{eq:approximateHE} we see that \begin{gather} \mu_1+\mu_2\,=\,\frac{2}{3}+(B_{\epsilon})_1^1,\nonumber \\ \Theta_2^2+\Theta_3^3\,=\, (1-\mu_1)\sqrt{-1}dz^1\wedge d\overline{z}^1+\left(\frac{1}{3}+\mu_1-(B_{\epsilon})_1^1 \right)\sqrt{-1}dz^2\wedge d\overline{z}^2, \nonumber \\ \Theta_2^2\wedge \omega \,=\,\frac{1}{3} \omega^2 +\frac{1}{2}(B_{\epsilon})_2^2 \omega^2, \nonumber \\ (\Theta_i^j)_{1\overline{1}}+(\Theta_i^j)_{2\overline{2}}\,=\,(B_{\epsilon})_i^j. \label{eq:deductionsfromapproxandcoordinates} \end{gather} Now, \begin{gather} \frac{c_1(h)^2-\frac{12}{5}c_2(h)}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \,=\, 2 - \frac{12}{5}\frac{\sum_{i\neq j}\left( -\Theta_i ^j \overline{\Theta}_i^j+\Theta_i^i \Theta_j^j \right)}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \nonumber \\ \leq\, 2 - \frac{12}{5}\frac{\sum_{i\neq j}\left( -((\Theta_i^j)_{1\overline{1}} \overline{(\Theta_i^j)_{2\overline{2}}}+(\Theta_i^j)_{2\overline{2}} \overline{(\Theta_i^j)_{1\overline{1}}} )\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2+\Theta_i^i \Theta_j^j \right)}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2}. \end{gather} Denote $(\Theta_2^2)_{1\overline{1}}$ by $\alpha$ and $\mu_1$ by $\mu$. Using \eqref{eq:deductionsfromapproxandcoordinates} we see that \begin{gather} \frac{c_1(h)^2-\frac{12}{5}c_2(h)}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2}\,\leq\, 2+\frac{12\big\vert (B_{\epsilon})_i^j\big\vert^2}{5} - \frac{12}{5}\frac{\sum_{i\neq j} \left(\Theta_i^i \Theta_j^j \right)}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \nonumber \\ \Rightarrow\, \frac{5(c_1(h)^2-\frac{12}{5}c_2(h))}{2\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2}\nonumber \\ <\,1+6\epsilon^2-6(B_{\epsilon})_1^1-6 \frac{-(\Theta_1 ^1)^2+\Theta_2^2 \Theta_3^3}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \nonumber \\ =\,1+12\epsilon-6\left(-(\Theta_2^2)^2+\alpha\left(\frac{1}{3}+\mu- (B_{\epsilon})_1^1\right)+ \left(\frac{2}{3}- \alpha+(B_{\epsilon})_2^2\right)(1-\mu)\right)\nonumber \\ +\,\,\frac{6(\Theta_1 ^1)^2}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \nonumber \\ \leq\, 1+12\epsilon-6\left(-2\alpha \left(\frac{2}{3}- \alpha+(B_{\epsilon})_2^2\right) +\alpha\left(\frac{1}{3}+\mu-(B_{\epsilon})_1^1\right)+\left(\frac{2}{3}- \alpha+ (B_{\epsilon})_2^2\right)(1-\mu)\right)\nonumber \\ +\,\,\frac{6(\Theta_1 ^1)^2}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \nonumber \\ \leq\,\, 27\epsilon -3\mu \left(\frac{2}{3}-\mu +(B_{\epsilon})_1^1 \right)+ \frac{6(\Theta_1 ^1)^2}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2} \nonumber \\ =\,\,27\epsilon+\frac{9}{2}\frac{(\Theta_1 ^1)^2}{\sqrt{-1}dz^1 \wedge d\overline{z}^1 \wedge \sqrt{-1}dz^2\wedge d\overline{z}^2}. \end{gather} \end{proof} Returning to the situation at hand, for every $\epsilon$, there exists an approximate Hermitian-Einstein metric satisfying $c_1(h_{\epsilon})\,=\,\omega$ and \eqref{eq:approximateHE} \cite{Kob}. Choose $$\epsilon\,=\, \frac{\left(c_1^2(E)-\frac{12}{5}c_2(E) \right).X}{54\displaystyle \int_X\omega^2}$$ and let $h\,=\,h_{\epsilon}$. In a normal trivialisation at $p$, $$(c_1(\mathcal{O})(1),\widetilde{h})^2 (p)\big\vert_{Y} \,=\, \left(\frac{\sqrt{-1}}{2\pi}\overline{\partial} \partial h_{11}\right)^2 \,=\, \Theta_1^1(h)^2.$$ Therefore, Lemma \ref{lem:pointwiseinequality} shows that \begin{gather} \frac{9}{2}(e_1^{*}((c_1(\mathcal{O})(1),\widetilde{h})^2) (p)+\frac{\left(c_1^2(E)- \frac{12}{5}c_2(E) \right).X}{2\displaystyle \int_X\omega^2} \omega^2 (p)\,\geq\, c_1^2(h)(p)-\frac{12}{5}c_2(h) (p). \end{gather} Integrating on both sides, we are done. \medskip \noindent \textbf{When $n\,=\,3,\, r\,=\,2$:}\, When $\dim \pi(Y)\,=\,0,\,1,\,2$ or when $\dim Y\, =\,4$, we are done. We only need to consider the case when $\pi(Y)\,=\,X$ and $\dim Y\,=\,3$. As in the case of $n\,=\,2,\, r\,=\,3$, we can assume without loss of generality (by means of an approximation argument as in the previous case) the existence of a Hermitian-Einstein metric $H$ such that $$c_1(\mathcal{O}(1))\big\vert_Y^3 (p)\,=\, (\Theta_1^1)^3(p),\,\, \omega\,=\,c_1(H)\,=\, \sum_{i=1}^3 \sqrt{-1} dz^i \wedge d\overline{z}^i,$$ $$\Theta_1^1 \,=\, \sum_{i=1}^3 \mu_i \sqrt{-1}dz^i \wedge d\overline{z}^i,\,\, \Theta_2^2 \,=\, \omega-\Theta_1^1 ,\,\, \sum_i \mu_i \,=\,\frac{3}{2}.$$ Moreover, $\displaystyle \sum_{i=1}^3 (\Theta_1^2)_{i\overline{i}}\,=\,0$. We can now calculate as follows: \begin{gather} 15\frac{\left(c_1^2(E)-\dfrac{16}{5} c_2(E)\right)c_1(E)}{\omega^3} \,=\, 15-48\frac{\Theta_1^1 \omega^2-(\Theta_1^1)^2 \omega-\Theta_{1}^2\overline{\Theta}_1^2\omega}{\omega^3} \nonumber \\ =\,15-8\left(3-2\displaystyle \sum_{i<j} \mu_i \mu_j-\sum_{i<j}\left((\Theta_1^2)_{i\overline{i}} (\overline{\Theta_1^2})_{j\overline{j}}+(\Theta_1^2)_{j\overline{j}} (\overline{\Theta_1^2})_{i\overline{i}} \right)+\sum_{i<j} \left(\big\vert (\Theta_1^2)_{i\overline{j}}\big\vert^2+ \big\vert (\Theta_1^2)_{j\overline{i}}\big\vert^2\right) \right) \nonumber \\ \leq\, -9+16\displaystyle \sum_{i<j} \mu_i \mu_j, \label{ineq:ontheway} \end{gather} where the last inequality is derived using the fact that $\displaystyle \sum_i (\Theta_1^2)_{i\overline{i}}\,=\,0$. Now let $$V\,=\,\mu_1 \mu_2 \mu_3 \,=\, \frac{(\Theta_1^1)^3}{\omega^3}.$$ Since $\displaystyle \sum_i \mu_i \,=\,\frac{3}{2}$, if $\mu_1\,\geq\, \mu_2\,\geq\, \mu_3$, then $\mu_1\, \geq\, \frac{1}{2}$. We can simplify Inequality \eqref{ineq:ontheway} as follows: \begin{gather} 15\frac{\left(c_1^2(E)-\dfrac{16}{5} c_2(E)\right)c_1(E)}{\omega^3}\,\leq\, -9+16 \frac{V}{\mu_1}+16\mu_1 \left(\frac{3}{2}-\mu_1 \right) \nonumber \\ =\,\frac{16V}{\mu_1} -(4\mu_1-3)^2 \nonumber \\ \leq\, 32 V. \label{ineq:done} \end{gather} Integrating on both sides, we are done. \qed \section{Counterexamples}\label{sec:counter} Consider rank $r$ vector bundles on surfaces. In this section we provide counterexamples to show that if L\"ubke's condition $c_1^2(E).X\,>\,\frac{2r(r-1)}{r^2-2r+2}c_2(E).X$ is not met, then the conclusion of the theorem cannot hold in general. Likewise for semistability with respect to $\det(E)$. For $r=2$, the counterexample for semistability was provided in \cite{ScTa} and the sharpness of the Chern class inequality was shown in \cite{Su}. For the remainder of this section we assume $r\geq 3$. Indeed, just as in \cite{ScTa}, let $M$ be a Riemann surface of genus at least two, and let $F$ be a stable vector bundle of rank two on $M$ such that $c_1(F)\,=\,0$ and the symmetric product $S^m F$ is stable for all $m\,\geq\, 1$. Set $X\,=\,\mathbb{P}(F)$, and let $L\,=\,\mathcal{O}_{\mathbb{P}(F)}(1)$. (Then $c_1(L)^2\,=\,0$ and $L\big\vert_C$ is positive for all curves $C$ on $X$.) Let $H$ be an ample line bundle on $X$, and set $$E\,=\,L\oplus H \oplus H \oplus \ldots \oplus H .$$ Note that $E$ is not ample because its quotient $L$ is not ample. However, $E$ is ample when restricted to curves. Then, \begin{gather} c_1(E)\,=\,c_1(L)+(r-1)c_1(H),\nonumber \\ c_2(E)\,=\,(r-1)c_1(L)c_1(H)+\frac{(r-1)(r-2)}{2}c_1^2(H).\nonumber \end{gather} The slope of $L$ is $c_1(L).c_1(E)\,=\,(r-1)c_1(L)c_1(H)$ and that of $H$ is $$c_1(H).c_1(E)\,=\,c_1(H).c_1(L)+(r-1)c_1(H)^2.$$ Therefore, semistability of $E$ (with respect to $\det(E)$) holds if and only if \begin{gather} (r-2)c_1(L).c_1(H)\,=\,(r-1)c_1(H)^2. \nonumber \end{gather} Certainly this inequality cannot be met for an arbitrary $H$ (and thus ampleness can fail if semistability does not hold). Suppose semistability is met. Then we have the following: \begin{gather} c_1(E)^2.X\,=\,(r-1)^2c_1(H)^2.X+2(r-1)c_1(L)c_1(H).X=(r-1)rc_1(L)c_1(H).X, \nonumber \\ \frac{2r(r-1)}{r^2-2r+2}c_2(E).X\,=\,\frac{2r(r-1)}{r^2-2r+2}\frac{2(r-1)+(r-2)^2}{2} c_1(L)c_1(H)=c_1(E)^2.\nonumber \end{gather} Therefore, if L\"ubke's Chern class inequality is not met, ampleness cannot hold in general. \section*{Acknowledgements} The second author is partially supported by grant F.510/25/CASII/2018(SAP-I) from UGC (Govt. of India), and a MATRICS grant MTR/2020/000100 from SERB (Govt. of India). The first author is partially supported by a J. C. Bose Fellowship.
\section{#1}} \begin{document} \title{Signatures of Quantum Gravity in the Gravitational Self-Interaction of Photons} \author{Zain Mehdi} \email{<EMAIL>} \affiliation{Department of Quantum Science and Technology and Department of Fundamental and Theoretical Physics, Research School of Physics, Australian National University, Canberra 2600, Australia}% \author{Joseph J. Hope} \affiliation{Department of Quantum Science and Technology and Department of Fundamental and Theoretical Physics, Research School of Physics, Australian National University, Canberra 2600, Australia}% \author{Simon A. Haine} \email{<EMAIL>} \affiliation{Department of Quantum Science and Technology and Department of Fundamental and Theoretical Physics, Research School of Physics, Australian National University, Canberra 2600, Australia}% \date{\today \begin{abstract} We propose relativistic tests of quantum gravity using the gravitational self-interaction of photons in a cavity. We demonstrate that this interaction results in a number of quantum gravitational signatures in the quantum state of the light that cannot be reproduced by any classical theory of gravity. We rigorously assess these effects using quantum parameter estimation theory, and discuss simple measurement schemes that optimally extract their signatures. Crucially, the proposed tests are sensitive to the spin of mediating gravitons, thus providing a new avenue for understanding the quantum nature of gravity. \end{abstract} \pacs{03.67.Lx \maketitle \SectionPRL{Introduction}The lack of experimental evidence supporting the quantization of the gravitational field is one of the most significant challenges in the search for a unified theory of quantum theory and general relativity (GR). Remarkably, low-energy experiments may soon be capable of testing the quantum nature of the gravitational field~\cite{Hossenfelder2017,bose_spin_2017,marletto_gravitationally_2017,Krisnanda2017,marletto_when_2018,Pino2018,Howl2017,Carney_2019,carlesso_testing_2019,Christodoulou2019,krisnanda_observable_2020,marshman_locality_2020,van_de_Kamp_2020,haine_searching_2021,howl_non-gaussianity_2021,Weiss2017,Bose2022Mechanism,Anastopoulos2020,Belenchia2016,Derakhshani2016,Schmle2016,AlBalushi2018,Miao2020,Tilly2021,Schut2022,Pedernales2022}. In particular, proposals for observing for quantum correlations between masses induced by their gravitational interaction have seen significant development in the last five years~\cite{marletto_when_2018,Carney_2019,carlesso_testing_2019,Pedernales2022,krisnanda_observable_2020,Christodoulou2019,marshman_locality_2020,van_de_Kamp_2020,Chevalier2020,Rijavec2021,haine_searching_2021,Toros2021,howl_non-gaussianity_2021,Tilly2021,Bose2022Mechanism,Schut2022}. The majority of these schemes consider gravitationally-induced entanglement (GIE) as the key signature of a quantized gravitational field, following proposals by Bose~\emph{et~al.}~\cite{bose_spin_2017} and Marletto and Vedral~\cite{marletto_gravitationally_2017}. More recent proposals have studied further signatures of quantum gravity that may be probed in ultra-cold atomic ensembles~\cite{haine_searching_2021,howl_non-gaussianity_2021} and optomechanical systems~\cite{AlBalushi2018,Miao2020,Matsumura2020, Biswas:2022}. While the prospect of table-top tests of quantum gravity is extraordinary, there are significant challenges with realising these proposals experimentally. Firstly, there are the well-known technical challenges of creating and probing macroscopic superpositions of mesoscopic masses (${\sim}10^{-14}$kg) in the presence of environmental decoherence~\cite{van_de_Kamp_2020,Rijavec2021}, as well as the requirement that Casimir-Polder interactions between the masses must be suppressed~\cite{Chevalier2020,van_de_Kamp_2020}. Still, these challenges may be overcome within the next decade~\cite{Margalit2021}. \par However, some have argued that experiments that rely on the Newtonian gravitational interaction cannot truly attest to the quantum nature of the gravitational field~\cite{Anastopoulos2018comment,Anastopoulos2020,Anastopoulos2021,Anastopoulos2021b,Martinez2022arxiv,Anastopoulos2022}, and that entanglement may be generated in the Newtonian regime without necessitating a gravitational mediator~\cite{Anastopoulos2021}. These objections to GIE tests of quantum gravity have seen significant debate~\cite{Anastopoulos2018comment,Belenchia2018,Belenchia2019,Christodoulou2019,marshman_locality_2020,Anastopoulos2020,Anastopoulos2021,Anastopoulos2021b,Martinez2022arxiv,Danielson2022,Anastopoulos2022,Carney2022}. The origin of this disagreement appears to stem from fundamental differences of metatheoretical assumptions and interpretation~\cite{Huggett2022,Adlam2022}, which suggests it may be the case that observation of GIE will not be undisputed as empirical evidence for the quantization of gravity -- urgently motivating the need for tests that test quantum gravity outside the Newtonian regime. \par In this \LetterPRL, we propose a platform for fundamentally relativistic tests of the quantum gravity, using the gravitational self-interaction of quantum light in a cavity. We demonstrate that there are multiple quantum gravitational signatures that can be extracted from the quantum state of the light, that cannot be reproduced by \emph{any} classical theory of gravity. Crucially, these signatures are sensitive to the spin of the gravitons that mediate the quantum gravitational interaction between photons. We provide a metrological analysis of the proposed tests, and discuss challenges with their experimental realization. This work provides a new approach for probing the quantum nature of the gravitational field in a regime inaccessible to, and therefore complementary to, existing proposed low-energy tests. \SectionPRL{Self-interaction of light due to gravity}A sufficiently high-density electromagnetic (EM) field will experience a self-interaction mediated by the gravitational field: the energy-density of light will curve spacetime, which in turn will affect the path of the light. This effect is well studied for freely propagating light, both classically~\cite{Tolman1931,Wheeler1955,Ratzel_2016,vanHolten2018} and for photons~\cite{Barker1967,Westervelt1970,Vilasi2011,Brodin2006,Lagouvardos2021}. In the case of quantum light, the nature of this self-interaction will depend on whether the gravitational field is also quantized or not -- providing a powerful avenue of probing the quantum nature of gravity with massless photons. This self-interaction of the electromagnetic field is well described within the framework of perturbative GR, in which the spacetime metric is written as $g_{\mu\nu} \approx \eta_{\mu\nu} + h_{\mu \nu}$ for a background (Minkowski) metric $\eta_{\mu\nu}$ and a perturbation $h_{\mu \nu}$. In the harmonic/Lorenz gauge, this leads to the linearized Einstein field equations \begin{align} \label{eq:LEFE} \Box \bar{h}^{\mu \nu} = -\frac{16\pi G}{c^4} T^{\mu \nu}\,, \end{align} where $\bar{h}^{\mu \nu} = h^{\mu \nu}-\frac{1}{2}\eta^{\mu \nu} h^{\alpha}_\alpha$ is the trace-reverse of the perturbation. Here we consider the perturbation due to the EM field, for which the stress-energy tensor on a general spacetime is: \begin{align} \label{eq:StrongFieldT} T^{\mu\nu} = \frac{1}{\mu_0}\left( F^{\mu\lambda}F^\nu_\lambda - \frac{1}{4}g^{\mu \nu}F^{\alpha \beta}F_{\alpha\beta}\right) \,, \end{align} where $F^{\mu\nu}=\partial^\mu A^\nu - \partial^\nu A^\mu$ is the EM field tensor in terms of the four-potential $A^\mu$, and we have employed Einstein summation. To linear order in $h$, we have $T^{\mu\nu} \approx T^{\mu \nu}_{(0)} + T^{\mu \nu}_{(1)}$, where $T^{\mu \nu}_{(0)}$ is the stress-energy tensor for flat (Minkowski) spacetime and $T^{\mu \nu}_{(1)}=h^{\mu\nu} F^{\alpha \beta}F_{\alpha\beta}/4$ (noting $g^{\mu\nu}\approx \eta^{\mu\nu}-h^{\mu\nu}$)~\footnote{Additionally, we get a term $T^{\mu\nu}\sim F^{\mu\lambda}F^{\nu\alpha}h_{\alpha\lambda}$, however it gives precisely zero contribution to the Hamiltonian density $T^{00}$.}. The term $T^{\mu \nu}_{(1)}$ describes gravitational self-interaction of the light, with $h^{\mu \nu}$ given as the solution to \begin{align} \label{eq:LinearedFieldEq_EM} \left(\nabla^2 - \frac{1}{c^2}\partial_t^2\right) h^{\mu \nu} &= -\frac{16\pi G}{c^4} T^{\mu \nu}_{(0)} \,. \end{align} Note that $T^{\mu \nu}_{(0)}$ is traceless due to the massless nature of photons. Eq.~\eqref{eq:LinearedFieldEq_EM} has the well-known Greens function solution $h^{\mu \nu}(\bm{r},t) =- (4 G/c^4)\int d\bm{r'}T^{\mu \nu}_{(0)}(\bm{r'},t-|\bm{r}-\bm{r'}|/c)/|\bm{r}-\bm{r'}|$~\Supp{B}, therefore leading to a self-interaction term in the Hamiltonian density ($\mathcal{H}\equiv T^{00}$) quartic in EM fields. The quantization of the EM field gives a stress-energy tensor that is operator valued, i.e. $\hat{T}^{\mu \nu}$, which directly implies the quantization of the gravitational field, i.e. $\hat{h}^{\mu \nu}$ (Fig.~\ref{fig:numberscheme}a). The self-interaction term in the resulting Hamiltonian will then be quartic in bosonic creation/annihilation operators -- e.g. $\hat{H}_{\rm int}= \int d^3\bm{r}\hat{h}^{0 0}\hat{F}^{\alpha \beta}\hat{F}_{\alpha\beta}/4\sim \hat{a}^\dag\hat{a}^\dag\hat{a}\hat{a}$ for a single-mode field. In contrast, the self-interaction Hamiltonian for any \emph{classical} theory of gravity -- specifically, any theory for which $h^{\mu \nu}$ is not operator valued -- may only be quadratic in creation/annihilation operators, at most. For example, in semiclassical gravity where $\hat{T}^{\mu \nu}\to \langle\hat{T}^{\mu \nu}\rangle$, we would have self-interaction Hamiltonian terms such as $\sim\langle\hat{a}^\dag\hat{a}\rangle\hat{a}^\dag\hat{a}$. Therefore there will be distinct signatures of the quantum self-interaction that cannot be reproduced by \emph{any} classical theory of gravity. We will explore these signatures both qualitatively and quantitatively in this work.\par Crucially, the self-interaction is sensitive to the spin of the quantized gravitational mediator, unlike Newtonian interactions~\cite{Carney2022}. The self-interaction described by $\hat{H}_{\rm int}$ specifically requires a spin-$2$ graviton -- mediators with any other spin would correspond a different form of gravity-light coupling in Eq.~\eqref{eq:StrongFieldT}, and give rise to a distinct interaction from $\hat{H}_{\rm int}$~\cite{Carney2022}. As the EM field has a traceless stress-energy tensor ($T=T^{\mu}_\mu=0$), this rules out mediation by spin-$0$ gravitons that couple solely to the trace $T$. This includes virtual spin-$0$ gravitons that appear in the canonical quantization of perturbative GR~\cite{Gupta_1952}, and quantized scalar gravity theories, such as that of Nordstr\"om~\cite{Nordstrm1913,Carney2022} or Brans-Dicke theory~\cite{Brans1961,Banerjee2016,Pal2016}. We note here the related proposal for realising the quantum analog of gravitational lensing~\cite{Biswas:2022}, in which mediators of different spin can be distinguished in the deflection angle of the light~\cite{Carney2022}. \par \SectionPRL{Kerr non-linearity for a single-mode field}First, let us consider a quantized EM field in a linear cavity with a single mode $\omega_0$ described by creation/annihilation operators $\hat{a}$/$\hat{a}^\dag$. We will consider the multi-mode case shortly. We treat the interaction Hamiltonian $\hat{H}_{\rm int}$ within a rotating-wave approximation (RWA), assuming the cavity finesse $\mathcal{F}$ and length $L$ satisfy $\mathcal{F}L\gg c/\omega_0$, which generates the unitary operator~\Supp{A}: \begin{align} \label{eq:UQG_SM} \hat{U}_{\rm QG} = \exp\left(i\chi_{\rm Q} \hat{a}^\dag\hat{a}^\dag\hat{a}\hat{a}\right) \,. \end{align} The dimensionless parameter $\chi_{\rm Q}=\mathcal{I} G \hbar \omega_0^2 \tau/(2\pi^2 L c^4) $ encodes the magnitude of this interaction, where $\mathcal{I}$ is a dimensionless coefficient that depends on cavity length, light wavelength $\lambda=2\pi c/\omega$, and width of the light beam $\sigma$. The interrogation time of this interaction is given by $\tau=\mathcal{F}L/c$. We then find the leading contribution to the dimensionless coefficient is given by $\mathcal{I}\approx 2\pi^4 \sigma^2/(\lambda L)$ provided $L \gg \lambda$, $\sigma$ and $\sigma\gg\lambda$~\Supp{B}, and thus the magnitude of the interaction can be expressed as: \begin{align} \label{eq:chiQ} \chi_{\rm Q} \approx\frac{\pi G \hbar \omega_0^3 \mathcal{F}\sigma^2}{2 c^6 L} \,. \end{align} Eq.~\eqref{eq:UQG_SM} can be understood as a gravitational Kerr effect that gives rise to self-phase modulation of the optical field -- here the gravitational field plays the role of the underlying nonlinear medium. Observing signatures of this effect is equivalent to observing GIE between photons, analogous to the original entanglement witness proposals~\cite{bose_spin_2017,marletto_gravitationally_2017}.\par In contrast, any classical theory of gravity -- that is, any theory for which $h^{\mu \nu}$ is not operator valued -- will at most result in a self-interaction term of quadratic order. In the RWA, the classical gravitational Hamiltonian must then take the form $\hat{H}^{\rm C}_{\rm int}=\hbar\lambda_{\rm C} \hat{a}^\dag \hat{a}$ for some coefficient $\lambda_{\rm C}$, giving the unitary $\hat{U}_{\rm C} = \exp\left(i\chi_{\rm C} \hat{a}^\dag\hat{a}\right)$, where $\chi_{\rm C}=\lambda_{\rm C}\tau$. Note that $\lambda_{\rm C}$ itself may depend on expectations of the quantum field as in semi-classical gravity, and may even include contributions from non-gravitational effects that do not result in interactions between photons. Nevertheless, any such Hamiltonian cannot reproduce features of the quantum gravitational Kerr effect. \par \SectionPRL{Fundamental detectability}Here we consider the fundamental limit to which the quantum gravitational self-interaction can be distinguished from the self-interaction described by any classical theory of gravity. More precisely, we ask the question -- how well can $\chi_{\rm Q}$ be distinguished from zero, given a completely \emph{unknown} value of $\chi_{\rm C}$? We can reformulate this as a multi-parameter estimation problem by treating $\chi_{\rm C}$ as a \emph{nuisance parameter}, following the approach of Ref.~\cite{haine_searching_2021}. Specifically, the smallest possible non-zero value of $\chi_{\rm Q}$ that may be inferred from a set of $M$ measurements each with interrogation time $\tau$ is given by the quantum Cram\'er-Rao bound (QCRB) \cite{Liu2019}: \begin{align}\label{eq:QCRB}\chi_{\rm Q} \geq \sqrt{[F_{i,j}]^{-1}_{\rm Q,Q}/M}\,,\end{align} where $ F_{i,j} = 4\tau^2\,\textrm{Cov}(\hat{G}_i,\hat{G}_j)$ is the quantum Fisher information matrix (QFIM) with respect to the classical and quantum generators $\hat{G}_{\rm C}=\hat{a}^\dag\hat{a}$ and $\hat{G}_{\rm Q}=\hat{a}^\dag\hat{a}^\dag\hat{a}\hat{a}$, respectively. The covariance is computed with respect to the state $\ket{\Psi}=\hat{U}_{\rm QG}\hat{U}_{\rm C}\ket{\psi}$ for some initial state $\ket{\psi}$. Note that the existence of an inverse QFIM is not guaranteed -- a non-invertible QFIM would correspond to the effect of the quantum gravitational interaction being fundamentally indistinguishable from a classical gravitational interaction. The choice of initial state $\ket{\psi}$ is therefore crucial to the detectability of quantum gravity given ignorance of $\chi_{\rm C} $; the wrong choice of state may result in zero sensitivity to $\chi_{\rm Q}$ regardless of the number of measurements. In this analysis we restrict ourselves to quantum states that may be prepared with established experimental techniques. In particular, we find that for a squeezed vacuum state, the signatures of quantum and classical gravity theories are highly distinguishable, resulting in Heisenberg scaling of the sensitivity~\Supp{C} \begin{align} \label{eq:QCRB_SqVac} \chi_{\rm Q}\geq \frac{1}{\sqrt{96M} N(N+1)} \end{align} where $N\equiv \langle \hat{a}^\dag \hat{a} \rangle$ is the average number of photons in the cavity. In comparison, a significant amount of information is lost for coherent state or a squeezed coherent state, with the sensitivity scaling as $N^{-3/2}$ in the absence of the nuisance parameter, and as $N^{-1}$ in its presence. \par This result allows us to make strong statements about the fundamental detectability of $\chi_{\rm Q}$, given no information about the classical theories of gravity from which this signal is distinguished. Specifically, we can use Eq.~\eqref{eq:QCRB_SqVac} to bound the experimental requirements to infer a non-zero value of $\chi_{\rm Q}$. For example, we may re-write Eq.~\eqref{eq:chiQ} in terms of the circulating power in the cavity $P_{\rm circ}=N\hbar\omega_0 c/L$, and the number of experiments $M\approx T/\tau$ that may conducted within a total time $T$. Making these substitutions and taking $N\gg 1$, we find that the circulating power required to satisfy Eq.~\eqref{eq:QCRB_SqVac} is approximately: \begin{align} P_{\rm circ} \gtrsim \frac{c^4}{\sigma }\left(\frac{\hbar^2}{24\pi^2 G\omega_0^2 \mathcal{F}LT}\right)^{1/4} \,. \end{align} This expression shows weak dependence of the required power on the interrogation time of the cavity $P_{\rm circ}\sim \tau^{-1/4}$, and is most strongly dependent on the transverse width of the cavity beam $\sigma$. As an example, consider experimental parameters similar to those expected of the next-generation gravitational-wave detector Cosmic Explorer~\cite{Abbott_2017}: a $L=10$km long cavity of finesse $\mathcal{F}=450$ with a $2\mu$m wavelength laser and beam width $10$cm. The minimum required circulating power for this system to infer the quantum signature of gravity over a year-long interrogation period is roughly $850$MW -- much larger than the $\mathcal{O}(1)$MW circulating powers expected of Cosmic Explorer. More realistically, we can instead consider a much smaller cavity $L=10$m with high finesse $\mathcal{F}=10^5$, and pump laser power of $50$kW ($P_{\rm circ}{\approx}5$GW)~\cite{Sistrunk2019,Spengler2022}. In this case, a $30$ day interrogation period is sufficient extract the signature of quantum gravity, in principle. Interestingly, this level of laser power is significantly lower than quoted requirements for directly measuring the gravitational field of the light~\cite{Spengler2022}, or generating observable light-matter entanglement~\cite{Biswas:2022}. An additional benefit of these parameters is that the beam intensity (${\sim}50$MW/cm$^2$) falls well within the thermal tolerance of modern low-loss cavity mirrors~\cite{Meng2005}. While $50$kW continuous lasers are commercially available~\cite{ipg}, the requirement of a squeezed-vacuum state at this power is beyond current experiments -- we will see later the need for highly squeezed states may be avoided by considering multi-mode interactions. \SectionPRL{Possible measurement schemes} \begin{figure} \centering \includegraphics[width=.9\columnwidth]{Qgrav_light_fig_small.png} \caption{(a) Superpositions of different photon numbers result in superpositions of spacetime geometries if gravity is quantum, resulting in quantum gravitational signatures in the state of the light. (b) A MZ interferometric scheme can observe signatures of quantized gravity in number-difference measurements between light exiting a pair of cavities, for an initial TMSV state. (c) Alternatively, quantum gravity can be witnessed by non-Gaussian statistics in the phase quadratures of photons exiting a single cavity via homodyne detection. } \label{fig:numberscheme} \end{figure} The question remains to design a measurement scheme that optimally extracts the signature of quantum gravity in the proposed cavity system, i.e. a measurement scheme for which the ideal precision is given by the right hand side of Eq.~\eqref{eq:QCRB_SqVac}. Optimal measurement schemes are not always guaranteed to exist, and are often not experimentally feasible. We instead identify two, experimentally realizable, \emph{nearly} optimal schemes -- their precision is not exactly Eq.~\eqref{eq:QCRB_SqVac}, but scales the same with $N$ (Heisenberg scaling). In Figure~\ref{fig:numberscheme}(b) we present a simple interferometric scheme that provides an optimal measurement for an initial two-mode squeezed vacuum state (TMSV)~\Supp{D}. In this scheme, the initial TMSV is beam-split to create a pair of squeezed vacuum states, each of which is fed into a high-finesse cavity. The gravitational self-interaction of the light leads to a relative phase between the two modes, which is then read-out by interfering the light exiting the cavity and reading out the number difference between the two modes. The distinguishability of the signature of quantum gravity from classical gravity in this scheme can be simply understood by considering the evolution of the state in the number basis. For the initial TMSV state $\ket{\psi} = \sum_N c_N \ket{N,N}$, where $c_N=(-e^{i\phi}\tanh(r))^N/\cosh(r)$, the measurement scheme can be described by the unitary operator $\hat{U}_{\rm MZ}=\hat{U}_{\rm BS}(\pi/2)\hat{U}_{\rm QG }\hat{U}_{\rm BS}(\pi/2)$, where $\hat{U}_{\rm BS}(\pi/2)$ is a 50-50 beamsplitter and $\hat{U}_{\rm QG }=\exp\left(i\chi_{\rm Q}((\hat{a}^\dag)^2\hat{a}^2+(\hat{b}^\dag)^2\hat{b}^2)\right)$ is the quantum-gravitational self-interaction for the two cavity modes represented by $\hat{a}$ and $\hat{b}$. To first order in $\chi_{\rm Q}\ll 1$, $\hat{U}_{\rm MZ}$ couples each $\ket{N,N}$ in the initial TMSV to $\ket{N-2,N+2}$ and $\ket{N+2,N-2}$. Higher order terms in this expansion will result in coupling to states $\ket{N-2n,N+2n}$ for integer $n$, though these will be negligible due to the exceptionally small value of $\chi_{\rm Q}$. Number measurements on each mode will then collapse the quantum state onto a manifold of well-defined $N$, with a small probability $\sim\chi_{\rm Q}^2$ of measuring a non-zero number difference between the modes. In contrast, consider the same scheme for a classical theory of gravity. First we assume the two cavities experience precisely the same self-interaction -- i.e. $H_{\rm int}^{\rm C}=\hbar\lambda_{\rm C}\left(\hat{a}^\dag\hat{a}+\hat{b}^\dag\hat{b}\right)$ -- the number distribution of each mode measured at the detector is unchanged from the number distribution of the original TMSV state. More generally, we allow for the case of a classical theory of gravity that additionally has a term of the form $H_{\rm int}^{\rm C}\sim\hat{a}^\dag\hat{a}-\hat{b}^\dag\hat{b}$. Such a term could also be contributed by non-gravitational effects that result in an asymmetry between the two cavities. In this case, each $\ket{N,N}$ in the initial TMSV will be coupled to states $\ket{N-n,N+n}$ for integer $n$ by the measurement scheme, with dominant coupling for $n=\pm 1$. This is clearly distinguishable from the signature of quantum gravity, in which the dominant coupling is for $n=\pm 2$. The main limitation with this approach is the requirement of ultra-high efficiency detectors operating at the single photon level, which for the high-power required is beyond reason for modern detection technology. An appealing alternative measurement scheme uses homodyne detection to observe signatures of quantum gravity in high-order cumulants of the phase quadratures \cite{howl_non-gaussianity_2021}, which can be implemented straightforwardly a single cavity and homodyne detection. This approach relies on the fact that the quartic self-interaction term described by a quantum theory of gravity will generate non-Gaussianity of the optical field, that cannot be reproduced by \emph{any} classical theory of gravity \cite{howl_non-gaussianity_2021}. As a result, a non-zero value of the fourth-order cumulant in a phase-quadrature of the light is a clear signature of the quantum nature of gravity. This scheme was initially proposed in the context of massive ultra-cold atomic systems \cite{howl_non-gaussianity_2021}, in which observing this signature is considerably more challenging due to the inability to directly measure the phase quadratures of massive particles. For this scheme it will again be optimal to use a high-power squeezed vacuum state of light, to maximize the sensitivity of the state to the gravitational self-interaction \cite{howl_non-gaussianity_2021}. Unlike proposals based on the gravitational interaction between massive particles, there is no van-der-Waals interaction between photons that can mimic the effect of the gravitational interaction -- a significant benefit to the light-based approach. However, when using an optical cavity, radiation pressure on the cavity mirrors can also result in a quantum interaction between photons. Fortunately, the magnitude of the radiation pressure interaction scales inversely with the mass of the mirrors. Therefore, by varying this parameter it is possible to distinguish this effect from the interaction resulting from gravitational coupling. \SectionPRL{Multi-mode interactions}The signatures of quantum gravity induced by the gravitational self-interaction of light become significantly more rich when we consider multiple modes of the optical field. Specifically, an ideal cavity may host multiple resonant frequencies $n\omega_0$ for some resonant frequency $\omega_0$ and integer $n$. The multi-mode effects of the self-interaction of light can be understood by analogy to traditional non-linear optics, as a non-linear response of an optical medium to the presence of light. In this case, the curvature of spacetime due to the energy-density of the optical field is equivalent to an intensity-dependent shift in the refraction index from vacuum. This leads to a number of non-linear optical effects -- here we restrict ourselves to those that survive the RWA. The prefactors of the Hamiltonian terms that describe these effects for a quantized gravitational field have the same parameter scalings as the single-mode self-interaction considered earlier, and are roughly the same order of magnitude as Eq.~\eqref{eq:chiQ}. To begin with, the quantum gravitational self-interaction gives rise to terms in the Hamiltonian that describe third-harmonic generation, i.e. $H_{\rm int}\sim \hat{a}_{\omega_0}\hat{a}_{\omega_0}\hat{a}_{\omega_0}\hat{a}_{3\omega_0}^\dag$. In contrast, any classical gravitational theories can only have non-energy-conserving terms arising such as $ H_{\rm int}\sim \hat{a}_{\omega_0}\hat{a}_{3\omega_0}^\dag$ which in the interaction picture will oscillate with frequency $2\omega_0$, and thus will be discarded in the RWA. Consider a simple experiment, in which the light incident on the cavity is purely in the $\omega_0$ mode, with all other frequencies in the vacuum -- the detection of photons of frequency $3\omega_0$ exiting the cavity would be a clear signature of four-wave mixing due to the quantum nature of gravity. This could in-principle be achieved with modern photodetectors that operate at the single-photon level if the pump mode ($\omega_0$) is discarded using a wave-length selective beamsplitter. An additional benefit of this experiment is that it can be implemented with coherent light -- with the QCRB for the sensitivity scaling as $N^{-3/2}$ for both coherent and squeezed vacuum states of the pump mode. \par Additionally, the quantum gravitational self-interaction will include cross-Kerr nonlinearities between pairs of frequencies of the form $\hat{H}_{\rm int}\sim \hat{a}_i^\dag \hat{a}_i\hat{a}_j^\dag \hat{a}_j$. Interactions of this form will result in cross-phase modulation, leading to entanglement between the quadratures of the two frequencies, which is distinguishable from interactions present in classical theories of gravity, specifically interactions of the form $\hat{H}_{\rm int} \sim \hat{a}_i^\dag \hat{a}_i$ and $\hat{H}_{\rm int} \sim \hat{a}_i^\dag \hat{a}_j$, neither of which result in entanglement or non-Gaussian states. \SectionPRL{Conclusions}While measuring gravitationally-induced entanglement in massive systems would be an incredible achievement, it is unlikely to be an undisputed demonstration of the quantum nature of gravity due to the disagreements regarding the fundamental nature of the Newtonian gravitational interaction. This work may provide a new pathway for resolving this question by testing the quantum nature of gravity in a entirely relativistic system that can attest not only to the existence of the graviton, but also its spin. This work is therefore entirely complementary to ongoing work searching for GIE; together these tests may provide more insight to the true nature of gravity than either can attest to separately.\par Furthermore, we have provided a comprehensive metrological analysis to establish fundamental requirements of such experiments. While there are several benefits of the all-optical approach -- there are no Casimir-Polder interactions that need to be suppressed, the experimental methods to generate quantum states of light are well-established, as are the measurement techniques we considered -- the challenges are just as pronounced. In particular, reading out signatures of quantum gravity from photon statistics requires extremely efficient photodetectors, beyond current experimental capabilities -- though there are clear routes to reducing these requirements by using interaction-based readouts~\cite{Nolan:2017b,Haine2018}, for example. Regardless, overcoming these challenges may become increasingly possible in the future given the outstanding rate at which photonic quantum technologies are advancing. The tests proposed here therefore provides a novel approach for answering the question once and for all -- \emph{is gravity quantum?}\par \SectionPRL{Acknowledgements}We acknowledge insightful discussions with Daniel Carney, Ruvi Lecamwasam, James Gardner, and Karl Wette. ZM is supported by an Australian Government Research Training Program (RTP) Scholarship. SH acknowledges support through an Australian Research Council Future Fellowship grant FT210100809.
\section{Introduction} Electron gas with Coulomb interactions dominating over the kinetic energies forms a Wigner crystal \cite{wigner,w791,win2,win3}. Its finite counterparts, e.g. Wigner molecules \cite{bryla,jaula1d,eggla,shapir,diaz1d,pecker,corrigan,modaresi,yanla,reimla,fila,uzi1,szafran1d,kala,jose,cus1d,sarma1d} are formed in quantum dots at low electron numbers in spatially large systems \cite{bryla} or in a strong magnetic field that promotes the single-electron localization \cite{reimann,jain}. The confined charge density in quantum dots defined in materials with isotropic effective mass reproduces the symmetry of confinement potential. For this reason in circular quantum dots, separation of the electrons in the Wigner phase occurs only in the inner coordinates of the system spanned by relative electron-electron distances \cite{reimann}. For lowered symmetry, the Wigner molecules can appear in the laboratory frame \cite{wimabrok}, with the special case of one-dimensional systems that is studied with much of attention \cite{jaula1d,diaz1d,cus1d,szafran1d,sarma1d}. Phosphorene \cite{fosf14,bp,review0,rev} is a particularly interesting material for Wigner-molecule physics due to the large electron effective masses and their strong anisotropy \cite{anisobp,18,tibikast1,tibikast2,kp,zhou,szafran1} Large masses reduce the kinetic energy as compared to the electron-electron interaction energy. Lowering the Hamiltonian symmetry by the effective mass anisotropy is promising for observation of the Wigner molecules in the laboratory frame. Phosphorene quantum dots \cite{Lee17,Sun15,Wang18,BPQD18,Saroka,s2,s3,pet1} in the form of small flakes have been extensively studied, in particular from the point of view of optical properties. In this work we consider a clean electrostatic confinement that keeps the confined electrons off the edge of the flake. In finite sheets of graphene, the edges inhibit the Wigner crystallization \cite{modaresi}. Advanced phosphorene gating techniques have been developed \cite{rev,l20,l21,l22,gatetune} for e.g. fabrication of the field-effect transistors \cite{bp,he19,bl19} and experimental studies of the quantum Hall effects \cite{natyang,hhe,ehe,qhe} are carried out. Therefore, the formation of clean electrostatic quantum dots \cite{eqd} in phosphorene is within experimental reach. Ordering of the electron charge in Wigner molecules of single-electron islands in quasi 1D systems \cite{jaula1d,diaz1d,cus1d,szafran1d,sarma1d} reduces the electron-electron interaction energy at the cost of increasing the kinetic energy due to the electron localization. In GaAs systems with low electron band effective mass of $0.067m_0$ conditions for Wigner molecule formation occur only in very long systems of hundreds of nanometers \cite{szafran1d} already for four electrons. On the other hand, the light electron mass in GaAs favors the reduction of the 2D confinement to an effectively 1D form with all the electrons occupying the same state of quantization for the transverse motion. Hence, the large effective masses in phosphorene are promising for producing the Wigner molecules in systems of relatively small sizes, but may inhibit formation of 1D confinement. In this paper, we consider the formation of Wigner molecules in the laboratory frame for a few electrons confined in circular and elongated quantum dots for varied confinement orientation and look for spectral signatures of Wigner crystallization to be experimentally resolved. We use the configuration interaction approach \cite{ci,ci2,ci3,ci4,ci5} that requires an optimized single-electron basis \cite{ci6,hfci,hfci0} for convergence due to the strong electron-electron interaction effects \cite{fyang} in phosphorene. This paper is organized as follows. In the Theory section we describe the applied computational approach. In the Results section we first describe the results for circular quantum dots and next the Wigner molecules in quasi one-dimensional confinement oriented along the zigzag and armchair crystal directions. Section IV contains the discussion of the experimentally accessible signatures of the Wigner molecule formation in the laboratory frame. Summary and conclusions are given in Section V. In the Appendix we include details on the single-electron wave functions used for optimization of the basis, the choice of the computational box, and the spectra without the Zeeman interaction. \begin{figure*} \begin{tabular}{ll} \includegraphics[width=0.8\columnwidth]{schematic_cylinder_small1.png} \put(-20,15){(a)} & \includegraphics[width=0.8\columnwidth]{schematic_rectangle_small1.png} \put(-20,15){(b)}\\ \includegraphics[width=0.6\columnwidth]{vci-crop} \put(-2,15){(c)} & \includegraphics[width=0.6\columnwidth]{vre-crop} \put(-2,15){(d)}\\ \end{tabular} \caption{ Schematics of model systems for evaluation of the confinement potential. The phosphorene monolayer is embedded in a dielectric that fills the space between electrodes of the plane capacitor configuration. The lower metal electrode contains a circular (a) or rectangular (b) protrusion. The upper electrode is kept at a higher potential energy $-eV_2=0.25$ eV for the electrons than the lower one $-eV_1=0$. The protrusion introduces an inhomogeneity of the electric field within the capacitor that forms the confinement potential for the electrons of the conduction band. We use $h_1+h_2+h_3=150$ nm and $h_1=50$ nm. For the circular protrusion (a) we take $h_2=50$ nm and for the rectangular one (b) $h_2=30$ nm. The radius of the protrusion in (a) is $R=50$ nm, and the sides of the rectangle in (b) have lengths $l_1=80$ nm and $l_2=30$ nm. The confinement potential on the phosphorene plane is plotted in (c) and (d) for the circular and rectangular protrusions, respectively. The origin in (c,d) is the symmetry center of the protrusion. } \label{sys} \end{figure*} \section{Theory} In this section we describe the finite difference method applied to the continuum Hamiltonian of a single electron in phosporene (subsection II.A), the model potential (II.B) and the configuration interaction approach (II.C) with optimization of the single-electron basis allowing for faster convergence of the configuration interaction approach. Subsection II.D describes the formula for extraction of the charge density and pair correlation functions for discussion of the Wigner crystallization of the confined system. \subsection{Single-electron Hamiltonian} We use the single-band approximation for Hamiltonian describing the electrons of the conduction band of monolayer phosphorene \cite{szafran1,tanmay} \begin{eqnarray} H_0&=& {\left(-i\hbar \frac{\partial }{\partial x}+e{A_x}\right)^2}/\, {2m_x} +{\left(-i\hbar \frac{\partial }{\partial y}+e{A_y}\right)^2}/\, {2m_y} \nonumber \\ &+&W(x,y)+{g\mu_B B\sigma_z}/{2} \, , \label{1eh} \end{eqnarray} where $W(x,y)$ is the confinement potential. In Eq. (\ref{1eh}) we use the effective masses $m_x=0.17037m_0$ for the armchair crystal direction ($x$) and $m_y=0.85327m_0$ for the zigzag direction ($y$). The values for the masses were determined in Ref. \cite{szafran1} by fitting the confined energy spectra of the continuum single-band Hamiltonian to the results of the tight-binding method. A detailed comparison of the spectra as obtained by the continuum model to the tight-binding ones is given in Ref. \cite {szafran1} for the harmonic oscillator potential and in Ref. \cite{tanmay} for the annular confinement. In Eq. (\ref{1eh}) we take the Land\'e factor $g=g_0=2$ after the k$\cdot p$ theory of Ref. \cite{Fabbian}. The values of experimentally extracted $g$-factors vary; in particular an increase with respect to $g_0$ was reported \cite{fyang} at low filling factors, which is attributed \cite{Fabbian,fyang} to strong electron-electron interaction effects in black phosphorus. The electron-electron interaction in this work is treated in an exact manner. The spin Zeeman term leads to the spin polarization of the confined system. The exact value of the magnetic field producing the spin polarization is affected by the adopted $g$-factor value, but no qualitative effect for the Wigner crystallization of the charge density is expected as long as the spin-orbit coupling is absent. The spectral features of Wigner crystallization for $g=0$ are discussed in the Appendix. We work with a square mesh with a spacing $\Delta x$ in both the $x$ and $y$ directions. The Hamiltonian acting on the wave function $\Psi_{\mu,\eta}=\Psi(x_\mu, x_\eta)=\Psi(\mu \Delta x, \eta \Delta x)$ in the finite-difference approach reads \begin{eqnarray} H_0 \Psi_{\mu,\eta}&\equiv& \frac{\hbar^2}{2m_x \Delta x^2}\left(2\Psi_{\mu,\eta}-C_y \Psi_{\mu,\eta-1}-C_y^*\psi_{\mu,\eta+1}\right)\nonumber \\ &+&\frac{\hbar^2}{2m_y \Delta x^2}\left(2\Psi_{\mu,\eta}-C_x \Psi_{\mu-1,\eta}-C_x^*\psi_{\mu+1,\eta}\right)\nonumber \\ &+& W_{\mu,\eta}\Psi_{\mu,\eta}+\frac{g\mu_B B}{2}\sigma_z \, , \label{numei} \end{eqnarray} where $C_x=\exp(-i\frac{e}{\hbar}\Delta x A_x)$ and $C_y=\exp(-i\frac{e}{\hbar}\Delta x A_y)$ introduce the Peierls phases \cite{governale} for the description of the orbital effects of the perpendicular magnetic field $(0,0,B)$. For calculation of the phase shifts, we use the symmetric gauge ${\bf A}=(A_x,A_y,A_z)=(-By/2,Bx/2,0)$. Hamiltonian (2) is diagonalized in a finite computational box with the infinite quantum well set at the end of the box (see the Appendix). \subsection{Model potential} For evaluation of a realistic confinement potential $W$ we use a simple model with a phosphorene plane embedded in a Al$_2$O$_3$ dielectric that fills the area between two parallel electrodes [Fig. \ref{sys}(a,b)]. A higher (lower) potential energy for electrons is introduced at the top (bottom) electrode. The bottom electrode is grounded and contains a protrusion that approaches the phosphorene layer. As a result, the electrostatic potential within phosphorene forms a cavity that traps the electrons of the conduction band. The model is a variation \cite{bednarek,szafran2} of a gated GaAs quantum dot of Ref. \cite{Ashoori}. Below we use two models: one with a circular protrusion (Fig. \ref{sys}(a)) and the other with a rectangular one (Fig. \ref{sys}(b)). The latter is used in the following to study the case close to the 1D confinement. The confinement potential to be used in the Hamiltonian is given by $W(x,y)=-eV(x,y,z_p)$, with the electrostatic potential $V$ that we evaluate by solving the Laplace equation $-\nabla^2 V=0$ and $z_p$ is the coordinate of the phosphorene layer. For evaluation of the potential we use the finite element method similar to the one applied in Ref. \cite{szafran2} for a charge-neutral phosphorene plane. The confinement potential at the monolayer is plotted in Fig. \ref{sys}(c) for the circular protrusion of Fig. \ref{sys}(a) and in Fig. \ref{sys}(d) for the rectangular protrusion of Fig. \ref{sys}(b). \begin{figure} \begin{tabular}{l} \includegraphics[width=0.79\columnwidth]{4edopub-crop} \put(-50,35){(a)} \\ \;\;\; \includegraphics[width=0.63\columnwidth]{4e_iwzb_32-crop} \put(-30,35){(b)} \end{tabular} \begin{tabular}{lll} \includegraphics[width=0.34\columnwidth]{pv024-crop} \put(-55,55){$H_0/24$ (c)} & \includegraphics[width=0.34\columnwidth]{hp24-crop}\put(-57,55){$H_0'/24$ (d)}& \includegraphics[width=0.34\columnwidth]{w4e_24-crop}\put(-60,55){$H_0''/24$ (e)}\\ \includegraphics[width=0.34\columnwidth]{pv040-crop}\put(-55,55){$H_0/40$ (f)} & \includegraphics[width=0.34\columnwidth]{hp40-crop} \put(-57,55){$H_0'/40$ (g)}& \includegraphics[width=0.34\columnwidth]{w4e_40-crop}\put(-60,55){$H_0''/40$ (h)}\\ \includegraphics[width=0.34\columnwidth]{pv060-crop} \put(-55,55){$H_0/60$ (i)}& \includegraphics[width=0.34\columnwidth]{hp60-crop}\put(-57,55){$H_0'/60$ (j)} & \includegraphics[width=0.34\columnwidth]{w4e_60-crop}\put(-60,55){$H_0''/60$ (k)} \end{tabular} \caption{ (a) Ground-state energy for 4 electrons confined in circular quantum dot as a function of the number of single-electron eigenstates used for construction of the basis for $B=0$. For the black (red) line the eigenstates of the single-electron Hamiltonian $H_0$ (Hamiltonian $H_0'$) with the bare confinement (confinement with a central Gaussian with $V_0=8$ meV and $\sigma=35$ nm the were used. (b) Energy shift that appears when the states with triple or quadruple excitations above the single-electron $32$-nd energy level are excluded from the basis constructed using $H_0$ (black) and $H_0'$ (red) eigenstates. (c-k) The ground-state charge density in the $x>0, y>0$ quarter of the QD as obtained using the Slater determinants basis constructed with $H_0$ (c,f,i), $H_0'$ (d,g,j) and $H_0''$ (e,h,k) Hamiltonians using $\nu=24$ (c-e), $\nu=40$ (f-h) and $\nu=60$ (i-k) lowest-energy single electron wave functions. } \label{conv} \end{figure} \subsection{Diagonalization of the $N$-electron Hamiltonian} The system of $N$-confined electrons is described with the Hamiltonian \begin{equation} H_N=\sum_{i=1}^N H_0(i)+\sum_{j>i}^N \frac{e^2}{4\pi\epsilon_0\epsilon \, r_{ij}} \, . \end{equation} We take the dielectric constant $\epsilon=9$ assuming that the phosphorene is embedded in Al$_2$O$_3$. In the standard configuration-interaction method \cite{ci,ci2,ci3,ci4,ci5} the $N$-electron Hamiltonian is diagonalized on the basis of Slater determinants constructed with the single-electron Hamiltonian $H_0$ eigenstates. Each of the Slater determinants defines a configuration, e.g. a distribution of electrons over the single-electron states. The number of Slater determinants to be used in the calculation is established by a study of the convergence of the energy estimates. Reaching convergence in the present calculation is challenging because of the strong electron-electron interaction in phosphorene \cite{fyang}. The energy of the ground-state estimated for $N=4$ at $B=0$ in the circular potential of Fig. \ref{sys}(c) is plotted with the black line in Fig. \ref{conv}(a) as a function of the number of the lowest-energy single-electron states $\nu$ that span the Slater determinant basis. The Hamiltonian $H_N$ commutes with the operator of the $z$ component of the total spin and also with the parity operator due to the point symmetry of the potential. The symmetries allow for a few-fold reduction of the number of basis elements. In Fig. \ref{conv} the four-electron ground state at $B=0$ is the spin singlet $S_z=0$ of an even spatial parity. Only Slater determinants of these symmetries contribute to the ground-state wave function. For $\nu=60$ the Slater determinants set counts $\binom{60}{4}=$487 635 elements, of which only about 94 500 determinants correspond to $S_z=0$ and either even or odd parity. The right vertical axis in Fig. 2(a) shows the number of Slater determinants of the spin-parity symmetry that are compatible with and contribute to the ground state. The convergence of the CI method using the $H_0$ single-electron eigenstates (black line in Fig. \ref{conv}(a)) is slow. The electron-electron interaction has a pronounced effect on the electron localization, since the electrons in phosphorene are quite heavy as compared to those in e.g. GaAs, and the deformation of the charge density in terms of the single-electron energy is cheap. This in turn results in a high numerical cost of the convergent calculations that require a large number of single-electron states to be included in the convergent basis. Therefore, due to the strong electron-electron interaction, the set of $H_0$ eigenstates is not the best starting point for a convergent CI calculation. The literature indicates a number of methods to speed-up the convergence, including the HF+CI method \cite{ci6,hfci,hfci0} where the basis for the CI method is based on the Hartree-Fock single-electron spin-orbitals. In the HF+CI approach, the mean-field effects of the electron-electron interaction are accounted for already in the single-electron basis and the CI is responsible only for description of the electron-electron correlation effects that evade the mean-field treatment. The HF charge density in the unrestricted version of the method breaks the symmetry of the confinement potential and its restoration is challenging \cite{chal1,chal2} on its own at the CI stage. Convergence speed-up by the choice of the single-electron basis is achieved \cite{no1,no2} with the natural orbitals \cite{no,uzi2} introduced by L\"owdin \cite{no0}. In this work, we apply a a simple approach that allows for the convergence speed-up by replacing the potential $W$ in $H_0$ by another potential that produces single-electron wave functions of the low-energy spectrum that cover a larger area than the ones for the bare potential $W$. For preparation of the single-electron basis we diagonalize the single-electron Hamiltonian $H_0'$ with the potential \begin{equation} W'=W+V_0\exp(-(x^2+y^2)/d^2).\end{equation} The $H_0'$, eigenfunctions are used for the Slater determinants to diagonalize the Hamiltonian $H_N$. $V_0$ and $d$ of Eq. (4) are used as variational parameters in terms of the $N$-electron energy \cite{dostajemy}. The results for 4 electrons and the basis of the $H_0'$ eigenstates for optimized Gaussian parameters given by the red line in Fig. \ref{conv}(a) exhibit a substantial convergence speed-up with respect to $H_0$ basis. In particular, the basis of $H_0'$ eigenstates with $\nu=36$ and about 12 thousand elements produce a similar ground-state energy estimate as the $H_0$ basis with $\nu=52$ and as much as about 53 thousand Slater determinants. Figure \ref{conv}(a) contains also the results obtained with eigenfunctions of Hamiltonian $H_0''$ (green line) using potential $ W''(x,y)=W(x)/s $, where $s$ is the scaling factor of the bare potential with its variationally optimal value of $s=2.13$. The scaling enlarges the area covered by the low-energy single-electron wave functions in a manner that becomes equivalent in terms of the 4-electron ground-state energy for the one using $W'$ potential for $\nu>32$. The low-energy single-electron wave functions for $W$, $W'$ and $W''$ potentials are given in the Appendix. Figure \ref{conv}(c-k) shows the ground-state charge density in the $x>0$, $y>0$ quarter of the QD as obtained for $\nu=24$ (first row of plots), $\nu=40$ (second row of plots) and $\nu=60$ (third row of plots) with the $H_0$ (left column), $H_0'$ (central column) and $H_0''$ (right column) eigenfunctions. For $\nu=60$ the results are similar for all the three bases. For lower $\nu$ the results for $H_0$ (Fig. \ref{conv}(c,f)) and $H_0''$ (Fig. \ref{conv}(e)) the islands appear closer to the origin than in the convergent result. In order to illustrate the role of the modified potential in the description of the electron-electron interaction, we plotted in Fig. \ref{conv}(b) the energy overestimate that is obtained once the basis of Slater determinants is reduced by exclusion of all configurations with more than two electrons \cite{ci6} above the $32$-nd single-electron energy level. For the Hamiltonian $H_0$ the cost of the limited basis is much larger than for $H_0'$ and grows fast with $\nu$. For $H_0'$ the overestimate is much lower. The single-electron effects due to $W'$ potential are included in the basis, and the double excitations that stay in the basis cover most of the electron-electron correlation effects. A similar result is obtained in the HF+CI method \cite{hfci,hfci0}. \subsection{Charge density and pair correlation function} For analysis of the electron localization, we extract the charge density and the pair correlation function from the $N$-electron wave function $\Psi$. The charge density is obtained as \begin{equation} \rho({\bf r})=\langle \Psi| \sum_{i=1}^N \delta({\bf r}_i-{\bf r})|\Psi \rangle \,. \end{equation} The pair correlation function extracts the relative localization of the electrons with one of the carrier positions fixed \begin{equation} \rho_{12}({\bf r},{\bf r}_f)=\langle \Psi| \sum_{i,j=1}^N \delta({\bf r}_i-{\bf r})\delta({\bf r}_j-{\bf r}_f)|\Psi \rangle \,.\end{equation} In the following we fix the position ${\bf r}_f$ of one of the electrons near the local charge density maximum for a discussion of $\rho_{12}$ plots. The spin density can be calculated as \begin{equation} \rho^{\alpha_i}({\bf r})=\langle \Psi| \sum_{i=1}^N \delta({\bf r}_i-{\bf r})|\alpha_i\rangle\langle \alpha_i||\Psi \rangle \,. \end{equation} where the projection on the spin eigenstates uses $|\alpha_i\rangle $ that stands for the single-electron spin eigenstate for $i$-th electron. Similarly, the relative localization including the spin configuration of the electron pair can be included in the $\rho_{12}$ pair-correlation function. In particular, opposite spin distribution can be obtained using spin projections \begin{eqnarray} \rho_{12}^{\uparrow\downarrow}({\bf r},{\bf r}_f)&=&\langle \Psi| \sum_{i,j=1}^N \delta({\bf r}_i-{\bf r})\delta({\bf r}_j-{\bf r}_f)\times\nonumber\\&\times& (|\alpha_i\beta_f \rangle\langle \alpha_i \beta_f| +|\beta_i\alpha_f \rangle\langle \beta_i \alpha_f|)\Psi \rangle \,,\end{eqnarray} with the spin eigenstates $|\alpha\rangle\neq|\beta\rangle$ . \section{Results} In this section we first (Section III.A) discuss case for the circular external potential where the formation of Wigner molecules in the laboratory frame occurs due to anisotropy of the effective mass. Section III.B contains the results for an elongated confinement potential near the quasi 1D confinement limit. \begin{figure} \begin{tabular}{l} \includegraphics[width=0.7\columnwidth]{ne1-crop} \put(-20,30){(a)} \put(-30,51){N=1}\\ \includegraphics[width=0.75\columnwidth]{zne2d-crop} \put(-33,25){(b)}\put(-42,55){N=2} \\ \includegraphics[width=0.75\columnwidth]{zne3d-crop} \put(-33,25){(c)}\put(-42,45){N=3} \\ \includegraphics[width=0.75\columnwidth]{zne4d-crop} \put(-33,25){(d)} \put(-42,55){N=4}\\ \includegraphics[width=0.75\columnwidth]{zne5z-crop} \put(-33,25){(e)} \put(-42,55){N=5}\\ \end{tabular}\caption{Spectra for circular potential for $N=1$ (a), 2 (b), 3 (c), 4 (d), and 5 (e) electrons. In (a) even and odd parity energy levels are plotted with blue and green lines, respectively. In (b-e) the even parity energy levels are plotted with the solid lines and the odd parity energy levels with the dotted lines. In (e) the symbols of '+' and 'o' mark the states with (1,4) and (0,4) charge configurations, respectively (see text). The color scale is separate for each figure and given to the right of the plot. } \label{scirc} \end{figure}% \subsection{Circular potential} We discuss first the relatively simple case for $N\leq 4$ (Section III.A.1) where in the low energy states the Wigner molecule formation in the laboratory frame is present $(N=2,N=4)$ or absent $N=3$. Section III.A.2 covers the case for $N=5$ where states of both types are present in the low-energy part of the spectrum. \begin{figure} \begin{tabular}{ll} \includegraphics[width=0.4\columnwidth]{ro2egs0t-crop} \put(-40,18){(a)} \put(-70,80){\tiny N=2, 0.01 T}& \includegraphics[width=0.39\columnwidth]{ro2egs5t-crop} \put(-40,18){(b)} \put(-70,80){\tiny N=2, 5 T}\\ \includegraphics[width=0.4\columnwidth]{ro3e0td-crop} \put(-40,18){(c)} \put(-70,80){\tiny N=3, 0.01 T}& \includegraphics[width=0.4\columnwidth]{ro3e5td-crop} \put(-40,18){(d)} \put(-70,80){\tiny N=3, 5 T}\\ \includegraphics[width=0.4\columnwidth]{ro4egs-crop} \put(-40,18){(e)} \put(-70,85){\tiny N=4, 0.01 T} & \includegraphics[width=0.4\columnwidth]{ro4egs5t-crop} \put(-40,18){(f)} \put(-70,85){\tiny N=4, 5 T}\\ \end{tabular} \caption{ The ground-state charge density in the circular confinement for $N=2$(a,b), $3$(c,d) and $4$(e,f) for $B=0.01$ T (left column) and $B=5$ T (right column). } \label{sd} \end{figure} \subsubsection{Results for $N\leq 4$ electrons} The energy spectra for the circular potential [see Fig. \ref{sys}(c)] are plotted in Fig. 3. For $N=1$ [Fig. \ref{scirc}(a)] the energy levels for $B=0$ are degenerate with respect to spin. For $N=2$ [Fig. \ref{scirc}(b)] the ground state is an even parity spin singlet which is replaced by an odd-parity spin-polarized triplet for $B\simeq 0.25$ T. The energy spacing between the lowest-energy states in Fig. \ref{scirc}(b-f) are much smaller than for the single-electron spectra, which is a signature of strong electron-electron interaction \cite{strongsup}. The spin triplets that we find correspond to odd spatial parity which is characteristic to the two-electron system \cite{jose}. For $N=3$ electrons [Fig. \ref{scirc}(c)] three different symmetry states appear in the ground state starting from an odd-parity spin doublet for $B=0$. Above 1 T the ground state becomes spin-polarized first in the odd parity and next, above $\simeq 4$ T, in the even parity state. For $N=4$ [Fig. \ref{scirc}(d)] the ground state at $B=0$ is nearly degenerate with respect to the parity and the spin. The ground state at $B=0$ is an even parity singlet. The spin polarization in the ground state appears already for $B\simeq 0.03$T. The results for $N\in[2,4]$ can be summarized in the following manner: (i) For even $N$ the spectrum at $B=0$ contains a few nearly degenerate energy levels near the ground state. Already a low magnetic field of a fraction of tesla leads to a complete spin polarization in the ground state.t The systems with $N=2$ and $N=4$ are also similar from the point of view of the Wigner molecular charge density, which contains separate $N$ single-electron islands (Fig. \ref{sd}(a,b) and Fig. \ref{sd}(e,f)). (ii) For $N=3$ the ground state at $B=0$ is exactly two-fold degenerate with respect to the spin, and a few ground state transitions appear in the field of the order of a few tesla before the high field symmetry is established. The charge density exhibits 4 local charge maxima Fig. \ref{sd}(c,d). These are not the single-electron islands. Furthermore, the charge density is smeared over the area between the maxima [Fig. \ref{sd}(c,d) and does not vanish as effectively as for even $N$ [Fig. \ref{sd}(a,b)] The three-electron charge density is not ordered in the Wigner-molecule form. \begin{figure} \begin{tabular}{ll} \includegraphics[width=0.5\columnwidth]{pcf3e1-crop} \put(-40,20){(a)} \put(-60,85){N=3}& \includegraphics[width=0.5\columnwidth]{pcf3e2-crop} \put(-40,20){(b)} \put(-60,85){N=3}\\ \includegraphics[width=0.5\columnwidth]{pcf41-crop} \put(-40,20){(c)} \put(-60,85){N=4}& \includegraphics[width=0.5\columnwidth]{xpx-crop} \put(-40,20){(d)} \put(-60,85){N=4} \\ \end{tabular} \caption{Pair correlation function plots for the circular confinement potential. The spin-polarized ground state at $B=5$T is considered. The crosses indicate the position of the fixed electron (see Eq.(6)). } \label{pcf} \end{figure} The effects of the electron-electron correlation in the localization of the carriers can be observed in the pair-correlation function plots given in Fig. \ref{pcf}. For these plots we fix the position of one of the electrons (see ${\bf r}_f$ in Eq. (6)) that is marked by the cross in each panel of Fig. \ref{pcf}. For illustration of the system reaction to the electron position, we fixed one of the electrons slightly off the local density maxima of Fig. \ref{pcf} near the left (top) edge of the charge distribution in the left (right) column of Fig. \ref{pcf}. For 3 electrons [Fig. \ref{pcf}(a,b)] the conditional probability exhibits two separate maxima. The maxima move once the fixed electron position is changed [cf. Fig. \ref{pcf}(a,b)], which corresponds to the ring-like charge distribution in Fig. 4(c,d). On the other hand, for $N=4$ the probability maxima at the right and bottom edges of the quantum dot stay in the same place when the fixed electron position is changed [Fig. \ref{pcf}(c,d)]. Note that for $N=4$ the charge density produces the pronounced single-electron maxima [Fig. 4(e,f)]. \begin{figure} \begin{tabular}{l} \includegraphics[width=0.7\columnwidth]{3eza-crop} \put(-80,105){N=3}\\ \end{tabular} \caption{ The energy spectra with (red lines) and without (blue lines) a Gaussian impurity [Eq. (9)] that perturbs the circular symmetry of the confinement potential. The energy levels for the clean system (blue lines) are taken from Fig. 3(c). In Eq. (9) we apply $D=0.125$ meV, $y_0=20$ nm and $R_p=5$ nm. } \label{zabu} \end{figure} \begin{figure} \begin{tabular}{lll} \includegraphics[width=0.33\columnwidth]{ro2e-3k5-crop} \put(-30,12){(a)} \put(-60,67){\tiny N=3 3.5 T}& \includegraphics[width=0.33\columnwidth]{ro2e3975-crop} \put(-30,12){(b)} \put(-60,67){\tiny N=3 3.975 T}& \includegraphics[width=0.33\columnwidth]{ro2e445-crop} \put(-30,12){(c)} \put(-60,67){\tiny N=3 5 T}\\ \includegraphics[width=0.33\columnwidth]{ro2e_35_dwa-crop} \put(-30,12){(d)} \put(-60,67){\tiny N=3 3.5 T}& \includegraphics[width=0.33\columnwidth]{ro2e39755_dwa-crop} \put(-30,12){(e)} \put(-60,67){\tiny N=3 3.975 T}& \includegraphics[width=0.33\columnwidth]{ro2e445_dwa-crop} \put(-30,12){(f)} \put(-60,67){\tiny N=3 5 T}\\ \end{tabular} \caption{ The charge density for $N=3$ (a-f) levels marked in red in Fig. \ref{zabu} for the circular quantum dot with an off-center Gaussian impurity. The first row (a-c) shows the data for $N=3$ ground state. The excited state for 3 electrons is shown in the second row (d-f). The central column (b,e) shows the results at the center of the avoided crossing displayed in Fig. \ref{zabu}. } \label{zaburo} \end{figure} For $N=3$ the single-electron islands forming a Wigner molecule in the real space are not observed since the number of local charge maxima is not equal to $N$ [Fig.4(c,d)]. The single-electron charge maxima can appear in the real space when the symmetry of the confinement potential is lowered \cite{wimabrok} by e.g. an off-center impurity. We use a weak Gaussian perturbation introduced to the confinement potential used in $H_0$, \begin{equation} V_p(x,y)=D\exp(-(x^2+(y-y_0)^2)/R_p^2)\,,\end{equation} with parameters $D=0.125$ meV, $R_p=5$ nm, and $y_0=20$ nm. We considered the spin-polarized states at the magnetic field, near the ground-state symmetry transition from even to odd parity, below 4 T for $N=3$ Fig. \ref{scirc}(c). The blue lines in Fig. \ref{zabu} present the energy levels of a clean system adopted from Fig. \ref{scirc}(c). The red lines show the energy levels for the perturbed system. The off-center Gaussian impurity opens avoided crossings between the energy levels [Fig. \ref{zabu}] which for the clean potential correspond to opposite parity. The charge density for the ground (excited) state of $N=3$ is given in Fig. \ref{zaburo}(a-c) for the magnetic field that is swept across the avoided crossing. The charge density outside the avoided crossing [Fig. \ref{zaburo}(a,c,d,f)] produces four maxima along the ring-like charge distribution, which deviates from the point symmetry due to the $V_p$ potential. At the avoided crossing the wave functions from otherwise crossing levels mix. In the ground state [Fig. \ref{zaburo}(b)] three well-separated single-electron islands appear and the charge density is low at the center of the perturbation ($(x,y)=(0,y_0)$). The excited state [Fig. \ref{zaburo}(e)] at the avoided crossing produces a Wigner molecule that is rotated by the $\pi$ angle. In this sense, the even and odd-parity $N=3$ states for a clean potential can be understood as superposition of states producing Wigner crystallization in real space with two equivalent but rotated charge distribution. This result for three electrons in circular potential but anisotropic effective mass is similar to the ones found previously for isotropic mass but anisotropic confinement potential \cite{aniso1,aniso2}. \subsubsection{5-electron system in the circular quantum dot} \begin{figure} \begin{tabular}{ll} \includegraphics[width=0.43\columnwidth]{ro5e-gsb0-crop} \put(-40,20){(a)} & \includegraphics[width=0.43\columnwidth]{ro5egs1t-crop} \put(-40,20){(b)}\\ \includegraphics[width=0.43\columnwidth]{ro5egs1k75-crop} \put(-40,20){(c)}& \includegraphics[width=0.43\columnwidth]{pcf5e2941-crop} \put(-40,20){(d)} \\ \end{tabular} \caption{The ground-state charge density for $N=5$ electrons in $B=0.01$ T (a), $B=1$T (b) and $B=1.75$ T (c) -- see the spectrum in Fig. 3(e). In panel (d) we plot the pair correlation function for the state of panel (b) one of the electrons fixed at the position marked by the cross. } \label{6} \end{figure} The five-electron systems has a more complex structure than systems with two to four electrons due to two charge distributions that appear in the low energy spectrum [see Fig. 3(e)]. In ground-state at $B=0$ we find 6 nearly degenerate energy levels: a $S_z=\pm 1$ odd-parity doublet slightly below $S_z=-3,-1,1,3$ even parity quartet. The charge density in all these energy levels is organized in the Wigner molecule form that is plotted in Fig. \ref{6}(a) with one central electron island and four others shifted off the center of the QD forming a cross-like structure that we will denote as (1,4). The near degeneracy of the ground-state is a counterpart of the four-electron ground-state for $N=4$, where the Wigner molecule is also found. For five electrons the first excited energy level at $B=0$ is a even parity $S_z=\pm 1$ doublet also with (1,4) charge distribution. In several higher excited energy levels the states at the energy of $\simeq 708.45$ meV the charge density is organized in a ring-like structure with four charge density maxima without the single-electron islands. We will denote this structure as (0,4). In higher excited levels the states with (1,4) and (0,4) structure interlace on the energy scale. For $B>0.9$ T the ground-state becomes fully spin-polarized [Fig. 3(e)] and the (0,4) structure [Fig. \ref{6}(b)] appear in the ground-state. Above 1.7 T the spatial parity of the ground-state change from odd to even and the (1,4) structure [Fig. \ref{6}(c)] re-appears in the ground-state. In presence of both types of states near the ground-state -- with and without single-electron islands in the laboratory frame -- the spectrum contains the features of both $N=2,4$ (ground-state near degeneracy at $B=0$) and symmetry transformations at higher field as for $N=3$. The (0,4) state for five electrons has a similar character as the three-electron ground-state. For three electrons the charge density is a superposition of two equivalent configurations one being an inversion of the other. The five-electron charge configurations with the (0,4) state correspond to the superposition one or two electrons at the right/left ends of the charge density near $y=0$ line. One of the two equivalent structures for five electrons can be observed in the pair correlation function plot of Fig. \ref{6}(d) for one of the electrons fixed at point (-29.4 nm,0). \subsection{A linear confinement} We discuss two perpendicular orientations of the elongated quantum dot to study the interplay of the potential and effective mass anisotropies. \begin{figure} \begin{tabular}{l} \includegraphics[width=0.67\columnwidth]{1ew1-crop} \put(-135,18){\tiny (0,0)} \put(-135,34){\tiny (0,1)}\put(-135,45){\tiny (0,2)}\put(-135,60){\tiny (0,3)} \put(-135,74){\tiny (0,4)}\put(-135,87){\tiny (0,5)}\put(-135,96){\tiny (1,0)} \put(-20,23){(a)} \\ \includegraphics[width=0.7\columnwidth]{w11_2e-crop}\put(-32,19){(b)}\\ \includegraphics[width=0.7\columnwidth]{w11_3e-crop} \put(-32,19){(c)}\\ \includegraphics[width=0.7\columnwidth]{w11_4e-crop}\put(-32,19){(d)}\\ \end{tabular} \caption{ Spectra for the potential of Fig. \ref{sys}(d) elongated along the zigzag crystal direction ($y$) for $N=1$ (a), 2 (b), 3(c), 4(d). In (a) even and odd parity levels are plotted with blue and green lines, respectively. Notation $(n_x,n_y)$ close to $B=0$ shows the number of excitations (sign changes) in the wave function at 0T. In (b-e) the even parity levels are plotted with the solid lines and the odd parity levels with the dotted lines. The color of the lines stands for $S_z$. The color of the lines in (b-d) shows the $S_z$ value } \label{1ewy} \end{figure} \begin{figure} \begin{tabular}{lll} \includegraphics[width=0.33\columnwidth]{ro2e-crop-1d} \put(-30,20){(a)} & \includegraphics[width=0.33\columnwidth]{ro3e-crop-1d} \put(-30,20){(b)}& \includegraphics[width=0.33\columnwidth]{ro4e-crop-1d} \put(-30,20){(c)}\\ \includegraphics[width=0.33\columnwidth]{ro2e-crop-1dx} \put(-30,20){(d)} & \includegraphics[width=0.33\columnwidth]{ro3e-crop-1dx} \put(-30,20){(e)}& \includegraphics[width=0.33\columnwidth]{ro4e-crop-1dx} \put(-30,20){(f)}\\ \includegraphics[width=0.33\columnwidth]{puc1-crop} \put(-32,20){(g)} & \includegraphics[width=0.33\columnwidth]{puc2-crop} \put(-32,20){(h)} & \includegraphics[width=0.33\columnwidth]{ro4e5-crop} \put(-30,20){(i)} \\ \end{tabular} \caption{Charge density for the $B=0.01$ T ground state of the quantum dot elongated along the $y$ axis (zigzag direction, spectra given in Fig. \ref{1ewy}) for $N=2$ (a), 3(b), and 4 electrons (c). The second row of the plots indicates the results for the dot elongated along the $x$ direction (armchair direction, the spectra given in Fig. \ref{1ewx}) for $N=2$ (d), 3 (e) and 4 electrons (f). Panel (i) corresponds to $N=4$ and $B=5$T. Panels (g) and (h) show the pair correlation function for $N=4$ and the dot elongated along the $x$ direction. The fixed position of one of the electrons is marked by the cross. Panel (g) shows the pair correlation function for the other electrons with the same spin as the fixed one. In panel (h) the spin of the other electrons is opposite to the one of the fixed one. } \label{dens1} \end{figure} \subsubsection{Confinement along the zigzag direction} The spectra for the potential of Fig. \ref{sys}(d) with the confinement potential elongated along the $y$ axis, i.e. in the direction where the effective mass is larger, are given in Fig. \ref{1ewy}. The numbers $(n_x,n_y)$ given in Fig. \ref{1ewy}(a) near the energy levels at $B=0$ (for $B=0$ and $N=1$ the parity with respect to inversion along the $x$ and $y$ axes of the $H_0$ eigenstates are definite). The first excitation within $x$, the direction of thinner confinement, occurs 3 meV above the ground state (see the energy level marked by (1,0) in Fig. \ref{1ewy}(a)) above 5 states excited in the $y$ direction. For $N=2$ (Fig. \ref{1ewy}(b)) the singlet-triplet ground state the degeneracy is nearly perfect at $B=0$. For $B>0$ the $S_z=0$ state remains two-fold degenerate with spin-singlet and spin-triplet energy levels that coincide in energy. The separation of the electron charges [Fig. \ref{dens1}(a)] is complete, and the system is effectively equivalent to a pair of electrons in a double quantum dot with vanishing tunnelling between the dots, which produces a vanishing exchange energy \cite{jose,burkard,petta}. The ground-state degeneracy at $B=0$ is also obtained for $N=3$ (Fig. \ref{1ewy}(c)). The Wigner crystallized charge density of the three-electron system at $B=0$ is shown in Fig. \ref{dens1}(b). Parity has no significant impact on energy once the electron charges are separated and the $S_z=\pm 1$ energy levels are two-fold degenerate with respect to parity. Low-energy spin-polarized states $S_z=\pm 3$ occur only in the odd parity. For $N=4$ the ground state at $B=0$ is only close to the degeneracy (Fig. \ref{1ewy}(d)) with the even parity ground state at $B=0$. The spin polarization $S_z=\pm 4$ occurs only in even parity states. The structure of the low-energy spectrum is similar to the one found for the circular quantum dot [Fig. \ref{scirc}(e)] with even-odd parity splitting of energy levels reduced almost to zero. The results of Fig. \ref{1ewy}(c,d) for $B>0$ indicate that for $N=3$ ($N=4$) the low-energy spin-polarized energy levels occur only with the odd (even) parity symmetry. This is in agreement with Ref. \cite{szafran1d} that indicated that in 1D Wigner molecules for $N=2M$ or $N=2M+1$ with integer $M$ the low-energy spin-polarized state has the spatial parity that agrees with the number $M$. Note that for $N=3$ in the circular potential [Fig. \ref{scirc}(c)], for which the Wigner molecules were not formed in the real-space charge density, both odd and even parity spin-polarized states appear in the ground state for a range of magnetic field. \subsubsection{Confinement along the armchair direction} \begin{figure} \begin{tabular}{l} \includegraphics[width=0.7\columnwidth]{1ew2-crop} \put(-20,24){(a)} \put(-140,19){\tiny (0,0)} \put(-140,50){\tiny (1,0)}\put(-140,67){\tiny (0,1)}\put(-142,84){\tiny (2,0)} \put(-142,91){\tiny (1,1)}\put(-142,102){\tiny (3,0)} \\ \includegraphics[width=0.7\columnwidth]{w22_2e-crop} \put(-30,18){(b)}\\ \includegraphics[width=0.7\columnwidth]{w22_3e-crop}\put(-30,18){(c)}\\ \includegraphics[width=0.7\columnwidth]{w22_4e-crop}\put(-30,18){(d)}\\ \end{tabular} \caption{ Spectra for the potential of Fig. \ref{sys}(d) elongated along the armchair crystal direction ($x$) for $N=1$ (a),2 (b),3 (c),4 (d). In (a) even and odd parity energy levels are plotted with blue and green lines, respectively. The notation $(n_x,n_y)$ close to $B=0$ axis shows the number of excitations (sign changes) observed in the wave function at zero magnetic field. The spin degeneracy is lifted for $B>0$ with the spin-down energy levels promoted by the Zeeman interaction. In (b-d) the even parity energy levels are plotted with the solid lines and the odd parity energy levels with the dotted lines. The color of the lines stands for the spin. The color of the lines in (b-d) shows the $S_z$ value. The color scale is separate for each figure and given to the right of the plot. } \label{1ewx} \end{figure} For the rectangular gate of Fig. \ref{sys}(a) with the longer side oriented along the $x$ direction, the electron mass along the dot is light and in the transverse direction the mass is heavy. For the preceding subsection with confinement along the zigzag direction [Fig. \ref{1ewy}(a)], several lowest energy single-electron states correspond to the same -- ground state -- energy level of the quantization in the direction perpendicular to the quantum dot axis. For the confinement along the armchair direction, the large $m_y$ mass allow the states with excitations in the direction perpendicular to the confinement axis to appear low in the energy spectrum [Fig. \ref{1ewx}(a)]. The first single-electron state excited in the transverse direction is the second excited energy level in Fig. \ref{1ewx}(a) (see the energy level described by (0,1)). From this point of view, the system deviates from the quasi 1D confinement, which should be characterized by a large number of excitations along the quantum dot below the energy when the first transverse excitation occurs. However, the charge density of the $N$-electron states is elongated along the $x$ direction (see Fig. \ref{dens1}(d,e,f)). The lifting of the even-odd degeneracy is observed in the spectrum for $N=2$ and $N=3$ [Fig. \ref{1ewx}(b,c)]. A lower value of $m_x$ allows for a non-negligible electron tunneling between the single-electron islands (cf. the charge density in between the single-electron maxima for $N=2$ and $N=3$ in Fig. \ref{dens1}(a,d) and Fig. \ref{dens1}(b,e)), thus lifting the degeneracy at $B=0$. Near $B=0$, the spectrum for $N=4$ (Fig. \ref{1ewx}(d)) has a distinctly different character than for the zigzag confinement (Fig. \ref{1ewy}(d)) and for the circular confinement [Fig. \ref{scirc}(e)]. In both preceding cases the electrons were separated in the single electron islands [Fig. \ref{sd}(e,f), Fig. \ref{dens1}(c)]. The ground state charge density for the armchair confinement possesses two single-electron islands at the ends of the dot and a lower but more extended central maximum [Fig. \ref{dens1}(f) for $B=0.01$T and Fig. \ref{dens1}(i) for $B=5$T]. The charge densities of the two central electrons do not separate into single-electron islands. The effect can be attributed to both a large value of $m_y$ that allows the states excited in the $y$ direction to contribute to the interacting states and a small value of $m_x$ which makes the formation of the single-electron islands along the $x$ direction more expensive in terms of the kinetic energy. Fig. \ref{dens1}(g,h) shows the spin-resolved pair correlation function for one of the electron positions fixed in the point marked by the cross for $B=0.01$T. Fig. \ref{dens1}(g) (Fig. \ref{dens1}(h)) corresponds to the electron distribution with the same (opposite) spin as the fixed electron spin. The electrons at the central maximum of the charge distribution [Fig. \ref{dens1}(f)] possess opposite spin. Note that, with the electrons of the extreme ends of the dots, separated from the central density island, the system at $B=0$ acquires a singlet / triplet spectral structure (Fig. \ref{1ewx}(d)) similar to the one for the two-electron system in the circular quantum dot (Fig. \ref{scirc}(b)) -- the central two-electron system governs the form of the low energy part of the spectrum. \section{Discussion} The systems confined in quantum dots weakly coupled to electron reservoirs are studied with the transport spectroscopy using the Coulomb blockade phenomenon \cite{leo,eqd}. In the Coulomb blockade regime, the flow of the current across the dot is stopped when the chemical potential of the confined $N$-electron is outside the transport window defined by the Fermi levels of the source and drain. For a small voltage drop between the reservoirs, the position of the chemical potential can be very precisely determined. The chemical potential $\mu_N=E_N-E_{N-1}$ is defined by the ground state energies of systems with $N$ and $N-1$ electrons \cite{leo,eqd}. The ground-state energy crossing in the $N$ electron system produces $\Lambda$-shaped cusps in the charging line as a function of the external magnetic field for the $N$-th electron added to the confined system, while the ground-state transitions for the $N-1$ system produces $V$-shaped cusps. Transport spectroscopy allows reconstruction of the energy spectra with a precision of the order of a few $\mu$eV \cite{fuhrer}. The results presented above indicate that the formation of the Wigner molecule in the laboratory frame leads to a near degeneracy of the ground state near $B=0$. The larger the electron separation in the single-electron charge islands, the closer the degeneracy at $B=0$. The ground state becomes spin-polarized at low magnetic field and no further ground-state transitions are observed. The systems without the Wigner molecular charge density undergo a number of ground-state transitions that also appear at higher magnetic field. The transport spectroscopy technique can also be used for detection of the excited part of the spectra when the corresponding energy level enters the transport window \cite{leo,fuhrer}. Detection of a dense set of levels near the ground state can be used as a signature of Wigner molecule formation \cite{corrigan,pecker}. \section{Summary and conclusions} We have studied the system of a few electrons in an electrostatic quantum dot confinement induced within a phosphorene layer. A version of the configuration interaction approach dealing with the strong electron-electron interaction effects has been developed. We indicated formation of Wigner molecules with single-electron islands separated in the real space in a system of realistic yet small size. In circular quantum dots, Wigner crystallization in the laboratory frame occurs due to the lowered Hamiltonian symmetry with the anisotropy of the electron effective mass. The Wigner molecules appear in the laboratory frame when the distribution of the single-electron islands is consistent with the Hamiltonian symmetry. For circular quantum dots we found Wigner molecules for 2 and 4 electrons but not for 3 electrons i.e. the conditions for the Wigner crystallization are not directly determined by the mean electron-electron distance. For 5 electrons in the circular confinement two forms of the charge density with or without single-electron islands appear in the ground-state depending on the value of the external magnetic field. Formation of the Wigner molecules in a quasi-1D confinement calls for orientation of the confinement potential with longer axis along the zigzag direction since larger effective mass promotes the single-electron islands localization and the smaller armchair mass supports the quasi 1D confinement. We studied the spectra for both circular and elongated quantum dots to find the signatures of the Wigner crystallization in real space. The systems with single-electron islands forming Wigner molecules in the laboratory frame are characterized by near degeneracy of the ground state at $B=0$ followed by spin polarization in low magnetic field and an energy gap between the nearly degenerate ground state and excited states. These features are missing for systems that do not form single-electron islands. Resolution of these signatures is within the reach of transport spectroscopy techniques. \section*{Acknowledgments} This work was supported by the National Science Centre (NCN) according to decision DEC-2019/35/O/ST3/00097. Calculations were performed on the PLGrid infrastructure. \section*{Appendix} \renewcommand{\thefigure}{A\arabic{figure}} \subsection*{Single-electron eigen-states with $H_0$, $H_0'$ and $H_0''$} \begin{figure} \begin{tabular}{lll} \includegraphics[width=0.3\columnwidth]{b1-crop}\put(-30,50) {$H_0$}\put(-40,30) {$\nu=1$}& \includegraphics[width=0.3\columnwidth]{g1-crop} \put(-30,50) {$H_0'$}\put(-40,30) {$\nu=1$}& \includegraphics[width=0.3\columnwidth]{w1-crop}\put(-30,50) {$H_0''$}\put(-40,30) {$\nu=1$}\\ \includegraphics[width=0.3\columnwidth]{b2-crop}\put(-40,30) {$\nu=2$} &\includegraphics[width=0.3\columnwidth]{g2-crop} \put(-40,30) {$\nu=2$}& \includegraphics[width=0.3\columnwidth]{w2-crop}\put(-40,30) {$\nu=2$}\\ \includegraphics[width=0.3\columnwidth]{b3-crop}\put(-40,30) {$\nu=3$}& \includegraphics[width=0.3\columnwidth]{g3-crop} \put(-40,30) {$\nu=3$}& \includegraphics[width=0.3\columnwidth]{w3-crop}\put(-40,30) {$\nu=3$}\\ \includegraphics[width=0.3\columnwidth]{b4-crop}\put(-40,30) {$\nu=4$}& \includegraphics[width=0.3\columnwidth]{g4-crop} \put(-40,30) {$\nu=4$}& \includegraphics[width=0.3\columnwidth]{w4-crop}\put(-40,30) {$\nu=4$}\\ \includegraphics[width=0.3\columnwidth]{b5-crop}\put(-40,30) {$\nu=5$}& \includegraphics[width=0.3\columnwidth]{g5-crop} \put(-40,30) {$\nu=5$}& \includegraphics[width=0.3\columnwidth]{w5-crop}\put(-40,30) {$\nu=5$}\\ \includegraphics[width=0.3\columnwidth]{b6-crop}\put(-40,40) {$\nu=6$}& \includegraphics[width=0.3\columnwidth]{g6-crop} \put(-40,40) {$\nu=6$}& \includegraphics[width=0.3\columnwidth]{w6-crop}\put(-40,40) {$\nu=6$}\\ \includegraphics[width=0.3\columnwidth]{b7-crop}\put(-40,30) {$\nu=7$}& \includegraphics[width=0.3\columnwidth]{g7-crop} \put(-40,30) {$\nu=7$}& \includegraphics[width=0.3\columnwidth]{w7-crop}\put(-40,30) {$\nu=7$}\\ \includegraphics[width=0.3\columnwidth]{b8-crop}\put(-40,40) {$\nu=8$}& \includegraphics[width=0.3\columnwidth]{g8-crop}\put(-40,40) {$\nu=8$} & \includegraphics[width=0.3\columnwidth]{w8-crop}\put(-40,40) {$\nu=8$}\\ \includegraphics[width=0.3\columnwidth]{b9-crop}\put(-40,30) {$\nu=9$}& \includegraphics[width=0.3\columnwidth]{g9-crop}\put(-40,30) {$\nu=9$} & \includegraphics[width=0.3\columnwidth]{w9-crop}\put(-40,30) {$\nu=9$} \end{tabular} \caption{Probability density of spin-down single-electron states ordered from the ground-state ($\nu=1$ -- the first row) to 8-th excited spin-down energy level ($\nu=9$ -- the last row). The left column corresponds to the states of the bare circular confinement with potential $W$ (Hamiltonian $H_0$). The central column to the potential $W'$ -- with an added central Gaussian with 8 meV, 35 meV (Hamiltonian $H_0'$). The right column correspond to states obtained with potential $W''=0.455\times W$ (Hamiltonian $H_0''$). The parameters of the central and the right column are optimized for diagonalization of the 4-electron system.} \label{wf1a} \end{figure} Figure 2 presents the convergence of the CI method the single-electron Hamiltonians $H_0$, $H_0'$ and $H_0''$ using the bare QD potential $W$, the potential with the central repulsive Gaussian ($W'$) and the reduced potential $W''$, respectively. The low-energy single-electron wave functions are plotted in Fig. \ref{wf1a} for the three Hamiltonians starting from the ground-state in the first row, and the subsequent excited states presented in the lower panels of Fig. \ref{wf1a}. The seven lowest-energy states have the same character for all Hamiltonians only with states for $H_0'$ (central column of plots) and $H_0''$ (right column) covering a larger area than the ones for $H_0$, which turns out to speed-up the convergence of the CI method for the system of size increased by the strong electron-electron interaction. \subsection*{Choice of the computational box} The CI method uses the single-electron wave functions that are obtained with the finite difference approach in a finite computational box with the boundary conditions of vanishing wave function at the edges of the box. The edges of the box form effectively an infinite quantum well that has to be chosen large enough to contain the few-electron system without perturbation to the low-energy states. The influence of the size of the box on the results is given in Fig. \ref{size} for the circular quantum dot. For the circular quantum dot we use the square grid of points of the spacing of $\Delta x=R/nx$ where $R$ is the radius of the computational box and we take $n_x=111$. The red (black) line in Fig. \ref{size} shows the ground-state energy for $N=2$ ($N=5$). The growth of the energy for small $R$ is due to the finite-size effect with the quantum well ground state changing as $1/R^2$. For calculations for $N=2$ the radius of $R=50$ nm is large enough while for $N=5$ is has to be taken as large as $R=80$ nm. \subsection*{Spectra without the spin Zeeman interaction} A striking difference in the energy spectra states with or without the Wigner molecule in the ground state is revealed for the circular potential once the spin Zeeman interaction is removed. This is illustrated in Fig. \ref{noz} which reproduces the data from Fig. \ref{scirc} for $g=0$. The systems with Wigner form of the charge density, i.e. the single-electron islands in the charge density), $N=2$ (Fig. \ref{noz}(a)) and $N=4$ (Fig. \ref{noz}(c)) contain a nearly degenerate ground state with energy levels of different parity that interlace in increasing $B$. The separation of the electron charges in the separate, weakly coupled, maxima produces a small energy difference due to the parity, which is similar to the nearly degenerate ground state for identical, weakly coupled quantum dots. The single electron islands are formed by a relatively strong electron-electron interaction and the weakness of the electron tunnelling between the islands can be deduced from the charge density plots of Fig. \ref{sd}(a,b) and Fig. \ref{sd}(e,f) for $N=2$ and $N=4$. In both cases, the bunch of energy levels of the ground state is separated by a distinct energy gap from the excited states. For $N=3$ [Fig. \ref{6}(b)] the parity of the ground state changes in growing $B$ as for even $N$ but the spacing between the even and odd parity energy levels near the ground state is much larger than for even $N$ and no energy gap is observed between the nearly degenerate ground state and the rest of the spectrum. \begin{figure} \includegraphics[width=0.5\columnwidth]{er-crop} \caption{The ground-state energy for a circular quantum dot holding two (red line, left energy axis) and five electrons (blue line, right energy axis) as a function of the radius of the computational box for $60$ single-electron eigenstates of hamiltonian $H_0'$ used in construction of the basis for configuration interaction.} \label{size} \end{figure} \begin{figure*} \begin{tabular}{lll} \includegraphics[width=0.5\columnwidth]{2enoz-crop} \put(-20,18){(a)} \put(-65,15){ N=2} \includegraphics[width=0.5\columnwidth]{3enoz-crop} \put(-20,18){(b)} \put(-65,15){ N=3} \includegraphics[width=0.5\columnwidth]{4enoz-crop} \put(-20,18){(c)} \put(-70,35) {N=4} \end{tabular} \caption{Spectra of $N=2$, 3, and 4 electron systems in circular potential [as in Fig. 3] but without the spin Zeeman interaction. The blue (red) lines show the energy levels of even (odd) parity.} \label{noz} \end{figure*} \input{biblio_ordered.tex} \end{document}
\section{Conclusion} In this work, we propose an automated framework \mbox{\textsc{STREAM}}\xspace to distill task-specific logical rules from large pre-trained models. Experiments show the effectiveness of \mbox{\textsc{STREAM}}\xspace, with stable and significant improvements over different baseline models. \section{Experiments} \subsection{Benchmark} \noindent\paragraph{BC5CDR}\cite{li2016biocreative} is constructed with BioCreative VCDR task corpus. It contains 500 train, 500 dev and 500 test PubMed articales, with 15,953 chemical and 13,318 disease entities. \noindent\paragraph{CHEMDNER}\cite{krallinger2015chemdner} contains 10,000 PubMed abstracts with 84,355 chemical entities, in which the training/dev/test set contain 14,522/14,572/12,434 sentences respectively. \noindent\paragraph{CONLL2003}\cite{sang2003introduction} consists of 14,041/3,250/3,453 sentences in the training/dev/test data split of Reuters news articles\footnote{Following previous work, type \text{MISC} is not considered.}. \subsection{Model and Metric} In our experiment, we use different weakly supervised approaches to label the manual set\footnote{Manual annotations can not be seen during training.} and obtain models on the set. To compare the quality of the weakly supervised data generated by different methods, we evaluate the models with human labels and report corresponding model performance. The evaluation metrics in our experiments include Precision(P), Recall(R) and F1-score(F$_1$). In \mbox{\textsc{STREAM}}\xspace, we use the model proposed in~\cite{jiang2019generalizing} as the specific tagging model, and all our reported values are the average over five runs. \begin{table*} \centering \begin{tabular}{l|c|ccc|ccc|ccc} \hline \multirow{2}{*}{Method} & \multirow{2}{*}{\begin{tabular}[c]{@{}c@{}}Need\\ Seed ?\end{tabular}} & \multicolumn{3}{c|}{BC5CDR} & \multicolumn{3}{c|}{CHEMDNER$^*$} & \multicolumn{3}{c}{CONLL2003} \\ \cline{3-11} & & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & \text{F}$_1$ & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & F$_{1}$ & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & F$_{1}$\\ \hline \hline Seed Rules & \ding{51} & \multicolumn{1}{c|}{\textbf{94.09}} & \multicolumn{1}{c|}{3.81} & 7.33 & \multicolumn{1}{c|}{\textbf{91.60}} & \multicolumn{1}{c|}{13.19} & 23.07 & \multicolumn{1}{c|}{\textbf{95.77}} & \multicolumn{1}{c|}{2.76} & 5.36 \\ Seed-Tagger & \ding{51} & \multicolumn{1}{c|}{\underline{78.33}} & \multicolumn{1}{c|}{21.60} & 33.86 & \multicolumn{1}{c|}{84.18} & \multicolumn{1}{c|}{21.91} & 34.78 & \multicolumn{1}{c|}{72.57} & \multicolumn{1}{c|}{24.68} & 36.83 \\ LinkedHMM & \ding{51} & \multicolumn{1}{c|}{10.18} & \multicolumn{1}{c|}{15.60} & 12.32 & \multicolumn{1}{c|}{23.99} & \multicolumn{1}{c|}{10.77} & 14.86 & \multicolumn{1}{c|}{19.78} & \multicolumn{1}{c|}{31.51} & 24.30 \\ HMM-Agg & \ding{51} & \multicolumn{1}{c|}{43.70} & \multicolumn{1}{c|}{21.60} & 29.00 & \multicolumn{1}{c|}{49.60} & \multicolumn{1}{c|}{18.40} & 26.80 & \multicolumn{1}{c|}{52.00} & \multicolumn{1}{c|}{8.50} & 14.60 \\ CGExpan & \ding{51} & \multicolumn{1}{c|}{40.96} & \multicolumn{1}{c|}{24.75} & 30.86 & \multicolumn{1}{c|}{45.70} & \multicolumn{1}{c|}{25.58} & 32.80 & \multicolumn{1}{c|}{55.97} & \multicolumn{1}{c|}{28.70} & 37.95 \\ AutoNER & \ding{51} & \multicolumn{1}{c|}{42.22} & \multicolumn{1}{c|}{30.66} & 35.52 & \multicolumn{1}{c|}{66.83} & \multicolumn{1}{c|}{27.59} & 39.05 & \multicolumn{1}{c|}{32.07} & \multicolumn{1}{c|}{5.98} & 10.08 \\ Self-Training & \ding{51} & \multicolumn{1}{c|}{73.69} & \multicolumn{1}{c|}{29.55} & 42.19 & \multicolumn{1}{c|}{\underline{85.06}} & \multicolumn{1}{c|}{20.03} & 32.42 & \multicolumn{1}{c|}{\underline{72.80}} & \multicolumn{1}{c|}{24.83} & 37.03 \\ TALLOR & \ding{51} & \multicolumn{1}{c|}{66.53} & \multicolumn{1}{c|}{\underline{66.94}} & \underline{66.73} & \multicolumn{1}{c|}{48.34} & \multicolumn{1}{c|}{\underline{52.56}} & \underline{50.36} & \multicolumn{1}{c|}{64.29} & \multicolumn{1}{c|}{\underline{64.14}} & \underline{64.22} \\ \hline \mbox{\textsc{STREAM}}\xspace & \ding{55} & \multicolumn{1}{c|}{72.47} & \multicolumn{1}{c|}{\textbf{67.90}} & \textbf{70.11} & \multicolumn{1}{c|}{63.93} & \multicolumn{1}{c|}{\textbf{55.13}} & \textbf{59.20} & \multicolumn{1}{c|}{69.92} & \multicolumn{1}{c|}{\textbf{72.30}} & \textbf{71.09} \\ \hline \end{tabular} \caption{ \label{overall performance table} Model performances on BC5CDR, CHEMDNER, and CONLL2003. Bold and underline indicate the best and the second best scores, * means the reported result is our re-implementation of author-provide code. } \end{table*} \subsection{Baseline} We select several recent weakly supervised methods to compare, including current SOTA systems. \noindent\paragraph{Seed Rules} uses manually annotated seed rules to match set and evaluate the label performance. \noindent\paragraph{Seed-Tagger} uses seed rules to label manual set and train the tagging models on the labeled data. \noindent\paragraph{CGExpan}\cite{zhang2020empower} expands lexicons by language models. Following previous work, we use CGExpan to expand the size of human annotated \textsc{TokenString}\xspace rules (\textit{i.e.} lexicons) to 1000. \noindent\paragraph{AutoNER}\cite{shang2018learning} labels untyped terms automatically with a pre-defined dictionary. We use the best expanded lexicon from CGExpan as the dictionary. Both of the expanded lexicon and the mined phrases from AutoPhrase~\cite{shang2018automated} as untyped mined phrases. \noindent\paragraph{LinkedHMM}\cite{safranchik2020weakly} proposes to utilize a generative model to aggregate noisy rules, and forms weak supervision signals to train the models. We use the best expanded lexicon from CGExpan as the tagging rules and the mined phrases from AutoPhrase as the linking rules. \noindent\paragraph{HMM-Agg}\cite{lison2020named} introduces the hidden Markov models to generate weak labels by labeling functions. We use the best expanded lexicons from CGExpan as the labeling functions. \noindent\paragraph{Self-Training} uses the seed rules to get initial teacher models and iterates the processes of generating pseudo labels for unlabeled data and training student models following self-training scheme. \noindent\paragraph{TALLOR}\cite{li2021weakly} bootstraps high-quality logical rules to train a neural tagger in an iterative manner, with selected, the most frequent manually annotated seed rules as the input. \subsection{Overall Performance} We summarize the model performances of our \mbox{\textsc{STREAM}}\xspace and above mentioned baselines in Table~\ref{overall performance table}. From the table, we can see: (1) Method Seed Rules yield a high accuracy, however, this simple matching pattern lacks generalization ability and results in a low model recall. (2) Similarly, the Self-training method starts from a small amount of seed data and has a good model accuracy, but its model recall is poor due to the limited data size. (3) Lexicon expanded model CGExpan and AutoNER sacrifice a certain model accuracy in exchange for more balanced model performance. (4) Previous SOTA system TALLOR can learn logical rules in an iterative manner and achieves competitive model F1-score. Since this system still relies on initial seed rules, its model performance is bounded. \begin{figure}[htbp] \centerline{\includegraphics[width=0.5\textwidth]{pics/dot.pdf}} \vspace{-0.2cm} \caption{Model Performances on dataset BC5CDR with different manually annotated seed rules size.} \label{seed diagram} \end{figure} Compared to the above baseline models, our proposed system \mbox{\textsc{STREAM}}\xspace does not need any human-annotated seed rules or data. We draw curves in Figure~\ref{seed diagram} to illustrate how many seed rules TALLOR needs to be comparable to our \mbox{\textsc{STREAM}}\xspace. From the figure, we can see that: When the number of most frequent seed rules reaches 825, the model performance of TALLOR exceeds \mbox{\textsc{STREAM}}\xspace for the first time. However, acquiring such the most frequent seed rules is quite labor-intensive. \subsection{Ablation Study} To explore how our proposed system \mbox{\textsc{STREAM}}\xspace works, we now present ablation studies. \noindent\paragraph{Initial Seed Rules} In section~\ref{sec: initial seed rules}, we utilize zero-shot prompt-based models' consistent outputs as initial seed rules. We firstly conduct experiments to check the quality of initial seed rules. \begin{table}[htbp] \centering \scalebox{0.72}{ \begin{tabular}{l|ccc|ccc} \hline \multirow{2}{*}{Method} & \multicolumn{3}{c|}{BC5CDR} & \multicolumn{3}{c}{CHEMDNER} \\ \cline{2-7} & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & F$_1$ & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & F$_1$ \\ \hline \hline TALLOR & \multicolumn{1}{c|}{66.53} & \multicolumn{1}{c|}{66.94} & 66.73 & \multicolumn{1}{c|}{48.34} & \multicolumn{1}{c|}{52.56} & 50.36 \\ \hline \mbox{$\textsc{STREAM}_{init}$}\xspace & \multicolumn{1}{c|}{70.46} & \multicolumn{1}{c|}{64.99} & 67.62 & \multicolumn{1}{c|}{57.13} & \multicolumn{1}{c|}{50.52} & 53.62 \\ \mbox{\textsc{STREAM}}\xspace & \multicolumn{1}{c|}{72.47} & \multicolumn{1}{c|}{67.90} & 70.11 & \multicolumn{1}{c|}{63.93} & \multicolumn{1}{c|}{55.13} & 59.20 \\ \hline \end{tabular}} \caption{ \label{ablation1} Ablation results of different rule learning systems on BC5CDR and CHEMDNER, method \mbox{$\textsc{STREAM}_{init}$}\xspace uses the initial seed rules. } \end{table} \vspace{-0.3cm} We summarize the model performances of different logical rule learning systems in Table~\ref{ablation1}. From the table we can see that: With only the initial rules given by the zero-shot prompt model, our system \mbox{$\textsc{STREAM}_{init}$}\xspace has surpassed the previous SOTA method TALLOR in metrics P and F$_1$, which means the generated seed rules are reliable. Besides, we directly utilize the human-annotated labels to verify the quality of the initial rules in a more intuitive way: When confidence threshold $p_t=0.3$ and support threshold $r_t=4$, about 219 seed rules are obtained with an accuracy of 98.6\%. In the process of initial seed rules generation, hyperparameters $p_t$ and $r_t$ are relatively important. We draw the figure in Figure~\ref{hyperparameter diagram} to show the model performances of \mbox{$\textsc{STREAM}_{init}$}\xspace with different combinations of $p_t$ and $r_t$. From the figure, we can see that: (1) When $p_t=0.3$ and $r_t=0.4$, our system \mbox{$\textsc{STREAM}_{init}$}\xspace achieves the best performance. (2) As hyperparameters $p_t$ or $r_t$ increases, the model performance first increases and then decreases. This is because a low parameter value may introduce some data noise, while a high parameter value may reduce the number of recalled rules. \begin{figure}[t] \centerline{\includegraphics[width=0.5\textwidth]{pics/hyperparameter.pdf}} \vspace{-0.3cm} \caption{Model performances of different hyperparameter combinations on dataset BC5CDR.} \label{hyperparameter diagram} \end{figure} \vspace{-0.3cm} \noindent\paragraph{Fine-tuned Seed Rules} After fine-tuning prompt-based models, the model can output high confidence scores for those correct samples. Thus, to filter out them, we adopt $p_t$ as 0.99, and following previous experience, we adopt $r_t$ as 4. With this combination, we can find that about 272 seed rules are recalled with an accuracy of 97.4\%. In section~\ref{sec:fine tune prompt inputs}, we propose two prompt-based inputs $\text{T}_3$ and $\text{T}_4$: $\text{T}_3$ directly uses hard words to form the prompt sentence while $\text{T}_4$ introduces soft embeddings to learn during training process. To compare the two prompt inputs, we present an ablation study, and the results are in Table~\ref{ablation2}. \begin{table}[htbp] \centering \scalebox{0.72}{ \begin{tabular}{l|ccc|ccc} \hline \multirow{2}{*}{Method} & \multicolumn{3}{c|}{BC5CDR} & \multicolumn{3}{c}{CHEMDNER} \\ \cline{2-7} & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & F$_1$ & \multicolumn{1}{c|}{P} & \multicolumn{1}{c|}{R} & F$_1$ \\ \hline \hline TALLOR & \multicolumn{1}{c|}{66.53} & \multicolumn{1}{c|}{66.94} & 66.73 & \multicolumn{1}{c|}{48.34} & \multicolumn{1}{c|}{52.56} & 50.36 \\ \hline \mbox{$\textsc{STREAM}_{hard}$}\xspace & \multicolumn{1}{c|}{73.13} & \multicolumn{1}{c|}{65.82} & 69.28 & \multicolumn{1}{c|}{61.49} & \multicolumn{1}{c|}{55.65} & 58.42 \\ \mbox{\textsc{STREAM}}\xspace & \multicolumn{1}{c|}{72.47} & \multicolumn{1}{c|}{67.90} & 70.11 & \multicolumn{1}{c|}{63.93} & \multicolumn{1}{c|}{55.13} & 59.20 \\ \hline \end{tabular}} \caption{ \label{ablation2} Ablation results of different prompt-based inputs on BC5CDR and CHEMDNER, method \mbox{$\textsc{STREAM}_{hard}$}\xspace uses the prompt-based input $\text{T}_3$, method \mbox{\textsc{STREAM}}\xspace uses the prompt input $\text{T}_4$. } \end{table} \begin{table*}[htbp] \centering \scalebox{0.92}{ \begin{tabular}{l|l|l} \hline Logical Rule Matched Sentence & Logical Rule Condition $p$ & Entity Type $q$ \\ \hline \hline \begin{tabular}[c]{@{}l@{}}Grade less than or equal to 2 \textbf{nausea$_\text{{\textcolor{red}{NOUN}}}$} \textbf{\textcolor{red}{and}} \\ \textbf{\textcolor{red}{vomiting}} occurred in 66\%, courses and phlebitis ... \end{tabular} & \begin{tabular}[c]{@{}l@{}}\textsc{PostNGram}\xspace == \textbf{\textcolor{red}{and vomiting}}\\$\land$~\textsc{POSTag}\xspace == \small\textbf{\textcolor{red}{NOUN}}\end{tabular} & $p \rightarrow q: \textbf{disease}$ \\ \hline \begin{tabular}[c]{@{}l@{}}This study describes neuropsychiatric side effects in \\ patients \textbf{\textcolor{red}{after treatment with}} \textbf{mefloquine$_\text{{\textcolor{red}{PROPN}}}$}.\end{tabular} & \begin{tabular}[c]{@{}l@{}}\textsc{PreNGram}\xspace == \textbf{\textcolor{red}{after treatment}} \\ \textbf{\textcolor{red}{with}} $\land$~\textsc{POSTag}\xspace == \small\textbf{\textcolor{red}{PROPN}}~ ~~\end{tabular} & $p \rightarrow q: \textbf{chemical}$ \\ \hline \begin{tabular}[c]{@{}l@{}}Prophylactic use of lamivudine with chronic immun-\\ osuppressive \textbf{\textcolor{red}{therapy for}} \textbf{rheumatologic disorders}\textbf{\textcolor{red}{.}} \end{tabular} & \begin{tabular}[c]{@{}l@{}}\textsc{PreNGram}\xspace == \textbf{\textcolor{red}{therapy for}} \\ $\land$~\textsc{PostNGram}\xspace == \small\textbf{\textsc{\textcolor{red}{[END]}}}\end{tabular} & $p \rightarrow q: \textbf{disease}$ \\ \hline \end{tabular}} \vspace{-0.1cm} \caption{Cast study of learned logical rules on dataset BC5CDR, [END] means the end (.) of sentences.} \label{case study} \end{table*} From the table we can see that: (1) Whether template $\text{T}_3$ or $\text{T}_4$ is used, our system \mbox{\textsc{STREAM}}\xspace can achieve SOTA model performance. (2) Soft template $\text{T}_4$ performs better because it can learn a more efficient prompt pattern during training process. \noindent\paragraph{High-quality Instance Pool} In section~\ref{sec: learn rules}, we add high-quality instances to $\text{PL}_S$ and distill new logical rules from $\text{PL}_S$ in an iterative manner. To figure out how $\text{PL}_S$ changes during the training process, we now show the ablation in Figure~\ref{change diagram}. \begin{figure}[htbp] \centerline{\includegraphics[width=0.5\textwidth]{pics/line.pdf}} \vspace{-0.1cm} \caption{Changes of $\text{PL}_S$ size and model performance on development set~(\textit{i.e.} dev $F_1$) during training process.} \vspace{-0.3cm} \label{change diagram} \end{figure} From the figure, we can see: (1) During the iterative process, the size of $\text{PL}_S$ continues to increase, but its growth rate gradually slows down. (2) At the beginning of the iteration, high-quality instances are added to the pool $\text{PL}_S$, and the model performance increases. However, at the later iteration stage, some noise instances may be introduced, which causes the model performance to decrease. \subsection{Case Study: Learned Logical Rules } In Table~\ref{case study}, we select three sentences and corresponding learned logical rules from the training corpus. For example: (1) The entity mention in the first sentence matches the \textsc{POSTag}\xspace form of \small\textbf{NOUN}\normalsize, and its \textsc{PostNGram}\xspace words are \textbf{and vomiting}, therefore, \mbox{\textsc{STREAM}}\xspace can infer a rule: (\textsc{PostNGram}\xspace == \textbf{and vomiting} $\land$ \textsc{POSTag}\xspace == \small{\textbf{NOUN}}\normalsize) $\rightarrow$ \textbf{disease}. (2) In the third sentence, the \textsc{PreNGram}\xspace words of mention \textbf{rheumatologic disorders} are \textbf{therapy for} while the mention is just the end of sentence. \mbox{\textsc{STREAM}}\xspace can extract logical rule (\textsc{PreNGram}\xspace == \textbf{therapy} for $\land$ \textsc{PostNGram}\xspace == \small\textbf{END}\normalsize) $\rightarrow$ \textbf{disease} from this sentence. \section{Introduction} Following the supervised learning paradigm, researchers resort to human annotation to obtain training data for specific tasks such as named entity tagging. Though accurate, manual annotation construction is quite expensive and time-consuming. In real scenarios, logical rules often serve as a source of weak supervision that provides abundant weakly supervised data for various downstream models, and compared with labeling data, applying rules can cover more application domains with better interpretability. Therefore, rule-based weakly supervised systems~(Figure~\ref{task}) have attracted considerable attention in recent years. In fact, it's not easy to develop an accurate and complete rule system, as the logical rules are usually summarized by human experts and the building process requires extensive domain knowledge. Besides, there is no evaluation metric to guide annotators to select valuable rules. The usability and quality of acquired rules can not be guaranteed. In this sense, how to build a reliable rule system with limited human effort is still an important challenge. \begin{figure}[t] \centerline{\includegraphics[width=\linewidth]{pics/task.pdf}} \caption{Schematic diagram of a typical rule-based weakly supervised named entity tagging system. Logical rules are used to label the data, and models can be trained on the weakly supervised data. Our goal in this work is to learn logical rules without any manual seed rules, corresponding to the dotted area in the figure.} \label{task} \end{figure} To solve above issue, previous researchers pay attention to the automatic construction of logical rules, which tends to start from a few seed rules and learn new logical rules by pre-defined similarity measures in an iterative manner. Though proven to be effective, these systems still require manually constructed seed rules as the cold start. Limited by human effort, the size of seed rules is usually small so that the system performance is bounded. In this work, we propose an automated framework \mbox{\textsc{STREAM}}\xspace to di\underline{S}till \underline{T}ask-specific logical \underline{R}ules from large pr\underline{E}-tr\underline{A}ined \underline{M}odels. Specifically, (1) In order to get rid of the restrictions of the seed rules, we firstly ask large pre-trained models for help. As the prompt-based pre-trained models own the zero-shot ability to generate candidate entity types, we design two appropriate prompt templates and achieve automatic acquisition of seed rules by the prompt model outputs' consistency. (2) Once seed rules are obtained, we form a high-quality instance pool to train the downstream task, continuously add potential instances to the pool, and distill new logical rules from the pool in an iterative manner. (3) Based on the convergent instance pool, we further fine-tune a new prompt-based model with more suitable prompt templates to obtain more reliable seed rules, and yield a better downstream task model. Compared with previous methods, our system no longer relies on manual seed rules or dictionaries, but only needs several prompt templates. Experiments on three public named entity tagging benchmarks demonstrate the effectiveness of our proposed framework \mbox{\textsc{STREAM}}\xspace, with consistent improvements over several baseline models and far exceed the state-of-the-art (SOTA) systems. Besides, we perform a detailed ablation study to analyze the quality of our obtained seed rules, the convergence of our propose iterative framework, and some specific cases of learned logical rules. Accordingly, the major contributions of our work are summarized as follows: (1) We introduce the large pre-trained prompt-based models to end the dilemma that the logical rule learning systems require seed rules as a start. (2) We develop an effective and stable framework to distill logical rules in an iterative manner, which combines prompt-based fine-tuning and rule distillation to achieve mutual enhancement. (3) We conduct detailed experiments to illustrate the effectiveness and rationality of our framework --- with several predefined prompt templates, the performance of our method has surpassed previous rule learning systems based on manual rules. \section{Limitations} \section{Methodology} \subsection{Overview} In this work, we adopt named entity tagging as the specific downstream task to compare with previous work~\cite{li2021weakly} of learning logical rules. The diagram of \mbox{\textsc{STREAM}}\xspace is visualized in Figure~\ref{Model Framework}. \subsection{Logical Rules} In real scenarios, logic rules can appear in various forms. For convenience, we define the logical rules in the unified form of \textit{``if p then q}~(\textit{i.e.} \textit{p} $\rightarrow$ \textit{q})''. In named entity tagging task, \textit{``p''} can be any logical expression and \textit{``q''} is the corresponding entity category. For example, a logical rule may look like: ``\textit{if the entity's lexical string is PD\footnote{PD: Parkinson's disease}, then its corresponding entity label should be \textbf{disease}}''. As demonstrated in previous work~\cite{zhou2002named}, we define five meta logical rules to tag named entities based on their lexical, contextual, and syntax information. In addition, some combinations of simple logical rules are also considered. \subsubsection{Meta Logical Rules} Following existing literature, our pre-defined meta-rules are: (1) \textsc{TokenString}\xspace rule matches entity's lexical string; (2) \textsc{PreNGram}\xspace rule matches entity's preceding context tokens; (3) \textsc{PostNGram}\xspace rule matches entity's succeeding context tokens; (4) \textsc{POSTag}\xspace rule matches entity's part-of-speech tags; (5) \textsc{DependencyRel}\xspace rule matches the dependency relations of the entity and its headword. \begin{figure}[htbp] \centerline{\includegraphics[width=\linewidth]{pics/dependency.pdf}} \caption{Dependency parsing example.} \label{dependency diagram} \end{figure} \begin{figure*} \centerline{\includegraphics[width=\linewidth]{pics/framework.pdf}} \caption{(1) In the first loop, zero-shot prompt models provide initial seed rules (\textit{i.e.} dotted line) and form a high-quality instance pool $\text{PL}_S$. (2) In the following loops, \mbox{\textsc{STREAM}}\xspace uses the positive instances from $\text{PL}_S$ and negative instances from sampling to fine-tune prompt models, generate better seed rules, and form a new instance pool $\text{PL}_S$. (3) During the process, the downstream model is trained and logical rules are distilled from the pool $\text{PL}_R$.} \label{Model Framework} \end{figure*} Figure~\ref{dependency diagram} shows an example with its dependency structure. In this sentence, word \textit{PD} is a potential disease entity and following logical rules may exist: \vspace{-0.1cm} \noindent \begin{quote} \textsc{TokenString}\xspace==\ \textit{PD} $\rightarrow$ disease \\ \textsc{PreNGram}\xspace==\ \textit{thirty} $\rightarrow$ disease \\ \textsc{PostNGram}\xspace==\ \textit{patients} $\rightarrow$ disease \\ \textsc{POSTag}\xspace==\ \small\textsc{PROPN}\normalsize\ $\rightarrow$ disease \\ \textsc{DependencyRel}\xspace==\ \\ (compound, \textit{patient}) $\rightarrow$ disease \end{quote} \vspace{-0.1cm} In fact, above simple rules may sometimes fail to work, therefore we introduce complex rules, which combine several simple rules into compound rules by logical connectives including and ($\land$), or ($\lor$) and negation ($\lnot$). For example, only a mention that satisfies both rule \textsc{PostNGram}\xspace==\ \textit{patients} and rule \textsc{POSTag}\xspace==\ \small\textsc{PROPN}\normalsize\ can be a disease entity. \subsubsection{Logical Rules Mining} \label{rule mining} After defining the form of meta logical rules, we traverse the entire training set and recall all potential rules that satisfy the format of meta rules. \subsection{Zero-shot Prompt Models as Seed Rules} In our proposed framework \mbox{\textsc{STREAM}}\xspace, we design a zero-shot prompt-based module to generate seed rules from pre-trained models without any manual seed rules, and the details are as follows. \subsubsection{Zero-shot Prompt Model Inputs} \label{sec: zero-shot prompt inputs} For each sentence in the unlabeled training corpus $\text{PL}_{U}$, we first obtain its noun chunks $\text{E}$ by open-source dependency parsing tools such as \textit{Spacy}\footnote{https://spacy.io/models/en\#en\_core\_web\_sm}. Actually, each noun chunk $\text{E}_i$ may be a potential entity, so that we construct the following prompt-based pattern proposed in~\cite{dai2021ultra} to mine its possible entity types: \begin{equation} \text{T}_1:\text{LC} \dots \text{[}\textit{mask}\text{]}\ \textit{such}\ \textit{as}\ \text{E} \dots \text{RC} \end{equation} where $\text{LC}$ and $\text{RC}$ are left and right context tokens. With the help of the zero-shot capability of large pre-trained models\footnote{In this work, we use RoBERTa-base as the prompt model.}, we can obtain the condition probability output ({$\text{PS}\subset \mathbb{R}^{V}$}, where $V$ is the vocabulary size) of noun chunk $\text{E}$ at the position of special token \text{[}\textit{mask}\text{]}. For example, the prompt input of the above sentence \textit{``Thirty PD patients participated in the study''}\xspace with noun chunk \textit{PD} is: \begin{equation} \textit{Thirty}\ \text{[}\textit{mask}\text{]}\ \textit{such}\ \textit{as}\ \textit{PD}\ \textit{patients}\dots \textit{study} \end{equation} At the position of word [\textit{mask}], pre-trained models are able to directly output entity types like \textit{``diseases''}, \textit{``disorders''}, \textit{``conditions''} and so on, and we select \textit{Top-K} types ($\text{S}_{1}:\{\text{S}_{11},\text{S}_{12},\dots,\text{S}_{1K}\}$) from the condition probability output $\text{PS}_1$ as the candidate types of noun chunk $\text{E}_i$, where $\text{S}_{1i}$ is the entity type that outputs the $i_{th}$ highest confidence in the conditional probability $\text{PS}_1$. However, the above prompt-based input breaks left context and focus more on right context, and we propose another prompt-based input to take left context also into consideration. It is defined as: \begin{equation} \text{T}_2:\text{LC}\dots \text{E}\ \textit{and}\ \textit{some}\ \textit{other}\ \text{[}\textit{mask}\text{]} \dots \text{RC} \end{equation} For this prompt-based input, we can also obtain its \textit{Top-K} entity types ($\text{S}_{2}:\{\text{S}_{21},\text{S}_{22},\dots,\text{S}_{2K}\}$), and the final type set $\text{S}$ of noun chunk $\text{E}$ should be generated from two above type sets $\text{S}_1$ and $\text{S}_2$. \subsubsection{Label Words Mapping} To bridge the gap between model's output types $\text{S}$ and our task-specific categories $\text{Y}$, we design a module to find label words mapping automatically. Specially, to find the label word mapping for target category $\text{Y}_i$, we count the co-occurrence between prompt model's output types $\text{S}_i$ and target type $\text{Y}_i$ in all $\text{S}$, and filter out the types with high support\footnote{The number of occurrences, called the support.} ($\text{S}_{ih}:\text{S}$). Actually, the co-occurring types in $\text{S}_{ih}$ are often synonyms or aliases of the target type $\text{Y}_i$. For instance, we can find target category \textit{diseases} and type \textit{disorders} tend to appear together in \text{S}, which means there is a label word mapping: $\textit{disorders} \rightarrow \textit{disease}$. We define the founded label mapping as $\mathcal{M}$, which maps all entity types in $\text{S}_{ih}$ to target type $\text{Y}_i$, this is defined as: \begin{equation} \mathcal{M}: \text{S}_{ih} \rightarrow \text{Y}_i,\ \text{Y}_i \in \text{Y} \end{equation} \subsubsection{Zero-shot Seed Rules} \label{sec: initial seed rules} By the label word mapping $\mathcal{M}$, we can convert the initial condition probability output $\text{PS}_{1,2}$ to our task-specific condition probability $\text{PY}_{1,2} \subset \mathbb{R}^{v}$, where $v$ is the target category number. $\text{PY}_1$ and $\text{PY}_2$ are the entity type predictions for noun chunk $\text{E}$ that come from two different prompt-based models. Therefore, if the two models' predictions are similar and have no differences, the final entity type $\text{O}$ can be considered as the common output type of the two models. It is defined as: \begin{equation} \text{O}=\left\{ \begin{aligned} \text{Y}_{11}\quad& \textit{if}\quad \text{Y}_{11}=\text{Y}_{21},\\ \text{unk}\quad & \textit{otherwise.} \end{aligned} \right. \end{equation} where $\text{Y}_{1i}$ is the entity type with the $i_{\text{th}}$ largest model confidence $p_{1i}$ in $\text{PY}_1$, and \text{unk} means the entity type is unknown due to models' divergence. For these chunks $\text{E}$ with determined entity type $\text{O}\neq \text{unk}$, we further filter out the chunks with high model confidence $p$, where $p=\min(p_{11},p_{21})$. Besides, we also use a support threshold to further filter out high-quality chunks (\textit{i.e.} chunks that occur less often may be noisy), and we define the final obtained chunks pool as $\text{PL}_S$. \begin{equation} \text{PL}_S=\{\text{E}:p>p_t, r>r_t\} \end{equation} where $p_t,r_t$ are confidence and support thresholds. Actually, any noun chunk $\text{E}$ with entity category $\text{O}$ in the high-quality chunk pool $\text{PL}_S$ can be seen as an initial \textsc{TokenString}\xspace rule: \begin{equation} \textsc{TokenString}\xspace\ \text{==}\ \text{chunk E} \rightarrow \text{type O} \end{equation} \subsection{Distill Task-specific Logical Rules from High-quality Instance Pool} \label{sec: learn rules} Once seed rules are obtained, we can fetch all instances that matches the seed rules to form a instance pool $\text{PL}_S \rightarrow \text{PL}_{R}$. Based on the initial pool $\text{PL}_{R}$, we aim to add high-quality instance to the pool, and distill new logical rules from the pool. \subsubsection{Add High-quality Instances to the Pool} \label{sec:add instances to the pool} Based on the high-quality instances in $\text{PL}_{S}$, we can train specific~(\textit{i.e.} named entity tagging) downstream models, and the trained model is defined as $\mathcal{F}$. After that, we use the trained model to generate a pseudo label for each unlabeled instance in $\text{PL}_{U}$. To identify potential high-quality instances in unlabeled instances~$\text{PL}_{U}$ , we use the instances in high-quality pool $\text{PL}_{S}$ as a guide. In detail, for any unlabeled sentence $s_u\in \text{PL}_{U}$, its pseudo label given by the trained model is $\text{Y}_u=\mathcal{F}(s_u)$. We randomly sample a certain number of high-quality instances from $\text{PL}_{S}$ with the same entity label $\text{Y}_u$, and estimate the similarity between the instance $s_u$ and these sample instances. This is defined as: \begin{equation} \text{S-score}(s_u)=\text{Medium}[\text{sim}(s_u,s_i)],\ s_i\in \text{PL}_{S} \end{equation} where \text{sim} is the function to measure the semantic similarity between sentence $s_u$ and the sampled sentence $s_i$, and \text{Medium} means that the final score is the median~(\textit{i.e.} avoid the influence of outliers) of all pair scores ($\text{sim}(s_u,s_i), s_i\in \text{PL}_S$). Besides, to decide the score threshold of adding instances to the pool $\text{PL}_S$, we also randomly select instance $s_j$ from $\text{PL}_S$, and calculate the similarity score between the instance $s_j$ and the remaining instances $\text{PL}_{S}/s_j$. This process is defined as: \begin{equation} \text{S-score}_{t}=\text{Medium}[\text{S-score}(s_j,\text{PL}_{S}/s_j)],\ s_j\subset \text{PL}_{S} \end{equation} \subsubsection{Distill Task-Specific Rules from the Pool} \label{sec:distill rules from the pool} With such a high-quality instance pool $\text{PL}_{S}$, our goal is to find all high-quality rules from potential rules set \text{R} mined in section~\ref{rule mining}. For any rule $\text{R}_u \in \text{R}$, we define its confidence score as: \begin{equation} \text{R-score}(\text{R}_u)=\frac{M_{\text{R}_u}}{N_{\text{R}_u}}\log_2 N_{\text{R}_u} \end{equation} where $N_{\text{R}_u}$ is the number of sentences that meets rule $\text{R}_u$ in the pool $\text{PL}_S$, and $M_{\text{R}_u}$ is the number of sentences that matches rule $\text{R}_u$ correctly (\textit{i.e.} the rule labelling result is consistent with the high-confidence label $\text{O}$). Similarly, we also use the existing high-quality rules to determine the dynamic threshold for filtering out potential rules: \begin{equation} \text{R-score}_{t}=\text{Medium}[\text{R-score}(\text{R}_i)],\ \text{R}_i \subset \text{PL}_R \end{equation} Accordingly, we keep repeating the steps defined in sections \ref{sec:add instances to the pool} and \ref{sec:distill rules from the pool} until pool $\text{PL}_S$ or $\text{PL}_R$ is no longer updated. During this process, high-quality instances are gradually added to the instance pool $\text{PL}_S$, and corresponding high-quality logical rules are also produced. \subsection{Fine-tuned Prompt Model as Seed Rules} \label{sec:fine models} In section~\ref{sec: zero-shot prompt inputs}, we propose to utilize zero-shot prompt-based models to generate initial seed rules, however, these rules are just a compromise at the time of data cold start (\textit{i.e.} w/o any weakly labeled data). Once we have collected enough high-quality instances in pool $\text{PL}_S$, we can further adjust the prompt-based model to adapt to our specific task, and generate seed rules with higher quality. \subsubsection{Fine-tuned Prompt Model Inputs} \label{sec:fine tune prompt inputs} To further fine-tune prompt models, we construct two new prompt-based inputs as follows: \begin{equation} \begin{aligned} \text{T}_3: &\text{LC}\ ...\ \text{E}\ ...\ \text{RC }\text{E}\ \textit{is}\ \text{[}\textit{mask}\text{]}\ \text{[}\textit{mask}\text{]}\ \textit{entity} \\ \text{T}_4: &\text{LC}\ ...\ \text{E}\ ...\ \text{RC }\text{E}\ \text{[}\textit{s}\text{]}\ \text{[}\textit{s}\text{]}\dots \text{[}\textit{s}\text{]}\ \text{[}\textit{mask}\text{]}\ \text{[}\textit{s}\text{]} \end{aligned} \end{equation} where $\text{[}\textit{s}\text{]}$ is the soft mask token. In the input template $\text{T}_3$, we aim to make the prompt-based model to output entity types at the positions of two [\textit{mask}] tokens, and its label words mapping is: \begin{align} \text{[}\textit{mask}\text{]}\quad\text{[}\textit{mask}\text{]} \quad &\nonumber \\ \textit{a/an}\quad \quad \ \ \text{O} \quad \quad &\rightarrow \quad \text{E}\textit{'s entity label is }\text{O}\nonumber \\ \textit{not}\ \ \ \quad \quad \textit{an} \ \ \ \quad &\rightarrow \quad \text{E}\textit{ is not an entity} \end{align} For example, if the output words at the positions of two mask tokens \text{[}\textit{mask}\text{]} are ``\textit{a disease}'', it means chunk E is an entity and its label is disease. Besides, we also use a soft embedding prompt-based input scheme~(\textit{i.e.} $\text{T}_4$), which can implicitly learn word embeddings at the positions of \text{[}\textit{s}\text{]} through gradient propagation. In this case, our goal is to constrain the model to output the target entity types O directly at the position of \text{[}\textit{mask}\text{]}. Compared to the zero-shot prompt-based input proposed in section~\ref{sec: zero-shot prompt inputs}, the above two prompt-based inputs do not destroy the original sentence structure and promote the models to better understand the meaning of the entire sentence. \subsubsection{Negative Instance Sampling} \label{sec:negative samples} However, instances in pool $\text{PL}_S$ are all positive sentences so that the models can not be trained only on pool $\text{PL}_S$. To solve this issue, we sample some high-quality negative instances also based on the consistency of model outputs, this is defined as: \begin{equation} \text{O}=\left\{ \begin{aligned} \text{Y}_{11}\quad& \textit{if} \quad \text{Y}_{11}=\text{Y}_{21},\\ \text{NA}\quad& \textit{otherwise if} \quad \text{S}_{11}=\text{S}_{21},\\ \text{unk}\quad & \textit{otherwise.} \end{aligned} \right. \end{equation} In short, negative samples (\textit{i.e.} \text{NA}) are the samples with same zero-shot prompt model outputs ($\text{S}_{11}=\text{S}_{21}$), but not with any target entity type ($\text{S}_{11}\not \subset \text{Y}$). \subsubsection{Fine-tuned Seed Rules} Based on the positive sentences provided by the pool $\text{PL}_S$ and negative instances sampled in section~\ref{sec:negative samples}, we can fine-tune prompt-based models with the inputs defined in section~\ref{sec:fine tune prompt inputs}. Then, similar to the approach in section~\ref{sec: initial seed rules}, we use the fine-tuned models to predict pseudo labels for all unlabeled sentences, and select the sentences with high model confidence and high support as new seed rules. Immediately afterward, our system will repeat the steps in sections~\ref{sec: learn rules} and~\ref{sec:fine models} to continuously distill more new rules, form a larger pool $\text{PL}_S$ and fine-tune a better prompt-based model. \section{Related Work} \noindent\paragraph{Weak Supervision} To alleviate the issue of limited labeled data, previous researchers made many efforts to improve \mbox{\textit{named entity tagging}}\xspace systems from different perspectives: (1)~\citep{ren2015clustype,fries2017swellshark,giannakopoulos2017unsupervised} introduce distant supervision~\cite{mintz2009distant}, an automated method to label data by aligning text with remote knowledge bases, to build NER systems without human supervision. (2)~\citep{shang2018automated} uses typed lexicons and~\citep{peng2019distantly} uses incompetent dictionaries as the indirect supervision to guide model training. However, lexicon or KB is not always available and its construction is expensive. (3)~\citep{niu2003bootstrapping,huang2010inducing} use classical bootstrap methods to build NER systems. (4)~\citep{lin2020triggerner} introduces ``entity triggers'', an effective proxy of human explanations for facilitating label-efficient learning of NER models. (5) Recently,~\citep{bach2017learning,lison2020named,safranchik2020weakly} focus on rule aggregation to learn from noisy supervision, and~\citep{li2021weakly} proposes to learn logical rules from selected seed rules to generate more diverse pseudo labels, and achieves the SOTA model performance. However, the above systems still rely on some manual data or rules, while our system yields rules from pre-trained models under limited prompt patterns. \noindent\paragraph{Language Models} ~\citet{vaswani2017attention} proposed a self-attention based architecture --- Transformer, and it soon becomes the backbone of many following language models. By pre-training on a large-scale corpus, BERT~\citep{devlin-etal-2019-bert} obtains the ability to capture a notable amount of ``common-sense'' knowledge and gains significant improvements on many tasks following the fine-tune scheme. Recently,~\citep{gao2020making,han2021ptr,wei2021finetuned} found that the prompt-based models achieve remarkable few-shot performance, and reformulate the traditional paradigm of fine-tuning to prompt-tuning, which could better utilize the knowledge of the pre-trained models.
\section{Introduction} Bicircular matroids are a minor closed class of matroids that arise from graphs. There is considerable amount of research towards studying certain subclasses of bicircular matroids. Matthews~\cite{matthewsQJMOS28} characterized bicircular matroids which are also graphic matroids. In~\cite{sivaramanDM328}, ternary bicircular matroids are studied, and in~\cite{chunDM339}, bicircular matroids representable over $GF(4)$ and $GF(5)$ are characterized. Neudauer~\cite{neudauerphd} considered bicircular matroids that are fundamental transversal matroids. Finally, Sivaraman and Slilaty~\cite{sivaramanGC2022} characterize the class of $3$-connected bicircular matroids whose duals are bicircular matroids as well. In the previous work, the authors suggested that studying the intersection of lattice path matroids and bicircular matroids might be an interesting research topic. Bonin and de Mier \cite{boninEJC27} showed that lattice path matroids are a class of transversal matroids closed under minors and duality. Furthermore, they observed that these matroids have several strong structural properties. For instance, all connected lattice path matroids have a spanning circuit. In the same work, the authors claimed that bicircular matroids and lattice path matroids are significantly different classes of transversal matroids. In particular, they noticed that every uniform matroid is a lattice path matroid, while the only uniform bicircular matroids are $U_{3,5}$, $U_{3,6}$ and $U_{4,6}$, and the families $U_{1,n}$, $U_{2,n}$, $U_{n,n}$ and $U_{n,n+1}$ for $n\ge 0$. This remark yields a large class of lattice path matroids that are not bicircular matroids. Recently, and in a different context, it was shown that every simple lattice path matroid has a positive coline~\cite{albrechtPhd}. Since the class of lattice path matroids is closed under duality, the previous statement implies that every cosimple lattice path matroid has a positive double circuit. On the contrary, we exhibited a large class of cosimple bicircular matroids with no positive double circuits~\cite{guzmanAR}. This class is obtained by considering bicircular matroids of graphs with minimum degree at least $3$ and with girth at least $5$. So, the bicircular matroids of such graphs are not lattice path matroids, which yields a large class of bicircular matroids that are not lattice path matroids. The observations of the two paragraphs above, motivate us to study the class of lattice path bicircular matroids. We show that indeed, lattice path bicircular matroids are a thin family of matroids. This is done by constructing five graph families $\mathcal{F}_i$ with $i\in\{0,\dots, 4\}$ such that the bicircular matroid of a graph $G\in \mathcal{F}_i$ is a lattice path matroid. This is one of our two main results. \begin{theorem}\label{thm:graphs} Let $G$ be a graph such that $B(G)$ is a connected matroid. The bicircular matroid $B(G)$ is a lattice path matroid if and only if $G$ belongs to $\mathcal{F}_0\cup\mathcal{F}_1\cup \mathcal{F}_2 \cup \mathcal{F}_3 \cup \mathcal{F}_4$. \end{theorem} Moreover, we propose a characterization of lattice path bicircular matroids within the class of bicircular matroids. We do so by exhibiting the list of excluded bicircular minors to lattice path matroids. \begin{theorem}\label{thm:excludedminors} A bicircular matroid is a lattice path matroid if and only if it has no one of the following matroids as a minor: \[ C^{2,4},~\mathcal{W}^3,~A^3,~R^3,~R^4,~D^4,~B^1, \text{ and } S^1. \] \end{theorem} We denote by $ex_B(\mathcal{L})$ the set that contains the eight matroids listed in Theorem~\ref{thm:excludedminors}. The proofs of Theorems~\ref{thm:graphs} and~\ref{thm:excludedminors} consists of three main blocks. In Section~\ref{sec:EM}, we define the matroids listed in Theorem~\ref{thm:excludedminors}, and we show that these are excluded bicircular minors to lattice path matroids. In Section~\ref{sec:GF}, we construct the graph families $\mathcal{F}_i$ for $i\in\{0,\dots, 4\}$, and show that each graph in these families has a lattice path bicircular matroid. Finally, in Section~\ref{sec:EMGF}, we observe that if a connected bicircular matroid $B(G)$ has no $ex_B(\mathcal{L})$-minor, then $G$ belongs to some $\mathcal{F}_i$. Building on the work from Sections~\ref{sec:EM}, \ref{sec:GF} and \ref{sec:EMGF}, we prove Theorems~\ref{thm:graphs} and~\ref{thm:excludedminors} in Section~\ref{sec:CAR}, where we also discuss some of their implications. For instance, we propose a geometric description of $2$-connected lattice path bicircular matroids. We begin with Section~\ref{sec:prelim}, where we introduce bicircular matroids and lattice path matroids, together with certain properties of these that will be useful for our work. \section{Preliminaries} \label{sec:prelim} We assume familiarity with basic matroid and graph theory. A standard reference for matroid theory is \cite{oxley2011} and for graph theory is \cite{bondy2008}. In particular, given a graph $G$ and a subset of edges $I$, we denote by $G[I]$ the subgraph of $G$ induced by $I$. That is, $G[I]$ is the subgraph of $G$ with edge set $I$ and no isolated vertices. Let $G$ be a (not necessarily simple) graph with vertex set $V$ and edge set $E$. The \textit{bicircular matroid} of $G$ is the matroid $B(G)$ with ground set $E$ whose independent sets are the edge sets $I\subseteq E$ such that $G[I]$ contains at most one cycle in each connected component. Equivalently, the circuits of $B(G)$ are the edge sets of subgraphs which are subdivisions of: Two loops on the same vertex, two loops joined by an edge, or three parallel edges joining a pair of vertices. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-4cm, yshift=0cm, scale=1 \node [vertex] (0) at (0,0){}; \path[-] (0) edge [min distance=1cm, out=45, in=-45] (0); \path[-] (0) edge [min distance=1cm, out=225, in=135] (0); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-0.7,0){}; \node [vertex] (1) at (0.7,0){}; \draw [edge] (1) to (0); \path[-] (1) edge [min distance=1cm, out=45, in=-45] (1); \path[-] (0) edge [min distance=1cm, out=225, in=135] (0); \end{scope} \begin{scope}[xshift=4cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (0,-1){}; \node [vertex] (1) at (0,1){}; \draw [edge] (0) to (1); \path[-] (0) edge [bend left] (1); \path[-] (0) edge [bend right] (1); \end{scope} \end{tikzpicture} \end{center} Lattice path matroids arise from lattice paths in a region bounded by a pair of paths. A \textit{lattice path} consists of a starting point $S$, $S\in \mathbb{Z}^2$, and a finite sequence of steps $E$, $E= (1,0)$, and $N$, $N = (0,1)$. Unless stated otherwise we assume that $S = (0,0)$, so a lattice path can be simply thought as a word over the alphabet $\{E,N\}$. The steps $E$ and $N$ are called \textit{East} and \textit{North} steps, respectively. The \textit{endpoint} of a lattice path $P$ is the sum (in $\mathbb{Z}^2$) of the steps of $P$ (plus $S$ when $S\neq (0,0)$). Consider a pair $P$ and $Q$ of lattice paths from $(0,0)$ to $(m,r)$, where $P$ never goes above $Q$. Let $\mathcal{P}$ be the set of all lattice paths from $(0,0)$ to $(m,r)$ that do not go below $P$ nor above $Q$. For every $i\in\{1,\dots r\}$ let $N_i$ be the set $\{j\colon$ step $j$ is the $i$-th North step of some path in $\mathcal{P}\}$. The matroid $M[P,Q]$ is defined as the transversal matroid with ground set $[m+r]$ that has $(N_1,\dots, N_r)$ as a presentation. We call $(N_1,\dots, N_r)$ the \textit{standard presentation} of $M[P,Q]$. A \textit{lattice path matroid} is a matroid $M$ isomorphic to $M[P,Q]$ for some lattice paths $P$ and $Q$. Notice that in this case, the rank of $M$ is $r$ and its corank is $m$. Equivalently \cite{boninEJC27}, a matroid $M$ with ground set $E$ is a lattice path matroid if and only if there is a linear ordering $e_1\le e_2 \le \cdots \le e_n$ of $E$, and a collection $\mathcal{N}$ of incomparable intervals of $(E,\le)$ such that $M$ is isomorphic to the transversal matroid $(E,\mathcal{N})$. We call $e_1\le e_2 \le \cdots \le e_n$ the \textit{interval ordering} of $\mathcal{N}$, and say that $(E,\mathcal{N})$ is an \textit{interval presentation} of $M$. In particular, every standard presentation is an interval presentation. Lattice path matroids have several nice structural properties investigated by Bonin and de Mier \cite{boninEJC27}. In particular, we are interested in the collection of \textit{fundamental flats}. Let $X$ be a connected flat of a connected matroid $M$ for which $|X| > 1$ and $r(X) < r(M)$. We say that $X$ is a \textit{fundamental flat} of $M$ if for some spanning circuit $C$ of $M$ the intersection $X\cap C$ is a basis of $X$. In \cite{boninEJC27}, the authors assert that the fundamental flats of a lattice path matroid form two disjoint chains ordered by inclusion. \begin{proposition}\cite{boninEJC27}\label{prop:boninff} Assume $M[P, Q]$ is a connected lattice path matroid of rank $r$ and corank $m$. Let $X$ be a connected flat of $M[P, Q]$ with $|X| > 1$ and $r(X) < r$. Then $X$ is a fundamental flat of $M[P, Q]$ if and only if $X$ is an initial or a final segment of $[m + r ]$. \end{proposition} \subsection*{\normalfont{\textsc{Series extension}}} Sometimes, we will need to argue that if the bicircular matroid of some graph is a lattice path matroid, then the bicircular matroids of certain subdivisions of this graph are also lattice path matroids. Since edge subdivisions correspond to coparallel extensions, we begin by proving the following statement. \begin{lemma}\label{lem:copar} Let $L$ be a lattice path matroid on $[n]$ with interval presentation $(N_1,\dots, N_k)$. The matroid obtained by adding a coparallel element $a$ to $1$ and a coparallel element $b$ to $n$ is a lattice path matroid with interval presentation $\big(\{a,1\}, N_1,\dots, N_k, \{n,b\}\big)$ and interval ordering $a \le 1 \le\cdots\le n\le b$. \end{lemma} \begin{proof} Since $(N_1,\dots, N_k)$ is an ordered collection of incomparable intervals of $[n]$, then $\big(\{a,1\}, N_1,\dots, N_k, \{n,b\}\big)$ is an ordered collection of incomparable intervals of $a\le 1\le 2\le\dots \le k\le b$. So, $\big(\{a,1\}, N_1,\dots, N_r, \{n,b\}\big)$ is a lattice path matroid $L'$ with ground set $[n]\cup\{a,b\}$. To see that $a$ and $1$ are coparallel elements in $L'$ suppose that there is a circuit $C$ that contains $a$ but does not contain $1$. Then, $C-a$ is an independent set so, $C-a$ is a partial transversal of $\big(\{a,1\}, N_1,\dots, N_k, \{n,b\}\big)$. But since $1\not\in C-a$, then $C-a$ is a partial transversal of $\big(N_1,\dots, N_k, \{n,b\}\big)$, and thus $C$ is a partial transversal of $\big(\{a,1\}, N_1,\dots, N_k, \{n,b\}\big)$ which contradicts the choice of $C$. Analogously we show that $n$ and $b$ are coparallel elements in $L'$. \end{proof} In particular, this implies that if $M$ is obtained from a uniform matroid as a series extension of at most two elements, then $M$ is a lattice path matroid. Also, since edge subdivisions in a graph $G$ correspond to series extensions in $B(G)$, the following lemma is a particular case of Lemma~\ref{lem:copar}. Thus, we consider it to be proved. \begin{lemma}\label{lem:Gsubdivision} Let $G$ be a graph with a distinguished (colored) edge $e_r$. Suppose that $B(G)$ is a lattice path matroid, with an interval ordering such that $e_r$ is a minimal or a maximal element. If $G'$ is obtained from subdividing $e_r$ (into arbitrarily many edges), then $B(G')$ is a lattice path matroid. \hfill $\square$ \end{lemma} \subsection*{\normalfont{\textsc{$2$-sums}}} Consider a pair of matroids $M_1$ and $M_2$ such that $E(M_1)\cap E(M_2) = \{e\}$. The \textit{$2$-sum} of $M_1$ and $M_1$ \textit{over} $e$, is the matroid $M_1\oplus_e M_2$ with ground set $E(M_1)\cup E(M_2)-e$, whose circuits are defined as follows. \begin{enumerate} \item Every circuit of $M_1-e$ and $M_2-e$ is a circuit of $M_1\oplus_e M_2$. \item A set $C \subseteq E(M_1)\cup E(M_2)-e$ is a circuit if $C\cap E(M_i) \cup\{e\}$ is a circuit for both $i\in\{1,2\}$. \end{enumerate} In general, neither lattice path matroids nor bicircular matroids are closed under $2$-sums. Nonetheless, there are some particular instances where the $2$-sum of a pair of bicircular (resp.\ lattice path) matroids is a bicircular (resp.\ lattice path) matroid. In particular, consider a pair of lattice path matroids $L_1$ and $L_2$ with interval presentations $(E_1,\mathcal{N})$ and $(E_2,\mathcal{N}')$. Let $\mathcal{N} = (N_1,\dots, N_k)$, $\mathcal{N}' = (N_1',\dots, N_l')$, and $e_1 \le \cdots \le e_n$ and $e'_1 \le \cdots \le e'_m$ be the respective interval orderings of $\mathcal{N}$ and of $\mathcal{N}'$. Suppose that $E_1\cap E_2 =\{e\} = \{e_n\} = \{e_1'\}$. In this case, the $2$-sum $L_1\oplus_e L_2$ is the lattice path matroid with interval presentation $(N_1,\dots N_{k-1}, (N_k\cup N'_1)-\{e\}, N_2',\dots, N_m')$, and interval ordering \[ e_1 \le \cdots \le e_{n-1} \le e'_2 \le \cdots e_m'. \] The previous assertion is a straightforward observation. It also follows from Lemma 3.2 in \cite{boninJCTB100}, and by noticing that the $2$-sum $M_1\oplus_e M_2$ of a pair of matroids can be obtained by deleting $e$ from the parallel connection of $M_1$ and $M_2$ over $e$. Consider now a pair of graphs $G_1$ and $G_2$ such that $E(G_1) \cap E(G_2) = \{e\}$, where $e$ is a loop incident with $v_1\in V(G_1)$, and incident with $v_2\in V(G_2)$. If $G$ is the graph obtained by gluing $G_1$ and $G_2$ over the vertices $v_1$ and $v_2$, and removing both copies of $e$, then the bicircular matroid $B(G)$ is the $2$-sum $B(G_1)\oplus_e B(G_2)$. In this case, we say that $G$ is a \textit{loop sum} of $G_1$ and $G_2$. Whenever any two loop sums of $G_1$ and $G_2$ are isomorphic we denote the unique (up to isomorphism) loop sum of $G_1$ and $G_2$ by $G_1\oplus_l G_2$. The following claim is proved by the arguments in this brief subsection. \begin{lemma}\label{lem:loopsums} Consider a pair of graphs $G_1$ and $G_2$ such that $E(G_1)\cap E(G_2) = \{e\}$ where $e$ is a loop in $G_1$ and in $G_2$. Let $G$ be the loop sum of $G_1$ and $G_2$ over $e$ and suppose that $B(G_1)$ and $B(G_2)$ are lattice path matroids. If there are interval orderings of $E(G_1)$ and of $E(G_2)$ such that $e$ is a terminal element in both, then $B(G)$ is a lattice path matroid. \hfill $\square$ \end{lemma} \subsection*{\normalfont{\textsc{Clones}}} To conclude this section we introduce one more notion that will be useful in Section~\ref{sec:GF}. A pair of elements $e$ and $f$ in a matroid $M$ are called \textit{clones} if the permutation of $e$ and $f$ is an automorphism of $M$. For instance, any pair of elements in a uniform matroid are a pair of clones. We say that a pair of edges $e$ and $f$ of a graph $G$ are \textit{clones} if $e$ and $f$ are clones in $B(G)$. In particular, any pair of parallel edges are clone edges. Consider a matroid $M$ and a set $S\subseteq E$ of clones in $M$. A \textit{clone extension} of $M$ over $S$, is a matroid $M+f$ such that $f$ is $S\cup\{f\}$ is a set of clones in $M+f$. In general, there might be more than one non-isomorphic clone extensions. For instance, if $S = \{e\}$ the parallel and the coparallel extensions of $e$ are clone extensions of $M$ over $S$. \begin{lemma}\label{lem:cloneEX} Let $M$ be a matroid and $S$ a set of clones of $M$. If $S$ is a circuit of $M$, then there is a unique (up to isomorphism) clone extension of $M$ over $S$. \end{lemma} \begin{proof} Consider a pair of clone extensions $M+e$ and $M+f$ of $M$ over $S$. We verify that $\varphi\colon M+e\to M+f$ defined as the identity on $E$ and $\varphi(e) =f$, is an isomorphism. We do so by observing that this function maps circuits to circuits, and the claim follows by symmetry. Clearly, every circuit of $M+e$ to which $e$ does not belong, is mapped to a circuit of $M+f$ to which $f$ does not belong. Similarly, if $C$ is a circuit of $M+e$ such that $e\in C$ but $s\not\in C$ for some $s\in S$, then $C-e+s$ is a circuit of $M+e$ (because $s$ and $e$ are clones). Since $C-e+s\subseteq E$, then $C-e+s$ is a circuit of $M+f$, and so, $(C-e+s)-s+f$ is a circuit of $M+f$, i.e., $\varphi[C] = C-e+f$ is a circuit of $M+f$. To conclude the proof, we argue that for every circuit $C$ of $M+e$ to which $e$ belongs, there is some $s\in S$ such that $s\not\in C$ (and thus, the claim will follow by the previously considered cases). Anticipating a contradiction, suppose that there is some circuit $C$ of $M+e$ such that $S\cup\{e\}\subseteq C$. Since $M+e$ is an extension of $M$, then $S$ is a circuit of $M+e$. Hence, $C$ properly contains another circuit, which contradicts the fact that circuits are minimal dependent sets. \end{proof} Clearly, any bicircular matroid $B(G)$ together with any set of three parallel edges of $G$, satisfy the hypothesis of Lemma~\ref{lem:cloneEX}. We use this observation to prove the following result. \begin{lemma}\label{lem:triangles} Let $G$ be graph and let $f_1$, $f_2$ and $f_3$ be three different parallel edges. If $B(G)$ is a lattice path matroid, then $B(G+f)$ is a lattice path matroid whenever $f$ is added to the parallel class of $f_1$, $f_2$ and $f_3$. Moreover, if $B(G)$ has an interval ordering where $f_1$ is its minimum (resp.\ maximum), then $B(G+f)$ has an interval ordering where $f_1$ is its minimum (resp.\ maximum). \end{lemma} \begin{proof} We begin with the following observation about transversal matroids. Consider a bipartite graph $H(E,Y)$, and let $T$ be the transversal matroid presented by $H$ (with ground set $E$). Let $e_1e_2e_3$ be a circuit of $T$. It is evident that $|N_H(\{e_1,e_2,e_3\})| = 2$. Moreover, at least one of these elements has degree two in $H$; otherwise, by the pigeonhole principle, two of them would be leaves of $H$ with a common support, i.e., parallel elements in $T$. Also notice that any two elements $e,f\in E$ with the same neighborhood in $H$ are clones in $T$. In particular, any pair of parallel edges in a graph are clone elements in its bicircular matroid. Let $G$, $f_1$, $f_2$, $f_3$ and $f$ be as in the hypothesis. In particular, $B(G+f)$ is a clone extension of $G$ over $\{f_1,f_2,f_3\}$. Let $(E,\mathcal{N})$ be an interval presentation of $B(G)$ with interval ordering $e_1\le \cdots \le e_{k-2} \le f_1 \le e_k \le \cdots \le e_n$. By the choice of $f_1,f_2$ and $f_3$, and by the arguments in the previous paragraph, we assume that $f_1$ belongs to exactly two sets of $\mathcal{N}$. Consider the presentation $(E\cup\{f\},\mathcal{N}')$, where $f$ belongs to the same two sets as $f_1$. Then, this is an interval presentation of a clone extension $B(G)+f$ over $\{f_1,f_2,f_3\}$ where any of the following is an interval ordering of $B(G)+f$ \[ e_1 \le \cdots \le f_1 \le f \le e_k \le \cdots \le e_n, \text{ and } e_1 \le \cdots \le e_{k-2} \le f \le f_1 \le \cdots \le e_n. \] Since $B(G+f)$ and $B(G)+f$ are clone extensions of $B(G)$ over $\{f_1,f_2,f_3\}$, and $f_1f_2f_3$ is a circuit of $B(G)$, by Lemma~\ref{lem:cloneEX} we conclude that $B(G+f) \cong B(G)+f$. Thus, $B(G+f)$ is a lattice path matroid. The moreover statement follows from the previously defined interval orderings. \end{proof} \section{Excluded minors} \label{sec:EM} In \cite{boninJCTB100}, Bonin exhibits an infinite family of excluded minors for lattice path matroids. In this section we introduce eight bicircular excluded minors for lattice path matroids. Some of these will have structural implications about those graphs with lattice path bicircular matroids. We begin by exhibiting the prism $C^{2,4}$ and the four graphs whose bicircular matroid is isomorphic to this prism. \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift = 2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (c) at (0,0.9){}; \node [vertex] (3) at (0,2.24){}; \node[] at (0,-1){$P_1$}; \foreach \from/\to in {c/0,c/1, c/3} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance=1cm] (1); \path[-] (0) edge [min distance=1cm] (0); \path[-] (3) edge [min distance=1cm] (3); \end{scope} \begin{scope}[xshift=-2.5cm, yshift = 2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (c) at (0,0.9){}; \node [vertex] (3) at (0,2.24){}; \node[] at (0,-1){$P_2$}; \foreach \from/\to in {c/1,c/0, c/3, 0/c, 1/c, 3/c} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=-7.5cm, yshift = -2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (c) at (0,0.9){}; \node [vertex] (3) at (0,2.24){}; \node[] at (0,-1){$P_3$}; \foreach \from/\to in {c/0} \draw [edge] (\from) to (\to); \path[-] (0) edge [min distance=1cm] (0); \foreach \from/\to in {c/1, c/3, 1/c, 3/c} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift = -2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (c) at (0,0.9){}; \node [vertex] (3) at (0,2.24){}; \node[] at (0,-1){$P_4$}; \foreach \from/\to in {c/1,c/0} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance=1cm] (1); \path[-] (0) edge [min distance=1cm] (0); \path[-] (c) edge [bend left] (3); \path[-] (3) edge [bend left] (c); \end{scope} \begin{scope}[xshift=5cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1.3,0){}; \node [vertex] (1) at (1.3,0){}; \node [vertex] (3) at (-1.3,3){}; \node [vertex] (4) at (1.3,3){}; \node [vertex] (5) at (0,3.7){}; \node [vertex] (6) at (0,0.7){}; \node[] at (0,-1){$C^{2,4}$}; \foreach \from/\to in {0/1, 1/4, 3/4, 3/0, 5/3, 5/4} \path[-] (\from) edge (\to); \foreach \from/\to in {6/0, 6/1, 6/5} \draw [edge, dotted] (\from) to (\to); \end{scope} \end{tikzpicture} \caption{To the right, an affine representation of $C^{2,4}$. To the left, four graphs whose bicircular matroid is isomorphic to $C^{2,4}$.} \label{fig:C24} \end{center} \end{figure} Recall that a \textit{block} of a graph $G$ is a maximal $2$-connected subgraph. An \textit{end block} is a block of $G$ that is a leaf in the block tree of $G$; a \textit{middle block} is a block of $G$ that is not an end block. In particular, if $B(G)$ is a connected matroid, then every end block of $G$ contains at least one cycle (i.e., $G$ has no loopless leaves). Furthermore, suppose that $G$ has three different end blocks. By contracting all of $G$ except these three end blocks, we can notice that $G$ contains $P_i$ as a minor for some $i\in\{1,2,3,4\}$ (these graphs are depicted in Figure~\ref{fig:C24}). Therefore, if $G$ is a graph such that $B(G)$ is a connected matroid with no $C^{2,4}$-minor, then the block tree of $G$ is a path. \begin{proposition}\label{prop:blockpath} Let $G$ be a graph such that $B(G)$ is a connected matroid. If $B(G)$ is does not contain $C^{2,4}$ as a minor, then the block tree of $G$ is a path. Moreover, every middle block contains exactly two vertices. \end{proposition} \begin{proof} In the paragraph preceding this proposition, we showed that the block tree of $G$ is a path. This also implies that every middle block contains exactly two cut vertices of $G$. To prove the moreover statement, and anticipating a contradiction, suppose that there is a middle block $MB$ of $G$ with at least three vertices. With out loss of generality, assume that $MB$ is the unique middle block of $G$; otherwise contract every middle block that is not $MB$. So, let $EB_1$, $MB$ and $EB_2$ be the blocks of $G$. Let $x\in MB\cap EB_1$ and $y\in MB\cap EB_2$ be the cut vertices of $G$ in $MB$. Since $B(G)$ is connected, $G$ has no loopless leaves. Thus, there are two possible scenarios for each end block $EB_i$: Either there is a cycle in $EB_i$, or $EB_i$ consist of an edge together with a loop incident with the end vertex. We consider the case when $EB_1$ and $EB_2$ contain a cycle. Since $MB$ is two connected and it is not an edge, there are two internally disjoint $xy$-paths $Q_1$ and $Q_2$. Furthermore, since $MB$ has at least three vertices, then we choose $Q_1$ such that it is not an edge. Finally, let $C_1$ and $C_2$ be a pair of cycles of the end blocks. Consider the following contractions of $G$: Contract $Q_1$ to a path of length $2$; contract $Q_2$; contract $C_1$ to a pair of parallel edges; and contract $C_2$ to a pair of parallel edges. The previous minor of $G$ is isomorphic to the graph $P_2$ (Figure~\ref{fig:C24}). Thus, $B(G)$ contains a $C^{2,4}$-minor. When one or both end blocks consist of an edge together with a loop, we find either of $P_3$ or $P_4$ as a minor of $G$, and the claim follows by similar arguments. \end{proof} Consider the four point line with ground set $\{1,2,3,4\}$, and add three elements $1'$, $2'$, and $3'$, coparallel to $1$, to $2$ and to $3$, respectively. Then, by contracting $4$ we obtain $C^{2,4}$ as a contraction minor. Now, consider a uniform matroid $U_{r,n}$ where $2\le r \le n-1$. It is not hard to notice, that any four points of $U_{r,n}$ belong to a four point line minor of $U_{r,n}$. Therefore, if we add elements in series to at least three different points of $U_{r,n}$, we obtain a matroid $M$ with a $C^{2,4}$-minor. This arguments prove the following statement. \begin{lemma}\label{lem:uniformextensions} Let $r$ and $n$ be a pair of non-negative integers and consider the uniform matroid $U_{r,n}$. If $2\le r \le n-1$, and $M$ is a series extension of at least three different elements of $U_{r,n}$, then $M$ contains a $C^{2,4}$-minor. \hfill $\square$ \end{lemma} \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-1.5cm, yshift=2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){$3K_3$}; \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \foreach \from/\to in {0/1, 0/2, 1/2} \draw [edge] (\from) to (\to); \end{scope} \begin{scope}[xshift=1.5cm, yshift=2cm, scale=0.8 \coordinate (c0) at (-1.5,0){}; \coordinate (c1) at (1.5,0){}; \coordinate (d0) at (-1.5,1){}; \coordinate (d1) at (1.5,1){}; \coordinate (i0) at (-1.5,2){}; \coordinate (i1) at (1.5,2){}; \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (2) at (0,0){}; \node [vertex] (0) at (-1.5,1){}; \node [vertex] (1) at (1.5,1){}; \node [vertex] (2) at (0,1){}; \node [vertex] (0) at (-1.5,2){}; \node [vertex] (1) at (1.5,2){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){$B^1$}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=-9cm, yshift = 2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$W_3$}; \foreach \from/\to in {1/0, 0/3, 3/1} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance=1cm, out=45, in=-45] (1); \path[-] (0) edge [min distance=1cm, out=225, in=135] (0); \path[-] (3) edge [min distance=1cm] (3); \end{scope} \begin{scope}[xshift=-6cm, yshift = 2cm, scale=0.8 \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (3) at (0,2.5){}; \node [vertex] (01) at (-0.75,1.25){}; \node [vertex] (13) at (0.75,1.25){}; \node [vertex] (30) at (0,0){}; \node[] at (0,-1){$\mathcal{W}^3$}; \foreach \from/\to in {1/0, 0/3, 3/1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=9cm, yshift=2cm, scale=0.8 \coordinate (0) at (-1.5,0){}; \node [vertex] (00) at (-1.5,0.15){}; \node [vertex] (01) at (-1.5,-0.15){}; \coordinate (1) at (1.5,0){}; \node [vertex] (10) at (1.5,-0.15){}; \node [vertex] (11) at (1.5,0.15){}; \node [vertex] (30) at (-0.5,1.5){}; \node [vertex] (31) at (0.5,1.5){}; \node [vertex] (c) at (0,0){}; \node[] at (0,-1){$R^3$}; \path[-] (0) edge (1); \end{scope} \begin{scope}[xshift=6cm, yshift=2cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$R_3$}; \foreach \from/\to in {1/0, 0/3, 3/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [min distance=1cm, out=90, in=175] (0); \path[-] (0) edge [min distance=1cm, out=185, in=270] (0); \path[-] (1) edge [min distance=1cm, out=90, in=5] (1); \path[-] (1) edge [min distance=1cm, out=355, in=270] (1); \end{scope} \begin{scope}[xshift=3cm, yshift = -3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$A_3$}; \foreach \from/\to in {0/1} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \foreach \from/\to in {3/1, 1/3, 3/0, 0/3} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift= 6cm, yshift = -3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$A_3'$}; \foreach \from/\to in {0/1, 0/3} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \path[-] (0) edge [min distance=1cm, out=225, in=135] (0); \foreach \from/\to in {3/1, 1/3} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=9cm, yshift=-3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2.5){}; \node [vertex] (01) at (-0.5,1.25){}; \node [vertex] (13) at (0.5,1.25){}; \node [vertex] (30) at (0,-0.3){}; \node[] at (0,-1){$A^3$}; \foreach \from/\to in {0/3, 3/1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=-9cm, yshift = -3cm, scale=0.8 \node [vertex] (0) at (-1.1,0){}; \node [vertex] (1) at (1.1,0){}; \node [vertex] (3) at (0,2.2){}; \node [vertex] at (0,0){}; \node[] at (0,-1){$D_4$}; \foreach \from/\to in {0/1, 0/3, 1/3} \draw [edge] (\from) to (\to); \foreach \from/\to in {3/1, 1/3, 3/0, 0/3} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=-6cm, yshift = -3cm, scale=0.8 \node [vertex] (0) at (-1.1,0){}; \node [vertex] (1) at (1.1,0){}; \node [vertex] (3) at (0,2.2){}; \node [vertex] at (0,0){}; \node[] at (0,-1){$D_4'$}; \foreach \from/\to in {0/1, 0/3} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance=1cm, in = -45, out = 45] (1); \foreach \from/\to in {3/1, 1/3, 3/0, 0/3} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=-3.2cm, scale=0.8 \coordinate (c0) at (0,0){}; \coordinate (c1) at (0,3){}; \coordinate (d0) at (-1.8,1){}; \coordinate (d1) at (-1.8,4){}; \coordinate (i0) at (1.8,1){}; \coordinate (i1) at (1.8,4){}; \node [vertex] (1) at (-1.2,1.3){}; \node [vertex] at (-1.2,2.2){}; \node [vertex] (2) at (-1.2,3){}; \node [vertex] (11) at (-0.6,1){}; \node [vertex] at (-0.6,1.9){}; \node [vertex] (22) at (-0.6,2.7){}; \node [vertex] at (1,2.6){}; \node [vertex] at (1,1.6){}; \node[] at (0,-0.8){$D^4$}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1, c0/d0, c0/i0, c1/i1, c1/d1, 1/2, 11/22} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=-7cm, yshift=-8cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-1){$R_4$}; \foreach \from/\to in {0/1, 0/3, 1/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left =20] (2); \path[-] (0) edge [bend right =20] (2); \path[-] (3) edge [min distance=1cm] (3); \path[-] (3) edge [min distance=1cm, out=40, in=320] (3); \end{scope} \begin{scope}[xshift=-4cm, yshift=-8cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-1){$R_4'$}; \foreach \from/\to in {0/1, 0/2, 0/3, 1/3} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \path[-] (3) edge [min distance=1cm, out=40, in=320] (3); \path[-] (2) edge [min distance=1cm] (2); \end{scope} \begin{scope}[xshift=-1cm, yshift=-8cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-1){$R''_4$}; \foreach \from/\to in {0/1, 0/3, 1/3, 0/2, 2/3} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \path[-] (3) edge [min distance=1cm, out=40, in=320] (3); \end{scope} \begin{scope}[xshift=2cm, yshift=-8cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-1){$R'''_4$}; \foreach \from/\to in {0/1, 1/3, 0/2, 2/3} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \path[-] (3) edge [min distance=1cm, out=40, in=320] (3); \path[-] (0) edge [min distance=1cm, out=225, in=315] (0); \end{scope} \begin{scope}[xshift=6cm, yshift=-8.2cm, scale=0.8 \coordinate (c0) at (0,0){}; \coordinate (c1) at (0,3){}; \coordinate (d0) at (-1.8,1){}; \coordinate (d1) at (-1.8,4){}; \coordinate (i0) at (1.8,1){}; \coordinate (i1) at (1.8,4){}; \node [vertex] at (-0.15,2.3){}; \node [vertex] at (0.15,2.3){}; \node [vertex] at (0,1){}; \node [vertex] at (-1.2,2.8){}; \node [vertex] at (1.2,2.8){}; \node [vertex] at (-1.2,1.5){}; \node [vertex] at (1.2,1.5){}; \node[] at (0,-0.8){$R^4$}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1, c0/d0, c0/i0, c1/i1, c1/d1} \path[-] (\from) edge (\to); \end{scope} \end{tikzpicture} \caption{Six excluded minors to the class of lattice path matroids: $\mathcal{W}^3$, $B^1$, $R^3$, $D^4$, $A^3$, and $R^4$. In each case there is an affine representation, together with all corresponding bicircular presentations.} \label{fig:bicircularEX} \end{center} \end{figure} The matroids listed in Theorem~\ref{thm:excludedminors} are presented in Figures~\ref{fig:C24}, \ref{fig:bicircularEX}, and~\ref{fig:BB}. In each case, we depict a bicircular and an affine representation of these matroids. With a brief look at Figure 2 in \cite{boninJCTB100}, the reader can realize that indeed, $C^{2,4}$, $\mathcal{W}^3$, $A^3$, $R^3$, $R^4$, $D^4$ and $(S^1)^\ast$ are excluded minors for the class of lattice path matroids. It is not immediate to conclude from the description in \cite{boninJCTB100} that $B^1$ is not a lattice path matroid. Nonetheless, this can easily be observed using Proposition~\ref{prop:boninff}. \begin{proposition}\label{prop:exminors} Each of the following matroids is a bicircular matroid that is not a lattice path matroid: \[ C^{2,4},~\mathcal{W}^3,~A^3,~R^3,~R^4,~D^4,~B^1, \text{ and } S^1. \] \end{proposition} \begin{proof} From the corresponding illustration, it is clear that these matroids are bicircular matroids. As we already mentioned, with a brief look at \cite{boninJCTB100}, the reader can realize that indeed, $C^{2,4}$, $\mathcal{W}^3$, $A^3$, $R^3$, $R^4$, $D^4$ and $(S^1)^\ast$ are excluded minors for the class of lattice path matroids. Since lattice path matroids are closed under duality \cite{boninEJC27}, then $S^1$ is an excluded minor for the class of lattice path matroids. To see that $B^1$ is not a lattice path matroid it suffices to notice that their corresponding fundamental flats do not form two chains ordered by inclusion (Proposition~\ref{prop:boninff}). For instance, any four points of $B^1$ such that no three of them belong to a common line, are a spanning circuit. Thus, each three point line of $B^1$ is spanned by some spanning circuit, which implies that each three point line is a fundamental flat of $B^1$. So, there are three incomparable fundamental flats of $B^1$, which implies that the fundamental flats of $B^1$ do not form two disjoint chains ordered by inclusion. Thus, we conclude that $B^1$ is not a lattice path matroid. \end{proof} \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$S_1$}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$S_1'$}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3, 0/2} \draw [edge] (\from) to (\to); \path[-] (2) edge [min distance = 1cm] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=1cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$S_1''$}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3, 0/2, 1/3} \draw [edge] (\from) to (\to); \path[-] (2) edge [min distance = 1cm] (2); \path[-] (1) edge [min distance = 1cm, out = 225, in = 315] (1); \end{scope} \begin{scope}[xshift=5cm, yshift=-3.3cm, scale=0.9 \coordinate (c0) at (-1.5,0){}; \coordinate (c1) at (1.5,0){}; \coordinate (i0) at (-1.5,1.5){}; \coordinate (i1) at (1.5,1.5){}; \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (2) at (0,0){}; \node [vertex] (1) at (0.1,0.75){}; \node [vertex] (2) at (-0.1,0.75){}; \node [vertex] (0) at (-1.5,1.5){}; \node [vertex] (1) at (1.5,1.5){}; \node [vertex] (2) at (0,1.5){}; \node[] at (0,-1.2){$(S^1)^\ast$}; \foreach \from/\to in {c0/c1, i0/i1} \path[-] (\from) edge (\to); \end{scope} \end{tikzpicture} \caption{To the left, three bicircular presentations of $S^1$. Since this is a rank $5$ matroid, we choose to present an affine representation of its dual $(S^1)^\ast$. $S^1$ is an excluded bicircular minor to lattice path matroids.} \label{fig:BB} \end{center} \end{figure} \section{Graph families} \label{sec:GF} In this section, we define five graph families $\mathcal{F}_i$ with $i\in\{0,\dots,4\}$ and we show that the graphs in these families have lattice path bicircular matroids. Throughout this section, we will heavily rely on Lemma~\ref{lem:Gsubdivision} to argue that subdivisions of certain graphs have lattice path bicircular matroids. In particular, we will use that any series extension of two elements of a uniform matroid is a lattice path matroid. We will also rely on Lemma~\ref{lem:triangles}. This lemma asserts that if a graph $G$ has a lattice path bicircular matroid, then $G+f$ has a lattice path bicircular matroid whenever $f$ is added to a parallel class that contains three different edges. \subsection*{\normalfont{\textsc{Family $\mathcal{F}_0$}}} We begin with the simplest construction. Consider the graphs $K'_{2,3}$, $K''_{2,3}$ and $K^\ast_{2,3}$ obtained from $K_{2,3}$ by adding certain parallel edges or a loop as follows. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-5cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$K'_{2,3}$}; \draw [edge] (2) to (3); \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \foreach \from/\to in { 0/s, s/3} \draw [edge, red] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \end{scope} \begin{scope}[xshift=0cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$K''_{2,3}$}; \foreach \from/\to in {0/2, 2/3} \draw [edge] (\from) to (\to); \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \foreach \from/\to in { 0/s, s/3} \draw [edge, red] (\from) to (\to); \path[-] (2) edge [min distance = 1cm] (2); \end{scope} \begin{scope}[xshift=5cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$K^\ast_{2,3}$}; \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \foreach \from/\to in {0/s, s/3} \draw [edge, red] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (3) edge [bend left] (2); \path[-] (3) edge [bend right] (2); \end{scope} \end{tikzpicture} \end{center} For the sake of clarity in the upcoming arguments, we distinguish some edges (red and blue) of $K'_{2,3}$, of $K''_{2,3}$ and of $K^\ast_{2,3}$ as depicted above (we will use this technique through the rest of this work). A graph $G$ belongs to $\mathcal{F}_0$ if either of the following hold: \begin{enumerate} \item $G$ is a subdivision of $K_{2,3}$, \item $G$ is a subdivision of blue and/or red edges of $K'_{2,3}$ of $K''_{2,3}$ or of $K^\ast_{2,3}$, or \item $G$ is a subdivision of at most two edges of $K_4$. \end{enumerate} In particular, notice that any subdivision of $K_{2,3}$ is a theta graph. Thus, $B(G)$ is the uniform matroid of rank $|E(G)|-1$ and $|E(G)|$ elements. Clearly then, $B(G)$ is a lattice path matroid. Also, it is not hard to notice that the bicircular matroid of $K_4$ is $U_{4,6}$. Thus, by Lemma~\ref{lem:Gsubdivision}, the bicircular matroid of any subdivision $G'$ of any two edges of $K_4$ is a lattice path matroid. \begin{proposition}\label{prop:familyF0} The bicircular matroid of each graph in $\mathcal{F}_0$ is a lattice path matroid. \end{proposition} \begin{proof} Given the arguments above, we only need to show that when $G$ is a subdivision of blue and red edges of $K'_{2,3}$, of $K''_{2,3}$, or of $K^\ast_{2,3}$ then $B(G)$ is a lattice path matroid. The last follows by noticing that the bicircular matroid $B(K^\ast_{2,3})$ is a series extension of $U_{3,6}$. Indeed, if we contract each pair of red and blue edges to a single red and blue edge, respectively, we obtain a graph $2K_3$ whose bicircular matroid is $U_{3,6}$. Thus, the bicircular matroid of any subdivision $G$ of red and blue edges of $K^\ast_{2,3}$ is a series extension of two elements of $U_{3,6}$. By Lemma~\ref{lem:Gsubdivision}, we conclude that $B(G)$ is a lattice path matroid. It is not hard to notice that there is a color preserving isomorphism from $B(K'_{2,3})$ to $B(K''_{2,3})$. So, to conclude this proof, it suffices to consider the case when $G$ is a subdivision of $K'_{2,3}$. Now, we propose the following lattice path presentation of the bicircular matroid of $K'_{2,3}$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$K'_{2,3}$}; \draw [edge] (2) to (3); \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \foreach \from/\to in { 0/s, s/3} \draw [edge, red] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \end{scope} \begin{scope}[xshift=3cm, scale = 0.8 \draw[step=1cm] (-1,0) grid (0,3); \draw[step=1cm] (0,2) grid (1,5); \node[] at (0,-1.2){\small{$L$}}; \color{red} \node[] at (-1.3,0.5){\scriptsize{$1$}}; \node[] at (-1.3,1.5){\scriptsize{$2$}}; \node[] at (-0.5,-0.3){\scriptsize{$1$}}; \node[] at (0.3,0.5){\scriptsize{$2$}}; \color{black} \node[] at (-1.3,2.5){\scriptsize{$3$}}; \node[] at (-0.3, 3.5){\scriptsize{$5$}}; \node[] at (0.3,1.5){\scriptsize{$3$}}; \node[] at (1.3,2.5){\scriptsize{$5$}}; \color{blue} \node[] at (1.3,3.5){\scriptsize{$6$}}; \node[] at (1.3,4.5){\scriptsize{$7$}}; \node[] at (-0.3,4.5){\scriptsize{$6$}}; \color{black} \end{scope} \end{tikzpicture} \end{center} It is not hard to notice that any color preserving labeling of the edges of $K'_{2,3}$ with $\{1,\dots, 7\}$, yields an isomorphism from $B(K'_{2,3})$ to the lattice path matroid $L$. Moreover, this isomorphism defines an interval ordering of $E(K'_{2,3})$, where the minimum is a red edge, and the maximum is a blue edge. Thus, by Lemma~\ref{lem:Gsubdivision}, if $G$ is obtained from $K'_{2,3}$ by subdividing any blue and any red edge, then $B(G)$ is a lattice path matroid. Therefore, the statement of this proposition holds true. \end{proof} \subsection*{\normalfont{\textsc{Family $\mathcal{F}_1$}}} Our most basic building block for the family $\mathcal{F}_1$ is the graph $G_1$, obtained from the $4$ cycle by duplicating two non consecutive edges. We distinguish the parallel edges by thinking of one class as blue edges, and the other as red edges. Given three non-negative integers $r$, $b$ and $d$, we denote the graph $G_1(r,d,b)$ obtained from $G_1$ by adding $r$ red parallel edges (to the red edges), $b$ blue parallel edges (to the blue edges), and $d$ parallel diagonal edges. From left to right, the following is a depiction of $G_1 = G_1(0,0,0)$, of $G_1(1,3,1)$, and $G(r,d,b)$, where the dashed edges represent $r$, $d$ and $b$ parallel copies. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1$}}; \path[-] (3) edge (2); \path[-] (0) edge (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(1,3,1)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left = 20] (3); \path[-] (0) edge [bend right = 20] (3); \draw [edge] (0) to (3); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, blue] (1) to (3); \end{scope} \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(r,d,b)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge] (\from) to (\to); \draw [edge, dashed] (0) to (3); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, dashed, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, dashed, blue] (1) to (3); \end{scope} \end{tikzpicture} \end{center} The colors on the edges of $G_1$ are useful to define the family $G_1(r,d,b)$. This colors are also convenient to define the family $\mathcal{F}_1$, but in this case, we extend this coloring when either of $r$, $d$, or $b$ equal $0$. In Figure~\ref{fig:H1}, we illustrate these edge colorings. With these figures in mind, we define the family $\mathcal{F}_1$. A graph $G$ belongs to $\mathcal{F}_1$ if the following holds: \begin{enumerate} \item $G$ is a subdivision of at most one red edge and at most one blue edge of $G(r,d,b)$ for some non-negative integers $r$, $d$ and $b$ (see Figure~\ref{fig:H1}). \end{enumerate} \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1 = G_1(0,0,0)$}}; \path[-, purple] (3) edge (2); \path[-, purple] (0) edge (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=-5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(0,d,0)$}}; \foreach \from/\to in {3/0} \draw [edge, dashed] (\from) to (\to); \path[-, red] (3) edge (2); \path[-, blue] (0) edge (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(r,0,0)$}}; \foreach \from/\to in {0/1,3/2} \draw [edge, blue] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, red, dashed] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(r,d,0)$}}; \draw [edge] (3) to (2); \draw [edge, dashed] (0) to (3); \foreach \from/\to in {0/1} \draw [edge, blue] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, red, dashed] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=2.5cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(0,0,b)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge, red] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, dashed, blue] (1) to (3); \end{scope} \begin{scope}[xshift=7.5cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(r,0,b)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, dashed, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, dashed, blue] (1) to (3); \end{scope} \begin{scope}[xshift=5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(r,d,b)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge] (\from) to (\to); \draw [edge, dashed] (0) to (3); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, dashed, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, dashed, blue] (1) to (3); \end{scope} \end{tikzpicture} \caption{The generating set of graphs for $\mathcal{F}_1$. Each dashed edge represents $r$, $b$ and $d$ red, blue and diagonal parallel edges, respectively. Non-bended edges of $G_1$ are both blue and red.} \label{fig:H1} \end{center} \end{figure} Notice that $G_1(r,d,b)$ is obtained by adding an edge to a parallel class to either of $G_1(r-1,d,b)$, $G_1(r,d-1,b)$ or $G_1(r,d,b-1)$. Thus, by Lemma~\ref{lem:triangles}, we conclude that if $G_1(1,3,1)$ has a lattice path bicircular matroid, then $G_1(r,d,b)$ has a lattice path bicircular matroid for every $r,b\ge 1$ and $d\ge 3$. Furthermore, it is obvious that if $G_1(r,d,b)$ has a lattice path bicircular matroid, then $G_1(r',d',b')$ has a lattice path bicircular matroid for any $r'\le r$, $d'\le d$ and $b'\le b$. Both of these observations together, show that if $G_1(1,3,1)$ has a lattice path bicircular matroid, then $G_1(r,d,b)$ has a lattice path bicircular matroid for all non-negative integers $r$, $d$ and $b$. \begin{lemma}\label{lem:Grdb} For all non-negative integers $r$, $d$ and $b$, the graph $G_1(r,d,b)$ has a lattice path bicircular matroid, with an interval ordering where the minimum (resp.\ maximum) element is a red (resp.\ blue) edge. \end{lemma} \begin{proof} Suppose that $B(G_1(1,3,1))$ is a lattice path matroid. By the arguments preceding this paragraph, we know that $B(G_1(r,d,b))$ is a lattice path matroid for all non-negative integers $r$, $d$ and $b$. Furthermore, with the same arguments and the ``moreover'' statement of Lemma~\ref{lem:triangles}, we conclude that if $B(G_1(1,3,1))$ has an interval ordering where the minimum (resp.\ maximum) element is a red (resp.\ blue) edge, then so does $B(G_1(r,d,b))$. Thus, it suffices to show that this lemma holds for $r = 1$, $d = 3$ and $b = 1$. This follows from the lattice path presentation of $B(G_1(1,3,1))$ in Figure~\ref{fig:LatG131}. \end{proof} \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.7] \begin{scope}[xshift=-5cm, yshift=6cm, scale=0.8 \node [vertex] (0) at (-2,0){}; \node [vertex] (1) at (2,0){}; \node [vertex] (2) at (-2,4){}; \node [vertex] (3) at (2,4){}; \node[] at (-2.8,2){\scriptsize{$1$}}; \node[] at (-2.2,2){\scriptsize{$2$}}; \node[] at (-1.6,2){\scriptsize{$3$}}; \node[] at (0,4.3){\scriptsize{$4$}}; \node[] at (0,3.2){\scriptsize{$5$}}; \node[] at (0,2.4){\scriptsize{$6$}}; \node[] at (0,1.5){\scriptsize{$7$}}; \node[] at (0,0.3){\scriptsize{$8$}}; \node[] at (1.6,2){\scriptsize{$9$}}; \node[] at (2.3,2){\scriptsize{$10$}}; \node[] at (3,2){\scriptsize{$11$}}; \node[] at (0,-1.3){\small{$G_1(1,3,1)$}}; \foreach \from/\to in {0/1, 2/3, 0/3} \draw [edge] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw[edge, red] (0) to (2); \path[-, blue] (1) edge [bend left] (3); \path[-, blue] (1) edge [bend right] (3); \draw[edge, blue] (1) to (3); \path[-] (0) edge [bend right =20] (3); \path[-] (0) edge [bend left =20] (3); \end{scope} \begin{scope}[xshift=5cm, yshift = 6cm, scale=0.8 \draw[step=1cm] (-2,0) grid (0,3); \draw[step=1cm] (0.01,1) grid (0.98,3); \draw[step=1cm] (1,1) grid (3,4); \draw[step=1cm] (-3,0) grid (-2.01,2); \draw[step=1cm] (3.01,2) grid (4,4); \color{red} \node[] at (-3.3,0.5){\scriptsize{$1$}}; \node[] at (-3.3,1.5){\scriptsize{$2$}}; \node[] at (-2.5,-0.4){\scriptsize{$1$}}; \node[] at (-1.5,-0.4){\scriptsize{$2$}}; \node[] at (-0.5,-0.4){\scriptsize{$3$}}; \color{black} \node[] at (-2.3,2.5){\scriptsize{$4$}}; \node[] at (0.3,0.5){\scriptsize{$4$}}; \node[] at (0.7,3.5){\scriptsize{$8$}}; \node[] at (3.3,1.5){\scriptsize{$8$}}; \node[] at (1.5,4.4){\scriptsize{$9$}}; \color{blue} \node[] at (4.5,2.5){\scriptsize{$10$}}; \node[] at (4.5,3.5){\scriptsize{$11$}}; \node[] at (2.5,4.4){\scriptsize{$10$}}; \node[] at (3.5,4.4){\scriptsize{$11$}}; \color{black} \node[] at (0,-1.3){\small{$L$}}; \end{scope} \end{tikzpicture} \caption{The graph $G_1(1,3,1)$ together with a lattice path matroid $L$, where the labels describe an isomorphism $\varphi\colon B(G_1(1,3,1))\to L$. Indeed, it is not hard to observe that $\varphi$ defines a bijection between the families of circuits of rank at most $3$, and that it defines a bijection on the collections of bases. Since $B(G_1(1,3,1))$ and $L$ are rank $4$ matroids, we conclude that $\varphi$ defines a bijection on the family of all circuits.} \label{fig:LatG131} \end{center} \end{figure} Recall that a pair of elements in a matroid $M$ are clones, if permuting these elements yields an automorphism of $M$. It is not hard to see for each graph depicted in Figure~\ref{fig:H1}, the blue and the red edges correspond to a pair of classes of clone elements in the corresponding bicircular matroid. Thus, for any of these graphs, any two subdivisions, $G'$ and $G''$, of at most one red edge and at most one blue edge (into the same number of blue and red edges, respectively) it holds that $B(G')\cong B(G'')$. \begin{proposition}\label{prop:familyF1} The bicircular matroid of each graph in $\mathcal{F}_1$ is a lattice path matroid. \end{proposition} \begin{proof} By Lemma~\ref{lem:Grdb}, the bicircular matroid of each graph $G_1(r,d,b)$ has an interval ordering where the minimum and maximum elements are a red and a blue edge, respectively. By the arguments in the paragraph above this lemma, any two subdivisions, $G'$ and $G''$, of at most one red edge and at most one blue edge (into the same number of blue and red edges, respectively) it holds that $B(G')\cong B(G'')$. Since we can choose an interval ordering of $B(G_1(r,d,b))$ where the minimum (resp.\ maximum) element is a red (resp.\ blue) edge, we conclude by Lemma~\ref{lem:Gsubdivision}, that if $G'$ is a subdivision of at most one red edge and at most one blue edge of $G_1(r,d,b)$, then $B(G')$ is a lattice path matroid. Recall that each graph in $\mathcal{F}_1$ is obtained by subdividing at most one red edge and at most and one blue edge of some $G_1(r,d,b)$. The claim follows. \end{proof} \subsection*{\normalfont{\textsc{Family $\mathcal{F}_2$}}} This family is constructed in a similar fashion to the construction of $\mathcal{F}_1$. Denote by $2K_3$ the graph obtained from $K_3$ by duplicating each edge. Again, we distinguish a pair of parallel classes, one by color red and the other one by blue. Similar to how we did in the previous subsection, for a pair of non-negative integers $r$ and $b$, we denote by $2K_3(r,b)$ the graph obtained from $2K_3$ by adding $r$ red parallel edges (to red edges) and $b$ blue parallel edge (to blue edges). From left to right, the following is a depiction of $2K_3 = 2K_3(0,0)$, of $2K_3(1,1)$, and of $2K_3(r,b)$, where the dashed edges represent $r$ and $b$ parallel copies. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-0.7){\small{$2K_3$}}; \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-0.7){\small{$2K_3(1,1)$}}; \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \draw[edge, blue] (1) to (2); \draw[edge, red] (0) to (2); \end{scope} \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-0.7){\small{$2K_3(r,b)$}}; \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \draw[edge, blue, dashed] (1) to (2); \draw[edge, red, dashed] (0) to (2); \end{scope} \end{tikzpicture} \end{center} As previously mentioned, we construct $\mathcal{F}_2$ in a similar manner to how we constructed $\mathcal{F}_1$. A graph $G$ belongs to $\mathcal{F}_2$ if the following holds: \begin{enumerate} \item $G$ is a subdivision of at most one red edge and at most one blue edge of $2K_3(r,b)$ for some non-negative integers $r$ and $b$. \end{enumerate} \begin{proposition}\label{prop:familyF2} The bicircular matroid of each graph in $\mathcal{F}_2$ is a lattice path matroid. \end{proposition} \begin{proof} We begin by proposing the following lattice path presentation of $B(2K_3(1,1))$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift=5cm, scale=0.66 \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (2) at (0,2.6){}; \node[] at (-1.25,1.7){\scriptsize{$1$}}; \node[] at (-0.9,1.45){\scriptsize{$2$}}; \node[] at (-0.5,1.2){\scriptsize{$3$}}; \node[] at (0,0.7){\scriptsize{$4$}}; \node[] at (0,-0.2){\scriptsize{$5$}}; \node[] at (0.5,1.2){\scriptsize{$6$}}; \node[] at (0.9,1.45){\scriptsize{$7$}}; \node[] at (1.25,1.7){\scriptsize{$8$}}; \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw[edge, red] (0) to (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \draw[edge, blue] (1) to (2); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \end{scope} \begin{scope}[xshift=3cm, yshift = 5cm, scale=0.8 \draw[step=1cm] (0,0) grid (3,3); \draw[step=1cm] (-1,0) grid (-0.01,2); \draw[step=1cm] (3.01,1) grid (4,3); \color{red} \node[] at (-1.3,0.5){\scriptsize{$1$}}; \node[] at (-1.3,1.5){\scriptsize{$2$}}; \node[] at (-0.5,-0.3){\scriptsize{$1$}}; \node[] at (0.5,-0.3){\scriptsize{$2$}}; \node[] at (1.5,-0.3){\scriptsize{$3$}}; \color{black} \node[] at (-0.3,2.5){\scriptsize{$4$}}; \node[] at (2.5,-0.3){\scriptsize{$4$}}; \node[] at (3.3,0.5){\scriptsize{$5$}}; \node[] at (0.5,3.4){\scriptsize{$5$}}; \node[] at (1.5,3.4){\scriptsize{$6$}}; \color{blue} \node[] at (4.3,1.5){\scriptsize{$7$}}; \node[] at (4.3,2.5){\scriptsize{$8$}}; \node[] at (2.5,3.4){\scriptsize{$7$}}; \node[] at (3.5,3.4){\scriptsize{$8$}}; \color{black} \end{scope} \end{tikzpicture} \label{fig:2K3} \end{center} Denote by $J$ the lattice path matroid on the right. One can notice that $B(2K_3(1,1))$ and $J$ are isomorphic matroids because, the only non-spanning circuits in both matroids are $123$ and $678$. This lattice path presentation of $B(2K_3(1,1))$ has an interval ordering where the minimum (resp.\ maximum) element is a red (resp.\ blue) edge. Clearly, $2K_3(r,b)$ is obtained by adding an edge to a parallel class of $2K_3(r-1,b)$ or of $2K_3(r,b-1)$. Thus, by Lemma~\ref{lem:triangles}, we conclude that $B(2K_3(r,b))$ is a lattice path matroid, and has an interval ordering where the minimum (resp.\ maximum) is a red (resp.\ blue) edge. As mentioned before, any class of parallel edges is a set of clone edges. Thus, any two subdivisions of $2K_3(r,b)$ of at most one red edge and at most one blue edge (into the same number of blue and red edges, respectively) have isomorphic bicircular matroids. By the arguments in the first paragraph, we can choose an interval ordering of $B(2K_3(r,b))$ where the minimum (resp.\ maximum) element is a red (resp.\ blue) edge. Thus, we conclude by Lemma~\ref{lem:Gsubdivision}, that if $G'$ is a subdivision of at most one red edge and at most one blue edge of $2K_3(r,b)$, then $B(G')$ is a lattice path matroid. The claim follows. \end{proof} \subsection*{\normalfont{\textsc{Family $\mathcal{F}_3$}}} Similar to previous cases, we begin by introducing the building blocks of $\mathcal{F}_3$. Consider three non-negative integers $r$, $j$ and $l$. We denote by $K_3(r,j,l)$ the graph obtained from $K_3$ by adding $l$ loops incident with the same vertex $v$; by adding $j$ parallel edges to some edge of $K_3$ incident with $v$; and by adding $r$ parallel edges to the (unique) edge of $K_3$ not incident with $v$. In Figure~\ref{fig:H3}, we depict $K_3(r,j,l)$ together with a couple of particular instances. Again, we use blue and red color to distinguish some edges, and this is useful for the definition of $\mathcal{F}_3$. \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-5cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,1,0)$}}; \draw [edge, purple] (0) to (1); \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \foreach \from/\to in {1/2, 2/1} \path[-, blue] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=0cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(r,1,0)$}}; \foreach \from/\to in {1/2, 2/1} \path[-, blue] (\from) edge [bend left] (\to); \path[-, red, dashed] (0) edge [bend left] (2); \path[-, red] (2) edge [bend left] (0); \draw [edge, blue] (0) to (1); \end{scope} \begin{scope}[xshift=5cm, yshift=3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(r,j,0)$}}; \foreach \from/\to in {1/2, 2/1} \path[-, blue] (1) edge [bend left] (2); \path[-, blue, dashed] (2) edge [bend left] (1); \path[-, red, dashed] (0) edge [bend left] (2); \path[-, red] (2) edge [bend left] (0); \draw [edge] (0) to (1); \end{scope} \begin{scope}[xshift=-7.5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,0,1)$}}; \foreach \from/\to in {0/1, 1/2} \draw [edge, purple] (\from) to (\to); \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(r,0,1)$}}; \foreach \from/\to in {0/1, 1/2} \draw [edge, blue] (\from) to (\to); \path[-, red, dashed] (0) edge [bend left] (2); \path[-, red] (2) edge [bend left] (0); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=2.5cm, yshift=0cm, scale=0.9]% \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,j,1)$}}; \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \draw [edge, red] (0) to (1); \foreach \from/\to in {1/2, 2/1} \path[-, blue] (1) edge [bend left] (2); \path[-, blue, dashed] (2) edge [bend left] (1); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=7.5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(r,j,1)$}}; \draw [edge] (0) to (1); \foreach \from/\to in {1/2, 2/1} \path[-, blue] (1) edge [bend left] (2); \path[-, blue, dashed] (2) edge [bend left] (1); \path[-, red, dashed] (0) edge [bend left] (2); \path[-, red] (2) edge [bend left] (0); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=-5cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,0,l)$}}; \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \foreach \from/\to in {0/1, 1/2} \draw [edge, red] (\from) to (\to); \path[-, dashed] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=0cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,j,l)$}}; \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \draw [edge, red] (0) to (1); \path[-] (1) edge [bend left] (2); \path[-, dashed] (2) edge [bend left] (1); \path[-, dashed] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=5cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(r,j,l)$}}; \path[-, dashed, red] (0) edge [bend left] (2); \path[-, red] (2) edge [bend left] (0); \draw [edge] (0) to (1); \path[-] (1) edge [bend left] (2); \path[-, dashed] (2) edge [bend left] (1); \path[-, dashed] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \end{tikzpicture} \caption{The generating set of graphs for $\mathcal{F}_3$. Each dashed edge represents $r$ and $j$ parallel edges, and the dashed loop represents $l$ loops incident in the same vertex. The non-bend edges of $K_3(1,1,0)$ and of $K_3(1,0,1)$ are both blue and red.} \label{fig:H3} \end{center} \end{figure} In particular, notice that the bicircular matroids of $K_3(1,1,0)$ and $K_3(1,0,1)$ are isomorphic to the uniform matroid $U_{3,5}$. Also notice that for any pair of non-negative integers, $r$ and $j$, the graph $K_3(r,j,0)$ is a subgraph of $2K_3(r,j)$. We construct $\mathcal{F}_3$ in a similar fashion to how we constructed $\mathcal{F}_1$. This is done by following the edge colorings depicted in Figure~\ref{fig:H3}. A graph $G$ belongs to $\mathcal{F}_3$ if either of the followings statements hold: \begin{enumerate} \item $G$ is a subdivision of at most one red edge and at most one blue edge of $K_3(r,j,l)$ for some non-negative integers $r$, $j$ and $l$, with $r\ge 1$, \item $G$ is a cycle with one chord $e$, and possibly some edges parallel to $e$, and at most one loop in each end point of $e$, \item $G$ is a chordless cycle with arbitrarily many loops in at most one vertex $v$, and at most one loop in one neighbor of $v$, or \item $G$ is a connected graph on two vertices. \end{enumerate} \begin{lemma}\label{lem:familyF3} For every graph $G$ in $\mathcal{F}_3$ there is a graph $H\in \mathcal{F}_1\cup \mathcal{F}_2$ such that $B(G)$ is a minor of $B(H)$. \end{lemma} \begin{proof} We consider the four possible scenarios for a graph in $\mathcal{F}_3$, and we begin with the last one. Suppose that $G$ is a connected graph on two vertices, $x$ and $y$. Let $l_x$ denote the number of loops on $x$, $l_y$ the number of loops on $y$, and $m$ the number of $xy$-edges. Consider the graph $H$ obtained from $G_1(l_x,m,l_y)$ by contracting one blue and one red edge. By removing one loop from each vertex of $H$ and two of the non-loop edges, we see that $G$ is a subgraph of $H$, and thus a minor of $G_1(l_x,m,l_y)\in \mathcal{F}_1$. Below, we depict these graphs when $l_x = l_y = 1$ and $m = 2$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(1,2,1)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left = 20] (3); \path[-] (0) edge [bend right = 20] (3); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, blue] (1) to (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex, label=180:{$x$}] (0) at (-1,0.2){}; \node [vertex, label = 0:{$y$}] (1) at (1,0.2){}; \node[] at (0,-0.7){\small{$H$}}; \path[-] (0) edge [bend left= 50] (1); \path[-] (0) edge [bend right= 50] (1); \path[-] (0) edge [bend left = 20] (1); \path[-] (0) edge [bend right = 20] (1); \path[-] (1) edge [min distance=1cm] (1); \path[-] (1) edge [min distance=1cm, in = 225, out = 315] (1); \path[-] (0) edge [min distance=1cm] (0); \path[-] (0) edge [min distance=1cm, in = 225, out = 315] (0); \end{scope} \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex, label=180:{$x$}] (0) at (-1,0.2){}; \node [vertex, label = 0:{$y$}] (1) at (1,0.2){}; \node[] at (0,-0.7){\small{$G$}}; \path[-] (0) edge [bend left] (1); \path[-] (0) edge [bend right] (1); \path[-] (1) edge [min distance=1cm] (1); \path[-] (0) edge [min distance=1cm] (0); \end{scope} \end{tikzpicture} \end{center} Now suppose that $G$ satisfies the third statement of the definition of $\mathcal{F}_3$. Let $m$ be the length of the cycle, $l_v$ denote the number of loops on $v$, and suppose that a neighbor $u$ of $v$ is incident with one loop; the case when no neighbor of $v$ has a loop, follows from the case we are now considering. In this case, consider the graph $H$ obtained by subdividing the top edge of $G(0,0,l_v-1)$ into $m-3$ new edges ($m-3 \ge 0$ since $m\ge 3$). Since the top edge of $G(0,0,l_v-1)$ is a red edge (see Figure~\ref{fig:H1}), then $H\in\mathcal{F}_1$. Finally, by contracting one of the red bend edges and one of the blue edges of $H$ we see that $G$ is a minor of $H$. We illustrate the case when $l_v = 3$ below, where the dotted edges represent a path of length $m-2$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(0,0,2)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge, red] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right=50] (3); \path[-, blue] (1) edge [bend left = 50] (3); \path[-, blue] (1) edge [bend right = 20] (3); \path[-, blue] (1) edge [bend left= 20] (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H$}}; \draw [edge, red] (0) to (1); \draw [edge, red, dotted] (3) to (2); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right=50] (3); \path[-, blue] (1) edge [bend left = 50] (3); \path[-, blue] (1) edge [bend right = 20] (3); \path[-, blue] (1) edge [bend left= 20] (3); \end{scope} \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex, label=180:{$u$}] (0) at (-1,0.2){}; \node [vertex] (1) at (1,0.2){}; \node[] at (0,-0.7){\small{$G$}}; \node[] at (2,0.2){$v$}; \path[-, dotted] (0) edge [bend left = 60] (1); \path[-] (0) edge [bend right] (1); \path[-] (1) edge [min distance=1cm] (1); \path[-] (1) edge [min distance=1cm, in = 225, out = 315] (1); \path[-] (1) edge [min distance=1cm, in = 45, out = 315] (1); \path[-] (0) edge [min distance=1cm] (0); \end{scope} \end{tikzpicture} \end{center} Our next case is when $G$ is a cycle with two distinguished vertices $u$ and $v$, such that $u$ and $v$ have at most one loop each, and any chord of the cycle is a $uv$-edge. Analogous to the previous case, we only consider the case when $u$ and $v$ are incident with a loop each. Let $m$ be the number of $uv$-edges, $a_1$ the length of one of the $uv$-arcs of the cycle, and $a_2$ the length of the other. Let $H$ be the graph obtained form $G_1(0,m,0)$ by subdividing the top and bottom edges into $a_1-1$ and $a_2-1$ edges, respectively. Since the top edge and bottom are red and blue edges of $G_1(0,m,0)$ (see Figure~\ref{fig:H1}), we conclude that $H\in \mathcal{F}_1$. In this case, $G$ is the minor of $H$ obtained by contracting of edge of each parallel class. We illustrate the case when $m = 2$ as follows, the dotted edges represent the corresponding subdivisions. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(0,2,0)$}}; \path[-] (0) edge [bend left = 20] (3); \path[-] (0) edge [bend right = 20] (3); \path[-, red] (3) edge (2); \path[-, blue] (0) edge (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H$}}; \path[-] (0) edge [bend left = 20] (3); \path[-] (0) edge [bend right = 20] (3); \path[-, red, dotted] (3) edge (2); \path[-, blue, dotted] (0) edge (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex, label=180:{$u$}] (0) at (-1,0.4){}; \node [vertex, label =0:{$v$}] (1) at (1,0.4){}; \node[] at (0,-0.7){\small{$G$}}; \path[-, dotted] (0) edge [bend left = 60] (1); \path[-, dotted] (0) edge [bend right = 60] (1); \path[-] (0) edge [bend left = 20] (1); \path[-] (0) edge [bend right = 20] (1); \path[-] (1) edge [min distance=1cm] (1); \path[-] (0) edge [min distance=1cm] (0); \end{scope} \end{tikzpicture} \end{center} The final case is when $G$ is a subdivision of at most one red edge and at most one blue edge of $K_3(r,j,l)$. As we already observed, $K_3(r,j,0)$ is a subgraph of $2K_3(r,l)$. Thus, $G$ is a subgraph of a subdivision $H$ of at most one red and at most one blue edge of $2K_3(r,j)$. The claim follows since $H\in \mathcal{F}_2$. Now suppose that $l\ge 1$, and let $H$ be the graph obtained from $G_1(r+1,j+1,l)$ by contracting one blue edge. In this case, $K_3(r,j,l)$ is a subgraph of $H$. We illustrate the case when $r = j = 1$ and $l = 2$ below. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(2,3,2)$}}; \draw[edge] (2) to (3); \draw[edge] (0) to (1); \path[-] (0) edge [bend left = 20] (3); \path[-] (0) edge [bend right = 20] (3); \path[-, red] (0) edge [bend left = 20] (2); \path[-, red] (0) edge [bend right = 20] (2); \path[-, red] (0) edge [bend left = 50] (2); \path[-, red] (0) edge [bend right = 50] (2); \path[-, blue] (1) edge [bend right = 20] (3); \path[-, blue] (1) edge [bend left= 20] (3); \path[-, blue] (1) edge [bend right = 50] (3); \path[-, blue] (1) edge [bend left= 50] (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node[] at (0,-0.7){\small{$H$}}; \draw[edge] (2) to (1); \draw[edge] (0) to (1); \path[-] (0) edge [bend left] (1); \path[-] (0) edge [bend right] (1); \path[-, red] (0) edge [bend left = 20] (2); \path[-, red] (0) edge [bend right = 20] (2); \path[-, red] (0) edge [bend left = 50] (2); \path[-, red] (0) edge [bend right = 50] (2); \path[-, blue] (1) edge [min distance=1cm, in = 315, out = 45] (1); \path[-, blue] (1) edge [min distance=1cm, out = 315, in = 225] (1); \path[-, blue] (1) edge [min distance=1cm] (1); \end{scope} \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node[] at (0,-0.7){\small{$G = 2K_3(1,1,2)$}}; \draw[edge] (2) to (1); \path[-] (0) edge [bend left] (1); \path[-] (0) edge [bend right] (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [min distance=1cm, in = 315, out = 45] (1); \path[-, blue] (1) edge [min distance=1cm] (1); \end{scope} \end{tikzpicture} \end{center} By preserving the edge colors in the operations previously described, we can easily see that the red edges coincide with the colors described in Figure~\ref{fig:H3}. So, if $G$ is a subdivision of at most one red edge of $K_3(r+1,j+1,l)$, then $G$ is a minor of a subdivision $H$ of at most one red edge of $G_1(r+1, j+1, l)$. Finally, notice that the only case when the set of blue edges of $K_3(r,j,l)$ is not empty, is when $l = 1$ (see Figure~\ref{fig:H3}). Also notice, that when $l = 1$ then the blue edges and the unique loop in $K_3(r,j,l)$ are clone edges. Thus, subdividing a blue edge yields the same bicircular matroid as subdividing the loop. Following the operations previously defined, we can notice that blue edges of $G_1(r+1,j+1,l)$ are contracted to loop edges in $H$. Thus, for any subdivision $G$ of at most one red edge and at most one blue edge of $K_3(r,j,l)$, there is a subdivision $H$ of at most one red edge and at most one blue edge of some $G_1(r+1,j+1,l)$ such that $B(G)$ is a minor of $B(H)$. Since this covers the last case of the definition of $\mathcal{F}_3$, the claim is proved. \end{proof} \begin{proposition}\label{prop:familyF3} The bicircular matroid of each graph in $\mathcal{F}_3$ is a lattice path matroid. \end{proposition} \begin{proof} By Lemma~\ref{lem:familyF3}, we know that the bicircular matroid of each graph in $\mathcal{F}_3$ is a minor of the bicircular matroid of some graph in $\mathcal{F}_1\cup \mathcal{F}_2$. Since the class of lattice path matroid is a minor closed class \cite{boninEJC27}, the claim follows by Propositions~\ref{prop:familyF1} and \ref{prop:familyF2}. \end{proof} \subsection*{\normalfont{\textsc{Family $\mathcal{F}_4$}}} Our final family consists of certain graphs with cut vertices. The restrictions upon the middle blocks is that each middle block contains exactly two vertices (no restriction upon the edge set). To define the constraints over the end blocks of these graphs, we depict three possible end blocks. Again, we distinguish some red edges, and in this case we distinguish one vertex which corresponds to the cut vertex of the end block. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7cm, yshift=0cm, scale=0.8] \node [vertex] (0) at (-1,0){}; \node [vertex, label = 0:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (-3,0){$K_3(r,j,0)$}; \draw [edge] (0) to (1); \path[-, red, dashed] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, dashed] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.8] \node [vertex] (0) at (-1,0){}; \node [vertex, label = 0:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (-3,0){$K_3(1,1,0)$}; \draw [edge, red] (0) to (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \end{scope} \begin{scope}[xshift=7cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex, label = 0:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (-3,0){$K_3(1,0,0)$}; \foreach \from/\to in {0/1, 1/2} \draw [edge, red] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \end{scope} \end{tikzpicture} \end{center} We first define an auxiliary family $\mathcal{F}_4'$. A graph $G$ belongs to $\mathcal{F}_4'$ if it is a loopless graph with the following properties: \begin{enumerate} \item the block graph of $G$ is a path, \item every middle block of $G$ has exactly two vertices, and \item each end block of $G$ is a subdivision of at most one red edge of either of the graphs above, where $x$ is a cut vertex. \end{enumerate} An example of a graph in $\mathcal{F}_4'$ looks as follows, where one blue and one red edge might be subdivided (dashed edges represent multiple parallel copies, and dots represent arbitrarily many blocks of two vertices). \begin{center} \begin{tikzpicture}[scale=0.7] \node [vertex] (0) at (-5,0){}; \node [vertex] (1) at (-3,0){}; \node [vertex] (2) at (-1,0){}; \node [vertex] (3) at (1,0){}; \node [vertex] (4) at (3,0){}; \node [vertex] (5) at (5,0){}; \node [vertex] (a0) at (-7,1){}; \node [vertex] (b0) at (-7,-1){}; \foreach \from/\to in {0/b0} \draw [edge] (\from) to (\to); \path[-, dashed] (a0) edge [bend left] (0); \path[-] (a0) edge [bend right] (0); \path[-, red] (a0) edge [bend left] (b0); \path[-, red, dashed] (a0) edge [bend right] (b0); \node [vertex] (a6) at (7,1){}; \node [vertex] (b6) at (7,-1){}; \foreach \from/\to in {5/b6, a6/5} \draw [edge, blue] (\from) to (\to); \path[-, blue] (a6) edge [bend left] (b6); \path[-, blue] (a6) edge [bend right] (b6); \foreach \from/\to in {4/5, 1/2, 0/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (1); \path[-] (0) edge [bend right] (1); \path[-] (0) edge [bend right=60] (1); \path[-] (2) edge [dotted] (3); \path[-] (4) edge [bend right] (3); \path[-] (4) edge [bend left] (3); \path[-] (4) edge [bend right] (5); \path[-] (4) edge [bend right=55] (5); \path[-] (4) edge [bend left] (5); \path[-] (4) edge [bend left=50] (5); \path[-] (4) edge [bend left=70] (5); \end{tikzpicture} \end{center} A graph belongs to $\mathcal{F}_4$ if it can be obtained from a graph in $\mathcal{F}'_4$ by adding loops to cut vertices and removing edges. In particular, any graph whose block tree is a path, and its blocks have exactly two vertices, belongs to $\mathcal{F}_4$. Also, any graph that satisfies items 1 and 2 above, and its end blocks are loopless cycles, also belongs to $\mathcal{F}_4$. Consider a graph $G$ obtained from some $H\in\mathcal{F}_4'$ by adding loops to one cut vertex. It is not hard to notice that $G$ can also be obtained from some $H'\in\mathcal{F}_4'$ by contracting one edge in some middle block. Thus, we inductively conclude that every graph in $\mathcal{F}_4$ is a minor of some graph in $\mathcal{F}_4'$. \begin{proposition}\label{prop:familyF4} The bicircular matroid of every graph in $\mathcal{F}_4$ is a lattice path matroid. \end{proposition} \begin{proof} Recall that lattice path matroids are closed under minors~\cite{boninEJC27}. Thus, it suffices to show that all graphs in $\mathcal{F}_4'$ have lattice path bicircular matroids. To begin with, consider the following graphs. \begin{center} \begin{tikzpicture}[scale=0.7] \node [vertex] (0) at (-5,3){}; \node [vertex] (a) at (-5,1){}; \node [vertex] (1) at (-3,2){}; \node[] at (-2,1){$K_3(r,j,1)$}; \path[-, dashed] (0) edge [bend left] (1); \path[-] (0) edge [bend right] (1); \path[-, red] (0) edge [bend left] (a); \path[-, red, dashed] (0) edge [bend right] (a); \node [vertex] (n) at (3,2){}; \node [vertex] (m) at (5,2){}; \node[] at (4,1){$mK_2'$}; \path[-] (n) edge [bend right] (m); \path[-, dashed] (n) edge [bend left] (m); \foreach \from/\to in {1/a} \draw [edge] (\from) to (\to); \path[-] (n) edge [min distance=1cm] (n); \path[-] (m) edge [min distance=1cm] (m); \path[-] (1) edge [min distance=1cm, out= 90, in= 0] (1); \end{tikzpicture} \end{center} On the one hand, the bicircular matroid of a subdivision $G$ of at most one red edge of $K_3(r,j,1)$ is a lattice path matroid (Proposition~\ref{prop:familyF3}). Clearly, all black parallel edges together with the loop, are a fundamental flat of $B(G)$. So, by Proposition~\ref{prop:boninff}, we know that there is an interval ordering where these edges (and the loop) are a final segment. Moreover, since this is a set of clone edges, we can choose an interval ordering of $E(G)$ where the loop is the maximum element. On the other hand, the bicircular matroid of $mK_2'$ is the uniform matroid $U_{2,m+2}$, so it is a lattice path matroid. Since any pair of elements in a uniform matroid are clones, then there is an interval ordering of the edge set of $mK_2'$ where the loops are the minimum and maximum elements. Recall that the loop sum of a pair of graphs is obtained by gluing two graphs over a loop, and then deleting this loop. Now, notice that any graph in $\mathcal{F}_4'$ is a loop sum of the form \[ EB_1\oplus_l MB_1\oplus_l \cdots \oplus_l MB_k \oplus_l EB_2, \] where $EB_1$ and $EB_2$ are a subdivision of at most one red edge of either $K_3(r,j,1)$, $K_3(1,1,1)$ or $K_3(1,0,1)$, and the graphs $MB_i$ are a graph on two vertices with exactly one loop in each vertex. Thus, by the arguments above, and by Lemma~\ref{lem:loopsums} the bicircular matroid of the loop sum above is a lattice path matroid. Therefore, the bicircular matroid of each graph in $\mathcal{F}_4'$ is a lattice path matroid. So, the claim follows because every graph in $\mathcal{F}_4$ is a minor of some graph in $\mathcal{F}_4'$. \end{proof} \subsection*{\normalfont{\textsc{Efficient recognition}}} To conclude this section, we observe that it takes linear time to recognize the graph families $\mathcal{F}_i$ with $i\in\{0,1,2,3,4\}$. Consider a connected graph $G$ and let $H$ be the graph obtained from $G$ after contracting all subdivided edges. By definition of each $\mathcal{F}_i$, if $G$ belongs to some $\mathcal{F}_i$ with $i\in\{0,1,2,3,4\}$, then $H$ must be either of the following graphs: \begin{enumerate} \item $K_{2,3},~K'_{2,3},~K''_{2,3},~K^\ast_{2,3}$ or $K_4$, \item $G(r,d,b)$ for some non-negative integers $r$ and $b$, \item $2K_3(r,b)$ for some non-negative integers $r$ and $b$, \item $K_3(r,j,l)$ for some non-negative integers $r$, $j$ and $l$, or a graph on two vertices, or \item a graph whose block tree is a path, every middle block has exactly two vertices, and each block has two vertices or it is some graph $K_3(r,j,l)$ for some non-negative integers $K_3(r,j,l)$. \end{enumerate} Each of these classes can be recognized in linear time with respect to the size of the edge set of the input graph. Moreover, after contracting subdivided edges of graph $G$, and keeping track of which edges correspond to subdivision classes, we can determine if $G$ belongs to $\bigcup_{i=0}^4\mathcal{F}_i$ in linear time with respect to $|E(G)|$. By these arguments we observe the following. \begin{observation}\label{obs:recognition} Given an input graph $G$, there is a linear time algorithm (in $|E(G)|$) to decide if $G$ belongs to the union \[ \mathcal{F}_0\cup \mathcal{F}_1\cup \mathcal{F}_2\cup \mathcal{F}_3\cup \mathcal{F}_4. \] \end{observation} \section{Excluded minors and graph families} \label{sec:EMGF} We have arrived to the most technical section of this work. Here, we show if a connected bicircular matroid $B(G)$ is $ex_B(\mathcal{L})$-minor free, then $G$ belongs to a family $\mathcal{F}_i$ for some $i\in\{0,1,2,3,4\}$. The set $ex_B(\mathcal{L})$ consists of the matroids introduced in Section~\ref{sec:EM}; namely, the matroids \[ \mathcal{W}^3,~C^{2,4},~R^3,~R^4,~D^4,~A^3,~B^1, \text{ and } S^1. \] \begin{proposition}\label{prop:F0-F4} Let $G$ be a graph. If $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid, then \[ G\in \mathcal{F}_0\cup\mathcal{F}_1\cup \mathcal{F}_2\cup\mathcal{F}_3\cup \mathcal{F}_4. \] \end{proposition} \begin{proof} This proof is divided in three main cases: Non-outerplanar graphs (Proposition~\ref{prop:nonouterplanar}), $2$-connected graphs (Proposition~\ref{prop:2connected}), and outerplanar graphs with a cut vertex (Proposition~\ref{prop:excludedcase}). The claim follows from these three propositions. \end{proof} The proofs of Propositions~\ref{prop:nonouterplanar}, \ref{prop:2connected}, and~\ref{prop:excludedcase} are subdivided in several cases. Regardless of the particular subcase in turn, the proof idea is very simple: Given a graph $G$ we verify that if $G$ does not belong to some family $\mathcal{F}_i$, then there is a graph $G'$ with a minor $H$ such that $B(G)\cong B(G')$ and $B(H)\in ex_B(\mathcal{L})$ (in most cases $G' = G$). In Figures~\ref{fig:C24}, \ref{fig:bicircularEX} and~\ref{fig:BB}, we depict bicircular and affine presentations of matroids in $ex_B(\mathcal{L})$. \subsection*{\normalfont{\textsc{Non-outerplanar graphs}}} A well-known characterization of outerplanar graphs states that a graph is an outerplanar graph if it does not contain a subdivision of $K_4$ nor a subdivision of $K_{2,3}$ \cite{chartrandIHP}. We first consider the case when $G$ contains a subdivision of $K_4$, and later we consider the general case of non-outerplanar graphs. Recall that the bicircular matroid of $K_4$ is $U_{4,6}$, and that the operation of subdividing an edge $e$ in a graph $G$, translates to series extension of $e$ in $B(G)$. Lemma~\ref{lem:uniformextensions}, asserts that if $M$ is a series extension of at least three different elements of a uniform matroid (of rank at least two and positive corank), then $M$ contains a $C^{2,4}$-minor. So, we conclude that if $G$ contains a subdivision of at least three different edges of $K_4$, then $B(G)$ contains a $C^{2,4}$-minor. \begin{lemma}\label{lem:K4subdivision} Let $G$ be a graph such that $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid. If $G$ contains a subdivision of $K_4$, then $G$ equals a subdivision of at most two edges of $K_4$. In particular, this implies that $G\in\mathcal{F}_0$. \end{lemma} \begin{proof} By the arguments preceding this lemma, we know that any subdivision $G$ of at least three edges of $K_4$, satisfies that $B(G)$ has a $C^{2,4}$-minor. Thus, if $B(G)$ is an $ex_B(\mathcal{L})$-minor free matroid, and $G$ is a subdivision of $K_4$, then $G$ equals a subdivision of at most two edges of $K_4$. We proceed to show that if $G$ contains a subdivision of $K_4$, the $G$ is a subdivision of $K_4$. First, we observe that the bicircular matroids of the following graphs contain some minor in $ex_B(\mathcal{L})$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift = 0cm, scale=0.8 \node [vertex, label = 180:{$z$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 270:{$y$}] (2) at (0,0.9){}; \node [vertex, label = 0:{$x$}] (3) at (0,2){}; \node[] at (0,-1){$K_4'$}; \foreach \from/\to in {0/1,0/2, 0/3, 1/2, 1/3, 2/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (3); \end{scope} \begin{scope}[xshift=3cm, yshift = 0cm, scale=0.8 \node [vertex, label = 180:{$z$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 270:{$y$}] (2) at (0,0.9){}; \node [vertex, label = 0:{$x$}] (3) at (0,2){}; \node[] at (0,-1){$K_4''$}; \foreach \from/\to in {0/1,0/2, 0/3, 1/2, 1/3, 2/3} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \end{scope} \end{tikzpicture} \end{center} Consider the minor of $K_4''$ obtained by contracting the edge $xy$. This minor is isomorphic to $A_3$ (Figure~\ref{fig:bicircularEX}). Similarly, by contracting one of the $xz$-edges of $K_4'$ we also obtain $A_3$ as a minor of $K_4'$. Thus, $B(K_4')$ and $B(K_4'')$ contain $A^3$ as a minor. To conclude the proof, suppose that $G$ contains a subdivision $H$ of $K_4$, and $G\neq H$. So, there is an edge in $E(G)\setminus E(H)$, and by contracting $H$ to $K_4$, we find either $K_4'$ or $K_4''$ as a minor of $G$. This contradicts the fact that $B(G)$ is $ex_B(\mathcal{L})$-minor free, and so the claim follows. \end{proof} To conclude this first scenario, we consider the general case of non-outerplanar graphs. We proceed by doing some case checking: We list all possible minimal supergraphs of $K_{2,3}$ that do not belong to $\mathcal{F}_0$, and we see that the bicircular matroids of these graphs have an $ex_B(\mathcal{L})$-minor. This (almost) exhaustive case checking is the same technique used in the rest of this section. \begin{proposition}\label{prop:nonouterplanar} Let $G$ be a non-outerplanar graph. If $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid, then $G$ belongs to $\mathcal{F}_0$. \end{proposition} \begin{proof} Throughout this proof we assume that $G$ and $B(G)$ are as in the hypothesis. Also, if $G$ contains no subdivision of $K_{2,3}$ then it contains a subdivision of $K_4$, and the claim follows by Lemma~\ref{lem:K4subdivision}. So, we also assume that $G$ contains a subdivision of $K_{2,3}$. Since any subdivision of $K_{2,3}$ belongs to $\mathcal{F}_0$, we suppose that $G$ contains a subdivision $H$ of $K_{2,3}$ plus some edge not in $E(H)$. In other words, $G$ contains a subdivision of some supergraph of $K_{2,3}$. It is not hard to notice that the minimal supergraphs of $K_{2,3}$ are $K_4$, $K'_{2,3}$, $K''_{2,3}$, and the graphs $T_1$ and $T_2$ depicted below. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift=0cm, scale=0.9 \node [vertex, label = 180:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$T_1$}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3, 0/2, 1/3} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance = 1cm] (3); \end{scope} \begin{scope}[xshift=3cm, yshift = 0cm, scale=0.9 \node [vertex, label = 180:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$T_2$}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3, 0/2, 1/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend right] (3); \end{scope} \end{tikzpicture} \end{center} In particular, if $G$ contains a subdivision of $K_4$, then $G\in \mathcal{F}_0$ (Lemma~\ref{lem:K4subdivision}). Also, observe that by contracting the edge $xy$ of $T_2$, we recover $P_2$ as a minor of $T_2$. Thus $B(T_2)$ contains a $C^{2,4}$-minor. Moreover, it is not hard to notice that $B(T_1)\cong B(T_2)$ so, $B(T_1)$ contains a $C^{2,4}$-minor as well. So, if $G$ is $ex_B(\mathcal{L})$-free then $G$ contains no subdivision of $T_1$ nor of $T_2$. We proceed to consider the case when $G$ contains a subdivision of $K'_{2,3}$. Again, we show that if $G$ is obtained from $K'_{2,3}$ be adding one edge, then $B(G)$ contains an $ex_B(\mathcal{L})$-minor. Recall that $T_1$ has a bicircular matroid with an $ex_B(\mathcal{L})$-minor. Thus, if $G'$ is obtained by adding a loop to $x$ (or $y$) then $B(G')$ has an $ex_B(\mathcal{L})$-minor. By considering the following cases we show that $G'$ plus any loop yields a bicircular matroid with an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-2.5cm, yshift=0cm, scale=0.9 \node [vertex, label = 180:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3, 0/2} \draw [edge] (\from) to (\to); \path[-] (2) edge [min distance = 1cm] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=2.5cm, yshift = 0cm, scale=0.9 \node [vertex, label = 180:{$x$}] (0) at (-1,0){}; \node [vertex, label = 270:{$w$}] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3, 0/2} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance = 1cm, out = 40, in = -40] (1); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \end{tikzpicture} \end{center} The graph to the left is $S_1'$, so $B(S_1') = S^1 \in ex_B(\mathcal{L})$; and if we contract one of the $yw$-edges in the graph to the right, we recover $R_4''$. If $G$ is a spanning supergraph of $K'_{2,3}$ and does not contain any subgraph of the above, nor $K_4$, $T_1$ and $T_2$, then it contains one of the following subgraphs. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label = 0:{$w$}] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \foreach \from/\to in {1/0, 0/s, s/3, 3/2, 1/3, 2/0} \draw [edge] (\from) to (\to); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \foreach \from/\to in {1/0, 0/s, s/3, 3/2} \draw [edge] (\from) to (\to); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \path[-] (2) edge [bend right] (0); \path[-] (2) edge [bend left] (0); \end{scope} \begin{scope}[xshift=2.5cm, yshift = 0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 180:{$z$}] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex, label=180:{$v$}] (s) at (0,1){}; \foreach \from/\to in {1/0, 0/s, s/3, 0/2} \draw [edge] (\from) to (\to); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \path[-] (2) edge [bend right] (3); \path[-] (2) edge [bend left] (3); \end{scope} \begin{scope}[xshift=7.5cm, yshift = 0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \foreach \from/\to in { 3/2, 0/s, s/3, 0/2} \draw [edge] (\from) to (\to); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \end{scope} \end{tikzpicture} \end{center} We see that $R''_4$ is a minor of the left most graph above, by contracting one of $wy$-edges. The middle left graph above is $S_1$ so, its bicircular matroid belongs to $ex_B(\mathcal{L})$. We can see that $A_3$ is a minor of the middle right graph by contracting one of the $yz$-edges and the edge $yv$. Finally, notice that the rightmost graph is $K^\ast_{2,3}$. We already argued that if we add a loop to $K'_{2,3}$, then its bicircular matroid has an $ex_B(\mathcal{L})$-minor. Also, $T_2$ together with the previous four graphs show that if we add a non-loop edge to $K'_{2,3}$ we obtain either a copy of $K^\ast_{2,3}$, or a graph whose bicircular matroid has an $ex_B(\mathcal{L})$-minor. This implies that if $G$ contains a subdivision $H$ of $K'_{2,3}$, but no subdivision of $K^\ast_{2,3}$, then $H = G$ (otherwise, there is some edge in $G$ that is not in $H$, and with adequate contractions, we obtain one of the graphs above, which contradicts the fact that $B(G)$ is $ex_B(\mathcal{L})$-minor free). Recall that we distinguished some blue and red edges in $K'_{2,3}$. In order to conclude the proof, we must show that if $H$ is a subdivision of some black edges of $K'_{2,3}$, then $B(H)$ contains an $ex_B(\mathcal{L})$-minor. In other words, the bicircular matroids of either of the following graph contain an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift=-3.5cm, scale=0.9 \node [vertex, label = 180:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 180:{$z$}] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node [vertex] (s1) at (0,2){}; \foreach \from/\to in {2/s1, s1/3} \draw [edge] (\from) to (\to); \foreach \from/\to in {0/s, s/3} \draw [edge, red] (\from) to (\to); \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \end{scope} \begin{scope}[xshift=3cm, yshift=-3.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 180:{$z$}] (2) at (-1,2){}; \node [vertex, label = 0:{$y$}] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node [vertex] (s1) at (-1.3,1){}; \draw [edge] (2) to (3); \foreach \from/\to in {0/s, s/3} \draw [edge, red] (\from) to (\to); \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \end{scope} \end{tikzpicture} \end{center} Notice that if we contract one of the $xz$-edges in the graph to the left, we recover $T_1$ as a minor; on the graph to the right we find $T_2$ as a minor by contracting the $yz$-edge. We already argued that neither $B(T_1)$ nor $B(T_2)$ are $ex_B(\mathcal{L})$-minor free. Thus, if $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid, and $G$ is a graph that contains subdivision of $K'_{2,3}$ but not of $K^\ast_{2,3}$, then $G\in\mathcal{F}_0$. Suppose that $G$ contains a subdivision of $K^\ast_{2,3}$. Since $K^\ast_{2,3}$ is a supergraph of $K'_{2,3}$, then every subdivision of $K^\ast_{2,3}$ contains a subdivision of $K'_{2,3}$. So, by the arguments above, if $G$ is a proper supergraph of $K^\ast_{2,3}$, then $B(G)$ has an $ex_B(\mathcal{L})$-minor. Moreover, if $H$ is a subdivision of $K^\ast_{2,3}$, then $H$ is a subdivision of the blue and red edges of $K^\ast_{2,3}$. Therefore, the statement of this proposition is settled when $G$ contains a subdivision of $K_4$, of $K'_{2,3}$ or a subdivision of $K^\ast_{2,3}$. When $G$ contains a subdivision of $K''_{2,3}$ the proof follows analogous arguments to the ones above. Finally, if $G$ contains no subdivision of $K_4$, of $K'_{2,3}$, of $K''_{2,3}$ nor of $K^\ast_{2,3}$, then $G$ contains a subdivision of $T_1$, of $T_2$ or $G$ equals a subdivision of $K_{2,3}$. Since $B(G)$ is $ex_B(\mathcal{L})$-minor free, we conclude that $G$ is a subdivision of $K_{2,3}$, so $G\in \mathcal{F}_0$. All possible cases for non-outerplanar graphs have now been considered. \end{proof} \subsection*{\normalfont{\textsc{Subdivisions of $G_1$}}} We move on to the second case. In this case we consider $2$-connected graphs. We begin by the subcase when $G$ contains a subdivision of $G_1$. Even though this seems like an arbitrary assumption, the following lemma shows that this case settles a broad scenario. \begin{lemma}\label{lem:2connected} Let $G$ be a $2$-connected graph of minimum degree three. If $G$ contains a pair of non-adjacent vertices and $B(G)$ is $ex_B(\mathcal{L})$-minor free, then $G$ contains a subdivision of $G_1$. \end{lemma} \begin{proof} We may assume that $G$ has exactly four vertices. Indeed, suppose that $G$ is a $2$-connected graph, and let $x$ and $y$ be a pair of non-adjacent vertices. Since $G$ is $2$-connected, then there are a pair of disjoint $xy$-paths $P$ and $Q$ of length at least $2$. Now, consider the subgraph of $G$ induced by the vertices of $P$ and $Q$, and then contract $P$ and $Q$ to paths of length exactly $2$. Thus, with out loss of generality, we assume that $G$ is a graph on four vertices, and that $x$ and $y$ are a pair of non-adjacent vertices of $G$. The following illustrates all edge minimal $2$-connected graphs of minimum degree three, where $xy\not\in E$ (up to isomorphism). \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-5cm, yshift=0.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1$}}; \path[-] (3) edge (2); \path[-] (0) edge (1); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=0cm, yshift=0.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H_1$}}; \foreach \from/\to in {0/1, 1/3, 2/3, 2/0} \draw [edge] (\from) to (\to); \path[-] (0) edge [min distance=1cm, out=315, in=225] (0); \path[-] (1) edge [min distance=1cm, out=315, in=225] (1); \path[-] (2) edge [min distance=1cm] (2); \path[-] (3) edge [min distance=1cm] (3); \end{scope} \begin{scope}[xshift=5cm, yshift=0.5cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex, label=right:{$z$}] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H_2$}}; \foreach \from/\to in {0/1, 2/3, 2/0} \draw [edge] (\from) to (\to); \path[-] (0) edge [min distance=1cm, out=315, in=225] (0); \path[-] (2) edge [min distance=1cm] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=-7.5cm, yshift=-3cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex, label=right:{$z$}] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H_3$}}; \foreach \from/\to in {0/1, 1/3, 2/3, 2/0, 3/0} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance=1cm, out=315, in=225] (1); \path[-] (2) edge [min distance=1cm] (2); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=-3cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex, label=right:{$z$}] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H_4$}}; \foreach \from/\to in {0/1, 2/3, 2/0, 3/0} \draw [edge] (\from) to (\to); \path[-] (2) edge [min distance=1cm] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=2.5cm, yshift=-3cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex, label=right:{$z$}] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H_5$}}; \foreach \from/\to in {0/1, 2/0, 3/0} \draw [edge] (\from) to (\to); \path[-] (2) edge [bend right] (3); \path[-] (2) edge [bend left] (3); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=7.5cm, yshift=-3cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex, label=right:{$y$}] (1) at (1,0){}; \node [vertex, label=left:{$x$}] (2) at (-1,2){}; \node [vertex, label=right:{$z$}] (3) at (1,2){}; \node[] at (0,-0.7){\small{$H_6$}}; \foreach \from/\to in {0/1, 2/0} \draw [edge] (\from) to (\to); \path[-] (0) edge [min distance=1cm, out=315, in=225] (0); \path[-] (2) edge [bend right] (3); \path[-] (2) edge [bend left] (3); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \end{tikzpicture} \end{center} To conclude the proof, we show that for each $i\in\{1,\dots, 6\}$, the bicircular matroid $B(H_i)$ has an $ex_B(\mathcal{L})$-minor. For instance, by removing any loop of $H_1$, we obtain a subdivision of $W_3$ (Figure~\ref{fig:bicircularEX}), thus $B(H_1)$ contains a $\mathcal{W}^3$-minor. Similarly, by contracting one of the $yz$-edges of $H_2$, we recover $W_3$ as a minor of $H_2$. Actually, by contracting one $yz$-edge in either of $H_3$, $H_4$ or $H_6$, we find $A_3'$ as a minor of these graphs. Finally, by contracting one $yz$-edge of $H_5$ we recover $A_3$. Therefore, if $B(G)$ is $ex_B(\mathcal{L})$-minor free, then $G$ contains a subdivision of $G_1$. \end{proof} At this point it is convenient to have a clear image of the structure of the graphs $G_1(r,d,b)$ (see, for instance, Figure~\ref{fig:H1}). With the same procedure as in previous occasions, we begin by studying which supergraphs of $G_1$ have a bicircular matroid with an $ex_B(\mathcal{L})$-minor. In this case, these graphs are the following ones. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = left:{$x$}] (2) at (-1,2){}; \node [vertex, label = right:{$y$}] (3) at (1,2){}; \node[] at (0,-1){$G_1'$}; \foreach \from/\to in {0/1, 2/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \path[-] (2) edge [bend left] (3); \end{scope} \begin{scope}[xshift=3cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = left:{$x$}] (2) at (-1,2){}; \node [vertex, label = right:{$y$}] (3) at (1,2){}; \node[] at (0,-1){$G_1''$}; \foreach \from/\to in {0/1, 2/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \path[-] (3) edge [min distance=1cm] (3); \end{scope} \end{tikzpicture} \end{center} By contracting one $xy$-edge in $G_1'$ or in $G_1''$ we see that $A_3$ is a minor of these graphs, thus $B(G_1')$ and $B(G_1'')$ have an $A^3$-minor. This implies that if $G$ is a supergraph of $G_1$, and $B(G)$ is a connected $ex_B(\mathcal{L})$-minor free matroid, then $G$ equals $G_1(r,d,b)$ for some non-negative integers $r$, $d$ and $b$. Furthermore, if $G$ contains a subdivision $H$ of one of the previous graphs, then $G = H$; otherwise, we could find a subdivision of either $G'_1$ or of $G''_1$ in $G$. \begin{lemma}\label{lem:G1subdivision} Let $G$ be a graph such that $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid. If $G$ contains a subdivision of $G_1$, then $G\in \mathcal{F}_0\cup \mathcal{F}_1$. \end{lemma} \begin{proof} Let $G$ be as in the hypothesis. Above this statement, we argued that if $G$ contains a subdivision of $G_1$, then $G$ is a subdivision of a graph $G_1(r,d,b)$ for some non-negative integers $r$, $d$ and $b$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=6cm, yshift=0cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-0.7){\small{$G_1(r,d,b)$}}; \foreach \from/\to in {3/2, 0/1} \draw [edge] (\from) to (\to); \draw [edge, dashed] (0) to (3); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, dashed, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, dashed, blue] (1) to (3); \end{scope} \end{tikzpicture} \end{center} To begin with, recall that $G_1(0,0,0) = G_1$ and $B(G_1)\cong U_{4,6}$. So, if $B(G)$ is an $ex_B(\mathcal{L})$-minor free matroid, then $G$ is a subdivision of at most two edges of $G_1(r,d,b)$; otherwise, $B(G)$ contains a $C^{2,4}$-minor (Lemma~\ref{lem:uniformextensions}). We consider the minimal outerplanar subdivision of two edges of the graphs $G_1(r,d,b)$ that are not subdivisions of one red and one blue edge. To this end, notice that subdividing any two parallel edges or any diagonal edge, creates a subdivision of $K_{2,3}$, i.e., a non-outerplanar subdivision. Thus, any non-outerplanar subdivision of at most two edges of $G_1$ belongs to $\mathcal{F}_1$. (This settles the case when $r = d = b = 0$). Consider the case when $r = b = 0$ and $d\ge 1$. In this case, one (not black) color class corresponds to the edges on the top left side of the diagonal, and the other one to the bottom right edges. Subdividing a diagonal edge, creates a supergraph of $K_{2,3}$, so this is taken care of by Proposition~\ref{prop:nonouterplanar}; this also happens if we subdivide a pair of parallel edges. Now we show that subdividing two non parallel edges on the same side of the diagonal yields a graph whose bicircular matroid has an $ex_B(\mathcal{L})$-minor. Up to symmetry, the following graph is the unique possible minimal case. To see that its bicircular matroid has an $ex_B(\mathcal{L})$-minor, notice that this graph contains $P_2$ as a minor: Remove the edge $yz$, and contract the edges $zw$ and $zx$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift=4cm, scale=0.9 \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex, label = right:{$w$}] (1) at (1,0){}; \node [vertex, label = left:{$y$}] (2) at (-1,2){}; \node [vertex, label = right:{$z$}] (3) at (1,2){}; \node [vertex] (s1) at (0,0){}; \node [vertex] (s2) at (1.33,1){}; \draw [edge] (0) to (3); \draw [edge, red] (2) to (3); \foreach \from/\to in {0/s1, s1/1} \draw [edge, blue] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right=10] (s2); \path[-, blue] (s2) edge [bend right=10] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \end{tikzpicture} \end{center} The second case we consider is when $r \ge 1$ and $b = 0$. Again, the subcases are when $d = 0$ and when $d\ge 1$. Suppose that $d = 0$ so, the red class consists of the $r+2$ parallel edges, and the remaining edges are blue. By the same arguments as before, we do not consider subdivisions of a pair of parallel edges (this creates a supergraph of $K_{2,3}$). The minimal subdivisions of two edges of the same color class, but not of parallel edges of $G$ are the following ones. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm, yshift=0cm, scale=0.9 \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex, label = right:{$w$}] (1) at (1,0){}; \node [vertex, label = left:{$y$}] (2) at (-1,2){}; \node [vertex, label = right:{$z$}] (3) at (1,2){}; \node [vertex] (s1) at (0,0){}; \node [vertex] (s2) at (1.33,1){}; \draw [edge, red] (2) to (0); \foreach \from/\to in {0/s1, s1/1, 2/3} \draw [edge, blue] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right=10] (s2); \path[-, blue] (s2) edge [bend right=10] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=3cm, yshift=0cm, scale=0.9 \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex, label = right:{$w$}] (1) at (1,0){}; \node [vertex, label = left:{$y$}] (2) at (-1,2){}; \node [vertex, label = right:{$z$}] (3) at (1,2){}; \node [vertex] (s1) at (0,0){}; \node [vertex] (s2) at (0,2){}; \draw [edge, red] (2) to (0); \foreach \from/\to in {0/s1, s1/1, 3/s2, s2/2} \draw [edge, blue ] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \end{tikzpicture} \end{center} By mapping the $yz$-edge (resp.\ the $zw$-path of length $2$) on the left to the rightmost $zw$-edge (resp.\ the $yz$-path of lentgh $2$) on the right, we see that the bicircular matroids of these graphs are isomorphic. We see that $R_4$ is a minor of the graph on the left after contracting $zw$ and either of the $xy$-edges. This implies that $R^4$ is a minor of $B(G)$. Thus, if $G$ is a subdivision of $G_1(r,0,0)$, then $G$ is a subdivision of at most one edge of each color class. To conclude this case, we consider the subcase when $G$ is a subdivision of $G_1(r,d,0)$ with $d\ge 1$. In this case, if $G$ is a subdivision of two red or two blue edges, then $G$ contains a subdivision of either two parallel edges, or of one of the graphs above. Thus, we only consider the case when $G$ is a subdivision of some black non-diagonal edge. The following is the unique such subdivision. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[scale=0.9 \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex, label = right:{$w$}] (1) at (1,0){}; \node [vertex, label = left:{$y$}] (2) at (-1,2){}; \node [vertex, label = right:{$z$}] (3) at (1,2){}; \node [vertex] (s2) at (0,2){}; \draw [edge, red] (2) to (0); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \foreach \from/\to in {3/s2, s2/2, 0/3} \draw [edge] (\from) to (\to); \draw [edge, blue] (1) to (0); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \end{scope} \end{tikzpicture} \end{center} In this case, by contracting one of the $xy$-edges, and removing one $zw$-edge, we obtain $R_4''$ as a minor of the graph above. Therefore, if $G$ is an outerplanar subdivision of either $G_1(r,d,0)$ for some $d\ge 1$, then $G\in \mathcal{F}_1$. By symmetry, and together with the previous subcase (when $d = 0$), the claim holds when $G$ is an outerplanar subdivision of $G_1(r,d,0)$ or of $G_1(0,d,b)$ for some non-negative integer $d$. The final case is when $r$ and $b$ are positive integers. In this case, the definitions of the red and blue edge do not depend on $d$; each (not black) color class corresponds to a class of parallel edges. By the same argument as above, we do not consider the cases when $G$ is a subdivision of a pair of parallel edges, nor when is a subdivision of some diagonal edges. Thus, it remains to show that if $G$ is a subdivision of either the top or the bottom edge, then has an $ex_B(\mathcal{L})$-minor. Such a minimal subdivision, looks as follows, and in this case we see that it contains $D_4$ (Figure~\ref{fig:bicircularEX}) as a minor by contracting the $xw$-edge. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[scale = 0.9] \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex, label = right:{$w$}] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s2) at (0,2){}; \foreach \from/\to in {0/1, 3/s2, s2/2} \draw [edge] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, red] (0) to (2); \path[-, blue] (1) edge [bend right] (3); \path[-, blue] (1) edge [bend left] (3); \draw [edge, blue] (1) to (3); \end{scope} \end{tikzpicture} \end{center} After this exhaustive case checking, we conclude that if $G$ is an outerplanar graph that contains a subdivision of $G_1$, then $G$ is a subdivision of at most one red edge and at most one blue edge of $G_1(r,d,b)$ for some non-negative integers $r$, $d$ and $b$. Therefore, $G\in\mathcal{F}_1$ (recall that if $G$ is not an outerplanar graph, then Proposition~\ref{prop:nonouterplanar} asserts that $G\in\mathcal{F}_0$). \end{proof} \subsection*{\normalfont{\textsc{$2$-connected graphs}}} The aim of this case is to settle Proposition~\ref{prop:F0-F4} for $2$-connected graphs. Notice that if $G$ is a $2$-connected graph, then $G$ is a subdivision of some $2$-connected graph $H$ of minimum degree $3$ (if $G$ has minimum degree $3$ then $G = H$). By Lemmas~\ref{lem:2connected} and~\ref{lem:G1subdivision}, if $H$ has a pair of non-adjacent vertices, then $H$ is a spanning supergraph of $G_1$ so, $|V(H)| = 4$. On the contrary, if every pair of vertices of $H$ are adjacent, then $H$ contains $K_4$ as a subgraph. Hence, by Lemma~\ref{lem:K4subdivision}, we conclude that $H = K_4$. In both cases, we conclude that if $H$ has at least four vertices, then it has exactly four vertices. Thus, we conclude the following statement. \begin{proposition}\label{prop:boundedsubdivision} Let $G$ be a $2$-connected graph. If $B(G)$ is an $ex_B(\mathcal{L})$-minor free matroid, then $G$ is a subdivision of a graph on at most $4$ vertices. Moreover, if $G$ is a subdivision of a graph on $4$ vertices of degree at least three, then $G\in \mathcal{F}_0\cup \mathcal{F}_1$. \end{proposition} \begin{proof} By the arguments in the paragraph above, we conclude that $G$ is a subdivision of a graph on at most $4$ vertices. Moreover, with the same arguments we also notice that if $G$ is a subdivision of a graph on $4$ vertices of minimum degree $3$, then $G$ contains a subdivision of $K_4$ or of $G_1$. Thus, the claim follows by Lemmas~\ref{lem:K4subdivision} and~\ref{lem:G1subdivision}. \end{proof} Now we consider subdivisions of graphs on three vertices. Recall that the graph $2K_3$ is obtained by duplicating every edge of the triangle, and its bicircular matroid is the uniform matroid $U_{3,6}$. Notice that adding a loop to $2K_3$ creates a copy of $A_3$ as a subgraph. Also, adding one more parallel edge to each parallel class yields the graph $3K_3$. The bicircular matroids of $3K_3$ and of $A_3$ belong to $ex_B(\mathcal{L})$. Thus, if $G$ contains a subdivision of $2K_3$, and $B(G)$ is a connected $ex_B(\mathcal{L})$-minor free matroid, then $G$ is a subdivision of $2K_3(r,b)$ for some non-negative integers $b$ and $r$. We use these observations to prove the following lemma. \begin{lemma}\label{lem:2K3subdivision} Let $G$ be an outerplanar graph such that $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid. If $G$ contains a subdivision of $2K_3$, then $G\in \mathcal{F}_2$. \end{lemma} \begin{proof} Before this lemma, we argued that if $G$ contains a subdivision $H$ of $2K_3$, then $G = H$ and $H = 2K_3(r,b)$ for some non-negative integers $r$ and $b$. Recall that we distinguished some colored edges in $2K_3(r,b)$, we proceed to show that $G$ must be a subdivision of at most one red and at most one blue edge of $2K_3(r,b)$. As we have done before, we highlight that subdividing a pair of parallel edges of $2K_3$ creates a subdivision of $K_{2,3}$. Since we are considering outerplanar graphs, we do not consider such subdivisions. First, consider the case when $r = b = 0$, i.e., when $G$ is a subdivision of $2K_3$, so $B(G)$ is a series extension of $U_{3,6}$. By Lemma~\ref{lem:uniformextensions}, we know that if $G$ contains a subdivision of at least three different edges of $2K_3$, then $B(G)$ has a $C^{2,4}$-minor. Thus, $G$ is a subdivision of at most two non-parallel edges of $2K_3$, and so, $G\in\mathcal{F}_2$. Suppose now that $r\ge 1$ and $b = 0$. To show that $G$ is a subdivision of at most one red edge and at most one blue edge, we consider the minimal subdivision of $2K_3(1,0)$ that is not such a subdivision (nor a subdivision of two parallel edges). \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=5cm, yshift=0cm, scale=0.9 \node [vertex, label=left:{$x$}] (0) at (-1,0){}; \node [vertex, label=right:{$z$}] (1) at (1,0){}; \node [vertex, , label=left:{$y$}] (2) at (0,2){}; \node [vertex] (a) at (0.82,1.17){}; \node [vertex] (b) at (0,-0.32){}; \foreach \from/\to in {0/2} \draw [edge, red] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \path[-, blue] (1) edge [bend right] (0); \path[-, blue] (1) edge [bend left] (0); \end{scope} \end{tikzpicture} \end{center} By removing the $xz$-edge and contracting one $xy$-edge, we see that this graph contains $R_4''$ as a minor. Therefore, if $G$ is an outerplanar subdivision of $2K_3(1,0)$, then it is a subdivision of at most one red and at most one blue edge of $2K_3(r,0)$. By symmetric arguments, the claim also follows when $r = 0$ and $b\ge 1$. So, we conclude the proof by considering the case when $r$ and $b$ are positive integers. In this case, the red edges correspond to the $(r+2)$-parallel edges, and the blue edges to the $(b+2)$-parallel edges. Since we are considering outerplanar subdivisions, we show that the bicircular matroid of the following graph has an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[scale=0.9 \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex, label = right:{$z$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node [vertex] (a) at (0,0){}; \foreach \from/\to in {1/a, a/0} \draw [edge] (\from) to (\to); \draw [edge, red] (0) to (2); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \draw [edge, blue] (1) to (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \path[-] (1) edge [bend left] (0); \end{scope} \end{tikzpicture} \end{center} In this case, by removing the $xz$-edge, we see that $D_4$ is a subgraph of the graph above. So, its bicircular matroid has a $D^4$-minor. Hence, if $G$ is a subdivision of $2K_3(r,b)$ for some positive integers $r$ and $b$, then $G$ is a subdivision of at most one blue and at most one red edge. After considering all possible cases, we conclude that the statement of this proposition holds. \end{proof} To conclude the case checking for outerplanar subdivisions of graphs on three vertices, we recall the definition of the graphs $K_3(r,j,l)$. These graphs are obtained from a triangle by adding $j$ parallel copies to some edge; adding $k$ parallel copies to another; and $j$ loops incident in some vertex that is not incident with both classes of parallel edges. We depict them as follows, together with the edges colorings used to define the family $\mathcal{F}_3$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7cm, yshift=0cm, scale=0.8] \node [vertex] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (-3,0){$K_3(r,j,l)$}; \draw [edge] (0) to (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, dashed] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \path[-, dashed] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift=0cm, yshift=0cm, scale=0.8] \node [vertex] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (-3,0){$K_3(1,1,0)$}; \draw [edge, purple] (0) to (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (2); \end{scope} \begin{scope}[xshift=7cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (-3,0){$K_3(1,0,1)$}; \foreach \from/\to in {0/1, 1/2} \draw [edge, blue] (\from) to (\to); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \end{tikzpicture} \end{center} \begin{lemma}\label{lem:3vertexsubdivision} Let $G$ be a $2$-connected outerplanar graph such that $B(G)$ is an $ex_B(\mathcal{L})$-minor free matroid. If $G$ is a subdivision of a graph on three vertices of minimum degree three, then $G\in\mathcal{F}_2\cup \mathcal{F}_3$. \end{lemma} \begin{proof} Let $H$ be the graph obtained from $G$ by contracting all subdivided edges. By the hypothesis of this lemma, we assume that $H$ has minimum degree three and $|V(H)| = 3$. If $H$ contains $2K_3$ as a subgraph, then $G$ contains a subdivision of $2K_3$ and the claim follows by Lemma~\ref{lem:2K3subdivision}. Now, we show that if $H$ does not contain a copy of $2K_3$, then $H = K_3(r,j,l)$ for some non-negative integers $r$, $j$ and $l$. Notice that since $H$ is $2$-connected (because is obtained from contracting subdivided edges of a $2$-connected graph), then $H$ is a supergraph of $K_3$. So, if every vertex of $H$ has a loop, then $H$ contains $W_3$ as a subgraph, and so $B(G)$ has a $\mathcal{W}^3$-minor. Thus, $H$ has at least one loopless vertex $v$. Since $d_H(v) \ge 3$, then $v$ is incident with a pair of parallel edges. Let $u$ be the other vertex incident in this same pair of parallel edges, and let $w$ be the remaining vertex. If both, $u$ and $w$ are looped vertices, then $H$ contains $A_3'$ as a subgraph, which implies that $B(G)$ has an $A^3$-minor. Thus, $H$ has at most one looped vertex. Finally, if this vertex is also incident with two classes of parallel edges, $H$ contains a copy of $A_3$, which also implies that $B(G)$ has an $A^3$-minor. Since we are assuming that $B(G)$ is $ex_B(\mathcal{L})$-free, we conclude that $H$ has at most one looped vertex, and this vertex is not incident with two classes of parallel edges. Therefore, $H = K_3(r,j,l)$ for some non-negative integers $r$, $j$ and $l$, and so, $G$ is a subdivision of $K_3(r,j,l)$. Furthermore, since $H$ has minimum degree three, then $r\ge 1$ and $j+l\ge 1$. Recall that the bicircular matroid of $K_3(1,1,0)$ and of $K_3(1,0,1)$ is the uniform matroid $U_{3,5}$. Hence, by Lemma~\ref{lem:uniformextensions}, we know that any subdivision of at least three edges of $K_3(1,1,0)$ or of $K_3(1,0,1)$ has a bicircular matroid with a $C^{2,4}$-minor. By the edge symmetries of these graphs, any subdivision of at least three edges of $K_3(r,j,l)$ (where $r\ge 1$ and $j+l\ge 1$) has a bicircular matroid with a $C^{2,4}$-minor. Let $G$ be a subdivision of at most two non-loop edges% \footnote{Any subdivision of some loop of $K_3(r,j,l)$ yields a graph with a cut vertex.} of $K_3(r,j,l)$. We begin by considering all cases when $l\le 1$ (see the top two rows of Figure~\ref{fig:H3}). In particular, if $r \ge 1$ and $j+l = 1$, then any subdivision of any pair of non-parallel edges of $K_3(r,j,l)$ belongs to $\mathcal{F}_3$ (this cases correspond to subdivisions of $K_3(1,1,0)$, of $K_3(r,1,0)$, of $K_3(1,0,1)$ and of $K_3(r,0,1)$). Also, if $r = 1 = l$, then any subdivision of a pair of non-parallel edges of $K_3(1,j,1)$ belongs to $\mathcal{F}_3$, so the claim follows for subdivisions of $K_3(1,1,0)$, of $K_3(r,1,0)$, of $K_3(1,0,1)$, of $K_3(r,0,1)$ and of $K_3(1,j,1)$. The remaining subcases (of the case $l\le 1$) are subdivisions of $K_3(r,j,l)$ where $r,j\ge 2$ (right most graphs in the top two columns of Figure~\ref{fig:H3}). In these cases, we must show that $G$ is a subdivision of at most one edge in each parallel classes. Since we are working with outerplanar graphs, we assume that it is not a subdivision of edges in the same parallel class. Thus, it suffices to show that $G$ does not contain a subdivision of the bottom edge of $K_3(r,j,l)$. Again, we consider the minimal such subdivisions, and see that their bicircular matroids have an $ex_B(\mathcal{L})$-minor. We depict these cases below, and clearly, their bicircular matroid is $D^4$ (Figure~\ref{fig:bicircularEX}) which belongs to $ex_B(\mathcal{L})$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift = -3cm, scale=0.9]% \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node [vertex] (s') at (0,0){}; \foreach \from/\to in {0/s', s'/1} \draw [edge] (\from) to (\to); \draw [edge, red] (0) to (2); \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \foreach \from/\to in {1/2, 2/1} \path[-, blue] (\from) edge [bend left] (\to); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \end{scope} \begin{scope}[xshift = 3cm, scale=0.9]% \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node [vertex] (s') at (0,0){}; \foreach \from/\to in {0/s', s'/1} \draw [edge] (\from) to (\to); \draw [edge, red] (0) to (2); \draw [edge, blue] (1) to (2); \foreach \from/\to in {0/2, 2/0} \path[-, red] (\from) edge [bend left] (\to); \foreach \from/\to in {1/2, 2/1} \path[-, blue] (\from) edge [bend left] (\to); \end{scope} \end{tikzpicture} \end{center} In the paragraph above, we settled all cases when $l\le 1$, now we assume that $l\ge 2$ (see the bottom row of Figure~\ref{fig:H3}). We first observe that $G$ is a subdivision of at most one non-loop edge of $K_3(r,j,l)$. Since we are considering only outerplanar subdivisions, then we do not consider subdivisions of parallel edges. Thus, it suffices to show that the bicircular matroids of the following two graphs have an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift = -3cm, scale=0.9]% \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 0:{$y$}] (2) at (0,2){}; \node [vertex] (s) at (0.5,1){}; \node [vertex] (s') at (0,0){}; \foreach \from/\to in {0/s', s'/1, 1/s, s/2} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \path[-] (1) edge [min distance=1cm, in = -45, out = -135] (1); \end{scope} \begin{scope}[xshift = 3cm, scale=0.9]% \node [vertex, label = left:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 0:{$y$}] (2) at (0,2){}; \node [vertex] (s) at (0.5,1){}; \node [vertex] (s') at (-0.8,1.2){}; \foreach \from/\to in {0/1, 1/s, s/2} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \path[-] (1) edge [min distance=1cm, in = -45, out = -135] (1); \end{scope} \end{tikzpicture} \end{center} Contracting one $xy$-edge in either of these graphs, shows that their bicircular matroids have an $R^4$-minor. Since $B(G)$ is an $ex_B(\mathcal{L})$-minor free matroid, then $G$ is a subdivision of at most one non-loop edge of $K_3(r,j,l)$ (recall that we are assuming that $r\ge 1$ and $l\ge 2$). In particular, since any subdivision of at most one edge of $K_3(1,0,l)$ belongs to $\mathcal{F}_3$ (see left most graph in the bottom row of Figure~\ref{fig:H3}), then the claim is settled for $l\ge 2$, $r = 1$ and $j = 0$. To conclude the proof we consider the case when $G$ is a subdivision of $K_3(r,j,l)$, where $r,l\ge 2$. To show that $G\in \mathcal{F}_3$, we argue that $G$ is a subdivision of at most one red edge, i.e., an edge that is not incident with a loop. Again, we assume that $G$ is not a subdivision of loop, nor of a pair of parallel edges. Hence, it suffices to show that the bicircular matroid of the following graph has an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[scale=0.9]% \node [vertex, label=left:{$x$}] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex, label = 0:{$y$}] (2) at (0,2){}; \node [vertex] (s) at (0.5,1){}; \foreach \from/\to in {0/1, 1/s, s/2} \draw [edge] (\from) to (\to); \draw [edge, red] (0) to (2); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-] (1) edge [min distance=1cm, in = 45, out = -45] (1); \path[-] (1) edge [min distance=1cm, in = -45, out = -135] (1); \end{scope} \end{tikzpicture} \end{center} Contract one of the $xy$-edges of the graph above. This minor is a triangle with two classes of parallel loops, i.e., this minor equals $R_3$. Thus, the bicircular matroid of the graph above has an $R^3$-minor. Which implies that if $G$ is an outerplanar subdivision of $K_3(r,j,l)$ where $r,l\ge 2$, then $G$ is a subdivision of at most one red edge. Therefore, $G\in\mathcal{F}_3$. This completes all possible cases, so the claim follows. \end{proof} Having proved all these technical lemmas, we are now ready to show that Proposition~\ref{prop:F0-F4} holds for $2$-connected graphs. \begin{proposition}\label{prop:2connected} Let $G$ be a $2$-connected graph. If $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid, then $G$ belongs to $\mathcal{F}_0\cup \mathcal{F}_1\cup \mathcal{F}_2 \cup \mathcal{F}_3$. \end{proposition} \begin{proof} When $G$ is not an outerplanar graph, the claim follows by Proposition~\ref{prop:nonouterplanar}. Also, Proposition~\ref{prop:boundedsubdivision} asserts that if a $2$-connected graph $G$ satisfies that $B(G)$ is an $ex_B(\mathcal{L})$-minor free matroid, then $G$ is a subdivision of a graph of at most four vertices. Moreover, the same proposition settles the case when $G$ is a subdivision of a graph on four vertices of minimum degree three. Similarly, Lemma~\ref{lem:3vertexsubdivision} shows that if $G$ is a subdivision of a graph on $3$ vertices of minimum degree three, then $G\in \mathcal{F}_2\cup \mathcal{F}_3$. To conclude this case checking we consider the case when $G$ is an outerplanar subdivision of a graph on at most two vertices. This case follows almost trivially. A graph $H$ on two vertices $x$ and $y$ consists of a class of parallel non-loop edges, some loops incident with $x$ or $y$. Subdividing any loop yields a graph with a cut vertex. Also, subdividing at least three different parallel edges creates a subdivision of $K_{2,3}$. Thus, an outerplanar $2$-connected subdivision of a graph on $2$ vertices is a subdivision of at most two non parallel edges of $H$. If each vertex of $H$ has at most one loop, then any such subdivision belongs to $\mathcal{F}_3$. The remaining cases are when exactly one vertex has at least two loops, and when both vertices have two loops. In the latter, we must verify that there are no subdivided edges, and in the former we must verify that there is at most one subdivided edge. This follows because the bicircular matroids of the following graphs are either $R^3$ or $R^4$ (see Figure~\ref{fig:bicircularEX}), which both belong to $ex_B(\mathcal{L})$. \begin{center} \begin{tikzpicture}[scale=0.7] \begin{scope}[xshift = -6cm] \node [vertex, label =left:{$x$}] (n) at (-1,0){}; \node [vertex, label = right:{$y$}] (m) at (1,0){}; \node [vertex] at (0,0.325){}; \node [vertex] at (0,-0.325){}; \path[-] (n) edge [bend right] (m); \path[-] (n) edge [bend left] (m); \path[-] (n) edge [min distance=1cm] (n); \path[-] (m) edge [min distance=1cm] (m); \path[-] (m) edge [min distance=1cm, out = 225, in = 315] (m); \end{scope} \begin{scope}[xshift = 0cm] \node [vertex, label =left:{$x$}] (n) at (-1,0){}; \node [vertex, label = right:{$y$}] (m) at (1,0){}; \node [vertex] at (0,0.325){}; \node [vertex] at (0,-0.325){}; \path[-] (n) edge [bend right] (m); \path[-] (n) edge [bend left] (m); \draw[edge] (n) to (m); \path[-] (m) edge [min distance=1cm] (m); \path[-] (m) edge [min distance=1cm, out = 225, in = 315] (m); \end{scope} \begin{scope}[xshift = 6cm] \node [vertex, label =left:{$x$}] (n) at (-1,0){}; \node [vertex, label = right:{$y$}] (m) at (1,0){}; \node [vertex] at (0,0.325){}; \path[-] (n) edge [bend right] (m); \path[-] (n) edge [bend left] (m); \path[-] (n) edge [min distance=1cm] (n); \path[-] (m) edge [min distance=1cm] (m); \path[-] (m) edge [min distance=1cm, out = 225, in = 315] (m); \path[-] (n) edge [min distance=1cm, out = 225, in = 315] (n); \end{scope} \end{tikzpicture} \end{center} The final case is when $G$ is a $2$-connected subdivision of a graph on one vertex. In this case, $G$ is a cycle with at most one looped vertex, and such a graph belongs to $\mathcal{F}_3$. The claim now follows. \end{proof} \subsection*{\normalfont{\textsc{Outerplanar graphs with cut vertices}}} Propositions~\ref{prop:nonouterplanar} and~\ref{prop:2connected} settle Proposition~\ref{prop:F0-F4} for non-outerplanar graphs and for $2$-connected graphs. We conclude by considering the complement case. In particular, we consider graphs that do not contain subdivisions of $K_4$ nor of $K_{2,3}$. Also, in the paragraph before Lemma~\ref{lem:2K3subdivision}, we argued that if $G$ contains a subdivision $H$ of $2K_3$ and $B(G)$ is $ex_B(\mathcal{L})$-minor free, then $G = H$. Which implies that $G$ is a $2$-connected graph. With analogous arguments, we conclude that if $G$ contains a subdivision of $G_1$ then $G$ is a $2$-connected graph. These observations, together with Lemma~\ref{lem:2connected} imply the following statement. \begin{observation}\label{obs:finalcase} Let $G$ be an outerplanar graph such that $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid. If $G$ has a cut vertex and $EB$ is an end block of $G$, then one of the following holds: \begin{enumerate} \item $EB$ is a cycle with possible loops on the corresponding cut vertex, \item $EB$ is a subdivision of a graph on $2$ vertices of minimum degree $3$, or \item $EB$ is a subdivision of a graph on three vertices but contains no subdivision of $2K_3$. \end{enumerate} \end{observation} Recall that, by Proposition~\ref{prop:blockpath}, if the bicircular matroid of graph $G$ is $C^{2,4}$-minor free, then the block tree of $G$ is a path, and every middle block contains exactly two vertices. By definition of $\mathcal{F}_4$, such a graph $G$ belongs to $\mathcal{F}_4$ if the end blocks of $G$ are subgraphs of a subdivision of some red edge of the following graphs, where the cut vertex is corresponding cut vertex is $x$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift=0cm, scale=0.8] \node [vertex] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(r,j,l)$}}; \draw [edge] (0) to (1); \draw [edge, red, dashed] (0) to (2); \draw [edge, dashed] (2) to (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \path[-, dashed] (1) edge [min distance=1cm, out = 45, in = 315] (1); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=0cm, scale=0.8] \node [vertex] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,1,l)$}}; \draw [edge, red] (0) to (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \path[-, dashed] (1) edge [min distance=1cm, out = 45, in = 315] (1); \end{scope} \begin{scope}[xshift=2.5cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){\small{$K_3(1,0,l)$}}; \foreach \from/\to in {0/1, 1/2} \draw [edge, red] (\from) to (\to); \path[-, dashed] (1) edge [min distance=1cm, out = 45, in = 315] (1); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \end{scope} \begin{scope}[xshift=7.5cm, yshift=0cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex, label = 0:{$x$}] (2) at (1,0){}; \node[] at (0,-1){\small{$mK_2''$}}; \draw [edge, red, dashed] (0) to (2); \path[-, red] (0) edge [bend left] (2); \path[-, red] (0) edge [bend right] (2); \path[-] (0) edge [min distance=1cm] (0); \path[-, dashed] (2) edge [min distance=1cm] (2); \end{scope} \end{tikzpicture} \end{center} \begin{proposition}\label{prop:excludedcase} Let $G$ be an outerplanar graph with some cut vertex. If $B(G)$ is an $ex_B(\mathcal{L})$-minor free connected matroid, then $G\in\mathcal{F}_4$. \end{proposition} \begin{proof} By the arguments in this subsection, it suffices to show the end blocks of $G$ are a subgraph of some subdivision of at most one red edge of either of $K_3(r,j,l)$, $K_3(1,1,l)$, $K_3(1,0,l)$ or $mK_2''$ depicted above. We divide this proof in the cases laid out by Observation~\ref{obs:finalcase}. In particular, when both end blocks satisfy the first statement of Observation~\ref{obs:finalcase}, then the claim follows immediately. Also, since $B(G)$ is a connected matroid, no end block of $G$ consists of exactly one edge. This implies that each end block can be contracted either to a pair of parallel edges, or to a leaf with a loop on the end vertex. We use this simple observation throughout this proof. Also, with out loss of generality we suppose that there are no loops incident with the cut vertex $x$ (any minor of $G$ that does not contain the loops on $x$, is also a minor of $G$). Suppose that an end block $EB$ is a subdivision of a graph on two vertices of minimum degree three. Denote by $x$ the corresponding cut vertex and by $y$ the other vertex in $EB$ of degree at least $3$. If $EB$ is an empty subdivision, i.e., $EB$ is a block on two vertices, then there is nothing to prove. Now we show that if $EB$ contains at least one subdivided edge, then $y$ has at most one loop and $EB$ has at most one subdivision class; in other words, $EB$ is a subdivision of at most one red edge of some $mK_2''$. First suppose that there are at least two loops incident with $y$. Since $x$ is a cut vertex and $B(G)$ is a connected matroid, then $G$ must contain one of the graphs as a minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm]% \node [vertex, label = 180:{$y$}] (n) at (-2,0){}; \node [vertex, label=90:{$x$}] (m) at (0,0){}; \node [vertex] (m') at (1,0){}; \node [vertex] at (-1,0.325){}; \foreach \from/\to in {n/m, m/n, m/m', m'/m} \path[-] (\from) edge [bend right] (\to); \path[-] (n) edge [min distance=1cm] (n); \path[-] (n) edge [min distance=1cm, out = 225, in = 315] (n); \end{scope} \begin{scope}[xshift=3cm] \node [vertex, label = 180:{$y$}] (n) at (-2,0){}; \node [vertex, label=90:{$x$}] (m) at (0,0){}; \node [vertex] (m') at (1,0){}; \node [vertex] at (-1,0.325){}; \path[-] (n) edge [bend right] (m); \path[-] (n) edge [bend left] (m); \draw[edge] (m) to (m'); \path[-] (n) edge [min distance=1cm] (n); \path[-] (m') edge [min distance=1cm] (m'); \path[-] (n) edge [min distance=1cm, out = 225, in = 315] (n); \end{scope} \end{tikzpicture} \end{center} Since the graph to the left is $R_4$ and the graph to the right is $R_4'$, we conclude that there is at most one loop incident with $y$. Finally, we show that there is at most one subdivision class. To this end, notice that by contracting the edge $xy$ in the following graphs, we obtain $P_2$ (on the left) and $P_3$ (on the right) as a minor of $G$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3cm]% \node [vertex, label = 180:{$y$}] (n) at (-2,0){}; \node [vertex, label=90:{$x$}] (m) at (0,0){}; \node [vertex] (m') at (1,0){}; \node [vertex] at (-1,0.325){}; \node [vertex] at (-1,-0.325){}; \foreach \from/\to in {n/m, m/n, m/m', m'/m} \path[-] (\from) edge [bend right] (\to); \draw[edge] (n) to (m); \end{scope} \begin{scope}[xshift=3cm] \node [vertex, label = 180:{$y$}] (n) at (-2,0){}; \node [vertex, label=90:{$x$}] (m) at (0,0){}; \node [vertex] at (-1,0.325){}; \node [vertex] at (-1,-0.325){}; \node [vertex] (m') at (1,0){}; \path[-] (n) edge [bend right] (m); \path[-] (n) edge [bend left] (m); \draw[edge] (n) to (m); \draw[edge] (m) to (m'); \path[-] (m') edge [min distance=1cm] (m'); \end{scope} \end{tikzpicture} \end{center} In both cases, this contradicts the fact that $B(G)$ is $ex_B(\mathcal{L})$-minor free. So, if and end block $EB$ of $G$ satisfies the second statement of Observation~\ref{obs:finalcase}, then $EB$ is a subgraph of a subdivision of at most one red edge of a graph $mK_2''$. To conclude this proof we verify the case when $EB$ is a subdivision of a graph on three vertices of minimum degree $3$. Denote by $x$, $y$ and $z$ the vertices of degree at least $3$ of $EB$, with $x$ the cut vertex. Since $EB$ is a block, then $xy,~yz,~xz\in E(G)$. If $y$ or $z$ are incident with some loop, then by contracting $xy$ we find $R_3$ as a minor of $G$. Thus, $y$ and $z$ are loopless vertices. Moreover, since we are assuming that $EB$ contains no subdivision of $2K_3$, then without loss of generality, we suppose that $yz$ has no parallel edges. These arguments show that $EB$ is a subdivision of $K_3(r,j,0)$ for some non-negative integer $j$ and $k$, with $j\ge 1$. Now we show that $EB$ is a subdivision of at most one red edge. Recall that subdividing a pair of parallel edges in $K_3(r,j,0)$, creates a subdivision of $K_{2,3}$. We do not consider such subdivisions because we are working with outerplanar graphs. To see that $EB$ has at most one subdivision class, we argue that the bicircular matroids of the following graphs have an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift=0cm, scale=0.8] \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node[vertex] at (0,0){}; \node [vertex] (s) at (0.5,1){}; \node [vertex] (m) at (2,0){}; \foreach \from/\to in {0/1, 1/2} \draw [edge] (\from) to (\to); \foreach \from/\to in {0/2, 2/0, m/1, 1/m} \path[-] (\from) edge [bend right] (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=0cm, scale=0.8] \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node[vertex] at (0,0){}; \node [vertex] at (-0.8,1.2){}; \node [vertex] (m) at (2,0){}; \foreach \from/\to in {0/1, 1/2} \draw [edge] (\from) to (\to); \foreach \from/\to in {0/2, 2/0, m/1, 1/m} \path[-] (\from) edge [bend right] (\to); \end{scope} \begin{scope}[xshift=2.5cm, yshift=0cm, scale=0.8 \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node [vertex] (m) at (2,0){}; \node[vertex] at (0,0){}; \node [vertex] (s) at (0.5,1){}; \path[-] (m) edge [min distance=1cm] (m); \foreach \from/\to in {0/1, 1/2, m/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \end{scope} \begin{scope}[xshift=7.5cm, yshift=0cm, scale=0.8 \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node [vertex] (m) at (2,0){}; \node[vertex] at (0,0){}; \node [vertex] (s') at (-0.8,1.2){}; \foreach \from/\to in {0/1, 1/2, m/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (m) edge [min distance=1cm] (m); \end{scope} \end{tikzpicture} \end{center} We proceed from left to right. Contracting one $yz$-edge in the left most and second left most graphs, yields an $R_4'''$-minor and an $R_4$-minor, respectively. The bicircular matroid of the middle right and of the right most graph are isomorphic. So, we conclude by noticing that we obtain $P_3$ as a minor of the right most graph by contracting the edges $yz$ and $zx$. This shows that the bicircular matroids of the graphs above have an $ex_B(\mathcal{L})$-minor. To conclude the proof, we must consider the cases when $EB$ is a subdivision of $K_3(r,j,0)$ with $j\ge 1$ or with $r\ge 2$. In these cases, it suffices to observe that the bicircular matroid of the following graphs have an $ex_B(\mathcal{L})$-minor. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift=0cm, scale=0.8] \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node [vertex] at (0.5,1){}; \node [vertex] (m) at (2,0){}; \foreach \from/\to in {0/2, 2/0, m/1, 1/m} \path[-] (\from) edge [bend right] (\to); \foreach \from/\to in {0/1, 1/2, 0/2} \draw [edge] (\from) to (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=0cm, scale=0.8] \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node [vertex] (m) at (2,0){}; \node[vertex] at (0,0){}; \foreach \from/\to in {0/1, 1/2, 0/2, 1/m} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (m) edge [min distance=1cm] (m); \end{scope} \begin{scope}[xshift=2.5cm, yshift=0cm, scale=0.8 \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node [vertex] at (0.8,1.2){}; \node [vertex] (m) at (2,0){}; \foreach \from/\to in {0/2, 2/0, m/1, 1/m, 1/2, 2/1} \path[-] (\from) edge [bend right] (\to); \foreach \from/\to in {0/1} \draw [edge] (\from) to (\to); \end{scope} \begin{scope}[xshift=7.5cm, yshift=0cm, scale=0.8]% \node [vertex, label = 270:{$y$}] (0) at (-1,0){}; \node [vertex, label = 270:{$x$}] (1) at (1,0){}; \node [vertex, label = 0:{$z$}] (2) at (0,2){}; \node [vertex] at (0.8,1.2){}; \node [vertex] (m) at (2,0){}; \foreach \from/\to in {0/1, 1/m} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \path[-] (1) edge [bend right] (2); \path[-] (m) edge [min distance=1cm] (m); \end{scope} \end{tikzpicture} \end{center} As we have done several times, we notice that each graph above contains a minor whose bicircular matroid belongs to $ex_B(\mathcal{L})$. Contracting one $yz$-edge of the left most graph above yields a graph isomorphic to $R_4$. Similarly, $R_4'$ is the minor obtained from the middle left graph by contracting one $yz$-edge. We see that $P_2$ is a minor of the middle right graph by removing the $xy$-edge and contracting the $xz$-edge. By applying analogous operations to the right most graph, we see that this graph contains $P_3$ as a minor. After considering all these possible cases, we conclude that the end blocks of $G$ are subdivisions of at most one red edge of $K_3(r,j,l)$ or of $mK_2''$. Hence, we conclude that $G\in\mathcal{F}_4$. \end{proof} \section{Characterizations} \label{sec:CAR} Using the work of previous sections, we now prove Theorems~\ref{thm:graphs} and~\ref{thm:excludedminors}, and we discuss some of their implications. \begingroup \def\ref{thm:excludedminors}{\ref{thm:graphs}} \begin{theorem} Let $G$ be a graph such that $B(G)$ is a connected matroid. The bicircular matroid $B(G)$ is a lattice path matroid if and only if $G$ belongs to $\mathcal{F}_0\cup\mathcal{F}_1\cup \mathcal{F}_2 \cup \mathcal{F}_3 \cup \mathcal{F}_4$. \end{theorem} \addtocounter{theorem}{-1} \endgroup \begin{proof} By Propositions~\ref{prop:familyF0}, \ref{prop:familyF1}, \ref{prop:familyF2},~\ref{prop:familyF3}, and~\ref{prop:familyF4} the bicircular matroid of any graph in $\mathcal{F}_0\cup\mathcal{F}_1\cup \mathcal{F}_2 \cup \mathcal{F}_3 \cup \mathcal{F}_4$ is a lattice path matroid. On the other hand, if $B(G)$ is a lattice path matroid, then it is $ex_B(\mathcal{L})$-minor free (Proposition~\ref{prop:exminors}). Thus, if $B(G)$ is also connected, then by Proposition~\ref{prop:F0-F4}, we conclude that $G\in \mathcal{F}_0\cup\mathcal{F}_1\cup \mathcal{F}_2 \cup \mathcal{F}_3\cup\mathcal{F}_4$. \end{proof} In this paragraph we claim and show that for any graph $G$ in $\mathcal{F}_0$, there is some graph in $\mathcal{F}_1\cup \mathcal{F}_2\cup\mathcal{F}_3\cup\mathcal{F}_4$ whose bicircular matroid is isomorphic to $B(G)$--- we do so to show that Theorem~\ref{thm:graphs} implies Corollary~\ref{cor:F1-F4}. For instance, any subdivision of at most two edges of $K_4$ has the same bicircular matroid as some subdivision of at most two edges of $G_1$. Similarly, any subdivision of blue and red edges of $K^\ast_{2,3}$ has the same bicircular matroid as some subdivision of a pair of non parallel edges of $2K_3$. Subdivisions of $K_{2,3}$ are subgraphs of subdivisions of red and blue edges of $K''_{2,3}$, and the latter have the same bicircular matroids as subdivisions of red and blue edges of $K'_{2,3}$. To conclude this argumentation, we show that subdivisions of $K'_{2,3}$ have isomorphic bicircular matroids to bicircular matroids of some graph in $\mathcal{F}_4$. To do so, it suffices to notice that the following graphs have isomorphic bicircular matroids (to the left, $K_{2,3}'$; to the right, a graph in $\mathcal{F}_4$). \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-4cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \draw [edge] (2) to (3); \foreach \from/\to in {0/1, 1/3} \draw [edge, blue] (\from) to (\to); \foreach \from/\to in { 0/s, s/3} \draw [edge, red] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \end{scope} \begin{scope}[xshift=4cm, scale = 0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \draw [edge] (2) to (3); \foreach \from/\to in { 0/s, s/3} \draw [edge, red] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-, blue] (1) edge [bend left] (3); \path[-, blue] (1) edge [bend right] (3); \end{scope} \end{tikzpicture} \end{center} \begin{corollary}\label{cor:F1-F4} Let $L$ be a connected lattice path matroid. Then, $L$ is a bicircular matroid if and only if there is some graph $G\in \mathcal{F}_1\cup \mathcal{F}_2 \cup \mathcal{F}_3\cup\mathcal{F}_4$ such that $L\cong B(G)$. \end{corollary} Recall that Proposition~\ref{prop:nonouterplanar}, asserts that $\mathcal{F}_0$ contains all non-outerplanar graphs whose bicircular matroids are connected lattice path matroids. \begin{corollary}\label{cor:outerplanar} Let $L$ be a lattice path matroid. If $L$ is a bicircular matroid, then there is an outerplanar graph $G$ such that $L\cong B(G)$. \end{corollary} Observation~\ref{obs:recognition} in Section~\ref{sec:GF}, asserts that we can recognize the union $\bigcup_{i=0}^4\mathcal{F}_i$ in linear time with respect to the edge set of the input graph. Thus, the following claim is an implication of Theorem~\ref{thm:graphs}. \begin{corollary} Given an input graph $G$, there is a linear time algorithm (with respect to $|E(G)|$) that determines whether $B(G)$ is a lattice path matroid. \end{corollary} To conclude this work, we exhibit the list of excluded bicircular minors to the class of lattice path matroids. We depict an affine presentations of these in Figure~\ref{fig:allex}, and in Figure~\ref{fig:allexbic} we display a bicircular presentation of these matroids. \begingroup \def\ref{thm:excludedminors}{\ref{thm:excludedminors}} \begin{theorem} A bicircular matroid is a lattice path matroid if and only if it has no one of the following matroids as a minor: \[ C^{2,4},~\mathcal{W}^3,~A^3,~R^3,~R^4,~D^4,~B^1, \text{ and } S^1. \] \end{theorem} \addtocounter{theorem}{-1} \endgroup \begin{proof} On the one hand, Proposition~\ref{prop:exminors} shows that if a bicircular matroid has either of the above as a minor, then it is not a lattice path matroid. On the other hand, since lattice path matroids are closed under disjoint unions, then we can assume that the bicircular matroid $B(G)$ is connected. Thus, by Proposition~\ref{prop:F0-F4}, if $B(G)$ is $ex_B(\mathcal{L})$-minor free, then $G\in\mathcal{F}_i$ for some $i\in\{0,1,2,3\}$. Now, the claim follows by Theorem~\ref{thm:graphs}. \end{proof} \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift = 3cm, scale=0.8 \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (3) at (0,2.5){}; \node [vertex] (01) at (-0.75,1.25){}; \node [vertex] (13) at (0.75,1.25){}; \node [vertex] (30) at (0,0){}; \node[] at (0,-1){$\mathcal{W}^3$}; \foreach \from/\to in {1/0, 0/3, 3/1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=3cm, scale=0.8 \coordinate (0) at (-1.5,0){}; \node [vertex] (00) at (-1.5,0.15){}; \node [vertex] (01) at (-1.5,-0.15){}; \coordinate (1) at (1.5,0){}; \node [vertex] (10) at (1.5,-0.15){}; \node [vertex] (11) at (1.5,0.15){}; \node [vertex] (30) at (-0.5,1.5){}; \node [vertex] (31) at (0.5,1.5){}; \node [vertex] (c) at (0,0){}; \node[] at (0,-1){$R^3$}; \path[-] (0) edge (1); \end{scope} \begin{scope}[xshift=2.5cm, yshift=3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2.5){}; \node [vertex] (01) at (-0.5,1.25){}; \node [vertex] (13) at (0.5,1.25){}; \node [vertex] (30) at (0,-0.3){}; \node[] at (0,-1){$A^3$}; \foreach \from/\to in {0/3, 3/1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=7.5cm, yshift=3cm, scale=0.9 \coordinate (c0) at (-1.5,0){}; \coordinate (c1) at (1.5,0){}; \coordinate (i0) at (-1.5,1.5){}; \coordinate (i1) at (1.5,1.5){}; \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (2) at (0,0){}; \node [vertex] (1) at (0.1,0.75){}; \node [vertex] (2) at (-0.1,0.75){}; \node [vertex] (0) at (-1.5,1.5){}; \node [vertex] (1) at (1.5,1.5){}; \node [vertex] (2) at (0,1.5){}; \node[] at (0,-1){$(S^1)^\ast$}; \foreach \from/\to in {c0/c1, i0/i1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=-7.5cm, yshift=-1.8cm, scale=0.8 \coordinate (c0) at (-1.5,0){}; \coordinate (c1) at (1.5,0){}; \coordinate (d0) at (-1.5,1){}; \coordinate (d1) at (1.5,1){}; \coordinate (i0) at (-1.5,2){}; \coordinate (i1) at (1.5,2){}; \node [vertex] (0) at (-1.5,0){}; \node [vertex] (1) at (1.5,0){}; \node [vertex] (2) at (0,0){}; \node [vertex] (0) at (-1.5,1){}; \node [vertex] (1) at (1.5,1){}; \node [vertex] (2) at (0,1){}; \node [vertex] (0) at (-1.5,2){}; \node [vertex] (1) at (1.5,2){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1.2){$B^1$}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=-2cm, scale=0.8 \node [vertex] (0) at (-1.3,0){}; \node [vertex] (1) at (1.3,0){}; \node [vertex] (3) at (-1.3,3){}; \node [vertex] (4) at (1.3,3){}; \node [vertex] (5) at (0,3.7){}; \node [vertex] (6) at (0,0.7){}; \node[] at (0,-1){$C^{2,4}$}; \foreach \from/\to in {0/1, 1/4, 3/4, 3/0, 5/3, 5/4} \path[-] (\from) edge (\to); \foreach \from/\to in {6/0, 6/1, 6/5} \draw [edge, dotted] (\from) to (\to); \end{scope} \begin{scope}[xshift=2.5cm, yshift=-2.2cm, scale=0.8 \coordinate (c0) at (0,0){}; \coordinate (c1) at (0,3){}; \coordinate (d0) at (-1.8,1){}; \coordinate (d1) at (-1.8,4){}; \coordinate (i0) at (1.8,1){}; \coordinate (i1) at (1.8,4){}; \node [vertex] at (-0.15,2.3){}; \node [vertex] at (0.15,2.3){}; \node [vertex] at (0,1){}; \node [vertex] at (-1.2,2.8){}; \node [vertex] at (1.2,2.8){}; \node [vertex] at (-1.2,1.5){}; \node [vertex] at (1.2,1.5){}; \node[] at (0,-0.8){$R^4$}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1, c0/d0, c0/i0, c1/i1, c1/d1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=7.5cm, yshift=-2.2cm, scale=0.8 \coordinate (c0) at (0,0){}; \coordinate (c1) at (0,3){}; \coordinate (d0) at (-1.8,1){}; \coordinate (d1) at (-1.8,4){}; \coordinate (i0) at (1.8,1){}; \coordinate (i1) at (1.8,4){}; \node [vertex] (1) at (-1.2,1.3){}; \node [vertex] at (-1.2,2.2){}; \node [vertex] (2) at (-1.2,3){}; \node [vertex] (11) at (-0.6,1){}; \node [vertex] at (-0.6,1.9){}; \node [vertex] (22) at (-0.6,2.7){}; \node [vertex] at (1,2.6){}; \node [vertex] at (1,1.6){}; \node[] at (0,-0.8){$D^4$}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1, c0/d0, c0/i0, c1/i1, c1/d1, 1/2, 11/22} \path[-] (\from) edge (\to); \end{scope} \end{tikzpicture} \caption{An affine presentation of the eight bicircular excluded minors for lattice path matroids (we choose to depict the dual of $S^1$ because $S^1$ has rank $5$).} \label{fig:allex} \end{center} \end{figure} \begin{figure}[ht!] \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-7.5cm, yshift = 3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$B(W)\cong \mathcal{W}^3$}; \foreach \from/\to in {1/0, 0/3, 3/1} \draw [edge] (\from) to (\to); \path[-] (1) edge [min distance=1cm, out=45, in=-45] (1); \path[-] (0) edge [min distance=1cm, out=225, in=135] (0); \path[-] (3) edge [min distance=1cm] (3); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$B(R_3)\cong R^3$}; \foreach \from/\to in {1/0, 0/3, 3/1} \draw [edge] (\from) to (\to); \path[-] (0) edge [min distance=1cm, out=90, in=175] (0); \path[-] (0) edge [min distance=1cm, out=185, in=270] (0); \path[-] (1) edge [min distance=1cm, out=90, in=5] (1); \path[-] (1) edge [min distance=1cm, out=355, in=270] (1); \end{scope} \begin{scope}[xshift=2.5cm, yshift=3cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (3) at (0,2){}; \node[] at (0,-1){$B(A_3)\cong A^3$}; \foreach \from/\to in {0/1} \draw [edge] (\from) to (\to); \path[-] (3) edge [min distance=1cm] (3); \foreach \from/\to in {3/1, 1/3, 3/0, 0/3} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=7.5cm, yshift=3cm, scale=0.9 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node [vertex] (s) at (0,1){}; \node[] at (0,-1){$B(S_1)\cong S^1$}; \foreach \from/\to in {0/1, 3/2, 0/s, s/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (3); \path[-] (1) edge [bend left] (3); \end{scope} \begin{scope}[xshift=-7.5cm, yshift=-1.5cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (0,2){}; \node[] at (0,-1){$B(3K_3)\cong B^1$}; \path[-] (0) edge [bend left] (2); \path[-] (0) edge [bend right] (2); \path[-] (1) edge [bend right] (2); \path[-] (1) edge [bend left] (2); \path[-] (1) edge [bend right] (0); \path[-] (1) edge [bend left] (0); \foreach \from/\to in {0/1, 0/2, 1/2} \draw [edge] (\from) to (\to); \end{scope} \begin{scope}[xshift=-2.5cm, yshift=-1.5cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (c) at (0,0.9){}; \node [vertex] (3) at (0,2.24){}; \node[] at (0,-1){$B(P_2)\cong C^{2,4}$}; \foreach \from/\to in {c/1,c/0, c/3, 0/c, 1/c, 3/c} \path[-] (\from) edge [bend left] (\to); \end{scope} \begin{scope}[xshift=2.5cm, yshift=-1.5cm, scale=0.8 \node [vertex] (0) at (-1,0){}; \node [vertex] (1) at (1,0){}; \node [vertex] (2) at (-1,2){}; \node [vertex] (3) at (1,2){}; \node[] at (0,-1){$B(R_4)\cong R^4$}; \foreach \from/\to in {0/1, 0/3, 1/3} \draw [edge] (\from) to (\to); \path[-] (0) edge [bend left =20] (2); \path[-] (0) edge [bend right =20] (2); \path[-] (3) edge [min distance=1cm] (3); \path[-] (3) edge [min distance=1cm, out=40, in=320] (3); \end{scope} \begin{scope}[xshift=7.5cm, yshift = -1.5cm, scale=0.8 \node [vertex] (0) at (-1.1,0){}; \node [vertex] (1) at (1.1,0){}; \node [vertex] (3) at (0,2.2){}; \node [vertex] at (0,0){}; \node[] at (0,-1){$B(D_4)\cong D^4$}; \foreach \from/\to in {0/1, 0/3, 1/3} \draw [edge] (\from) to (\to); \foreach \from/\to in {3/1, 1/3, 3/0, 0/3} \path[-] (\from) edge [bend left] (\to); \end{scope} \end{tikzpicture} \caption{A bicircular presentation of the eight bicircular excluded minors for lattice path matroids. In each case we choose the presentation that minimizes the number of loops.} \label{fig:allexbic} \end{center} \end{figure} It was recently proved that there are finitely many excluded minors to the class of bicircular matroids \cite{deVosAR}. This, together with Theorem~\ref{thm:excludedminors} implies that there are finitely many excluded minors to the class of lattice path bicircular matroids. \begin{corollary}\label{cor:finitelatbic} There are only finitely many excluded minors to the class of lattice path bicircular matroids. \end{corollary} Allow us to discuss one more implication of the characterizations proposed in this section. By Corollary~\ref{cor:F1-F4}, every lattice path bicircular matroid admits a bicircular presentation by a graph in $\mathcal{F}_i$ for some $i\in\{1,2,3,4\}$. By definition of $\mathcal{F}_4$, all graphs in this family have a cut vertex. This implies that their bicircular matroids are not $2$-connected. Also, by Lemma~\ref{lem:familyF3}, the bicircular matroids of graphs in $\mathcal{F}_3$ are minors of bicircular matroids of graphs in $\mathcal{F}_1\cup \mathcal{F}_2$. Thus, every $2$-connected lattice path bicircular matroid is a minor of the bicircular matroid of some graph in $\mathcal{F}_1\cup\mathcal{F}_2$. Recall that the bicircular matroid of some $2$-connected graph $G$ is cosimple whenever $G$ has no subdivided edges. The subfamilies of graphs with no subdivided edges of $\mathcal{F}_1\cup \mathcal{F}_2$ are the graph families $G_1(r,b,d)$ and $2K_3(r,b)$. The bicircular matroids of these graphs have simple geometric descriptions. The bicircular matroid of $2K_3(r,b)$ is the rank $3$ matroid with one $(r+2)$-point line, one $(b+2)$-point line, and two points in general position. The bicircular matroid of $G_1(r,d,b)$ is the rank $4$ matroid with two hyperplanes $H_1$ and $H_2$ intersecting in a $d$-point line $\ell$, where $H_1$ and $H_2$ contain $\ell$, one point that belongs to no $3$-point line, and an $(r+2)$-point line and a $(b+2)$-point line, respectively. The following are affine representations of $B(2K_3(2,1))$ and of $B(G_1(1,4,0))$. \begin{center} \begin{tikzpicture}[scale=0.8] \begin{scope}[xshift=-3.5cm, yshift = 0.75cm, scale=0.9]% \coordinate (c0) at (-1.5,0){}; \coordinate (c1) at (1.5,0){}; \coordinate (i0) at (-1.5,1.5){}; \coordinate (i1) at (1.5,1.5){}; \node [vertex] at (-1.5,0){}; \node [vertex] at (1.5,0){}; \node [vertex] at (-0.5,0){}; \node [vertex] at (0.5,0){}; \node [vertex] at (-0.75,0.75){}; \node [vertex] at (0.75,0.75){}; \node [vertex] (0) at (-1.5,1.5){}; \node [vertex] (1) at (1.5,1.5){}; \node [vertex] (2) at (0,1.5){}; \foreach \from/\to in {c0/c1, i0/i1} \path[-] (\from) edge (\to); \end{scope} \begin{scope}[xshift=3cm, scale = 0.8]% \coordinate (c0) at (0,0){}; \coordinate (c1) at (0,3){}; \coordinate (d0) at (-1.8,1){}; \coordinate (d1) at (-1.8,4){}; \coordinate (i0) at (1.8,1){}; \coordinate (i1) at (1.8,4){}; \node [vertex] (1) at (-1.2,1.3){}; \node [vertex] at (-1.2,2.2){}; \node [vertex] (2) at (-1.2,3){}; \node [vertex] (11) at (1.2,1.3){}; \node [vertex] (22) at (1.2,3){}; \node [vertex] at (-0.6,1.8){}; \node [vertex] at (0.6,1.8){}; \node [vertex] at (0,0.5){}; \node [vertex] at (0,1.2){}; \node [vertex] at (0,1.9){}; \node [vertex] at (0,2.6){}; \foreach \from/\to in {c0/c1, d0/d1, i0/i1, c0/d0, c0/i0, c1/i1, c1/d1, 1/2, 11/22} \path[-] (\from) edge (\to); \end{scope} \end{tikzpicture} \end{center} \begin{proposition}\label{prop:2conectedcosimple} For a $2$-connected cosimple matroid $M$ the following statements are equivalent: \begin{enumerate} \item $M$ is a lattice path bicircular matroid, \item $M$ is a minor of $B(G_1(r,b,d))$ or of $B(2K_3(r,b))$, for some non-negative integers $r$, $b$ and $d$. \end{enumerate} \end{proposition} \begin{proof} This statement is proved in the two preceding paragraphs. \end{proof} \begin{corollary} The cosimplification of $2$-connected lattice path bicircular matroid has rank at most $4$. \end{corollary} \section{Conclusions} \label{sec:conclusions} Theorem~\ref{thm:excludedminors} lists all excluded bicircular minors to the class of lattice path matroids. A natural extension of this work is to exhibit the list of excluded lattice path minors to the class of bicircular matroids. Moreover, Corollary~\ref{cor:finitelatbic} asserts that there are only a finite number of excluded minors for the class of lattice path bicircular matroids, which are these excluded minors? \begin{problem} Exhibit the excluded minors for lattice path bicircular matroids. \end{problem} As Sivaraman and Slilaty \cite{sivaramanGC2022} suggested, we also considered to study the intersection of bicircular matroids and multipath matroids; but it turned out to be (even more) technical than the present work. The interested reader could try to find nicer arguments to characterize multipath bicircular matroids. Also, the dual class of transversal matroids is the class of strict gammoids. Since lattice path matroids and cobicircular matroids are duals of transversal matroids, studying the intersection of bicircular matroids and strict gammoids would be a nice extension of the present work and of the work of Sivaraman and Slilaty \cite{sivaramanGC2022}. Finally, Corollary~\ref{cor:outerplanar} asserts that every lattice path bicircular matroid is the bicircular matroid of some outerplanar graph; is there an interesting characterization of bicircular matroids of outerplanar graphs? We believe it could also be interesting to consider super classes of outerplanar graphs. For instance, studying the class $\mathcal{C}$ of bicircular matroids of series-parallel graphs could yield a nice problem to investigate. In particular, all lattice path bicircular matroids belong to $\mathcal{C}$. Also, if $B(G)$ is representable over $GF(4)$ then it is $U_{4,6}$-minor free, and thus $G$ is $K_4$-minor free, i.e., $G$ is a series-parallel graph. We stress out that $\mathcal{C}$ is not the class of $U_{4,6}$-minor free bicircular matroids since $U_{4,6}\cong B(G_1)$ and $G_1$ is a series-parallel graph. \section*{Acknowledgements} This work was carried out during a visit of the first author at FernUniversit\"at in Hagen, supported by DAAD grant 57552339.
\section{Introduction}\label{sec1} In 2012 the long-sought Higgs boson is found \cite{atl12, cms12}, which establishes the triumph of the Brout-Englert-Higgs mechanism \cite{eng64, hig64}. This mechanism tells us how no-mass gauge particles gain mass in the standard model (SM), while the gauge particle itself alone cannot have its mass due to gauge symmetry. That finding shows the Higgs-particle mass of $125$ GeV ($\sim 10^{2}$ GeV). Considering the interaction of the Higgs particle and an elementary particle in the Planck-scale, particle physicists normally need a special tuning to obtain the Higgs mass. Since the Planck-scale mass ($\sim 10^{18}$ GeV) is so much heavier than the Higgs mass, particle physicists usually employ the so-called fine-tuning in SM to cope with the mass gap with the ratio ($\sim 10^{16}$ GeV); thus, they perform the unnatural, huge cancellation between the bare mass term and the quantum corrections to obtain the Higgs mass. This is the so-called hierarchy problem. Moreover, the Higgs mass of $125$ GeV could result in the possibility of the flat Higgs potential \cite{hol12, eli12, deg12, but13, iso13, ibe14}. It says that the Higgs quartic interaction may almost vanish at the Planck scale in electroweak theory. Removing this apprehension, we probably should need to find a mass-enhancement mechanism by the radiative generation without the Higgs potential. Against these difficulties, supersymmetry (SUSY) is among the strong candidates for natural theories to solve those problems. However, the Higgs mass of $125$ GeV puzzles particle physicists again because it is rather heavier than the mass predicted in the minimal supersymmetric standard model (MSSM). The mass of $125$ GeV is almost the upper bound ($110-135$ GeV) of the possibly predicted mass, and imposes pretty tight constraints on the conditions of MSSM \cite{arb12}. This gap between the two masses requires another fine-tuning. It is expected that this gap is plugged by the SUSY breaking \cite{sal74, buc82, giu99, arb12, dra12, dud13, iba13, ant14, lu14, oku19}, a kind of spontaneous symmetry breaking. Unfortunately, any fingerprint of SUSY and its spontaneous breaking had not been firmly, directly observed in the physical reality even for the quantum mechanics (QM) version \cite{wit81, wit82, bin06, gmr11, bau15a, bau15b} until 2022. That is when Cai \textit{et al.} report its observation \cite{cai22}. Some months before the Higgs-boson discovery, actually, the quantum simulation for the Brout-Englert-Higgs mechanism is succeeded \cite{end12}. Quantum simulation is for the study of quantum phenomena, which is implemented on a programmable quantum system consisting of quantum devices especially designed to realize those quantum phenomena. The idea of quantum simulation is based on Feynman's proposal \cite{fey82} and has been developing lately: the Klein paradox \cite{ger11}, the Brout-Englert-Higgs mechanism \cite{end12}, the $(1+1)$-dimensional lattice QED \cite{yan16} and the lattice Schwinger model \cite{est16, kok19}, the Floquet approach to $\mathbb{Z}_{2}$ lattice gauge theories \cite{sch19}, a gauge invariance \cite{yan20}, $\mathcal{N}=2$\, SUSY and its spontaneous breaking \cite{cai22}, and Floquet symmetry-protected topological phases \cite{zha22}, etc. Some theoretical models for quantum simulation of SUSY and its spontaneous breaking are proposed \cite{hir15, tom15, url15, gha21, min22}. In particular, a simple, prototype model is given with using the quantum Rabi model \cite{rab36, rab37, bra11}, and it has the transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking by tuning some parameters \cite{hir15}. Indeed this transition is not an elementary process, and thus, not unitary, but it behaves as if it changed the in-field into the out-field. The success in experimental observation of that transition in a trapped ion quantum simulator is reported \cite{cai22}. In this transition we cannot observe any mass enhancement because the Lagrangian of the prototype model does not include any mass-enhancement mechanism. Thus, we are interested in quantum simulation showing a mass-enhancement mechanism in SUSY breaking. One of the candidates for the mass enhancement is adding the quadratic term, often called `$A^{2}$-term' \cite{rza75, nat10} as an extra mass term to the quantum Rabi model. Here, we note that this `$A$' is different from the `$A$' of the $A$-term appearing in the stop mixing parameter as one of the weak-scale MSSM parameters. Since the quantum Rabi model describes the electromagnetic interaction basically, its `$A$' corresponds to the photon gauge field. For the prototype model \cite{hir15}, the strong coupling limit is used to obtain the transition. As shown in this paper, however, we can derive a no-go theorem for the SUSY breaking in the strong coupling limit if the prototype model has the $A^{2}$-term. On the other hand, Cai \textit{et al.} propose another limit experimentally to obtain the transition for the prototype model \cite{cai22}. Then, we show that their limit makes our model avoid the no-go theorem. Employing their limit, therefore, we extend the prototype such that we can make quantum simulation for the mass enhancement in SUSY breaking. Our model's interaction has no Higgs potential, and thus, the mass enhancement is radiatively made with the help of the swap between the bosonic and fermionic states. The structure of this paper is as follows: In Section \ref{sec2} we review the following facts on the quantum Rabimodel. The quantum Rabi model with the $A^{2}$-term meets the no-go theorem for the SUSY breaking in the strong coupling limit. On the other hand, it can avoid the no-go theorem and have the transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking under the scheme by Cai \textit{et al.} \cite{cai22}. In Section \ref{sec3} we show that the mass enhancement takes place in the SUSY breaking. In Section \ref{sec4} we discuss the experimental realization of our quantum simulation. We introduce some problems on the Goldstino (i.e., Nambu-Goldstone fermion) arising from the results in this paper. \section{Quantum Rabi model in SUSY QM}\label{sec2} In this section, following \cite{hir22}, we explain the role of the quantum Rabi model for the transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking. The quantum Rabi model has been coming in handy for quantum simulation lately \cite{bra17, yos17, lv18, mei22}, and therefore, it can be a powerful tool for our purpose. The state space of the 1-mode boson is given by the boson Fock space $\mathcal{F}_{\mathrm{b}}$, which is spanned by the boson Fock states. The boson Fock state with $n$ bosons is denoted by $\mid\!\!n\rangle$; thus, $\mid\!\!0\rangle$ is the Fock vacuum in particular. The $2$-level atom in our model is represented by spin. We denote the up-spin state by $\mid\uparrow\rangle=\bigl( \begin{smallmatrix} 1 \\ 0 \end{smallmatrix} \bigl)$, the down-spin state by $\mid\downarrow\rangle=\bigl( \begin{smallmatrix} 0 \\ 1 \end{smallmatrix} \bigl)$. We denote by $\mathbb{C}$ the $1$-dimensional unitary space, that is, the set of all the complex numbers with its natural inner product. We use the Hilbert space $\mathbb{C}\otimes\mathcal{F}_{\mathrm{b}}$ for the total state space of our model. The orthonormal basis of $\mathbb{C}\otimes\mathcal{F}_{\mathrm{b}}$ is given by the set of all the vectors $\mid\downarrow\rangle\otimes\mid\!\!n\rangle$ and $\mid\uparrow\rangle\otimes\mid\!\!n'\rangle$ for $n, n'=0, 1, 2, \cdots$. We often omit the symbol `$\otimes$' in the vectors of $\mathbb{C}\otimes\mathcal{F}_{\mathrm{b}}$ throughout this paper. The annihilation and creation operators of a $1$-mode boson are respectively denoted by $a$ and $a^{\dagger}$. The annihilation operator $\sigma_{-}$ and the creation operator $\sigma_{+}$ of a $2$-level atom (i.e., spin) are given by $\sigma_{\pm}=(1/2)(\sigma_{x}\pm i\sigma_{y})$. Thus, $\sigma_{-}$ and $\sigma_{+}$ are respectively the spin-annihilation operator and spin-creation operator. Here, the standard notation $\sigma_{x}$, $\sigma_{y}$, and $\sigma_{z}$ are used for the Pauli matrices: $\sigma_{x}=\bigl( \begin{smallmatrix} 0 & 1 \\ 1 & 0 \end{smallmatrix} \bigl)$, $\sigma_{y}=\bigl( \begin{smallmatrix} 0 & -i \\ i & 0 \end{smallmatrix} \bigl)$, $\sigma_{z}=\bigl( \begin{smallmatrix} 1 & 0 \\ 0 & -1 \end{smallmatrix} \bigl)$. We use the notation `$1$' for the 2-by-2 identity matrix, i.e., $1=\bigl( \begin{smallmatrix} 1 & 0 \\ 0 & 1 \end{smallmatrix} \bigl)$, and for the identity operator acting in $\mathcal{F}_{\mathrm{b}}$ as well as the numerical character $1$. We often omit the symbols `$1$' and `$\otimes$' in operators throughout this paper. \subsection{Our problem} We consider the physical system describing the interaction of the $2$-level atom and $1$-mode boson. The two ideal, free Hamiltonians, $H(0, \Omega_{\mathrm{b}}, 0, 0)$, $H(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, 0, 0)$, are defined by \begin{align*} H(0, \Omega_{\mathrm{b}}, 0, 0) &= 1\otimes \hbar\Omega_{\mathrm{b}}\left( a^{\dagger}a+\frac{1}{2}\right), \\ H(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, 0, 0) &=\frac{\hbar\Omega_{\mathrm{a}}}{2}\sigma_{z}\otimes 1+H(0, \Omega_{\mathrm{b}}, 0, 0), \end{align*} where $\Omega_{\mathrm{b}}$ denotes the frequency of the $1$-mode boson, and $\Omega_{\mathrm{a}}$ is the atom transition frequency. It is easy to check that, for a constant $\Omega>0$, the Hamiltonian $H(\Omega, \Omega, 0, 0)$ has the $\mathcal{N}=2$\, SUSY, and the Hamiltonian $H(0, \Omega, 0, 0)$ makes its spontaneous breaking. Actually, their algebraic structures are given in the following \cite{hir15}. For the Hamiltonian $H(\Omega, \Omega, 0, 0)$, its real supercharges, $q_{1}$, $q_{2}$, are given by $$ q_{1} =\sqrt{\frac{\hbar\Omega}{2}}\left(\sigma_{+}a+\sigma_{-}a^{\dagger}\right),\qquad q_{2} =i\sqrt{\frac{\hbar\Omega}{2}}\left(\sigma_{-}a^{\dagger}-\sigma_{+}a\right). $$ Then, they satisfy \begin{align*} & \left\{ q_{k}, q_{\ell}\right\} =\delta_{k\ell}H(\Omega, \Omega, 0, 0), \\ & \left[ q_{k}, H(\Omega, \Omega, 0, 0)\right]=0, \\ & \left\{ q_{k}, N_{\mbox{\tiny F}}\right\}=0, \end{align*} where $N_{\mbox{\tiny F}}$ is the grading operator defined by $N_{\mbox{\tiny F}}=-\sigma_{z}$. The ground state ${\mid\downarrow\rangle}\otimes{\mid\!\!0\rangle}$ of $H(\Omega, \Omega, 0, 0)$ (i.e., vacuum) is bosonic state since $N_{\mbox{\tiny F}}{\mid\downarrow\rangle}\otimes{\mid\!\!0\rangle} =\, {\mid\downarrow\rangle}\otimes{\mid\!\!0\rangle}$, and it satisfies $q_{k}\mid\downarrow\rangle\otimes\mid\!\!0\rangle=0$, $k=1, 2$. The complex supercharges, $q^{+}$, $q^{-}$, are given by $$ q^{+}=\frac{1}{\sqrt{2}}\left( q_{1}+iq_{2}\right) =\sqrt{\hbar\Omega}\, \sigma_{+}a,\qquad q^{-}=\frac{1}{\sqrt{2}}\left( q_{1}-iq_{2}\right) =\sqrt{\hbar\Omega}\, \sigma_{-}a^{\dagger}, $$ such that \begin{align*} & H(\Omega, \Omega, 0, 0)=\left\{ q^{+}, q^{-}\right\}, \\ & \left\{q^{\pm}, q^{\pm}\right\}=0, \\ & \left[ H(\Omega, \Omega, 0, 0), q^{\pm}\right]=0. \end{align*} These complex supercharges make the connection between the bosonic and fermionic states: \begin{align*} & q^{-}\mid\downarrow\rangle\otimes\mid\!\!n\rangle =q^{+}\mid\uparrow\rangle\otimes\mid\!\!n\rangle=0, \\ & \mid\uparrow\rangle\otimes\mid\!\!n\rangle =\frac{1}{\sqrt{(n+1)\hbar\omega\,}} q^{+}\mid\downarrow\rangle\otimes\mid\!\!n+1\rangle, \\ & \mid\downarrow\rangle\otimes\mid\!\!n+1\rangle =\frac{1}{\sqrt{(n+1)\hbar\omega\,}} q^{-}\mid\uparrow\rangle\otimes\mid\!\!n\rangle. \end{align*} We immediately have $q^{\pm}{\mid\downarrow\rangle}\otimes{\mid\!\!0\rangle}=0$ for the vacuum ${\mid\downarrow\rangle}\otimes{\mid\!\!0\rangle}$. Since this vacuum is a unique ground state of the Hamiltonian $H(\Omega, \Omega, 0, 0)$, the Witten index is $1$. Meanwhile, the algebraic structure for the SUSY breaking of $H(0, \Omega, 0, 0)$ is determined in the following. Its real supercharges, $Q_{1}$, $Q_{2}$, are given by $$ Q_{1}=\sqrt{\frac{\hbar\Omega}{2}} \sqrt{a^{\dagger}a+\frac{1}{2}}\,\sigma_{x},\qquad Q_{2}=\sqrt{\frac{\hbar\Omega}{2}} \sqrt{a^{\dagger}a+\frac{1}{2}}\,\sigma_{y}. $$ Then, they satisfy \begin{align*} & \left\{ Q_{k}, Q_{\ell}\right\} =\delta_{k\ell}H(0, \Omega, 0, 0), \\ & \left[ Q_{k}, H(0, \Omega, 0, 0)\right]=0, \\ & \left\{ Q_{k}, N_{\mbox{\tiny F}}\right\}=0, \end{align*} where $N_{\mbox{\tiny F}}$ is the grading operator defined by $N_{\mbox{\tiny F}}=-\sigma_{z}$. The ground sates ${\mid\!\!\sharp\rangle}\otimes{\mid\!\!0\rangle}$, $\sharp=\downarrow, \uparrow$, of $H(0, \Omega, 0, 0)$ (i.e., vacuums) has the strictly positive eigenvalue $\hbar\Omega>0$. We have $Q_{k}\mid\!\!\sharp\rangle\otimes\mid\!\!0\rangle\ne 0$, $k=1, 2$. The complex supercharges, $Q^{+}$, $Q^{-}$, are given by $$ Q^{\pm}=\frac{1}{\sqrt{2}}\left(Q_{1}\pm iQ_{2}\right) =\sqrt{\hbar\Omega \left( a^{\dagger}a+\frac{1}{2}\right)}\, \sigma_{\pm} $$ such that \begin{align*} & H(0, \Omega, 0, 0)=\left\{ Q^{+}, Q^{-}\right\}, \\ & \left\{Q^{\pm}, Q^{\pm}\right\}=0, \\ & \left[ H(0, \Omega, 0, 0), Q^{\pm}\right]=0. \end{align*} These complex supercharges have the relations, $$ Q^{-}\mid\downarrow\rangle\otimes\mid\!\!n\rangle =Q^{+}{\mid\uparrow\rangle}\otimes\mid\!\!n\rangle=0. $$ They do cut the connection with the boson annihilation and creation but the connection between bosonic and fermionic states as \begin{align*} & \mid\uparrow\rangle\otimes\mid\!\!n\rangle =\frac{1}{\sqrt{(n+\frac{1}{2})\hbar\Omega\,}} Q^{+}\mid\downarrow\rangle\otimes\mid\!\!n\rangle, \\ & \mid\downarrow\rangle\otimes\mid\!\!n\rangle =\frac{1}{\sqrt{(n+\frac{1}{2})\hbar\Omega\,}} Q^{-}\mid\uparrow\rangle\otimes\mid\!\!n\rangle, \end{align*} in particular, $Q^{+}\mid\downarrow\rangle\otimes\mid\!\!0\rangle\ne 0$ and $Q^{-}\mid\uparrow\rangle\otimes\mid\!\!0\rangle\ne 0$ for the vacuums $\mid\!\!\sharp\rangle\otimes\mid\!\!0\rangle$, $\sharp=\downarrow, \uparrow$. In terms of the grading operator $N_{\mbox{\tiny F}}$, since $N_{\mbox{\tiny F}}{\mid\downarrow\rangle}\otimes{\mid\!\!n\rangle}= {\mid\downarrow\rangle}\otimes{\mid\!\!n\rangle}$ and $N_{\mbox{\tiny F}}{\mid\uparrow\rangle}\otimes{\mid\!\!n\rangle}= -{\mid\uparrow\rangle}\otimes{\mid\!\!n\rangle}$, the vacuum ${\mid\downarrow\rangle}\otimes{\mid\!\!0\rangle}$ is a bosonic state and the vacuum ${\mid\uparrow\rangle}\otimes{\mid\!\!0\rangle}$ is a fermionic state. Thus, the Witten index is $0$, and the SUSY is spontaneously broken. The collaboration by the supercharges, $Q^{\pm}$, can make the oscillation between the degenerate ground states, $\mid\downarrow\rangle\otimes\mid\!\!0\rangle$, $\mid\uparrow\rangle\otimes\mid\!\!0\rangle$, of the Hamiltonian $H(0, \Omega, 0, 0)$, which may emerge the Goldstino mode \cite{sal74, bin06, bau15a, bau15b}. Our problem is described as follows:\\ \textbf{Problem 1.} How can we introduce an interaction $H_{\mathrm{int}}$ between the $2$-level atom and $1$-mode boson to make the transition from the $\mathcal{N}=2$\, SUSY Hamiltonian $H(\Omega, \Omega, 0, 0)$ to its spontaneous-breaking Hamiltonian unitarily equivalent to the Hamiltonian $H(0, \Omega, 0, 0)$? \\ \textbf{Problem 2.} How can we make a mass term in the interaction $H_{\mathrm{int}}$ which causes the mass enhancement in the SUSY breaking? The prototype model in \cite{hir15} is given as a partial solution of Problem 1. Thus, we extend the prototype such that the extended model gives a solution to Problem 2. Our model is based on the quantum Rabi model whose Hamiltonian is given by $$ H_{\mbox{\tiny Rabi}}(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, G) =H(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, 0, 0) +\hbar G\left( a+a^{\dagger}\right), $$ where the last term is the linear interaction between the atom and boson with the parameter $G$ representing the coupling strength. For our candidate of the interaction $H_{\mathrm{int}}$, we add the quadratic interaction in addition to the linear one, and thus, our total Hamiltonian reads \begin{align} H(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, G, C) =& H_{\mbox{\tiny Rabi}}(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, G) +\hbar CG^{2}\left( a+a^{\dagger}\right)^{2}, \label{eq:hamiltonian_0} \end{align} where the last term of Eq.(\ref{eq:hamiltonian_0}) is the quadratic interaction $\hbar C\{G\sigma_{x}(a+a^{\dagger})\}^{2}$ with the parameter $C$ which controls the dimension and volume of the quadratic interaction energy. This quadratic term is often called `$A^{2}$-term' \cite{rza75, nat10}. As explained above, tuning the parameters $\Omega_{\mathrm{a}}$ and $\Omega_{\mathrm{b}}$ as $\Omega_{\mathrm{a}}=\Omega_{\mathrm{b}}=\omega$ for a positive constant $\omega$, the Hamiltonian $H(\omega, \omega, 0, 0)$ without the $A^{2}$-term has the $\mathcal{N}=2$\, SUSY. In our model, as the coupling strength $G$ gets stronger enough, the $A^{2}$-term may appear, i.e., $C\ne 0$. Similarly to the case of the superradiant phase transition \cite{dicke54,hl73}, a no-go theorem caused by the $A^{2}$-term \cite{rza75} should be minded, and its avoidance should be argued \cite{nat10} also for our model described by Eq.(\ref{eq:hamiltonian_0}) for supersymmetric quantum mechanics (SUSY QM). We investigate this problem in this section. For every non-negative $C$, as in \cite{hir22}, there exists a unitary operator $U_{A^{2}}$ such that the Hopfield-Bogoliubov transformation \cite{hop58, nat10} is given by \begin{eqnarray} U_{A^{2}}^{*}H(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, G, C)U_{A^{2}} &=&H(\Omega_{\mathrm{a}}, \Omega(G), \widetilde{G}, 0) =H_{\mbox{\tiny Rabi}}(\Omega_{\mathrm{a}}, \Omega(G), \widetilde{G}), \label{eq:hb-trans} \end{eqnarray} where $\Omega(G)=\sqrt{\Omega_{\mathrm{b}}^{2}+4C\Omega_{\mathrm{b}}G^{2}\,}$ and $\widetilde{G}=G\sqrt{\Omega_{\mathrm{b}}/\Omega(G)}$. Eq.(\ref{eq:hb-trans}) means a renormalization of the $A^{2}$-term. The effect of the $A^{2}$-term is stuffed into $\Omega(G)$ and $\widetilde{G}$. We note that, for $C=0$, the parameters satisfy $\Omega(G)=\Omega_{\mathrm{b}}$, $\widetilde{G}=G$, and then, the unitary operator $U_{A^{2}}$ is $1$, the identity operator. For the displacement operator $D(G/\Omega_{\mathrm{b}}) = \exp\left[ G(a^{\dagger}-a)/\Omega_{\mathrm{b}}\right]$, as in \cite{hir22}, a unitary operator $U(G/\Omega_{\mathrm{b}})$ is defined by $$ U(G/\Omega_{\mathrm{b}})=\frac{1}{\sqrt{2}} \left\{\left(\sigma_{-}-1\right)\sigma_{+}D(G/\Omega_{\mathrm{b}}) +\left(\sigma_{+}+1\right)\sigma_{-}D(-G/\Omega_{\mathrm{b}})\right\}. $$ Then, it makes the equation, \begin{eqnarray} &{}& U(G/\Omega_{\mathrm{b}})^{*} \left\{ H(\Omega_{\mathrm{a}}, \Omega_{\mathrm{b}}, G, 0) +\hbar\frac{G^{2}}{\Omega_{\mathrm{b}}} \right\} U(G/\Omega_{\mathrm{b}}) \nonumber \\ &=& H(0, \Omega_{\mathrm{b}}, 0, 0) -\frac{\hbar\Omega_{\mathrm{a}}}{2} \left\{\sigma_{+}D(G/\Omega_{\mathrm{b}})^{2} +\sigma_{-}D(-G/\Omega_{\mathrm{b}})^{2}\right\}. \label{eq:ut} \end{eqnarray} Since the arguments on the limit of Hamiltonians used below are already established as a mathematical method \cite{hir15, hir17, hir20}. Thus, for simplicity, mathematically naive arguments are made in this section to explain the no-go theorem and its avoidance. \subsection{No-go theorem in strong coupling limit} Now we consider the strong coupling limit for the quantum Rabi model without and with the $A^{2}$-term. For instance, the strong coupling limit is experimentally realized for the quantum Rabi model in circuit QED \cite{yos17} as deep-strong coupling regime \cite{cas10}. The parameters, $\Omega_{\mathrm{a}}$, $\Omega_{\mathrm{b}}$, $G$, are set as $\Omega_{\mathrm{a}}=\Omega_{\mathrm{b}}=\omega$ and $G=\mathrm{g}$ for a non-negative parameter $\mathrm{g}$. The Hamiltonian $H(\omega, \omega, \mathrm{g}, 0) =H_{\mbox{\tiny Rabi}}(\omega, \omega, \mathrm{g})$ is for the quantum Rabi model, and denoted by $H_{\mbox{\tiny Rabi}}(\mathrm{g})$ for simplicity. In the renormalization for the $A^{2}$-term, the quantities $\Omega(\mathrm{g})$ and $\widetilde{\mathrm{g}}$ are defined by $\Omega(\mathrm{g})= \sqrt{\omega^{2}+4C\omega\mathrm{g}^{2}\,}$ and $\widetilde{\mathrm{g}}=\mathrm{g}\sqrt{\omega/\Omega(\mathrm{g})}$. In case $C=0$, the mathematical results \cite{hir15, hir17} say that the approximation, \begin{equation} H_{\mbox{\tiny Rabi}}(\mathrm{g})+\hbar\frac{\mathrm{g}^{2}}{\omega} \approx U(\mathrm{g}/\omega)H(0, \omega, 0, 0)U(\mathrm{g}/\omega)^{*}, \label{eq:approx1} \end{equation} is obtained as $\mathrm{g}\to\infty$. Due to the appearance of the Hamiltonian $H(0, \omega, 0, 0)$ in Eq.(\ref{eq:approx1}), the $\mathcal{N}=2$\, SUSY is spontaneously broken in the strong coupling limit $\mathrm{g}\to\infty$. This is completely characterized with the energy-spectrum property, for instance, as in the left graph of Fig.\ref{fig:Fig_g}. How to obtain Eq.(\ref{eq:approx1}) is explained in \cite{hir22}. In the case $C>0$, on the other hand, the mathematical result \cite{hir20} says that \begin{eqnarray} &{}& H_{\mbox{\tiny Rabi}}(\mathrm{g}) +\hbar C\mathrm{g}^{2}\left( a+a^{\dagger}\right)^{2} +\hbar\frac{\widetilde{\mathrm{g}}^{2}}{\Omega(\mathrm{g})} \nonumber \\ &\approx& U_{A^{2}} U(\widetilde{\mathrm{g}}/\Omega(\mathrm{g})) \left[ H(0, \Omega(\mathrm{g}), 0, 0) -\, \frac{\hbar\omega}{2}\sigma_{x} \right] U(\widetilde{\mathrm{g}}/\Omega(\mathrm{g}))^{*} U_{A^{2}}^{*} \label{eq:approx2} \end{eqnarray} as $\mathrm{g}\to\infty$. The atomic term $\hbar\omega\sigma_{x}/2$ appears in addition to the Hamiltonian $H(0, \Omega(\mathrm{g}), 0, 0)$ in RHS of Eq.(\ref{eq:approx2}). This appearance interferes with the transition to the SUSY breaking then. Moreover, the divergence of $\Omega(\mathrm{g})$, together with the atomic term, rudely crushes that SUSY. We can see this crush in the energy spectrum, for instance, as in the right graph of Fig.\ref{fig:Fig_g}. Thus, the above quantum Rabi model with the $A^{2}$-term cannot go to the SUSY breaking as $\mathrm{g}$ changes from $\mathrm{g}=0$ to $\mathrm{g}\approx\infty$. This is the `no-go theorem' for the SUSY breaking in the strong coupling limit caused by the $A^{2}$-term. The reason why $\hbar\omega\sigma_{x}/2$ appears in RHS of Eq.(\ref{eq:approx2}) is in \cite{hir22}. The approximations given by Eqs.(\ref{eq:approx1}) and (\ref{eq:approx2}) are mathematically established in the norm resolvent sense, and the limit is valid over the energy spectrum \cite{rs1}. Thus, the limit energy spectrum is obtained by those approximations. Whether the $\mathcal{N}=2$\, SUSY of $H(\omega, \omega, 0, 0)$ is taken to its spontaneous breaking is checked by seeing the energy degeneracy and measuring each interval between adjacent energy levels. The energy spectrum by the numerical computations with QuTiP \cite{nori1, nori2} is obtained, for instance, as in Fig.\ref{fig:Fig_g}. \begin{figure}[h \centering \includegraphics[width=0.45\textwidth]{C=0_g.eps} \quad \includegraphics[width=0.45\textwidth]{C=0-038_g.eps} \vspace*{17mm} \caption{Energy Spectrum of $H_{\mbox{\tiny Rabi}}(\mathrm{g})+\hbar C\mathrm{g}^{2} \left( a+a^{\dagger}\right)^{2}+\hbar\widetilde{\mathrm{g}}^{2}/\Omega(\mathrm{g})$ with $\omega=6.2832$: A ground state energy and six excited state energies from the bottom are shown in each graph. The left graph shows the energy spectrum for $C=0$. The right graph is for $C=0.0377$. The left graph says that the quantum Rabi model (without $A^{2}$-term) has the transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking. On the other hand, the right graph shows the loss of the spontaneous breaking. Here, it should be noted $\lim_{\mathrm{g}\to\infty}\hbar\Omega(\mathrm{g})=\infty$ and $\lim_{\mathrm{g}\to\infty}\hbar\widetilde{\mathrm{g}}^{2}/\Omega(\mathrm{g}) =\hbar/(4C)$.}\label{fig:Fig_g} \end{figure} \subsection{Limit for avoidance of no-go theorem} As stated above, the Rabi model with the $A^{2}$-term is faced with the no-go theorem in the strong coupling limit, which is caused by the effect coming from the $A^{2}$-term. Indeed the no-go theorem appears in the strong coupling limit, but there is another limit used for the scheme by Cai \textit{et al}. \cite{cai22}. They employ their own limit experimentally to realize the transition for the prototype in the case $C=0$. Their limit is more direct to make the transition from the $\mathcal{N}=2$\, SUSY Hamiltonian $H(\omega, \omega, 0, 0)$ to its spontaneous-breaking Hamiltonian unitarily equivalent to the Hamiltonian $H(0, \omega, 0, 0)$ than the strong coupling limit is. It is based on the following idea. They prepare the continuous function $\omega[r]$ of $1$-variable $r$, $0\le r\le 1$, such that $\omega[0]=\omega$ and $\omega[1]=0$. Then, the Hamiltonian $H(\omega[0], \omega, 0, 0) =H(\omega, \omega, 0, 0)$ has the $\mathcal{N}=2$\, SUSY, and the Hamiltonian $H(\omega[1], \omega, 0, 0) =H(0, \omega, 0, 0)$ makes its spontaneous breaking. Cai \textit{et al.} have the trapped-ion technology to realize this limit in the case $C=0$. Indeed the linear interaction cannot, alone, do anything to enhance the mass, but it works for the mass enhancement with the help of the $A^{2}$-term. We explain this below. From now on, it is proved that the limit, $r\to 1$, has the advantage over the strong coupling limit in order that the Rabi model with the $A^{2}$-term avoid the no-go theorem and has the SUSY breaking. Let $g(r)$ be continuous a function of $1$-variable $r$, $0\le r \le 1$, satisfying $g(0)=0$ and $g(1)=\mathrm{g}$. The parameters $\Omega_{\mathrm{a}}$, $\Omega_{\mathrm{b}}$, $G$ are given by $\Omega_{\mathrm{a}}=\omega[r]$, $\Omega_{\mathrm{b}}=\omega$, $G=g(r)$. The Hamiltonian $H(\omega[r], \omega, g(r), 0)=H_{\mbox{\tiny Rabi}}(\omega[r], \omega, g(r))$ for the quantum Rabi model is denoted by $H_{\mbox{\tiny Rabi}}[r]$ for simplicity. The renormalized quantities $\widetilde{\omega}[r]$ and $\widetilde{g}[r]$ are given by $\widetilde{\omega}[r]= \sqrt{\omega^{2}+4C\omega g(r)^{2}\,}$ and $\widetilde{g}[r]=g(r)\sqrt{\omega/\widetilde{\omega}[r]}$. Then, the same argument as in \cite{hir15, hir17, hir20} gives \begin{eqnarray} &{}& H_{\mbox{\tiny Rabi}}[r] +\hbar Cg(r)^{2}\left( a+a^{\dagger}\right)^{2} +\hbar\frac{\widetilde{g}[r]^{2}}{\widetilde{\omega}[r]} \nonumber \\ &\longrightarrow& U_{A^{2}} U(\widetilde{\mathrm{g}}[1]/\widetilde{\omega}[1]) H(0, \widetilde{\omega}[1], 0, 0) U(\widetilde{\mathrm{g}}[1]/\widetilde{\omega}[1])^{*} U_{A^{2}}^{*} \label{eq:approx3} \end{eqnarray} in the norm resolvent sense \cite{rs1} as $r\to 1$. The naive reason why this limit is obtained is because the limit, $\omega[r]\to\omega[1]=0$, eliminates the second term of RHS of Eq.(\ref{eq:ut}). Eq.(\ref{eq:approx3}) says that the limit has the Hamiltonian $H(0, \widetilde{\omega}[1], 0, 0)$, and therefore, the Rabi model with $A^{2}$-term, described by $H_{\mbox{\tiny Rabi}}[r] +\hbar Cg(r)^{2}\left( a+a^{\dagger}\right)^{2} +\hbar\widetilde{g}[r]^{2}/\widetilde{\omega}[r]$, yields the SUSY breaking in the limit $r\to 1$. The limit in the norm resolvent sense guarantees the convergence of each energy level \cite{rs1}. Thus, it is worthy to note that how the transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking takes place, and how the energy gap is produced in that transition. The energy gap is governed by the parameter $C$ of the $A^{2}$-term. The energy spectrum is checked with QuTiP \cite{nori1, nori2}, for instance, as in Fig.\ref{fig:Fig_r}. In particular, the comparison of the two graphs of Fig.\ref{fig:Fig_r} shows the energy gap caused by the $A^{2}$-term. \begin{figure}[h \centering \includegraphics[width=0.45\textwidth]{C=0_r.eps} \quad \includegraphics[width=0.45\textwidth]{C=0-251_r.eps} \vspace*{17mm} \caption{Energy Spectrum of $H_{\mbox{\tiny Rabi}}[r]+\hbar Cg(r)^{2} \left( a+a^{\dagger}\right)^{2} +\hbar\widetilde{g}[r]^{2}/\widetilde{\omega}[r]$ with $\omega=6.2832$ and $\mathrm{g}=6.2832$: A ground state energy and six excited state energies from the bottom are shown in each graph. The left graph shows the energy spectrum for $C=0$. The right graph is for $C=0.2513$. The quantum Rabi models without $A^{2}$-term (i.e., $C=0$) and with $A^{2}$-term (i.e., $C>0$) have the transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking. In particular, the energy gap by the $A^{2}$-term appears in $\hbar\widetilde{\omega}[1]$ of the right graph. In these numerical computations, we employ $\omega[r]=(1-r)\omega$ and $g(r)=r\mathrm{g}$.}\label{fig:Fig_r} \end{figure} \section{Radiative mass-enhancement in SUSY breaking}\label{sec3} \subsection{Mathematical model for quantum simulation} We consider the position operator $X$ and the momentum operator $P$ acting in the boson Fock space $\mathcal{F}_{\mathrm{b}}$, and identify them $1\otimes X$ and $1\otimes P$ acting in the state space $\mathbb{C}\otimes\mathcal{F}_{\mathrm{b}}$, respectively. For these identified position and momentum operators, $X$, $P$, we give the Hamiltonian $H$ of a harmonic oscillator coupled with spin. This describes the energy operator of a $1$-mode massive boson coupled with the two-level atom. It is given by \begin{equation} H =\left(\frac{1}{2}P^{2}+\frac{\omega_{\mathrm{g}}^{2}}{2}X^{2}\right) \label{eq:h_XP} \end{equation} acting in the state space $\mathbb{C}\otimes\mathcal{F}_{\mathrm{b}}$, where $\hbar\omega_{\mathrm{g}}$ is the boson energy. We call this $1$-mode massive boson the `heavy boson.' We arbitrarily give a positive parameter $\omega$, a non-negative parameter $C$, and a positive constant $\mathrm{g}$ such that $\omega_{\mathrm{g}}^{2}=\omega^{2}+4C\omega\mathrm{g}^{2}$. We consider another Hamiltonian $H_{\mbox{\tiny SS}}$ for the position operator $x$ and the momentum operator $p$ acting in another boson Fock space $\mathcal{F}_{\mathrm{b}}$. The Hamiltonian $H_{\mbox{\tiny SS}}$ is popular in SUSY QM \cite{bin06, gmr11} and given by \begin{equation} H_{\mbox{\tiny SS}} =1\otimes\frac{1}{2}\left( p^{2}+W^{2}\right) +\frac{\hbar}{2}\sigma_{z}\otimes\frac{d W}{dx}, \label{eq:h_ss} \end{equation} where $W$ is the superpotential given by $W(x)=\omega x$. We omit `$\otimes$', and then, $H_{\mbox{\tiny SS}}=(1/2)\left( p^{2}+W^{2}+\hbar\sigma_{z}(dW/dx)\right)$. Our spin-boson interaction is based on $\sigma_{x}x$. It should be pointed out that the Pauli matrix $\sigma_{x}$ plays a role of the swap between the bosonic and fermionic states. We suppose that an extra second-order term $(\sigma_{x}x)^{2}=x^{2}$, different from the second-order term in Eq.(\ref{eq:h_ss}), appears in our interaction as well as the first-order term $\sigma_{x}x$. We prepare an interaction, \begin{equation} H_{\mathrm{int}}(r) =g(r)\sqrt{\frac{2\hbar}{\omega}}\, \sigma_{x}W +\frac{2C}{\omega}g(r)^{2}W^{2} +\frac{\hbar g(r)^{2}}{4Cg(r)^{2}+\omega} +\frac{1}{2}\hbar\sigma_{z}\frac{dW_{\mathrm{a}}(r)}{dx}, \label{eq:h_int} \end{equation} for $r$, $0\le r\le 1$, with some functions, $g(r)$, $W_{\mathrm{a}}(r)=\left(\omega_{\mathrm{a}}(r)-\omega\right)x$, $\omega_{\mathrm{a}}(r)$, of $r$. This interaction $H_{\mathrm{int}}(r)$ is introduced to cause a SUSY breaking for the SUSY Hamiltonian $H_{\mbox{\tiny SS}}$. Unlike Nambu and Jona-Lasinio's case \cite{nam61} and Goldstone's \cite{gol61}, the interaction $H_{\mathrm{int}}(r)$ has no Mexican-hat potential (i.e., Higgs potential). Thus, we expect that the extra second-order term in $H_{\mathrm{int}}(r)$ to play a role of radiatively making the mass enhancement via the help of $\sigma_{x}$ in the first-order term. Our total Hamiltonian reads $$ H(r)=H_{\mbox{\tiny SS}}+H_{\mathrm{int}}(r) $$ then. We control the interaction appearance using the functions $g(r)$ and $\omega_{a}(r)$, where $g(r)$ is a continuous function satisfying $g(0)=0$ and $g(1)=\mathrm{g}$, and $\omega_{\mathrm{a}}(r)$ is also a continuous function satisfying $\omega_{\mathrm{a}}(0)=\omega$ and $\omega_{\mathrm{a}}(1)=0$. Then, the total Hamiltonian attains the SUSY Hamiltonian at $r=0$: $H(0)=H_{\mbox{\tiny SS}}$. We bring up the parameter $r$ from $r=0$ to $r=1$ in the total Hamiltonian $H(r)$. Following the mathematical methods \cite{hir15, hir17, hir20}, we can show $H(r)\to H(1)$ as $r\to 1$ in the norm resolvent sense \cite{rs1}. As shown below, actually, $H(1)=H$. In the case $C=0$, it can mathematically be proved that this limit produces the transition from the $\mathcal{N}=2$\, SUSY at $r=0$ to its spontaneous breaking at $r=1$ in the same way as in \cite{hir15, cai22}. Cai \textit{et al.} report its two kinds of experimental observations in a trapped ion quantum simulator \cite{cai22}. The condition $C=0$ means that there is no mass-enhancement term in the interaction $H_{\mathrm{int}}(r)$, and there is no possibility that the SUSY breaking can yields a mass enhancement. In the case $C>0$, however, there is that possibility. We check this proposal in this paper. Thus, we allocate the mass-enhancement role to the second-order term, $2C\omega g(r)^{2}x^{2}$ with $C>0$, in our model, and theoretically show that for $C>0$ the mass enhancement takes place in the process of the transition from $\mathcal{N}=2$\, SUSY to its spontaneous breaking. We consider the limit, $H(r)\to H(1)$ as $r\to 1$. Defining the $1$-mode boson annihilation operator $B$ by $$ B=\sqrt{\frac{\omega_{\mathrm{g}}}{2\hbar}}\, X+i\sqrt{\frac{1}{2\hbar\omega_{\mathrm{g}}}}\, P, $$ the Hamiltonian $H$ of the heavy boson can be rewritten as $$ H=\hbar\omega_{\mathrm{g}}\left( B^{\dagger}B+\frac{1}{2}\right). $$ Meanwhile, we define the $1$-mode boson annihilation operator $b$ by $$ b=\sqrt{\frac{\omega}{2\hbar}}\, x+i\sqrt{\frac{1}{2\hbar\omega}}\, p. $$ We call this $1$-mode massive boson the `light boson' compared with the heavy boson. Then, we can rewrite the total Hamiltonian $H(r)$ of the light boson as $$ H(r) =H_{\mbox{\tiny Rabi}}(r) +\hbar Cg(r)^{2}( b+b^{\dagger})^{2} +\frac{\hbar g(r)^{2}}{4Cg(r)^{2}+\omega}, $$ where $H_{\mbox{\tiny Rabi}}(r)$ is the Hamiltonian of the quantum Rabi model \cite{rab36, rab37, bra11} given by $$ H_{\mbox{\tiny Rabi}}(r)=\hbar\omega\left( b^{\dagger}b+\frac{1}{2}\right) +\hbar g(r)\left( b+b^{\dagger}\right) +\frac{\hbar\omega_{\mathrm{a}}(r)}{2}\sigma_{z}. $$ The total Hamiltonian $H(r)$ is unitarily equivalent to the Hamiltonian $H(\omega_{\mathrm{a}}(r), \omega, g(r), C) +\hbar g(r)^{2}/(4Cg(r)^{2}+\omega)$ whose definition is given in Section \ref{sec2}. The second-order term $\hbar Cg(r)^{2}( b+b^{\dagger})^{2}$ is the $A^{2}$-term \cite{rza75, nat10}. The $A^{2}$-term naturally appears in quantum electrodynamics (QED) and cavity QED when the coupling strength $g(r)$ is not so small. Moreover, it may be controlled in circuit QED (see \cite{nat10} and Methods of \cite{yos17}). For every $r$, $0\le r\le 1$, we prepare functions, $\omega_{\mathrm{g}}(r)$ and $\widetilde{g}(r)$, of the $1$-variable $r$, $0\le r\le 1$, by as $\omega_{\mathrm{g}}(r)=\sqrt{\omega^{2}+4C\omega g(r)^{2}}$, and $\widetilde{g}(r)=g(r)\sqrt{\omega/\omega_{\mathrm{g}}(r)}$. Based on Eqs.(\ref{eq:hb-trans}) and (\ref{eq:ut}), we can make the unitary operator $U_{r}$, $0\le r\le 1$, by replacing $\Omega_{\mathrm{a}}$, $\Omega_{\mathrm{b}}$, $G$, $\Omega(G)$, and $\widetilde{G}$ by $\omega_{\mathrm{a}}(r)$, $\omega$, $g(r)$, $\omega_{\mathrm{g}}(r)$, and $\widetilde{g}(r)$, respectively, we obtain a unitary operator $U_{r}$. We define a boson annihilation operator $B_{r}$ and the spin operators $\mathcal{D}_{\pm}$ by \begin{align} B_{r}&=U_{r}bU_{r}^{*}=(c_{1}+c_{2})b+(c_{1}-c_{2})b^{\dagger} +\frac{\widetilde{g}(r)}{\omega_{\mathrm{g}}(r)}\, \sigma_{x}, \label{eq:unitrans1a} \\ \mathcal{D}_{\pm}&=U_{r}\sigma_{\pm} \exp\left[\pm 2\frac{\widetilde{g}(r)}{\omega_{\mathrm{g}}(r)} \left( b^{\dagger}-b\right)\right]U_{r}^{*} =-\, \frac{1}{2}\left(\sigma_{z}\mp i\sigma_{y}\right), \label{eq:unitras1b} \end{align} where $c_{1}=(1/2)\sqrt{\omega_{\mathrm{g}}(r)/\omega}$, $c_{2}=(1/2)\sqrt{\omega/\omega_{\mathrm{g}}(r)}$. Then, $B_{1}$ is unitarily equivalent to $B$ since $\omega_{\mathrm{a}}(1)=0$, $g(1)=\mathrm{g}$, $\omega_{\mathrm{g}}(1)=\omega_{\mathrm{g}}$, and $\widetilde{g}(1)=\widetilde{\mathrm{g}}\equiv\mathrm{g}\sqrt{\omega/\omega_{\mathrm{g}}}$. Thus, we identify $B_{1}$ with $B$, i.e., $B_{1}=B$, from now on. We note the canonical commutation relation and canonical anticommutation relation respectively hold: \begin{align*} \left[ B_{r}, B_{r}^{\dagger}\right]=\left[ b, b^{\dagger}\right]=1,\qquad \left\{ \mathcal{D}_{-}, \mathcal{D}_{+}\right\}=1,\qquad \left\{ \mathcal{D}_{\pm}, \mathcal{D}_{\pm}\right\}=0. \end{align*} In addition, we realize the spin-chiral symmetry, $$ [\sigma_{x}, B_{r}]=[\sigma_{x}, B_{r}^{\dagger}]=0. $$ Eq.(\ref{eq:unitrans1a}) says that the boson described by $B_{r}$ and $B_{r}^{\dagger}$ consists of the pair of the annihilation and creation of the light boson with the swap between the bosonic and fermionic states. This pair is produced following the (meson) pair theory \cite{ht62, hir17, hir20}. In particular, since $B_{1}=B$, the heavy boson is a quasi-particle of the light boson. Eq.(\ref{eq:unitras1b}) says that the heavy boson cannot see the displacement by the light boson in the spin. Then, we have the equation between the Hamiltonian described by the light boson coupled with the spin and the Hamiltonian described by the heavy boson coupled with the spin, \begin{align} \hbar\omega_{\mathrm{g}}(r)\left( B_{r}^{\dagger}B_{r}+\frac{1}{2}\right) -\, \frac{\hbar\omega_{\mathrm{a}}(r)}{2} \left(\mathcal{D}_{-}+\mathcal{D}_{+}\right) = H(r). \label{eq:unitrans2} \end{align} We have $\omega_{\mathrm{a}}(1)=0$, and $\omega_{\mathrm{g}}(1)=\omega_{\mathrm{g}}$ because $g(1)=\mathrm{g}$. Thus, we obtain the limit \begin{align*} H(r)&= H_{\mbox{\tiny Rabi}}(r)+\hbar Cg(r)^{2}( b+ b^{\dagger})^{2} +\frac{\hbar g(r)^{2}}{4Cg(r)^{2}+\omega} \\ &\longrightarrow H= \hbar\omega_{\mathrm{g}}\left( B^{\dagger}B+\frac{1}{2}\right) \end{align*} as $r\to 1$. This limit is consistent with Eq.(\ref{eq:approx3}) and its rephrasing in the present case. \subsection{Mechanism of radiative mass-enhancement} We introduce the $1$-mode field $\Phi_{r}$ and its conjugate field $\Pi_{r}$ of the boson getting heavy by $$ \Phi_{r}=\sqrt{\frac{\hbar}{2\omega_{\mathrm{g}}(r)}}\left( B_{r}+B_{r}^{\dagger}\right),\qquad \Pi_{r}=-i\sqrt{\frac{\hbar\omega_{\mathrm{g}}(r)}{2}}\left( B_{r}-B_{r}^{\dagger}\right) $$ for $0\le r\le 1$. We denote $\Phi_{1}$ and $\Pi_{1}$ by $\Phi$ and $\Pi$, respectively, because $B_{1}=B$. Then, we have $[\Phi_{r}, \Pi_{r}]=i\hbar$. The Lagrangian $L_{r}$ corresponding to $H(r)$ is given by $$ L_{r}=\frac{1}{2}\Pi_{r}^{2}-\frac{\omega_{\mathrm{g}}(r)^{2}}{2}\Phi_{r}^{2} +\frac{\hbar\omega_{\mathrm{a}}(r)}{2} \left(\mathcal{D}_{-}+\mathcal{D}_{+}\right). $$ In particular, we have \begin{align} L_{1}=\frac{1}{2}\Pi^{2}-\frac{\omega_{\mathrm{g}}^{2}}{2}\Phi^{2} \label{eq:L1a} \end{align} since $\omega_{\mathrm{a}}(1)=0$. The Lagrangian $L_{1}$ corresponds to the Hamiltonian $H$ since $B=B_{1}$. We introduce a field $\phi$ and its conjugate field $\pi$ of the light boson by \begin{align*} \phi=\sqrt{\frac{\hbar}{2\omega}}\left( b+b^{\dagger}\right),\qquad \pi=-i\sqrt{\frac{\hbar\omega}{2}}\left( b-b^{\dagger}\right). \end{align*} We use the fields, $\phi$, $\pi$, as auxiliary fields for the fields, $\Phi_{r}$, $\Pi_{r}$. Taking the limit $r\to 1$, we have $L_{r}\to L_{1}$. Thus, inserting Eq.(\ref{eq:unitrans1a}) into $L_{r}$, we obtain \begin{align} L_{r} =&\,\,\frac{1}{2}\pi^{2}-\frac{\omega^{2}}{2}\phi^{2} - g(r)\sqrt{2\hbar\omega}\, \sigma_{x}\phi -2C\omega g(r)^{2}\phi^{2} \nonumber \\ &-\frac{\hbar g(r)^{2}}{4Cg(r)^{2}+\omega} -\,\frac{\hbar\omega_{\mathrm{a}}(r)}{2}\sigma_{z} \nonumber \\ \mathop{\longrightarrow}_{r\to 1}&\,\, L_{1}=\frac{1}{2}\pi^{2}-\frac{\omega_{\mathrm{g}}^{2}}{2}\phi^{2} - \mathrm{g}\sqrt{2\hbar\omega}\, \sigma_{x}\phi -\frac{\hbar \mathrm{g}^{2}}{4C\mathrm{g}^{2}+\omega}. \label{eq:L1b} \end{align} In the Lagrangian $L_{r}$, an extra second-order term, $2C\omega g(r)^{2}\phi^{2}$, appears. Indeed an effect of $\sigma_{x}$ is invisible in it since $\sigma_{x}^{2}=1$, but the interaction in the Lagrangian $L_{r}$ is basically constructed with $\sigma_{x}\phi$ which makes the swap between creation and annihilation of bosons and the swap between the bosonic and fermionic states. The increment of the mass enhancement is included in the factor, $4C\omega\mathrm{g}^{2}$, in the renormalized frequency $\omega_{\mathrm{g}}$. Considering the dimension, the mass increment $\Delta m$ is given by $\omega_{\mathrm{g}}=\sqrt{\omega^{2}+(\Delta m)^{2}/\hbar^{2}}$, that is, $\Delta m=2\sqrt{C\omega}\,\hbar\mathrm{g}$. We here summarize the above results. 1) The transition changes the free field $\phi$ of the light boson to the free field $\Phi$ of heavy boson. The heavy boson obtains a part of its mass from the excitation of the light boson then, caused by the $A^{2}$-term. 2) The Lagrangian $L_{1}$ has the spin-chiral symmetry, $[\sigma_{x}, L_{1}]=0$, though the Lagrangian $L_{r}$ does not have it, $[\sigma_{x}, L_{r}]\ne 0$, for $0\le r<1$ because of the existence of the spin term, $-\hbar\omega_{\mathrm{a}}(r)\sigma_{z}/2$. We can restate the results in terms of Hamiltonian. The transition from the Hamiltonian $H(0)=H_{\mbox{\tiny SS}}$ of the light boson to the Hamiltonian $H(1)=H$ of the heavy boson is obtained: \begin{align} H(0)&=H_{\mbox{\tiny SS}}=\hbar\omega\left( b^{\dagger}b+\frac{1}{2}\right) +\frac{\hbar\omega}{2}\sigma_{z} \nonumber \\ &\Longrightarrow H(1)=H=\hbar\omega_{\mathrm{g}}\left( B^{\dagger}B+\frac{1}{2}\right), \label{eq:transition} \end{align} where we omit the 2-by-2 identity matrix $1$. According to the facts in Section \ref{sec2}, Eq.(\ref{eq:transition}) says that the transition brings the $\mathcal{N}=2$\, SUSY Hamiltonian $H(0)$ to the its spontaneous-breaking Hamiltonian $H(1)$, and the transition yields the mass enhancement with the increment $\Delta m=2\sqrt{C\omega}\,\hbar\mathrm{g}$, determined by $\omega_{\mathrm{g}}^{2}=\omega^{2}+(\Delta m)^{2}/\hbar^{2}$ coming from the increment of the mass term, $-\left((\Delta m)^{2}/(2\hbar^{2})\right)\phi^{2}$. It is worthy to note again that Cai \textit{et al.} report the observation of the transition, Eq.(\ref{eq:transition}), in the case $C=0$ \cite{cai22}. This SUSY breaking induces the spontaneous breaking with respect to the spin-chiral symmetry; namely, $H(1)$ satisfies $[\sigma_{x}, H(1)]=0$ and has the two degenerate ground states. Actually, the ground states are $\mid\uparrow\rangle\otimes\mid\!0\rangle$ and $\mid\downarrow\rangle\otimes\mid\!0\rangle$. Combining Eq.(\ref{eq:hb-trans}) and the result of \cite{hh14}, we know that $H(r)$ has a unique ground state for $0\le r<1$, and then, $\left[\sigma_{x}, H(r)\right]=-i\hbar\omega\sigma_{y}$, $0\le r<1$. It is important that the swap matrix, $\sigma_{x}$, plays a role of the swap between the bosonic and fermionic states. Since each energy level of $H(r)$ is guaranteed for its convergence as $r\to 1$ by the limit in the norm resolvent sense (see Theorem VIII.24 of \cite{rs1}), we are interested in the energy spectrum of $H(r)$ for every $r$, $0\le r\le 1$. Fig.\ref{fig:Fig_1} shows its two examples by numerical calculations with QuTiP \cite{nori1, nori2}. \begin{figure}[h \centering \includegraphics[width=0.45\textwidth]{C=0-628_r.eps} \quad \includegraphics[width=0.45\textwidth]{C=1-257_r.eps} \vspace*{17mm} \caption{Mass Enhancement in Energy Spectrum of $H(r)$ with $\omega=6.2832$ and $\mathrm{g}=6.2832$ : A ground state energy and six excited state energies from the bottom are shown in each graph. The graphs show the energy spectrum for $C=0.628$ and $C=1.257$, respectively. In these numerical calculations, $\omega_{\mathrm{a}}(r)=(1-r)\omega$ and $g(r)=r\mathrm{g}$ are employed.}\label{fig:Fig_1} \end{figure} \section{Conclusion and discussion}\label{sec4} We have proposed a mathematical model, though very simple, for quantum simulation of a mass enhancement in the SUSY breaking. This model is based on the quantum Rabi model with the $A^{2}$-term, and reveals a transition from the $\mathcal{N}=2$\, SUSY to its spontaneous breaking. We have proved that the $A^{2}$-term works for the mass enhancement with the help of the linear interaction. We have shown that, in the process of the transition, the heavy boson obtains a part of its mass from the excitation of the light boson. In the case without the $A^{2}$-term, the transition is experimentally observed in a trapped ion quantum simulator by Cai \textit{et al.} \cite{cai22}. Thus, a future experimental problem would be whether $A^{2}$-term can be added to their experimental set-ups in a quantum simulator, and an experimental observation of the energy spectrum can be performed. The results in this paper raise the following issues: Can we see the mode of the so-called Goldstino (i.e., Nambu-Goldstone fermion) \cite{bin06, bau15a, bau15b, san16, ma21} in the SUSY breaking for the model in this paper? Can we grasp the Goldstino's influence on the mass enhancement in the mechanism given in this paper? If so, what is the mathematical characterization between the Goldstino and $\sigma_{x}\phi$, the field with the swap between the bosonic and fermionic states, for its observation in a quantum simulation? \begin{acknowledgments} The author acknowledges the support from JSPS Grant-in-Aid for Scientific Researchers (C) 20K03768. He wishes to thank Masahiko Ichimura for his comment. He would like to dedicate this study to Hiroshi Ezawa and Elliott H. Lieb on the occasions of their 90th birthdays. \end{acknowledgments}
\section*{Acknowledgement} Min H.~Kim acknowledges funding from Samsung Electronics, in addition to the partial support of the MSIT/IITP of Korea (RS-2022-00155620, 2022-0-00058, and 2017-0-00072), the NIRCH of Korea (2021A02P02-001), Microsoft Research Asia, and the Samsung Research Funding Center (SRFC-IT2001-04) for developing 3D imaging algorithms. James Tompkin thanks US NSF CAREER-2144956. \section{Appendix} \label{sec:appendix} \subsection{Metrics} For depth evaluation, we use the following metrics: \begin{itemize} \item MAE: $\frac{1}{n}\sum |d - d^*|$ \item RMSE: $\sqrt{\frac{1}{n}\sum (d - d^*)^2}$ \item MAE Rel.: $\frac{1}{n}\sum |d - d^*|/d^*$ \item RMSE Rel.: $\sqrt{\frac{1}{n}\sum \left((d - d^*)/d^*\right)^2}$ \item Bad ratio: percentage of pixel with error $|d - d^*|$ above threshold \end{itemize} with $d$ the estimated depth, $d^*$ ground truth, $n$ the number of valid pixels. \subsection{Implementation Details} \mparagraph{Fusion training} We initialize $\tau=140$ and the RAFT-stereo weights using Middlebury checkpoints. For training, we run 10k iteration with a batch size of 4 and a crop size of 640$\times$1440 pixels. \mparagraph{Mip-NeRF optimization} The ToF depth loss is scaled by an exponential decay $N_0\exp^{-\lambda i / m}$ where $N_0=10$, $\lambda=8$, $i$ is the current iteration and $m$ is the total number of iterations. We train Mip-NeRF for 200k iterations and a batch size of 4096 rays. \subsection{Additional Results} \NEW{ \mparagraph{Additional Scenes} Figure~\ref{fig:snapshot_comparison_2} shows more ToF/stereo fusion results captured with our phone. \mparagraph{Input ToF} Figure~\ref{fig:tof_vs_ours} shows the depth estimated from the ToF sensor and our fusion results. Depth from ToF is much noisier and lower resolution, with blurry depth edges. } \begin{figure}[htp] \centering \resizebox{\columnwidth}{!}{\input{figs/snapshot_comparison_2.pdf_tex}} \caption{\label{fig:snapshot_comparison_2} \NEW{Additional mobile ToF/stereo fusion results.} } \end{figure} \begin{figure}[htp] \centering \resizebox{\columnwidth}{!}{\input{figs/tof_vs_ours.pdf_tex}} \caption{\label{fig:tof_vs_ours} \NEW{Input ToF depth and our fusion results.} } \end{figure} \begin{figure}[htbp] \centering \resizebox{0.75\columnwidth}{!}{\input{figs/synth3.pdf_tex}} \caption{\label{fig:synth3} Our ToF/stereo fusion results on the rendered SYNTH3 dataset \cite{agresti2017fusion}. } \end{figure} \begin{figure}[htbp] \centering \resizebox{\columnwidth}{!}{\input{figs/real3.pdf_tex}} \caption{\label{fig:real3} Our ToF/stereo fusion results on REAL3 dataset \cite{agresti2019fusion_synthetic}. } \end{figure} \begin{figure}[htbp] \centering \resizebox{\columnwidth}{!}{\input{figs/lttm5.pdf_tex}} \caption{\label{fig:lttm5} Our ToF/stereo fusion results on LTTM5 dataset \cite{mutto2015probabilisticFusion}. } \end{figure} \begin{figure}[htbp] \centering \resizebox{\columnwidth}{!}{\input{figs/calibration_failure.pdf_tex}} \vspace{-5mm} \caption{\label{fig:calibration_failure} \NEW{Estimating innacurate calibration parameters can lead to poor rectification. (b) rectifying the stereo pair based on Gao et al.~\cite{gao2017selfcalibratingtof}'s approach aggressively crops the images and they are not horizontally aligned (see the vertical shift of the checkerboard corner). (c) Our calibration provides more sensible results and the images of stereo pair are aligned.} } \end{figure} \begin{table}[t] \centering \caption{\label{tab:fusion_comparison} Disparity error of stereo+ToF fusion techniques. Reported numbers are from respective works, except for $\dagger$ that have been evaluated in \cite{agresti2019fusion_synthetic}. Our method outperforms others on the real-world datasets REAL3 \cite{agresti2019fusion_synthetic} and LTTM5 \cite{mutto2015probabilisticFusion}. \NEW{We show the results of guided ToF upsampling as ``Interpolated ToF'' for reference.} } \begin{tabular}{l rr rr rr} \toprule & \multicolumn{2}{c}{SYNTH3} & \multicolumn{2}{c}{REAL3} & \multicolumn{2}{c}{LTTM5} \\ & MAE & MSE & MAE & MSE & MAE & MSE \\ \midrule \NEW{Interpolated ToF~\cite{agresti2019fusion_synthetic}} & 0.66 & 4.75 & 2.55 & 10.76 & 1.53 & 11.68 \\ Marin et al.~\cite{Marin2016ReliableFO}$^\dagger$ & 0.64 & 4.20 & 2.19 & 8.82 & 1.15 & 7.67 \\ Agresti et al.~\cite{agresti2019fusion_synthetic} & 0.53 & 3.92 & 1.65 & 8.35 & 0.89 & 7.40 \\ Deng et al. \cite{yong2021fusion} & 0.30 & \textBF{1.84} & 0.93 & 5.84 & 0.79 & 3.47 \\ Dal Mutto et al. \cite{Mutto2012LocallyCT} & -- & -- & -- & -- & 1.43 & 12.21 \\ Dal Mutto et al. \cite{mutto2015probabilisticFusion} & -- & -- & -- & -- & 1.36 & 10.06 \\ Ours & \textBF{0.26} & 2.14 & \textBF{0.67} & \textBF{4.10} & \textBF{0.45} & \textBF{1.52} \\ \bottomrule \end{tabular} \vspace{-0.45cm} \end{table} \begin{table}[t] \centering \caption{\label{tab:plenoxels_vs_nerf} Plenoxels shows good novel view synthesis, but depth maps from Mip-NeRF are more accurate. Evaluated on the NeRF synthetic datasets~\cite{mildenhall2020nerf}. } \begin{tabular}{l rr rrrr} \toprule \rule{0pt}{2.2ex} & \multicolumn{2}{c}{Bad ratio (\%)} & \multicolumn{4}{c}{Depth error} \\ & $>$0.2 & $>$0.05 & MAE Rel. & RMSE Rel. & MAE & RMSE \\ \midrule Plenoxels~\cite{yu2021plenoxels} & {11.84} & {55.84} & {0.032} & {0.139} & {0.120} & {0.275} \\ Mip-NeRF~\cite{barron2021mipnerf} & {0.93} & {6.65} & {0.005} & {0.024} & {0.019} & {0.049} \\ \bottomrule \end{tabular} \end{table} \mparagraph{Stereo+ToF Fusion Evaluation on other Datasets} We evaluate our fusion on SYNTH3 \cite{agresti2017fusion}, REAL3 \cite{agresti2019fusion_synthetic} and LTTM5 \cite{mutto2015probabilisticFusion}. Note that None of those datasets show the strong challenges encountered in the mobile environment, with higher power ToF modules and low distortion. In addition, their resolution is lower and raw ToF measurements are not provided, making the results not directly applicable to our phone. However, they allow us to compare against numerous methods without reimplementation. SYNTH3 \cite{agresti2017fusion} dataset features 15 scenes rendered following \cite{Meister2013tofrender}. REAL3 \cite{agresti2019fusion_synthetic} features eight scenes captured with a ZED stereo camera and a Microsoft Kinect v2 ToF depth camera. Ground truth disparity is obtained with a line laser. LTTM5 \cite{mutto2015probabilisticFusion} consists of five scenes captured with two BASLER scA1000 RGB cameras and a MESA SR4000 ToF camera. Ground truth is acquired by spacetime stereo~\cite{zhang2003spacetime,Davis2005spacetime}. To accommodate for REAL3 and LTTM5's low RGB resolution, we linearly upsample the input stereo images two times in horizontal and vertical directions. Since ToF raw measurements are not available, we remove the confidence based on the difference between the estimated distance from the two frequencies. We also account for the intensity scale difference in the amplitude maps by setting $\sigma_A = 0.001$. We present our results on these datasets in Table~\ref{tab:fusion_comparison} and on Figures \ref{fig:real3} and \ref{fig:lttm5}. \mparagraph{Runtimes} On our test system equipped with an NVIDIA RTX 3090, our online calibration takes 4.4 seconds and fusion takes 1.4 seconds. \NEW{\mparagraph{Comparison against Plenoxels} Table~\ref{tab:plenoxels_vs_nerf} shows that Mip-NeRF~\cite{barron2021mipnerf} is better than Plenoxels~\cite{yu2021plenoxels} at estimating depth maps. We therefore use MipNeRF as a basis to generate training data. } \NEW{\mparagraph{Calibration Failure} Figure~\ref{fig:calibration_failure} shows an example of total calibration failure for Gao et al.~\cite{gao2017selfcalibratingtof}. Due to this, we use our calibration when comparing our fusion method against others in the main paper. } \bibliographystyle{splncs04} \subsection{Applications} \paragraph{Geometry-Aware Image Editing} \begin{figure} \centering \resizebox{\columnwidth}{!}{\input{../figs/applications.pdf_tex}} \caption{\label{fig:applications} Depth-aware image editing. \ANDREAS{Fix figure layouts} } \end{figure} \paragraph{Novel View Synthesis} \begin{figure} \centering \resizebox{\columnwidth}{!}{\input{../figs/nvs_comparison.pdf_tex}} \caption{\label{fig:nvs_comparison} Novel view synthesis application. } \end{figure} \begin{table}[htpb] \centering\footnotesize \begin{tabular}{l|rrr} \hline \rule{0pt}{2.2ex} & PSNR & SSIM & LPIPS \\ \hline \cite{shih2020inpainting3Dphoto} (w/ MiDaS \cite{Ranftl2020MiDaS})\\ \cite{shih2020inpainting3Dphoto} (w/ reprojected ToF)\\ \cite{shih2020inpainting3Dphoto} (w/ our depth) \\ \hline \end{tabular} \caption{\label{tab:nvs_application} Including our depth map to view synthesis pipelines improves the novel views' quality. } % \end{table} \subsection{Limitations} \label{sec:limitations} While our approach applies to indoor environments, the reliance on ToF and stereo prevents application in some scenarios. First, the ToF module cannot estimate depth accurately at large distances due to its low power. Second, ToF depth estimation is not reliable within strong IR ambient illumination (e.g., direct daylight). Since our calibration relies directly on ToF measurements, it becomes inaccurate if no ToF depth can be estimated. In addition, some materials---particularly translucent or specular materials---are challenging for both ToF and stereo depth estimation and cannot be tackled by our fusion approach. \section{Conclusion} Optical-image-stabilized lenses are now common but present problems for pose estimation when wanting to fuse information across multiple sensors in a camera system. This limits our ability to estimate high-quality depth maps from a single snapshot. Our method is designed for consumer devices, tackling calibration and robust sensor fusion for indoor environments. As our approach uses only a single snapshot and does not exploit camera motion for pose estimation, the acquisition is quick and could be used on dynamic scenes. \NEW{Evaluated on real-world inputs, our method estimates more accurate depth maps than state-of-the-art ToF and stereo fusion methods.} \section{Introduction} \label{sec:intro} Advances in computational photography allow many applications such as 3D reconstruction~\cite{Ha2021NormalFusion}, view synthesis~\cite{kopf2020oneshot3Dphoto,shih2020inpainting3Dphoto}, depth-aware image editing~\cite{Wadhwa2018,zhang2019defocus}, and augmented reality~\cite{Holynski2018densification,Valentin2018filter}. Vital to these algorithms is \emph{high-accuracy per-pixel depth}, e.g., to integrate virtual objects by backprojecting high-resolution camera color into 3D. To this end, smartphones now have camera systems with multiple sensors, lenses of different focal lengths, and active-illumination time-of-flight (ToF). For instance, correlation-based ToF provides depth by measuring the travel time of infrared active illumination with a gated infrared sensor. \begin{figure*}[t] \centering \resizebox{\textwidth}{!}{\input{figs/teaser_w_closups.pdf_tex}} \vspace{-0.5cm} \caption{\label{fig:teaser} (a) Multi-modal smartphone imaging. (b) Reference RGB image. (c) ToF depth reprojected to the reference. (d) Our depth from floating fusion. } \vspace{-0.25cm} % \end{figure*} We consider two challenges in providing high-accuracy per-pixel depth: \NEW{(1) ToF} sensor spatial resolution is orders of magnitude less than that of its compatriot color cameras. RGB spatial resolution has increased dramatically on smartphones---12--64 million pixels is common---whereas ToF is often 0.05--0.3 million pixels. One might correctly think that fusing depth information from ToF with depth information from color camera stereo disparity is a good strategy to increase our depth resolution. Fusion might also help us overcome the low signal-to-noise ratio in ToF signals that arises from the low-intensity illumination of a battery-powered device. For fusion, we need to accurately know the geometric poses of all sensors and lenses in the camera system. This leads to our second challenge: (2)~As RGB spatial resolution has increased, smartphones now use optical image stabilization \cite{sachs2006image,Wang2017phoneIOS}: a \emph{floating} lens compensates for camera body motion to avoid motion blur during exposure. Two low-power actuators suspend the lens body vertically and horizontally to provide a few degrees of in-plane rotation or translation, similar to how a third actuator translates the lens along the optical axis for focus. The magnetic actuation varies with focus and even with the smartphone's orientation due to gravity, and the pose of the stabilizer is not currently possible to measure or read out \NEW{electronically}. As such, we can only use a fusion strategy if we can automatically optically calibrate the geometry of the floating lens for each exposure taken. This work proposes a \emph{floating fusion} algorithm to provide high accuracy per pixel depth estimates from an optically-image-stabilized camera, a second RGB camera, and a ToF camera (Fig.~\ref{fig:teaser}). We design an online calibration approach for the floating lens that uses ToF measurements and dense optical flow matching between the RGB camera pair. This lets us form 2D/3D correspondences to recover intrinsic, extrinsic, and lens distortion parameters in an absolute manner (not `up to scale'), and for every snapshot. This makes it suitable for dynamic environments. Then, to fuse multi-modal sensor information, we build a correlation volume that integrates both ToF and stereo RGB cues, \NEW{then predict disparity via a learned function. There are few large multi-modal datasets to train this function, and synthetic data creation is expensive and retains a domain gap to the real world.} Instead, we capture real-world scenes with multiple views and optimize a neural radiance field~\cite{barron2021mipnerf} with ToF supervision. The resulting depth maps are lower noise and higher detail than those of a depth camera\NEW{, and provide us with high-quality training data.} For validation, we build a test dataset using a Kinect Azure and show that our method outperforms other traditional and data-driven approaches for snapshot RGB-D imaging. \section{Method} We use an off-the-shelf Samsung Galaxy S20+ smartphone. This has the main camera with a 12MP color sensor and a magnetic mount 79° lens for stabilization and focusing, a secondary 12MP color camera with a fixed ultrawide 120° lens, and a 0.3MP ToF system with an infrared fixed 78° lens camera and infrared emitter (Fig.~\ref{fig:teaser}a). As the ultrawide camera and the ToF module are rigidly fixed, we calibrate their intrinsics $K_{\text{UW}},K_{\text{ToF}}$, extrinsics $[R|t]_{\text{UW}},[R|t]_{\text{ToF}}$, and lens distortion parameters using an offline method based on checkerboard corner estimation. We use a checkerboard with similar absorption in the visible spectrum as in infrared. However, calibrating the floating main camera (subscript $_{\text{FM}}$) is not possible offline, as its pose changes from snapshot to snapshot. OIS introduces lens shift in $x,y$ for stabilization and in $z$ for focus, with the $z$ direction inducing additional lens distortion changes. The lens also tilts (pitch/yaw rotations) depending on the phone's orientation because of gravity. As such, we must estimate per snapshot a new intrinsic matrix $K_{\text{FM}}$, new extrinsic matrix $[R|t]_{\text{FM}}$, and three radial and two tangential distortion coefficients $\{k_1,k_2,k_3,p_1,p_2\}_\text{FM}$ from the Brown-Conrady model~\cite{conrady1919lens,brown1966lens} for the main floating camera. To tackle this challenge, we present a method to estimate these parameters at an absolute scale (not relative or `up to scale'). \subsection{ToF Depth Estimation} \label{sec:tof_depth} \begin{figure*}[t] \centering \resizebox{\textwidth}{!}{\input{figs/tof_breakdown.pdf_tex}} \caption{\label{fig:tof} ToF depth estimation from raw measurements. From raw ToF images for two different frequencies (a), we estimate a coarse but unwrapped phase map~(b) and a finer but wrapped phase map (c). By unwrapping $\phi_{100\text{MHz}}$ using the lower frequency phase $\phi_{20\text{MHz}}$, we estimate a more accurate depth map. } \end{figure*} The ToF system modulates its infra-red light source by 20MHz and 100MHz square waves, and alternates between both frequencies sequentially. The sensor captures four shots per frequency, with the same modulation as the light source shifted by 90 degrees. With two frequencies, we obtain eight raw ToF measurements per snapshot: \begin{equation} Q_{f,\theta},\ \hspace{4mm} f\in \{20\text{MHz}, 100\text{MHz}\}, \hspace{4mm} \theta \in \{0, \pi/2, \pi, 3\pi/2\}, \end{equation} where $f$ is the modulation frequency and $\theta$ is the sensor phase shift. Figure~\ref{fig:tof}(a) shows an example of captured ToF measurements. To estimate depth, the first step is to estimate phase (Figures~\ref{fig:tof}(b) and~\ref{fig:tof}(c)) for each modulation frequency: \begin{equation} \phi_f = \text{arctan2}\left(Q_{f,\pi} - Q_{f,0}, Q_{f,3\frac{\pi}{2}} - Q_{f,\frac{\pi}{2}}\right). \end{equation} From these phases, we can estimate the distance: \begin{equation} \label{eq:phase2depth} d_f = \frac{c}{4\pi f}\phi_f + k_f\frac{c}{2f}, \hspace{4mm} k_f\in\mathbb{N}, \end{equation} with $c$ the speed of light. This equation shows that, given a phase, the depth is known up to a $k_f\frac{c}{2f}$ shift. That is, we observe phase wrapping. The ToF depth variance is inversely proportional to the modulation frequency \cite{Li2014tofTIintro}. Therefore, the higher frequency tends to be more accurate; however, the wrapping range is shorter ($\approx$1.5m for 100MHz against $\approx$7.5m for 20MHz). Since the ToF illumination is low power, the signal becomes weak for further objects, making the phase estimation highly unreliable beyond the wrapping point of the lower frequency. Based on this, we assume that $\phi_{20\text{MHz}}$ does not show phase wrapping: $k_{20\text{MHz}} := 0$. Therefore, we unwrap $\phi_{100\text{MHz}}$ using $\phi_{20\text{MHz}}$ to benefit from the lower depth variance associated with a higher frequency without the phase wrapping ambiguity. In detail, we find $\hat k_{100\text{MHz}}$ that minimizes the depth difference between the two frequencies: \begin{equation} \hat k_{100\text{MHz}} = \underset{k}{\text{argmin}}\left|d_{20\text{MHz}} - \frac{c}{4\pi \cdot10^8}\phi_{100\text{MHz}} + k\frac{c}{2\cdot10^8} \right|. \end{equation} From this, we can compute the distance $d_{100\text{MHz}}$, which will be used to obtain the depth $d_{ToF}$ (Figure~\ref{fig:tof}d). For more details on ToF, refer to~\cite{hansard2012tofbook,Li2014tofTIintro}. With the estimated depth, we assign a confidence map $\omega$ based on the signal's amplitude, the concordance between $d_{20\text{MHz}}$ and $d_{100\text{MHz}}$ and local depth changes. First, we assign lower scores when the signal is weak: \begin{equation} \omega_A = \exp\left(-{1}/\sum_{f}A_f / (2 \sigma_A^2)\right), \end{equation} With $A_f = \sqrt{(Q_{f,0} - Q_{f,\frac{\pi}{2}})^2 + (Q_{f,\pi} - Q_{f,3\frac{\pi}{2}})^2} / 2$ and $f \in \{20\text{MHz}, 100\text{MHz}\}$. We also take into account the difference between the estimated distance from the two frequencies: \begin{equation} \omega_d = \exp\left(-|d_{20\text{MHz}} - d_{100\text{MHz}}|^2 / (2 \sigma_d^2)\right). \end{equation} Since ToF is less reliable at depth discontinuities, we deem areas with large depth gradient to be less reliable: \begin{equation} \omega_\nabla = \exp\left(-\|\nabla d_\text{ToF}\|^2 / (2 \sigma_\nabla^2)\right) \cdot \exp\left(-\|\nabla (1/d_\text{ToF})\|^2 / (2 \sigma_\nabla^2)\right). \end{equation} The complete confidence is: $\omega = \omega_A \omega_d \omega_\nabla$. For our experiments, we set $\sigma_A = 20$, $\sigma_d = 0.05$, and $\sigma_\nabla = 0.005$. \subsection{Online Calibration} \label{sec:calib} To calibrate our floating main camera, we need to find sufficient correspondences between known 3D world points and projections of those points in 2D. We must find a way to correspond our 3D points from ToF with the main camera even though it does not share a spectral response. Our overall strategy is to use the known fixed relationship between the ToF and ultrawide cameras and additionally exploit 2D color correspondences from the optical flow between the ultrawide and floating cameras. In this way, we can map from main camera 2D coordinates to ultrawide camera 2D coordinates to ToF camera 3D coordinates. While ToF can be noisy, it still provides sufficient points to robustly calibrate all intrinsic, extrinsic, and lens distortion parameters of the main camera. \mparagraph{From ToF to Ultrawide} The first step is to reproject the ToF depth estimates $d_{\text{ToF}}$ to the ultrawide camera. We transform the depth map to a point cloud $P$: \begin{equation} \label{eq:d_to_points} P_{\text{ToF}} = K^{-1}_{\text{ToF}} [u, v, d_{\text{ToF}}]^\top, \end{equation} where $K_{\text{ToF}}$ is the known ToF camera matrix, and $(u, v)$ are pixel coordinates with corresponding depth $d_{\text{ToF}}$. Then, the point cloud can be transformed to the ultrawide camera's space: \begin{equation} \label{eq:space_transform} P_{\text{UW}} = [R|t]_{\text{ToF} \rightarrow \text{UW}} [P_{\text{ToF}}^T|1]^\top, \end{equation} where $[R|t]_{ToF \rightarrow \text{UW}}$ is the relative transformation from the ToF camera space to the ultrawide camera space. From point cloud $P_{\text{UW}}$, we obtain the pixel coordinate $[u_{\text{UW}}, v_{\text{UW}}]$ of the ToF point cloud reprojected to the ultrawide camera: \begin{equation} \label{eq:points_2_uv} d_{\text{UW}} [u_{\text{UW}}, v_{\text{UW}}, 1] = K_{\text{UW}} P_{\text{UW}}. \end{equation} The reprojected ToF points $P_{\text{UW}}$ and their subpixel coordinates $[u_{\text{UW}}, v_{\text{UW}}]$ will be used to estimate calibration for our main camera in a later stage. \mparagraph{From Ultrawide to Floating Main} Next, we match the ultrawide camera to the floating main camera to be accurately calibrated. Since both cameras are located near to each other, they share a similar point of view, thus making sparse scale and rotation invariant feature matching unnecessary. As such, we use dense optical flow~\cite{teed2020raft} to find correspondences. To use flow, we first undistort the ultrawide camera image given its calibration, then rectify it \emph{approximately} to the floating main camera given an initial \emph{approximate} offline calibration. This calibration will be wrong, but as flow is designed for small unconstrained image-to-image correspondence, this rectification approach will still find useful correspondences. As output, we receive a 2D vector field $\mathcal{F}_{\text{UW}\rightarrow \text{FM}}$. \mparagraph{From ToF to Floating Main} We can now use the optical flow to form 2D/3D matches. For each ToF point reprojected to the ultrawide camera $P_{\text{UW}}$, we find the corresponding pixel in the floating camera: \begin{equation} \label{eq:uw_to_fm} [u'_{\text{FM}}, v'_{\text{FM}}] = [u_{\text{UW}}, v_{\text{UW}}] + \mathcal{F}_{\text{UW}\rightarrow \text{FM}}([u_{\text{UW}}, v_{\text{UW}}]). \end{equation} We sample the flow using bilinear interpolation since $[u_{\text{UW}}, v_{\text{UW}}]$ are estimated with subpixel precision. From this 2D/3D matching between the 2D points in the floating camera $[u'_{\text{FM}}, v'_{\text{FM}}]$ \NEW{and }the 3D points in the ultrawide camera space $P_{\text{UW}}$, we can estimate the floating camera's calibration. We first solve the optimization through RANSAC for outlier removal, followed by Levenberg-Marquardt optimization, obtaining the transformation between the two RGB cameras $[R, t]_{\text{FM} \rightarrow \text{UW}}$, as well as the camera matrix $K_{\text{FM}}$ and its distortion coefficients. Once the calibration is achieved, we rectify the two RGB images, enabling stereo/ToF fusion. \mparagraph{Discussion} Both Equations~\eqref{eq:points_2_uv} and~\eqref{eq:uw_to_fm} are not occlusion-aware but, due to the small baseline, occluded world points are only a small portion of the total number of matched points. RANSAC helps us to avoid outlier correspondences from occlusion, incorrect flow estimates, and noisy ToF estimates for calibration. Further, while we rely on a fixed RGB camera and ToF module, extending the approach to scenarios without fixed cameras is possible. Reliable feature matching between spectral domains has been demonstrated~\cite{efe2021dfm,zhu2019rgb_ir_matching,brown2011MultispectralSF} as well as RGB/IR optical flow~\cite{qiu2019tof_upsampling}. Using matching between the ToF module's IR camera and the RGB cameras, calibration can likely be achieved even if no second RGB camera exists as fixed with respect to the ToF module. \subsection{Fusing ToF and Stereo} \label{sec:fusion} Given the now-calibrated color stereo pair, and the ToF depth samples, we will fuse these into an accurate high-resolution depth map for a color camera. The first step is to build a correlation volume $\mathcal{C}_c$ from our RGB pair. A point in the volume $\mathcal{C}_c$ at coordinate $[u, v, u']$ represents the correlation between a pixel $[u, v]$ in the reference image and a pixel $[u', v]$ in the target image at some disparity. Thus, the correlation volume's shape is (width$\times$height$\times$width) since disparity is horizontal along the width direction. We compute correlation volume values by extracting 256-dim.~image features from each view using RAFT-stereo~\cite{lipson2021raft-stereo}'s learned feature encoder, then by taking the dot product of the feature vectors from each RGB camera for each disparity amount. \NEW{Note that the feature extraction process downsamples the images four times and a disparity map at original resolution is recovered through RAFT-stereo's convex upsampling.} For ease of evaluation, we use the fixed ultrawide camera as a reference, although the floating camera can be chosen without algorithmic change. A 3D world point $P_\text{ToF}$ corresponds to a 2D sensor coordinate $[u_{\text{UW}}, v_{\text{UW}}]$ in the ultrawide camera and in the floating main camera $[u_{\text{FM}}, v_{\text{FM}}]$ (see reprojection Equations~\eqref{eq:d_to_points},\eqref{eq:space_transform}, and \eqref{eq:points_2_uv})). A ToF point also has a confidence $\omega$ estimated along with the ToF depth maps. We leverage those points by increasing the correlation at the location of the sample points in the volume. For a point, the corresponding location in the volume is $[u_{\text{UW}}, v_{\text{UW}}, u_{\text{FM}}]$. Coordinates given by a ToF point $[u_{\text{UW}}, v_{\text{UW}}, u_{\text{FM}}]$ have eight integer neighbors with defined values in the correlation volume. We inject the ToF point into RAFT-stereo's correlation volume using linear-like weights: \begin{equation} \small \begin{split} \mathcal{C}(\lfloor u_{\text{UW}}\rfloor, \lfloor v_{\text{UW}}\rfloor, \lfloor u_{\text{FM}}\rfloor) = &\ \mathcal{C}_c(\lfloor u_{\text{UW}}\rfloor, \lfloor v_{\text{UW}}\rfloor, \lfloor u_{\text{FM}}\rfloor) ~+ \\ & \tau \cdot \omega \left((\lceil u_{\text{UW}}\rceil - u_{\text{UW}})(\lceil v_{\text{UW}}\rceil - v_{\text{UW}})(\lceil u_{\text{FM}}\rceil - u_{\text{FM}}) \right). \end{split} \end{equation} $\lfloor u\rfloor$ is the nearest integer $\leq$ u, and $\lceil \rceil$ is the nearest integer $\geq$ u. We perform the same operation for all eight integer points with coordinates around $[u, v, u']$. If several ToF points affect the same point in the correlation, their contributions accumulate. $\tau$ is a scalar parameter that is optimized during the training process. We then use the updated correlation volume $\mathcal{C}$ with the next steps of RAFT-stereo's pipeline to estimate disparity. Thanks to this approach, we efficiently and robustly combine stereo correlation cues and ToF measurements before estimating the depth map. \subsection{Dataset Generation} \label{sec:dataset} \mparagraph{Background} Learning-based stereo/ToF fusion methods require training data. For this, we optimize neural radiance fields~\cite{Lombardi2019neuralVolumes,mildenhall2020nerf,Lombardi2021neuralmixture} from RGB images. These allow querying density and appearance for every point in the scene, allowing us to render estimated depth maps. A typical volume rendering is as follows: \begin{equation} \label{eq:rendering} \hat{C}(r) = \sum_{i=1}^N T_i(1-\exp(-\sigma_i\delta_i))c_i, \end{equation} \NEW{where $\hat{C}(r)$ is the rendered color for the ray $r$, $\sigma_i$ and $c_i$ are the density and color of the representation at $i$ point. $N$ points are sampled along the ray $r$, where $\delta_i$ is the distance between neighboring samples, and $T_i=\exp\left(-\sum\nolimits_{i'<i}\sigma_{i'}\delta_{i'}\right)$ is the approximated transparancy between the ray origin and the sample.} This rendering is differentiable on the density and color of the sample points, allowing gradient-based optimization. To render depth maps from these representations, we swap the color term $c_i$ in Equation (\ref{eq:rendering}) for the depth of the point w.r.t.~the ray origin. \begin{figure}[t] \centering \resizebox{\columnwidth}{!}{\input{figs/nerfingmvs_vs_ours.pdf_tex}} \caption{\label{fig:nerfingmvs_vs_ours} NerfingMVS~\cite{wei2021nerfingmvs}'s results before filtering show more artifacts than ours. } \end{figure} \mparagraph{Design Choices and Our Approach} Despite improving on numerous aspects such as optimization time and novel view quality over neural representations, Plenoxels~\cite{yu2021plenoxels} produces fuzzy depth maps \NEW{(see the supplemental material).}% We also observe that NerfingMVS's~\cite{wei2021nerfingmvs} guided NeRF optimization based on reducing the sampling range around the expected depth tends to create artifacts (Figure~\ref{fig:nerfingmvs_vs_ours}) that require an additional filtering step~\cite{Valentin2018filter} for accurate depth maps. Since filtering at novel views is impossible, this approach is not suitable for creating training data for unseen views. Thus, we use MipNeRF~\cite{barron2021mipnerf} as a basis for our multiview depth estimation pipeline. This can naturally handle the resolution difference between the ToF and RGB cameras. For depth supervision~\cite{kangle2021dsnerf}, we use a straightforward approach similar to VideoNeRF~\cite{xian2021space}'s supervision on inverse depth maps computed from multi-view stereo: we add a loss using depth samples to the optimization: \begin{equation} \mathcal{L}_{depth} = \omega\left\|d_{\text{rendered}} - d_{\text{ToF}}\right\|_2^2, \end{equation} with the ToF confidence $\omega$ (Section~\ref{sec:tof_depth}). In addition to this supervision, we implement extrinsic and intrinsic refinement~\cite{jeong2021SCNeRF} following a 6D continuous rotation representation~\cite{zhou2019rotation}. Note that, since Mip-NeRF prevents too high frequencies in positional encoding and poses and that the intrinsics are well initialized, a coarse-to-fine positional encoding~\cite{lin2021barf} is not required. Our training and validation datasets have eight scenes with around 100 snapshots per scene. The scenes feature varied depth range, background, objects, and materials. \section{Related Work} \mparagraph{ToF and RGB Fusion} Existing data-driven approaches~\cite{agresti2017fusion,agresti2019fusion_synthetic,pham2019deep_fusion} heavily rely on synthetic data, creating a domain gap. This is exacerbated when using imperfect low-power sensors such on mobile phones. In addition, current stereo-ToF fusion~\cite{evangelidis2015fusion,mutto2015probabilisticFusion,gao2017selfcalibratingtof} typically estimates disparity from stereo and ToF separately before fusion. One approach is to estimate stereo and ToF confidence to merge the disparity maps \cite{Marin2016ReliableFO,agresti2017fusion,agresti2019fusion_synthetic,poggi2020fusion_conf}. In contrast, our ToF estimates are directly incorporated into our disparity pipeline before depth selection. \NEW{Fusion without stereo~\cite{jung2021wildtofu} tackles more challenging scenarios than direct ToF depth estimation. However, Jung et al.'s downsampling process can blur over occlusion edges, producing incorrect depth at a low resolution that is difficult to fix after reprojection at finer resolutions.} \mparagraph{Phone and Multi-Sensor Calibration} DiVerdi and Barron~\cite{DiVerdi2016calib} tackle per shot stereo calibration up to scale in the challenging mobile camera environment; however, absolute calibration is critical for stereo/ToF fusion. We leverage coarse ToF depth estimates for absolute stereo calibration. \NEW{Gil et al.~\cite{gil2021OnlineCalibration} estimate two-view stereo calibration by first estimating a monocular depth map in one image before optimizing the differentiable projective transformation (DPT) that maximizes the consistency between the stereo depth and the monocular depth. The method refines the DPT parameters, handling camera pose shift after factory calibration and improving stereo depth quality, but it still requires the initial transformation to be sufficiently accurate for reasonable stereo depth estimation. In addition, to allow for stable optimization, a lower degree of freedom model is selected, which can neglect camera distortion and lens shift.} Works tackling calibration with phone and ToF sensors are not common. Gao et al.~\cite{gao2017selfcalibratingtof} use Kinect RGB-D inputs, match RGB to the other camera, use depth to lift points to 3D, then solves a PnP problem to find the transformation. Since it matches sparse keypoints, it is not guaranteed that depth is available where a keypoint is, leading to too few available keypoints. In addition, the method does not account for intrinsic or distortion refinement. \mparagraph{Data-Driven ToF Depth Estimation} Numerous works~\cite{son2016tof,marco2017deeptof,guo2018tof_flat,agresti2018tof,su2018deeptof,gao2021tof} attempt to tackle ToF depth estimation via learned approaches. While these approaches have demonstrated strong capabilities in handling challenging artifacts (noise, multi-path interference, or motion), our approach does not strictly require a dedicated method for ToF depth estimation as we directly merge ToF samples in our stereo fusion pipeline. \mparagraph{Conventional Datasets} Accurate real-world datasets with ground-truth depth maps are common for stereo depth estimation~\cite{middlebury2014dataset,Menze2015CVPR,sunrgbd2015dataset}. However, the variety of fusion systems makes it challenging to acquire large-high-quality, real-world datasets. A majority of ToF-related works leverage rendered data~\cite{marco2017deeptof,guo2018tof_flat}, particularly for fusion datasets~\cite{agresti2017fusion,agresti2019fusion_synthetic}. These datasets enable improvement over conventional approaches, but synthesizing RGB and ToF images accurately is challenging. A domain gap is introduced as the noise profile and imaging artifacts are different from the training data. Notable exceptions are Son et al.~\cite{son2016tof}, and Gao and Fan et al.~\cite{gao2021tof}, where an accurate depth camera provides training data for a lower-quality ToF module. The acquisition is partially automated thanks to a robotic arm. However, this bulky setup limits the variety of the scenes: all scenes are captured on the same table, with similar backgrounds across the dataset. In addition, the use of a single depth camera at a different location from the ToF module introduces occlusion, with some areas in the ToF image having no supervision. In addition, this method only tackles ToF depth estimation, and the dataset does not feature RGB images. \mparagraph{Multiview Geometry Estimation} Several approaches are capable of accurate depth estimation from multiview images~\cite{schonberger2016colmap}, even in dynamic environments~\cite{li2019mannequin,luo2020cvd,kopf2021rcvd}. Despite their accuracy, including ToF data to these approaches is not obvious. Scene representations optimized from a set of images~\cite{barron2021mipnerf,jeong2021SCNeRF,yu2021plenoxels} have recently shown good novel view synthesis and scene geometry reconstruction, including to refine depth estimates in the context of multiview stereo~\cite{wei2021nerfingmvs}. Since the optimization can accept supervision from varied sources, including ToF measurements\NEW{ is straightforward.} % For this reason, we select a state-of-the-art neural representation that has the advantage to handle heterogeneous resolutions~\cite{barron2021mipnerf} for our training data generation. \NEW{TöRF~\cite{attal2021torf} renders phasor images from a volume representation to optimize raw ToF image reconstruction. While efficiently improving NeRF's results and tackling ToF phase wrapping, this approach is not necessary for our context as our device is not prone to phase wrapping due to its low illumination range (low power) and thanks to the use of several modulation frequencies. We also observe that, in the absence of explicit ToF confidence, erroneous ToF measurements tend to be more present in depth maps rendered from a TöRF. } Finally, approaches based on ICP registration~\cite{Ha2021NormalFusion} cannot be applied directly to our data since depth maps from the low-power ToF module are too noisy to be registered through ICP. \section{Results} \subsection{Evaluation Dataset} To evaluate our method, we build a real-world dataset with ground-truth depth obtained using a Kinect Azure. Since the depth camera is higher power, noise is reduced, and depth quality is much better than our phone's ToF module. After securing the phone and the Azure Kinect on a joint mount, we calibrate the phone's ToF module and the ultrawide camera w.r.t. the depth camera. Once the calibration is estimated, depth maps can be reprojected to the ultrawide and ToF cameras for comparison. We capture four scenes for a total of 200 snapshots. In addition to this RGB-D dataset, we calibrate the floating camera using the conventional multi-shot offline pipeline with chessboards. This provides ground truth for our online calibration evaluation on four scenes. \subsection{Depth Estimation for Training} \begin{table}[t] \centering \caption{\label{tab:dataset_eval} We compare our multiview fusion against a ToF-supervised scene representation~\cite{attal2021torf} and multiview-stereo approaches~\cite{wei2021nerfingmvs,kopf2021rcvd,luo2020cvd}. Original Mip-NeRF~\cite{barron2021mipnerf} on which our implementation is based is given for reference. } \begin{tabular}{l rr rrrr} \toprule & \multicolumn{2}{c}{Bad ratio (\%)} & \multicolumn{4}{c}{Depth error} \\ & $>$0.2 & $>$0.05 & MAE Rel. & RMSE Rel. & MAE & RMSE \\ \midrule TöRF~\cite{attal2021torf} & {1.82} & {26.48} & {0.055} & {0.075} & {0.041} & {0.062} \\ NerfingMVS~\cite{wei2021nerfingmvs} & {3.37} & {20.11} & {0.047} & {0.069} & {0.039} & {0.071} \\ RCVD~\cite{kopf2021rcvd} & {35.12} & {75.68} & {0.249} & {0.326} & {0.208} & {0.315} \\ CVD~\cite{luo2020cvd} & {1.68} & {11.67} & {0.033} & {0.056} & {0.028} & {0.056} \\ Mip-NeRF~\cite{barron2021mipnerf} & {17.47} & {61.71} & {0.156} & {0.199} & {0.115} & {0.170}\\ \midrule Ours & \textBF{0.81} & \textBF{7.07} & \textBF{0.028} & \textBF{0.047} & \textBF{0.022} & \textBF{0.044}\\ \bottomrule \end{tabular} \end{table} \begin{figure}[t] \centering \resizebox{\columnwidth}{!}{\input{figs/mvs_comparison.pdf_tex}} \caption{\label{fig:mvs_comparison} Multiview depth estimation with ToF-supervised scene representation TöRF~\cite{attal2021torf} and the multiview-stereo approaches NerfingMVS \cite{wei2021nerfingmvs} and CVD \cite{luo2020cvd}. } \vspace{-3mm} \end{figure} Figure~\ref{fig:mvs_comparison} shows that our method can preserve thin structures, and Table~\ref{tab:dataset_eval} confirms that our approach can efficiently merge ToF and stereo data from multiple views. While TöRF~\cite{attal2021torf} is designed to handle ToF inputs, it performs worse than our method when ToF and RGB resolutions differ. We run CVD and RCVD at their default resolution since we observed degradation in accuracy when increasing image size. Note that progressive geometry integration methods such as~\cite{Ha2021NormalFusion} fail on our data: the raw ToF depth maps from our smartphone are not accurate enough for ICP registration. \subsection{Snapshot RGB-D Imaging} \begin{table}[t] \centering \caption{\label{tab:snapshot_abla_calib} Our online calibration versus Gao et al.~\cite{gao2017selfcalibratingtof} on our real dataset. } \begin{tabular}{l rr rr} \toprule & \multicolumn{2}{c}{Pose error (mm)} & \multicolumn{2}{c}{Rotation error (deg.)} \\ & MAE & RMSE & MAE & RMSE \\ \midrule Gao et al. \cite{gao2017selfcalibratingtof} & {5.664} & {5.997} & {1.292} & {1.431} \\ \cite{gao2017selfcalibratingtof} + DFM \cite{efe2021dfm} & {5.174} & {5.803} & {1.344} & {1.499} \\ \midrule Ours & \textBF{3.346} & \textBF{3.989} & \textBF{1.264} & \textBF{1.411} \\ \bottomrule \end{tabular} \end{table} \mparagraph{Calibration} Table~\ref{tab:snapshot_abla_calib} details the accuracy of our calibration method. \NEW{Gao et al.~[15] calibrate two GoPro cameras w.r.t.~a Kinect RGB-D camera. In our comparison, we substitute the RGB-D camera by the ultrawide RGB plus the ToF module, and substitute the GoPro camera by the main camera. } Gao et al.~\cite{gao2017selfcalibratingtof}'s calibration shows much lower accuracy than ours, even when the method is paired with a state-of-the-art feature matcher~\cite{efe2021dfm}. In addition, only our method is able to refine the camera matrix and distortion parameters. \begin{figure}[thpb] \centering \resizebox{\columnwidth}{!}{\input{figs/snapshot_comparison.pdf_tex}} \caption{\label{fig:snapshot_comparison} ToF/stereo fusion results. We pair all other methods with a state-of-the-art stereo approach for fair comparison \cite{lipson2021raft-stereo}. Marin et al.~\cite{Marin2016ReliableFO} and Agresti et al.~\cite{agresti2017fusion} suffer from quantization as their sub-pixel resolution approach is not suitable for small phone camera baselines. Gao et al.~\cite{gao2017selfcalibratingtof} relies heavily on ToF measurements, degrading its performance when ToF is inaccurate (e.g., black parts of the camera). \NEW{Refer to the supplemental material for additional results.} } \end{figure} \begin{table}[t] \centering \caption{\label{tab:snapshot_comparison} Fusion evaluation. In the first rows, we evaluate other approaches for RGB/ToF fusions. Since their stereo matching method are not robust against noise and imaging artifacts, their fusion results are highly inaccurate. In the next rows, we replace their less robust stereo matching with a state-of-the-art method~\cite{lipson2021raft-stereo}. We use our calibration for all methods\NEW{, except for ``Ours (ignoring OIS)'' to highlight the importance of our per-shot calibration}. The results show that our fusion approach outperforms existing methods. } \begin{tabular}{l rr rrrr} \toprule & \multicolumn{2}{c}{Bad ratio (\%)} & \multicolumn{4}{c}{Depth error} \\ & $>$0.2 & $>$0.05 & MAE Rel. & RMSE Rel. & MAE & RMSE \\ \midrule Marin et al.~\cite{Marin2016ReliableFO} & {61.25} & {96.80} & {0.545} & {0.708} & {0.410} & {0.610} \\ Agresti et al.~\cite{agresti2017fusion,agresti2019fusion_synthetic} & {91.29} & {98.29} & {0.962} & {1.172} & {0.722} & {1.012}\\ Gao et al.~\cite{gao2017selfcalibratingtof} & {14.95} & {40.82} & {2.262} & {6.493} & {1.394} & {5.066}\\ \midrule \cite{Marin2016ReliableFO} (RAFT-stereo~\cite{lipson2021raft-stereo}) & {2.01} & {13.87} & {0.043} & {0.092} & {0.034} & {0.085} \\ \cite{agresti2017fusion,agresti2019fusion_synthetic} (RAFT-stereo~\cite{lipson2021raft-stereo}) & {1.48} & {13.96} & {0.037} & {0.065} & {0.031} & {0.065} \\ \cite{gao2017selfcalibratingtof} (RAFT-stereo~\cite{lipson2021raft-stereo}) & {1.67} & {7.71} & {0.031} & {1.021} & {0.026} & {0.854} \\ \midrule \NEW{Stereo only~\cite{lipson2021raft-stereo}} & {2.36} & {14.18} & {0.041} & {1.300} & {0.035} & {1.078} \\ \NEW{Ours (ignoring OIS)} & {9.06} & {29.54} & {0.082} & {0.163} & {0.073} & {0.164} \\ \midrule Ours & \textBF{1.40} & \textBF{7.17} & \textBF{0.028} & \textBF{0.050} & \textBF{0.024} & \textBF{0.051}\\ \bottomrule \end{tabular} \vspace{-0.35cm} \end{table} \mparagraph{Stereo/ToF Fusion} We evaluate our fusion approach against our real-world RGB-D dataset. For comparison, we implement~\cite{Marin2016ReliableFO,agresti2017fusion,gao2017selfcalibratingtof} and we train Agresti et al.'s method~\cite{agresti2017fusion} using their rendered SYNTH3 dataset. Since Gao et al.~\cite{gao2017selfcalibratingtof}'s calibration is too inaccurate, rectification fails severely on some snapshots. \NEW{ Total calibration failure occurred for 34 of the 200 snapshots (17\%) in our test dataset. We show examples of poorly rectified stereo pairs in the supplemental material. } Thus, evaluate all methods using our calibration. \NEW{ We also evaluate if we can ignore OIS: we calibrate the main camera using a checkerboard while the phone is fixed, then we move the phone to capture our test scenes. We report the results in Table~\ref{tab:snapshot_comparison} under ``Ours (ignoring OIS)'', showing a large decrease in depth accuracy. Thus, online calibration is both necessary and effective. } Figure~\ref{fig:snapshot_comparison} shows that our method allows for robust depth estimation with better edge and hole preservation. The low RMSE in Table~\ref{tab:snapshot_comparison} suggests that our method is robust against strong outliers. While other methods suffer from a less robust stereo matching\NEW{---swapping theirs for RAFT-stereo~\cite{lipson2021raft-stereo} significantly improving their results---}our approach maintains higher accuracy. \NEW{\subsection{Dependency on the Device} Under the assumption of a narrow baseline on smartphones, the method should generalize as it allows accurate optical flow estimation between the two RGB cameras. In addition, we show the results of our fusion of datasets based on different hardware: a ZED stereo camera and a Microsoft Kinect v2 ToF depth camera for REAL3~\cite{agresti2019fusion_synthetic}, and two calibrated BASLER scA1000 RGB cameras and a MESA SR4000 ToF camera for LTTM5 \cite{mutto2015probabilisticFusion} in the supplemental material.}
\section*{Background \& Summary} Super-resolution (SR) is aimed at reconstructing a high-resolution (HR) image from a single image or multiple low-resolution (LR) observations presenting the same scene. Multi-image SR (MISR) fuses multiple LR images, each of which contains a different portion of HR information. This allows for achieving higher reconstruction accuracy than relying on single-image SR (SISR)~\cite{Yue2016}, but MISR is highly sensitive to the variability of the input images and their proper co-registration~\cite{Molini2020}. This poses a challenge when preparing the data for training and validation. Recent advances in satellite image SR include SISR~\cite{Galar2020} and MISR~\cite{Razzak2021} techniques for enhancing Sentinel-2 (S-2) multispectral images (MSIs), composed of 13 bands, whose resolution ranges from 60\,m ground sampling distance (GSD) to 10\,m GSD~\cite{Drusch2012} Commonly, SR techniques are evaluated relying on an artificial scenario---a certain image is treated as an HR reference which is subsequently degraded to obtain the simulated LR images. The similarity of the super-resolved outcome to the reference is then used to evaluate the SR performance. Unfortunately, such procedure does not reflect the real-world operating conditions~\cite{ChenHe2022}, and methods that perform well for the simulated data are not necessarily effective for original (i.e., not downsampled) images. It is therefore crucial to properly validate the emerging techniques using real LR images coupled with a real HR reference---in an excellent survey on real-world SISR~\cite{ChenHe2022}, Chen et al. identified the deficiency of realistic datasets as one of the most important challenges in this field. Recently, several real-world SISR datasets have been elaborated~\cite{Joze2020ImagePairs,Wei2020DRealSR,Bhat2021NTIRE}, however preparing such datasets for MISR is much more costly and troublesome. In 2019, European Space Agency organized an SR challenge~\cite{Martens2019} based on real-world scenes acquired by the Proba-V satellite, each of which contains an HR image (100\,m GSD) coupled with at least nine LR images (300\,m GSD). The dataset allowed for developing first MISR techniques underpinned with convolutional neural networks (CNNs), applied either to enhance the LR images before their multi-temporal fusion~\cite{Kawulok2020GRSL} or employed to learn the reconstruction process in an end-to-end manner~\cite{Molini2020,Valsesia2022,AnZhang2022} Very recently, the WorldStrat dataset was published which matches multiple S-2 images with SPOT spectral bands of 6\,m GSD~\cite{Cornebise2022} (the magnification factor equals $1.67\times$). However, the problem of comparing the reconstruction outcome with the reference was not discussed there and it is not clear whether and how WorldStrat can be used for benchmarking SR algorithms. We demonstrate that this is not a straightforward task, especially when LR and HR images are captured by different satellites. In~\cite{Beaulieu2018}, S-2 SISR was assessed by comparing the outcome against WorldView-3 images. The authors observed that the peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) do not correlate well with the quality of the reconstructed images---the highest scores were obtained for blurred images in which the details were not reconstructed accurately. Contrary to that, the learned perceptual image patch similarity (LPIPS)~\cite{ZhangIsola2018} was reported to be suitable for evaluating SISR for remote sensing~\cite{WangBayram2022,DongZhang2022}, but it was not applied to MISR. \begin{figure}[!t] \centering \includegraphics[width=\columnwidth]{images/map_new.pdf} \caption{Regions selected for our MuS2\, benchmark (map source: Google).} \label{fig:map} \end{figure} In this paper, we address the problem of evaluating MISR for S-2 images by introducing a new \underline{Mu}lti-image \underline{S}entinel-\underline{2} SR (MuS2) benchmark. It is composed of a new dataset with WorldView-2 (WV-2) images used as an HR reference and the end-to-end validation procedure. Our contribution can be summarized in the following points. \begin{itemize \item We publish a new MuS2\, benchmark dataset with 91 diverse scenes covering around 2500\,km$^2$ (Fig.~\ref{fig:map}), each composed of at least 14 S-2 MSIs coupled with a single WV-2 MSI. The benchmark is intended to serve as a test set for evaluating future advancements in MISR. \item We elaborated a protocol (included into the source code we publish) for assessing the SR outcome for all of S-2 10\,m bands based on the corresponding WV-2 bands, and we report the results of $3\times$ magnification obtained using the well-established MISR techniques. \item We demonstrate that the LPIPS metric~\cite{ZhangIsola2018} is suitable for evaluating the MISR outcome, even if the reference HR images are acquired using a different satellite. To verify that, we have performed a mean opinion score (MOS) survey, whose results are thoroughly discussed. \item We introduce relevance masks which indicate the image regions that can be considered for evaluation relying on pixel-wise image similarity metrics. \end{itemize} \section*{Methods} \subsection*{Data Source} \label{sec:datasource} Our benchmark dataset is composed of images acquired by S-2 and WV-2 satellites. The S-2 images were downloaded from the Copernicus Open Access Hub, and we accessed the WV-2 images published within the European Cities dataset\footnote{The European Cities dataset is freely available at \url{https://earth.esa.int/web/guest/-/worldview-2-european-cities-dataset}.}. The S-2 data are organized into tiles, each of which contains a $100\times100$~km MSI, and aggregated into products that are distributed at different processing levels. Here, we exploit Level-2A which includes the bottom of atmosphere reflectance correction. Each tile is composed of 13 spectral band , however the B10 (cirrus) band is excluded from Level-2A, because it does not represent any surface information. The blue, green, red, and near infrared (NIR) bands (B02, B03, B04, and B08, respectively) are of 10\,m GSD, the vegetation red edge bands (B05, B06, and B07), narrow NIR (B08a), and the short-wave infrared (SWIR) bands (B11 and B12) are of 20\,m GSD, while the remaining coastal aerosol (B01), water vapour (B09), and cirrus clouds estimation (B10) bands are of 60\,m GSD. Each WV-2 tile contains a panchromatic image of 0.4\,m GSD and 8 spectral bands at 1.6\,m GSD. These are C---coastal (400--450\,nm), B---blue (450--510\,nm), G---green (510--580\,nm), Y---yellow (585--625\,nm), R---red (630--690\,nm), RE---red edge (705--745\,nm), NIR1 (770--895\,nm), and NIR2 (860--1040\,nm). Based on the coverage between the spectral ranges of S-2 and WV-2 bands (measured with the Dice coefficient---$D_C$), we have selected four pairs: B02 with B ($D_C=0.8$), B03 with G ($D_C=0.68$), B04 with R ($D_C=0.68$), and B08 with NIR1 ($D_C=0.92$). For the remaining band pairs, the spectral coverage did not exceed $D_C=0.5$, so we do not consider them in our study. \subsection*{Scene Selection and Data Alignment} For each WV-2 tile, we collected 14 or 15 S-2 images that entirely contain that tile or overlap with it. The images, both within the S-2 stacks, as well as with the WV-2 tiles, were co-registered at whole-pixel precision. We assemble the dataset using areas defined by seven different military grid reference system (MGRS) tiles. These areas represent diverse environments throughout Europe, such as mountains in Norway, plains in Germany and Belgium and a coastal region in Spain. The diversity of the chosen locations is illustrated in Fig.~\ref{fig:map}. Our data preparation procedure (see Fig.~\ref{fig:flowchartA}) operates on original S-2 and WV-2 images. The common area is determined based on the geographic coordinates retrieved from the metadata, and for each band, $N$ LR images ($\mathbb{I}_{\rm in}$) are cropped and coupled with the cropped WV-2 image. The latter is subsequently downsampled to create the HR reference ($\mathbb{I}_{\rm HR}$) whose each dimension is $\alpha \times$ larger than those of $\mathbb{I}_{\rm in}$. In the published dataset, we use $\alpha=3$, as enlarging the images $3\times$ remains sufficiently challenging for the state-of-the-art MISR techniques~\cite{AnZhang2022,deudon2020highresnet,Salvetti2020,Valsesia2022}. However, the elaborated software tools that we publish along with the benchmark allow for generating the reference HR data up to $\alpha=6.25$ for WV-2 images of original size. \begin{figure} \centering \includegraphics[width=0.75\columnwidth]{images/fig_flowchart_prep.pdf} \caption{The data preparation pipeline: the yellow boxes indicate input data, the blue ones---temporary data, and the red ones---the output. For each WV-2 image, $N$ S-2 images with overlapping area are processed to identify the coordinates of the largest common region. It is used to crop the four 10\,m bands from S-2 images and corresponding WV-2 bands. The latter are downsampled, so that they are $\alpha \times$ larger than the cropped S-2 images. } \label{fig:flowchartA} \end{figure} Overall, we acquired 91 pairs of HR images, each of which is coupled with multiple LR images (every HR and LR image is composed of four bands). To verify whether the bands are correctly co-registered after cropping, we composed color images and inspected them against color artefacts (Fig.~\ref{fig:color_example}a,\,b). In order to check the co-registration correctness between LR images and the HR image, we have assembled checkerboard mosaicked images and inspected them visually for all the scenes (Fig.~\ref{fig:color_example}c). Finally, we combined multiple S-2 images for each scene to inspect whether the obtained images are free of color and halo artefacts that could result from poor co-registration across multiple S-2 images and/or the spectral bands (Fig.~\ref{fig:color_example}d). \begin{figure} \centering \includegraphics[width=\columnwidth]{images/color_example.pdf} \caption{Color images composed of S-2 and WV-2 bands to inspect the co-registration correctness of the prepared data. The example shows correct co-registration among (a) S-2 and (b) WV-2 bands, (c) between S-2 and WV-2 images (in a form of a checkerboard image), and (d)~among multiple S-2 images (incorrect co-registration would result in color artefacts).} \label{fig:color_example} \end{figure} \subsection*{The Evaluation Procedure} The evaluated SR process is fed with $N$ input images for reconstructing a specific S-2 band to produce a single super-resolved image ($\mathbb{I}_{\rm SR}$) which is subsequently compared with the corresponding $\mathbb{I}_{\rm HR}$. By an input image we understand a single S-2 band, but it is also possible that multiple bands cropped to show the same area are processed to reconstruct a single S-2 band or multiple bands, and each of the super-resolved 10\,m bands can be compared with a corresponding $\mathbb{I}_{\rm HR}$ derived from the WV-2 data. We measure the similarity between $\mathbb{I}_{\rm SR}$ and $\mathbb{I}_{\rm HR}$ with the PSNR, SSIM, and LPIPS metrics that are commonly employed for assessing the SR quality~\cite{WangBayram2022}. ~$\mathbb{I}_{\rm in}$ and $\mathbb{I}_{\rm HR}$ are acquired by different sensors, hence the differences between $\mathbb{I}_{\rm SR}$ and $\mathbb{I}_{\rm HR}$ result not only from the lack of reconstruction accuracy, but also from the characteristics of the imaging sensor and the temporal changes of the scene (due to different acquisition time)~\cite{Benecki2018AA}. Also, as the $N$ input images are co-registered in the LR space at whole-pixel precision, the super-resolved $\mathbb{I}_{\rm SR}$ may be displaced up to $\alpha$ pixels in each dimension compared with $\mathbb{I}_{\rm HR}$. For Proba-V images (acquired with the same satellite), it was sufficient to co-register $\mathbb{I}_{\rm SR}$ to $\mathbb{I}_{\rm HR}$ and to compensate the brightness bias~\cite{Martens2019}. The co-registration was performed by shifting $\mathbb{I}_{\rm SR}$ by $\left[-\alpha;\alpha\right]$ pixels in vertical and horizontal dimensions to maximize the PSNR score computed for the whole $\mathbb{I}_{\rm HR}$ image without an $\alpha$-wide boundary (so that even after shifting the same part of $\mathbb{I}_{\rm HR}$ is considered for computing the score). For MuS2, we have fully adopted that approach. In~\cite{Martens2019}, the brightness was compensated by subtracting the mean brightness from both $\mathbb{I}_{\rm SR}$ and $\mathbb{I}_{\rm HR}$. In the case considered here, the differences between S-2 and WV-2 images are more substantial than among Proba-V images, therefore we match the histogram of $\mathbb{I}_{\rm SR}$ to $\mathbb{I}_{\rm HR}$ before the evaluation. Importantly, this does not convey any HR information from $\mathbb{I}_{\rm HR}$ to $\mathbb{I}_{\rm SR}$, but only compensates the low-frequency differences between them. Also, we do not modify $\mathbb{I}_{\rm HR}$, so that every $\mathbb{I}_{\rm SR}$ obtained using different techniques is always compared to the same reference image. As proposed in~\cite{Martens2019}, in addition to reporting the direct values of PSNR, we also compute their relation to the scores retrieved for images obtained by averaging LR images enlarged with bicubic interpolation, treated as a baseline which does not offer any information gain. We adopt the same approach for SSIM and LPIPS metrics, and we also compute the balanced metric as: \begin{equation} \mathcal{B}(\mathbb{I}_{\rm SR})=\frac{1}{3} \left[ \frac{{\rm PSNR}\left(\mathbb{I}_{\rm bic},\mathbb{I}_{\rm HR}\right)}{{\rm PSNR}\left(\mathbb{I}_{\rm SR},\mathbb{I}_{\rm HR}\right)} + \frac{ {\rm SSIM}\left(\mathbb{I}_{\rm bic}, \mathbb{I}_{\rm HR}\right)}{ {\rm SSIM}\left(\mathbb{I}_{\rm SR},\mathbb{I}_{\rm HR}\right)} + \frac{ {\rm LPIPS}\left(\mathbb{I}_{\rm SR},\mathbb{I}_{\rm HR}\right)}{ {\rm LPIPS}\left(\mathbb{I}_{\rm bic},\mathbb{I}_{\rm HR}\right)} \right] , \end{equation} where $\mathbb{I}_{\rm bic}$ is obtained by averaging all bicubically-upsampled $\mathbb{I}_{\rm in}$'s in the scene (they are all co-registered as justified earlier). Hence, $\mathcal{B}<1$ means better performance compared with the bicubic interpolation, and $\mathcal{B}>1$ indicates the opposite case (for PSNR and SSIM the higher score indicates higher similarity, and for LPIPS the lower the score, the higher the similarity). During our experiments (reported later in this paper), we observed that the PSNR and SSIM metrics are not particularly effective in assessing the reconstruction accuracy when $\mathbb{I}_{\rm in}$ and $\mathbb{I}_{\rm HR}$ originate from different satellites---the scores differ little across $\mathbb{I}_{\rm SR}$'s obtained with the employed SR or interpolation procedures. Based on experimental validation and MOS survey, whose results are discussed later in this paper, it is clear that the outcomes obtained using MISR techniques better reflect the image details than relying on bicubic interpolation, and this is correctly captured relying on the LPIPS metric. It can be seen from Figure~\ref{fig:differences} that there are regions, marked as red in Figure~\ref{fig:differences}e, in which bicubic interpolation consistently prevails over all of the four considered SR techniques trained from real-life data in terms of the mean squared error (MSE), which the PSNR metric is based on (these regions were extracted after applying shift and brightness compensation). This may result from the temporal differences between $\mathbb{I}_{\rm in}$'s and $\mathbb{I}_{\rm HR}$---in the regions where bicubic interpolation renders lower MSE than all the SR techniques, the HR reference can be regarded as inappropriate to assess the reconstruction quality. It can be noticed that such regions are mainly located in the cultivated fields, while in the highly-detailed urban areas they are isolated (this may result from shadows and differences in lighting conditions). Overall, for every scene, we generate the relevance masks which indicate the regions in $\mathbb{I}_{\rm HR}$ where at least one MISR model (out of four considered in our study) offers better performance than the bicubic interpolation in terms of MSE, and if the relevance masks are applied, then the metrics are computed only inside such regions (hence, in Figure~\ref{fig:differences}e, the pixels marked as red would be ignored when computing the metrics with the relevance masks applied) \begin{figure}[!htb] \centering \newcommand{0.19}{0.19} \renewcommand{\tabcolsep}{0.3mm} \begin{tabular}{ccccc} \includegraphics[width=0.19\textwidth]{images/hrn_nir_better_hr.png} & \includegraphics[width=0.19\textwidth]{images/hrn_red_better_hr.png} & \includegraphics[width=0.19\textwidth]{images/rams_nir_better_hr.png} & \includegraphics[width=0.19\textwidth]{images/rams_red_better_hr.png} & \includegraphics[width=0.19\textwidth]{images/any_better_hr.png} \\ (a) & (b) & (c) & (d) & (e) \\ \end{tabular} \caption{Areas (red) in which bicubically interpolated image is closer to the HR reference than the super-resolved one (after applying appropriate shift and brightness compensation). Outcomes of (a, b)~HighRes-net~\cite{deudon2020highresnet} and (c, d)~RAMS~\cite{Salvetti2020} models trained over Proba-V NIR and Red images, respectively, are shown along with (e)~the final relevance mask (red areas are masked out).} \label{fig:differences} \end{figure} \section*{Data Records} The MuS2 benchmark dataset is available at \url{https://doi.org/10.7910/DVN/1JMRAT} and its folder structure is depicted in Figure~\ref{fig:files}. The images are grouped into 91 scenes, each of which is placed in a separate scene-level folder, whose names follow the pattern {\tt <ord\_num>\_<mgrs>\_<date>-2AS\_<tile>}, where {\tt <ord\_num>} is the ordinal number of Sentinel-2 product, {\tt <mgrs>} is the MGRS tile representing the captured area, {\tt <date>} is the acquisition date of the WV-2 image, and {\tt <tile>} is the name of the WV-2 tile. Each scene-level folder contains 12 band-level folders ({\tt b1}, {\tt b2}, {\tt b3}, etc.) with the corresponding S-2 bands. Every band-level folder contains 14 or 15 Level-2A images captured at different revisits. The WV-2 bands (numbered from 0 to 7) along with a panchromatic image are stored in the {\tt hr\_resized} folder for each scene, resized to the dimensions $3\times$ larger than the S-2 input images. Also, the scene classification maps ({\tt scl}), cloud masks ({\tt cld}), aerosol optical thickness ({\tt aot}), and water vapour maps ({\tt wvp}) are included as well. The resolution of HR images is $3\times$ larger than the resolution of S-2 10\,m GSD images (i.e., bands B02, B03, B04, and B08). S-2 and WV-2 band images are intended to be coupled for evaluation as follows: \begin{itemize} \item S-2 B02 ({\tt b2}) with WV-2 B band ({\tt mul\_band\_1}), \item S-2 B03 ({\tt b3}) with WV-2 G band ({\tt mul\_band\_2}), \item S-2 B04 ({\tt b4}) with WV-2 R band ({\tt mul\_band\_4}), \item S-2 B08 ({\tt b8}) with WV-2 NIR1 band ({\tt mul\_band\_6}). \end{itemize} Additionally, the relevance masks for the 10\,m S-2 bands are also included in the {\tt masks} folder. \begin{figure} \dirtree{% .1 /. .2 image\_data. .3 0\_31UFT\_11JUN031102-2AS\_R4C1. .4 b1. .5 lrs. .6 S2A\_*.jp2. .6 .... .4 b2. .5 lrs. .6 .... .4 .... .4 hr\_resized. .5 pan.tiff. .5 mul\_band\_0.tiff. .5 .... .5 mul\_band\_7.tiff. .4 scl. .4 wvp. .4 cld. .4 aot. .3 .... .2 masks. .3 relevance\_masks\_b2. .3 .... } \caption{The folder structure of the MuS2 benchmark dataset.} \label{fig:files} \end{figure} \section*{Technical Validation} \label{sec:exp} The goal of our experiments was twofold: (\textit{i})~to confirm that MuS2, including the evaluation procedure, is suitable for assessing the reconstruction accuracy, and (\textit{ii})~to report the scores of the well-established SR techniques, which can be used as a baseline for future research. For this sake, we included HighRes-net that recursively combines latent LR representations to obtain the super-resolved image~\cite{deudon2020highresnet}, as well as the residual attention MISR (RAMS) network equipped with the attention mechanism~\cite{Salvetti2020}. In this study, we focus on evaluating MISR performed for four 10\,m S-2 bands matched with the HR reference obtained from WV-2. In order to verify that based on MuS2, we can assess how much the reconstructed details resemble those observed in $\mathbb{I}_{\rm HR}$, we consider three groups of methods: (\textit{i})~MISR networks trained with real-world LR and HR Proba-V images~\cite{Martens2019}, (\textit{ii})~MISR networks trained using S-2 simulated LR data~\cite{Kawulok2019IGARSS} (obtained by degrading an original S-2 image, later treated as $\mathbb{I}_{\rm HR}$), and (\textit{iii})~image interpolation techniques treated as a baseline. In~\cite{Kawulok2021IGARSS}, we demonstrated that RAMS and HighRes-net trained from Proba-V images are successful in super-resolving S-2 data, and they do not generate artefacts observed when these networks are trained using simulated LR images. To verify how such artefacts influence the scores for MuS2, we report the performance for the networks trained with Proba-V NIR, Proba-V Red, and S-2 simulated images. \newcommand{NN}{NN} \newcommand{Bicubic}{Bicubic} \newcommand{Lanczos}{Lanczos} \newcommand{Linear}{Linear} \newcommand{Pr-NIR}{Pr-NIR} \newcommand{Pr-Red}{Pr-Red} \newcommand{S2-simul.}{S2-simul.} \newcommand{Pr-NIR}{Pr-NIR} \newcommand{Pr-Red}{Pr-Red} \newcommand{S2-simul.}{S2-simul.} \begin{table*}[!t] \renewcommand{\tabcolsep}{1mm} \centering \caption{Reconstruction accuracy obtained for our MuS2\, benchmark measured with PSNR (in dB), SSIM, LPIPS, and the balanced score $\mathcal{B}$, obtained for different interpolation techniques alongside HighRes-net and RAMS networks trained using real-world and simulated images. The scores are reported without and with the relevance masks. The best scores (highest PSNR and SSIM, and lowest LPIPS and $\mathcal{B}$) are boldfaced.} \resizebox{\textwidth}{!}{ \begin{tabular}{llccccccccccccccccccc} \Xhline{3\arrayrulewidth} & & \multicolumn{4}{c}{Band B02} & &\multicolumn{4}{c}{Band B03} & & \multicolumn{4}{c}{Band B04} & & \multicolumn{4}{c}{Band B08} \\ \cline{3-6} \cline{8-11} \cline{13-16} \cline{18-21} \multicolumn{2}{r}{Method $\downarrow$} & PSNR & SSIM & LPIPS & $\mathcal{B}$ & & PSNR & SSIM & LPIPS & $\mathcal{B}$ & & PSNR & SSIM & LPIPS & $\mathcal{B}$ & & PSNR & SSIM & LPIPS & $\mathcal{B}$ \\ \Xhline{3\arrayrulewidth} \multicolumn{9}{l}{{No mask applied (whole image compared):}} \\ \cline{2-21} \multirow{4}{*}{\begin{sideways} Interp. \end{sideways}} & NN & $ 34.85$ & $ .9266$ & $ .2705$ & $ 0.984$ & & $ 30.66$ & $ .8465$ & $ .3733$ & $ 0.979$ & & $ 31.80$ & $ .8575$ & $ .3451$ & $ 0.988$ & & $ 24.06$ & $ .5694$ & $ .5285$ & $ 1.001$ \\ & Linear & $ 34.92$ & $ \bf{.9305}$ & $ .2986$ & $ 1.016$ & & $ 30.72$ & $ .8533$ & $ .4157$ & $ 1.012$ & & $ 31.85$ & $ .8627$ & $ .3762$ & $ 1.015$ & & $ 24.10$ & $ .5790$ & $ .5318$ & $ 0.998$ \\ & Bicubic & $ 34.95$ & $ .9301$ & $ .2858$ & $ 1.000$ & & $ 30.75$ & $ .8535$ & $ .4025$ & $ 1.000$ & & $ 31.88$ & $ .8631$ & $ .3609$ & $ 1.000$ & & $ 24.14$ & $ .5835$ & $ .5419$ & $ 1.000$ \\ & Lanczos & $ 34.95$ & $ .9302$ & $ .2817$ & $ 0.995$ & & $ 30.76$ & $ \bf{.8540}$ & $ .3974$ & $ 0.996$ & & $ \bf{31.89}$ & $ \bf{.8636}$ & $ .3568$ & $ 0.996$ & & $ \bf{24.15}$ & $ .5853$ & $ .5408$ & $ 0.998$ \\ \cline{2-21} \multirow{3}{*}{\begin{sideways} HRn \end{sideways}} & Pr-NIR & $ \bf{35.19}$ & $ .9288$ & $ .2310$ & $ 0.936$ & & $ \bf{30.84}$ & $ .8498$ & $ .3214$ & $ 0.934$ & & $ 31.82$ & $ .8604$ & $ .2864$ & $ 0.932$ & & $ 23.93$ & $ .5820$ & $ \bf{.4330}$ & $ \bf{0.936}$ \\ & Pr-Red & $ 34.95$ & $ .9229$ & $ .2192$ & $ 0.925$ & & $ 30.68$ & $ .8437$ & $ .3164$ & $ 0.933$ & & $ 31.61$ & $ .8553$ & $ .2792$ & $ 0.929$ & & $ 23.98$ & $ .5842$ & $ .4446$ & $ 0.941$ \\ & S2-simul. & $ 34.63$ & $ .9125$ & $ .2730$ & $ 0.998$ & & $ 30.39$ & $ .8247$ & $ .3610$ & $ 0.988$ & & $ 31.48$ & $ .8383$ & $ .3412$ & $ 1.004$ & & $ 23.69$ & $ .5311$ & $ .4901$ & $ 1.014$ \\ \cline{2-21} \multirow{3}{*}{\begin{sideways} RAMS \end{sideways}} & Pr-NIR & $ 35.01$ & $ .9232$ & $ .2166$ & $ 0.922$ & & $ 30.61$ & $ .8400$ & $ .3171$ & $ 0.936$ & & $ 31.59$ & $ .8543$ & $ .2757$ & $ 0.927$ & & $ 23.97$ & $ .5850$ & $ .4391$ & $ 0.937$ \\ & Pr-Red & $ 35.11$ & $ .9257$ & $ \bf{.2165}$ & $ \bf{0.917}$ & & $ 30.80$ & $ .8478$ & $ \bf{.3107}$ & $ \bf{0.925}$ & & $ 31.87$ & $ .8605$ & $ \bf{.2706}$ & $ \bf{0.915}$ & & $ 24.01$ & $ \bf{.5854}$ & $ .4558$ & $ 0.947$ \\ & S2-simul. & $ 34.55$ & $ .9143$ & $ .2580$ & $ 0.984$ & & $ 30.35$ & $ .8238$ & $ .3660$ & $ 0.990$ & & $ 31.51$ & $ .8345$ & $ .3503$ & $ 1.006$ & & $ 23.84$ & $ .5261$ & $ .5617$ & $ 1.056$ \\ \hline \multicolumn{9}{l}{{Relevance masks applied:}} \\ \cline{2-21} \multirow{4}{*}{\begin{sideways} Interp. \end{sideways}} & NN & $ 34.60$ & $ .9613$ & $ .2226$ & $ 0.921$ & & $ 30.39$ & $ .9359$ & $ .3021$ & $ 0.891$ & & $ 31.56$ & $ .9091$ & $ .2710$ & $ 0.902$ & & $ 24.01$ & $ .8327$ & $ .4149$ & $ 0.821$ \\ & Linear & $ 34.64$ & $ .9628$ & $ .2295$ & $ 0.928$ & & $ 30.42$ & $ .9381$ & $ .3132$ & $ 0.899$ & & $ 31.58$ & $ .9114$ & $ .2810$ & $ 0.911$ & & $ 24.03$ & $ .8360$ & $ .4239$ & $ 0.825$ \\ & Bicubic & $ 34.70$ & $ .9626$ & $ .2225$ & $ 0.920$ & & $ 30.48$ & $ .9383$ & $ .3049$ & $ 0.892$ & & $ 31.65$ & $ .9119$ & $ .2716$ & $ 0.901$ & & $ 24.11$ & $ .8385$ & $ .4156$ & $ 0.818$ \\ & Lanczos & $ 34.71$ & $ .9627$ & $ .2203$ & $ 0.917$ & & $ 30.49$ & $ \bf{.9384}$ & $ .3023$ & $ 0.889$ & & $ 31.66$ & $ .9122$ & $ .2694$ & $ 0.899$ & & $ 24.12$ & $ .8392$ & $ .4119$ & $ 0.815$ \\ \cline{2-21} \multirow{3}{*}{\begin{sideways} HRn \end{sideways}} & Pr-NIR & $ \bf{35.41}$ & $ \bf{.9630}$ & $ .2021$ & $ 0.892$ & & $ \bf{31.06}$ & $ \bf{.9384}$ & $ .2693$ & $ 0.858$ & & $ \bf{32.14}$ & $ .9135$ & $ .2404$ & $ 0.866$ & & $ 24.40$ & $ .8401$ & $ .3503$ & $ 0.774$ \\ & Pr-Red & $ 35.24$ & $ .9608$ & $ .1987$ & $ 0.889$ & & $ 30.96$ & $ .9369$ & $ .2667$ & $ 0.855$ & & $ 31.96$ & $ .9111$ & $ .2375$ & $ 0.865$ & & $ 24.33$ & $ .8404$ & $ .3626$ & $ 0.782$ \\ & S2-simul. & $ 34.57$ & $ .9555$ & $ .2425$ & $ 0.948$ & & $ 30.32$ & $ .9272$ & $ .3210$ & $ 0.912$ & & $ 31.45$ & $ .8983$ & $ .2949$ & $ 0.934$ & & $ 23.81$ & $ .8152$ & $ .4271$ & $ 0.837$ \\ \cline{2-21} \multirow{3}{*}{\begin{sideways} RAMS \end{sideways}} & Pr-NIR & $ 35.26$ & $ .9611$ & $ \bf{.1939}$ & $ \bf{0.882}$ & & $ 30.88$ & $ .9352$ & $ .2675$ & $ 0.857$ & & $ 31.89$ & $ .9108$ & $ .2338$ & $ 0.863$ & & $ \bf{24.51}$ & $ .8406$ & $ \bf{.3394}$ & $ \bf{0.765}$ \\ & Pr-Red & $ 35.29$ & $ .9619$ & $ .1953$ & $ \bf{0.882}$ & & $ 30.98$ & $ .9379$ & $ \bf{.2621}$ & $ \bf{0.851}$ & & $ 32.11$ & $ \bf{.9144}$ & $ \bf{.2329}$ & $ \bf{0.858}$ & & $ 24.47$ & $ \bf{.8411}$ & $ .3567$ & $ 0.776$ \\ & S2-simul. & $ 34.39$ & $ .9544$ & $ .2393$ & $ 0.950$ & & $ 30.19$ & $ .9241$ & $ .3315$ & $ 0.923$ & & $ 31.41$ & $ .8951$ & $ .3090$ & $ 0.944$ & & $ 23.97$ & $ .8122$ & $ .4721$ & $ 0.863$ \\ \Xhline{3\arrayrulewidth} \multicolumn{20}{l}{HRn---HighRes-net, trained with Proba-V NIR (Pr-NIR), Proba-V Red (Pr-Red), or S-2 simulated (Simul.) images} \\ \multicolumn{20}{l}{NN---nearest-neighbor interpolation} \end{tabular} } \label{tab:results} \end{table*} \begin{figure*}[!h] \centering \includegraphics[width=\textwidth]{images/sr_example.pdf} \caption{Reconstruction outcome (band B08) obtained with RAMS and HighRes-net trained from real-life Proba-V NIR and Red images and from simulated data, compared with image interpolation techniques and HR reference. PSNR (in dB), SSIM, LPIPS and $\mathcal{B}$ scores are presented above each example.} \label{fig:results} \end{figure*} Quantitative results obtained for four S-2 bands without and with the relevance masks applied are reported in Table~\ref{tab:results}. It can be seen that without the relevance mask, the PSNR and SSIM scores do not differ much between each other within particular bands, and they do not indicate the SR techniques to be better than interpolation. This is against what can be judged from visual inspection of the reconstruction outcome, an example of which is presented in Figure~\ref{fig:results}. The images rendered by HighRes-net and RAMS trained over Proba-V images present more details than the interpolated images (which are quite blurry), and they are free from the artefacts present for the models trained from the S-2 simulated data. It is worth noting that based on visual assessment, the details in $\mathbb{I}_{\rm SR}$ are quite close to those observed in the WV-2 image, which suggests that they were reconstructed indeed rather than hallucinated (such hallucination artefacts are quite common for SISR techniques, especially for larger magnification factors~\cite{Ledig2017}). Unfortunately, these qualitative observations are quantitatively reflected only in the LPIPS values, while PSNR and SSIM are slightly worse for HighRes-net and RAMS---overall, both LPIPS and $\mathcal{B}$ indicate that SR networks perform better than interpolation and they penalize for the artefacts. Apparently, the differences between $\mathbb{I}_{\rm in}$ and $\mathbb{I}_{\rm HR}$ images resulting from different image acquisition conditions prevail over the accuracy of reconstructing the details when local pixel-wise metrics like PSNR or SSIM are used, but they have smaller impact on the feature-based LPIPS metric. When the relevance masks are applied, all the metrics indicate the superiority of SR networks and their $\mathcal{B}$ scores are aligned in a similar order as without the mask. As shown in Table~\ref{tab:results}, the reported metrics (without the relevance masks) are not consistent in indicating the SR performance. In order to verify which of them is most reliable for assessing the reconstruction accuracy, we have prepared a MOS survey composed of 15 queries\footnote{The MOS questions are presented in the Supplementary Material.}. We considered the cases in which PSNR, SSIM, and LPIPS metrics pointed to a different SR or interpolation outcome as the most (eight cases) or the least (seven cases) similar to $\mathbb{I}_{\rm HR}$. In each query, the participants of diverse background (including Earth observation professionals and individuals without any remote sensing experience) were presented such three images alongside $\mathbb{I}_{\rm HR}$, and asked to select the best or the worst image for retrieving some specific details (e.g., delineating the roads). In this way, we wanted to prevent the participants from being biased toward picking an image of the best perceptual quality, instead of the one whose details are most similar to those in $\mathbb{I}_{\rm HR}$. The results of the survey (averaged from over 160 responses) are reported in Table~\ref{tab:mos}---clearly, LPIPS correlates most with the human judgement both in picking the most or least accurate reconstruction outcome (retrieved with an SR network trained from Proba-V data and an interpolation technique, respectively). Overall, even though LPIPS is a perceptual metric, the reported study shows that it can be exploited as a reliable indicator of reconstruction accuracy in this case. We expect that the balanced metric $\mathcal{B}$ introduces an additional stability, as the PSNR and SSIM scores are sensitive to the hallucination effects~\cite{Ledig2017} which potentially may not affect the LPIPS metric. \begin{table}[h] \centering \caption{The MOS survey outcome showing how often each metric was consistent with the answers (in \%), stratified into SR nets trained with Proba-V and simulated images, and interpolation.} \begin{tabular}{lrrrrr} \Xhline{2\arrayrulewidth} \multicolumn{2}{l}{$\downarrow$ Query type~~~~~~~~Method $\downarrow$} & \multicolumn{1}{c}{PSNR} & \multicolumn{1}{c}{SSIM} & \multicolumn{1}{c}{LPIPS} & \multicolumn{1}{c}{Total} \\ \Xhline{2\arrayrulewidth} \multirow{4}{*}{\begin{sideways}Best acc.\end{sideways}} & SR networks (Proba-V) & $3.92$ & $14.46$ & $55.57$ & $73.95$ \\ & SR networks (simulated) & $11.67$ & $0.00$ & $7.61$ & $19.28$ \\ & Image interpolation & $1.81$ & $4.97$ & $0.00$ & $6.78$ \\ \cline{2-6} & Total & $17.39$ & $19.43$ & $63.18$ & $100.00$ \\ \hline \multirow{4}{*}{\begin{sideways}Worst acc.\end{sideways}} & SR networks (Proba-V) & $5.85$ & $0.00$ & $0.00$ & $5.85$ \\ & SR networks (simulated) & $2.07$ & $10.93$ & $6.71$ & $19.71$ \\ & Image interpolation & $0.00$ & $0.00$ & $74.44$ & $74.44$ \\ \cline{2-6} & Total & $7.92$ & $10.93$ & $81.15$ & $100.00$ \\ \Xhline{2\arrayrulewidth} \end{tabular} \label{tab:mos} \end{table} \subsection*{Conclusions and outlook} In this paper, we introduced a new MuS2\, benchmark for assessing the accuracy of MISR for S-2 images. It is composed of original S-2 data coupled with HR references obtained from WV-2. We have proposed the evaluation protocol based on a balanced score built upon PSNR, SSIM, and LPIPS metrics, and we demonstrated that it is suitable for assessing the reconstruction accuracy. Based on the MOS survey, we showed that LPIPS metric can be employed for assessing the similarity to the ground truth and that it is robust against variations resulting from acquiring images by different satellites. Additionally, we have elaborated the relevance masks which pick the regions to allow for pixel-wise evaluation performed with ``traditional'' PSNR and SSIM metrics. Although we have shown that all of the S-2 10\,m bands can be coupled with corresponding WV-2 bands, evaluating reconstruction of the remaining bands, potentially relying on panchromatic WV-2 images, remains an open issue. With our data preparation procedure, it is possible to crop all the bands which may help address this challenging problem in the future. Furthermore, here we consider the magnification factor of $3\times$, but with the prepared procedure, other factors may be considered as well. Finally, even though the reconstruction outcomes obtained with the reported techniques are of definitely higher quality than the bicubically-interpolated images, they are still far from the HR reference. We expect that MuS2\, used as a test set for assessing emerging SR techniques will guide the researchers toward developing more effective SR techniques. They may result from improved architectures, better data simulation and augmentation procedures, as well as from new loss functions that would allow for more robust training from real-world data. \section*{Usage Notes} After downloading the dataset from \url{https://doi.org/10.7910/DVN/1JMRAT}, the SR algorithms can be fed with multiple images for each scene (and for each band). Every S-2 band can be reconstructed relying on multiple images of the same band, but other bands can also be exploited during reconstruction. Also, the data can be used for SISR by picking a single LR input image for each scene and band. To assess the quality of the super-resolved images, the code published at the Code Ocean (\url{https://codeocean.com/capsule/8131193/tree/v1}) can be exploited to compute the metrics (PSNR, SSIM, LPIPS, and the balanced score $\mathcal{B}$). \section*{Code availability} The code for creating the benchmark from raw data and for evaluating the SR outcome is available at \url{https://codeocean.com/capsule/8131193/tree/v1}. The code is documented and accompanied with usage examples.
\section{Introduction} For conventional wireless communication systems, the main \textcolor[rgb]{0.00,0.00,0.00}{performance} indicator is the communication quality of service (QoS). However, in the upcoming beyond fifth generation (B5G) and sixth generation (6G) wireless networks, sensing service will play a more important role than ever before~\cite{9585321,Dong2022Sensing}. The goal of future wireless communication is to provide services based on both sensing and communication functionalities. Toward this \textcolor[rgb]{0.00,0.00,0.00}{goal}, integrated sensing and communication (ISAC) has emerged and attracted growing attention in both academia and industries~\cite{9755276,Li2022AssistingLB,9585321}. Broadly, the research contributions on ISAC can be classified into two categories, namely, radar-communication coexistence (RCC) and dual-function radar communication (DFRC)~\cite{Liu2022ISAC}. For RCC, the radar and communication devices are separated, while the spectrum is shared simply by radar and communication systems. Sophisticated interference management and cooperation techniques are needed for RCC to mitigate the system interference. However, this requires \textcolor[rgb]{0.00,0.00,0.00}{a} large number of information \textcolor[rgb]{0.00,0.00,0.00}{exchanges} and leads to high overhead. For DFRC, the radar and communication functions share the same hardware and a unified transmit waveform is exploited to simultaneously perform communication and sensing tasks. Nevertheless, it is a challenging task to design \textcolor[rgb]{0.00,0.00,0.00}{an} efficient waveform to balance the conflicting requirements between the communication and sensing \textcolor[rgb]{0.00,0.00,0.00}{tasks}. Various key techniques, such as millimeter wave (mmWave)~\cite{Gao2022IntegratedSA,9729809,9849103}, terahertz (THz)~\cite{Chaccour2021JointSA,9729746,Ahmet2022}, massive multiple-input multiple-output (MIMO)~\cite{You2022BeamSI} and multi-unmanned aerial vehicle (UAV)~\cite{9729746,9858656}, have been incorporated in ISAC \textcolor[rgb]{0.00,0.00,0.00}{systems} to boost the communication and sensing capabilities, Given the already large number of works on ISAC communications, in this paper we focus on the applications of non-orthogonal multiple access (NOMA) and reconfigurable intelligent surface (RIS) to ISAC (or DFRC) systems. \vspace{-0.3cm} \subsection{Prior Works} A handful of works have been devoted to studying NOMA-ISAC and RIS-ISAC systems. We elaborate on them as follows. \subsubsection{Studies on NOMA-ISAC systems} NOMA has received significant attention as a promising technique for supporting massive connectivity, interference management, and spectrum enhancement~\cite{9693417,9167258}. The authors of~\cite{Mu2022NOMAAidedJR} first proposed a novel NOMA-aided joint radar and multicast-unicast communication system, where the base station (BS) transmits superimposed multicast and unicast messages to the radar users and communication users, while detecting the radar user targets. The authors of~\cite{Wang2022NOMAEI} utilized the superimposed NOMA communication signal to perform radar sensing and proposed a beamforming design algorithm to maximize the weighted sum of the communication throughput and the effective sensing power. Since the sensing signal can also be information-bearing, the authors of~\cite{Wang2021NOMAII} utilized multiple beams of the sensing signal to deliver extra multicast information while detecting radar targets. The communication users received one desired unicast stream and multiple multicast streams, which were detected \textcolor[rgb]{0.00,0.00,0.00}{by successive} interference cancellation (SIC). In conventional ISAC networks, the total bandwidth was assumed to be utilized for both radar detection and wireless communication. However, this assumption is \textcolor[rgb]{0.00,0.00,0.00}{impractical because the bandwidth is} occupied by different applications. To overcome this difficulty, the authors of~\cite{Zhang2022SemiIntegratedSensingandCommunicatios} proposed an uplink NOMA-assisted semi-ISAC system, where the total bandwidth was divided into three portions, namely the ISAC bandwidth, the communication-only bandwidth, and the sensing-only bandwidth. \subsubsection{Studies on RIS-ISAC systems} Although many key enablers, such as mmWave, MIMO and THz, have demonstrated tremendous potential in improving the performances of the ISAC system, they usually suffer from various practical limitations, such as \textcolor[rgb]{0.00,0.00,0.00}{uncontrollable electromagnetic} waves propagation, high hardware complexity and energy consumption~\cite{Liu2022ISAC}. Recently, a novel energy-efficient technique, namely, RIS~\cite{9424177}, \textcolor[rgb]{0.00,0.00,0.00}{has} been proposed as an important enabling technology for enhancing the communication performance. By smartly adjusting the amplitude and phase response of the reflecting elements, RIS can reconfigure the electromagnetic environments. Furthermore, by deploying RIS, additional optimization degrees of freedoms (DoFs) and virtual line-of-sight (LoS) links can be introduced for radar targets. In~\cite{Sankar2022BeamformingII}, the authors considered two scenarios \textcolor[rgb]{0.00,0.00,0.00}{for} RIS-ISAC systems. In the first scenario, the users and targets were well separated and a single RIS was deployed to enhance the communication performance. The transmit beamformers and RIS phase shifts were designed by minimizing the total beampattern mismatch error and the average squared cross-correlation. In the second scenario, two geographically separated RISs were deployed for sensing and communications. The transmit beamformers and RIS phase shifts were optimized by maximizing the worst-case target illumination power. The authors of~\cite{Hua2022JointAA} studied \textcolor[rgb]{0.00,0.00,0.00}{the} transmit power minimization problem and considered two cases. For case 1, the interference introduced by the RIS was perfectly canceled and the cross correlation design was ignored. For case 2, both the interference introduced by the RIS and the cross-correlation pattern design were considered. In addition, \textcolor[rgb]{0.00,0.00,0.00}{the authors proved} that the dedicated radar signals were not required in case 1, while the dedicated radar signals were required in case 2 to enhance the system performance. The authors of~\cite{Xing2022PassiveBD} leveraged RIS to assist \textcolor[rgb]{0.00,0.00,0.00}{a mmWave} ISAC system and proposed a novel passive beamforming strategy by considering the target size. The closed-form detection probability for target sensing was derived and a new concept of ultimate detection resolution was introduced to measure the target detection capability. Furthermore, the resource allocation for mmWave ISAC system was studied in~\cite{9838546}, where the authors formulated a sum-rate maximization problem and derived closed-form expressions for the radar signal covariance matrix, the communication beamforming vectors and the RIS phase shifts. For THz ISAC system, the authors of~\cite{Liu2022ProximalPO} explored the implementation of RIS to \textcolor[rgb]{0.00,0.00,0.00}{compensate for} the path loss caused by molecular absorption. In addition, a joint beamforming optimization algorithm was proposed, \textcolor[rgb]{0.00,0.00,0.00}{which utilized} gradient-based, primal-dual proximal policy optimization in the multi-user multiple-input single-output (MISO) scenario. In practical scenarios, the LoS link between the BS (or access point) and the sensing targets \textcolor[rgb]{0.00,0.00,0.00}{is} likely to be blocked. As a result, target sensing is not applicable. To resolve this issue, the authors of~\cite{Song2022JointTA,Song2022IntelligentRS} utilized RIS to establish virtual LoS links for target sensing and proposed efficient passive beamforming optimization algorithms to guarantee the targets sensing performance. However, the prior works were focused on the traditional reflection-only RIS, which requires the users and targets to be located at the same side of the BS and RIS. To overcome this limitation, the authors of~\cite{Wang2022STARSEI} proposed a simultaneously transmitting and reflecting intelligent surface (STARS) enabled ISAC system, where STARS can provide $360^{\mathrm{o}}$ full-space coverage and \textcolor[rgb]{0.00,0.00,0.00}{divide} the whole space into two half-spaces, namely the communication space and the sensing space. \vspace{-0.5cm} \subsection{Motivations and Contributions} \textcolor[rgb]{0.00,0.00,0.00}{Motivated} by the aforementioned NOMA-ISAC and RIS-ISAC systems, this paper aims to achieve further performance enhancement by investigating the integration of NOMA and RIS in ISAC systems. The RIS-NOMA-ISAC system is still a nascent field and many open issues deserve exploration. Note that the integration of NOMA and RIS in \textcolor[rgb]{0.00,0.00,0.00}{an} ISAC system will provide more DoFs for system \textcolor[rgb]{0.00,0.00,0.00}{design} and optimization, which makes the optimization problem different from that of the NOMA-ISAC system or RIS-ISAC system. The motivations and challenges of this paper \textcolor[rgb]{0.00,0.00,0.00}{can be summarized as follows}. \begin{itemize} \item In future ISAC networks, \textcolor[rgb]{0.00,0.00,0.00}{a} massive number of devices will be connected to the networks. The communication users and radar targets will suffer from severe interference. Although multi-antenna techniques can be employed to mitigate the inter-user interference, they cannot efficiently support both communication and sensing functions due to the limited spatial DoFs, \textcolor[rgb]{0.00,0.00,0.00}{which motivates} us to consider \textcolor[rgb]{0.00,0.00,0.00}{the} NOMA technique. By applying SIC, NOMA can reduce the impact of \textcolor[rgb]{0.00,0.00,0.00}{limited spatial DoFs}, by partially removing inter-user interference and supporting more communication users with the same orthogonal resource. \item In conventional ISAC systems, radar sensing relies on LoS links between BS and radar targets, while the direct communication links between the BS and users are generally assumed to be available. However, in practical scenarios, the radar targets are likely to be distributed in the non-LoS (NLoS) region of the BS and the direct communication links are often blocked, which \textcolor[rgb]{0.00,0.00,0.00}{motivates us to apply the} RIS technique to provide virtual LoS links and reflection links for radar sensing and communication, respectively. \item By exploiting NOMA and RIS techniques, more DoFs can be introduced to enhance the design flexibility of ISAC systems. However, more optimization variables are introduced and the optimization complexity increases. Specifically, it is still a challenging issue to jointly optimize the active beamforming at the BS, the power allocation among NOMA users, and the passive beamforming at the RIS, while guaranteeing the radar-specific requirements and QoS requirements of communication users. \end{itemize} Inspired by the aforementioned research, motivations and challenges, this paper focus on the design of the RIS-NOMA-ISAC system. To the best of our knowledge, the joint optimization design of the considered system has not been studied yet. Our contributions are summarized as follows. \begin{enumerate} \item \textcolor[rgb]{0.00,0.00,0.00}{We propose a novel RIS-NOMA-ISAC system with a RIS-\textcolor[rgb]{0.00,0.00,0.00}{aided}-sensing structure, where a dedicated RIS is leveraged to introduce virtual LoS links for target sensing and to establish reflection links for user communication. Based on this, we derive the beampattern gain at the RIS as the sensing metric.} In addition, to achieve high spectral efficiency, we exploit the SIC technique of NOMA to multiplex communication users and to mitigate the inter-user interference. \textcolor[rgb]{0.00,0.00,0.00}{To improve the sensing performance while \textcolor[rgb]{0.00,0.00,0.00}{guaranteeing} the minimum QoS required for the communication users, we formulate the beampattern gain maxmin optimization problem by jointly optimizing active beamforming, power allocation coefficients, and passive beamforming.} \item The main challenges of solving the formulated problem is the \textcolor[rgb]{0.00,0.00,0.00}{high} coupling between the optimization variables and the exponential expressions of RIS phase shifts. We propose an iterative block coordinate descent (IBCD) algorithm to solve \textcolor[rgb]{0.00,0.00,0.00}{the formulated optimization problem}. \textcolor[rgb]{0.00,0.00,0.00}{In particular, we first transform the optimization problem into a more tractable form, then we divide the coupled variables into two blocks. Finally, we exploit semidefinite relaxation (SDR), successive convex approximation (SCA)\textcolor[rgb]{0.00,0.00,0.00}{, and the} sequential rank-one constraint relaxation (SRCR) algorithm to solve the resultant problems. } \item To reduce the complexity of the proposed IBCD algorithm, we further develop a low-complexity iterative alternating optimization (IAO) algorithm, where we \textcolor[rgb]{0.00,0.00,0.00}{derive closed-form solutions for} the power allocation coefficients in each NOMA cluster and obtain the active beamforming solution by solving a semidefinite programming (SDP) problem. \item \textcolor[rgb]{0.00,0.00,0.00}{Our simulation results verify the effectiveness of the proposed algorithms and demonstrate the \textcolor[rgb]{0.00,0.00,0.00}{superior ISAC performance} of the proposed RIS-NOMA-ISAC system over the RIS-ISAC system without NOMA. We also obtain some insights from the simulation results. Firstly, the IBCD algorithm outperforms the IAO algorithm but has a higher complexity. Secondly, the proposed RIS-NOMA-ISAC system can \textcolor[rgb]{0.00,0.00,0.00}{achieve} high sensing performance \textcolor[rgb]{0.00,0.00,0.00}{for} underloaded and overloaded communication scenarios.} \end{enumerate} \vspace{-0.5cm} \subsection{Organization} The rest of this paper is organized as follows. In Section II, the system model and the problem formulation for designing the RIS-NOMA-ISAC system are presented. In Sections III and IV, we present the proposed IBCD algorithm and IAO algorithm to solve the original optimization problem, respectively. Numerical results are presented in Section V, which is followed by the conclusions in Section VI. Notations: $\mathbb{C}^{M \times 1}$ denotes the space of $M\times 1$ complex valued vectors, diag(\textbf{x}) denotes a diagonal matrix whose diagonal elements correspond to vector \textbf{x}. The $(m,n)$-th element of matrix $\textbf{X}$ is denoted as $\left[ \mathbf{X} \right] _{m,n}$. ${\textbf{x}}^{H}$ and ${\textbf{X}}^{H}$ denote the conjugate transpose of vector \textbf{x} and matrix \textbf{X}, respectively. The notations Tr(\textbf{X}) and rank(\textbf{X}) denote the trace and rank of matrix \textbf{X}, respectively. $\mathcal{C}\mathcal{N}\left( 0,\sigma ^2 \right) $ represents the distribution of a circularly symmetric complex Gaussian variable (CSCG) with zero mean and $\sigma ^2$ variance. \vspace{-0.3cm} \section{System Model and Problem Formulation} \begin{figure}[t] \setlength{\belowcaptionskip}{-25pt} \centering \includegraphics[scale=0.25]{ST.eps} \caption{Illustration of the proposed RIS-NOMA-ISAC system.} \label{ST1} \end{figure} As shown in Fig.~\ref{ST1}, a RIS-NOMA-ISAC system is proposed, which consists of a dual-functional BS equipped with $N$ antennas, $2K$ single-antenna users, \textcolor[rgb]{0.00,0.00,0.00}{a} uniform linear array (ULA)-RIS with $M$ reflecting elements, and $L$ radar targets. We assume that all the direct links from the BS to the communication users and to the radar targets are blocked, which prevents the BS from performing communication and sensing tasks. By carefully deploying the RIS, virtual LoS links can be established from the BS to the communication users and to the radar targets. Thus, the performance of communication and sensing tasks can be significantly enhanced. To improve the spectral efficiency and to reduce the system load, we assume that the $2K$ users are grouped into $\emph{K}$ clusters by employing user clustering techniques$\footnote{Many efficient user clustering methods have been proposed for NOMA systems, such as: many-to-one matching~\cite{9167258}, K-means~\cite{8454272}, and correlation of channels~\cite{8485639}. These methods can also be applied for our considered system. In this paper, we only focus on the system optimization problem after user clustering.} $. As a result, there are two users in each cluster, namely the RIS-near user (RNU) and the RIS-far user (RFU). Generally, the RNUs are much closer to the RIS than the RFUs. In each cluster, \textcolor[rgb]{0.00,0.00,0.00}{the} NOMA protocol is applied to serve all users with the same orthogonal resource. The cluster and user sets are denoted by $\mathcal{K} =\left\{ 1,\cdots ,K \right\}$ and $\mathcal{U} =\left\{ 1,\cdots ,2K \right\}$, respectively. Moreover, ${{\mathcal U}_k}$ denotes the set of users in cluster $k$, where $\mathcal{U} =\cup _{k\in\mathcal{K}} \mathcal{U} _k$, $ \mathcal{U} _k\cap \mathcal{U} _{\underline{k}}=\oslash \left( k,\underline{k}\in \mathcal{K} ,k\ne \underline{k} \right) $. For notation simplicity, we denote the RNU and RFU in the $k$-th cluster as \textcolor[rgb]{0.00,0.00,0.00}{users} $\mathrm{U}\left( k,n \right) $ and $\mathrm{U}\left( k,f \right) $, respectively. \vspace{-0.5cm} \subsection{Communication Model} The superimposed communication signal transmitted by the BS is given by \begin{equation}\label{superimposed_signal} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathbf{x}=\sum_{k=1}^K{\mathbf{w}_k\left( \sqrt{a _{k,n}}s_{k,n}+\sqrt{a _{k,f}}s_{k,f} \right)}, \end{equation} where $\mathbf{w}_k\in \mathbb{C}^{N\times 1}$ is the active beamforming vector of the $k$-th cluster, $s_{k,i}$ denotes the communication signal to be sent to user $\mathrm{U}\left( k,i \right) $ with $\mathbb{E}\left( s_{k,i}^{H}s_{k,i} \right) =1$, and $a _{k,i}$ is the corresponding power allocation coefficient, $i\in \left\{ n,f \right\} $, $k\in \mathcal{K}$. Let $\mathbf{G}\in \mathbb{C}^{M\times N}$ and $\mathbf{g}_{k,i}\in \mathbb{C}^{M\times 1}$ be the channel coefficients of the communication links $\text{BS}\rightarrow \text{RIS}$ and $\text{RIS}\rightarrow \mathrm{U}\left( k,i \right)$, respectively. Furthermore, let $\mathbf{v}=\left[ e^{j\theta _{1}^{\text{RIS}}}e^{j\theta _{2}^{\text{RIS}}}\cdots e^{j\theta _{M}^{\text{RIS}}} \right] $ be the passive beamforming vector with $\theta _{m}^{\text{RIS}}\in \left[ 0,2\pi \right) $ denoting the phase shift of the $m$-th reflecting element, $m\in\mathcal{M}\triangleq \left\{ 1,2,\cdots , M \right\} $. With the help of RIS, the signal received at user $\mathrm{U}\left( k,i \right) $ can be mathematically expressed as \begin{equation}\label{signal_yki} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{split} y_{k,i} = & \underset{\text{desired}~ \text{signal}}{\underbrace{\left( \mathbf{g}_{k,i}^{H}\mathbf{\Theta G} \right) \mathbf{w}_k\sqrt{a _{k,i}}s_{k,i}}}+\underset{\text{intra}-\text{cluster}~ \text{interference}}{\underbrace{\left( \mathbf{g}_{k,i}^{H}\mathbf{\Theta G} \right) \mathbf{w}_k\sqrt{a _{k,\widetilde{i}}}s_{k,\widetilde{i}}}}+\underset{\text{inter}-\text{cluster}~ \text{interference}}{\underbrace{\left( \mathbf{g}_{k,i}^{H}\mathbf{\Theta G} \right) \sum_{\widetilde{k}\ne k}^K{\mathbf{w}_{\widetilde{k}}\sum_{j\in \left\{ n,f \right\}}{\sqrt{a _{\widetilde{k},j}}s_{\widetilde{k},j}}}}}+ \underset{\text{noise}}{\underbrace{z_{k,i}}}, \end{split} \end{equation} with $\widetilde{i},i\in \left\{ n,f \right\}$ and $\widetilde{i}\ne i$, where $\mathbf{\Theta }=\mathrm{diag}\left( \mathbf{v} \right) $ is the RIS's diagonal phase shift matrix and $z_{k,i}\sim \mathcal{C} \mathcal{N} \left( 0,\sigma ^2 \right) $ is the additive white Gaussian noise (AWGN). In the proposed RIS-NOMA-ISAC system, SIC is applied for the users to decode their signals in each cluster. We assume a fixed decoding order in each cluster. Particularly, user $\mathrm{U}\left( k,n \right) $ first decodes the signal of user $\mathrm{U}\left( k,f \right) $ and then subtracts it from its observation to decode its own information. Therefore, the achievable rate for user $\mathrm{U}\left( k,n \right) $ to decode the signal of user $\mathrm{U}\left( k,f \right) $ is given by \begin{equation}\label{Rn21} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} R_{k,f\rightarrow n}=\log _2\left( 1+\frac{a_{k,f}\left| \mathbf{g}_{k,n}^{H}\mathbf{\Theta Gw}_k \right|^2}{I_{k,n}^{\mathrm{itra}}+I_{k,n}^{\mathrm{iter}}+\sigma ^2} \right), \end{equation} where $I_{k,n}^{\mathrm{itra}}=a_{k,n}\left| \mathbf{g}_{k,n}^{H}\mathbf{\Theta Gw}_k \right|^2 $ and $I_{k,n}^{\mathrm{iter}}=\sum_{\widetilde{k}\ne k}^K{\left| \mathbf{g}_{k,n}^{H}\mathbf{\Theta Gw}_{\widetilde{k}} \right|^2} $. If the above decoding is successful, user $\mathrm{U}\left( k,n \right) $ removes the signal $s_{k,f}$ from $y_{k,n}$ to further decode its own signal $s_{k,n}$. Therefore, the individual achievable rate of user $\mathrm{U}\left( k,n \right) $ is given by \begin{equation}\label{Rn1} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} R_{k,n}=\log _2\left( 1+\frac{a_{k,n}\left| \mathbf{g}_{k,n}^{H}\mathbf{\Theta Gw}_k \right|^2}{I_{k,n}^{\mathrm{iter}}+\sigma ^2} \right). \end{equation} Accordingly, user $\mathrm{U}\left( k,f \right) $ directly decodes its own signal by treating the other users' signals as interference. Therefore, the achievable rate for user $\mathrm{U}\left( k,f \right) $ to decode its own signal can be expressed as \begin{equation}\label{Rn22} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} R_{k,f\rightarrow f}=\log _2\left( 1+\frac{a_{k,f}\left| \mathbf{g}_{k,f}^{H}\mathbf{\Theta Gw}_k \right|^2}{I_{k,f}^{\mathrm{itra}}+I_{k,f}^{\mathrm{iter}}+\sigma ^2} \right), \end{equation} where $I_{k,f}^{\mathrm{itra}}=a_{k,n}\left| \mathbf{g}_{k,f}^{H}\mathbf{\Theta Gw}_k \right|^2 $ and $I_{k,f}^{\mathrm{iter}}=\sum_{\widetilde{k}\ne k}^K{\left| \mathbf{g}_{k,f}^{H}\mathbf{\Theta Gw}_{\widetilde{k}} \right|^2}$. As a result, the individual achievable rate of user $\mathrm{U}\left( k,f \right) $ is given by~\cite{9240028,8684765} \begin{equation}\label{Rn2} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} R_{k,f}=\min \left\{ R_{k,f\rightarrow n},R_{k,f\rightarrow f} \right\}. \end{equation} \vspace{-1.5cm} \subsection{Radar Detection Model} Since all the potential targets are in the NLoS \textcolor[rgb]{0.00,0.00,0.00}{areas} of the BS, no LoS links from the BS can be exploited to perform radar target sensing. However, we can utilize the reflection-LoS links created by the RIS to complete the sensing tasks. We consider using the RIS's beampattern gain as the sensing performance metric. The reflected signal at the RIS can be expressed as \begin{equation}\label{signal_RIS} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \overline{\mathbf{x}}=\mathbf{\Theta G}\left( \sum_{k=1}^K{\mathbf{w}_k\left( \sqrt{a _{k,n}}s_{k,n}+\sqrt{a _{k,f}}s_{k,f} \right)} \right). \end{equation} Therefore, the corresponding covariance matrix is given by \begin{equation}\label{covariance matrix} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathbf{R}_{\overline{\mathbf{x}}}=\mathbb{E}\left( \overline{\mathbf{x}}\overline{\mathbf{x}}^H \right) =\mathbf{\Theta G}\left( \sum_{k=1}^K{\mathbf{w}_k\mathbf{w}_{k}^{H}} \right) \mathbf{G}^H\mathbf{\Theta }^H. \end{equation} In our considered system, the communication signal is used to perform radar target sensing, thus the RIS's beampattern gain~\cite{Song2022JointTA} with respect to the $q$-th \textcolor[rgb]{0.00,0.00,0.00}{angle of interest}, i.e, $\theta _{q}^{\text{Tg}}$, is given by \begin{equation}\label{beam pattern} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathcal{P}_{\theta _{q}^{\text{Tg}}}\left( \mathbf{w}_k,\mathbf{v} \right) =\boldsymbol{a }^H\left( \theta _{q}^{\text{Tg}} \right) \mathbf{\Theta G}\left( \sum_{k=1}^K{\mathbf{w}_k\mathbf{w}_{k}^{H}} \right) \mathbf{G}^H\mathbf{\Theta }^H\boldsymbol{a }\left( \theta _{q}^{\text{Tg}} \right), \end{equation} where $\boldsymbol{a }\left( \theta \right) =\left[ 1,e^{j\frac{2\pi d}{\lambda}\sin \left( \theta \right)},\cdots ,e^{j\frac{2\pi d}{\lambda}\left( M-1 \right) \sin \left( \theta \right)} \right] ^T$ is the steering vector at the RIS with angle $\theta$, $d$ denotes the antenna spacing, $\lambda $ denotes the carrier wavelength, $q\in \mathcal{Q} \triangleq \left\{ 1,2,\cdots ,Q \right\} $, and $\mathcal{Q} _{\theta}=\left\{ \theta _{1}^{\mathrm{Tg}},\theta _{2}^{\mathrm{Tg}},\cdots ,\theta _{Q}^{\mathrm{Tg}} \right\} $ is the set of sensing \textcolor[rgb]{0.00,0.00,0.00}{angles of interest}. \vspace{-0.5cm} \subsection{Maximize the Minimum Beampattern Gain} The objective of this paper is to maximize the minimum beampattern gain towards \textit{Q} \textcolor[rgb]{0.00,0.00,0.00}{angles of interest} by jointly optimizing the active beamforming, power allocation coefficients and passive beamforming.~Accordingly, the optimization problem is formulated as \begin{subequations}\label{OP_MM} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\mathbf{a}_k,\mathbf{w}_k,\mathbf{v}}{\max}\underset{q\in \mathcal{Q}}{\min}\mathcal{P}_{\theta _{q}^{\text{Tg}}}\left( \mathbf{w}_k,\mathbf{v} \right) , \\ &\mathrm{s}.\mathrm{t}.~R_{k,i}\geqslant R_{k,i}^{\min}, \label{OP_MM:b} \\ & \ \ \ \ \ \sum_{k=1}^K{\lVert \mathbf{w}_k \rVert _2} \leqslant P_{\max} , \label{OP_MM:c} \\ & \ \ \ \ \ a _{k,n}+a _{k,f}=1, a_{k,i}\in \left( 0,1 \right) , \label{OP_MM:d} \\ & \ \ \ \ \ \theta _{m}^{\text{RIS}}\in \left[ 0,2\pi \right) ,\label{OP_MM:e} \end{align} \end{subequations} where $ R_{k,i}^{\min}$ is the minimum QoS requirement, $P_{\max}$ is the maximum transmit power at the BS, $\mathbf{a}_k=\left[ a_{k,n}~a_{k,f} \right] ^T$, $i\in \left\{ n,f \right\}, k\in \mathcal{K}$, $m\in \mathcal{M}$. Constraint~\eqref{OP_MM:b} ensures the minimum QoS requirement of each NOMA user, constraint~\eqref{OP_MM:c} limits the maximum transmit power at the BS, constraint~\eqref{OP_MM:d} represents the power allocation coefficient constraint in each cluster, \textcolor[rgb]{0.00,0.00,0.00}{and} constraint~\eqref{OP_MM:e} is the phase shift constraint for the RIS. Due to the coupling between $\mathbf{w}_k$, $\mathbf{a}_k$ and $\mathbf{v}$, the non-convexity of QoS constraints, and the exponential form of phase shifts in $\mathbf{v}$, problem~\eqref{OP_MM} is a highly nonconvex optimization problem and the optimal solution is in general intractable. In the next section, a suboptimal IBCD algorithm is proposed to solve problem~\eqref{OP_MM}. \vspace{-0.5cm} \section{Proposed Solution} In this section, we elaborate on how to solve problem~\eqref{OP_MM}. We first transform problem~\eqref{OP_MM} into a more tractable form. To facilitate the design, we define $\mathbf{W}_k=\mathbf{w}_k\mathbf{w}_{k}^{H}$, where $\mathbf{W}_k$ satisfies $\mathbf{W}_k\succcurlyeq \textbf{0}$ and $\text{rank}\left( \mathbf{W}_k \right) =1$, $k\in \mathcal{K}$. Similarly, we define $\mathbf{V}=\mathbf{v}^H\mathbf{v} $, which needs to satisfy $\mathbf{V}\succcurlyeq \textbf{0}$ and $\text{rank}\left( \mathbf{V} \right) =1$. Then, the beampattern gain in~\eqref{beam pattern} can be rewritten as: \begin{equation}\label{beam pattern rewritten} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathcal{P}_{\theta _{q}^{\text{Tg}}}\left( \mathbf{W}_k,\mathbf{V} \right) =\text{Tr}\left[ \mathbf{V\Upsilon }_q\left( \sum_{k=1}^K{\mathbf{W}_k} \right) \mathbf{\Upsilon }_{q}^{H} \right] , \end{equation} where $\mathbf{\Upsilon }_q=\mathrm{diag}\left\{ \boldsymbol{a }^H\left( \theta _{q}^{\text{Tg}} \right) \right\} \mathbf{G}$ Moreover, the quadratic terms $\left| \mathbf{g}_{k,i}^{H}\mathbf{\Theta Gw}_k \right|^2 $ and $\left| \mathbf{g}_{k,i}^{H}\mathbf{\Theta Gw}_{\widetilde{k}} \right|^2 $ in~\eqref{Rn21},~\eqref{Rn1} and~\eqref{Rn22} can be respectively rewritten as: \begin{equation}\label{channel gain rewritten} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{cases} \left| \mathbf{g}_{k,i}^{H}\mathbf{\Theta Gw}_k \right|^2=\text{Tr}\left( \mathbf{V\Gamma }_{k,i}\mathbf{W}_k\mathbf{\Gamma }_{k,i}^{H} \right),\\ \left| \mathbf{g}_{k,i}^{H}\mathbf{\Theta Gw}_{\widetilde{k}} \right|^2=\text{Tr}\left( \mathbf{V\Gamma }_{k,i}\mathbf{W}_{\widetilde{k}}\mathbf{\Gamma }_{k,i}^{H} \right), k\ne \tilde{k},\\ \end{cases} \end{equation} where $\mathbf{\Gamma }_{k,i}=\mathrm{diag}\left\{ \mathbf{g}_{k,i}^{H} \right\} \mathbf{G}$, $i\in \left\{ n,f \right\}$, and $k,\tilde{k} \in \mathcal{K}$. By exploiting the above definitions, constraints in~\eqref{OP_MM:b} can be equivalently reformulated as: \begin{equation}\label{R11 constrait} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,n}\mathrm{Tr}\left( \mathbf{V\Gamma }_{k,n}\mathbf{W}_k\mathbf{\Gamma }_{k,n}^{H} \right) \geqslant r_{k,n}^{\min}\left( I_{k,n}^{\mathrm{iter}}+\sigma ^2 \right), \end{equation} \begin{equation}\label{R21 constrait} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}\mathrm{Tr}\left( \mathbf{V\Gamma }_{k,n}\mathbf{W}_k\mathbf{\Gamma }_{k,n}^{H} \right) \geqslant r_{k,f}^{\min}\left( I_{k,n}^{\mathrm{itra}}+I_{k,n}^{\mathrm{iter}}+\sigma ^2 \right), \end{equation} \begin{equation}\label{R22 constrait} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}\mathrm{Tr}\left( \mathbf{V\Gamma }_{k,f}\mathbf{W}_k\mathbf{\Gamma }_{k,f}^{H} \right) \geqslant r_{k,f}^{\min}\left( I_{k,f}^{\mathrm{itra}}+I_{k,f}^{\mathrm{iter}}+\sigma ^2 \right), \end{equation} where $I_{k,n}^{\mathrm{itra}}=a_{k,n}\mathrm{Tr}\left( \mathbf{V\Gamma }_{k,n}\mathbf{W}_k\mathbf{\Gamma }_{k,n}^{H} \right) $, $I_{k,f}^{\mathrm{itra}}=a_{k,n}\mathrm{Tr}\left( \mathbf{V\Gamma }_{k,f}\mathbf{W}_k\mathbf{\Gamma }_{k,f}^{H} \right) $, $I_{k,i}^{\mathrm{iter}}=\sum_{\widetilde{k}\ne k}^K{\mathrm{Tr}\left( \mathbf{V\Gamma }_{k,i}\mathbf{W}_{\widetilde{k}}\mathbf{\Gamma }_{k,i}^{H} \right)} $, $r_{k,i}^{\min}=2^{R_{k,i}^{\min}}-1 $. Finally, the original problem~\eqref{OP_MM} can be equivalently recast as follows: \begin{subequations}\label{OP_MM_SDP} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\mathbf{a}_k,\mathbf{W}_k\succcurlyeq 0,\mathbf{V}\succcurlyeq 0}{\max}\underset{q\in \mathcal{Q}}{\min}\mathcal{P}_{\theta _{q}^{\text{Tg}}}\left( \mathbf{W}_k,\mathbf{V} \right) , \\ &\mathrm{s}.\mathrm{t}.~\sum_{k=1}^K{\text{Tr}\left( \mathbf{W}_k \right)} \leqslant P_{\max}, \label{OP_MM_SDP:b} \\ & \ \ \ \ \ \left[ \mathbf{V} \right] _{m,m}=1, m\in \mathcal{M}, \label{OP_MM_SDP:c}\\ & \ \ \ \ \ \text{rank}\left( \mathbf{W}_k \right) =1, k\in \mathcal{K}, \label{OP_MM_SDP:d} \\ & \ \ \ \ \ \text{rank}\left( \mathbf{V} \right) =1, \label{OP_MM_SDP:e} \\ & \ \ \ \ \ \eqref{OP_MM:d},~\eqref{R11 constrait},~\eqref{R21 constrait},~\eqref{R22 constrait}. \end{align} \end{subequations} It is noted that the objective function of problem~\eqref{OP_MM_SDP} is non-smooth, \textcolor[rgb]{0.00,0.00,0.00}{hence,} we introduce an auxiliary variable $\chi$ to transform the original nonsmooth optimization problem~\eqref{OP_MM_SDP} into a smooth optimization problem, which is given by \begin{subequations}\label{OP_MM_SDP_smooth} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\mathbf{a }_k,\chi >0,\mathbf{W}_k\succcurlyeq 0,\mathbf{V}\succcurlyeq 0}{\max}\chi , \\ &\mathrm{s}.\mathrm{t}.~\text{Tr}\left[ \mathbf{V\Upsilon }_q\left( \sum_{k=1}^K{\mathbf{W}_k} \right) \mathbf{\Upsilon }_{q}^{H} \right] \geqslant \chi, q\in \mathcal{Q}, \label{OP_MM_SDP_smooth:b} \\ & \ \ \ \ \ \eqref{OP_MM:d},~\eqref{R11 constrait},~\eqref{R21 constrait},~\eqref{R22 constrait},~\eqref{OP_MM_SDP:b},~\eqref{OP_MM_SDP:c},~\eqref{OP_MM_SDP:d},~\eqref{OP_MM_SDP:e}. \end{align} \end{subequations} In the remainder of this article, we utilize \textcolor[rgb]{0.00,0.00,0.00}{the} IBCD approach to solve the equivalent problem~\eqref{OP_MM_SDP_smooth} instead of the original problem~\eqref{OP_MM}. To be specific, the coupled variables are divided into two blocks, namely $\left\{ \mathbf{W}_k,\mathbf{a}_k \right\} $ and $\mathbf{V}$. The active beamforming matrices $\left\{ \mathbf{W}_k \right\} $ and power allocation coefficients $\left\{ \mathbf{a}_k \right\} $ are first jointly optimized by applying \textcolor[rgb]{0.00,0.00,0.00}{the} SCA and SDR methods. Then, the passive beamforming matrix $\mathbf{V}$ is solved by employing the SRCR algorithm~\cite{Cao2017ASC}. \subsection{Joint Active Beamforming and Power Allocation Coefficients Optimization} For a given passive beamforming matrix $\mathbf{V}$, the joint optimization problem for the design of $\left\{ \mathbf{W}_k \right\} $ and $\left\{ \mathbf{a}_k \right\} $ is given by \begin{subequations}\label{ABP_Max_SDP} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\mathbf{a }_k,\chi >0,\mathbf{W}_k\succcurlyeq 0}{\max}\chi , \\ &\mathrm{s}.\mathrm{t}.~\eqref{OP_MM:d},~\eqref{R11 constrait},~\eqref{R21 constrait},~\eqref{R22 constrait},~\eqref{OP_MM_SDP:b},~\eqref{OP_MM_SDP:d},~\eqref{OP_MM_SDP_smooth:b}. \end{align} \end{subequations} We note that the objective function of problem~\eqref{ABP_Max_SDP} is an affine function. However, $\mathbf{W}_k$ and $\mathbf{a}_k$ are coupled together in constraints~\eqref{R11 constrait},~\eqref{R21 constrait}, and~\eqref{R22 constrait}. Furthermore, the rank-one constraint~\eqref{OP_MM_SDP:d} is also nonconvex. As a result, these obstacles make problem~\eqref{ABP_Max_SDP} difficult to be solved. In the following, we will further transform and approximate problem~\eqref{ABP_Max_SDP} to achieve a tractable formulation. To begin with, we define $\mathbf{H}_{k,i}=\mathbf{\Gamma }_{k,i}^{H}\mathbf{V\Gamma }_{k,i}$, $i\in \left\{ n,f \right\} $. In addition, according to the equality constraint~\eqref{OP_MM:d}, we have: $a _{k,f}=1-a _{k,n}$. Then, substituting $\mathbf{H}_{k,i}$ and $a _{k,f}$ into~\eqref{R11 constrait},~\eqref{R21 constrait} and~\eqref{R22 constrait}, we have the following equivalent inequality constraints, \begin{equation}\label{R11_equivalent} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) \geqslant r_{k,n}^{\min}\left( I_{k,n}^{\mathrm{iter}}+\sigma ^2 \right), \end{equation} \begin{equation}\label{R21_equivalent} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \frac{r_{k,f}^{\min}\left( \frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}{r_{k,f}^{\min}}-I_{k,n}^{\mathrm{iter}}-\sigma ^2 \right)}{r_{k,f}^{\min}+1}\geqslant a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) , \end{equation} \begin{equation}\label{R22_equivalent} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \frac{r_{k,f}^{\min}\left( \frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)}{r_{k,f}^{\min}}-I_{k,f}^{\mathrm{iter}}-\sigma ^2 \right)}{r_{k,f}^{\min}+1}\geqslant a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right), \end{equation} where $I_{k,i}^{\mathrm{iter}}=\sum_{\widetilde{k}\ne k}^K{\mathrm{Tr}\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,i} \right)}$ It is observed that the functions in the left hand side of~\eqref{R11_equivalent}, and in the right hand sides of~\eqref{R21_equivalent} and~\eqref{R21_equivalent} have similar structure. In fact, the functions $a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) $ and $a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)$ are bilinear functions over $a_{k,n}$ and $\mathbf{W}_k$, which are neither convex nor concave. To develop \textcolor[rgb]{0.00,0.00,0.00}{an} efficient algorithm for jointly optimizing $\left\{ \mathbf{W}_k \right\}$ and $\left\{ \mathbf{a}_k \right\}$, \textcolor[rgb]{0.00,0.00,0.00}{the} SCA and SDR approaches are leveraged to tackle the nonconvex constraints~\eqref{R11_equivalent}, ~\eqref{R21_equivalent}, and ~\eqref{R22_equivalent}. In particular, we first reformulate constraint~\eqref{R11_equivalent} by introducing a new slack variable $\eta _k$, such that \begin{numcases}{} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) \geqslant \eta _{k}^{2}, \label{slack_1}\\ \eta _{k}^{2}\geqslant r_{k,n}^{\min}\left( I_{k,n}^{\mathrm{iter}}+\sigma ^2 \right). \label{slack_2} \end{numcases} Then, by applying the Schur complement theory~\cite{Xie2021JointOO}, \eqref{slack_1} can be further expressed in \textcolor[rgb]{0.00,0.00,0.00}{the} linear matrix inequality form, which is given by \begin{equation}\label{LMI} \left[ \begin{matrix} a_{k,n}& \eta _k\\ \eta _k& \mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)\\ \end{matrix} \right] \succcurlyeq \textbf{0},\exists \eta _k> 0. \end{equation} Furthermore, by using the SCA approach based on \textcolor[rgb]{0.00,0.00,0.00}{first}-order Taylor approximation, \eqref{slack_2} can be approximated as follows \begin{equation}\label{AB_Max_SDP:c21} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \widetilde{\eta _{k}^{2}}+2\widetilde{\eta _k}\left( \eta _k-\widetilde{\eta _k} \right) \geqslant r_{k,n}^{\min}\left( I_{k,n}^{\mathrm{iter}}+\sigma ^2 \right), \end{equation} where $\widetilde{\eta }_{k}$ is a fixed point and can be updated by $\widetilde{\eta }_{k}^{\left( t_1 \right)}=\eta _{k}^{\left( t_1 \right)}$, \textcolor[rgb]{0.00,0.00,0.00}{where} $t_1$ is the iteration index. Next, we tackle the non-convexity in constraints~\eqref{R21_equivalent} and~\eqref{R22_equivalent}. To tackle this challenge, we resort to the arithmetic-geometric mean inequality~\cite{Sun2018JointBA}. Specifically, $a _{k,n}\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) $ and $a _{k,n}\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)$ can be\textcolor[rgb]{0.00,0.00,0.00}{, respectively,} approximated as \begin{equation}\label{CUB1} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) \leqslant \frac{\beta _{k,1}a_{k,n}^{2}}{2}+\frac{\left( \mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) \right) ^2}{2\beta _{k,1}}\triangleq \mathcal{T} _{k,1}, \end{equation} \begin{equation}\label{CUB2} a_{k,n}\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right) \leqslant \frac{\beta _{k,2}a_{k,n}^{2}}{2}+\frac{\left( \mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right) \right) ^2}{2\beta _{k,2}}\triangleq \mathcal{T} _{k,2}, \end{equation} where $\beta _{k,1}$ and $\beta _{k,2}$ are fixed points. The equality in~\eqref{CUB1} and~\eqref{CUB2} will always hold if $\beta _{k,1}=\frac{\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}{a _{k,n}}$ and $\beta _{k,2}=\frac{\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)}{a _{k,n}} $. Based on the aforementioned transformations and approximations, \textcolor[rgb]{0.00,0.00,0.00}{the} constraints given in~\eqref{R21_equivalent} and~\eqref{R22_equivalent} can be\textcolor[rgb]{0.00,0.00,0.00}{, respectively,} reformulated as \begin{equation}\label{AB_Max_SDP:d11} \setlength{\abovedisplayskip}{0pt} \setlength{\belowdisplayskip}{0pt} \frac{r_{k,f}^{\min}\left( \frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}{r_{k,f}^{\min}}-I_{k,n}^{\mathrm{iter}}-\sigma ^2 \right)}{r_{k,f}^{\min}+1}\geqslant \mathcal{T} _{k,1}, \end{equation} \begin{equation}\label{AB_Max_SDP:e11} \setlength{\abovedisplayskip}{0pt} \setlength{\belowdisplayskip}{0pt} \frac{r_{k,f}^{\min}\left( \frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)}{r_{k,f}^{\min}}-I_{k,f}^{\mathrm{iter}}-\sigma ^2 \right)}{r_{k,f}^{\min}+1}\geqslant \mathcal{T} _{k,2}. \end{equation} Finally, let us turn our attention to the rank-one constraint~\eqref{OP_MM_SDP:d}. To address this issue, we exploit the SDR technique by removing the rank-one constraints from the problem formulation. In particular, the relaxed problem is \textcolor[rgb]{0.00,0.00,0.00}{given} as \begin{subequations}\label{AB_Max_SDR} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\chi ,\eta _k>0,0<a_{k,n}<1,\mathbf{W}_k\succcurlyeq 0}{\max}\chi, \\ &\mathrm{s}.\mathrm{t}.~~\eqref{OP_MM_SDP:b},~\eqref{OP_MM_SDP_smooth:b},~\eqref{LMI},~\eqref{AB_Max_SDP:c21}, ~\eqref{AB_Max_SDP:d11},~\eqref{AB_Max_SDP:e11}. \end{align} \end{subequations} Obviously, problem~\eqref{AB_Max_SDR} is a convex SDP problem and can be efficiently solved by the CVX tool~\cite{cvx}. In the following theorem, we will verify the tightness of the relaxed problem~\eqref{AB_Max_SDR}. \begin{theorem}\label{Rank1 in joint problem} If the relaxed problem~\eqref{AB_Max_SDR} is feasible, then the solutions $\left\{ \mathbf{W}_k \right\} $ obtained by solving problem~\eqref{AB_Max_SDR} always satisfy $\text{rank}\left( \mathbf{W}_k \right) \leqslant 1$, $k\in \mathcal{K}$. \textit{Proof}: Please refer to Appendix A. \end{theorem} \vspace{-0.3cm} \textbf{Theorem~\ref{Rank1 in joint problem}} represents the fact that we can obtain the rank-one solutions of problem~\eqref{ABP_Max_SDP} by solving the convex problem~\eqref{AB_Max_SDR}. \vspace{-0.3cm} \begin{algorithm} \caption{Proposed joint active beamforming and power allocation coefficients optimization algorithm} \label{ABPAC} \begin{algorithmic}[1] \STATE \textbf{Initialize} $\beta _{k,1}^{\left( 0 \right)},\beta _{k,2}^{\left( 0 \right)},\widetilde{\eta }_{k}^{\left( 0 \right)},k\in \mathcal{K} $, and set ${t_1} = 0$. \REPEAT \STATE ${t_1} = {t_1} + 1$; \STATE update $ \mathbf{W}_{k}^{\left( t_1 \right)}$, $a_{k,n}^{\left( t_1 \right)}$ and $ \eta _{k}^{\left( t_1 \right)}$ by solving problem~\eqref{AB_Max_SDR} with given $\beta _{k,1}^{\left( t_1-1 \right)},\beta _{k,2}^{\left( t_1-1 \right)},\widetilde{\eta }_{k}^{\left( t_1-1 \right)}$; \STATE update $\widetilde{\eta }_{k}^{\left( t_1 \right)}=\eta _{k}^{\left( t_1 \right)}$, $\beta _{k,1}^{\left( t_1 \right)}=\frac{\text{Tr}\left( \mathbf{W}_{k}^{\left( t_1 \right)}\mathbf{H}_{k,n} \right)}{a _{k,n}^{\left( t_1 \right)}}$ and $\beta _{k,2}^{\left( t_1 \right)}=\frac{\text{Tr}\left( \mathbf{W}_{k}^{\left( t_1 \right)}\mathbf{H}_{k,f} \right)}{a _{k,n}^{\left( t_1 \right)}} $; \UNTIL {the objective value of problem~\eqref{AB_Max_SDR} converge}. \STATE \textbf{Output}: $\mathbf{W}_{k} $ and $\mathbf{a}_{k}$, $ k\in \mathcal{K}$. \end{algorithmic} \end{algorithm} \vspace{-0.5cm} Based on the above discussion, the proposed algorithm to solve problem~\eqref{ABP_Max_SDP} is summarized in \textbf{Algorithm~\ref{ABPAC}}. It is noted that we need to initialize the fixed points $\left\{ \beta _{k,1}^{\left( 0 \right)},\beta _{k,2}^{\left( 0 \right)},\widetilde{\eta }_{k}^{\left( 0 \right)} \right\} $ in \textbf{Algorithm~\ref{ABPAC}}. However, it is difficult to find these feasible fixed points. In the following, we proceed to construct a feasibility problem and develop a novel feasible initial points finding algorithm. By \textcolor[rgb]{0.00,0.00,0.00}{introducing} an infeasibility indicator $\delta \ge 0$, the formulated feasibility problem is given as: \begin{subequations}\label{feasible problem} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\delta \geqslant 0,\chi >0,0<a_{k,n}<1,\mathbf{W}_k\succcurlyeq \textbf{0}}{\min}\delta,\\ &{\mathrm{s}.\mathrm{t}.}~\mathrm{Tr}\left[ \mathbf{V\Upsilon }_q\left( \sum_{k=1}^K{\mathbf{W}_k} \right) \mathbf{\Upsilon }_{q}^{H} \right] +\delta \geqslant \chi , \\ & \ \ \ \ \ \widetilde{\eta _{k}^{2}}+2\widetilde{\eta _k}\left( \eta _k-\widetilde{\eta _k} \right) +\delta \geqslant r_{k,n}^{\min}\left( I_{k,n}^{\mathrm{iter}}+\sigma ^2 \right) ,\\ & \ \ \ \ \ \frac{r_{k,f}^{\min}\left( \frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}{r_{k,f}^{\min}}-I_{k,n}^{\mathrm{iter}}-\sigma ^2 \right)}{r_{k,f}^{\min}+1} +\delta \geqslant \mathcal{T} _{k,1}, \\ & \ \ \ \ \ \frac{r_{k,f}^{\min}\left( \frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)}{r_{k,f}^{\min}}-I_{k,f}^{\mathrm{iter}}-\sigma ^2 \right)}{r_{k,f}^{\min}+1} +\delta \geqslant \mathcal{T} _{k,2},\\ & \ \ \ \ \ P_{\max}+ \delta \geqslant \sum_{K=1}^K{\text{Tr}\left( \mathbf{W}_k \right)},\\ & \ \ \ \ \ \eqref{LMI}, \end{align} \end{subequations} where $\delta $ denotes how far the corresponding \textcolor[rgb]{0.00,0.00,0.00}{constraint} in~problem~\eqref{AB_Max_SDR} is from being satisfied, $q\in \mathcal{Q}$ and $k\in \mathcal{K}$. Problem~\eqref{feasible problem} is also a convex optimization problem, which can be solved efficiently. The proposed feasible points finding algorithm is summarized in\textbf{ Algorithm 2}. \vspace{-0.3cm} \begin{algorithm} \caption{Feasible initial points finding algorithm} \label{Feasible_algorithm} \begin{algorithmic}[1] \STATE Randomly initialize fixed points $\beta _{k,1}^{\left( 0 \right)},\beta _{k,2}^{\left( 0 \right)},\widetilde{\eta }_{k}^{\left( 0 \right)},k\in \mathcal{K} $. Let iteration index ${t_2} = 0$. \REPEAT \STATE ${t_2} = {t_2} + 1$; \STATE update $ \mathbf{W}_{k}^{\left( t_2 \right)}$, $\mathbf{R}_{0}^{\left( t_2 \right)} $ and $ \eta _{k}^{\left( t_2 \right)}$ by solving problem~\eqref{feasible problem} with given $\beta _{k,1}^{\left( t_2-1 \right)},\beta _{k,2}^{\left( t_2-1 \right)},\widetilde{\eta }_{k}^{\left( t_2-1 \right)},k\in \mathcal{K}$; \STATE update $\widetilde{\eta }_{k}^{\left( t_2 \right)}=\eta _{k}^{\left( t_2 \right)}$, $\beta _{k,2}^{\left( t_2 \right)}=\frac{\text{Tr}\left( \mathbf{W}_{k}^{\left( t_2 \right)}\mathbf{H}_{k,n} \right)}{a _{k,n}^{\left( t_2 \right)}}$ and $\beta _{k,2}^{\left( t_2 \right)}=\frac{\text{Tr}\left( \mathbf{W}_{k}^{\left( t_2 \right)}\mathbf{H}_{k,f} \right)}{a _{k,n}^{\left( t_2 \right)}} $; \UNTIL {$\delta$ below a predefined threshold}. \STATE \textbf{Output}: $\beta _{k,1},\beta _{k,2},\widetilde{\eta }_{k},k\in \mathcal{K} $. \end{algorithmic} \end{algorithm} \begin{remark}\label{remark:algorithm 4} When $\delta\rightarrow 0$, the obtained solutions of problem~\eqref{feasible problem} are feasible for problem~\eqref{AB_Max_SDR}. Therefore, the output of \textbf{Algorithm~\ref{Feasible_algorithm}} can be used to replace the initial fixed points in \textbf{Algorithm~\ref{ABPAC}}. \end{remark} \subsection{Passive Beamforming Optimization} For any given $\left\{ \mathbf{W}_k \right\}$ and $\left\{ \textbf{a} _{k} \right\}$, the passive beamforming optimization problem is given by \begin{subequations}\label{PB_Max_SDP} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\chi >0,\mathbf{V}\succcurlyeq \textbf{0}}{\max}\chi , \\ &\mathrm{s}.\mathrm{t}.~\eqref{R11 constrait},~\eqref{R21 constrait},~\eqref{R22 constrait},~\eqref{OP_MM_SDP:c},~\eqref{OP_MM_SDP:e},~\eqref{OP_MM_SDP_smooth:b}. \end{align} \end{subequations} Now, the remaining non-convexity in problem~\eqref{PB_Max_SDP} lies in the rank-one constraint~\eqref{OP_MM_SDP:e}. According to the SRCR algorithm~\cite{Cao2017ASC}, the constraint $\text{rank}\left( \mathbf{V} \right) =1 $ can be transformed equivalently as: \begin{equation} \label{rank_ralex} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathbf{e}_{\max}^{H}\left( \mathbf{V}^{\left( t_3 \right)} \right) \mathbf{Ve}_{\max}\left( \mathbf{V}^{\left( t_3 \right)} \right) \geqslant \varepsilon ^{\left( t_3 \right)}\mathrm{Tr}\left( \mathbf{V} \right), \end{equation} where $\mathbf{V}^{\left( t_3 \right)}$ is the obtained solution in the $t_3$-th iteration, $\mathbf{e}_{\max}\left( \mathbf{V}^{\left( t_3 \right)} \right) $ is the eigenvector corresponding to the maximum eigenvalue of $\mathbf{V}^{\left( t _3 \right)}$, $\varepsilon ^{\left( t_3 \right)}\in \left[ 0,1 \right]$ is a relaxation parameter in the $t_3$-th iteration. We can increase $\varepsilon ^{\left( t_3 \right)}$ from 0 to 1 sequentially via iterations to gradually approach a rank-one solution. After each iteration, the relaxation parameter can be updated as \begin{equation} \label{update relaxation parameter} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \varepsilon ^{\left( t_3+1 \right)}\longleftarrow \min \left( 1,\frac{\lambda _{\max}\left( \mathbf{V}^{\left( t_3+1 \right)} \right)}{\mathrm{Tr}\left( \mathbf{V}^{\left( t_3+1 \right)} \right)}+\rho ^{\left( t_3+1 \right)} \right) , \end{equation} where $\lambda _{\max}\left( \mathbf{V}^{\left( t_3 \right)} \right) $ is the largest eigenvalue of $\mathbf{V}^{\left( t_3 \right)}$ and $\rho ^{\left( t_3 \right)}$ denotes the step size. Finally, in the $t_3$-th iteration, the optimization problem that needs to be solved is given as follows \begin{subequations}\label{PB_Max_SROCR} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\chi >0,\mathbf{V}\succcurlyeq \textbf{0}}{\max}\chi , \\ &\mathrm{s}.\mathrm{t}.~\eqref{R11 constrait},~\eqref{R21 constrait},~\eqref{R22 constrait},~\eqref{OP_MM_SDP:c},~\eqref{OP_MM_SDP_smooth:b},~\eqref{rank_ralex} . \end{align} \end{subequations} Problem~\eqref{PB_Max_SROCR} is a SDP problem and can be solved by the CVX tool~\cite{cvx}. The procedure for optimizing passive beamforming is sketched in \textbf{Algorithm~\ref{PB_algorithm}}. \begin{algorithm} \caption{Proposed passive beamforming optimization algorithm} \label{PB_algorithm} \begin{algorithmic}[1] \STATE Initialize $\mathbf{V}^{\left( 0 \right)} $ and $\rho ^{\left( 0 \right)}$. Set $\varepsilon ^{\left( t _3 \right)}=0$ and ${t_3} = 0$. \REPEAT \STATE Solve problem~\eqref{PB_Max_SROCR} with $\left\{ \varepsilon ^{\left( t_3 \right)},\mathbf{V}^{\left( t_3 \right)} \right\} $ to obtain $\mathbf{V}^*$; \STATE \textbf{if} problem~\eqref{PB_Max_SROCR} is solvable \STATE ~~~Update $\mathbf{V}^{\left( t_3+1 \right)}=\mathbf{V}^*$; \STATE ~~~Update $\rho ^{\left( t_3+1 \right)}=\rho ^{\left( 0 \right)} $; \STATE \textbf{else} \STATE ~~~Update $\mathbf{V}^{\left( t_3+1 \right)}=\mathbf{V}^{\left( t_3 \right)} $; \STATE ~~~update $\rho ^{\left( t_3+1 \right)}=\frac{\rho ^{\left( t_3 \right)}}{2} $; \STATE \textbf{end} \STATE Update $\varepsilon ^{\left( t _3 + 1 \right)}$ via~\eqref{update relaxation parameter}; \STATE Update ${t_3} = {t_3} + 1$; \UNTIL {$\frac{\mathrm{Tr}\left( \mathbf{V}^{\left( t_3 \right)} \right)}{\lambda _{\max}\left( \mathbf{V}^{\left( t_3 \right)} \right)}$ is below a predefined threshold and the objective value of problem~\eqref{PB_Max_SROCR} converges.} \STATE \textbf{Output}: $\mathbf{V}$. \end{algorithmic} \end{algorithm} \vspace{-0.3cm} \subsection{Proposed Algorithm, Complexity and Convergence} To facilitate the understanding of the proposed IBCD algorithm for solving problem~\eqref{OP_MM_SDP_smooth}, we summarize it in~\textbf{Algorithm~\ref{proposed BCD algorithm}}. The convergence of \textbf{Algorithm~\ref{proposed BCD algorithm}} is analyzed as follows.~\textbf{Algorithm~\ref{ABPAC}} and~\textbf{Algorithm~\ref{PB_algorithm}} converge to a KKT stationary solution of problem~\eqref{ABP_Max_SDP} and problem~\eqref{PB_Max_SDP}, respectively. Similar \textcolor[rgb]{0.00,0.00,0.00}{proofs} can be found in~\cite{Sun2018JointBA} and~\cite{Cao2017ASC}. Furthermore, the objective value of problem~\eqref{OP_MM_SDP_smooth} is non-decreasing after each iteration and the radar beampattern gain is upper bounded. Therefore, the proposed IBCD algorithm is guaranteed to converge. Let $T_{1}^{\max}$ and $T_{2}^{\max}$ denote the \textcolor[rgb]{0.00,0.00,0.00}{number of iterations} of~\textbf{Algorithm~\ref{ABPAC}} and~\textbf{Algorithm~\ref{Feasible_algorithm}}. Then, the complexity of~\textbf{Algorithm~\ref{ABPAC}} is given by $\mathcal{O} \left( T_{1}^{\max}O_1+T_{2}^{\max}O_2 \right) $, where $O_i$ is defined as \begin{equation} \label{O_i} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} O_i=\max \left\{ 3K+Q+1,N \right\} ^4\sqrt{N}\log \frac{1}{\varpi _i}, \end{equation} where $\varpi _1$ and $\varpi _2$ are the solution \textcolor[rgb]{0.00,0.00,0.00}{accuracies} of~\textbf{Algorithm~\ref{ABPAC}} and~\textbf{Algorithm~\ref{Feasible_algorithm}}, $i\in \left\{ 1,2 \right\} $. Similarly, the complexity of \textbf{Algorithm~\ref{PB_algorithm}} is given by $\mathcal{O} \left( T_{3}^{\max}O_3 \right) $ with \begin{equation} \label{O_3} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} O_3=\max \left\{ 3K+Q+1,M \right\} ^4\sqrt{M}\log \frac{1}{\varpi _3}, \end{equation} where $T_{3}^{\max}$ and $\varpi _3$ are the corresponding \textcolor[rgb]{0.00,0.00,0.00}{number of iterations} and solution \textcolor[rgb]{0.00,0.00,0.00}{accuracy}, respectively. Finally, the total complexity of \textbf{Algorithm~\ref{proposed BCD algorithm}} is given by \begin{equation} \label{O_4} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathcal{O} \left( T_{4}^{\max}\left( T_{1}^{\max}O_1+T_{2}^{\max}O_2+T_{3}^{\max}O_3 \right) \right), \end{equation} where $T_{4}^{\max}$ is the number of iterations of \textbf{Algorithm~\ref{proposed BCD algorithm}}. \begin{algorithm} \caption{Proposed IBCD algorithm for solving problem~\eqref{OP_MM}} \label{proposed BCD algorithm} \begin{algorithmic}[1] \STATE Initialize $\mathbf{V}^{\left( 0 \right)}$ and set ${t_4} = 0$. \REPEAT \STATE ${t_4} = {t_4} + 1$; \STATE update $\mathbf{W}_{k}^{\left( t_4 \right)} $ and $\mathbf{a}_{k}^{\left( t_4\right)}$ by \textbf{Algorithm~\ref{ABPAC}} with $\mathbf{V}^{\left( t_4-1 \right)}$; \STATE update $\mathbf{V}^{\left( {t_4 } \right)}$ by \textbf{Algorithm~\ref{PB_algorithm}} with $\mathbf{W}_{k}^{\left( t_4 \right)} $ and $\mathbf{a}_{k}^{\left( t_4\right)}$; \UNTIL {the objective value of problem~\eqref{OP_MM_SDP_smooth} converges.} \STATE \textbf{Output}: $\mathbf{W}_{k} $, $\mathbf{a}_{k}$, and $\mathbf{V}$, $ k\in \mathcal{K}$. \end{algorithmic} \end{algorithm} \vspace{-0.5cm} \section{Low Complexity Algorithm} In the developed~\textbf{Algorithm~\ref{proposed BCD algorithm}}, $\left\{ \mathbf{W}_k \right\} $ and $\left\{ \mathbf{a}_{k} \right\} $ are jointly optimized by applying~\textbf{Algorithm~\ref{ABPAC}}. However, the computational complexity of~\textbf{Algorithm~\ref{ABPAC}} scales \textcolor[rgb]{0.00,0.00,0.00}{linearly} with $T_{1}^{\max}$ and $T_{2}^{\max}$. Note that the joint optimization strategy over $\left\{ \mathbf{W}_k \right\} $ and $\left\{ \mathbf{a}_{k} \right\} $ can achieve better performance than other benchmark schemes, which will be revealed via simulations in Section V. To strike a balance between the performance and computational complexity, we develop a low-complexity algorithm based on \textcolor[rgb]{0.00,0.00,0.00}{the} IAO method, where the active beamforming, power allocation coefficients and passive beamforming are optimized iteratively in an alternating manner. In each iteration, the passive beamforming solution is also obtained by~\textbf{Algorithm~\ref{PB_algorithm}}. \textcolor[rgb]{0.00,0.00,0.00}{However}, the active beamforming is optimized by a single SDP problem and the solutions of the power allocation coefficients are obtained by a proposed closed-form power allocation strategy. To begin with, we first exploit the feasibility of problem~\eqref{OP_MM_SDP_smooth}. \begin{theorem}\label{feaible_check_theorem} Given the active beamforming matrix $\left\{ \mathbf{W}_{k} \right\} $ and passive beamforming matrix $\mathbf{V}$, problem~\eqref{OP_MM_SDP_smooth} is feasible, if and only if the following inequality holds: \begin{equation}\label{feasible} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \max \left( a_{k,f}^{\min ,1},a_{k,f}^{\min ,2} \right) \leqslant a_{k,f}^{\max}<1, \end{equation} where $a_{k,f}^{\max}$, $a_{k,f}^{\min ,1}$ and $a_{k,f}^{\min ,2}$ are\textcolor[rgb]{0.00,0.00,0.00}{, respectively,} defined as \begin{equation}\label{a_kf_max} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}^{\max}=1-\frac{r_{k,n}^{\min}\left[ \sum_{\widetilde{k}\ne k}^K{\mathrm{Tr}\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,n} \right)}+\sigma ^2 \right]}{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}, \end{equation} \begin{equation}\label{a_kf_min1} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}^{\min ,1}=\frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) +\sum_{\widetilde{k}\ne k}^K{\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,n} \right)}+\sigma ^2}{\left( 1+\frac{1}{r_{k,f}^{\min}} \right) \mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}, \end{equation} \begin{equation}\label{a_kf_min2} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}^{\min ,2}=\frac{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right) +\sum_{\widetilde{k}\ne k}^K{\mathrm{Tr}\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,f} \right)}+\sigma ^2}{\left( 1+\frac{1}{r_{k,f}^{\min}} \right) \mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)}. \end{equation} \textit{Proof}: Please refer to Appendix~B. \end{theorem} Following the idea introduced in~\cite{Zhu2019JointTB}, in each cluster, the power allocation should be first performed for the RFU and only necessary power should be allocated to satisfy the minimum QoS constraints. Then, the remaining power should be allocated to the RNU. According to the minimum QoS constraints \eqref{R21 constrait} and \eqref{R22 constrait}, if $a_{k,f}$ is a feasible solution of problem~\eqref{OP_MM_SDP_smooth}, we have: $a_{k,f}\geqslant \max \left\{ a_{k,f}^{\min ,1},a_{k,f}^{\min ,2} \right\} $. Finally, the closed-form power allocation coefficients \textcolor[rgb]{0.00,0.00,0.00}{are} given by: \begin{equation}\label{power_allocation_sub} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}=\max \left\{ a_{k,f}^{\min ,1},a_{k,f}^{\min ,2} \right\} ~\mathrm{and}~a_{k,n}=1-\max \left\{ a_{k,f}^{\min ,1},a_{k,f}^{\min ,2} \right\} , k\in \mathcal{K}. \end{equation} For any given $\left\{ \mathbf{a}_k \right\} $ and $\mathbf{V}$, the optimization problem for the design of $\left\{ \mathbf{W}_k \right\} $ is expressed as follows \begin{subequations}\label{AB_Max_SDP} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{align} &\underset{\chi >0,\mathbf{W}_k\succcurlyeq 0}{\max}\chi , \\ &\mathrm{s}.\mathrm{t}.~\eqref{R11 constrait},~\eqref{R21 constrait},~\eqref{R22 constrait},~\eqref{OP_MM_SDP:b},~\eqref{OP_MM_SDP:d},~\eqref{OP_MM_SDP_smooth:b}. \end{align} \end{subequations} Similar to tackling the rank-one constraint in problem~\eqref{ABP_Max_SDP}, we \textcolor[rgb]{0.00,0.00,0.00}{solve} problem~\eqref{AB_Max_SDP} by employing SDR and removing \textcolor[rgb]{0.00,0.00,0.00}{the} rank-one \textcolor[rgb]{0.00,0.00,0.00}{in} constraint~\eqref{OP_MM_SDP:d}. The tightness of the SDR method for problem~\eqref{AB_Max_SDP} can be proved by the following theorem. \begin{theorem}\label{Rank1_only_W} The optimal solution $\mathbf{W}_k$ satisfying $\text{rank}\left( \mathbf{W}_k \right) \leqslant 1$ can always be obtained by solving problem~\eqref{AB_Max_SDP} without rank-one constraint. \textit{Proof}: The proof follows similar arguments as that of \textbf{Theorem~\ref{Rank1 in joint problem} }and is thus omitted for brevity. \end{theorem} The overall proposed IAO algorithm is summarized in~\textbf{Algorithm~\ref{proposed low algorithm}}. Similar to~\textbf{Algorithm~\ref{proposed BCD algorithm}}, the objective value obtained in~\textbf{Algorithm~\ref{proposed low algorithm}} is non-decreasing in each iteration and the proposed algorithm is guaranteed to converge. ~\textbf{Algorithm~\ref{proposed low algorithm}} is computationally efficient as $\left\{ \mathbf{W}_k \right\} $ in step $4$ are updated by solving the SDP problem~\eqref{AB_Max_SDP} and $\left\{ \mathbf{a}_{k} \right\} $ in step $6$ are updated by using closed-form expressions without \textcolor[rgb]{0.00,0.00,0.00}{iterations}. The computational complexity of problem~\eqref{AB_Max_SDP} in solving the SDP problem can be represented by $\mathcal{O} \left( \max \left\{ 3K+Q+1,N \right\} ^4\sqrt{N}\log \frac{1}{\varpi _5} \right) $, where $\varpi _5$ is the corresponding solution accuracy. Thus, the overall complexity of~\textbf{Algorithm~\ref{proposed low algorithm}} can be written as $\mathcal{O} \left( T_{5}^{\max}\left( \max \left\{ 3K+Q+1,N \right\} ^4\sqrt{N}\log \frac{1}{\varpi _5}+O_3 \right) \right) $, where $T_{5}^{\max}$ is the \textcolor[rgb]{0.00,0.00,0.00}{number of iterations} of~\textbf{Algorithm~\ref{proposed low algorithm}}. \begin{algorithm} \caption{Proposed IAO algorithm for solving problem~\eqref{OP_MM}} \label{proposed low algorithm} \begin{algorithmic}[1] \STATE Initialize $\left\{ \mathbf{a}_{k}^{\left( 0 \right)} \right\} $ and $\mathbf{V}^{\left( 0 \right)}$ and set the iteration index ${t_5} = 0$. \REPEAT \STATE ${t_5} = {t_5} + 1$; \STATE For a given $\mathbf{a}_{k}^{\left( t_5-1 \right)}$ and $\mathbf{V}^{\left( t_5-1 \right)}$, update $\mathbf{W}_{k}^{\left( t_5 \right)}$ by solving problem~\eqref{AB_Max_SDP} without constraint~\eqref{OP_MM_SDP:d} ; \STATE For a given $\mathbf{W}_{k}^{\left( t_5 \right)}$ and $\mathbf{a}_{k}^{\left( t_5 -1 \right)}$, update $\mathbf{V}^{\left( {t_5 } \right)}$ by applying \textbf{Algorithm~\ref{PB_algorithm}}; \STATE For a given $\mathbf{W}_{k}^{\left( t_5 \right)}$ and $\mathbf{V}^{\left( t_2 \right)}$, update $\mathbf{a}_{k}^{\left( t_5 \right)} $ according to~\eqref{power_allocation_sub}; \UNTIL {the objective value of problem~\eqref{OP_MM_SDP_smooth} converges.} \STATE \textbf{Output}: $\mathbf{W}_{k} $, $\mathbf{a}_{k}$, and $\mathbf{V}$, $ k\in \mathcal{K}$. \end{algorithmic} \end{algorithm} \section{Simulation Results} In this section, the performance of the proposed algorithms for \textcolor[rgb]{0.00,0.00,0.00}{the} RIS-NOMA-ISAC system is evaluated through numerical simulations. The simulated RIS-NOMA-ISAC system geometry is shown in Fig.~\ref{simulation_fig}. We assume that there are three clusters and three radar targets. The RIS is located \textcolor[rgb]{0.00,0.00,0.00}{at the origin}, while the BS is located at $\left( -40, 10\right) $ meter $\left( \text{m} \right) $. In each cluster, the RNU and the RFU are randomly distributed on the half circles centered at $\left( 0,0 \right) \text{m}$ with \textcolor[rgb]{0.00,0.00,0.00}{radii} of $r_{k,n}\in \left[ 20,25 \right]\mathrm{m} $ and $r_{k,f}\in \left[ 80,85 \right] \mathrm{m}$, respectively. Let $\theta _{k,i}$ denote the angle from the RIS to user $\mathrm{U}\left( k,i \right)$ and we further assume that $\left\{ \theta _{1,i} \right\} $, $\left\{ \theta _{2,i} \right\} $, and $\left\{ \theta _{3,i} \right\} $, which denote the set of angles of Cluster $1$, $2$ and $3$, are randomly distributed in the angle ranges $\left( -30^{\text{o}},-20^{\text{o}} \right] $, $\left(20^{\text{o}},30^{\text{o}} \right] $, and $\left( 60^{\text{o}},70^{\text{o}} \right] $, respectively. Without loss of generality, let $\theta _{k,n}=\theta _{k,f}$, $k\in \mathcal{K}$. The angles from the RIS to the three targets are set to be $-45^{\text{o}}$,~$0^{\text{o}}$ and~$45^{\text{o}}$, and the corresponding \textcolor[rgb]{0.00,0.00,0.00}{radii} are set to be $90~\text{m}$, $90~\text{m}$ and $80~\text{m}$, respectively. Given the angles of sensing targets, the desired beampattern can be defined as \begin{equation}\label{desired_beampattern} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathcal{P}\left( \theta \right) =\left\{ \begin{array}{c} 1, \theta _{\text{T}}-\frac{\Delta \theta}{2}\leqslant \theta \leqslant \theta _{\text{T}}+\frac{\Delta \theta}{2},\theta _{\text{T}}\in \left\{ -45^{\text{o}},0^{\text{o}},45^{\text{o}} \right\},\\ 0, \text{otherwise},~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\\ \end{array} \right. \end{equation} where $\Delta \theta =6^{\text{o}}$ is the desired beam width, $\theta$ is the element of the angle grid $\left[ -90^{\mathrm{o}}:\frac{180^{\mathrm{o}}}{100}:90^{\mathrm{o}} \right]$, and the interested sensing angle set can be defined as $\mathcal{Q} _{\theta}=\left\{ \theta \left| \begin{array}{c} \theta _{\mathrm{T}}-\frac{\Delta \theta}{2}\leqslant \theta \leqslant \theta _{\mathrm{T}}+\frac{\Delta \theta}{2},\\ \theta _{\mathrm{T}}\in \left\{ -45^{\mathrm{o}},0^{\mathrm{o}},45^{\mathrm{o}} \right\}\\ \end{array} \right. \right\} $. \begin{figure}[t] \setlength{\belowcaptionskip}{-0.6cm} \centering \includegraphics[scale=0.22]{simulation_fig.eps} \caption{The simulated RIS-NOMA-ISAC system geometry.} \label{simulation_fig} \end{figure} We further assume that all the channels follow the Rician fading \textcolor[rgb]{0.00,0.00,0.00}{distribution}, which can be modeled as follows~\cite{Li2021JointBD,9449661}: \begin{equation}\label{channel_G} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathbf{G}=\sqrt{\varepsilon _0d_{\text{BR}}^{-\varpi _{\text{BR}}}}\left( \sqrt{\frac{\kappa _{\text{BR}}}{1+\kappa _{\text{BR}}}}\mathbf{G}_{\text{LoS}}+\sqrt{\frac{1}{1+\kappa _{\text{BR}}}}\mathbf{G}_{\text{NLoS}} \right), \end{equation} \begin{equation}\label{channel_gki} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathbf{g}_{k,i}=\sqrt{\varepsilon _0d_{\text{R},\left( k,i \right)}^{-\varpi _{\text{R},\left( k,i \right)}}}\left( \sqrt{\frac{\kappa _{\text{R},\left( k,i \right)}}{1+\kappa _{\text{R},\left( k,i \right)}}}\mathbf{g}_{\text{R},\left( k,i \right)}^{\text{LoS}}+\sqrt{\frac{1}{1+\kappa _{\text{R},\left( k,i \right)}}}\mathbf{g}_{\text{R},\left( k,i \right)}^{\text{NLoS}} \right), \end{equation} where $\varepsilon _0$ denotes the path loss at a reference distance of one meter, $\varpi _{\text{BR}}$ and $\varpi _{\text{R},\left( k,i \right)}$ denote the path loss exponents, $\kappa _{\text{BR}}$ and $\kappa _{\text{R},\left( k,i \right)}$ denote the Rician factors, $\mathbf{G}_{\text{LoS}}$ and $\mathbf{g}_{\text{R},\left( k,i \right)}^{\text{LoS}}$ are the LoS components of channel $\mathbf{G}$ and $\mathbf{g}_{k,i}$, $\mathbf{G}_{\text{NLoS}}$ and $\mathbf{g}_{\text{R},\left( k,i \right)}^{\text{NLoS}}$ are the corresponding NLoS components. The LoS component is modeled as the product of the array response vectors of the transceivers and the NLoS component is modeled as Rayleigh fading. Without loss of generality, we assume that the path loss exponents and the Rician factors for all channels are identical. The path loss at a reference distance of one meter is set to $30{\text {~dB}}$, the path loss exponents are set to 2.2, the Rician factors are set to 3, the noise power is set to $-90\text{~dBm}$, the normalized spacing between two adjacent antennas(elements) is set as $\frac{d}{\lambda}=0.5$. Other system parameters are set as follows unless specified otherwise later: the maximum transmit power is set to $35$ dBm, the minimum QoS requirement for RNUs and RFUs are set to $R_{k,n}^{\min}=0.5$ bits/s/Hz and $R_{k,f}^{\min}=0.1$ bits/s/Hz, respectively. Unless otherwise stated, we adopt the default values of the system parameters provided in Table~\ref{parameter}. All \textcolor[rgb]{0.00,0.00,0.00}{of} the following numerical results are obtained by averaging over $100$ random channel realizations unless otherwise specified. \begin{table}[t] \setlength{\abovecaptionskip}{3pt} \setlength{\belowcaptionskip}{3pt} \caption{Simulation Parameters} \label{parameter} \begin{center} \begin{tabular} {|l|l|} \hline Parameter & Value \\ \hline Locations of the BS and RIS & $\left( -40,10\right) {\rm m} $ and $\left( 0,0\right) {\rm m}$ \\ \hline Angles of the three radar targets & $-45^{\rm o}$, $0^{\rm o}$, and $45^{\rm o}$ \\ \hline Radius from the RIS to the three radar targets & $90{\rm m}$, $90{\rm m}$, and $80{\rm m}$ \\ \hline Angle ranges of the three clusters & $\left( -30^{\text{o}},-20^{\text{o}} \right] $, $\left(20^{\text{o}},30^{\text{o}} \right] $, and $\left( 60^{\text{o}},70^{\text{o}} \right] $ \\ \hline Radius ranges from the RIS to RNUs and RFUs & $ \left[ 20,25 \right]\mathrm{m} $ and $\left[ 80,85 \right] \mathrm{m}$ \\ \hline Minimum QoS requirement for RNUs and RFUs & $0.5$ bits/s/Hz and $0.1$ bits/s/Hz \\ \hline Maximum transmit power & $35$ dBm \\ \hline Path loss exponents and Rician factors of all channels & $ 2.2$ and $ 3$ \\ \hline Path loss at one meter & $30$~{\rm dB} \\ \hline Desired beam width & $6^{\text{o}}$ \\ \hline Noise power & \textcolor[rgb]{0.00,0.00,0.00}{$-90$~{\rm dBm}} \\ \hline \end{tabular} \end{center} \end{table} \subsection{Convergence and Solutions' Rank of the Proposed Algorithms} \subsubsection{Convergence} In Fig.~\ref{Converge}, we investigate the convergence behavior of the proposed algorithms with different numbers of RIS reflecting elements $M$ and BS antennas $N$. We observe that, for both cases, the proposed algorithms monotonically converge to stationary points within approximately \textcolor[rgb]{0.00,0.00,0.00}{$10$} iterations. Furthermore, the minimum beampattern gain achieved by the IAO algorithm is lower than that of the IBCD algorithm. This \textcolor[rgb]{0.00,0.00,0.00}{behavior} will be explained in the following numerical results. Though some performance loss is incurred by the IAO algorithm, the complexity of the IAO algorithm is much lower than that of the IBCD algorithm. \subsubsection{Solutions' Rank} Based on \textbf{Theorem~\ref{Rank1 in joint problem}} and \textbf{Theorem~\ref{Rank1_only_W}}, the rank-one solutions for active beamforming matrices can always be obtained by the proposed IBCD and IAO algorithms. To verify the Theorems, in Table~\ref{ratio_eig}, we list the average ratios between the largest eigenvalue and the second largest eigenvalue of the matrices $\left\{ \mathbf{W}_1,\mathbf{W}_2,\mathbf{W}_3 \right\} $ obtained by the proposed algorithms. It is easy to observe that the \textcolor[rgb]{0.00,0.00,0.00}{values} of the ratios are always enormous \textcolor[rgb]{0.00,0.00,0.00}{for} different \textcolor[rgb]{0.00,0.00,0.00}{values} of $N$ and $M$. On the other hand, we also list \textcolor[rgb]{0.00,0.00,0.00}{this} ratio \textcolor[rgb]{0.00,0.00,0.00}{for} the passive beamforming matrix $\mathbf{V}$ obtained by \textbf{Algorithm~\ref{PB_algorithm}} in Table~\ref{ratio_eig}. Obviously, the average ratios achieved by the proposed IBCD and IAO algorithms are sufficiently large. These results in Table~\ref{ratio_eig} reveal that the solutions obtained by the proposed algorithms always satisfy the rank-one constraints. \begin{table*}[!ht] \caption{The ratios obtained by the proposed algorithms with different $N$ and $M$.} \label{ratio_eig} \center \begin{tabular} {|c|c|c|c|c|c|c|c|} \cline{1-6} \multirow{6}{*}{ IBCD } & $M$ &\multicolumn{2}{c|}{$32$} & \multicolumn{2}{c|}{$36$} \\ \cline{2-2} \cline{3-4} \cline{5-6} \multirow{6}{*}{algorithm} & $N$ & 3 & 12 & 3 & 12 \\ \cline{2-2} \cline{3-6} \multirow{6}{*}{} &$\mathbf{W}_1$ & 2.4441e+09 & 6.0565e+09 & 2.0657e+09 & 3.7819e+09 \\ \cline{2-6} \multirow{6}{*}{} &$\mathbf{W}_2$ & 2.5464e+09 & 5.4004e+09 & 2.0341e+09 & 4.1430e+09 \\ \cline{2-6} \multirow{6}{*}{} &$\mathbf{W}_3$ & 2.6132e+09 & 5.9513e+09 & 2.1736e+09 & 4.0795e+09 \\ \cline{2-6} \multirow{6}{*}{} &$\mathbf{V} $ & 2.4804e+10 & 3.0715e+10 & 2.5339e+10 & 0.5839e+10 \\ \cline{1-6} \multirow{6}{*}{IAO } & $M$ &\multicolumn{2}{c|}{$32$} & \multicolumn{2}{c|}{$36$} \\ \cline{2-2} \cline{3-4} \cline{5-6} \multirow{6}{*}{algorithm} & $N$ & 3 & 12 & 3 & 12 \\ \cline{2-2} \cline{3-6} \multirow{6}{*}{} &$\mathbf{W}_1$ & 0.0728e+11 & 1.7223e+11 & 2.0472e+10 & 7.6990e+10 \\ \cline{2-6} \multirow{6}{*}{} &$\mathbf{W}_2$ & 0.1226e+11 & 1.0293e+11 & 1.0012e+10 & 5.9330e+10 \\ \cline{2-6} \multirow{6}{*}{} &$\mathbf{W}_3$ & 0.1436e+11 & 1.1674e+11 & 1.3838e+10 & 8.1600e+10 \\ \cline{2-6} \multirow{6}{*}{} &$\mathbf{V} $ & 1.2814e+11 & 1.8597e+11 & 5.9715e+11 & 3.7944e+11 \\ \cline{1-6} \end{tabular} \end{table*} \begin{figure}[H] \setlength{\belowcaptionskip}{-0.6cm} \centering \begin{minipage}[t]{0.48\textwidth} \centering \includegraphics[scale=0.54]{Converge.eps} \caption{Convergence of the proposed IBCD algorithm and IAO algorithm.} \label{Converge} \end{minipage} \begin{minipage}[t]{0.48\textwidth} \centering \includegraphics[scale=0.54]{MinBPgain_vs_M.eps} \caption{Minimum beampattern gain versus number of reflecting elements for different $N$.} \label{MinBPgain_vs_M} \end{minipage} \end{figure} \subsection{Performance Analysis of the Proposed Algorithms} Fig.~\ref{MinBPgain_vs_M} depicts the minimum beampattern gain versus the number of RIS reflecting elements, $M$, for different \textcolor[rgb]{0.00,0.00,0.00}{numbers} of BS \textcolor[rgb]{0.00,0.00,0.00}{antennas}. Firstly, it is observed that the minimum beampattern gains obtained by the proposed algorithms monotonically increase with $M$. This is expected since installing more reflecting elements at RIS can introduce more virtual LoS links and provide higher passive beamforming gain towards the radar targets. Secondly, the proposed low complexity IAO algorithm can achieve comparable performance to that achieved by the IBCD algorithm. Thirdly, we note that the performance of the two proposed algorithms can be improved by \textcolor[rgb]{0.00,0.00,0.00}{increasing $N$}. In fact, more BS antennas introduce more DoFs to construct a more directional sensing beam and to achieve a higher active beamforming gain, thereby increasing minimum beampattern gain. On the other hand, in Fig.~\ref{RIS_NOMA_ISAC_BPgain_vs_angle}, we plot the beampattern gain versus angles. As illustrated in Fig.~\ref{RIS_NOMA_ISAC_BPgain_vs_angle}, both proposed schemes can achieve the dominant peaks of the beampattern gain in the angles of interest, i.e., $-45^{\text{o}}$,~$0^{\text{o}}$ and~$45^{\text{o}}$. Moreover, at the target directions, the achievable beampattern gains of the IBCD algorithm are always higher than that of the IAO algorithm. \begin{figure}[H] \setlength{\abovecaptionskip}{3pt} \setlength{\belowcaptionskip}{-25pt} \centering \begin{minipage}[t]{0.48\textwidth} \centering \includegraphics[scale=0.54]{RIS_NOMA_ISAC_BPgain_vs_angle.eps} \caption{Beampattern gain versus angles for different $M$ with $N=9$.} \label{RIS_NOMA_ISAC_BPgain_vs_angle} \end{minipage} \begin{minipage}[t]{0.48\textwidth} \centering \includegraphics[scale=0.54]{minBPgain_vs_power.eps} \caption{Minimum beampattern gain versus maximum transmit power, $P_{\mathrm{max}}$, for different schemes with $N=9$.} \label{MinBPgain_vs_Pmax} \end{minipage} \end{figure} \subsection{Comparison With Different Schemes for RIS-NOMA-ISAC System} We compare the \textcolor[rgb]{0.00,0.00,0.00}{performances} of the proposed algorithms with two baseline schemes. For baseline scheme 1, the active beamforming design implements an approximate zero-forcing method~\cite{Wang2017SpectrumAE}, i.e, only the RNUs in each cluster and the combined channel vector $\mathbf{g}_{k,n}^{H}\mathbf{\Theta G}$ are utilized to determine each beam. For baseline scheme 2, the active beamforming \textcolor[rgb]{0.00,0.00,0.00}{is realized by} the maximum-ratio transmission method~\cite{Wu2019IntelligentRS} based on the RFUs's combined channel gain. We further assume that each cluster shares the same power allocation coefficients in all baseline schemes. \textcolor[rgb]{0.00,0.00,0.00}{For a fair comparison}, \textcolor[rgb]{0.00,0.00,0.00}{the resulting} optimization problems are solved by applying the SDR or SRCR algorithm~\cite{Cao2017ASC}. In Fig.~\ref{MinBPgain_vs_Pmax}, we study the minimum beampattern gain versus the maximum transmit power, $P_{\max}$, for all schemes. As expected, the minimum beampattern gain increases as $P_{\max}$ grows. The reason behind this is that when the transmit power is high, the received signal strength at the communication users and targets are strong. The QoS requirements of the communication users \textcolor[rgb]{0.00,0.00,0.00}{can be easily} satisfied and more redundant power can be utilized to improve the sensing performance, thereby significantly increasing the beampattern gain. Moreover, it can be seen that the proposed schemes are capable of \textcolor[rgb]{0.00,0.00,0.00}{providing a higher} beampattern gain than the baseline schemes. This can be explained by the fact that the active beamforming, power allocation coefficients and passive beamforming are not jointly optimized in the baseline schemes. However, in the proposed schemes, the joint optimization over these variables can provide a considerable performance improvement and fully exploit the DoFs introduced by the RIS and NOMA. \subsection{Comparison With Different RIS Assisted Systems} \textcolor[rgb]{0.00,0.00,0.00}{To} demonstrate the effectiveness of \textcolor[rgb]{0.00,0.00,0.00}{our} proposed RIS-NOMA-ISAC system, we consider the following two benchmark systems: \begin{itemize} \item RIS-ISAC system: In this system, NOMA is not employed. The achievable rate of user $k$ can be obtained by: $R_k=\log _2\left( 1+\frac{\left| \mathbf{g}_{k}^{H}\mathbf{\Theta Gw}_k \right|^2}{\sum_{i\ne k}^{2K}{\left| \mathbf{g}_{i}^{H}\mathbf{\Theta Gw}_k \right|^2}+\sigma ^2} \right) $, where $\mathbf{g}_k$ is the channel coefficients from the RIS to user $k$, $k\in \left\{ 1,2,\cdots ,2K \right\} $. \item RIS-Sensing system: In this system, the transmitted signal at the BS is used only for radar sensing while the communication function is not considered during the system design. \end{itemize} \textcolor[rgb]{0.00,0.00,0.00}{Note that the resulting optimization problems} for RIS-ISAC system and RIS-Sensing system can be solved in a similar way as solving problem~\eqref{OP_MM}. In addition, for the ease of presentation, we focus on the proposed IBCD algorithm for RIS-NOMA-ISAC system. In Fig.~\ref{MinBPgain_vs_N}, we compare the minimum beampattern gain versus the number of BS antennas, $N$, for different systems. It is clear that \textcolor[rgb]{0.00,0.00,0.00}{when $N$ increases}, which means that more active beams are exploited to transmit the BS signal, higher possible beamforming gain can be provided towards the radar targets. Moreover, the proposed RIS-NOMA-ISAC system outperforms the RIS-ISAC system under overloaded ($N<6$) and underloaded ($N>6$) cases. This is because the RIS-NOMA-ISAC system can mitigate the inter-user interference by employing SIC and provide more DoFs for radar sensing. However, \textcolor[rgb]{0.00,0.00,0.00}{the RIS-ISAC system cannot mitigate the inter-user interference effectively}. Besides, the RIS-NOMA-ISAC system and the RIS-ISAC system achieve lower performance than the RIS-Sensing system, which reveals a trade-off between the radar sensing and communication for ISAC systems. On the other hand, we evaluate the normalized beampattern gain of \textcolor[rgb]{0.00,0.00,0.00}{the} considered systems with respect to different angles in Fig.~\ref{Diff_system_BPgain_vs_angle}. As can be observed, the beampattern gains of all systems have peaks towards target directions and our proposed RIS-NOMA-ISAC system has a stronger peak compared with the RIS-ISAC system. Moreover, the proposed RIS-NOMA-ISAC system can obtain higher beampattern gains at the worst angles than \textcolor[rgb]{0.00,0.00,0.00}{the} RIS-ISAC system. \begin{figure}[H] \setlength{\abovecaptionskip}{3pt} \setlength{\belowcaptionskip}{-25pt} \centering \begin{minipage}[t]{0.48\textwidth} \centering \includegraphics[scale=0.54]{MinBPgain_vs_N.eps} \caption{Minimum beampattern gain versus number of BS antennas for different systems.} \label{MinBPgain_vs_N} \end{minipage} \begin{minipage}[t]{0.48\textwidth} \centering \includegraphics[scale=0.54]{Diff_system_BPgain_vs_angle.eps} \caption{Normalized beampattern gain versus angles for different systems with ${N}=9$ and ${M}=36$.} \label{Diff_system_BPgain_vs_angle} \end{minipage} \end{figure} \subsection{Illumination Power} In \textcolor[rgb]{0.00,0.00,0.00}{the} previous subsections, the performance of the proposed schemes and system are evaluated by the beampattern gain metric. In this subsection, we adopt \textcolor[rgb]{0.00,0.00,0.00}{an} alternative metric, namely, illumination power~\cite{Sankar2022BeamformingII}, to evaluate the radar sensing performance. Let $\mathbf{g}_{\mathrm{X}}$ denote the channel from the RIS to any location in the considered system geometry. Then, the illumination power can be defined as $\mathrm{Tr}\left[ \mathbf{V\Upsilon }\left( \sum_{k=1}^K{\mathbf{W}_k} \right) \mathbf{\Upsilon }^H \right]$, where $\mathbf{\Upsilon }=\mathrm{diag}\left\{ \mathbf{g}_{\mathrm{X}}^{H} \right\} \mathbf{G}$. $\mathbf{g}_{\mathrm{X}}$ is modeled as \textcolor[rgb]{0.00,0.00,0.00}{a} LoS channel as in~\cite{Sankar2022BeamformingII}. In Fig.~\ref{illumation_power_map}, we show the illumination power map of the RIS on different angles and locations over one random channel realization. From Fig.~\ref{illumation_power_map}, we can see that there are three brightest \textcolor[rgb]{0.00,0.00,0.00}{regions} towards the three target directions in different systems. This is intuitive since the RIS attempts to steer both the active and passive beamforming towards the targets to maximize the minimum beampattern. Compared with Fig.\ref{Sensing_N12_M36_IP} for RIS-Sensing system, the leakages of illumination power towards \textcolor[rgb]{0.00,0.00,0.00}{angles of no interest} are more \textcolor[rgb]{0.00,0.00,0.00}{serious} in Fig.~\ref{RIS_NOMA_ISAC_N12_M36_IP} for \textcolor[rgb]{0.00,0.00,0.00}{the} RIS-NOMA-ISAC system and Fig.~\ref{RIS_ISAC_N12_M36_IP} for \textcolor[rgb]{0.00,0.00,0.00}{the} RIS-ISAC system. To further reveal the insights of the illumination power map, in Fig.~\ref{illumate_power_target}, we present the total illumination power towards the \textcolor[rgb]{0.00,0.00,0.00}{angles of interest} for each target, where the \textcolor[rgb]{0.00,0.00,0.00}{angles of interest for} the three targets are $\left[ -45^{\text{o}}-\Delta \theta ,-45^{\text{o}}+\Delta \theta \right] $, $\left[ 0^{\text{o}}-\Delta \theta ,0^{\text{o}}+\Delta \theta \right] $ and $\left[ 45^{\text{o}}-\Delta \theta ,45^{\text{o}}+\Delta \theta \right] $, respectively. It is clear that the RIS-Sensing system achieves the best performance. Furthermore, the proposed RIS-NOMA-ISAC system achieves higher illumination power \textcolor[rgb]{0.00,0.00,0.00}{towards} the three targets than that of the RIS-ISAC system. These results clearly demonstrate the importance of employing NOMA in the ISAC system. \begin{figure*}[t!] \setlength{\abovecaptionskip}{5pt} \setlength{\belowcaptionskip}{-35pt} \centering \subfigure[RIS-Sensing system] { \begin{minipage}[t]{0.32\linewidth} \label{Sensing_N12_M36_IP} \includegraphics[scale=0.37]{Sensing_N12_M36_IP_dBm.eps} \end{minipage \centering \subfigure[RIS-NOMA-ISAC system] { \begin{minipage}[t]{0.32\linewidth} \label{RIS_NOMA_ISAC_N12_M36_IP} \includegraphics[scale=0.36]{RIS_NOMA_ISAC_N12_M36_IP_dBm.eps} \end{minipage } \centering \subfigure[RIS-ISAC system] { \begin{minipage}[t]{0.32\linewidth} \label{RIS_ISAC_N12_M36_IP} \includegraphics[scale=0.36]{RIS_ISAC_N12_M36_IP_dBm.eps} \end{minipage } \caption{The map of illumination power for different systems with $N=12$ and $M=36$.} \label{illumation_power_map} \end{figure*} \vspace{-1cm} \begin{figure}[H] \setlength{\abovecaptionskip}{5pt} \setlength{\belowcaptionskip}{5pt} \centering \includegraphics[scale=0.6]{illumate_power_target.eps} \caption{Illumination power on targets for different systems with $N=12$ and $M=36$.} \label{illumate_power_target} \end{figure} \vspace{-1cm} \section{CONCLUSIONS} \vspace{-0.2cm} \textcolor[rgb]{0.00,0.00,0.00}{We proposed} a novel RIS-NOMA-ISAC system, where the RIS is deployed to serve the communication users and to assist radar sensing. A joint optimization problem over active beamforming, power allocation coefficients, and passive beamforming was formulated with the aim of maximizing the minimum beampattern gain. Due to the nonconvex nature of the formulated problem, \textcolor[rgb]{0.00,0.00,0.00}{an} IBCD algorithm was proposed to solve the original problem. To further reduce the complexity of the proposed algorithm, a low complexity IAO algorithm was proposed where the exact power allocation coefficients \textcolor[rgb]{0.00,0.00,0.00}{are derived in closed-form expressions}. Numerical results confirmed that \textcolor[rgb]{0.00,0.00,0.00}{our} proposed algorithms can achieve better beampattern gain performance in comparison to other baseline schemes. Moreover, our results revealed that NOMA is an efficient means to mitigate the inter-user interference in ISAC systems \textcolor[rgb]{0.00,0.00,0.00}{whether} the system is overloaded or underloaded. \section*{Appendix~A: Proof of Theorem~\ref{Rank1 in joint problem}} \label{Proof_rank1} \renewcommand{\theequation}{A.\arabic{equation}} \setcounter{equation}{0} Since problem~\eqref{AB_Max_SDR} is convex and satisfies the Slater's condition, and strong duality holds. The Lagrangian function of problem~\eqref{AB_Max_SDR} in terms of beamforming matrices $\left\{ \mathbf{W}_k \right\} $ is given as follows: \begin{equation} \label{Lagrangian} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{split} \psi _{\text{Lag}} = & -\alpha _0\sum_{k=1}^K{\mathrm{Tr}\left( \mathbf{W}_k \right)}-\sum_{k=1}^K{\beta _{k}^{\eta}r_{k,n}^{\min}I_{k,n}^{\mathrm{iter}}} + \sum_{k=1}^K{\mathrm{Tr}\left( \mathbf{W}_k\mathbf{X}_k \right)}+\varrho \\ & +\sum_{q=1}^Q{\alpha _q\mathrm{Tr}\left[ \left( \sum_{k=1}^K{\mathbf{W}_k} \right) \mathbf{\Upsilon }_{q}^{H}\mathbf{V\Upsilon }_q \right]}+\sum_{k=1}^K{\mathrm{Tr}\left( \mathbf{Y}_k\left[ \begin{matrix} a_{k,n}& \eta _k\\ \eta _k& \mathrm{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)\\ \end{matrix} \right] \right)} \\ & +\sum_{k=1}^K{\frac{\beta _{k}^{\mathcal{T} _1}\left( \mathrm{Tr}\left( \mathbf{W}_k\mathbf{\Gamma }_{k,n}^{H}\mathbf{V\Gamma }_{k,n} \right) -r_{k,f}^{\min}I_{k,n}^{\mathrm{iter}} \right)}{\left( 1+r_{k,f}^{\min} \right)}}+\sum_{k=1}^K{\frac{\beta _{k}^{\mathcal{T} _2}\left( \mathrm{Tr}\left( \mathbf{W}_k\mathbf{\Gamma }_{k,f}^{H}\mathbf{V\Gamma }_{k,f} \right) -r_{k,f}^{\min}I_{k,f}^{\mathrm{iter}} \right)}{\left( 1+r_{k,f}^{\min} \right)}}, \end{split} \end{equation} where $\varrho$ is the collection of terms that are not relevant for the proof, $\alpha _0$, $\beta _{k}^{\eta}$, $\alpha _q $, $\beta _{k}^{\mathcal{T} _1}$ and $\beta _{k}^{\mathcal{T} _2}$ are the Lagrange multipliers. The matrix $\mathbf{Y}_k $ and $\mathbf{X}_k $ are the Lagrange multiplier matrix for the positive semi-definite constraints. Note that there exists at least one $\alpha _0 > 0$, since constraint~\eqref{OP_MM_SDP:b} is active for the optimal $\mathbf{W}_k$\footnote{It is easy to prove that constraint~\eqref{OP_MM_SDP:b} is active by \textcolor[rgb]{0.00,0.00,0.00}{the} contradiction method. Specifically, if the equality in \textcolor[rgb]{0.00,0.00,0.00}{constraint}~\eqref{OP_MM_SDP:b} is not satisfied, i.e, $\sum_{k=1}^K{\mathrm{Tr}\left( \mathbf{W}_k \right)}<P_{\max}$. Define $\rho =\frac{P_{\max}}{\sum_{k=1}^K{\mathrm{Tr}\left( \mathbf{W}_k \right)}}>1$ and multiply $\rho$ \textcolor[rgb]{0.00,0.00,0.00}{by} the optimal $\mathbf{W}_k$. As a result, a new solution $\overline{\mathbf{W}}_k$ is obtained. Since the beampattern gain with $\overline{\mathbf{W}}_k$ is larger than that with ${\mathbf{W}}_k$, which contradicts \textcolor[rgb]{0.00,0.00,0.00}{with} the optimality of $\mathbf{W}_k$. Thus, the equality in constraint~\eqref{OP_MM_SDP:b} always holds.}. The Karush-Kuhn-Tucker (KKT) conditions of problem~\eqref{AB_Max_SDR} that are relevant to the proof are given as follows: \begin{equation} \label{KKT} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathrm{K}1:\alpha _0,\alpha _q,\beta _{k}^{\eta},\beta _{k}^{\mathcal{T} _1},\beta _{k}^{\mathcal{T} _2}\geqslant 0,\mathbf{Y}_k,\mathbf{Z}_k\succeq \mathbf{0},~~~\mathrm{K}2:\mathbf{W}_k\mathbf{X}_k=\mathbf{0},~~~\mathrm{K}3:\triangledown _{\mathbf{W}_k}\psi _{\mathrm{Lag}}=\mathbf{0}. \end{equation} To proceed, we derive the gradient of $\psi _{\mathrm{Lag}}$ explicitly and rewrite K3 as \begin{equation} \label{K3} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \mathbf{Z}_k=\alpha _0\mathbf{I}-\mathbf{\Pi }_k, \end{equation} where the matrix $\mathbf{\Pi }_k$ is defined as \begin{equation} \label{matrix Q} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} \begin{split} \mathbf{\Pi }_k &=\left[ \gamma _k\left( r_{k,f}^{\min}a_{k,n}-a_{k,f} \right) +\eta _k\left( r_{k,f}^{\min}a_{k,n}-a_{k,f} \right) -\beta _ka_{k,n} \right] \mathbf{H}_{k,n}^{H} \\ &+\sum_{\widetilde{k}\ne k}^K{\left( \beta _{\widetilde{k}}r_{\widetilde{k},n}^{\min}+\gamma _{\widetilde{k}}r_{\widetilde{k},f}^{\min}+\eta _{\widetilde{k}}r_{\widetilde{k},f}^{\min} \right) \mathbf{H}_{\widetilde{k},n}^{H}}-\sum_{q=1}^Q{\mu _q\mathbf{H}_{q}^{H}}. \end{split} \end{equation} Denote by $\lambda _{\max}\left( \mathbf{\Pi }_k \right) $ the largest eigenvalue of matrix $\mathbf{\Pi }_k$. Due to the randomness of the channels, the largest eigenvalue $\lambda _{\max}\left( \mathbf{\Pi }_k \right) $ is unique. Recalling the expression~\eqref{K3}, if $\lambda _{\max}\left( \mathbf{\Pi }_k \right) >\alpha _0$, then we have: $\alpha _0\mathbf{I}-\mathbf{\Pi }_k\prec \mathbf{0}$ which contradicts \textcolor[rgb]{0.00,0.00,0.00}{with} $\mathbf{Z}_k\succeq \mathbf{0}$. In addition, if $\lambda _{\max}\left( \mathbf{\Pi }_k \right) \leqslant \alpha _0$, we have: $\alpha _0\mathbf{I}-\mathbf{\Pi }_k\succeq \mathbf{0} $, which implies that $\mathbf{Z}_k \leqslant \mathbf{0}$ and $\mathrm{rank}\left( \mathbf{Z}_k \right) \geqslant N_{\mathrm{T}}-1$. Considering K2, we have: $\mathrm{rank}\left( \mathbf{W}_k \right) \leqslant 1$. The proof is completed. \section*{Appendix~B: Proof of Theorem~\ref{feaible_check_theorem}} \label{Proof_feaible} \renewcommand{\theequation}{B.\arabic{equation}} \setcounter{equation}{0} According to the QoS constraint~\eqref{R11 constrait} and~\eqref{OP_MM:d}, we have the following inequalities: \begin{equation}\label{alpha_kf_max} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}\leqslant 1-\frac{r_{k,n}^{\min}\left[ \sum_{\widetilde{k}\ne k}^K{\text{Tr}\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,n} \right)}+\sigma ^2 \right]}{\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}\triangleq a_{k,f}^{\max}. \end{equation} In addition, the QoS constraints~\eqref{R21 constrait} and~\eqref{R22 constrait} can be respectively rewritten as: \begin{equation}\label{alpha_kf_min1} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}\geqslant \frac{\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right) +\sum_{\widetilde{k}\ne k}^K{\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,n} \right)}+\sigma ^2}{\left( 1+\frac{1}{r_{k,f}^{\min}} \right) \text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,n} \right)}\triangleq a_{k,f}^{\min ,1}, \end{equation} \begin{equation}\label{alpha_kf_min2} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{5pt} a_{k,f}\geqslant \frac{\text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right) +\sum_{\widetilde{k}\ne k}^K{\text{Tr}\left( \mathbf{W}_{\widetilde{k}}\mathbf{H}_{k,f} \right)}+\sigma ^2}{\left( 1+\frac{1}{r_{k,f}^{\min}} \right) \text{Tr}\left( \mathbf{W}_k\mathbf{H}_{k,f} \right)}\triangleq a_{k,f}^{\min ,2}. \end{equation} \textcolor[rgb]{0.00,0.00,0.00}{Combing}~\eqref{alpha_kf_max},~\eqref{alpha_kf_min1} and~\eqref{alpha_kf_min2}, it is easy to observe that if problem~\eqref{OP_MM_SDP_smooth} is feasible, the following condition should be satisfied: \begin{equation}\label{max>min} \max \left( a_{k,f}^{\min ,1},a_{k,f}^{\min ,2} \right) \leqslant a_{k,f}^{\max}<1. \end{equation} \vspace{-0.5cm} \bibliographystyle{IEEEtran}
\section{Introduction} Imagine your favorite celebrity giving daily news updates, motivating you to work out, or interacting with you on your mobile phone! What if a movie director could reenact an actor's image without actually recording the actor? Or, how about skilled content creators animating avatars in a metaverse to follow an actor's head movements and expressions in great detail? We can also reduce zoom fatigue~ \cite{zoom} by animating a well-dressed image of ourselves in a video call without transmitting a live video stream! These ideas seem fictitious, infeasible, and not scalable. But, how about animating or ``reenacting" a single image of any person according to a driving video of someone else? Face reenactment, thus, opens up many opportunities in a world that is becoming increasingly digital with each passing day. Face Reenactment aims to animate a source image using a driving video's motion while preserving the source identity. Multiple publications have improved the quality of the generations. Existing works on talking head generation generally use a single modality, i.e., either visual\cite{hong2022depth,Siarohin_2019_NeurIPS,wang2021one,zakharov2019few} or audio features\cite{ji2021audio,wang2021audio2head,song2018talking}. Audio-driven talking head generation models are good at generating quality lip-sync; however, they have a serious drawback in handling non-verbal cues. The video-driven methods heavily rely on the disentanglement of motion from the appearance~\cite{lorenz2019unsupervised}. These methods generally use key points as an intermediate representation~\cite{Siarohin_2019_NeurIPS,hong2022depth,wang2021one} and try to align the detected key points of source and driving frames. These works learn key points in an unsupervised manner and fail to focus on specific regions of the face. This stems from inadequate priors regarding the face structure or the uttered speech. The final quality of the generations also suffers from using a basic CNN-based decoder that fails to capture the sharpness present in the source image and generates blurred output video. As a part of this work, we provide a detailed review of different approaches in Section~\ref{sec:related_works}. In this paper, we analyze the shortcomings of the current works and add key modules to our network. We introduce \textbf{A}udio-\textbf{V}isual \textbf{F}ace \textbf{R}eenactment \textbf{GAN} (\textbf{AVFR-GAN}), a novel architecture that uses both audio and visual cues to generate highly realistic face reenactments. We start with providing additional priors about the structure of the face in the form of a face segmentation mask and face mesh. We also provide corresponding speech to our algorithm to help it attend to the mouth region and improve lip synchronization. Finally, our pipeline uses a novel identity-aware face generator to improve the final outputs. Our approach generates superior results compared to the current state-of-the-art works, as shown in Section~\ref{sec:eval}. We comprehensively evaluate our method against several baselines and report the quantitative performance based on multiple standard metrics. We also perform human evaluations to evaluate qualitative results in the same section. Our proposed method opens a host of applications, as discussed in Section~\ref{sec:applications}, including one in compressing video calls. Our work achieves more than $7\times$ improvement in visual quality when tested at the same compression levels using the recently released H.266~\cite{h266} codec. Our contributions are summarized as follows:\\ 1. We use additional priors in the form of face mesh and face segmentation mask to preserve the geometry of the face.\\ 2. We utilize additional input in the form of audio to improve the generation quality of the mouth region. Audio also helps to preserve lip synchronization, enhancing the viewing experience.\\ 3. We build a novel carefully-designed identity-aware face generator to generate high-quality talking head videos in contrast to the high levels of blur present in the previous works. \section{Related Work} \label{sec:related_works} \begin{figure*} \begin{center} \includegraphics[width=\linewidth]{images/Architecture.pdf} \end{center} \vspace{-20pt} \caption{The overall pipeline of our proposed Audio Visual Face Reenactment network (AVFR-GAN) is given in this Figure. We take the source and driving images, along with their face mesh and segmentation masks to extract keypoints. An audio encoder extracts features from driving audio and use them provide attention on lip region. The audio and visual feature maps are warped together and passed to the carefully designed Identity-Aware Generator along with extracted features of the source image to generate the final output.} \label{fig:model_architecture} \end{figure*} Talking head generation works can be broadly classified in three categories based on the type of input they use to generate a talking head: Text-driven~\cite{li2021write,tandon2021txt2vid,wang2011text}, Audio-driven~\cite{chung2017you,ji2021audio,lu2021live,song2018talking,wang2021audio2head,zhou2019talking,zhou2020makelttalk}, and Video-driven~\cite{hong2022depth,ren2021pirenderer,Siarohin_2019_NeurIPS,wang2021one,zhou2021pose} Talking Head Generation. \paragraph{Text-driven Talking-head Generation} Text-driven natural image generation~\cite{ramesh2021zero,reed2016generative} has recently seen a lot of progress in the computer vision community. Inspired by the recent success of GANs in generating static faces from text\cite{Wang_2021_WACV}, Li~\etal~\cite{li2021write} proposed a method to use text for driving animation parameters of the mouth, upper face and head. Txt2Vid~\cite{tandon2021txt2vid} converts the spoken language and facial webcam data into text and transmits it to achieve low-bandwidth video conferencing using talking head generation. However, this method relies heavily on the generated speech, altering the original speaker's voice, prosody, and head movements in the video call. It depends on the quality of the Speech-to-Text module, which introduces grammatical errors and language dependency. Text as a medium has very little information about the head and lip movements; thus, we consider the problem ill-posed. \paragraph{Audio-driven Talking-head Generation} While text-driven methods suffer from a significant lack of adequate priors, we now move on to audio, a much more expressive and informative form of input. As the name suggests, audio-driven methods~\cite{chung2017you,ji2021audio,lu2021live,song2018talking,wang2021audio2head,zhou2019talking,zhou2020makelttalk} use only audio to animate a static face image. The first set of works like You-said-that?~\cite{chung2017you}, LipGAN~\cite{kr2019towards} and Wav2Lip~\cite{prajwal2020lip} achieved lip synchronization with given audio but failed to generate head movements in sync with the speech. These works used fully convolutional architectures and generated a single frame at a time without considering the temporal constraints. Eventually, a different class of works starting from Song~\etal~\cite{song2018talking} in 2018 and Zhou~\etal~\cite{zhou2019talking} in 2019, started using conditional Recurrent Neural Networks to model the temporal characteristics of a talking face. In 2020, Zhou~\etal~\cite{zhou2020makelttalk} published a landmark work that predicted dense flow from audio instead of directly generating the output video. The dense flow was then used to warp the source image to generate the final output. Several other well-known works like Emotional Video Portraits~\cite{ji2021audio} add an additional emotion label as input to create the talking head in the desired emotion. However, all of these works lack fine-grained control of the talking head and often contain a loopy head motion, and thus cannot be directly used in many applications. \paragraph{Video-driven Talking-head Generation} Finally, we move to video-driven methods, which use a driving video to get the motion and other facial features required to reenact a source image. Please note that the driving video and the source image may not have the same identity. Owing to the significant priors in driving video, the final generation quality of video-driven methods surpasses those of text-only and audio-only ones. The most influential work in this area, First-Order-Motion-Model (FOMM), was published by Siarohin~\etal~\cite{Siarohin_2019_NeurIPS} in 2019. The key idea was to estimate the motion field from sparse keypoints detected in both source and driving frames. The motion field was used to calculate dense flow and warp the source frame in a latent space. Several other works~\cite{wang2021one, hong2022depth} followed the same principle and added supplementary components to improve the quality. Face-vid2vid~\cite{wang2021one} used keypoint information in a 3D space, taking care of head rotation, among other things. DA-GAN\cite{hong2022depth} further added depth-aware attention to provide dense 3D facial geometry to guide the generation of motion fields. A similar approach in Motion-Representation-in-Articulated-Animation~\cite{siarohin2019animating} uses key regions instead of keypoints to generate the warpable motion field. Approaches like ICface\cite{Tripathy_2020_WACV} provide a method to control the pose and expressions of a face image using head pose angles and action unit values. Recently, Zhang~\etal~\cite{zhang2021flow} proposed using the three-dimensional morphable face model (3DMM) parameters to reenact a face image. They demonstrated that motion descriptor parameters for 3DMM can be derived from a driving video and, in turn, animate a static facial image. To the best of our knowledge, PC-AVS~\cite{zhou2021pose} is the only work that uses audio and video to formulate a low-dimension pose and motion code. Unlike FOMM, PC-AVS does not predict motion fields to calculate dense flow and warp the source image. Instead, they try to train their network to learn motion in a latent space inherently. While this allows them to achieve state-of-the-art lip sync, the generated video's overall quality is considered inferior to works like DA-GAN~\cite{hong2022depth}. In this work, we base our approach on FOMM's~\cite{Siarohin_2019_NeurIPS} principles and improve it with additional audio information. We also provide additional structural information to extract better geometries of the face. This allows us to use the best of both worlds and propose a novel network AVFR-GAN as described in the next section. \section{Audio-Visual Face Reenactment GAN} We present \textbf{A}udio-\textbf{V}isual \textbf{F}ace \textbf{R}eenactment GAN (\textbf{AVFR-Gan}), which takes a source image and a driving video plus audio to create high-quality talking head videos by preserving the source identity. As mentioned previously, we follow a similar strategy to that of FOMM~\cite{Siarohin_2019_NeurIPS} for our training pipeline. Instead of generating multiple frames in the form of a video, we handle the input in a frame-by-frame fashion. Our main goal is to estimate the motion between a source and a driving frame and then warp the source frame accordingly to generate an approximation of the driving frame. Our model can be broadly divided into a Generator $M_{Gen}$ and a discriminator $M_{Disc}$ as shown in Figure~\ref{fig:model_architecture}. We first discuss the individual components present inside the generator. \paragraph{Additional Structural Priors to the Keypoint Detector} We start with selecting a source frame $F_s$ and a driving frame $F_d$ both of dimensions $h \times w$. During training, both of these frames are selected from the same video. We pass these frames through mediapipe~\cite{lugaresi2019mediapipe} to generate a face mesh and a face segmentation map. We channel-wise concatenate the generated mesh and the segmentation mask with their respective images and create $5$ channel versions of the same. We term the concatenated source and driving frames as $I_s$ and $I_d$, respectively. We use these concatenated inputs to feed into our keypoint detector, $M_{kp}$. The addition of these priors helps us in providing the keypoint detector with more information about the respective structures of source and driving frames. Furthermore, the segmentation mask also provides the module with foreground and background information enabling the keypoints to be detected only from the foreground. We use the keypoint detector from FOMM~\cite{Siarohin_2019_NeurIPS} in our architecture. The keypoint detector $M_{kp}$ detects $K$ keypoints. More concretely, we can write, \begin{equation} \label{eq:1} \{X_{T,n}\}_{n=1}^K = M_{kp}(I_T), T \in {s, d} \end{equation} The difference between the generated keypoints from the source and driving frames is used to calculate the motion field following FOMM. The motion field is then used to calculate dense flow and generate a warped feature map. We denote this feature map as Motion Feature Map, $Enc_{motion}$ as it captures the motion between the source and the driving frames. The dimension of this feature map is kept to be $\frac{h}{4} \times \frac{w}{4} \times c$. We plot sample keypoints detected in specific frames in Figure~\ref{fig:keypoint_attention} (left). Also, note that each keypoint has a specific region of interest in the generated motion field. We plot the heatmaps for each keypoint in Figure~\ref{fig:keypoint_attention} (middle). The heatmaps show that the regions of interest for each keypoints correspond to specific facial features. For example, the dark blue keypoint attends to the mouth region, green attends to the jaw, and sky blue attends specifically to the eye regions. Interestingly both of the eyes are attended by the same keypoint. \begin{figure} \begin{center} \includegraphics[width=\linewidth]{images/frame_select.png} \end{center} \vspace{-20pt} \caption{Illustration of Audio window selector mechanism. It generates a 200ms spectogram such that the driving frame remains in the middle of the segment. In case of a 25 FPS video, a 200ms segment contains 5 frames.} \label{fig:frame-select} \end{figure} \begin{figure} \begin{center} \includegraphics[width=\linewidth]{images/attention.png} \end{center} \vspace{-20pt} \caption{Illustration of Audio Visual Attention module. Attention is generated by taking the dot product between a learned audio feature and visual features in each location, followed by a Sigmoid activation. } \label{fig:audio-attention} \end{figure} \paragraph{Audio-conditioned Features} Audio (mainly speech in our case) is an essential source of information that often accompanies a talking-head video. We decided to use the speech from the driving video to improve the quality of mouth movements in the generated video. While works like MakeItTalk~\cite{zhou2020makelttalk} have already generated head movements solely from audio, our goal is to only improve the mouth movements and transfer head motion directly from the driving video. Therefore, we follow the same strategy taken by lip-synchronization works like~\cite{chung2017you, kr2019towards, prajwal2020lip} to handle speech. We select the $200$ms window of speech around our driving frame $F_d$ such that $F_d$ is the middle frame in the sampling window. A graphical representation of the audio window selection is given in Figure~\ref{fig:frame-select}. We generate melspectrogram $I_{mel}$ from the speech window and feed it to a 2D CNN-based encoder. The audio encoder also outputs a feature map, $Enc_{aud}$, of $\frac{h}{4} \times \frac{w}{4} \times c$ dimension. We concatenate $(Enc_{motion}, Enc_{aud})$ along with the attention map generated as described next. \paragraph{Audio-Visual Attention} Apart from improving the lip synchronization in the generated video, we propose using audio to specifically attend to the speaker's mouth region, enhancing the fine-grained details like teeth in the generated video. To do this, we pass $I_{mel}$ through an attention encoder generating an encoding $Enc_{query}$ of dimensions $1 \times 1 \times c$. We then take $Enc_{motion}$ of dimension $\frac{h}{4} \times \frac{w}{4} \times c$ and calculate the dot product at each location with $Enc_{query}$, generating a $\frac{h}{4} \times \frac{w}{4} \times 1$ matrix. We pass this through a Sigmoid layer to get the attention map $Enc_{attn}$ as shown in Figure~\ref{fig:audio-attention}. A formal definition of this block is given in Equation~\ref{eq:3}. \begin{equation} \label{eq:3} \begin{gathered} Enc_{attn} (i, j) = Sigmoid (Enc_{query} \odot Enc_{motion}(i, j)), \\ i \in \frac{w}{4}, j \in \frac{h}{4} \end{gathered} \end{equation} A visualization of the audio-visual attention can be found in Figure~\ref{fig:keypoint_attention}. As we can see, audio not only helps the model to attend to the mouth region but also helps the network attend to other regions like the eyes, which correlates to expressions from speech. \begin{figure} \begin{center} \includegraphics[width=\linewidth]{images/attention_final.png} \end{center} \vspace{-20pt} \caption{Illustration of keypoints detected (left), colour coded heatmap corresponding to each keypoint (centre) and the attention generated by our Audio-Visual Module (right). The ROI image shows that there are keypoints specific to the eye and mouth region. Attention image shows the important facial regions on which AVFR-Gan focuses.} \label{fig:keypoint_attention} \end{figure} \paragraph{Identity-Aware Generator} We propose a novel generator to decode the concatenated feature vector. We analyze the current decoders used in FOMM~\cite{Siarohin_2019_NeurIPS}, Face-Vid2Vid~\cite{wang2021one} and DA-GAN~\cite{hong2022depth}. We realize that the pipelines followed by the current works fail to capture information from the source image directly. The network entirely depends on the warped features generated from the motion estimator to get the identity characteristics of the source speaker. Unfortunately, the warped features are forced to encode motion and fine-grained identity information, making it tougher to train. This ultimately causes the outputs to contain major artifacts and lose sharpness. We improve upon this and design an identity-aware face generator. We first concatenate $Enc_{motion}$, $Enc_{con}$ and $Enc_{attn}$ together to get the final warped features, generating $Enc_{dec}$. Instead of only feeding the warped features, we also feed in the source image $F_s$ separately to the UNet-shaped~\cite{unet} generator. The generator consists of an identity-encoder and a decoder. Both the encoder and decoder contain residual convolutional blocks inspired from Spatially Adaptive Normalization~\cite{park2019semantic}. The source image $F_s$ is first passed through an identity encoder to encode identity information. The output from the identity encoder is then concatenated with $Enc_{dec}$ and finally passed through the matching decoder with appropriate skip connections between the encoder and decoder blocks. The final output from the generator is denoted by $F_{gen}$. Our generator produces the sharpest output compared to the current state-of-the-art, as shown in the subsequent sections. \paragraph{Discriminator} To improve the quality of our generated outputs, we also employ a standard discriminator, which is trained in a GAN setup along with the rest of the network. Our discriminator $M_{Disc}$, consists of a stack of Conv2D layers each followed by either spectral normalization~\cite{miyato2018spectral} or instance normalization~\cite{Ulyanov2016InstanceNT}. Each convolution block is followed by a Leaky ReLU activation~\cite{Maas2013RectifierNI}. The discriminator predicts a real or fake label and is trained to maximize the following loss function $L_{Disc}$ given in Equation~\ref{eq:4}. \begin{equation} \label{eq:4} \begin{gathered} \max_{M_{Disc}} L_{Disc} = \mathbb{E}_{x \sim p_{real}} \log M_{Disc}(x) + \\ \mathbb{E}_{F_{gen}} \log (1 - M_{Disc}(F_{gen})) \end{gathered} \end{equation} \paragraph{Losses used to train the Generator} We use multiple loss functions similar to~\cite{Siarohin_2019_NeurIPS}. We use the $L1$ reconstruction loss between $F_d$ and $F_{gen}$. We also use the LPIPs~\cite{lpips} perceptual similarity loss (denoted by $L_{per}$) to improve the perceptual quality of the generated outputs. Finally, we employ the equivarience constraints $L_{eq}$ as described in the original FOMM paper. We refer the reader to ~\cite{Siarohin_2019_NeurIPS} for information regarding these constraints. While training the generator we also minimize the discriminator loss given in Equation~\ref{eq:4}. Therefore, we present our final loss function, Equation~\ref{eq:5}. \begin{equation} \label{eq:5} \begin{gathered} \min_{M_{Gen}} L_{Gen} = ||F_d - F_{gen}||_1 + \\ L_{per} + L_{eq} + \mathbb{E}_{F_{gen}} \log (1 - M_{Disc}(F_{gen})) \end{gathered} \end{equation} \paragraph{Inference Setting} While we sample both $F_s$ and $F_d$ from the same video during training, our training strategy ensures that identity and motion information are well distilled. Therefore, our method allows for cross-identity face reenactment. During inference, we select a single image of a person as the source image $F_s$. Given a driving video of $N$ frames, $V_{i ... N}$, we pass each frame separately through our network along with $F_s$ and the corresponding audio segment of $V_i$ (denoted by $A_i$) to generate the final output as shown in Equation~\ref{eq:6}. \begin{equation} \label{eq:6} \begin{gathered} F_{Gen}^i = M_{Gen}(F_s, V_i, A_i), i \in 1 ... N \end{gathered} \end{equation} \begin{table*}[] \centering \begin{tabular}{|c|ccccccc||cc|} \hline & \multicolumn{7}{c||}{Same-id Reenactment} & \multicolumn{2}{c|}{Cross-id Reenactment} \\ \cline{2-10} & \textbf{L1$\downarrow$} & \textbf{PSNR$\uparrow$} & \textbf{SSIM$\uparrow$} & \textbf{FID$\downarrow$} & \textbf{LMD$\downarrow$} & \textbf{AED$\downarrow$ }& \textbf{Sync$\uparrow$} & \textbf{FID$\downarrow$} & \textbf{Sync$\uparrow$} \\ \hline FOMM\cite{Siarohin_2019_NeurIPS} & 0.046 & 28.890 & 0.740 & 11.04 & 1.294 & 0.142 & 5.17 & 11.93 & 3.17 \\ Face-vid2vid \cite{wang2021one} & 0.062 & 29.160 & 0.690 & 11.47 & 1.620 & 0.153 & 4.96 & 10.81 & 4.19 \\ MRAA \cite{siarohin2019animating} & 0.040 & 23.351 & 0.64 & 11.36 & 1.280 & 0.135 & 3.10 & 15.61 & 3.96 \\ PC-AVS \cite{zhou2021pose} & 0.081 & 23.750 & 0.620 & 14.32 & 1.843 & 0.180 & \textbf{6.76} & 16.78 & \textbf{6.39}\\ DA-GAN \cite{hong2022depth} & 0.036 & 31.220 & 0.804 & 9.10 & \textbf{1.278} & 0.129 & 5.01 & 9.40& 4.71\\ AVFR-GAN (Ours) & \textbf{0.034} & \textbf{32.20} & \textbf{0.824} & \textbf{8.48} & 1.280 & \textbf{0.127} & 5.45 & \textbf{9.05} & 4.99\\ \hline \end{tabular} \caption{Comparison with state-of-the-art methods on Same-identity Reenactment and Cross-identity reenactment on VoxCeleb\cite{nagrani2017voxceleb} dataset. $\uparrow$ indicates larger is better, and $\downarrow$ indicates smaller is better.} \label{tab:sota_compression} \end{table*} \paragraph{Implementation Details} In our experiments, we set $h=256, w=256$ and predict $K=10$ keypoints for training all our models. The model is trained using the Adam optimizer\cite{kingma2014adam} with a learning rate scheduler set at $60$ and $90$ epochs. The initial learning rate is set to be at $0.001$. The training time taken by model on $4$ NVIDIA RTX 3080Ti GPUs with a batch size of $10$ is around $10$ days. We train our model on the VoxCeleb~\cite{nagrani2017voxceleb} dataset, which contains 25 FPS videos. Thus, the $200$ms audio window consists of $5$ frames, of which the $3$rd frame is selected as the driving frame $F_d$. Any other random frame from the same video is selected as $F_s$ during training the network. More details about the network structure and other training characteristics are provided in the supplementary material. \section{Experiments and Results} \label{sec:eval} We provide a comprehensive set of evaluations to measure the performance of our proposed method. We perform the quantitative assessment by following the standard benchmarks set by the previous works. We also perform extensive human evaluations to provide a qualitative assessment of the generated results. \paragraph{Evaluation Set} We use the public test set of the VoxCeleb~\cite{nagrani2017voxceleb} dataset. The dataset contains videos of celebrities. All the videos are preprocessed to $256 \times 256$. The test set contains 465 number of videos of different identities making up a total of 76 minutes. \vspace{-10pt} \paragraph{Evaluation Metrics} To provide an extensive evaluation of video reconstruction, we use several metrics to measure the performance of different works. We use the following metrics to measure various aspects of our generation. \textbf{L1}: It checks the average L1 distance between the generated and ground-truth video. \textbf{LMD}: Landmark Distance calculates the distance between detected key points of ground-truth and developed video using a pre-trained facial landmark detector\cite{bulat2017far}. Please note that this metric was denoted by Average Keypoint Distance in~\cite{Siarohin_2019_NeurIPS}. However, we renamed it Landmark Distance to avoid confusion with the keypoint detector module used in this work. \textbf{AED}: Average Euclidean Distance is used to evaluate the identity information. We use Openface\cite{amos2016openface} to find the feature vectors of generated and ground-truth video and then take the $L2$ distance between them. \textbf{PSNR}: Peak Signal to Noise Ratio is used to evaluate the reconstruction quality of the generated image compared to the ground truth image. \textbf{SSIM}: Structural Similarity Index evaluates the perceived changes in structural information of an image. We use it along with PSNR as it can also handle global illumination changes. \textbf{FID}: Fréchet Inception Distance is used to compare the distribution of generated images with the ground truth image using the features extracted from an InceptionV3 model~\cite{szegedy2016rethinking}. \textbf{Sync}: Syncnet confidence score is used to measure the amount of lip sync~\cite{chung2016lip}. \vspace{-10pt} \paragraph{Comparison with State-of-the-Art Methods} \begin{figure*} \begin{center} \includegraphics[width=\linewidth]{images/cross_id.png} \end{center} \vspace{-20pt} \caption{Qualitative comparison on Cross-identity reenactment. Our method gives fewer artifacts, preserves facial structure and handle motion in a better way.} \label{fig:cross_id} \end{figure*} We compare our work with the current methods published for the same task. To have a fair comparison, we use the official pre-trained models of FOMM~\cite{FOMM_github}, MRAA~\cite{MRAA_github}, PC-AVS~\cite{PCAVS_github} and DA-GAN~\cite{DaGAN_github} from their respective open-source implementations. For Face-Vid2Vid, we use an unofficial implementation in~\cite{facevid2vid_github}. All the pre-trained models and AVFR-GAN were trained on the same train split and evaluated on the test split of VoxCeleb\cite{nagrani2017voxceleb} using two inference strategies defined below. \vspace{-10pt} \paragraph{Same-identity Reenactment} We perform the face reenactment task where the source frame and the driving video are of the same person. In this setting, we take the first frame of any video as the source frame and consider the rest of the video as the driving video. The audio chunks corresponding to each driving frame are also fed to the network as input. In this case, we expect the generated output to be as close to the original video as possible. We can therefore calculate metrics like L1, LMD, PSNR, and SSIM, which requires ground truth. We also calculate AED, FID, and Sync metrics for the generated outputs from all the models. From Table \ref{tab:sota_compression}, it is evident that our method outperforms all the other competing methods. The superior L1 and AED show that our model preserves identity information better. The improvement achieved by our model in terms of LMD indicates the improved structure of generated faces. Interestingly, our model generates improved eye movement in much more detail compared to the previous methods. We got state-of-the-art PSNR, SSIM, and FID scores, correlating with better visual quality. Finally, the sync quality achieved by our algorithm is superior to all the methods except PC-AVS, which performs slightly better in this metric. \vspace{-10pt} \paragraph{Cross-identity Reenactment} In this setting, we take a driving video for a different identity and animate a source image. The audio from the driving video is also given as input to the network, as usual. However, since the generated output does not mimic any specific ground truth, we use metrics that do not directly need the same. We use FID, which measures the distance between real and generated distributions and does not require one-to-one ground truths. We also use Sync to measure the quality of the lip sync in the generated video. As seen in Table~\ref{tab:sota_compression}, we achieve the best FID results and the second-best results in sync trailing only to PC-AVS. \begin{figure*} \begin{center} \includegraphics[width=\linewidth]{images/same_id.png} \end{center} \vspace{-20pt} \caption{Qualitative results on same-identity face reenactment. Upper row: Driving Video, Lower row: Generated Results} \label{fig:same_id} \end{figure*} \paragraph{Human Evaluations} Since our algorithm generates outputs directly meant for human consumption, we perform extensive human evaluations to ascertain the quality of the generations from our model from a human's perspective. We perform a study enrolling $20$ users. Each user is shown generated samples from the state-of-that-art method along with Ours. The users are also shown the source image and the driving video. We select $30$ samples from Cross-identity generations. Our user study shows corresponding results from each algorithm side by side, along with the source image and the driving video. The users are asked to rate each generated output based on three characteristics. The users rate the quality of 1. Head pose matching the driving videos, 2. Expressions matching the driving videos, 3. Identity preservation between the source image and the generated videos. The ratings are between $1$ to $5$, where $1$ corresponds to the worst and $5$ corresponds to the best. As seen in Table~\ref{tab:user_study}, our model consistently yields better results across all the criteria. Our model can enact a better head pose and match expressions of the driving video while preserving the source identities. \begin{table}[h] \begin{center} \begin{tabular}{| c | c c c |} \hline \textbf{ } & \textbf{HPMS$\uparrow$} & \textbf{EMS$\uparrow$} & \textbf{IPS$\uparrow$} \\ \hline FOMM\cite{Siarohin_2019_NeurIPS} & 3.40 & 3.16 & 2.80\\ Face-vid2vid \cite{wang2021one} & 3.70 & 3.12 & 2.66\\ MRAA \cite{siarohin2019animating} & 3.26 & 3.06 & 2.50\\ PC-AVS \cite{zhou2021pose} & 1.58 & 1.64 & 1.92 \\ DA-GAN \cite{hong2022depth} & 3.98 & 3.82 & 3.10\\ AVFR-GAN (Ours) & \textbf{4.56} & \textbf{4.22} & \textbf{3.94}\\ \hline \end{tabular} \caption{User Study quantitative comparison. 'HPMS' represents Head Pose Matching Score, 'EMS' represents Expression Matching Score and 'IPS' represents Identity Preservation Score. $\uparrow$ shows higher is better. } \label{tab:user_study} \end{center} \end{table} \section{Ablation Study} Our proposed approach comprises addition of several key priors and the use of a better image generator. We check the contribution of each of these novel blocks in this section. For setting a baseline (very similar to FOMM), we remove Face Mesh, Face Segmentation, Audio Encoders, and used a basic CNN-based decoder architecture\cite{Siarohin_2019_NeurIPS,hong2022depth,wang2021one}. We add one module at a time to this baseline and train them on the same train-test split. We first add only face mesh and face segmentation to the baseline. We separately also check the effect of adding audio to the baseline. Finally, we combine the structural priors and audio to train a model without the novel identity-aware generator. We calculate SSIM, FID, and Sync metrics and report them in Table \ref{tab:ablation_study}. \begin{table}[h] \begin{center} \begin{tabular}{| l | c c c |} \hline \textbf{ } & \textbf{SSIM$\uparrow$} & \textbf{FID$\downarrow$} & \textbf{Sync$\uparrow$} \\ \hline Baseline & 0.74 & 11.04 & 5.17 \\ + Structural Prior & 0.801 & 8.98 & 5.19\\ + Audio Prior & 0.79 & 8.69 & \textbf{ 5.48}\\ + IAG & 0.812 & 8.51 & 5.13\\ AVFR-GAN & \textbf{0.824} & \textbf{8.48} & 5.45\\ \hline \end{tabular} \caption{Ablation Study. The baseline represents the model without face mesh, segmentation, audio, and identity-aware decoder. '+ Structural Prior' represents Baseline with face segmentation and face mesh. '+ Audio Prior' represents Baseline with Audio encoders. '+ IAG' represents Baseline with Identity Aware Generator. $\uparrow$ indicates larger is better, and $\downarrow$ indicates smaller is better.} \vspace{-20pt} \label{tab:ablation_study} \end{center} \end{table} As we observe clearly, the structural priors improve the SSIM significantly over baseline while audio improves the lip sync quality. We also observe that audio improves the visual quality (measured using FID) of the generations marginally. Finally, the identity-aware face generator gives a significant boost in terms of visual quality improvement. \section{Applications} \label{sec:applications} Our work opens up several applications in the digital industry. Our method can revolutionize multiple industries. We can potentially replace recording famous celebrities in a studio environment costing thousands of dollars; we can animate a single picture of them based on home-recorded driving videos. Similar advances can also be made in the education sector, where online lectures are integral part of education. News readers can reduce their commute and present news from the comfort of their homes by animating their characters. We can also make video calls simpler in more than one way. We can replace the live video feed with a generated one reducing zoom fatigue. More importantly, this can lead to huge bandwidth reduction due to the compact keypoint-based representation, as already noted in~\cite{wang2021one}. \vspace{-20pt} \paragraph{Low-bandwidth Video Conferencing} Face reenactment methods can be easily extended for video compression. In the case of a video call between a sender and a receiver, we can first send a single high-resolution frame between the two and follow it up with sending keypoints detected by the keypoint detector for each frame. Our model can then generate the output frames at the receiver's end by considering the high-resolution frame as the source and keypoints from each of the driving frames, similar to the results shown in Figure~\ref{fig:same_id}. The $10$ keypoints each consist of $x$ and $y$ coordinates and four jacobians, all of which are represented as float values. Therefore, the total bits required to represent a $256 \times 256$ frame using FP16 representation is $10\times6\times16 = 960$ bits. Therefore, the Bits-per-Pixel(BPP) achieved by our model is $\frac{960}{256\times256} = 0.014$. We use the latest H.266 codec~\cite{h266} released in September of 2021 and compress the VoxCeleb test set at the same BPP. While the results generated by our algorithm achieve a FID of 8.48, the H.266 lags by a large margin at 58.32. This indicates the superior quality of the results generated using AVFR-GAN and provides a proof-of-concept for compressing video calls in future work. \section{Further Discussions} In this work, we propose a novel face reenactment network, Audio-Visual Face Reenactment GAN. Our network uses audio-visual cues to reenact a source image according to a driving video. We provide the network with additional structural priors and speech to improve lip synchronization. The final output quality also benefits from a novel identity-aware generator. The improvement in the quality of the generative networks has also led to concerns over its potential misuse. We, therefore, urge the users of any such works to use it ethically. We also encourage users to clearly mark the generated videos with a watermark. We believe these works will benefit and reduce manual effort in professional content creation. {\small \bibliographystyle{ieee_fullname}
\section{Introduction} Understanding quark confinement is one of the most outstanding problem in QCD. Some criteria have been devised (e.g. \cite{Kugo:1977zq,Kugo:1979gm}) but a first principle proof is not known yet. Some theory are shown to confine as in supersymmetric Yang-Mills theory \cite{Novikov:1983uc,Shifman:1986zi,Ryttov:2007cx} or standard Yang-Mills theory \cite{Chaichian:2018cyv} where the exact beta function was obtained. Indeed, the gluon propagator is also known in closed form with more or less fitting parameters \cite{Cornwall:1981zr,Cornwall:2010bk,Dudal:2008sp,Frasca:2015yva,Frasca:2017slg}). It should be emphasized that it is essential to obtain the low-energy limit of QCD from first principles as this opens up a wealthy number of applications in several fields ranging from nuclear physics to cosmology. With the given results in Yang-Mills theory, this can be accomplished. The relevant approximations involved are strong coupling limit and 't Hooft limit of number of colors running to infinity keeping the product of the number of colors and the square of coupling constant \cite{tHooft:1973alw,tHooft:1974pnl}. We will obtain such a limit and prove quark confinement in the 't Hooft limit \cite{Frasca:2022lwp}. \section{Bender-Milton-Savage technique} Our approach is based on the Bender-Milton-Savage (BMS) technique that permits to derive the Dyson-Schwinger equations in PDE form \cite{Bender:1999ek}. This technique can be better explained referring to a scalar field. Therefore, we consider the following partition function \begin{equation} Z[j]=\int[D\phi]e^{iS(\phi)+i\int d^4xj(x)\phi(x)}. \end{equation} We start from the equation of motion for th 1P-function \begin{equation} \left\langle\frac{\delta S}{\delta\phi(x)}\right\rangle=j(x), \end{equation} assuming \begin{equation} \left\langle\ldots\right\rangle=\frac{\int[D\phi]\ldots e^{iS(\phi)+i\int d^4xj(x)\phi(x)}}{\int[D\phi]e^{iS(\phi)+i\int d^4xj(x)\phi(x)}} \end{equation} Then, we set $j=0$ to obtain the equation for the 1P-function. We derive this equation with respect to $j$ to obtain the equation for the 2P-function.The definition for the nP-functions is the following \begin{equation} \langle\phi(x_1)\phi(x_2)\ldots\phi(x_n)\rangle=\frac{\delta^n\ln(Z[j])}{\delta j(x_1)\delta j(x_2)\ldots\delta j(x_n)}. \end{equation} This implies \begin{equation} \frac{\delta G_k(\ldots)}{\delta j(x)}=G_{k+1}(\ldots,x). \end{equation} This procedure can be iterated to any desired order. These equations have the great advantage that permit to use possible exact solutions to them providing closed form formulas for the correlation functions of the theory. \section{1P and 2P functions for QCD} In order to make our computations simpler, as done in Ref.~\cite{Frasca:2015yva}, we evaluate our equations in the Landau gauge. The Bender-Milton-Savage method yields for the 1P-functions \begin{eqnarray} &&\partial^2G_{1\nu}^{a}(x)+gf^{abc}( \partial^\mu G_{2\mu\nu}^{bc}(0)+ \nonumber \\ &&\partial^\mu G_{1\mu}^{b}(x)G_{1\nu}^{c}(x)- \partial_\nu G_{2\mu}^{\nu bc}(0) \nonumber \\ &&-\partial_\nu G_{1\mu}^{b}(x)G_{1}^{\mu c}(x)) \nonumber \\ &&+gf^{abc}\partial^\mu G_{2\mu\nu}^{bc}(0)+gf^{abc}\partial^\mu(G_{1\mu}^{b}(x)G_{1\nu}^{c}(x)) \nonumber \\ &&+g^2f^{abc}f^{cde}(G_{3\mu\nu}^{\mu bde}(0,0) +G_{2\mu\nu}^{bd}(0)G_{1}^{\mu e}(x) \nonumber \\ &&+G_{2\nu\rho}^{eb}(0)G_{1}^{\rho d}(x) +G_{2\mu\nu}^{de}(0)G_{1}^{\mu b}(x)+ \nonumber \\ &&G_{1}^{\mu b}(x)G_{1\mu}^{d}(x)G_{1\nu}^{e}(x)) \nonumber \\ &&=g\sum_{q,i}\gamma_\nu T^aS_{q}^{ii}(0)+g\sum_{q,i}{\bar q}_1^i(x)\gamma_\nu T^a q_1^i(x), \end{eqnarray} and for the quarks \begin{equation} (i\slashed\partial-m_q)q_{1}^{i}(x)+g{\bm T}\cdot\slashed{\bm G}_1(x) q_{1}^{i}(x) +g{\bm T}\cdot\slashed{\bm W}^{i}_q(x,x)= 0. \end{equation} Here and in the following Greek indexes ($\mu,\nu,\ldots$) are for the space-time and Latin index ($a, b,\ldots$) for the gauge group. We recognize immediately a known property of the Dyson-Schwinger equations that equations for the lower order correlation functions depend on values of higher order correlation functions. At this stage, we assume the mapping theorem as done in Ref.~\cite{Frasca:2015yva}. So, we assume \begin{equation} G_{1\nu}^a(x)\rightarrow\eta_\nu^a\phi(x) \end{equation} being $\phi(x)$ a scalar field. Let us introduce the $\eta$-symbols as follows \begin{eqnarray} \eta_\mu^a\eta^{a\mu} &=& N^2-1. \nonumber \\ \eta_\mu^a\eta^{b\mu} &=& \delta_{ab}, \nonumber \\ \eta_\mu^a\eta_\nu^a &=& \left(g_{\mu\nu}-\delta_{\mu\nu}\right)/2. \end{eqnarray} These simplify the equations down to \begin{eqnarray} &&\partial^2\phi(x)+2Ng^2\Delta(0)\phi(x)+Ng^2\phi^3(x) \nonumber \\ &&=\frac{1}{N^2-1}\left[g\sum_{q,i}\eta^{a\nu}\gamma_\nu T^aS_{q}^{ii}(0)\right. \nonumber \\ &&\left.+g\sum_{q,i}{\bar q}_1^i(x)\eta^{a\nu}\gamma_\nu T^a q_1^i(x)\right] \nonumber \\ &&(i\slashed\partial-m_q^i)q_{1}^{i}(x)+g{\bm T}\cdot\slashed\eta\phi(x) q_{1}^{i}(x) = 0. \end{eqnarray} We do the same for the 2P-functions. In the Landau gauge, for the gluon 2P-function we get \begin{equation} G_{2\mu\nu}^{ab}(x-y)=\left(\eta_{\mu\nu}-\frac{\partial_\mu\partial_\nu}{\partial^2}\right)\Delta_\phi(x-y) \end{equation} being $\eta_{\mu\nu}$ the Minkowski metric, and $\Delta_\phi(x-y)$ is the propagator of the $\phi$ given the map between the scalar and the Yang-Mills fields. Finally, we can write \begin{eqnarray} &&\partial^2\Delta_\phi(x-y)+2Ng^2\Delta_\phi(0)\Delta_\phi(x-y)+3Ng^2\phi^2(x)\Delta_\phi(x-y) \nonumber \\ &&=g\sum_{q,i}{\bar Q}^{ia}_\nu(x-y)\gamma^\nu T^a q_{1}^{i}(x) \nonumber \\ &&+g\sum_{q,i}{\bar q}_1^{i}(x)\gamma^\nu T^a Q^{ia}_\nu(x-y) + \delta^4(x-y)\nonumber \\ &&\partial^2 P^{ad}_2(x-y)=\delta_{ad}\delta^4(x-y) \nonumber \\ &&(i\slashed\partial-m_q^i)S^{ij}_q(x-y) \nonumber \\ &&+g{\bm T}\cdot\slashed\eta\phi(x) S^{ij}_q(x-y)=\delta_{ij}\delta^4(x-y) \nonumber \\ &&\partial^2W_{q\nu}^{ai}(x-y)+2Ng^2\Delta_\phi(0)W_{q\nu}^{ai}(x-y)+3Ng^2\phi^2(x)W_{q\nu}^{ai} \nonumber \\ &&=g\sum_{j}{\bar q}_1^{j}(x)\gamma_\nu T^a S^{ji}_q(x-y)\nonumber \\ &&(i\slashed\partial-m_q^i)Q^{ia}_\mu(x-y)+g{\bm T}\cdot\slashed\eta\phi(x) Q^{ia}_\mu(x-y) \nonumber \\ &&+gT^a\gamma_\mu\Delta_\phi(x-y) q_{1}^{i}(x)=0. \end{eqnarray} \section{'t Hooft limit} 't Hooft limit means to solve the theory assuming \cite{tHooft:1973alw, tHooft:1974pnl} \begin{equation} N\rightarrow\infty,\qquad Ng^2=constant, \qquad Ng^2\gg 1. \end{equation} The gauge group is SU(N) being $N$ is the number of colors. To solve the equations in the strong coupling limit, we need a proper perturbation technique. We proposed such a method in Ref.\cite{Frasca:2013tma}. We rescale $x\rightarrow\sqrt{Ng^2}x$ and write the equation for the gluon field as follows \begin{eqnarray} \partial^2\phi(x')+2\Delta_\phi(0)\phi(x')+3\phi^3(x')&=& \\ \frac{1}{\sqrt{Ng^2}\sqrt{N}(N^2-1)}\left[\sum_{q,i}\eta\cdot\gamma\cdot TS_{q}^{ii}(0)+\right.&& \nonumber \\ \left.\sum_{q,i}{\bar q}_1^i(x')\eta\cdot\gamma\cdot T q_1^i(x')\right].&&\nonumber \end{eqnarray} In the 't Hooft limit, the equation for the 1P-function becomes \begin{eqnarray} \partial^2\phi_0(x)+2Ng^2\Delta_\phi(0)\phi_0(x)+3Ng^2\phi_0^3(x)=0,& \nonumber \\ (i\slashed\partial-m_q^i){\hat q}_{1}^{i}(x)+g{\bm T}\cdot\slashed{\eta}\phi(x) q_{1}^{i}(x)=0.& \end{eqnarray} At the leading order the only effect is seen on masses. Therefore, we can solve the equation for the gluon field taking \begin{eqnarray} \phi_0(x)=\sqrt{\frac{2\mu^4}{m^2+\sqrt{m^4+2Ng^2\mu^4}}}\times \nonumber \\ {\rm sn}\left(p\cdot x+\chi,\kappa\right), \end{eqnarray} being sn a Jacobi elliptical function, $\mu$ and $\chi$ arbitrary integration constants and $m^2=2Ng^2\Delta_\phi(0)$ a mass shift arising from quantum corrections. We have \begin{equation} \kappa=\frac{-m^2+\sqrt{m^4+2Ng^2\mu^4}}{-m^2-\sqrt{m^4+2Ng^2\mu^4}}. \end{equation} This is true provided that the following dispersion relation holds \begin{equation} p^2=m^2+\frac{Ng^2\mu^4}{m^2+\sqrt{m^4+2Ng^2\mu^4}}. \end{equation} For the equations of the 2P-functions one has \begin{eqnarray} \partial^2\Delta_\phi(x,y)+2Ng^2\Delta_\phi(0)\Delta(x-y)+3Ng^2\phi_0^2(x)\Delta_\phi(x-y) \nonumber \\ =g\sum_{q,i}{\bar Q}^{ia}_\nu(x,y)\gamma^\nu T^a {\hat q}_{1}^{i}(x) \nonumber \\ +g\sum_{q,i}{\bar{\hat q}}_1^{i}(x)\gamma^\nu T^a Q^{ia}_\nu(x,y) + \delta^4(x-y) \nonumber \\ \partial^2 P^{ad}_2(x-y)=\delta_{ad}\delta^4(x-y) \nonumber \\ (i\slashed\partial-m_q^i){\hat S}^{ij}_q(x-y)+g{\bm T}\cdot\slashed\eta\phi(x) S^{ij}_q(x-y)=\delta_{ij}\delta^4(x-y) \nonumber \\ \partial^2W_{q\nu}^{ai}(x,y)+2Ng^2\Delta_\phi(0)W_{q\nu}^{ai}(x,y)+3Ng^2\phi_0^2(x)W_{q\nu}^{ai}(x,y)\nonumber \\ =g\sum_{j}{\bar {\hat q}}_1^{j}(x)\gamma_\nu T^a {\hat S}^{ji}(x-y) \nonumber \\ (i\slashed\partial-{\hat M}_q^i){\hat Q}^{ia}_\mu(x,y)+gT^a\gamma_\mu\Delta_\phi(x-y) {\hat q}_{1}^{i}(x)=0. \end{eqnarray} These equations can be solved by finding a solution to the following equation \begin{eqnarray} \partial^2\Delta_0(x-y)+[m^2+3Ng^2\phi_0^2(x)]\Delta_0(x-y)&=& \nonumber \\ \delta^4(x-y).&& \end{eqnarray} In momentum space, the solution of this equation is given by \cite{Frasca:2015yva,Frasca:2013tma} \begin{eqnarray} \Delta_0(p)=M{\hat Z}(\mu,m,Ng^2)\frac{2\pi^3}{K^3(\kappa)}\times \nonumber \\ \sum_{n=0}^\infty(-1)^n\frac{e^{-(n+\frac{1}{2})\pi\frac{K'(\kappa)}{K(\kappa)}}} {1-e^{-(2n+1)\frac{K'(\kappa)}{K(\kappa)}\pi}}\times \nonumber \\ (2n+1)^2\frac{1}{p^2-m_n^2+i\epsilon} \end{eqnarray} being \begin{equation} M=\sqrt{m^2+\frac{Ng^2\mu^4}{m^2+\sqrt{m^4+2Ng^2\mu^4}}}, \end{equation} and ${\hat Z}(\mu,m,Ng^2)$ a given constant. The spectrum is given by $m_n$ and a proper gap equation \cite{Frasca:2017slg}. \section{Non-local Nambu-Jona-Lasinio approximation} In the strong coupling approximation and 't Hooft limit, one gets the Dyson-Schwinger equations for the following nonlocal-NJL-model \cite{Frasca:2021zyn}: \begin{eqnarray*} \lefteqn{{\cal L}'_{\rm NJL}\ =\ \sum_i\bar\psi_i(x) (i\gamma^\mu\partial_\mu-m_q)\psi_i(x)\strut}\nonumber\\&&\strut +\frac{N_cg^2}2\int d^4y\Delta_0(x-y)\sum_{i,j}\bar\psi_i(x)\psi_j(y) \bar\psi_j(y)\psi_i(x)\strut\nonumber\\&&\strut +\frac{N_cg^2}2\int d^4y\Delta_0(x-y)\sum_{i,j}\bar\psi_i(x)i\gamma_5\psi_j(y) \bar\psi_j(y)i\gamma_5\psi_i(x)\strut\nonumber\\&&\strut -\frac{N_cg^2}4\int d^4y\Delta_0(x-y)\sum_{i,j}\bar\psi_i(x)\gamma^\mu \psi_j(y)\bar\psi_j(y)\gamma_\mu \psi_i(x)\strut\nonumber\\&&\strut -\frac{N_cg^2}4\int d^4y\Delta_0(x-y)\sum_{i,j} \bar\psi_i(x)\gamma^\mu\gamma_5\psi_j(y) \bar\psi_j(y)\gamma_\mu\gamma_5\psi_i(x). \end{eqnarray*} This model yields the following gap equation for the quark masses \begin{equation} M_q(p)=m_q+4N_fN_cg^2\frac{\tilde\Delta_0(p)}{\tilde\Delta_0(0)} \int\frac{d^4p'}{(2\pi)^4}\frac{\tilde\Delta_0(p')M_q(p')}{p^{\prime2} -M_q^2(p')}. \end{equation} In order for a quark to be free, this mass should represent a pole on the real axis in the quark propagator. We will show that this is not generally true and quarks are confined. This means that the gap equation has not always a solution at decreasing energy and we move from a chiral condensate of quarks to an instanton liquid of glue excitations where quark bound states are the particles in the spectrum of the theory. The solution of the gap equation is shown graphically in Fig.~\ref{fig1} \begin{figure}[H] \includegraphics[width=.4\textwidth]{lowestzero.eps} \label{fig1} \caption{$M_0$ is the effective quark mass, $m_0$ is the mass of the lowest glue state.} \end{figure} In this figure the two lowest zeros of $-p^2=M_q^2(p)$ in Euclidean domain are given in units of $m_0^2$, splitted into real parts (green straight lines) and imaginary parts (red dashed lines), in dependence on the ratio $M_0/m_0$. The zeros become complex for approximately $M_0/m_0>0.39$. Given the values $\Lambda=1\ \rm{GeV}$ and $m_0$ the mass of the f0(500)\footnote{We have chosen this resonance because its possible interpretation is that it is the scalar field responsible for the chiral symmetry breaking in the NJL model.}, we are deeply in the confined regime for QCD. The evidence that the gluon propagator represents an instanton liquid quite well was given Ref.~\cite{Frasca:2013kka}. The relation between the non-local factor arising from the instanton liquid and the factor appearing in the non-local NJL model is \begin{equation} \frac{2}{\tilde\Delta(0)}\tilde\Delta(p)={\cal C}(p), \end{equation} For an instanton liquid (normalized to zero momentum) we have (see \cite{Hell:2008cc} and refs. therein) \begin{equation} {\cal C}_I(p)=p^2\left\{\pi d^2\dfrac{d}{d\xi} \big[I_0(\xi)K_0(\xi)-I_1(\xi)K_1(\xi)\big]\right\}^2 \end{equation} where $\xi=\frac{|p|d}{2}$. Indeed, the comparison yields Fig.~\ref{fig2}. \begin{figure}[H] \includegraphics[width=.4\textwidth]{formfactor.eps} \caption{\it Comparison of our form factor and that of an instanton liquid.\label{fig2}}. \end{figure} The agreement is very good and we can depict a scenario with a chiral quark condensate with massive and possibly unconfined quarks and that of an instanton liquid for the glue sector where the only particles in the spectrum are bounded quark states and colorless glue states. Free quarks are no more in the spectrum of the theory. \section{Conclusions} There are different approaches to understand the confinement of quarks. One of these is given by solutions of the gap equation of the dynamical quark mass. With a reasonable UV cutoff and fixed by the glueball spectrum starting at the mass of the $f_0(500)$ resonance, free quarks are no more in the spectrum of QCD. As a consequence, free quarks are no longer physical states of the theory and the quarks can be expected to be confined in the 't~Hooft limit. The low-energy limit of QCD turns out to be a well-defined non-local NJL model with all the parameters obtained from QCD. Having a low-energy limit of QCD permits to do several computations to be compared with experiments. Indeed, our first application was to the $g-2$ problem with a very satisfactory agreement with data \cite{Frasca:2021yuu}. \section*{Acknowledgements\label{Ack}} The research was supported in part by the European Regional Development Fund under Grant No.~TK133.
\section{Introduction} Subgraph discovery in network data has aroused many interests in recent years because of many real-world applications, such as disease outbreak detection \cite{chen2014non}, intrusion detection in computer networks \cite{shao2017efficient}, event detection in social networks \cite{rozenshtein2014event,shao2018efficient}, congestion detection in traffic network, etc. However, most of existing works investigate the subgraph mining on static, isolated networks, and such problem involving complex networks has not been well studied, which could be multilayer networks, interdependent networks, temporal networks, and networks of networks and among others. Subgraph discovery in complex networks is very challenging but useful, since real system are more often than not interconnected, with many inter-dependencies that are not properly captured by an isolated network. It is important to take such multiple networks which are interdependent with each other into account to try to improve our understanding of interesting pattern in networks. Typically, subgraph discovery in a single network is to find a subset of vertices and edges that minimizing an user-specified cost function, meanwhile, satisfying a certain topological structured constraint, such as connected subgraphs, dense subgraphs, subgraphs that are isomorphic to a query graph, compact subgraphs, trees, and paths, among others \cite{chen2016generalized}. It can be formulated as an NP-hard combinatorial optimization problem as follows: \begin{equation} \begin{gathered} \min_{S\subseteq \mathbb{V}} F(S) \\ \mathrm{s.t.} \ \ S \ \text{satisfies a pre-defined topological constraint} \end{gathered} \end{equation} where $F$ is a user-specified cost function, and $S$ is a subset of vertex set $\mathbb{V}$ of a network. Correspondingly, subgraph detection in multiple interdependent networks can be formulated as block-structured optimization problem with multiple topological constraints on blocks, \begin{equation}\label{prob:discrete} \begin{gathered} \min_{S_1 \subseteq \mathbb{V}^1, ..., S_K \subseteq \mathbb{V}^K } F(S_1,\cdots, S_K) \\ \mathrm{s.t.} \ \ S_k \ \text{satisfies a pre-defined topological constraint,} \end{gathered} \end{equation} where $S_k$ is a subset of nodes in $k^{\text{th}}$ network, and $\mathbb{V}^k$ is vertex set of $k^{\text{th}}$ network, $ k=1,...,K $. We can also treat $\mathbb{V}^k$ as $k^{\text{th}}$ block of all vertices $\mathbb{V} = \mathbb{V}^1 \cup \cdots \cup \mathbb{V}^K$. There are many trivial examples of multiple interdependent networks \cite{kivela2014multilayer,gao2012networks}. For instance, a temporal network can be viewed as multiple temporal-dependent networks, in which each network represents a snapshot of temporal network at a specific time stamp \cite{mucha2010community}. Subgraph detection in a temporal network is to find a sequence of subset of vertices in a sequence of blocks, where the detected subgraph in each block must satisfy a predefined topological constraint. A large network comprised of many communities is a network of networks, where communities can be viewed as small networks or blocks that interconnect with each other. Vanilla subgraph detection problem is a special case of subgraph discovery in interdependent networks when number of interdependent networks (blocks) is 1. To the best of our knowledge, most of related studies on subgraph detection in multiple interdependent networks only focus on specific applications and are lack of generality. Furthermore, they are heuristic-driven with no theoretical guarantee. Therefore, we propose a general framework that leverages graph structured sparsity model \cite{hegde2015nearly,chen2016generalized} and randomized block coordinate descent method \cite{fercoq2015accelerated} to solve this problem which can be modeled as a block-structured nonconvex optimization problem. Suppose there are $N$ nodes in the graph, each node in a graph is associated with a random variable. Then the combinatorial optimization problem (\ref{prob:discrete}) can be relaxed from discrete space to continuous space, and formulated as: \begin{equation} \hspace{-5pt} {\fontsize{10}{10} \begin{gathered} \min_{\text{supp}({\bf x}^1)\subseteq \mathbb{V}^1,\dots,\text{supp}({\bf x}^K)\subseteq \mathbb{V}^K} F({\bf x})\\ \text{s.t.}\ \ \text{supp}({\bf x}^k)\text{ satisfies a pre-defined topological constraint,} \end{gathered}\hspace{-10pt} } \end{equation} where $\text{supp}({\bf x}^k)$ is non-zero entries of the $k^{\text{th}}$ block and their corresponding nodes must satisfy some topological constraint. Then, a variant of continuous optimization methods can be deployed to solve this problem, which enjoys better effectiveness, efficiency, scalability and is flexible to be generalized to different scenarios. The \textcolor{red}{contributions} of our work are summarized as follows: \begin{itemize} [wide=0pt,leftmargin=\parindent] \item \textbf{Design of an efficient and scalable approximation algorithm.} We propose a novel generic framework, namely, Graph Block-structured Matching Pursuit, to approximately solve a broad class of subgraph discovery problems in multiple interdependent networks in nearly-linear time. Furthermore, we design a parallel version of our algorithm to make it more scalable and efficient. \item \textbf{Theoretical guarantees.} We present a theoretical analysis of the proposed GBMP algorithm and show that it enjoys a good convergence rate and a tight error bound on the quality of the detected subgraph. \item \textbf{Two practical applications with comprehensive experiments.} We demonstrate how our framework can be applied to two practical applications: 1.) anomalous evolving subgraph detection; 2.) subgraph discovery in network of networks. We conduct comprehensive experiments on both synthetic and real networks to validate the effectiveness and efficiency of our proposed algorithm. \end{itemize} \textbf{Reproducibility}: The implementation of GBMP, datasets, and \textcolor{red}{supplementary material} are available via the anonymous link: \url{https://bit.ly/2NxDvkw} The rest of this paper is organized as follows. Section \ref{section:method} introduces some preliminaries and the proposed method GBMP. Section \ref{section:theory} analyzes theoretical properties of the method. Section \ref{section:example} demonstrates applications of our proposed algorithm. Experimental design, datasets and results are shown in section \ref{section:experiment}. We introduce related work in Section \ref{section:related}. Section \ref{section:conclusion} concludes the paper and describes future work. \section{Methodology}\label{section:method} \subsection{Problem Formulation} Firstly, multiple interdependent networks can be viewed as one combined network. Suppose such a network $\mathbb{G} = (\mathbb{V}, \mathbb{E}, {\bf W})$ is given, where $\mathbb{V} = \{1, \cdots, N\}$ is the ground set of vertices, $\mathbb{E} \subseteq \mathbb{V}\times \mathbb{V}$ is the ground set of edges, ${\bf W} = [{\bf w}_1, \cdots, {\bf w}_N]\in \mathbb{R}^{P\times N}$ is the feature matrix, and ${\bf w}_i\in \mathbb{R}^P$ is the feature vector of vertex $i$. Vertex set $\mathbb{V}$ is decomposed to $K$ disjoint subsets (blocks) of vertices: $\mathbb{V} = \mathbb{V}^1\cup \cdots \cup \mathbb{V}^K$, where $N_k = |\mathbb{V}^k|$ is the size of the subset of vertices $\mathbb{V}^k$. The general subgraph detection problem in multiple blocks can be formulated as following general block-structured optimization problem: \begin{equation} \begin{gathered} \min_{{\bf x}=({\bf x}^1,\dots,{\bf x}^K)} F({\bf x})=f({\bf x}^1, \cdots, {\bf x}^K) + \textcolor{red}{\sum_{k=1}^K g_k({\bf x}^k)}, \ \ \\ \mathrm{s.t.}\ \ \mathrm{supp}({\bf x}^k) \in \mathbb{M}_k(\mathbb{G}, s),\ \ k = 1, \cdots, K \label{eq:gen_prob} \end{gathered} \end{equation} where the vector ${\bf x} \in \mathbb{R}^N$ is partitioned into multiple disjoint blocks ${\bf x}^1 \in \mathbb{R}^{N_1}, \cdots, {\bf x}^K \in \mathbb{R}^{N_K}$, $f$ and $g_k$ are both continuous, differentiable and convex functions, $\text{supp}({\bf x}^k)$ denotes the support set of vector ${\bf x}^k$, $\mathbb{M}_k(\mathbb{G}, s)$ denotes all possible subsets of vertices in $\mathbb{G}$ that satisfy a certain predefined topological constraint. \textcolor{red}{The functions $f$ and $g_k$ will be defined based on the feature matrix ${\bf W}$, and can be used to formulate the cost function and dependencies among blocks. } One example of topological constraint for defining $\mathbb{M}_k(\mathbb{G}, s)$ is connected subgraph, and we can formally define it as follows: \begin{equation} \mathbb{M}_k(\mathbb{G}, s) \coloneqq \{S | S \subseteq \mathbb{V}^k; |S| \leq s; \mathbb{G}_S\ \text{is connected.} \} \end{equation} where $s$ is a predefined upperbound size of $S$, $S\subseteq \mathbb{V}^k$ , and $\mathbb{G}_S$ refers to the induced subgraph by a set of vertices $S$. The topological constraints can be any graph structured sparsity constraints on $\mathbb{G}_S$, such as connected subgraphs, dense subgraphs, compact subgraphs \cite{chen2017generic}. Moreover, we do not restrict all $\mathrm{supp}({\bf x}^1),\cdots, \mathrm{supp}({\bf x}^K)$ satisfy an identical topological constraint. An illustration of problem formulation for connected subgraph detection in interdependent network can be found in Figure \ref{fig:prob_demo}. \begin{figure}[htbp] \centering \includegraphics[width=\linewidth]{figures/prob_demo_2.pdf} \caption{Illustration of problem formulation. In this example, the whole network has a obvious block-separated structure, in which dash lines represent the connections across different blocks, and solid lines represent connections between nodes in the same block. Those two types of lines may characterize different relationships in practical applications. Those darker nodes are what we are interested in, and their corresponding entries in vector ${\bf x}$ should be nonzero, while others should be 0s once we get a optimum of ${\bf x}$.} \label{fig:prob_demo} \end{figure} \subsection{Head and Tail Projections on $\mathbb{M}(\mathbb{G}, s)$} Before presenting our algorithm, we first introduce two major components related to the support of the topological constraints "$\text{supp}(\bf{x}) \in \mathbb{M}(\mathbb{G}, s)$", including head and tail projections \cite{hegde2015nearly}. The key idea is that, suppose we are able to find a good intermediate solution $\bf{x}$ that does not satisfy this topological constraint, these two types of projections can be used to find good \textit{approximations} of $\bf{x}$ in the feasible space defined by $\mathbb{M}(\mathbb{G},s)$. \begin{itemize}[leftmargin=*] \item \textbf{Tail Projection} ($T({\bf x})$): is to find a subset of nodes $S \subseteq \mathbb{V}$ such that \begin{equation} \|{\bf x} - {\bf x}_{S}\|_2 \leq c_{T} \cdot \min_{S' \in \mathbb{M}(\mathbb{G}, s)} \|{\bf x} - {\bf x}_{S'}\|_2, \end{equation} where $c_{T} \geq 1$, and ${\bf x}_S$ is a restriction of ${\bf x}$ on $S$ such that: $({\bf x}_S)_i = ({\bf x})_i$ if $i \in S$, and $({\bf x}_S)_i=0$ otherwise. When $c_{T} = 1$, $T({\bf x})$ returns an optimal solution to the problem: $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2$. When $c_T > 1$, $T({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_T$. \item \textbf{Head Projection} ($H({\bf x})$): is to find a subset of nodes $S$ such that \begin{equation} \|{\bf x}_{S}\|_2 \geq c_{H}\cdot \max_{S'\in \mathbb{M}(\mathbb{G}, s)} \|{\bf x}_{S'}\|_2, \end{equation} where $c_H\leq1$. When $c_H = 1$, $H({\bf x})$ returns an optimal solution to the problem: $\max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. When $c_H < 1$, $H({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_H$. \end{itemize} It can be readily proved that, when $c_T = 1$ and $c_H = 1$, both $T({\bf x})$ and $H({\bf x})$ return the same subset $S$, since $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2 = \max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. In addition, the corresponding vector ${\bf x}_S$ is an optimal solution to the standard projection oracle in the traditional projected gradient descent algorithm \cite{bahmani2016learning}: \begin{equation} \argmin_{{\bf x}'\in \mathbb{R}^n} \|\bf{x}-\bf{x}'\|_2 \ \ \text{s.t.\ supp}({\bf x}') \in \mathbb{M}(\mathbb{G}, s) \label{eq:projection_oracle} \end{equation} which is NP-hard in general for popular topological constraints, such as connected subgraphs and dense subgraphs \cite{qian2014connected}. However, when $c_T > 1$ and $c_H < 1$, $T({\bf x})$ and $H({\bf x})$ return different approximate solutions to the standard projection problem \cite{chen2017generic}. Although the head and tail projections are NP-hard when we restrict $c_T = 1$ and $c_H = 1$, these two projections can still be implemented in nearly-linear time when approximated solutions with $c_{T} > 1$ and $c_H < 1$ are allowed. The head and tail projections are two different approximations to the standard projection problem (\ref{eq:projection_oracle}). It has been demonstrated that the joint utilization of both head and tail projections is critical in design of approximate algorithms for network topology-related optimization problems \cite{hegde2015nearly,hegde2015approximation,chen2016generalized,zhou2016graph}. \subsection{Algorithm Details} We propose a novel Graph Block-structured Matching Pursuit, namely GBMP, to approximately solve problem (\ref{eq:gen_prob}) in nearly-linear time. The key idea is to alternatively search for a close-to-optimal solution by solving easier sub-problems for graph $\mathbb{G}_k$ in each iteration $i$ until converged. The pseudo-code of our proposed algorithm is described in Algorithm \ref{alg:gbmp}. \begin{algorithm \begin{algorithmic}[1] \Statex \textbf{Input}: $\mathbb{G}=\{\mathbb{G}^{(1)},\dots,\mathbb{G}^{(K)}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}, $ i=0 $, $ {\bf x}^{k,i}=\text{initial vectors}$, k=1,\dots, K \Repeat \For{$k = 1,\cdots, K$} \State $\Gamma_{{\bf x}^{k}}=H(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$ \State $\Omega_{{\bf x}^{k}}=\Gamma_{{\bf x}^{k}}\cup\mathrm{supp}({\bf x}^{k,i})$ \EndFor \State Get $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ by solving problem (\ref{sub-p1})\label{alg:line:subproblem} \For{$k = 1, \cdots, K$} \State $ \Psi_{{\bf x}^{k}}^{i+1}=\mathrm{T}({\bf b}_{{\bf x}^k}^i) $ \State $ {\bf x}^{k,i+1}=[{\bf b}_{{\bf x}^{k}}^i]_{\Psi_{{\bf x}^{k}}^{i+1}} $ \EndFor \State $ i=i+1 $ \Until{$ \sum_{k=1}^{K} \left\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\right\|\leq \epsilon $} \State $ C=(\Psi_{x^1}^{i}, \dots, \Psi_{{\bf x}^k}^{i}) $ \Return $ ( {\bf x}^{1,i}, \cdots, {\bf x}^{K,i}) , C $ \end{algorithmic} \caption{Graph Block-structured Matching Pursuit}\label{alg:gbmp} \end{algorithm} Our algorithm can be decomposed into three main procedures, including 1) (\textbf{Line 2 $\sim$ 5}) alternatively apply head projection on the partial derivatives of the objective function w.r.t ${\bf x}^k$ ; 2) (\textbf{Line 6}) identify the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ that minimizes the objective function in intermediate space $\cup_{k=1}^{K} \Omega_{{\bf x}^k}$ ; 3) (\textbf{Line 7 $\sim$ 10}) alternatively apply tail projections on the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ to the feasible space defined by the topological constraints: ``$\text{supp}({\bf x}^k) \in \mathbb{M}_k(\mathbb{G}, s)$". To be more informative, we illustrate general idea of each step in algorithm \ref{alg:gbmp}. The whole procedure iteratively refines the intermediate solutions $({\bf x}^{1,i}, \cdots, {\bf x}^{K, i})$ until converged. In the procedure of head projections, the first step (\textbf{Line 3}) calculates the partial derivative $\nabla_{{\bf x}^k} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$, and then identifies a subset of nodes $\Gamma_{{\bf x}^k}$ via head projection. The support set $\Gamma_{{\bf x}^k}$ can be interpreted as a good approximated directions where the nonconvex set ``$\text{supp}({\bf x}^k) \in \mathbb{M}_k(\mathbb{G}, s)"$ is located. In \textbf{Line 4}, we combine the set $\Gamma_{{\bf x}^k}$ with the support set of ${\bf x}^{k,i}$ to get a slightly larger possible searching space $\Omega_{{\bf x}^k}$, which is the feasible space for subproblem in (\textbf{Line 6}): \begin{equation} \begin{split} \hspace*{-10pt}\left( {\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i \right) = &\argmin\limits_{{\bf x}^1,\dots,{\bf x}^K} f({\bf x}^1,\dots,{\bf x}^K) + \sum_{k=1}^{K} g_k({\bf x}^k) \\ &\mathrm{s.t.}\, \ \ \mathrm{supp}({\bf x}^k)\subseteq \Omega_{{\bf x}^k} \label{sub-p1} \end{split} \end{equation} In the procedure of tail projections, the first step (\textbf{Line 8}) is to apply tail projection on the solution of subproblem $(\ref{sub-p1})$, and returns a set of nodes $\Psi_{{\bf x}^{k}}^{i+1}$ . The last step is to update ${\bf x}^{k}$ by mapping the vector ${\bf b}_{{\bf x}^k}^i$ on the support set $\Psi_{{\bf x}^{k}}^{i+1}$, thereby $({\bf x}^{k, i+1})_j = ({b}_{{\bf x}^k}^i)_j$ if $j \in \Psi_{{\bf x}^{k}}^{i+1} $, $({\bf x}^{k, i+1})_j = 0$ otherwise. Furthermore, we utilize the \textit{block-coordinate descent method} with \textit{proximal linear update} \cite{tseng2009coordinate,shi2016primer} to solve the problem (\ref{sub-p1}) (Algorithm \ref{alg:block}). This method has been analyzed and also applied to both convex and nonconvex problems \cite{beck2013convergence,zhou2016global,hong2017iteration,xu2017globally}, which shows good performance empirically. Block coordinate descent is a generalization of the alternating minimization method that has been applied to a variety of problems, such as the expectation-maximization (EM) algorithm \cite{dempster1977maximum}. In addition, we utilize the proximal linear update that ensures the convergence of the algorithm on nonconvex problems with topological constraints. The proximal linear update in our scenario is defined by: \begin{equation} \begin{split} \hspace*{-8pt}{\bf x}^{k, t+1} = &\underset{{\bf x}^{k}}{\operatorname{argmin}}\ f({\bf x}^{t}) + \langle \nabla_{k} f(\hat{\bf x}^{k,t}, {\bf x}^{\neq k, t}), {\bf x}^{k} - \hat{\bf x}^{k, t} \rangle\\ & + \frac{1}{2 \alpha^{k, t}}\|{\bf x}^{k} - {\bf \hat{x}}^{k, t}\|_2^2 + g_{k}({\bf x}^{k})\\ &\ \ \ \ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.} \ \ \mathrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k} \label{prob:proximal} \end{split} \end{equation} where $\alpha^{k, t}$ serves as a step size and can be set as the reciprocal of the Lipschitz constant of $\nabla_{k} f(\hat{\bf x}^{k,t}, {\bf x}^{\neq k, t})$, and $\hat{\bf x}^{k, t}$ (\textbf{Line 4}) is an extrapolated point that helps accelerate the convergence of the proximal point update scheme. Since the objective function is simply second order Taylor approximation of function $f$ with Hessian replaced by identity matrix plus a convex function $g_k$, we can easily derive and implement the closed form solution of the objective function in problem (\ref{prob:proximal}), and then project it to the feasible space, which is convex. The overall block coordinated descent on convex function with convex constraint (i.e. Algorithm \ref{alg:block}) has a sublinear rate of convergence \cite{beck2013convergence,shi2016primer}. \begin{algorithm}[H] \begin{algorithmic}[1] \Statex \textbf{Input}: $\mathbb{G}=\{\mathbb{G}^{(1)},\dots,\mathbb{G}^{(K)}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $t = 0, \epsilon = 10^{-6}, \rho_0 = 1.$ \Repeat \State \text{Choose index } $k \in \{1, \cdots, K\}$ \State $\omega_{t} = (\rho_t - 1) / \rho_t,\ $ \State $\hat{\bf x}^{k, t} = {\bf x}^{k, t} + \omega_{t} ({\bf x}^{k, t} - {\bf x}^{k,t-1})$ \State Update ${\bf x}^{k, t}$ to ${\bf x}^{k, t+1}$ by solving Problem (\ref{prob:proximal}) \State Keep ${\bf x}^{j, t+1} = {\bf x}^{j, t}$, for all $j \neq k$ \State $\rho_{t+1} = (1+\sqrt{1 + 4 \rho_{t}^2})/2,$ \State Let $t = t+1$ \Until{$\sum_{k=1}^{K} \|{\bf x}^{k, t} - {\bf x}^{k, t-1}\| \le \epsilon$} \Return $\{{\bf x}^{1, t}, \cdots, {\bf x}^{K, t}\}$ \end{algorithmic} \caption{Block-Coordinate Descent Method with Proximal Linear Update to Solve Problem (\ref{sub-p1})}\label{alg:block} \end{algorithm} \section{Theoretical Analysis} \label{section:theory} In order to demonstrate the accuracy and efficiency of GBMP, we require that the objective function $F({\bf x})$ satisfies the Weak Restricted Strong Convexity (WRSC) condition, which is a variant of the Restricted Strong Convexity/Smoothness (RSC/RSS) \cite{yuan2014gradient}: \begin{definition}[Weak Restricted Strong Convexity (WRSC)]\label{def:wrsc} A function $F({\bf x})$ has condition $(\xi,\delta,\mathbb{M})$-WRSC, if $\forall {\bf x}, {\bf y}\in\mathbb{R}^N$ and $\forall S\in\mathbb{M}$ with $\mathrm{supp}({\bf x})\cup\mathrm{supp}({\bf y})\subseteq S$, the following inequality holds for some $\xi >0$ and $0<\delta<1$: \begin{equation} \|{\bf x}-{\bf y}-\xi\nabla_S F({\bf x})+\xi\nabla_S F({\bf y})\|_2\leq\delta\|{\bf x}-{\bf y}\|_2 \end{equation} where ${\bf x}=({\bf x}^1,\dots,{\bf x}^K), {\bf y}=({\bf y}^1,\dots,{\bf y}^K), {\bf x}^k, {\bf y}^k\in\mathbb{R}^{N_k}, k=1,\dots,K$, topological constraint $\mathbb{M}$ can be expressed as $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}_k(\mathbb{G},s_k), s=\sum_{k=1}^K s_k$, and the subgraph in $k^{\text{th}}$ block is $S_k$, which satisfies $|S_k|\leq s_k, S_k\subseteq \mathbb{V}^k, S=\bigcup_{k=1}^K S_k, |S|\leq s$. \end{definition} \begin{remark} We can set different $s_k$ for $k^{\text{th}}$ block. In our applications, $s_1=\cdots=s_k=s'$, i.e., we use the same upper bound of subgraph size for all blocks. \end{remark} \begin{theorem}\label{thm:convege} Consider the graph block-structured constraint with $K$ blocks $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}_k(\mathbb{G},s_k)$ and a cost function $F:\mathbb{R}^N\to\mathbb{R}$ that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G},8s))$-WRSC. If $\eta=c_H(1-\delta)-\delta>0$, then for any true ${\bf x}^*\in\mathbb{R}^N$ with $\mathrm{supp}({\bf x}^*)\in\mathbb{M}((\mathbb{G},s)$, the iteration of algorithm obeys \begin{equation} \|{\bf x}^{i+1}-{\bf x}^*\|_2\leq\alpha\|{\bf x}^i-{\bf x}^*\|_2+\beta\|\nabla_I F({\bf x}^*)\|_2 \end{equation} where $c_H=\min_{k=1,\dots,K}\{{c_{H_k}}\}$, $c_T=\max_{k=1,\dots,K}\{{c_{T_k}}\}$, $I=\argmax_{S\in\mathbb{M}}\|\nabla_S F({\bf x})\|_2$, $\alpha=\frac{1+c_T}{1-\delta}\sqrt{1-\eta^2}$, and $\beta=\frac{\xi(1+c_T)}{1-\delta}\left[\frac{1+c_H}{\eta}+\frac{\eta(1+c_H)}{\sqrt{1-\eta^2}}+1 \right]$. $c_{H_k}$ and $c_{T_k}$ denote head and tail projection approximation factors on $k^{\text{th}}$ block. \end{theorem} \begin{IEEEproof} The proof is provided in Appendix \ref{proof:converge}. \end{IEEEproof} \begin{remark} 1) The convergence of GBMP is controled by the shrinkage rate $\alpha<1$, which can be satisfied if and only if $c_H^2>1-1/(1+c_T)^2$ when $\delta$ is small. As proved in \cite{hegde2015approximation}, the approximation factor $c_H$ of any given head approximation algorithm can be boosted to any arbitrary constant close to 1, such that the above condition is satisfied. 2) According to WRSC condition, the function is Lipschitz continuous, which further implies the $\|\nabla_I F(x^*)\|_2$ must be bounded. To sum up, Theorem \ref{thm:convege} indicates the convegence of GBMP algorihtm. \end{remark} \begin{theorem}\label{thm:time} Let ${\bf x}^*\in\mathbb{R}^N$ be a true optimum such that $\mathrm{supp}({\bf x}^*)\in\mathbb{M}(\mathbb{G}, s)$, and $F:\mathbb{R}^N\to\mathbb{R}$ be a cost function that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G}, 8s))$-WRSC. Assuming that $\alpha<1$, GBMP returns an $\hat{{\bf x}}$ such that, $\mathrm{supp}(\hat{{\bf x}})\in\mathbb{M}(\mathbb{G}, 5s)$ and $\|{\bf x}^*-\hat{{\bf x}}\|_2\leq c\|\nabla_{I}F({\bf x}^*)\|_2$, where $c=(1+\frac{\beta}{1-\alpha})$ is a fixed constant. Moreover, GBMP runs in time \begin{equation} {\fontsize{8}{8} O\left(\left(T+\sum_{k=1}^K|\mathbb{E}^k|\log^3 N_k\right)\log\left(\frac{\|{\bf x}^*\|_2}{\|\nabla_{I}F({\bf x}^*)\|_2}\right) \right) } \end{equation} where $|\mathbb{E}^k|$, $N_k$ denote edge and node size of $k^{\text{th}}$ block and $T$ is the time complexity of one execution of the subproblem in line \ref{alg:line:subproblem} of Algorithm \ref{alg:gbmp}. In particularly, if $T$ scales linearly with $N$, then GBMP scales \textbf{nearly linearly} with $N$. \end{theorem} \begin{IEEEproof} The proof is provided in Appendix \ref{proof:time}. \end{IEEEproof} \begin{remark} We can run head and tail projections on blocks \textbf{in parallel}, which reduces the time cost of each iteration to $(T+|\mathbb{E}'|\log^3N'), |\mathbb{E}'|\log^3N'=\max_{k=1,\dots,K}|\mathbb{E}^k|\log^3N_k$. As mentioned in Section \ref{section:method}, which has been proved in \cite{beck2013convergence}, sublinear convergece rate $O(1/t)$ can be established for Algorithm \ref{alg:block}. Hence, the number of iterations in Algorithm \ref{alg:block} is $O(\lceil 1/\epsilon\rceil)$ when error bound is $\epsilon$. Then we can conclude that the time complexity of Algorithm \ref{alg:block} (i.e. $T$) is $O(\lceil 1/\epsilon\rceil N)$, which further implies algorithm GBMP scales nearly linearly with $N$. \end{remark} \section{Example Applications} \label{section:example} In this section, we shows two applications in the field of event detection: 1) anomalous evolving subgraphs detection and 2) subgraph discovery in network of networks. For these two applications, we leverage the \textbf{Elevated Mean Scan} (EMS) statistics, which is popularly used for detecting signals among node-level numerical features on graph \cite{qian2014connected,arias2011detection}. The EMS statistics is defined as: \begin{equation} \frac{{\bf c}^\top {\bf x}}{ \sqrt{{\bf x}^\top {\bf 1}} } \end{equation} where ${\bf x} \in \{0,1\}^N$, ${\bf c}$ denotes the feature vector of all nodes, and $c_i \in \mathbb{R}$ denotes the uni-variate feature for node $i$. Assuming $S$ is some unknown anomalous cluster which forms a connected component, $S\subseteq \mathbb{V}$. The aim of significant subgraph detection is to decide between the null hypothesis $H_0 : \{ c_i \sim \mathbb{N}(0,1), \ \forall \ i \in V\}$ and the alternative hypothesis $H_{1, S}: \{c_i \sim \mathbb{N}(\mu, 1)\ \ \forall \ i \in S\ \text{with}\ \mu > 0 , \ \text{and}\ c_i \sim \mathbb{N}(0,1) \ \forall \ i \notin S\}$. Briefly, we hypothesize that the significant nodes $v \in S$ follow a different signal distribution with insignificant nodes $v \in V \setminus S$. Empirically, maximizing the score of EMS leads to discovering significant nodes in the network precisely. Instead of maximizing the EMS in the domain $\{0,1\}^N$, we relax EMS to continuous space and minimize the relaxed negative EMS in our applications, which can be defined as: \begin{equation} -\frac{{\bf c}^\top {\bf x}}{ \sqrt{{\bf x}^\top {\bf 1}} } + \frac{1}{2} \|{\bf x}\|_2^2 \ \ \ \text{where} \ \ {\bf x} \in [0, 1]^N \end{equation} Most importantly, the relaxed negative EMS satisfies the RSC/RSS condition when ${\bf c}$ is normalized, which implies WRSC condition. \cite{yuan2014gradient,chen2016generalized} \subsection{Anomalous Evolving Subgraphs Detection} Typically, an evolving event characterizes three phrases: emerging, spreading, and receding over a period of time. In order to detect and track the exact spatial and temporal region of an evolving event, we can formulate the problem as an anomalous evolving subgraph detection problem, which is to find a connected subgraph $S_k$ at each time stamp $k$ (denoted as local connectivity constraint), and at the meanwhile we expect $S_k$ and $S_{k-1}$ share some overlap nodes in the network (denoted as temporal consistency constraint). Hence, we can leverage the relaxed EMS and mathematically formulate the detection problem as nonconvex optimization with convex objective function and block-structured constraints: \begin{equation} \hspace{-5pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{{{\bf c}^k}^\top {\bf x}^k}{\sqrt{{{\bf x}^k}^\top {\bf 1}}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+ \lambda \cdot \sum_{k=2}^{K} \|{\bf x}^k - {\bf x}^{k-1}\|_2^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}_{k}(\mathbb{G}, s) \end{aligned}\hspace{-10pt} } \end{equation} where the first term is the summation of relaxed negative EMS, and the second term is soft constraints on ${\bf x}^{k}$ and ${\bf x}^{k-1}$ to ensure temporal consistency on detected subgraphs, and $\lambda > 0$ is a trade-off parameter. The connected subset of nodes at time stamp $k$ can be found as $S_k = \mathrm{supp}({\bf x}^{k})$, the support set of the estimated ${\bf x}^{k}$ that minimizes the objective function. \begin{algorithm}[h] \begin{algorithmic}[1] \Statex \textbf{Input}: $\mathbb{G}=\{\mathbb{G}^{(1)},\dots,\mathbb{G}^{(K)}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $i=0, {\bf x}^{1,i}, \cdots, {\bf x}^{K,i} $, $\tau=$number of processors, $n=$number of blocks \Repeat \State $\Omega_{k}=\mathrm{supp}({\bf x}^{k,i}) \cup H\Big(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K, i})\Big), \forall{k}$\label{alg:approx_block:head} \State $t=0$, choose ${\bf x}^{0}\in \mathbb{R}^N$, ${\bf x}^{0} = {\bf z}^{0}$, and $\theta_{0}= \frac{\tau}{n}$\label{alg:approx_block:diff:start} \Repeat \State ${\bf y}^t=(1-\theta_t){\bf x}^t+\theta_t {\bf x}^t$ \label{alg:approx_block:comb} \State Generate random set of blocks $S_t \subseteq \{1,\dots,K\}$ \label{alg:approx_block:select} \State ${\bf z}^{t+1} = {\bf z}^{t} $ \For{$k \in S_t$} \label{alg:approx_block:parallel:start} \State ${\bf z}^{k, t+1} = \argmin_{{\bf z} \in \mathbb{R}^{N_k}} \left\langle \nabla_k f({\bf y}^{t}), {\bf z} - {\bf y}^{k, t} \right\rangle + \frac{n \theta_t }{2\tau} \left\|{\bf z} - {\bf z}^{k, t}\right\|_2^2 + g_k({\bf z})\qquad \mathrm{s.t.} \ \ \mathrm{supp}({\bf z}^{k}) \subseteq \Omega_{k}$ \EndFor \label{alg:approx_block:parallel:end} \State ${\bf x}^{t+1} = {\bf y}^{t} + \frac{n}{\tau} \theta_t ({\bf z}^{t+1} - {\bf z}^{t})$\label{alg:approx_block:parallel:xt+1} \State $\theta_{t+1} = \frac{\sqrt{\theta_t^4 + 4\theta_t^2}- \theta_t^2}{2}$ \State let $t = t + 1$ \Until{$\| {\bf x}^{t} - {\bf x}^{t-1} \|_2 \leq \epsilon$} \label{alg:approx_block:diff:end} \State $\Psi_k = \text{T}({\bf x}^{k,i})$, ${\bf x}^{k, i} = [{\bf x}^{k,i}]_{\Psi_k}, \ \ \forall k$ \label{alg:approx_block:tail} \State let $i = i + 1$ \Until{$\sum_{k=1}^K\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\|\leq\epsilon$} \Return $\{{\bf x}^{1,i}, \cdots, {\bf x}^{K,i}\}$ \end{algorithmic} \caption{Graph Block-structured Matching Pursuit with Parallel Block Coordinate Descent}\label{alg:approx_block} \end{algorithm} \subsection{Subgraph Discovery in Network of Networks} Our proposed framework is also applicable to subgraph discovery in a network of networks. A large-scale static network with many communities can be viewed as one instance of network of networks, where each community is a small block of the network. When an event is wide-spreading in such large networks, it becomes very challenging and time-consuming to apply effective models to detect the significant subgraphs. For example, one application is rumor detection and tracking in social networks. It is interesting and useful to identify the connected subgraph that depicts how a rumor spreads across different communities in a social network. The most traditional approach is to partition a large network into several small blocks, and then process them individually and independently. However, this approach will effect the detection performance if those blocks are highly interdependent. By encoding the dependencies as constraints in our proposed framework, we can detect subgraphs in each individual partition of networks more efficiently without sacrificing performance. Specifically, our proposed framework provides a feasible solution for this scenario where node dependencies among a large-scale network can not be neglected. For subgraph discovery in a network of networks, we can also leverage the relaxed negative $\text{EMS}$ and formulate the detection problem in large-scale networks as follows: \begin{table*}[ht] \caption{Results on synthetic datasets with different $\mu$. It shows that GBMP is more robust than Meden and Netspot.}\label{tab:noise} \centering \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{$\mu=3$} & \multicolumn{3}{c|}{$\mu=4$} & \multicolumn{3}{c|}{$\mu=5$} \\ \cline{2-10} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7588 & 0.7342 & 0.7453 & 0.8836 & 0.8591 & 0.8709 & 0.9646 & 0.9145 & 0.9388 \\ NetSpot & 0.6658 & 0.7267 & 0.6947 & 0.7615 & 0.7922 & 0.7763 & 0.7956 & 0.8185 & 0.8068 \\ GBMP & 0.6468 & 0.8899 & \textbf{0.7489} & 0.8487 & 0.9674 & \textbf{0.9041} & 0.9553 & 0.9914 & \textbf{0.9730} \\ \hline \end{tabular} \end{table*} \begin{equation} \hspace{-3pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{{{\bf c}^{k}}^\top {\bf x}^{k}}{\sqrt{{{\bf x}^{k}}^\top {\bf 1}}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+\lambda \cdot \sum_{i,j} e_{ij} \cdot (x_i - x_j)^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}_{k}(\mathbb{G}, s) \end{aligned} }\hspace{-15pt} \end{equation} where the first term is the summation of relaxed negative EMS, the second term is soft constraints on bridge nodes of two partitions to ensure dependencies; $e_{ij} = 1$ if node $i$ and node $j$ are connected but in two different partitions (in other words, edge $(i,j)$ is an edge cut), otherwise $e_{ij} = 0$, $x_i$ and $x_j$ are $i^{\text{th}}$ and $j^{\text{th}}$ entries of ${\bf x}$, and $\lambda > 0$ is a trade-off parameter. In addition, we propose a parallel version of our algorithm (Algorithm 3) to speed up the computation by integrating the APPROX algorithm, a randomized coordinate descent method proposed in \cite{fercoq2015accelerated}. In Algorithm 3, the head projections (Line \ref{alg:approx_block:head}), tail projections (Line \ref{alg:approx_block:tail}), and steps from Line \ref{alg:approx_block:parallel:start} to Line \ref{alg:approx_block:parallel:end} are parallelizable. The difference with Algorithm \ref{alg:gbmp} is from Line \ref{alg:approx_block:diff:start} to Line \ref{alg:approx_block:diff:end}. The parallel part starts from ${\bf x}^0\in\mathbb{R}^N$ (Line \ref{alg:approx_block:diff:start}) and generates three vector sequences denoted ${\bf x}^t,{\bf y}^t, {\bf z}^t \geq0$. In step \ref{alg:approx_block:comb}, ${\bf y}^t$ is defined as a convex combination of ${\bf x}^t$ and ${\bf z}^t$. In step \ref{alg:approx_block:select}, a set of random blocks $S_t$ is sampled and then steps \ref{alg:approx_block:parallel:start}–\ref{alg:approx_block:parallel:xt+1} are performed in parallel. After parallelization, the convergence rate of Algorithm \ref{alg:block} can be accelerated from $O(1/t)$ to $O(1/t^2)$ when the number of processors is equal to the number of coordinates, which has been proved in \cite{fercoq2015accelerated}. \section{Experiments}\label{section:experiment} This section evaluates the effectiveness and efficiency of the proposed GBMP approach in two applications on both synthetic data and real-world data. \subsection{Anomalous Evolving Subgraph Detection} \paragraph{\textbf{Synthetic Dataset}} We generate networks using Barab\'asi-Albert preferential attachment model \cite{barabasi1999emergence}. The evolving true subgraphs spanning within 7 time stamps are simulated, and the true subgraphs in two consecutive time stamps have $50\%$ of node overlap. The univariate feature values of background nodes and true nodes are randomly generated in $\mathbb{N}(0,1)$ and $\mathbb{N}(\mu, 1)$ distributions, respectively. We generate 10 temporal networks for each setting of $\mu = [3,4,5]$. As we can see, when $\mu$ is small, the data is more noised, and it is more difficult to distinguish between the anomalous nodes and normal nodes based on the univariate feature. \paragraph{Real-world Dataset} 1) \textbf{\textit{ Water Pollution Dataset}}: a real world sensor network with 12,527 vertices and 14,831 edges. This temporal network consists of node attributes in 8 time stamps with time resolution as 60 minutes, and the evolving true chemical contaminated subgraphs are provided \cite{ostfeld2008battle}. For each hour, each vertex has a sensor that reports 1 if it is polluted; otherwise, reports 0. 2) \textbf{\textit{Washington D.C. Road Traffic Dataset}}: a traffic dataset of Washington D.C from June 1, 2013 to March 31, 2014 from INRIX\footnote{http://inrix.com/publicsector.asp.} \cite{chen2017collective}. The road networks consists of 1,188 nodes and 1,323 edges, and we use the data from 6AM. to 10PM. (17 time stamps) with time resolution as 60 minutes. 3) \textbf{\textit{ Beijing Road Traffic Dataset}}: The dataset contains the real-time traffic conditions of four days. The road networks consists of 59,000 nodes and 70,317 edges, and we use the data from 5PM. to 7PM. with time resolution as 10 minutes (totally 12 time stamps) \cite{shang2014inferring}. For both traffic datasets, the node attribute is the difference between reference speed and current speed, and the true congested roads are provided. \paragraph{Performance Metrics} For the dataset used in this and following experiments, as the true subgraphs are provided, f-measure that combines precision and recall can be deployed to evaluate the quality of detected subgraphs by different methods. \paragraph{Comparison Methods and Results} We compare our algorithm with two state of the art baseline methods: \textit{Meden} \cite{bogdanov2011mining} and \textit{NetSpot} \cite{mongiovi2013netspot}, which were designed specifically for detecting significant anomalous region in dynamic networks. We compare the average precision, recall, and f-measure of detected subgraphs on all methods, and the results are reported in Table \ref{tab:noise} and Table \ref{tab:evo}. As you can see, our method outperforms these two baseline methods on both synthetic data and real-world data. \begin{table}[htbp] \caption{Results on Washingtong D.C. and Beijing datasets. }\label{tab:evo} \centering \setlength\tabcolsep{3pt} \begin{tabular}{|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{Washington D.C.} & \multicolumn{3}{c|}{Beijing} \\ \cline{2-7} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7076 & 0.7662 & 0.7342 & 0.6424 & 0.7509 & 0.6882 \\ NetSpot & 0.5823 & 0.7098 & 0.6367 & 0.6789 & 0.7351 & 0.6973 \\ GBMP & 0.7049 & 0.9192 & \textbf{0.7853} & 0.6627 & 0.9634 & \textbf{0.7788} \\ \hline \end{tabular} \end{table} \begin{figure*} \centering \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/precision_water.pdf} \caption{Precision vs Noise Level} \label{fig:water:a} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/recall_water.pdf} \caption{Recall vs Noise Level} \label{fig:water:b} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/fm_water.pdf} \caption{F-measure vs Noise Level} \label{fig:water:c} \end{subfigure} \caption{Precision, Recall, and F-measure curves on Water Pollution dataset with respect to different noise ratios.} \label{fig:water:noise} \end{figure*} \begin{figure*}[ht] \vspace{-10pt} \centering \begin{subfigure}[t]{0.38\textwidth} \centering \includegraphics[width=\linewidth]{figures/node_time_4} \caption{Run Time vs Nodes} \label{fig:synthetic:a} \end{subfigure} \hspace{10pt} \begin{subfigure}[t]{0.38\textwidth} \centering \includegraphics[width=\linewidth]{figures/edge_time_4} \caption{Run Time vs Edges} \label{fig:synthetic:b} \end{subfigure} \caption{Comparison of run time on synthetic datasets. Figure (a) shows our methods run in nearly linear time w.r.t to the network size, where $|\mathbb{E}|=3|\mathbb{V}|$. Figure (b) shows that our algorithm can be easily scaled up to $1,000,000$ edges with node size $|\mathbb{V}| = 100,000$, by contrast, the AdditiveGraphScan runs over $10,000$ seconds on all cases.} \label{fig:synthetic} \end{figure*} \paragraph{Robustness Validation} Except for measuring the accuracy of subgraph detection, we also test the robustness of subgraph derection method on water pollution dataset as \cite{zhou2016graph,shao2017efficient}. We randomly select $P$ percent nodes, and flip their sensor binary values in order to test the robustness of methods to noises, where $P \in \{2, 4, 6, 8, 10\}$. Figure \ref{fig:water:noise} shows the precision, recall, and f-measure of all the comparison methods on the detection of polluted nodes in the water pollution dataset with respect to different noise ratios. The results indicate that our proposed method GBMP is the best methods on f-measures for all of the settings, which verify its robustness. \paragraph{Parameter Tuning} We strictly follow strategies recommended by authors in their original papers to tune the related model parameters. For NetSpot \cite{mongiovi2013netspot}, edges are weighted by comparing their p-value to a significance level threshold $\mu$ (0.01 recommended by authors). Our proposed methods have two parameters, 1) sparseness parameter $s$ (an upper bound of the subgraph size on each block) and 2) trade off parameter $\lambda$. We extract some data from datasets as training dataset and do grid search for those two parameters. We decide the best $\lambda$ in the range $\{0.0005, 0.001, 0.005, 0.01, 0.05, 0.1\}$, while the range of $s$ depends on specific datasets. \subsection{Subgraph Discovery in Network of Networks} \paragraph{Synthetic Datasets} We generate several networks with different network sizes with Barab\'asi-Albert model. We use random walk algorithm to simulate the ground-truth subgraph with size as $10\%$ of network size. The nodes in true subgraph have features following normal distribution $\mathbb{N}(5,1)$, and the features of background nodes follows distribution $\mathbb{N}(0,1)$. \paragraph{Real-world Datasets} 1) \textit{\textbf{Beijing Road Traffic Dataset}}: we use static network data per time stamp from 5PM. to 7PM. in previous application. 2) \textit{\textbf{Wikivote Dataset}}\footnote{\url{https://snap.stanford.edu/data/wiki-Vote.html}\label{data:snap}}: the network contains all the Wikipedia voting data from the inception of Wikipedia till January 2008, with $7,115$ nodes and $103,689$ edges. 3) \textit{\textbf{CondMat Dataset}}\footnote{\url{https://snap.stanford.edu/data/ca-CondMat.html}}: the collaboration network is from the e-print arXiv and covers scientific collaborations between authors papers submitted to Condense Matter category, with $23,133$ nodes and $93,497$ edges. For Wikivote and CondMat datasets, we simulate the true subgraphs of size $1,000$ using random walk, and the node attribute in true subgraphs follows distribution $\mathbb{N}(5, 1)$, otherwise $\mathbb{N}(0,1)$. \begin{table*}[!htbp] \caption{Results on Beijing, Wikivote, CondMat datasets. The run time is measured in seconds.}\label{tab:block} \begin{adjustbox}{center} \centering \setlength\tabcolsep{2.5pt} \resizebox{\textwidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Method} & \multicolumn{4}{c|}{Beijing} & \multicolumn{4}{c|}{Wikivote} & \multicolumn{4}{c|}{CondMat} \\ \cline{2-13} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time \\ \hline AddtivegGraphScan & 0.4295 & 0.6884 & 0.5192 & 10846.94 & 0.9543 & 0.9959 & 0.9747 & 249.97 & 0.9753 & 0.9900 & \textbf{0.9826} & 1188.33 \\ EventTree & 0.5547 & 0.5577 & 0.5369 & \textbf{90.68} & 0.9088 & 0.9654 & 0.9360 & \textbf{80.99} & 0.8623 & 0.9204 & 0.8902 & \textbf{100.23} \\ GBMP(Serial) & 0.9166 & 0.7286 & \textbf{0.8057} & 843.37 & 0.8287 & 0.9908 & 0.90254 & 610.54 & 0.9132 & 0.9859 & 0.9479 & 1243.71 \\ GBMP(Parallel) & 0.9105 & 0.7283 & 0.8028 & 154.12 & 0.9637 & 0.9888 & \textbf{0.9761} & 171.98 & 0.9423 & 0.9835 & 0.9624 & 113.08 \\ \hline \end{tabular} } \end{adjustbox} \end{table*} \setlength{\dbltextfloatsep}{10pt} \paragraph{Performance Metrics} Except for metrics (precision, recall and f-measure) used in the experiments of previous application, we also report the \textbf{run time} in this application. The running times of different methods are compared to evaluate their scalability. \paragraph{Comparison Methods and Results} We compare our method with two state of the art methods: 1) \textit{EventTree} \cite{rozenshtein2014event} and 2) \textit{AdditiveGraphScan} \cite{speakman2013dynamic} , which were designed specifically for event detection on static networks. We report the average precision, recall, f-measure, as well as run time on all methods in Table \ref{tab:block}. Our method outperforms the baseline methods in terms of f-measure by the compromise on a small amount of run time. Both of baseline methods have their own shortcomings. Despite AdditiveGraphScan can get comparable performance as our method on some datasets, it is a heuristic algorithm without theoretical guarantees and not scalable for large scale networks. EventTree is scalable, but its performance is not as good as our method. \paragraph{Scalability Analysis} We analyze the affection of sizes of nodes and edges on different methods' scalability. Figure \ref{fig:synthetic} reports the run time of our methods compared with the baseline methods. In order to run our algorithm, we partition the static network into 20 blocks with METIS \cite{karypis1998software}, and run the parallel algorithm with 20 processors. Our method is able to get comparable performance as those customized algorithms of this specific problem, and it is more scalable if we properly utilize the computing resource based on network properties. \paragraph{Parameters Tuning} For all the parameters used in AddtiveGraphScan and EventTree, we follow the same settings as \cite{zhou2016graph,shao2018efficient}. For parameters in our method, same strategy as the previous application is used. \textbf{Implementation} We implement all discussed algorithms and perform the experiments on Linux servers with the same hardware configuration (64-bit machines with Intel(R) Xeon(R) CPU E5-2680 v4 @ 2.40GHz and 251GB memory). \section{Related Work} \label{section:related} \paragraph{Structured Sparse Optimization} Sparsity is effective to model latent structure in high-dimensional data and remains a mathematically tractable concept. Beyond the ordinary sparsity model, a variety of structured sparsity models have been proposed to solve specific structured constraints on signals, such as sparsity models defined through trees, groups, clusters, paths and connected subgraphs \cite{zhou2016graph,hegde2014approximation,hegde2015nearly,hegde2015approximation}. Those methods for structured sparsity that focus on general nonlinear cost functions fall into two major categories, including: 1) structured sparsity-inducing norms based and 2) model-projection based, both of which often assume that the cost function $F({\bf x})$ satisfies a certain convexity/smoothness condition, such as Restricted Strong Convexity/Smoothness (RSC/RSS) or Stable Mode-Restricted Hessian (SMRH) \cite{zhou2016graph,hegde2015approximation}. The seminal work on general approximate graph-structured sparsity model is \cite{hegde2015nearly}. The authors present GRAPH-COSAMP, a variant of COSAMP \cite{needell2009cosamp}, for compressive sensing and linear regression problems based on head and tail approximations of $\mathbb{M}(\mathbb{G},s)$. After this work, general structured optimization methods on single graph was proposed to do subgraph \cite{chen2016generalized,zhou2016graph} or subspace \cite{chen2017generic} detection. We extend the method \cite{chen2016generalized} to interdependent networks, which are block-structured. The work \cite{chen2016generalized} can be viewed as a special case of our work, which handles networks with only one block. \paragraph{Subgraph Detection} Subgraph detection is an important problem in graph mining. Existing methods mainly find subgraphs that satisfy some topological constraints, such as connected subgraphs, dense subgraphs and compact subgraphs. Those graphs with static network structure are what we focus on. According to dynamics of attributes on nodes, the relevant studies can be divided into two parts. For static graphs, the most recent methods include EventTree \cite{rozenshtein2014event}, NPHGS\cite{chen2014non}, and method introduced in \cite{qian2014connected}, in which the first two methods are heuristic and the last one provides performance bounds but is not scalable. For dynamic graphs, the latest methods include Meden \cite{bogdanov2011mining}, NetSpot\cite{mongiovi2013netspot}, AdditiveGraphScan \cite{speakman2013dynamic}, and dGraphScan \cite{shao2018efficient}, which are all heuristic. \paragraph{Interdependent Networks} Complex systems can be modeled as complex networks, which usually encompass many subsystems that interact with or depend on each other. These networks composed of multiple interdependent networks are also known as multilayer networks, networks of networks \cite{kivela2014multilayer}, or multiplex networks \cite{mucha2010community,gomez2012evolution}. Research in this field mostly studies static and evolving statistical characteristics of structures in these networks, which does not consider attributes on nodes and edges. Typical applications and problems for interdependent networks include: community structure analysis \cite{gomez2012evolution}, the spread of epidemics, and the organizational laws of social interactions \cite{gao2012networks}, among others. \section{Conclusion and Future Work} \label{section:conclusion} This paper presents a general framework, GBMP, to solve a nonconvex optimization problem subject to graph block-structured constraints in nearly linear time with theoretical approximation guarantee, and it can be applied to a broad class of subgraph detection problems in interdependent networks. A parallel version of our algorithm is also be proposed to improve the scalability. We evaluate our model on two applications, and results of both experiments show that the algorithm enjoys a better effectiveness and efficiency than state of the art methods while our work is a general framework and can be used in more scenarios. For future work, we will extend the work on network data with high-dimensional node attributes and different graph topological constraints. \section{Introduction} Subgraph detection in network data has aroused many interests in recent years because of many real-world applications, such as disease outbreak detection \cite{chen2014non}, intrusion detection in computer networks \cite{shao2017efficient}, event detection in social networks \cite{rozenshtein2014event,shao2018efficient}, congestion detection in traffic networks, etc. However, most of existing works investigate the subgraph mining on static, isolated networks, and such a problem involving interdependent networks has not been well studied. In interdependent networks, one network depends on another to achieve its full functionality. Examples include smart power grids, transportation networks, and layered communication networks \cite{danziger2014introduction}. Interdependent networks are comprised of multiple networks $\{\mathbb{G}^1, \mathbb{G}^2, \dots, \mathbb{G}^k,\dots\}$ and edges $\mathbb{E}^0$ interconnected among networks, where $\mathbb{G}^k = (\mathbb{V}^k, \mathbb{E}^k)$. $\mathbb{V}^k$ and $\mathbb{E}^k$ are vertex set and edge set of $k^{\text{th}}$ network $\mathbb{G}^k$ respectively. Some nodes in different networks exhibit node-node dependencies that could be captured by explicit edges or implicit correlation on node attributes (implicit edges). As demonstrated in Figure~\ref{fig:interdependent_networks}, a temporal network can be viewed as multiple temporal-dependent networks, in which each network represents a snapshot of the temporal network at a specific time stamp, where current node's attributes depend on attributes in the previous time-stamp implicitly \cite{mucha2010community}. A transportation network consists of road networks, airport networks, and seaport networks, which can be viewed as interdependent networks with explicit connections among different networks \cite{danziger2014introduction}. \textcolor{red}{A web-scale social network comprised of many communities is a network of networks (a trivial interdependent networks) with explicit connections as well, where communities can be viewed as small networks or blocks that interconnect with each other.} Typically, subgraph detection in a single network is to find a subset of vertices and edges that minimizing an user-specified cost function, meanwhile, satisfying a certain topological structured constraint, such as connected subgraphs, dense subgraphs, subgraphs that are isomorphic to a query graph, compact subgraphs, trees, and paths, among others \cite{chen2016generalized}. It can be formulated as an NP-hard combinatorial optimization problem as follows: \begin{equation}\label{prob:single} \begin{gathered} \min_{S\subseteq \mathbb{V}} F(S) \\ \mathrm{s.t.} \ \ S \ \text{satisfies a pre-defined topological constraint} \end{gathered} \end{equation} where $F$ is a user-specified cost function, and $S$ is a subset of vertex set $\mathbb{V}$ of a network. Correspondingly, subgraph detection in multiple interdependent networks can be formulated as a block-structured optimization problem with multiple topological constraints on blocks, \begin{equation}\label{prob:discrete} \begin{gathered} \min_{S_1 \subseteq \mathbb{V}^1, ..., S_K \subseteq \mathbb{V}^K } F(S_1,\cdots, S_K) \\ \mathrm{s.t.} \ \ S_k \ \text{satisfies a pre-defined topological constraint,} \end{gathered} \end{equation} where \textcolor{red}{$F$ is a user-specified cost function regularized by block dependencies, for example, $F$ could be $f(S_1, \cdots, S_K) + g(S_1, \cdots, S_K)$, where $f$ is used to capture signals in interdependent networks and $g$ models the dependencies between networks}. $S_k$ is a subset of nodes in $k^{\text{th}}$ network $\mathbb{G}^k=(\mathbb{V}^k,\mathbb{E}^k)$, $ k=1,...,K $. \st{We can also treat $\mathbb{V}^k$ as $k^{\text{th}}$ block of all vertices $\mathbb{V} = \mathbb{V}^1 \cup \cdots \cup \mathbb{V}^K$.} For example, subgraph detection in a temporal network is to find a sequence of subset of vertices in a sequence of blocks, where the detected subgraph in each block must satisfy a predefined topological constraint. \st{Vanilla subgraph detection problem is a special case of discovering subgraphs in interdependent networks when number of interdependent networks (blocks) is 1.} Vanilla subgraph detection problem (\ref{prob:single}) is a special case of problem (\ref{prob:discrete}) when number of networks (blocks) is 1. \begin{figure*} \centering \begin{subfigure}[t]{0.25\textwidth} \centering \includegraphics[width=\linewidth]{figures/temporal_network.pdf} \caption{Temporal Networks} \label{fig:temporal_network} \end{subfigure} \hspace{25pt} \begin{subfigure}[t]{0.25\textwidth} \centering \includegraphics[width=\linewidth]{figures/social_network.pdf} \caption{Communities in Social Network} \label{fig:social_network} \end{subfigure} \hspace{25pt} \begin{subfigure}[t]{0.25\textwidth} \centering \includegraphics[width=\linewidth]{figures/network_of_networks.pdf} \caption{Network of Networks} \label{fig:network_of_networks} \end{subfigure} \caption{Examples of Interdependent Networks.\textcolor{red}{(a) Temporal Networks: black dash lines capture implicit temporal dependencies or consistencies. (b) Social Networks: black solid lines are bridges across communities; social networks can be viewed as a network of networks with explicit connections. (c) Network of Networks with Implicit Connections: the main network is represented by dashed nodes and edges, where each node of the main network can be represented as another network. Black dashed lines model the implicit connections.}} \label{fig:interdependent_networks} \end{figure*} Subgraph detection in interdependent networks is very challenging but useful, since real systems are more often than not interconnected, with many inter-dependencies that are not properly captured by an isolated network. It is important to take such multiple networks which are interdependent with each other into account to try to improve our understanding of interesting patterns in networks. To the best of our knowledge, most of related studies on subgraph detection in interdependent networks only focus on specific applications and are lack of generality. Furthermore, they are heuristic-driven with no theoretical guarantee. Therefore, we propose a general framework that leverages graph structured sparsity model \cite{chen2016generalized,hegde2015nearly} and randomized block coordinate descent method \cite{fercoq2015accelerated} to solve this problem which can be modeled as a block-structured nonconvex optimization problem. \st{Suppose there are $N$ nodes in interdependent networks, i.e., $|\mathbb{V}|=N$ and each node is associated with a random variable. Then the combinatorial optimization problem} (\ref{prob:discrete}) \st{can be relaxed from discrete space to continuous space, and formulated as:} \begin{equation} {\fontsize{9}{10} \begin{aligned} &\qquad\qquad\quad\min_{\text{supp}({\bf x}^1)\subseteq \mathbb{V}^1,\dots,\text{supp}({\bf x}^K)\subseteq \mathbb{V}^K} F({\bf x})\\ &\text{s.t.}\ \ \text{supp}({\bf x}^k)\text{ satisfies a pre-defined topological constraint,} \end{aligned} \end{equation}\vspace{-3pt}\st{where $\text{supp}({\bf x}^k)$ are non-zero entries of the $k^{\text{th}}$ block and satisfy some topological constraint. Then, we propose a nonconvex optimization method to solve this problem, which enjoys better effectiveness, efficiency, scalability and is flexible to be generalized to different scenarios.} The contributions of our work are summarized as follows: \begin{itemize} [wide=0pt,leftmargin=\parindent] \item \textbf{Design of an efficient and scalable approximation algorithm.} We propose a novel generic framework, namely, Graph Block-structured Matching Pursuit, for block structured nonconvex optimization, which can be used to approximately solve a broad class of subgraph detection problems in interdependent networks in nearly-linear time. Furthermore, we design a parallel version of our algorithm to make it more scalable and efficient. \item \textbf{Theoretical guarantees.} We present a theoretical analysis of the proposed GBMP algorithm and show that it enjoys a good convergence rate and a tight error bound on the quality of the detected subgraph. \item \textbf{Two practical applications with comprehensive experiments.} We demonstrate how our framework can be applied to two practical applications: 1.) anomalous evolving subgraph detection; 2.) subgraph detection in network of networks. We conduct comprehensive experiments on both synthetic and real networks to validate the effectiveness and efficiency of our proposed algorithm. \end{itemize} \textbf{Reproducibility}: The implementation of GBMP, datasets, and \textcolor{red}{supplementary material} are available via the anonymous link: \url{https://bit.ly/2NxDvkw} The rest of this paper is organized as follows. Section \ref{section:method} introduces some preliminaries and the proposed method GBMP. Section \ref{section:theory} analyzes theoretical properties of the method. Section \ref{section:example} demonstrates applications of our proposed algorithm. Experimental design, datasets and results are shown in section \ref{section:experiment}. We introduce related work in Section \ref{section:related}. Section \ref{section:conclusion} concludes the paper and describes future work. \section{Methodology}\label{section:method} \subsection{Problem Formulation} \textcolor{red}{First, we reformulate the combinatorial problem (\ref{prob:discrete}) in discrete space as an nonconvex optimization problem in continuous space.} \textcolor{red}{Interdependent networks can be viewed as one large network $\mathbb{G}= \{\mathbb{V}^1, \cdots, \mathbb{V}^K, \mathbb{E}^0, \mathbb{E}^1, \cdots, \mathbb{E}^K \}$, where each pair of $(\mathbb{V}^k, \mathbb{E}^k)$ forms a small network $\mathbb{G}^k$ for $k= 1, \cdots, K$, and $\mathbb{E}^0$ are interconnected edges across different small networks. Edges in $\mathbb{E}^0$ should be treated differently with the edges in each $\mathbb{E}^k$, since they models the dependencies among different networks.} \textcolor{red}{Interdependent networks can be viewed as one large network $\mathbb{G}= (\mathbb{V}, \mathbb{E})$, where $\mathbb{V} = \{1,\cdots, N\}$ could be cut into $\{\mathbb{V}^1, \cdots, \mathbb{V}^K \}$ and $\mathbb{E}$ could be split into $\{\mathbb{E}^0, \mathbb{E}^1, \cdots, \mathbb{E}^K\}$. Each pair of $(\mathbb{V}^k, \mathbb{E}^k)$ forms a small network $\mathbb{G}^k$ for $k = 1,\cdots, K$, and $\mathbb{E}^0$ are edges interconnected among different small networks. Edges in $\mathbb{E}^0$ should be treated differently with the edges in each $\mathbb{E}^k$, since they models the dependencies among different networks.} Given interdependent networks $ \{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ where $ \mathbb{G}^{k} = (\mathbb{V}^{k}, \mathbb{E}^{k})$, $k=1,\dots,K$, the vertex set of all networks is denoted as $\mathbb{V} = \{1, \cdots, N\}$. It can be easily obtained that $\mathbb{V} = \mathbb{V}^1\cup \cdots \cup \mathbb{V}^K$. ${\bf W} = [{\bf w}_1, \cdots, {\bf w}_N]\in \mathbb{R}^{P\times N}$ is the feature matrix, and ${\bf w}_i\in \mathbb{R}^P$ is the feature vector of vertex $i$, $i\in\mathbb{V}$. $N_k = |\mathbb{V}^k|$ is the size of the subset of vertices $\mathbb{V}^k$. The general subgraph detection problem in interdependent networks can be formulated as following general block-structured optimization problem: \begin{equation} \begin{gathered} \min_{{\bf x}=({\bf x}^1,\dots,{\bf x}^K)} F({\bf x}_1,\dots,{\bf x}_K) \ \ \\ \mathrm{s.t.}\ \ \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s_k),\ \ k = 1, \cdots, K \label{eq:gen_prob} \end{gathered} \end{equation} where the vector ${\bf x} \in \mathbb{R}^N$ is partitioned into multiple disjoint blocks ${\bf x}^1 \in \mathbb{R}^{N_1}, \cdots, {\bf x}^K \in \mathbb{R}^{N_K}$, and ${\bf x}^k$ are variables associated with nodes of network $\mathbb{G}^k$. The objective function $F(\cdot)$ is a continuous, differentiable and convex function, which will be defined based on the feature matrix ${\bf W}$. \st{and can be used to formulate cost function and dependencies among blocks. Thus, a possible format of function $F$ is $f({\bf x})+g({\bf x})$} In addition, F could be decomposed as $f({\bf x}) + g({\bf x})$, where $f$ is used to capture signals on nodes in interdependent networks and $g$ models the dependencies between networks. $\text{supp}({\bf x}^k)$ denotes the support set of vector ${\bf x}^k$, $\mathbb{M}(\mathbb{G}^k, s)$ denotes all possible subsets of vertices in $\mathbb{G}^k$ that satisfy a certain predefined topological constraint. One example of topological constraint for defining $\mathbb{M}(\mathbb{G}^k, s)$ is connected subgraph, and we can formally define it as follows: \begin{equation} \mathbb{M}(\mathbb{G}^k, s) \coloneqq \{S | S \subseteq \mathbb{V}^k; |S| \leq s; \mathbb{G}^k_S\ \text{is connected.} \} \end{equation} where $s$ is a predefined upperbound size of $S$, $S\subseteq \mathbb{V}^k$ , and $\mathbb{G}^k_S$ refers to the induced subgraph by a set of vertices $S$. The topological constraints can be any graph structured sparsity constraints on $\mathbb{G}^k_S$, such as connected subgraphs, dense subgraphs, compact subgraphs \cite{chen2017generic}. Moreover, we do not restrict all $\mathrm{supp}({\bf x}^1),\cdots, \mathrm{supp}({\bf x}^K)$ satisfy an identical topological constraint. An illustration of problem formulation for connected subgraph detection in interdependent network can be found in Figure \ref{fig:prob_demo}. \setlength{\textfloatsep}{5pt} \begin{figure}[htbp] \centering \includegraphics[width=\linewidth]{figures/prob_demo_3.pdf} \caption{Illustration of connected subgraph detection in interdependent networks. In this example, interdependent networks $\{\mathbb{G}^1,\mathbb{G}^2,\mathbb{G}^3\}$ with an obvious block-separated structure are given. Dash lines represent the connections across different networks, and solid lines represent connections between nodes in the same network. Those two types of lines may characterize different relationships in practical applications. Those red nodes are what we are interested in, and their corresponding entries in vector ${\bf x}$ should be nonzero, while others should be 0s once we get an optimum of ${\bf x}$.} \label{fig:prob_demo} \end{figure} \noindent Notice that the objective function of Problem (\ref{eq:gen_prob}) is convex, while it has nonconvex constraints, which makes it a \textbf{nonconvex optimization problem}. \subsection{Head and Tail Projections on $\mathbb{M}(\mathbb{G}, s)$} Before presenting our algorithm, we first introduce two major components related to the support of the topological constraints "$\text{supp}(\bf{x}) \in \mathbb{M}(\mathbb{G}, s)$", including head and tail projections \cite{hegde2015nearly}. The key idea is that, suppose we are able to find a good intermediate solution $\bf{x}$ that does not satisfy this topological constraint, these two types of projections can be used to find good \textit{approximations} of $\bf{x}$ in the feasible space defined by $\mathbb{M}(\mathbb{G},s)$. \begin{itemize}[leftmargin=*] \item \textbf{Tail Projection} ($T({\bf x})$): is to find a subset of nodes $S \subseteq \mathbb{V}$ such that \begin{equation} \|{\bf x} - {\bf x}_{S}\|_2 \leq c_{T} \cdot \min_{S' \in \mathbb{M}(\mathbb{G}, s)} \|{\bf x} - {\bf x}_{S'}\|_2, \end{equation} where $c_{T} \geq 1$, and ${\bf x}_S$ is a restriction of ${\bf x}$ on $S$ such that: $({\bf x}_S)_i = ({\bf x})_i$ if $i \in S$, and $({\bf x}_S)_i=0$ otherwise. When $c_{T} = 1$, $T({\bf x})$ returns an optimal solution to the problem: $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2$. When $c_T > 1$, $T({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_T$. \item \textbf{Head Projection} ($H({\bf x})$): is to find a subset of nodes $S$ such that \begin{equation} \|{\bf x}_{S}\|_2 \geq c_{H}\cdot \max_{S'\in \mathbb{M}(\mathbb{G}, s)} \|{\bf x}_{S'}\|_2, \end{equation} where $c_H\leq1$. When $c_H = 1$, $H({\bf x})$ returns an optimal solution to the problem: $\max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. When $c_H < 1$, $H({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_H$. \end{itemize} It can be readily proved that, when $c_T = 1$ and $c_H = 1$, both $T({\bf x})$ and $H({\bf x})$ return the same subset $S$, since $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2 = \max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. In addition, the corresponding vector ${\bf x}_S$ is an optimal solution to the standard projection oracle in the traditional projected gradient descent algorithm \cite{bahmani2016learning}: \begin{equation} \argmin_{{\bf x}'\in \mathbb{R}^n} \|\bf{x}-\bf{x}'\|_2 \ \ \text{s.t.\ supp}({\bf x}') \in \mathbb{M}(\mathbb{G}, s) \label{eq:projection_oracle} \end{equation} which is NP-hard in general for popular topological constraints, such as connected subgraphs and dense subgraphs \cite{qian2014connected}. However, when $c_T > 1$ and $c_H < 1$, $T({\bf x})$ and $H({\bf x})$ return different approximate solutions to the standard projection problem \cite{chen2017generic}. Although the head and tail projections are NP-hard when we restrict $c_T = 1$ and $c_H = 1$, these two projections can still be implemented in nearly-linear time when approximated solutions with $c_{T} > 1$ and $c_H < 1$ are allowed. The head and tail projections are two different approximations to the standard projection problem (\ref{eq:projection_oracle}). It has been demonstrated that the joint utilization of both head and tail projections is critical in design of approximate algorithms for network topology-related optimization problems \cite{chen2016generalized,hegde2015nearly,hegde2015approximation,zhou2016graph}. \subsection{Algorithm Details} We propose a novel Graph Block-structured Matching Pursuit, namely GBMP, to approximately solve problem (\ref{eq:gen_prob}) in nearly-linear time. The key idea is to alternatively search for a close-to-optimal solution by solving easier sub-problems for graph $\mathbb{G}_k$ in each iteration $i$ until converged. The pseudo-code of our proposed algorithm is described in Algorithm \ref{alg:gbmp}. \begin{algorithm \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}, $ i=0 $, $ {\bf x}^{k,i}=\text{initial vectors}$, k=1,\dots, K \Repeat \For{$k = 1,\cdots, K$} \State $\Gamma_{{\bf x}^{k}}=H(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$ \State $\Omega_{{\bf x}^{k}}=\Gamma_{{\bf x}^{k}}\cup\mathrm{supp}({\bf x}^{k,i})$ \EndFor \State Get $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ by solving problem (\ref{sub-p1})\label{alg:line:subproblem} \For{$k = 1, \cdots, K$} \State $ \Psi_{{\bf x}^{k}}^{i+1}=T({\bf b}_{{\bf x}^k}^i) $ \State $ {\bf x}^{k,i+1}=[{\bf b}_{{\bf x}^{k}}^i]_{\Psi_{{\bf x}^{k}}^{i+1}} $ \EndFor \State $ i=i+1 $ \Until{$ \sum_{k=1}^{K} \left\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\right\|\leq \epsilon $} \State $ C=(\Psi_{x^1}^{i}, \dots, \Psi_{{\bf x}^k}^{i}) $ \Return $ ( {\bf x}^{1,i}, \cdots, {\bf x}^{K,i}) , C $ \end{algorithmic} \caption{Graph Block-structured Matching Pursuit}\label{alg:gbmp} \end{algorithm} \setlength{\textfloatsep}{7pt} Our algorithm can be decomposed into three main steps, including: \begin{itemize}[leftmargin=*] \item \textbf{Step 1}: alternatively identify a subset of nodes in each block $\Omega_{{\bf x}^k}$, in which pursuing the minimization will be most effective (\textbf{Line 2 $\sim$ 5}). \item \textbf{Step 2}: identify the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ that minimizes the objective function in intermediate space $\cup_{k=1}^{K} \Omega_{{\bf x}^k}$ (\textbf{Line 6}); \item \textbf{Step 3}: alternatively apply tail projections on the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ to the feasible space defined by the topological constraints: ``$\text{supp}({\bf x}^k) \in \mathbb{M}_k(\mathbb{G}, s)$" (\textbf{Line 7 $\sim$ 10}). \end{itemize} To be more informative, we illustrate the general idea of each step in algorithm \ref{alg:gbmp} as follows. The whole procedure iteratively refines the intermediate solutions $({\bf x}^{1,i}, \cdots, {\bf x}^{K, i})$ until converged. In Step 1, it first calculates the partial derivative $\nabla_{{\bf x}^k} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$, and then identifies a subset of nodes $\Gamma_{{\bf x}^k}$ via head projection (\textbf{Line 3}). The set $\Gamma_{{\bf x}^k}$ can be interpreted as a good approximated directions where the nonconvex set ``$\text{supp}({\bf x}^k) \in \mathbb{M}_k(\mathbb{G}, s)"$ is located. In \textbf{Line 4}, we combine the set $\Gamma_{{\bf x}^k}$ with the support set of ${\bf x}^{k,i}$ to get a slightly larger possible searching space $\Omega_{{\bf x}^k}$, which is the feasible space for subproblem in Step 2 (\textbf{Line 6}): \begin{equation} \begin{gathered} \hspace*{-10pt}\left( {\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i \right) = \argmin\limits_{{\bf x}^1,\dots,{\bf x}^K} F({\bf x}^1,\dots,{\bf x}^K) \\ \mathrm{s.t.}\, \ \ \mathrm{supp}({\bf x}^k)\subseteq \Omega_{{\bf x}^k} \label{sub-p1} \end{gathered} \end{equation} In Step 3, it first applies tail projection on the solution of subproblem $(\ref{sub-p1})$, and returns a set of nodes $\Psi_{{\bf x}^{k}}^{i+1}$ (\textbf{Line 8}). Subsequently, ${\bf x}^{k}$ is updated by mapping the vector ${\bf b}_{{\bf x}^k}^i$ on the support set $\Psi_{{\bf x}^{k}}^{i+1}$, thereby $({\bf x}^{k, i+1})_j = ({b}_{{\bf x}^k}^i)_j$ if $j \in \Psi_{{\bf x}^{k}}^{i+1} $, $({\bf x}^{k, i+1})_j = 0$ otherwise (\textbf{Line 9}). Furthermore, we utilize the \textit{block-coordinate descent method} with \textit{proximal linear update} \cite{tseng2009coordinate,shi2016primer} to solve the problem (\ref{sub-p1}) (Algorithm \ref{alg:block}). This method has been analyzed and also applied to both convex and nonconvex problems \cite{beck2013convergence,zhou2016global,hong2017iteration,xu2017globally}, which shows good performance empirically. Block coordinate descent is a generalization of the alternating minimization method that has been applied to a variety of problems, such as the expectation-maximization (EM) algorithm \cite{dempster1977maximum}. In addition, we utilize the proximal linear update that ensures the convergence of the algorithm on convex problems with convex constraints ``$\textrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k}$". The proximal linear update in our scenario is defined by: \begin{equation}\label{prob:proximal} {\fontsize{9}{10} \begin{aligned} \hspace{-10pt}{\bf x}^{k, t+1} = &\argmin_{{\bf x}^k} F(\hat{\bf x}^{t}) + \langle \nabla_{{\bf x}^k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t}), {\bf x}^{k} - \hat{\bf x}^{k, t} \rangle\\ & + \frac{1}{2 \alpha^{k, t}}\|{\bf x}^{k} - {\bf \hat{x}}^{k, t}\|_2^2\\ &\ \ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.} \ \ \mathrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k}\hspace{-7pt} \end{aligned} } \end{equation} where $\alpha^{k, t}$ serves as a step size and can be set as the reciprocal of the Lipschitz constant of $\nabla_{k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t})$, and $\hat{\bf x}^{k, t}$ (\textbf{Line 4}) is an extrapolated point that helps accelerate the convergence of the proximal point update scheme. Since the objective function is simply second order Taylor approximation of function $F$ with Hessian replaced by identity matrix, we can easily derive and implement the closed form solution of the objective function in problem (\ref{prob:proximal}), and then project it to the feasible space, which is convex. The overall block coordinated gradient projection method on convex function with convex constraint (i.e. Algorithm \ref{alg:block}) has a sublinear rate of convergence \cite{shi2016primer,beck2013convergence}. \begin{algorithm}[H] \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $t = 0, \epsilon = 10^{-3}, \rho_0 = 1.$ \Repeat \State \text{Choose index } $k \in \{1, \cdots, K\}$ \State $\omega_{t} = (\rho_t - 1) / \rho_t,\ $ \State $\hat{\bf x}^{k, t} = {\bf x}^{k, t} + \omega_{t} ({\bf x}^{k, t} - {\bf x}^{k,t-1})$ \State Update ${\bf x}^{k, t + 1} \leftarrow {\bf \hat{x}}^{k, t} - \frac{1}{\alpha^{k, t}} \nabla_{k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t})$ \State Project ${\bf x}^{k, t+1}$ to feasible space by setting entries of ${\bf x}^{k, t+1}$ to zero if index of entry not in set $\Omega_{{\bf x}^k}$. \State Keep ${\bf x}^{j, t+1} = {\bf x}^{j, t}$, for all $j \neq k$ \State $\rho_{t+1} = (1+\sqrt{1 + 4 \rho_{t}^2})/2,$ \State Let $t = t+1$ \Until{$\sum_{k=1}^{K} \|{\bf x}^{k, t} - {\bf x}^{k, t-1}\| \le \epsilon$} \Return $\{{\bf x}^{1, t}, \cdots, {\bf x}^{K, t}\}$ \end{algorithmic} \caption{Block-Coordinate Descent Method with Proximal Linear Update to Solve Problem (\ref{sub-p1})}\label{alg:block} \end{algorithm} \section{Theoretical Analysis} \label{section:theory} In order to demonstrate the accuracy and efficiency of GBMP, we require that the objective function $F({\bf x})$ satisfies the Weak Restricted Strong Convexity (WRSC) condition, which is a variant of the Restricted Strong Convexity/Smoothness (RSC/RSS) \cite{yuan2014gradient}: \begin{definition}[Weak Restricted Strong Convexity (WRSC)]\label{def:wrsc} A function $F({\bf x})$ has condition $(\xi,\delta,\mathbb{M})$-WRSC, if $\forall {\bf x}, {\bf y}\in\mathbb{R}^N$ and $\forall S\in\mathbb{M}$ with $\mathrm{supp}({\bf x})\cup\mathrm{supp}({\bf y})\subseteq S$, the following inequality holds for some $\xi >0$ and $0<\delta<1$: \begin{equation} \|{\bf x}-{\bf y}-\xi\nabla_S F({\bf x})+\xi\nabla_S F({\bf y})\|_2\leq\delta\|{\bf x}-{\bf y}\|_2 \end{equation} where ${\bf x}=({\bf x}^1,\dots,{\bf x}^K), {\bf y}=({\bf y}^1,\dots,{\bf y}^K), {\bf x}^k, {\bf y}^k\in\mathbb{R}^{N_k}, k=1,\dots,K$, topological constraint $\mathbb{M}$ can be expressed as $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}(\mathbb{G}^k,s_k), s=\sum_{k=1}^K s_k$, and the subgraph in $k^{\text{th}}$ block (i.e., $\mathbb{G}^k$) is $S_k$, which satisfies $|S_k|\leq s_k, S_k\subseteq \mathbb{V}^k, S=\bigcup_{k=1}^K S_k, |S|\leq s$. Here, since constraints on blocks are independent, we use union sign ``$\bigcup$" to denote combined model $\mathbb{M}$, in which ${\bf x}\in\mathbb{M}=\{{\bf x}|{\bf x}^k\in\mathbb{M}(\mathbb{G}^k,s_k),k=1,\dots,K\}$. \end{definition} \begin{remark} We can set different $s_k$ for $k^{\text{th}}$ block. In our applications, $s_1=\cdots=s_k=s'$, i.e., we use the same upper bound of subgraph size for all blocks. \end{remark} \begin{theorem}\label{thm:convege} Consider the graph block-structured constraint with $K$ blocks $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}(\mathbb{G}^k,s_k)$ and a cost function $F:\mathbb{R}^N\to\mathbb{R}$ that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G},8s))$-WRSC. If $\eta=c_H(1-\delta)-\delta>0$, then for any true ${\bf x}^*\in\mathbb{R}^N$ with $\mathrm{supp}({\bf x}^*)\in\mathbb{M}((\mathbb{G},s)$, the iteration of algorithm obeys \begin{equation} \|{\bf x}^{i+1}-{\bf x}^*\|_2\leq\alpha\|{\bf x}^i-{\bf x}^*\|_2+\beta\|\nabla_I F({\bf x}^*)\|_2 \end{equation} where $c_H=\min_{k=1,\dots,K}\{{c_{H_k}}\}$, $c_T=\max_{k=1,\dots,K}\{{c_{T_k}}\}$, $I=\argmax_{S\in\mathbb{M}}\|\nabla_S F({\bf x})\|_2$, $\alpha=\frac{1+c_T}{1-\delta}\sqrt{1-\eta^2}$, and $\beta=\frac{\xi(1+c_T)}{1-\delta}\left[\frac{1+c_H}{\eta}+\frac{\eta(1+c_H)}{\sqrt{1-\eta^2}}+1 \right]$. $c_{H_k}$ and $c_{T_k}$ denote head and tail projection approximation factors on $k^{\text{th}}$ block. \end{theorem} \begin{IEEEproof} The proof is provided in Appendix \ref{proof:converge}. \end{IEEEproof} \begin{remark} 1) The convergence of GBMP is controled by the shrinkage rate $\alpha<1$, which can be satisfied if and only if $c_H^2>1-1/(1+c_T)^2$ when $\delta$ is small. As proved in \cite{hegde2015approximation}, the approximation factor $c_H$ of any given head approximation algorithm can be boosted to any arbitrary constant close to 1, such that the above condition is satisfied. 2) According to WRSC condition, the function is Lipschitz continuous, which further implies the $\|\nabla_I F(x^*)\|_2$ must be bounded. To sum up, Theorem \ref{thm:convege} indicates the convegence of GBMP algorihtm. \end{remark} \begin{theorem}\label{thm:time} Let ${\bf x}^*\in\mathbb{R}^N$ be a true optimum such that $\mathrm{supp}({\bf x}^*)\in\mathbb{M}(\mathbb{G}, s)$, and $F:\mathbb{R}^N\to\mathbb{R}$ be a cost function that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G}, 8s))$-WRSC. Assuming that $\alpha<1$, GBMP returns an $\hat{{\bf x}}$ such that, $\mathrm{supp}(\hat{{\bf x}})\in\mathbb{M}(\mathbb{G}, 5s)$ and $\|{\bf x}^*-\hat{{\bf x}}\|_2\leq c\|\nabla_{I}F({\bf x}^*)\|_2$, where $c=(1+\frac{\beta}{1-\alpha})$ is a fixed constant. Moreover, GBMP runs in time \begin{equation} {\fontsize{8}{8} O\left(\left(T+\sum_{k=1}^K|\mathbb{E}^k|\log^3 N_k\right)\log\left(\frac{\|{\bf x}^*\|_2}{\|\nabla_{I}F({\bf x}^*)\|_2}\right) \right) } \end{equation} where $|\mathbb{E}^k|$, $N_k$ denote edge and node size of $k^{\text{th}}$ block and $T$ is the time complexity of one execution of the subproblem in line \ref{alg:line:subproblem} of Algorithm \ref{alg:gbmp}. In particularly, if $T$ scales linearly with $N$, then GBMP scales \textbf{nearly linearly} with $N$. \end{theorem} \begin{IEEEproof} The proof is provided in Appendix \ref{proof:time}. \end{IEEEproof} \begin{remark} We can run head and tail projections on blocks \textbf{in parallel}, which reduces the time cost of each iteration to $(T+|\mathbb{E}'|\log^3N'), |\mathbb{E}'|\log^3N'=\max_{k=1,\dots,K}|\mathbb{E}^k|\log^3N_k$. As mentioned in Section \ref{section:method}, which has been proved in \cite{beck2013convergence}, sublinear convergece rate $O(1/t)$ can be established for Algorithm \ref{alg:block}. Hence, the iterations number of Algorithm \ref{alg:block} is $O(\lceil 1/\epsilon\rceil)$ when error bound is $\epsilon$. Then it concludes that the time complexity of Algorithm \ref{alg:block} (i.e. $T$) is $O(\lceil 1/\epsilon\rceil N)$, which further implies the algorithm GBMP scales nearly linearly with $N$. \end{remark} \section{Example Applications} \label{section:example} In this section, we show how to formulate two subgraph detection applications: 1) anomalous evolving subgraph detection and 2) subgraph detection in network of networks as problem (\ref{eq:gen_prob}) with specific objective function $F$ and topological constraints. For these two applications, we leverage the \textbf{Elevated Mean Scan} (EMS) statistics, which is popularly used for detecting signals among node-level numerical features on graph \cite{qian2014connected,arias2011detection}. The EMS statistics is defined as: \begin{equation} \frac{{\bf c}^\top {\bf x}}{ \sqrt{{\bf x}^\top {\bf 1}} } \end{equation} where ${\bf x} \in \{0,1\}^N$, ${\bf c}$ denotes the feature vector of all nodes, and $c_i \in \mathbb{R}$ denotes the uni-variate feature for node $i$. Assuming $S$ is some unknown anomalous cluster which forms a connected component, $S\subseteq \mathbb{V}$. The aim of significant subgraph detection is to decide between the null hypothesis $H_0 : \{ c_i \sim \mathbb{N}(0,1), \ \forall \ i \in V\}$ and the alternative hypothesis $H_{1, S}: \{c_i \sim \mathbb{N}(\mu, 1)\ \ \forall \ i \in S\ \text{with}\ \mu > 0 , \ \text{and}\ c_i \sim \mathbb{N}(0,1) \ \forall \ i \notin S\}$. Briefly, we hypothesize that the significant nodes $v \in S$ follow a different signal distribution with insignificant nodes $v \in V \setminus S$. Empirically, maximizing the score of EMS leads to discovering significant nodes in the network precisely. Instead of maximizing the EMS in the domain $\{0,1\}^N$, we relax EMS to continuous space and minimize the relaxed negative EMS in our applications, which can be defined as: \begin{equation} -\frac{{\bf c}^\top {\bf x}}{ \sqrt{{\bf x}^\top {\bf 1}} } + \frac{1}{2} \|{\bf x}\|_2^2 \ \ \ \text{where} \ \ {\bf x} \in [0, 1]^N \end{equation} Most importantly, the relaxed negative EMS satisfies the RSC/RSS condition when ${\bf c}$ is normalized, which implies WRSC condition \cite{chen2016generalized,yuan2014gradient}. \begin{algorithm}[h] \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $i=0, {\bf x}^{k,i}= $initial vectors, $k=1,\dots,K$, $\tau=$number of processors, $n=$number of blocks \Repeat \State $\Omega_{{\bf x}^k}=\mathrm{supp}({\bf x}^{k,i}) \cup H\Big(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K, i})\Big), \forall{k}$\label{alg:approx_block:head} \State $t=0$, choose ${\bf x}^{0}\in \mathbb{R}^N$, ${\bf x}^{0} = {\bf z}^{0}$, and $\theta_{0}= \frac{\tau}{n}$\label{alg:approx_block:diff:start} \Repeat \State ${\bf y}^t=(1-\theta_t){\bf x}^t+\theta_t {\bf x}^t$ \label{alg:approx_block:comb} \State Generate random set of blocks $S_t \subseteq \{1,\dots,K\}$ \label{alg:approx_block:select} \State ${\bf z}^{t+1} = {\bf z}^{t} $ \For{$k \in S_t$} \label{alg:approx_block:parallel:start} \State ${\bf z}^{k, t+1} = \argmin_{{\bf z} \in \mathbb{R}^{N_k}} \left\langle \nabla_{{\bf y}^k} F({\bf y}^{t}), {\bf z} - {\bf y}^{k, t} \right\rangle+\frac{n \theta_t }{2\tau} \left\|{\bf z} - {\bf z}^{k, t}\right\|_2^2\qquad \mathrm{supp}({\bf z}^{k}) \subseteq \Omega_{{\bf x}^k}$ \EndFor \label{alg:approx_block:parallel:end} \State ${\bf x}^{t+1} = {\bf y}^{t} + \frac{n}{\tau} \theta_t ({\bf z}^{t+1} - {\bf z}^{t})$\label{alg:approx_block:parallel:xt+1} \State $\theta_{t+1} = \frac{\sqrt{\theta_t^4 + 4\theta_t^2}- \theta_t^2}{2}$ \State let $t = t + 1$ \Until{$\| {\bf x}^{t} - {\bf x}^{t-1} \|_2 \leq \epsilon$} \label{alg:approx_block:diff:end} \State $\Psi_{{\bf x}^k} = \text{T}({\bf x}^{k,i})$, ${\bf x}^{k, i} = [{\bf x}^{k,i}]_{\Psi_{{\bf x}^k}}, \ \ \forall k$ \label{alg:approx_block:tail} \State let $i = i + 1$ \Until{$\sum_{k=1}^K\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\|\leq\epsilon$} \Return $\{{\bf x}^{1,i}, \cdots, {\bf x}^{K,i}\}$ \end{algorithmic} \caption{Graph Block-structured Matching Pursuit with Parallel Block Coordinate Descent}\label{alg:approx_block} \end{algorithm} \subsection{Anomalous Evolving Subgraphs Detection} Typically, an evolving event characterizes three phrases: emerging, spreading, and receding over a period of time. In order to detect and track the exact spatial and temporal region of an evolving event, we can formulate the problem as an anomalous evolving subgraph detection problem, which is to find a connected subgraph $S_k$ at each time stamp $k$ (denoted as \textit{local connectivity constraint}), and at the meanwhile we expect $S_k$ and $S_{k-1}$ share some overlap nodes in the network (denoted as \textit{temporal consistency constraint}). Hence, we can leverage the relaxed EMS and mathematically formulate the detection problem as nonconvex optimization with convex objective function and block-structured constraints: \begin{equation} \hspace{-5pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{{{\bf c}^k}^\top {\bf x}^k}{\sqrt{{{\bf x}^k}^\top {\bf 1}}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+ \lambda \cdot \sum_{k=2}^{K} \|{\bf x}^k - {\bf x}^{k-1}\|_2^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s) \end{aligned}\hspace{-10pt} } \end{equation} where the first term is the summation of relaxed negative EMS, and the second term is soft constraints on ${\bf x}^{k}$ and ${\bf x}^{k-1}$ to ensure temporal consistency on detected subgraphs, and $\lambda > 0$ is a trade-off parameter. The connected subset of nodes at time stamp $k$ can be found as $S_k = \mathrm{supp}({\bf x}^{k})$, i.e., the support set of the estimated ${\bf x}^{k}$ that minimizes the objective function. \subsection{Subgraph Detection in Network of Networks} Our proposed framework is also applicable to subgraph detection in a network of networks. \textcolor{red}{Due to space limit, we only demonstrate the network of networks with explicit edge dependency, but our model can definitely apply to network of networks with implicit dependency as well.} A large-scale static network with many communities can be viewed as one instance of network of networks (a trivial interdependent networks), where each community is a small block of the network. When an event is wide-spreading in such large networks, it becomes very challenging and time-consuming to apply effective models to detect the significant subgraphs. For example, one application is rumor detection and tracking in social networks. It is interesting and useful to identify the connected subgraph that depicts how a rumor spreads across different communities in a social network. \begin{table*}[!htbp] \caption{Results on synthetic datasets with different $\mu$. It shows that GBMP is more robust than Meden and Netspot.}\label{tab:noise} \centering \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{$\mu=3$} & \multicolumn{3}{c|}{$\mu=4$} & \multicolumn{3}{c|}{$\mu=5$} \\ \cline{2-10} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7588 & 0.7342 & 0.7453 & 0.8836 & 0.8591 & 0.8709 & 0.9646 & 0.9145 & 0.9388 \\ NetSpot & 0.6658 & 0.7267 & 0.6947 & 0.7615 & 0.7922 & 0.7763 & 0.7956 & 0.8185 & 0.8068 \\ GBMP & 0.6468 & 0.8899 & \textbf{0.7489} & 0.8487 & 0.9674 & \textbf{0.9041} & 0.9553 & 0.9914 & \textbf{0.9730} \\ \hline \end{tabular} \end{table*} The most traditional approach is to partition a large network into several small blocks, and then process them individually and independently. However, this approach will effect the detection performance if those blocks are highly interdependent. By encoding the dependencies in our proposed framework, we can detect subgraphs in each individual partition of networks more efficiently without sacrificing performance. Specifically, our proposed framework provides a feasible solution for this scenario where node dependencies among a large-scale network can not be neglected. For subgraph detection in a network of networks, we can also leverage the relaxed negative $\text{EMS}$ and formulate the detection problem in large-scale networks as follows: \vspace{-2pt} \begin{equation} \hspace{-3pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{{{\bf c}^{k}}^\top {\bf x}^{k}}{\sqrt{{{\bf x}^{k}}^\top {\bf 1}}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+\lambda \cdot \sum_{i,j} e_{ij} \cdot (x_i - x_j)^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s) \end{aligned} }\hspace{-15pt} \end{equation} where the first term is the summation of relaxed negative EMS, the second term is soft constraints on bridge nodes of two partitions to ensure dependencies; $e_{ij} = 1$ if node $i$ and node $j$ are connected but in two different partitions (in other words, edge $(i,j)$ is an graph cut), otherwise $e_{ij} = 0$, $x_i$ and $x_j$ are $i^{\text{th}}$ and $j^{\text{th}}$ entries of ${\bf x}$, and $\lambda > 0$ is a trade-off parameter. In addition, we propose a parallel version of our algorithm (Algorithm 3) to speed up the computation by integrating the APPROX algorithm, a randomized coordinate descent method proposed in \cite{fercoq2015accelerated}. In Algorithm 3, the head projections (Line \ref{alg:approx_block:head}), tail projections (Line \ref{alg:approx_block:tail}), and steps from Line \ref{alg:approx_block:parallel:start} to Line \ref{alg:approx_block:parallel:end} are parallelizable. The difference with Algorithm \ref{alg:gbmp} is from Line \ref{alg:approx_block:diff:start} to Line \ref{alg:approx_block:diff:end}. The parallel part starts from ${\bf x}^0\in\mathbb{R}^N$ (Line \ref{alg:approx_block:diff:start}) and generates three vector sequences denoted as ${\bf x}^t,{\bf y}^t, {\bf z}^t \geq0$. In Line \ref{alg:approx_block:comb}, ${\bf y}^t$ is defined as a convex combination of ${\bf x}^t$ and ${\bf z}^t$. In Line \ref{alg:approx_block:select}, a set of random blocks $S_t$ is sampled and then Lines \ref{alg:approx_block:parallel:start}–\ref{alg:approx_block:parallel:xt+1} are performed in parallel. The convergence rate of Algorithm \ref{alg:block} is $O(1/t^2)$, and the theoretical proof and more details are provided in \cite{fercoq2015accelerated}. \section{Experiments}\label{section:experiment} This section evaluates the effectiveness and efficiency of the proposed GBMP algorithm in two applications on both synthetic data and real-world data. \subsection{Anomalous Evolving Subgraph Detection} \paragraph{Synthetic Dataset} We generate networks using Barab\'asi-Albert preferential attachment model \cite{barabasi1999emergence} with 3,000 nodes and 11,984 edges. The evolving true subgraphs spanning within 7 time stamps are simulated from node size 100 to 300, and the true subgraphs in two consecutive time stamps have $50\%$ of node overlap. The univariate feature values of background nodes and true nodes are randomly generated in $\mathbb{N}(0,1)$ and $\mathbb{N}(\mu, 1)$ distributions, respectively. We generate 50 temporal networks for each setting of $\mu = [3,4,5]$. As we can see, when $\mu$ is small, the data is more noised, and it is more difficult to distinguish between the anomalous nodes and normal nodes based on the univariate feature. \paragraph{Real-world Dataset} 1) \textbf{\textit{ Water Pollution Dataset}}: a real world sensor network with 12,527 vertices and 14,831 edges. This temporal network consists of node attributes in 8 time stamps with time resolution as 60 minutes, and the evolving true chemical contaminated subgraphs are provided \cite{ostfeld2008battle}. For each hour, each vertex has a sensor that reports 1 if it is polluted; otherwise, reports 0. 2) \textbf{\textit{Washington D.C. Road Traffic Dataset}}: a traffic dataset of Washington D.C from June 1, 2013 to March 31, 2014 from INRI \cite{chen2017collective}. The road networks consists of 1,188 nodes and 1,323 edges, and we use the data from 6AM. to 10PM. (17 time stamps) with time resolution as 60 minutes. 3) \textbf{\textit{ Beijing Road Traffic Dataset}}: the dataset contains the real-time traffic conditions of four days. The road networks consists of 59,000 nodes and 70,317 edges, and we use the data from 5PM. to 7PM. with time resolution as 10 minutes (totally 12 time stamps) \cite{shang2014inferring}. For both traffic datasets, the node attribute is the difference between reference speed and current speed, and the true congested roads are provided. \paragraph{Performance Metrics} Precision, Recall, and F-measure are deployed to evaluate the quality of detected subgraphs by different methods. Higher F-measure reveals better overall performance. For synthetic data, we use the averaged precision, recall, and f-measure over 50 simulated examples. \paragraph{Comparison Methods and Results} We compare our algorithm with two state of the art baseline methods: \textit{Meden} \cite{bogdanov2011mining} and \textit{NetSpot} \cite{mongiovi2013netspot}, which were designed specifically for detecting significant anomalous region in dynamic networks. The comparison of results are reported in Table \ref{tab:noise} and Table \ref{tab:evo}. As you can see, our method outperforms these two baseline methods on both synthetic data and real-world data. Both of baselines are heuristic, which can not guarantee the quality of results and cause worse performance than ours. \begin{table}[htbp] \caption{Results on Washingtong D.C. and Beijing datasets. }\label{tab:evo} \centering \setlength\tabcolsep{3pt} \begin{tabular}{|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{Washington D.C.} & \multicolumn{3}{c|}{Beijing} \\ \cline{2-7} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7076 & 0.7662 & 0.7342 & 0.6424 & 0.7509 & 0.6882 \\ NetSpot & 0.5823 & 0.7098 & 0.6367 & 0.6789 & 0.7351 & 0.6973 \\ GBMP & 0.7049 & 0.9192 & \textbf{0.7853} & 0.6627 & 0.9634 & \textbf{0.7788} \\ \hline \end{tabular} \end{table} \begin{figure*} \centering \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/precision_water.pdf} \caption{Precision vs Noise Level} \label{fig:water:a} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/recall_water.pdf} \caption{Recall vs Noise Level} \label{fig:water:b} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/fm_water.pdf} \caption{F-measure vs Noise Level} \label{fig:water:c} \end{subfigure} \caption{Precision, Recall, and F-measure curves on Water Pollution dataset with respect to different noise ratios.} \label{fig:water:noise} \end{figure*} \begin{figure*}[ht] \vspace{-10pt} \centering \begin{subfigure}[t]{0.38\textwidth} \centering \includegraphics[width=\linewidth]{figures/node_time_6} \caption{Run Time vs Nodes} \label{fig:synthetic:a} \end{subfigure} \hspace{10pt} \begin{subfigure}[t]{0.38\textwidth} \centering \includegraphics[width=\linewidth]{figures/edge_time_5} \caption{Run Time vs Edges} \label{fig:synthetic:b} \end{subfigure} \caption{Comparison of run time on synthetic datasets. Figure (a) shows our methods run in nearly linear time w.r.t to the network size, where $|\mathbb{E}|=3|\mathbb{V}|$. Figure (b) shows that our algorithm can be easily scaled up to $1,000,000$ edges with node size $|\mathbb{V}| = 100,000$, by contrast, the AdditiveGraphScan runs over $10,000$ seconds on all cases.} \label{fig:synthetic} \end{figure*} \paragraph{Robustness Validation} Except for measuring the accuracy of subgraph detection, we also test the robustness of subgraph derection method on water pollution dataset as \cite{shao2017efficient,zhou2016graph}. $P$ percent of nodes are selected randomly, and their sensor binary values are flipped in order to test the robustness of methods to noises, where $P \in \{2, 4, 6, 8, 10\}$. Figure \ref{fig:water:noise} shows the precision, recall, and f-measure of all the comparison methods on the detection of polluted nodes in the water pollution dataset with respect to different noise ratios. The results indicate that our proposed method GBMP is the best overall performance for all of the settings, which verifies the robustness of our method. \paragraph{Parameter Tuning} We strictly follow strategies recommended by authors in their original papers to tune the related model parameters. For NetSpot \cite{mongiovi2013netspot}, edges are weighted by comparing their p-value to a significance level threshold $\mu$ (0.01 recommended by authors). Our proposed methods have two parameters, 1) sparseness parameter $s$ (an upper bound of the subgraph size on each block) and 2) trade off parameter $\lambda$. Part of data is extracted from datasets as training dataset and grid search is done to decide those two parameters. $\lambda$ is selected in range $[0.001, 0.1]$ with step size $0.001$. More details are provided in the supplementary material. \subsection{Subgraph Dectection in Network of Networks} \paragraph{Synthetic Datasets} We generate several networks with different network sizes with Barab\'asi-Albert model. We use random walk algorithm to simulate the ground-truth subgraph with size as $10\%$ of network size. The nodes in true subgraph have features following normal distribution $\mathbb{N}(5,1)$, and the features of background nodes follows distribution $\mathbb{N}(0,1)$. \paragraph{Real-world Datasets} 1) \textit{\textbf{Beijing Road Traffic Dataset}}: we use static network data per time stamp from 5PM. to 7PM. in previous application. 2) \textit{\textbf{Wikivote Dataset}}\footnote{\url{https://snap.stanford.edu/data/wiki-Vote.html}\label{data:snap}}: the network contains all the Wikipedia voting data from the inception of Wikipedia till January 2008, with $7,115$ nodes and $103,689$ edges. 3) \textit{\textbf{CondMat Dataset}}\footnote{\url{https://snap.stanford.edu/data/ca-CondMat.html}}: the collaboration network is from the e-print arXiv and covers scientific collaborations between authors papers submitted to Condense Matter category, with $23,133$ nodes and $93,497$ edges. For Wikivote and CondMat datasets, we simulate the true subgraphs of size $1,000$ using random walk, and the node attribute in true subgraphs follows distribution $\mathbb{N}(5, 1)$, otherwise $\mathbb{N}(0,1)$. \begin{table*}[!htbp] \caption{Results on Beijing, Wikivote, CondMat datasets. The run time is measured in seconds.}\label{tab:block} \begin{adjustbox}{center} \centering \setlength\tabcolsep{2.5pt} \resizebox{\textwidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Method} & \multicolumn{4}{c|}{Beijing} & \multicolumn{4}{c|}{Wikivote} & \multicolumn{4}{c|}{CondMat} \\ \cline{2-13} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time \\ \hline AddtivegGraphScan & 0.4295 & 0.6884 & 0.5192 & 10846.94 & 0.9543 & 0.9959 & 0.9747 & 249.97 & 0.9753 & 0.9900 & \textbf{0.9826} & 1188.33 \\ EventTree & 0.5547 & 0.5577 & 0.5369 & 90.68 & 0.9088 & 0.9654 & 0.9360 & 80.99 & 0.8623 & 0.9204 & 0.8902 & 100.23 \\ LTSS & 0.5144 & 0.8333 & 0.6320 & \textbf{7.56} & 0.9543 & 0.9959 & 0.9747 & \textbf{1.72} & 0.5174 & 1.0000 & 0.6819 & \textbf{3.85} \\ GBMP(Serial) & 0.9166 & 0.7286 & \textbf{0.8057} & 843.37 & 0.8287 & 0.9908 & 0.90254 & 610.54 & 0.9132 & 0.9859 & 0.9479 & 1243.71 \\ GBMP(Parallel) & 0.9105 & 0.7283 & 0.8028 & 154.12 & 0.9637 & 0.9888 & \textbf{0.9761} & 171.98 & 0.9423 & 0.9835 & 0.9624 & 113.08 \\ \hline \end{tabular} } \end{adjustbox} \end{table*} \setlength{\dbltextfloatsep}{10pt} \paragraph{Performance Metrics} Except for metrics (precision, recall and f-measure) used for evaluating the detection performance, we also compare and report the \textbf{run time} among different methods in this application to evaluate the scalability. \paragraph{Comparison Methods and Results} We compare our method with two state of the art methods: 1) \textit{EventTree} \cite{rozenshtein2014event}, 2) \textit{AdditiveGraphScan} \cite{speakman2013dynamic}, and 3) \textit{LTSS} \cite{neill2012fast}, which were designed specifically for event detection on static networks. The average precision, recall, f-measure, as well as run time on all methods are reported in Table \ref{tab:block}. Our method outperforms the baseline methods in terms of f-measure by the compromise on a small amount of run time. Both of baseline methods have their own shortcomings. Despite AdditiveGraphScan can get comparable performance as our method on some datasets, it is a heuristic algorithm without theoretical guarantees and not scalable for large scale networks. EventTree and LTSS are scalable, but their performances are not as good as our method. \paragraph{Scalability Analysis} We analyze the affection of sizes of nodes and edges on different methods' scalability. Figure \ref{fig:synthetic} reports the run time of our methods compared with the baseline methods. In order to run our algorithm, we partition the static network into 20 blocks with METIS \cite{karypis1998software}, and run the parallel algorithm with 20 processors. Our method is able to get comparable performance as those customized algorithms of this specific problem, and it is more scalable if we properly utilize the computing resource based on network properties. \paragraph{Parameters Tuning} For all the parameters used in AddtiveGraphScan, EventTree, and LTSS, we follow the same settings as \cite{zhou2016graph,shao2018efficient,neill2012fast}. For parameters in our method, the same strategy as the previous application is used. \textbf{Implementation} We implement all discussed algorithms and perform experiments on Linux servers with the same hardware configuration (64-bit machines with Intel(R) Xeon(R) CPU E5-2680 v4 @ 2.40GHz and 251GB memory). \section{Related Work} \label{section:related} \paragraph{Structured Sparse Optimization} Sparsity is effective to model latent structure in high-dimensional data and remains a mathematically tractable concept. Beyond the ordinary sparsity model, a variety of structured sparsity models have been proposed to solve specific structured constraints on signals, such as sparsity models defined through trees, groups, clusters, paths and connected subgraphs \cite{hegde2015nearly,hegde2015approximation,zhou2016graph,hegde2014approximation}. Those methods for structured sparsity that focus on general nonlinear cost functions fall into two major categories, including: 1) structured sparsity-inducing norms based and 2) model-projection based, both of which often assume that the cost function $F({\bf x})$ satisfies a certain convexity/smoothness condition, such as Restricted Strong Convexity/Smoothness (RSC/RSS) or Stable Mode-Restricted Hessian (SMRH) \cite{zhou2016graph,hegde2015approximation}. The seminal work on general approximate graph-structured sparsity model is \cite{hegde2015nearly}. The authors present GRAPH-COSAMP, a variant of COSAMP \cite{needell2009cosamp}, for compressive sensing and linear regression problems based on head and tail approximations of $\mathbb{M}(\mathbb{G},s)$. After this work, general structured optimization methods on single graph was proposed to do subgraph \cite{chen2016generalized,zhou2016graph} or subspace \cite{chen2017generic} detection. We extend the method \cite{chen2016generalized} to handle interdependent networks, which are block-structured. The work \cite{chen2016generalized} can be viewed as a special case of our work, which handles networks with only one block. \paragraph{Subgraph Detection} Subgraph detection is an important problem in graph mining. Existing methods mainly find subgraphs that satisfy some topological constraints, such as connected subgraphs, dense subgraphs and compact subgraphs. Those graphs with static network structure are what we focus on. According to dynamics of attributes on nodes, the relevant studies can be divided into two parts. For static graphs, the most recent methods include EventTree \cite{rozenshtein2014event}, NPHGS\cite{chen2014non}, and method introduced in \cite{qian2014connected}, in which the first two methods are heuristic and the last one provides performance bounds but is not scalable. For dynamic graphs, the latest methods include Meden \cite{bogdanov2011mining}, NetSpot\cite{mongiovi2013netspot}, AdditiveGraphScan \cite{speakman2013dynamic}, and dGraphScan \cite{shao2018efficient}, which are all heuristic. \paragraph{Interdependent Networks} Complex systems can be modeled as complex networks, which usually encompass many subsystems that interact with or depend on each other. These networks composed of multiple interdependent networks are also known as multilayer networks, networks of networks \cite{kivela2014multilayer}, or multiplex networks \cite{mucha2010community,gomez2012evolution}. Research in this field mostly studies static and evolving statistical characteristics of structures in these networks, which does not consider attributes on nodes and edges. Typical applications and problems for interdependent networks include: community structure analysis \cite{gomez2012evolution}, the spread of epidemics, and the organizational laws of social interactions \cite{gao2012networks}, among others. \section{Conclusion and Future Work} \label{section:conclusion} This paper presents a general framework, GBMP, to solve a nonconvex optimization problem subject to graph block-structured constraints in nearly linear time with theoretical approximation guarantee, and it can be applied to a broad class of subgraph detection problems in interdependent networks. A parallel version of our algorithm is also be proposed to improve the scalability. We evaluate our model on two applications, and results of both experiments show that the algorithm enjoys a better effectiveness and efficiency than state of the art methods while our work is a general framework and can be used in more scenarios. For future work, we will extend the work on network data with high-dimensional node attributes and different graph topological constraints. \section{Introduction} Subgraph detection in network data has aroused many interests in recent years because of many real-world applications, such as disease outbreak detection \cite{chen2014non}, intrusion detection in computer networks \cite{shao2018efficient}, event detection in social networks \cite{rozenshtein2014event}, congestion detection in traffic networks \cite{shao2018efficient}, etc. However, most of existing works investigate the subgraph mining on static, isolated networks, and such a problem involving interdependent networks has not been well studied. In interdependent networks, one network depends on another to achieve its full functionality. Examples include smart power grids, transportation networks, and layered communication networks \cite{danziger2014introduction}. Interdependent networks are comprised of multiple networks $\{\mathbb{G}^1, \mathbb{G}^2, \dots, \mathbb{G}^k,\dots\}$ and edges $\mathbb{E}^0$ interconnected among networks, where $\mathbb{G}^k = (\mathbb{V}^k, \mathbb{E}^k)$. $\mathbb{V}^k$ and $\mathbb{E}^k$ are vertex set and edge set of $k^{\text{th}}$ network $\mathbb{G}^k$ respectively. Some nodes in different networks exhibit node-node dependencies that could be captured by explicit edges or implicit correlation on node attributes (implicit edges). For instance, a temporal network can be viewed as multiple temporal-dependent networks, in which each network represents a snapshot of the temporal network at a specific time stamp, where current node's attributes depend on attributes in the previous time-stamp implicitly \cite{mucha2010community} (Figure \ref{fig:temporal_network}). A web-scale social network comprised of many communities is a network of networks (a trivial interdependent networks) with explicit connections, where communities can be viewed as small networks or blocks that interconnect with each other (Figure \ref{fig:social_network}). Another example of network of networks with implicit connections is infrastructure networks (Figure \ref{fig:network_of_networks}). In reality, diverse critical infrastructures are coupled together and depend on each other, including systems such as water and food supply, communications, fuel, financial transactions and power stations. For instance, the electric power network provides power for pumping and control systems of water network, the fuel network provides fuel for generators for electric power network, etc \cite{gao2014single}. Typically, subgraph detection in a single network is to find a subset of vertices and edges that minimizing an user-specified cost function, meanwhile, satisfying a certain topological structured constraint, such as connected subgraphs, dense subgraphs, subgraphs that are isomorphic to a query graph, compact subgraphs, trees, and paths, among others \cite{chen2016generalized}. It can be formulated as an NP-hard combinatorial optimization problem as follows: \begin{equation}\label{prob:single} \begin{gathered} \min_{S\subseteq \mathbb{V}} F(S) \\ \mathrm{s.t.} \ \ S \ \text{satisfies a pre-defined topological constraint} \end{gathered} \end{equation} where $F$ is a user-specified cost function, and $S$ is a subset of vertex set $\mathbb{V}$ of a network. Correspondingly, subgraph detection in multiple interdependent networks can be formulated as a block-structured optimization problem with multiple topological constraints on blocks, \begin{equation}\label{prob:discrete} \begin{gathered} \min_{S_1 \subseteq \mathbb{V}^1, ..., S_K \subseteq \mathbb{V}^K } F(S_1,\cdots, S_K) \\ \mathrm{s.t.} \ \ S_k \ \text{satisfies a pre-defined topological constraint,} \end{gathered} \end{equation} where $F$ is a user-specified cost function regularized by block dependencies, for example, $F$ could be $f(S_1, \cdots, S_K) + g(S_1, \cdots, S_K)$, where $f$ is used to capture signals in interdependent networks and $g$ models the dependencies between networks. $S_k$ is a subset of nodes in $k^{\text{th}}$ network $\mathbb{G}^k$, $ k=1,...,K $. For example, subgraph detection in a temporal network is to find a sequence of subset of vertices in a sequence of blocks, where the detected subgraph in each block must satisfy a predefined topological constraint. Vanilla subgraph detection problem (\ref{prob:single}) is a special case of problem (\ref{prob:discrete}) when number of networks (blocks) is 1. \begin{figure*} \centering \begin{subfigure}[t]{0.25\textwidth} \centering \includegraphics[width=\linewidth]{figures/temporal_network.pdf} \caption{Temporal Networks} \label{fig:temporal_network} \end{subfigure} \hspace{23pt} \begin{subfigure}[t]{0.25\textwidth} \centering \includegraphics[width=\linewidth]{figures/social_network.pdf} \caption{Communities in Social Network} \label{fig:social_network} \end{subfigure} \hspace{23pt} \begin{subfigure}[t]{0.25\textwidth} \centering \includegraphics[width=\linewidth]{figures/network_of_networks.pdf} \caption{Network of Networks} \label{fig:network_of_networks} \end{subfigure} \caption{Examples of Interdependent Networks. (a) Temporal Networks: black dashed lines capture implicit temporal dependencies or consistencies. (b) Social Networks: black solid lines are bridges across communities; social networks can be viewed as a network of networks with explicit connections. (c) Network of Networks with Implicit Connections: the main network is represented by dashed nodes and edges, where each node of the main network can be represented as another network. Black dashed lines model the implicit connections.} \label{fig:interdependent_networks} \end{figure*} Subgraph detection in interdependent networks is very challenging but useful, since real systems are more often than not interconnected, with many inter-dependencies that are not properly captured by an isolated network. It is important to take such multiple networks which are interdependent with each other into account to try to improve our understanding of interesting patterns in networks. To the best of our knowledge, most of related studies on subgraph detection in interdependent networks only focus on specific applications and are lack of generality. Furthermore, they are heuristic-driven with no theoretical guarantee. Therefore, we propose a general framework that leverages graph structured sparsity model \cite{hegde2015nearly} and block coordinate descent method \cite{fercoq2015accelerated} to solve this problem which can be modeled as a block-structured optimization problem. The contributions of our work are summarized as follows: \begin{itemize} [wide=0pt,leftmargin=\parindent] \item \textbf{Design of an efficient and scalable approximation algorithm.} We propose a novel generic framework, namely, Graph Block-structured Gradient Projection, for block structured nonconvex optimization, which can be used to approximately solve a broad class of subgraph detection problems in interdependent networks in nearly-linear time. Furthermore, we design a parallel version of our algorithm to make it more scalable and efficient. \item \textbf{Theoretical guarantees.} We present a theoretical analysis of the proposed GBGP algorithm and show that it enjoys a good convergence rate and a tight error bound on the quality of the detected subgraph. \item \textbf{Two practical applications with comprehensive experiments.} We demonstrate how our framework can be applied to two practical applications: 1) anomalous evolving subgraph detection; 2) subgraph detection in network of networks. We conduct comprehensive experiments on both synthetic and real networks to validate the effectiveness and efficiency of our proposed algorithm. \end{itemize} \textbf{Reproducibility}: The implementation of GBGP, datasets, and supplementary material are available via the anonymous link: \url{https://bit.ly/2NxDvkw} The rest of this paper is organized as follows. Section \ref{section:method} introduces some preliminaries and the proposed method GBGP. Section \ref{section:theory} analyzes theoretical properties of the method. Section \ref{section:example} demonstrates applications of our proposed algorithm. Experimental design, datasets and results are shown in section \ref{section:experiment}. We introduce related work in Section \ref{section:related}. Section \ref{section:conclusion} concludes the paper and describes future work. \section{Methodology}\label{section:method} \subsection{Problem Formulation} First, we reformulate the combinatorial problem (\ref{prob:discrete}) in discrete space as an nonconvex optimization problem in continuous space. Interdependent networks can be viewed as one large network $\mathbb{G}= (\mathbb{V}, \mathbb{E})$, where $\mathbb{V} = \{1,\cdots, N\}$ could be cut into $\{\mathbb{V}^1, \cdots, \mathbb{V}^K \}$ and $\mathbb{E}$ could be split into $\{\mathbb{E}^0, \mathbb{E}^1, \cdots, \mathbb{E}^K\}$. Each pair of $(\mathbb{V}^k, \mathbb{E}^k)$ forms a small network $\mathbb{G}^k$ for $k = 1,\cdots, K$, and $\mathbb{E}^0$ are edges interconnected among different small networks. Edges in $\mathbb{E}^0$ should be treated differently with the edges in each $\mathbb{E}^k$, since they models the dependencies among different networks. ${\bf W} = [{\bf w}_1, \cdots, {\bf w}_N]\in \mathbb{R}^{P\times N}$ is the feature matrix, and ${\bf w}_i\in \mathbb{R}^P$ is the feature vector of vertex $i$, $i\in\mathbb{V}$. $N_k = |\mathbb{V}^k|$ is the size of the subset of vertices $\mathbb{V}^k$. The general subgraph detection problem in interdependent networks can be formulated as following general block-structured optimization problem with topological constraints: \begin{equation} \begin{gathered} \min_{{\bf x}=({\bf x}^1,\dots,{\bf x}^K)} F({\bf x}_1,\dots,{\bf x}_K) \ \ \\ \mathrm{s.t.}\ \ \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s),\ \ k = 1, \cdots, K \label{eq:gen_prob} \end{gathered} \end{equation} where the vector ${\bf x} \in \mathbb{R}^N$ is partitioned into multiple disjoint blocks ${\bf x}^1 \in \mathbb{R}^{N_1}, \cdots, {\bf x}^K \in \mathbb{R}^{N_K}$, and ${\bf x}^k$ are variables associated with nodes of network $\mathbb{G}^k$. The objective function $F(\cdot)$ is a continuous, differentiable and convex function, which will be defined based on the feature matrix ${\bf W}$. In addition, $F(\cdot)$ could be decomposed as $f({\bf x}) + g({\bf x})$, where $f$ is used to capture signals on nodes in interdependent networks and $g$ models the dependencies between networks. $\text{supp}({\bf x}^k)$ denotes the support set of vector ${\bf x}^k$, $\mathbb{M}(\mathbb{G}^k, s)$ denotes all possible subsets of vertices in $\mathbb{G}^k$ that satisfy a certain predefined topological constraint. One example of topological constraint for defining $\mathbb{M}(\mathbb{G}^k, s)$ is connected subgraph, and we can formally define it as follows: \begin{equation} \mathbb{M}(\mathbb{G}^k, s) \coloneqq \{S | S \subseteq \mathbb{V}^k; |S| \leq s; \mathbb{G}^k_S\ \text{is connected.} \} \end{equation} where $s$ is a predefined upperbound size of $S$, $S\subseteq \mathbb{V}^k$ , and $\mathbb{G}^k_S$ refers to the induced subgraph by a set of vertices $S$. The topological constraints can be any graph structured sparsity constraints on $\mathbb{G}^k_S$, such as connected subgraphs, dense subgraphs, compact subgraphs \cite{chen2017generic}. Moreover, we do not restrict all $\mathrm{supp}({\bf x}^1),\cdots, \mathrm{supp}({\bf x}^K)$ satisfying an identical topological constraint. An illustration of problem formulation for connected subgraph detection in interdependent networks can be found in Figure \ref{fig:prob_demo}. \setlength{\textfloatsep}{5pt} \begin{figure}[htbp] \centering \includegraphics[width=0.95\linewidth]{figures/prob_demo_4.pdf} \caption{Illustration of connected subgraph detection in interdependent networks. In this example, interdependent networks $\{\mathbb{G}^1,\mathbb{G}^2,\mathbb{G}^3\}$ with an obvious block-separated structure are given. Dashed lines represent the connections across different networks, and solid lines represent connections between nodes in the same network. Those two types of lines may characterize different relationships in practical applications. Those red nodes are what we are interested in, and their corresponding entries in vector ${\bf x}$ should be nonzero, while others should be 0s once we get an optimum of ${\bf x}$.} \label{fig:prob_demo} \end{figure} \subsection{Head and Tail Projections on $\mathbb{M}(\mathbb{G}, s)$} Before presenting our algorithm, we first introduce two major components related to the support of the topological constraints "$\text{supp}(\bf{x}) \in \mathbb{M}(\mathbb{G}, s)$", including head and tail projections \cite{hegde2015nearly}. The key idea is that, suppose we are able to find a good intermediate solution $\bf{x}$ that does not satisfy this topological constraint, these two types of projections can be used to find good \textit{approximations} of $\bf{x}$ in the feasible space defined by $\mathbb{M}(\mathbb{G},s)$. \begin{algorithm \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}, $ i=0 $, $ {\bf x}^{k,i}=\text{initial vectors}$, k=1,\dots, K \Repeat \For{$k = 1,\cdots, K$} \State $\Gamma_{{\bf x}^{k}}=H(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$ \State $\Omega_{{\bf x}^{k}}=\Gamma_{{\bf x}^{k}}\cup\mathrm{supp}({\bf x}^{k,i})$ \EndFor \State Get $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ by solving problem (\ref{sub-p1})\label{alg:line:subproblem} \For{$k = 1, \cdots, K$} \State $ \Psi_{{\bf x}^{k}}^{i+1}=T({\bf b}_{{\bf x}^k}^i) $ \State $ {\bf x}^{k,i+1}=[{\bf b}_{{\bf x}^{k}}^i]_{\Psi_{{\bf x}^{k}}^{i+1}} $ \EndFor \State $ i=i+1 $ \Until{$ \sum_{k=1}^{K} \left\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\right\|\leq \epsilon $} \State $ C=(\Psi_{x^1}^{i}, \dots, \Psi_{{\bf x}^k}^{i}) $ \Return $ ( {\bf x}^{1,i}, \cdots, {\bf x}^{K,i}) , C $ \end{algorithmic} \caption{Graph Block-structured Gradient Projection}\label{alg:gbmp} \end{algorithm} \setlength{\textfloatsep}{7pt} \begin{itemize}[leftmargin=*] \item \textbf{Tail Projection} ($T({\bf x})$): is to find a subset of nodes $S \subseteq \mathbb{V}$ such that \begin{equation} \|{\bf x} - {\bf x}_{S}\|_2 \leq c_{T} \cdot \min_{S' \in \mathbb{M}(\mathbb{G}, s)} \|{\bf x} - {\bf x}_{S'}\|_2, \end{equation} where $c_{T} \geq 1$, and ${\bf x}_S$ is a restriction of ${\bf x}$ on $S$ such that: $({\bf x}_S)_i = ({\bf x})_i$ if $i \in S$, and $({\bf x}_S)_i=0$ otherwise. When $c_{T} = 1$, $T({\bf x})$ returns an optimal solution to the problem: $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2$. When $c_T > 1$, $T({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_T$. \item \textbf{Head Projection} ($H({\bf x})$): is to find a subset of nodes $S$ such that \begin{equation} \|{\bf x}_{S}\|_2 \geq c_{H}\cdot \max_{S'\in \mathbb{M}(\mathbb{G}, s)} \|{\bf x}_{S'}\|_2, \end{equation} where $c_H\leq1$. When $c_H = 1$, $H({\bf x})$ returns an optimal solution to the problem: $\max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. When $c_H < 1$, $H({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_H$. \end{itemize} It can be readily proved that, when $c_T = 1$ and $c_H = 1$, both $T({\bf x})$ and $H({\bf x})$ return the same subset $S$, since $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2 = \max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. In addition, the corresponding vector ${\bf x}_S$ is an optimal solution to the standard projection oracle in the traditional projected gradient descent algorithm \cite{bahmani2016learning}: \begin{equation} \argmin_{{\bf x}'\in \mathbb{R}^n} \|\bf{x}-\bf{x}'\|_2 \ \ \text{s.t.\ supp}({\bf x}') \in \mathbb{M}(\mathbb{G}, s) \label{eq:projection_oracle} \end{equation} which is NP-hard in general for popular topological constraints, such as connected subgraphs and dense subgraphs \cite{qian2014connected}. However, when $c_T > 1$ and $c_H < 1$, $T({\bf x})$ and $H({\bf x})$ return different approximate solutions to the standard projection problem \cite{chen2017generic}. Although the head and tail projections are NP-hard when we restrict $c_T = 1$ and $c_H = 1$, these two projections can still be implemented in nearly-linear time when approximated solutions with $c_{T} > 1$ and $c_H < 1$ are allowed. The head and tail projections are two different approximations to the standard projection problem (\ref{eq:projection_oracle}). It has been demonstrated that the joint utilization of both head and tail projections is critical in design of approximate algorithms for network topology-related optimization problems \cite{chen2016generalized,hegde2015nearly,hegde2015approximation,zhou2016graph}. \subsection{Algorithm Details} We propose a novel Graph Block-structured Gradient Projection, namely GBGP, to approximately solve problem (\ref{eq:gen_prob}) in nearly-linear time on the network size. The key idea is to alternatively search for a close-to-optimal solution by solving easier sub-problems for graph $\mathbb{G}_k$ in each iteration $i$ until converged. The pseudo-code of our proposed algorithm is described in Algorithm \ref{alg:gbmp}. Our algorithm can be decomposed into three main steps, including: \begin{itemize}[leftmargin=*] \item \textbf{Step 1}: alternatively identify a subset of nodes in each block $\Omega_{{\bf x}^k}$, in which pursuing the minimization will be most effective (\textbf{Line 2 $\sim$ 5}). \item \textbf{Step 2}: identify the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ that minimizes the objective function in intermediate space $\cup_{k=1}^{K} \Omega_{{\bf x}^k}$ (\textbf{Line 6}); \item \textbf{Step 3}: alternatively apply tail projections on the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ to the feasible space defined by the topological constraints: ``$\text{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s)$" (\textbf{Line 7 $\sim$ 10}). \end{itemize} To be more informative, we illustrate the general idea of each step in algorithm \ref{alg:gbmp} as follows. The whole procedure iteratively refines the intermediate solutions $({\bf x}^{1,i}, \cdots, {\bf x}^{K, i})$ until converged. In Step 1, it first calculates the partial derivative $\nabla_{{\bf x}^k} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$, and then identifies a subset of nodes $\Gamma_{{\bf x}^k}$ via head projection (\textbf{Line 3}). The set $\Gamma_{{\bf x}^k}$ can be interpreted as a good approximated directions where the nonconvex set ``$\text{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s)"$ is located. In \textbf{Line 4}, we combine the set $\Gamma_{{\bf x}^k}$ with the support set of ${\bf x}^{k,i}$ to get a slightly larger possible searching space $\Omega_{{\bf x}^k}$, which is the feasible space for subproblem in Step 2 (\textbf{Line 6}): \begin{equation} \begin{gathered} \hspace*{-10pt}\left( {\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i \right) = \argmin\limits_{{\bf x}^1,\dots,{\bf x}^K} F({\bf x}^1,\dots,{\bf x}^K) \\ \mathrm{s.t.}\, \ \ \mathrm{supp}({\bf x}^k)\subseteq \Omega_{{\bf x}^k} \label{sub-p1} \end{gathered} \end{equation} In Step 3, it first applies tail projection on the solution of subproblem $(\ref{sub-p1})$, and returns a set of nodes $\Psi_{{\bf x}^{k}}^{i+1}$ (\textbf{Line 8}). Subsequently, ${\bf x}^{k}$ is updated by mapping the vector ${\bf b}_{{\bf x}^k}^i$ on the support set $\Psi_{{\bf x}^{k}}^{i+1}$, thereby $({\bf x}^{k, i+1})_j = ({b}_{{\bf x}^k}^i)_j$ if $j \in \Psi_{{\bf x}^{k}}^{i+1} $, $({\bf x}^{k, i+1})_j = 0$ otherwise (\textbf{Line 9}). Furthermore, we utilize the \textit{block-coordinate descent method} with \textit{proximal linear update} \cite{tseng2009coordinate,shi2016primer} to solve the problem (\ref{sub-p1}) (Algorithm \ref{alg:block}). This method has been analyzed and also applied to both convex and nonconvex problems \cite{beck2013convergence,zhou2016global,hong2017iteration,xu2017globally}, which shows good performance empirically. Block coordinate descent is a generalization of the alternating minimization method that has been applied to a variety of problems, such as the expectation-maximization (EM) algorithm \cite{dempster1977maximum}. In addition, we utilize the proximal linear update that ensures the convergence of the algorithm on convex problems with convex constraints ``$\textrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k}$". The proximal linear update in our scenario is defined by: \begin{equation}\label{prob:proximal} {\fontsize{9}{10} \begin{aligned} \hspace{-10pt}{\bf x}^{k, t+1} = &\argmin_{{\bf x}^k} F(\hat{\bf x}^{t}) + \langle \nabla_{{\bf x}^k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t}), {\bf x}^{k} - \hat{\bf x}^{k, t} \rangle\\ & + \frac{1}{2 \alpha^{k, t}}\|{\bf x}^{k} - {\bf \hat{x}}^{k, t}\|_2^2\qquad\mathrm{s.t.} \ \ \mathrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k}\hspace{-7pt} \end{aligned} } \end{equation} where $\alpha^{k, t}$ serves as a step size and can be set as the reciprocal of the Lipschitz constant of $\nabla_{k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t})$, and $\hat{\bf x}^{k, t}$ (\textbf{Line 4}) is an extrapolated point that helps accelerate the convergence of the proximal point update scheme. Since the objective function is simply second order Taylor approximation of function $F$ with Hessian replaced by identity matrix, we can easily derive and implement the closed form solution of the objective function in problem (\ref{prob:proximal}), and then project it to the feasible space, which is convex. The overall block coordinated gradient projection method on convex function with convex constraint (i.e. Algorithm \ref{alg:block}) has a sublinear rate of convergence \cite{shi2016primer,beck2013convergence}. \begin{algorithm}[H] \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $t = 0, \epsilon = 10^{-3}, \rho_0 = 1.$ \Repeat \State \text{Choose index } $k \in \{1, \cdots, K\}$ \State $\omega_{t} = (\rho_t - 1) / \rho_t,\ $ \State $\hat{\bf x}^{k, t} = {\bf x}^{k, t} + \omega_{t} ({\bf x}^{k, t} - {\bf x}^{k,t-1})$ \State Update ${\bf x}^{k, t + 1} \leftarrow {\bf \hat{x}}^{k, t} - \frac{1}{\alpha^{k, t}} \nabla_{k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t})$ \State Project ${\bf x}^{k, t+1}$ to feasible space by setting entries of ${\bf x}^{k, t+1}$ to zero if index of entry not in set $\Omega_{{\bf x}^k}$. \State Keep ${\bf x}^{j, t+1} = {\bf x}^{j, t}$, for all $j \neq k$ \State $\rho_{t+1} = (1+\sqrt{1 + 4 \rho_{t}^2})/2,$ \State Let $t = t+1$ \Until{$\sum_{k=1}^{K} \|{\bf x}^{k, t} - {\bf x}^{k, t-1}\| \le \epsilon$} \Return $\{{\bf x}^{1, t}, \cdots, {\bf x}^{K, t}\}$ \end{algorithmic} \caption{Block-Coordinate Descent Method with Proximal Linear Update to Solve Problem (\ref{sub-p1})}\label{alg:block} \end{algorithm} \section{Theoretical Analysis} \label{section:theory} In order to demonstrate the accuracy and efficiency of GBGP, we require that the objective function $F({\bf x})$ satisfies the Weak Restricted Strong Convexity (WRSC) condition, which is a variant of the Restricted Strong Convexity/Smoothness (RSC/RSS) \cite{yuan2014gradient}: \begin{definition}[Weak Restricted Strong Convexity (WRSC)]\label{def:wrsc} A function $F({\bf x})$ has condition $(\xi,\delta,\mathbb{M})$-WRSC, if $\forall {\bf x}, {\bf y}\in\mathbb{R}^N$ and $\forall S\in\mathbb{M}$ with $\mathrm{supp}({\bf x})\cup\mathrm{supp}({\bf y})\subseteq S$, the following inequality holds for some $\xi >0$ and $0<\delta<1$: \begin{equation} \|{\bf x}-{\bf y}-\xi\nabla_S F({\bf x})+\xi\nabla_S F({\bf y})\|_2\leq\delta\|{\bf x}-{\bf y}\|_2 \end{equation} where ${\bf x}=({\bf x}^1,\dots,{\bf x}^K), {\bf y}=({\bf y}^1,\dots,{\bf y}^K), {\bf x}^k, {\bf y}^k\in\mathbb{R}^{N_k}, k=1,\dots,K$, topological constraint $\mathbb{M}$ can be expressed as $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}(\mathbb{G}^k,s_k), s=\sum_{k=1}^K s_k$, and the subgraph in $k^{\text{th}}$ block (i.e., $\mathbb{G}^k$) is $S_k$, which satisfies $|S_k|\leq s_k, S_k\subseteq \mathbb{V}^k, S=\bigcup_{k=1}^K S_k, |S|\leq s$. Here, since constraints on blocks are independent, we use union sign ``$\bigcup$" to denote combined model $\mathbb{M}$, in which ${\bf x}\in\mathbb{M}=\{{\bf x}|{\bf x}^k\in\mathbb{M}(\mathbb{G}^k,s_k),k=1,\dots,K\}$. \end{definition} \begin{remark} We can set different $s_k$ for $k^{\text{th}}$ block. In our applications, $s_1=\cdots=s_k=s'$, i.e., we use the same upper bound of subgraph size for all blocks. \end{remark} \begin{theorem}\label{thm:convege} Consider the graph block-structured constraint with $K$ blocks $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}(\mathbb{G}^k,s_k)$ and a cost function $F:\mathbb{R}^N\to\mathbb{R}$ that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G},8s))$-WRSC. If $\eta=c_H(1-\delta)-\delta>0$, then for any true ${\bf x}^*\in\mathbb{R}^N$ with $\mathrm{supp}({\bf x}^*)\in\mathbb{M}((\mathbb{G},s)$, the iteration of algorithm obeys \begin{equation} \|{\bf x}^{i+1}-{\bf x}^*\|_2\leq\alpha\|{\bf x}^i-{\bf x}^*\|_2+\beta\|\nabla_I F({\bf x}^*)\|_2 \end{equation} where $c_H=\min_{k=1,\dots,K}\{{c_{H_k}}\}$, $c_T=\max_{k=1,\dots,K}\{{c_{T_k}}\}$, $I=\argmax_{S\in\mathbb{M}}\|\nabla_S F({\bf x})\|_2$, $\alpha=\frac{1+c_T}{1-\delta}\sqrt{1-\eta^2}$, and $\beta=\frac{\xi(1+c_T)}{1-\delta}\left[\frac{1+c_H}{\eta}+\frac{\eta(1+c_H)}{\sqrt{1-\eta^2}}+1 \right]$. $c_{H_k}$ and $c_{T_k}$ denote head and tail projection approximation factors on $k^{\text{th}}$ block. \end{theorem} \begin{IEEEproof} The proof is provided in Appendix \ref{proof:converge}. \end{IEEEproof} \begin{remark} 1) The convergence of GBGP is controled by the shrinkage rate $\alpha<1$, which can be satisfied if and only if $c_H^2>1-1/(1+c_T)^2$ when $\delta$ is small. As proved in \cite{hegde2015approximation}, the approximation factor $c_H$ of any given head approximation algorithm can be boosted to any arbitrary constant close to 1, such that the above condition is satisfied. 2) According to WRSC condition, the function is Lipschitz continuous, which further implies the $\|\nabla_I F(x^*)\|_2$ must be bounded. To sum up, Theorem \ref{thm:convege} indicates the convegence of GBGP algorihtm. \end{remark} \begin{theorem}\label{thm:time} Let ${\bf x}^*\in\mathbb{R}^N$ be a true optimum such that $\mathrm{supp}({\bf x}^*)\in\mathbb{M}(\mathbb{G}, s)$, and $F:\mathbb{R}^N\to\mathbb{R}$ be a cost function that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G}, 8s))$-WRSC. Assuming that $\alpha<1$, GBGP returns an $\hat{{\bf x}}$ such that, $\mathrm{supp}(\hat{{\bf x}})\in\mathbb{M}(\mathbb{G}, 5s)$ and $\|{\bf x}^*-\hat{{\bf x}}\|_2\leq c\|\nabla_{I}F({\bf x}^*)\|_2$, where $c=(1+\frac{\beta}{1-\alpha})$ is a fixed constant. Moreover, GBGP runs in time \begin{equation} {\fontsize{8}{8} O\left(\left(T+\sum_{k=1}^K|\mathbb{E}^k|\log^3 N_k\right)\log\left(\frac{\|{\bf x}^*\|_2}{\|\nabla_{I}F({\bf x}^*)\|_2}\right) \right) } \end{equation} where $|\mathbb{E}^k|$, $N_k$ denote edge and node size of $k^{\text{th}}$ block and $T$ is the time complexity of one execution of the subproblem in line \ref{alg:line:subproblem} of Algorithm \ref{alg:gbmp}. In particularly, if $T$ scales linearly with $N$ and $|\mathbb{E}|$, then GBGP scales \textbf{nearly linearly} with $N$ and $|\mathbb{E}|$. \end{theorem} \begin{IEEEproof} The proof is provided in Appendix \ref{proof:time}. \end{IEEEproof} \begin{remark} We can run head and tail projections on blocks \textbf{in parallel}, which reduces the time cost of each iteration to $(T+|\mathbb{E}'|\log^3N'), |\mathbb{E}'|\log^3N'=\max_{k=1,\dots,K}|\mathbb{E}^k|\log^3N_k$. As mentioned in Section \ref{section:method}, which has been proved in \cite{beck2013convergence}, sublinear convergence rate $O(1/t)$ can be established for Algorithm \ref{alg:block}. Hence, the iteration number of Algorithm \ref{alg:block} is $O(\lceil 1/\epsilon\rceil)$ when error bound is $\epsilon$. Then it concludes that the time complexity of Algorithm \ref{alg:block} (i.e. $T$) is $O(\lceil 1/\epsilon\rceil N)$, which further implies the algorithm GBGP scales nearly linearly with $N$ and $|\mathbb{E}|$. \end{remark} \section{Example Applications} \label{section:example} In this section, we show how to formulate two subgraph detection applications: 1) anomalous evolving subgraph detection and 2) subgraph detection in network of networks as problem (\ref{eq:gen_prob}) with specific objective function $F$ and topological constraints. For these two applications, we leverage the \textbf{Elevated Mean Scan} (EMS) statistics, which is popularly used for detecting signals among node-level numerical features on graph \cite{qian2014connected,arias2011detection}. The EMS statistics is defined as: \begin{equation} {\bf c}^\top {\bf x}/\sqrt{{\bf x}^\top {\bf 1}} \end{equation} where ${\bf x} \in \{0,1\}^N$, ${\bf c}$ denotes the feature vector of all nodes, and $c_i \in \mathbb{R}$ denotes the uni-variate feature for node $i$. Assuming $S$ is some unknown anomalous cluster which forms a connected component, $S\subseteq \mathbb{V}$. The aim of significant subgraph detection is to decide between the null hypothesis $H_0 : \{ c_i \sim \mathbb{N}(0,1), \ \forall \ i \in V\}$ and the alternative hypothesis $H_{1, S}: \{c_i \sim \mathbb{N}(\mu, 1)\ \ \forall \ i \in S\ \text{with}\ \mu > 0 , \ \text{and}\ c_i \sim \mathbb{N}(0,1) \ \forall \ i \notin S\}$. Briefly, we hypothesize that the significant nodes $v \in S$ follow a different signal distribution with insignificant nodes $v \in V \setminus S$. Empirically, maximizing the score of EMS leads to discovering significant nodes in the network precisely. Instead of maximizing the EMS in the domain $\{0,1\}^N$, we relax EMS to continuous space and minimize the relaxed negative EMS in our applications, which can be defined as: \begin{equation} -\frac{{\bf c}^\top {\bf x}}{ \sqrt{{\bf x}^\top {\bf 1}} } + \frac{1}{2} \|{\bf x}\|_2^2 \ \ \ \text{where} \ \ {\bf x} \in [0, 1]^N \end{equation} Most importantly, the relaxed negative EMS satisfies the RSC/RSS condition when ${\bf c}$ is normalized, which implies WRSC condition \cite{chen2016generalized,yuan2014gradient}. \subsection{Anomalous Evolving Subgraphs Detection} Typically, an evolving event characterizes three phrases: emerging, spreading, and receding over a period of time. In order to detect and track the exact spatial and temporal region of an evolving event, we can formulate the problem as an anomalous evolving subgraph detection problem, which is to find a connected subgraph $S_k$ at each time stamp $k$ (denoted as \textit{local connectivity constraint}), and at the meanwhile we expect $S_k$ and $S_{k-1}$ share some overlap nodes in the network (denoted as \textit{temporal consistency constraint}). Hence, we can leverage the relaxed EMS and mathematically formulate the detection problem as nonconvex optimization with convex objective function and block-structured constraints: \begin{equation} \hspace{-5pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{{{\bf c}^k}^\top {\bf x}^k}{\sqrt{{{\bf x}^k}^\top {\bf 1}}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+ \lambda \cdot \sum_{k=2}^{K} \|{\bf x}^k - {\bf x}^{k-1}\|_2^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s) \end{aligned}\hspace{-10pt} } \end{equation} where the first term is the summation of relaxed negative EMS, and the second term is soft constraints on ${\bf x}^{k}$ and ${\bf x}^{k-1}$ to ensure temporal consistency on detected subgraphs, and $\lambda > 0$ is a trade-off parameter. The connected subset of nodes at time stamp $k$ can be found as $S_k = \mathrm{supp}({\bf x}^{k})$, i.e., the support set of the estimated ${\bf x}^{k}$ that minimizes the objective function. \subsection{Subgraph Detection in Network of Networks} Our proposed framework is also applicable to subgraph detection in network of networks. Due to space limit, we only demonstrate the network of networks with explicit block dependencies, but our model can definitely apply to network of networks with implicit dependencies as well. A large-scale static network with many communities can be viewed as one instance of network of networks (a trivial interdependent networks), where each community is a small block of the network. When an event is wide-spreading in such large networks, it becomes very challenging and time-consuming to apply effective models to detect the significant subgraphs. For example, one application is rumor detection and tracking in social networks. It is interesting and useful to identify the connected subgraph that depicts how a rumor spreads across different communities in a social network. \begin{table*}[!htbp] \caption{Results on synthetic datasets with different $\mu$. It shows that GBGP is more robust than Meden and Netspot.}\label{tab:noise} \begin{adjustbox}{center} \centering \resizebox{0.8\textwidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{$\mu=3$} & \multicolumn{3}{c|}{$\mu=4$} & \multicolumn{3}{c|}{$\mu=5$} \\ \cline{2-10} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7588 & 0.7342 & 0.7453 & 0.8836 & 0.8591 & 0.8709 & 0.9646 & 0.9145 & 0.9388 \\ NetSpot & 0.6658 & 0.7267 & 0.6947 & 0.7615 & 0.7922 & 0.7763 & 0.7956 & 0.8185 & 0.8068 \\ GBGP & 0.6468 & 0.8899 & \textbf{0.7489} & 0.8487 & 0.9674 & \textbf{0.9041} & 0.9553 & 0.9914 & \textbf{0.9730} \\ \hline \end{tabular} } \end{adjustbox} \end{table*} The most traditional approach is to partition a large network into several small blocks, and then process them individually and independently. However, this approach will effect the detection performance if those blocks are highly interdependent. By encoding the dependencies in our proposed framework, we can detect subgraphs in each individual partition of networks more efficiently without sacrificing performance. Specifically, our proposed framework provides a feasible solution for this scenario where node dependencies among a large-scale network can not be neglected. For subgraph detection in a network of networks, we can also leverage the relaxed negative $\text{EMS}$ and formulate the detection problem in large-scale networks as follows: \vspace{-2pt} \begin{equation} \hspace{-3pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{{{\bf c}^{k}}^\top {\bf x}^{k}}{\sqrt{{{\bf x}^{k}}^\top {\bf 1}}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+\lambda \cdot \sum_{i,j} e_{ij} \cdot (x_i - x_j)^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s) \end{aligned} }\hspace{-15pt} \end{equation} where the first term is the summation of relaxed negative EMS, the second term is soft constraints on bridge nodes of two partitions to ensure dependencies; $e_{ij} = 1$ if node $i$ and node $j$ are connected but in two different partitions (in other words, edge $(i,j)$ is an graph cut), otherwise $e_{ij} = 0$, $x_i$ and $x_j$ are $i^{\text{th}}$ and $j^{\text{th}}$ entries of ${\bf x}$, and $\lambda > 0$ is a trade-off parameter. In addition, we propose a parallel version of our algorithm (Algorithm 3) to speed up the computation by integrating the APPROX algorithm, a randomized coordinate descent method proposed in \cite{fercoq2015accelerated}. In Algorithm 3, the head projections (Line \ref{alg:approx_block:head}), tail projections (Line \ref{alg:approx_block:tail}), and steps from Line \ref{alg:approx_block:parallel:start} to Line \ref{alg:approx_block:parallel:end} are parallelizable. The block from Line \ref{alg:approx_block:diff:start} to Line \ref{alg:approx_block:diff:end} can be run in parallel and boosts the convergence rate of solving problem (\ref{sub-p1}) from $O(1/t)$ to $O(1/t^2)$, and the theoretical proof and more details are provided in \cite{fercoq2015accelerated}. The parallel part starts from ${\bf x}^0\in\mathbb{R}^N$ (Line \ref{alg:approx_block:diff:start}) and generates three vector sequences denoted as ${\bf x}^t,{\bf y}^t, {\bf z}^t \geq0$. In Line \ref{alg:approx_block:comb}, ${\bf y}^t$ is defined as a convex combination of ${\bf x}^t$ and ${\bf z}^t$. In Line \ref{alg:approx_block:select}, a set of random blocks $S_t$ is sampled and then Lines \ref{alg:approx_block:parallel:start}–\ref{alg:approx_block:parallel:xt+1} are performed in parallel. \begin{algorithm}[h] \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $i=0, {\bf x}^{k,i}= $initial vectors, $k=1,\dots,K$, $\tau=$number of processors, $n=$number of blocks \Repeat \State $\Omega_{{\bf x}^k}=\mathrm{supp}({\bf x}^{k,i}) \cup H\Big(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K, i})\Big), \forall{k}$\label{alg:approx_block:head} \State $t=0$, choose ${\bf x}^{0}\in \mathbb{R}^N$, ${\bf x}^{0} = {\bf z}^{0}$, and $\theta_{0}= \frac{\tau}{n}$\label{alg:approx_block:diff:start} \Repeat \State ${\bf y}^t=(1-\theta_t){\bf x}^t+\theta_t {\bf x}^t$ \label{alg:approx_block:comb} \State Generate random set of blocks $S_t \subseteq \{1,\dots,K\}$ \label{alg:approx_block:select} \State ${\bf z}^{t+1} = {\bf z}^{t} $ \For{$k \in S_t$} \label{alg:approx_block:parallel:start} \State ${\bf z}^{k, t+1} = \argmin_{{\bf z} \in \mathbb{R}^{N_k}} \left\langle \nabla_{{\bf y}^k} F({\bf y}^{t}), {\bf z} - {\bf y}^{k, t} \right\rangle+\frac{n \theta_t }{2\tau} \left\|{\bf z} - {\bf z}^{k, t}\right\|_2^2\qquad \mathrm{supp}({\bf z}^{k}) \subseteq \Omega_{{\bf x}^k}$ \EndFor \label{alg:approx_block:parallel:end} \State ${\bf x}^{t+1} = {\bf y}^{t} + \frac{n}{\tau} \theta_t ({\bf z}^{t+1} - {\bf z}^{t})$\label{alg:approx_block:parallel:xt+1} \State $\theta_{t+1} = \frac{\sqrt{\theta_t^4 + 4\theta_t^2}- \theta_t^2}{2}$ \State let $t = t + 1$ \Until{$\| {\bf x}^{t} - {\bf x}^{t-1} \|_2 \leq \epsilon$} \label{alg:approx_block:diff:end} \State $\Psi_{{\bf x}^k} = \text{T}({\bf x}^{k,i})$, ${\bf x}^{k, i} = [{\bf x}^{k,i}]_{\Psi_{{\bf x}^k}}, \ \ \forall k$ \label{alg:approx_block:tail} \State let $i = i + 1$ \Until{$\sum_{k=1}^K\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\|\leq\epsilon$} \Return $\{{\bf x}^{1,i}, \cdots, {\bf x}^{K,i}\}$ \end{algorithmic} \caption{Graph Block-structured Gradient Projection with Parallelism}\label{alg:approx_block} \end{algorithm} \section{Experiments}\label{section:experiment} This section evaluates the effectiveness and efficiency of the proposed GBGP algorithm in two applications on both synthetic data and real-world data. \begin{table}[!htbp] \caption{Statistics of Datasets for 1st Application.} \resizebox{\linewidth}{!}{ \centering \begin{tabular}{|c|c|c|c|c|} \hline \multirow{2}{*}{Datasets} & \multicolumn{4}{c|}{Statistics} \\ \cline{2-5} & \multicolumn{1}{c|}{Node} & \multicolumn{1}{c|}{Edge} & \multicolumn{1}{c|}{Timestamp} & \multicolumn{1}{c|}{Resolution} \\ \hline Synthetic & 3,000 & 11,984 & 7 & NA \\ Water Pollution & 12,527 & 14,831 & 8 & 60 min. \\ Washington D.C. & 1,188 & 1,323 & 17 & 60 min. \\ Beijing & 59,000 & 70,317 & 12 & 10 min. \\ \hline \end{tabular}\label{table:app1} } \end{table} \subsection{Anomalous Evolving Subgraph Detection} \paragraph{Synthetic Dataset} We generate networks using Barab\'asi-Albert preferential attachment model \cite{barabasi1999emergence}. The evolving true subgraphs spanning within 7 time stamps are simulated from node size 100 to 300, and the true subgraphs in two consecutive time stamps have $50\%$ of node overlap. The univariate feature values of background nodes and true nodes are randomly generated in $\mathbb{N}(0,1)$ and $\mathbb{N}(\mu, 1)$ distributions, respectively. We generate 50 temporal networks for each setting of $\mu = [3,4,5]$. As we can see, when $\mu$ is small, the data is more noised, and it is more difficult to distinguish between the anomalous nodes and normal nodes based on the univariate feature. \paragraph{Real-world Dataset} 1) \textbf{\textit{ Water Pollution Dataset}}: a real world sensor network. This temporal network consists of node attributes in 8 time stamps with time resolution as 60 minutes, and the evolving true chemical contaminated subgraphs are provided \cite{ostfeld2008battle}. For each hour, each vertex has a sensor that reports 1 if it is polluted; otherwise, reports 0. 2) \textbf{\textit{Washington D.C. Road Traffic Dataset}}: a traffic dataset of Washington D.C from June 1, 2013 to March 31, 2014 from INRIX \footnote{http://inrix.com/publicsector.asp.}. We use the data from 6AM. to 10PM. (17 time stamps) with time resolution as 60 minutes. 3) \textbf{\textit{ Beijing Road Traffic Dataset}}: the dataset contains the real-time traffic conditions of four days. We use the data from 5PM. to 7PM. with time resolution as 10 minutes (totally 12 time stamps) \cite{shang2014inferring}. For both traffic datasets, the node attribute is the difference between reference speed and current speed, and the true congested roads are provided. Statistics of all datasets are provided in Table \ref{table:app1}. \paragraph{Performance Metrics} Precision, Recall, and F-measure are deployed to evaluate the quality of detected subgraphs by different methods. Higher F-measure reveals better overall performance. For synthetic data, we use the averaged precision, recall, and f-measure over 50 simulated examples. \paragraph{Comparison Methods and Results} We compare our algorithm with two state of the art baseline methods: \textit{Meden} \cite{bogdanov2011mining} and \textit{NetSpot} \cite{mongiovi2013netspot}, which were designed specifically for detecting significant anomalous region in dynamic networks and provide implementations. The comparison of results are reported in Table \ref{tab:noise} and Table \ref{tab:evo}. As you can see, our method outperforms these two baseline methods on both synthetic data and real-world data. Both of baselines are heuristic, which can not guarantee the quality of results and cause worse performance than ours. \begin{table}[!htbp] \caption{Results on Washingtong D.C. and Beijing datasets. }\label{tab:evo} \centering \setlength\tabcolsep{3pt} \resizebox{\linewidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{Washington D.C.} & \multicolumn{3}{c|}{Beijing} \\ \cline{2-7} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7076 & 0.7662 & 0.7342 & 0.6424 & 0.7509 & 0.6882 \\ NetSpot & 0.5823 & 0.7098 & 0.6367 & 0.6789 & 0.7351 & 0.6973 \\ GBGP & 0.7049 & 0.9192 & \textbf{0.7853} & 0.6627 & 0.9634 & \textbf{0.7788} \\ \hline \end{tabular} } \end{table} \begin{figure*} \centering \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/precision_water_2.pdf} \caption{Precision vs Noise Level} \label{fig:water:a} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/recall_water_2.pdf} \caption{Recall vs Noise Level} \label{fig:water:b} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.3\textwidth} \centering \includegraphics[width=\linewidth]{figures/fm_water_2.pdf} \caption{F-measure vs Noise Level} \label{fig:water:c} \end{subfigure} \caption{Precision, Recall, and F-measure curves on Water Pollution dataset with respect to different noise ratios.} \label{fig:water:noise} \end{figure*} \begin{figure*}[ht] \vspace{-10pt} \centering \begin{subfigure}[t]{0.37\textwidth} \centering \includegraphics[width=\linewidth]{figures/node_time_6} \caption{Run Time vs Nodes} \label{fig:synthetic:a} \end{subfigure} \hspace{10pt} \begin{subfigure}[t]{0.37\textwidth} \centering \includegraphics[width=\linewidth]{figures/edge_time_6} \caption{Run Time vs Edges} \label{fig:synthetic:b} \end{subfigure} \caption{Comparison of run time on synthetic datasets. Figure (a) shows our methods run in nearly linear time w.r.t to the network size, where $|\mathbb{E}|=3|\mathbb{V}|$. Figure (b) shows that our algorithm can be easily scaled up to $1,000,000$ edges with node size $|\mathbb{V}| = 100,000$, by contrast, the AdditiveGraphScan runs over $10,000$ seconds on all cases.} \label{fig:synthetic} \end{figure*} \paragraph{Robustness Validation} Except for measuring the accuracy of subgraph detection, we also test the robustness of subgraph detection method on water pollution dataset as \cite{shao2017efficient,zhou2016graph}. $P$ percent of nodes are selected randomly, and their sensor binary values are flipped in order to test the robustness of methods to noises, where $P \in \{2, 4, 6, 8, 10\}$. Figure \ref{fig:water:noise} shows the precision, recall, and f-measure of all the comparison methods on the detection of polluted nodes in the water pollution dataset with respect to different noise ratios. The results indicate that our proposed method GBGP is the best overall performance for all of the settings, which verifies the robustness of our method. \paragraph{Parameter Tuning} We strictly follow strategies recommended by authors in their original papers to tune the related model parameters. For NetSpot \cite{mongiovi2013netspot}, edges are weighted by comparing their p-value to a significance level threshold $\mu$ (0.01 recommended by authors). Our proposed methods have two parameters, 1) sparseness parameter $s$ (an upper bound of the subgraph size on each block) and 2) trade off parameter $\lambda$. Part of data is extracted from datasets as training dataset and grid search is done to decide those two parameters. $\lambda$ is selected in range $[0.001, 0.1]$ with step size $0.001$. More details are provided in the supplementary material. \subsection{Subgraph Dectection in Network of Networks} \paragraph{Synthetic Datasets} We generate several networks with different network sizes using Barab\'asi-Albert model, and then apply random walk algorithm to simulate the ground-truth subgraph with size as $10\%$ of network size. The nodes in true subgraph have features following normal distribution $\mathbb{N}(5,1)$, and the features of background nodes follows distribution $\mathbb{N}(0,1)$. The synthetic datasets are used for scalability analysis in terms of size of nodes and size of edges, which we denote them as \textbf{\textit{SynNode}} and \textbf{\textit{SynEdge}} respectively. \paragraph{Real-world Datasets} 1) \textit{\textbf{Beijing Road Traffic Dataset}}: we use static network data per time stamp from 5PM. to 7PM. in previous application. 2) \textit{\textbf{Wikivote Dataset}}\footnote{\url{https://snap.stanford.edu/data/wiki-Vote.html}\label{data:snap}}: the network contains all the Wikipedia voting data from the inception of Wikipedia till January 2008. 3) \textit{\textbf{CondMat Dataset}}\footnote{\url{https://snap.stanford.edu/data/ca-CondMat.html}}: the collaboration network is from the e-print arXiv and covers scientific collaborations between authors papers submitted to Condense Matter category. For Wikivote and CondMat datasets, we simulate the true subgraphs of size $1,000$ using random walk, and the node attribute in true subgraphs follows distribution $\mathbb{N}(5, 1)$, otherwise $\mathbb{N}(0,1)$. 4) \textit{\textbf{DBLP}}\footnote{\url{http://konect.uni-koblenz.de/networks/dblp_coauthor}}: the collaboration graph of authors of scientific papers from DBLP computer science bibliography. An edge between two authors represents a common publication, and node attribute is the number of publications. We extract a subset of the dataset ranging from year 1995 to 2005. We apply random walk to get subgraphs with size 20,000 and inject the anomalies as our true subgraph as suggested by \cite{mongiovi2013netspot}. Statistics of all datasets are provided in Table \ref{table:app2}. \begin{table}[!htbp] \caption{Statistics of Datasets for 2nd Application.} \resizebox{\linewidth}{!}{ \centering \begin{tabular}{|c|c|c|c|c|} \hline \multirow{2}{*}{Datasets} & \multicolumn{4}{c|}{Statistics} \\ \cline{2-5} & \multicolumn{1}{c|}{Node} & \multicolumn{1}{c|}{Edge} & \multicolumn{1}{c|}{Blocks} & \multicolumn{1}{c|}{Processors} \\ \hline SynNode & 1,000$\sim$10,000 & 3,000$\sim$30,000 & 10 & 10\\ SynEdge & 100,000 & 300,000$\sim$1,000,000 & 100 & 50\\ Beijing & 59,000 & 70,317 & 100 & 50\\ Wikivote & 7,115 & 103,689 & 10 & 10\\ CondMat & 23,133 & 93,497 & 100 & 50\\ DBLP & 329,404 & 1,082,106 & 100 & 50\\ \hline \end{tabular}\label{table:app2} } \end{table} \begin{table*}[!htbp] \caption{Results on Beijing, Wikivote, CondMat and DBLP datasets. The run time is measured in seconds.}\label{tab:block} \begin{adjustbox}{center} \centering \setlength\tabcolsep{2pt} \resizebox{\textwidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Method} & \multicolumn{4}{c|}{Beijing} & \multicolumn{4}{c|}{Wikivote} & \multicolumn{4}{c|}{CondMat}& \multicolumn{4}{c|}{DBLP} \\ \cline{2-17} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time& \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time \\ \hline AddtivegGraphScan & 0.4295 & 0.6884 & 0.5192 & 10846.94 & 0.9543 & 0.9959 & 0.9747 & 249.97 & 0.9753 & 0.9900 & \textbf{0.9826} & 1188.33& / & / & / & / \\ EventTree & 0.5547 & 0.5577 & 0.5369 & 90.68 & 0.9088 & 0.9654 & 0.9360 & 80.99 & 0.8623 & 0.9204 & 0.8902 & 100.23& 0.8213 & 0.1922 & 0.3113 & 1961.58 \\ LTSS & 0.5144 & 0.8333 & 0.6320 & \textbf{7.56} & 0.9543 & 0.9959 & 0.9747 & \textbf{1.72} & 0.5174 & 1.0000 & 0.6819 & \textbf{3.85}& 0.3910 & 1.0000 & 0.5622 & \textbf{533.13} \\ GBGP(Serial) & 0.9166 & 0.7286 & \textbf{0.8057} & 843.37 & 0.8287 & 0.9908 & 0.90254 & 610.54 & 0.9132 & 0.9859 & 0.9479 & 1243.71 & 0.4701 & 0.9672 & \textbf{0.6354} & 13497.50 \\ GBGP(Parallel) & 0.9105 & 0.7283 & 0.8028 & 154.12 & 0.9637 & 0.9888 & \textbf{0.9761} & 171.98 & 0.9423 & 0.9835 & 0.9624 & 113.08 & 0.4683 & 0.9672 & 0.6311 & 567.20 \\ \hline \end{tabular} } \end{adjustbox} \end{table*} \setlength{\dbltextfloatsep}{10pt} \paragraph{Performance Metrics} Except for metrics (precision, recall and f-measure) used for evaluating the detection performance, we also compare and report the \textbf{run time} among different methods in this application to evaluate the scalability. \paragraph{Comparison Methods and Results} We compare our method with three baseline methods: 1) \textit{EventTree} \cite{rozenshtein2014event}, 2) \textit{AdditiveGraphScan} \cite{speakman2013dynamic}, and 3) \textit{LTSS} \cite{neill2012fast}, which were designed specifically for event detection on static networks. The average precision, recall, f-measure, as well as run time on all methods are reported in Table \ref{tab:block}. Our method outperforms the baseline methods in terms of f-measure by the compromise on a small amount of run time. Both of baseline methods have their own shortcomings. Despite AdditiveGraphScan can get comparable performance as our method on some datasets, it is a heuristic algorithm without theoretical guarantees and not scalable for large scale networks. We do not report the result of AdditiveGraphScan on DBLP dataset, since it takes over one day to run and infeasible to tune the parameters. EventTree and LTSS are scalable, but their performances are not as good as our method. \paragraph{Scalability Analysis} We evaluate the scalability of different methods in terms of the sizes of nodes and edges. Figure \ref{fig:synthetic} reports the run time of our methods compared with the baseline methods. In order to run our algorithm, we partition the static network into multiple blocks with METIS \cite{karypis1998software}, and run the parallel algorithm with multiple processors. Our method is able to get comparable performance as those customized algorithms of this specific problem, and it is more scalable if we properly utilize the computing resource based on network properties. \paragraph{Parameters Tuning} For all the parameters used in AddtiveGraphScan, EventTree, and LTSS, we follow the same settings as \cite{zhou2016graph,shao2018efficient,neill2012fast}. For parameters in our method, the same strategy as the previous application is used. We deploy multiple processors to run parallelized GBGP algorithm for different datasets, and more details are provided in Table \ref{table:app2}. \textbf{Implementation} We implement all discussed algorithms and perform experiments on 64-bit machines with Intel(R) Xeon(R) CPU E5-2680 v4 @ 2.40GHz and 251GB memory. \section{Related Work} \label{section:related} \paragraph{Structured Sparse Optimization} Sparsity is effective to model latent structure in high-dimensional data and remains a mathematically tractable concept. Beyond the ordinary sparsity model, a variety of structured sparsity models have been proposed to solve specific structured constraints on signals, such as sparsity models defined through trees, groups, clusters, paths and connected subgraphs \cite{hegde2015nearly,hegde2015approximation,zhou2016graph}. Those methods for structured sparsity that focus on general nonlinear cost functions fall into two major categories, including: 1) structured sparsity-inducing norms based and 2) model-projection based, both of which often assume that the cost function $F({\bf x})$ satisfies a certain convexity/smoothness condition, such as Restricted Strong Convexity/Smoothness (RSC/RSS) or Stable Mode-Restricted Hessian (SMRH) \cite{hegde2015approximation, zhou2016graph}. The seminal work on general approximate graph-structured sparsity model is \cite{hegde2015nearly}. The authors present GRAPH-COSAMP, a variant of COSAMP \cite{needell2009cosamp}, for compressive sensing and linear regression problems based on head and tail approximations of $\mathbb{M}(\mathbb{G},s)$. After this work, general structured optimization methods on single graph was proposed to do subgraph \cite{chen2016generalized,zhou2016graph} or subspace \cite{chen2017generic} detection. The work \cite{chen2016generalized} can be viewed as a special case of our work, which handles networks with only one block. \paragraph{Subgraph Detection} Subgraph detection is an important problem in graph mining. Existing methods mainly find subgraphs that satisfy some topological constraints, such as connected subgraphs, dense subgraphs and compact subgraphs. Those graphs with static network structure are what we focus on. According to dynamics of attributes on nodes, the relevant studies can be divided into two parts. For static graphs, the most recent methods include EventTree \cite{rozenshtein2014event}, NPHGS\cite{chen2014non}, and method introduced in \cite{qian2014connected}, in which the first two methods are heuristic and the last one provides performance bounds but is not scalable. For dynamic graphs, the latest methods include Meden \cite{bogdanov2011mining}, NetSpot\cite{mongiovi2013netspot}, AdditiveGraphScan \cite{speakman2013dynamic}, and dGraphScan \cite{shao2018efficient}, which are all heuristic. \paragraph{Interdependent Networks} Research in this field mostly studies static and evolving statistical characteristics of structures in these networks, which does not consider attributes on nodes and edges. Typical applications and problems for interdependent networks include: community structure analysis \cite{gao2014single, gomez2012evolution}, the spread of epidemics, and the organizational laws of social interactions \cite{gao2012networks}, among others. \section{Conclusion and Future Work} \label{section:conclusion} This paper presents a general framework, GBGP, to solve a nonconvex optimization problem subject to graph block-structured constraints in nearly linear time with theoretical approximation guarantee, and it can be applied to a broad class of subgraph detection problems in interdependent networks. A parallel version of our algorithm is also be proposed to improve the scalability. We evaluate our model on two applications, and results of both experiments show that the algorithm enjoys a better effectiveness and efficiency than state of the art methods while our work is a general framework and can be used in more scenarios. For future work, we will extend the work on network data with high-dimensional node attributes and different graph topological constraints. \section{Introduction} Subgraph detection in network data has aroused many interests in recent years because of many real-world applications, such as disease outbreak detection \cite{chen2014non}, intrusion detection in computer networks , event detection in social networks \cite{rozenshtein2014event}, congestion detection in traffic networks, etc. However, most of existing works investigate the subgraph mining on static, isolated networks, and such a problem involving interdependent networks has not been well studied. Interdependent networks are comprised of multiple networks $\{\mathbb{G}^1, \mathbb{G}^2, \dots, \mathbb{G}^k,\dots\}$ and edges $\mathbb{E}^0$ interconnected among networks, where $\mathbb{G}^k = (\mathbb{V}^k, \mathbb{E}^k)$. $\mathbb{V}^k$ and $\mathbb{E}^k$ are vertex set and edge set of $k^{\text{th}}$ network $\mathbb{G}^k$ respectively. Some nodes in different networks exhibit node-node dependencies that could be captured by explicit edges or implicit correlation on node attributes (implicit edges). For instance, a temporal network can be viewed as multiple temporal-dependent networks, in which each network represents a snapshot of the temporal network at a specific time stamp, where current node's attributes depend on attributes in the previous time-stamp implicitly \cite{mucha2010community} (Figure \ref{fig:temporal_network}). A web-scale social network comprised of many communities is a network of networks (a trivial interdependent networks) with explicit connections, where communities can be viewed as small networks or blocks that interconnect with each other (Figure \ref{fig:social_network}). Subgraph detection in multiple interdependent networks can be formulated as a block-structured optimization problem with multiple topological constraints on blocks, \begin{equation}\label{prob:discrete} \begin{gathered} \min_{S_1 \subseteq \mathbb{V}^1, ..., S_K \subseteq \mathbb{V}^K } F(S_1,\cdots, S_K) \\ \mathrm{s.t.} \ \ S_k \ \text{satisfies a pre-defined topological constraint,} \end{gathered} \end{equation} where $F$ is a user-specified cost function regularized by block dependencies, for example, $F$ could be $f(S_1, \cdots, S_K) + g(S_1, \cdots, S_K)$, where $f$ is used to capture signals in interdependent networks and $g$ models the dependencies between networks. $S_k$ is a subset of nodes in $k^{\text{th}}$ network $\mathbb{G}^k$, $ k=1,...,K $. Vanilla subgraph detection problem is a special case of problem (\ref{prob:discrete}) when number of networks (blocks) is 1. \begin{figure} \centering \begin{subfigure}[t]{0.20\textwidth} \centering \includegraphics[width=\linewidth,height=0.85\linewidth]{figures/temporal_network.pdf} \caption{Temporal Networks} \label{fig:temporal_network} \end{subfigure} \hspace{23pt} \begin{subfigure}[t]{0.20\textwidth} \centering \includegraphics[width=\linewidth,height=0.85\linewidth]{figures/social_network.pdf} \caption{Network of Networks} \label{fig:social_network} \end{subfigure} \caption{Examples of Interdependent Networks. (a) Temporal Networks: black dashed lines capture implicit temporal dependencies or consistencies. (b) Network of Networks: black solid lines are bridges across networks.} \label{fig:interdependent_networks} \end{figure} To the best of our knowledge, most of related studies on subgraph detection in interdependent networks only focus on specific applications and are lack of generality. Furthermore, they are heuristic-driven with no theoretical guarantee. Therefore, we propose a general framework that leverages graph structured sparsity model \cite{hegde2015nearly} and block coordinate descent method \cite{fercoq2015accelerated} to solve this problem which can be modeled as a block-structured optimization problem. The contributions of our work are summarized as follows: \begin{itemize} [wide=0pt,leftmargin=\parindent] \item \textbf{Design of an efficient and scalable approximation algorithm.} We propose a novel generic framework, namely, Graph Block-structured Gradient Projection, for block structured nonconvex optimization, which can be used to approximately solve a broad class of subgraph detection problems in interdependent networks in nearly-linear time. \item \textbf{Theoretical guarantees.} We present a theoretical analysis of the proposed GBGP algorithm and show that it enjoys a good convergence rate and a tight error bound on the quality of the detected subgraph. \item \textbf{Two practical applications with comprehensive experiments.} We demonstrate how our framework can be applied to two practical applications: 1) anomalous evolving subgraph detection; 2) subgraph detection in network of networks. We conduct comprehensive experiments on both synthetic and real networks to validate the effectiveness and efficiency of our proposed algorithm. \end{itemize} \section{Methodology}\label{section:method} \subsection{Problem Formulation} First, we reformulate the combinatorial problem (\ref{prob:discrete}) in discrete space as an nonconvex optimization problem in continuous space. Interdependent networks can be viewed as one large network $\mathbb{G}= (\mathbb{V}, \mathbb{E})$, where $\mathbb{V} = \{1,\cdots, N\}$ could be cut into $\{\mathbb{V}^1, \cdots, \mathbb{V}^K \}$ and $\mathbb{E}$ could be split into $\{\mathbb{E}^0, \mathbb{E}^1, \cdots, \mathbb{E}^K\}$. Each pair of $(\mathbb{V}^k, \mathbb{E}^k)$ forms a small network $\mathbb{G}^k$ for $k = 1,\cdots, K$, and $\mathbb{E}^0$ are edges interconnected among different small networks. Edges in $\mathbb{E}^0$ should be treated differently with the edges in each $\mathbb{E}^k$, since they models the dependencies among different networks. ${\bf W} = [{\bf w}_1, \cdots, {\bf w}_N]\in \mathbb{R}^{P\times N}$ is the feature matrix, and ${\bf w}_i\in \mathbb{R}^P$ is the feature vector of vertex $i$, $i\in\mathbb{V}$. $N_k = |\mathbb{V}^k|$ is the size of the subset of vertices $\mathbb{V}^k$. The general subgraph detection problem in interdependent networks can be formulated as following general block-structured optimization problem with topological constraints: \begin{equation} \begin{gathered} \min_{{\bf x}=({\bf x}^1,\dots,{\bf x}^K)} F({\bf x}_1,\dots,{\bf x}_K) \ \ \\ \mathrm{s.t.}\ \ \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s),\ \ k = 1, \cdots, K \label{eq:gen_prob} \end{gathered} \end{equation} where the vector ${\bf x} \in \mathbb{R}^N$ is partitioned into multiple disjoint blocks ${\bf x}^1 \in \mathbb{R}^{N_1}, \cdots, {\bf x}^K \in \mathbb{R}^{N_K}$, and ${\bf x}^k$ are variables associated with nodes of network $\mathbb{G}^k$. The objective function $F(\cdot)$ is a continuous, differentiable and convex function, which will be defined based on the feature matrix ${\bf W}$. In addition, $F(\cdot)$ could be decomposed as $f({\bf x}) + g({\bf x})$, where $f$ is used to capture signals on nodes in interdependent networks and $g$ models the dependencies between networks. $\text{supp}({\bf x}^k)$ denotes the support set of vector ${\bf x}^k$, $\mathbb{M}(\mathbb{G}^k, s)$ denotes all possible subsets of vertices in $\mathbb{G}^k$ that satisfy a certain predefined topological constraint. One example of topological constraint for defining $\mathbb{M}(\mathbb{G}^k, s)$ is connected subgraph, and we can formally define it as follows: \begin{equation} \mathbb{M}(\mathbb{G}^k, s) \coloneqq \{S | S \subseteq \mathbb{V}^k; |S| \leq s; \mathbb{G}^k_S\ \text{is connected.} \} \end{equation} where $s$ is a predefined upperbound size of $S$, $S\subseteq \mathbb{V}^k$ , and $\mathbb{G}^k_S$ refers to the induced subgraph by a set of vertices $S$. The topological constraints can be any graph structured sparsity constraints on $\mathbb{G}^k_S$, such as connected subgraphs, dense subgraphs, compact subgraphs \cite{chen2016generalized}. Moreover, we do not restrict all $\mathrm{supp}({\bf x}^1),\cdots, \mathrm{supp}({\bf x}^K)$ satisfying an identical topological constraint. \begin{algorithm \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}, $ i=0 $, $ {\bf x}^{k,i}=\text{initial vectors}$, k=1,\dots, K \Repeat \For{$k = 1,\cdots, K$} \State $\Gamma_{{\bf x}^{k}}=H(\nabla_{{\bf x}^{k}} F({\bf x}^{1,i}, \dots,{\bf x}^{K,i}))$ \State $\Omega_{{\bf x}^{k}}=\Gamma_{{\bf x}^{k}}\cup\mathrm{supp}({\bf x}^{k,i})$ \EndFor \State Get $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ by solving problem (\ref{sub-p1})\label{alg:line:subproblem} \For{$k = 1, \cdots, K$} \State $ \Psi_{{\bf x}^{k}}^{i+1}=T({\bf b}_{{\bf x}^k}^i) $ \State $ {\bf x}^{k,i+1}=[{\bf b}_{{\bf x}^{k}}^i]_{\Psi_{{\bf x}^{k}}^{i+1}} $ \EndFor \State $ i=i+1 $ \Until{$ \sum_{k=1}^{K} \left\|{\bf x}^{k,i+1}-{\bf x}^{k,i}\right\|\leq \epsilon $} \State $ C=(\Psi_{x^1}^{i}, \dots, \Psi_{{\bf x}^k}^{i}) $ \Return $ ( {\bf x}^{1,i}, \cdots, {\bf x}^{K,i}) , C $ \end{algorithmic} \caption{Graph Block-structured Gradient Projection}\label{alg:gbmp} \end{algorithm} \setlength{\textfloatsep}{7pt} \subsection{Head and Tail Projections on $\mathbb{M}(\mathbb{G}, s)$} \begin{itemize}[leftmargin=*] \item \textbf{Tail Projection} ($T({\bf x})$): is to find a subset of nodes $S \subseteq \mathbb{V}$ such that \begin{equation} \|{\bf x} - {\bf x}_{S}\|_2 \leq c_{T} \cdot \min_{S' \in \mathbb{M}(\mathbb{G}, s)} \|{\bf x} - {\bf x}_{S'}\|_2, \end{equation} where $c_{T} \geq 1$, and ${\bf x}_S$ is a restriction of ${\bf x}$ on $S$ such that: $({\bf x}_S)_i = ({\bf x})_i$ if $i \in S$, and $({\bf x}_S)_i=0$ otherwise. When $c_{T} = 1$, $T({\bf x})$ returns an optimal solution to the problem: $\min_{S'\in \mathbb{M}(\mathbb{G},s)} \|{\bf x}-{\bf x}_{S'}\|_2$. When $c_T > 1$, $T({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_T$. \item \textbf{Head Projection} ($H({\bf x})$): is to find a subset of nodes $S$ such that \begin{equation} \|{\bf x}_{S}\|_2 \geq c_{H}\cdot \max_{S'\in \mathbb{M}(\mathbb{G}, s)} \|{\bf x}_{S'}\|_2, \end{equation} where $c_H\leq1$. When $c_H = 1$, $H({\bf x})$ returns an optimal solution to the problem: $\max_{S' \in \mathbb{M}(\mathbb{G},s)} \|{\bf x}_{S'}\|_2$. When $c_H < 1$, $H({\bf x})$ returns an approximate solution to this problem with the approximation factor $c_H$. \end{itemize} Although the head and tail projections are NP-hard when we restrict $c_T = 1$ and $c_H = 1$, these two projections can still be implemented in nearly-linear time when approximated solutions with $c_{T} > 1$ and $c_H < 1$ are allowed. \subsection{Algorithm Details} We propose a novel Graph Block-structured Gradient Projection, namely GBGP, to approximately solve problem (\ref{eq:gen_prob}) in nearly-linear time on the network size. The key idea is to alternatively search for a close-to-optimal solution by solving easier sub-problems for graph $\mathbb{G}_k$ in each iteration $i$ until converged. The pseudo-code of our proposed algorithm is described in Algorithm \ref{alg:gbmp}. Our algorithm can be decomposed into three main steps, including: \begin{itemize}[leftmargin=*] \item \textbf{Step 1}: alternatively identify a subset of nodes in each block $\Omega_{{\bf x}^k}$, in which pursuing the minimization will be most effective (\textbf{Line 2 $\sim$ 5}). \item \textbf{Step 2}: identify the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ that minimizes the objective function in intermediate space $\cup_{k=1}^{K} \Omega_{{\bf x}^k}$ (\textbf{Line 6}); \begin{equation} \begin{gathered} \hspace*{-10pt}\left( {\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i \right) = \argmin\limits_{{\bf x}^1,\dots,{\bf x}^K} F({\bf x}^1,\dots,{\bf x}^K) \\ \mathrm{s.t.}\, \ \ \mathrm{supp}({\bf x}^k)\subseteq \Omega_{{\bf x}^k} \label{sub-p1} \end{gathered} \end{equation} \item \textbf{Step 3}: alternatively apply tail projections on the intermediate solution $({\bf b}_{{\bf x}^1}^i,\dots,{\bf b}_{{\bf x}^K}^i)$ to the feasible space defined by constraints: ``$\text{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s)$" (\textbf{Line 7 $\sim$ 10}). \end{itemize} We utilize the \textit{block-coordinate descent method} with \textit{proximal linear update} \cite{tseng2009coordinate,shi2016primer} to solve the problem (\ref{sub-p1}) (Algorithm \ref{alg:block}). In addition, proximal linear update is used to ensure the convergence of the algorithm on convex problems with convex constraints ``$\textrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k}$". The proximal linear update in our scenario is defined by: \begin{equation}\label{prob:proximal} {\fontsize{9}{10} \begin{aligned} \hspace{-10pt}{\bf x}^{k, t+1} = &\argmin_{{\bf x}^k} F(\hat{\bf x}^{t}) + \langle \nabla_{{\bf x}^k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t}), {\bf x}^{k} - \hat{\bf x}^{k, t} \rangle\\ & + \frac{1}{2 \alpha^{k, t}}\|{\bf x}^{k} - {\bf \hat{x}}^{k, t}\|_2^2\qquad\mathrm{s.t.} \ \ \mathrm{supp}({\bf x}^{k}) \subseteq \Omega_{{\bf x}^k}\hspace{-7pt} \end{aligned} } \end{equation} where $\alpha^{k, t}$ serves as a step size and can be set as the reciprocal of the Lipschitz constant of $\nabla_{k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t})$, and $\hat{\bf x}^{k, t}$ (\textbf{Line 4}) is an extrapolated point that helps accelerate the convergence of the proximal point update scheme. The overall block coordinated gradient projection method on convex function with convex constraint (i.e. Algorithm \ref{alg:block}) has a sublinear rate of convergence \cite{shi2016primer}. \begin{algorithm}[H] \begin{algorithmic}[1] \Statex \textbf{Input}: $\{\mathbb{G}^{1},\dots,\mathbb{G}^{K}\}$ \Statex \textbf{Output}: ${\bf x}^{1, t}, \cdots, {\bf x}^{K, t}$ \Statex \textbf{Initialization}: $t = 0, \epsilon = 10^{-3}, \rho_0 = 1.$ \Repeat \State \text{Choose index } $k \in \{1, \cdots, K\}$ \State $\omega_{t} = (\rho_t - 1) / \rho_t,\ $ \State $\hat{\bf x}^{k, t} = {\bf x}^{k, t} + \omega_{t} ({\bf x}^{k, t} - {\bf x}^{k,t-1})$ \State Update ${\bf x}^{k, t + 1} \leftarrow {\bf \hat{x}}^{k, t} - \frac{1}{\alpha^{k, t}} \nabla_{k} F(\hat{\bf x}^{k,t}, \hat{\bf x}^{\neq k, t})$ \State Project ${\bf x}^{k, t+1}$ to feasible space by setting entries of ${\bf x}^{k, t+1}$ to zero if index of entry not in set $\Omega_{{\bf x}^k}$. \State Keep ${\bf x}^{j, t+1} = {\bf x}^{j, t}$, for all $j \neq k$ \State $\rho_{t+1} = (1+\sqrt{1 + 4 \rho_{t}^2})/2,$ \State Let $t = t+1$ \Until{$\sum_{k=1}^{K} \|{\bf x}^{k, t} - {\bf x}^{k, t-1}\| \le \epsilon$} \Return $\{{\bf x}^{1, t}, \cdots, {\bf x}^{K, t}\}$ \end{algorithmic} \caption{Block-Coordinate Descent Method with Proximal Linear Update to Solve Problem (\ref{sub-p1})}\label{alg:block} \end{algorithm} \section{Theoretical Analysis} \label{section:theory} In order to demonstrate the accuracy and efficiency of GBGP, we require that the objective function $F({\bf x})$ satisfies the Weak Restricted Strong Convexity (WRSC) condition, which is a variant of the Restricted Strong Convexity/Smoothness (RSC/RSS) \cite{yuan2014gradient}: \begin{definition}[Weak Restricted Strong Convexity (WRSC)]\label{def:wrsc} A function $F({\bf x})$ has condition $(\xi,\delta,\mathbb{M})$-WRSC, if $\forall {\bf x}, {\bf y}\in\mathbb{R}^N$ and $\forall S\in\mathbb{M}$ with $\mathrm{supp}({\bf x})\cup\mathrm{supp}({\bf y})\subseteq S$, the following inequality holds for some $\xi >0$ and $0<\delta<1$: \begin{equation} \|{\bf x}-{\bf y}-\xi\nabla_S F({\bf x})+\xi\nabla_S F({\bf y})\|_2\leq\delta\|{\bf x}-{\bf y}\|_2 \end{equation} where ${\bf x}=({\bf x}^1,\dots,{\bf x}^K), {\bf y}=({\bf y}^1,\dots,{\bf y}^K), {\bf x}^k, {\bf y}^k\in\mathbb{R}^{N_k}, k=1,\dots,K$, topological constraint $\mathbb{M}$ can be expressed as $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}(\mathbb{G}^k,s_k), s=\sum_{k=1}^K s_k$, and the subgraph in $k^{\text{th}}$ block (i.e., $\mathbb{G}^k$) is $S_k$, which satisfies $|S_k|\leq s_k, S_k\subseteq \mathbb{V}^k, S=\bigcup_{k=1}^K S_k, |S|\leq s$. Here, since constraints on blocks are independent, we use union sign ``$\bigcup$" to denote combined model $\mathbb{M}$, in which ${\bf x}\in\mathbb{M}=\{{\bf x}|{\bf x}^k\in\mathbb{M}(\mathbb{G}^k,s_k),k=1,\dots,K\}$. \end{definition} \begin{theorem}\label{thm:convege} Consider the graph block-structured constraint with $K$ blocks $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}(\mathbb{G}^k,s_k)$ and a cost function $F:\mathbb{R}^N\to\mathbb{R}$ that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G},8s))$-WRSC. If $\eta=c_H(1-\delta)-\delta>0$, then for any true ${\bf x}^*\in\mathbb{R}^N$ with $\mathrm{supp}({\bf x}^*)\in\mathbb{M}((\mathbb{G},s)$, the iteration of algorithm obeys \begin{equation} \|{\bf x}^{i+1}-{\bf x}^*\|_2\leq\alpha\|{\bf x}^i-{\bf x}^*\|_2+\beta\|\nabla_I F({\bf x}^*)\|_2 \end{equation} where $c_H=\min_{k=1,\dots,K}\{{c_{H_k}}\}$, $c_T=\max_{k=1,\dots,K}\{{c_{T_k}}\}$, $I=\argmax_{S\in\mathbb{M}}\|\nabla_S F({\bf x})\|_2$, $\alpha=\frac{1+c_T}{1-\delta}\sqrt{1-\eta^2}$, and $\beta=\frac{\xi(1+c_T)}{1-\delta}\left[\frac{1+c_H}{\eta}+\frac{\eta(1+c_H)}{\sqrt{1-\eta^2}}+1 \right]$. $c_{H_k}$ and $c_{T_k}$ denote head and tail projection approximation factors on $k^{\text{th}}$ block. \end{theorem} \begin{theorem}\label{thm:time} Let ${\bf x}^*\in\mathbb{R}^N$ be a true optimum such that $\mathrm{supp}({\bf x}^*)\in\mathbb{M}(\mathbb{G}, s)$, and $F:\mathbb{R}^N\to\mathbb{R}$ be a cost function that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G}, 8s))$-WRSC. Assuming that $\alpha<1$, GBGP returns an $\hat{{\bf x}}$ such that, $\mathrm{supp}(\hat{{\bf x}})\in\mathbb{M}(\mathbb{G}, 5s)$ and $\|{\bf x}^*-\hat{{\bf x}}\|_2\leq c\|\nabla_{I}F({\bf x}^*)\|_2$, where $c=(1+\frac{\beta}{1-\alpha})$ is a fixed constant. Moreover, GBGP runs in time \begin{equation} {\fontsize{8}{8} O\left(\left(T+\sum_{k=1}^K|\mathbb{E}^k|\log^3 N_k\right)\log\left(\frac{\|{\bf x}^*\|_2}{\|\nabla_{I}F({\bf x}^*)\|_2}\right) \right) } \end{equation} where $|\mathbb{E}^k|$, $N_k$ denote edge and node size of $k^{\text{th}}$ block and $T$ is the time complexity of one execution of the subproblem in line \ref{alg:line:subproblem} of Algorithm \ref{alg:gbmp}. In particularly, if $T$ scales linearly with $N$ and $|\mathbb{E}|$, then GBGP scales \textbf{nearly linearly} with $N$ and $|\mathbb{E}|$. \end{theorem} Note that the proofs of Theorem \ref{thm:convege} and Theorem \ref{thm:time} are omitted due to space limitation. \section{Example Applications} \label{section:example} In this section, we show how to formulate two subgraph detection applications: 1) anomalous evolving subgraph detection and 2) subgraph detection in network of networks as problem (\ref{eq:gen_prob}) with specific objective function $F$ and topological constraints. For these two applications, we leverage the \textbf{Elevated Mean Scan} (EMS) statistics, which is is defined as: $ {\bf c}^\top {\bf x}/\sqrt{{\bf x}^\top {\bf 1}}$, where ${\bf x} \in \{0,1\}^N$, ${\bf c}$ denotes the feature vector of all nodes, and $c_i \in \mathbb{R}$ denotes the uni-variate feature for node $i$. Assuming $S$ is some unknown anomalous cluster which forms a connected component, $S\subseteq \mathbb{V}$. Empirically, maximizing the score of EMS leads to discovering significant nodes in the network precisely. Instead of maximizing the EMS in the domain $\{0,1\}^N$, we relax EMS to continuous space and minimize the relaxed negative EMS in our applications, which can be defined as: \begin{equation} -\frac{({\bf c}^\top {\bf x})^2}{ {\bf x}^\top {\bf 1}} + \frac{1}{2} \|{\bf x}\|_2^2 \ \ \ \text{where} \ \ {\bf x} \in [0, 1]^N \end{equation} Most importantly, the relaxed negative EMS satisfies the RSC/RSS condition when ${\bf c}$ is normalized, which implies WRSC condition \cite{chen2016generalized,yuan2014gradient}. \subsection{Anomalous Evolving Subgraphs Detection} We can leverage the relaxed EMS and mathematically formulate the anomalous evolving subgraphs detection problem as nonconvex optimization with convex objective function and block-structured constraints: \begin{equation} \hspace{-5pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{ ({{\bf c}^k}^\top {\bf x}^k)^2}{{{\bf x}^k}^\top {\bf 1}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+ \lambda \cdot \sum_{k=2}^{K} \|{\bf x}^k - {\bf x}^{k-1}\|_2^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s) \end{aligned}\hspace{-10pt} } \end{equation} where the first term is the summation of relaxed negative EMS, and the second term is soft constraints on ${\bf x}^{k}$ and ${\bf x}^{k-1}$ to ensure temporal consistency on detected subgraphs, and $\lambda > 0$ is a trade-off parameter. The connected subset of nodes at time stamp $k$ can be found as $S_k = \mathrm{supp}({\bf x}^{k})$, i.e., the support set of the estimated ${\bf x}^{k}$ that minimizes the objective function. \subsection{Subgraph Detection in Network of Networks} Our proposed framework is also applicable to subgraph detection in network of networks. \begin{table*}[!htbp] \caption{Results on synthetic datasets with different $\mu$. It shows that GBGP is more robust than Meden and Netspot.}\label{tab:noise} \begin{adjustbox}{center} \centering \resizebox{0.75\textwidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{$\mu=3$} & \multicolumn{3}{c|}{$\mu=4$} & \multicolumn{3}{c|}{$\mu=5$} \\ \cline{2-10} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7588 & 0.7342 & 0.7453 & 0.8836 & 0.8591 & 0.8709 & 0.9646 & 0.9145 & 0.9388 \\ NetSpot & 0.6658 & 0.7267 & 0.6947 & 0.7615 & 0.7922 & 0.7763 & 0.7956 & 0.8185 & 0.8068 \\ GBGP & 0.6468 & 0.8899 & \textbf{0.7489} & 0.8487 & 0.9674 & \textbf{0.9041} & 0.9553 & 0.9914 & \textbf{0.9730} \\ \hline \end{tabular} } \end{adjustbox} \end{table*} For subgraph detection in a network of networks, we can also leverage the relaxed negative $\text{EMS}$ and formulate the detection problem in large-scale networks as follows: \vspace{-2pt} \begin{equation} \hspace{-3pt} {\fontsize{8}{9} \begin{aligned} \min_{{\bf x}^{1},\cdots,{\bf x}^{K}} &\sum_{k=1}^{K} \left(-\frac{({{\bf c}^{k}}^\top {\bf x}^{k})^2}{{{\bf x}^{k}}^\top {\bf 1}} + \frac{1}{2}\|{\bf x}^{k}\|_2^2 \right)+\lambda \cdot \sum_{i,j} e_{ij} \cdot (x_i - x_j)^2 \\ &\ \ \ \ \ \ \ \ \ \ \ \ \ \mathrm{s.t.}\,\, \mathrm{supp}({\bf x}^k) \in \mathbb{M}(\mathbb{G}^k, s) \end{aligned} }\hspace{-15pt} \end{equation} where the first term is the summation of relaxed negative EMS, the second term is soft constraints on bridge nodes of two partitions to ensure dependencies; $e_{ij} = 1$ if node $i$ and node $j$ are connected but in two different partitions (in other words, edge $(i,j)$ is an graph cut), otherwise $e_{ij} = 0$, $x_i$ and $x_j$ are $i^{\text{th}}$ and $j^{\text{th}}$ entries of ${\bf x}$, and $\lambda > 0$ is a trade-off parameter. In addition, we propose a parallel version of our algorithm to speed up the computation by integrating the APPROX algorithm, a randomized coordinate descent method proposed in \cite{fercoq2015accelerated}. \section{Experiments}\label{section:experiment} \begin{table}[!htbp] \caption{Statistics of Datasets for the 1st Application.} \begin{adjustbox}{center} \resizebox{0.85\linewidth}{!}{ \centering \begin{tabular}{|c|c|c|c|c|} \hline \multirow{2}{*}{Datasets} & \multicolumn{4}{c|}{Statistics} \\ \cline{2-5} & \multicolumn{1}{c|}{Node} & \multicolumn{1}{c|}{Edge} & \multicolumn{1}{c|}{Timestamp} & \multicolumn{1}{c|}{Resolution} \\ \hline Synthetic & 3,000 & 11,984 & 7 & NA \\ Water Pollution & 12,527 & 14,831 & 8 & 60 min. \\ Washington D.C. & 1,188 & 1,323 & 17 & 60 min. \\ Beijing & 59,000 & 70,317 & 12 & 10 min. \\ \hline \end{tabular}\label{table:app1} } \end{adjustbox} \end{table} \subsection{Anomalous Evolving Subgraph Detection} \paragraph{Synthetic Dataset} We generate networks using Barab\'asi-Albert preferential attachment model \cite{barabasi1999emergence}. The evolving true subgraphs spanning within 7 time stamps are simulated from node size 100 to 300, and the true subgraphs in two consecutive time stamps have $50\%$ of node overlap. The univariate feature values of background nodes and true nodes are randomly generated in $\mathbb{N}(0,1)$ and $\mathbb{N}(\mu, 1)$ distributions, respectively. We generate 50 temporal networks for each setting of $\mu = [3,4,5]$. \paragraph{Real-world Dataset} 1) \textbf{\textit{ Water Pollution Dataset}}: a real world sensor network \cite{ostfeld2008battle}. For each hour, each vertex has a sensor that reports 1 if it is polluted; otherwise, reports 0. 2) \textbf{\textit{Washington D.C. Road Traffic Dataset}}: a traffic dataset of Washington D.C from INRIX \footnote{http://inrix.com/publicsector.asp.}. 3) \textbf{\textit{ Beijing Road Traffic Dataset}}: the dataset contains the real-time traffic conditions of Beijing city. \cite{shang2014inferring}. For both traffic datasets, the node attribute is the difference between reference speed and current speed, and the true congested roads are provided. Statistics of all datasets are provided in Table \ref{table:app1}. \paragraph{Performance Metrics} Precision, Recall, and F-measure are deployed to evaluate the quality of detected subgraphs by different methods. Higher F-measure reveals better overall performance. For synthetic data, we use the averaged precision, recall, and f-measure over 50 simulated examples. \paragraph{Comparison Methods and Results} We compare our algorithm with two state of the art baseline methods: \textit{Meden} \cite{bogdanov2011mining} and \textit{NetSpot} \cite{mongiovi2013netspot}, which were designed specifically for detecting significant anomalous region in dynamic networks and provide implementations. The comparison of results are reported in Table \ref{tab:noise} and Table \ref{tab:evo}. As you can see, our method outperforms these two baseline methods on both synthetic data and real-world data. Both of baselines are heuristic, which can not guarantee the quality of results and cause worse performance than ours. \begin{table}[!htbp] \caption{Results on Washingtong D.C. and Beijing datasets. }\label{tab:evo} \centering \setlength\tabcolsep{3pt} \resizebox{\linewidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Methods} & \multicolumn{3}{c|}{Washington D.C.} & \multicolumn{3}{c|}{Beijing} \\ \cline{2-7} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & F-measure \\ \hline Meden & 0.7076 & 0.7662 & 0.7342 & 0.6424 & 0.7509 & 0.6882 \\ NetSpot & 0.5823 & 0.7098 & 0.6367 & 0.6789 & 0.7351 & 0.6973 \\ GBGP & 0.7049 & 0.9192 & \textbf{0.7853} & 0.6627 & 0.9634 & \textbf{0.7788} \\ \hline \end{tabular} } \end{table} \begin{figure*} \centering \begin{subfigure}[t]{0.24\textwidth} \centering \includegraphics[width=\linewidth,height=0.7\linewidth]{figures/precision_water_2.pdf} \caption{Precision vs Noise Level} \label{fig:water:a} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.24\textwidth} \centering \includegraphics[width=\linewidth,height=0.7\linewidth]{figures/recall_water_2.pdf} \caption{Recall vs Noise Level} \label{fig:water:b} \end{subfigure} \hspace{0pt} \begin{subfigure}[t]{0.24\textwidth} \centering \includegraphics[width=\linewidth,height=0.7\linewidth]{figures/fm_water_2.pdf} \caption{F-measure vs Noise Level} \label{fig:water:c} \end{subfigure} \caption{Precision, Recall, and F-measure curves on Water Pollution dataset with respect to different noise ratios.} \label{fig:water:noise} \end{figure*} \begin{figure}[ht] \vspace{-7pt} \centering \begin{subfigure}[t]{0.23\textwidth} \centering \includegraphics[width=\linewidth,height=0.75\linewidth]{figures/node_time_6} \caption{Run Time vs Nodes} \label{fig:synthetic:a} \end{subfigure} \begin{subfigure}[t]{0.23\textwidth} \centering \includegraphics[width=\linewidth,height=0.75\linewidth]{figures/edge_time_6} \caption{Run Time vs Edges} \label{fig:synthetic:b} \end{subfigure} \vspace{-3pt} \caption{Comparison of run time on synthetic datasets. Figure (a) shows our methods run in nearly linear time w.r.t to the network size, where $|\mathbb{E}|=3|\mathbb{V}|$. Figure (b) shows that our algorithm can be easily scaled up to $1,000,000$ edges with node size $|\mathbb{V}| = 100,000$, by contrast, the AdditiveGraphScan runs over $10,000$ seconds on all cases.} \label{fig:synthetic} \end{figure} \paragraph{Robustness Validation} Except for measuring the accuracy of subgraph detection, we also test the robustness of subgraph detection method on water pollution dataset as \cite{shao2017efficient,zhou2016graph}. $P$ percent of nodes are selected randomly, and their sensor binary values are flipped in order to test the robustness of methods to noises, where $P \in \{2, 4, 6, 8, 10\}$. Figure \ref{fig:water:noise} shows the precision, recall, and f-measure of all the comparison methods on the detection of polluted nodes in the water pollution dataset with respect to different noise ratios. The results indicate that our proposed method GBGP is the best overall performance for all of the settings, which verifies the robustness of our method. \subsection{Subgraph Dectection in Network of Networks} \paragraph{Synthetic Datasets} We generate several networks with different network sizes using Barab\'asi-Albert model, and then apply random walk algorithm to simulate the ground-truth subgraph with size as $10\%$ of network size. The nodes in true subgraph have features following normal distribution $\mathbb{N}(5,1)$, and the features of background nodes follows distribution $\mathbb{N}(0,1)$. The synthetic datasets are used for scalability analysis in terms of size of nodes and size of edges, which we denote them as \textbf{\textit{SynNode}} and \textbf{\textit{SynEdge}} respectively. \paragraph{Real-world Datasets} 1) \textit{\textbf{Beijing Road Traffic Dataset}}: we use static network data per time stamp from 5PM. to 7PM. in previous application. 2) \textit{\textbf{Wikivote Dataset}}\footnote{\url{https://snap.stanford.edu/data/}\label{data:snap}}: the network contains all the Wikipedia voting data from the inception of Wikipedia till January 2008. 3) \textit{\textbf{CondMat Dataset}\textsuperscript{\ref{data:snap}}}: the collaboration network is from the e-print arXiv and covers scientific collaborations between authors papers submitted to Condense Matter category. For Wikivote and CondMat datasets, we simulate the true subgraphs of size $1,000$ using random walk, and the node attribute in true subgraphs follows distribution $\mathbb{N}(5, 1)$, otherwise $\mathbb{N}(0,1)$. 4) \textit{\textbf{DBLP}}\footnote{\url{http://konect.uni-koblenz.de/networks/dblp_coauthor}}: the collaboration graph of authors of scientific papers from DBLP computer science bibliography. An edge between two authors represents a common publication, and node attribute is the number of publications. We extract a subset of the dataset ranging from year 1995 to 2005. We apply random walk to get subgraphs with size 20,000 and inject the anomalies as our true subgraph as suggested by \cite{mongiovi2013netspot}. Statistics of all datasets are provided in Table \ref{table:app2}. \begin{table}[!htbp] \vspace{-5pt} \caption{Statistics of Datasets for the 2nd Application.} \begin{adjustbox}{center} \resizebox{0.85\linewidth}{!}{ \centering \begin{tabular}{|c|c|c|c|c|} \hline \multirow{2}{*}{Datasets} & \multicolumn{4}{c|}{Statistics} \\ \cline{2-5} & \multicolumn{1}{c|}{Node} & \multicolumn{1}{c|}{Edge} & \multicolumn{1}{c|}{Blocks} & \multicolumn{1}{c|}{Processors} \\ \hline SynNode & 1,000$\sim$10,000 & 3,000$\sim$30,000 & 10 & 10\\ SynEdge & 100,000 & 300,000$\sim$1,000,000 & 100 & 50\\ Beijing & 59,000 & 70,317 & 100 & 50\\ Wikivote & 7,115 & 103,689 & 10 & 10\\ CondMat & 23,133 & 93,497 & 100 & 50\\ DBLP & 329,404 & 1,082,106 & 100 & 50\\ \hline \end{tabular}\label{table:app2} } \end{adjustbox} \end{table} \begin{table*}[!htbp] \caption{Results on Beijing, Wikivote, CondMat and DBLP datasets. The run time is measured in seconds.}\label{tab:block} \begin{adjustbox}{center} \centering \setlength\tabcolsep{2pt} \resizebox{\textwidth}{!}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|} \hline \multirow{2}{*}{Method} & \multicolumn{4}{c|}{Beijing} & \multicolumn{4}{c|}{Wikivote} & \multicolumn{4}{c|}{CondMat}& \multicolumn{4}{c|}{DBLP} \\ \cline{2-17} & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time & \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time& \multicolumn{1}{c|}{Precision} & \multicolumn{1}{c|}{Recall} & \multicolumn{1}{c|}{F-measure} & Run Time \\ \hline AddtivegGraphScan & 0.4295 & 0.6884 & 0.5192 & 10846.94 & 0.9543 & 0.9959 & 0.9747 & 249.97 & 0.9753 & 0.9900 & \textbf{0.9826} & 1188.33& / & / & / & / \\ EventTree & 0.5547 & 0.5577 & 0.5369 & 90.68 & 0.9088 & 0.9654 & 0.9360 & 80.99 & 0.8623 & 0.9204 & 0.8902 & 100.23& 0.8213 & 0.1922 & 0.3113 & 1961.58 \\ LTSS & 0.5144 & 0.8333 & 0.6320 & \textbf{7.56} & 0.9543 & 0.9959 & 0.9747 & \textbf{1.72} & 0.5174 & 1.0000 & 0.6819 & \textbf{3.85}& 0.3910 & 1.0000 & 0.5622 & \textbf{533.13} \\ GBGP(Serial) & 0.9166 & 0.7286 & \textbf{0.8057} & 843.37 & 0.8287 & 0.9908 & 0.90254 & 610.54 & 0.9132 & 0.9859 & 0.9479 & 1243.71 & 0.4701 & 0.9672 & \textbf{0.6354} & 13497.50 \\ GBGP(Parallel) & 0.9105 & 0.7283 & 0.8028 & 154.12 & 0.9637 & 0.9888 & \textbf{0.9761} & 171.98 & 0.9423 & 0.9835 & 0.9624 & 113.08 & 0.4683 & 0.9672 & 0.6311 & 567.20 \\ \hline \end{tabular} } \end{adjustbox} \end{table*} \setlength{\dbltextfloatsep}{10pt} \paragraph{Performance Metrics} Except for metrics (precision, recall and f-measure) used for evaluating the detection performance, we also compare and report the \textbf{run time} among different methods in this application to evaluate the scalability. \paragraph{Comparison Methods and Results} We compare our method with three baselines: 1) \textit{EventTree} \cite{rozenshtein2014event}, 2) \textit{AdditiveGraphScan} \cite{speakman2013dynamic}, and 3) \textit{LTSS} \cite{neill2012fast}, which were designed specifically for event detection on static networks. The average precision, recall, f-measure, as well as run time on all methods are reported in Table \ref{tab:block}. Our method outperforms the baselines in terms of f-measure by the compromise on a small amount of run time. All of baselines have their own shortcomings. Despite AdditiveGraphScan can get comparable performance as our method on some datasets, it is a heuristic algorithm without theoretical guarantees and not scalable for large scale networks. We do not report the result of AdditiveGraphScan on DBLP dataset, since it takes over one day to run and infeasible to tune the parameters. EventTree and LTSS are scalable, but their performances are not as good as our method. \paragraph{Scalability Analysis} We evaluate the scalability of different methods in terms of the sizes of nodes and edges. Figure \ref{fig:synthetic} reports the run time of our methods compared with the baseline methods. In order to run our algorithm, we partition the static network into multiple blocks with METIS \cite{karypis1998fast}, and run the parallel algorithm with multiple processors. Our method is able to get comparable performance as those customized algorithms of this specific problem, and it is more scalable if we properly utilize the computing resource based on network properties. \section{Related Work} \label{section:related} \textit{a) Subgraph Detection.} Subgraph detection methods mainly find subgraphs that satisfy some topological constraints, such as connected subgraphs, dense subgraphs and compact subgraphs, including EventTree \cite{rozenshtein2014event}, NPHGS\cite{chen2014non} for static graphs, Meden \cite{bogdanov2011mining}, NetSpot\cite{mongiovi2013netspot}, and AdditiveGraphScan \cite{speakman2013dynamic} for dynamic graphs, which are all heuristic. \textit{b) Structured Sparse Optimization.} The seminal work on general approximate graph-structured sparsity model is \cite{hegde2015nearly}. General structured optimization methods on single graph was proposed to do subgraph \cite{chen2016generalized,zhou2016graph} or subspace \cite{chen2017generic} detection. \section{Conclusion and Future Work} \label{section:conclusion} This paper presents a general framework, GBGP, to solve a nonconvex optimization problem subject to graph block-structured constraints in nearly linear time with a theoretical approximation guarantee. We evaluate our model on two applications, and results of both experiments show that the algorithm enjoys better effectiveness and efficiency than state of the art methods while our work is a general framework and can be used in more scenarios. For future work, we will extend the work on network data with high-dimensional node attributes and different graph topological constraints. \section*{Acknowledgments} The first author has been supported by the CSC scholarship. This work has been supported by the National Key Research and Development Program of China under grant 2016YFB1000901, the National Natural Science Foundation of China under grant 91746209, the Program for Changjiang Scholars and Innovative Research Team in University (PCSIRT) of the Ministry of Education of China under grant IRT17R32, and the US National Science Foundation under grant IIS-1815696 and IIS-1750911. \bibliographystyle{IEEEtran} \section{Proofs} \subsection{Theorem 1} \begin{definition}[Weak Restricted Strong Convexity Property (WRSC) for Multiple Blocks]\label{def:wrsc} A function $F({\bf x})$ has condition $(\xi,\delta,\mathbb{M})$-WRSC, if $\forall {\bf x}, {\bf y}\in\mathbb{R}^N$ and $\forall S\in\mathbb{M}$ with $\mathrm{supp}({\bf x})\cup\mathrm{supp}({\bf y})\subseteq S$, the following inequality holds for some $\xi >0$ and $0<\delta<1$: \begin{equation} \|{\bf x}-{\bf y}-\xi\nabla_S F({\bf x})+\xi\nabla_S F({\bf y})\|_2\leq\delta\|{\bf x}-{\bf y}\|_2 \end{equation} where ${\bf x}=({\bf x}^1,\dots,{\bf x}^K), {\bf y}=({\bf y}^1,\dots,{\bf y}^K), {\bf x}^k, {\bf y}^k\in\mathbb{R}^{N_k}, k=1,\dots,K$, topological constraint $\mathbb{M}$ can be expressed as $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}_k(\mathbb{G},s_k), s=\sum_{k=1}^K s_k$, and the subgraph in $k^{\text{th}}$ block is $S_k$, which satisfies $|S_k|\leq s_k, S_k\subseteq \mathbb{G}, S=\bigcup_{k=1}^K S_k, |S|\leq s$. \end{definition} \begin{theorem}\label{thm:convege} Consider the graph block-structured constraint with $K$ blocks $\mathbb{M}(\mathbb{G}, s)=\bigcup_{k=1}^K\mathbb{M}_k(\mathbb{G},s_k)$ and a cost function $F:\mathbb{R}^N\to\mathbb{R}$ that satisfies condition $(\xi,\delta,\mathbb{M}(\mathbb{G},8s))$-WRSC. If $\eta=c_H(1-\delta)-\delta>0$, then for any true ${\bf x}\in\mathbb{R}^N$ with $\mathrm{supp}({\bf x})\in\mathbb{M}((\mathbb{G},s)$, the iteration of Algorithm obeys \begin{equation} \|{\bf x}^{i+1}-{\bf x}^*\|_2\leq\alpha\|{\bf x}^i-{\bf x}^*\|_2+\beta\|\nabla_I F({\bf x}^*)\|_2 \end{equation} where $c_H=\min_{k=1,\dots,K}\{{c_{H_k}}\}$, $c_T=\max_{k=1,\dots,K}\{{c_{T_k}}\}$, $I=\argmax_{S\in\mathbb{M}}\|\nabla_S F({\bf x}^*)\|_2$, $\alpha=\frac{1+c_T}{1-\delta}\sqrt{1-\eta^2}$, and $\beta=\frac{\xi(1+c_T)}{1-\delta}\left[\frac{1+c_H}{\eta}+\frac{\eta(1+c_H)}{\sqrt{1-\eta^2}}+1 \right]$. $c_{H_k}$ and $c_{T_k}$ denote head and tail projection approximation factors on $k^{\text{th}}$ block. \end{theorem} \begin{proof} Let ${\mathbf{r}}^{i+1}={\mathbf{x}}^{i+1}-{\mathbf{x}}^*$, ${\mathbf{x}}^i=({\mathbf{x}}^{1,i},\dots,{\mathbf{x}}^{K,i}), {\mathbf{b}}^i=({\mathbf{b}}^{1,i},\dots,{\mathbf{b}}^{K,i})$, ${\mathbf{x}}^{k,i},{\mathbf{b}}^{k,i}\in\mathbb{R}^{N_k}$ are coefficient variables for partitioned block $k$ at $i^{\text{th}}$ iteration, $k=1,\dots, K$, ${\bf x}^{*}$ is optimum of ${\bf x}$, ${\mathbf{x}}^i$ refers to the whole coefficient variable at iteration $i$. For block $k$, its head and tail projections are $\Gamma_{{\mathbf{x}}^k}^{i}=H(\nabla_{{\mathbf{x}}^k}F({\mathbf{x}}^{i}))$ and $\Psi_{{\mathbf{x}}^k}^{i}=T({\mathbf{b}}^i)$. $\|{\mathbf{r}}^{i+1}\|_2$ is upper bounded as \begin{align*} &\|{\mathbf{r}}^{i+1}\|_2\\ =&\|{\mathbf{x}}^{i+1}-{\mathbf{x}}^*\|_2\\ =&\|{\mathbf{x}}^{i+1}-{\mathbf{b}}+{\mathbf{b}}-{\mathbf{x}}^*\|_2\\ \leq&\|{\mathbf{x}}^{i+1}-{\mathbf{b}}\|_2+\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\quad \Leftarrow\sqrt{a+b}\leq\|a\|_2+\|b\|_2\\ =&\sqrt{\|{\mathbf{x}}^{1,i+1}-{\mathbf{b}}^{1}\|_2^2+\cdots+\|{\mathbf{x}}^{K,i+1}-{\mathbf{b}}^{K}\|_2^2}+\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\\ \leq&\sqrt{c_{T_1}^2\|{\mathbf{x}}^{1,*}-{\mathbf{b}}^1\|_2^2+\cdots+c_{T_K}^2\|{\mathbf{x}}^{K,*}-{\mathbf{b}}^K\|_2^2}+\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\\ &{\color{red}{({\mathbf{x}}^k)^* \text{ refers to the optimum of } \|{\bf x}^k-{\bf b}^k\ |_2}}\\ & \text{Tail projection}, \|{\mathbf{x}}-{\mathbf{x}}_S\|\leq c_T\min_{S'\in{\mathbb{M}}({\mathcal{G}}, s)}\|{\mathbf{x}}-{\mathbf{x}}_{S'}\|_2\Rightarrow \|{\mathbf{x}}^{k,i+1}-{\mathbf{b}}^k\|_2\leq c_T\|{\mathbf{x}}^{k,*}-{\mathbf{b}}^k\|_2\\ \leq&\sqrt{c_{T_1}^2\|({\mathbf{x}}^*)^{1}-{\mathbf{b}}^1\|_2^2+\cdots+c_{T_K}^2\|({\mathbf{x}}^*)^{K}-{\mathbf{b}}^K\|_2^2}+\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\\ &{\color{red}{x^{k,*} \text{ refers to the } k^{\text{th}} \text{ block of global optimum } {\bf x}^* }} \\ =&c_T\sqrt{\|{\mathbf{x}}^{1,*}-{\mathbf{b}}^1\|_2^2+\cdots+\|{\mathbf{x}}^{K,*}-{\mathbf{b}}^K\|_2^2}+\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\quad\text{where } {\color{red}{c_T=\max_{k=1,\dots,K}\{c_{T_k}\}}}\\ =&c_T\|{\mathbf{x}}^*-{\mathbf{b}}\|_2+\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\\ =&(1+c_T)\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\numberthis\label{eq:ri+1} \end{align*} where the second inequality follows from the fact that global optimnum of $k^{\text{th}}$ block $({\bf x}^*)^k$ is not necessarily the optimum of $\|{\bf x}^k-{\bf b}^k\|_2$. Suppose $\Omega=\bigcup_{k=1}^K\Omega_{{\mathbf{x}}^k}$, where $\Omega_{{\bf x}^k}$ is defined in \textbf{Line 4} in Algorithm 1. The component $\|({\mathbf{x}}^*-{\mathbf{b}})_{\Omega}\|_2^2$ is upper bounded as \begin{align*} &\|({\mathbf{x}}^*-{\mathbf{b}})_{\Omega}\|_2^2\\ =&\left\langle {\mathbf{b}}-{\mathbf{x}}^*,({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega} \right\rangle\\ =&\left\langle {\mathbf{b}}-{\mathbf{x}}^*-\xi\nabla_{\Omega}F({\mathbf{b}})+\xi\nabla_{\Omega}F({\mathbf{x}}^*),({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega} \right\rangle-\left\langle \xi\nabla_{\Omega}F({\mathbf{x}}^*),({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega} \right\rangle\\ &{\mathbf{b}}=\argmin_{{\mathbf{x}}\in\mathbb{R}^N} F({\mathbf{x}})\quad \mathrm{s.t.}\quad \mathrm{supp}({\mathbf{x}})\subseteq\Omega\Rightarrow{\color{red}{\nabla_{\Omega}F({\mathbf{b}})=0}}\\ \leq&\|{\mathbf{b}}-{\mathbf{x}}^*-\xi\nabla_{\Omega}F({\mathbf{b}})+\xi\nabla_{\Omega}F({\mathbf{x}}^*)\|_2\|({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega}\|_2+\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2\|({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega}\|_2\\ &\text{Cauchy-Schwarz inequality}, |\langle {\mathbf{u}},{\mathbf{v}} \rangle|\leq\|{\mathbf{u}}\|_2\|{\mathbf{v}}\|_2\\ \leq&\delta\|{\mathbf{b}}-{\mathbf{x}}^*\|_2\|({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega}\|_2+\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2\|({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega}\|_2\\ &{\color{red}{\text{WRSC property}}}, \|{\mathbf{x}}-{\mathbf{y}}-\xi\nabla_S F({\mathbf{x}})+\xi\nabla_S F({\mathbf{y}})\|_2\leq \delta\|{\mathbf{x}}-{\mathbf{y}}\|_2 \end{align*} where the second equality follows from the fact that $\nabla_{\Omega}F({\mathbf{b}})=0$ since ${\mathbf{b}}$ is the solution to problem (8) in Algorithm 1, and the last inequality follows from condition $(\xi,\delta,{\mathbb{M}}({\mathbb{G}}, 8s)), {\mathbb{M}}({\mathbb{G}}, 8s)=\bigcup_{k=1}^K{\mathbb{M}}_k({\mathbb{G}}, 8s_k)$. After simplification, we have \begin{equation*} \|({\mathbf{x}}^*-{\mathbf{b}})_{\Omega}\|_2\leq\delta\|{\mathbf{b}}-{\mathbf{x}}^*\|_2+\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2 \end{equation*} It follows that \begin{align*} &\|{\mathbf{x}}^*-{\mathbf{b}}\|_2\leq\|({\mathbf{x}}^*-{\mathbf{b}})_{\Omega}\|_2+\|({\mathbf{x}}^*-{\mathbf{b}})_{\Omega^c}\|_2\quad \Leftarrow\sqrt{a+b}\leq\|a\|_2+\|b\|_2\\ \leq&\delta\|{\mathbf{b}}-{\mathbf{x}}^*\|_2+\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2+\|({\mathbf{x}}^*-{\mathbf{b}})_{\Omega^c}\|_2 \end{align*} After rearrangement, we obtain \begin{align*} &\|{\mathbf{b}}-{\mathbf{x}}^*\|_2\\ \leq&\frac{\|({\mathbf{b}}-{\mathbf{x}}^*)_{\Omega^c}\|_2}{1-\delta}+\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2}{1-\delta}\\ =&\frac{\|{\mathbf{x}}^*_{\Omega^c}\|_2}{1-\delta}+\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}})\|_2}{1-\delta}\quad \Leftarrow{\color{red}{{\mathbf{b}}_{\Omega^c}=0}}\Leftarrow{\mathbf{b}}=\argmin_{{\mathbf{x}}\in\mathbb{R}^N}F({\mathbf{x}})\quad\mathrm{s.t.}\quad\mathrm{supp}({\mathbf{x}})\subseteq\Omega\\ =&\frac{\|({\mathbf{x}}^*-{\mathbf{x}}^i)_{\Omega^c}\|_2}{1-\delta}+\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2}{1-\delta}\quad\Leftarrow{\color{red}{{\mathbf{x}}^i_{\Omega^c}=0}} \Leftarrow \Gamma\cup \mathrm{supp}({\mathbf{x}}^i)=\Omega\\ =&\frac{\|{\mathbf{r}}_{\Omega^c}^i\|_2}{1-\delta}+\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2}{1-\delta}\\ \leq&\frac{\|{\mathbf{r}}_{\Gamma^c}^i\|_2}{1-\delta}+\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2}{1-\delta}\quad\Leftarrow \Omega^c\subseteq\Gamma^c\Leftarrow\Gamma\subseteq\Omega\Leftarrow \Gamma\cup\mathrm{supp}({\mathbf{x}}^i)=\Omega \numberthis\label{eq:ri} \end{align*} where the first equality follows from the fact that $\mathrm{supp}({\mathbf{b}})\subseteq\Omega$, the second and last inequalities follow from the fact that $\Omega=\Gamma\cup\mathrm{supp}({\mathbf{x}}^i)$. Combining inequality (\ref{eq:ri+1}) and above inequality (\ref{eq:ri}), we obtain \begin{align*} \|{\mathbf{r}}^{i+1}\|_2\leq&(1+c_T)\frac{\|{\mathbf{r}}_{\Omega^c}^i\|_2}{1-\delta}+(1+c_T)\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2}{1-\delta}\\ \leq&(1+c_T)\frac{\|{\mathbf{r}}_{\Gamma^c}^i\|_2}{1-\delta}+(1+c_T)\frac{\xi\|\nabla_{\Omega}F({\mathbf{x}}^*)\|_2}{1-\delta} \end{align*} From Lemma \ref{lem:bound}, we have \begin{equation*} \|{\mathbf{r}}_{\Gamma^c}^i\|_2\leq \sqrt{1-\eta^2}\|{\mathbf{r}}^i\|_2+\left[\frac{\xi(1+c_H)}{\eta}+\frac{\xi\eta(1+c_H)}{\sqrt{1-\eta^2}}\right]\|\nabla_{I}F({\mathbf{x}}^*)\|_2 \end{equation*} Combining the above inequalities, we prove the theorem. \end{proof} \begin{lemma}\label{lem:wrsc} Assume that $F$ is a differentiable function. If $F$ satisfies condition $(\xi, \delta,{\mathbb{M}})$-WRSC, then $\forall {\mathbf{x}},{\mathbf{y}}\in\mathbb{R}^N$ with $\mathrm{supp}({\mathbf{x}})\cup\mathrm{supp}({\mathbf{y}})\subseteq S\in{\mathbb{M}}$, the following two inequalities hold \cite{yuan2014gradient} \begin{gather*} \frac{1-\delta}{\xi}\|{\mathbf{x}}-{\mathbf{y}}\|_2\leq\|\nabla_S F({\mathbf{x}})-\nabla_S F({\mathbf{y}})\|_2\leq\frac{1+\delta}{\xi}\|{\mathbf{x}}-{\mathbf{y}}\|_2\\ F({\mathbf{x}})\leq F({\mathbf{y}})+\langle \nabla F({\mathbf{y}}), {\mathbf{x}}-{\mathbf{y}} \rangle+\frac{1+\delta}{2\xi}\|{\mathbf{x}}-{\mathbf{y}}\|_2^2 \end{gather*} \end{lemma} \begin{lemma}\label{lem:bound} Let ${\mathbf{r}}^i={\mathbf{x}}^i-{\mathbf{x}}^*$ and $\Gamma=\bigcup_{k=1}^K\Gamma_{{\mathbf{x}}^k}, \Gamma_{{\mathbf{x}}^k}\in{\mathbb{M}}_k({\mathbb{G}}_k, 2s_k)$ ${\mathbf{r}}_{{\mathbf{x}}^k}^i={\mathbf{x}}^{k,i}-{\mathbf{x}}^{k,*}$, and $\Gamma_{{\mathbf{x}}^k}=H(\nabla_{{\mathbf{x}}^k}F({\mathbf{x}}^i))$. Then \begin{equation*} \|{\mathbf{r}}_{\Gamma^c}^i\|_2\leq\sqrt{1-\eta^2}\|{\mathbf{r}}^i\|_2+\left[\frac{\xi(1+c_{H})}{\eta}+\frac{\xi\eta(1+c_H)}{\sqrt{1-\eta^2}} \right]\|\nabla_{I}F({\mathbf{x}}^*)\|_2 \end{equation*} where $\eta=c_H(1-\delta)-\delta$ and $I=\argmax_{S\in{\mathbb{M}}({\mathbb{G}}, 8s)}\|\nabla_S F({\mathbf{x}}^*)\|_2$. We assume that $c_H$ and $\delta$ are such that $\eta>0$. \end{lemma} \begin{proof} Denote $\Phi=\mathrm{supp}({\mathbf{x}}^*)\in{\mathbb{M}}=\bigcup_{k=1}^K{\mathbb{M}}_k({\mathbb{G}}, s_k), \Gamma_{x^k}=H(\nabla_{{\mathbf{x}}^k}F({\mathbf{x}})), \Gamma=\bigcup_{k=1}^K, \Gamma_{{\mathbf{x}}^k}\in{\mathbb{M}}_k({\mathbb{G}}, 2s_k), {\mathbf{r}}^i={\mathbf{x}}^i-{\mathbf{x}}^*$, and $\Omega=\mathrm{supp}({\mathbf{r}}^i)\in{\mathbb{M}}({\mathbb{G}}, 6s)=\bigcup_{k=1}^K{\mathbb{M}}_k({\mathbb{G}},6s_k))$. The component $\|\nabla_{\Gamma}F({\mathbf{x}}^i)\|_2$ can be lower bounded as \begin{align*} &\|\nabla_{\Gamma} F({\mathbf{x}}^i)\|_2\\ =&\sqrt{\left\|\left[\nabla_{\Gamma_{{\mathbf{x}}^1}}F({\mathbf{x}}^i),\dots,\nabla_{\Gamma_{{\mathbf{x}}^K}}F({\mathbf{x}}^i)\right]\right\|_2^2}\\ =&\sqrt{\|\nabla_{\Gamma_{{\mathbf{x}}^1}}F({\mathbf{x}}^i)\|_2^2+\cdots+\|\nabla_{\Gamma_{{\mathbf{x}}^K}}F({\mathbf{x}}^i)\|_2^2}\\ \geq&\sqrt{c_{H_1}^2\|\nabla_{\Phi^1}F({\mathbf{x}}^i)\|_2^2+\cdots+c_{H_K}^2\|\nabla_{\Phi^K}F({\mathbf{x}}^i)\|_2^2}\\ &\text{Head projection}, \|{\mathbf{x}}_S\|_2\geq c_H\max_{S'\in{\mathbb{M}}({\mathbb{G}}, s)}\|{\mathbf{x}}_{S'}\|_2\\ \geq&c_H\sqrt{\|\nabla_{\Phi^1}F({\mathbf{x}}^i)\|_2^2+\cdots+\|\nabla_{\Phi^K}F({\mathbf{x}}^i)\|_2^2}\quad c_H=\min\{c_{H_k}\}, k=1,\dots,K\\ =&c_H\|\nabla_{\Phi}F({\mathbf{x}}^i)\|_2\\ =&c_H\|\nabla_{\Phi}F({\mathbf{x}}^i)-\nabla_{\Phi}F({\mathbf{x}}^*)+\nabla_{\Phi}F({\mathbf{x}}^*)\|_2\\ \geq& c_H(\|\nabla_{\Phi}F({\mathbf{x}}^i)-\nabla_{\Phi}F({\mathbf{x}}^*)\|_2-\|\nabla_{\Phi}F({\mathbf{x}}^*)\|_2)\quad\Leftarrow\|a+b\|_2\geq\|a\|_2-\|b\|_2\\ \geq&c_H(1-\delta)\|{\mathbf{x}}^i-{\mathbf{x}}^*\|_2/\xi-c_H\|\nabla_{\Phi} F({\mathbf{x}}^*)\|_2\quad\Leftarrow \text{Lemma } \ref{lem:wrsc}\\ \geq&c_H(1-\delta)\|{\mathbf{r}}^i\|_2/\xi-c_H\|\nabla_I F({\mathbf{x}}^*)\|_2 \numberthis\label{bound:geq} \end{align*} where the last inequality follows from Lemma \ref{lem:wrsc}. The component $\|\nabla_{\Gamma}F({\mathbf{x}}^i)\|_2$ can also be upper bounded as \begin{align*} \|\nabla_{\Gamma}F({\mathbf{x}}^i)\|_2\leq&\frac{1}{\xi}\|\xi\nabla_{\Gamma}F({\mathbf{x}}^i)-\xi\nabla_{\Gamma}F({\mathbf{x}}^*)\|_2+\|\nabla_{\Gamma}F({\mathbf{x}}^*)\|_2\quad \Leftarrow \|a+b\|_2\leq\|a\|_2+\|b\|_2\\ \leq&\frac{1}{\xi}\|\xi\nabla_{\Gamma}F({\mathbf{x}}^i)-\xi\nabla_{\Gamma}F({\mathbf{x}}^*)-{\mathbf{r}}_{\Gamma}^i+{\mathbf{r}}_{\Gamma}^i\|_2+\|\nabla_{\Gamma}F({\mathbf{x}}^*)\|_2\\ \leq&\frac{1}{\xi}\left(\|\xi\nabla_{\Gamma\cup\Omega}F({\mathbf{x}}^i)-\xi\nabla_{\Gamma\cup\Omega}F({\mathbf{x}}^*)-{\mathbf{r}}_{\Gamma\cup\Omega}^i\|_2+\|{\mathbf{r}}_{\Gamma}^i\|_2\right)+\|\nabla_{\Gamma}F({\mathbf{x}}^*)\|_2\\ \leq&\frac{\delta}{\xi}\cdot\|{\mathbf{r}}^i\|_2+\frac{1}{\xi}\|{\mathbf{r}}_{\Gamma}^i\|_2+\|\nabla_I F({\mathbf{x}}^*)\|_2\numberthis\label{bound:leq}\\ &\text{Definition \ref{def:wrsc} } (\xi,\delta,{\mathbb{M}}({\mathbb{G}},s))-\text{WRSC} \end{align*} where the last inequality follows from condition $(\xi,\delta,{\mathbb{M}}({\mathbb{G}},s))$-MWRSC and the fact that ${\mathbf{r}}_{\Gamma\cup\Omega}^i={\mathbf{r}}^i$. Let $\eta=(c_H\cdot(1-\delta)-\delta)$. Combining the two bounds (\ref{bound:geq}) and (\ref{bound:leq}) and grouping terms, we have $\|{\mathbf{r}}_{\Gamma}^i\|\geq\eta\|{\mathbf{r}}^i\|_2-\xi(1+c_H)\|\nabla_I F({\mathbf{x}}^*)\|_2$. After a number of algebraic manipulations similar to those used in \cite{hegde2014approximation} page 11, we prove the lemma. \end{proof} \subsection{Theorem 2} We have proved this theorem in the paper. Here are some details omitted in the paper due to page limit. Suppose ${\bf x}$ starts from ${\bf 0}$, i.e., ${\bf x}^0={\bf 0}$. Then the $i^{th}$ iteration of Algorithm 1 satisfies \begin{align*} &\|{\bf x}^*-{\bf x}^i\|_2\\ \leq&\alpha\|{\bf x}^*-{\bf x}^{i-1}\|_2+\beta\|\nabla_I F({\bf x}^*)\|_2\\ \leq&\alpha^t\|{\bf x}^*-{\bf x}^{i-1}\|_2+(\alpha^{t-1}\beta+\alpha^{t-2}\beta+\cdots+\beta)\|\nabla_I F({\bf x}^*)\|_2\quad \text{after $t$ iterations}\\ \leq&\cdots\\ \leq&\alpha^i\|{\bf x}^*-{\bf x}^0\|_2+\frac{\beta}{1-\alpha}\|\nabla_I F({\bf x}^*)\|_2\\ &\text{the coeffcient of the second term is a geometric sequence and when}\\ & t\to\infty, \alpha^{t-1}\beta+\alpha^{t-2}\beta+\cdots+\beta=\frac{\beta(1-\beta^{t-1})}{1-\beta}=\frac{\beta}{1-\alpha} \\ \leq&\alpha^i\|{\bf x}^*\|_2+\frac{\beta}{1-\alpha}\|\nabla_I F({\bf x}^*)\|_2\quad \Leftarrow {\bf x}^0={\bf 0} \end{align*} \section{Experiments} \subsection{Datasets} \subsection{Synthetic Dataset for Anomalous Evolving Subgraph Detection} We generate networks using Barab\'asi-Albert preferential attachment model \cite{barabasi1999emergence}. We simulate the evolving true subgraphs in time window $T = 7$, and the true subgraphs in two consecutive time stamps have $50\%$ of overlap. The univariate feature values of background nodes and true nodes are randomly generated in $\mathbb{N}(0,1)$ and $\mathbb{N}(\mu, 1)$ distributions, respectively. We generate multiple temporal networks with different noise level by setting $\mu = [3,4,5]$ for true nodes. As we can see, when $\mu$ is small, the data is more noised, and it is more difficult to distinguish between the anomalous nodes and normal nodes based on the uni-variate feature. \subsection{Water Pollution Dataset} The "Battle of the Water Sensor Networks" (BWSN) \cite{ostfeld2008battle} provides a real world network with 12,527 vertices. Among them, there are 25 vertices with chemical contaminant plumes that are distributed in four different areas. The spread of these contaminant plumes on graph is simulated using the water network simulator EPANET that is used in BWSN for a period of 8 hours. For each hour, each vertex has a sensor that reports 1 if it is polluted; otherwise, reports 0. Except measuring the accuracy of subgraphs detection, we also test the robustness of subgraph detection methods to noises. We randomly selected K percent vertices, and flipped their sensor binary values, where K = 0, 2, 4, ...,10 as \cite{chen2016generalized,shao2017efficient}. The objective is to detect the set of polluted vertices. In order to apply nonparametric graph scan baseline methods to this dataset, we map the sensors whose report values are 1s to the empirical p-value 0.15, and those whose report values are 0s to 1.0. \subsection{Washington D.C. Road Traffic Dataset} We collected traffic data of Washington D.C from June 1, 2013 to March 31, 2014 from INRIX \footnote{http://inrix.com/publicsector.asp.}. The raw INRIX dataset provides traffic speed and reference speed information for each road link per hour interval. A reference speed is defined as the "uncongested free flow speed" for each road segment. It is calculated based upon the 85-th percentile of the measured speed for all time periods over a few years by INRIX, where the reference speed serves as a threshold separating two traffic states, congested vs. uncongested, which will also be served as ground-truth of our experiments. The road traffic dataset for each of the two cities has 43 weeks in total. An hour is represented by a specific combination of hour of day $(h \in {6, 7, ..., 22})$, day of week $(d \in {1, 2, 3, 4, 5})$, and week $(w \in {1, 2, ..., 43}): (h, d, w)$. We only considered work days from Monday $(d = 1)$ to Friday $(d = 5)$ and hours from 6AM $(h = 6)$ to 10PM $(h = 22)$. \subsection{Beijing Road Traffic Dataset} Beijing road traffic dataset is comprised of 148,110 nodes and 196,307 edges. The road network covers a $ 40\times 50 $ km spatial range, with a total length (of road segments) of 21, 895 km. Due to missing values in the raw data, we extract and only use the largest connected component in the network, which contains 59,000 nodes and 70,317 edges. The dataset contains the real-time traffic conditions of four days, from Sep. \nth{12}, 2013 to Sep. \nth{15}, 2013, consisting two workdays and two holidays. In each date, the data consists of traffic records in 144 time-stamps with time resolution as 6 minutes. We only use the data between morning 5AM to evening 10PM, which totally contains $108$ time stamps. The traffic information on each road segment containing the average travel speed $ \bar{\nu} $, the standard deviation of the travel speed $\sigma$, and the number of vehicles, is derived from the GPS trajectories generated by taxicabs traversing the road segment in the time slot. We simply use the difference between reference speed and current speed as edge feature, and obtain the node feature by averaging the edge features associated with that node. \subsection{Synthetic Dataset for Subgraph Detection in Network of Networks} We generate several networks with different network sizes with Barab\'asi-Albert model. We use random walk to simulate the ground-truth subgraph with size as $10\%$ of network size. The nodes in true subgraph have features following normal distribution $\mathbb{N}(5,1)$, and the features of background nodes follows distribution $\mathbb{N}(0,1)$. \subsection{Wikivote Dataset} \textit{Wikivote} \footnote{\url{https://snap.stanford.edu/data/wiki-Vote.html}} is a network contains all the Wikipedia voting data from the inception of Wikipedia till January 2008, with $7,115$ nodes and $103,689$ edges. We only use the network structure of this data, and we simulate the true subgraphs of size $1000$ using random walk, and the node attribute in true subgraphs follows normal distribution $\mathbb{N}(5, 1)$, otherwise $\mathbb{N}(0,1)$. \subsection{CondMat Dataset} \textit{CondMat}\footnote{\url{https://snap.stanford.edu/data/ca-CondMat.html}} is a collaboration network from the e-print arXiv and covers scientific collaborations between authors papers submitted to Condense Matter category, with $23,133$ nodes and $93,497$ edges. We only use the network structure of this data, and we simulate the true subgraphs of size $1000$ using random walk, and the node attribute in true subgraphs follows normal distribution $\mathbb{N}(5, 1)$, otherwise $\mathbb{N}(0,1)$. \section{Implementation} \subsection{} We implement our algorithm and conduct the experiments in python 2.7. The python modules are required to install before running the code: \begin{displayquote} pip install numpy networkx sparse-learning \end{displayquote} The sparse-learning module provides the implementation of head and tail projection. Our proposed GBMP have two parameters $k$ and $\lambda$, which denote by an upper bound of the subgraph size and trade-off parameter, respectively. We grid search the optimal values of these parameters on the training data, and apply them to the testing data. The provided implementation only outputs the result for one single case, however, our results show in the paper are averaged results over multiple cases. \bibliographystyle{plain}
\section{Introduction} Neutron stars are the densest objects in the observable universe and deep knowledge of the Equation of State (EoS) of the dense matter in beta-equilibrium is thus required to understand their behavior. It has been shown that the dense matter EoS must be treated relativistically \cite{Walecka1974,Glendenning1991}. For this reason, relativistic mean field (RMF) models have been widely used to obtain a realistic description of the properties of finite nuclei, bulk nuclear matter or the properties of neutron stars. Currently, many different variants of RMF models with various couplings are in use to study the finite nuclei and neutron star properties \cite{Dutra2014, Oertel2017, Roca-Maza2018}. Accurate constraints are necessary to understand the limits of these different types of models. During the last decade, a wide range of astrophysical observations such as the precise measurement of massive millisecond pulsars using Shapiro delay technique \cite{Demorest2010, Antoniadis2013}, detection of gravitational wave generated by binary neutron stars in the GW170817 event by the LIGO-Virgo collaboration \cite{Abbott2018,Abbott2019}, or the joint mass radius measurement of neutron stars using X-ray timing technique by NICER collaboration \cite{Miller2019, Riley2019, Miller2021, Riley2021} started to provide unprecedented new constraints on the dense matter EoS. They have triggered plethora of theoretical studies to look at the dense matter EoS from very different perspectives c.f. Ref. \cite{Lattimer2021} and references therein. First of its kind model independent measurement of neutron skin thickness $\Delta r_{np}$ of $^{208}$Pb \cite{Adhikari2021} and $^{48}$Ca \cite{Adhikari2022} in the Jefferesen lab also inspired theoretical studies to take a fresher look at the isovector channel of the nuclear interaction \cite{Essick2021, Reinhard2021, Mondal2022b, Reinhard2022, Yuksel2022}. Effective mass of nucleon quantifies the momentum dependence of nuclear force in the medium. It can be quoted for infinite nuclear matter at the Fermi surface. It is, however, necessary to realize that the concept of effective mass is different in non-relativistic \cite{Serot1986,Chen2007} and relativistic formalism \cite{Jaminon1989}. Nevertheless, it plays some crucial roles to determine various finite nuclear properties \textit {e.g.} isoscalar giant quadrupole resonance (ISGQR) \cite{Roca-Maza2013}, nucleon nucleon scattering in optical potentials \cite{Li2015b} or even in realizing various properties of nuclear matter and neutron stars \cite{Malik2018a, Malik2018b}. Recently, a systematic study was performed using RMF models which assessed the impact of relativistic (Dirac) effective mass ($M^*$) on the properties of neutron star \cite{Ghosh2021}. The isovector splitting of the effective mass, which measures the difference between neutron ($M_n^*$) and proton ($M_p^*$) effective mass, can influence greatly as well the physical properties of finite nuclei such as locating the drip-lines \cite{Woods1997} or nucleon-nucleus scattering of asymmetric systems \cite{Li2015b}. Its impact increases manifold in high density environment which can alter thermal and transport properties of asymmetric matter \cite{Li2004, Xu2015} or neutrino opacities of neutron star matter \cite{Baldo2014}. To settle its value, even at saturation, remains a persisting challenge both theoretically \cite{Zuo2005, Dalen2005, Bandyopadhyay1990, Mondal2017, Mondal2018} and experimentally \cite{ Zhang2016, Li2015b, Kong2017}. Appearance of isovector splitting of effective mass to the leading order in RMF models occurs through the isovector-scalar $\delta$ mesons. It impacts the proton fraction in neutron stars and hence the cooling process of neutron stars after formation \cite{Roca-Maza2011,Wang2014}. It can also influence the global properties of neutron stars \cite{Dexheimer2015, Kumar2018, Kumar2021,Malik2018a,Malik2018b,Fan-Li2022}. A systematic study of RMF models with added freedom in the isospin channel through $\delta$ meson, optimized using well constrained finite nuclear properties and extrapolating at high density to understand the properties of neutron stars and in general dense matter EoS, can enhance our knowledge on the density dependence of the isovector channel of nuclear interaction. The present study is aimed towards investigating the effects of $\delta$ meson on the dense matter EoS within the framework of RMF model. We generate several parameter sets by varying the coupling strength of $\delta$ meson to the nucleons such that the low density behaviour of the EOSs remain consistent with the available finite nuclei data and a few empirical properties of infinite nuclear matter evaluated at the saturation density. The properties of neutron stars obtained with these EOSs are them compared to asses the role of $\delta$ mesons. The paper is organized as follows. In section \ref{model}, the theoretical framework which is used to construct the EoS for neutron stars is discussed. We also discuss the procedure to optimize the coupling constants and the method to perform a covariance analysis in the same section. In section \ref{results}, we present our results. We summarize and draw our conclusions in section \ref{conclusion}. \section{Formalism}\label{model} \subsection{Theoretical model} The Lagrangian density for the RMF model used in the present study based on different non-linear, self and inter-couplings among isoscalar-scalar $\sigma$, isoscalar-vector $\omega_{\mu}$, isovector-scalar $\delta$ and isovector-vector $\rho_{\mu}$ meson fields and nucleonic Dirac field $\Psi$ \cite{Dhiman2007,Raj2006}, is given by \begin{eqnarray} \label{eq:lbm} {\cal L} &=& \sum_q \overline{\Psi}[i\gamma^{\mu}\partial_{\mu}- (M-g_{\sigma } \sigma - g_{\delta}\delta\cdot\tau)\nonumber\\ &-&(g_{\omega }\gamma^{\mu} \omega_{\mu}+ \frac{1}{2}g_{\mathbf{\rho}}\gamma^{\mu}\tau\cdot\mathbf{\rho}_{\mu})]\Psi + \frac{1}{2}(\partial_{\mu}\sigma\partial^{\mu}\sigma-m_{\sigma}^2\sigma^2) \nonumber\\ &-&\frac{\overline{\kappa}}{3!} g_{\sigma }^3\sigma^3-\frac{\overline{\lambda}}{4!}g_{\sigma }^4\sigma^4 - \frac{1}{4}\omega_{\mu\nu}\omega^{\mu\nu}+ \frac{1}{2}m_{\omega}^2\omega_{\mu}\omega^{\mu}\nonumber\\ &+&\frac{1}{4!}\zeta g_{\omega }^{4}(\omega_{\mu}\omega^{\mu})^{2}-\frac{1}{4}\mathbf{\rho}_{\mu\nu}\mathbf{\rho}^{\mu\nu} +\frac{1}{2}m_{\rho}^2\mathbf{\rho}_{\mu}\mathbf{\rho}^{\mu}\nonumber\\ &+&\frac{1}{2}(\partial_{\mu}\delta\partial^{\mu}\delta-m_{\delta}^2\delta^2) +\frac{1}{2}c_{1}g_{\omega }^{2}g_{\rho }^2\omega_{\mu}\omega^{\mu}\rho_{\mu}\rho^{\mu}. \end{eqnarray The Dirac effective mass for the nucleons (q) appearing in the Lagrangian density above is specified as \begin{equation} \label{eq:nucleon} M^{*}_{q} =( M - g_{\sigma}\sigma - g_{\delta}\delta\cdot \tau), \end{equation} where, $\tau =1 (-1)$ for $q=$ neutron (proton). Following the Euler-Lagrange formalism one can readily find the expressions for energy density ${\cal E}$ and pressure $P$ as a function of density from Eq. (\ref{eq:lbm}) \cite{Glendenning2000}. \subsection{Optimization and covariance analysis} In the present study, five new relativistic interactions SRV00, SRV01, SRV02, SRV03, and SRV04 have been generated for the Lagrangian density given by Eq. (\ref{eq:lbm}) to investigate the effect of $\delta$ meson on the properties of finite nuclei and neutron star matter. Here, SRV00, SRV01, SRV02, SRV03 and SRV04 parametrizations correspond to different value of the coupling of $\delta$-meson to the nucleon i.e. $g_{\delta}$ = 0.0, 1.0, 2.0, 3.0 and 4.0 respectively. As the effect of $\delta$ meson is predominantly important at suprasaturation densities, one can \textit{a-priori} anticipate its insignificant impact in finite nuclei, which is primarily sensitive to the EoS at subsaturation densities. This is the reason why we kept fixed the $g_{\delta}$ at aforementioned values optimizing the rest of the parameters in Eq. (\ref{eq:lbm}). This is not far from the strategy recently used by Li \textit{et. al.} in Ref. \cite{Fan-Li2022}. The parameters of the model are obtained by fitting the experimental data \cite{Wang2021} on binding energies ($BE$) and charge rms radii ($r_{ch}$) \cite{Angeli2013} of some spherical nuclei $^{16,24}$O, $^{40,48}$Ca, $^{56,78}$Ni, $^{88}$Sr,$^{90}$Zr, $^{100,116,132}$Sn and $^{208}$Pb. For the open shell nuclei, the pairing has been included using BCS formalism with constant pairing gaps \cite{Ring1980,Karatzikos2010} that are taken from the nucleon separation energies of neighboring nuclei \cite{Wang2021}. Neutron and proton pairing gaps are evaluated by using fourth order finite difference mass formula (five point difference) \cite{Duguet2001}. The neutron and proton pairing gaps ($\Delta_{n}$,$\Delta_{p}$) in MeV for the open shell nuclei are $^{88}Sr$(0.0,1.284), $^{90}Zr$(0.0,1.239) and $^{116}Sn$(1.189,0.0). The neutron pairing gap for $^{24}O$ practically vanishes since the first unoccupied orbit 1$d_{3/2}$ is almost 4.5 MeV above the completely filled 2$s_{1/2}$ orbit \cite{Chen2015,Mondal2016}. The pairing correlation energies for a fix gap $\Delta$ is calculated by using the paring window of 2$\hbar\omega$, where $\hbar\omega$ = $45 A^{-1/3}$ - $25 A^{-2/3}$ MeV \cite{Raj2006}. We also incorporated the recently measured neutron skin thickness of $^{208}$Pb using the parity violating electron scattering experiment \cite{Adhikari2021} in our fit data. \begin{table*}[t] \centering \caption{\label{tab:table1} SRV parameter sets for the Lagrangian of RMF model as given in Eq.(\ref{eq:lbm}). The parameter $\overline{\kappa}$ is in fm$^{-1}$. The values of meson masses $m_{\sigma}$, $m_{\omega}$, $m_{\rho}$ and $m_{\delta}$ are in MeV. The nucleonic mass (M) and meson masses ($m_{\omega}$, $m_{\rho}$ and $m_{\delta}$) are taken as 939, 782.5, 762.468 and 980 MeV, respectively. The values of $\overline{\kappa}$, $\overline{\lambda}$, and ${c_{1}}$ are multiplied by $10^{2}$.} \begin{tabular}{ccccccc} \hline \hline \multicolumn{1}{c}{${\bf {Parameters}}$}& \multicolumn{1}{c}{{\bf SRV00}}& \multicolumn{1}{c}{{\bf SRV01}}& \multicolumn{1}{c}{{\bf SRV02}}& \multicolumn{1}{c}{{\bf SRV03}}& \multicolumn{1}{c}{{\bf SRV04}}\\ \hline ${\bf g_{\sigma}}$ &10.3109$\pm$0.1109&10.3442$\pm$0.0978&10.3344$\pm$0.1135&10.3723$\pm$0.0999&10.3735$\pm$0.1294\\ ${\bf g_{\omega}}$ &13.1772$\pm$0.1621 & 13.2508$\pm$0.1379&13.2137$\pm$0.1414&13.3113$\pm$0.1269&13.2984$\pm$0.1815\\ ${\bf g_{\rho}}$ &10.8834$\pm$1.1730&11.2832$\pm$1.0110 &11.5834$\pm$0.9676 &12.4834$\pm$1.1274&13.1833$\pm$0.8043\\ ${\bf \overline {\kappa}}$&1.8509$\pm$0.0500 &1.8624$\pm$0.0700 &1.8780$\pm$0.0200 &1.8242$\pm$0.0500&1.8490$\pm$0.0800\\ ${\bf \overline {\lambda}}$&-0.05151$\pm$0.0700&-0.05803$\pm$0.0600&-0.06060$\pm$0.0600& -0.04934$\pm$0.0800&-0.05621$\pm$0.0800\\ ${\bf{\zeta}}$&0.02116$\pm$0.0017&0.02050$\pm$0.0013&0.02017$\pm$0.0011& 0.02177$\pm$0.0012&0.02089$\pm$0.0027\\ ${\bf c_1}$ &4.60038$\pm$2.3600&4.49219$\pm$1.9200&4.20853$\pm$1.5600 &3.66169$\pm$1.4900 &3.01068$\pm$0.8800\\ ${\bf m_{\sigma}}$ &501.9596$\pm$0.9230&501.0200$\pm$1.0071 &501.6638 $\pm$1.3141&500.7480$\pm$1.2629&501.0215$\pm$1.3663\\ \hline \hline \end{tabular} \end{table*} The optimization of the parameters ($\textbf{p}$) appearing in the Lagrangian (Eq. \ref{eq:lbm}) is done by using the simulated annealing method (SAM) \cite{Agrawal2005, Burvenich2004, Kirkpatrick1984} by following $\chi^{2}$ minimization procedure which is given as, \begin{equation} {\chi^2}(\textbf{p}) = \frac{1}{N_d - N_p}\sum_{i=1}^{N_d} \left (\frac{ M_i^{exp} - M_i^{th}}{\sigma_i}\right )^2 \label {chi2}, \end{equation} where $N_d$ is the number of experimental data points and $N_p$ is the number of fitted parameters. The $\sigma_i$ denotes adopted errors \cite{Dobaczewski2014,Mondal2015} and $M_i^{exp}$ and $M_i^{th}$ are the experimental and the corresponding theoretical values, respectively, for a given observable. The minimum value of ${{\chi}}^{2}_{0}$ corresponds to the optimal values $\textbf{p}_{0}$ of the parameters. Once the optimized parameter set is obtained, the correlation coefficient between two quantities Y and Z, can be calculated by covariance analysis \cite{Brandt1997,Reinhard2010,Fattoyev2011,Dobaczewski2014,Mondal2015} as \begin{equation} \label{covariance} \textit{r}_{\scriptstyle{YZ} }= \frac{\overline{\Delta{Y} \Delta{Z} }}{\sqrt{\overline{\Delta{Y^2}} \quad \overline{\Delta{Z^2}}}} , \end{equation} where covariance between Y and Z is expressed as \begin{equation} \label{error} \overline{\Delta{Y}\Delta{Z}} = \sum_{\alpha\beta} \left( \frac{\partial{Y}} {\partial{p}_{\alpha}}\right) _{\textbf{p}_0} C_{\alpha\beta}^{-1} \left( \frac{\partial{Z}}{\partial{p}_{\beta}}\right) _{\textbf{p}_0}. \end{equation} Here, $C_{\alpha\beta}^{-1}$ is an element of inverted curvature matrix given by \begin{equation} \label{matrix} \textit{C}_{\alpha\beta} = \frac{1}{2}\left(\frac{\partial^2 \chi^2(\textbf{p})}{\partial{p}_{\alpha}\partial{p}_{\beta}}\right)_{\textbf{p}_{0}}. \end{equation} The standard deviation, $\overline{\Delta{Y}^2}$, in Y can be computed using Eq. (\ref{error}) by substituting Z = Y. \section{Results and Discussion}\label{results} We have obtained five different parameter sets corresponding to different values of $g_\delta$ by calibrating the remaining prameters to a suitable set of on finite nuclei as described earlier. All parametrizations obtained in the present work give equally good fit to the properties of finite nuclei which were used for the optimization procedure. In Table \ref{tab:table1} we display optimum values of the model parameters for all the five SRV parameter sets along with the uncertainties on them computed using Eq. (\ref{error}). It can be seen that the parameter $g_{\rho}$ increases with the increase in value of $g_{\delta}$. A larger value of $g_{\rho}$ is required in the presence of the $\delta$-field to fit the properties of finite nuclei. As the contribution of the $\delta$-field is attractive, increased binding due to the $\delta$-field has to be compensated by the higher value of the repulsion by the $\rho$-field. The parameter $g_{\rho}$ has its lowest value for SRV00 parametrization ($g_{\delta}$=0). For any finite value of $\delta$-coupling ($g_{\delta}>0$) i.e. for SRV01, SRV02, SRV03 and SRV04 parametrizations, the strength of $\rho$-coupling ($g_{\rho}$) increases gradually. The cross-coupling between the $\omega_{\mu}$ and $\rho_{\mu}$ fields quantified by the term $c_{1}$ decreases slightly from 4.6003 to 3.0107 as the value of coupling constant $g_{\delta}$ increases from 0.0 to 4.0 corresponding to different SRV parametrizations. \begin{table*} \centering \caption{\label{tab:table2} The values of binding energy (BE) and charge radii ($r_{ch}$) of fitted nuclei along with theoretical errors obtained for different SRV parametrizations. The corresponding experimental values \cite{Wang2021,Angeli2013} are also listed. The value of neutron skin thickness ($\Delta r_{np}$) for $^{208}$Pb is given along with the experimental data \cite{Adhikari2021}. The adopted errors on the observables ($\sigma$) used for optimisation of parameters are also displayed. The value of BE are given in units of MeV and $r_{ch}$ and $\Delta r_{np}$ are in fm. } \begin{tabular}{|c|c|c|c|c|c|c|c|c|} \hline \hline \multicolumn{1}{|c|}{${\bf {Nucleus}}$}& \multicolumn{1}{|c|}{${\bf {Observables}}$}& \multicolumn{1}{|c|}{{\bf Exp.}}& \multicolumn{1}{|c|}{{\bf $\sigma$}}& \multicolumn{1}{|c|}{{\bf SRV00}}& \multicolumn{1}{|c|}{{\bf SRV01}}& \multicolumn{1}{|c|}{{\bf SRV02}}& \multicolumn{1}{|c|}{{\bf SRV03}}& \multicolumn{1}{|c|}{{\bf SRV04}} \\ \hline $^{16}O$ &BE&127.62&4.0&128.67$\pm$0.52&128.83$\pm$0.50&128.94$\pm$0.55&128.90$\pm$0.51&128.94$\pm$0.61\\ &$r_{ch}$&2.699&0.04&2.709$\pm$0.008&2.712$\pm$0.023&2.711$\pm$0.031&2.710$\pm$0.013&2.710$\pm$0.023\\ \hline $^{24}O$ &BE&168.96&1.0&169.95$\pm$0.96 &169.38$\pm$0.90&169.64$\pm$0.89&168.90$\pm$1.01&169.00$\pm$0.93\\ \hline $^{40}Ca$&BE &342.04&3.0&343.40$\pm$0.69&343.14$\pm$0.65&343.18$\pm$0.53&344.41$\pm$0.63&344.39$\pm$0.91\\ &$r_{ch}$&3.478&0.02&3.454$\pm$0.014 &3.457$\pm$0.007&3.455$\pm$0.016&3.455$\pm$0.014&3.455$\pm$0.017\\ \hline $^{48}Ca$ &BE&415.97&1.0&415.59$\pm$0.54&415.15$\pm$0.52&415.37$\pm$0.45&415.37$\pm$0.63&415.48$\pm$0.52\\ &$r_{ch}$&3.477&0.02&3.468$\pm$0.016&3.469$\pm$0.014&3.468$\pm$0.014&3.467$\pm$0.014&3.467$\pm$0.022\\ \hline $^{56}Ni$ &BE&484.01&5.0&482.05$\pm$1.28&482.39$\pm$1.21&482.28$\pm$1.31&483.12$\pm$1.48&483.22$\pm$1.56\\ &$r_{ch}$&3.750&0.02&3.712$\pm$0.022&3.709$\pm$0.017&3.708$\pm$0.14&3.707$\pm$0.017&3.705$\pm$0.013\\ \hline $^{78}Ni$&BE&642.56 &2.0&641.39$\pm$1.03 &640.01$\pm$0.97&641.05$\pm$1.01&640.21$\pm$1.08&640.18$\pm$1.07\\ \hline $^{88}Sr$ &BE&768.42&1.0&768.24$\pm$0.60&767.72$\pm$0.57&767.84$\pm$0.58&768.39$\pm$0.60&768.40$\pm$0.62\\ &$r_{ch}$&4.219&0.02&4.226$\pm$0.016&4.227$\pm$0.014&4.227$\pm$0.013&4.225$\pm$0.021&4.225$\pm$0.0146\\ \hline $^{90}Zr$ &BE&783.81&1.0&783.92$\pm$0.69 &783.58$\pm$0.64&783.59$\pm$0.68&784.37$\pm$0.69&784.36$\pm$0.68\\ &$r_{ch}$&4.269&0.02&4.280$\pm$0.019&4.280$\pm$0.019&4.280$\pm$0.013&4.278$\pm$0.029&4.278$\pm$0.015\\ \hline $^{100}Sn$&BE&825.10&2.0&826.60$\pm$1.28&826.95$\pm$1.24&827.56$\pm$1.14&827.09$\pm$1.23&827.01$\pm$1.66\\ \hline $^{116}Sn$ &BE&988.67&2.0&988.34$\pm$0.83&987.74$\pm$0.73&987.72$\pm$2.18&988.49$\pm$0.82&988.25$\pm$0.88\\ &$r_{ch}$&4.627&0.02&4.617$\pm$0.016 &4.618$\pm$0.014&4.617$\pm$0.009&4.615$\pm$0.012&4.615$\pm$0.020\\ \hline $^{132}Sn$&BE&1100.22 &1.0&1101.38$\pm$0.84&1100.58$\pm$0.80&1101.48$\pm$0.77&1100.59$\pm$0.86&1100.70$\pm$0.82\\ &$r_{ch}$&4.709&0.02&4.721$\pm$0.019&4.721$\pm$0.019&4.720$\pm$0.010&4.719$\pm$0.012&4.717$\pm$0.011\\ \hline $^{208}Pb$ &BE&1636.34&1.0&1636.58$\pm$1.03&1635.98$\pm$0.98&1636.32$\pm$0.96&1636.27$\pm$1.05&1636.10$\pm$1.02\\ &$r_{ch}$&5.501&0.02&5.530$\pm$0.015 &5.531$\pm$0.014&5.529$\pm$0.014&5.527$\pm$0.021&5.526$\pm$0.011\\ &$\Delta r_{np}$&$0.283\pm0.071$&0.071&0.222$\pm$0.032&0.223$\pm$0.028&0.217$\pm$0.026&0.215$\pm$0.035&0.214$\pm$0.029\\ \hline \hline \end{tabular} \end{table*} \begin{figure} \centering \includegraphics[trim=0 0 0 0,clip,scale=0.6]{parameter_corr.eps} \caption{\label{parameter_corr} (Color online) Correlation coefficients (absolute values) among the model parameters for SRV02 parametrization for the Lagrangian given by Eq. (\ref{eq:lbm}).} \end{figure} In Table \ref{tab:table2}, different observables fitted in the present work, their experimental values \cite{Wang2021,Angeli2013}, adopted errors $\sigma$ on them \cite{Klupfel2009} along with the calculated values for different SRV parametrizations are displayed. The estimated uncertanties are also listed for the fitted observables. The fitted values of finite nuclei properties are quite close to their experimental counterparts. The root mean square (rms) errors on the $BE$ are found to be in the range $ 1.50 - 1.86$ MeV, and the ones for $r_{ch}$ are found to be $~ 0.02 $ fm for the different parameterizatons. It is quite interesting to observe that even though $g_{\delta}$ influences the coupling $g_{\rho}$, the isovector sensitive observable $\Delta r_{np}$ varies only slightly $\sim 0.01$ fm across the different SRV models obtained in the present work. This observation is quite similar to the one obtained by Li \textit{et. al.} \cite{Fan-Li2022}. \begin{table*} \centering \caption{\label{tab:table3} The bulk nuclear matter properties at saturation density for SRV parametrizations are listed: $\rho_{0}$, E/A, K, J, L and $M^{*}/M$ denotes the saturation density, binding energy per nucleon, incompressibility coefficient, symmetry energy, the slope of symmetry energy, and the ratio of effective nucleon mass to the nucleon mass, respectively.} \begin{tabular}{cccccc} \hline \hline \multicolumn{1}{c}{${\bf {Parameters}}$}& \multicolumn{1}{c}{{\bf SRV00}}& \multicolumn{1}{c}{{\bf SRV01}}& \multicolumn{1}{c}{{\bf SRV02}}& \multicolumn{1}{c}{{\bf SRV03}}& \multicolumn{1}{c}{{\bf SRV04}}\\ \hline ${\bf{\rho_{0} ~(fm^{-3})}}$&0.149$\pm$0.003&0.149$\pm$0.002 &0.149$\pm$0.002&0.149$\pm$0.003&0.149$\pm$0.008\\ ${\bf E/A ~(MeV)}$ &-16.11$\pm$0.06 & -16.11$\pm$0.05&-16.09$\pm$0.05&-16.12$\pm$0.06&-16.11$\pm$0.04\\ ${\bf K ~(MeV)}$ &223.94$\pm$8.57&221.78$\pm$9.95 &222.05$\pm$5.47&221.72$\pm$10.62&221.11$\pm$23.20\\ ${\bf J ~(MeV)}$&33.49$\pm$1.82&33.75$\pm$1.77&33.31$\pm$1.78&33.54$\pm$2.13&33.34$\pm$2.08\\ ${\bf L ~(MeV)}$&65.23$\pm$15.37&63.82$\pm$13.50&61.49$\pm$13.22&58.06$\pm$15.93&55.31$\pm$13.76\\ ${\bf ~M^{*}/M}$&0.606$\pm$0.013&0.0.602$\pm$0.010&0.603$\pm$0.005& 0.601$\pm$0.009&0.600$\pm$0.009\\ \hline \hline \end{tabular} \end{table*} In Table \ref{tab:table3}, we present the results for the properties of Symmetric Nuclear Matter (SNM) such as binding energy per nucleon (E/A), incompressibility (K), the ratio of effective mass to the mass of nucleon ($M^{*}/M$) along with symmetry energy coefficient (J), and its slope (L), all are evaluated at the saturation density ($\rho_{0}$). We also quote the theoretically calculated error on them. The results are presented for all five SRV parametrizations. The value of E/A lies in the range $-16.09$ to $-16.12$ for the five parametrizations. The value of J and L obtained by our parametrizations are consistent with the constraints from observational analysis J = 31.6 $\pm$ 2.66 MeV and L = 58.9 $\pm$ 16 MeV \citep{Li2013, Yue2022}. The value of K is also in agreement with the value 240 $\pm$ 20 MeV determined from isoscalar giant monopole resonance (ISGMR) for $^{90}$Zr and $^{208}$Pb nuclei \citep{Colo2014,Piekarewicz2014}. It can also be seen from Table \ref{tab:table3} that the mean values of the slope of of symmetry energy (L) for SRV parametrizations decrease with the increase in the value of $g_{\delta}$. The average value of L decreases from 65.23 MeV in SRV00 to 55.31 MeV for SRV04. It can be noted that the isoscalar properties (E/A, K, $\rho_{0}$ and $M^{*}/M$) are well constrained for all SRV parametrizations. The only exception is the error on K in case of SRV04, where the error is almost 10\% of its central value. But in the isovector sector, the percentage error on the slope of symmetry energy (L) are consistently on the larger side for all SRV parametrizations. A great deal of importance to perform covariance analysis in theoretical studies has been pointed out recently \cite{Reinhard2010, Dobaczewski2014}. It not only enables one to quote statistical uncertainties on model parameters or any calculated observables, but also privedes complementary information about the sensitivity of the parameters to physical observables, redundancies among fitted observables or interdependences among model parameters. As our primary objective is not to establish an ultimate model, for demonstrative purpose, we will discuss the results of covariance analysis as outlined in Section \ref{model}B, only for the model SRV02. The results for other parameter sets are quite similar (not shown here). In Fig. \ref{parameter_corr}, the correlation coefficients between different model parameters appearing in Eq. (\ref{eq:lbm}) are outlined for SRV02 parametrization. A strong correlation is found between the several pairs of model parameters, like, $g_{\sigma}$ and $g_{\omega} $, $ g_{\rho}$ and $c_{1}$ and $\overline{\lambda}$ and $\zeta$ with correlation coefficients 0.99, 0.98 and 0.95, respectively. These interdependences mean that if one of these pairs are fixed at a particular value, the other must attain the precise value as suggested by their correlation to satisfactorily obtain the fit data. The results obtained for the correlations among model parameters presented in Fig. \ref{parameter_corr} are quite similar to the obtained in Refs. \cite{Chen2014, Mondal2022b}. Anticipating the strong correlation between L and $\Delta r_{np}$ which is shown later (see Fig. \ref{snm_skin_corr}), this may be attributed to the large experimental error on the $\Delta r_{np}$ for $^{208}$Pb, which also led us choosing a rather large adopted error during optimization. The theoretical errors on the $\Delta r_{np}$ of $^{208}$Pb nucleus are found to be 0.032, 0.028, 0.026, 0.0353 and 0.029 fm for SRV00, SRV01, SRV02, SRV03, and SRV04 parametrizations, respectively. These are much smaller compared to the adopted error (0.071 fm, which is also the experimental error obtained in Ref. \cite{Adhikari2021}). \begin{figure} \centering \includegraphics[trim=0 0 0 0,clip,scale=0.61]{par_vs_snm_skin.eps} \caption{\label{par_vs_snm_skin} (Color online) Correlation coefficients (absolute values) between the model parameters and a set of physical observables for SRV02 parametrization (see text for details).} \end{figure} We now display in Fig. \ref{par_vs_snm_skin}, the correlation coefficients between the model parameters apearing in Lagrangian (Eq. \ref{eq:lbm}) and the different properties of interest corresponding to the SNM and the density dependent symmetry energy as displayed in Table \ref{tab:table3} and the $\Delta r_{np}$ of $^{208}$Pb for SRV02. A strong correlation is observed between the isovector parameter $g_{\rho}$ with the symmetry energy coefficient (J), its slope (L) and $\Delta r_{np}$ of $^{208}$Pb. The vector mixing parameter $c_{1}$ is also found to have a strong correlation with the J and L. This strong correlation is anticipated, as $c_{1}$ and $g_{\rho}$ are strongly correlated to each other, which was observed in Fig. \ref{parameter_corr}. It is also realized from Fig. \ref{par_vs_snm_skin} that bulk properties of SNM like E/A, K, $\rho_{0}$ and $M^{*}/M$ have strong correlations with isoscalar coupling parameters $g_{\sigma}$, $g_{\omega}$ and $\overline{\kappa}$. This study is quite consistent with previous calculations in the literature \cite{Chen2014, Mondal2016, Reinhard2022}. \begin{figure} \centering \includegraphics[trim=0 0 0 0,clip,scale=0.6]{snm_skin_corr.eps} \caption{\label{snm_skin_corr} (Color online) Correlation coefficients (absolute values) for few bulk nuclear matter properties and neutron skin of $^{208}$Pb for SRV02 parametrization.} \end{figure} In Fig. \ref{snm_skin_corr}, we display the correlation coefficients among the different observables in graphical form, particularly which were also studied in Fig. \ref{par_vs_snm_skin}. In the isoscalar sector the only strong correlation observed is between binding energy per nucleon (E/A) and incompressibility coefficient (K). The K also shows some mild correlations with all other observables displayed in the figure. The symmetry energy J and its slope parameter L are found to be strongly correlated. As mentioned earlier in the discussion of Table \ref{tab:table3}, we observe a strong correlation of the neutron skin thickness of $^{208}$Pb with J and L. These results are also in line with the earlier ones \cite{Chen2014}. \begin{figure} \centering \includegraphics[trim=0 0 0 0,clip,scale=0.40]{mass_split.eps} \caption{\label{fig:fig2} (Color online) Effective masses of proton and neutron for a few values of asymmetry parameter $\alpha$ for SRV04 parametrization.} \end{figure} It is quite important to emphasize that we kept fixed the strength of the coupling of $\delta$ meson to different values and optimized the rest. This might be partially responsible to impart a strong correlation among the isovector sensitive parameters $g_{\rho}, c_1$ to J, L or $\Delta r_{np}$ of $^{208}$Pb (see Fig. \ref{par_vs_snm_skin}) to reproduce the fitted data within bounds. It further gets clarified in the strong correlations among $\Delta r_{np}$ ($^{208}$Pb), J and L in Fig. \ref{snm_skin_corr}. Anticipating the results obtained for neutron stars which are discussed later, this strong correlation somewhat restricts the behavior of the matter at high densities in the isovector channel, resulting in a monotonic increasing in the radius and tidal deformability of 1.4 $M_{\odot}$ (see Table \ref{tab:table4}) with the increase of the $\delta$ meson coupling $g_{\delta}$. A full optimization is thus needed with suitable data in the future including $g_{\delta}$, to understand this behavior further. In the present work we have included the simplest form of $\delta$-meson coupling ($g_{\delta}$) to the nucleons. Furthermore, a higher order mixed scalar interactions of $\delta$ meson has a large influence on the symmetry energy and its density dependence. This enables one to have flexibility to vary the behaviour of EoS at high density and gives a large influence on the properties of neutron stars \cite{Zabari2019,Zabari2019_2,Miyatsu2022}. To study the effects of $\delta$-meson on nucleon mass, in Fig. \ref{fig:fig2}, the effective mass of proton and neutron are plotted as a function of baryon density for three values of asymmetry parameter $\alpha$= 0, 0.5, 1 ($\alpha$= $\frac{\rho_{n}-\rho_{p}}{\rho_{n}+\rho_{p}}$) for SRV04 parametrization, which has the largest value of $g_{\delta}$ amongst all SRV variants obtained in the present work. The asymmetry parameter $\alpha$ = 0.0 represents the SNM and $\alpha$=1 corresponds to the pure neutron matter (PNM). It is clear from the Eq. (\ref{eq:nucleon}) that the presence of $\delta$-meson leads to splitting of nucleon mass. For SNM, there is no splitting of the nucleon mass. In Fig. \ref{fig:fig2}, the solid (dashed) lines depict the effective mass of proton (neutron) for $\alpha$= 0, 0.5 and 1.0. One can observe from the figure that the effective proton mass is larger than the neutron effective mass. The splitting of the proton and neutron effective masses due to the $\delta$-meson can be important in the highly asymmetric system like a neutron star or supernova environment. At the center of a neutron star the density can reach $\sim$ 5-6 $\rho_0$ and $\alpha\sim$ 0.7-0.8. One can readily estimate the amount of splitting in the effective mass in this situation looking at Fig. \ref{fig:fig2}. It can also affect the transport properties of neutron star matter \cite{Kubis1997}. \begin{figure} \centering \includegraphics[trim=0 0 0 0,clip,scale=0.56]{mr.eps} \caption{\label{mr} (Color online) Mass-Radius relation of neutron star for SRV parametrizations.} \end{figure} \begin{table*} \caption{\label{tab:table4}The properties of nonrotating neutron star for the various EOSs computed with SRV parameter sets are presented along with the theoretical errors on them. M$_G$ and R$_{max}$ denote the Maximum Gravitational mass and corresponding radius. The values for R$_{1.4}$ and $\Lambda_{1.4}$ denote radius and dimensionless tidal deformability at 1.4M$_\odot$. } \begin{tabular}{ccccccc} \hline \bf{No.} &\bf{EOS}& \bf{$M_G$}& \bf{R$_{max}$ } & \bf{R$_{1.4}$}&\bf{$R_{2.0}$}&${\bf{\Lambda_{1.4}}}$\\ & &(M$_{\odot}$) & (km)& (km) &(km) & \\ \hline 1.&SRV00&2.04$\pm$0.03&11.48$\pm$0.08&12.92$\pm$0.22&12.07$\pm$0.31&484.16$\pm$62.10\\ 2.&SRV01&2.06$\pm$0.02&11.55$\pm$0.13&12.99$\pm$0.20&12.24$\pm$0.21&504.95$\pm$58.02\\ 3.&SRV02&2.07$\pm$0.02&11.67$\pm$0.07&13.16$\pm$0.13&12.43$\pm$0.14&565.52$\pm$60.33\\ 4.&SRV03&2.08$\pm$0.02&11.81$\pm$0.11&13.41$\pm$0.21&12.60$\pm$0.16&652.60$\pm$52.01\\ 5.&SRV04&2.13$\pm$0.06&12.11$\pm$0.23&13.86$\pm$0.21&13.09$\pm$0.33&783.96$\pm$70.03\\ \hline \end{tabular} \end{table*} To assess the impact of $\delta$-meson on the global properties of neutron star, we plot the gravitational mass ($M_G$) of non-rotating neutron star as a function of radius for all SRV parametrizations in Fig. \ref{mr}. The maximum mass ($M_{max}$) and the corresponding radius ($R_{max}$) of neutron star for all the models obtained here lie in the range 2.04 - 2.13 $M_{\odot}$ and 11.48 - 12.11 km, respectively. This satisfies the recently measured radius of PSRJ0740+6620 with $12.45^{+0.65}_{-0.65}$ km by NICER collaboration \cite{Miller2021,Riley2021}. The radius of neutron star of 2$M_{\odot}$ is also in accordance with the observational data of PSRJ0740+6620 by NICER \cite{Miller2021,Riley2021}. The maximum mass of the neutron star attained by various SRV parametrizations supports the constraint from PSRJ0740+6620 with the mass of 2.08 $\pm$ 0.07 $M_{\odot}$ \cite{Cromartie2019,Fonseca2021}. It is observed that the radius ($R_{1.4}$) of neutron star with mass 1.4$M_{\odot}$, can be significantly affected by the presence of $\delta$-meson as we move from parametrization set SRV00 to SRV04. The value of $R_{1.4}$ with the inclusion of TM1 crust EoS \cite{Sugahara1994} lies in the range 12.92-13.86 km, which is also in line with the range proposed in Ref. \cite{Miller2021,Reed2021}. It is observed that the radius $R_{1.4}$ increases by 7.27 \% and the maximum mass of neutron star changes by 4.4 \% from SRV00 to SRV04 parametrizations with the variation of coupling $g_{\delta}$= 0.0 to 4.0. This change in the neutron star properties may be attributed to the impact of $\delta$-meson, which affects high-density behavior of asymmetric nuclear matter. Tidal deformability imparted by the companion stars on one another in a binary system can yield remarkable information on the EoS for neutron star \cite{Hinderer2008, Hinderer2010}. In Fig. \ref{tidal}, we show the results of dimensionless tidal deformability $\Lambda$, defined as $\Lambda$= (2/3)$k_{2}$$(R/M_G)^{5}$, where $k_{2}$ is the love number, as a function of the neutron star mass $M_G$ for different SRV models. The recent constraints on the tidal deformability $\Lambda_{1.4}$ of 1.4$M_{\odot}$ neutron star including GW170817 \cite{Abbott2018,Li2021} is also given in the figure. The value of $\Lambda_{1.4}$ lies in the range 484 - 783 for different SRV parametrizations, which satisfies the proposed limit are listed in Refs. \cite{Abbott2018, Chen2021,Abbott2017,Reed2021}. The value of $\Lambda_{1.4}$ increases with the increase in the value of the coupling $g_{\delta}$ corresponding to the SRV parametrizations as can be seen from Fig. \ref{tidal}. All these results are summarized in Table \ref{tab:table4}. The theoretical erros/uncertainities in neutron star properties for SRV parametrizations are also mentioned in the table. The neutron star properties such as $M_{max}$, $R_{max}$, $R_{1.4}$, $R_{2.0}$ are relatively well constrained for all SRV parametrizations (at $\leq$ 3 $\%$) whereas for $\Lambda_{1.4}$, the theoretical uncertainities are found to be $\leq$ 10$\%$. \begin{figure} \centering \includegraphics[trim=0 0 0 0,clip,scale=0.42]{tidal.eps} \caption{\label{tidal} (Color online) Variation of dimensionless tidal deformability ($\Lambda$) with respect to gravitational mass for SRV parametrizations.} \end{figure} To this end, we may mention that the contribution of $\delta$ meson is considered only through its linear interaction with nucleons. However, inclusion of the self interaction of $\delta$ mesons and the mixed interactions with other mesons may alter the symmetry energy at suprasaturation densities. This would further enhance the flexibility of EOS of dense matter and accordingly the properties of neutron stars \cite{Zabari2019,Zabari2019_2,Miyatsu2022}. Inclusion of the higher order contributions of $\delta$ meson thus enable one to model the properties of neutron stars in somewhat independent of the properties of finite nuclei. The optimization of effective Lagrangian that includes different terms involving $\delta$ meson field requires accurate knowledge of neutron star properties over a wide range of mass. \section{Summary and conclusions}\label{conclusion} The effect of the isovector-scalar field corresponding to $\delta$-meson in relativistic mean field theory is investigated. We have generated five sets of SRV parametrizations SRV00, SRV01, SRV02, SRV03 and SRV04 to explore the effects of $\delta$-meson on the properties of finite nuclei, infinite nuclear matter, and neutron stars. A covariance analysis to measure the accuracy of model predictions is also performed. This also enabled us to carry out a systematic study of correlations among model parameters and various finite nuclei and infinite nuclear matter properties of interest. The SRV parametrizations have been obtained in such a way that they reproduce the ground state properties of the finite nuclei and infinite nuclear matter properties quite convincingly. In turn, they satisfy the constraints on mass and radius of the neutron star and its dimensionless tidal deformability, $\Lambda$, from recent astrophysical observations \cite{Li2013,Yue2022,Abbott2018,Li2021,Reed2021}. It is observed that to fit the properties of finite nuclei and infinite nuclear matter, a stronger coupling between the $\rho$-meson and nucleons ($g_{\rho}$) is required in the presence $\delta$-meson field. Furthermore, the $\delta$-meson significantly affects the radius of canonical neutron star. It is found that the contributions from $\delta$-meson is important and has some significant effects on the dense matter EoS. The value of $\Lambda_{1.4}$ for different SRV parametrization is also in line with the constraint obtained from GW170817 event. It is clear that the isovector splitting of effective mass of nucleon in the presence of $\delta$ in dense asymmetric matter, like the scenario present in the core of a neutron star, can be significant. It remains, however, an open question how to identify in future the signatures of isovector effective mass splitting from astrophysical observations. \begin{acknowledgments} Virender Thakur is highly thankful to Himachal Pradesh University and DST-INSPIRE (Govt. of India) for providing computational facility and financial assistance (Junior/Senior Research Fellowship under grant number “DST/INSPIRE Fellowship/2017/IF170302”). C.M. acknowledges partial support from the IN2P3 Master Project “NewMAC”. \end{acknowledgments}
\section{Introduction} \label{sec:introduction} As autonomous vehicle (AV) operations grow, developing appropriate methods for evaluating AV safety becomes ever more imperative. The question of ``is a vehicle in an unsafe state?'' is relevant for AV system developers, policymakers, and the general public alike (see Figure~\ref{fig:hero}). While \emph{guaranteeing} safety may not be practical in the face of the myriad uncertainties and complexities that come with real-world driving, there is still a broad desire to codify, to some extent, collectively agreed-upon notions of safety \cite{IEEEP28462022}. Should safety be defined using data-driven methods that can account for the complexities of the AV's environment but lack interpretability and formal guarantees, or leverage control theoretic techniques derived from first principles which are interpretable and rigorous but not as scalable or expressive as their learned counterparts? In this work, we strike a middle-ground by a learning safety-critical driving behavior model and integrating it within a robust control framework to develop an interpretable and rigorous AV safety model that is informed by data. Towards this goal of building safe and trustworthy AVs, various stakeholders have advanced \textit{safety concepts} consisting, in general, of two functions mapping world state (e.g., joint state of all agents and environmental context) to (i) a scalar measure of safety, and (ii) a set of allowable (safe) agent actions \cite{LeungBajcsyEtAl2022}. Numerous uses of such safety concepts have been proposed throughout AV pipelines, e.g., a criterion to prune away unsafe plans \cite{PhanMinhHowingtonEtAl2022}, a safety monitor to determine when evasive action must be taken \cite{LeungSchmerlingEtAl2020}, a component in the planning objective \cite{WangLeungEtAl2020}, or for perception safety evaluation metrics \cite{OborilBuerkleEtAl2022,TopanLeungEtAl2022}. Critically, different behavioral assumptions lead to different safety concepts which in turn affects realized AV safety and performance. To mitigate overconservatism and enable maximum flexibility, we contend that the design of an effective safety concept hinges upon characterizing reasonable foreseeable behaviors of other agents, in a way conducive to efficiently evaluating the safety of driving scenes and producing associated safe controls. To address this challenge, we propose designing novel safety concepts by learning from data what are controls, specifically, control sets, that humans operate with when their safety is threatened, and then using these learned control sets to inform AVs of what are reasonable foreseeable behaviors of other agents in safety-critical scenarios. Equipped with such a learned ``human behavior collision avoidance model,'' we perform safety concept synthesis by using robust control theory, specifically Hamilton-Jacobi reachability \cite{MitchellBayenEtAl2005}, as a powerful inductive bias for interpretability, verifiability, and tractability. Our control set learning approach differs from reward learning paradigms (i.e., inverse reinforcement learning / inverse optimal control \cite{AbbeelNg2004,ZiebartMaasEtAl2008,LevineKoltun2012}) which strive to learn high-level human intentions from demonstrations, often in the absence of constraints \cite{PhanMinhHowingtonEtAl2022,SadighSastryEtAl2016c}. Reward learning approaches aim to model a human's high-level planning objective which encapsulates more than just safety considerations. Whereas in this work, we are interested in \textit{learning control constraint boundaries associated with collision avoidance behaviors} as opposed to nuanced behaviors (e.g., aggressive versus passive). \begin{figure}[t] \centering \includegraphics[width=0.47\textwidth]{figs/hero.png} \caption{Evaluating the safety of an autonomous vehicle (AV) depends on what constitutes as \textit{reasonable foreseeable behaviors} of other road users. For example, determining whether the autonomous car (blue) is currently in a safe state depends on how the human driver (red) may behave (e.g., speed up or swerve away). In this work, we develop a data-driven methodology to model reasonable foreseeable behaviors and leverage the learned model for AV safety evaluation.} \label{fig:hero} \end{figure} \noindent \textbf{Structure and Contributions.} We provide a literature review in Section~\ref{sec:related work}, give an overview on Hamilton-Jacobi (HJ) reachability in Section~\ref{sec:hj reachability}, and formally state our safety concept learning problem in Section~\ref{sec:problem formulation}. Then we describe the details of our key contributions: \textbf{(i)} We propose a data-driven approach to learn humans' collision avoidance behaviors in the control space to capture ``reasonable driving behaviors'' (Section~\ref{sec:learning control sets}). Specifically, we learn safe control sets from demonstrations via a high order control barrier function (HOCBF) \cite{XiaoBelta2021} framework. \textbf{(ii)} We develop a constrained game-theoretic optimization problem derived from a HJ reachability formulation to synthesize novel data-driven safety concepts that are robust to other agents' behaviors while respecting the learned collision avoidance behaviors (Section~\ref{sec:data-driven safety}). \textbf{(iii)} We demonstrate our proposed learning framework using highway driving data and show that the resulting data-driven safety concept is less conservative than other common safety concepts (due to the way it captures constraints on reasonable agent behavior) and thus is useful as a ``responsibility-aware'' evaluation metric for the safety of AV interactions (Section~\ref{sec:results}). \section{Related Work} \label{sec:related work} We use the term \textit{safety concept} to help unify existing safety theory prevalent in various robot planning and control algorithms, such as velocity obstacles \cite{FioriniShiller1998,WilkieVanDenBergEtAl2009}, forward reachable sets \cite{HolmesKousikEtAl2020,AlthoffDolan2014}, contingency planning \cite{KuwataTeoEtAl2009,JansonHuEtAl2018}, backward reachability \cite{MitchellBayenEtAl2005}, and other methods that make static assumptions on agent behavior \cite{NisterLeeEtAl2019,ShalevShwartzShammahEtAl2017}. The differences between various safety concepts stem from the assumptions about the behavior of other interacting agents, ranging from worst-case assumptions \cite{MitchellBayenEtAl2005} to presuming agents follow fixed open-loop trajectories (e.g., braking \cite{ShalevShwartzShammahEtAl2017}, constant velocity \cite{WilkieVanDenBergEtAl2009}). Indeed, a core challenge is in selecting behavioral assumptions that balances conservatism, tractability, interpretability, and compatibility with real-world interactions. Recent works propose dynamically changing the conservatism of the safety concept based on online estimations of how confident the robot's human behavior prediction model is. If a human agent is behaving as expected (i.e., high model confidence), then the worst-case assumptions in the safety concept can be relaxed, and vice versa \cite{FridovichKeilBajcsyEtAl2019,TianSunEtAl2022}. However, the integrity of the adaptive safety concept depends on the quality of the prediction model where obtaining an accurate human behavior prediction model is in general quite challenging and, indeed, is an active research field \cite{RudenkoPalmieriEtAl2020}. Another data-driven safe control technique is to use expert demonstrations and learn a control barrier function (CBF) \cite{AmesCooganEtAl2019} to describe unsafe regions in the state space \cite{RobeyHuEtAl2020,RobeyLindemannEtAl2021,QinZhangEtAl2021,LyuLuoEtAl2022}. The learned CBF is then \textit{directly} used as the core safety mechanism in synthesizing a safe policy. However, CBFs are not well-suited for interactive settings where there is uncertainty in how other interacting agents may behave. In our work, we too consider learning CBFs (specifically, high order CBFs (HOCBFs) \cite{XiaoBelta2021}), but instead use the learned HOCBF as an intermediate step towards formulating a more rigorous notion of safety rooted in robust control theory which enjoys interpretability and verifiability benefits. \section{Safety Concept via Hamilton-Jacobi Reachability} \label{sec:hj reachability} We define a safety concept as a combination of two functions mapping world state to (i) a scalar measure of safety, and (ii) a set of allowable actions for each agent in which to preserve safety. A family of safety concepts can be described via a HJ reachability formulation \cite{LeungBajcsyEtAl2022}. HJ reachability is a mathematical formalism used for characterizing the safety properties of dynamical systems \cite{MitchellBayenEtAl2005,MargellosLygeros2011}. The outputs of a HJ reachability computation are (i) a HJ value function, a scalar-valued function that measures ``distance'' to collision, and (ii) a set of controls that prevents the safety measure from decreasing further---precisely the components needed for a safety concept. Consider a target set $\mathcal{T}$ which is the set of collision states between agents $A$ (ego agent) and $B$ (contender). The HJ reachability formulation describes a two-player differential game to determine whether it is possible for the ego agent to avoid entering $\mathcal{T}$ under any family of closed-loop policies of the contender, as well as the ego agent's appropriate control policy for ensuring safety. It is assumed that the contender follows an \textit{adversarial} policy and has the advantage with respect to the information pattern. Using the principle of dynamic programming, the collision avoidance problem reduces to solving the Hamilton-Jacobi-Isaacs (HJI) partial differential equation (PDE)\cite{MitchellBayenEtAl2005}, \vspace{-3mm} {\small \begin{equation} \begin{aligned} &\frac{\partial \mathcal{V}(x, t)}{\partial t} + \min \Big\{0,~ {\begingroup \max_{\uA \in \UA} \min_{\uB \in \UB} \endgroup} \nabla_{x} \mathcal{V}(x, t)^\top f(x, \uA, \uB) \Big\} = 0\\ &\mathcal{V}(x, 0) = \ell(x) \end{aligned} \label{eq:hji pde} \end{equation} } \noindent where $x \in \mathcal{X}$ denotes the joint state of agents $A$ and $B$, $\uA \in \UA$ and $\uB\in\UB$ are the available (bounded) controls\footnote{The control sets $\UA$ and $\UB$ are typically chosen to reflect the physically feasible limits of the system.} of agents $A$ and $B$, respectively, and $f(\cdot,\cdot,\cdot)$ is the joint dynamics assumed to be measurable in $\uA$ and $\uB$ for each $x$, and uniformly continuous, bounded, and Lipschitz continuous in $x$ for fixed $\uA$ and $\uB$.\footnote{This assumption ensures that trajectories are generated by a unique control sequence.} The boundary condition is defined by a function $\ell: \mathcal{X} \rightarrow \mathbb{R}$ whose zero sub-level set encodes the target set, i.e., $\mathcal{T} = \lbrace x \mid \ell(x) < 0\rbrace$. The solution $\mathcal{V}(x,t),\, t\in [-T,0]$, called the HJ value function, captures the lowest value of $\ell(\cdot)$ along the system trajectory within $|t|$ seconds if the systems starts at $x$ and both agents $A$ and $B$ act optimally, that is, $\uA^*(x),\,\uB^*(x) = \arg \max_{\uA \in \UA}(\arg)\min_{\uB \in \UB} \nabla_{x} \mathcal{V}(x, t)^\top f(x, \uA, \uB)$. Thus the HJ value function fulfills the first aspect of a safety concept. After obtaining the HJ value function, we can also consider the set of controls that prevent the HJ value function from decreasing over time. That is, we can compute the \textit{safety-preserving control set}, $\mathcal{U}^\mathrm{A}_{\mathrm{safe}}(x) = \lbrace \uA \in \UA \mid \min_{\uB \in \UB} \frac{d\mathcal{V}(x,t)}{dt} \geq 0 \rbrace $, thus fulfilling the second aspect of a safety concept. By varying the problem parameters, i.e., control sets, behavior type, and a choice of $\ell(\cdot)$, we can synthesize a \textit{family} of safety concepts via HJ reachability. Although solving HJI PDE suffers from the curse of dimensionality, it is performed \emph{offline}. For reasonably sized problems, such as the pairwise car-car system considered in the work, solving the HJI PDE is tractable on modern computers. Equipped with the HJ value function and a state $x$, computing $\mathcal{V}(x, t)$ and $\mathcal{U}^\mathrm{A}_{\mathrm{safe}}(x)$ is computationally lightweight, consisting of a table look-up, interpolation and/or matrix-vector multiplication. \section{Towards Data-driven Safety Concept Synthesis} \label{sec:problem formulation} A key limitation to the standard HJ reachability setup is in the assumption the contender will choose \textit{optimal collision-seeking} controls from $\UB$, the set of admissible controls of the system (typically corresponding to the system's physical limits). While a worst-case assumption is key in providing robustness guarantees for the safety of the system, the assumption that a contender agent will execute \textit{any} available, including worst-case, controls is unrealistic in practice. To reduce the conservatism in how we model a contender's behavior within the HJ formulation (and hence resulting safety concept), we aim to use data to learn \textit{state-dependent control sets} to capture agent behaviors reflecting practical real-world operations. That is, \textbf{the problem we seek to solve consists of two parts: (i) learning state-dependent control sets from data, and (ii) integration of the state-dependent control sets into the HJ reachability formulation for safety concept synthesis.} Building upon the notation introduced in Section~\ref{sec:hj reachability}, consider a nonlinear control-disturbance-affine\footnote{Many vehicle dynamics models can be written as a control-affine system.} system describing the joint dynamics between agent $A$ and $B$, \begin{equation} \dot{x} = f(x) + g(x)\uA + h(x)\uB \label{eq:pairwise dynamics} \end{equation} where $x \in \mathcal{X} \subset \mathbb{R}^n$, $\uA \in \UA\subset \mathbb{R}^{m_\mathrm{A}}$ and $\uB\in\UB \subset \mathbb{R}^{m_\mathrm{B}}$, and $f: \mathcal{X} \rightarrow \mathbb{R}^n$, $g: \mathcal{X} \rightarrow \mathbb{R}^{n \times m_\mathrm{A}}$, and $h: \mathcal{X} \rightarrow \mathbb{R}^{n\times m_\mathrm{B}}$ are locally Lipschitz continuous. \noindent{\bf Learning state-dependent control sets.} Consider an offline dataset $\mathcal{S} = \{ (x^{(i)}, \uA^{(i)}) \}_{i=1}^{N}$ of joint states between agent $A$ and $B$, and agent $A$'s controls collected from \textit{safe} interactions between agents $A$ and $B$. We assume agent $A$ does not observe the controls of agent $B$. We seek to find a mapping $\phi: \mathcal{X} \rightarrow 2^{\UA}$ such that $\uA^{(i)} \in \phi(x^{(i)})$ for all $(x^{(i)}, \uA^{(i)}) \in \mathcal{S}$. Of course $\phi$ can be a trivial mapping, i.e., $\phi(x^{(i)}) = \UA$ for all $x \in \mathcal{X}$; thus we additionally require the learned state-dependent sets to be \textit{minimal} in the sense that the set should contain the relevant points as tightly as possible. \noindent{\bf Safety concept synthesis.} Equipped with $\phi$, we seek to integrate the learned control sets into the HJ reachability framework to \textit{restrict} the feasible control set that an agent will operate with. \section{Learning State-Dependent Control Sets \\From Data} \label{sec:learning control sets} In this section, we describe our proposed approach to describing human collision avoidance behaviors by learning state-dependent control sets from data. First we give a self-contained overview to HOCBFs (Section~\ref{subsec:hocbf}), then followed by our proposed learning procedure (Section~\ref{subsec:hocbf learning}). \subsection{High-Order Control Barrier Functions} \label{subsec:hocbf} HOCBF provides a method to represent and reason about control invariant sets \cite[Theorem 4]{XiaoBelta2021}. Before introducing HOCBFs, we first introduce control barrier functions (CBFs), a special case of HOCBFs. Consider a control-affine system of the form, \begin{equation} \dot{x}=f(x) + g(x)u, \: \text{where}\: x\in\mathcal{X}\subset \mathbb{R}^n, \: u\in \mathcal{U} \subset \mathbb{R}^m, \label{eq:control affine dynamics} \end{equation} where $f: \mathcal{X} \rightarrow \mathbb{R}^n$ and $g: \mathcal{X} \rightarrow \mathbb{R}^{m_\mathrm{A}}$ are locally Lipschitz continuous. Suppose there is a set which the system wants to stay inside of (e.g., set of safe states). A control invariant set is a set of states for which it is possible for a system \eqref{eq:control affine dynamics} to stay inside of indefinitely. In many settings, it is often desirable to find the largest control invariant set that is contained within the safe set. \begin{definition}[Control invariant set] A set $\mathcal{C}$ is control invariant for a system $\dot{x}=f(x,u)$ if for all $x_0\in \mathcal{C}$, there exists a control law $u=k(x) \in \mathcal{U}$ such that $x(t) \in \mathcal{C},\, x(0) = x_0,\, \dot{x}(t)=f(x(t),u)$ for all $t\in[0,\infty)$. \label{def:control invariant set} \end{definition} \noindent One way to represent a control variant set is to use Control Barrier Functions, a scalar valued function which satisfies a set of certain conditions which we describe next. \begin{definition}[Extended Class $\mathcal{K}_\infty$ function] A continuous function $\alpha :(-\infty, \infty) \rightarrow (-\infty, \infty)$, belongs to extended class $\mathcal{K}_\infty$ if it is strictly increasing, $\alpha(0) = 0$, and $\lim_{r\rightarrow \pm\infty} \alpha(r) = \pm\infty$. \end{definition} \begin{definition}[Control Barrier Function \cite{AmesCooganEtAl2019}] Given a system \eqref{eq:control affine dynamics}, consider a continuously differentiable function $b: \mathcal{X} \rightarrow \mathbb{R}$ and a set $\mathcal{C} \subset \mathcal{X}$ where $\mathcal{C} = \{ x \in \mathcal{X} \mid b(x) \geq 0\}$. Then $b$ is a candidate control barrier function (CBF) if there exists a class $\mathcal{K}_\infty$ function $\alpha$ such that \begin{equation} \sup_{u\in \mathcal{U}} \left[ \lie{f}{b}(x) + \lie{g}{b}(x)u \right] \geq - \alpha(b(x)) \quad \forall x\in\mathcal{X}, \label{eq:cbf} \end{equation} where $\lie{f}{b}(x)=\nabla b(x)^Tf(x)$ and $\lie{g}{b}(x)=\nabla b(x)^Tg(x)$ are Lie derivatives describing the change in $b(x)$ along a vector field described by $f(x)$ and $g(x)$, respectively. \label{def:cbf} \end{definition} \noindent A valid CBF ensures that there exists a feasible control that prevents $b(x(t))$ from decreasing faster than a rate of $-\alpha(b(x))$ along system trajectories. If $\lie{g}{b}(x) = 0$, the control input $u$ has no influence in ensuring that \eqref{eq:cbf} holds. In fact, if the \textit{relative degree} $m_\mathrm{r}$ of the system and $b$ is greater than one, then $\lie{g}{b}(x) = 0$ for all $x\in\mathcal{X}$. \begin{definition}[Relative degree] The relative degree $m_\mathrm{r}$ of a (sufficiently) differentiable function $b: \mathbb{R}^n \rightarrow \mathbb{R}$ with respect to dynamics \eqref{eq:control affine dynamics} is when $\lie{g}{\liem{f}{b}{m_\mathrm{r}-1}}(\cdot) \neq 0$ but $\lie{g}{\liem{f}{b}{m_\mathrm{r}-2}}(\cdot) = 0$. \end{definition} \noindent When $m_\mathrm{r} > 1$, the standard CBF formulation (Definition~\ref{def:cbf}) cannot be used to determine what are safe control actions. Thus we consider HOCBFs \cite{XiaoBelta2021} instead which addresses this issue, and we show later that HOCBFs are a more natural paradigm to encode obstacle sets. \begin{definition}[High-order Control Barrier Function \cite{XiaoBelta2021}] Given a system \eqref{eq:control affine dynamics}, and an $m^{\mathrm{th}}$ order differentiable function $b: \mathcal{X} \rightarrow \mathbb{R}$. Let $m_\mathrm{r}\leq m$ be the relative degree of $b$ with respect to the dynamics. Define a sequence of functions $\psi_i(x) = \dot{\psi}_{i-1}(x) + \alpha_i(\psi_{i-1}(x)),\, i=1,...,m_\mathrm{r}, \, \, \psi_0(x) = b(x)$. Then $b$ is a candidate high order control barrier function (HOCBF) of relative degree $m_\mathrm{r}$ for system \eqref{eq:control affine dynamics} if there exists differentiable extended class $\mathcal{K}$ functions $\alpha_i,\,i=1,...,m_\mathrm{r}$ such that {\footnotesize \begin{equation} \sup_{u\in \mathcal{U}} \underbrace{\left[ \liem{f}{b}{m_\mathrm{r}}(x) + \lie{g}{\liem{f}{b}{m_\mathrm{r}-1}}(x)u + \mathcal{O}(b(x)) +\alpha_{m_\mathrm{r}}(\psi_{{m_\mathrm{r}}-1}(x))\right]}_{\psi_{m_\mathrm{r}}(x)} \geq 0, \label{eq:hocbf} \end{equation} } \noindent where $\mathcal{O}(b(x)) = \sum_{i=1}^{{m_\mathrm{r}}-1} \liem{f}{(\alpha_{{m_\mathrm{r}}-i} \circ \psi_{{m_\mathrm{r}}-i-1}}{i})(x)$. \label{def:hocbf} \end{definition} \begin{theorem}[\cite{XiaoBelta2021}, Theorem 4] Given a valid HOCBF $b(x)$ for a system \eqref{eq:control affine dynamics} and sets $\mathcal{C}_i,\, i=1,...,m_\mathrm{r}$, $\mathcal{C}_i = \{ x \in \mathcal{X} \mid \psi_{i-1}(x) \geq 0 \}$. Then any Lipschitz controller $u\in K_\mathrm{HOCBF}(x)$ renders the set $\cap_{i}^m \mathcal{C}_i$ forward invariant, where \begin{eqnarray} \small K_\mathrm{HOCBF}(x) = \{u\in \mathcal{U} \mid \liem{f}{b}{m_\mathrm{r}}(x) + \lie{g}{\liem{f}{b}{m_\mathrm{r}-1}}(x)u + \notag\\ \mathcal{O}(b(x)) +\alpha_{m_\mathrm{r}}(\psi_{{m_\mathrm{r}}-1}(x)) \geq 0\}. \label{eq:hocbf control set} \end{eqnarray} \normalsize \end{theorem} \begin{definition}[Effective CBF] Given a HOCBF $b$ and corresponding $\alpha_i,\, i=1,...,m_\mathrm{r}$, we say $\psi_{m_\mathrm{r}-1}$ is the ``effective'' CBF since \eqref{eq:hocbf} is equivalent to \eqref{eq:cbf} with $b(x) = \psi_{m_{\mathrm{rel}-1}}(x)$. \label{def:effective cbf} \end{definition} In short, given system dynamics and an unsafe set, HOCBFs can describe control invariant sets. The size and shape of a control invariant set is influenced by the $\alpha_i$ functions which imposes a bound on the allowable rate at which the system is allowed to approach the unsafe set. \subsection{State-dependent Control Set Learning Procedure} \label{subsec:hocbf learning} In this section, we detail our state-dependent control set learning procedure. Roughly, we use HOCBF as inductive bias in learning a mapping from state to control set. \subsubsection{Learning set-up and assumptions} We make the assumption that (safe and reasonable) drivers do not put themselves in situations where it is not possible for them to avoid a collision. That is, drivers execute controls that ensure they continually stay inside a ``safe set'' because leaving that set may lead to collision. For example, (typical) safe drivers avoid approaching obstacles at high speeds because they may not be able to steer and slow down to avoid the obstacle. This so-called ``safe-set'' is precisely a control invariant set (see Definition~\ref{def:control invariant set}). Thus, given a dataset of \textit{safe} collision-free trajectories, the goal is to learn a control invariant set and corresponding control sets that contain the observed samples. We represent the control invariant set using HOCBFs \cite[Theorem 4]{XiaoBelta2021} which provides inductive bias that help make the learning process tractable and a direct and interpretable way to obtain state-dependent control sets (see \eqref{eq:hocbf control set}) amenable for safety concept synthesis. For collision avoidance, agents are aiming to avoid the \textit{same} obstacle set but only differ in \textit{how} they avoid it. Thus we use HOCBFs to avoid reasoning about obstacle sets in velocity states (or higher derivatives) which is difficult to construct, and instead reason about $\alpha_i$'s. \subsubsection{Illustrative example} \begin{figure}[t] \centering \includegraphics[width=0.5\textwidth]{figs/toy_different_behaviors_hocbf.png} \caption{Two different $\alpha_i$ functions parameterized by different parameters, $\mathbf{p}_\mathrm{A}$ and $\mathbf{p}_\mathrm{B}$, result in different trajectory behaviors and effective CBFs. Left: More ``aggressive'' behaviors are observed with using $\mathbf{p}_\mathrm{B}$ compared to $\mathbf{p}_\mathrm{A}$. Right: The ground truth effective CBF each set of trajectories.} \label{fig:hocbf illustration} \end{figure} Figure~\ref{fig:hocbf illustration} illustrates how different parameters for the HOCBF $\alpha_i$ functions result in different collision avoidance behaviors, thereby motivating our goal of learning HOCBFs, specifically parameters for $\alpha_i$, from data. Suppose a car needs to avoid a circular obstacle centered at $x_\mathrm{ob}$ with radius $r_\mathrm{ob}$ while reaching a goal state $x_\mathrm{goal}$. We use a HOCBF $b(x) = \|x - x_\mathrm{ob}\|^2_2 - r_\mathrm{ob}^2$ to represent the obstacle (i.e., the unsafe set). Figure~\ref{fig:hocbf illustration} illustrates two sets of trajectories generated from the HOCBF-CLF planner described in \cite{XiaoBelta2021}, each set constructed using different parameters, $\mathbf{p}_\mathrm{A}$ and $\mathbf{p}_\mathrm{B}$ for $\alpha_i$. We see that $\mathbf{p}_\mathrm{A}$ (blue) results in more conservative behaviors than $\mathbf{p}_\mathrm{B}$ (orange) since the blue trajectories starts turning away from the obstacle earlier. Correspondingly, we see the zero sub-level set of the effective CBF with $\mathbf{p}_\mathrm{A}$ is larger than the one for $\mathbf{p}_\mathrm{B}$. \subsubsection{HOCBF learning algorithm} Next, we present our HOCBF learning algorithm whereby we aim to learn the parameters for $\alpha_i$ from data. Let $\mathcal{S} = \{ (x^{(i)}, u^{(i)}) \}_{i=1}^{N}$ be a dataset containing states and controls collected from humans operating in the target environment exhibiting \textit{safe} collision avoidance behaviors. Since negative examples are rare and their explicit collection is impractical, one of the key strengths of our method is its ability to learn control invariant sets from just positive examples. A;though our method can also consider negative examples if available. Suppose we have dynamics given by \eqref{eq:control affine dynamics}. Let $\mathcal{C}$ describe the set of obstacle states in position space (we consider $\mathbb{R}^2$ but this analysis can extend to $\mathbb{R}^3$). Let $b: \mathcal{X} \rightarrow \mathbb{R}$ be a function where $b(x) \leq 0 \Leftrightarrow \mathrm{pos}(x) \in \mathcal{C}$, and $\mathrm{pos}:\mathcal{X} \rightarrow \mathbb{R}^2$ is a function that extracts the position states. Let $m_\mathrm{r}\geq1$ be the relative degree of \eqref{eq:control affine dynamics} and $b$. We seek to find $\alpha_i, \, i=1,...,m_\mathrm{r}$ such that $u^{(j)} \in K_\mathrm{HOCBF}(x^{(j)})$ for all $(x^{(j)}, u^{(j)}) \in \mathcal{S}$. More concretely, let $\alpha_i^{p_i}$ indicate that $\alpha_i$ is parameterized by a vector of parameters $p_i$, and let $\mathbf{p} = [p_1,...,p_{m_\mathrm{r}}]$. Considering that (i) $\alpha_i^{p_i}$ can be chosen to be arbitrarily large (i.e., steep) which will trivially lead to \eqref{eq:hocbf control set} being true for all datapoints, (ii) we want the HOCBF control constraint \eqref{eq:hocbf control set} to be satisfied, (iii) the states should be inside the (safe) control invariant set, and (iv) the dataset could contain outliers or noise, we seek to find $\mathbf{p}^\star$ such that, \begin{equation} \begin{split} \mathbf{p}^\star =& \arg\min_{\mathbf{p}} \frac{1}{N}\sum_{j=1}^N\underbrace{-\beta_1\min\{G_x^ju^{(j)} + F_x^j(\mathbf{p}), 0\}}^{\text{\eqref{eq:hocbf control set} violation}} + \\ &\qquad \qquad \qquad \beta_2 \underbrace{\max\{\tanh(G_x^ju^{(j)} + F_x^j(\mathbf{p})), 0\}}^{\text{\eqref{eq:hocbf control set} satisfaction (saturated)}} + \\ & \qquad \qquad \qquad \beta_3( \underbrace{-\min\{ \psi_{m_\mathrm{r}-1}(x^{(j)};\mathbf{p}), 0\}}_{\text{Effective CBF violation}} +\\ &\qquad \qquad \qquad \beta_4 \underbrace{\max\{ \tanh(\psi_{m_\mathrm{r}-1}(x^{(j)};\mathbf{p})), 0\}}_{\text{Effective CBF satisfaction (saturated)}} + \\ & \qquad \qquad \qquad \beta_5 \underbrace{\|\mathbf{p}\|_2^2}_{\text{$\alpha_i$ regularization}} \label{eq:hocbf learning} \end{split} \end{equation} where $G_x^j = \lie{g}{\liem{f}{b}{m_\mathrm{r}-1}}(x^{(j)})$, $F_x^j(\mathbf{p}) =\liem{f}{b}{m_\mathrm{r}}(x^{(j)})+ \mathcal{O}(b(x^{(j)});\mathbf{p}) +\alpha_{m_\mathrm{r}}^{p_{m_\mathrm{r}}}(\psi_{{m_\mathrm{r}}-1}(x^{(j)}))$, and $\mathcal{O}(b(x);\mathbf{p}) = \sum_{i=1}^{{m_\mathrm{r}}-1} \liem{f}{(\alpha_{{m_\mathrm{r}}-i}^{p_{m_\mathrm{r}}-i} \circ \psi_{{m_\mathrm{r}}-i-1}}{i})(x)$ (c.f., \eqref{eq:hocbf control set}). We highlight some important considerations for this optimization problem. \noindent{\it Saturation:} We apply $\tanh$ on the second and fourth terms in \eqref{eq:hocbf learning} because while we desire all the data points to satisfy the HOCBF conditions, we are not too interested in \textit{how much} each data point satisfies them. That is, we want to reduce the influence of extremely safe points (e.g., states very far and moving away from the obstacle). \noindent{\it Parameterization:} The $\alpha_i, \, i=1,...,m_\mathrm{r}$ functions must belong to extended class $\mathcal{K}_\infty$. As such, we can parameterize $\alpha_i$ as a linear combination of extended class $\mathcal{K}_\infty$ basis functions. In future work, we can consider using a monotonic neural network \cite{Sill1997,WehenkelLouppe2019}. \noindent{\it Pairwise joint dynamics:} In the case with pairwise joint dynamics, as presented in \eqref{eq:pairwise dynamics}, there is an additional term corresponding to the contender's input (i.e., a disturbance term), and ultimately, it will show up in \eqref{eq:hocbf learning}. In particular, the HOCBF constraint becomes \begin{equation} \begin{split} &\underbrace{\lie{g}{\liem{f}{b}{m_\mathrm{r}-1}}(x)\uA}_{\text{Ego's influence}} + \underbrace{\lie{h}{\liem{f}{b}{m_\mathrm{r}-1}}(x)\uB}_{\text{Contender's influence}} + \\ & \qquad \liem{f}{b}{m_\mathrm{r}}(x)+ \mathcal{O}(b(x);\mathbf{p}) +\alpha_{m_\mathrm{r}}^{p_{m_\mathrm{r}}}(\psi_{{m_\mathrm{r}}-1}(x)) \geq 0 \end{split} \label{eq:hocbf control disturbance constraint} \end{equation} which is affine in $\uA$ and $\uB$. To select a value for $\uB$, depending on what information is available, we could either (i) use the ground truth value, (ii) assume the worst-case, or (iii) \textit{predict} a distribution over agent $B$'s controls and take the worst-case with respect to the predictions. \noindent{\it Differentiability:} If the dynamics and $b$ are differentiable, then \eqref{eq:hocbf learning} can be optimized via standard gradient descent algorithms. In this work, we use JAX \cite{JAX2018}, a Python software library for automatic differentiation. \noindent{\it Negative examples:} If negative examples are available (e.g., from real-world driving logs or synthetically generated \cite{ChenDathathriEtAl2019}), we can include additional terms to \eqref{eq:hocbf learning} that encourage the negative examples to violate the control constraint and have negative effective CBF values. The negative examples will help refine the delineation of the control invariant set. \section{Safety Concept Synthesis via Constrained HJ Reachability} \label{sec:data-driven safety} We incorporate the learned HOCBF into the HJ reachability formulation to synthesize a safety concept that assumes \textit{reasonable} human behaviors in safety-critical situations. Directly adding the learned HOCBF control constraint \eqref{eq:hocbf control disturbance constraint} to \eqref{eq:hji pde} places the burden of constraint satisfaction on the agent that acts second (i.e., agent $B$), thus imposing a strong assumption that the other (uncontrolled) agents will always behave responsibly with respect to HOCBF constraint satisfaction. To address this, we swap the ordering in which the agents act, and the following proposition states that this swapping results in a more conservative HJ value function, i.e., it is more advantageous for a player to act first. \begin{proposition} Consider a coupled affine constraint $p(\uA, \uB) := a\uA + b\uB + c \geq 0$ in $\uA$ and $\uB$, and a linear objective $q(\uA, \uB)=A\uA + B\uB$. Let $\UAz = \{ \uA\in\UA \mid \exists \uB\in\UB, \, p(\uA,\uB) \geq 0\}$ and $\UBz = \{ \uB\in\UB \mid \exists \uA\in\UA, p(\uA,\uB) \geq 0\}$ represent control sets for each agent which ensures the other agent can satisfy the constraint $p(\uA, \uB) \geq 0$. Let $\UA(\uB) = \{ \uA\in\UA \mid p(\uA,\uB) \geq 0\}$, and $\UB(\uA) = \{ \uB\in\UB \mid p(\uA,\uB) \geq 0\}$ describe an agent's feasible control set with the other agent's control fixed. Then, \begin{equation} \max_{\uA \in \UAz} \min_{\uB \in \UB(\uA)} q(\uA, \uB) \geq \min_{\uB \in \UBz} \max_{\uA \in \UA(\uB)} q(\uA, \uB). \label{eq:minimax constrained inequality} \end{equation} \label{prop:minimax constrained inequality} That is, the player that acts first has the advantage assuming the second player is provided feasible options. \end{proposition} \begin{proof} \begin{eqnarray*} &&\max_{\uA \in \UAz} \min_{\uB \in \UB(\uA)} q(\uA, \uB) \\ &\geq& \max_{\uA \in \UAz} \min_{\uB \in \UBz} q(\uA, \uB) \quad {\small(\UB(\uA) \subseteq \UBz)}\\ &=& \min_{\uB \in \UBz} \max_{\uA \in \UAz} q(\uA, \uB) \quad {\small(\text{Minimax theorem})}\\ &\geq& \min_{\uB \in \UBz} \max_{\uA \in \UA(\uB)} q(\uA, \uB) \quad {\small (\UA(\uB) \subseteq \UAz)} \end{eqnarray*} \end{proof} Proposition~\ref{prop:minimax constrained inequality} is contrary to the well-known minimax inequality for the unconstrained case where the player acting second has the advantage \cite{Neumann1927}. Since we assume control-disturbance-affine dynamics, both the HOCBF constraint from \eqref{eq:hocbf control set} and $\nabla \mathcal{V}(x,t)^Tf(x, \uA, \uB)$ term from \eqref{eq:hji pde} are linear in control input, we can apply Proposition~\ref{prop:minimax constrained inequality} and hence instead consider a \textit{constrained} HJ reachability problem, \vspace{2mm} \begin{equation} \begin{split} &\textbf{Constrained HJ reachability}\\ &\min_{\uB \in \UBz} \max_{\uA \in \UA(\uB)}\nabla_{x} \mathcal{V}(x, t)^\top \left[ f(x) + g(x)\uA + h(x)\uB\right]\\ &\quad \text{such that} \: \eqref{eq:hocbf control disturbance constraint} \:\text{holds}. \label{eq:hji with cbf constraint} \end{split} \end{equation} Instead of assuming the contender will follow a worst-case policy (the standard HJ reachability setup), \eqref{eq:hji with cbf constraint} computes the worst-case \textit{responsible} contender policy, where we consider responsible behaviors as those that ensure HOCBF control constraint satisfaction. This constrained formulation assumes that contender (agent $B$) will act first and choose a control that ensures there exists a feasible control for the ego (agent $A$) to choose from. Thus the ego bears the burden of constraint satisfaction. Future work includes investigating ways to divide collision avoidance responsibility. \section{Experiments and Discussion} \label{sec:results} We present two examples, a simple static obstacle collision avoidance example to aid understanding of our method, and a highway driving scenario studied in \cite{SchmerlingLeungEtAl2018} to illustrate the synthesis of a data-driven safety concept for AV applications. We note that our method can be applied to other settings, such as car-pedestrian interactions, and social navigation. We plan on releasing our code upon publication. \subsection{Collision avoidance with circular obstacle} \begin{figure}[t] \centering \subfloat[Effective CBFs.]{\includegraphics[width=0.16\textwidth]{figs/toy_different_alpha_parameterization.png}\label{fig:toy alpha parameterization comparison}} \subfloat[Synthesized trajectories.]{\includegraphics[width=0.32\textwidth]{figs/toy_generated_traj_with_learned_hocbf.png}\label{fig:toy generated traj from learned hocbf}} \caption{Comparison of various learned HOCBFs for collision avoidance around a circular obstacle.} \label{fig:toy example results} \end{figure} We continue with the example discussed in Section~\ref{subsec:hocbf learning}. Consider a 4-state simple car model, \begin{equation} [\dot{x}, \dot{y}, \dot{\theta}, \dot{v}] = [v\cos\theta , v\sin\theta , \frac{v}{\ell}\tan\delta , a] \label{eq:simple car} \end{equation} with $(\delta,a)$ as steering and acceleration control inputs, and $\ell$ is the wheelbase length of the car. For the HOCBF learning, we use the following parametric form $\alpha_i^{p_i}(a) = p_{i,1}a^{p_{i,2}}$, $p_1 = [0.54, 1.16],\, p_2=[0.68, 1.11]$ to generate a set of trajectories with various random initial conditions. The parameter values serves as the ground truth (GT). We applied the HOCBF learning procedure using various parameterization of $\alpha_i^{p_i}$: power function (same parameterization as GT), linear function $\alpha_i^{p_i} = p_ia$, cubic function $\alpha_i^{p_i}=p_ia^3$, and a linear combination (LC) of a linear, cubic, and $\tanh$ function $\alpha_i^{p_i}(x) = p_{i,1}x + p_{i,2}\tanh(p_{i,3}x) + p_{i,4}x^3$ where $p_i=[p_{i,1}, p_{i,2}, p_{i,3}, p_{i,4}]$, all with $i=1,2$. When learning the parameters of $\alpha$ (i.e., performing gradient descent on \eqref{eq:hocbf learning}), we used $\beta_1 = 1$, $\beta_2 = \beta_4 = 0.001$, $\beta_3 = 1$, $\beta_5 =0.001$, step size / learning rate = $0.001$, and 150000 gradient steps (though it converged much earlier). Figure~\ref{fig:toy example results} visualizes the zero level set of the learned effective CBF (left) and resulting trajectory from running the same reach-avoid planner used to generate the dataset but with the different learned $\alpha_i$ parameterizations (right). We see that the learned HOCBFs except the cubic parameterization is able to closely recover the ground truth behavior (black line). \subsection{Highway driving} In this example, we consider a highway driving scenario, synthesize a novel safety concept based on a highway driving dataset, and evaluate on real traffic data. \subsubsection{Data collection} \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{figs/predicted_3std_example.png} \caption{Comparison between the ground truth control (green), distribution of predicted control (blue), three standard deviation bounds of the prediction distribution (red), and upper/lower control limits (black).} \label{fig:predicted_3std_example} \vspace{-3mm} \end{figure} We use the traffic-weaving dataset \cite{SchmerlingLeungEtAl2018}, and assume the control inputs of the other cars are not observable (this is often true in real-world settings). Instead, we learn a generative model to construct distributions over likely contender controls (i.e., disturbances) and use them as ground truth for our HOCBF learning procedure. We trained a conditional variational autoencoder with a continuous latent space (latent dimension size of 8) with a history length of ten time steps, and prediction horizon of five. Although we predict five time steps into the future, we only consider the first (i.e., current) control of the other agent. We used LSTM cells for the encoder and decoder with hidden dimension 8. Given the prediction, we define $\mathcal{D}_\mathrm{pred}$ as the interval three standard deviations away from the mean, and then compute $\uB \in \mathcal{D}_\mathrm{pred}$ that minimizes the LHS of \eqref{eq:hocbf control disturbance constraint} during the HOCBF learning process. Figure~\ref{fig:predicted_3std_example} shows an example which compares the learned distribution, three standard deviation bound, the ground truth, and control limits. \begin{table}[t] \centering \vspace{2mm} \caption{Values of a hyperparameter sweep. The values chosen for the rest of the experiments are shown in \textbf{bold}.} \begin{tabular}{|c|c|c|} \hline \textbf{Parameter} & \textbf{Values} \\ \hline \hline $\beta_1$ & $\lbrace \mathbf{1} \rbrace$ \\ $\beta_2$ & $\lbrace 0.0, \mathbf{0.001}, 0.01, 0.1 \rbrace$\\ $\beta_3$ & $\lbrace 0., 0.1, \mathbf{1.0} \rbrace$\\ $\beta_4$ & (=$\beta_2$)\\ $\beta_5$ & $\lbrace 0.1, \textbf{0.001} \rbrace $ \\ $\alpha_i$ & $\lbrace \mathbf{p_1 x},\, p_1 x + p_2\tanh(p_4 x) + p_3 x^3\rbrace $\\ Learning rate & $\lbrace \mathbf{0.001} \rbrace $\\ Number of steps & $\lbrace \mathbf{10000} \rbrace$\\\hline \end{tabular} \label{tab:hyperparameter sweep} \end{table} \begin{figure}[t] \centering \subfloat[Zero level-set of HJ value function evaluated at $\Delta x-\Delta y$ slice. $\vA=18$ms$^{-1}$, $\vB=25$ms$^{-1}$, $\theta_\mathrm{A}=\theta_\mathrm{B}=0$rad. ]{\includegraphics[width=0.47\textwidth]{figs/avoid_set_state=-135_00_00_00_180_250.png}\label{fig:trafficweaving avoid set constrained unconstrained comparison, b behind}} \hspace{3mm} \subfloat[HOCBF-HJ and WC-HJ optimal controls for agents $A$ and $B$ when agent $B$ is approaching from behind.]{\includegraphics[width=0.47\textwidth]{figs/control_sets_state=-135_00_00_00_180_250.png}\label{fig:trafficweaving control comparison, b behind}} \caption{Safety concept comparison computed over a two second horizon. Left: Level sets of the HJ value function corresponding to different safety concepts. Right: Plots of control sets with infeasible regions according to the HOCBF constraint shaded gray.} \label{fig:trafficweaving HOCBF-HJ results} \vspace{-4mm} \end{figure} \subsubsection{Safety concept analysis} \begin{table*}[t] \centering \caption{Volumetric ``confusion matrices'' compared against the unconstrained (standard) HJ value function. Values represent the percentage of grid points in state space.} \label{tab:avoid set volume comparison} \begin{tabular}{cc|cc|cc|cc|cc} \toprule {} & {} & \multicolumn{2}{c|}{\bf WC-HJ} &\multicolumn{2}{c|}{\bf HOCBF-HJ} & \multicolumn{2}{c|}{\bf Brake} & \multicolumn{2}{c}{\bf Constant}\\ {} & {} & Safe & Unsafe & Safe & Unsafe & Safe & Unsafe & Safe & Unsafe \\ \midrule \multirow{2}{*}{\bf WC-HJ} & Safe & 89.08 & 0 & 88.93 & 0.15 & 86.56 & 2.52 & 86.28 & 2.79\\ & Unsafe & 0 & 10.92 & 1.30 & 9.62 & 1.52 & 9.40 & 1.49 & 9.43\\ \bottomrule \end{tabular} \end{table*} \begin{table}[t] \centering \caption{HJ value statistics corresponding to various safety concepts evaluated on the NGSIM dataset.} \label{tab:trafficweaving ngsim percentile} \begin{tabular}{|c|c|ccccc|} \hline \multirow{2}{*}{\bf Safety Concept} & \multirow{2}{*}{\bf Mean} & \multicolumn{5}{c|}{\bf Percentile}\\ & & {\bf 0$^\mathrm{th}$} & {\bf 5$^\mathrm{th}$} & {\bf 50$^\mathrm{th}$} & {\bf 95$^\mathrm{th}$} & {\bf 100$^\mathrm{th}$} \\ \hline\hline {\bf WC-HJ} & 4.3 & -0.38 & 0.24 & 4.04 & 9.36 & 13.67\\ {\bf HOCBF-HJ} & 4.42 & -0.37 & 0.23 & 4.17 & 9.54 & 13.62 \\ {\bf Brake} & 4.96 & 0.13 & 0.65 & 4.52 & 10.94 & 14.93 \\ {\bf Constant} & 4.52 & -0.01 & 0.55 & 4.21 & 9.52 & 13.83\\ \hline \end{tabular} \vspace{-3mm} \end{table} We consider a HOCBF $b(x) = \frac{\Delta x^2}{a^2} + \frac{\Delta y^2}{b^2} - 1$, $a = 5.4,\, b = 2.4$, and consider relative dynamics between two vehicles modeled by the simple car model \eqref{eq:simple car}, resulting in a relative degree of two. We applied the learning procedure outlined in Section~\ref{subsec:hocbf learning}; we performed a hyperparameter sweep over the following parameters defined in \eqref{eq:hocbf learning}. The values are presented in Table~\ref{tab:hyperparameter sweep}, and the bolded values are the hyperparameters that we found yielded the best results. With our learned HOCBF, we then solved the corresponding HOCBF constrained HJ reachability problem described by \eqref{eq:hji with cbf constraint}. As our problem is relatively low-dimensional, we can solve the constrained HJ reachability problem exactly by enumerating over the vertices of the feasible domain (but adds significant computational costs). We consider a two second horizon when solving the constrained HOCBF-HJ reachability problem and compare against various safety concepts (also synthesized via a HJ computation). Figure~\ref{fig:trafficweaving HOCBF-HJ results} shows the unsafe region and optimal controls for various safety concepts: \textbf{HOCBF-HJ} is the proposed constrained HJ set-up, \textbf{WC-HJ} is the standard HJ formulation using worst-case contender policy without any control set restriction, \textbf{Brake} assumes both agents perform a maximum braking maneuver with zero steering (inspired by safety concepts used by AV companies \cite{NisterLeeEtAl2019,ShalevShwartzShammahEtAl2017}), and \textbf{Constant} assumes both agents maintain their current velocity \cite{WilkieVanDenBergEtAl2009}, a common assumption used in AV risk assessment methods \cite{DahlRodriguesdeCamposEtAl2019}. Qualitatively, we observe in Figure~\ref{fig:trafficweaving avoid set constrained unconstrained comparison, b behind} that due to the restrictions imposed by the HOCBF constraints, the HOCBF-HJ unsafe set can be significantly less ``wide'' compared to WC-HJ. The skinniness of the HOCBF-HJ unsafe set reflects practical driving assumptions where we expect nearby drivers to stay within their lanes. Figure~\ref{fig:trafficweaving avoid set constrained unconstrained comparison, b behind} also highlights the over-conservatism and impracticality of WC-HJ which would render cars traveling alongside agent $A$ in adjacent lanes as unsafe. A volumetric comparison\footnote{We considered regions where the vehicles speeds were $[15, 30$]ms$^{-1}$ and headings between $[-0.4\pi, 0.4\pi]$.} is provided in Table~\ref{tab:avoid set volume comparison} where we compare the size of the safe/unsafe regions. We see that compared to the Brake and Constant safety concepts, the HOCBF-HJ unsafe set is the most contained within the WC-HJ unsafe set---the regions which WC-HJ deems unsafe but HOCBF-HJ / Brake / Constant deems safe are of a similar ballpark (between 1.30\% to 1.49\%), but the size of the region which WC-HJ deems safe and HOCBF-HJ unsafe is significantly lower compared to Brake and Constant (0.15\% versus 2.52\% and 2.79\% respectively). Figure~\ref{fig:trafficweaving control comparison, b behind} illustrates the optimal control for a car-following scenario depicted in Figure~\ref{fig:trafficweaving avoid set constrained unconstrained comparison, b behind}. The gray shaded region denotes the infeasible controls determined by the HOCBF constraint, and we see that the optimal HOCBF-HJ control (disturbance), shown by the green dot, maximizes (minimizes) $\nabla \mathcal{V}(x,t)^Tg(x)\uA$ ($\nabla \mathcal{V}(x,t)^Th(x)\uB$) while satisfying the HOCBF constraint. While the optimal control and disturbance for WC-HJ, denoted by the black dot, are the extremes of the control bounds. Figure~\ref{fig:trafficweaving control comparison, b behind} reflects intuitive and expected driving behaviors---it is unreasonable for agent A to assume that agent B will aggressively accelerate from behind. \subsubsection{Offline evaluation on real traffic data:} We evaluate how various safety concepts perform \textit{ex post facto} on the NGSIM dataset \cite{NGSIM2016}, a highway driving dataset containing vehicles traveling along the US 101 highway in Los Angeles, USA. There are no collisions observed, and therefore we expect all the datapoints to be considered ``safe''. Table~\ref{tab:trafficweaving ngsim percentile} presents the mean and various percentile values of the HJ value of each safety concept. While it is difficult to definitively say that a particular safety concept is better than another based on these statistics since there are a lot of nuances in the interpreting the HJ value, we make the following observations: (i) The Brake safety concept presents the highest values in all the statistics, indicating that it is the most optimistic out of the safety concepts studied. Being overly-optimistic can lead to over-confident driving where the AV can over-estimate how safe a situation is. (ii) For situations when the HJ value is low (i.e., for low percentiles), both the HOCBF-HJ and WC-HJ safety concept present very similar statistics, but the HOCBF-HJ statistics gradually become more similar to the Constant statistics as we consider higher percentile values. This suggests that (perhaps not too surprisingly) HOCBF-HJ behaves like a hybrid between the WC-HJ and Constant safety concepts. \section{Limitations, Future Work, and Conclusions} \label{sec:limitation_future_conclusions} We conclude by highlighting some limitations of this work, laying out exciting future directions, and summarizing our key contributions. \subsection{Limitations} A major limitation of this work stems from (i) the curse of dimensionality in solving the HJI PDE explicitly (as opposed to implicit representations \cite{BansalTomlin2021}), and (ii) multi-agent extensions to the HOCBF and HJ reachability theory. Although we are currently using pairwise decomposition when considering multi-agent scenarios, pairwise decomposition for multi-agent analysis is effective in practice \cite{WangLeungEtAl2020,NisterLeeEtAl2019}, and in some settings, multi-agent analysis reduces to a pairwise decomposition \cite{ChenSingletaryEtAl2021}. While the eventual goal is to investigate using implicit representation (e..g, neural networks) when solving the HJI PDE to account for high dimensional scenarios, the (HO)CBF and HJ reachability formulation nonetheless provides useful inductive biases in building responsibility-aware safety concepts. Our HOCBF-constrained safety concepts does run the risk of encountering behaviors not abiding by the HOCBF constraint and therefore invalidating assurances provided by the synthesized safety concept. While we can further improve the behavior learning step to help reduce model mismatch, there has been complementary work in out-of-distribution (OOD) detection to catch anomalous events \cite{FaridVeerEtAl2021}. Such OOD detectors are designed to be used as a complementary safety filter and catch rare tail events that are not nominally considered by the system. \subsection{Future work} An area primed for future work is in investigating the division of responsibility for the constraint satisfaction of \eqref{eq:hji with cbf constraint}. A similar consideration is studied in \cite{GuoWangEtAl2021} which analyzes how much each agent should contribute to constraint satisfaction in a multi-agent setting. Fruitful future work entails learning appropriate responsibility allocation within a game theoretic context \cite{TsaknakisHongEtAl2021,GoktasGreenwald2021}, and combining offline safety concept synthesis with online responsibility learning. \subsection{Conclusions} We have proposed a data-driven safety concept that is robust yet reflective of real-world driving interaction behaviors. We first learn control sets describing collision avoidance behaviors by leveraging high order control barrier functions, and then use them to constrain the HJ reachability computation used for safety concept synthesis. We show that our learned safety concept is less overly-conservative than other common AV safety concepts, and captures responsible behaviors, though there is more work to be done in testing safety concepts in closed-loop AV operations, and extensions to multi-agent interactive scenarios, especially where the division of responsibility for collision avoidance is ambiguous. \bibliographystyle{ieeetran}
\subsection{Ablation study and analysis} \label{sec:ablations} \vspace{-.2cm} \noindent \textbf{Feature and geometric prototypes.} We study the contribution of feature and geometric prototypes of SoftClu\xspace (Eq.~\ref{eq:center_coords}). We perform pre-training by using (i) only feature prototypes, (ii) only geometric prototypes, and (iii) both prototypes. We perform this study on ModelNet40 and ModelNet10. In Table~\ref{tab:ab_space} we can observe that when only feature prototypes are used, SoftClu\xspace achieves the lowest performance. This is due to wrong cluster assignments of those points sharing similar features but belonging to different geometric regions (e.g.~wings of an airplane). Using both feature and geometric prototypes, SoftClu\xspace can achieve the best performance on ModelNet40 and ModelNet10, with both PointNet and DGCNN. \begin{table}[!hbt] \centering \vspace{-.2cm} \footnotesize \caption{Ablation study of SoftClu\xspace by using different prototypes.} \label{tab:ab_space} \resizebox{.56\textwidth}{!}{ \begin{tabular}{l c c c c} \toprule \multirow{2}{*}{Encoder} & \multirow{2}{*}{Geometry} & \multirow{2}{*}{Feature} & \multicolumn{2}{c}{Accuracy} \\ \cline{4-5} \multicolumn{2}{c}{} & & ModelNet40 & ModelNet10 \\ \toprule \multirow{3}{*}{PointNet} & $\checkmark$ & & 88.7 & 92.9 \\ & & $\checkmark$ & 86.5 & 92.7 \\ & $\checkmark$ & $\checkmark$ & \bf90.3 & \bf93.5 \\ \midrule \multirow{3}{*}{DGCNN} & $\checkmark$ & & 91.4 & 94.5 \\ & & $\checkmark$ & 90.5 & 93.3 \\ & $\checkmark$ & $\checkmark$ & \bf91.9 & \bf94.8 \\ \bottomrule \end{tabular} } \vspace{-0.2cm} \end{table} \noindent \textbf{Number of clusters.} We assess the effect of selecting different numbers of cluster partitions $J$ by using ModelNet40. We pre-train SoftClu\xspace with different values of $J$, i.e.~from $16$ to $128$, and report the results in Table~\ref{tab:ablation_j}. SoftClu\xspace achieves the best results with $J=64$ for both PointNet and DGCNN. We observed stability with the results throughout different values of $J$. Additional results of the batch size and soft-labels please refer to the supplementary material. \begin{table}[!hbt] \vspace{-.2cm} \centering \caption{Ablation study results of SoftClu\xspace with different number of clusters $J$.} \label{tab:ablation_j} \resizebox{.65\textwidth}{!}{ \begin{tabular}{l c c c c c c c c c} \toprule Method & 16 & 32 & 48 & 64 & 72 & 96 & 112 & 128 \\ \toprule PointNet & 92.4 & 93.0 & 93.1 & 93.5 & 93.4 & 93.3 & 93.2 & 93.1 \\ DGCNN & 94.2 & 94.8 & 94.6 & 94.8 & 94.7 & 94.6 & 94.6 & 94.5 \\ \bottomrule \end{tabular} } \vspace{-0.2cm} \end{table} \noindent \textbf{Running times.} Our method is used only for pre-training, where each iteration consists of two parts: a backbone forward pass and SoftClu optimization. We run our method on one Tesla V100 GPU (32G) and two Intel(R) 6226 CPUs and measured the iteration time over several iterations. SoftClu adds an average overhead of 0.014ms for each iteration on ShapeNet with a DGCNN backbone. Notice that, the inference time of each backbone used remains the original one. \section{Algorithm} Here, we provide a pseudo-code for SoftClu\xspace training loop in Algorithm~\ref{alg:cluster}. \begin{algorithm}[!hbt] \small \caption{Soft clustering (pseudocode).} \label{alg:cluster} \hspace*{\algorithmicindent} \textbf{Input:} $\{\mathcal{P}\}$ a set of 3D point clouds and each point cloud has $N$ points; $K$ number of optimization steps. \\ \hspace*{\algorithmicindent} {\bf Output:} the backbone $f_\varphi$ pretrained by using our algorithm. \begin{algorithmic}[1] \For{$i$ in range(0, K)} \State $\mathcal{L}_{tot}=0$ \For{$\mathcal{P}\in \left\{\mathcal{P}\right\}$} \State {\# compute class scores} \State $\bm{S} = \mbox{softmax}\left(\phi_\alpha\left(f_\varphi\left(\mathcal{P}\right)\right)\right)$ \State {\# compute prototypes} \State $\bm{C}^E = \left\{\frac{1}{\sum_{i=1}^{N}s_{ij}} \sum_{i=1}^{N}s_{ij}\bm{p}_i \right\}_{j=1}^N$ \State $\bm{C}^F = \left\{ \frac{1}{\sum_{i=1}^{N}s_{ij}} \sum_{i=1}^{N}s_{ij}\bm{f}_i \right\}_{j=1}^N$ \State {\# compute $\bm{D}$} \State $\bm{D} = \left\{\lambda\|\bm{p}_i-\bm{c}^E_j\|^2_2+\left(1-\lambda)\right\|\bm{f}_i-\bm{c}^F_j\|^2_2 \right\}_{i,j}^{N,J}$ \State {\# compute $\gamma$} \State $\bm{\Gamma} = \mbox{SINKHORN}\left(\mbox{stopgrad}\left(\bm{D}\right), 1e-3, 20\right)$ \State $\bm{\gamma}=N\cdot\bm{\Gamma}$ \State {\# compute loss} \State $\mathcal{L}_{tot} \mathrel{{+}{=}} \mathcal{L}_{soft}$ + $\eta\mathcal{L}_{orth}$ \EndFor \State {\# update backbone and segmentation head} \State $f_\varphi, \phi_\alpha \leftarrow\mbox{optimize}\left(\frac{\mathcal{L}_{tot}}{N}\right)$ \EndFor \\ \Return $f_\varphi$ \end{algorithmic} \end{algorithm} For the Sinkhorn-Knopp algorithm, we provide a detailed pseudo-code in Algorithm~\ref{alg:sinkhorn}. \begin{algorithm}[!hbt] \small \caption{Sinkhorn-Knopp algorithm (pseudocode).} \label{alg:sinkhorn} \hspace*{0.02in} {\bf Input:} {$D$ distance matrix, $\epsilon=1e-3$ and $niters$ iterations.} \begin{algorithmic}[1] \Function{sinkhorn}{$\bm{D}$, $\epsilon$, $niters$} \State $\bm{\Gamma} = \exp(\bm{D} / \epsilon)$ \State $\bm{\Gamma} /= \mbox{sum}(\bm{\Gamma})$ \State $N, J = \bm{\Gamma}$.shape \State $\bm{u}, \bm{\mu}, \bm{\nu} = \mbox{zeros}(N),\mbox{ones}(N) / N, \mbox{ones}(J) / J$ \For{ \_ in range(0, \textit{niters})} \State $\bm{u} = $ sum($\bm{\Gamma}$, dim=1) \State $\bm{\Gamma} *= (\bm{\mu} / \bm{u})$.unsqueeze(1) \State $\bm{\Gamma} *= (\bm{\nu} / \mbox{sum}(\bm{\Gamma}, \mbox{dim=0}))$.unsqueeze(0) \EndFor\\ \Return $\bm{\Gamma}$ \EndFunction \end{algorithmic} \end{algorithm} \section{Downstream Tasks Setups} \noindent \textbf{Classification.} We use ModelNet40~\cite{sharma2016vconv} and ModelNet10~\cite{sharma2016vconv} benchmark classification datasets. ModelNet40 is composed of $12331$ meshed models from $40$ object categories, split into $9843$ training meshes and $2468$ testing meshes, where the points are sampled from CAD models. ModelNet10 dataset contains $4899$ pre-aligned shapes from $10$ categories with $3991$ ($80\%$) shapes for training and $908$ ($20\%$) shapes for testing. For SVM training, we randomly sample $1024$ points for each shape as in \cite{sauder2019self}. \noindent \textbf{Part segmentation.} We follow~\cite{wang2020unsupervised} and use the ShapeNetPart~\cite{yi2016scalable} benchmark dataset that contains $16881$ objects of $2048$ points from $16$ categories with $50$ parts in total. We train the linear fully connected layer for $100$ epochs by using the AdamW \cite{gugger2018adamw} optimizer with batch size of $24$, initial learning rate of $0.001$, learning rate decay of $0.5$ every $20$ epoch. We report the overall accuracy (OA) and the mean class intersection over union (mIoU) to evaluate segmentation quality as in \cite{wang2020unsupervised}. \noindent \textbf{Semantic segmentation.} We evaluate SoftClu\xspace features on semantic segmentation by using the S3DIS~\cite{armeni20163d} benchmark dataset. S3DIS consists of 3D scans collected with the Matterport scanner in six indoor areas, featuring 271 rooms and 13 semantic classes. Following the pre-processing, post-processing and training settings as in \cite{wang2020unsupervised}, we split each room into $1m \times 1m$ blocks and use 4,096 points as the model input. For PointNet and DGCNN, we finetune the pre-trained model on areas 1,2,3,4,6 and test them on area 5. As in part segmentation, we report OA and mIoU to quantify the segmentation quality. For SR-UNet backbone, we finetune the pre-trained model on areas 1-4 and 6 and test them on area 5. The fine-tuning experiments are trained with a batch size of 48 for a total of 10K iterations. The initial learning rate is 0.1, with polynomial decay with a power of 0.9. We set voxel size as 0.05 (5cm) and weight decay as 0.0001. We report mIoU and mAcc to evaluate segmentation quality as in \cite{xie2020pointcontrast}. \section{More Results} \paragraph{Part segmentation visualizations.} Figure~\ref{fig:part_segmentation} shows examples of qualitative part segmentation results obtained with SoftClu\xspace after the fine-tuning on the downstream task compared to ground-truth annotations (GT). We can observe that our method provides consistent predictions throughout shapes, also in the case of complex shapes (chair and motorcycle). \paragraph{Few-shot learning.} Few-shot learning (FSL) aims to train a model that generalizes with limited data. We conduct FSL ($N$-way $K$-shot learning) for the classification task on ModelNet40~\cite{sharma2016vconv} and ModelNet10~\cite{sharma2016vconv} benchmark datasets, where the model is evaluated on $N$ classes, and each class contains $N$ samples. We use the same setting and train/test split as OcCo~\cite{wang2020unsupervised} and CrossPoint~\cite{afham2022crosspoint} and report the mean and standard deviation across 10 runs. Table~\ref{tab:few_shot} shows the FSL results on ModelNet40, where SoftClu\xspace outperforms prior works in all the FSL settings in the DGCNN backbone. Our method with PointNet backbone performs slightly poorly in 5-way 10-short and 10-way 20-short settings compared to results of CrossPoint with PointNet. \begin{table}[t] \centering \small \caption{Few-shot object classification results on ModelNet40. We report mean and standard error over 10 runs. Top results of each backbone is bold.} \label{tab:few_shot} \vspace{0.0cm} \setlength{\tabcolsep}{1.1mm}{ \begin{tabular}{c l | c c c c} \toprule \multirow{2}{*}{Encoder} & \multirow{2}{*}{Method} & \multicolumn{2}{c}{5-way} & \multicolumn{2}{c}{10-way} \\ \cline{3-6} \multicolumn{2}{c|}{} & 10-shot & 20-shot & 10-shot & 20-shot \\ \toprule \multirow{6}{*}{PointNet} & Rand & 52.0 $\pm$ 3.8 & 57.8 $\pm$ 4.9 & 46.6 $\pm$ 4.3 & 35.2 $\pm$ 4.8 \\ & Jigsaw~\cite{sauder2019self} & 66.5 $\pm$ 2.5 & 69.2 $\pm$ 2.4 & 56.9 $\pm$ 2.5 & 66.5 $\pm$ 1.4 \\ & cTree~\cite{sharma2020self} & 63.2 $\pm$ 3.4 & 68.9 $\pm$ 3.0 & 49.2 $\pm$ 1.9 & 50.1 $\pm$ 1.6 \\ & OcCo~\cite{wang2020unsupervised} & 89.7 $\pm$ 1.9 & 92.4 $\pm$ 1.6 & 83.9 $\pm$ 1.8 & 89.7 $\pm$ 1.5 \\ & CrossPoint~\cite{afham2022crosspoint} & \bf 90.9 $\pm$ 4.8 & 93.5 $\pm$ 4.4 & 84.6 $\pm$ 4.7 & \bf 90.2 $\pm$ 2.2 \\ & SoftClu\xspace & 90.6 $\pm$ 4.0 & \bf 93.8 $\pm$ 3.2 & \bf 84.7 $\pm$ 3.6 & 90.1 $\pm$ 4.5 \\ \midrule \multirow{6}{*}{DGCNN} & Rand & 31.6 $\pm$ 2.8 & 40.8 $\pm$ 4.6 & 19.9 $\pm$ 2.1 & 16.9 $\pm$ 1.5 \\ & Jigsaw~\cite{sauder2019self} & 34.3 $\pm$ 1.3 & 42.2 $\pm$ 3.5 & 26.0 $\pm$ 2.4 & 29.9 $\pm$ 2.6 \\ & cTree~\cite{sharma2020self} & 68.4 $\pm$ 3.4 & 71.6 $\pm$ 2.9 & 42.4 $\pm$ 2.7 & 43.0 $\pm$ 3.0 \\ & OcCo~\cite{wang2020unsupervised} & 90.6 $\pm$ 2.8 & 92.5 $\pm$ 1.9 & 82.9 $\pm$ 1.3 & 86.5 $\pm$ 2.2 \\ & CrossPoint~\cite{afham2022crosspoint} & 92.5 $\pm$ 3.0 & 94.9 $\pm$ 2.1 & 83.6 $\pm$ 5.3 & 87.9 $\pm$ 4.2 \\ & SoftClu\xspace & \bf 93.6 $\pm$ 3.3 & \bf97.3 $\pm$ 2.0 & \bf 89.1 $\pm$ 1.4 & \bf 93.2 $\pm$ 3.4 \\ \toprule \end{tabular} } \end{table} \begin{figure}[t] \centering \vspace{-.3cm} \includegraphics[width=0.98\textwidth]{figures/qualitative_v2.pdf} \put(-503,90){\color{black}\footnotesize \rotatebox{90}{\textbf{Ours}}} \put(-503,30){\color{black}\footnotesize \rotatebox{90}{\textbf{GT}}} \caption{Part segmentation results on ShapeNetPart \cite{yi2016scalable} of SoftClu\xspace using the DGCNN encoder (top row) compared to the ground-truth annotations (bottom row).} \label{fig:part_segmentation} \end{figure} \paragraph{Batch size.} Contrastive methods mine negative examples from the mini-batch can suffer from performance drops when their batch size is not sufficiently large \cite{grill2020bootstrap}. Because SoftClu\xspace does not rely on negative examples, we expect it to be more robust to smaller batch sizes when compared to the contrastive approaches. We empirically show the effect of different batch sizes by comparing the performance of SoftClu\xspace with SimCLR \cite{chen2020simple}. We variate batch sizes from 8 to 48 during pre-training. Table~\ref{tab:batch} shows that SimCLR experiences degradation of performance when the batch size is 8, likely due to the small number of available negative samples. By contrast, SoftClu\xspace maintains a fairly stable performance throughout different batch size configurations. \begin{table}[t] \centering \caption{Ablation study results of SoftClu by using DGCNN on ModelNet10 with different batch sizes during pre-training.} \label{tab:batch} {% \begin{tabular}{l l c c c c c c} \toprule Encoder & Method & 8 & 16 & 24 & 32 & 40 & 48 \\ \toprule \multirow{2}{*}{PointNet} & SimCLR & 87.5 & 88.0 & 88.2 & 88.1 & 88.5 & 88.4 \\ & SoftClu\xspace & 89.9 & 89.8 & 90.2 & 90.3 & 90.1 & 89.9 \\ \midrule \multirow{2}{*}{DGCNN} & SimCLR & 88.6 & 89.3 & 89.4 & 89.7 & 89.7 & 90.1 \\ & SoftClu\xspace & 91.6 & 91.8 & 91.7 & 91.9 & 91.9 & 91.8 \\ \bottomrule \end{tabular} } \end{table} \paragraph{Computation of soft-labels.} We assess our strategy for soft-label assignment based on optimal transport (OT) by comparing it with a typical L2 distance-based approach on ModelNet40 and ModelNet10. Therefore, we assess SoftClu\xspace by using $\Gamma$ computed with Eq.~(\ref{eq:gamma}) and by using the L2 approach in \cite{caron2018deep}. Table~\ref{tab:ablation_gamma} shows that OT achieves the best performance on all the datasets with both PointNet and DGCNN encoders. This is due to the equal partition constraint in Alg.~\ref{alg:sinkhorn} which prevents solutions from being assigned to the same cluster and affecting the performance. \begin{table}[!hbt] \centering \caption{Ablation study of SoftClu\xspace on ModelNet40 and ModelNet10 with soft-labels computed with our approach (OT) and with a typical distance-based assignment (L2).} \label{tab:ablation_gamma} \begin{tabular}{l l c c} \toprule \multirow{2}{*}{Dataset} & \multirow{2}{*}{Encoder} & \multicolumn{2}{c}{Accuracy} \\ \cline{3-4} \multicolumn{2}{c}{} & L2 & OT \\ \toprule \multirow{2}{*}{ModelNet10} & PointNet & 91.5 & \bf93.4 \\ & DGCNN & 94.1 & \bf94.8 \\ \midrule \multirow{2}{*}{ModelNet40} & PointNet & 86.5 & \bf90.3 \\ & DGCNN & 90.4 & \bf91.9 \\ \toprule \end{tabular} \end{table} \paragraph{SoftClu\xspace with Transformer backbone.} Following~\cite{liu2022masked} setups, we also provide the results with the recent Transformer backbone provided by \cite{liu2022masked}. As shown in Tab.~\ref{tab:nbk}, SoftClu\xspace also achieves competitive result. \begin{table}[!hbt] \centering \vspace{-.13cm} \caption{Classification results with a Transformer backbone on ModelNet40.} \label{tab:nbk} {% \begin{tabular}{l l c c c c c c} \toprule Encoder & SoftClu\xspace & PointViT-OcCo~\cite{wang2020unsupervised} & Point-BERT~\cite{yu2022point} & MaskPoint~\cite{liu2022masked} \\ \hline SoftClu\xspace & \bf 93.8 & 92.1 & 93.2 & \bf 93.8 \\ \bottomrule \end{tabular} } \end{table} \section{Conclusions} \vspace{-.2cm} We presented SoftClu, a data augmentation-free unsupervised representation learning scheme for 3D point cloud understanding. SoftClu implicitly alternates between clustering the point-level features to produce point-wise pseudo-labels and utilizing these soft-labels to train the representations. Our approach showed promising results in transferring the pre-trained representations to different downstream 3D understanding tasks, such as classification, part segmentation, and semantic segmentation. Our SoftClu is independent from specific deep network architectures, enabling us to use our method as a generic method for feature extraction from raw point cloud data to improve other 3D models performances. \noindent \textbf{Acknowledgments.} This work was supported by the EU H2020 AI4Media No. 951911 project and the EUREGIO project OLIVER. \section{Experiments}\label{doc:exp} \vspace{-.2cm} In this section, we present the implementation details, the setup of pre-training and the downstream fine-tuning. We invite the reader to check in the supplementary material for additional results on few-shot learning, ablation studies, Transformer, and additional visualizations. \vspace{-.4cm} \subsection{Pre-training setup} We explore pre-training strategies on single objects (ShapeNet~\cite{shapenet2015}) and complex scenes with multiple objects (ScanNet~\cite{dai2017scannet}) to evaluate the effectiveness of SoftClu\xspace. We implemented SoftClu\xspace in PyTorch and executed our experiments on two Tesla V100-PCI-E-32G GPUs. During pre-training, we set $J=64$ and $\epsilon=1e-3$. \noindent\textbf{ShapeNet}~\cite{shapenet2015} is a collection of single-object CAD models and contains $57448$ synthetic objects from 55 object categories. We follow the experimental setup presented in \cite{sauder2019self,huang2021spatio}, we use PointNet~\cite{qi2017pointnet} and DGCNN~\cite{wang2019dynamic} as encoder networks. The latent dimension of both encoders is $1024$. Following~\cite{huang2021spatio}, each point cloud is randomly downsampled to $2048$ points. We use the official training split of ShapeNet for pre-training. Our pre-training involves $250$ epochs by using the AdamW \cite{gugger2018adamw} optimizer, the batch size is equal to $32$, and initial learning is equal to $0.001$ that decays by $0.7$ every $20$ epochs. \noindent\textbf{ScanNet}~\cite{dai2017scannet} is a dataset of indoor scenes with multiple objects and consists of 1513 reconstructed meshes for 707 unique scenes. Following~\cite{xie2020pointcontrast}, we choose SR-UNet provided in PointContrast~\cite{xie2020pointcontrast} as backbone. For pre-training, we use an SGD optimizer with a learning rate of 0.1 and a batch size of 32. The learning rate is decreased by a factor of 0.99 every 1K iteration. The model is trained for 30K iterations. \vspace{-0.4cm} \subsection{Downstream fine-tuning}\label{sec:evaluation} \vspace{-0.2cm} We evaluate SoftClu\xspace on three downstream tasks: classification, part segmentation, and semantic segmentation. We compare SoftClu\xspace to state-of-the-art discriminative approaches (Jigsaw3D~\cite{sauder2019self}, STRL~\cite{huang2021spatio}, CrossPoint~\cite{afham2022crosspoint}, SimCLR~\cite{chen2020simple}, STRL~\cite{huang2021spatio}, PointContrast~\cite{xie2020pointcontrast}, and ContrastiveScene~\cite{hou2021exploring}) and a generative approach (OcCo~\cite{wang2020unsupervised} and ParAE~\cite{eckart2021self}). The details of setups for downstream tasks can be found in supplementary for three encoders. \noindent \textbf{Object classification.} We use linear SVM classification on ModelNet40~\cite{sharma2016vconv} and ModelNet10~\cite{sharma2016vconv} datasets to evaluate the quality of their pre-trained versions on ShapeNet. Table~\ref{tab:classification} reports the classification accuracy of SoftClu\xspace, compared to the other approaches. Results show that the SoftClu\xspace is more effective than the alternative pre-training methods on both datasets. Specifically, on ModelNet40, SoftClu\xspace with PointNet backbone achieves the same classification accuracy ($90.3\%$) as ParAE~\cite{eckart2021self} while outperforming the contrastive approach STRL \cite{huang2021spatio} ($88.3\%$). The linear SVM classification performance of our method even surpasses the performance of the fully supervised PointNet, which achieves an 89.2\% test accuracy. With the DGCNN encoder, our method achieves a $91.9\%$ test accuracy, outperforming ParAE ($91.6\%$) by $0.3\%$, and generating model OcCo~\cite{wang2020unsupervised} by $2.7\%$. On ModelNet10, SoftClu\xspace outperforms OcCo~\cite{wang2020unsupervised} and Jigsaw3D~\cite{sauder2019self} with both the encoding networks. Compared to jigsaw tasks that coarsely segment a point cloud into disjoint partitions, SoftClu\xspace learns the partitioning function itself to softly assign point clouds into coherent clusters. Moreover, we also report results (SoftClu$^\star$) of SoftClu\xspace pre-trained on ModelNet40, since some methods are pretrained on ModelNet40. SoftClu\xspace also achieves competitive results. We further use visualization to explore pre-trained features before fine-tuning with the DGCNN encoder. Figure~\ref{fig:tsne} shows the features visualized with T-SNE~\cite{van2008visualizing} of OcCo and SoftClu\xspace on ModelNet10. Our method yields a better separation of the features than OcCo, which indicates a better ability of SoftClu\xspace in clustering objects in the feature space. In Figure~\ref{fig:pca}, we color the points based on the PCA projections of the network features and shows how the pre-trained encoder can effectively embed geometric information. \begin{table}[t] \centering \footnotesize \caption{Linear classification comparisons on ModelNet40 and ModelNet10. $\star$ indicates that models are pre-trained on ModelNet40, otherwise, models are pre-trained on ShapeNet.} \label{tab:classification} \resizebox{0.78\columnwidth}{!}{% \begin{tabular}{l c c c c c} \toprule \multirow{2}{*}{Method} & \multirow{2}{*}{Year} & \multicolumn{2}{c}{PointNet} & \multicolumn{2}{c}{DGCNN}\\ \cline{3-4} \cline{5-6} \multicolumn{2}{c}{} & ModelNet40 & ModelNet10 & ModelNet40 & ModelNet10 \\ \toprule DeepCluster~\cite{caron2018deep} & 2018 & 86.3 & 91.6 & 90.4 & 94.1 \\ Jigsaw3D$^\star$~\cite{sauder2019self} & 2019 & 87.5 & 91.3 & 87.8 & 92.6 \\ Jigsaw3D~\cite{sauder2019self} & 2019 & 87.3 & 91.6 & 90.6 & 94.5 \\ Rotation3D~\cite{poursaeed2020self} & 2020 & 88.6 & - & 90.8 & -\\ SwAV~\cite{caron2020unsupervised} & 2020 & 85.4 & 92.1 & 90.3 & 93.5 \\ OcCo~\cite{wang2020unsupervised} & 2021 & 88.7 & 91.4 & 89.2 & 92.7 \\ SimCLR~\cite{chen2020simple} & 2021 & 88.4 & 91.4 & 90.1 & 92.1 \\ STRL~\cite{huang2021spatio} & 2021 & 88.3 & - & 90.9 & - \\ ParAE~\cite{eckart2021self} & 2021 & \textbf{90.3} & - & 91.6 & - \\ CrossPoint~\cite{afham2022crosspoint} & 2022 & 89.1 & - & 91.2 & - \\ SoftClu$^\star$ (Ours) & - & 88.4 & 93.0 & 91.4 & 94.5 \\ SoftClu (Ours) & - & \textbf{90.3} & \textbf{93.5} & \textbf{91.9} & \textbf{94.8} \\ \bottomrule \end{tabular} } \vspace{-.2cm} \end{table} \begin{figure}[t] \centering \begin{minipage}{.48\textwidth} \centering \begin{tabular}{cc} \includegraphics[width=.48\textwidth]{figures/docnn} & \includegraphics[width=.48\textwidth]{figures/dgcnn} \end{tabular} \vspace{-.15cm} \footnotesize \caption{T-SNE-processed network features obtained with (left) OcCo~\cite{wang2020unsupervised} and (right) SoftClu\xspace on ModelNet10.} \label{fig:tsne} \end{minipage} \hspace{.2cm} \begin{minipage}{.48\textwidth} \centering \begin{tabular}{cc} \includegraphics[width=.41\textwidth]{figures/modelnet} & \includegraphics[width=.41\textwidth]{figures/shapenet} \end{tabular} \vspace{-.15cm} \footnotesize \caption{Color-coded points based on PCA projections of the learned features: (left) ModelNet40, (right) ShapeNet.} \label{fig:pca} \end{minipage} \vspace{-0.4cm} \end{figure} \noindent \textbf{Part segmentation.} We follow~\cite{wang2020unsupervised} and use the ShapeNetPart~\cite{yi2016scalable} benchmark dataset. Table~\ref{tab:part_segmentation} reports the part segmentation results of SoftClu\xspace in comparison with the alternative approaches on ShapeNetPart~\cite{yi2016scalable}. SoftClu\xspace outperforms all the other approaches with both PointNet and DGCNN encoders in terms of both OA and mIoU. With the PointNet encoder, SoftClu\xspace achieves $93.9\%$ OA and $83.8\%$ mIoU, improving over state-of-the-art CrossPoint ($93.2\%$ OA, $82.7\%$ mIoU) by $0.7\%$ OA and $1.1\%$ mIoU. With the DGCNN encoder, we achieve $94.6\%$ OA and $85.7\%$ mIoU, outperforming CrossPoint ($94.4$ OA, $85.3$\% mIoU) of about $0.2\%$ OA and $0.4\%$ mIoU. Figure~\ref{fig:part_segmentation} in the supplementary material shows examples of qualitative part segmentation results. \begin{table}[t] \vspace{-0.2cm} \begin{minipage}{.49\textwidth} \centering \footnotesize \caption{Part segmentation results.} \label{tab:part_segmentation} \resizebox{.90\textwidth}{!}{ \begin{tabular}{clcccc} \toprule \multirow{2}{*}{Encoder} & \multirow{2}{*}{Method} & \multicolumn{2}{c}{Metrics} \\ \cline{3-4} \multicolumn{2}{c}{} & OA ($\%$) & mIoU ($\%$) \\ \toprule \multirow{5}{*}{PointNet} & Random & 92.8 & 82.2 \\ & Jigsaw3D \cite{sauder2019self} & 93.1 & 82.2 \\ & OcCo \cite{wang2020unsupervised} & 93.4 & 83.4 \\ & CrossPoint \cite{afham2022crosspoint} & 93.2 & 82.7 \\ & SoftClu (Ours) & \textbf{93.9} & \textbf{83.8} \\ \midrule \multirow{5}{*}{DGCNN} & Random & 92.2 & 84.4 \\ & Jigsaw3D \cite{sauder2019self} & 92.7 & 84.3 \\ & OcCo \cite{wang2020unsupervised} & 94.4 & 85.0 \\ & CrossPoint \cite{afham2022crosspoint} & 94.4 & 85.3 \\ & SoftClu (Ours) & \textbf{94.6} & \textbf{85.7} \\ \bottomrule \end{tabular} } \vspace{-0.21cm} \end{minipage} \hspace{.2cm} \begin{minipage}{0.49\textwidth} \centering \footnotesize \caption{Semantic segmentation results.} \label{tab:semantic_segmentation} \resizebox{.90\textwidth}{!}{ \begin{tabular}{clcc} \toprule \multirow{2}{*}{Encoder} & \multirow{2}{*}{Method} & \multicolumn{2}{c}{Metrics} \\ \cline{3-4} \multicolumn{2}{c}{} & OA ($\%$) & mIoU ($\%$) \\ \toprule \multirow{5}{*}{PointNet} & Random & 78.9 & 47.0 \\ & Jigsaw3D \cite{sauder2019self} & 80.1 & 52.6 \\ & OcCo \cite{wang2020unsupervised} & 82.0 & 54.9 \\ & CrossPoint \cite{afham2022crosspoint} & 81.8 & 54.5 \\ & SoftClu (Ours) & \textbf{82.9} & \textbf{55.3} \\ \midrule \multirow{5}{*}{DGCNN} & Random & 83.7 & 54.9 \\ & Jigsaw3D \cite{sauder2019self} & 84.1 & 55.6 \\ & OcCo \cite{wang2020unsupervised} & 84.6 & 58.0 \\ & CrossPoint \cite{afham2022crosspoint} & 84.7 & 58.4 \\ & SoftClu (Ours) & \textbf{85.4} & \textbf{59.2} \\ \bottomrule \end{tabular} } \vspace{-0.2cm} \end{minipage} \vspace{-0.65cm} \end{table} \noindent \textbf{Semantic segmentation.} We first evaluate SoftClu\xspace features on semantic segmentation by using the S3DIS~\cite{armeni20163d} benchmark dataset, where features are pre-trained on ShapeNet. Table~\ref{tab:semantic_segmentation} reports the segmentation results of SoftClu\xspace and that of the other baselines on S3DIS~\cite{armeni20163d}. SoftClu\xspace outperforms all the other approaches with both PointNet and DGCNN encoders. With the PointNet encoder, SoftClu\xspace achieves $82.9\%$ OA and $55.3\%$ mIoU, outperforming both the state-of-the-art OcCo ($82.0\%$ OA, $55.3\%$ mIoU) and Jigsaw3D ($80.1\%$ OA, $52.6\%$ mIoU). With the DGCNN encoder, SoftClu\xspace achieves $85.4\%$ OA and $59.2\%$ mIoU, outperforming CrossPoint~\cite{afham2022crosspoint} (84.7\% OA and 58.4\% mIoU), OcCo ($84.6\%$ OA, $58.0\%$ mIoU) and Jigsaw3D ($84.1\%$ OA, $55.6\%$ mIoU). We also compare SoftClu\xspace with point-level methods such as PointContrast~\cite{xie2020pointcontrast} and ContrastiveScene~\cite{hou2021exploring} when features are pre-trained on ScanNet with SR-UNet backbone. Table~\ref{tab:point_level} shows that our pre-training method achieves 73.4\% mIoU and 79.1\% mAcc, outperforming the pre-training results of PointContrast~\cite{xie2020pointcontrast} and ContrastiveScene~\cite{hou2021exploring}. \begin{table}[!hbt] \centering \vspace{-.12cm} \footnotesize \caption{Results of semantic segmentation with SR-UNet backbone~\cite{armeni20163d}.} \label{tab:point_level} \resizebox{.7\textwidth}{!}{ \begin{tabular}{c|cccc} \toprule Method & Scratch & PointContrast~\cite{xie2020pointcontrast} & ContrastiveScene~\cite{hou2021exploring} & SoftClu\xspace \\ \toprule mIoU & 68.2 & 70.3 & 72.2 & \bf73.4 \\ mAcc & 75.5 & 76.9 & - & \bf79.1 \\ \bottomrule \end{tabular} } \vspace{-0.2cm} \end{table} \section{Introduction} \vspace{-0.2cm} The rapid progress of 3D capturing devices, such as 3D laser scanners and depth sensors, led to convenient and effective ways to process 3D data, which, if combined with RGB images, can further improve the understanding of environments. Applications like robotic navigation \cite{biswas2012depth,Zhou2022}, autonomous driving \cite{li2020deep} and exploration \cite{wang2020}, and augmented and virtual reality \cite{park2008multiple} are among the major reasons for a higher attention toward 3D data understanding. Learning discriminative and transferable point cloud features is a crucial problem in the area of 3D shape understanding \cite{lin2021object,poiesi2022}, as it allows efficient training of downstream tasks, such as object detection \cite{shi2020pv} and tracking~\cite{yin2021center}, segmentation \cite{xu2020geometry}, reconstruction~\cite{yuan2018pcn}, classification \cite{qi2017pointnet}, and registration \cite{huang2020feature,mei2021point,mei2022overlap}. Therefore, learning from unlabeled or partially labeled data to alleviate human labeling efforts is an emerging research topic in point cloud understanding. Along this line, unsupervised representation learning is an attractive, yet potent, alternative approach to learning features without human intervention \cite{eckart2021self}. Unsupervised learning approaches can be broadly categorized as generative or discriminative \cite{grill2020bootstrap}. The former includes self-reconstruction or auto-encoding \cite{yang2018foldingnet}, generative adversarial network \cite{sarmad2019rl}, and auto-regressive \cite{sun2020pointgrow} methods. These methods can map an input point cloud into a global latent representation \cite{rao2020global,shi2020unsupervised}, or a latent distribution in the variational case \cite{hassani2019unsupervised,han2019multi} through an encoder and then attempt to reconstruct the input by a decoder. Generative methods can be effective to model high-level and structural properties of the input point clouds. However, because they are sensitive to Euclidean transformations, they typically assume that all 3D objects have the same pose in a given category \cite{sanghi2020info3d}. Unlike generative methods, discriminative methods learn to predict or discriminate augmented versions of the input. These methods can yield rich latent representations for downstream tasks \cite{wang2020unsupervised}. Examples of these include contrastive methods \cite{du2021self,rao2020global,sanghi2020info3d}, which have shown remarkable results for unsupervised representation learning. Contrastive methods also promote learning of rotation-invariant representations via data augmentation \cite{poursaeed2020self}. Typically, these algorithms require several negative samples and heavily depend on the selection criteria to mine negatives \cite{grill2020bootstrap,chen2021exploring}. Often, they require large batch sizes, memory banks, or customized strategies to retrieve informative pairs \cite{grill2020bootstrap}. Moreover, it is somewhat unclear what constitutes an effective semantics-preserving data augmentation strategy given that a point cloud is typically defined as a set of 3D coordinates. Any disturbance of the original geometry, such as cropping or view-based occlusions, could potentially degrade its semantics \cite{eckart2021self}; for example, random crops of a point cloud may correspond to different objects and introduce inconsistent learning signals. For this reason, contrastive approaches need humans to carefully design combinations of data augmentations to learn informative representations. On the other hand, training on whole object instances can lead to the learning of global representations, which in turn can produce fewer discriminant representations as local geometric differences may be disregarded \cite{rao2020global, han2019multi, xie2020pointcontrast}. Therefore, our first motivation is to design a data augmentation-free unsupervised learning approach to avoid the inconvenience of building chains of ad-hoc combinations of data augmentations. Second, we develop an unsupervised method that is not based on global features but instead can optimize local features, which facilitates the network to learn 3D spatial geometric information of point clouds. In this paper, we propose an unsupervised method to learn informative point-level representations of 3D point clouds without using data augmentation. Our framework learns cluster affiliation scores to softly group the 3D points of each point cloud into a given number of geometric partitions, i.e.~through soft clustering. We learn point-level feature representations by minimizing the standard cross-entropy of a single equation, which is the result of an EM-like algorithm \cite{moon1996expectation}. The Expectation step employs an optimal transport \cite{peyre2019computational} based clustering algorithm to generate point-level pseudo-labels, i.e.~focusing on local geometric information. In particular, we softly label points based on their distance from the centroids in both feature and geometric spaces, with the constraint that labels partition data in equally-sized subsets (uniform distribution). Optimal transport serves as a potent means for comparing probability distributions with each other, as well as for producing optimal mappings to minimize distances \cite{peyre2019computational}. The Maximization step adapts the E-step for a point-to-cluster loss to optimize the metric learning network. Our approach learns the partitioning network itself and softly assigns points into geometrically coherent overlapping clusters, {overcoming the weakness of conventional GMM and K-means that involve expensive iterative procedures.} In doing so, we avoid data augmentation that might degrade its geometric coherency and thus its semantic information. Our approach is inspired by DeepCluster~\cite{caron2018deep}, SeLa~\cite{asano2020self} and SwAV~\cite{caron2020unsupervised} but it differs from them, as they implement clustering in the feature space at the instance level, they use data-augmentation, and they may degrade the geometric information when used with 3D data. We show that pre-training on datasets using SoftClu\xspace can improve the performance of a range of downstream tasks and outperforms the recent state-of-the-art methods without any data augmentation and also across different domains. \noindent To summarize, our contributions are: \begin{itemize} \item We propose a data augmentation-free unsupervised method, which does not rely on data augmentations, negative pair sampling, and large batches, to learn transferable point-level features on a 3D point cloud; % \item We extend the pseudo-label prediction to an optimal transport problem, which can be efficiently solved by using an efficient variant of the Sinkhorn-Knopp~\cite{cuturi2013sinkhorn} algorithm; % \item We conduct thorough experiments, and SoftClu\xspace achieves state-of-the-art performance without having to use data augmentation. \end{itemize} \section{Proposed method} \vspace{-.3cm} We formulate the problem of representation learning as a soft-clustering problem. Figure~\ref{fig:pcl} illustrates our framework that consists of three steps: prototype computation, soft-label assignment, and optimization. Given a 3D point cloud as an unordered set $\bm{\mathcal{P}}=\{\bm{p}_i\}_{i=1}^N$ of $N$ points where each point $\bm{p}_i \in \mathbb{R}^{3}$ is represented by a 3D coordinate $\bm{p}_i = \{x, y, z\}$, our goal is to train, in an unsupervised way, a feature encoder $f_\varphi$ with parameters $\varphi$ ($e.g.$, PointNet) that extracts informative point-wise features $\bm{\mathcal{F}} = \{f_\varphi(\bm{p}_i)\}_{i=1}^N$ from $\bm{\mathcal{P}}$. To this end, we apply a segmentation head $\phi_\alpha$ that takes as input $\bm{\mathcal{F}}$ and outputs joint log probabilities, and a softmax operator that acts on log probabilities to generate a classification score matrix $\bm{S}$. The prototype computation block estimates the $J$ cluster centroids (prototypes) $\bm{C}^E$ and $\bm{C}^F$ to represent each partitions. Next, soft-labels $\bm{\gamma}_{ij}\in \bm{\gamma}$ of each input point $\bm{p}_i$ are based on these prototypes and we use the Sinkhorn-Knopp~\cite{cuturi2013sinkhorn} algorithm to perform the soft-label assignment, i.e., $\bm{\gamma}$ softly groups $\bm{\mathcal{P}}$ into partitions. $\bm{\gamma}_{ij}\in[0,1]$ is a soft-label score that point $\bm{p}_i$ belongs to cluster $j$. The final optimization step is to minimize the average cross-entropy loss $\mathcal{L}_{tot}$ between the soft-label $\bm{\gamma}$ and the predicted class probability $\bm{S}$. \begin{figure}[t] \vspace{-.15cm} \centering \footnotesize \includegraphics[width=0.85\columnwidth]{figures/main_chart_cluster.pdf} \caption{The architecture of our SoftClu\xspace. It consists of three steps: prototype computation (blue line), soft-label $\bm{\gamma}$ assignment (green line), and optimization (red line).}\label{fig:pcl} \end{figure} \noindent \textbf{Prototype computation.} We begin by computing a prototype for each cluster (partition) as the most representative feature for a set of points. Specifically, we use the point-wise features $\mathcal{F} = \{\bm{f}_i\}_{i=1}^N$, where $\bm{f}_i = f_\varphi(\bm{p}_i)$, to compute a set of classification scores $\bm{S}$ as $ \bm{S} = \{ \sigma(\phi_\alpha(\bm{f}_i) \}_{i=1}^N$. $\sigma$ is the softmax operation, and $\phi_\alpha$ is the segmentation layer with parameters $\alpha$. For each feature $\bm{f}_i$, $\phi_\alpha$ produces a probability score $s_{ij}$ indicating the likelihood that $\bm{p}_i$ belongs to partition $j$. We use two types of prototypes as the representatives for each category, one in the feature space and another in the geometric space. Specifically, according to the type, we compute $J$ prototypes as the weighted average of the features $\bm{\mathcal{F}}$ or 3D coordinates $\bm{\mathcal{P}}$ based on their scores $\bm{S}$. Let $\bm{C}^E = \{ \bm{c}^E_j \}_{j=1}^J$ and $\bm{C}^F = \{ \bm{c}^F_j \}_{j=1}^J$ be the set of prototypes in the geometric and the features space, respectively, which are defined as \vspace{-.2cm} \begin{equation} \label{eq:center_coords} \vspace{-.2cm} \bm{c}^E_j =\frac{1}{\sum_{i=1}^{N}s_{ij}}\sum_{i=1}^{N}s_{ij}\bm{p}_i,\quad \bm{c}^F_j =\frac{1}{\sum_{i=1}^{N}s_{ij}}\sum_{i=1}^{N}s_{ij}\bm{f}_{p_i}. \end{equation} \noindent \textbf{Soft-label assignment.} We introduce the soft-label assignment step that labels points based on their distance to the prototypes estimated by Eq.~\eqref{eq:center_coords}. If we only use features for soft-label assignment, this would highly likely produce disconnected and scattered clusters. Hence, we concatenate point coordinates with the features so that the label is more localized. Specifically, we encode the pseudo-labels $\bm{\gamma}=\{\gamma_{ij}\in[0,1]\}_{i,j}^{N,J}$ as posterior distributions, i.e.~soft-labels, satisfying $\sum_{j=1}^{J}\gamma_{ij}=1$. $\gamma_{ij}$ is the posterior probability that $\bm{p}_i$ belongs to partition $j$. We base the assignment of soft-labels to the respective points on the prototypes $\bm{C}^E$ and $\bm{C}^F$, and by following two assumptions: \begin{enumerate}[noitemsep,topsep=0pt,label=\roman*)] \item Cluster cohesion: If a point $\bm{p}_i$ belongs to partition $j$, point $\bm{p}_i$ and prototype $\bm{c}^E_{j}$ should have the shortest distance among the distances of $\bm{p}_i$ with other prototypes in $\bm{C}^E$. The same holds true in the feature space. \item Uniform distribution: Each point cloud is assumed to be segmented into equally-sized partitions of $\left \lfloor \frac{N}{J} \right \rfloor$ elements, where $\left \lfloor \cdot \right \rfloor$ indicates the greatest integer less than or equal to its argument. \end{enumerate} Assumption i) inspires us to label points based on their distance from the centroids. It can be formalized as an expression, i.e., if $\bm{p}_i$ belongs to cluster $j$, then $\|\bm{p}_i-\bm{c}^E_{j}\|_2\leq\|\bm{p}_i-\bm{c}^E_{k}\|_2, \|\bm{f}_i-\bm{c}^F_{j}\|_2\leq\|\bm{f}_i-\bm{c}^F_k\|_2$ and $\gamma_{ij}\geq \gamma_{ik}, k\neq j, k=1,\cdots,J$. $\|\cdot\|_2$ is the L2 norm. This can be ensured by minimizing the following objective, \vspace{-.2cm} \begin{equation}\label{eq:vgamma} \vspace{-.2cm} \min_{\bm{\gamma}} \frac{1}{N}\sum_{i=1}^{N}\sum_{j=1}^{J}\left(\lambda\|\bm{p}_i-\bm{c}^E_j\|^2_2+\left(1-\lambda)\right\|\bm{f}_i-\bm{c}^F_j\|^2_2\right)\gamma_{ij}, \end{equation} where $\lambda \in [0,1]$ is a learned parameter. For convenience, we define the following matrix form $\bm{D}=\lambda\bm{D}^E+\left(1-\lambda\right)\bm{D}^F$, where $\bm{D}^F=\{\|\bm{f}_i-\bm{c}^F_j\|^2_2\}_{i,j}^{N,J}$ and $\bm{D}^E=\{\|\bm{p}_i-\bm{c}^E_j\|^2_2\}_{i,j}^{N,J}$ are matrices of size equal to $N\times J$. Then, Eq. (\ref{eq:vgamma}) can be rewritten as: \vspace{-.2cm} \begin{equation}\label{eq:mgamma} \vspace{-.2cm} \min_{\bm{\gamma}} \left<\frac{\bm{\gamma}}{N}, \bm{D}\right>, \end{equation} where $\left < \cdot, \cdot \right>$ is the Frobenius matrix dot product. Assumption ii) is formulated in a constraint condition as $\sum_{i=1}^{N}\gamma_{ij}=\frac{N}{J}$, which can mitigate the problem that all data points are assigned to a single (arbitrary) label. Therefore, based on $\sum_{i=1}^{N}\gamma_{ij}=\frac{N}{J}$ and the property of the posterior probability $\sum_{j=1}^{J}\gamma_{ij}=1$, $\bm{\gamma}$ satisfies the following constraints \vspace{-0.2cm} \begin{equation}\label{eq:constraint} \vspace{-.2cm} \frac{1}{N}\bm{\gamma}^\top\bm{1}_N =\frac{1}{J}\bm{1}_J, \frac{1}{N}\bm{\gamma}\bm{1}_J =\frac{1}{N}\bm{1}_N, \end{equation} where $\bm{1}_k (k=N,J)$ denotes the vector of ones in dimension $k$. Let $\bm{\Gamma}=\frac{\bm{\gamma}}{N}$ with elements defined as $\Gamma_{ij}=\frac{\gamma_{ij}}{N}$. $\bm{\Gamma}$ satisfies $\sum_{ij}^{NJ}\bm{\Gamma}_{ij}=1$. By replacing the variable $\bm{\gamma}$ with $\bm{\Gamma}$ in Eq. (\ref{eq:mgamma}) and Eq. (\ref{eq:constraint}), the joint objective of assumptions i) and ii) can be formulated as an optimal transport (OT) problem~\cite{peyre2019computational} as \vspace{-0.3cm} \begin{equation}\label{eq:poster} \min_{\bm{\Gamma}} \left<\bm{\Gamma}, \bm{D}\right>, ~ \mbox{s.t.} ~ \bm{\Gamma}^\top\bm{1}_N=\frac{1}{J}\bm{1}_J, \bm{\Gamma}\bm{1}_J=\frac{1}{N}\bm{1}_N. \end{equation} The minimization of Eq.~(\ref{eq:poster}) can be solved in polynomial time as a linear program. However, the linear program involves millions of data points and thousands of classes and traditional algorithms hardly scale to large problems \cite{cuturi2013sinkhorn}. We address this issue by adopting an efficient version of the Sinkhorn-Knopp algorithm~\cite{cuturi2013sinkhorn}. Our implementation of the Sinkhorn-Knopp algorithm is described in Alg.~\ref{alg:sinkhorn} (Appendix). This requires the following regularization term \vspace{-0.3cm} \begin{equation}\label{eq:opt} \min_{\bm{\Gamma}} \left<\bm{\Gamma}, \bm{D}\right> - \epsilon H\left(\bm{\Gamma}\right), \quad \mbox{s.t.}~\bm{\Gamma}^\top\bm{1}_N=\frac{1}{J}\bm{1}_J, \,\,\, \bm{\Gamma}\bm{1}_J=\frac{1}{N}\bm{1}_N, \end{equation} where $H\left(\bm{\Gamma}\right)=\left<\bm{\Gamma},\log\bm{\Gamma}-1\right>$ denotes the entropy of $\bm{\Gamma}$ and $\epsilon > 0$ is a regularization parameter. For very small $\epsilon$, optimizing Eq.~(\ref{eq:opt}) is equivalent to optimizing Eq.~(\ref{eq:poster}), but even for moderate values of $\epsilon$, the objective tends to have approximately the same optimizer \cite{cuturi2013sinkhorn}. The larger the $\epsilon$, the faster the convergence, please refer to~\cite{cuturi2013sinkhorn} for details. In our case, using a fixed $\epsilon=1e-3$ is appropriate as we are interested in the final clustering and representation learning results, rather than in solving the transport problem exactly. The solution to Eq.~(\ref{eq:opt}) takes the form of the following normalized exponential matrix~\cite{cuturi2013sinkhorn}, \vspace{-.2cm} \begin{equation}\label{eq:gamma} \vspace{-.2cm} \bm{\Gamma} = \mbox{diag}\left(\bm{\mu}\right)\exp\left(\bm{D}\big/\epsilon\right)\mbox{diag}\left(\bm{\nu}\right), \end{equation} where $\bm{\mu}=(\mu_1, \mu_2,\cdots,\mu_N)$ and $\bm{\nu}=(\nu_1,\nu_2,\cdots,\nu_J)$ are renormalization vectors in $\mathbb{R}^N$ and $\mathbb{R}^J$. The vectors $\bm{\mu}$ and $\bm{\nu}$ can be obtained by iterating the updates via $\bm{\mu}_i=\left[\exp\left(\bm{D}\big/\epsilon\right)\bm{\nu}\right]^{-1}_i$ and $\bm{\nu}_j=\left[\exp\left(\bm{D}\big/\epsilon\right)^\top\bm{\mu}\right]^{-1}_j$ with initial values $\bm{\mu}=\frac{1}{N}\bm{1}_N$ and $\bm{\nu}=\frac{1}{J}\bm{1}_J$, respectively. The initialization of $\bm{\mu}$ and $\bm{\nu}$ can be any distribution, and choosing the constraints as initial values allow a faster convergence~\cite{cuturi2013sinkhorn}. $\left[ \cdot\right]^{-1}_j$ defines as the inverse value of the $j^{th}$ element of its argument. In all our experiments, we use 20 iterations as we found it works well in practice. After solving Eq.~(\ref{eq:gamma}), we can infer the soft-label matrix as $\bm{\gamma}=N\cdot\bm{\Gamma}$. \noindent \textbf{Optimization.} The optimization step follows an EM-like scheme where the Expectation step E optimizes prototypes and soft labels, while the Maximization step M optimizes the trained parameters for representation learning. Each step can be detailed as follows: \begin{itemize}[noitemsep,topsep=0pt] \item E: Given the current encoder and segmentation layer, we compute prototypes $\bm{C^E}$ and $\bm{C}^F$ following Eq.~(\ref{eq:center_coords}), and obtain soft-labels $\bm{\gamma}$ through $\bm{\gamma}=N\cdot\bm{\Gamma}$. \item M: Given the current soft-labels $\bm{\gamma}$ from step E, we optimize the encoder $f_\varphi$ and segmentation layer $\phi_\alpha$ parameters. \end{itemize} During E, we solve the OT problem with the Sinkhorn-Knopp algorithm. During M, we minimize the segmentation loss based on the resulting soft labels, such as \vspace{-.3cm} \begin{equation}\label{eq:sup} \vspace{-.2cm} \mathcal{L}_{soft}(\bm{\gamma}, \bm{S}) = -\frac{1}{N}\left<\bm{\gamma},\log\bm{S}\right>=-\frac{1}{N}\sum_{i=1}^{N}\sum_{j=1}^{J}\bm{\gamma}_{ij}\log s_{ij}, \end{equation} which corresponds to the minimization of the standard cross-entropy loss between soft-labels $\bm{\gamma}$ and predictions $\bm{S}$. However, the optimization of Eq.~(\ref{eq:sup}) does not ensure encoder $f_\varphi$ from predicting the same features for all the points, i.e.~all centroids collapse into the same vector. We further promote centroids separation by minimizing the orthogonal regularization loss $\mathcal{L}_{orth}(\bm{C}) = \|{\bm{C}^E}_*^\top\bm{C}^E_*-\bm{I}\|_{Fr} + \|{\bm{C}^F}_*^\top\bm{C}^F_*-\bm{I}\|_{Fr}$, where $\bm{C}^k_*=[\frac{\bm{c}^k_1}{\|\bm{c}^k_1\|_2},\frac{\bm{c}^k_2}{\|\bm{c}^k_2\|_2},\cdots, \frac{\bm{c}^k_J}{\|\bm{c}^k_J\|_2}]$ with $k=E, F$, and $\|\cdot\|_{Fr}$ is Frobenius norm. We define the final objective loss for the M step as \vspace{-.3cm} \begin{equation} \vspace{-.2cm} \mathcal{L}_{tot} = \mathcal{L}_{soft} + \eta \mathcal{L}_{orth}, \end{equation} where $\eta=0.01$ is a weighting parameter. We set the value of $\eta$ empirically and found that $\eta\leq 0.01$ can slightly improve the performance. The minimization of this loss leads to the maximization of the expected number of points correctly classified, associating the correct neighbor prototypes. This facilitates the encoder to learn more local geometric information. Our implementation of SoftClu\xspace is described in Alg.~\ref{alg:cluster} in the supplementary material. \section{Related Work} In this section, we briefly review existing works related to unsupervised learning on point clouds, which can be classified into two categories: generative and discriminative methods. \noindent \textbf{Generative methods.} Generative methods learn features via self-reconstruction~\cite{han2019multi}. For instance, FoldingNet~\cite{yang2018foldingnet} leverages a graph-based encoder and a folding-based decoder to deform a canonical 2D grid onto the surface of a point cloud. L2g~\cite{liu2019l2g} uses a local-to-global auto-encoder to simultaneously learn the local and global structure of point clouds. In~\cite{chen2019deep}, a graph-based decoder with a learnable graph topology is used to push the codeword to preserve representative features. In~\cite{achlioptas2018learning} a combination of hierarchical Bayesian and generative models is trained to generate plausible point clouds. GraphTER~\cite{gao2020graphter} self-trains a feature encoder by reconstructing node-wise transformations from the representations of the original and transformed graphs. However, generative models are sensitive to transformations, weakening the learning of robust point cloud representations for different downstream tasks. Moreover, it is not always feasible to reconstruct back the shape from pose-invariant features \cite{sanghi2020info3d}. \noindent \textbf{Discriminative methods.} Discriminative methods are based on auxiliary handcrafted prediction tasks to learn point cloud representations. Jigsaw3D~\cite{sauder2019self} uses a 3D jigsaw puzzle approach as the self-supervised learning task. Recently, contrastive approaches~\cite{rao2020global,sanghi2020info3d,chen2021exploring, xie2020pointcontrast}, which are robust to transformation, achieved state-of-the-art performance. Info3D~\cite{sanghi2020info3d} maximizes the mutual information between the 3D shape and a geometric transformed version of the 3D shape. PointContrast~\cite{xie2020pointcontrast} is the first to research a unified framework of the contrastive paradigm for 3D representation learning. We argue that the success of contrastive methods relies on the correct design of negative mining strategies and on the correct choice of data augmentations that should not affect the semantics of the input. To mitigate these issues, we propose an unsupervised learning method, SoftClu\xspace, which is formulated by implementing an EM-like algorithm and provides point-level supervision to extract discriminative point-wise features. SoftClu\xspace needs no data augmentation procedures to learn informative representations.
\section{\bf Introduction and statement of main results} \noi In this article, we study the existence and multiplicity of the positive solutions for the following modified quasilinear equation \begin{equation*} \label{pq}\tag{$P_{*}$}\left\{ \begin{array}{rlll} -\Delta u -\Delta (u^{2})u&=&\la \al(x) u^{-q} + f(x,u) \; \text{in}\; \Om,\\ u&> &0~\mbox{in}~ \Om,\\ u&=&0 ~\mbox{on}~ \partial\Om, \end{array} \right. \end{equation*} where $\Om$ is a smooth bounded domain in $\mathbb R^2,\;$ $0<q<3$ and the function $f:\Om \times \mb R\to \mb R$ is defined as $f(x,s)=g(x,s)\exp(|s|^{4})$, where $g \in C(\bar \Om \times \mb R)$ satisfies some appropriate assumptions described later. We also have the following assumption on function $\al:\Om\to \mb R$ \begin{itemize} \item[$(\al1)$ ] $\al\in L^{\infty}(\Om)$ and $\al(x)>0$ for all $x\in \Om$. \end{itemize} \noi The study on the equations driven by the modified quasilinear operator $-\Delta u -\Delta (u^{2})u$ is quite popular for long because of their wide range of applications in the modeling of the physical phenomenon such as, in plasma physics and fluid mechanics \cite{bass}, in dissipative quantum mechanics \cite{has}, etc. Solutions of such equations (called soliton solutions) are related to the existence of standing wave solutions for quasilinear Schr\"odinger equations of the form \begin{align}\label{aa1} iu_t =-\Delta u+V(x)u-h_1(|u|^2)u-C\Delta h_2(|u|^2)h_2'(|u|^2)u,\;\; x\in\mathbb R^N, \end{align} where $V$ is a potential function, $C$ is a real constant, $h_1$ and $h_2$ are real valued functions. Equations of the form \eqref{aa1} appear in the study of mathematical physics. Each different type of the function $h_2$ represents different physical phenomenon. For example, if $h_2(s)=s$, then \eqref{aa1} is used in the modeling of the super fluid film equation in plasma physics (see \cite{1}). When $h_2(s) =\sqrt{1+s^2}$, \eqref{aa1} attributes to the study of self-channeling of a high-power ultra short laser in matter (see \cite{33}). Because of the quasilinear term $\De(u^2) u$, present in the problems of type \eqref{pq}, the natural energy functional associated to such problems are not well defined. Hence, we have a restriction in applying variational method directly for studying such problems. To overcome this shortcoming, researchers developed several methods and arguments, such as the perturbation method (see for e.g.,\cite{19,24}) a constrained minimization technique (see for e.g., \cite{20,22,28,29}), and a change of variables (see for e.g., \cite {CJ,do,8,M-do1,11,12}).\\ \noi Without the quasilinear term $\Delta (u^{2})u$, the problem \eqref{pq} goes back to the original semilinear equation \begin{equation}\label{21} -\Delta u=\la \al(x) u^{-q} + f(x,u) \; \text{in}\; \Om,\; u> 0~\mbox{in}~ \Om,\; u=0 ~\mbox{on}~ \partial\Om. \end{equation}Such kind of equations have significant applications in the physical modelling related to the boundary layer phenomenon for viscous fluids, non-Newtonian fluids, etc. If $f\equiv0$, \eqref{21} becomes purely singular problem, for which existence, uniqueness, non-existence and regularity results are extensively studied in \cite{crandal ,hirano} with suitable $\al(x)$ and for different ranges of $q$.\\ One of the main features of problem \eqref{pq} is that the nonlinear term $f(x,s)$ enjoys the critical exponential growth with respect to the following Trudinger–Moser inequality (see \cite{Trud-Moser}): \begin{theorem}\label{TM-ineq}(\textbf {Trudinger–Moser inequality}) Let $\Om$ be a smooth bounded domain in $\mb R^2.$ Then for $u \in H^{1}_0(\Om)$ and $p>0$ we have \[ \exp(p|u|^{2})\in L^1(\Om).\] Moreover, \[\sup_{\|u\|\leq 1}\int_\Om \exp(p|u|^{2})~dx < +\infty\] if and only if $p \leq 4\pi$. \end{theorem} \noi Here the Sobolev space $H^{1}_0(\Om)$ and the corresponding norm $\|\cdot\|$ are defined in Section \ref{sec2}. The study on the critical growth exponential problems associated to this inequality were initiated with the work of Adimurthi \cite{adi} and de Figueiredo et al. \cite{DR}. Furthermore, the problem of type \eqref{pq} without the singular term, that is the equation \begin{align}\label{exp}-\Delta u -\Delta (u^{2})u + V(x) u=f(x, u) \,\; \text{in}\;\; \mb R^2, \end{align} where $V:\mb R^N\to \mb R$ is a continuous potential and $f:\mb R^2\times\mb R\to \mb R$ is a continuous function with some suitable assumption and is having critical exponential growth ($\exp(p s^{4})$), was studied by do Ó et al. in \cite{do} for the first time. Note that, unlike as in the case of semilinear critical exponential problem involving Laplacian, where the critical exponential growth is given as $\exp(|s|^{2})$, in problem \eqref{pq} and in \eqref{exp}, the form of critical exponential nonlinearity $f$ is considered as $\exp(|s|^{4})$ because of the quasilinear term $\De(u^2)u$. \\ \noi Motivated by the seminal work of Ambrosetti et al. \cite{abc}, many researchers studied the global multiplicity results for singular-convex problems. In \cite{haito}, the author proved the global multiplicity result for \eqref{21}, considering critical polynomial growth as $f(x,s)=|s|^{\frac{N+2}{N-2}}$, and $0<q<1$ in a general smooth bounded domain $\Om\subset \mb R^N$, $N> 2.$ Then, in the critical dimension $N=2$, Adimurthi and Giacomoni \cite{adijg} discussed the global multiplicity of $H^1_0$ solutions for \eqref{21} by taking the optimal range of $q$ as $1<q<3$ and considered $f$ to be having critical exponential growth as $f(x,s)=g(x,s)\exp(4\pi s^2)$, where $g$ is some appropriate continuous function. Later, in \cite{js}, the authors showed the similar results as in \cite{haito} for \eqref{21} while considering $f(x,s)=|s|^{\frac{N+2}{N-2}}$, $0<q<3$ and adding a smooth perturbation with sub-critical asymptotic behavior at $+\infty$. In \cite{sweta1, sweta2}, Dhanya et al. studied the global multiplicity result for the problem of type \eqref{21} with critical growth nonlinearities combined with a discontinuous function multiplied with the singular term $u^{-q}$, $0<q<3.$\\ \noi On the other hand, for modified quasilinear Sch\"rodinger equations involving singular nonlinearity, there are a few results in the existing literature. Authors in \cite{bal, DM,santos} discussed existence of multiple solutions of such equations with singular nonlinearity $u^{-q}$, $0<q<1$ in combination with some polynomial type perturbation. Very recently, in \cite{yang-singular}, the authors studied the global multiplicity results for the equations of type \eqref{pq} in a smooth bounded domain $\Om\subset \mb R^N,$ $N>2$, for the first time, by assuming critical polynomial growth $f(x,s)=b(x)|s|^\frac{3N+2}{N-2}$, where $b$ is a sign changing continuous function.\\ \noi Inspired from all these aforementioned works, in this article, we investigate the existence, multiplicity and non-existence results (that is, the global multiplicity result) for problem \eqref{pq} driven by modified quasilinear operator involving singular and critical exponential nonlinearity, which was an open question. The main mathematical difficulties we face in studying problem \eqref{pq} occur in three folds as following: \begin{itemize} \item[1.] The modified quasilinear term $\Delta(u^2)u$ prohibits the natural energy functional corresponding to problem \eqref{pq} to be well defined for all $u\in H_0^{1}(\Om)$ (defined in Section \ref{sec2}). \item[2. ] The critical exponential nature of $f$ induces non-compactness of the Palais-Smale sequences. \item[3. ] The growth on the singular nonlinearity falls into the optimal range (that is, $0<q<3$), which again prevents the associated energy functional to problem \eqref{pq} to be well defined for all $u\in H_0^{1}(\Om)$. \end{itemize} First, we transform the problem \eqref{pq} by using a change of variable as in \cite{CJ,yang-singular}. Then, applying variational and sub-super solution methods on the transformed problem, we show that there exists some $\La^*>0$ such that for the range of the parameter $0<\la<\La^*$, the transformed problem has at least two positive solutions, for $\la=\La^*$ it achieves at least one positive solution and for $\la>\La^*$, it has no solutions. In Section 3, we prove the existence of a non trivial weak solution for the range $0<\la\leq \La^*$ and non existence of solutions for $\la>\La^*$ by constructing a suitable sub-super solution argument. We also prove the asymptotic boundary behavior of such solutions. Then in Section 4, we investigate the existence of second solution in a cone around the first solution for $0<\la<\La^*$ by using the Ekeland variational principle and a mountain pass argument with a min-max level. There we find the first critical level, below which we prove the compactness condition of the Palaise-Smale sequences. This gives rise to the existence of a second positive solution. In this whole process, we prove many technically involved delicate estimates due to the several complexities present in problem \eqref{pq}. We would like to mention that to the best of our knowledge, there is no work in the literature addressing the question of global multiplicity of positive solutions involving modified quasilinear operator and singular and exponential nonlinearity. In this article, we study the global multiplicity results for problem \eqref{pq} up to the optimal range for the singularity ($0<q<3$).\\ \noi We now state all the hypotheses imposed on the continuous function $f:\Om\times\mb R\to\mb R$, given by $f(x,s)= g(x,s)\exp\left(|s|^{4}\right)$: \begin{enumerate} \item[$(f1)$] $g\in C(\overline{\Om}\times \mb R)$ such that for each $x\in\overline\Om$, $g(x,s)=0$ for all $s\le 0$; $g(x,s)>0$ \text{for all} $s>0$ and {$\frac {f(x,s)}{s^3}$ is non decreasing in $s>0$,} for all $x\in\overline\Om$. \item[$(f2)$] $\displaystyle\lim_{s\to0}\frac{f(x,s)}{s}=0$, uniformly in $x\in\Om$. \item[$(f3)$] {\it Critical growth assumption}: For any $\e>0$, $$\displaystyle\lim_{s\to +\infty}\sup_{x\in\overline\Om}g(x,s)\exp\left(-\e|s|^{4}\right)=0\text{\; \; and \;\;} \displaystyle\lim_{s\to +\infty}\inf_{x\in\overline\Om}g(x,s) {\exp(\e |s|^{4})}=+\infty.$$ \item[$(f4)$] There exist constants $M_0>\sqrt{2},\; L>0$ such that\[f'(x,s)\geq M_0f(x,s)-L \text{ for all } s>0.\] \item[$(f5)$] There exists a constant $\tau>4$ such that $0<\tau F(x,s)\leq f(x,s)s,$ for all $ (x,s)\in \Om\times (0,+\infty).$ \item[$(f6)$] There exists a constant $M_1>0$ such that $F(x,s)\leq M_1(1+f(x,s))$ for all $s>0$. \item[$(f7)$] We assume that\begin{equation*} \displaystyle \lim_{s\to +\infty} \frac{sf(x,s)}{\exp\left( s^{4}\right)} =+ \infty,\mbox{ uniformly in }x \in \overline{\Om}. \end{equation*} \end{enumerate} \begin{example} Consider $f(x,s)= g(x,s)e^{s^{4}}$, where $g(x,s)=\left\{\begin{array}{lr} {t^{a_0+ 1} \exp(d_0s^{r})},\; \mbox{if} \; s> 0\\ 0, \; \mbox{if} \; s\leq 0 \end{array}\right.$ for some $a_0>0$, $0<d_0\leq 4\pi$ and $1\leq r <4$. Then $f$ satisfies all the conditions from $(f1)$-$(f7)$. \end{example} \noi Now for any $\phi \in C_0(\overline \Om)$ with $\phi>0$ in $\Om$, we define the set \[C_\phi:=\{u\in C_0(\overline\Om) | \text{ there exists } c\geq 0\ \text { such that } |u(x)|\leq c\phi \text { for all } x\in \Om\}\] equipped with the norm $\|u\|_{C_\phi(\overline \Om)}:=\|u/\phi\|_\infty.$ Next, we define the following open convex set of $C_\phi(\Om)$ as \[C_\phi^+(\Om)=\left\{u\in C_\phi (\Om)| \inf_{x\in\Om}\frac{u(x)}{\phi(x)}>0\right\}.\] That is, the set $C_\phi^+(\Om)$ is consisting of all those functions $u\in C^0(\overline \Om)$ such that $C_1 \phi\leq u\leq C_2 \phi$ in $\Om$ for some constants $C_1,\,C_2>0$. Let us also define the distance function $$\de(x):=dist(x,\partial \Om)=\ds\inf_{y\in\partial\Om}|x-y|$$ for any $x\in \overline \Om$. Now for any continuous, non-negative bounded function $\varrho:\Om\to [0,+\infty)$, we consider the following weighted eigenvalue problem : \begin{align}\label{ev} -\De u =\la \varrho(x)u \text { in } \Om,\; u>0 \text { in } \Om,\;u=0 \text { on } \partial \Om. \end{align} Let $\varphi_{1,\Om}\in H^1_0(\Om)$ be a positive solution (first eigen function) of the above equation corresponding to the first eigenvalue $\tilde\la_{1,\Om}(\varrho)$ with $\Vert\varphi_{1,\Om}\Vert_{\infty}<1$. We recall that $\varphi_{1,\Om}\in C^{1,\theta}(\overline \Om)$ for some $\theta\in (0,1)$ and $\varphi_{1,\Om}\in C_{\de}^+(\Omega).$ Then, we define the function $\varphi_q$ as follows: \begin{equation*} \varphi_q= \left\{\begin{array}{l}\displaystyle \varphi_{1,\Om}\quad\mbox{ if } 0<q<1,\nonumber\\ \varphi_{1,\Om}\left(\log\left(\frac{1}{\varphi_{1,\Om}}\right)\right)^{\frac{1}{q+1}}\quad\mbox{ if } q=1,\nonumber\\ \varphi_{1,\Om}^{\frac{2}{q+1}}\quad\mbox{ if } q>1. \end{array}\right. \end{equation*} One can easily see that $\varphi_{1,\Om}\in C^+_{\varphi_q}$.\\\\ Now we state the main results of this article: \begin{theorem}\label{thm1} Let $\Om\subset \mb R^2$ be a smooth bounded domain. Suppose the hypotheses $(f1)-(f7)$ and $(\al1)$ hold. Then there exists $\La^*>0$ such that for every $\la\in(0,\La^*]$, problem \eqref{pq} admits at least one solution in {$H_0^1(\Om)\cap C^+_{\varphi_q}(\Omega)$} and for $\la>\La^*$, problem \eqref{pq} admits no solution. \end{theorem} \begin{theorem}\label{thm2} Let $\Om\subset \mb R^2$ be a smooth bounded domain. Assume that the hypotheses $(f1)-(f7)$ and $(\al1)$ hold. Then for every $\la\in(0,\La^*)$, problem \eqref{pq} admit at least two solutions in {$H_0^1(\Om)\cap C^+_{\varphi_q}(\Omega)$}. \end{theorem} \section{Variational frame work}\label{sec2} \noi For $u:\Om\to\mathbb R$, measurable function, and for $1\leq p \leq +\infty$, we define the Lebesgue space $L^{p}(\Om)$ as $$L^{p}(\Om)=\big\{u:\Om\to\mathbb R \;\; \text{measurable}\;:\; \int_\Om| u|^p ~dx<+\infty\big\}$$ equipped with the usual norm denoted by $\Vert u\Vert_{p}$. Now the Sobolev space $H^{1}_0(\Om)$ is defined as $$H^{1}_0(\Om)=\big\{u\in L^2(\Om)\;:\; \int_\Om|\nabla u|^2 ~dx<+\infty\big\}$$ endowed with the norm $$\|u\|:=\displaystyle \Big({\int_{\Om} |\nabla u|^2 ~dx}\Big)^{1/2}.$$ Since $\Om\subset \mb R^2$ is a smooth bounded domain, we have the continuous embedding $H^1_0(\Om)\hookrightarrow L^p(\Om)$ for $p\in (0,+\infty)$. Moreover, the embedding $H^{1}_0(\Om)\ni u \mapsto \exp(|u|^\beta)\in L^1(\Om)$ is compact for all $\beta \in \left[1,2\right)$ and is continuous for $\beta = 2$. Consequently, the map $\mc M: H^{1}_0(\Om) \to L^p(\Om)$ for $p \in [1,+\infty)$, defined by $\mc M(u):= \exp\left( |u|^{2}\right)$ is continuous with respect to the $H^1_0-$norm topology. \noi The natural energy functional associated to problem \eqref{pq} is the following: \begin{equation}\label{en} I_\la(u)=\left\{ \begin{array}{l} \frac{1}{2}\displaystyle\int_{\Om }(1+2|u|^{2})|\nabla u|^{2}~dx-\la\frac{1}{1-q}\int_\Om \al(x) u^{1-q} ~dx-\int_{\Om} {F(x,u(x))}~dx~~\mbox{\;\; if}~~ q\not =1;\\ \frac{1}{2}\displaystyle\int_{\Om }(1+2|u|^{2})|\nabla u|^{2}~dx-\la\int_\Om \al(x) \log |u| ~dx-\int_{\Om} {F(x,u(x))}~dx~~\mbox{\;\;\;\;\;\;\; if}~~ q =1. \end{array} \right. \end{equation} \noi Observe that, the functional $I_\la$ is not well defined in $H^{1}_0(\Om)$ because of the nature of the singularity $(0<q<3)$ as well as, due to the fact that $\displaystyle\int_{\Om} u^{2}|\nabla u|^{2}dx$ is not finite for all $u\in H_0^{1}(\Om) $. So, it is difficult to apply variational methods directly in our problem \eqref{pq}. In order to get rid of this inconvenience, first we apply the following change of variables introduced in \cite{CJ}, namely, $w:=h^{-1}(u),$ where $h$ is defined by \begin{equation}\label{g} \left\{ \begin{array}{l} h^{\prime}(s)=\displaystyle\frac{1}{\left(1+2|h(s)|^{2}\right)^{\frac{1}{2}}}~~\mbox{in}~~ [0,+\infty),\\ h(s)=-h(-s)~~\mbox{in}~~ (-\infty,0]. \end{array} \right. \end{equation} \noi Now we gather some properties of $h$, which we follow throughout in this article. For the detailed proofs of such results, one can see \cite{CJ,do}. \begin{lemma}\label{L1} The function $h$ satisfies the following properties: \begin{itemize} \item[$(h_1)$] $h$ is uniquely defined, $C^{\infty}$ and invertible; \item[$(h_2)$] $h(0)=0$; \item[$(h_3)$] $0<h^{\prime}(s)\leq 1$ for all $s\in \mathbb{R}$; \item[$(h_4)$] $\frac{1}{2}h(s)\leq sh^{\prime}(s)\leq h(s)$ for all $s>0$; \item[$(h_5)$] $|h(s)|\leq |s|$ for all $s\in \mathbb{R}$; \item[$(h_6)$] $|h(s)|\leq 2^{1/4}|s|^{1/2}$ for all $s\in \mathbb{R}$; \item[$(h_7)$] $\ds \lim_{s\to+\infty}{h(s)}/{s^{\frac 12}}=2^{\frac{1}{4}}$; \item[$(h_8)$] $|h(s)|\geq h(1)|s|$ for $|s|\leq 1$ and $|h(s)|\geq h(1)|s|^{1/2}$ for $|s|\geq 1$; \item[$(h_9)$] $h''(s)=-2h(s)(h'(s))^4,$ for all $s\geq0$ and $h^{\prime \prime}(s)<0$ when $s>0$, $h^{\prime \prime}(s)>0$ when $s<0$. \item[$(h_{10})$] the function $\frac{(h(s))^{\gamma}h'(s)}{s}$ is strictly increasing for $\gamma\geq3$; \item[$(h_{11})$] $\ds\lim_{s\to 0} {h(s)}/{s}=1$; \item[$(h_{12})$] $|h(s)h^{\prime}(s)|<1/ \sqrt[]{2}$ for all $s\in \mathbb{R}$; \item[$(h_{13})$] the function $h(s)^{-\gamma}h'(s)$ is decreasing for all $s>0$, where $\gamma>0$. \end{itemize} \end{lemma} \noi After employing the change of variable $w=h^{-1}(u)$ in \eqref{en}, we define the new functional $J_\la:H^{1}_0(\Om)\to \mb R$ as \begin{equation}\label{energy} J_\la(w)=\left\{ \begin{array}{l} \frac{1}{2}\displaystyle\int_{\Om} |\nabla w|^{2}dx-\la\frac{1}{1-q}\int_\Om \al (x)|h(w)|^{1-q}dx-\int_{\Om}F(x,h(w))dx~~\mbox{if}~~ q\not =1;\\ \frac{1}{2}\displaystyle\int_{\Om} |\nabla w|^{2}dx-\la\int_\Om \al (x)\log|h(w)|dx-\int_{\Om}F(x,h(w))dx~~\mbox{if}~~ q =1. \end{array} \right. \end{equation} \begin{remark} The functional $J_\la(w)$ is well defined for $w\in H^1_0(\Om)\cap C_{\varphi_q}^+(\Om)$. Indeed, let us define the set $\mc D(J_\la):= \{w\in H^1_0(\Om):\; J_\la(w)< +\infty\}$. Now we intend to show that this set is non empty. Let $1<q< 3$. Then using the fact that $h(s)$ is increasing in $s>0$ and Lemma \ref{L1}-$(h_8)$, we have \begin{equation*} h(w)> h(C_1\varphi_{1,\Om}^{\frac{2q}{q+1}})>h(C_2\de ^{\frac{2q}{q+1}})> \left\{ \begin{array}{l} C_2h(1)\de^{\frac{2q}{q+1}} \mbox{\;\; if }C_2\de^{\frac{2q}{q+1}}<1,\\ h(1)\mbox{\;\; if }C_2\de^{\frac{2q}{q+1}}\geq 1, \end{array} \right. \end{equation*} where $C_1,\,C_2$ are positive constants. Then for any $\psi \in H_0^1(\Om)$ and $w \in C_{\varphi_q}^+(\Om)$, using Lemma \ref{L1}-$(h_3)$, H\"older's inequality Hardy's inequality, and the Sobolev embedding, we deduce \begin{align}\label{gm-11} \int_{\Om}h(w)^{-q}h'(w)\psi dx =& \int_{\Om\cap \{x\,:\,C_2\de(x)^{\frac{2q}{q+1}}<1 \}}h(w)^{-q}h'(w)\psi dx + \int_{\Om\cap \{x\,:\,C_2\de(x)^{\frac{2q}{q+1}}\geq1 \}}h(w)^{-q}h'(w)\psi dx \notag\\&\leq C_3 \left(\int_\Om \frac{dx}{\de^{\frac{2(q-1)}{(q+1)}}}\right)^{\frac12}\left(\int_\Om\frac{\psi^2 }{\de^{2}}~dx\right)^{\frac12}+ C_4 h(1)^{-q}\int_\Om \psi~ dx\notag\\ &< C_5 \|\psi\|<+\infty, \end{align} since $\frac{2(q-1)}{q+1}<1$ for $1<q<3$, where $C_3,\, C_4,\, C_5$ are positive constants. For case $0<q\leq1$, arguing is a similar manner as above and following \cite{haito,yang-singular}, we get \eqref{gm-11}. In view of this, we obtain that the set $\mc D(J_\la)\neq \emptyset$ for $0<q<3$. This also justifies the reason behind considering the optimal range of $q$ as $0<q<3$. \end{remark} \noi Next, we check for the Gateaux differentiability of the functional $J_\la.$ For $0<q<1$ and $w\in H^1_0(\Om)$ with $w\geq c \de,$ using the idea of \cite{haito} combining with the properties of $h$ described in Lemma \ref{L1}, we can show that the functional $J_\la$ is Gateaux differentiable at $w$. For the range $1<q<3$, we have the following lemma regarding the similar property of $J_\la$. \begin{lemma}\label{diff} Let $\mc S:=\{w\in H^1_0(\Om) : w_1\leq w\leq w_2\},$ where $w_1\in C^+_{\varphi_q}(\Om)$ and $w_2\in H^1_0(\Om)$. Then $J_\la$ is Gateaux differentiable at $w$ in the direction $v-w$ for $v,\, w\in \mc S.$ \end{lemma} \begin{proof} We have to prove that \begin{align*} \lim_{t \to 0} \frac{J_\la(w+t(v-w))-J_\la(w)}{t} &= \int_\Om \nabla w\nabla(v-w)dx -\la \int_\Om \al (x)h(w)^{-q}h'(w)(v-w)~dx\\ &\qquad\qquad-\int_{\Om}f(x,h(w))h'(w)(v-w)~dx. \end{align*} For the first term and third term in the right hand side of the above expression, the proof follows in a standard way. So, we are left to show for the second term, that is, for the singular term. Since $\mc S$ is a convex set, for any $t \in (0,1)$, $w+t(v-w)\in \mc S$. Let us define the function $H:H^1_0(\Om)\to \mb R$ as \begin{equation*} H(w)=\left\{ \begin{array}{l} \displaystyle\frac{1}{1-q}\int_{\Om}h(w)^{1-q}~dx \quad\mbox { if } q\not=1\\ \displaystyle\int_{\Om}\log (h(w))~dx\quad \mbox{ if } q=1. \end{array}\right. \end{equation*} Now using mean value theorem, for any $0<q<3$, it follows that \begin{align}\label{1} \frac{H(w+t(v-w))-H(w)}{t} &= \int_\Om h(w+t\theta(v-w))^{-q} h'(w+t\theta(v-w)) (v-w)~dx \end{align} for some $\theta \in (0,1)$. Since $w+t\theta(v-w)\in \mc S$, using Lemma \ref{L1}-$(h_{13})$ together with \eqref{gm-11}, we get \[\int_\Om h(w+t\theta(v-w))^{-q}h'(w+t\theta(v-w))(v-w)~dx \leq \int_\Om h(w_1)^{-q}h'(w_1)(v-w)~dx < +\infty.\] Thus, applying Lebesgue dominated convergence theorem and passing to the limit $t \to 0^+$ in \eqref{1}, we have \begin{align}\label{kk}\lim_{t\to 0}\frac{H(w+t(v-w))-H(w)}{t} = \int_\Om h(w)^{-q}h'(w)(v-w)~dx. \end{align} This completes the proof. \end{proof} \noi Thus, using the properties of the functions $f,h$ and the above results, it can be derived that \eqref{energy} is the associated energy functional to the following problem: \begin{equation} \label{pp}\left\{ \begin{array}{rlll} -\Delta w&=&\la \al(x) h(w)^{-q} h'(w)+ f(x,h(w))h'(w) \; \text{in}\; \Om,\\ w&>& 0~\mbox{in}~ \Om,\\ w&=&0 ~\mbox{on}~ \partial\Om. \end{array} \right. \end{equation} Moreover, applying Lemma \ref{L1} and following the idea as in \cite{CJ}, one can show that the problem \eqref{pp} is equivalent to our original problem \eqref{pq} and $w$ is a solution to \eqref{pp} if and only if $u = h(w)$ is a solution to the problem \eqref{pq}. Thus, our main objective is now reduced to proving the existence of solutions to the new transformed equation \eqref{pp}. \begin{definition} A function $w \in H^{1}_0(\Om)$ is said to be a weak solution to \eqref{pp} if for every compact set $\mc K\subset \Om$, there exists a constant $m_{\mc K}>0$ such that $w>m_{\mc K}$ holds in $\mc K$ and for every $\phi \in H^{1}_0(\Om)$, we have \begin{align}\label{wk} \int_{\Om} \nabla w\nabla \phi ~dx-\la\int_\Om \al(x)h(w)^{-q} h'(w)\phi ~dx-\int_{\Om}f(x,h(w))h'(w)\phi ~dx=0.\end{align} \end{definition}\noi In the next lemma, we discuss some comparison type result related to our problem \eqref{pp}. \begin{lemma}\label{comp-princ} Let {$w_1,w_2 \in H^1_0(\Om)\cap C^+_{\varphi_q}(\Omega)$} satisfy \begin{align*}-\De w_1&\leq h(w_1)^{-q}h'(w_1), \;\;\; x\in\Om;\\ -\De w_2&\geq h(w_2)^{-q}h'(w_2), \;\;\; x\in\Om. \end{align*} \end{lemma} Then $w_1\leq w_2$ a.e. in $\Om$. \begin{proof} The proof of this lemma follows in a similar fashion as in \cite [Lemma 2.2]{yang-singular}. \end{proof} \textbf{Notations.} In the next subsequent sections, we make use of the following notations: \begin{itemize} \item If $u$ is a measurable function, we denote the positive and negative parts by $u^{+}=\max\left\{u,0\right\}$ and $u^{-}=\max\left\{-u,0\right\}$, respectively. \item For any function $f$, supp $f=\{x\,:\, f(x)\not=0\}$. \item If $A$ is a measurable set in $\mathbb{R}^{2}$, we denote the Lebesgue measure of $A$ by $\vert A \vert$ . \item The arrows $\rightharpoonup $ , $\to $ denote weak convergence, strong convergence, respectively. \item The arrow $\hookrightarrow $ denotes continuous embedding. \item $B_r$ denotes the ball of radius $r>0$ centered at $0\in H^1_0(\Om).$ \item $\overline{B_r}$ denotes the closure of the ball $B_r$ with respect to $H_0^{1}(\Om)$-norm topology. \item ${\partial B_r}$ denotes the boundary of the ball $B_r$. \item $B_r(x)$ denotes the ball of radius $r>0$ centered at $x\in H^1_0(\Om).$ \item For any $p>1$, $p':=\frac{p}{p-1}$ denotes the conjugate of $p$. \item $c,C_0, C_{1},C_{2},\cdots, \tilde C_1, \tilde C_2,\cdots, C$ and $\tilde C$ denote positive constants which may vary from line to line. \end{itemize} \section{Proof of Theorem \ref{thm1}: Existence and non-existence results} \noi From the assumptions $(f2)$-$(f3)$, we obtain that for any $\e>0$, $r\geq 1$, there exist $\tilde C(\e)$ and $C(\e)>0$ such that \begin{align} &|f(x,s)| \le \e |s|+ \tilde C(\e) |s|^{r-1} \exp\left((1+\e)|s|^{4}\right)\;\; \text{for all}\; (x,s)\in \Om \times \mb R,\label{f}\\ &|F(x,s)| \le \e |s|^2 + C(\e) |s|^r \exp\left((1+\e)|s|^{4}\right)\;\; \text{for all}\; (x,s)\in \Om \times \mb R.\label{F} \end{align} Thus, for any $w \in H^{1}_0(\Om)$, in light of the Sobolev embedding, we have $w \in L^q(\Om)$ for all $q \in [1,+\infty)$.\\ Let us define the set $\mathcal Q$ as \[\mc Q=\{\la>0\;:\; \text { the problem \eqref{pp} has a weak solution in } H^1_0(\Om)\}\] and let $\La^*:=\sup \mc Q.$ Then we have the following result: \begin{lemma}\label{lem1} Assume that the conditions in Theorem \ref{thm1} hold and let $h$ be defined as in \eqref{g}. Then the set $\mc Q$ is non empty. \end{lemma} \begin{proof} First, we consider the case $0<q<1.$\\ Using \eqref{F}, Lemma \ref{L1}-$(h_5), (h_6)$ with the Sobolev embedding and H\"older's inequality, from \eqref{energy}, we get \begin{align}\label{a1} J_\la(w)&\geq\frac 12 \|w\|^2-\frac{\la}{q-1}\int_\Om \al (x)h(w)^{1-q}~dx-\e\int_\Om h(w)^2 ~dx-C(\e)\int_\Om |w|^r\exp((1+\e)h(w)^4)~dx\notag\\ &\geq \frac 12 \|w\|^2-\frac{\la \|\al\|_\infty}{q-1} \int_\Om |w|^{1-q}~dx-\e\int_\Om w^2 ~dx-C(\e)\int_\Om |w|^r\exp(2(1+\e)w^2)~dx\notag\\ & \geq \frac 12 \|w\|^2-\frac{\la \|\al\|_\infty}{q-1} C_1 \| w\|^{1-q}-\e C_2\| w\|^2-C_3(\e)\|w\|_{rp'}^{r}\left(\int_\Om\exp(2p(1+\e){w^2})~dx\right)^{1/p}\notag \\ & \geq \left(\frac 12-\e C_2\right) \|w\|^2-\frac{\la \|\al\|_\infty}{q-1} C_1 \| w\|^{1-q}-C_4(\e)\|w\|^{r}\left(\int_\Om\exp\left(2p(1+\e)\|w\|^2.\frac{w^2}{\|w\|^2}\right) ~dx\right)^{1/p}, \end{align} for any $\e>0,\,p>1$ and $r>2.$ Choose $\|w\|=r_0$ with $0<r_0<1$ sufficiently small, $0<\e< \frac{1}{2C_2}$ sufficiently small and $p>1$ very near to $1$ such that $2(1+\e)pr_0<4\pi$. Then by using Theorem \ref{TM-ineq}, from \eqref{a1} we obtain \begin{align*} &\frac 12 \|w\|^2-\int_\Om F(x,h(w))~dx\geq 2\delta_0 \;\;\text{ for all } w\in \partial B_{r_0};\\ &\frac 12 \|w\|^2-\int_\Om F(x,h(w))~dx\geq 0 \;\;\text{ for all } w\in B_{r_0}. \end{align*} Now we can choose $\la=\la_0>0$ sufficiently small so that the last two relations yield that \begin{align*} J_{\la_0}|_{\partial B_{r_0}}\geq \de_0>0. \end{align*} Set $m_0:=\ds\inf_{w\in B_{r_0}} J_{\la_0}(w)$. Since for $t>0$ very small and $w\not=0$, from \eqref{energy}, we have \[J_{\la_0}(tw)\leq \frac 12 \|tw\|^2-C\la_0\|tw\|^{1-q},\] it follows that $m_0<0.$ Let $\{w_k\}\subset B_{r_0}$ be a minimizing sequence such that as $k\to+\infty$, \begin{align*} &J_{\la_0}(w_k)\to m_0;\\ &w_k\rightharpoonup w_0 \text{\;\; weakly in } H^1_0(\Om);\\ &w_k\to w_0 \text{\;\; strongly in } L^{1-q}(\Om) \text{ and }\\ &w_k(x)\to w_0(x) \text{ point-wise a.e. in } \Om. \end{align*} Without loss of generality, let us assume that $w_k\geq 0$ due to the fact that $J_\la(w)=J_\la(|w|)$. Now by mean value theorem there exists $\tilde w_k$ in between $w_0$ and $w_k$ such that as $k\to +\infty$, we have the following: \begin{align*} \int_\Om\al(x)h(w_k)^{1-q} ~dx&\leq \int_\Om\al(x)h(w_0)^{1-q} ~dx+\int_\Om\al(x)|h(w_k)-h(w_0)|^{1-q} ~dx\\ & \leq \int_\Om\al(x)h(w_0)^{1-q} ~dx+\int_\Om\al(x)|w_k-w_0|^{1-q}|h'(\tilde w_k)|^{1-q} ~dx\\ &\leq \int_\Om\al(x)h(w_0)^{1-q} ~dx+o(1).\end{align*} Similarly, we get $\ds \int_\Om\al(x)h(w_0)^{1-q} ~dx\leq \int_\Om\al(x)h(w_k)^{1-q} ~dx+o(1)$ as $k\to+\infty.$ Therefore, from the last two relations, we obtain \begin{align}\label{a5} \int_\Om\al(x)h(w_k)^{1-q} ~dx\to \int_\Om\al(x)h(w_0)^{1-q} ~dx\text{ as } k\to+\infty. \end{align} Next, using \eqref{F} and arguing in a similar fashion as in \eqref{a1} for sufficiently small $\e>0$, we deduce \begin{align*} \int_\Om F(x,h(w_k)) ~dx\leq \e C_2 \|w_k\|^2+C_4(\e)\|w_k\|^{r}\left(\int_\Om\exp\left(2p(1+\e)\|w_k\|^2.\frac{w_k^2}{\|w_k\|^2}\right) ~dx\right)^{1/p} <+\infty. \end{align*}In the last line of the above relation, we used Theorem \ref{TM-ineq}, with sufficiently small $\|w_k\|<r_0<<1$ and $p>1$ very close to $1$ so that $2(1+\e)pr_0<4\pi$. Thus, recalling Lebesgue dominated convergence theorem, we obtain \begin{align}\label{a6} \int_\Om F(x,h(w_k)) ~dx\to \int_\Om F(x,h(w_0)) ~dx\; \text{\;\;\; as } k\to +\infty. \end{align} Now from the weak lower semi-continuity of norm, we have \[r_0\geq \liminf_{k\to+\infty}\|w_k\|\geq \|w_0\|,\] which yields that $w_0\in B_{r_0}.$ Therefore,\[J_{\la_0}(w_0)\geq m_0.\] Furthermore, recalling \eqref{a5} and \eqref{a6}, we deduce \[m_0=\lim_{k\to+\infty} J_{\la_0}(w_k)\geq J_{\la_0}(w_0)\geq m_0.\] Thus, \[J_{\la_0}(w_0)=m_0<0.\] Hence, $w_0 (\not\equiv 0)$ is a local minimizer of $J_{\la_0}$ in $H_0^1(\Om).$ \\ Now we claim that $w_0$ is a weak solution to the problem \eqref{pp}. Note that, \begin{align}\label{a7} \liminf_{t\to 0^+} \frac{J_{\la_0}(w_0+t\phi)-J_{\la_0}(w_0)}{t}\geq 0. \end{align} It can be derived from the last expression that $ -\De w_0\geq 0$ in $ \Om$ in the weak sense and hence, by strong maximum principle, $w_0>0$ in $\Om.$ Furthermore, employing Fatou's lemma in \eqref{a7}, we infer that \begin{align}\label{a8} \int_\Om \nabla w_0\nabla \psi ~dx\geq \la \int_\Om \al(x)h(w_0)^{-q} h'(w_0)\psi ~dx+\int_\Om f(x,h(w_0)) h'(w_0)\psi ~dx \;\;\;\; \text{ for all } \psi\in H^1_0(\Om),\; \psi\geq 0. \end{align} Now for any $\phi\in H^1_0(\Om)$ and $\e>0$, taking $\psi=(w_0+\e\phi)^+$ as a test function in \eqref{a8} and dividing it by $\e>0$, we obtain \begin{align*} \int_\Om \nabla w_0\nabla \phi ~dx+\e\int_\Om |\nabla \phi|^2 ~dx&\geq \frac {\la }{\e}\int_\Om \al(x)(h(w_0+\e\phi)^{1-q} -h(w_0)^{1-q}) ~dx\notag\\&\qquad\qquad\qquad+\frac 1\e\int_\Om ( F(x,h(w_0+\e\phi))- F (x,h(w_0))) ~dx. \end{align*} Letting the limit $\e\to 0^+$ in the last expression, we deduce \begin{align*} \int_\Om \nabla w_0\nabla \phi ~dx\geq {\la }\int_\Om \al(x)h(w_0)^{-q}h'(w_0) \phi ~dx+\int_\Om f (x,h(w_0)) h'(w_0) \phi ~dx. \end{align*} Again, by taking $-\phi$ in place of $\phi$, we get the reverse inequality in the last relation. Therefore, $w_0$ is a weak solution to the problem \eqref{pp}. \\ Next, we consider the case $1\leq q<3.$ For that, we consider the following problem: \begin{equation} \label{pp,}\left\{ \begin{array}{rlll} -\Delta w&=&\la \al(x) (h(w)+\e)^{-q} h'(w)+ f(x,h(w))h'(w) \; \text{in}\; \Om,\\ w&>&0 \; \text{in}\; \Om,\\ w&=&0 ~\mbox{on}~ \partial\Om, \end{array} \right. \end{equation} such that $\e>0$ is sufficiently small and $0<\la<\min \{\tilde\la_{1,\Om},\la_0\}$. Here $\tilde\la_{1,\Om}:=\tilde\la_{1,\Om}(\al)$ is the first eigenvalue of the problem \eqref{ev} with $\varrho=\al$ and $\varphi_{1,\Om}$ is the first eigen function corresponding to $\tilde\la_{1,\Om}$. We show the existence of solution to \eqref{pp,} by constructing a sub-solution and a super-solution to \eqref{pp,}. Let $W$ be a solution to \begin{align*} -\De W=1 \text{ in } \Om;\;\;\;\; W=0 \text{ on } \partial \Om. \end{align*} Then by maximum principle, $W>0$ in $\Om$ and by standard elliptic regularity theory, $W\in C^1(\overline\Om)$ and hence, bounded on $\oline\Om$. Set $$\overline w :=C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW,$$ where $C=C(\la)$ and $M>0$ are two sufficiently large real constants. Therefore, \begin{align}\label{a9} -\De \overline w=C\la\al(x)\varphi_{1,\Om}+M. \end{align} Now using Lemma \ref{L1}-$(h_{13}), (h_3), (h_5)$ and the fact $h(s)>1$ for sufficiently large $s>0$, we get \begin{align}\label{a11} \frac {h'\left( C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW\right)}{\left(h\left(C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW\right)+\e\right)^{q}}&\leq\frac {h'\left( C\varphi_{1,\Om}\right)}{h\left(C\varphi_{1,\Om}\right)^{q }}\notag\\ &=\frac {h'( C\varphi_{1,\Om})}{h(C\varphi_{1,\Om})^{1+q}} h(C\varphi_{1,\Om})\leq C\varphi_{1,\Om}. \end{align} Again, using Lemma \ref{L1}-$(h_3),(h_6)$ combining with $(f3)$, for any $c>0, \e>0$, we obtain \begin{align}\label{a12} &f\left(x,h\left( C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW\right)\right)h'\left( C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW\right)\notag\\&<c\exp\left((1+\e)h\left( C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW\right)^4\right)\notag\\ &<c\exp\left(2(1+\e)\left( C\frac{\la}{\tilde\la_{1,\Om}}\varphi_{1,\Om}+ MW\right)^2\right)\notag\\ & <c\exp\left(2(1+\e)\left( C\frac{\la}{\tilde\la_{1,\Om}}\|\varphi_{1,\Om}\|_\infty+ M\|W\|_\infty\right)^2\right)\notag\\ &<M \text{ \;\; for sufficiently small } c=c(\la)>0. \end{align} Plugging \eqref{a11} and \eqref{a12} in \eqref{a9}, we infer that $\overline w$ is a super-solution to \eqref{pp,}. Now let us set $$\underline w:=\la\al(x)m W$$ for sufficiently small $m>0.$ Therefore, \[-\De \underline w=\la\al(x)m.\] We claim that $\underline w$ is a sub-solution to \eqref{pp,}. To prove the claim, it is enough to show \begin{align}\label{a13} m<\frac{h'(mW)}{(h(mW)+\e)^q}. \end{align} For sufficiently small $0<m(\la)<1$, using Lemma \ref{L1}-$(h_4), (h_5), (h_8),$ we deduce \begin{align*} \frac{1}{m(h(mW)+\e)^q} h'(mW)&\geq \frac{1}{m(h(mW)+\e)^q} \frac{ h(mW)}{2mW}\notag\\ &\geq \frac{1}{m(mW+\e)^q} \frac{ h(1)}{2}\notag\\ &\geq \frac{1}{m^{q+1}(\|W\|_\infty+1/m)^q} \frac{ h(1)}{2}>1. \end{align*} This establishes the claim. Now by choosing $M$ sufficiently large and $m$ sufficiently small so that $M>>m$, from \eqref{a12} and \eqref{a13}, we have $\underline w\leq \overline w$. Hence, there is a solution {$\underline w\leq w_\e\leq \overline w$} to \eqref{pp,} in $H^1_0(\Om)$. Since $\underline w, \overline w$ do not depend on $\e$, we have $$w_\e(x)\to w_\la(x)\text{ \;\; point-wise in } \Om \text { as } \e\to 0^+.$$ Next, we show that $w_\la$ is a weak solution to \eqref{pp}. Testing \eqref{pp,} against the test function $w_\e$, we get \begin{align*}\int_\Om |\nabla w_\e|^2 ~dx&=\la \int_\Om \al(x)(h(w_\e)+\e)^{-q}h'(w_\e) w_\e ~dx+ \int_\Om f(x,h(w_\e))h'(w_\e) w_\e ~dx\\ &\leq \la \int_\Om \al(x)h(\underline w)^{-q}h'(\underline w) \underline w ~dx+ \int_\Om f(x,h(\underline w))h'(\underline w) \underline w ~dx<+\infty. \end{align*} { Thus $\{w_e\}$ is bounded in $H^1_0(\Om)$. Up to some sub-sequence, $w_e\rightharpoonup w_\la$ in $H^1_0(\Om)$ as $\e\to 0$. } Again, testing \eqref{pp,} against any $\phi\in H^1_0(\Om)$, we deduce \begin{align}\label{me}\int_\Om \nabla w_\e\nabla \phi ~dx&=\la \int_\Om \al(x)(h(w_\e)+\e)^{-q}h'(w_\e) \phi ~dx+ \int_\Om f(x,h(w_\e))h'(w_\e) \phi ~dx. \end{align} For $\phi\geq 0,$ using Lemma \ref{L1}-$(h_{13})$, we have \begin{align}\label{st}\al(x)(h(w_\e)+\e)^{-q}h'(w_\e)\phi\leq \al(x)h(\underline w)^{-q}h'(\underline w) \phi\in L^1(\Om). \end{align} Observe that, $f(x,h(s))h'(s)$ is increasing in $s>0$. Indeed, using $(f1)$ and Lemma \ref{L1}-$(h_{10})$, it follows that $f(x,h(s))h'(s)=\frac{f(x,h(s))}{h(s)^3}.\frac{ h(s)^3h'(s)}{s}.s$ is increasing in $s>0$. Using this, again for $\phi\geq 0,$ by Lemma \ref{L1}, we have \begin{align}\label{aije}f(x,h(w_\e))h'(w_\e)\phi\leq f(x,h(\oline w))h'(\oline w) \phi \in L^1(\Om). \end{align} Then \eqref{me}, \eqref{st} and \eqref{aije} together with Lebesgue dominated convergence theorem yield that as $\e\to 0$, \begin{align}\label{a14} \int_\Om \nabla w_\la\nabla \phi ~dx&=\la \int_\Om \al(x)h(w_\la)^{-q}h'(w_\la) \phi ~dx+ \int_\Om f(x,h(w_\la))h'(w_\la) \phi ~dx. \end{align} Since for any $\phi\in H^1_0(\Om),$ $\phi=\phi^+-\phi^-,$ the relation in \eqref{a14} holds for all $\phi\in H^1_0(\Om).$ Thus $w_\la$ is a solution to \eqref{pp}. This completes the proof of the lemma. \end{proof} \noi In the next lemma, we aim to discuss the regularity result for the solutions of \eqref{pp}. \begin{lemma}\label{lem6} Assume that $(f1)-(f7)$ and $(\al1)$ hold. Let $h$ be defined as in \eqref{g}. If $w\in H^1_0(\Om) $ is any weak solution to \eqref{pp} for $\la \in (0,\Lambda^*]$, then $w \in L^\infty(\Om)\cap C^+_{\varphi_{q}}(\Om)$. \end{lemma} \begin{proof} Let $w\in H^1_0(\Om)$ be a weak solution to \eqref{pp}. First, in spirit of \cite[Lemma A.4]{js}, we show that $w$ is in $L^\infty(\Om)$. For that, let us define a $C^1$ cut-off function $\psi:\mb R\to[0,1]$ as \begin{equation*} \psi(s)=\left\{ \begin{array}{l} 0~~\mbox{if}~~ s\leq 0,\\ 1~~\mbox{if}~~ s\geq 1. \end{array} \right. \end{equation*} Now for any $\e>0$, define \[\psi_\e(s)=\psi\left(\frac{s-1}{\e}\right) \text{\;\; for } s\in \mb R.\] Note that $\nabla (\psi_e\circ w)=(\psi_e'\circ w)\nabla w$. Hence, $\psi_\e\circ w\in H^1_0(\Om).$ Let $v\in C^\infty_c(\Om)$ with $v\geq 0$. Now using $\phi:= (\psi_\e\circ w)v$ as a test function in \eqref{wk}, we obtain \begin{align}\label{p1} \int_{\Om} \nabla w\nabla (\psi_\e\circ w)v ~dx&-\la\int_\Om \al(x)h(w)^{-q} h'(w)(\psi_\e\circ w)v ~dx\notag\\&\qquad\qquad\quad-\int_{\Om}f(x,h(w)(x))h'(w)(\psi_\e\circ w)v~dx=0. \end{align} Since \[ \nabla w\nabla (\psi_\e\circ w)v=|\nabla w|^2 \nabla (\psi_\e'\circ w)v+ (\nabla w\nabla v) (\psi_\e\circ w),\] from \eqref{p1}, we deduce \begin{align*} \int_{\Om} (\nabla w\nabla v) (\psi_\e\circ w) ~dx\leq \la \int_\Om \al(x)h(w)^{-q} h'(w)(\psi_\e\circ w)v ~dx+\int_{\Om}f(x,h(w)(x))h'(w)(\psi_\e\circ w)v~dx. \end{align*} In the last relation, letting $\e\to 0^+$ and using Lemma \ref{L1}-$(h_{13}), (h_3)$, we get \begin{align*} \int_{\Om} \nabla (w-1)^+\nabla v ~dx&\leq \int_{\Om\cap \{x\,:\,w(x)>1\}} \la \al(x)h(1)^{-q} h'(1) v ~dx+\int_{\Om\cap \{x\,:\,w(x)>1\}}f(x,h(w))h'(w)v~dx\\ &\leq C +\int_{\Om}f(x,h(w))v~dx. \end{align*} Now following the arguments as in \cite [Lemma $10$, Theorem $C$]{hirano} combining with Theorem \ref{TM-ineq}, from the last relation, we infer that $(w-1)^+\in L^\infty(\Om).$ Hence $w\in L^\infty(\Om).$\\ Finally, adapting the ideas as in the proof of \cite[Corollary $1.1$]{adijg} and \cite[Theorem $4$]{crandal }, we can conclude that $w\in C_{\varphi_q}^+(\Om).$ \end{proof} \begin{remark}\label{rem1} By Lemma \ref{lem6}, it follows that if $w\in H^1_0(\Om)$ is any weak solution to \eqref{pp}, then $w\in C(\oline \Om)$. Moreover, when $0<q<1$, we have $w\in C^1(\oline\Om)$. \end{remark}\noi The following lemma basically ensures the non-existence of solution to \eqref{pp} for $\la>\La^*$. \begin{lemma}\label{lem2} Let the conditions in Theorem \ref{thm1} hold and let $h$ be defined as in \eqref{g}. Then, $0<\La^*<+\infty.$ \end{lemma} \begin{proof} From Lemma \ref{lem1}, we can infer that $\La^*>0.$ Thus, we are left to show that $\La^*<+\infty.$ Suppose this is not true. Then there exists a sequence $\{\la_k\}\subset \mc Q$ such that $\la_k\to +\infty$ as $k\to +\infty.$ For $s>0,$ let us define the function \begin{align*} \mc N_{\la}(s):=[\la h(s)^{-q}+f(x,h(s))] \frac{h'(s)}{s}. \end{align*} We claim that there exists $k_0\in \mb N$ sufficiently large and $\beta=\beta (\la_{k_0})>0$ such that for all $s>0$, \begin{align}\label{b1} \mc N_{\la_{k_0}}(s)=[\la_{k_0}h(s)^{-q}+f(x,h(s))] \frac{h'(s)}{s}>\beta>\tilde\la_{1,\Om}(\varrho), \end{align} where $\tilde\la_{1,\Om}(\varrho)$ is the first eigenvalue of the problem \eqref{ev} with $\varrho(x)=\min\{1,\al(x)\}$. Indeed, for any arbitrary $k\in\mb N$ and for $s\in [1/n, n],\; n\in \mb N$, let us consider $\mc N_{\la_k}(s)$. Since $\mc N_{\la_k}$ is a continuous function, there exists $s_n:=s_{n,k}\in [1/n,n]$ such that \[\mc N_{\la_k}(s_n)\leq \mc N_{\la_k}(s) \text{ for all } s\in [1/n,n].\] Now we show that, up to some sub-sequence, $s_n\to s_{0,k}\in (0,+\infty)$ as $n\to +\infty$. Supposing the contrary to this, we have either $s_n\to 0$ or $s_n\to+\infty$ as $n\to+\infty$. For both the cases, applying Lemma \ref{L1}-$(h_6),(h_8)$, we obtain \[\lim_{n\to+\infty}\mc N_{\la_k}(s)\geq \lim_{n\to+\infty}\mc N_{\la_k}(s_n)=+\infty.\] That is, $\mc N_{\la_k}\geq +\infty$ for all $s\in (0,+\infty)$ and for all $k\in \mb N,$ which is absurd. Hence, $s_n\to s_{0,k}\in (0,+\infty)$ as $n\to +\infty$ and \begin{align}\label{b2} \mc N_{\la_k}(s)\geq [\la_{k}h(s_{0,k})^{-q}+f(x,h(s_{0,k}))] \frac{h'(s_{0,k})}{s_{0,k}} \text{ for all } s>0. \end{align} Arguing in a similar manner as in \eqref{b2}, it can be deduced that $s_k:=s_{0,k}\to s_0\in (0,+\infty)$, up to some sub-sequence, as $k\to+\infty.$ Using this fact, from \eqref{b2}, we achieve \eqref{b1}. Thus, the claim follows. Since $\la_{k_0}\in\mc Q,$ for $\la=\la_{k_0},$ let $w_{k_0}$ be a solution to \eqref{pp}. So, from Lemma \ref{L1}-$(h_8)$, it follows that \begin{align} -\De w_{\la_{k_0}}-\beta \varrho(x)w_{\la_{k_0}}&\geq -\De w_{\la_{k_0}}-\mc N_{\la_{k_0}} \varrho(x) w_{\la_{k_0}}\notag\\ &=-\De w_{\la_{k_0}}-\varrho(x)w_{\la_{k_0}}[\la_{k_0}h(w_{\la_{k_0}})^{-q}+f(x,h(w_{\la_{k_0}}))] \frac{h'(w_{\la_{k_0}})}{w_{\la_{k_0}}}\notag\\ &\geq -\De w_{\la_{k_0}}-\la_{k_0}\al(x)h(w_{\la_{k_0}})^{-q}-f(x,h(w_{\la_{k_0}})) {h'(w_{\la_{k_0}})}=0.\notag \end{align}This implies that $ -\De w_{\la_{k_0}}\geq \beta \varrho(x) w_{\la_{k_0}}>0$ in $\Om$, which in view of strong maximum principle yields that $ w_{\la_{k_0}}>0$ in $\Om$. Now by applying Picone's identity for $\varphi_{1,\Om}$ and $ w_{\la_{k_0}}$, we derive \begin{align*} 0&\leq \int_\Om |\nabla \varphi_{1,\Om}|^2 ~dx-\int_\Om \nabla\left(\frac {\varphi_{1,\Om}^2}{w_{\la_{k_0}}}\right) \nabla w_{\la_{k_0}}~dx\\ &\leq \int_\Om |\nabla \varphi_{1,\Om}|^2 ~dx-\int_\Om \beta\varrho(x) \varphi_{1,\Om}^2 ~dx\\ &=(\tilde\la_{1,\Om}(\varrho)-\beta)\int_\Om \varrho(x) \varphi_{1,\Om}^2 ~dx. \end{align*} Therefore, $\tilde\la_{1,\Om}(\varrho)\geq\beta$, which contradicts \eqref{b1}. Thus, the proof of the lemma follows. \end{proof} \noi In the next result, using a sub-super solution technique, we show the existence of at least one solution to \eqref{pp}. \begin{proposition}\label{lem3} Let the conditions in Theorem \ref{thm1} be satisfied and let $h$ be defined as in \eqref{g}. Then for each $\la\in (0,\La^*)$, \eqref{pp} admits a nontrivial solution in $H^1_0(\Om)\cap C_{\varphi_q}^+(\Om)$. \end{proposition} \begin{proof} Let $\la \in (0,\La^*)$ and $\la^\prime \in (\la,\La^*)$. Then, one can see that $w_{\la'}\in H^1_0(\Om)$ forms a weak solution to \eqref{pp} for $\la=\la'$. Moreover, by Lemma \ref{lem6}, $w_{\la'}\in C_{\varphi_q}^+(\Om)$. Existence of such $\la'$ is guaranteed from to the definition of $\La^*$ and Lemma \ref{lem1}. Therefore, \begin{align*} -\De { w_{\la'}} \geq \la\al(x)h({w_{\la'}})^{-q}h'({w_{\la'}})+f(x,h(\underline{ w_\la}))h'({w_{\la'}}),\;\; x\in \Om;\; {w_{\la'}}>0,\;\; x\in\Om;\;\; {w_{\la'}}=0,\;\; x\in\partial \Om. \end{align*} Hence, $w_{\la'}$ is a super-solution to \eqref{pp}. Now we aim to find a sub-solution to \eqref{pp} which is smaller than $w_{\la'}$. For this, we use the first eigen function $\varphi_{1,\Om}$ corresponding to the first eigenvalue $\tilde\la_{1,\Om}>0$ as defined for the equation \eqref{ev} with $\varrho=\al$. Choose $c:=c(\la)\in(0,1)$ sufficiently small and define $\underline w_\la:=c\varphi_{1,\Om}$. By the construction and the properties of $\varphi_{1,\Om}$, we have $\uline{w_\la}\in C_{\varphi_q}^+(\Om)$. That is, there exist two positive constants $c_1:=c_1(\la,q),\, c_2:=c_2(\la,q)$ such that { \begin{align} c_1(q,\la)\de (x)&\leq \uline{w_{\la}}\leq c_2(q,\la)\de(x) \text {\;\;\; if \;} 0<q<1,\label{inqq1}\\ c_1(q,\la)\de (x)^\frac{2}{q+1}&\leq \uline{w_{\la}}\leq c_2(q,\la)\de(x)^\frac{2}{q+1} \text {\;\;\; if \;} 1<q<3.\label{inqq2} \end{align} } Then by using Lemma \ref{L1}-$(h_{13}), (h_8)$, we can derive the relation \begin{align}\label{conj}\la\al(x)h(\underline {w_\la})^{-q}h'(\underline{ w_\la})&=\la\al(x)h(\underline {w_\la})^{-1-q}h'(\underline{ w_\la})h(\underline {w_\la})\notag\\ &\geq \tilde\la_{1,\Om}\al(x)\frac{h(\underline {w_\la})}{h(1)}\notag\\ &\geq \tilde\la_{1,\Om}\al(x)\underline {w_\la}. \end{align} { This is evident from the last relation that $c(\la)$ is increasing in $\la>0$. Therefore, \begin{align}\label{increasing} \text{$\la\mapsto \uline{w_{\la}}$ is increasing and continuous in $\la$ from $\mb R^+\to C^1(\oline\Om)$.} \end{align} } From \eqref{conj}, it follows that \begin{align*} -\De \underline{ w_\la}= \tilde\la_{1,\Om} \al(x) \underline {w_\la}\leq \la\al(x)h(\underline {w_\la})^{-q}h'(\underline{ w_\la})+f(x,h(\underline{ w_\la}))h'(\underline {w_\la}),\;\; x\in \Om. \end{align*} Thus, $\underline w_\la$ is a weak sub-solution to \eqref{pp}. Therefore, we see that $w_{\la'}$ and $\underline w_\la$ satisfy the following: \begin{equation*} \left\{ \begin{array}{l} -\De { w_{\la'}} \geq \la\al(x)h({w_{\la'}})^{-q}h'({w_{\la'}}) \; \text{in}\;\;\; \Om,\\ -\De \underline{ w_\la}\leq \la\al(x)h(\underline{ w_\la})^{-q}h'(\underline{ w_\la})\;\;\; \text{in}\; \Om. \end{array} \right. \end{equation*} Hence, Lemma \ref{comp-princ} yields that $\uline{w_\la} \leq w_{\la^\prime}$. Now we consider the closed convex subset $Y_\la$ of $H^1_0(\Om)$ as \[Y_{\la}:= \{w \in H^1_0(\Om):\; \uline{w_\la} \leq w\leq w_{\la^\prime} \}.\] Let $\{w_k\} \subset Y_\la$ be such that $w_k \rightharpoonup w_0$ in $H^1_0(\Om)$ as $k \to +\infty$. Then, up to a sub-sequence, $w_k(x)\to w_0(x)$ point-wise a.e. in $\Om$. Using Lemma \ref{L1}-$(h_5)$ and Remark \ref{rem1} for $w_{\la'}$, we get $$h(w_k)^{1-q}~dx \leq w_k^{1-q}~dx \leq {w_{\la'}}^{1-q}~dx\in L^1(\Om)\; \text{ if } 0<q<1$$ and $$\log (h(w_k))\leq \log (w_k)\leq \log ({w_{\la'}})\in L^{1}(\Om)\; \text{ if } q=1. $$ {Again, from Lemma \ref{L1}-$(h_8)$ and \eqref{inqq2}, it follows that \[h(w_k)^{1-q} \leq h(\uline {w_k})^{1-q} \leq h(1)^{1-q} \uline{w_\la}^{1-q}<C \de ^{\frac{2(1-q)}{1+q}}\in L^1(\Om)\text{ if } 1<q<3\] }\noi since $\frac{2(1-q)}{1+q}>-1$ for $1<q<3$. Furthermore, using $(f3)$ in combination with Lemma \ref{L1}-$(h_6)$ and Theorem \ref{TM-ineq}, we deduce \[F(x,h(w_k))<C \exp((1+\e)h(w_k)^4)\leq C \exp(2(1+\e)w_{\la'}^2)\in L^1(\Om).\] So, by Lebesgue dominated convergence theorem, we obtain \begin{align*} \int_\Om h(w_k)^{1-q}~dx &\to \int_\Om h(w_0)^{1-q}~dx, \text{ if } q\not =1;\\ \int_\Om \log (h(w_k))~dx &\to \int_\Om \log (h(w_0))~dx, \text{ if } q =1;\\ \int_{\Om} F(x,h(w_k)) ~dx &\to \int_{\Om} F(x,h(w_0)) ~dx.\end{align*} Using last three limits and weak lower semicontinuity property of the norm, we deduce that $J_\la$ is weakly lower semicontinuous on $Y_\la$. Since $Y_\la$ is weakly sequentially closed subset of $H^1_0(\Om)$, there exists some $w _\la\in Y_\la$ such that \begin{equation}\label{gm-3} \inf_{w \in Y_\la} J_\la(w) = J_\la(w_\la). \end{equation} \noi Now we show that $w_\la$ is a weak solution to \eqref{pp}.\\ For $\varphi \in H^1_0(\Om)$ and $\e>0$ small enough, we define \[v_\e := \min\{w_{\la^\prime}, \max\{\uline{w_\la}, w_\la+\e \varphi\} \} = w_\la+\e \varphi - \varphi^\e+ \varphi_\e \in Y_\la,\] where $\varphi^\e := \max\{0, w_\la+\e\varphi- w_{\la^\prime}\}$ and $\varphi_\e:=\max\{0, \uline{w_\la}-w_\la-\e\varphi\}$. By construction, $v_\e \in Y_\la$ and $\varphi^\e, \varphi_\e \in H^1_0(\Om) \cap L^\infty(\Om)$. Since $w_\la+t(v_\e-w) \in Y_\la$, for each $0<t<1$, using \eqref{gm-3}, Lemma \ref{diff} and mean value theorem, we obtain \begin{align*} 0 &\leq \lim_{t\to 0^+} \frac{J_\la(w_\la+t(v_\e-w_\la))- J_\la(w_\la)}{t} \\ & = \int_\Om \nabla w_\la \nabla(v_\e-w_\la) ~dx-\la\lim_{t\to 0^+} \int_{\Om}\al(x)h(w_\la+\theta t (v_\e-w_\la))^{-q} h'(w_\la+\theta t (v_\e-w_\la)) (v_\e-w_\la)~dx\\ &\qquad- \int_{\Om} f(x,h(w_\la)) h'(w_\la)(v_\e-w_\la)~dx \end{align*} for some $0<\theta<1.$ From the definition of $\varphi^\e,\varphi_\e,$ we get that $|v_\e-w_\la|\in H^1_0(\Om)$, which yields that \[|(h(\uline{w_\la})^{-q}h'(\uline{w_\la}))(v_\e-w_\la)|\in L^1(\Om).\] Moreover, using Lemma \ref{L1}-$(h_{13})$, we obtain \[|h(w_\la+\theta t (v_\e-w_\la))^{-q} h'(w_\la+\theta t (v_\e-w_\la)) (v_\e-w_\la)|\leq|(h(\uline{w_\la})^{-q}h'(\uline{w_\la}))(v_\e-w_\la)| \] for all $t\in (0,1)$. From the last relation, it follows that \begin{equation}\label{gm-4} \int_{\Om}\nabla w_\la\nabla \varphi~dx {-}\la \int_{\Om}\al(x)h(w_\la)^{-q}h'(w_\la)\varphi ~dx-\int_\Om f(x,h(w_\la))h'(w_\la)\varphi~dx \geq \frac{1}{\e} (E^\e-E_\e), \end{equation} where \begin{align*} E^\e &:= \int_{\Om}\nabla w_\la\nabla \varphi^\e~dx-\la \int_{\Om}\al(x)h(w_\la)^{-q}h'(w_\la)\varphi^\e ~dx-\int_\Om f(x,h(w_\la))h'(w_\la)\varphi^\e~dx;\\ E_\e &:= \int_{\Om}\nabla w_\la\nabla \varphi_\e~dx-\la \int_{\Om}\al(x)h(w_\la)^{-q}h'(w_\la)\varphi_\e ~dx-\int_\Om f(x,h(w_\la))h'(w_\la)\varphi_\e~dx.\\ \end{align*} We define the set $\Om^\e := \{x \in \Om :\; (w_\la+\e\varphi)(x) \geq w_{\la^\prime}> w_\la(x)\}$ so that $\mc |\Om^\e| \to 0$ as $\e \to 0^+$. Next, using the fact that ${w_{\la^\prime}}$ is a super-solution to \eqref{pp} together with Lemma \ref{L1}-$(h_{13})$, we estimate the following: \begin{align*} \frac{1}{\e}E^\e= &\frac{1}{\e}\left[ \int_{\Om}\nabla (w_\la-w_{\la'})\nabla\varphi^\e ~dx + \int_{\Om}\nabla w_{\la'}\nabla\varphi^\e ~dx - \la \int_{\Om}(\al(x)h(w_\la)^{-q}+ f(x,h(w_\la)))h'(w_\la)\varphi^\e~dx\right] \\ &\geq \frac 1\e\int_{\Om^\e}|\nabla (w_\la-w_{\la'})|^2 ~dx + \int_{\Om^\e}\nabla (w_\la-w_{\la'})\nabla\varphi ~dx+ \frac{\la}{\e}\int_{\Om^\e}\al(x) (h(w_{\la^\prime})^{-q}h'(w_{\la'})\\ &\quad -h(w_\la)^{-q}h'(w_\la))\varphi^\e ~dx+\frac 1\e\int_{\Om^\e}(f(x,h(w_{\la'}))h'(w_{\la'})-f(x,h(w_{\la}))h'(w_{\la}))\varphi^\e ~dx\\ & \geq \int_{\Om^\e}\nabla (w_\la-w_{\la'})\nabla\varphi ~dx-{\la}\int_{\Om^\e}\al(x) (h(w_{\la^\prime})^{-q}h'(w_{\la'})-h(w_\la)^{-q}h'(w_\la))|\varphi|~dx\\ &\qquad\quad-\int_{\Om^\e}|f(x,h(w_{\la'}))h'(w_{\la'})-f(x,h(w_{\la}))h'(w_{\la})|\,|\varphi| ~dx\\& =o(1)\; \text{as}\; \e \to 0^+. \end{align*} Arguing similarly, we have \[\frac{1}{\e}E_\e \leq o(1) \; \text{as}\; \e \to 0^+.\] Thus, from \eqref{gm-4}, we get \[ \int_{\Om}\nabla w_\la\nabla \varphi~dx {-}\la \int_{\Om}\al(x)h(w_\la)^{-q}h'(w_\la)\varphi ~dx-\int_\Om f(x,h(w_\la))h'(w_\la)\varphi~dx \geq o(1)\; \text{as}\; \e \to 0^+\] for all $\varphi \in {H_0^1(\Om)}$. Considering $-\varphi$ in place of $\varphi$ and following the similar arguments as above, we infer that $w_\la$ is a weak solution to \eqref{pp}. Moreover, from the construction of $w_\la$ and Lemma \ref{lem6}, it follows that $w_\la\in C_{\varphi_q}^+$. This concludes the proof of the proposition. \end{proof} \begin{lemma}\label{lem4} Assume that the conditions in Theorem \ref{thm1} hold and let $h$ be defined as in \eqref{g}. Let $\la\in (0,\La^*)$. Then any weak solution to \eqref{pp} obtained in Lemma \ref{lem3} forms a local minimizer for the functional $J_\la.$ \end{lemma} \begin{proof} We prove this lemma for the case $q\not=1$. For $q=1$, the proof follows in a similar fashion.\\ Now suppose the statement of the lemma does not hold, that is, let us assume that $w_\la$ is not a local minimum of $J_\la$. Then there exists a sequence $\{w_k\}\subset H_0^1(\Om)$ such that \begin{equation}\label{gm-5} \|w_k-w_\la\| \to 0\; \text{as}\; k \to +\infty \; \text{and}\; J_\la({w_k})< J_\la(w_\la). \end{equation} Next, we define $\uline w:= \uline{w_\la}$ and $\oline{w}:= w_{\la^\prime}$ as a sub-solution and a super-solution to \eqref{pp}, respectively, as defined in the proof of Proposition \ref{lem3}. Furthermore, we define \begin{equation*} v_k := \max\{\uline{w}, \min\{w_k,\uline{w}\}\}=\left\{ \begin{array}{ll} \uline{w},\; &\text{if}\; w_k<\uline{w},\\ w_k,\; &\text{if}\; \uline{w}\leq w_k\leq\oline{w},\\ \oline{w},\; &\text{if}\; w_k>\uline{w}, \end{array} \right.\\ \end{equation*} \begin{align*} &\uline{u_k}:= (w_k-\uline{w})^-,\;\; \oline{u_k}:= (w_k-\oline{w})^+,\\ &\uline{\mc S_k}:= \text{supp}(\uline{w_k}),\;\;\; \oline{\mc S_k}:= \text{supp}(\oline{w_k}). \end{align*} Then $w_k = v_k - \uline{u_k}+\oline{u_k}$ and $v_k \in Y_\la,$ where $Y_\la$ is defined in Proposition \ref{lem3}. Then we can express $J_\la(w_k)$ as \begin{align}\label{x}J_\la(w_k)= J_{\la}(v_k)+ A_k+B_k, \end{align}where \begin{align}\label{gm-6} A_k &:=\frac 12 \int_{\oline{\mc S_k}}(|\nabla w_k|^2-|\nabla \oline{w}|^2)~dx- \frac{\la}{1-q}\int_{\oline{\mc S_k}}\al(x) (h(w_k)^{1-q}-h(\oline w)^{1-q} )~dx\notag\\&\qquad\qquad\quad -\int_{\oline{\mc S_k}} (F(x,h(w_k)) - F(x,h(\oline{w})))~dx,\\ B_k &:=\frac 12 \int_{\uline{\mc S_k}}(|\nabla w_k|^2-|\nabla \uline{w}|^2)~dx- \frac{\la}{1-q}\int_{\uline{\mc S_k}}\al(x) (h(w_k)^{1-q}-h(\uline w)^{1-q} )~dx\notag\\&\qquad\qquad\quad -\int_{\uline{\mc S_k}} (F(x,h(w_k)) - F(x,h(\uline{w})))~dx.\label{gm7} \end{align}From Proposition \ref{lem3}, we get $J_\la(w_k)\geq J_{\la}(w_\la)+ A_k+B_k.$ We intend to show that $A_k,B_k\geq 0$ for large $k$. For that, we need to show \begin{align}\label{sk}\lim\limits_{k \to +\infty}|\oline{\mc S_k}|=0\;\; \text{\; and \;} \lim\limits_{k \to +\infty}|\uline{\mc S_k}|=0. \end{align} Now recalling the properties of $\varphi_{1,\Om}$ and the proof of Proposition \ref{lem3}, we have \[\oline w\geq w_\la>\uline w:=c(\la)\varphi_{1,\Om}>c(\la)\de(x)>0\] for sufficiently small $c(\la)>0.$ On the other hand, by $(f1)$ and Lemma \ref{L1}, we have $f(x,h(s))h'(s)$ is increasing in $s>0$. For any $b>0$, let us define the set $$\Om_b:=\{x\in \, :\, \de (x)>b\}.$$Gathering all the above facts together with Lemma \ref{L1}-$(h_3), (h_{12})$ and using mean value theorem, for $x\in \Om_{\frac b2}$, we get \begin{align} -\De(\oline w-w_\la)\geq &\la\al(x)[h(\oline w)^{-q}h'(\oline w)-h(w)^{-q}h'(w)]\notag\\ &=\la \al(x)[-q(h'(w_*))^2h(w_*)^{-q-1}+h(w_*)^{-q}h''(w_*)](\oline w-w_*),\;\;\;\; \text{ for some } w_*\in (w_\la,\oline w)\notag\\ &\geq \la \al(x) [-q h(w_*)^{-q-1}-\sqrt{2}h(w_*)^{-q}](\oline w-w_*)\notag\\ &\geq -\la \al(x)\left [q h\left (c(\la)\frac{b}{2}\right )^{-q-1}+\sqrt{2}h\left(c(\la)\frac{b}{2}\right)^{-q}\right](\oline w-w_\la).\notag \end{align} Applying \cite[Theorem 3] {bn}, from the last relation, we infer that for any $b>0$, there exists a constant $C_*>0$ such that $$\oline w-w_\la\geq C_* \frac b 2>0\;\;\; \text{in } \Om_b.$$ Given $\e>0$, choose $b>0$ such that $|\Om\setminus \Om_b|<\frac \e2$. Since we assumed that $w_k\to w_\la$ in $H^1_0(\Om)$, for sufficiently large $k\in\mb N$, we obtain \begin{align*} |\oline{\mc S_k}|&\leq |\Om\setminus\Om_b|+|\oline{\mc S_k}\cap \Om_b|\\ &\leq \frac \e 2 +\int_{\oline{\mc S_k}\cap \Om_b} \frac{w_k-w_\la}{\oline w-w_\la}~dx\\ &\leq \frac \e 2 +\frac{4}{C_*^2 b^2}\int_{\oline{\mc S_k}\cap \Om_b} {(w_k-w_\la)^2}~dx\\ &<\e + C \|w_k-w_\la\|^2. \end{align*} This yields that $|\oline{\mc S_k}|\to 0$ as $k\to+\infty.$ In a similar fashion as above, considering $\uline w-w_\la$, we get $|\uline{\mc S_k}|\to 0$ as $k\to+\infty.$ Therefore, as $k\to+\infty$ \begin{align}\label{c2} \|\oline{v_k}\|^2&=\int_{\oline{\mc S_k}}|\nabla(w_k-\oline w)|^2 ~dx\notag\\ &\leq 2\left(\|w_k-w_\la\|^2+ \int_{\oline{\mc S_k}}|\nabla(w_\la-\oline w)|^2 ~dx\right)\to 0. \end{align} \noi Similarly, $\|\uline{v_k}\|^2\to 0$ as $k\to+\infty$. Since $\oline w$ is a super-solution to \eqref{pp}, using Lemma \ref{L1}-$(h_9)$ and mean value theorem, from \eqref{gm-6}, we obtain \begin{align}\label{111} A_k&=\frac 12 \int_{\oline{\mc S_k}}(|\nabla( \oline w+ \oline{v_k})|^2-|\nabla \oline{w}|^2)~dx- \frac{\la}{1-q}\int_{\oline{\mc S_k}}\al(x) (h(\oline w+ \oline{v_k})^{1-q}-h(\oline w)^{1-q} )~dx\notag\\&\qquad\qquad -\int_{\oline{\mc S_k}} (F(x,h(\oline w+\oline{v_k})) - F(x,h(\oline{w})))~dx,\notag\\ &=\frac 12 \|\oline{v_k}\|^2+\int_{\oline{\mc S_k}} \nabla \oline w\nabla \oline{v_k} ~dx- \frac{\la}{1-q}\int_{\oline{\mc S_k}}\al(x) h(\oline w+\theta \oline{v_k})^{-q}h'(\oline w+\theta \oline{v_k}) \oline{v_k} ~dx\notag\\&\qquad\qquad-\int_{\oline{\mc S_k}} f(x,h(\oline w+\theta \oline{v_k})) h'(\oline w+\theta \oline{v_k}) \oline{v_k}~dx,\;\;\; \theta \in(0,1)\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2+ \la \int_{\oline{\mc S_k}}\al(x)h(\oline w)^{-q}h'(\oline w)\oline{v_k}~dx +\int_{\oline{\mc S_k}}f(x,h(\overline{ w}))h'(\overline{w})\oline{v_k}~dx\notag\\ &\qquad\qquad- \frac{\la}{1-q}\int_{\oline{\mc S_k}}\al(x) h(\oline w+\theta \oline{v_k})^{-q}h'(\oline w+\theta \oline{v_k}) \oline{v_k} ~dx-\int_{\oline{\mc S_k}} f(x,h(\oline w+\theta \oline{v_k})) h'(\oline w+\theta \oline{v_k}) \oline{v_k}~dx\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 +\int_{\oline{\mc S_k}}f(x,h(\overline{ w}))h'(\overline{w})\oline{v_k}~dx -\int_{\oline{\mc S_k}} f(x,h(\oline w+\theta \oline{v_k})) h'(\oline w+\theta \oline{v_k}) \oline{v_k}~dx\notag\\ &= \frac 12 \|\oline{v_k}\|^2 + \theta\int_{\oline{\mc S_k}}\left( f'(x,h(\oline w+\tilde \theta \oline{v_k}))( h'(\oline w+\tilde \theta \oline{v_k}))^2 +f(x,h(\oline w+\tilde \theta \oline{v_k})) h''(\oline w+\tilde \theta \oline{v_k}) \right)\oline{v_k}^2 ~dx,\;\;\; \tilde\theta\in(0,1)\notag\\ &= \frac 12 \|\oline{v_k}\|^2 + \theta\int_{\oline{\mc S_k}}\Big( f'(x,h(\oline w+\tilde \theta \oline{v_k}))( h'(\oline w+\tilde \theta \oline{v_k}))^2 \notag\\&\qquad\qquad\qquad\qquad\qquad-2f(x,h(\oline w+\tilde \theta \oline{v_k})) h(\oline w+\tilde \theta \oline{v_k})( h'(\oline w+\tilde \theta \oline{v_k}))^4 \Big)\oline{v_k}^2 ~dx. \end{align} Now by the definition of the function $f$, we have $$f'(x,h(s))=(g'(x,h(s)) +4h(s)^3 g(x,h(s)))\exp(h(s)^4)\geq 4h(s)^3 f(x,h(s)).$$ Using this combining with Lemma \ref{L1}-$(h_{13}), (h_{12}), (h_3), (h_6)$ and H\"older's inequality, from \eqref{111}, we deduce \begin{align} A_k&\geq \frac 12 \|\oline{v_k}\|^2 + \theta\int_{\oline{\mc S_k}}\Big( 4 f(x,h(\oline w+\tilde \theta \oline{v_k}))h(\oline w+\tilde \theta \oline{v_k})^3( h'(\oline w+\tilde \theta \oline{v_k}))^2 \notag\\&\qquad\qquad\qquad\qquad-2f(x,h(\oline w+\tilde \theta \oline{v_k})) h(\oline w+\tilde \theta \oline{v_k})( h'(\oline w+\tilde \theta \oline{v_k}))^4 \Big)\oline{v_k}^2 ~dx\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 - \theta\int_{\oline{\mc S_k}}\Big( 4 f(x,h(\oline w+\tilde \theta \oline{v_k}))h(\oline w+\tilde \theta \oline{v_k})^3( h'(\oline w+\tilde \theta \oline{v_k}))^3\notag \\&\qquad\qquad\qquad\qquad-2f(x,h(\oline w+\tilde \theta \oline{v_k})) h(\oline w+\tilde \theta \oline{v_k}) h'(\oline w+\tilde \theta \oline{v_k}) \Big)\oline{v_k}^2 ~dx\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 -\sqrt{2} \theta\int_{\oline{\mc S_k}} f(x,h(\oline w+\tilde \theta \oline{v_k})) \oline{v_k}^2~dx\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 -C\int_{\oline{\mc S_k}} \exp((1+\e)h(\oline w+\tilde \theta \oline{v_k})^4) \oline{v_k}^2~dx, \;\;\;\;\;\;\;\; \text{ by } (f3) \text{\; for } \e>0\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 -C\int_{\oline{\mc S_k}} \exp(2(1+\e)(\oline w+\tilde \theta \oline{v_k})^2) \oline{v_k}^2~dx\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 -C\left(\int_{\oline{\mc S_k}} \exp(4(1+\e)(\oline w+\tilde \theta \oline{v_k})^2) ~dx\right)^{\frac 12} \left(\int_{\oline{\mc S_k}}\oline{v_k}^4~dx\right)^{\frac 12}\notag\\ &\geq \frac 12 \|\oline{v_k}\|^2 -C |\oline {\mc S_k}| \|\oline{v_k}\|^2\geq 0, \;\;\; \text{ for large } k\in\mb N,\notag \end{align} where in the last line of the above estimation, we used Theorem \ref{TM-ineq}, \eqref{c2} and \eqref{sk}. Similarly, from \eqref{gm7}, we can show that $B_k\geq 0$ for sufficiently large $k\in\mb N$. Thus from \eqref{x}, for large $k\in\mb N$, it yields that \[J_\la(w_k) {\geq} J_{\la}(w_\la),\] which is a contradiction to \eqref{gm-5}. Hence, $w_\la$ is a local minimum of $J_\la$ over $H^1_0(\Om)$. \end{proof} \noi The next result is a consequence of Lemma \ref{lem4}, which yields that at the threshold level of $\la$, that is $\la=\La^*$, we have a weak solution to \eqref{pp}. \begin{proposition} \label{lem5} Let the conditions in Theorem \ref{thm1} be satisfied and let $h$ be defined as in \eqref{g}. Then for $\la=\La^*$, \eqref{pp} admits a weak solution in $H^1_0(\Om)\cap C_{\varphi_q}^+(\Om).$ \end{proposition} \begin{proof} From the definition of $\La^*$, there exists a increasing sequence $\{\la_k\}\in \mc Q$ such that $\la_k\uparrow\La^*$ as $k \to +\infty$. Hence, by Lemma \ref{lem3}, $\{w_{\la_k}\} \in H^1_0(\Om)\cap C_{\varphi_q}^+(\Om)\cap Y_{\la_k}$ is a sequence of positive weak solutions to \eqref{pp} with $\la=\la_k$. Therefore, \begin{align}\label{d1} \int_{\Om}|\nabla w_{\la_k}|^2 ~dx-\la_k \int_{\Om}\al(x)h(w_{\la_k})^{-q}h'(w_{\la_k}) w_{\la_k} ~dx-\int_\Om f(x,h(w_{\la_k}))h'(w_{\la_k})w_{\la_k}~~dx=0. \end{align} Let $\uline{w_{\la_k}}:=c(\la_k)\varphi_{1,\Om}$ denote the sub-solution to \eqref{pp} for $\la=\la_k$ as described in previous lemmas. So, using \eqref{conj} and Lemma \ref{L1}-$(h_4)$, from \eqref{ev} with $\rho=\al$, we obtain \begin{align}\label{d2} \int_{\Om}|\nabla \uline{w_{\la_k}}|^2 ~dx&=\la_{1,\Om}\int_\Om \al(x)\uline{w_{\la_k}}^2 ~dx\notag\\ &\leq \la_k \int_{\Om}\al(x)h(\uline{w_{\la_k}})^{-q}h'(\uline{w_{\la_k}}) \uline{w_{\la_k}} ~dx\leq \la_k \int_{\Om}\al(x)h(\uline{w_{\la_k}})^{1-q} ~dx. \end{align} Now Lemma \ref{lem4} yields that $w_{\la_k}$ forms the local minimizer of $J_{\la_k}$ for each $k\in\mb N$ as shown in Lemma \ref{lem4}. So, \begin{equation}\label{d3} J_{\la_k}(w_{\la_k})=\min_{w\in Y_{\la_k}} J_{\la_k}(w)\leq J_{\la_k}(\uline{w_{\la_k}})\leq\left\{ \begin{array}{l} \frac{1}{2}\displaystyle\int_{\Om} |\nabla \uline{w_{\la_k}}|^{2}~dx-\la\frac{1}{1-q}\int_\Om \al (x)|h(\uline{w_{\la_k}})|^{1-q}~dx~~\mbox{\;\;\; if}~~ q\not =1;\\ \frac{1}{2}\displaystyle\int_{\Om} |\nabla \uline{w_{\la_k}}|^{2}~dx-\la\int_\Om \al (x)\log|h(\uline{w_{\la_k}})|~dx~~\mbox{\;\;\; if}~~ q =1. \end{array} \right. \end{equation} Plugging \eqref{d2} in \eqref{d3}, we get \begin{equation}\label{d4} J_{\la_k}(w_{\la_k})\leq \beta_k:=\left\{ \begin{array}{l} \la_k\left(\frac{1}{2}-\frac{1}{1-q}\right)\ds\int_\Om \al (x)|h(\uline{w_{\la_k}})|^{1-q}~dx~~\mbox{\;\;\; if}~~ q\not =1;\\ \frac {\la_k}{2}\ds\int_\Om\al(x)~dx-\la_k\ds\int_\Om \al (x)\log|h(\uline{w_{\la_k}})|~dx~~\mbox{\;\;\; if}~~ q =1. \end{array} \right. \end{equation} Now for all $0<q<3$, since $0<\la_1\leq \la_2\leq\cdots\leq\la_k\leq\cdots\leq \La^*,$ from \eqref{inqq1} and \eqref{inqq2} and \eqref{increasing}, we infer that \begin{align}\label{d5}\sup_{k}\beta_k<+\infty. \end{align} {\bf Case-I:} $0<q<1$.\\ Now \eqref{d1} and \eqref{d4} combining with Lemma \ref{L1}-$(h_4)$ and $(f5)$ imply \begin{align}\label{d6} \beta_k+ \la_k\left(\frac{1}{1-q}-\frac{1}{2}\right)\ds\int_\Om \al (x)|h({w_{\la_k}})|^{1-q}~dx&\geq \frac 12 \int_\Om f(x,h(w_{\la_k}))h'(w_{\la_k})w_{\la_k} ~dx-\int_\Om F(x,h(w_{\la_k}))~dx\notag\\ &\geq \left( \frac 14-\frac 1\tau\right) \int_\Om f(x,h(w_{\la_k}))h(w_{\la_k}) ~dx. \end{align} Plugging \eqref{d6} and \eqref{d5} in \eqref{d1} and using Lemma \ref{L1}-$(h_4), (h_5)$ together with the fact that $\tau>4$ and Sobolev embedding ($H^1_0(\Om)\hookrightarrow L^{1-q}(\Om)$), we obtain \begin{align}\label{d7} \|w_{\la_k}\|^2 =\int_{\Om}|\nabla w_{\la_k}|^2 ~dx\leq C_1+C_2\La^* \int_{\Om}h(w_{\la_k})^{1-q}~dx \leq C_1+C_2\La^* \int_{\Om}w_{\la_k}^{1-q}~dx\leq C_1+C_3 \|w_{\la_k}\|^{1-q}. \end{align} {{\bf Case-II:} $q=1.$\\ Again using \eqref{d1}, \eqref{d4}, Lemma \ref{L1}-$(h_4)$ and $(f5)$ combining with the inequality $\log h(s)\leq\log s< s$, for $s>0$, we get \begin{align}\label{logg}\beta_k+ \la_k\ds\int_\Om \al (x)w_{\la_k}\geq \beta_k+ &\la_k\ds\int_\Om \al (x)\log w_{\la_k}\notag\\ &\geq\frac {\la_k}{2}\int_\Om\al(x) h(w_{\la_k})^{-1}h'(w_{\la_k})w_{\la_k}+\left( \frac 14-\frac 1\tau\right) \int_\Om f(x,h(w_{\la_k}))h(w_{\la_k}) ~dx\notag\\ & \geq \frac{ \la_k}{ 4}\int_\Om \al(x) dx+\left( \frac 14-\frac 1\tau\right) \int_\Om f(x,h(w_{\la_k}))h(w_{\la_k}) ~dx. \end{align} This gives that \begin{align}\label{loggg} \beta_k+\frac 34\la_k\ds\int_\Om \al (x)\geq \left( \frac 14-\frac 1\tau\right) \int_\Om f(x,h(w_{\la_k}))h(w_{\la_k}) ~dx. \end{align} Using \eqref{loggg} and \eqref{d5}, from \eqref{d1}, we deduce \begin{align}\label{d08}\|w_{\la_k}\|^2\leq C_6( \beta_k+\La^*\|\al\|_\infty\|w_{\la_k}\|+\|\al\|_\infty|\Om|). \end{align}} {\bf Case-III:} $1<q<3$.\\ Form \eqref{d6}, it follows that \[ \left( \frac 14-\frac 1\tau\right) \int_\Om f(x,h(w_{\la_k}))h(w_{\la_k}) ~dx\leq \beta_k+\la_k \left(\frac{1}{q-1}+\frac{1}{2}\right)\ds\int_\Om \al (x)|h({w_{\la_k}})|^{1-q}~dx.\] Employing this in \eqref{d1}, recalling Lemma \ref{L1}-$(h_8)$ and using \eqref{inqq2}, we get \begin{align}\label{d8} \|w_{\la_k}\|^2= \int_{\Om}|\nabla w_{\la_k}|^2&\leq C_1+C_4\La^* \int_{\Om}h(w_{\la_k})^{1-q}~dx\notag\\ & \leq C_1+C_4 h(1)^{1-q}\La^* \int_{\Om}w_{\la_k}^{1-q}~dx\nonumber\\ & \leq C_1+C_5\int_{\Om} \uline {w_{\la_k}}^{1-q}~dx\notag\\ & \leq C_1+C_5c_2(q,\la_2)\int_{\Om} \de^{\frac{2(1-q)}{1+q}}~dx<+\infty, \end{align} since $\frac {2(1-q)}{1+q}>-1.$\\\\ Thus, each of the expressions in \eqref{d7}, \eqref{d8}, \eqref{d08} from Case-I, II, III, respectively, yields that $$\ds\limsup_{k\to+\infty}\|w_{\la_k} \|<+\infty.$$ Therefore, up to a sub-sequence, there exists $w_{\La^*}\in H^1_0(\Om)$ such that $w_{\la_k}\rightharpoonup w_{\La^*}$ weakly in $H^1_0(\Om)$ and $w_{\la_k}(x)\to w_{\La^*}(x)$ a.e. in $\Om$ as $k \rightarrow +\infty$. Also, by construction, it follows that $w_{\la_k} \geq\uline{w_{\la_k}} \geq\underline{w_{\la_1}}$. So,\[{w_{\La^*}}(x)=\lim_{k\to +\infty} {w_{\la_k}}(x)>\uline{w_{\la_1}}(x)>0 \text{ a.e. in } \Om.\]Thus, by Lebesgue dominated convergence theorem, for any $\phi\in C_c^\infty(\Om)$, we have \begin{align}\label{d9}\int_\Om h(w_{\la_k})^{-q}h'(w_{\la_k})\phi ~dx\to\int_\Om h(w_{\La^*})^{-q}h'(w_{\La^*})\phi ~dx \text{\;\; as } k\to +\infty. \end{align} Since $w_{\la_k}$ is a weak solution to \eqref{pp} for each $k\in\mb N$, we have \begin{align}\label{d10} \int_{\Om}\nabla w_{\la_k}\nabla \phi ~dx-\la_k \int_{\Om}\al(x)h(w_{\la_k})^{-q}h'(w_{\la_k}) \phi ~dx-\int_\Om f(x,h(w_{\la_k}))h'(w_{\la_k})\phi~dx=0 \text{\; for any }\phi\in C_c^\infty(\Om). \end{align} Letting $k\to +\infty$, from \eqref{d9} and \eqref{d10}, we obtain \[\int_\Om f(x,h(w_{\la_k}))h'(w_{\la_k})\phi~dx<+\infty.\] This implies \[\int_\Om f(x,h(w_{\la_k}))h'(w_{\la_k})\phi~dx\to \int_\Om f(x,h(w_{\La^*}))h'(w_{\La^*})\phi~dx \text{ as } k\to +\infty,\] thanks to Lebesgue dominated convergence theorem. Gathering all these facts, finally we infer that $w_{\La^*}\in H^1_0(\Om)$ is a positive weak solution to \eqref{pp}. Moreover, in light of Lemma \ref{lem6}, we have $w_{\La^*}\in H^1_0(\Om)\cap C_{\varphi_q}^+(\Om)$. Hence, the proof of the proposition is complete. \end{proof} \noi {\bf Proof of Theorem \ref{thm1}:} Combining Lemma \ref{lem1}, \ref{lem6}, \ref{lem2}, \ref{lem4} along with Proposition \ref{lem3}, \ref{lem5}, we infer that $w_\la\in H_0^1(\Om)\cap C^+_{\varphi_q}(\Omega)$ is a weak solution to \eqref{pp}. Now by Lemma \ref{L1}-$(h_1)$, we have $h$ is a $C^\infty$ function and Lemma \ref{L1}-$(h_8), (h_{11})$ ensure that $h(s)$ behaves like $s$ when $s$ is close to $0$. Therefore, we can conclude that $h(w_\la) \in H_0^1(\Om)\cap C^+_{\varphi_q}(\Omega)$ forms a weak solution to the problem \eqref{pq}. \section{Proof of Theorem \ref{thm2} : Multiplicity result} \noi This section is dedicated toward establishing the existence of second solution of \eqref{pp} using the mountain pass lemma in combination with Ekeland variational principle. Let us define the set \[T := \{w\in H^1_0(\Om):\; w\geq w_\la\; \text{a.e. in}\; \Om \}.\] Since $w_\la$ forms a local minimizer for $J_\la,$ we get that $J_\la(w) \geq J_\la(w_\la)$ whenever $\|w_\la-w\|\leq \sigma_0$, for some small constant $\sigma_0>0$. Then, one of the following cases holds: \begin{enumerate} \item[$(ZA)$]{\bf (Zero Altitude):} $\inf \{ J_\la(w)\; |\; w \in T, \;\|w-w_\la\|=\sigma\}= J_\la(w_\la)$ for all $\sigma\in (0,\sigma_0)$. \item[$(MP)$]{\bf (Mountain Pass):} There exists a $\sigma_1 \in (0,\sigma_0)$ such that $\inf\{ J_\la(w)|\; w \in T,\; \|w-w_\la\|=\sigma_1\}> J_\la(w_\la)$. \end{enumerate} Now for the case $(ZA)$, inspired by \cite{haito} and \cite{adijg}, we prove the existence of second weak solution to \eqref{pp} in the following result. \begin{proposition}\label{prp1} Let the conditions in Theorem \ref{thm2} hold and let $\la\in(0,\La^*)$. Suppose that $(ZA)$ holds. Then \eqref{pp} admits a second solution $v_\la \in H^1_0(\Om) \cap C_{\varphi_q}^+(\Om)$ such that $v_\la\geq w_\la$ and $\|v_\la-w_\la\| = \sigma$ for all $\sigma \in (0,\sigma_0)$. \end{proposition} \begin{proof} Let us fix $\sigma \in (0, \sigma_0)$ and $r>0$ such that $\sigma -r>0$ and $\sigma +r< \sigma_0$. Define the set \[\mc A : = \{w \in T \,:\,\; 0<\sigma-r \leq \|w-w_\la\|\leq \sigma+r\}.\] Clearly $\mc A$ is closed in $H^1_0(\Om)$ and by $(ZA)$, $\ds\inf_{w \in \mc A} J_\la(w)= J_\la(w_\la)$. So, for any minimizing sequence $\{w_k\}\subset \mc A$ satisfying $\|w_k-w_\la\|= \sigma$, by Ekeland variational principle, we get another sequence $\{v_k\}\subset \mc A$ such that \begin{equation}\label{sec-sol-gm1} \left\{ \begin{array}{ll} J_\la(v_k) &\leq J_\la(w_k)\leq J_\la(w_\la)+ \frac{1}{k}\\ \|w_k-v_k\| &\leq \frac{1}{k}\\ J_\la(v_k)& \leq J_\la(v)+\frac{1}{k}\|v-v_k\|\;\; \text{for all}\; v \in \mc A. \end{array}\right. \end{equation} For $z \in T,$ we can choose $\e >0$ small enough so that $v_k + \e(z-v_k) \in \mc A$. So, from \eqref{sec-sol-gm1}, we obtain \[\frac{ J_\la(v_k + \e(z-v_k)) - J_\la(v_k)}{\e} \geq -\frac{1}{k}\|z-v_k\|.\] Letting $\e \to 0^+$, using the fact that $v_k\geq w_\la$ for each $k\in \mb N$ and following the similar arguments as in \eqref{1} and \eqref{kk} for the singular term in the last relation, we obtain \begin{equation}\label{sec-sol-gm2} -\frac{1}{k}\|z-v_k\|\leq \int_{\Om}\nabla v_k\nabla(z-v_k) ~dx-\la\int_\Om\al(x) h(v_k)^{-q}h'(v_k)(z-v_k)~dx -\int_\Om f(x,h(v_k))h'(v_k)(z-v_k)~dx \end{equation} for all $z\in T$. Since $\{v_k\}$ is a bounded sequence in $H^1_0(\Om)$, there exists $v_\la \in H_0^1(\Om)$ such that, up to a sub-sequence, $v_k \rightharpoonup v_\la$ weakly in $H^1_0(\Om)$ and point-wise a.e. in $\Om $ as $k \to +\infty$. As $v_k\geq w_\la$ for each $k$, we have that $v_\la\geq w_\la$ a.e. in $\Om$.\\ {\bf Claim:} $v_\la$ is a weak solution to \eqref{pp}.\\ For $\phi \in H_0^1(\Om)$ and $\e>0$, we set $$\psi_{k,\e} := (v_k+\e\phi-w_\la)^-,\;\; \psi_\e:= (v_\la+\e\phi -w_\la)^-.$$ Clearly, $\psi_{k,\e}\in H_0^1(\Om)$. This gives that $(v_k +\e\phi+\psi_{k,\e}) \in T$. Taking $z = v_k +\e\phi+\psi_{k,\e}$ in \eqref{sec-sol-gm2}, we deduce \begin{equation}\label{sec-sol-gm3} \begin{split} -\frac{1}{k}\|(\e\phi+\psi_{k,\e})\|&\leq\int_\Om \nabla v_k \nabla (\e\phi+\psi_{k,\e}) -\la \int_{\Om}\al(x)h(v_k)^{-q}h'(v_k)(\e\phi+\psi_{k,\e})~dx\\ &\quad \quad- \int_\Om f(x,h(v_k))h'(v_k)(\e\phi+\psi_{k,\e})~dx. \end{split} \end{equation} Note that $|\psi_{k,\e}| \leq w_\la +\e|\phi|$. Hence, using the Sobolev embedding and Lebesgue dominated convergence theorem, as $k \to +\infty$, $\psi_{k,\e} \to \psi_\e$ in $L^p(\Om), \;p \in [1,+\infty)$; $ \psi_{k,\e} \rightharpoonup \psi_\e $ weakly in $H^1_0(\Om)$ and $\psi_{k,\e}(x) \to \psi_\e(x)$ point-wise a.e. in $\Om$. Now using Lemma \ref{L1}-$(h_{13})$, we obtain \begin{align*} \al(x)h(v_k)^{-q}h'(v_k)(\e\phi+\psi_{k,\e})\leq\|\al\|_\infty h(v_\la)^{-q}h'(v_\la)(v_\la+2\e|\phi|). \end{align*} Furthermore, using the fact that both $h$ and $ f(x,\cdot)$ are non decreasing functions, we get \begin{align*} f(x,h( v_k))h'(v_k)(\e\phi+\psi_{k,\e})\leq f(x,h(w_\la+\e|\phi|))(w_\la+\e|\phi|). \end{align*} Hence, employing Lebesgue dominated convergence theorem, as $k\to+\infty$, we infer \begin{align}\label{sg} \int_\Om \al(x) h(v_k)^{-q}h'(v_k)(\e\phi+\psi_{k,\e}) ~dx &\to \int_\Om \al(x) h(v_\la)^{-q}h'(v_\la)(\e\phi+\psi_{\e}) ~dx,\\ \int_\Om f(x,h( v_k))h'(v_k)(\e\phi+\psi_{k,\e}) ~dx &\to \int_\Om f(x,h( v_\la))h'(v_\la)(\e\phi+\psi_{\e}) ~dx.\label{ct} \end{align} We define the sets $$\Om_{k,\e}:= \text{supp}\;\psi_{k,\e},\;\;\; \Om_\e:= \text{supp}\;\psi_\e \text\;\; \text{ and \;\;} \Om_0 :=\{x \in \Om:\; v_\la(x):=w_\la(x)\}.$$ Then, \begin{align}\label{ms1} |\Om_\e\setminus \Om_0| & \to 0 \text{\;\;\; as }\e \to 0;\\ |\Om_{k,\e}\setminus \Om_\e|+ |\Om_\e\setminus\Om_{k,\e}| & \to 0 \text{ \;\; as } k \to +\infty.\label{ms2} \end{align} Therefore, as $k\to+\infty$, we can derive that \begin{align}\label{gd} \int_\Om \nabla v_k\nabla \psi_{k,\e} ~dx &=\int_{\Om_{\e}} \nabla v_k\nabla \psi_{\e}~dx -\int_{\Om_{k,\e}} |\nabla( v_k-v_\la)|^2 ~dx+\int_{\Om_{k,\e}} \nabla v_\la \nabla( v_\la-v_k)|~dx+o(1)\notag\\ &\leq \int_{\Om} \nabla v_k\nabla \psi_{\e}~dx +\int_{\Om_{\e}} \nabla v_\la \nabla( v_\la-v_k)|~dx +o(1)=\int_{\Om} \nabla v_k\nabla \psi_{\e}~dx+o(1).\end{align} Combining \eqref{sec-sol-gm3}, \eqref{sg}, \eqref{ct}, \eqref{ms1}, \eqref{ms2} and \eqref{gd}, letting $k\to +\infty$ and using Lemma \ref{L1}-$(h_{13})$, we obtain \begin{align}\label{ee1} &\int_\Om\nabla v_\la \nabla \phi ~dx -\la \int_\Om \al(x) h(v_\la)^{-q}h'(v_\la)\phi ~dx-\int_\Om f(x,h( v_\la))h'(v_\la)\phi ~dx\notag\\ &\geq-\frac 1\e \left[\int_\Om\nabla v_\la \nabla \psi_\e ~dx - \la\int_\Om \al(x) h(v_\la)^{-q}h'(v_\la)\psi_{\e} ~dx-\int_\Om f(x,h( v_\la))h'(v_\la)\psi_{\e} ~dx\right]\notag\\ &=\frac 1\e \bigg[\int_\Om -\nabla (v_\la-w_\la )\nabla \psi_\e ~dx +\la\int_\Om \al(x) \left[h(v_\la)^{-q}h'(v_\la)-h(w_\la)^{-q}h'(w_\la)\right]\psi_{\e} ~dx\notag\\ &\qquad\qquad\qquad+\int_\Om\left[f(x,h( v_\la))h'(v_\la)-f(x,h( w_\la))h'(w_\la)\right]\psi_{\e} ~dx\bigg]\notag\\ &=\frac 1\e \bigg[\int_{\Om_\e }-\nabla (v_\la-w_\la )\nabla (w_\la-v_\la-\e\phi) ~dx \notag\\&\qquad\qquad\quad+\la\int_{\Om_\e }\al(x) \left[h(v_\la)^{-q}h'(v_\la)-h(w_\la)^{-q}h'(w_\la)\right](w_\la-v_\la-\e\phi) ~dx\notag\\ &\qquad\qquad\qquad\qquad+\int_{\Om_\e}\left[f(x,h( v_\la))h'(v_\la)-f(x,h( w_\la))h'(w_\la)\right](w_\la-v_\la-\e\phi) ~dx\bigg]\notag\\ &=\int_{\Om_\e }\nabla (v_\la-w_\la )\nabla \phi ~dx -\la\int_{\Om_\e }\al(x) \left[h(v_\la)^{-q}h'(v_\la)-h(w_\la)^{-q}h'(w_\la)\right]\phi ~dx \notag\\ &\quad\;\;-\int_{\Om_\e}\left[f(x,h( v_\la))h'(v_\la)-f(x,h( w_\la))h'(w_\la)\right]\phi ~dx\notag\\&\qquad\qquad+\frac1\e\int_{\Om_\e}\left[f(x,h( v_\la))h'(v_\la)-f(x,h( w_\la))h'(w_\la)\right](w_\la-v_\la) ~dx. \end{align} Since $v_\la\geq w_\la,$ using Lemma \ref{L1}-$(h_9)$ and mean value theorem, \begin{align}\label{fa} &\left[f(x,h( v_\la))h'(v_\la)-f(x,h( w_\la))h'(w_\la)\right](w_\la-v_\la) ~dx\notag\\ &\qquad\geq -(v_\la-w_\la)^2\left[f'(x,h(\xi_\la))(h'(\xi_\la))^2+f(x,h(\xi_\la))h''(\xi_\la)\right], \;\;\;\;\; \xi_\la\in (w_\la, v_\la)\notag\\ &\qquad\geq -\e^2 f'(x,h(\xi_\la)) \phi^2. \end{align} Plugging \eqref{fa} into \eqref{ee1}, letting $\e\to 0^+$ and using \eqref{ms1}, we get \begin{align*} &\int_\Om\nabla v_\la \nabla \phi ~dx -\la \int_\Om \al(x) h(v_\la)^{-q}h'(v_\la)\phi ~dx-\int_\Om f(x,h( v_\la))h'(v_\la)\phi ~dx\\&\quad\quad\geq o(1)-\e\int_{\Om_\e}f'(x,h(\xi_\la)) \phi^2~dx=o(1). \end{align*} Considering $-\phi$ in place of $\phi$ and arguing similarly as above, we get the reverse inequality in the last relation. Therefore, \begin{align*} \int_{\Om} \nabla v_\la\nabla \phi ~dx-\la\int_\Om \al(x)h(v_\la)^{-q} h'(v_\la)\phi ~dx-\int_{\Om}f(x,h(v_\la))h'(v_\la)\phi ~dx=0 \end{align*} for all $\phi\in H^1_0(\Om).$ So, $v_\la\in H^1_0(\Om)$ is a weak solution to \eqref{pp} and thus, the claim is proved. Moreover, by Lemma \ref{lem6}, $v_\la\in C^+_{\varphi_{q}}(\Om)$. \\ Now we show that $v_\la\not= w_\la.$ For that, it is enough to prove that \begin{align}\label{cv1} v_k\to v_\la \text{ \;\; in \; } H^1_0(\Om) \text{\;\; as } k\to+\infty. \end{align} Applying Br\'ezis-Lieb lemma, we get \begin{align*} \|v_k\|^2-\|v_k-v_\la\|^2 &=\|v_\la\|^2+o(1). \end{align*} Putting $z=v_\la$ in \eqref{sec-sol-gm2} and using the fact that $v_k\rightharpoonup v_\la$ in $T$ as $k\to+\infty$, we obtain that \begin{equation}\label{sec-sol-gm4} \int_\Om|\nabla( v_k-v_\la)|^2 dx\leq o(1)-\la\int_\Om\al(x) h(v_k)^{-q}h'(v_k)(v_\la-v_k)~dx -\int_\Om f(x,h(v_k))h'(v_k)(v_\la-v_k)~dx. \end{equation} Let us denote $u_k:=\frac{v_k-w_\la}{\|v_k-w_\la\|}$. Now recalling $(f3)$ and \eqref{f} for any $\e>0$, Lemma \ref{L1}-$(h_3), (h_4), (h_5)$ and using H\"older's inequality, for some large $N>>1$, we deduce \begin{align}\label{gm5} &\int_{\Om\cap\{x\,:\, v_k(x)>N\}} f(x,h(v_k))h'(v_k)v_k~dx\notag\\&\leq C \int_{\Om\cap\{x\,:\, v_k(x)>N\}} \exp \left((1+\e)h(v_k)^4\right) h'(v_k)v_k~dx\notag\\ &\leq C \int_{\Om\cap \{x\,:\, v_k(x)>N\}} \exp \left(2(1+\e) v_k^2\right) v_k~dx\notag\\ &\leq C \int_{\Om\cap \{x\,:\, v_k(x)>N\}} \exp \left(3(1+\e) v_k^2\right) ~dx\notag\\ &= C \int_{\Om\cap \{x\,:\, v_k(x)>N\}} \exp \left(-(1+\e) v_k^2\right) \exp \left(4(1+\e) (v_k-w_\la+w_\la)^2\right) ~dx\notag\\ &\leq C \exp \left(-(1+\e) N^2\right)\int_{\Om\cap\{x\,:\, v_k(x)>N\}} \exp \left(8(1+\e) [(v_k-w_\la)^2+w_\la^2]\right) ~dx\notag\\ &\leq C \exp \left(-(1+\e) N^2\right)\int_{\Om\cap\{x\,:\, v_k(x)>N\}} \exp \left(8(1+\e) u_k^2\|v_k-w_\la\|^2\right)\exp\left(8(1+\e)w_\la^2\right) ~dx\notag\\ &\leq C \exp \left(-(1+\e) N^2\right) \left(\int_{\Om\cap\{x\,:\, v_k(x)>N\}} \exp \left(8p(1+\e) u_k^2\|v_k-w_\la\|^2\right)~dx \right)^{1/p}\notag\\&\qquad\qquad\qquad\qquad\qquad\qquad \left(\int_\Om\exp\left(8p'(1+\e)w_\la^2\right) ~dx\right)^{1/p'}\notag\\ &\leq C \exp \left(-(1+\e) N^2\right) \bigg(\int_{\Om\cap\{x\,:\, v_k(x)>N\}} \exp \left(8p(1+\e) u_k^2(\sigma+r)^2\right)~dx \bigg)^{1/p}\notag\\&\qquad\qquad\qquad\qquad\qquad\qquad\left(\int_\Om\exp\left(8p'(1+\e)w_\la^2\right) ~dx\right)^{1/p'}. \end{align} Now choosing $p>1$ and $\sigma_0>0$ appropriately small so that $8(1+\e)p(\sigma+r)<8(1+\e)p \sigma_0<4\pi$ and then, applying Theorem \ref{TM-ineq}, from \eqref{gm5}, we infer that \begin{align}\label{gd0}\int_{\Om\cap\{x\,:\, v_k(x)>N\}} f(x,h(v_k))h'(v_k)v_k~dx=O\left(\exp \left(-(1+\e) N^2\right)\right). \end{align} Since $f(x,h(v_k))h'(v_k)v_k\to f(x,h(v_\la))h'(v_\la)v_\la$ point-wise a.e. in $\Om$ as $k\to+\infty$, using \eqref{gd0} and applying Lebesgue dominated convergence theorem, it follows that \begin{align}\label{gd1}\int_\Om f(x,h(v_k))h'(v_k)v_k ~dx&=\int_{\Om\cap\{x\,:\, v_k\leq N\}} f(x,h(v_k))h'(v_k)v_k ~dx+\int_{\Om\cap\{x\,:\, v_k>N\}} f(x,h(v_k))h'(v_k)v_k ~dx\notag\\ &= \int_{\Om\cap\{x\,:\, v_k\leq N\}} f(x,h(v_k))h'(v_k)v_k ~dx+O\left(\exp \left(-(1+\e) N^2\right)\right)\notag\\ &\to\int_\Om f(x,h(v_\la))h'(v_\la)v_\la ~dx \text {\;\;\;\; as } k\to +\infty \text{\; and } N\to+\infty. \end{align} In a similar way, we also have $\ds\int_\Om f(x,h(v_k))h'(v_k)v_k ~dx\to\int_\Om f(x,h(v_k))h'(v_k)v_\la ~dx$ as $k\to +\infty.$ This combining with \eqref{gd1} implies that \begin{align}\label{fcv} \int_\Om f(x,h(v_k))h'(v_k)(v_k-v_\la) ~dx\to 0 \text{ \;\;\; as } k\to+\infty. \end{align} Next, we show that \begin{align}\label{r2} \int_\Om \al(x) h(v_k)^{-q}h'(v_k)(v_\la-v_k) ~dx \to 0 \text{\;\;\; as } k\to+\infty. \end{align} By the construction, we have $v_k, v_\la\geq w_\la\geq \uline {w_\la}$. We consider three cases separately.\\ {\bf Case I: $0<q<1$.} By \eqref{inqq1} and the fact that $v_\la\in C(\oline \Om)$, using Lemma \ref{L1}-$(h_{13}), (h_3), (h_8)$, we get \begin{align}\label{r1} h(v_k)^{-q}h'(v_k)v_\la\leq h(\uline{w_\la})^{-q} h'(\uline{w_\la})v_\la\leq h(1)^{-q} \uline{w_\la}^{-q} v_\la\leq C(\la) \de^{-q} v_\la\in L^1(\Om). \end{align} Moreover, by Lemma \ref{L1}-$(h_3), (h_4)$, it follows that \begin{align}\label{r3} h(v_k)^{-q}h'(v_k)v_k \leq h(v_k)^{1-q}\leq v_k^{1-q}\in L^1(\Om) \end{align} due to the continuous embedding $H^1_0(\Om)\hookrightarrow L^{1-q}(\Om)$. Therefore, by Lebesgue dominated convergence theorem, as $k\to+\infty$, combining \eqref{r1} ad \eqref{r3}, we get \eqref{r2}.\\ {{\bf Case II: $q=1$.} Again using the fact that $v_\la\in C^+_{\varphi_{q}}$ and $1>\uline{w_\la}>C_1\de>0$, together with Lemma \ref{L1}-$(h_{13}), (h_3), (h_8)$, there exists some $c>0$ such that \begin{align}\label{r04} h(v_k)^{-1}h'(v_k)v_\la\leq h(\uline{w_\la})^{-1} h'(\uline{w_\la})c\varphi_{1,\Om} \left(\log \left(\frac{1}{c\varphi_{1,\Om}}\right)\right)^{1/2}\leq h(1)^{-1} \uline{w_\la}^{-1} (c\varphi_{1,\Om})^{1/2} \leq C \de ^{-\frac 12} \in L^1(\Om) \end{align} and hence, \eqref{r2} follows, thanks to Lebesgue dominated convergence theorem.}\\ {\bf Case III: $1<q<3$.} Recalling \eqref{inqq2} and the fact that $v_\la\in C^+_{\varphi_{q}}$, by Lemma \ref{L1}-$(h_{13}), (h_3), (h_8)$, it yields that \begin{align}\label{r4} h(v_k)^{-q}h'(v_k)v_\la\leq h(\uline{w_\la})^{-q} h'(\uline{w_\la})v_\la\leq h(1)^{-q} \uline{w_\la}^{-q} v_\la\leq C(\la) \de ^{\frac{2(1-q)}{1+q}} \in L^1(\Om) \end{align} since $\frac{2(1-q)}{1+q}>-1.$ Again, by Lemma \ref{L1}-$ (h_4), (h_8)$ and using the facts that $h(s)$ is non decreasing in $s>0$ and $h^{1-q}(s)$ is non increasing in $s>0$ for $q>1$, it follows that \begin{align}\label{r5} h(v_k)^{-q}h'(v_k)v_k \leq h(v_k)^{1-q}\leq h (\uline{w_\la})^{1-q}\leq h(1)^{1-q}\uline{w_\la}^{1-q}\leq C(\la) \de ^{\frac{2(1-q)}{1+q}} \in L^1(\Om). \end{align} Thus, \eqref{r4} and \eqref{r5} combining with Lebesgue dominated convergence theorem give \eqref{r2}.\\ Therefore, taking into account \eqref{fcv} and \eqref{r2}, from \eqref{sec-sol-gm4}, we finally get \eqref{cv1}. This completes the proof of the proposition. \end{proof} \noi Now we prove the existence of second solution in the case where $(MP)$ occurs.\\ Now for $k\in \mb N$, we define the Moser function $\mc M_k:\ \Om\to\mb R$ as \begin{equation*} \mc{ {M}}_{k}(x)=\frac{1}{\sqrt{2\pi}}\left\{ \begin{array}{ll} & \ds(\log k)^{\frac{1}{2}} \;\;\;\;\; \text{\;\; if \;} 0\leq |x|\leq \frac{1}{k},\\ & \ds\frac{\log \left(\frac{1}{|x|}\right)}{(\log k)^{\frac{1}{2}}} \quad\text{\;\; if \;} \; \frac{1}{k}\leq |x|\leq 1,\\ &\quad 0 \;\;\;\qquad\;\; \text{\;\; if \;} |x|\geq 1. \end{array} \right. \end{equation*} Then, $ \mc{{M}}_{k}\in H^{1}_0(\Om)$ and supp $ \mc{{M}}_{k} \subseteq {B_1}$. Moreover, we define the function $$\mc M_k^{\ell}(x):=\mc M_k\left(\frac{x-x_0}{\ell}\right).$$ We choose $x_0$ and $\ell$ is such a way so that $\text{supp}\, \mc M_k^{\ell}\subset \Om$. Note that $\|\mc M_k^{\ell}\|=1.$ \begin{lemma}\label{minimizer-gm}Let the conditions in Theorem \ref{thm2} and $(MP)$ hold. Then \begin{enumerate} \item[$(i)$] $J_\la(w_\la+ t \mc M_k^\ell) \to-\infty$ as $t\to+\infty$ uniformly for $k$ large. \item[$(ii)$] $\ds\sup_{t\geq 0}J_\la(w_\la+ t \mc M_k^\ell)<J_\la(w_\la)+\pi$ for large $k$. \end{enumerate} \end{lemma} \begin{proof} We prove this lemma for the case $q\not=1$. When $q=1$, the proof follows similarly.\\ \noi { $(i).$} By $(f3),$ there exist two positive constants $C_1,C_2$ such that $$F(x,s)\geq C_1 \exp (h(s)^4) -C_2 $$ for all $x\in \Om,\; s\geq0.$ Using this combining with Lemma \ref{L1}-$(h_8)$ for large $t>>1$ and H\"older's inequality, we get \begin{align} &J_\la ( w_\la+ t \mc M_k^\ell)\notag\\&=\frac 12\int_\Om |\nabla (w_\la+ t \mc M_k^\ell)|^2 ~dx-\frac{\la}{1-q}\int_\Om \al(x) h( w_\la+ t \mc M_k^\ell)^{1-q} ~dx- \int_\Om F(x, h( w_\la+ t \mc M_k^\ell)) ~dx\notag\\ &\leq \frac 12 \|w_\la\|^2+t\|w_\la\|\| \mc M_k^\ell\|+\frac 12 t^2 \|\mc M_k^\ell\|^2+C_2|\Om|-C_1\int_\Om \exp \left( h( w_\la+ t \mc M_k^\ell)^4\right)\notag\\ &\leq t^2 +C_3 t-\int_{B_{\frac \ell k}(x_0)} \exp \left( h(1)^4 (w_\la+ t \mc M_k^\ell)^2\right) ~dx\notag\\&\leq t^2 +C_3 t- C_4\int_{B_{\frac \ell k}(x_0)} \exp \left(t^2\frac { h(1)^4}{2\pi} \log k\right) ~dx\notag\\ &= t^2 +C_3 t- C_4~ k^{ \frac{h(1)^4}{2\pi} t^2-2}\to-\infty \;\;\;\text{uniformly in $k$ as $t\to+\infty$}.\notag \end{align} \noi { $(ii).$} Suppose $(ii)$ does not hold. So, there exists a sub-sequence of $\{\mc M_k^\ell\}$, still denoted by $\{\mc M_k^\ell\}$, such that \begin{align}\label{l1} \max_{t\geq 0} J_\la (w_\la+ t \mc M_k^\ell)\geq J_\la(w_\la)+\pi. \end{align} Then, \begin{align}\label{l2}J_\la(w_\la+ t \mc M_k^\ell)&=\frac 12\|w_\la\|^2+t \int_\Om \nabla w_\la \nabla \mc M_k^\ell ~dx+\frac{t^2}{2}-\frac{\la}{1-q}\int_\Om \al(x) h( w_\la+ t \mc M_k^\ell)^{1-q} ~dx\notag\\&\qquad\qquad- \int_\Om F(x, h( w_\la+ t \mc M_k^\ell)) ~dx\notag\\ &= J_\la (w_\la)+\frac{\la}{1-q}\int_\Om \al(x) h( w_\la)^{1-q} ~dx+ \int_\Om F(x, h( w_\la) )~dx\notag\\&\qquad+t{\la}\int_\Om \al(x) h( w_\la)^{-q} h'(w_\la) \mc M_k^\ell ~dx+ t \int_\Om f(x, h( w_\la)) h'(w_\la)\mc M_k^\ell ~dx\notag\\& \qquad\quad+\frac{t^2}{2}-\frac{\la}{1-q}\int_\Om \al(x) h( w_\la+ t \mc M_k^\ell)^{1-q} ~dx- \int_\Om F(x, h( w_\la+ t \mc M_k^\ell)) ~dx. \end{align} From $(i)$ and \eqref{l1}, it follows that there exists $t_k\in (0,+\infty)$ and $L_0>0$ satisfying $t_k\leq L_0$, such that \begin{align}\label{l3} \max_{t\geq 0} J_\la (w_\la+ t \mc M_k^\ell)= J_\la (w_\la+ t_k \mc M_k^\ell)\geq J_\la(w_\la)+\pi. \end{align} Now \eqref{l2} and \eqref{l3} yield that \begin{align} &\frac{\la}{1-q}\int_\Om \al(x) h( w_\la)^{1-q} ~dx +\int_\Om F(x, h( w_\la)) ~dx\notag\\&\qquad+t_k{\la}\int_\Om \al(x) h( w_\la)^{-q} h'(w_\la) \mc M_k^\ell ~dx+ t_k \int_\Om f(x, h( w_\la)) h'(w_\la)\mc M_k^\ell ~dx\notag\\& \qquad\quad+\frac{t_k^2}{2}-\frac{\la}{1-q}\int_\Om \al(x) h( w_\la+ t_k \mc M_k^\ell)^{1-q} ~dx- \int_\Om F(x, h( w_\la+ t_k \mc M_k^\ell)) ~dx\geq \pi.\notag \end{align} Using mean value theorem and Lemma \ref{L1}-$(h_9)$, we deduce \begin{align}\label{l5} &\frac{\la}{1-q}\left[\int_\Om \al(x) h( w_\la)^{1-q} ~dx-\int_\Om \al(x) h( w_\la+ t_k \mc M_k^\ell)^{1-q} ~dx\right] +t_k{\la}\int_\Om \al(x) h( w_\la)^{-q} h'(w_\la) \mc M_k^\ell ~dx\notag\\ &=-\la t_k\left[\int_\Om \al(x) h( w_\la+ t_k\theta_k \mc M_k^\ell)^{-q} h'(w_\la+ t_k\theta_k \mc M_k^\ell) \mc M_k^\ell ~dx-\int_\Om \al(x) h( w_\la)^{-q} h'(w_\la) \mc M_k^\ell ~dx\right]\notag\\ &=-\la t_k^2\theta_k\int_\Om \al(x) {|\mc M_k^\ell|^2}\Big[-qh(w_\la+ t_k\xi_k \mc M_k^\ell)^{-q-1}h'(w_\la+ t_k\xi_k \mc M_k^\ell)\notag\\&\qquad\qquad\qquad\qquad\qquad\qquad\qquad+h(w_\la+ t_k\xi_k \mc M_k^\ell)^{-q}h''(w_\la+ t_k\xi_k \mc M_k^\ell)\Big]\notag\\ &=\la t_k^2\theta_k\int_\Om \al(x) {|\mc M_k^\ell|^2}\Big[qh(w_\la+ t_k\xi_k \mc M_k^\ell)^{-q-1}h'(w_\la+ t_k\xi_k \mc M_k^\ell)\notag\\&\qquad\qquad\qquad\qquad\qquad+2 h(w_\la+ t_k\xi_k \mc M_k^\ell)^{1-q}(h'(w_\la+ t_k\xi_k \mc M_k^\ell))^4\Big], \end{align} where $\theta_k,\xi_k\in(0,1)$. Now by Lemma \ref{L1}-$(h_3),(h_{12})$, \[2h(s)^{1-q}(h'(s))^4=2h(s)^{-1-q}(h(s)h'(s))^2(h'(s))^2\leq h(s)^{-1-q}h'(s).\] Plugging this in \eqref{l5} and again using Lemma \ref{L1}-$(h_{13}), (h_3), (h_8)$ together with the fact that \\$w_\la+ t_k\xi_k \mc M_k^\ell\geq \uline{ w_\la}>0 $ in $B_{\frac{\ell}{k}}(x_0)$, we obtain \begin{align}\label{l6} &\frac{\la}{1-q}\left[\int_\Om \al(x) h( w_\la)^{1-q} ~dx-\int_\Om \al(x) h( w_\la+ t_k \mc M_k^\ell)^{1-q} ~dx\right] +t_k{\la}\int_\Om \al(x) h( w_\la)^{-q} h'(w_\la) \mc M_k^\ell ~dx\notag\\ &\leq \la t_k^2\theta_k (q+1)\int_\Om \al(x) {|\mc M_k^\ell|^2} h(w_\la+ t_k\xi_k \mc M_k^\ell)^{-q-1}h'(w_\la+ t_k\xi_k \mc M_k^\ell) ~dx\notag\\ &\leq \la t_k^2\theta_k (q+1)\|\al\|_\infty\int_\Om {|\mc M_k^\ell|^2} h(\uline{ w_\la})^{-q-1}h'(\uline{ w_\la}) ~dx\notag\\ &\leq \la t_k^2\theta_k (q+1)\|\al\|_\infty(h(1))^{-1-q}\int_\Om{|\mc M_k^\ell|^2} \uline {w_\la}^{-q-1}~dx =t_k^2 O\left(\frac {1} {\log k}\right). \end{align} On the other hand, again using mean value theorem and Lemma \ref{L1}-$(h_9), (h_{12}),(h_3)$, we infer \begin{align}\label{l7} &t_k\int_\Om f(x, h( w_\la))h'(w_\la)\mc M_k^\ell ~dx+\int_\Om F(x,h(w_\la))~dx-\int_\Om F(x, h( w_\la+ t_k \mc M_k^\ell)) ~dx\notag\\ &=t_k\left[\int_\Om f(x, h( w_\la))h'(w_\la)\mc M_k^\ell ~dx-\int_\Om f(x, h( w_\la+t_k \tilde\theta_k\mc M_k^\ell))h'(w_\la+t_k \tilde\theta_k\mc M_k^\ell)\mc M_k^\ell ~dx\right] \notag\\ &=t_k^2\int_\Om -\tilde\theta_k |\mc M_k^\ell|^2 \Big[f'(x, h( w_\la+t_k \tilde\xi_k\mc M_k^\ell))(h'(w_\la+t_k \tilde\xi_k\mc M_k^\ell))^2\notag\\&\qquad\qquad+f(x, h( w_\la+t_k \tilde\xi_k\mc M_k^\ell))h''(w_\la+t_k \tilde\xi_k\mc M_k^\ell)\Big] ~dx\notag\\ &=t_k^2\tilde\theta_k\int_\Om |\mc M_k^\ell|^2 \bigg[-f'(x, h( w_\la+t_k \tilde\xi_k\mc M_k^\ell))(h'(w_\la+t_k \tilde\xi_k\mc M_k^\ell))^2\notag\\&\qquad\qquad\qquad\qquad\qquad+2f(x, h( w_\la+2t_k \tilde\xi_k\mc M_k^\ell))h(w_\la+t_k \tilde\xi_k\mc M_k^\ell)(h'(w_\la+t_k \tilde\xi_k\mc M_k^\ell))^4\bigg] ~dx\notag\\ &\leq t_k^2\tilde\theta_k\int_\Om |\mc M_k^\ell|^2 \bigg[-f'(x, h( w_\la+t_k \tilde\xi_k\mc M_k^\ell))(h'(w_\la+t_k \tilde\xi_k\mc M_k^\ell))^2\notag\\&\qquad\qquad\qquad\qquad\qquad+\sqrt{2}f(x, h( w_\la+2t_k \tilde\xi_k\mc M_k^\ell))h(w_\la+t_k \tilde\xi_k\mc M_k^\ell)h'(w_\la+t_k \tilde\xi_k\mc M_k^\ell)\bigg] ~dx\notag\\ &\leq t_k^2\tilde\theta_k\int_\Om |\mc M_k^\ell|^2 \bigg[(\sqrt{2}-M_0)f'(x, h( w_\la+t_k \tilde\xi_k\mc M_k^\ell))+L\bigg] h'(w_\la+t_k \tilde\xi_k\mc M_k^\ell) ~dx \;\;\;\;\qquad\qquad[\text{by \;} (f4)]\notag\\ &\leq L t_k^2\tilde\theta_k\int_\Om |\mc M_k^\ell|^2 ~dx=t_k^2 O\left(\frac{1}{\log k}\right), \end{align} where $\tilde\theta_k,\tilde\xi_k\in(0,1).$ Now gathering \eqref{l1}, \eqref{l6} and \eqref{l7}, it follows that $ \frac{t_k^2}{2} + O\left(\frac{1}{\log k}\right) t_k^2\geq\pi. $ That is, \begin{align}\label{l8} {t_k^2} \geq 2\pi- O\left(\frac{1}{\log k}\right). \end{align} In virtue of the relation $\frac{d}{dt}J_\la(w_\la+t\mc M_k^\ell)|_{t=t_k}=0,$ we have \begin{align}\label{l10} t_k^2+t_k\int_\Om \nabla w_\la \nabla \mc M_k^\ell ~dx&-{\la}\int_\Om \al(x) h( w_\la+ t_k \mc M_k^\ell)^{-q} h'( w_\la+ t_k \mc M_k^\ell) t_k \mc M_k^\ell ~dx\notag\\&\qquad\qquad\qquad= \int_\Om f(x, h( w_\la+ t_k \mc M_k^\ell)) h'( w_\la+ t_k \mc M_k^\ell) t_k \mc M_k^\ell ~dx. \end{align} Now we estimate the right hand side in \eqref{l10} as following:\\ In light of the fact that $w_\la\geq C>0$ on $B_{\frac{\ell}{k}}(x_0)$ combining with $(f1)$ and Lemma \ref{L1}-$(h_{10}), (h_4)$, we obtain \begin{align}\label{l11} &\int_\Om f(x, h( w_\la+ t_k \mc M_k^\ell)) h'( w_\la+ t_k \mc M_k^\ell) t_k \mc M_k^\ell ~dx\notag\\ &\geq \int_{B_{\frac{\ell}{k}}(x_0)} f(x, h( C+ t_k \mc M_k^\ell)) h'( C+ t_k \mc M_k^\ell) t_k \mc M_k^\ell ~dx\notag\\ &\geq \frac 12\int_{B_{\frac{\ell}{k}}(x_0)} f(x, h( C+ t_k \mc M_k^\ell)) h( C+ t_k \mc M_k^\ell) \frac{ t_k \mc M_k^\ell}{C+ t_k \mc M_k^\ell} ~dx. \end{align} By $(f7)$, for any $b>0$ there exists some constant $M_b>0$ such that \begin{align}\label{l12} f(x, h( C+ t_k \mc M_k^\ell)) h( C+ t_k \mc M_k^\ell)> b\exp\left(h( C+ t_k \mc M_k^\ell)^4\right) \text{\;\;\;\;\;\;\;\; for all } t_k>M_b. \end{align} On the other hand, by Lemma \ref{L1}-$(h_7)$, for any $\e>0$ there exists $m_\e>0$ such that \begin{align}\label{l13} h(C+ t_k \mc M_k^\ell)^4>(C+ t_k \mc M_k^\ell)^2(2-\e) \;\;\;\;\;\;\text{for all } t_k\geq m_\e. \end{align} Plugging \eqref{l12} and \eqref{l13} in \eqref{l11} and using \eqref{l8}, for $t_k>\max\{M_b,m_\e\}$, we get \begin{align}\label{l14} &\int_{B_{\frac{\ell}{k}}(x_0)} f(x, h( w_\la+ t_k \mc M_k^\ell)) h'( w_\la+ t_k \mc M_k^\ell) t_k \mc M_k^\ell ~dx\notag\\ &\geq \frac b2\int_{B_{\frac{\ell}{k}}(x_0)} \exp(h( C+ t_k \mc M_k^\ell)^4) \frac{ t_k \mc M_k^\ell}{C+ t_k \mc M_k^\ell} ~dx\notag\\ &\geq \frac b2\int_{B_{\frac{\ell}{k}}(x_0)} \exp(( C+ t_k \mc M_k^\ell)^2(2-\e)) \frac{ t_k \mc M_k^\ell}{C+ t_k \mc M_k^\ell} ~dx\notag\\ &\geq \frac b2 \frac{ t_k \mc M_k^\ell(x_0)}{C+ t_k \mc M_k^\ell(x_0)}\int_{B_{\frac{\ell}{k}}(x_0)} \exp(( C+ t_k \mc M_k^\ell)^2(2-\e)) ~dx\notag\\ &= \frac b2 \frac{ t_k \mc M_k^\ell(x_0)}{C+ t_k \mc M_k^\ell(x_0)} \exp\left(\left[C^2+ 2Ct_k\mc M_k^\ell(x_0)+t_k^2 \mc |M_k^\ell(x_0)|^2\right](2-\e)\right) | B_{\frac{\ell}{k}}(x_0)|\notag\\ &= \frac b2 \frac{ t_k \mc M_k^\ell(x_0)}{C+ t_k \mc M_k^\ell(x_0)} C_0 \exp\left(2Ct_k\mc M_k^\ell(x_0)+t_k^2 \mc |M_k^\ell(x_0)|^2\right) | B_{\frac{\ell}{k}}(x_0)|\;\;\; \text{\; as }\e\to 0^+\notag\\ &=\frac b2 \frac{1}{1+\frac {C} {t_k \mc M_k^\ell(x_0)}}C_0 \pi \ell^2 \exp\left(2Ct_k\mc M_k^\ell(x_0)+{2\log k}\left(\frac {t_k^2}{2\pi} -1\right)\right) \notag\\ &\geq \frac b 2 \frac{1}{1+\frac {C\sqrt{2\pi}} {t_k \sqrt{\log k}}}C_1 \pi \ell^2 \exp\left(2Ct_k\mc M_k^\ell(x_0)\right). \end{align} Now incorporating \eqref{l14} in \eqref{l10} and using H\"older's inequality, we get \[+\infty>C_2:=L_0^2+\|w_\la\|L_0\geq t_k^2+\|w_\la\| t_k\geq \frac b 2 \frac{1}{1+\frac {C\sqrt{2\pi}} {t_k \sqrt{\log k}}}C_1 \pi \ell^2 \exp\left(2Ct_k\mc M_k^\ell(x_0)\right).\] Since $t_k$ is bounded away from $0$, $t_k\mc M_k^\ell(x_0):=C_3(\log k)^{1/2}\to+\infty$ as $k\to+\infty$. Hence, letting $k\to+\infty$ in the last relation, it yields that \[C_2\geq \frac b 2 C_1\pi \ell^2.\] This is absurd since, $b>0$ is arbitrary. Hence, $(ii)$ follows. This completes the proof of the lemma. \end{proof} \noi Next, we recall the following result due to P. L. Lions (\cite{Lions}). \begin{theorem}\label{hi} Let $\{u_k\,:\, \|u_k\| = 1\} $ be a sequence in $H^1_0(\Om)$ converging weakly in $H^1_0(\Om)$ to a non zero function $u$. Then, for every $0<p <(1-\|u\|)^{-1}$ \[\sup_k\int_\Om \exp(4\pi pu_k^2) ~dx<+\infty.\] \end{theorem} \begin{proposition}\label{prp2} Let the conditions in Theorem \ref{thm2} hold and let $\la\in(0,\La^*)$. Suppose that $(MP)$ holds. Then \eqref{pp} admits a second solution $v_\la \in H^1_0(\Om) \cap C_{\varphi_q}^+(\Om)$ satisfying $v_\la\geq w_\la$ and $\|v_\la-w_\la\|=\sigma_1$. \end{proposition} \begin{proof} First, we define the complete metric space \[\Gamma := \{\eta \in C([0,1],T):\; \eta(0)=w_\la,\; \|\eta(1)-w_\la\|>\sigma_1,\; J_\la(\eta(1))< J_\la(w_\la) \}\] with the metric $$d(\eta,\tilde\eta)=\max\limits_{t\in[0,1]}\{\|\eta(t)-\tilde\eta(t)\|\} \text {\;\;\; for all }\eta,\tilde\eta \in \Gamma.$$ Using Lemma \ref{minimizer-gm}-$(i)$, we have $\Gamma \neq \emptyset$. Let us set \begin{align*}\gamma_0 = \inf\limits_{\eta\in \Gamma}\max\limits_{t \in [0,1]}J_\la(\eta(t)). \end{align*} Then, in light of Lemma \ref{minimizer-gm}-$(ii)$ and the condition $(MP)$, we obtain \[J_\la(w_\la)< \gamma_0 \leq J_\la(w_\la)+\pi.\] Set $\Phi(\eta):= \max\limits_{t \in [0,1]}J_\la(\eta(t))$ for $\eta \in \Gamma$. Then employing Ekeland's variational principle to the functional $\Phi$ on $\Ga$, we get a sequence $\{\eta_k\}\subset \Gamma$ such that \begin{equation*} \Phi(\eta_k)<\gamma_0+ \frac{1}{k} \;\;\text{and}\;\;\; \Phi(\eta_k){<} \Phi(\eta)+ \frac{1}{k}\|\Phi(\eta)-\Phi(\eta_k)\|_\Gamma\;\;\;\;\text {for all } \eta\in \Gamma. \end{equation*} Again, applying Ekeland's variational principle to $J_\la$ on $\Ga$ and arguing exactly similar to \cite[Lemma $3.5$]{badi}, one can show that there exists a sequence $\{v_k\}\subset T$ such that \begin{equation}\label{evp0} \left\{ \begin{array}{ll} & J_\la(v_k) \to \ga_0\;\;\;\; \text{as \;} k\to+\infty\\ & \ds \int_{\Om} \nabla v_k\nabla(w-v_k) ~dx-\la\int_\Om \al(x)h(v_k)^{-q} h'(v_k)(w-v_k) ~dx-\int_{\Om}f(x,h(v_k))h'(v_k)(w-v_k)~dx\\ &\qquad\geq -\ds\frac C k (1+\|w\|)\;\;\;\text{for all}\; w \in T. \end{array}\right. \end{equation} Now choosing $w=2v_k$ in \eqref{evp0}, we get \begin{align}\label{j1} \int_{\Om}|\nabla v_k|^2 ~dx-\la_k \int_{\Om}\al(x)h(v_k)^{-q}h'(v_k) v_k ~dx-\int_\Om f(x,h(v_k))h'(v_k)v_k~dx\geq -\frac C k (1+\|2v_k\|). \end{align} In virtue of Lemma \ref{L1}-$(h_4)$, from \eqref{j1}, we obtain \begin{align}\label{j2} \int_{\Om}|\nabla v_k|^2 ~dx-\frac \la 2 \int_{\Om}\al(x)h(v_k)^{1-q}~dx- \frac 12\int_\Om f(x,h(v_k))h(v_k)~dx\geq -\frac C k (1+\|2v_k\|). \end{align} We claim that \begin{align}\label{bd}\ds\limsup_{k\to+\infty}\|v_k\|<+\infty. \end{align} For $0<q<1$, using \eqref{evp0}, \eqref{j2}, $(f5)$, Lemma \ref{L1}-$(h_5)$ and the Sobolev embedding, as $k\to+\infty,$ it follows that \begin{align}\label{j3} \ga_0+\frac{4C}{\tau }\|v_k\|+o(1)&\geq \left(\frac 12-\frac 2\tau\right)\|v_k\|^2-\la\left(\frac{1}{1-q}-\frac 1\tau\right)\int_\Om\al(x)h(v_k)^{1-q} ~dx\notag\\&\qquad\qquad\qquad-\frac 1\tau \int_\Om [\tau F(x,h(v_k))-f(x,h(v_k))h(v_k)]~dx\\ & \geq \left(\frac 12-\frac 2\tau\right)\|v_k\|^2-\la C(q,\Om)\left(\frac{1}{1-q}-\frac 1\tau\right)\|\al\|_\infty \|v_k\|^{1-q} ~dx.\notag \end{align} Since $\tau>4$ and $2>1-q>0,$ the last relation yields that $\{v_k\}$ is bounded in $H^1_0(\Om)$ and hence, \eqref{bd} holds.\\ {Next, for $q=1$, using \eqref{j3} and following the arguments in similar way as in \eqref{logg} and \eqref{loggg}, we obtain \eqref{bd}.}\\ Lastly, for the case $1<q<3$, again using \eqref{j3} and the exact arguments in \eqref{d8} used for estimating the singular term, as $k\to+\infty$, we get \[\left(\frac 12-\frac 2\tau\right)\|v_k\|^2\leq (1+C)\|v_k\|+ \ga_0+o(1),\] which gives \eqref{bd}. Therefore, there exists a $v_\la\in H^1_0(\Om) $ such that $v_k\rightharpoonup v_\la$ weakly in $H^1_0(\Om)$ and point-wise a.e. in $\Om$ as $k\to+\infty$. Arguing similarly as in the proof of Proposition \ref{prp1}, we infer that $v_\la$ is a weak solution to \eqref{pp} and $v_\la\in H^1_0(\Om)\cap C_{\varphi_q}^+(\Om).$\\ {\bf Claim: $v_\la\not=w_\la$.}\\ In order to establish this claim, it is sufficient to prove that $v_k\to v_\la$ in $H^1_0(\Om)$ as $k\to+\infty.$ For that, we need to establish \begin{align}\label{compp} \int_\Om f(x,h(v_k)) h'(v_k) v_k ~dx\to \int_\Om f(x,h(v_\la)) h'(v_\la) v_\la ~dx \;\;\;\; \text{as } k\to+\infty. \end{align}Now borrowing the similar arguments used for showing \eqref{r2}, we have \begin{align}\label{mpsi} \int_\Om \al(x) h(v_k)^{1-q} dx \to \int_\Om \al(x) h(v_\la)^{1-q} ~dx\text{\;\;\; as } k\to+\infty. \end{align} Next, we show that \begin{align}\label{mpF} \int_\Om F(x,h(v_k)) ~dx\to \int_\Om F(x,h(v_\la)) ~dx \;\;\;\; \text{as } k\to+\infty. \end{align} Since $\{v_k\}$ is bounded in $H^1_0(\Om)$, from \eqref{j2}, it follows that\begin{align}\label{o0} \limsup_{k\to+\infty} \int_\Om f(x,h(v_k)) h'(v_k) v_k ~dx<+\infty. \end{align} Now using \eqref{o0} and Lemma \ref{L1}-$(h_8)$, for some large $N>>1$, we get \begin{align*}\int_{\Om\cap\{x\,:\,h(v_k)(x)>N\}} f(x,h(v_k)) ~dx&\leq \frac 1N \int_{\Om\cap\{x\,:\,h(v_k)(x)>N\}} f(x,h(v_k)) h(v_k) ~dx\\&\leq \frac 2N \int_{\Om\cap\{x\,:\,h(v_k)(x)>N\}} 2 f(x,h(v_k)) h'(v_k) v_k\\&=O\left(\frac 1N\right). \end{align*} This together with Lebesgue dominated convergence theorem yields \begin{align}\label{fof}\int_{\Om} f(x,h(v_k)) ~dx&=\int_{\Om\cap\{x\,:\,h(v_k)(x)\leq N\}} f(x,h(v_k)) ~dx+\int_{\Om\cap\{x\,:\,h(v_k)(x)>N\}} f(x,h(v_k)) ~dx\notag\\ &=\int_{\Om\cap\{x\,:\,h(v_k)(x)\leq N\}} f(x,h(v_k)) ~dx+O\left(\frac 1N\right)\notag\\ & \to\int_{\Om} f(x,h(v_\la)) ~dx, \end{align} as $k\to+\infty$ and $N\to+\infty$. Since by $(f6)$, $F(x,v_k)\leq M_1(1+f(x,v_k)),$ for all $ k\in\mb N$, using \eqref{fof} and Lebesgue dominated convergence theorem, \eqref{mpF} follows. Therefore, combining \eqref{mpF} and \eqref{mpsi} with the weak lower semicontinuity property of the norm, we achieve \begin{align}\label{inl} J_\la(v_\la)\leq\liminf_{k\to+\infty} J_\la (v_k). \end{align} Supposing the contrary, let us assume that $\{v_k\}$ does not converge in $H^1_0(\Om)$ strongly. Then \eqref{mpF}, \eqref{mpsi} and \eqref{inl} give that $ J_\la(v_\la)<\ga_0.$ By the hypothesis, $J_\la(w_\la)\leq J_\la(v_\la).$ So, for sufficiently small $\e>0$, by Lemma \ref{minimizer-gm}, we have \begin{align}\label{kk1} (\ga_0-J_\la(v_\la))(1+\e)<(\ga_0-J_\la(v_\la))(1+\e)\leq \left(\max_{t\in[0,1]} J(w_\la+t\mc M_k^\ell)-J_\la(w_\la)\right)(1+\e)<\pi. \end{align}Set \[\zeta_0:=\int_{\Om}\al(x)h(v_k)^{1-q}~dx+\int_\Om F(x,h(v_k))~dx.\] Then, \begin{align}\label{kk2} \lim_{k\to+\infty}\|v_k\|^2&=2\lim_{k\to 0}\left[J_\la(v_k)+\int_{\Om}\al(x)h(v_k)^{1-q}~dx+\int_\Om F(x,h(v_k))~dx\right]\notag\\ &=2(\ga_0+\zeta_0). \end{align} Taking into account \eqref{kk1} and \eqref{kk2}, we deduce \begin{align*} (1+\e)\|v_k\|^2&<\frac{2\pi (\ga_0+\zeta_0)}{\ga_0-J_\la(v_\la)}=\frac{2\pi (\ga_0+\zeta_0)}{\ga_0+\zeta_0-\frac 12\|v_\la\|^2}=2\pi\left(1-\frac 12 \left(\frac{\|v_\la\|^2}{\ga_0+\zeta_0}\right)\right)^{-1}. \end{align*} Hence, we choose $r>0$ such that $\frac {(1+\e)}{2\pi}\|v_k\|^2\leq p:= \frac{ r}{2\pi}<\left(1- {\|u_\la\|^2}\right)^{-1},$ where $u_\la:=\frac{v_\la}{(2(\ga_0+\zeta_0))^{1/2}}$. Also, note that $u_k:=\frac{v_k}{\|v_k\|}\rightharpoonup\frac{v_\la}{(2(\ga_0+\zeta_0))^{1/2}}=u_\la$ weakly in $H^1_0(\Om)$ as $k\to+\infty.$ Therefore, using Theorem \ref{hi}, for any $\e>0$, we deduce\[\ds\sup_k\int_\Om \exp\left(4\pi p u_k^2\right)~dx<+\infty.\] This together with the fact that $p>\frac{(1+\e)}{2\pi}\|v_k\|^2$ implies that \begin{align}\label{he1} \sup_k\int_\Om \exp\left(2(1+\e)v_k^2\right) ~dx<+\infty. \end{align} Now using $(f3)$, Lemma \ref{L1}-$(h_6)$ and \eqref{he1}, we get \begin{align} &\int_{\Om} f(x,h(v_k))h'(v_k)v_k~dx\notag\\&=\int_{\Om\cap\{x\,:\, v_k(x)>N>1\}} f(x,h(v_k))h'(v_k)v_k~dx+\int_{\Om\cap\{x\,:\, v_k(x)\leq N\}} f(x,h(v_k))h'(v_k)v_k~dx\notag \\&= O\left( \int_{\Om\cap\{x\,:\, v_k(x)>N\}} \exp \left(\left(1+\frac\e 2\right) h(v_k)^4\right) dx\right)+\int_{\Om\cap\{x\,:\, v_k(x)\leq N\}} f(x,h(v_k))h'(v_k)v_k~dx\notag\\ &= O\left(\int_{\Om\cap \{x\,:\, v_k(x)>N\}} \exp \left(2\left(1+\frac\e2\right) v_k^2\right)~dx\right)+\int_{\Om\cap\{x\,:\, v_k(x)\leq N\}} f(x,h(v_k))h'(v_k)v_k~dx\notag\\ &=O\left(\exp\left(-\e N^2\right) \int_{\Om\cap \{x\,:\, v_k(x)>N\}} \exp \left(2(1+\e) v_k^2\right) ~dx\right)+\int_{\Om\cap\{x\,:\, v_k(x)\leq N\}} f(x,h(v_k))h'(v_k)v_k~dx\notag\\ & =O\left(\exp(-\e N^2)\right) +\int_{\Om\cap\{x\,:\, v_k(x)\leq N\}} f(x,h(v_k))h'(v_k)v_k~dx\notag\\&\to\int_\Om f(x,h(v_k))h'(v_k)v_k ~dx, \text{ \; as } k\to+\infty \text{ and } N\to+\infty,\nonumber \end{align} thanks to Lebesgue dominated convergence theorem. Thus, we achieve \eqref{compp}. Hence, taking into account \eqref{mpsi} and \eqref{compp} and arguing as in the proof of Proposition \ref{prp1}, we can infer that $v_k\to v_k$ strongly in $H^1_0(\Om)$ as $k\to+\infty$ and $v_\la\not=w_\la$. Hence, the claim is verified. Thus, the proof of the proposition follows. \end{proof} \noi {\bf Proof of Theorem \ref{thm2}:} From Proposition \ref{prp2}, \ref{prp2}, it follows that $v_\la\in H_0^1(\Om)\cap C^+_{\varphi_q}(\Omega)$ is a weak solution to \eqref{pp}. Moreover, $v_\la\not=w_\la$, where $w_\la$ is another weak solution to \eqref{pp}. Now by Lemma \ref{L1}-$(h_1)$, we have $h$ is a $C^\infty$ function and Lemma \ref{L1}-$(h_8), (h_{11})$ ensure that $h(s)$ behaves like $s$ when $s$ is close to $0$. Therefore, $h(v_\la) \in H_0^1(\Om)\cap C^+_{\varphi_q}(\Omega)$ forms a weak solution to the problem \eqref{pq} and $h(v_\la)\not=h(w_\la)$, where $h(w_\la)$ is another solution to the problem \eqref{pq} obtained in Theorem \ref{thm1}. This concludes the proof of Theorem \ref{thm2}. \\ \begin{remark} Consider the purely singular problem \begin{equation} \label{pq1} -\Delta u -\Delta (u^{2})u=\la \al(x) u^{-q} \; \text{in}\; \Om,\;\; u> 0~\mbox{in}~ \Om,\;\; u=0 ~\mbox{on}~ \partial\Om, \end{equation} where $\Om$ is a smooth bounded domain in $\mathbb R^2,\;$ $0<q<3$ and $\al:\Om\to (0,+\infty)$ is a positive valued function such that $\al\in L^\infty(\Om)$. Then using the transformation $u=h(w)$, where $h$ is defined in \eqref{g}, we get the associated transformed problem \begin{equation} \label{pq2} -\Delta w =\la \al(x) h(w)^{-q}h'(w) \; \text{in}\; \Om,\;\; w> 0~\mbox{in}~ \Om,\;\; w=0 ~\mbox{on}~ \partial\Om. \end{equation} It can be checked that $w$ is a solution to \eqref{pq2} if and only if $h(w)$ is a solution to \eqref{pq1}. Now $\la \al(x) h(w)^{-q}h'(w)$ verifies the hypotheses of Proposition 4.1 in \cite{adijg}. Hence, using \cite[Proposition 4.1]{adijg} (also by \cite{crandal }), we can infer that there exists a unique solution to \eqref{pq2}, say $\hat w_\la$, such that $\hat w_\la\in H^1_0(\Om)\cap C_{\varphi_q}^+(\Om)$. Therefore, instead of using $\uline{w_\la}:=c(\la)\varphi_{1,\Om}$ as a sub-solution to \eqref{pp}, similar to \cite{adijg}, we can make use of $\hat w_\la$ as a sub-solution to \eqref{pq2} and argue in a similar fashion as discussed above to prove Theorem \ref{thm1}, \ref{thm2}. \end{remark}
\section{Introduction}\vspace{-3pt} Deep generative models are a class of deep learning algorithms aimed at estimating and sampling from an unknown data distribution. The recent influx of amazing advances in generative modeling, {e.g.}, for image generation \citet{ramesh2022hierarchical,rombach2022high}, is mostly facilitated by the scalable and relatively stable training of diffusion-based models \citet{ho2020denoising,song2020score}. However, the restriction to simple diffusion processes leads to a rather confined space of sampling probability paths, resulting in very long training times and the need to adopt specialized methods~({e.g.}, \citet{song2020denoising,zhang2022fast}) for efficient sampling. In this work we consider the general and deterministic framework of Continuous Normalizing Flows (CNFs; \citet{chen2018neural}). CNFs are capable of modeling arbitrary probability path \begin{wrapfigure}[19]{r}{0.45\textwidth} \vspace{-17pt} \begin{center} \includegraphics[width=0.44\textwidth]{figures/imagenet128/imagenet128_curated_.png} \end{center} \vspace{-1em} \caption{Unconditional ImageNet-128 samples of a CNF trained using Flow Matching with Optimal Transport probability paths.} \label{fig:teaser_256} \end{wrapfigure} and are in particular known to encompass the probability paths modeled by diffusion processes \citep{song2021maximum}. However, aside from diffusion that can be trained efficiently via, {e.g.}, denoising score matching~\citep{vincent2011connection}, no scalable CNF training algorithms are known. Indeed, maximum likelihood training ({e.g.}, \citet{ffjord2018}) require expensive numerical ODE simulations, while existing simulation-free methods either involve intractable integrals \citep{rozen2021moser} or biased gradients \citep{ben2022matching}. The goal of this work is to propose Flow Matching (FM), an efficient simulation-free approach to training CNF models, allowing the adoption of general probability paths to supervise CNF training. Importantly, FM breaks the barriers for scalable CNF training beyond diffusion, and sidesteps the need to reason about diffusion processes to directly work with probability paths. In particular, we propose the Flow Matching objective (Section \ref{sec:flow_matching}), a simple and intuitive training objective to regress onto a target vector field that generates a desired probability path. We first show that we can construct such target vector fields through per-example ({i.e.}, conditional) formulations. Then, inspired by denoising score matching, we show that a per-example training objective, termed Conditional Flow Matching (CFM), provides equivalent gradients and does not require explicit knowledge of the intractable target vector field. Furthermore, we discuss a general family of per-example probability paths (Section \ref{sec:cond_paths}) that can be used for Flow Matching, which subsumes existing diffusion paths as special instances. Even on diffusion paths, we find that using FM provides more robust and stable training, and achieves superior performance compared to score matching. Furthermore, this family of probability paths also includes a particularly interesting case: the vector field that corresponds to an Optimal Transport (OT) displacement interpolant \citep{mccann1997convexity}. We find that conditional OT paths are simpler than diffusion paths, forming straight line trajectories whereas diffusion paths result in curved paths. These properties seem to empirically translate to faster training, faster generation, and better performance. We empirically validate Flow Matching and the construction via Optimal Transport paths on ImageNet, a large and highly diverse image dataset. We find that we can easily train models to achieve state-of-the-art performance in both likelihood estimation and sample quality amongst competing generative models, through only deterministic simulations. Furthermore, we find that our models produce better trade-offs between computational cost and sample quality compared to prior methods. Figure \ref{fig:teaser_256} depicts selected unconditional ImageNet 128$\times$128 samples from our model. \section{Preliminaries: Continuous Normalizing Flows} \label{s:prelim} Let $\mathbb R^d$ denote the data space with data points $x=(x^1,\ldots,x^d) \in \mathbb R^d$. Two important objects we use in this paper are: the \emph{probability density path} $p:[0,1]\times \mathbb R^d \rightarrow \mathbb R_{>0}$, which is a time dependent\footnote{We use subscript to denote the time parameter, {e.g.}, $p_t(x)$.} probability density function, {i.e.}, $\int p_t(x)dx = 1$, and a \emph{time-dependent vector field}, $v:[0,1]\times \mathbb R^d \rightarrow \mathbb R^d$. A vector field $v_t$ can be used to construct a time-dependent diffeomorphic map, called a \emph{flow}, $\phi:[0,1]\times \mathbb R^d \rightarrow \mathbb R^d$, defined via the ordinary differential equation (ODE): \begin{align}\label{e:ode} \frac{d}{dt}\phi_t(x) &= v_t(\phi_t(x)) \\ \phi_0(x) &= x \end{align} Previously, \cite{chen2018neural} suggested modeling the vector field $v_t$ with a neural network, $v_t(x;\theta)$, where $\theta\in \mathbb R^p$ are its learnable parameters, which in turn leads to a deep parametric model of the flow $\phi_t$, called a \emph{Continuous Normalizing Flow} (CNF). A CNF is used to reshape a simple prior density $p_0$ ({e.g.}, pure noise) to a more complicated one, $p_1$, via the push-forward equation \begin{equation}\label{e:push_forward} p_t = [\phi_t]_* p_0 \end{equation} where the push-forward (or change of variables) operator $*$ is defined by \begin{equation}\label{e:push_forward_explicit} [\phi_t]_* p_0(x) = p_0(\phi_t^{-1}(x))\det \brac{ \frac{\partial \phi_t^{-1}}{\partial x}(x)}. \end{equation} A vector field $v_t$ is said to \emph{generate} a probability density path $p_t$ if its flow $\phi_t$ satisfies \eqref{e:push_forward}. One practical way to test if a vector field generates a probability path is using the continuity equation, which is a key component in our proofs, see Appendix \ref{A:continuity_equation}. We recap more information on CNFs, in particular how to compute the probability $p_1(x)$ at an arbitrary point $x\in\mathbb R^d$ in Appendix \ref{A:cnf_prob}. \section{Flow Matching}\label{sec:flow_matching} Let $x_1$ denote a random variable distributed according to some unknown data distribution $q(x_1)$. We assume we only have access to data samples from $q(x_1)$ but have no access to the density function itself. Furthermore, we let $p_t$ be a probability path such that $p_0$ is a simple distribution, {e.g.}, the standard normal distribution $p_0(x) = {\mathcal{N}}(x | 0, I)$, and let $p_1$ be approximately equal in distribution to $q$. We will later discuss how to construct such a path. The Flow Matching objective is then designed to match this target probability path, which will allow us to flow from $p_0$ to $p_1$% . Given a target probability density path $p_t(x)$ and a corresponding vector field $u_t(x)$, which generates $p_t(x)$, we define the Flow Matching (FM) objective as \begin{equation}\label{e:fm} \mathcal{L}_{\scriptscriptstyle \text{FM} }(\theta) = \mathbb{E}_{t,p_t(x)}\| v_t(x)-u_t(x) \|^2, \end{equation} where $\theta$ denotes the learnable parameters of the CNF vector field $v_t$ (as defined in Section \ref{s:prelim}), $t\sim {\mathcal{U}}[0,1]$ (uniform distribution), and $x\sim p_t(x)$. Simply put, the FM loss regresses the vector field $u_t$ with a neural network $v_t$. Upon reaching zero loss, the learned CNF model will generate $p_t(x)$. Flow Matching is a simple and attractive objective, but na\"ively on its own, it is intractable to use in practice since we have no prior knowledge for what an appropriate $p_t$ and $u_t$ are. There are many choices of probability paths that can satisfy $p_1(x) \approx q(x)$, and more importantly, we generally don't have access to a closed form $u_t$ that generates the desired $p_t$. In this section, we show that we can construct both $p_t$ and $u_t$ using probability paths and vector fields that are only defined \emph{per sample}, and an appropriate method of aggregation provides the desired $p_t$ and $u_t$. Furthermore, this construction allows us to create a much more tractable objective for Flow Matching. \subsection{Constructing $p_t,u_t$ from conditional probability paths and vector fields} A simple way to construct a target probability path is via a mixture of simpler probability paths: Given a particular data sample $x_1$ we denote by $p_t(x\vert x_1)$ a \emph{conditional probability path} such that it satisfies $p_0(x|x_1) = p_0(x)$ at time $t=0$, and we design $p_1(x|x_1)$ at $t=1$ to be a distribution concentrated around $x=x_1$, {e.g.}, $p_1(x|x_1)={\mathcal{N}}(x|x_1,\sigma^2 I)$, a normal distribution with $x_1$ mean and a sufficiently small standard deviation $\sigma > 0$. Marginalizing the conditional probability paths over $q(x_1)$ give rise to \emph{the marginal\@\xspace probability path} \begin{equation}\label{e:p_t} p_t(x)=\int p_t(x|x_1)q(x_1)dx_1, \end{equation} where in particular at time $t=1$, the marginal\@\xspace probability $p_1$ is a mixture distribution that closely approximates the data distribution $q$, \begin{equation}\label{e:p_1} p_1(x)=\int p_1(x|x_1)q(x_1)dx_1\approx q(x). \end{equation} Interestingly, we can also define a \emph{marginal\@\xspace vector field}, by ``marginalizing'' over the conditional vector fields in the following sense (we assume $p_t(x)>0$ for all $t$ and $x$): \begin{equation}\label{e:u_t} u_t(x) = \int u_t(x\vert x_1) \frac{p_t(x\vert x_1)q(x_1)}{p_t(x)}dx_1, \end{equation} where $u_t(\cdot|x_1):\mathbb R^d\rightarrow\mathbb R^d$ is a conditional vector field that generates $p_t(\cdot\vert x_1)$. It may not seem apparent, but this way of aggregating the conditional vector fields actually results in the correct vector field for modeling the marginal probability path. Our first key observation is this: \vspace{-0.5em} \begin{center} \colorbox{mygray} { \begin{minipage}{0.977\linewidth} \centering \emph{The marginal vector field (\eqref{e:u_t}) generates the marginal probability path (\eqref{e:p_t}).} \end{minipage}} \end{center} This provides a surprising connection between the conditional VFs (those that generate conditional probability paths) and the marginal VF (those that generate the marginal probability path). This connection allows us to break down the unknown and intractable marginal VF into simpler conditional VFs, which are much simpler to define as these only depend on a single data sample. We formalize this in the following theorem. \begin{restatable}{theorem}{marginalvf}\label{thm:marginal_vf} Given vector fields $u_t(x|x_1)$ that generate conditional probability paths $p_t(x|x_1)$, for any distribution $q(x_1)$, the marginal vector field $u_t$ in \eqref{e:u_t} generates the marginal probability path $p_t$ in \eqref{e:p_t}, {i.e.}, $u_t$ and $p_t$ satisfy the continuity equation (equation \ref{e:continuity}). \end{restatable} The full proofs for our theorems are all provided in Appendix \ref{A:proofs}. \pagebreak \subsection{Conditional Flow Matching} Unfortunately, due to the intractable integrals in the definitions of the marginal probability path and VF (equations \ref{e:p_t} and \ref{e:u_t}), it is still intractable to compute $u_t$, and consequently, intractable to na\"ively compute an unbiased estimator of the original Flow Matching objective. Instead, we propose a simpler objective, which surprisingly will result in the same optima as the original objective. Specifically, we consider the \emph{Conditional Flow Matching} (CFM) objective, \begin{equation}\label{e:cfm} \mathcal{L}_{\scriptscriptstyle \text{CFM}}(\theta) = \mathbb{E}_{t,q(x_1),p_t(x\vert x_1)} \big\| v_t(x) - u_t(x\vert x_1) \big\|^2, \end{equation} where $t\sim {\mathcal{U}}[0,1]$, $x_1\sim q(x_1)$, and now $x\sim p_t(x|x_1)$. Unlike the FM objective, the CFM objective allows us to easily sample unbiased estimates as long as we can efficiently sample from $p_t(x|x_1)$ and compute $u_t(x|x_1)$, both of which can be easily done as they are defined on a per-sample basis. Our second key observation is therefore: \vspace{-0.5em} \begin{center} \colorbox{mygray} { \begin{minipage}{0.977\linewidth} \centering \emph{The FM (\eqref{e:fm}) and CFM (\eqref{e:cfm}) objectives have identical gradients w.r.t.~$\theta$.} \end{minipage}} \end{center} That is, optimizing the CFM objective is equivalent (in expectation) to optimizing the FM objective. Consequently, this allows us to train a CNF to generate the marginal probability path $p_t$---which in particular, approximates the unknown data distribution $q$ at $t$=$1$--- without ever needing access to either the marginal probability path or the marginal vector field. We simply need to design suitable \emph{conditional} probability paths and vector fields. We formalize this property in the following theorem. \begin{restatable}{theorem}{cfm}\label{thm:grad_VR_equals_CVR} Assuming that $p_t(x)>0$ for all $x\in\mathbb R^d$ and $t\in [0,1]$, then, up to a constant independent of $\theta$, ${\mathcal{L}}_{\scriptscriptstyle \text{CFM}}$ and ${\mathcal{L}}_{\scriptscriptstyle \text{FM}}$ are equal. Hence, \begin{equation} \nabla_\theta \mathcal{L}_{\scriptscriptstyle \text{FM}}(\theta) = \nabla_\theta \mathcal{L}_{\scriptscriptstyle \text{CFM}}(\theta). \end{equation} \end{restatable} \section{Conditional Probability Paths and Vector Fields} \label{sec:cond_paths} The Conditional Flow Matching objective works with any choice of conditional probability path and conditional vector fields. In this section, we discuss the construction of $p_t(x \vert x_1)$ and $u_t(x \vert x_1)$ for a general family of Gaussian conditional probability paths. Namely, we consider conditional probability paths of the form \begin{equation}\label{e:pt_gau} p_t(x\vert x_1) = {\mathcal{N}}(x\, \vert\, \mu_t(x_1), \sigma_t(x_1)^2 I ), \end{equation} where $\mu:[0,1]\times \mathbb R^d\rightarrow \mathbb R^d$ is the time-dependent mean of the Gaussian distribution, while $\sigma:[0,1]\times\mathbb R\rightarrow \mathbb R_{>0}$ describes a time-dependent scalar standard deviation (std). We set $\mu_0(x_1) = 0$ and $\sigma_0(x_1) = 1$, so that all conditional probability paths converge to the same standard Gaussian noise distribution at $t=0$. We then set $\mu_1(x_1)=x_1$ and $\sigma_1(x_1)=\sigma_\text{min}$, which is set sufficiently small so that $p_1(x \vert x_1)$ is a highly concentrated Gaussian distribution centered at $x_1$. There is potentially an infinite number of vector fields that generate any particular probability path, but the vast majority of these is due to the presence of components that leave the underlying distribution invariant---for instance, rotational components when the distribution is rotation-invariant---leading to unnecessary extra compute. We decide to use the simplest vector field corresponding to a canonical transformation for Gaussian distributions. Specifically, consider the flow \begin{equation}\label{e:phi_t_gau} \psi_t(x) = \sigma_t(x_1)x + \mu_t(x_1). \end{equation} When $x$ is distributed as a standard Gaussian, $\psi_t(x)$ is the affine transformation that maps to a normally-distributed random variable with mean $\mu_t(x_1)$ and std $\sigma_t(x_1)$. That is to say, according to equation \ref{e:push_forward_explicit}, $\psi_t$ pushes the noise distribution $p_0(x \vert x_1)$ to $p_t(x\vert x_1)$, {i.e.}, \begin{equation} \brac{\psi_t}_*p_0(\cdot \vert x_1) = p_t(\cdot\vert x_1). \end{equation} This flow then provides a vector field that generates the conditional probability path: \begin{equation} \frac{d}{dt}\psi_t(x) = u_t(\psi_t(x)\vert x_1). \end{equation} Since $\psi_t$ is a simple (invertible) affine map we can use this equation to solve for $u_t$ in a closed form. Let $f'$ denote the derivative with respect to time, {i.e.}, $f' = \frac{d}{dt}f$, for a time-dependent function $f$. \begin{restatable}{theorem}{condvf}\label{thm:cond_vf} Let $p_t(x\vert x_1)$ be a Gaussian probability path as in \eqref{e:pt_gau}, and $\psi_t$ its corresponding flow map as in \eqref{e:phi_t_gau}. Then, the unique vector field that defines $\psi_t$ has the form: \begin{equation}\label{e:u_t_cond_x1} u_t(x\vert x_1) = \frac{\sigma'_t(x_1)}{\sigma_t(x_1)}\parr{x-\mu_t(x_1)} + \mu'_t(x_1). \end{equation} Consequently, $u_t(x\vert x_1)$ generates the Gaussian path $p_t(x\vert x_1)$. \end{restatable} \subsection{Special instances of Gaussian conditional probability paths}\label{ss:instances} Our formulation is fully general for arbitrary (differentiable) functions $\mu_t(x_1)$ and $\sigma_t(x_1)$, and we can set them to any reasonable function. We first discuss the special cases that recover probability paths corresponding to previously-used diffusion processes. Since we directly work with probability paths, we can simply depart from reasoning about diffusion processes altogether. Therefore, in the second example below, we directly formulate a probability path based on the Wasserstein-2 optimal transport solution as an interesting instance. \paragraph{Example I: Diffusion conditional VFs} Diffusion models start with data points and gradually add noise until it approximates pure noise. These can be formulated as stochastic processes, which have strict requirements in order to obtain closed form representation at arbitrary times $t$, resulting in Gaussian conditional probability paths $p_t(x\vert x_1)$ with specific choices of mean $\mu_t(x_1)$ and std $\sigma_t(x_1)$ \citep{sohl2015deep, ho2020denoising,song2020score}. For example, the reversed (noise$\rightarrow$data) Variance Exploding (VE) path has the form \begin{equation}\label{e:VE} p_t(x) = {\mathcal{N}}(x | x_1 , \sigma_{1-t}^2 I ), \end{equation} where $\sigma_t$ is an increasing function, $\sigma_0=0$, and $\sigma_1 \gg 1$. Next, \eqref{e:VE} provides the choices of $\mu_t(x_1)= x_1$ and $\sigma_t(x_1)= \sigma_{1-t}$. Plugging these into \eqref{e:u_t_cond_x1} of Theorem \ref{thm:cond_vf} we get \begin{equation}\label{e:u_t_VE} u_t(x|x_1) = -\frac{\sigma'_{1-t}}{\sigma_{1-t}}(x-x_1). \end{equation} The reversed (noise$\rightarrow$data) Variance Preserving (VP) diffusion path has the form \begin{equation}\label{e:VP_diffusion_path} p_t(x\vert x_1) = {\mathcal{N}}(x\, \vert \, \alpha_{1-t} x_1 , \parr{1-\alpha_{1-t}^2}I), \text{where } \alpha_t = e^{-\frac{1}{2}T(t)}, T(t)=\int_0^{t} \beta(s)ds, \end{equation} and $\beta$ is the noise scale function. Equation \ref{e:VP_diffusion_path} provides the choices of $\mu_t(x_1)=\alpha_{1-t} x_1$ and $\sigma_t(x_1)=\sqrt{1-\alpha_{1-t}^2}$. Plugging these into \eqref{e:u_t_cond_x1} of Theorem \ref{thm:cond_vf} we get \begin{equation}\label{e:ut_dif_with_our_method} u_t(x\vert x_1) = \frac{\alpha'_{1-t}}{1-\alpha^2_{1-t}} \parr{\alpha_{1-t}x-x_1} = -\frac{T'(1-t)}{2}\brac{ \frac{e^{-T(1-t)}x - e^{-\frac{1}{2}T(1-t)}x_1}{1-e^{-T(1-t)}}}. \end{equation} Our construction of $u_t(x|x_1)$ does in fact coincide with the vector field previously used in the deterministic probability flow (\cite{song2020score}, equation 13) for these conditional diffusion processes; see details in Appendix \ref{A:diff_cond_VP}. Nevertheless, combining our method of marginalizing the conditional vector fields with the Flow Matching objective offers an attractive training alternative---which we find to be more stable and robust in our experiments---to existing score matching approaches. Another important observation is that, as these probability paths were previously derived as solutions of diffusion processes, they do not actually reach a true noise distribution in finite time. In practice, $p_0(x)$ is simply approximated by a suitable Gaussian distribution for sampling and likelihood evaluation. Instead, our construction provides full control over the probability path, and we can just directly set $\mu_t$ and $\sigma_t$, as we will do next. \begin{figure} \centering \begin{subfigure}[t]{0.0989\linewidth} \includegraphics[width=\linewidth]{figures/plots/2d_vf_reference.png} \end{subfigure} \hfill \begin{subfigure}[t]{0.42\linewidth} \centering \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_score_dif_0.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=0.0$}} \end{subfigure} \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_score_dif_1.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=\nicefrac{1}{3}$}} \end{subfigure} \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_score_dif_2.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=\nicefrac{2}{3}$}} \end{subfigure} \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_score_dif_3.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=1.0$}} \end{subfigure} \vspace{-5pt} \caption*{Diffusion path -- conditional score function} \end{subfigure} \hfill \begin{subfigure}[t]{0.43\linewidth} \centering \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_flow_match_ot_0.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=0.0$}} \end{subfigure} \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_flow_match_ot_1.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=\nicefrac{1}{3}$}} \end{subfigure} \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_flow_match_ot_2.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=\nicefrac{2}{3}$}} \end{subfigure} \begin{subfigure}[t]{0.23\linewidth} \centering \includegraphics[width=\linewidth]{figures/plots/2d_vf_flow_match_ot_3.pdf} \vspace{-1.5em} \caption*{\scalebox{0.8}{$t=1.0$}} \end{subfigure}\vspace{-5pt} \caption*{OT path -- conditional vector field} \end{subfigure}\vspace{-5pt} \caption{Compared to the diffusion path's conditional score function, the OT path's conditional vector field has constant direction in time and is arguably simpler to fit with a parametric model. Note the blue color denotes larger magnitude while red color denotes smaller magnitude.\vspace{-5pt}} \label{fig:2d_fv} \end{figure} \paragraph{Example II: Optimal Transport conditional VFs} A more natural choice for conditional probability paths is to define the mean and the std to simply change linearly in time, {i.e.}, \begin{equation} \mu_t(x) = tx_1, \text{ and } \sigma_t(x) = 1-(1-\sigma_{\text{min}})t. \end{equation} According to Theorem \ref{thm:cond_vf} this path is generated by the VF \begin{equation}\label{e:ut_ot} u_t(x|x_1)= \frac{x_1-(1-\sigma_{\text{min}})x}{1-(1-\sigma_{\text{min}})t}, \end{equation} which, in contrast to the diffusion conditional VF (\eqref{e:ut_dif_with_our_method}), is defined for all $t\in[0,1]$. Allowing the mean and std to change linearly not only leads to simple and intuitive paths, but it is actually also optimal in a certain sense. Consider the conditional flow that corresponds to $u_t(x|x_1)$, \begin{equation}\label{e:phi_t_ot} \psi_t(x) = (1-(1-\sigma_{\text{min}})t)x + tx_1. \end{equation} This is in fact the Optimal Transport (OT) \emph{displacement map} between the two Gaussians $p_0(x|x_1)$ and $p_1(x|x_1)$. The OT \emph{interpolant}, which is a probability path, is defined to be (see Definition 1.1 in \cite{mccann1997convexity}): \begin{equation} p_t = [(1-t)\mathrm{id} + t\psi]_\star p_0 \end{equation} where $\psi:\mathbb R^d\rightarrow\mathbb R^d$ is the OT map pushing $p_0$ to $p_1$, $\mathrm{id}$ denotes the identity map, {i.e.}, $\mathrm{id}(x)=x$, and $(1-t)\mathrm{id} + t\psi$ is called the OT displacement map. Example 1.7 in \cite{mccann1997convexity} shows, that in our case of two Gaussians where the first is a standard one, the OT displacement map takes the form of \eqref{e:phi_t_ot}. \begin{wrapfigure}[8]{r}{0.30\textwidth} \vspace{-17pt} \begin{center} \begin{tabular}{cc} \includegraphics[width=0.13\textwidth]{figures/2d_traj/2d_traj_diff.png} & \includegraphics[width=0.13\textwidth]{figures/2d_traj/2d_traj_ot.png}\vspace{-5pt} \\ {\scriptsize Diffusion} & {\scriptsize OT} \vspace{-10pt} \end{tabular} \end{center} \caption{Diffusion and OT trajectories. }\label{fig:trajectories} \end{wrapfigure} Intuitively, particles under the OT displacement map always move in straight line trajectories and with constant speed. Figure \ref{fig:trajectories} depicts sampling paths for the diffusion and OT conditional VFs. Interestingly, we find that sampling trajectory from diffusion paths can ``overshoot'' the final sample, resulting in unnecessary backtracking, whilst the OT paths are guaranteed to stay straight. Figure \ref{fig:2d_fv} compares the diffusion conditional score function (the regression target in a typical diffusion methods), {i.e.}, $\nabla \log p_t(x|x_1)$ with $p_t$ defined as in \eqref{e:VP_diffusion_path}, with the OT conditional VF (\eqref{e:ut_ot}). The start ($p_0$) and end ($p_1$) Gaussians are identical in both examples. An interesting observation is that the OT VF has a constant direction in time, which arguably leads to a simpler regression task. This property can also be verified directly from \eqref{e:ut_ot} as the VF can be written in the form $u_t(x|x_1)=g(t)h(x|x_1)$. Figure \ref{fig:2d_diff_fv} in the Appendix shows a visualization of the Diffusion VF. Lastly, we note that although the conditional flow is optimal, this by no means imply that the marginal VF is an optimal transport solution. Nevertheless, we expect the marginal vector field to remain relatively simple. \section{Related Work} Continuous Normalizing Flows were introduced in \citep{chen2018neural} as a continuous-time version of Normalizing Flows (see {e.g.}, \citet{kobyzev2020normalizing,papamakarios2021normalizing} for an overview). Originally, CNFs are trained with the maximum likelihood objective, but this involves expensive ODE simulations for the forward and backward propagation, resulting in high time complexity due to the sequential nature of ODE simulations. Although some works demonstrated the capability of CNF generative models for image synthesis \citep{ffjord2018}, scaling up to very high dimensional images is inherently difficult. A number of works attempted to regularize the ODE to be easier to solve, {e.g.}, using augmentation~\citep{dupont2019aug}, adding regularization terms~\citep{yang2019potential,finlay2020how,onken2021ot-flow,tong2020trajectorynet,kelly2020learning}, or stochastically sampling the integration interval \citep{du2022toflow}. These works merely aim to regularize the ODE but do not change the fundamental training algorithm. In order to speed up CNF training, some works have developed simulation-free CNF training frameworks by explicitly designing the target probability path and the dynamics. For instance, \citet{rozen2021moser} consider a linear interpolation between the prior and the target density but involves integrals that were difficult to estimate in high dimensions, while \citet{ben2022matching} consider general probability paths similar to this work but suffers from biased gradients in the stochastic minibatch regime. In contrast, the Flow Matching framework allows simulation-free training with unbiased gradients and readily scales to very high dimensions. Another approach to simulation-free training relies on the construction of a diffusion process to indirectly define the target probability path~\citep{sohl2015deep,ho2020denoising,song2019score}. \citet{song2020score} shows that diffusion models are trained using denoising score matching~\citep{vincent2011connection}, a conditional objective that provides unbiased gradients with respect to the score matching objective. Conditional Flow Matching draws inspiration from this result, but generalizes to matching vector fields. Due to the ease of scalability, diffusion models have received increased attention, producing a variety of improvements such as loss-rescaling~\citep{song2021maximum}, learning the noise schedule~\citep{nichol2021improved,kingma2021vdm}, and adding classifier guidance along with architectural improvements~\citep{dhariwal2021diffusion}. While existing works make use of a connection between diffusion processes and continuous normalizing flows with the same probability path~\citep{maoutsa2020interacting,song2020score,song2021maximum}, we find that it is possible to completely sidestep the diffusion process construction and reason directly with probability paths. This allows us to generalize beyond the class of probability paths modeled by simple diffusion. \section{Experiments} We explore the empirical benefits of using Flow Matching, especially when compared to prior methods for training continuous-time generative models, such as maximum likelihood and score matching. We also ablate the choice of diffusion paths, particularly between the standard variance preserving diffusion path and the optimal transport path. We experiment with 2D (checkerboard pattern) and image datasets such as CIFAR-10 \citep{krizhevsky2009learning} and ImageNet at resolutions 32, 64, 128, and 256~\citep{chrabaszcz2017downsampled,deng2009-imagenet}. Finally, we discuss how sample generation is improved by directly parameterizing the generating vector field and using the Flow Matching objective. Unless otherwise specified, we evaluate likelihood and samples from the model using \texttt{dopri5} \citep{dormand1980family} at absolute and relative tolerances of 1e-5. Generated samples can be found in the Appendix, and all implementation details are in Appendix \ref{A:implementation-details}.\vspace{-5pt} \subsection{Density Modeling and Sample Quality on ImageNet}\vspace{-5pt} \begin{table}\centering {\textnormal{a}}{1.05} \setlength{\tabcolsep}{6.0pt} \resizebox{0.95\linewidth}{!}{% \begin{tabular}{@{} l R{3.5em} R{3.5em} r R{3.5em} R{3.5em} r R{3.5em} R{3.5em} r @{}}\toprule & \multicolumn{2}{c}{\bf CIFAR-10} & & \multicolumn{2}{c}{\bf ImageNet 32$\times$32} & & \multicolumn{2}{c}{\bf ImageNet 64$\times$64} \\ \cmidrule(lr){2-3} \cmidrule(lr){5-6} \cmidrule(lr){8-9} Model & {NLL$\downarrow$} & {FID$\downarrow$} & & {NLL$\downarrow$} & {FID$\downarrow$} & & {NLL$\downarrow$} & {FID$\downarrow$} \\ \cmidrule(r){1-1}\cmidrule(lr){2-3} \cmidrule(lr){5-6} \cmidrule(lr){8-9} \textit{\small Normalizing Flow}\\ \;\; FFJORD~{\tiny\citep{ffjord2018}} & 3.40 & & & & & & & \\ \;\; Glow~{\tiny\citep{kingma2018glow}} & 3.35 & & & 4.09 & & & 3.81 & \\ \;\; Residual Flow~{\tiny\citep{chen2019residual}} & 3.28 & & & 4.01 & & & 3.76 & \\ \;\; Flow++~{\tiny\citep{ho2019flowpp}} & 3.09 & & & 3.86 & & & 3.69 & \\ \textit{\small Variational Autoencoder}\\ \;\; NVAE~{\tiny\citep{vahdat2020nvae}} & 2.91 & & & 3.92 & & & & \\ \;\; Very Deep VAE~{\tiny\citep{child2020very}} & 2.87 & & & 3.80 & & & 3.52 & \\ \textit{\small Diffusion Model}\\ \;\; DDPM~{\tiny\citep{ho2020denoising}} & 3.75 & 3.17 & & & & & & \\ \;\; VDM~{\tiny\citep{kingma2021vdm}} & \textbf{2.65} & 7.41 & & 3.72 & & & 3.40 & \\ \;\; Score SDE~{\tiny\citep{song2020score}} & 2.99 & \textbf{2.92} & & & & & & \\ \;\; Soft Truncation~{\tiny\citep{kim2022soft}} & 2.88 & 3.45 & & 3.85 & 8.42 & & & \\ \;\; ScoreFlow~{\tiny\citep{song2021maximum}} & 2.81 & 5.40 & & 3.76 & 10.18 & & & \\ \textit{\small Ablation}\\ \;\; Score Matching \textsuperscript{w}/ Diffusion path & 3.16 & 21.96 & & 3.57 & 22.38 & & 3.40 & 19.61 \\ \cmidrule(r){1-1}\cmidrule(lr){2-3} \cmidrule(lr){5-6} \cmidrule(lr){8-9} \textit{\small Ours}\\ \;\; Flow Matching \textsuperscript{w}/ Diffusion path & 3.10 & 10.31 & & 3.56 & 8.02 & & 3.33 & 16.06 \\ \;\; Flow Matching \textsuperscript{w}/ OT path & 3.00 & 6.96 & & \textbf{3.53} & \textbf{5.25} & & \textbf{3.31} & \textbf{14.00} \\ \bottomrule \end{tabular} } \caption{Likelihood and quality of generated samples. \vspace{-10pt}} \label{tab:img_results} \end{table} Table \ref{tab:img_results} summarizes our results alongside prior related works, reporting both negative log-likelihood (NLL) in units of bits per dimension (BPD) and sample quality as measured by the Frechet Inception Distance (FID; \citet{heusel2017gans}). Note that these are \emph{unconditional} models. We directly use the U-Net architecture from \citet{dhariwal2021diffusion} with minimal changes. Although this architecture was not designed with CIFAR-10 in mind, we find that we can achieve very reasonable performance on par with Score SDE \citep{song2020score}. On ImageNet, we obtain state-of-the-art results in terms of both density modeling and sample quality compared to competing methods. Furthermore, we trained using Flow Matching with the OT path on ImageNet at resolution 128$\times$128, achieving \textbf{2.88} BPD and a FID of \textbf{21.52}. While NLL is not typically reported at this resolution, we believe our model reaches state-of-the-art performance, and this FID is competitive with strong likelihood-free models such as BigGAN~\citep{luvcic2019high} at 25.3~\citep{casanova2021instance}. Figures \ref{fig:imagenet32_samples}, \ref{fig:imagenet64_samples}, \ref{fig:imagenet128_samples} in the Appendix depict non-curated samples from these models. \begin{figure} \centering \begin{tabular}{@{}c@{\hspace{4pt}}|@{\hspace{4pt}}c@{\hspace{2pt}}c@{\hspace{2pt}}c@{\hspace{2pt}}c@{\hspace{2pt}}c@{}} \includegraphics[width=0.68\textwidth]{figures/2d_checker/2d_checkerboard_score_dif.png} & \rot{\tiny{SM \textsuperscript{w}/ Dif}} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/score_dif_ss_0_5.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/score_dif_ss_0_25.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/score_dif_ss_0_2.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/score_dif_ss_0_1.png} \vspace{-3pt} \\ \scriptsize{Score matching \textsuperscript{w}/ Diffusion} & & & & & \\ \includegraphics[width=0.68\textwidth]{figures/2d_checker/2d_checkerboard_flow_match_dif.png} & \rot{\tiny{FM \textsuperscript{w}/ Dif}} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_dif_ss_0_5.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_dif_ss_0_25.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_dif_ss_0_2.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_dif_ss_0_1.png} \vspace{-3pt} \\ \scriptsize{Flow Matching \textsuperscript{w}/ Diffusion } & & & & & \\ \includegraphics[width=0.68\textwidth]{figures/2d_checker/2d_checkerboard_flow_match_ot.png} & \rot{\tiny{FM \textsuperscript{w}/ OT}} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_ot_ss_0_5.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_ot_ss_0_25.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_ot_ss_0_2.png} & \includegraphics[width=0.0632\textwidth]{figures/2d_ode/flow_match_ot_ss_0_1.png} \vspace{-3pt} \\ \scriptsize{Flow Matching \textsuperscript{w}/ OT } & & {\scriptsize NFE=4} & {\scriptsize NFE=8} & {\scriptsize NFE=10} & {\scriptsize NFE=20} \end{tabular} \caption{(\emph{left}) Trajectories of CNFs trained with different objectives on 2D checkerboard data. The OT path introduces the checkerboard pattern much earlier, while FM results in more stable training. (\emph{right}) FM with OT results in more efficient sampling, solved using the midpoint scheme.\vspace{-10pt}} \label{fig:2d_checkerboard} \end{figure} \textbf{Faster convergence} While existing works train diffusion models with a very high number of iterations ({e.g.}, 1.3m and 10m iterations are reported by Score Flow and VDM, respectively), we find that Flow Matching generally converges much faster. For example, \cite{dhariwal2021diffusion} train ImageNet-64 for 540k iterations with 2k batch size, while FM trains (with the same architecture) for 157k iterations with equal batch size resulting in 70\% less image throughput; for ImageNet-128 \cite{dhariwal2021diffusion} train for 4.36m iterations with batch size 256, while FM (with 25\% larger model) used 475k iterations with batch size 1.5k, {i.e.}, 35\% less image throughput; see Table \ref{tab:hyper-params} for exact details. As the energy demand for training large deep learning models is increasing at a rapid pace~\citep{openaiandcompute,thompson2020computational}, being able to train using less gradient updates / image throughput can lead to significant time and energy savings. \textbf{Ablation experiments} We note that maximum likelihood training for Continuous Normalizing Flows ({e.g.}, as done in FFJORD) is not feasible for larger and more diverse datasets, so we mainly compare to the more competitive simulation-free methods. As our U-Net architecture may be different from prior works, we also perform our own ablation experiments on comparing models trained on a VP diffusion probability path and score matching. All models are trained using the same architecture, hyperparameter values and number of training iterations. We find that there is a noticeable difference when comparing Flow Matching to Score Matching. For instance, on ImageNet 64$\times$64, while the score matching ablation matches the results of VDM, simply switching to Flow Matching immediately outperforms VDM by a large margin.\vspace{-5pt} \subsection{Sampling Efficiency}\vspace{-5pt} \begin{figure} \centering \begin{subfigure}[b]{0.32\linewidth} \includegraphics[width=\linewidth]{figures/imagenet64/imagenet64_sm_dif.png} \caption*{\scriptsize Score Matching w/ Diffusion} \end{subfigure} \begin{subfigure}[b]{0.32\linewidth} \includegraphics[width=\linewidth]{figures/imagenet64/imagenet64_fm_dif.png} \caption*{\scriptsize Flow Matching w/ Diffusion} \end{subfigure} \begin{subfigure}[b]{0.32\linewidth} \includegraphics[width=\linewidth]{figures/imagenet64/imagenet64_fm_ot.png} \caption*{\scriptsize Flow Matching w/ OT} \end{subfigure} \caption{Sample paths from the same initial noise with models trained on ImageNet 64$\times$64. The OT path reduces noise roughly linearly, while diffusion paths visibly remove noise only towards the end of the path. Note also the differences between the generated images.} \label{fig:sample_paths} \end{figure} For sampling, we first draw a random noise sample $x_0 \sim {\mathcal{N}}(0,I)$ then compute $\phi_1(x_0)$ by solving \eqref{e:ode} with the trained VF, $v_t$, on the interval $t\in [0, 1]$ using an ODE solver. While diffusion models can also be sampled through an SDE formulation, this can be highly inefficient and many methods that propose fast samplers ({e.g.}, ~\citet{song2020denoising,zhang2022fast}) directly make use of the ODE perspective (see Appendix \ref{A:diff_cond_VP}). In part, this is due to ODE solvers being much more efficient---yielding lower error at similar computational costs~\citep{kloeden2012numerical}---and the multitude of available ODE solver schemes. When compared to our ablation models, we find that models trained using Flow Matching with the OT path always result in the most efficient sampler, regardless of ODE solver, as demonstrated next. \textbf{Sample paths} We first qualitatively visualize the difference in sampling paths between diffusion and OT. Figure \ref{fig:sample_paths} shows samples from ImageNet-64 models using identical random seeds, where we find that the OT path model starts generating images sooner than the diffusion path models, where noise dominates the image until the very last time point. We additionally depict the probability density paths in 2D generation of a checkerboard pattern, Figure \ref{fig:2d_checkerboard} (left), noticing a similar trend. \begin{wraptable}{r}{0.28\linewidth} \vspace{-1em} \centering {\textnormal{a}}{1.2} \setlength{\tabcolsep}{2.5pt} \resizebox{\linewidth}{!}{% \begin{tabular}{ @{} l C{4.5em} C{4.5em} C{4.5em} }\toprule & \bf CIFAR-10 & {\bf ImageNet 32$\times$32} & \bf ImageNet 64$\times$64 \\ \midrule \;\; SM \textsuperscript{w}/ Dif & 232 & 157 & 436 \\ \;\; FM \textsuperscript{w}/ Dif & 179 & 165 & 179 \\ \;\; FM \textsuperscript{w}/ OT & 156 & 164 & 162 \\ \bottomrule \end{tabular} } \caption{Sample costs (NFE) at fixed error tolerance, averaged over 50k samples.} \label{tab:nfe_for_sampling} \end{wraptable} \textbf{Computational costs} Table \ref{tab:nfe_for_sampling} shows the average number of function evaluations (NFE) required for sampling at tolerance of 1e-5, showing that Flow Matching can result in a much lower number of function evaluations, where a model trained using score matching can use 3$\times$ as much compute. Furthermore, the NFE required for sampling from a model can drastically change during training for score matching, whereas the sampling cost stays constant when training with Flow Matching (see Figure \ref{fig:2d_NFE_vs_epochs} in Appendix). \begin{figure} \centering \begin{tabular}{@{}c@{\hspace{5pt}}|@{\hspace{5pt}}c@{\hspace{2pt}}c@{\hspace{2pt}}c@{}} \includegraphics[width=0.23\textwidth]{figures/plots/error_vs_nfe.pdf} & \includegraphics[width=0.23\textwidth]{figures/plots/fid_vs_nfe_imagenet32_fm_ot.pdf} & \includegraphics[width=0.23\textwidth]{figures/plots/fid_vs_nfe_imagenet32_fm_dif.pdf} & \includegraphics[width=0.23\textwidth]{figures/plots/fid_vs_nfe_imagenet32_sm_dif.pdf}\vspace{-5pt} \\ \quad \ \ {\scriptsize Error of ODE solution } & \ \ \ {\scriptsize Flow matching \textsuperscript{w}/ OT} & \ \ {\scriptsize Flow matching \textsuperscript{w}/ Diffusion} & \ \ {\scriptsize Score matching \textsuperscript{w}/ Diffusion}\vspace{-5pt} \end{tabular} \caption{Flow Matching, especially when using OT paths, allows us to use fewer evaluations for sampling while retaining similar numerical error (left) and sample quality (right). Results are shown for models trained on ImageNet 32$\times$32, and numerical errors are for the midpoint scheme.\vspace{-8pt}} \label{fig:fid_vs_nfe} \end{figure} \textbf{Low-cost sampling} We next switch to fixed-step solvers and compare low ($\leq$100) NFE samples computed with the ImageNet-32 models from Table \ref{tab:img_results}. In Figure \ref{fig:fid_vs_nfe} (left), we compare the per-pixel MSE of low NFE solutions compared with 1000 NFE solutions (we use 256 random noise seeds), and notice that the FM with OT model produces the best numerical error, in terms of computational cost, requiring roughly only 60\% of the NFEs to reach the same error threshold as diffusion models. Secondly, Figure \ref{fig:fid_vs_nfe} (right) shows how FID changes as a result of the computational cost, where we find FM with OT is able to achieve decent FID even at very low NFE values, producing better trade-off between sample quality and cost compared to ablated models. Figure \ref{fig:2d_checkerboard} (right) shows low-cost sampling effects for the 2D checkerboard experiment. \vspace{-3pt} \section{Conclusion}\vspace{-3pt} We introduced Flow Matching, a new simulation-free framework for training Continuous Normalizing Flow models, relying on conditional constructions to effortlessly scale to very high dimensions. Furthermore, the FM framework provides an alternative view on diffusion models, and suggests forsaking the stochastic/diffusion construction in favor of more directly specifying the probability path, allowing us to, {e.g.}, construct paths that allow faster sampling and/or improve generation. We experimentally showed the ease of training and sampling when using the Flow Matching framework, and in the future, we expect FM to open the door to allowing a multitude of probability paths ({e.g.}, non-isotropic Gaussians or more general kernels altogether). In particular, FM can be generalized to manifold data, where diffusion process are less understood and no longer simulation-free ({e.g.}, \citet{de2022riemannian}), but probability paths can be easily defined ({e.g.}, \citet{ben2022matching}).
\section{Introduction}\label{Introduction} The problem addressed in this paper is the construction of a new differential elimination tool, a differential resultant for matrix ordinary differential operators (MODOs). Our main goal is to prove that such a tool allows to establish an effective criterion to guaranty the solvability of the eigenvalue problem for commuting MODOs \begin{equation}\label{eq-eigenProblem} L Y =\lambda Y \quad , \quad B Y = \mu Y \ . \end{equation} We restrict to the case where $L$ is monic and has order one, since according to Wilson \cite{wilson}, this situation is interesting because $L$ does have order $1$ in practically all the most interesting examples \cite{ZS}, see also \cite{Dubrovin}. {Furthermore, it should be noted that by means of the Cyclic Vector Lemma, there is a correspondence between systems of order $1$ and size $\ell \times \ell$ and differential operators of order $\ell$, see for example Churchill and Kovacic \cite{ChurchillKovasic}, or Katz \cite{Katz1987}.} \medskip Differential resultants were first defined for ordinary differential operators, as the natural generalization to a non commutative environment of the algebraic resultant of two univariate polynomials, see for instance \cite{Ch}. A few years ago the theory of differential resultants was formalized for multivariate differential polynomials, as reviewed in two recent reports \cite{McW} and \cite{LY}. No attempt has been made so far to define a differential resultant for MODOs. Every existing resultant provides a conditions on the coefficients of the differential operators (or differential polynomials) that guarantees the existence of common nontrivial solutions. The tool we would like to develop should provide such condition in the case of MODOs, but many difficulties emerge trying to apply similar methods to the ones used in previous existing resultants. These are a consequence of two main facts: matrix coefficients rings are non commutative and, in addition, rings of MODOs are not euclidean domains. \medskip Throughout this paper we use the language of differential algebra and Picard-Vessiot theory. For the main definitions and notation we recommend the fo\-llowing references \cite{Ritt}, \cite{Kolchin}, \cite{VPS}, \cite{Ch}, and \cite{MR1999}. The essential termminology has been summarized in the Appendix. We consider the ring $\mathcal{R}_\ell$ of $\ell\times \ell$ matrices with entries in an ordinary differential field $K$, whose field of constants $C$ is algebraically closed. The derivation of $K$ can be extended to a derivation $D$ in $\mathcal{R}_\ell$ The MODOs of this paper belong to the ring of differential operators $\mathcal{R}_\ell [D]$, for details see Section \ref{sec-modos}. \medskip In this article, we define the differential resultant of two MODOs $P,Q$ in $\mathcal{R}_\ell [D]$, in the case $P=A_0 +A_1 D$, with $A_1$ invertible. Associated to $P$, we consider the matrix differential system \begin{equation}\label{eq-PV} DY = NY \quad , \quad \textrm{with } N=-A_1^{-1} A_0 \quad \textrm{and }Y=(y_1,\ldots ,y_{\ell})^t. \end{equation} Let $\Sigma$ be the Picard-Vessiot field of the previous differential equation. The operator $Q$ acts linearly on the solution space of \eqref{eq-PV}, and this action provides an $\ell\times \ell$ matrix $M(P,Q)$ whose determinant is the new differential resultant for MODOs, \begin{equation}\label{intro-Dresultant} {\rm DRes} (P,Q)= \det M(P,Q) . \end{equation} Moreover, we prove the following result. \ {\bf Theorem A. }{\it Given MODOs $P$ and $Q$ in $\mathcal{R}_{\ell}[D]$, $P$ of order $1$ with invertible leading coefficient matrix. The following statements hold: \begin{enumerate} \item If there exists a common nontrivial solution of $PY=\overline{0}$ and $QY=\overline{0}$ then ${\rm DRes} (P,Q)=0$. \item If $P$ and $Q$ commute, and ${\rm DRes} (P,Q)=0$, then the matrix differential system $PY=\overline{0}$ , $QY=\overline{0}$, has a solution $\psi = (\psi_1 , \dots ,\psi_{\ell} )^t$ with every $\psi_i$ in a finite dimensional differential extension $\Sigma$ of $K$. \end{enumerate} } {These results motivate the definition of the differential resultant for MODOs in the general case, where $P$ has arbitrary order. For that purpose the Picard-Vessiot theory of MODOs needs further development that could benefit of results about the factorization of MODOs as those obtained by A. Kasman in \cite{Kasman2017}.} The classical problem of describing pairs of commuting differential operators was first studied by Burchnall and Chaundy \cite{BC1}, \cite{BC2}, and Baker in \cite{Baker1928}, for ODOS. {The work of Grinevich in \cite{Grinevich1987} generalizes this problem to the case of MODOs, assuming that they are in so called {\sl general position} and for matrix coefficients in the field of smooth complex functions.} The effective construction of commuting matrix differential operators has been also addressed in Oganesyan's article \cite{Oganesyan2017}. {This paper is a contribution to the} generalization to the case of MODOs, of the famous results by Burchnall and Chaundy in \cite{BC1}, that allow to establish a correspondence between rings of commuting ordinary differential operators and planar algebraic curves, see also \cite{K78}. For a commuting pair $L$, $B$ of ODOs, it is easy to observe the existence of a polynomial $h(\lambda,\mu)$ with constant coefficients such that $h(L,B)=0$: Burchnall and Chaundy showed that the opposite is also true \cite{BC1, BC2}. This is the defining polynomial of a plane algebraic curve $\Gamma$, commonly known as {\sl the spectral curve}, and it can be computed by means of the differential resultant of $L-\lambda$ and $B-\mu$. {These facts are an important motivation to develop differential resultants for MODOs to study the spectral problem \eqref{eq-eigenProblem}}. Next we consider $P= L-\lambda$ and $Q=B-\mu$ as MODOs with matrix coefficients in the differential field $K(\lambda ,\mu)$, for algebraic variables $\lambda$ and $\mu$, whose field of constants is $C(\lambda,\mu)$. We generalize Previato's theorem on differential resultant for ODOs, see \cite{Prev} and \cite{MRZ1}, to prove the next analogous result for MODOs, {showing that the differential resultant of $L-\lambda$ and $B-\mu$ is a constant coefficient polynomial.} \medskip {\bf Theorem B. }{\it \ Let us consider matrix differential operators $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, and assume that $L$ has order one with invertible leading coefficient. If $L$ and $B$ commute then the differential resultant \begin{equation}\label{def-spCurve} f(\lambda ,\mu) = {\rm DRes}(L-\lambda,B-\mu) \end{equation} is a polynomial in $C [\lambda ,\mu ]$. } \medskip Coming back to Theorem A, for a commuting pair $L$, $B$, the spectral problem \eqref{eq-eigenProblem} has a nontrivial solution if and only if $f(\lambda,\mu)=0$, see Corollary \ref{cor-coupled}. Thus \eqref{eq-eigenProblem} is in fact a coupled problem since $\lambda$ and $\mu$ are not free parameters. The algebraic curve $\Gamma$ defined by $f(\lambda,\mu)=0$, {guaranties the solvavility} of the eigenvalue problem, it is the so called {\sl spectral curve}, see \cite{Grinevich1987}. {In other words, it shows how each point of $\Gamma$ provides a spectral problem associated to a pair of commuting operators, $L, B$ that admits a common solution.} \medskip In Mulase et al. \cite{MuKi}, a correspondence is established between commutative algebras of MODOs and coverings of algebraic curves together with some geometric data. The so called {\sl inverse spectral problem} for an algebraic curve $\Gamma$ with some extra geometric data, was initially studied by Krichever \cite{krichever}. He used MODOs to construct a pair of matrix operators whose spectral curve is a given one, based on its configuration of points at infinity. \medskip The present work studies the so called {\sl direct problem} for commutative algebras $C[L,B]$ associated with a commuting pair of MODOs $L, B$, {for the first time} in the case of an arbitrary differential field $K$. More precisely, given $L,B$ in $\mathcal{R}_\ell [D]$, assuming that $L$ has order one and invertible leading coefficient matrix, we prove Theorem C, a decomposition theorem for the algebra $C[L,B]$ in terms of the irreducible components of the spectral curve in this context. The new developed tool, the differential resultant for MODOs, has a crucial role. It is important to note that we do not restrict to the case of irreducible curves or nonsingular curves. Working in an arbitrary differential field and using Picard-Vessiot theory allows to {reduce} the hypothesis on the leading coefficient of $L$, in comparison with previous works, see for instance \cite{Grinevich1987}. Similar benefits are expected for $L$ of arbitrary order, after an appropriate differential resultant for MODOs is defined. We define the {\sl Burchnall-Chaundy ideal of the pair $L,B$} to be the set \[ {\tt BC} (L,B) :=\{g\in C[\lambda,\mu]\mid g(L,B)={\bf 0}\}, \] whose elements are {\sl Burchnall-Chaundy (BC) polynomials}, in analogy with the theory of ODOs. We prove in the first place that the differential resultant $f$ is a BC polynomial. Moreover, once $f$ has been computed its decomposition in irreducible factors $f=h_1^{\sigma_1 } \cdots h_s^{\sigma_s}$ will allow us to give the Algorithm \texttt{BC-generator} to compute a polynomial $F$ such that ${\tt BC}(L,B)=(F)$. We establish the ring structure of the commutative algebra $C[L,B]$ by means of an isomorphism $$C[L,B]\simeq\frac{C[\lambda , \mu ] }{{\tt BC}(L,B)}.$$ {The next decomposition theorem is by itself important and allows to classify the commutative algebras $C[L,B]$ as products of quotient rings related with the irreducible components $\Gamma_i$ of the spectral curve $\Gamma$. } \ {\bf Theorem C. }{\it \ Let us consider commuting matrix differential operators $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, and assume that $L$ has order one with invertible leading coefficient. Let $f(\lambda ,\mu) = {\rm DRes}(L-\lambda,B-\mu)$. Then there exists a polynomial $F=h_1^{r_1 } \cdots h_s^{r_s}$ that divides $f$ such that ${\tt BC} (L,B) =(F)$. Furthermore the following isomorphism can be established \begin{equation}\label{eq-decomposition} C[L,B]\simeq \frac{C[\lambda , \mu ] }{(h_1^{r_1 })} \times \cdots \times \frac{C[\lambda , \mu ]}{(h_s^{r_s })} , \end{equation} whose ring structure is componentwise addition and multiplication. } { These results can be used to classify the commutative algebras $C[L,B]$ in terms of the irreducible components of the spectral curve, more precisely the irreducible factors of its defining polynomial $f$, the differential resultant. In particular, if $\Gamma$ is an irreducible curve then \[C[L,B]\simeq \frac{C[\lambda , \mu ]}{(h^{r})}\] where $h$ is the square free part of $f=h^{\sigma}$, $1\leq r\leq \sigma$. For matrix coefficients of size $\ell=2$ the classification is then clear and can be applied to pairs of operators $L$ and $B$ defining the famous AKNS hierarchy. We finish this paper illustrating our results with a computed example, the first non trivial case of the AKNS hierarchy. All computations were performed in \href{https://www.maplesoft.com/}{Maple} 21. } \bigskip {\it The paper is organized as follows}. Section 2 includes important notation and definitions, together with the context of the problems studied in relation to the work of other authors {using different approaches}. Section 3 is dedicated to the construction of the differential resultant for MODOs and the proof of Theorem A. The spectral curve $\Gamma$ is defined in Section 4 after proving Theorem B. {It is shown that problem \eqref{eq-problem} is a coupled spectral problem, that admits a solution whenever $\lambda$ and $\mu$ are related through $f(\lambda,\mu)=0$}. It is in Section 5 that the ideal of BC polynomials ${\tt BC} (L, B)$ is canonically associated to the operators $L, B$. In Theorem \ref{thm-ideal1} it is proved to contain the differential resultant $f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu)$ and in Theorem \ref{thm-ideal} it is proved to be bounded by ideals defined by $f$. Section 6 contains the proof of Theorem C and the Algorithm \texttt{BC-generator} to compute its decomposition as a product of rings associated with irreducible curves. Finally, we illustrate our results in Section 7 by applying them to the AKNS hierarchy. \section{Matrix coefficient ODOs}\label{sec-modos} Let K be a differential field with derivation $\partial$, whose field of constants $C$ is algebraically closed of characteristic zero. Given $a\in K$ we denote $\partial(a)$ by $a'$. The commutation rule in the ring of differential operators $K[\partial]$ is then defined by $\partial a =a\partial+a'$. Let us consider the ring $\mathcal{R}_\ell =M_{\ell}(K)$ of $\ell\times \ell$ matrices with coefficients in $K$. Given $A=(a_{\alpha,\beta})\in\mathcal{R}_\ell $, let us denote by $A'=(a'_{\alpha,\beta})$. Thus we can extend the derivation $\partial$ to a derivation $D$ in $\mathcal{R}_\ell$ as $D(A):=A'$. We will work with matrix coefficient differential operators as elements of $\mathcal{R}_\ell [D]$, called \emph{ matrix ordinary differential operators} or MODOs, where the commutation rule is naturally defined by $D A:=AD+A'$. In addition, we will denote by ${\bf 0}$ the matrix with all entries equal to $0$. {Observe that we can identify $\mathcal{R}_\ell [D]$ with $M_{\ell}(K[\partial])$.} \medskip The ring of scalar differential operators $K[\partial]$ is embedded in the ring of matrix differential operators $\mathcal{R}_\ell [D]$ by sending a scalar differential operator $\sum a_i \partial^i$ to the matrix differential operator $\sum a_i I_{\ell} D^i$, for the identity matrix $I_{\ell}$ of $\mathcal{R}_\ell $. In the scalar case, ODOs enjoy many properties that are essential to the classification of commutative rings of ODOs. In the matrix-coefficient case, it is not known whether such properties hold. We list the main ones: \begin{enumerate}[label= \Roman* ] \item \label{item-I}\label{property-P1} The commutator of two operators of orders $m$ and $n$ has order strictly less than $n+m$. \item \label{item-II} If two operators commute with an operator $L$, then they commute among themselves. \label{property-P2} \end{enumerate} Observe that, in the matrix case, Property \ref{property-P1} does not hold. For a counterexample, let us consider operators $MD,\ ND$, where $M,\ N$ are two constant non-commuting matrices \[[MD,ND]=[M,N]D^2+(N'-M')D.\] One might wonder whether in the algebraic case (i.e., the operators correspond to algebraic functions on a given curve) the property might hold; in fact, the assumption in \cite{wilson} is that the leading coefficients are diagonal. In addition, Property \ref{property-P2} fails. In fact, $MD,\ ND$ as above both commute with $ID,$ where $I$ is the identity matrix. These observations bring out the intrinsic interest of studying commutative subrings of matrix differential operators; {however, given the difficulties that arise, some special assumptions are usually considered. We review below some of the existing literature to highlight the contributions of the present paper.} \medskip Observe that the ring $\mathcal{R}_\ell [D]$ of MODOs is included in the algebra of pseudo-differential operators with matrix coefficients $$\mathcal{R}_\ell [D ,D^{-1}]:=\left\{\sum_{i=-\infty}^n A_i D^i\mid A_i\in \mathcal{R}_\ell, n\in\mathbb{Z}\right\}.$$ For a pseudo-differential operator $L=\sum_{i=-\infty}^n A_i D^i $, we call $A_n$ its leading coefficient, and $n$ its order. Furthermore, we will say that L is in normal form if $A_{n-1}=0$. \vspace{0.5cm} The above construction has been generalized as follows. Given $ L=\sum_{i=0}^n U_i D^i , $ with $U_i =\displaystyle\left( u_{i, \alpha \beta} \right)_{1\leq \alpha , \beta \leq l}$, if we consider $u_{i,\alpha\beta}$ as differential variables over $C$, we can define the ring of differential polynomials $$ \mathcal{B}=C\{u_{i,\alpha\beta}\}={C}\left[u^{(j)}_{i,\alpha\beta} \, ; \, 1\le \alpha, \beta\le l, \ 0\le i\le n, \ j\ge 0 \ \right]. $$ In \cite{wilson}, Wilson studied {the centralizer $\mathcal{Z}(L)$ of $L$} in $M_l (\mathcal{B})[D ,D^{-1}]$, and it is in this algebra that some of the properties of scalar ODOs persist. In \cite{wilson}, Proposition 2.19, he shows that $\mathcal{Z}(L)$ is commutative, i.e. that Property \ref{property-P2} holds under the following assumptions: \begin{enumerate}[label=(\alph*)] \item \label{item-a} The leading coefficient $U_n$ is an invertible diagonal matrix, diag$ (c_1, \ldots ,c_k)$, the $c_\alpha$ being non-zero constants. \item \label{item-b} If $c_\alpha= c_\beta$, then $u_{n-1,\alpha\beta} = 0$. \end{enumerate} {As Wilson writes, one can conjugate $L$ into its leading term by a suitable `integral operator' (formula (5.1) in \cite{wilson}). This is what gives the affine ring of a curve. } \medskip In Mulase et al. \cite{MuKi}, a correspondence is established between integral algebras of MODOs ({those containing an operator in normal form}) and geometric data {related to an algebraic curve}, assuming that the differential field $K$ equals $C((x))$, the field of fractions of the ring of formal series in the variable $x$ with coefficients in $C$. In this framework, there exists a classification of commutative elliptic algebras of MODOs, in the Verdier sense \cite{Ve}. In Mulase et al. \cite{MuLi} an equivalence of categories provides such classification: On one hand the category of algebras of commuting MODOs; on the other, coverings of algebraic curves (spectral curves) together with some associated geometric data. This type of rings appeared in the study of the so-called {\sl inverse spectral problem} for an algebraic curve with some extra geometric data. The problem was initially studied by Krichever \cite{krichever}. He established a method to use MODOs to construct a pair of matrix operators whose spectral curve is the given one, based on the configuration of its points at infinity. {One can observe that the matrices associated to a curve by Krichever's construction are of Wilson's type, \cite{previato}.} \medskip Given $L \in \mathcal{R}_\ell [D]$, {one can consider the centralizer $\mathcal{C}(L)$ of $L$ in $ \mathcal{R}_\ell [D]$ or the centralizer $Z(L)$ of $L$ in $\mathcal{R}_\ell [D ,D^{-1}]$. In this paper we study the algebras $C[L,B]$, for $B$ in $\mathcal{C}(L)$. One first observation is that the algebra $C[L,B]$} is not in general a maximal commutative subalgebra of {$\mathcal{R}_\ell [D]$} . The following inclusion \[ C[L,B] \subset \mathcal{C}(L)=\mathcal{R}_\ell [D] \cap Z(L). \] points out the interest of studying the centralizer $\mathcal{C} (L)$ of $L$ in $\mathcal{R}_\ell [D]$. {The results of K. Goodearl in \cite{Good} about centralizers of ODOs have proven to be important for effective computational approaches in \cite{PRZ2019, MRZ1, MRZ2}.} {In this sense, a generalization to the case of MODOs of Goodearl's results would give an effective description of $\mathcal{C} (L)$ but we do not achieve such description in this paper. } \medskip {In this work,} as in the scalar case, we would like to use the concept of differential resultant to establish a correspondence between pairs of commuting matrix differential operators $L$, $B$ and algebraic curves \cite{BC1}. {More precisely, we will assign to each commutative algebra $C[L,B]$ a plane algebraic curve, the \emph{spectral curve}.} {This is the goal of the second part of this paper from Section \ref{sec-spectral curves} onward}. For this purpose, let us consider algebraic variables $\lambda$ and $\mu$ with respect to $\partial$. Thus $\partial \lambda = 0$ and $\partial \mu = 0$ and we can extend the derivation $\partial$ of $K$ to the polynomial ring $K[\lambda, \mu]$. Hence $(K[\lambda, \mu], \partial)$ is a differential ring whose ring of constants is $(C[\lambda, \mu], \partial)$. Since $\lambda I_{\ell}$ is a matrix in $M_{\ell}(K[\lambda,\mu])$, given a matrix differential operator $P$ in $\mathcal{R}_{\ell}[D]$ we will denote by $P-\lambda$ the matrix differential operator $P-\lambda I_{\ell}$ in the matrix ring $M_{\ell}(K(\lambda,\mu))[D]$, extending the derivation $D$ to matrices with entries in the differential field $K(\lambda,\mu)$. {To complete this brief overview of the general situation for MODOs, we would like to indicate that by} using Picard-Vessiot extensions, we obtain a representation of the centralizer $\mathcal{C} (L)$. Let $E$ be the Picard-Vessiot field of the differential equation $LY =\lambda Y$. Since $L-\lambda$ and $B-\mu$ commute, the operator $B-\mu$ acts linearly on the solution space of \eqref{eq-PV}, and this action provides an $\ell\times \ell$ matrix $M(L-\lambda ,B-\mu )$, as constructed in Section \ref{sec-spectral curves}. Moreover, the null space of $M(L-\lambda ,B-\mu )$ provides a representation of the space of common solutions at each point of the spectral curve. \medskip { It was E. Previato who glimpsed for the first time at the convenience of a triple approach combining differential algebra, Picard-Vessiot extensions and representation theory, in her important work \cite{Previato2008} on the generalization of Burchnall and Chaundy's ideas to ODOs in several variables. The present work is written in this philosophy, uniting these techniques for the study of coupled spectral problems for MODOs. } \section{Characterizing common solutions}\label{sec-commonSol} { In this section we present the construction of the tool that allows characterizing the existence of common solutions for MODOs. This tool is the differential resultant and we define it under some hypotheses.} Let us consider matrix differential operators in $\mathcal{R}_{\ell}[D] $, \begin{equation}\label{def-operators} P=A_0+A_1 D \quad \textrm{and} \quad Q=\sum_{j=0}^n B_j D^j , \ \textrm{where } n\geq 1\ , \end{equation} with $A_i$, $B_j$ in the differential ring $\mathcal{R}_{\ell}$. We will assume that the leading coefficient matrix $A_1$ of $P$ is invertible, allowing to consider a monic operator. In this section we will investigate necessary and sufficient conditions on the entries of the coefficient matrices of $P$ and $Q$ for the system \begin{equation}\label{eq-system} \left\{\begin{matrix} PY=\overline{0}\\ QY=\overline{0} \end{matrix}\right. \quad ,\,\,\, Y=(y_1,\ldots ,y_{\ell})^t, \ \overline{0}= (0,\dots ,0)^t , \end{equation} to have a nontrivial solution $\psi = (\psi_1 , \dots ,\psi_{\ell} )^t$, with all the $\psi_i$ in some differential extension $\Sigma$ of the differential field $K$. To guarantee the existence of such an extension, we will associate to system \eqref{eq-system} a differential field, {the classical Picard-Vessiot field extension of $K$ for the system $PY=\overline{0}$, a finite dimensional extension where the entries of its solutions belong \cite{VPS}.} First, observe that the differential equation $PY=\overline{0}$ can be rewritten as \begin{equation}\label{eq-PV-system} DY= N Y \quad \textrm{with } \ N= -A_1^{-1} A_0 \in \mathcal{R}_{\ell} . \end{equation} Next consider the matrix differential recursion in $\mathcal{R}_{\ell}$: \begin{equation}\label{eq-rec} p_0(N):=I_{\ell} \ ,\quad p_j (N):=p_{j-1}(N)N+(p_{j-1}(N))' \ ,\quad j\geq 1, \end{equation} and denote by $M(P,Q)$ the $\ell\times \ell$ matrix in $\mathcal{R}_{\ell}$ defined by \begin{equation}\label{def-MPQ} M(P,Q):=\sum_{j=0}^n B_j p_j(N). \end{equation} \begin{remark}\label{rem-Dj} {Let us consider the Picard-Vessiot extension $\Sigma$} of $K$ for the differential system \eqref{eq-PV-system}. Hence, if $\psi$ is a solution of this system, then $\psi$ is a solution of $PY=\overline{0}$ and reciprocally. Observe that $\Sigma$ is a finite dimensional differential extension of $K$, see the Appendix. Given a solution $\psi = (\psi_1 , \dots ,\psi_{\ell} )^t$ of system \eqref{eq-PV-system}, we have $\psi\in \Sigma^{\ell}$ and observe that \[D^j\psi =p_j(N)\psi\quad, \quad j\geq 1,\] with $p_j(N)$ defined by \eqref{eq-rec}. Thus in $\Sigma^{\ell}$ the derivation is defined by the differential system $DY=NY$. \end{remark} From the previous remark the following essential lemma is obtained. It will be used to prove the main results of this paper. \begin{lemma}\label{lem-essential} Let $P$ and $Q$ be matrix differential operators as in \eqref{def-operators}. Let $\Psi$ be a fundamental matrix of system \eqref{eq-PV-system}. Then, \begin{equation}\label{eq-QM} Q\Psi = M(P,Q)\Psi. \end{equation} \end{lemma} \begin{proof} Let us consider a solution $\psi = (\psi_1 , \dots ,\psi_{\ell} )^t$ of system \eqref{eq-PV-system}. By Remark \ref{rem-Dj}, we have $\psi\in \Sigma^{\ell}$. Consequently we get the next equalities \begin{equation}\label{eq-commonSolution} \overline{0} = Q\psi = \sum_{j=0}^n B_j D^j\psi=\sum_{j=0}^n B_j p_j(N)\psi=M(P,Q)\psi. \end{equation} \end{proof} \begin{definition} In previous notations, we define \texttt{the matrix differential resultant} of two matrix differential operators $P$ and $Q$ in $\mathcal{R}_{\ell}$, with $P$ of order one and invertible leading coefficient matrix, to be \begin{equation}\label{def-Dres} {\rm DRes} (P,Q)=\det M(P,Q). \end{equation} \end{definition} We are ready to prove Theorem A from the introduction. This theorem ensures that the differential resultant of $P$ and $Q$ is a necessary and sufficient condition on the entries of the coefficient matrices of $P$ and $Q$, that guaranties the existence of a common nontrivial solution, a solution of \eqref{eq-system}, whenever $P$ and $Q$ commute. \begin{proof}[Proof of Theorem A] \begin{enumerate} \item Let us assume that there is a nonzero common solution $\psi$ of system \eqref{eq-system}, $\psi\in \Sigma^{\ell}$. By Lemma \ref{lem-essential}, $Q\psi = M(P,Q)\psi$. Thus the linear map defined by $M(P,Q)$ on $\Sigma^{\ell}$ has a non trivial kernel, and then its determinant is zero. \item Suppose now that the determinant of the matrix $M(P,Q)$ is zero. Let $\Psi$ be a fundamental matrix of system \eqref{eq-PV-system}, that is an invertible matrix in $M_{\ell} (\Sigma)$, whose columns form a fundamental system of solutions. By Lemma \ref{lem-essential} it holds that $Q\Psi =M(P,Q)\Psi$ and therefore the matrix $Q\Psi $ has zero determinant. Let us now consider the columns $\{ Q\phi_1, \ldots, Q\phi_{\ell} \}$ of the matrix $Q\Psi$. They form a system of linearly dependent vectors in $\Sigma^{\ell}$ over the differential field $K$, but also over the field of constants $C$. To verify this we can proceed as follows. Up to a change of the order of the variables, we can assume that any proper subset of $\{ Q\phi_1, \ldots, Q\phi_r \}$ is linearly independent over $K$. Then \begin{equation}\label{eq-Qphi} Q\phi_1 = \sum_{i=2}^r c_i Q\phi_i \mbox{ with } c_i \in K. \end{equation} {Since $P$ and $Q$ commute then $Q \phi_j$ is also a solution of $P$ and by Remark \ref{rem-Dj} then $D(Q\phi_j )= N (Q\phi_j )$.} So, differentiating \eqref{eq-Qphi} we get \begin{align*} \overline{0}&= D(Q\phi_1 )-\sum_{i=2}^r c'_i Q\phi_i - \sum_{i=2}^r c_i D(Q\phi_i )=\\ &= N(Q\phi_1 )-\sum_{i=2}^r c'_i Q\phi_i - \sum_{i=2}^r c_i N(Q\phi_i ) . \end{align*} Then, the equality $\overline{0}= \sum_{i=2}^r c'_i Q\phi_i$ implies that $c_i' =0$, so they are cons\-tants in $C$. Finally we have obtained that the vectors $\{ Q\phi_1, \ldots, Q\phi_r \}$ {are linearly dependent} over $C$. Then, for some constants $c_i \in C$ not all zero, we can consider the vector in $\Sigma^{\ell}$ defined by $\psi:=c_1 \phi_1 + \cdots +c_{\ell} \phi_{\ell}$ verifying \begin{equation*} P\psi = \sum_{i=1}^{\ell} c_i P\phi_i = \overline{0} \quad , \quad Q\psi = \sum_{i=1}^{\ell} c_i Q\phi_i = \overline{0}. \end{equation*} So $\psi$ is a common solution, and it is not the null solution because $\Psi$ is a fundamental matrix. \end{enumerate} \end{proof} \begin{corollary}\label{cor-common solutions} Let $P$ and $Q$ be commuting matrix differential operators as in \eqref{def-operators}. The space of common solutions of \eqref{eq-system} is non trivial if and only if ${\rm DRes}(P,Q)={\bf 0}$. Moreover, the space of common solutions of $P$ and $Q$ is defined by \begin{equation}\label{eq-commonSol2} M(P,Q)Y=\overline{0}, \end{equation} with solutions $\psi = (\psi_1 , \dots ,\psi_{\ell} )^t$, whose entries belong to a finite differential extension $\Sigma$ of $K$. \end{corollary} \begin{proof} The result follows by Theorem A and Lemma \ref{lem-essential}. \end{proof} \begin{remark}\label{remark-1} {Observe that equation \eqref{eq-commonSol2} together with the structure of $\Sigma$, the Picard-Vessiot field of the system \eqref{eq-PV-system}, determines the space of common solutions of \eqref{eq-system}. } \end{remark} The previous results indicate the interest of developing a theory of differential resultants for matrix differential operators in $\mathcal{R}_{\ell}[D]$, that we start in this work and we plan to develop in a near future. {To define a Sylvester style matrix whose determinant is the resultant, the notion of wronskian for MODOs developed in \cite{Kasman2017} will be useful.} In the remaining parts of this paper we will apply Theorem A to guaranty the solvability of matrix-type spectral problems. \section{Spectral curves for MODOs}\label{sec-spectral curves} Given differential operators $L$ and $B$ in $\mathcal{R}_{\ell}[D]=M_{\ell}(K)[D] $, we consider the spectral problem \begin{equation}\label{eq-sp-system} LY=\lambda Y\quad , \quad BY=\mu Y \quad ,\,\,\, Y=(y_1,\ldots ,y_{\ell})^t . \end{equation} { The spectral problem \eqref{eq-sp-system} can be studied using Theorem A for \begin{equation}\label{def-operatorsLB} L=A_0+A_1 D \quad \textrm{and} \quad B=\sum_{j=0}^n B_j D^j , \ \textrm{where } n\geq 1 \ , \end{equation} assuming that $A_1$ is invertible. More precisely, we will apply Theorem A to the matrix differential operators} \begin{equation} P=L-\lambda = (A_0 -\lambda I_{\ell} ) + A_1 D , \quad Q=B-\mu= (B_0 -\mu I_{\ell} ) +\sum_{j=1}^n B_j D^j. \end{equation} Let $N_{\lambda}$ be the matrix $N_{\lambda}=-A_1^{-1}(A_0-I_{\ell}\lambda )$ in $M_{\ell} (K(\lambda , \mu ))$, and consider the differential system \begin{equation}\label{eq-PV-system_lambda} DY= N_\lambda Y \quad \textrm{ with } \ N_{\lambda}=-A_1^{-1}(A_0-\lambda I_{\ell} ) . \end{equation} We will consider next the matrix differential resultant defined in \eqref{def-Dres} for $P=L-\lambda$ and $Q=B-\mu$, \begin{equation}\label{eq-dresLB} {\rm DRes}(L-\lambda,B-\mu)=\det M(L-\lambda, B-\mu) \end{equation} where \begin{equation}\label{eq-matrix} M(L-\lambda, B-\mu)=B_0-I_{\ell} \mu +\sum_{j=1}^n B_j p_j(N_{\lambda}), \end{equation} with $p_j$ defined by the recursion \eqref{eq-rec}. With the above assumptions we have the following statements. \begin{lemma}\label{lemma-1} The differential resultant ${\rm DRes}(L-\lambda,B-\mu)$ is a polynomial $f(\lambda,\mu)$ in $K[\lambda,\mu]$, of degrees $\ell$ in $\mu$ and $\ell n$ in $\lambda$. \end{lemma} \begin{proof} By \eqref{eq-matrix} $M(L-\lambda, B-\mu)$ is an $\ell\times \ell$ matrix with entries in $K[\lambda,\mu]$. Thus $f(\lambda,\mu)=\det M(L-\lambda, B-\mu)$ is a polynomial in $K[\lambda,\mu]$. Furthermore by \eqref{eq-matrix} we have \begin{equation*} f(\lambda,\mu)=(-1)^{\ell} \mu^{\ell}+a\lambda^{n\ell}+\cdots . \end{equation*} \end{proof} \begin{remark}\label{rem-PVE}\label{remark-PVE} We can consider the operators $P=L-\lambda$ and $Q=B-\mu$ with matrix coefficients with entries in $\mathcal {F}=K(\lambda,\mu)$. Let $\mathcal {F}^\dag$ be the differential closure of the differential field $K(\lambda,\mu)$, and $\mathcal{C}$ its field of constants, which is known to be algebraically closed, see \eqref{eq-constants-cl-appenddix} in the Appendix. In consequence, by Remark \ref{rem-E-appendix} in the Appendix, there exists a fundamental matrix $\Psi_\lambda$ of \eqref{eq-PV-system_lambda} in $M_{\ell}(\mathcal{E})$ such that {$D\Psi_\lambda=N_{\lambda}\Psi_\lambda$, or equivalently} \begin{equation}\label{eq-with-lamda} L\Psi_\lambda = \lambda \Psi_\lambda , \end{equation} where $\mathcal{E}$ is the Picard-Vessiot extension of $\mathcal {F}^\dag$ for this differential system. To be more precise, the matrix coefficients of $P$ and $Q$ have entries in the differential ring $K[\lambda,\mu]$, whose ring of constants is $C[\lambda,\mu]$. Observe that $C[\lambda,\mu]\subset \mathcal{C}$ and $K[\lambda,\mu]\cap \mathcal{C}=C[\lambda,\mu]$. For details, see Lemma \ref{lemma-para-Previato} in the Appendix. \end{remark} The next lemmas will be necessary to prove the main result in this section. \begin{lemma}\label{lem-V} Given a solution $ \psi$ in $\mathcal{E}^{\ell}$, the next identity holds \begin{equation} (B-\mu)\psi=M(L-\lambda , B-\mu )\psi. \end{equation} \end{lemma} \begin{proof} By Remmark \ref{remark-PVE} and Lemma \ref{lem-essential} for $P=L-\lambda$ and $Q=B-\mu$ the equality follows. \end{proof} \begin{lemma}\label{lem-Delta0} Let us assume that $L$ and $B$ commute. Given a fundamental matrix of solutions $\Psi_{\lambda}$ of $LY=\lambda Y$ in $\mathcal{E}^{\ell}$ the next identity holds \begin{equation} (B-\mu)\Psi_\lambda =\Psi_\lambda \cdot \Delta \ , \end{equation} for some $\ell\times \ell$ matrix $\Delta$ with entries in the field of constants $\mathcal{C}$ of $\mathcal{E}$. \end{lemma} \begin{proof} With the previous notations, we consider $\Psi_\lambda$ a fundamental matrix sa\-tisfying \eqref{eq-with-lamda}. Morever, observe that $(B-\mu )\Psi_\lambda$ is also a fundamental matrix since \begin{equation*} (L-\lambda)((B-\mu)\Psi_\lambda )=(B-\mu) ((L-\lambda)\Psi_\lambda )=0. \end{equation*} Hence, \begin{equation} (B-\mu)\Psi_\lambda =\Psi_\lambda \cdot \Delta \ , \end{equation} for some matrix $\Delta$ with entries in $\mathcal{C}$. \end{proof} We are ready to prove Previato's Theorem for MODOs in this situation, see \cite{Prev} and \cite{MRZ1} for Previato's Theorem for ODOs. \begin{proof}[Proof of Theorem B] With the previous notations, we consider $\Psi_\lambda$ a fundamental matrix sa\-tisfying \eqref{eq-with-lamda}. By Lemma \ref{lem-Delta0} \begin{equation} (B-\mu)\Psi_\lambda =\Psi_\lambda \cdot \Delta \ , \end{equation} for some matrix $\Delta$ with entries in $\mathcal{C}$. On the other hand, by Lemma \ref{lem-V} \begin{equation*} (B-\mu)\Psi_{\lambda}=M(L-\lambda , B-\mu )\Psi_{\lambda} . \end{equation*} Therefore, since the fundamental matrix $\Psi_\lambda$ is an invertible matrix, we obtain that $\det (M(L-\lambda , B-\mu )= \det (\Delta )$, so ${\rm DRes}(L-\lambda,B-\mu)$ is a polynomial in $C [\lambda ,\mu ]$, since $K[\lambda,\mu]\cap \mathcal{C}=C[\lambda,\mu]$. \end{proof} From now on in this paper we will assume that $L$ and $B$ commute. Therefore, using the matrix differential resultant we compute \begin{equation}\label{def-resultant} f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu), \end{equation} the defining polynomial of the affine plane algebraic curve \begin{equation}\label{eq-scurve} \Gamma=\{(\lambda,\mu)\in C^2\mid f(\lambda,\mu)=0\}. \end{equation} We will call $\Gamma$ \texttt{the spectral curve} of the pair $L,B$. In sections \ref{sec-BC} and \ref{sec-Classification} we establish an isomorphism between the ring of this curve and the commutative subring $C[L,B]$ of the ring of MODOs, under the appropriate hypothesis for $\Gamma$. In general $\Gamma$ is not an irreducible curve, that is, $\Gamma$ may have more than one irreducible component. In Section \ref{sec-AKNS}, we give Example \ref{ex-irreducible} with an irreducible spectral curve and Example \ref{ex-nonirred} where the spectral curve has two irreducible components. Thus one open issue is to characterize the irreducibility of the curve $\Gamma$ or study the role of the irreducible components of $\Gamma$ in the study of the direct and inverse spectral problems. \medskip {To finish this section, applying Theorem A to the pair $L-\lambda$ and $B-\mu$ we conclude that the spectral problem \eqref{eq-eigenProblem} is a coupled problem.} \begin{corollary}\label{cor-coupled} Given commuting matrix differential operators $L$ and $B$ in $R_{\ell}$[D], with $L$ of order one and invertible leading coefficient. Let us consider the polynomial $f(\lambda,\mu)$ defined by ${\rm DRes}(L-\lambda,B-\mu)$. The spectral problem \eqref{eq-eigenProblem} has a nontrivial solution in $\mathcal{E}^{\ell}$ if and only if $f(\lambda,\mu)=0$. \end{corollary} \section{{The ideal of Burchnall-Chaundy polynomials}}\label{sec-BC} Let us consider commuting matrix differential operators $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, of respective orders $1$ and $n\geq 1$. We assume that the leading coefficient of $L$ is an invertible matrix. Using the matrix differential resultant we compute \begin{equation}\label{def-resultant} f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu), \end{equation} the defining polynomial of the spectral curve $\Gamma$ of the pair $L,B$, see \eqref{eq-scurve}. We will prove next that $f$ is a polynomial of Burchnall-Chaundy type for the pair of commuting MODOs $L,B$. That is, when $\lambda$ is replaced by $L$ and $\mu$ is replaced by $B$ then $f$ becomes the zero matrix differential operator. \medskip We establish a morphism of rings \begin{equation}\label{eq-rho} \rho:C[\lambda,\mu]\longrightarrow \mathcal{R}_{\ell}[D], \end{equation} defined by $\rho (c)=c I_{\ell}$, for every $ c\in C$, \begin{equation}\label{eq-morphism1} \lambda\mapsto L\mbox{ and }\mu\mapsto B . \end{equation} Thus \[\sum a_{i,j} \lambda^i\mu^j \mapsto \sum a_{i,j} L^iB^j.\] Observe that the image of $\rho$ is a commutative subalgebra of $\mathcal{R}_{\ell}[D]$, namely the commutative algebra \begin{equation} C[L,B]:=\left\{\sum a_{i,j} L^iB^j\mid a_{i,j}\in C\right\}. \end{equation} Given $g\in C[\lambda,\mu]$ we will denote its image $\rho(g)$ by $g(L,B)$. \medskip Let us consider the kernel ${\rm Ker} (\rho)$ of $\rho$ and observe that the polynomials in ${\rm Ker} (\rho)$ play the role of Burchnall-Chaundy polynomials in the case of ODOs \cite{BC1}. \begin{definition} Given a pair of commuting MODOs $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, with $L$ of order $1$ and invertible leading coefficient matrix, we will say that $g\in C[\lambda,\mu]$ is \texttt{a Burchnall-Chaundy (BC) polynomial} of the pair $L,B$ if $$g(L,B)={\bf 0}.$$ \end{definition} We will prove next that $f$ defined in \eqref{def-resultant} is a BC polynomial for $L,B$, that is, we will prove that ${\rm Ker}(\rho)$ is a non null ideal. \begin{theorem}\label{thm-ideal1} Given commuting MODOs $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, we assume that $L$ has order $1$, with invertible leading coefficient. Let us consider the polynomial $f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu)$ in $C[\lambda,\mu]$. Then $f$ is a Burchnall-Chaundy polynomial for the pair $L,B$. \end{theorem} \begin{proof} Let us prove that $f$ belongs to ${\rm Ker}(\rho)$. \begin{comment} For $\lambda$ \textcolor{red}{any complex number}\textcolor{green}{es necesario especializar? creo que segun la definicion que viene despues no. Empezaria la frase en We...}\textcolor{red}{Marian: creo que con el resultado del apendice ya se puede escribir xomo tu quieres.} \end{comment} We denote by $V_\lambda$ the eigenspace of $L$ corresponding to the eigenvalue $\lambda$, { \begin{equation} V_{\lambda}=\{\psi\in \mathcal{E}^{\ell}\mid D\psi=N_{\lambda}\psi\}. \end{equation} } {By Remark \ref{rem-PVE}, $V_\lambda$ is nonzero}, we define $B_\lambda$ as the restriction of $B$ to the eigenspace $V_\lambda$: \begin{equation} B_\lambda : V_\lambda \rightarrow V_\lambda \quad , \quad B_\lambda (\psi) = B\psi = (B-\mu )\psi +\mu \psi = (M+\mu I_{\ell} )\psi , \end{equation} where $M=M(L-\lambda , B-\mu)$ by {Lemma \ref{lem-V}}. In consequence, the matrix differential resultant is the characteristic polynomial of $B_\lambda$ since the following equality holds \begin{equation} \det (B_\lambda -\mu I_{\ell} ) = \det ( M ) = f(\lambda ,\mu ) . \end{equation} By the Cayley-Hamilton Theorem, $f(\lambda , B)={\bf 0} $. In consequence for $\Psi_\lambda $ a fundamental matrix of \eqref{eq-PV-system} the Burchnall–Chaundy type equality holds: \begin{equation}\label{eq-CH} {\bf 0}= f(\lambda , B)\Psi_\lambda = f(L , B)\Psi_\lambda , \textrm{ and then } f(L , B)= {\bf 0}. \end{equation} \end{proof} \begin{definition} In previous notations, we call \texttt{Burchnall-Chaundy (BC) ideal} of the pair $L,B$ to the non zero ideal in $C[\lambda ,\mu ]$ defined as \begin{equation} {\tt BC} (L,B) =Ker (\rho) =\{g\in C[\lambda,\mu]\mid g(L,B)={\bf 0}\}. \end{equation} \end{definition} \medskip From the definition of $\rho$ in \eqref{eq-rho} we can now consider the isomorphism \begin{equation*}\label{eq-iso1} \frac{{C[\lambda,\mu]}}{{\tt BC} (L,B)} \simeq C[L,B]. \end{equation*} We wonder whether $C[L,B]$ is isomorphic to the ring of the curve $\Gamma$ defined in \eqref{eq-scurve}, but one encounters some difficulties related with the algebraic nature of the situation described. More precisely, since we are working with matrices, $C[L,B]$ is not in general an integral domain. In fact, from the previous isomorphism, we know that $C[L,B]$ is an integral domain if and only if ${\tt BC} (L,B)$ is a prime ideal. The next technical lemma will allow us to obtain some conclusions about this issue. \begin{lemma}\label{lem-Delta} Let us assume that $L$ and $B$ commute, and let us consider a fundamental matrix of solutions $\Psi_{\lambda}$ of $LY=\lambda Y$ in $\mathcal{E}^{\ell}$. Given a polynomial $g(\lambda,\mu)=\sum_{i=0}^p a_i(\lambda) \mu^p$ in $C[\lambda, \mu]$ the next identity holds \begin{equation}\label{eq-gDelta} g(\lambda,\mu)\Psi_{\lambda}= g(L,B)\Psi_{\lambda}+\Theta\Psi_{\lambda} \Delta, \end{equation} for some matrix {$\Theta$} with entries in $K[\lambda ,\mu ]$ and some matrix $\Delta$ with entries in the ring of constants $C[\lambda ,\mu ]$, whose determinant equals ${\rm DRes}(L-\lambda,B-\mu)$. \end{lemma} \begin{proof} Let us denote $M=M(L-\lambda,B-\mu)$. Recall that by Lemma \ref{lem-V}, $\mu\Psi_{\lambda}=(B-M)\Psi_{\lambda}$ and by Lemma \ref{lem-Delta}, $M\Psi_{\lambda}=\Psi_{\lambda}\Delta$, for some constant matrix $\Delta$ in $M_{\ell}(C[\lambda,\mu])$. We prove this result by induction in the degree $p$ of $g(\lambda,\mu)$ in $\mu$. We are going to use the following notation: \[ \left( B-\Delta \right)^s := \sum_{k=0}^s (-1)^{s-k}\binom{s}{k}B^k \Psi_{\lambda}\Delta^{s-k} . \] By induction on $p$, it is shown that \begin{equation}\label{eq-mu-p} \mu^p \Psi_{\lambda} = \left( B-\Delta \right)^p . \end{equation} In fact, since $(B-M) \Psi_{\lambda} =\mu \Psi_{\lambda} $, and $M\Psi_{\lambda} = \Psi_{\lambda} \Delta$, we obtain \[ \mu \Psi_{\lambda} = (B-M) \Psi_{\lambda} =B\Psi_{\lambda} -\Psi_{\lambda} \Delta = (B-\Delta )^1 . \] Let us assume the identity holds for degree $p-1$, then \begin{equation*} \begin{array}{ll}\displaystyle \mu^p \Psi_{\lambda} &= \displaystyle \mu (B-\Delta )^{p-1} = \sum_{k=0}^{p-1} (-1)^{p-1-k}\binom{p-1}{k}B^k (B-M) \Psi_{\lambda} \Delta^{p-1-k}=\\ &= \displaystyle \sum_{j=1}^{p-1} (-1)^{p-j} \left[\binom{p-1}{j-1}+\binom{p-1}{j} \right] B^j \Psi_{\lambda} \Delta^{p-j} +B^p \Psi_{\lambda} + (-1)^p \Psi_{\lambda} \Delta^p =\\ &= (B-\Delta)^p . \end{array} \end{equation*} Now, consider an arbitrary polynomial of degree $p$ in $\mu$,\break $g(\lambda,\mu)=\sum_{i=0}^p a_i(\lambda) \mu^p$ in $C[\lambda, \mu]$. Then, applying equality $L\Psi_{\lambda} = \lambda \Psi_{\lambda}$, we obtain \begin{equation} \begin{array}{ll} g(\lambda,\mu) \Psi_{\lambda} &= \displaystyle \sum_{i=0}^p a_i(\lambda) \mu^i \Psi_{\lambda}=\sum_{i=0}^p a_i(\lambda) (B-\Delta)^i =\\ &=\displaystyle \sum_{i=}^p \sum_{k=0}^i (-1)^{i-k} a_i(\lambda) \binom{i}{k} B^k \Psi_{\lambda} \Delta^{i-k} = \\ &=\displaystyle g(L ,B ) \Psi_{\lambda} +\sum_{j=0}^{p-1}\sum_{k=0}^j (-1)^{j-k+1} a_{j+1} (L ) \binom{j+1}{k} B^k \Psi_{\lambda} \Delta^{j-k+1} . \end{array} \end{equation} In consequence, since $ \Psi_{\lambda}\Delta^s = (B-\mu )^{s-1} \Psi_{\lambda} \Delta$ by lemmas \ref{lem-V} and \ref{lem-Delta0}, \begin{equation} g(\lambda,\mu) \Psi_{\lambda} = g(L ,B )\Psi_{\lambda} +\Theta \Psi_{\lambda}\Delta , \end{equation} as indicated in the statement. \end{proof} \begin{theorem}\label{thm-ideal} Let us consider commuting MODOs $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, with $L$ of order one and invertible leading coefficient Given the polynomial $f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu)$ in $C[\lambda,\mu]$, the following inclusions of ideals in $C[\lambda,\mu]$ hold \begin{equation} (f)\subseteq{\tt BC}(L,B)\subseteq (f_{red}), \end{equation} where $f_{red} = h_1 \cdots h_s$, being $h_1 , \dots ,h_s$ the irreducible factors of $f$. \end{theorem} \begin{proof} We know that $(f)\subseteq {\tt BC}(L,B)={\rm Ker}(\rho)$, let us prove the other inclusion. Given $g\in{\rm Ker}(\rho)$, by Lemma \ref{lem-Delta}, \begin{equation} g(\lambda,\mu)\Psi_{\lambda}=\Theta\Psi_{\lambda}\Delta. \end{equation} Taking determinants both sides $g^{\ell}= \det(\Theta)f(\lambda,\mu)$, since $\det(\Delta)=f(\lambda,\mu)$. Observe that $\det(\Theta)\in C[\lambda,\mu]$. This implies that the square free part $f_{red}$ of $f$ divides the square free part of $g$ and proves that ${\rm Ker}(\rho)\subset (f_{red})$. Then, \[ (f)\subset {\tt BC}(L,B)\subseteq (f_{red} ). \] \end{proof} Since the polynomial $f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu)$ may not be irreducible, see Example \ref{ex-nonirred} in Section \ref{sec-AKNS}, the ideal $(f)$ may not be a prime ideal. The next corollary presents the conclusions for an special situation. \begin{corollary}\label{cor-trivial} Let us consider commuting MODOs $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, with $L$ of order one and invertible leading coefficient. Given $f(\lambda,\mu)={\rm DRes}(L-\lambda,B-\mu)$, the following statements hold for some polynomial $h=\mu-R(\lambda)$ in $C[\lambda,\mu]$: \begin{enumerate} \item If $B\in C[L]$ then ${\tt BC}(L,B)=(h)$ and $f(\lambda,\mu)=h^{\ell}$. \item If $f=h^{\ell}$ then ${\tt BC}(L,B)=(h^r)$, for $r$ minimal such that $h(L,B)^r=0$, $1\leq r\leq \ell$. In particular, if $r=1$ then $B\in C[L]$. \end{enumerate} \end{corollary} \begin{proof} Recall that by Lemma \ref{lemma-1} the polynomial $f$ has degree $\ell$ in $\mu$. Observe that if $B\in C[L]$ then $B-R(L)=0$, for some $R(\lambda)\in C[\lambda]$. Thus $h=\mu-R(\lambda)$ belongs to ${\tt BC}(L,B)$ and by Theorem \ref{thm-ideal} then $f_{red}=h$. Thus $f=h^{\ell}$. \end{proof} \section{{Commutative algebras of MODOs }}\label{sec-Classification} As in the previous sections, let us consider $L$ in $\mathcal{R}_{\ell}[D]$ of order one and invertible leading coefficient matrix. Given $B$ in the centralizer of $\mathcal{C}(L)$ of $L$ in $\mathcal{R}_{\ell}[D]$, let us assume that $B$ is non trivial, that is $B\notin C[L]$, see Corollary \ref{cor-trivial}. { In this section we give an algorithm to describe the commutative algebras $C[L,B]$ of MODOs in terms of products of rings of irreducible algebraic curves.} \medskip We start with the case where $\Gamma$ is an irreducible plane algebraic curve, that is, its defining polynomial $f$ has a unique irreducible factor $h$, and then $f=h^\sigma$. {\begin{theorem}\label{thm-isocurve} Let us consider commuting MODOs $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, with $L$ of order one and invertible leading coefficient. Let us assume that $\Gamma$ is an irreducible plane algebraic curve defined by $f=h^{\sigma}$ as in \eqref{def-resultant}. Then $ {\tt BC} (L,B)=(h^r)$ for a positive integer $r$ minimal such that $h(L,B)^r={\bf 0}$, $1\leq r\leq \sigma$. Moreover, \begin{equation} C[L,B]\simeq \frac{{C[\lambda,\mu]}}{(h^r)} . \end{equation} If in addition $f$ is irreducible in $C[\lambda,\mu]$, the algebra $C[L,B]$ is an integral domain whose spectrum is isomorphic to $\Gamma$. \end{theorem} } \begin{proof} By Theorem \ref{thm-ideal} we know that $(h^{\sigma} )\subset{\tt BC} (L,B)\subset (h)$. Then there exists $r$ minimal verifying $1\leq r\leq \sigma$ and $h(L,B)^r=0$. Thus ${\tt BC} (L,B)=(h^r)$. Therefore, if $f$ is irreducible, then $r=1$, and the result follows. \end{proof} \medskip We conclude that if $\Gamma$ is an irreducible and reduced plane algebraic curve, then the commutative ring of MODOs $C[L,B]$ is isomorphic to the ring of rational function on $\Gamma$ and therefore is an integral domain. In addition Theorem \ref{thm-isocurve} indicates that if $f$ is not irreducible, we can check whether its irreducible square free part is a BC polynomial, and otherwise we can find a minimal power $h^r$ which is a BC polynomial for the pair $L,B$. \medskip The previous result allows to complete the classification of commutative algebras of MODOs $C[L,B]$ for order one operators $L$ with invertible leading coefficient matrix when $K$ is any differential field with algebraically closed field of constants $C$, in the zero characteristic case. See Mulase et al. \cite{MuKi} for the differential field $K=C((x))$. \medskip For a non irreducible curve $\Gamma$, whose defining polynomials is $f=h_1^{\sigma_1 } \cdots h_s^{\sigma_s}$, where each $h_i$ is irreducible, we consider now each irreducible component \begin{equation} \Gamma_i=\{(\lambda,\mu)\in C^2\mid h_i(\lambda,\mu)=0\}. \end{equation} We repeat the argument of Theorem \ref{thm-isocurve} for every irreducible component $\Gamma_i$ of the curve $\Gamma$. \medskip {\bf Algorithm \texttt{BC-generator}.} {\it \texttt{Given} commuting MODOs $L$ and $B$ in $\mathcal{R}_{\ell}[D]$, with $L$ of order one and invertible leading coefficient, \texttt{return} a polynomial $F$ in $C[\lambda,\mu]$ such that ${\tt BC}(L,B)=(F)$. \begin{enumerate} \item Compute the differential resultant $f(\lambda,\mu)={\rm DRes}(L-\lambda ,B-\mu)$. \item Factor $f$ to obtain $h_1^{\sigma_1 } \cdots h_s^{\sigma_s }$, each $h_i$ irreducible in $C[\lambda,\mu]$. \item For each $i=1,\ldots ,s$, compute the minimal integer $r_i$, with $1\leq r_i\leq \sigma_i$, such that $$\prod_i h_i(L,B)^{r_i}={\bf 0}.$$ \item \texttt{Return} $F=h_1^{r_1 } \cdots h_s^{r_s}$. \end{enumerate} } We prove the correctness of Algorithm \texttt{BC-generator} in the next proof of Theorem C. \begin{proof}[Proof of Theorem C] By Theorem \ref{thm-ideal}, we have $(f)\subset{\tt BC} (L,B)\subset (h_1 \cdots h_s)$. Since $f(L,B)={\bf 0}$, there exist minimal integers $r_i$, with $1\leq r_i\leq \sigma_i$ such that $$\prod_i h_i(L,B)^{r_i}={\bf 0}.$$ Thus $F=h_1^{r_1}\cdots h_s^{r_s}\in {\tt BC} (L,B)$ and ${\tt BC} (L,B)=(F)$. We can establish the isomorphism in \eqref{eq-decomposition}, using the classical decomposition of the quotient \[C[L,B]\simeq \frac{C[\lambda , \mu ] }{{\tt BC} (L,B)}=\frac{C[\lambda , \mu ] }{(h_1^{r_1 } \cdots h_s^{r_s})},\] see for instance \cite{AM} pag. 7. \end{proof} \section{The AKNS system }\label{sec-AKNS} In 1974, Ablowitz, Kaup, Newell and Segur introduced in \cite{AKNS1974}, a system of integrable nonlinear evolutionary equations called the AKNS system, whose stationary version is the nonlinear differential system \begin{equation}\label{eq-AKNS} \begin{array}{cc} \frac{\imath}{2} v_{xx}+\imath v^2 u & =0 \ ,\\ \frac{\imath}{2} u_{xx}+\imath v u^2 & =0 \ , \end{array} \end{equation} which can be regarded as the complexified nonlinear stationary Sch\"odinger (nS) equation \begin{equation} -\frac{\imath}{2} u_{xx}\pm \imath |u|^2 u =0 , \end{equation} for $v=\mp{u}^\ast$ and $u^\ast$ the complex conjugate of $u$. In \cite{GH}, Gesztesy and Holden provide a matrix recursion for an integrable matrix hierarchy, called the AKNS hierarchy, whose first non trivial member has equations \eqref{eq-AKNS} as integrability conditions. Its matrix presentation provides a pair of MODOs $L$, $B$ in $\mathcal{R}_{2}[D]$ {for matrix coefficients with entries in the differential field $K=\mathbb{C} \langle u, v\rangle$.} Specifically, let $L$ be the $2\times 2$ matrix \begin{equation}\label{mat-1} L=\imath\left[\begin{matrix}D &u\\v&-D\end{matrix}\right] = A_0 +A_1 D, \textrm{with } A_0 =\imath\left[\begin{matrix}0&u\\v&0\end{matrix}\right] , A_1 = \imath\left[\begin{matrix}1&0\\0&-1\end{matrix}\right] \ . \end{equation} Next consider the second order matrix differential operator \begin{equation}\label{mat-2} B= \imath\left[\begin{matrix}-2D^2-uv&-2uD-u_x\\-2vD-v_x&2D^2+uv\end{matrix}\right] = B_0 + B_1 D +B_2 D^2 \ , \end{equation} where \begin{equation*} B_0 =\imath\left[\begin{matrix}-uv&-u_x\\-v_x&uv\end{matrix}\right] \ , \ B_1 = \imath\left[\begin{matrix}0&-2u\\-2v&0\end{matrix}\right] \ , \ B_2 =\imath\left[\begin{matrix}-2&0\\0&2\end{matrix}\right] \ . \end{equation*} This matrix $B$ is matrix $Q_2$ in \cite{GH}, p. $180$, for integration constants $c_1 =0$ and $c_2 =0$ and potentials $p=v$ and $q=-u$. The matrices \eqref{mat-1} and \eqref{mat-2} can be found in \cite{previato} as $L_1$ and $L_2$ respectively, and in that context, $u$ and $v$ are solutions to a complexified non-linear Schr\"odinger (NLS) system, so that below we will take $v$ to be the complex conjugate of $u$, denoted by $u^\ast$, \begin{equation}\label{eq-NLS} u''+2u^2 v =0 \quad , \quad v''+2v^2 u =0 \ . \end{equation} In fact, it is easy to check that the commutator of these operators is the zero order operator \begin{equation} [ L , B ]= \left[\begin{matrix} 0& -u''-2u^2 v \\v''+2v^2 u & 0 \end{matrix} \right], \end{equation} which is the zero operator by \eqref{eq-NLS}. \medskip Next we will study the spectral problem associated with the pair of operators $L, B$. This is the coupled eigenvalues problem \begin{equation}\label{eq-problem} ( L -\lambda I_2)Y = \overline{0} \quad , \quad ( B -\mu I_2)Y = \overline{0} \ . \end{equation} The ${\tt BC}$-ideal in this case is described by the following result. \begin{theorem}\label{thm-2} Let us consider commuting MODOs $L$ and $B$ in $\mathcal{R}_{2}[D]$, with $L$ of order one and invertible leading coefficient. If $B\notin C[L]$ then ${\tt BC} (L,B)=(f)$, for $f(\lambda,\mu)=Dres(L-\lambda,B-\mu)$. \end{theorem} \begin{proof} In the case of matrix coefficients of size $\ell=2$, the polynomial $f$ has degree $2$ in $\mu$, see Lemma \ref{lemma-1} . Hence the options are limited to: \begin{enumerate} \item By Theorem \ref{thm-ideal}, if $f$ is irreducible or has two different irreducible components then ${\tt BC} (L,B)=(f)$. \item If $f$ is the square of a polynomial of type $h=\mu-R(\lambda)$, then by Corollary \ref{cor-trivial}, ${\tt BC} (L,B) =(h)$ if and only if $B=R(L)$. Hence, for $B$ not a polynomial in $L$, we obtain ${\tt BC} (L,B)=(f)$. \end{enumerate} \end{proof} The classification of algebras $C[L,B]$ for MODOs of size $\ell=2$ follows from Theorem \ref{thm-2}: If $f$ has one irreducible component then, by Theorem \ref{thm-isocurve}, then $C[L,B]\simeq C[\lambda,\mu]/(f)$; If $f=h_1\cdot h_2$, by Theorem C, then $C[L,B]\simeq C[\lambda,\mu]/(h_1)\times C[\lambda,\mu]/(h_2)$. \vspace{0.5cm} The differential resultant ${\rm DRes}(L-\lambda,B-\mu)$ is the determinant of the $2\times 2$ matrix defined in \eqref{def-Dres} for $N_{\lambda}$, \begin{align} N_{\lambda}&=-A_1^{-1}(A_0-\lambda I_2)\\ M(L -\lambda, B-\mu)&=B_0-\mu I_2 +B_1 N_{\lambda}+B_2 (N_{\lambda}^2 +N'_{\lambda})=\\ &= \left[\begin{matrix} -\imath u v +2 \,\imath{\lambda}^{2}-\mu&\imath u' +2\, u \lambda\\ \noalign{\medskip}\imath v' -2\,v \lambda&\imath u v -2\,\imath{\lambda}^{2}-\mu \end{matrix}\right] . \end{align} Moreover, \begin{equation}\label{eq-spectralCurve} f(\lambda , \mu) = {\rm DRes} (L-\lambda,B-\mu)= {\mu}^{2}+ 4\,{\lambda}^{4}+ I_0 \lambda+ I_1 \ \end{equation} where the differential polynomials $I_0 = u^{2} v^{2}+ v'u'$ and $I_1 = -2\,i v' u +2\,i u' v$ are first integrals of the NLS equation \eqref{eq-NLS}, since \[ I'_0 = 2uu'v^2+2u^2vv' +v'' u' +vu'' =0 \ , \ I'_1 = -2\imath v'' u +2\imath u'' v=0. \] Consequently, the polynomial \eqref{eq-spectralCurve} defines a plane algebraic curve $\Gamma$ in $\mathbb{C}^2$, the spectral curve. \vspace{0.5cm} Now assume that $M(L-\lambda, B-\mu)$ has zero determinant $f(\lambda,\mu)=0$. Let $V_\lambda$ be kernel of $L -\lambda$. If we consider the operator $B -\mu$ restricted to $V_\lambda$, we obtain \begin{equation} \begin{array}{ll} (B -\mu)\psi = & (B_0 -\mu I)\psi +B_1 D\psi +B_2 D^2 \psi =M(L-\lambda, B-\mu) \psi \ . \end{array} \end{equation} The linear map \begin{equation} \xi: E^2 \rightarrow E^2 \ , \ \xi (\psi ): = M(L-\lambda, B-\mu)\psi , \end{equation} has a nontrivial kernel $\mathcal{L}$, \begin{equation}\label{eq-FiberBundel} \mathcal{L} = \left\{ (\psi_1 ,\psi_2 ) \ : \ \left(-\imath u v +2 \,\imath{\lambda}^{2}-\mu\right) \psi_1 + \left( \imath u' +2\, u \lambda \right) \psi_2 =0 \ \right\} \ . \end{equation} This kernel defines the (rank $1$) fiber bundle over the spectral curve $\Gamma$, and the rational function in {the fraction field of $K[\lambda,\mu]/(f)$} \begin{equation}\label{eq-phi} \phi = -\frac{-\imath u v +2 \,\imath{\lambda}^{2}-\mu}{\imath u' +2\, u \lambda} = \frac{\psi_2 }{\psi_1 } \end{equation} satisfies the Riccati-type equation $\phi'-u \phi^2 -2 \imath \lambda \phi - v=0$, since \[ \phi'-u \phi^2 -2 \imath \lambda \phi - v =-u \cdot f(\lambda ,\mu) =0\ , \] in total agreement with \cite{GH}, formula (3.62) with $p=v$ and $q=-u$. \begin{ex}\label{ex-irreducible} If we consider $K=\mathbb{C}(e^{2\imath x})$ and the NLS potentials $ u(x)=e^{-2\imath x} $, $ v(x)= 2 e^{2\imath x} $, then \[ L=\imath\left[\begin{matrix}D &e^{-2\imath x}\\2 e^{2\imath x}&-D\end{matrix}\right] \ , \ B= \imath\left[\begin{matrix}-2D^2-2&-2e^{-2\imath x}D+2\imath e^{-2\imath x}\\-4 e^{2\imath x}D-4\imath e^{2\imath x}&2D^2+2\end{matrix}\right] . \] Consequently, the spectral curve is $ f(\lambda , \mu )= \mu^2 +4 (\lambda+1)^2 (\lambda^2-2\lambda+3) =0 $. Observe that this curve is an irreducible singular curve. The algebra $C[L,B]$ is isomorphic to the domain $\frac{C[\lambda , \mu ] }{(f)}$. The common solution of the coupled spectral problem \eqref{eq-problem} is \[ \Psi= \begin{pmatrix} 1 \\ \phi \end{pmatrix}\ \textrm{ with } \phi=\displaystyle -\frac{-2\imath +2\imath \lambda^2 -\mu}{2+2\lambda}\cdot e^{2 \imath x }\ . \] \end{ex} \begin{ex}\label{ex-nonirred} Next consider $K=\mathbb{C}(x)$ and the NLS potentials $u(x)=x$ and $v(x)=0$. Then $f(\lambda , \mu )= \mu^2 +4\lambda^4$ and $\phi=-\frac{2i\lambda^2-\mu}{i+2x\lambda}$. We know that $f(L,B)={\bf 0}$ but one can easily check that non of the irreducible components of $f$, namely $h_1 (\lambda,\mu )=\mu -2i\lambda^2$ nor $h_2 (\lambda,\mu )=\mu +2i\lambda^2$ are BC polynomials for the pair $L,B$. The decomposition \eqref{eq-decomposition} in Theorem C gives the ring structure of $C[L,B]\simeq C[\lambda ,\mu ]/(\mu^2 +4\lambda^4 ) $ as the product of $C[\lambda ,\mu ]/(h_i )$. In particular ${\bf 0}\in C[L,B]$ corresponds to {$(0,0)\in C[\lambda ,\mu ]/(h_1 ) \times C[\lambda ,\mu ]/(h_2 )$}; in other words, for a polynomial $g\in \mathbb{C}[\lambda ,\mu]$ we have \[ g(L,B)={\bf 0} \Longleftrightarrow h_1 | g \quad \textrm{and}\quad h_2 | g . \] \end{ex} \subsection*{Acknowledgements} S.L.~Rueda is partially supported by Research Group ``Modelos ma\-tem\'aticos no lineales''. M.A.~Zurro is partially supported by Grupo UCM 910444. S.L.~Rueda and M.A.~Zurro partially supported by the grant PID2021-124473NB-I00, ``Algorithmic Differential Algebra and Integrability" (ADAI) from the Spanish MICINN.
\section{Introduction and main results} The Coulomb gas ensemble in the complex plane is governed by the law \begin{equation} \label{Gibbs cplx beta} d P_N^{(\beta)}(z_1,\dots,z_N) :=\frac{1}{Z_N^{(\beta)}} \prod_{j>k=1}^N |z_j-z_k|^{\beta} \prod_{j=1}^N e^{-\frac{\beta N}{2} Q(z_j)}\, dA(z_j), \end{equation} where $N$ is the number of particles, $\beta$ is the inverse temperature and $dA(z):=d^2z/\pi$ is the area measure. Here, $Q:\mathbb{C} \to \mathbb{R}$ is called the confining/external potential that satisfies suitable potential theoretic conditions. We refer to \cite{forrester2010log,Lewin22,Serfaty} and references therein for recent developments of two-dimensional Coulomb gases. Contrary to \eqref{Gibbs cplx beta}, the configurational canonical Coulomb gas ensemble in the upper-half plane \cite{kiessling1999note} (cf. \cite[Appendix A]{byun2022spherical}) has an additional complex conjugation symmetry (i.e. the particles come in complex conjugate pairs) and is governed by the law \begin{equation} \label{Gibbs symplectic beta} d \widetilde{P}_N^{(\beta)}(z_1,\dots,z_N) :=\frac{1}{ \widetilde{Z}_N^{(\beta)}} \prod_{j>k=1}^N |z_j-z_k|^\beta |z_j-\bar{z}_k|^\beta \prod_{j=1}^N |z_j-\bar{z}_j|^\beta \, e^{-\beta N Q(z_j)}\, dA(z_j). \end{equation} In \eqref{Gibbs cplx beta} and \eqref{Gibbs symplectic beta}, the normalization constants \begin{align} \label{Zn normal def} Z_N^{(\beta)}&:=\int_{\mathbb{C}^N} \prod_{j>k=1}^N |z_j-z_k|^\beta \prod_{j=1}^N e^{-\frac{\beta N}{2} Q(z_j)}\, dA(z_j), \\ \widetilde{Z}_N^{(\beta)}&:= \int_{\mathbb{C}^N} \prod_{j>k=1}^N |z_j-z_k|^\beta |z_j-\bar{z}_k|^\beta \prod_{j=1}^N |z_j-\bar{z}_j|^\beta \, e^{-\beta N Q(z_j)}\, dA(z_j) \label{Zn symplectic def} \end{align} that make \eqref{Gibbs cplx beta} and \eqref{Gibbs symplectic beta} probability measures are called partition functions. Furthermore, the logarithm of a partition function (divided by $N^2$) is often called free energy. For the special value $\beta=2$, \eqref{Gibbs cplx beta} and \eqref{Gibbs symplectic beta} represent joint probability distributions of the random normal matrix and planar symplectic ensembles, respectively. In particular, if $Q(z)=|z|^2$, these correspond to the complex and symplectic Ginibre ensembles \cite{ginibre1965statistical}. An important feature of this special value $\beta=2$ is that, due to the Vandermonde determinant terms, the ensembles \eqref{Gibbs cplx beta} and \eqref{Gibbs symplectic beta} form \emph{determinantal} and \emph{Pfaffian} point processes in the plane \cite{forrester2010log}, respectively. In other words, all their correlation functions can be expressed in terms of the (pre-)kernel of planar (skew-)orthogonal polynomials. In the sequel, for $\beta=2$, we omit the superscript $(\beta)$ in \eqref{Zn normal def} and \eqref{Zn symplectic def}, and simply write $Z_N \equiv Z_N^{(2)}$ and $\widetilde{Z}_N \equiv \widetilde{Z}_N^{(2)}$. We mention that the definition of partition functions \eqref{Zn normal def} and \eqref{Zn symplectic def} is more common in the statistical physics community. On the other hand, in the random matrix theory community, another widely used convention for the (canonical) partition functions is \begin{equation} \label{partition another convention} \mathcal{Z}_N:=\frac{1}{N!} Z_N, \qquad \widetilde{\mathcal{Z}}_N:= \frac{1}{N!} \widetilde{Z}_N, \end{equation} see e.g. \cite[Section 1.4]{forrester2010log}. The prefactor $1/N!$ in \eqref{partition another convention} allows writing $\mathcal{Z}_N$ and $\widetilde{\mathcal{Z}}_N$ in terms of a structured determinant and Pfaffian, respectively. In this work, we study the asymptotic expansions of $Z_N$ and $\widetilde{Z}_N$ as $N \to \infty$. \subsection{Summary of previous results} Before introducing our results, let us summarize some known results on the asymptotics of $Z_N^{(\beta)}$ for general $\beta$ and $Q$. Cf. the literature on $\widetilde{Z}_N^{(\beta)}$ is much more limited. \begin{itemize} \item \textbf{(Zabrodin-Wiegmann prediction)} In \cite{MR2240466}, it was predicted that the partition function $Z_N^{(\beta)}$ has an asymptotic expansion of the form \begin{equation} \label{ZW formula} \log Z_N^{(\beta)} = C_0 N^2+ C_1 N \log N +C_2 N +C_3 \log N + C_4 +O(\frac{1}{N}). \end{equation} Furthermore, they proposed explicit formulas for the constants $C_j\equiv C_j(\beta,Q)$ $(j=0,\dots,4)$ depending on $\beta$ and $Q$, cf. \eqref{ZW formula radial}. (See also \cite{can2015exact,jancovici1994coulomb} for a similar prediction in a different setup.) Incidentally, the formulas for $C_3$ and $C_4$ in \cite{MR2240466} have been controversial as pointed out for instance in \cite{sandier20152d,serfaty2020gaussian}. \smallskip \item \textbf{(Asymptotic of the leading order $O(N^2)$-term)} It was shown in \cite[Theorem 2.11]{HM13} and \cite[Theorem 1.1]{chafai2014first} (among others) that as $N \to \infty$, \begin{equation} \log Z_N^{(\beta)} = -\frac{\beta}{2}N^2 I_Q[\mu_Q] + o(N^2). \end{equation} Here $\mu_Q$ is Frostman's equilibrium measure \cite{ST97}, a unique probability measure that minimizes the weighted logarithmic energy \begin{equation} \label{IQ functional} I_Q[\mu] := \iint_{\mathbb{C}^2} \log|z-w| \,d\mu(z)\,d\mu(w) + \int_{\mathbb{C}} Q \,d\mu. \end{equation} \item \textbf{(Asymptotic up to the $O(N)$-term)} It was shown by Lebl\'{e} and Serfaty \cite[Corollary 1.1]{MR3735628} that as $N \to \infty$, \begin{equation} \label{LS formula} \log Z_N^{(\beta)} = -\frac{\beta}{2}N^2 I_Q[\mu_Q] + \frac{\beta}{4}N \log N - \Big( C(\beta) + \Big(1-\frac{\beta}{4}\Big) E_Q[\mu_Q] \Big) N+ o(N), \end{equation} where $C(\beta)$ is a constant independent of the potential $Q$ and \begin{equation}\label{entropy} E_Q[\mu_Q] := \int_{\mathbb{C}} \log (\Delta Q) \, d\mu_{Q} \end{equation} is the entropy associated with $\mu_Q$. Here, $\Delta:=\partial \bar{\partial}$ is the quarter of the usual Laplacian. We refer the reader to \cite{bauerschmidt2016two,serfaty2020gaussian} for the expansion \eqref{LS formula} with quantitative error bounds. \end{itemize} Beyond the general cases mentioned above, for $\beta=2$ with a specific (and fundamental from the random matrix theory viewpoint) potential, there have been several works on the precise asymptotic expansion of the partition functions, see e.g. \cite{charlier2021large,charlier2021asymptotics} and references therein. This type of potential usually contains certain singularities. As a result, the asymptotic expansions of the associated partition functions are more complicated (for instance, some non-trivial $O(\sqrt{N})$ terms appear as well). Several topics in this direction will be discussed in a separate remark at the end of the next subsection. \subsection{Main results} We study asymptotic behaviors of $Z_N$ and $\widetilde{Z}_N$ for the exactly-solvable case where $Q$ is radially symmetric. Our main findings are summarized as follows. \begin{enumerate}[label=(\roman*)] \item We derive the large-$N$ expansions of $\log Z_N$ and $\log \widetilde{Z}_N$ up to and including the $O(1)$-terms. \smallskip \item In the large-$N$ expansions, the formulas of the $O(\log N)$- and $O(1)$-terms depend on whether the limiting spectrum is an \emph{annulus} or a \emph{disc}, see Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc}, respectively, cf. Figure~\ref{fig:droplets}. (This distinction is crucial in the asymptotic analysis but seems not considered in \cite{MR2240466}.) \smallskip \item For the partition function $Z_N$ of random normal matrix ensembles, our expansions \eqref{ZN expansion cplx annulus} and \eqref{ZN expansion cplx disc} up to the $O(N)$-terms agree with the formula \eqref{LS formula} with $\beta=2$. Furthermore, we verify from \eqref{ZN expansion cplx disc} that the asymptotic formula given in \cite[Eqs.(1.2), (C.7)]{MR2240466} holds up to an additive constant \eqref{ZW missing}. \smallskip \item For the partition function $\widetilde{Z}_N$ of planar symplectic ensembles, the asymptotic formulas \eqref{ZN expansion symp annulus} and \eqref{ZN expansion symp disc} are new to the best of our knowledge. Contrary to \eqref{LS formula}, the $O(N)$-terms in these expansions contain not only the entropy but also the logarithmic potential \eqref{logarithmic potential}. \end{enumerate} \begin{figure}[h!] \begin{center} \centering \includegraphics[width=0.8\textwidth]{droplets.png} \caption{Eigenvalues of complex Ginibre (left) and complex induced Ginibre (right) matrices where $N=1000$.} \label{fig:droplets} \end{center} \end{figure} Let us be more precise in introducing our results. It is well known \cite{MR2934715,HM13} that under some mild assumptions on $Q$, as $N \to \infty$, the empirical measures $\frac{1}{N}\sum_{j=1}^N \delta_{z_j}$ of \eqref{Gibbs cplx beta} and \eqref{Gibbs symplectic beta} weakly converge to $\mu_Q$, which takes the form \begin{equation} \label{eq msr Lap Q} d\mu_Q =\Delta Q \cdot \mathbbm{1}_S \,dA. \end{equation} Here $S \equiv S_Q$ is a certain compact subset of $\mathbb{C}$ called the \emph{droplet}, see Figure~\ref{fig:droplets}. We consider the case where the external potential $Q$ is radially symmetric, i.e. $Q(z) = q(|z|)$ for some function $q$ defined in $[0,\infty)$. We assume the basic growth condition \begin{equation} \label{Q growth condition} \liminf_{ |z| \to \infty } \frac{Q(z)}{ 2\log |z| } >1, \end{equation} which guarantees that $Z_N, \widetilde{Z}_N < +\infty.$ Furthermore, we assume that $Q$ is smooth, subharmonic in $\mathbb{C}$, and strictly subharmonic in a neighborhood of the droplet. In terms of the function $q,$ the latter conditions are equivalent to the requirements that $r q'(r)$ is increasing on $(0,\infty)$, and strictly increasing in a neighborhood of the droplet, cf. \eqref{Delta Q q' q''}. Under the above assumptions, the droplet is given by \begin{equation} \label{droplet} S = \mathbb{A}_{r_0,r_1}:= \{z \in \mathbb{C} : r_0 \leq |z| \leq r_1\}, \end{equation} where $r_0$ is the largest solution to $r q'(r)=0$ and $r_1$ is the smallest solution to $r q'(r)=2$, see \cite[Section IV.6]{ST97}. (We mention that the annular droplets often appear in non-Hermitian random matrix theory, see e.g. \cite{MR2831116}.) In particular, if $r_0=0$, we denote $\mathbb{D}_{r_1}= \mathbb{A}_{0,r_1}.$ Henceforth, we keep the assumptions on $Q$ described above. For a radially symmetric potential $Q$, by using \eqref{eq msr Lap Q} and \eqref{droplet}, one can show that the energy $I_Q[\mu_Q]$ in \eqref{IQ functional} is given by \begin{equation} \label{energy radially sym} I_Q[\mu_Q]=q(r_1)-\log r_1 -\frac14 \int_{r_0}^{r_1} rq'(r)^2\,dr. \end{equation} Similarly, in terms of the logarithmic potential \begin{equation} \label{logarithmic potential} U_\mu(z) = \int \log\frac1{|z-w|}\, d\mu(w), \end{equation} we have \begin{equation} \label{potential radially sym} U_{\mu_Q}(0) = -\int_{S}\log |w| \, d\mu_Q(w) = - \log r_1 + \frac{q(r_1)-q(r_0)}{2}. \end{equation} See \cite[Section IV.6]{ST97} for more details. \medskip For the annular droplet case, we have the following. \begin{thm} \textbf{\textup{(Large-$N$ expansion of the partition functions: annular droplet case)}} \label{Thm_ZN annulus} Suppose that $r_0>0$, i.e. the droplet $S$ in \eqref{droplet} is an annulus. Let \begin{equation} \label{FQ annulus} F_Q[\mathbb{A}_{r_0,r_1}] := \frac{1}{12} \log\Big( \frac{ r_0^2\Delta Q(r_0) }{ r_1^2\Delta Q(r_1) } \Big) -\frac{1}{16} \Big( r_1 \frac{ (\d_r \Delta Q)(r_1) }{ \Delta Q(r_1) } - r_0 \frac{ (\d_r \Delta Q)(r_0) }{ \Delta Q(r_0) } \Big) +\frac{1}{24} \int_{r_0}^{r_1} \Big( \frac{ \d_r \Delta Q(r) }{ \Delta Q(r) }\Big)^2\,r \,dr. \end{equation} Then as $N \to \infty,$ the following holds. \begin{enumerate}[label=(\roman*)] \item \textup{\textbf{(Random normal matrix ensemble)}} We have \begin{equation} \label{ZN expansion cplx annulus} \begin{split} \log Z_N &= -N^2 I_Q[\mu_Q] + \frac{1}{2}N\log N + \Big( \frac{\log(2\pi)}{2}-1- \frac12 E_Q[\mu_Q] \Big) \, N \\ &\quad + \frac{1}{2}\log N + \frac{\log (2\pi)}{2} +F_Q[\mathbb{A}_{r_0,r_1}] + O(N^{-1}). \end{split} \end{equation} \item \textup{\textbf{(Planar symplectic ensemble)}} We have \begin{equation} \begin{split} \label{ZN expansion symp annulus} \log \widetilde{Z}_N & = -2N^2 I_Q[\mu_Q] +\frac{1}{2}N \log N + \Big( \frac{ \log(4\pi) }{2}-1 - U_{\mu_Q}(0) -\frac12 E_Q[\mu_Q] \Big) N \\ &\quad+\frac12 \log N + \frac{\log(2\pi)}{2} +\frac12 F_Q[\mathbb{A}_{r_0,r_1}]+\frac{1}{8} \log \Big( \frac{ \Delta Q(r_0) }{ \Delta Q(r_1) } \Big) +O(N^{-1}). \end{split} \end{equation} \end{enumerate} \end{thm} Using the convention \eqref{partition another convention} together with \eqref{log N!}, our result can also be rewritten as \begin{equation} \label{ZN expansion cplx annulus v2} \begin{split} \log \mathcal{Z}_N &=-N^2 I_Q[\mu_Q] - \frac{1}{2}N\log N + \Big( \frac{\log(2\pi)}{2}- \frac12 E_Q[\mu_Q] \Big) \, N +F_Q[\mathbb{A}_{r_0,r_1}] + O(N^{-1}). \end{split} \end{equation} and \begin{equation} \begin{split} \label{ZN expansion symp annulus v2} \log \widetilde{\mathcal{Z}}_N & = -2N^2 I_Q[\mu_Q] - \frac{1}{2}N\log N + \Big( \frac{ \log(4\pi) }{2} - U_{\mu_Q}(0) -\frac12 E_Q[\mu_Q] \Big) N \\ &\quad +\frac12 F_Q[\mathbb{A}_{r_0,r_1}]+\frac{1}{8} \log \Big( \frac{ \Delta Q(r_0) }{ \Delta Q(r_1) } \Big) +O(N^{-1}). \end{split} \end{equation} We mention that these formulas \eqref{ZN expansion cplx annulus v2} and \eqref{ZN expansion symp annulus v2} as well as the formulas \eqref{ZN expansion cplx disc v2} and \eqref{ZN expansion symp disc v2} below are more convenient to compare with some asymptotic results in the previous literature \cite{charlier2021large,charlier2021asymptotics}. Notice that the term $\log (r_1/r_0)$ is the extremal length of the annulus \eqref{droplet}, see e.g. \cite[p.142]{garnett2005harmonic}. It is worth pointing out that a characteristic difference between the expansions \eqref{ZN expansion cplx annulus} and \eqref{ZN expansion symp annulus} is the appearance of the logarithmic potential $U_{\mu_Q}(0)$ in the $O(N)$-term of \eqref{ZN expansion symp annulus}. This additional term can be interpreted as \begin{equation} \label{renormalized energy} - \int_S \log|w-\bar{w}| \,d\mu_Q(w) \end{equation} after a proper renormalization. The interpretation \eqref{renormalized energy} is natural from the perspective of the repulsion term $ |z_j-\bar{z}_j|^\beta $ in \eqref{Gibbs symplectic beta} and is closely related to the notion of the next-order energy, see e.g. \cite{leble2018fluctuations}. (We thank T. Lebl\'{e} for pointing out this.) In Subsection~\ref{Subsec_ML} we present an example of Theorem~\ref{Thm_ZN annulus} for the Mittag-Leffler ensembles from which we expect that the error terms $O(N^{-1})$ are optimal. \medskip For the disc droplet case, we have the following. \begin{thm} \textbf{\textup{(Large-$N$ expansion of the partition functions: disc droplet case)}} \label{Thm_ZN disc} Suppose that $r_0=0$, i.e. the droplet $S$ in \eqref{droplet} is a disc. Let \begin{equation} \begin{split} \label{FQ disc} F_Q[\mathbb{D}_{r_1}] := \frac{1}{12} \log\Big( \frac{ 1 }{ r_1^2 \Delta Q(r_1) } \Big) -\frac{1}{16} r_1 \frac{ (\d_r \Delta Q)(r_1) }{ \Delta Q(r_1) } +\frac{1}{24} \int_{0}^{r_1} \Big( \frac{ \d_r \Delta Q(r) }{ \Delta Q(r) }\Big)^2\,r \,dr. \end{split} \end{equation} Then as $N \to \infty,$ the following holds. \begin{enumerate}[label=(\roman*)] \item \textup{\textbf{(Random normal matrix ensemble)}} We have \begin{align} \begin{split} \label{ZN expansion cplx disc} \log Z_N &= -N^2 I_Q[\mu_Q] + \frac{1}{2}N\log N + \Big( \frac{\log(2\pi)}{2}-1- \frac12 E_Q[\mu_Q] \Big) \, N + \frac{5}{12}\log N \\ &\quad + \frac{\log (2\pi)}{2} + \zeta'(-1)+ F_Q[\mathbb{D}_{r_1}] + O(N^{-\frac{1}{12}}( \log N)^{3}). \end{split} \end{align} \item \textup{\textbf{(Planar symplectic ensemble)}} We have \begin{align} \begin{split} \label{ZN expansion symp disc} \log \widetilde{Z}_N & = -2N^2 I_Q[\mu_Q] +\frac{1}{2}N \log N + \Big( \frac{ \log(4\pi) }{2}-1 - U_{\mu_Q}(0) -\frac12 E_Q[\mu_Q] \Big) N+\frac{11}{24} \log N \\ &\quad + \frac{\log(2\pi)}{2}+\frac{1}{2}\zeta'(-1) +\frac12 F_Q[\mathbb{D}_{r_1}]+\frac{5}{24}\log2+ \frac{1}{8} \log \Big( \frac{ \Delta Q(0) }{ \Delta Q(r_1) } \Big) + O(N^{-\frac{1}{12}} (\log N)^3). \end{split} \end{align} \end{enumerate} Here $\zeta$ is the Riemann zeta function. \end{thm} Again, using the convention \eqref{partition another convention}, we have \begin{align} \begin{split} \label{ZN expansion cplx disc v2} \log \mathcal{Z}_N &= -N^2 I_Q[\mu_Q] - \frac{1}{2}N\log N + \Big( \frac{\log(2\pi)}{2}- \frac12 E_Q[\mu_Q] \Big) \, N - \frac{1}{12}\log N \\ &\quad + \zeta'(-1)+ F_Q[\mathbb{D}_{r_1}] + O(N^{-\frac{1}{12}}( \log N)^{3}) \end{split} \end{align} and \begin{align} \begin{split} \label{ZN expansion symp disc v2} \log \widetilde{\mathcal{Z}}_N & = -2N^2 I_Q[\mu_Q] - \frac{1}{2}N \log N + \Big( \frac{ \log(4\pi) }{2} - U_{\mu_Q}(0) -\frac12 E_Q[\mu_Q] \Big) N-\frac{1}{24} \log N \\ &\quad +\frac{1}{2}\zeta'(-1) +\frac12 F_Q[\mathbb{D}_{r_1}]+\frac{5}{24}\log2+ \frac{1}{8} \log \Big( \frac{ \Delta Q(0) }{ \Delta Q(r_1) } \Big) + O(N^{-\frac{1}{12}} (\log N)^3). \end{split} \end{align} In Subsection~\ref{Subsec_truncated}, we provide an example of Theorem~\ref{Thm_ZN disc} for truncated unitary ensembles. Contrary to Theorem~\ref{Thm_ZN annulus}, the error terms in Theorem~\ref{Thm_ZN disc} do not coincide with the expected optimal orders $O(N^{-1})$. Our error bounds originate from a decomposition of the analytic expressions of $Z_N,\widetilde{Z}_N$ (see Subsection~\ref{Subsec_outline}), which depends on sufficiently large but seemingly arbitrary number $m_N>0.$ (Such a decomposition was not necessary for the proof of Theorem~\ref{Thm_ZN annulus}.) Later, we choose $m_N=N^{1/6}$ that gives rise to the control of the total error bounds presented in Theorem~\ref{Thm_ZN disc}. We mention that such error estimates also naturally appeared in similar computations, see e.g. \cite{byun2022characteristic,charlier2021large,charlier2021asymptotics}. Nevertheless, we expect that the estimates can be improved with more effort. In terms of the function $\chi:= \frac12 \log \Delta Q$, one can rewrite \eqref{FQ disc} as \begin{equation} \label{FQ disc v2} F_Q[\mathbb{D}_{r_1}] =\frac{1}{12}\log\Big( \frac{1}{r_1^2}\Big) -\frac{1}{12\pi} \oint_{ \partial S } \kappa \, \chi\,ds -\frac{1}{4} \int_S \Delta \chi \,dA + \frac{1}{12} \int_S | \nabla \chi |^2 \,dA, \end{equation} where $S=\mathbb{D}_{r_1}$ and $\kappa=1/r_1$ is the curvature of the boundary, see \cite[p.8960]{MR2240466} and \eqref{ZW F0 12 1}. Here, the third term $\int_S \Delta \chi \,dA$ on the right-hand side of \eqref{FQ disc v2} is known as a ``zero mode'' of the loop operator (cf. \cite[Eq.(5.26)]{MR2240466}), whereas the fourth term corresponds to the Dirichlet energy of $\chi$. We end this subsection by giving some crucial remarks on our theorems. \begin{rem}[\textbf{Comparison with Zabrodin-Wiegmann formula}] We compare our formula \eqref{ZN expansion cplx disc} with the prediction by Zabrodin and Wiegmann. For $\beta=2$ and a radially symmetric $Q$ associated with a disc droplet of radius $r_1$, the asymptotic formula \eqref{ZW formula} is written in \cite[Eqs.(1.2),(C.7)]{MR2240466} as \begin{equation} \begin{split} \label{ZW formula radial} \log Z_N &=F_0 N^2 + F_{1/2} N +F_1 +c(N) +O(N^{-1}), \qquad \Big( c(N):=\log N! -\frac{1}{2}N \log N + \gamma N \Big) \\ &= F_0 N^2+ \frac12 N \log N + \Big( \gamma-1+F_{1/2} \Big) N +\frac12 \log N + \frac{ \log(2\pi) }{ 2 } +F_1 +O(N^{-1}), \end{split} \end{equation} where $\gamma$ is a ``numerical'' constant \cite[p.8938]{MR2240466} (that is not explicitly presented). (For reader's convenience, let us mention that in \cite{MR2240466}, the authors use a different convention for $\beta$ so that $\beta=2$ in our case corresponds to $\beta=1$ in \cite{MR2240466}. Furthermore, the Planck constant $\hbar$ in \cite{MR2240466} is identified as $1/N$.) The coefficients $F_0, F_{1/2}$ and $F_1$ in \eqref{ZW formula radial} are given by \begin{align} F_0&:= \pi \int_0^{r_1^2} ( W_{ \textrm{rad} }(x)-W_{ \textrm{rad} }'(x) x \log x ) \sigma_{ \textrm{rad} }(x) \,dx, \label{F0 ZW} \\ F_{1/2} &:= -\frac{\pi}{2} \int_0^{r_1^2} \sigma_{ \textrm{rad} }(x) \log (\pi \sigma_{ \textrm{rad} }(x))\,dx, \label{F12 ZW} \\ F_1&:= \frac{1}{12} \log\Big( \frac{1}{r_1^2} \Big)- \frac{1}{6} \chi_{ \textrm{rad} }(r_1^2) - \frac14 r_1^2 \chi_{ \textrm{rad} }'(r_1^2)+\frac13 \int_0^{r_1^2} x (\chi_{ \textrm{rad} }'(x))^2\,dx, \label{F1 ZW} \end{align} where \begin{equation} \label{chi rad def} W_{ \textrm{rad} }(r):= -Q(\sqrt{r}) , \qquad \sigma_{ \textrm{rad} }(r):=\frac{1}{\pi} \Delta Q(\sqrt{r}), \qquad \chi_{ \textrm{rad} }(r):= \frac12 \log \Delta Q(\sqrt{r}). \end{equation} Using \eqref{chi rad def}, it is straightforward to check that the formulas \eqref{F0 ZW}, \eqref{F12 ZW} and \eqref{F1 ZW} can be identified as \begin{equation} \label{ZW F0 12 1} F_0=-I_Q[\mu_Q],\qquad F_{1/2}=-\frac12 E_Q[\mu_Q], \qquad F_1=F_Q[\mathbb{D}_{r_1}], \end{equation} where $I_Q$, $E_Q$ and $F_Q[\mathbb{D}_{r_1}]$ are given by \eqref{energy radially sym}, \eqref{entropy} and \eqref{FQ disc}. (Cf. the identification of $F_0$ follows from the computation \eqref{sum Vtau EM 1} below.) Then by letting $\gamma=\log(2\pi)/2$, one can deduce from \eqref{ZW F0 12 1} that the asymptotic formula \eqref{ZW formula radial} agrees with our result \eqref{ZN expansion cplx disc} up to the additive terms \begin{equation} \label{ZW missing} -\frac1{12} \log N +\zeta'(-1). \end{equation} We remark that the asymptotic expansion of the partition function of the complex Ginibre ensemble was presented in \cite{can2015exact,tellez1999exact}, where one can also observe the term $\zeta'(-1)$ in \eqref{ZW missing}. Indeed, the term $\zeta'(-1)$ and its generalizations have appeared in similar situations in the Hermitian matrix theory, see \cite[Remark 1.3, Proposition 1.4]{MR4259377}, \cite[Theorem 1.1]{MR4043828}, \cite[Theorem 1.2]{MR4232544}. Interestingly, the coefficients of the $\zeta'(-1)$ term depend on the connectivity of the droplet (i.e. the number of disjoint intervals in this case) and the number of hard edges. \end{rem} \begin{rem}[\textbf{Non-triviality of the limit $r_0 \to 0$}] The formulas \eqref{ZN expansion cplx disc} and \eqref{ZN expansion symp disc} cannot be recovered by simply taking the limit $r_0 \to 0$ of \eqref{ZN expansion cplx annulus} and \eqref{ZN expansion symp annulus}. Namely, it is obvious that as $r_0 \to 0$, the terms \begin{equation} \label{ZW missing annulus} -\frac1{12} \log\Big( \frac{1}{r_0^2 \Delta Q(r_0) } \Big)+\frac{1}{16} r_0 \frac{ (\d_r \Delta Q)(r_0) }{ \Delta Q(r_0) } \end{equation} do not correspond to the terms \eqref{ZW missing}. (One may however notice that for the standard microscale $r_0=O(1/\sqrt{N})$, at least the $-\frac1{12}\log N$ term in \eqref{ZW missing} follows.) From the viewpoint of the proof, the origin of \eqref{ZW missing} and \eqref{ZW missing annulus} is essentially similar in the sense that these terms arise from the asymptotic behaviors of the summand in \eqref{ZN random normal symplectic} of \emph{lower degrees}. Nevertheless, it is essential (but seems not discussed in \cite{MR2240466}) that these asymptotic behaviors depend on whether the droplet is contractible or not, i.e. for the radially symmetric potentials, disc or annulus. We remark that the contractible case requires considerably more analysis than the other case, see the following subsection for more discussion. \end{rem} \begin{rem}[\textbf{Invariance of the $O(1)$-terms under the dilation}] For $a>0$, let $Q_a(z):=Q(z/a)$. Then the droplet associated with $Q_a$ is given by $\{ z\in \mathbb{C}: ar_0 \le |z| \le ar_1 \}$, where $r_0$ and $r_1$ are given in \eqref{droplet}. Then it follows from \eqref{FQ annulus} and \eqref{FQ disc} that \begin{equation}\label{FQ invariance dilation} F_Q[\mathbb{A}_{r_0,r_1}]=F_{Q_a}[\mathbb{A}_{ar_0,ar_1}], \qquad F_Q[\mathbb{D}_{r_1}]= F_{Q_a}[\mathbb{D}_{ar_1}]. \end{equation} This in turn means that the $O(1)$-terms in the expansions in Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc} are invariant under the dilation $\{ z_j \} \mapsto \{a\cdot z_j \}$. The property \eqref{FQ invariance dilation} can be expected from the analytic expression \eqref{ZN random normal symplectic} below. \end{rem} \begin{rem}[\textbf{Weight function with singularities and classical problems in random matrix theory}] In Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc}, we focus on the weight function $e^{-NQ}$ without any kind of singularities. In contrast, if a specific singularity is allowed for the weight function, the problems of deriving asymptotic expansions of the associated partition function are (when combined with Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc}) equivalent to several classical problems in random matrix theory. To be more concrete, we list various problems in this direction. If the weight function has a \emph{hard-edge} inside the droplet, the associated partition function provides the large gap (hole) probability, see \cite{adhikari2018hole,AR2016hole,akemann2009gap,byun2022almost,charlier2021large,MR1181356,ghosh2018point,jancovici1993large} and references therein. The weight function with a \emph{jump-type singularity} gives rise to the moment generating function of the disc counting function. It has been extensively studied in recent years \cite{akemann2022universality,ameur2022exponential,byun2022characteristic,charles2020entanglement,charlier2021asymptotics,charlier2022exponential}. (We also refer to \cite{fenzl2022precise,lacroix2019intermediate,lacroix2019rotating,smith2021counting} for physical motivations of these problems from the counting statistics of rotating free fermions.) Finally, a \emph{root-type singularity} arises in the study of the log-characteristic polynomials \cite{byun2022characteristic,deano2019characteristic,MR3946715}. We stress that the literature mentioned above is limited mainly to a particular model, such as the Ginibre ensemble, when deriving precise asymptotic results or to the leading order asymptotic when considering general potentials. We expect that Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc} provide the building blocks for obtaining precise asymptotic results on the problems mentioned above with general radially symmetric potentials. \end{rem} \begin{rem}[\textbf{Planar point processes with a general external potential $Q$}] For a general potential $Q$ beyond a radially symmetric one, the asymptotic behaviors of planar orthogonal polynomials (of sufficiently large degrees) with respect to $e^{-NQ}\,dA$ were recently obtained in \cite{hedenmalm2017planar}. We expect that this will be helpful to extend Theorem~\ref{Thm_ZN annulus} (i) to a general potential $Q$ associated with a ``non-contractible'' droplet. On the other hand, for the extension of Theorem~\ref{Thm_ZN disc} (i), it is required to derive asymptotics of orthogonal polynomials of lower degrees as well. Such a generalization of Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc} (ii) for planar symplectic ensembles seems at present far from being solved. More precisely, in order to obtain an analytic expression of $\widetilde{Z}_N$, it is required to construct the associated skew-orthogonal polynomial. However, for a non-radially symmetric potential, this construction has been known only in a few special cases \cite{MR2180006, MR1928853} (cf. see \cite{akemann2021skew} for a possible generality). \end{rem} \subsection{Outline of the proof} \label{Subsec_outline} In this subsection, we outline the proofs of our main results. Using the determinantal (resp., Pfaffian) structure and de Bruijn's type formulas, one can express $Z_N$ (resp., $\widetilde{Z}_N$) in terms of the (skew-)orthogonal norms. Consequently, since $Q$ is radially symmetric, we find \begin{equation} \label{ZN random normal symplectic} \log Z_N=\log N!+ \sum_{j=0}^{N-1} \log h_j, \qquad \log \widetilde{Z}_N= \log N! + \sum_{j=0}^{N-1} \log (2\widetilde{h}_{2j+1}) , \end{equation} where \begin{equation} \label{hj hj tilde def} h_j:= \int_\mathbb{C} |z|^{2j}\,e^{-N Q(z)}\,dA(z), \qquad \widetilde{h}_j:= \int_\mathbb{C} |z|^{2j}\,e^{-2N Q(z)}\,dA(z). \end{equation} These formulas can be found for instance in \cite[Lemma 1.7]{charlier2021asymptotics} and \cite[Remark 2.5]{akemann2021skew}. In particular, for planar symplectic ensembles, we have used the explicit construction of skew-orthogonal polynomials associated with radially symmetric potentials, see \cite[Corollary 3.3]{akemann2021skew}. In order to obtain the large-$N$ expansions of partition functions up to the $O(1)$-terms, we need to derive asymptotic behaviors of $h_j$ and $\widetilde{h}_j$ up to the first subleading terms, for which we apply Laplace's method. For this purpose, let $r_\tau$ be a unique number $r_\tau$ such that $r_\tau q'(r_\tau)=2\tau$ for $0\le \tau \le 1$. Such a function $\tau \mapsto r_\tau$ plays an important role in Laplace's method, and we defer more explanations to Subsection~\ref{Subsection_norms annulus}. In the asymptotic expansions of $h_j$ and $\widetilde{h}_j$, one should distinguish the following two cases depending on a small constant $\varepsilon>0$. \begin{itemize} \item \textbf{Case 1: $r_{j/N} \gg N^{-\varepsilon}$.} For the annular droplet case where $r_0>0$, this case covers all $j=0,1,\dots,N-1$ (Lemma~\ref{Lem_hj asymptotic}). On the other hand, for the disc droplet case where $r_0=0$, this case covers only $j=m_N,m_N+1,\dots,N-1$ for $m_N=N^{\epsilon}$ with some $\epsilon>0$ (Lemma~\ref{Lem_hj higher}). \smallskip \item \textbf{Case 2: $r_{j/N} \ll N^{-\varepsilon}$.} This covers the remaining disc droplet case with $j=0,1,\dots,m_N-1$ (Lemma~\ref{Lem_hj lower}). Notably, the asymptotic expansion involves gamma functions in this case. \end{itemize} Furthermore, we apply the Euler-Maclaurin formula (see e.g. \cite[Section 2.10]{olver2010nist}) to precisely analyze the summations in \eqref{ZN random normal symplectic} \begin{equation} \begin{split} \label{EMF} \sum_{j=m}^{n} f(j) = \int_{m}^{n} f(x) \, dx + \frac{f(m)+f(n)}{2} + \sum_{k=1}^{l} \frac{B_{2k}}{(2k)!}\Big(f^{(2k-1)}(n)-f^{(2k-1)}(m)\Big) + R_l, \end{split} \end{equation} where $B_k$ is the Bernoulli number defined by \begin{equation} \label{Bernoulli number} \frac{t}{e^t-1}=\sum_{n=0}^\infty B_n \frac{t^n}{n!} \end{equation} and $R_l$ is an error term with the following estimate \[ |R_l| \le \frac{2\zeta(l)}{(2\pi)^l} \int_m^n|f^{(l)}(x)|\,dx. \] Here $\zeta$ is the Riemann zeta function. In particular, for the disc droplet case, in the summation of lower degrees $j=0,1,\dots, m_N-1$, we consider the Barnes $G$-function \cite[Section 5.17]{olver2010nist} \begin{equation*} G(z+1) = (2\pi)^{z/2} e^{-(z+z^2(1+\gamma))/2} \prod_{n=0}^\infty \big(1+\frac z n\big)^n e^{-z+z^2/(2n)} \end{equation*} and use its asymptotic expansion \cite[Eq.(5.17.5)]{olver2010nist}: \begin{align} \begin{split} \label{Barnes G asymp} \log G(z+1) =\frac{z^2 \log z}{2} -\frac34 z^2+\frac{ \log(2\pi) z}{2}-\frac{\log z}{12}+\zeta'(-1)+O( \frac{1}{z^2} ), \qquad (z \to \infty). \end{split} \end{align} This asymptotic expansion leads to the appearance of the Riemann zeta function in Theorem~\ref{Thm_ZN disc}. \subsection*{Plan of the paper} The rest of this paper is organized as follows. In Section~\ref{Section_annulus}, we prove Theorem~\ref{Thm_ZN annulus}. Subsection~\ref{Subsection_norms annulus} is devoted to deriving asymptotic behaviors of $h_j$ and $\widetilde{h}_j$ using Laplace's method. Then we show Theorem~\ref{Thm_ZN annulus} (i) on random normal matrices in Subsection~\ref{Subsection_annulus normal} and Theorem~\ref{Thm_ZN annulus} (ii) on planar symplectic ensembles in Subsection~\ref{Subsection_annulus symplectic}. Section~\ref{Section_disc} is structured in parallel with a goal to show Theorem~\ref{Thm_ZN disc} albeit it requires considerably more computations compared to those in Section~\ref{Section_annulus}. In Section~\ref{Appendix_Examples}, we present examples of Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc} for the Mittag-Leffler and truncated unitary ensembles whose partition functions can be explicitly expressed in terms of well-known special functions. \section{Proof of Theorem~\ref{Thm_ZN annulus}} \label{Section_annulus} In this section, we prove Theorem~\ref{Thm_ZN annulus}. Throughout this section, we assume that $r_0>0.$ \subsection{Asymptotics of the orthogonal norm} \label{Subsection_norms annulus} We first introduce an auxiliary function $V_\tau$ in $(0,\infty)$ \begin{equation} \label{V tau} V_\tau(r) := q(r) - 2\tau \log r. \end{equation} With the following choices of $\tau = \tau(j), \widetilde\tau(j)$ \begin{equation} \label{tau j wt tau j} \tau(j):=\frac{j}{N}, \qquad \widetilde{\tau}(j):=\frac{j}{2N}, \end{equation} the integrands in $h_j, \widetilde{h}_j$ \eqref{hj hj tilde def} can be expressed in terms of $V_\tau:$ $$r^{2j} e^{-N q(r)} = e^{-N V_{\tau(j)}(r)}, \qquad r^{2j} e^{-2N q(r)} = e^{-N V_{\widetilde{\tau}(j)}(r)}.$$ For a radially symmetric potential $Q$, we represent $\Delta Q$ in terms of $q$ as \begin{equation} \label{Delta Q q' q''} 4\Delta Q(z)|_{z=r}= \frac{1}{r}(rq'(r))'= \frac{q'(r)}{r}+q''(r) . \end{equation} \begin{comment} Using \eqref{V tau} and \eqref{Delta Q q' q''}, we compute $V_\tau'$ and $V_\tau''$ as \begin{equation} \label{V tau ' ''} V_\tau'(r)=q'(r)-\frac{2\tau}{r}, \qquad V_\tau''(r)=q''(r)+\frac{2\tau}{r^2}= 4\Delta Q(r)- \frac{q'(r)}{r}+\frac{2\tau}{r^2}= 4\Delta Q(r)-\frac{1}{r} V_\tau'(r) . \end{equation} By differentiating \eqref{V tau ' ''}, we have \begin{equation} \begin{split} \label{Vtau (3)} V_\tau^{(3)}(r) & =4 \d_r \Delta Q(r)+\frac{1}{r^2} V_\tau'(r)-\frac{1}{r} V_\tau''(r) = 4 \d_r \Delta Q(r)-\frac{4}{r} \Delta Q(r) +\frac{2}{r^2} V_\tau'(r) \end{split} \end{equation} and \begin{equation} \begin{split} \label{Vtau (4)} V_\tau^{(4)}(r) & = 4 \d_r^2 \Delta Q(r)+\frac{4}{r^2} \Delta Q(r)-\frac{4}{r} \d_r \Delta Q(r) -\frac{4}{r^3} V_\tau'(r)+\frac{2}{r^2} V_\tau''(r) \\ & = 4 \d_r^2 \Delta Q(r)+\frac{12}{r^2} \Delta Q(r)-\frac{4}{r} \d_r \Delta Q(r) -\frac{6}{r^3} V_\tau'(r). \end{split} \end{equation} \end{comment} Differentiating \eqref{V tau}, we have \begin{align} \begin{split} \label{V tau diff} V_\tau'(r)=q'(r)-\frac{2\tau}{r}, \qquad V_\tau''(r) &= 4\Delta Q(r)-\frac{1}{r} V_\tau'(r), \qquad V_\tau^{(3)}(r) = 4 \d_r \Delta Q(r)-\frac{4}{r} \Delta Q(r) +\frac{2}{r^2} V_\tau'(r), \\ V_\tau^{(4)}(r) &= 4 \d_r^2 \Delta Q(r)+\frac{12}{r^2} \Delta Q(r)-\frac{4}{r} \d_r \Delta Q(r) -\frac{6}{r^3} V_\tau'(r). \end{split} \end{align} We now set the stage to apply Laplace's method. Since $rq'(r)$ is strictly increasing inside the droplet, for $0 \leq \tau \leq 1$, there exists a unique number $r(\tau)$ such that \begin{equation} \label{r tau min} V_\tau'(r(\tau))=0 , \qquad V_\tau''(r(\tau))>0. \end{equation} Moreover, by \eqref{Delta Q q' q''} and the relation \eqref{r tau min}, it follows that \begin{equation}\label{drdtau} \frac{dr(\tau)}{d\tau} = \frac{2}{(rq'(r))'}\Big|_{r=r(\tau)} = \frac{1}{2r(\tau)\Delta Q (r(\tau))}>0. \end{equation} Thus $r(\tau)$ is an increasing function of $\tau$. On the other hand, $r(1) = r_1, r(0) = r_0$, where $r_0,r_1$ are given in \eqref{droplet}. Therefore, we denote $r_\tau = r(\tau)$ making the notation consistent with \eqref{droplet}. We also mention here that $r_\tau$ corresponds to the outer radius of the so-called ``$\tau$-droplet'' \cite{hedenmalm2017planar}. By \eqref{V tau diff} and \eqref{r tau min}, $r_\tau$ satisfies \begin{equation} \label{r tau eq} r_\tau q'(r_\tau)=2\tau. \end{equation} In particular, $q'(r_0)=0$ and $r_1q'(r_1)=2.$ Let \begin{equation} \label{B1} \mathfrak{B}_1(r):= -\frac{1}{32} \frac{ \d_r^2 \Delta Q(r) }{ (\Delta Q(r))^2 } -\frac{19}{96r} \frac{\d_r \Delta Q(r)}{ (\Delta Q(r))^2 }+\frac{5}{96} \frac{ (\d_r \Delta Q(r))^2 }{ \Delta Q(r)^3 } +\frac{1}{12r^2} \frac{1}{\Delta Q(r)}. \end{equation} Here, the subscript $1$ is added to $\mathfrak{B}$ to emphasize that this function appears as the first subleading term of the asymptotic expansion of orthonormal polynomials, see Lemma~\ref{Lem_hj asymptotic} below. Indeed, function $\mathfrak{B}_1$ is closely related to function $\mathfrak{B}_{\tau,1}$ in \cite[Theorem 1.3]{hedenmalm2017planar}. \begin{lem}\label{Lem_hj asymptotic} As $N\to\infty$, the following holds. \begin{itemize} \item For each $j$ with $0\leq j \leq N-1$, \begin{equation} h_j = N^{-\frac{1}{2}}e^{-NV_{\tau(j)}(r_{\tau(j)})} \Big(\frac{{2\pi}r_{\tau(j)}^2}{\Delta Q (r_{\tau(j)})}\Big)^{\frac{1}{2}} \Big( 1 + \frac{1}{N}\mathfrak{B}_1(r_{\tau(j)}) + O(N^{-2})\Big). \end{equation} \item For each $j$ with $0\leq j \leq 2N-1$, \begin{equation} \widetilde{h}_j = (2N)^{-\frac{1}{2}}e^{-2NV_{\widetilde{\tau}(j)}(r_{\widetilde{\tau}(j)})} \Big(\frac{{2\pi}r_{\widetilde{\tau}(j)}^2}{\Delta Q (r_{\widetilde{\tau}(j)})}\Big)^{\frac{1}{2}} \Big( 1 + \frac{1}{2N}\mathfrak{B}_1(r_{\widetilde{\tau}(j)}) + O(N^{-2})\Big). \end{equation} \end{itemize} \end{lem} \begin{proof} It suffices to show the first assertion as the second one follows by replacing $N$ with $2N.$ Write $\delta_N:= \log N/\sqrt{N}$. As seen in \eqref{V tau}, \eqref{r tau min} and \eqref{drdtau}, the function $V_{\tau}$ has a global minimum at $r=r_{\tau}$ and $r_{\tau(j+\frac{1}{2})}-r_{\tau(j)}=O(N^{-1})$. We have \begin{equation*} V_{\tau(j+\frac{1}{2})}(r) \geq V_{\tau(j+\frac{1}{2})}(r_{\tau(j)}+\delta_N) = V_{\tau(j+\frac{1}{2})}(r_{ \tau(j+\frac{1}{2})}) + \frac{1}{2}V_{\tau(j+\frac{1}{2})}''(r_{\tau(j+\frac{1}{2})})(r_{\tau(j)}+\delta_N - r_{\tau(j+\frac{1}{2})})^2 + O(\delta_N^3) \end{equation*} for all $r$ with $r>r_{\tau(j)}+\delta_N$ since $rq'(r)$ is increasing in $(0,\infty)$. A similar estimate holds for $r<r_{\tau(j)}-\delta_N$. Thus we deduce from the estimate \begin{equation} V_{\tau(j+\frac{1}{2})}(r_{\tau(j+\frac{1}{2})}) - V_{\tau(j)}(r_{\tau(j)}) = O(N^{-1}) \end{equation} that there exists a positive number $c>0$ such that for all $|r-r_{\tau(j)}|>\delta_N$ \begin{align}\label{Vtau:diff} V_{\tau(j+\frac{1}{2})}(r) - V_{\tau(j)}(r_{\tau(j)}) \geq c\,\delta_N^2. \end{align} We split $h_j$ in \eqref{hj hj tilde def} into two integrals \begin{align*} h_j = \int_{0}^\infty e^{-NV_{\tau(j)}(r)} 2r\, dr = \int_{|r-r_{\tau(j)}|<\delta_N} e^{-NV_{\tau(j)}(r)} 2r \, dr + \int_{|r-r_{\tau(j)}| > \delta_N} e^{-NV_{\tau(j)}(r)} 2r \, dr. \end{align*} Using \eqref{Q growth condition}, we choose sufficiently large $M>0$ such that \begin{equation} \label{M choose} \int_0^\infty \Big(r^2 e^{-q(r)} \Big)^M \,r \,dr < +\infty. \end{equation} We then use \eqref{Vtau:diff} and \eqref{M choose} to find an error estimate for the second integral \begin{align} \begin{split} \label{ex_error} &\quad \int_{|r-r_{\tau(j)}| > \delta_N} e^{-N V_{\tau(j)}(r) }2r\, dr = e^{-NV_{\tau(j)}(r_{\tau(j)})} \int_{|r-r_{\tau(j)}| > \delta_N} e^{-N \big(V_{\tau(j)}(r) - V_{\tau(j)}(r_{\tau(j)}) \big)} \,2r\, dr \\ &\leq e^{-NV_{\tau(j)}(r_{\tau(j)})}e^{-c(N-M)\delta_N^2} \int_{|r-r_{\tau(j)}| > \delta_N} e^{-M \big(V_{\tau(j)}(r) - V_{\tau(j)}(r_{\tau(j)})\big)} \,2r \, dr = e^{-NV_{\tau(j)}(r_{\tau(j)})} \epsilon_{N}, \end{split} \end{align} where $\epsilon_{N} = O(e^{-c(\log N)^2})$ for some $c>0$ and the $O$-constants are bounded uniformly for all $\tau$ with $0\leq \tau \leq 1$. We deduce from the asymptotic expansion of $V_\tau(r)$ near the critical point $r_\tau$ and \eqref{ex_error} that \begin{align*} h_j = e^{-NV_{\tau(j)}(r_{\tau(j)})} \Big(\int_{-\delta_N}^{\delta_N} e^{-2N\Delta Q(r_{\tau(j)})r^2}e^{-N(\frac{1}{3!}V_{\tau(j)}^{(3)}(r_{\tau(j)})r^3 + \frac{1}{4!}V_{\tau(j)}^{(4)}(r_{\tau(j)})r^4 + O(r^5)) } 2(r_{\tau(j)}+r) \,dr + \epsilon_N\Big). \end{align*} A change of variables gives that \begin{equation} \begin{split} \label{hj asymptotic 1} & e^{NV_{\tau(j)}(r_{\tau(j)})} h_j \\ =& \frac{2\,r_{\tau(j)}}{\sqrt{N}} \int_{-\sqrt{N}\delta_N}^{\sqrt{N}\delta_N} e^{-2\Delta Q(r_{\tau(j)})r^2-\frac{1}{\sqrt{N}}\frac{1}{3!}V_{\tau(j)}^{(3)}(r_{\tau(j)})r^3 - \frac{1}{N}\frac{1}{4!}V_{\tau(j)}^{(4)}(r_{\tau(j)})r^4 + O(N^{-\frac{3}{2}}r^5) } \big(1+\frac{r}{r_{\tau(j)}\sqrt{N}}\big) \,dr + \epsilon_N. \end{split} \end{equation} Using the Taylor series expansion of the function \begin{align*} e^{-\frac{1}{\sqrt{N}}\frac{1}{3!}V_{\tau(j)}^{(3)}(r_{\tau(j)})r^3 - \frac{1}{N}\frac{1}{4!}V_{\tau(j)}^{(4)}(r_{\tau(j)})r^4 }, \end{align*} we have the asymptotic expansion \begin{equation} \begin{split} & \frac{\sqrt{N}}{2r_{\tau(j)}}e^{NV_{\tau(j)}(r_{\tau(j)})}h_j \\ =& \int_{-\infty}^{\infty} e^{-2\Delta Q(r_{\tau(j)})r^2}\Big[1 - \frac{1}{N}\Big(\frac{1}{6r_{\tau(j)}} V_{\tau(j)}^{(3)}(r_{\tau(j)})+\frac{1}{24}V_{\tau(j)}^{(4)}(r_{\tau(j)}) \Big)r^{4} + \frac{1}{N}\frac{1}{72}(V_{\tau(j)}^{(3)}(r_{\tau(j)}))^2 r^6\Big] \, dr + O(N^{-2}) \end{split} \end{equation} since the odd terms vanish in the integral, leaving only the even terms. Combining \eqref{V tau diff} with the elementary Gaussian integrals \begin{equation} \int_\mathbb{R} e^{-2ar^2}\,dr=\sqrt{\frac{\pi}{2}} \frac{1}{a^{1/2}} , \qquad \int_\mathbb{R} e^{-2ar^2}r^4\,dr=\sqrt{\frac{\pi}{2}} \frac{3}{16} \frac{1}{a^{5/2}} , \qquad \int_\mathbb{R} e^{-2ar^2}r^6\,dr=\sqrt{\frac{\pi}{2}} \frac{15}{64} \frac{1}{a^{7/2}}, \end{equation} we obtain the desired asymptotic behavior after some straightforward computations. \end{proof} The following elementary integration will be helpful later. \begin{lem} \label{Lem_B1 integral} We have \begin{equation} \begin{split} \int_{S} \mathfrak{B}_1 \, d\mu_Q =F_Q[\mathbb{A}_{r_0,r_1}] -\frac{1}{4} \log \Big( \frac{ \Delta Q(r_1) }{ \Delta Q(r_0) } \Big) + \frac{1}{3} \log\Big( \frac{r_1}{r_0} \Big) , \end{split} \end{equation} where $F_Q[\mathbb{A}_{r_0,r_1}]$ is given in \eqref{FQ annulus}. \end{lem} \begin{proof} By \eqref{B1} and \eqref{eq msr Lap Q}, we have \begin{equation*} \begin{split} \int_{S} \mathfrak{B}_1 \, d\mu_Q &= \frac{1}{6} \log\Big( \frac{r_1}{r_0} \Big) -\frac{19}{48} \log \Big( \frac{ \Delta Q(r_1) }{ \Delta Q(r_0) } \Big) - \frac{1}{16} \int_{r_0}^{r_1} \Big[ \frac{ \d_r^2 \Delta Q(r) }{ \Delta Q(r) } -\frac{5}{3} \Big( \frac{ \d_r \Delta Q(r) }{ \Delta Q(r) }\Big)^2 \Big] \,r \,dr. \end{split} \end{equation*} Then the lemma follows using integration by parts \begin{equation} \begin{split} \label{Delta Q partial integral} &\quad \int_{r_0}^{r_1} \Big[ \frac{ \d_r^2 \Delta Q(r) }{ \Delta Q(r) } -\frac{5}{3} \Big( \frac{ \d_r \Delta Q(r) }{ \Delta Q(r) }\Big)^2 \Big] \,r \,dr \\ &=r_1\, \frac{ (\d_r \Delta Q)(r_1) }{ \Delta Q(r_1) } - r_0\, \frac{ (\d_r \Delta Q)(r_0) }{ \Delta Q(r_0) } + \log \Big( \frac{ \Delta Q(r_0) }{ \Delta Q(r_1) } \Big) - \frac{2}{3} \int_{r_0}^{r_1} \Big( \frac{ \d_r \Delta Q(r) }{ \Delta Q(r) }\Big)^2\,r \,dr. \end{split} \end{equation} \end{proof} \subsection{Random normal matrix ensemble} \label{Subsection_annulus normal} In this subsection, we prove Theorem~\ref{Thm_ZN annulus} (i). By Lemma~\ref{Lem_hj asymptotic}, we have \begin{equation}\label{Logh} \log h_j = - NV_{\tau(j)}(r_{\tau(j)}) + \frac{1}{2}\Big( \log (2\pi r_{\tau(j)}^2) - \log N - \log \Delta Q(r_{\tau(j)})\Big) + \frac{1}{N}\mathfrak{B}_1(r_{\tau(j)}) + O(N^{-2}). \end{equation} In the following lemmas, we analyze the asymptotic behavior of the partial sum of each term in \eqref{Logh}. \begin{lem}\label{Sum:Vtau} As $N \to \infty$, we have \begin{equation} \sum_{j=0}^{N-1} V_{\tau(j)}(r_{\tau(j)}) = N I_Q[\mu_Q]-U_{\mu_Q}(0) + \frac{1}{6N}\log \Big(\frac{r_0}{r_1}\Big) + O(N^{-3}). \end{equation} \end{lem} \begin{proof} The sequence $\tau$ in \eqref{tau j wt tau j} can be extended to the function on $[0,N]$: $\tau(t) = t/N.$ Using the Euler-Maclaurin formula \eqref{EMF} and \eqref{tau j wt tau j}, we have \begin{align} \begin{split} \label{sum Vtau EM} \sum_{j=0}^{N-1} V_{\tau(j)}(r_{\tau(j)}) &= \int_{0}^{N} V_{\tau(t)}(r_{\tau(t)}) \, dt - \frac{1}{2}\big(V_{\tau(N)}(r_{\tau(N)})-V_{\tau(0)}(r_{\tau(0)})\big) \\ &\quad + \frac{1}{12}\Big[\d_t V_{\tau(t)}(r_{\tau(t)})\big|_{t=N} - \d_t V_{\tau(t)}(r_{\tau(t)})\big|_{t=0} \Big] + O(N^{-3}). \end{split} \end{align} Here, we also used the second Bernoulli number $B_2=1/6$, which can be easily seen from the definition \eqref{Bernoulli number}. For the first term on the right-hand side of \eqref{sum Vtau EM}, the change of variables $s=r_{\tau(t)}$, the definition \eqref{V tau} of $V_\tau$, the definition \eqref{tau j wt tau j} of $\tau$, the formula \eqref{drdtau} of $dr/d\tau$, and the equation \eqref{r tau eq} $r_\tau q'(r_\tau)=2\tau$ for $r_\tau$ give that \[ \frac{1}{N}\int_{0}^{N}V_{\tau(t)}(r_{\tau(t)}) \,dt = 2 \int_{r_0}^{r_1} \big(q(s) - sq'(s)\log s \big) s \Delta Q(s)\, ds. \] We use the polar coordinate system to represent the first term on the right-hand side of the above equation as \[2\int_{r_0}^{r_1} s q(s) \Delta Q(s)\, ds = \int_{S} Q \cdot \Delta Q \,dA. \] By \eqref{Delta Q q' q''}, the method of integration by parts, and the relation $r_1 q'(r_1) = 2, q'(r_0)=0$ (see \eqref{r tau eq}), the second term is simplified to \[ - 2\int_{r_0}^{r_1} s^2q'(s)\log s \Delta Q(s)\, ds = - \frac{1}{4}\int_{r_0}^{r_1} \log s \cdot ((sq'(s))^2)'\, ds \\ = - \log r_1 + \frac{1}{4} \int_{r_0}^{r_1} s (q'(s))^2 \,ds. \] Applying the method of integration by parts again to the last integral, \[ \frac{1}{4} \int_{r_0}^{r_1} s (q'(s))^2 \,ds = \frac{1}{2} q(r_1) - \frac{1}{4}\int_{r_0}^{r_1} q(s) (sq'(s))' \,ds. \] Using the formula \eqref{energy radially sym} of $I_Q[\mu_Q]$, the representation \eqref{Delta Q q' q''} of $\Delta Q$ in terms of $q$, and the equation \eqref{r tau eq} $r_\tau q'(r_\tau)=2\tau$ for $r_\tau$, we have \begin{align} \label{sum Vtau EM 1} \begin{split} \frac{1}{N}\int_{0}^{N}V_{\tau(t)}(r_{\tau(t)}) \,dt &= \int_{S} Q \cdot \Delta Q \,dA - \log r_1 + \frac{1}{2} q(r_1) - \frac{1}{4}\int_{r_0}^{r_1} q(s) (sq'(s))' \,ds\\ & = \frac{1}{2}\int_{S} Q \cdot \Delta Q \,dA - \log r_1 + \frac{1}{2} q(r_1)=I_{Q}[\mu_Q] . \end{split} \end{align} For the next term on the right-hand side of \eqref{sum Vtau EM}, we observe that \begin{equation} \label{sum Vtau EM 2} V_{\tau(N)}(r_{\tau(N)}) - V_{\tau(0)}(r_{\tau(0)}) = V_1(r_1)-V_0(r_0) = q(r_1) - q(r_0)- 2\log r_1=2 U_{\mu_Q}(0), \end{equation} where we have used \eqref{potential radially sym}. To analyze the remaining term, we use the Leibniz rule and obtain \begin{align*} \begin{split} \d_t V_{\tau(t)}(r_{\tau(t)})\big|_{t=N} & = \frac{1}{N} \big[\d_{\tau} (q(r_\tau) - 2 \log r_\tau)\big|_{\tau=1} - 2 \log r_1 \big], \\ \d_t V_{\tau(t)}(r_{\tau(t)})\big|_{t=0} & = \frac{1}{N} \big[\d_{\tau} q(r_\tau) \big|_{\tau=0} - 2 \log r_0 \big]. \end{split} \end{align*} It follows from $r_1 q'(r_1) = 2$, $r_0q'(r_0)=0$ and the formula \eqref{drdtau} of $dr/d\tau$ that \begin{align} \begin{split} \label{sum Vtau EM 3} &\quad \d_t V_{\tau(t)}(r_{\tau(t)})\big|_{t=N} - \d_t V_{\tau(t)}(r_{\tau(t)})\big|_{t=0} \\ &= \frac{1}{N} \Big[ \frac{q'(r_1)}{2r_1\Delta Q(r_1)} - 2\log r_1 - \frac{1}{r_1^2 \Delta Q (r_1)} - \frac{q'(r_0)}{2r_0 \Delta Q(r_0)} + 2\log r_0\Big] = \frac{2}{N} \log\Big( \frac{r_0}{r_1} \Big). \end{split} \end{align} Combining \eqref{sum Vtau EM}, \eqref{sum Vtau EM 1}, \eqref{sum Vtau EM 2}, and \eqref{sum Vtau EM 3}, the proof is complete. \end{proof} \begin{lem}\label{Sum:LapQ} As $N\to \infty$, we have \begin{equation} \label{Sum:LapQtau} \sum_{j=0}^{N-1}\log \Delta Q(r_{\tau(j)}) = N E_{Q}[\mu_Q] - \frac{1}{2} \log \Big( \frac{\Delta Q(r_1)} { \Delta Q(r_0)} \Big) + O(N^{-1}), \end{equation} and \begin{equation} \label{Sum:logr} \sum_{j=0}^{N-1} \log r_{\tau(j)} = -N U_{\mu_Q}(0) -\frac{1}{2}\log \Big(\frac{r_1}{r_0}\Big) + O(N^{-1}). \end{equation} \end{lem} \begin{proof} As in Lemma \ref{Sum:Vtau}, we apply the Euler-Maclaurin formula \eqref{EMF} and obtain \begin{align} \label{sum Lap Q EM} \begin{split} \sum_{j=0}^{N-1} \log \Delta Q(r_{\tau(j)}) &= \int_{0}^{N}\log \Delta Q(r_{\tau(t)})\, dt - \frac{1}{2} \log \Big( \frac{\Delta Q(r_1)} { \Delta Q(r_0)} \Big) \\ &\quad +\frac{1}{12}\Big[ \d_t \log\Delta Q(r_{\tau(t)})\big|_{t=N} - \d_t \log\Delta Q(r_{\tau(t)})\big|_{t=0} \Big] + O(N^{-3}). \end{split} \end{align} It follows from a change of variables and \eqref{drdtau} that the first term on the right-hand side of \eqref{sum Lap Q EM} gives the entropy term \begin{equation} \int_{0}^{N}\log \Delta Q(r_{\tau(t)}) \,dt = N \int_{r_0}^{r_1} \log \Delta Q(s) 2s\Delta Q(s)\, ds = N \int_{S} \log \Delta Q \,d\mu_Q. \end{equation} By the chain rule and the formula \eqref{drdtau} of $dr/d\tau$ again, we also observe that \begin{align*} \d_t\log\Delta Q(r_{\tau(t)})\big|_{t=N} - \d_t\log\Delta Q(r_{\tau(t)})\big|_{t=0} = \frac{1}{2N}\Big(\frac{(\d_r\Delta Q)(r_1)}{r_1 (\Delta Q (r_1))^2} - \frac{(\d_r\Delta Q)(r_0)}{r_0 (\Delta Q (r_0))^2} \Big)=O(N^{-1}). \end{align*} Combining all of the above, we obtain \eqref{Sum:LapQtau}. The equation \eqref{Sum:logr} follows similarly. \end{proof} We are now ready to prove the first assertion of Theorem~\ref{Thm_ZN annulus}. \begin{proof}[Proof of Theorem~\ref{Thm_ZN annulus} (i)] Combining Lemmas \ref{Sum:Vtau} and \ref{Sum:LapQ} with \eqref{Logh}, we obtain \begin{align*} \sum_{j=0}^{N-1}\log h_j &= -N^2 I_Q[\mu_Q] - \frac{N}{2}\log N + N\Big( \frac{\log (2\pi)}{2} -\frac12 E_{Q}[\mu_Q] \Big) \\ &\quad -\frac{1}{3}\log\Big(\frac{r_1}{r_0}\Big) + \frac{1}{4}\log \Big( \frac{\Delta Q(r_1)}{\Delta Q(r_0)} \Big) + \int_{S} \mathfrak{B}_1 \, d\mu_Q + O(N^{-1}), \end{align*} where $\mathfrak{B}_1$ is given by \eqref{B1}. Then the desired asymptotic expansion \eqref{ZN expansion cplx annulus} follows from \begin{equation} \label{log N!} \log N!= N \log N-N+\frac12 \log N+\frac12 \log(2\pi)+O(\frac{1}{N}), \qquad (N \to \infty) \end{equation} (see e.g. \cite[Eq.(5.11.1)]{olver2010nist}) and Lemma~\ref{Lem_B1 integral}. \end{proof} \subsection{Planar symplectic ensemble} \label{Subsection_annulus symplectic} In this subsection, we prove Theorem~\ref{Thm_ZN annulus} (ii). Recall that by Lemma~\ref{Lem_hj asymptotic}, \begin{equation}\label{Logh tilde} \log \widetilde{h}_j = - 2NV_{\widetilde{\tau}(j)}(r_{\widetilde{\tau}(j)}) + \frac{1}{2}\Big( \log (\pi r_{\widetilde{\tau}(j)}^2) - \log N - \log \Delta Q(r_{\widetilde{\tau}(j)})\Big) + \frac{1}{2N}\mathfrak{B}_1(r_{\widetilde{\tau}(j)}) + O(N^{-2}). \end{equation} In the following lemmas, we derive asymptotic expansions for the partial sum of each term on the right-hand side of \eqref{Logh tilde}. We obtain the following as a counterpart of Lemma~\ref{Sum:Vtau}. \begin{lem}\label{Sum:Vtau symplectic} As $N\to \infty$, we have \begin{equation} \label{Vtau sum odd} \sum_{j=0}^{N-1} V_{\widetilde{\tau}(2j+1)}(r_{\widetilde{\tau}(2j+1)}) =N I_{Q}[\mu_{Q}] -\frac{1}{12N}\log \Big(\frac{r_0}{r_1}\Big) + O(N^{-3}). \end{equation} \end{lem} \begin{proof} Applying Lemma~\ref{Sum:Vtau} by replacing $N$ with $2N$, we have \begin{equation} \label{Vtau sum 2N} \sum_{j=0}^{2N-1} V_{\widetilde{\tau}(j)}(r_{\widetilde{\tau}(j)}) = 2N I_Q[\mu_Q] -U_{\mu_Q}(0) + \frac{1}{12N}\log \Big(\frac{r_0}{r_1}\Big) + O(N^{-3}). \end{equation} It follows from $V_{\widetilde{\tau}(2j)}(r_{\widetilde{\tau}(2j)}) = V_{\tau(j)}(r_{\tau(j)})$ and Lemma~\ref{Sum:Vtau} that \begin{equation} \label{Vtau sum even} \sum_{j=0}^{N-1} V_{\widetilde{\tau}(2j)}(r_{\widetilde{\tau}(2j)}) = N I_{Q}[\mu_{Q}] -U_{\mu_Q}(0) + \frac{1}{6N}\log\Big( \frac{r_0}{r_1}\Big) + O(N^{-3}). \end{equation} Then \eqref{Vtau sum odd} follows from \eqref{Vtau sum 2N} and \eqref{Vtau sum even}. \end{proof} \begin{lem}\label{Sum:LapQ symplectic} As $N\to \infty$, we have \[ \sum_{j=0}^{N-1}\log \Delta Q(r_{\widetilde{\tau}(2j+1)}) = N E_{Q}[\mu_Q] + O(N^{-1}), \] and \[ \sum_{j=0}^{N-1} \log r_{\widetilde{\tau}(2j+1)} = -N U_{\mu_Q}(0) + O(N^{-1}). \] \end{lem} \begin{proof} By Lemma~\ref{Sum:LapQ}, we have \begin{align} \sum_{j=0}^{2N-1}\log \Delta Q(r_{\widetilde{\tau}(j)}) & = 2N E_{Q}[\mu_Q] - \frac{1}{2} \log\Big( \frac{ \Delta Q(r_1) } { \Delta Q(r_0) } \Big) + O(N^{-1}),\\ \sum_{j=0}^{2N-1} \log r_{\widetilde{\tau}(j)} & = -2NU_{\mu_Q}(0) - \frac{1}{2}\log\Big( \frac{r_1}{r_0}\Big) + O(N^{-1}). \end{align} Along the lines of Lemma~\ref{Sum:LapQ}, one can also show that \begin{align} \sum_{j=0}^{N-1}\log \Delta Q(r_{\widetilde{\tau}(2j)})& = N E_{Q}[\mu_Q] - \frac{1}{2}\log\Big( \frac{ \Delta Q(r_1) } { \Delta Q(r_0) } \Big) + O(N^{-1}), \\ \sum_{j=0}^{N-1} \log r_{\widetilde{\tau}(2j)}& = -NU_{\mu_Q}(0) -\frac{1}{2}\log \Big(\frac{r_1}{r_0}\Big) + O(N^{-1}). \end{align} This completes the proof. \end{proof} We now prove the second assertion of Theorem~\ref{Thm_ZN annulus}. \begin{proof}[Proof of Theorem~\ref{Thm_ZN annulus} (ii)] By Lemmas~\ref{Sum:Vtau symplectic} and \ref{Sum:LapQ symplectic}, we have \begin{align*} \sum_{j=0}^{N-1}\log (2\widetilde{h}_{2j+1}) &=-2N^2 I_Q[\mu_Q] -\frac{N}{2}\log N +\frac{N}{2} \log 2 + \frac{N}{2} \log(2\pi) \\ &\quad -N U_{\mu_Q}(0) -\frac{N}{2} E_Q[\mu_Q] +\frac12 \int_{S} \mathfrak{B}_1 \, d\mu_Q +\frac{1}{6} \log\Big( \frac{r_0}{r_1} \Big)+O(N^{-1}) . \end{align*} Combining \eqref{ZN random normal symplectic}, \eqref{log N!}, and Lemma~\ref{Lem_B1 integral} completes the proof. \end{proof} \section{Proof of Theorem~\ref{Thm_ZN disc}} \label{Section_disc} In this section, we prove Theorem~\ref{Thm_ZN disc}. Throughout this section, we let $r_0=0.$ \subsection{Asymptotics of the orthogonal norm} Let $\delta_N=N^{-1/2}\log N$ and $m_N = N^{\epsilon}$ for $0<\epsilon<1/5$. As explained in Subsection~\ref{Subsec_outline}, for the disc droplet case, the asymptotic behaviors of $h_j$ and $\widetilde{h}_j$ depend on whether the degree $j$ is sufficiently small or not, see Lemmas~\ref{Lem_hj lower} and \ref{Lem_hj higher}, respectively. \begin{lem}\label{Lem_hj lower} As $N \to \infty$, the following holds. \begin{itemize} \item For $j=0,1,\dots,m_N-1$, we have \begin{align*} \log h_j = - Nq(0) - (j+1) \log \Big(\frac{N}{2}q''(0) \Big) + \log j! + O\big(N^{-\frac{1}{2}} (j+1)^{\frac{3}{2}}(\log N)^{3} \big). \end{align*} \item For $j =0,1,\dots,2m_N-1$, we have \begin{align*} \log \widetilde{h}_j = - 2Nq(0) - (j+1) \log (Nq''(0) ) + \log j! + O\big(N^{-\frac{1}{2}}(j+1)^{\frac{3}{2}}(\log N)^3\big). \end{align*} \end{itemize} \end{lem} \begin{proof} The second assertion is an immediate consequence of the first one. Recall that $\tau(j)=j/N$. Let \begin{equation*} r^*_\tau := r_\tau \cdot \log N, \end{equation*} where $r_\tau$ is given in \eqref{r tau min} or \eqref{r tau eq}, $r_\tau q'(r_\tau) = 2\tau$. We consider the decomposition \begin{align*} h_j &= \int_{0}^{\infty} 2r^{2j+1} e^{-N q(r)} \, dr = \int_{0}^{r^*_{{\tau(j+\frac{1}{2})}}} 2r^{2j+1} e^{-Nq(r)}\, dr + \int_{r^*_{\tau(j+\frac{1}{2})}}^\infty 2r^{2j+1} e^{-Nq(r)}\, dr. \end{align*} Due to strict subharmonicity of $Q$ in a neighborhood of the droplet, $r_\tau$ defined in \eqref{r tau min} satisfies $r_{\tau} = O({\tau}^{\frac{1}{2}})$ as $\tau \to 0$. Since the function $V_{\tau}$ in \eqref{V tau} has a global minimum at $r=r_{\tau}$ and increases in $(r_{\tau},\infty)$, for all $r>r^*_{\tau(j+\frac{1}{2})}$, we have \begin{align} \begin{split} \label{V increas h lower} V_{\tau(j+\frac{1}{2})}(r) &\geq V_{\tau(j+\frac{1}{2})}(r^*_{\tau(j+\frac{1}{2})}) = q(r^*_{\tau(j+\frac{1}{2})}) - \frac{2j+1}{N}\log(r^*_{\tau(j+\frac{1}{2})})\\ &= q(0) + \frac{1}{2}q''(0)(r^*_{\tau(j+\frac{1}{2})})^2 - \frac{2j+1}{N}\log(r^*_{\tau(j+\frac{1}{2})}) + O(r^*_{\tau(j+\frac{1}{2})})^3. \end{split} \end{align} Here, we also have used $q'(0)=0$, which follows from \eqref{Delta Q q' q''} and the fact that $\Delta Q(z) \in (0,\infty)$ near the origin. Using \eqref{V increas h lower}, it follows that \begin{align*} &\quad e^{Nq(0)}\int_{r^*_{\tau(j+\frac{1}{2})}}^\infty 2r^{2j+1} e^{-N q(r)}\, dr = \int_{r^*_{\tau(j+\frac{1}{2})}}^\infty 2\,e^{-N( V_{\tau(j+\frac{1}{2})}(r)-q(0))}\, dr \\ &\leq e^{-c_1(N-M) (r^*_{\tau(j+\frac{1}{2})} )^2 } (r^*_{\tau(j+\frac{1}{2})})^{(2j+1)\frac{N-M}{N}} \int_{r^*_{\tau(j+\frac{1}{2})}}^\infty 2 \, e^{-M(V_{\tau(j+\frac{1}{2})}(r)-q(0))}\, dr =: \epsilon_N(j) \end{align*} for some $c_1>0$. Here, $M$ is given by \eqref{M choose}. Since $r_{\tau} = O({\tau}^{\frac{1}{2}})$, there exists $c_2>0$ such that \begin{align*} \epsilon_N(j) = O \Big( (r^*_{\tau(j+\frac{1}{2})})^{(2j+1)\frac{N-M}{N}} \cdot e^{-c_2 (j+\frac{1}{2})(\log N)^2 } \Big) = O\Big( \big(\tfrac{2j+1}{2N} (\log N)^2 \big)^{(2j+1)\frac{N-M}{2N}} e^{-c_2(j+\frac{1}{2})(\log N)^2}\Big) . \end{align*} Therefore we obtain \begin{align*} h_j &= \int_{0}^{\infty} 2r^{2j+1} e^{-N q(r)} \, dr = \int_{0}^{r^*_{\tau(j+\frac{1}{2})}} 2r^{2j+1} e^{-Nq(r)}\, dr + e^{-Nq(0)} \epsilon_N(j) \\ &= \int_{0}^{r^*_{\tau(j+\frac{1}{2})}} 2r^{2j+1} e^{-N(q(0) + \frac{1}{2}q''(0)r^2 ) + O(N (r^*_{\tau(j+\frac{1}{2})})^3 ) } \,dr + e^{-Nq(0)}\epsilon_N(j) \\ &= e^{-Nq(0)} \Big[ N^{-(j+1)} \int_{0}^{\infty} 2r^{2j+1} e^{- \frac{1}{2}q''(0)r^2 } \,dr \, \big(1 + O(N (r^*_{\tau(j+\frac{1}{2})})^3 )\big)+ \epsilon_N(j) \Big] \\ &= e^{-Nq(0)} \Big[ N^{-(j+1)} \Gamma(j+1) \Big(\frac{1}{2}q''(0)\Big)^{-(j+1)}\, \Big(1 + O\Big(N^{-\frac{1}{2}} \big(j+\tfrac{1}{2}\big)^{\frac{3}{2}}(\log N)^3 \Big) \Big)+ \epsilon_N(j) \Big], \end{align*} where $\epsilon_N(j)$ is negligible. This completes the proof. \end{proof} Recall that the sequences $\tau(j)$ and $\widetilde{\tau}(j)$ are given by \eqref{tau j wt tau j}: $\tau(j):=j/N, \widetilde{\tau}(j):=j/(2N)$ and the function $\mathfrak{B}_1$ is given by \eqref{B1}: \begin{equation*} \begin{split} \mathfrak{B}_1(r):= -\frac{1}{32} \frac{ \d_r^2 \Delta Q(r) }{ (\Delta Q(r))^2 } -\frac{19}{96r} \frac{\d_r \Delta Q(r)}{ (\Delta Q(r))^2 }+\frac{5}{96} \frac{ (\d_r \Delta Q(r))^2 }{ \Delta Q(r)^3 } +\frac{1}{12r^2} \frac{1}{\Delta Q(r)}. \end{split} \end{equation*} Recall also that $V_\tau$ is given by \eqref{V tau} $V_\tau(r):=q(r)-2\tau\log r$ and $r_{\tau}$ is given by \eqref{r tau min} or \eqref{r tau eq} $r_\tau q'(r_\tau)=2\tau$. As a counterpart of Lemma~\ref{Lem_hj asymptotic}, we show the following lemma. \begin{lem}\label{Lem_hj higher} As $N \to \infty$, the following holds. \begin{itemize} \item For $j =m_N,m_N+1,\dots, N-1$, we have \begin{equation*} \log h_j = - NV_{\tau(j)}(r_{\tau(j)}) + \frac{1}{2} \log \Big( \frac{2\pi r_{\tau(j)}^2 }{ N \Delta Q(r_{\tau(j)}) } \Big) + \frac{1}{N}\mathfrak{B}_1(r_{\tau(j)}) + O(j^{-\frac{3}{2}}(\log N)^{\alpha}). \end{equation*} \item For $j =2m_N,2m_N+1, \dots, 2N-1$, we have \begin{equation*} \log \widetilde{h}_j = - 2NV_{\widetilde{\tau}(j)}(r_{\widetilde{\tau}(j)}) + \frac{1}{2} \log\Big( \frac{\pi r_{\widetilde{\tau}(j)}^2 }{ N\Delta Q(r_{\widetilde{\tau}(j)}) } \Big) + \frac{1}{2N}\mathfrak{B}_1(r_{\widetilde{\tau}(j)}) + O(j^{-\frac{3}{2}}(\log N)^{\alpha}). \end{equation*} \end{itemize} Here $\alpha>0$ is a small constant. \end{lem} \begin{proof} This lemma can be shown in a similar way to Lemma~\ref{Lem_hj asymptotic}. Recall that $r_{\tau}$ satisfies $r_{\tau}=O(\tau^{\frac{1}{2}})$ as $\tau \to 0$. Note that for $d\ge1$ \begin{equation} |V_{\tau}^{(d)}(r_{\tau})| = |q^{(d)}(r_{\tau}) + (-1)^{d} \, 2\tau\, (d-1)! \, r_{\tau}^{-d}| \leq C_1(1+ \tau^{-\frac{d}{2}+1}), \end{equation} where $C_1>0$ is a constant that can be taken uniformly for all $\tau$. We now split the integral for $h_j$ by \begin{align} h_j &= \int_{0}^{\infty} 2r^{2j+1} e^{-N q(r)} \, dr = \int_{0}^{\infty} 2r e^{-N V_{\tau(j)}(r)} \, dr \\ &= \int_{r_{\tau(j)}-\delta_N}^{r_{\tau(j)}+\delta_N} 2r e^{-NV_{\tau(j)}(r)}\, dr + \int_{|r-r_{\tau(j)}|>\delta_N} 2r e^{-NV_{\tau(j)}(r)}\, dr \end{align} and first compute the integral over the outer region. For $m_N \leq j < N$, we have \begin{equation*} r_{\tau(j+\frac{1}{2})} - r_{\tau(j)} = O((jN)^{-\frac{1}{2}}). \end{equation*} Since $V_{\tau}$ is increasing in $(r_{\tau},\infty)$, the Taylor series expansion for $V_{\tau}$ gives \begin{align}\label{Vtauh:1} \begin{split} V_{\tau(j+\frac{1}{2})}(r) &\geq V_{\tau(j+\frac{1}{2})}(r_{\tau(j)}+\delta_N) \\ &= V_{\tau(j+\frac{1}{2})}(r_{\tau(j+\frac{1}{2})}) + \frac{1}{2}V''_{\tau(j+\frac{1}{2})}(r_{\tau(j+\frac{1}{2})})\big(r_{\tau(j)} + \delta_N - r_{\tau(j+\frac{1}{2})} \big)^2 + O(\tau(j)^{-\frac{1}{2}}\delta_N^3) \end{split} \end{align} for all $r>r_{\tau(j)}+\delta_N$. Here, $O(\tau(j)^{-\frac{1}{2}} \delta_N^3) = O(N^{-1}j^{-\frac{1}{2}}(\log N)^3)$. Similarly, since $V_{\tau}$ is decreasing in $(0,r_\tau)$, we have \begin{align}\label{Vtauh:1-1} \begin{split} V_{\tau(j+\frac{1}{2})}(r) &\geq V_{\tau(j+\frac{1}{2})}(r_{\tau(j)}-\delta_N) \\ &= V_{\tau(j+\frac{1}{2})}(r_{\tau(j+\frac{1}{2})}) + \frac{1}{2}V''_{\tau(j+\frac{1}{2})}(r_{\tau(j+\frac{1}{2})})\big(r_{\tau(j)} - \delta_N - r_{\tau(j+\frac{1}{2})} \big)^2 + O(\tau(j)^{-\frac{1}{2}}\delta_N^3) \end{split} \end{align} for all $r< r_{\tau(j)}-\delta_N$. Using the Taylor series for $V_{\tau}$ again, we have \begin{align}\label{Vtauh:2} \begin{split} V_{\tau(j+\frac{1}{2})}(r_{\tau(j+\frac{1}{2})}) - V_{\tau(j)}(r_{\tau(j)}) &= V_{\tau(j)}(r_{\tau(j+\frac{1}{2})}) - V_{\tau(j)}(r_{\tau(j)}) - \frac{1}{N}\log r_{\tau(j+\frac{1}{2})} \\ &=O((jN)^{-1}) - \frac{1}{N}\log r_{\tau(j+\frac{1}{2})}. \end{split} \end{align} Thus, it follows from \eqref{Vtauh:1}, \eqref{Vtauh:1-1}, and \eqref{Vtauh:2} that \begin{align}\label{int:outer} \begin{split} &\quad e^{NV_{\tau(j)}(r_{\tau(j)})} \int_{|r-r_{\tau(j)}|>\delta_N} 2r^{2j+1} e^{-Nq(r)}\,dr = \int_{|r-r_{\tau(j)}|>\delta_N} 2 e^{-N \big(V_{\tau(j+\frac{1}{2})}(r) - V_{\tau(j)}(r_{\tau(j)})\big)} \,dr \\ &\leq e^{-c_1(\log N)^2} e^{\frac{N-M}{N}\log r_{\tau(j+\frac{1}{2})}} \int_{|r-r_{\tau(j)}|>\delta_N} 2 e^{-M\big(V_{\tau(j+\frac{1}{2})}(r) - V_{\tau(j)}(r_{\tau(j)}) \big)}\,dr = O(e^{-c_2(\log N)^2}) \end{split} \end{align} for some $c_1, c_2 >0$. Here $M$ is given by \eqref{M choose}. For the integral near the critical point $r_{\tau(j)}$, we use the Taylor series expansion to obtain \begin{align*} &\quad \int_{r_{\tau(j)}-\delta_N}^{r_{\tau(j)}+\delta_N} 2r e^{-NV_{\tau(j)}(r)}\, dr \\ & = e^{-NV_{\tau(j)}(r_{\tau(j)})}\int_{-\delta_N}^{\delta_N} 2(r_{\tau(j)}+t) \,e^{-N ( \frac{1}{2}V_{\tau(j)}''(r_{\tau(j)})t^2 + \frac{1}{6}V_{\tau(j)}^{(3)}(r_{\tau(j)}) t^3 + \frac{1}{24}V_{\tau(j)}^{(4)}(r_{\tau(j)})t^4 + O(\tau(j)^{-\frac{3}{2}}|t|^5))} dt \\ &=e^{-NV_{\tau(j)}(r_{\tau(j)})}\frac{1}{\sqrt{N}}\int_{-\sqrt{N}\delta_N}^{\sqrt{N}\delta_N} 2 e^{-2\Delta Q(r_{\tau(j)})t^2 } \,\Big(r_{\tau(j)}+\frac{t}{\sqrt{N}}\Big) \\ & \hspace{10em} \Big( 1 - \frac{V_{\tau(j)}^{(3)}(r_{\tau(j)})}{6\sqrt{N}} t^3 - \frac{V_{\tau(j)}^{(4)}(r_{\tau(j)})}{24 N} t^4 + \frac{(V_{\tau(j)}^{(3)}(r_{\tau(j)}))^2}{72N} t^6 + \epsilon'_{N,1} \Big) \,dt \end{align*} where $\epsilon'_{N,1}=O(j^{-\frac{3}{2}}(\log N)^{\alpha})$ for some $\alpha>0$. Combining the all of the above, we obtain \begin{align*} h_j = e^{-NV_{\tau(j)}(r_{\tau(j)})} \Big[ \frac{1}{\sqrt{N}} \Big(\frac{2\pi r_{\tau(j)}^2}{\Delta Q(r_{\tau(j)})}\Big)^{\frac{1}{2}}\Big(1+\frac{1}{N}\mathfrak{B}_1(r_{\tau(j)})+\epsilon_{N,1}\Big) + \epsilon_{N,2} \Big] \end{align*} where $\epsilon_{N,1}=O(j^{-\frac{3}{2}}(\log N)^{\alpha})$ and $\epsilon_{N,2} = O(e^{-c_2(\log N)^2})$. \end{proof} \subsection{Random normal matrix ensemble} In this subsection, we show Theorem~\ref{Thm_ZN disc} (i). According to the asymptotic expansions of $h_j$ given in Lemmas~\ref{Lem_hj lower} and ~\ref{Lem_hj higher}, we analyze the summation in \eqref{ZN random normal symplectic} through the decomposition \begin{equation} \label{sum hj decomp} \sum_{j=0}^{N-1} \log h_j = \sum_{j=0}^{m_N-1} \log h_j + \sum_{j=m_N}^{N-1} \log h_j. \end{equation} The asymptotic behaviors of each summation on the right-hand side of \eqref{sum hj decomp} are given in Lemma~\ref{Lem_sum of log hj lower} and \ref{Lem_sum of log hj higher}, respectively. \begin{lem} \label{Lem_sum of log hj lower} As $N\to \infty$, we have \begin{align*} \sum_{j=0}^{m_N-1} \log h_j & = - m_N N q(0) - \frac{m_N(m_N+1)}{2}\Big(\log N + \log \big(\frac{1}{2}q''(0)\big)\Big) \\ &\quad +\frac{1}{2}m_N^2\log m_N - \frac{3}{4}m_N^2 + \frac{\log(2\pi)}{2}m_N - \frac{1}{12}\log m_N + \zeta'(-1) + O(m_N^{-2}+N^{-\frac{1}{2}(1-5\epsilon)}(\log N)^3). \end{align*} \end{lem} \begin{proof} By Lemma~\ref{Lem_hj lower}, we have \begin{align*} \sum_{j=0}^{m_N-1} \log h_j = - m_N N q(0) - \frac{m_N(m_N+1)}{2}\Big(\log N + \log \big(\frac{1}{2}q''(0)\big)\Big) + \log G(m_N+1) + O(N^{-\frac{1}{2}(1-5\epsilon)}(\log N)^3), \end{align*} where $G$ is the Barnes $G$-function that can be defined recursively by \begin{equation} \label{Barnes G def} G(z+1)=\Gamma(z)G(z),\qquad G(1)=1. \end{equation} Now lemma follows from \eqref{Barnes G asymp}. \end{proof} \begin{lem}\label{Sum:Vtau disc} As $N\to \infty$, we have \begin{align*} \sum_{j=m_N}^{N-1}V_{\tau(j)}(r_{\tau(j)}) &= N I_{Q}[\mu_Q]-U_{\mu_Q}(0) - \frac{1}{6N}\log r_1 \\ &\quad - m_Nq(0) - \frac{3}{4}\frac{m_N^2}{N} + \frac{1}{2N}\Big(m_N^2-m_N +\frac{1}{6}\Big)\log \Big(\frac{m_N}{N\Delta Q(0)}\Big) + \frac{m_N}{2N} + O(N^{-\frac{1}{2}(3-5\epsilon)}). \end{align*} \end{lem} \begin{proof} By applying the Euler-Maclaurin formula \eqref{EMF}, we have \begin{align} \begin{split} \sum_{j=m_N}^{N-1} V_{\tau(j)}(r_{\tau(j)}) & = \int_{m_N}^{N} V_{\tau(t)}(r_{\tau(t)}) \,dt - \frac{1}{2}\Big(V_{\tau(N)}(r_{\tau(N)}) - V_{\tau(m_N)}(r_{\tau(m_N)})\Big) \\ &\quad + \frac{1}{12}\Big(\d_t (V_{\tau(t)}(r_{\tau(t)}))\big|_{t=N} - \d_t ( V_{\tau(t)}(r_{\tau(t)}))\big|_{t=m_N}\Big) + O(N^{-1-2\epsilon}). \label{hj higher 0} \end{split} \end{align} Here we have used $\d_t^3 (V_{\tau(t)}(r_{\tau(t)}))\big|_{t=m_N} = O(N^{-3} (\tau(m_N))^{-2}) = O(m_N^{-2}N^{-1})$ and $B_2=1/6$. By the change of variables $s = r_{\tau(t)}$ and the formula \eqref{energy radially sym} of $I_Q[\mu_Q]$, we obtain \begin{align} &\quad \int_{m_N}^N V_{\tau(t)}(r_{\tau(t)})\, dt = 2N\int_{r_{\tau(m_N)}}^{r_1} (q(s) - sq'(s)\log s) s\Delta Q(s) \,ds \\ & = N\Big( \frac{1}{2}\int_{S \setminus S_{\tau(m_N)}}\!\!\! Q \cdot \Delta Q \, dA - \log r_1 + (\tau(m_N))^2\log r_{\tau(m_N)}+ \frac{1}{2}(q(r_{1}) - \tau(m_N)\cdot q(r_{\tau(m_N)})) \Big)\\ &= N I_{Q}[\mu_Q] - \frac{N}{2}\int_{S_{\tau(m_N)}} Q \cdot \Delta Q dA + \frac{m_N^2}{N}\log r_{\tau(m_N)} - \frac{m_N}{2}q(r_{\tau(m_N)}). \end{align} Observe here that \begin{equation} r_{\tau} = \Big(\frac{2\tau}{q''(0)}\Big)^{\frac{1}{2}} + O(\tau) = \Big(\frac{\tau}{\Delta Q(0)}\Big)^{\frac{1}{2}} + O(\tau)\qquad \textup{as } \tau \to 0. \label{r tau asymp} \end{equation} Thus we have \begin{align} \log r_{\tau(m_N)} &= \frac{1}{2} \log \Big( \frac{ \tau(m_N) }{ \Delta Q(0) } \Big) + O(\tau(m_N)^{\frac{1}{2}}) = \frac{1}{2} \log \Big( \frac{ \tau(m_N) }{ \Delta Q(0) } \Big)+ O(N^{-\frac{1}{2}(1-\epsilon)}), \label{log r tau asymp} \\ q(r_{\tau(m_N)}) &= q(0) + \frac{1}{2}q''(0)(r_{\tau(m_N)})^2 + O((\tau(m_N))^{\frac{3}{2}}) = q(0) + \tau(m_N) + O(N^{-\frac{3}{2}(1-\epsilon)}), \label{q r tau asymp} \end{align} and \begin{align*} \frac{1}{2}\int_{S_{\tau(m_N)}} Q\cdot \Delta Q \,dA &= \frac{1}{4} \int_{0}^{r_{\tau(m_N)}} q(s) \cdot (sq'(s))' \,ds = \frac{1}{2} \tau(m_N)\cdot q(r_{\tau(m_N)}) - \frac{1}{4}\int_{0}^{r_{\tau(m_N)}} s (q'(s))^2 \,ds \\ &= \frac{1}{2} \tau(m_N)\cdot q(r_{\tau(m_N)}) - \frac{1}{4}(q''(0))^2 \int_{0}^{r_{\tau(m_N)}} s^3 \,ds + O(r_{\tau(m_N)}^5) \\ &= \frac{1}{2} \tau(m_N)\cdot q(r_{\tau(m_N)}) - \frac{1}{4} \tau(m_N)^2 + O(N^{-\frac{5}{2}(1-\epsilon)}). \end{align*} Combining all of the above asymptotic expansions, we obtain \begin{align} \begin{split} \int_{m_N}^N V_{\tau(t)}(r_{\tau(t)})\, dt &= NI_{Q}[\mu_Q] - m_N q(r_{\tau(m_N)}) + \frac{1}{4} \frac{m_N^2}{N} + \frac{m_N^2}{N}\log r_{\tau(m_N)} + O(N^{-\frac{1}{2}(3-5\epsilon)}) \\ &= NI_{Q}[\mu_{Q}] - m_N q(0) - \frac{3}{4}\,\frac{m_N^2}{N} + \frac{m_N^2}{2N}\log\Big( \frac{m_N}{N\Delta Q(0)}\Big) + O(N^{-\frac{1}{2}(3-5\epsilon)}). \label{hj higher 1} \end{split} \end{align} Furthermore, it follows from the formula~\eqref{potential radially sym} of $U_{\mu_Q}(0)$, \eqref{log r tau asymp} and \eqref{q r tau asymp} that \begin{align} \begin{split} &\quad V_{\tau(N)}(r_{\tau(N)}) - V_{\tau(m_N)}(r_{\tau(m_N)}) = q(r_1)- 2\log r_1 - q(r_{\tau(m_N)}) + 2\tau(m_N)\cdot\log r_{\tau(m_N)} \\ &= q(r_1) - 2\log r_1 - q(0) - \frac{m_N}{N} + \frac{m_N}{N}\log \Big( \frac{m_N}{N\Delta Q(0)} \Big)+ O(N^{-\frac{3}{2}(1-\epsilon)}) \label{hj higher 2} \\ &= 2 U_{\mu_Q}(0)- \frac{m_N}{N} + \frac{m_N}{N}\log \Big( \frac{m_N}{N\Delta Q(0)} \Big)+ O(N^{-\frac{3}{2}(1-\epsilon)}). \end{split} \end{align} Similarly, we have \begin{align} \begin{split} \d_t (V_{\tau(t)}(r_{\tau(t)}))\big|_{t=N} - \d_t ( V_{\tau(t)}(r_{\tau(t)}))\big|_{t=m_N} &= \frac{2}{N}(\log{r_{\tau(m_N)}}-\log{r_1})\\ &= \frac{1}{N}\log \Big( \frac{m_N}{N\Delta Q(0)} \Big) - \frac{2}{N}\log r_1 + O(N^{-\frac{1}{2}(3-\epsilon)}). \label{hj higher 3} \end{split} \end{align} Now lemma follows from \eqref{hj higher 0}, \eqref{hj higher 1}, \eqref{hj higher 2} and \eqref{hj higher 3}. \end{proof} \begin{lem}\label{Lem_sum of Lap Q r disc} As $N \to \infty$, we have \begin{equation} \sum_{j=m_N}^{N-1} \log \Delta Q(r_{\tau(j)}) = NE_{Q}[\mu_Q] - \frac{1}{2} \log\Big( \frac{ \Delta Q(r_1) }{ \Delta Q(0) } \Big) - m_N\log \Delta Q(0) + O(N^{-\frac{1}{2}(1-\epsilon)}), \end{equation} and \begin{equation} \sum_{j=m_N}^{N-1} \log r_{\tau(j)} = -NU_{\mu_Q}(0) + \frac{m_N}{2} - \frac{1}{2}\log r_1 - \Big(\frac{m_N}{2} -\frac{1}{4} \Big)\log \Big( \frac{m_N}{N\Delta Q(0)} \Big) + O(N^{-\epsilon}). \end{equation} \end{lem} \begin{proof} Using the Euler-maclaurin formula \eqref{EMF}, \begin{align*} \sum_{j=m_N}^{N-1} \log \Delta Q(r_{\tau(j)}) =& N\int_{S\setminus S_{\tau(m_N)}} \log \Delta Q\, d\mu_Q - \frac{1}{2} \log\Big( \frac{\Delta Q(r_1)}{ \Delta Q(r_{\tau(m_N)}) } \Big) \\ &+ \frac{1}{12}\big(\d_t \log \Delta Q (r_{\tau(t)}))\big|_{t=N} - \d_t \log \Delta Q (r_{\tau(t)}))\big|_{t=m_N}\big) + o(N^{-1}\tau(m_N)^{-\frac{1}{2}}). \end{align*} We verify from \eqref{r tau asymp} that \begin{align*} \int_{S_{\tau(m_N)}} \log \Delta Q \,d\mu_Q &= \Delta Q(0)\cdot \log\Delta Q(0) \cdot r_{\tau(m_N)}^2 + O(\tau(m_N)^3) = \frac{m_N}{N}\log\Delta Q(0) + O(N^{-3(1-\epsilon)}) \end{align*} and \begin{align*} \d_{t} \log \Delta Q(r_{\tau(t)})\big|_{t=m_N} = \frac{1}{2N}\frac{\d_r \Delta Q(r_{\tau(m_N)})}{r_{\tau(m_N)}(\Delta Q (r_{\tau(m_N)}))^2} = O(N^{-1} \tau(m_N)^{-\frac{1}{2}}) = O(N^{-\frac{1}{2}(1+\epsilon)}). \end{align*} Observe that $\log \Delta Q(r_{\tau(m_N)}) = \log \Delta Q(0) + O(r_{\tau(m_N)})$. Combining above equations, we obtain the first assertion. Similarly, by using the Euler-Maclaurin formula \eqref{EMF}, \eqref{log r tau asymp}, and \eqref{q r tau asymp}, we have \begin{align*} \sum_{j=m_N}^{N}\log r_{\tau(j)} &= N\int_{S\setminus S_{\tau(m_N)}}\log|z|\, d\mu_{Q} - \frac{1}{2}\log\Big( \frac{ r_1 }{ r_{\tau(m_N)} } \Big) +O(m_N^{-1})\\ &=\frac{N}{2}\Big(2\log r_1 - 2\tau(m_N)\log r_{\tau(m_N)} - q(r_1) + q(r_{\tau(m_N)})\Big) - \frac{1}{2}\log\Big( \frac{ r_1 }{ r_{\tau(m_N)} } \Big) \\ &= N\Big(\log r_1 - \frac{q(r_1)-q(0)}{2} +\frac{1}{2}\tau(m_N) \Big) - \frac{1}{2}\log r_1 - \Big(\frac{m_N}{2} -\frac{1}{4}\Big)\log \Big( \frac{\tau(m_N)}{\Delta Q(0)}\Big) + O(N^{-\epsilon}), \end{align*} which completes the proof. \end{proof} \begin{lem} \label{Lem_sum of B1 higher} As $N\to \infty$, we have \begin{align*} \frac{1}{N}\sum_{j=m_N}^{N-1} \mathfrak{B}_1(r_{\tau(j)}) & = F_Q[\mathbb{D}_{r_1}] + \frac{1}{3}\log r_1 - \frac{1}{12}\log \Big( \frac{m_N}{N}\Big) -\frac{1}{4} \log \Big( \frac{ \Delta Q(r_1) }{ \Delta Q(0) } \Big) \\ &\quad +\frac{1}{6}\log \Delta Q(0) + O(N^{-\epsilon}+N^{-\frac{1}{2}(1-\epsilon)}), \end{align*} where $F_Q[\mathbb{D}_{r_1}]$ is given in \eqref{FQ disc}. \end{lem} \begin{proof} Observe that \begin{align*} \sum_{j=m_N}^{N-1} \mathfrak{B}_1(r_{\tau(j)}) &= N\int_{S\setminus S_{\tau(m_N)}} \mathfrak{B}_1\, d\mu_Q + O(\tau(m_N)^{-1}). \end{align*} By \eqref{r tau asymp} and \eqref{log r tau asymp}, \begin{align*} &\quad \int_{S\setminus S_{\tau(m_N)}} \!\!\!\mathfrak{B}_1 \, d\mu_Q = \frac{1}{6}\log \Big(\frac{r_1}{r_{\tau(m_N)}}\Big) - \frac{19}{48}\log \Big(\frac{\Delta Q(r_1)}{\Delta Q(r_{\tau(m_N)})}\Big)-\frac{1}{16} \int_{r_{m_N}}^{r_1} \Big[ \frac{\d_r^2 \Delta Q(r)}{\Delta Q(r)} - \frac{5}{3}\Big(\frac{\d_r\Delta Q(r)}{\Delta Q(r)}\Big)^2 \Big] r\, dr\\ &= \frac{1}{6}\log r_1 - \frac{1}{12}\log \Big(\frac{\tau(m_N)}{\Delta Q(0)}\Big) - \frac{19}{48}\log \Big(\frac{\Delta Q(r_1)}{\Delta Q(0)}\Big)- \frac{1}{16} \int_{0}^{r_1} \Big[ \frac{\d_r^2 \Delta Q(r)}{\Delta Q(r)} - \frac{5}{3}\Big(\frac{\d_r\Delta Q(r)}{\Delta Q(r)}\Big)^2 \Big] r\, dr + O(N^{-\frac{1}{2}(1-\epsilon)}). \end{align*} Thus we have \begin{align*} \frac{1}{N}\sum_{j=m_N}^{N-1} \mathfrak{B}_1(r_{\tau(j)}) & = \frac{1}{6}\log r_1 - \frac{1}{12}\log \Big( \frac{m_N}{N\Delta Q(0)}\Big) - \frac{19}{48}\log \Big(\frac{\Delta Q(r_1)}{\Delta Q(0)}\Big) \\ &\quad - \frac{1}{16} \int_{0}^{r_1} \Big[ \frac{\d_r^2 \Delta Q(r)}{\Delta Q(r)} - \frac{5}{3}\Big(\frac{\d_r\Delta Q(r)}{\Delta Q(r)}\Big)^2 \Big] r\, dr + O(N^{-\epsilon}+N^{-\frac{1}{2}(1-\epsilon)}). \end{align*} Now lemma follows from \eqref{Delta Q partial integral}. \end{proof} \begin{lem} \label{Lem_sum of log hj higher} As $N\to \infty$, we have \begin{align*} \sum_{j=m_N}^{N-1}\log h_j &= -N^2 I_Q[\mu_Q] + \frac{N-m_N}{2}\log \Big(\frac{2\pi}{N}\Big) + Nm_N q(0) + \frac{3}{4}m_N^2 - \frac{1}{2}NE_{Q}[\mu_Q] \\ &\quad - \frac{1}{2} m_N (m_N+1 )\log\Big( \frac{1}{\Delta Q(0)}\Big) + F_Q[\mathbb{D}_{r_1}] -\frac{1}{2}\Big(m_N^2 - \frac{1}{6}\Big)\log \Big( \frac{m_N}{N} \Big) + O(N^{-\frac{1}{12}}(\log N)^{3}). \end{align*} \end{lem} \begin{proof} By Lemma~\ref{Lem_hj higher}, we have \begin{align*} \sum_{j=m_N}^{N-1} \log h_j = & \sum_{j=m_N}^{N-1} \Big(-NV_{\tau(j)}(r_{\tau(j)}) + \log r_{\tau(j)} - \frac{1}{2}\log\Delta Q(r_{\tau(j)}) +\frac{1}{N}\mathfrak{B}_1(r_{\tau(j)}) \Big) \\ & +\frac{(N-m_N)}{2}\log \Big( \frac{2\pi}{N} \Big)+ O(m_N^{-\frac{1}{2}}(\log N)^{\alpha})+O(N^{-\frac{1}{2}(1-5\epsilon)}). \end{align*} Now Lemmas~\ref{Lem_hj higher}, \ref{Sum:Vtau disc}, \ref{Lem_sum of Lap Q r disc} and \ref{Lem_sum of B1 higher} complete the proof. Here, for the error term, we take $\epsilon = 1/6$ so that $\epsilon/2=(1-5\epsilon)/2=1/12$. \end{proof} We are now ready to prove the first assertion of Theorem~\ref{Thm_ZN annulus}. \begin{proof}[Proof of Theorem~\ref{Thm_ZN disc} (i)] By combining Lemmas~\ref{Lem_sum of log hj lower}, \ref{Lem_sum of log hj higher} and \eqref{sum hj decomp}, we obtain \begin{equation} \sum_{j=0}^{N-1}\log h_j = -N^2 I_Q[\mu_Q] - \frac{1}{2}N\log N - \frac{N}{2}\Big(E_Q[\mu_Q] -\log(2\pi) \Big) - \frac{\log N}{12} +\zeta'(-1) +F_Q[\mathbb{D}_{r_1}] + O(N^{-\frac{1}{12}}(\log N)^{3}). \end{equation} Note here that all the terms involving $m_N$ in Lemmas~\ref{Lem_sum of log hj lower} and \ref{Lem_sum of log hj higher} vanish. Then the desired asymptotic expansion \eqref{ZN expansion cplx disc} follows from \eqref{ZN random normal symplectic} and \eqref{log N!}. This completes the proof. \end{proof} \subsection{Planar symplectic ensemble} In this subsection, we prove the second assertion of Theorem~\ref{Thm_ZN disc}. As a counterpart of Lemma~\ref{Lem_sum of log hj lower}, we have the following. \begin{lem} \label{Lem_sum of log hj lower symplectic} As $N\to\infty$, we have \begin{align*} \sum_{j=0}^{m_N-1} \log \widetilde{h}_{2j+1} & = -2 m_N N q(0) +m_N^2 \log m_N +\Big(\log 2-\frac32-\log (Nq''(0)) \Big) m_N^2 \\ &\quad+\frac12 m_N \log m_N+\Big( \log 2-\frac12+\frac12 \log \pi-\log (Nq''(0)) \Big)m_N \\ &\quad -\frac{1}{24}\log m_N + \frac{5}{24}\log 2 +\frac12 \zeta'(-1)+O(m_N^{-1}+N^{-\frac{1}{2}(1-5\epsilon)}(\log N)^3). \end{align*} \end{lem} \begin{proof} By Lemma~\ref{Lem_hj lower} and \eqref{Gamma multiplication}, we have \begin{align*} \log \widetilde{h}_{2j+1} = - 2Nq(0) - (2j+2) \log (N q''(0)) + \log \Big( \frac{ 2^{2j+1} }{ \sqrt{\pi} } \Gamma(j+1)\Gamma(j+\tfrac32) \Big) + O(N^{-\frac{1}{2}(1-3\epsilon)}). \end{align*} Thus we have \begin{align*} \sum_{j=0}^{m_N-1} \log \widetilde{h}_{2j+1} & = -2 m_N N q(0) - m_N(m_N+1)\log (N q''(0)) +m_N^2 \log 2-\frac{m_N}{2} \log \pi \\ &\quad +\log \Big( G(m_N+1) \frac{ G(m_N+\frac32) }{ G(\frac32) } \Big)+ O(N^{-\frac{1}{2}(1-5\epsilon)}). \end{align*} Now lemma follows from the asymptotic expansion \eqref{Barnes G asymp} of the Barnes $G$ function and \begin{equation} \label{G(1/2)} G(\tfrac12)=2^{ \frac{1}{24} }\,\exp\Big( \frac32 \zeta'(-1) \Big) \pi^{-\frac14}, \qquad G(\tfrac32)=G(\tfrac12)\Gamma(\tfrac12)= G(\tfrac12)\sqrt{\pi}. \end{equation} \end{proof} \begin{lem}\label{Sum:Vtau disc symplectic} As $N\to \infty,$ we have \begin{align*} \sum_{j=m_N}^{N-1}V_{\widetilde{\tau}(2j+1)}(r_{\widetilde{\tau}(2j+1)}) &= N I_{Q}[\mu_Q] + \frac{1}{12N}\log r_1 \\ &\quad - m_Nq(0)- \frac{3}{4}\frac{m_N^2}{N} +\frac{1}{4N}\Big(2m_N^2-\frac{1}{6}\Big)\log \Big(\frac{m_N}{N\Delta Q(0)}\Big) + O(N^{-\frac{1}{2}(3-5\epsilon)}). \end{align*} \end{lem} \begin{proof} By using Lemma~\ref{Sum:Vtau disc} with $N \to 2N$, we have \begin{align*} \sum_{j=2m_N}^{2N-1}V_{\widetilde{\tau}(j)}(r_{\widetilde{\tau}(j)}) &= 2N I_{Q}[\mu_Q] -U_{\mu_Q}(0) - \frac{1}{12N}\log r_1 \\ &\quad - 2m_Nq(0) - \frac{3}{2}\frac{m_N^2}{N} + \frac{1}{4N}\Big(4m_N^2-2m_N +\frac{1}{6}\Big)\log \Big(\frac{m_N}{N\Delta Q(0)}\Big) + \frac{m_N}{2N} + O(N^{-\frac{1}{2}(3-5\epsilon)}). \end{align*} On the other hand, by the Euler-Maclaurin formula \eqref{EMF}, we have \begin{align} \begin{split} \sum_{j=m_N}^{N-1} V_{\widetilde{\tau}(2j)}(r_{\widetilde{\tau}(2j)}) &= \frac12\int_{2m_N}^{2N} V_{\widetilde{\tau}(t)}(r_{\widetilde{\tau}(t)}) \, dt - \frac{1}{2}\big(V_{\widetilde{\tau}(2N)}(r_{\widetilde{\tau}(2N)})-V_{\widetilde{\tau}(2m_N)}(r_{\widetilde{\tau}(2m_N)})\big) \\ &\quad + \frac{1}{12}\Big(\d_t (V_{\widetilde{\tau}(2t)}(r_{\widetilde{\tau}(2t)}))\big|_{t=N} - \d_t ( V_{\widetilde{\tau}(2t)}(r_{\widetilde{\tau}(2t)}))\big|_{t=m_N}\Big) + O(N^{-1-2\epsilon}). \end{split} \end{align} Following the proof of Lemma~\ref{Sum:Vtau disc}, we have \begin{align} \begin{split} \sum_{j=m_N}^{N-1} V_{\widetilde{\tau}(2j)}(r_{\widetilde{\tau}(2j)}) &= N I_{Q}[\mu_Q] -U_{\mu_Q}(0) - \frac{1}{6N}\log r_1 \\ &\quad - m_Nq(0) - \frac{3}{4}\frac{m_N^2}{N} + \frac{1}{2N}(m_N^2-m_N +\frac{1}{6})\log \Big(\frac{m_N}{N\Delta Q(0)}\Big) + \frac{m_N}{2N} + O(N^{-\frac{1}{2}(3-5\epsilon)}), \end{split} \end{align} which completes the proof. \end{proof} \begin{lem}\label{Lem_sum of Lap Q r disc symplectic} As $N \to \infty$, we have \begin{equation} \sum_{j=m_N}^{N-1} \log \Delta Q(r_{\widetilde{\tau}(2j+1)}) = NE_{Q}[\mu_Q]- m_N\log \Delta Q(0) + O(N^{-\frac{1}{2}(1-\epsilon)}), \end{equation} and \begin{equation} \sum_{j=m_N}^{N-1} \log r_{\widetilde{\tau}(2j+1)} =-NU_{\mu_Q}(0) + \frac{m_N}{2} - \frac{m_N}{2} \log \Big(\frac{m_N}{N\Delta Q(0)}\Big) + O(N^{-\epsilon}). \end{equation} \end{lem} \begin{proof} By Lemma~\ref{Lem_sum of Lap Q r disc} with $N \to 2N$, we have \begin{align*} \sum_{j=2m_N}^{2N-1} \log \Delta Q(r_{\widetilde{\tau}(j)}) &= 2NE_{Q}[\mu_Q] - \frac{1}{2} \log \Big( \frac{\Delta Q(r_1)}{ \Delta Q(0) } \Big) - 2m_N\log \Delta Q(0) + O(N^{-\frac{1}{2}(1-\epsilon)}), \\ \sum_{j=2m_N}^{2N-1} \log r_{\widetilde{\tau}(j)} &= -2N U_{\mu_Q}(0) + m_N - \frac{1}{2}\log r_1 - \Big(m_N -\frac{1}{4} \Big)\log \Big(\frac{m_N}{N\Delta Q(0)}\Big) + O(N^{-\epsilon}). \end{align*} Following the proof of Lemma~\ref{Lem_sum of Lap Q r disc}, we also have \begin{align*} \sum_{j=m_N}^{N-1} \log \Delta Q(r_{\widetilde{\tau}(2j)}) & = NE_{Q}[\mu_Q] -\frac{1}{2} \log \Big( \frac{\Delta Q(r_1)}{ \Delta Q(0) } \Big) - 2m_N\log \Delta Q(0) + O(N^{-\frac{1}{2}(1-\epsilon)}), \\ \sum_{j=m_N}^{N-1} \log r_{\widetilde{\tau}(2j)} &= -NU_{\mu_Q}(0)+ m_N - \frac{1}{2}\log r_1 - \Big( m_N -\frac{1}{4} \Big)\log \Big( \frac{m_N}{N\Delta Q(0)} \Big) + O(N^{-\epsilon}). \end{align*} This completes the proof. \end{proof} \begin{lem} \label{Lem_sum of B1 higher symplectic} As $N\to\infty$, we have \begin{align*} \frac{1}{2N}\sum_{j=m_N}^{N-1} \mathfrak{B}_1(r_{\widetilde{\tau}(2j+1)}) = \frac12 F_Q[\mathbb{D}_{r_1}] + \frac{1}{6}\log r_1 - \frac{1}{24}\log \Big( \frac{m_N}{N}\Big) -\frac{1}{8} \log \Big( \frac{ \Delta Q(r_1) }{ \Delta Q(0) } \Big)+\frac{1}{12}\log \Delta Q(0) + O(m_N^{-1}). \end{align*} \end{lem} \begin{proof} This lemma follows along the same lines of Lemma~\ref{Lem_sum of B1 higher}. \end{proof} \begin{lem} \label{Lem_sum of log hj higher symplectic} As $N\to\infty$, we have \begin{align*} \sum_{j=m_N}^{N-1} \log \widetilde{h}_{2j+1} & =-2N^2 I_{Q}[\mu_Q]-\frac{N}{2}\log N+ N\Big( \frac{\log \pi}{2} -U_{\mu_Q}(0) -\frac12 E_{Q}[\mu_Q] \Big) \\ &\quad + \frac{3}{2} m_N^2 -\Big(m_N^2-\frac{1}{24}\Big)\log \Big(\frac{m_N}{N}\Big) +m_N \Big( 2 Nq(0) + \frac{1}{2} +\frac12 \log \Big(\frac{m_N}{\pi}\Big) \Big) \\ &\quad -\Big(m_N^2+\frac{1}{8}\Big)\log \Big(\frac{1}{\Delta Q(0)}\Big) + \frac12 F_Q[\mathbb{D}_{r_1}] + \frac{1}{8} \log\Big( \frac{ 1 }{ \Delta Q(r_1) } \Big) + O(m_N^{-\frac{1}{2}}(\log N)^{\alpha}). \end{align*} \end{lem} \begin{proof} Note that by Lemma~\ref{Lem_hj higher}, we have \begin{align*} \sum_{j=m_N}^{N-1} \log \widetilde{h}_{2j+1} = & \sum_{j=m_N}^{N-1} \Big(-2NV_{\widetilde{\tau}(2j+1)}(r_{\widetilde{\tau}(2j+1)}) + \log r_{\widetilde{\tau}(2j+1)} - \frac{1}{2}\log\Delta Q(r_{\widetilde{\tau}(2j+1)}) +\frac{1}{2N}\mathfrak{B}_1(r_{\widetilde{\tau}(2j+1)}) \Big) \\ & +\frac{(N-m_N)}{2}\log \Big(\frac{\pi}{N}\Big) + O(m_N^{-\frac{1}{2}}(\log N)^{\alpha}). \end{align*} The lemma now follows from Lemmas~\ref{Sum:Vtau disc symplectic}, \ref{Lem_sum of Lap Q r disc symplectic} and \ref{Lem_sum of B1 higher symplectic}. \end{proof} We now finish the proof of Theorem~\ref{Thm_ZN disc}. \begin{proof}[Proof of Theorem~\ref{Thm_ZN disc} (ii)] Combining Lemmas~\ref{Lem_sum of log hj lower symplectic} and \ref{Lem_sum of log hj higher symplectic}, after long but straightforward simplifications, we obtain \begin{align*} &\quad \sum_{j=0}^{N-1} \log (2\widetilde{h}_{2j+1}) =N \log 2+ \sum_{j=0}^{m_N-1} \log \widetilde{h}_{2j+1} + \sum_{j=m_N}^{N-1} \log \widetilde{h}_{2j+1} \\ &=-2N^2 I_{Q}[\mu_Q] -\frac{1}{2} N \log N + N\Big( \frac{\log (4\pi)}{2} -U_{\mu_Q}(0) -\frac12 E_{Q}[\mu_Q] \Big) -\frac1{24}\log N \\ &\quad+ \frac{5}{24}\log 2 +\frac12 \zeta'(-1) +\frac12 F_Q[\mathbb{D}_{r_1}] +\frac{1}{8} \log\Big( \frac{ \Delta Q(0) }{ \Delta Q(r_1) } \Big) +O(m_N^{-1}+N^{-\frac{1}{2}(1-5\epsilon)}(\log N)^3). \end{align*} Again, it is noteworthy that all the terms in Lemmas~\ref{Lem_sum of log hj lower symplectic} and \ref{Lem_sum of log hj higher symplectic} involving $m_N$ cancel each other. Now the asymptotic behavior \eqref{ZN expansion symp disc} follows from \eqref{ZN random normal symplectic} and the asymptotic expansion \eqref{log N!} of $\log N!$ with $\epsilon=1/6$. \end{proof} \section{Examples: Mittag-Leffler ensemble and truncated unitary ensemble} \label{Appendix_Examples} This section presents examples of our Theorems~\ref{Thm_ZN annulus} and \ref{Thm_ZN disc} for some well-known planar point processes. \subsection{Mittag-Leffler ensemble} \label{Subsec_ML} Let us consider the potential \begin{equation} \label{Q ML} Q(z)=|z|^{2\lambda}-2c \log|z|, \quad c > 0. \end{equation} The models \eqref{Gibbs cplx beta} and \eqref{Gibbs symplectic beta} associated with the potential \eqref{Q ML} are known as the Mittag-Leffler ensemble \cite{ameur2018random}. We refer to \cite{byun2022characteristic,charlier2021large,charlier2022exponential} and \cite{akemann2021scaling} for recent studies on complex and symplectic Mittag-Leffler ensembles, respectively. Using \eqref{droplet}, we have \begin{equation} \label{density power Q c} r_0= \Big(\frac{c}{\lambda}\Big)^{\frac{1}{2\lambda}},\qquad r_1= \Big(\frac{1+c}{\lambda}\Big)^{\frac{1}{2\lambda}}, \qquad \Delta Q(z)= \lambda^2 |z|^{2\lambda-2}. \end{equation} In particular, by \eqref{density power Q c}, the Mittag-Leffler ensemble \eqref{Q ML} falls into the class considered in Theorem~\ref{Thm_ZN annulus}. By direct computations using \eqref{entropy}, \eqref{energy radially sym} and \eqref{potential radially sym}, we have \begin{align} I_Q[\mu_Q] & = \frac{1}{2\lambda }\log \Big( \frac{c^{c^2} }{(1+c)^{(1+c)^2}} \Big)+\frac{1+2c}{2\lambda}\Big(\log \lambda+\frac32\Big), \label{IQ ML} \\ E_Q[\mu_Q] & =\frac{1+\lambda}{\lambda} \log \lambda + \frac{1-\lambda}{\lambda} \Big(1+ \log\Big(\frac{c^c}{(1+c)^{1+c} }\Big) \Big). \label{EQ ML} \end{align} It also follows from \eqref{FQ annulus} and \begin{equation} r\frac{ (\partial_r \Delta) Q (r) }{ \Delta Q (r)}= 2 \lambda-2, \qquad r^2 \Delta Q(r)= \lambda^2 r^{2\lambda} \end{equation} that \begin{equation} F_Q[\mathbb{A}_{r_0,r_1}] = \Big( \frac{\lambda}{6}-\frac{(\lambda-1)^2}{6} \Big) \log \Big( \frac{r_0}{r_1}\Big) =-\frac{ \lambda^2-3\lambda+1 }{12 \lambda}\log\Big( \frac{c}{1+c}\Big). \label{FQ ML} \end{equation} On the other hand, by using \eqref{ZN random normal symplectic}, \begin{equation} h_j= 2\int_0^\infty r^{2j+1+2cN} e^{-N r^{ 2\lambda }} \,dr= \frac{ 1 }{ \lambda } N^{- \frac{j+1+cN}{ \lambda } } \Gamma\Big( \frac{j+Nc+1}{ \lambda } \Big ) , \end{equation} and the analogous formula for $\widetilde{h}_j$, we have \begin{equation} Z_N= \frac{ N!} {\lambda^{N} } N^{-\frac{ (2c+1)N^2+N }{2\lambda} } \prod_{j=0}^{N-1} \Gamma\Big( \frac{j+Nc+1}{\lambda} \Big), \qquad \widetilde{Z}_N =\frac{ N! }{ (\lambda/2)^N }\, (2N)^{-\frac{ (2c+1)N^2+N }{\lambda} } \prod_{j=0}^{N-1} \Gamma\Big( \frac{j+Nc+1}{\lambda/2} \Big). \end{equation} Furthermore, using the multiplication theorem of gamma function (\cite[Eq. (5.5.6)]{olver2010nist}) \begin{equation}\label{Gamma multiplication} \Gamma(nz)= (2\pi)^{ \frac{1-n}{2} } n^{ nz-\frac12 } \prod_{k=0}^{n-1} \Gamma(z+\tfrac{k}{n}) \end{equation} and the characteristic property \eqref{Barnes G def} of the Barnes $G$-function, we have that for $ \frac{1}{\lambda} \in \mathbb{N}$, \begin{equation} \label{ZN ML cplx} Z_N= N!\, N^{-\frac{ (2c+1)N^2+N }{2\lambda} } (2\pi)^{ ( \frac12-\frac{1}{2\lambda} ) N } \Big( \frac{1}{\lambda} \Big)^{ (\frac{1}{2\lambda}+\frac{c}{\lambda} )N^2+ ( \frac{1}{\lambda}+\frac{1}{2}-\frac{1}{2\lambda} ) N } \prod_{k=0}^{ \frac{1}{\lambda}-1} \frac{ G( N+Nc+1+\lambda k)}{ G( Nc+1+\lambda k) }. \end{equation} Similarly, for $ \frac{2}{\lambda} \in \mathbb{N}$, we have \begin{equation} \label{ZN ML symplectic} \widetilde{Z}_N = N! \, (2N)^{-\frac{ (2c+1)N^2+N }{\lambda} } (2\pi)^{ ( \frac12-\frac{1}{\lambda} ) N } \Big( \frac{2}{\lambda} \Big)^{ (\frac{1}{\lambda}+\frac{2c}{\lambda} )N^2+ ( \frac{2}{\lambda}+\frac{1}{2}-\frac{1}{\lambda} ) N } \prod_{k=0}^{ \frac{2}{\lambda}-1} \frac{ G( N+Nc+1+\frac{\lambda}{2} k)}{ G( Nc+1+\frac{\lambda}{2} k) } . \end{equation} Then by using \eqref{Barnes G asymp}, one can directly check that the partition functions \eqref{ZN ML cplx} and \eqref{ZN ML symplectic} satisfy the expansions \eqref{ZN expansion cplx annulus} and \eqref{ZN expansion symp annulus} with \eqref{IQ ML}, \eqref{EQ ML} and \eqref{FQ ML}. \subsection{Truncated unitary ensemble}\label{Subsec_truncated} We now consider the potential \begin{equation} \label{Q truncated unitary strong} Q(z)= \begin{cases} -\alpha \, \log \Big( 1-\dfrac{|z|^2}{R^2(1+\alpha) } \Big) &\textup{if } |z| \le R\sqrt{1+\alpha }, \smallskip \\ \infty &\textup{otherwise}, \end{cases} \qquad \alpha,R>0. \end{equation} The models associated with \eqref{Q truncated unitary strong} correspond to the truncated unitary ensembles at strong non-unitarity \cite{khoruzhenko2021truncations,MR1748745}. These models provide a one-parameter generalization of the Ginibre ensembles that can be recovered in the extremal case, i.e. $\lim_{\alpha \to \infty} Q(z)= |z|^2/R^2$. (See \cite{dubach2021eigenvector,serebryakov2021characteristic} and references therein for recent works on these models.) In this case, we have \begin{equation} \label{density truncated} r_0=0,\qquad r_1=R, \qquad \Delta Q(z) = \frac{ R^2\, \alpha (1+\alpha ) }{ ( R^2(1+\alpha) -|z|^2)^2}. \end{equation} From \eqref{density truncated}, we see that the truncated unitary ensembles are contained in the class covered in Theorem~\ref{Thm_ZN disc}. (The hard edge condition imposed in \eqref{Q truncated unitary strong} outside the droplet does not harm the proof of Theorem~\ref{Thm_ZN disc}.) It is easy to verify from \eqref{entropy}, \eqref{energy radially sym} and \eqref{potential radially sym} that \begin{align} I_Q[\mu_Q] & = -\frac{\alpha }{2}-\frac{\alpha(2+\alpha )}{2} \log \Big( \frac{\alpha }{1+\alpha }\Big) -\log R, \label{IQ trunc} \\ E_Q[\mu_Q]&=- 2-(1+2\alpha )\log \Big( \frac{\alpha }{1+\alpha } \Big) -2\log R \label{EQ trunc}. \end{align} Since \begin{equation} r\frac{ (\partial_r \Delta) Q (r) }{ \Delta Q (r)}\Big|_{r=R} = \frac{4r^2}{R^2(1+\alpha)-r^2} \Big|_{r=R}= \frac{4}{\alpha} , \qquad R^2 \Delta Q(R)= \frac{ 1+\alpha }{ \alpha } , \end{equation} we deduce from \eqref{FQ disc} that \begin{equation} F_Q[\mathbb{D}_{R}]= \frac{1}{12}\log \Big( \frac{\alpha}{1+\alpha}\Big) -\frac{1}{4\alpha} +\frac{1}{3}\Big( \frac{1}{\alpha}+\log \Big( \frac{\alpha}{1+\alpha} \Big) \Big) = \frac{1}{12}\Big( \frac{1}{\alpha }+5 \log\Big(\frac{\alpha }{1+\alpha }\Big) \Big). \label{FQ trunc} \end{equation} Notice here that $F_Q[\mathbb{D}_{R}]$ is independent of $R$, which is consistent with the invariance of the $O(1)$-terms of \eqref{ZN expansion cplx disc} and \eqref{ZN expansion symp disc} under the dilation, see the remark below Theorem~\ref{Thm_ZN disc}. Using the Euler's beta integral \begin{equation} \frac{\Gamma(a) \Gamma(b)}{ \Gamma(a+b) } = \int_0^1 t^{a-1} (1-t)^{b-1}\,dt, \qquad (a,b>0), \end{equation} the orthogonal norm $h_j$ is computed as \begin{equation} h_j=\int_0^{ R\sqrt{1+\alpha} } r^{2j+1} \Big( 1- \frac{r^2}{ R^2(1+\alpha) } \Big)^{\alpha N} \,dr= R^{2j+2}(1+\alpha )^{j+1} \frac{ \Gamma(\alpha N+1) \Gamma(j+1) }{ \Gamma(\alpha N+j+2) }. \end{equation} Then by \eqref{ZN random normal symplectic} and \eqref{Barnes G def}, we have \begin{equation}\label{ZN trunc cplx} Z_N= N! \,R^{N(N+1)} (1+\alpha )^{ \frac{N^2}{2}+\frac{N}{2} } \, \Gamma(\alpha N+1)^N \, \frac{ G(N+1)G(\alpha N+2) }{ G(\alpha N+N+2) }. \end{equation} Similarly, by \eqref{ZN random normal symplectic} and the duplication formula of the gamma function (i.e. \eqref{Gamma multiplication} with $n=2$), \begin{equation} \label{ZN trunc symplectic} \begin{split} \widetilde{Z}_N & = N! \, R^{2N(N+1)} 2^{-2\alpha N^2}\, (1+\alpha )^{ N^2+N } \, \Gamma(2\alpha N+1)^N \\ &\quad \times G(N+1) \frac{G(N+\frac32)}{G(\frac32)} \frac{G(\alpha N+2)}{G(\alpha N+N+2)} \frac{G(\alpha N+\frac32)}{ G(\alpha N+N+\frac32)} . \end{split} \end{equation} Then by using \eqref{Barnes G asymp}, it is again straightforward to check that the partition functions \eqref{ZN trunc cplx} and \eqref{ZN trunc symplectic} satisfy the expansions \eqref{ZN expansion cplx disc} and \eqref{ZN expansion symp disc} with \eqref{IQ trunc}, \eqref{EQ trunc} and \eqref{FQ trunc}. In the extremal case where $\alpha \to \infty$, the expansion of the partition function $Z_N$ of the complex Ginibre ensemble appears in \cite{tellez1999exact}. \subsection*{Acknowledgements} We thank Christophe Charlier and Thomas Lebl\'{e} for helpful discussions. \bibliographystyle{abbrv}
\section{Introduction} Let $X$ be a compact K\"ahler manifold, and let $u \in H^0(X, \Omega_X^p)$ be a holomorphic $p$-form on $X$. As a consequence of the K\"ahler identity for the Laplacians $\Delta_d = 2 \Delta_{\partial}$ one obtains that the holomorphic form is $d$-closed, i.e. $d u=0$. Twenty years ago Jean-Pierre Demailly used a very clever ``integration by parts'' to generalise this statement to forms with values in certain line bundles: \begin{thm} \cite[Main thm]{Dem02} \label{theorem-demailly} Let $X$ be a compact K\"ahler manifold. Let $(L,h)$ be a holomorphic line bundle on $X$ where $h$ is a possibly singular metric such that $i\Theta_h (L)\geq 0$ on $X$ in the sense of currents. Let $$ u \in H^0(X, \Omega_X^p \otimes L^\star) $$ be a non-zero holomorphic section, and let $S_u \subset T_X$ be the saturated subsheaf given by vector fields $\xi$ such that the contraction $i_\xi u$ vanishes. Then one has $D' _{h^\star} u =0$. Hence $S_u$ is integrable, i.e. it defines a (possibly singular) foliation on $X$, and $(L,h)$ has flat curvature along the leaves. \end{thm} Demailly's main motivation for this result was to prove that if a compact K\"ahler manifold admits a contact structure, then the canonical bundle $K_X$ is never pseudoeffective \cite[Cor.2]{Dem02}. Moreover Theorem \ref{theorem-demailly} has turned out to be a very efficient tool for the study of foliations with vanishing first Chern class \cite{PT13, LPT18, GKP21}. In view of the increased interest in foliations on singular spaces (cf. e.g. \cite{CS21,Dru21}) it seems worthwhile to look at Demailly's arguments in this setting. Our main result is: \begin{thm} \label{theorem-main} Let $Y$ be a normal compact K\"ahler space with klt singularities. Let $\sA$ be a rank one reflexive sheaf such that the reflexive power $\sA^{[m]}$ is locally free and pseudoeffective for some $m \in \mathbb{N}$. Let $$ u \in H^0(Y, (\Omega_Y^p \otimes \sA^\star)^{\star\star}) $$ be a non-zero holomorphic section. Let $S_u \subset T_Y$ be the saturated subsheaf given by vector field $\xi$ such that the contraction $i_\xi u$ vanishes. Then $S_u$ is integrable, i.e. it defines a (possibly singular) foliation on $Y$. \end{thm} For applications in foliation theory it is interesting to verify if $\sA$ has flat curvature along the leaves of $S_u$. Since $\sA$ is not locally free the precise formulation would be a bit awkward, but flatness holds for the corresponding line bundle $(L,h)$ on a resolution of singularities (cf. Proposition \ref{l2version} and Proposition \ref{pless2}). Our basic strategy is similar to the proof of Theorem \ref{theorem-demailly}, except that we have to carry out the computation on a resolution of singularities $\holom{\pi}{X}{Y}$. If $\sA$ is not locally free this leads to some well-known difficulties, for example the saturation of $\pi^\star \sA$ in $\Omega^p_{X}$ is not always pseudoeffective \cite{GKP12, Ou14}. Therefore we consider forms with logarithmic poles along the exceptional divisor $E$ of the resolution $\pi$, in particular we obtain that the saturation in $\Omega^p_{X}(\log E)$ is pseudoeffective, cf. Corollary \ref{corollary-pseff}. This leads us to the following problem: \begin{question} \label{lccase} Let $(X,\omega_X)$ be a compact K\"ahler manifold, and let $E=\sum E_i$ be a snc divisor. Let $(L,h)$ be a holomorphic line bundle on $X$ where $h$ is a possibly singular metric such that $i\Theta_h (L)\geq 0$ on $X$ in the sense of currents. Let $(L^\star, h^\star)$ be the dual metric. Let $u\in H^0 (X, \Omega_X ^p (\log E) \otimes L^\star)$. Can we prove that $D' _{h^\star} u =0$ on $X\setminus E$, where $D' _{h^\star}$ is the connection with respect to $h^\star$ ? \end{question} If $p=1$, the problem is totally solved in \cite[Thm 5]{Tou16}\footnote{We thank St\'ephane Druel and Daniel Greb for bringing this reference to our attention.}. It is still open when $p\geq 2$. We give a positive answer to this question when the metric $h$ is smooth (Proposition \ref{proposition-smooth-metric}). Our main technical result (Proposition \ref{l2version}) gives a positive answer making an assumption on the singularity of $h$ along certain irreducible components $E_i$. This integrability condition can be verified for a resolution of singularities $X \rightarrow Y$ of a klt space. When $p=1$, by using the techniques in our article, we can also give an alternative proof of \cite[Thm 5]{Tou16}, cf. Proposition \ref{pless2}. It will imply the following property: \begin{proposition} \label{proposition-lc} Let $Y$ be a normal compact K\"ahler space with lc singularities. Let $\sA$ be a rank one reflexive sheaf such that the reflexive power $\sA^{[m]}$ is locally free and pseudoeffective for some $m \in \mathbb{N}$. Let $$ u \in H^0(Y, (\Omega_Y \otimes \sA^\star)^{\star\star}) $$ be a non-zero holomorphic section. Let $S_u \subset T_Y$ be the saturated subsheaf given by vector field $\xi$ such that the contraction $i_\xi u$ vanishes. Then $S_u$ is integrable, i.e. it defines a (possibly singular) foliation on $Y$. \end{proposition} Patrick Graf indicated an alternative path of proof of Proposition \ref{proposition-lc}: by \cite[Thm.1.4]{GK14}\footnote{The statement is formulated for algebraic varieties, but in view of \cite{KS21} should hold for analytic spaces.} a holomorphic $1$-form on the smooth locus of a log-canonical space extends to a resolution, even without admitting logarithmic poles. Therefore we can copy the proof of Theorem \ref{theorem-main} and verify the technical condition of Proposition \ref{l2version}. Note that \cite[Thm.1.6]{GK14} gives an example of a $2$-form on a $3$-fold that does not extend to a resolution unless we admit logarithmic poles. Therefore this approach does not allow to generalise Proposition \ref{proposition-lc} to forms in $(\Omega_Y^p \otimes \sA^\star)^{\star\star}$ with $p \geq 2$. {\bf Acknowledgements.} This work was initiated by our discussions with Mihai P\v aun during his stay in Nice in the spring 2022 for which we are very grateful. We thank Patrick Graf and Stefan Kebekus for communications on forms on singular spaces, St\'ephane Druel, Daniel Greb, Wenhao Ou, Mihai P\v aun and Fr\'ed\'eric Touzet for their valuable comments on the article. The Institut Universitaire de France and A.N.R project Karmapolis (ANR-21-CE40-0010) provided excellent working conditions for this project. \section{Notation and terminology} For general definitions in complex and algebraic geometry we refer to \cite{Har77, Dem12}, for the terminology of singularities of the MMP we refer to \cite{KM98}. Manifolds and normal complex spaces will always be supposed to be irreducible. Given a normal complex space $Y$, we denote by $\Omega_Y^{[p]}:= (\Omega_Y^p)^{\star\star}$ the sheaf of holomorphic reflexive $p$-forms. If $Y$ has klt singularities we know by \cite[Thm.1.1]{KS21} that this coincides with the sheaf of holomorphic $p$-forms that extend to a resolution of singularities $X \rightarrow Y$. For a reflexive sheaf $\sF$ on $Y$, we denote by $\sF^{[m]}:=(\sF^{\otimes m})^{\star\star}$ the $m$-th reflexive power. Given a surjective morphism $\holom{\varphi}{X}{Y}$ we denote by $\varphi^{[\star]} \sF$ the reflexive pull-back $(\varphi^\star \sF)^{\star\star}$. \section{Twisted logarithmic forms} \begin{proposition} \label{proposition-smooth-metric} Let $X$ be a compact K\"ahler manifold, and let $E=\sum E_i$ be a snc divisor. Let $(L,h)$ be a holomorphic line bundle on $X$ where $h$ is a smooth metric such that $i\Theta_h (L)\geq 0$. Let $u\in H^0 (X, \Omega_X ^p (\log E) \otimes L^\star)$ and $(L^\star, h^\star)$ be the dual metric on $(L,h)$. Then $D' _{h^\star} u =0$ on $X$ and $i\Theta_h (L) \wedge u\wedge \overline{u} =0$. \end{proposition} \begin{proof} If $L$ is a trivial line bundle, it is done by \cite{Nog95}. We generalize it to the twisted setting by the following argument. {\em Step 1:} Since $h$ is a smooth metric, we know that $D' _{h^\star} u \in C^\infty (X, \Omega^{p+1}_X (\log E) \otimes L^\star)$. We show in this step that $D' _{h^\star} u \in C^\infty (X, \Omega^{p+1}_X \otimes L^\star)$. We consider the residue of $u$ and $D' _{h^\star} u$ on $E_i$. First of all, by a direct calculation, we have \begin{equation}\label{equality1} \mathrm{Res}_{E_i} (D' _{h^\star} u) = - D'_{h^\star} \mathrm{Res}_{E_i} (u) \qquad\text{ on } E_i . \end{equation} In fact, let $\Omega$ be a neighborhood of a generic point of $E_i$. We suppose that $E_i$ is defined by $z_1=0$ and $h =e^{-\varphi}$ on $\Omega$. Then we can write $$u = \frac{dz_1}{z_1} \wedge f +g$$ for two smooth forms $f, g$ on $\Omega$. For the RHS of \eqref{equality1}, since $\mathrm{Res}_{E_i} (u)= f$ and we obtain $$ - D'_{h^\star} \mathrm{Res}_{E_i} (u) = -(\partial f + \partial \varphi \wedge f) |_{E_i} .$$ For the LHS of \eqref{equality1}, we have $$ \mathrm{Res}_{E_i} (D' _{h^\star} u) = \mathrm{Res}_{E_i} (D' _{h^\star} (\frac{dz_1}{z_1} \wedge f)) = \mathrm{Res}_{E_i} ( - \frac{dz_1}{z_1} \wedge \partial f + \partial \varphi \wedge \frac{dz_1}{z_1} \wedge f)=- (\partial f +\partial \varphi \wedge f )|_{E_i}. $$ Then we obtain \eqref{equality1}. Note that $\mathrm{Res}_{E_i} (u) \in H^0 (E_i , \Omega_{E_i} ^{p-1} (\log (E-E_i)) \otimes L^\star)$. By induction on dimension, we know that $\mathrm{Res}_{E_i} (u)$ is $D' _{h^\star}$-closed on $E_i$. Then \eqref{equality1} implies that $\mathrm{Res}_{E_i} (D' _{h^\star} u) =0 $. Therefore the form $D' _{h^\star} u$ is a smooth form on the total space $X$. \medskip {\em Step 2:} Let $N\in\mathbb N^\star$ and let $\Xi_N (x)$ be a smooth function which equals to $1$ on $[0, N]$, equals to $0$ on $[N+1 ,\infty]$ and $0 \leq \Xi'_N (x)\leq 1$. Let $s_E$ be the canonical section of $E$. We consider the integration \begin{equation}\label{twoterms} \int_X \Xi_N (\log (- \log |s_E|)) \{D' _{h^\star} u, D' _{h^\star} u\} \wedge \omega_X ^{n-p-1} . \end{equation} Here $|s_E|$ denotes the norm of $s_E$ with respect to a fixed smooth metric on $E$. By integration by parts, \eqref{twoterms} equals to $$= \int_X \{ D' _{h^\star} (\Xi_N (\log (- \log |s_E|)) u) , D' _{h^\star}u\} \wedge \omega_X ^{n-p-1} - \int_X \{\partial (\Xi_N (\log (- \log |s_E|))) \wedge u , D'_{h^\star} u \} \wedge \omega_X ^{n-p-1} $$ $$ = -\int_X (-1)^p \Xi_N (\log (- \log |s_E|)) \{u, \bar \partial (D' _{h^\star} u) \}\wedge \omega_X ^{n-p-1} - \int_X \{\partial (\Xi_N (\log (- \log |s_E|))) \wedge u , D'_{h^\star} u \} \wedge \omega_X ^{n-p-1}$$ \begin{equation}\label{twotermsest} =- \int_X i\Theta_h (L) \Xi_N \cdot \{u, u\}\wedge \omega_X ^{n-p-1} - \int_X \{ \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u }{\log |s_E|} , D'_{h^\star} u \} \wedge \omega_X ^{n-p-1} . \end{equation} Since $i\Theta_h (L)\geq 0$, the first term of \eqref{twotermsest} is semi-negative. For the second term of \eqref{twotermsest}, by step 1, we know that $D'_{h^\star} u$ is smooth on $X$. Together with $\frac{d s_{E_i}}{ s_{E_i} \log |s_{E_i}|} \wedge \frac{d s_{E_i}}{ s_{E_i}} =0$, we know that the second term of \eqref{twotermsest} is controlled by $$\int_{N \leq \log (- \log |s_E|) \leq N+1} \frac{1}{\prod_i |s_{E_i}|} \omega_X ^{n} ,$$ which converges to zero when $N \rightarrow 0$. As a consequence, when $N\rightarrow +\infty$, the upper limit of \eqref{twotermsest} will not be strictly positive. Since \eqref{twoterms} is always positive, we obtain \begin{equation} \lim_{N\rightarrow +\infty} \int_X \Xi_N (\log (- \log |s_E|)) \{D' _{h^\star} u, D' _{h^\star} u\} \wedge \omega_X ^{n-p} =0 . \end{equation} Therefore $D'_{h^\star} u =0$ on $X$. \end{proof} \begin{remark} By a standard argument, it is easy to generalize the above proposition to the case when the metric $(L,h)$ is of analytic singularity. However, it is unclear whether we can generalize it to the case of arbitrary singularity cf. Question \ref{lccase}. \end{remark} In the rest of the section, we will confirm Question \ref{lccase} in two special cases. \begin{proposition} \label{l2version} Let $(X,\omega_X)$ be a compact K\"ahler manifold, and let $E=\sum_{i=1}^r E_i$ be a snc divisor. Let $(L,h)$ be a holomorphic line bundle on $X$ where $h$ is a possibly singular metric such that $i\Theta_h (L)\geq 0$ on $X$ in the sense of currents. Let $(L^\star, h^\star)$ be the dual metric. Let $u\in H^0 (X, \Omega_X ^p (\log E) \otimes L^\star)$. We assume that $\mathrm{Res}_{E_i} (u) \neq 0$ for every $1 \leq i\leq k$ and $\mathrm{Res}_{E_i} (u)=0$ for every $k<i \leq r$. We write $h=e^{-\varphi} \cdot h_0$, where $\varphi$ is a quasi-psh function on $X$ and $h_0$ is a smooth metric on $L$. If the weight function $\varphi$ satisfies: \begin{equation}\label{upper} \varphi \leq - 2 \sum_{i=1}^k \ln (-\ln |s_{E_i}|) + C , \end{equation} where $s_{E_i}$ is the canonical section of $E_i$, then $D' _{h^\star} u =0$ and $i\Theta_h (L) \wedge u \wedge \overline{u} =0$ on $X\setminus E$ , where $D' _{h^\star}$ is the connection with respect to $h^\star$. \end{proposition} \begin{remark} Note that if the Lelong number of $\varphi$ along $E_i$ is strictly positive for every $i\leq k$, then $\varphi$ satisfies the condition \eqref{upper}. \end{remark} \begin{proof} The proof is divided into two steps. {\em Step 1:} Let $N\in\mathbb N^\star$ and let $\Xi_N (x)$ be a smooth function which equals to $1$ on $[0, N]$, equals to $0$ on $[N+1 ,\infty]$ and $0 \leq \Xi'_N (x)\leq 1$. We consider the integration \begin{equation}\label{twotermssing1} \int_X \Xi^2 _N (\log (\log (- \log |s_E|))) \{D' _{h^\star} u, D' _{h^\star} u\} \wedge \omega_X ^{n-2} . \end{equation} Since $D' _{h^\star} u$ is $L^2$ in the support of $ \Xi_N (\log (\log (- \log |s_E|))) $, we can still do the integration by parts as in \cite{Dem02}. In particular, \eqref{twotermssing1} equals to $$= \int_X \{ D' _{h^\star} (\Xi^2 _N (\log (\log (- \log |s_E|))) u) , D' _{h^\star}u\} \wedge \omega_X ^{n-2} - \int_X \{\partial (\Xi^2 _N (\log (\log (- \log |s_E|))) \wedge u , D'_{h^\star} u \} \wedge \omega_X ^{n-2} $$ \begin{equation}\label{twotermsestsing1} =- \int_X i\Theta_h (L) \Xi^2 _N (\log (- \log |s_E|)) \{u, u\}\wedge \omega_X ^{n-2} - \int_X \{ \frac{2 \cdot \Xi' _N \cdot \partial \log |s_E| \wedge u }{\log(-\log |s_E|) \log |s_E|} , \Xi_N \cdot D'_{h^\star} u \} \wedge \omega_X ^{n-2} . \end{equation} Since $i\Theta_h (L)\geq 0$, the first term of \eqref{twotermsestsing1} is semi-negative. For the second term of \eqref{twotermsestsing1}, by using Cauchy inequality, we get $$| \int_X \{ \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u}{\log(-\log |s_E|) \log |s_E|} , \Xi_N \cdot D'_{h^\star} u \} \wedge \omega_X ^{n-2}| ^2 $$ $$\leq \int_X \Xi^2 _N \{D' _{h^\star} u, D' _{h^\star} u\} \wedge \omega_X ^{n-2} \cdot \int_X \{ \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u}{\log(-\log |s_E|) \log |s_E|} , \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u }{\log(-\log |s_E|) \log |s_E|} \} \wedge \omega_X ^{n-2} .$$ As a consequence, we obtain \begin{equation}\label{bound1} \int_X \Xi^2 _N \cdot \{D' _{h^\star} u, D' _{h^\star} u\} \wedge \omega_X ^{n-2} \leq \int_X \{ \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u}{\log(-\log |s_E|) \log |s_E|} , \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u}{\log(-\log |s_E|) \log |s_E|} \} \wedge \omega_X ^{n-2} \end{equation} \bigskip {\em Step 2:} In this step, we would like to show the RHS of \eqref{bound1} tends to zero when $N \rightarrow +\infty$. Since $\frac{d s_{E_i}}{ s_{E_i}} \wedge \frac{d s_{E_i}}{ s_{E_i}} =0$, the assumption \eqref{upper} implies that $\{\partial \log |s_E| \wedge u , \partial \log |s_E| \wedge u \} \wedge \omega_X ^{n-2}$ is upper bounded by $$ C' \frac{\omega_X ^n }{\prod_{i=1}^k |s_{E_i}|^2 \log^2 |s_{E_i}|}\cdot (\sum_{i =k+1}^r \frac{1}{|s_{E_i}|^2})$$ for some constant $C'$. Then the RHS of \eqref{bound1} is controlled by \begin{equation}\label{maintron1} C' \sum_{i=k+1}^r\int_X \frac{(\Xi' _N)^2 \omega_X ^n}{\prod_{i=1}^k |s_{E_i}|^2 \log^2 |s_{E_i}|} \cdot \frac{1}{|s_{E_i}|^2 \log^2 |s_{E_i}|}. \end{equation} which converges to zero when $N \rightarrow 0$. As a consequence, the RHS of \eqref{bound1} tends to zero when $N \rightarrow +\infty$. Therefore $D' _{h^\star} u =0$ on $X\setminus E$. \end{proof} \noindent By using the argument in Proposition \ref{l2version}, we can give an alternative proof of \cite[Thm 5]{Tou16}: \begin{proposition} \label{pless2} Let $X$ be a compact K\"ahler manifold, and let $E=\sum E_i$ be a snc divisor. Let $(L,h)$ be a holomorphic line bundle on $X$ where $h$ is a possible singular metric such that $i\Theta_h (L)\geq 0$. Let $u\in H^0 (X, \Omega_X ^1 (\log E) \otimes L^\star)$ and $(L^\star, h^\star)$ be the dual metric on $(L,h)$. Then $D' _{h^\star} u =0$ and $i\Theta_h (L) \wedge u \wedge \overline{u} =0$ on $X\setminus E$. \end{proposition} \begin{proof} We follow the notations in Proposition \ref{l2version}. By the step 1 of Proposition \eqref{bound1}, we know that \begin{equation}\label{bound} \int_X \Xi^2 _N \cdot \{D' _{h^\star} u, D' _{h^\star} u\} \wedge \omega_X ^{n-2} \leq \int_X \{ \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u}{\log(-\log |s_E|) \log |s_E|} , \frac{\Xi' _N \cdot \partial \log |s_E| \wedge u}{\log(-\log |s_E|) \log |s_E|} \} \wedge \omega_X ^{n-2} \end{equation} In order to prove the proposition, it is sufficient to show the RHS of \eqref{bound} tends to zero when $N \rightarrow +\infty$. Since $\frac{d s_{E_i}}{ s_{E_i}} \wedge \frac{d s_{E_i}}{ s_{E_i}} =0$ and $u$ is a $1$-form, $\{\partial \log |s_E| \wedge u , \partial \log |s_E| \wedge u \} \wedge \omega_X ^{n-2}$ is upper bounded by $$ C \cdot \sum_{i \neq j} \frac{\omega_X ^n }{ |s_{E_i} s_{E_j}|^2 } .$$ Then the RHS \eqref{bound} is controlled by \begin{equation}\label{maintron}C \sum_{i\neq j}\int_X \frac{(\Xi' _N)^2 \omega_X ^n}{\log^2 (-\log |s_E|) \log^2 |s_E| \cdot |s_{E_i} s_{E_j}|^2} . \end{equation} Note that the integral $$\int_{ 0\leq r_1 ,r_2 \leq 1} \frac{d r_1 \wedge dr_2}{\log^2 (-\log |r_1 r_2|) \log^2 |r_1 r_2| \cdot r_1 r_2} < +\infty .$$ Therefore \eqref{maintron} converges to zero when $N \rightarrow 0$. As a consequence, the RHS of \eqref{bound} tends to zero when $N \rightarrow +\infty$. Therefore $D' _{h^\star} u =0$ on $X\setminus E$. \end{proof} \section{Lifting subsheaves to the resolution} Let $Y$ be a normal complex space with klt singularities, and let $\holom{\nu}{Y'}{Y}$ be a proper surjective morphism from a normal complex space $Y'$. Since klt singularities are rational \cite[Thm.5.22]{KM98}, by \cite[Thm.1.10]{KS21} there exists for every $p \in \mathbb{N}$ a cotangent map \begin{equation} \label{equation-pull-back} d \nu : \nu^\star \Omega_Y^{[p]} \rightarrow \Omega_{Y'}^{[p]} \end{equation} If $Y$ has lc singularities we can still combine the proof of \cite[Thm.4.3]{GKKP11} with \cite[Thm.1.5]{KS21} to obtain\footnote{Note that \cite[Thm.1.10]{KS21} holds for any morphism, while we only need the simpler case where the morphism is surjective.} that there exists for every $p \in \mathbb{N}$ a cotangent map \begin{equation} \label{equation-pull-back-lc} d \nu : \nu^\star \Omega_Y^{[p]} \rightarrow \Omega_{Y'}^{[p]}(\log \Delta) \end{equation} where $\Delta \subset Y'$ is the largest reduced Weil divisor contained in $\nu^{-1}(\mbox{non-klt locus})$. The following statement is well-known to experts and essentially a rewriting of the proof of \cite[Thm.7.2]{GKKP11}. We include it for the convenience of the reader: \begin{lemma}\label{lemma-pullback} Let $Y$ be a normal complex space with lc singularities, and let $\mathcal A \subset \Omega_Y^{[p]}$ be a reflexive subsheaf of rank one that is $\mathbb{Q}$-Cartier, i.e. there exists a $m \in \mathbb{N}$ such that $\mathcal A^{[m]}$ is locally free. Let $\holom{\pi}{X}{Y}$ be a log resolution, and let $E$ be the exceptional divisor. Let $\mathcal C \subset \Omega^p_{X}(\log E)$ be the saturation of the image of the morphism $$ \pi^\star \mathcal A \rightarrow \pi^\star \Omega_Y^{[p]} \stackrel{d \pi}{\rightarrow} \Omega^p_{X}(\log E). $$ Then there exists a non-zero morphism $\pi^\star \mathcal A^{[m]} \rightarrow \mathcal C^{\otimes m}$. \end{lemma} \begin{remark*} The morphism $\pi^\star \mathcal A^{[m]} \rightarrow \mathcal C^{\otimes m}$ is an isomorphism in the complement of the exceptional divisor $E$. Thus, up to multiplication by a holomorphic function that is a pull-back from $Y$, the morphism is unique. \end{remark*} If $Y$ has klt singularities, we could use \eqref{equation-pull-back} and consider $\mathcal C' \subset \Omega^p_{X}$, the saturation of the image of the morphism $$ \pi^\star \mathcal A \rightarrow \pi^\star \Omega_Y^{[p]} \stackrel{d \pi}{\rightarrow} \Omega^p_{X}, $$ but in general there will be no morphism $\pi^\star \mathcal A^{[m]} \rightarrow (\mathcal C')^{\otimes m}$. However, in the course of the proof of Lemma \ref{lemma-pullback} we will prove the following remark that will be useful for the proof of Lemma \ref{lemma-residue}: \begin{remark} \label{remark-klt-case} If $Y$ is klt, let $\holom{\tilde \gamma}{\tilde Z}{X}$ be the cover induced by a (local) index-one cover $\holom{\gamma}{Z}{Y}$ of $\mathcal A$ (cf. Diagram \eqref{commute}). Then $\pi_Z^\star \gamma^\star \mathcal A^{[m]}$ is a subsheaf of $S^{[m]} \Omega_{\tilde Z}^{[p]}$. \end{remark} For the proof let us recall the notion of index one covers \cite[Defn.5.19]{KM98}: given a normal complex space $Y$ and a reflexive sheaf $\mathcal A$ such that some reflexive power $\mathcal A^{[m]}$ is trivial, there exists a quasi-\'etale morphism $\holom{\gamma}{Z}{Y}$ from a normal complex space $Z$ such that the reflexive pull-back $\gamma^{[\star]} \mathcal A$ is locally free. \begin{proof}[Proof of Lemma \ref{lemma-pullback}] The locally free sheaves coincide in the complement of the exceptional locus $E= \cup_i E_i$, so we can write $\mathcal C^{\otimes m} \simeq \pi^\star \mathcal A^{[m]} \otimes \sO_{X}(\sum a_i E_i)$ with uniquely determined $a_i \in \mathbb{Z}$. We are done if we show that $a_i \geq 0$ for all $i$. This property can be checked locally on the base $Y$. Therefore we can replace $Y$ by a Stein neighborhood such that there exists an index-one cover $\holom{\gamma}{Z}{Y}$, and let $\holom{\tilde \gamma}{\tilde Z}{X}$ be the induced finite map from the normalisation $\tilde Z$ of $X \times_Y Z$. We denote by $\holom{\pi_Z}{\tilde Z}{Z}$ the bimeromorphic morphism induced by $\pi$ and summarize the construction in a commutative diagram: \begin{equation} \label{commute} \xymatrix{ \tilde Z \ar[r]^{\tilde \gamma} \ar[d]_{\pi_Z} & X \ar[d]^\pi \\ Z \ar[r]^\gamma & Y } \end{equation} The morphism $\holom{\gamma}{Z}{Y}$ is an index-one cover for $\mathcal A$, so $\gamma$ is \'etale in codimension one and $\gamma^{[\star]} \mathcal A =: \mathcal B$ is locally free. In particular $Z$ still has lc singularities \cite[Prop.5.20(4)]{KM98}. Denote the exceptional locus of $\pi_Z$ by $E_Z$ and observe that $E_Z$ is equal to the support of $\tilde \gamma^\star E$. In particular $E_Z$ contains the preimage of the non-klt locus of $Z$, so \eqref{equation-pull-back-lc} gives a natural map $$ d \pi_Z : \pi_Z^\star \Omega_Z^{[p]} \rightarrow \Omega_{\tilde Z}^{[p]}(\log E_Z) $$ Since $\mathcal A \subset \Omega_Y^{[p]}$ and $\gamma$ is \'etale in codimension one we have an inclusion $\mathcal B \subset \Omega_Z^{[p]} \simeq \gamma^{[\star]} \Omega_Y^{[p]}$ and hence an induced map $$ \pi_Z^\star \mathcal B \rightarrow \pi_Z^\star \Omega_Z^{[p]} \rightarrow \Omega_{\tilde Z}^{[p]}(\log E_Z). $$ Since $\mathcal B$ is locally free, this induces an inclusion \begin{equation} \label{equation-inclusion-B} \pi_Z^\star \mathcal B^{\otimes m} \simeq (\pi_Z^\star \mathcal B)^{\otimes m} \rightarrow S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z). \end{equation} By assumption $A^{[m]}$ is locally free, so its (non-reflexive !) pull-back $\gamma^\star \mathcal A^{[m]}$ is still locally free. Thus $B^{\otimes m} \simeq \gamma^\star A^{[m]}$ since they are both reflexive and coincide in codimension one. Thus we have constructed a morphism $$ \pi_Z^\star \gamma^\star A^{[m]} \rightarrow S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z). $$ We interrupt the proof of the lemma for the {\em Proof of Remark \ref{remark-klt-case}.} If $Y$ is klt, the index one cover $Z$ also has klt singularities \cite[Prop.5.20(4)]{KM98}. Thus we can replace the pull-back with logarithmic poles \eqref{equation-pull-back-lc} by the usual pull-back \eqref{equation-pull-back} to obtain $$ d \pi_Z : \pi_Z^\star \Omega_Z^{[p]} \rightarrow \Omega_{\tilde Z}^{[p]} $$ As above the inclusion $\gamma^{[\star]} \mathcal A \simeq \mathcal B \subset \Omega_Z^{[p]} \simeq \gamma^{[\star]} \Omega_Y^{[p]}$ then gives the inclusion $$ \pi_Z^\star \gamma^\star \mathcal A^{[m]} \simeq \pi_Z^\star \mathcal B^{\otimes m} \simeq (\pi_Z^\star \mathcal B)^{\otimes m} \rightarrow S^{[m]} \Omega_{\tilde Z}^{[p]}. $$ This proves Remark \ref{remark-klt-case}, we now proceed with the proof of Lemma \ref{lemma-pullback}. Since $X$ is smooth, the saturated subsheaf $\mathcal C \subset \Omega^p_{X}(\log E)$ is locally free and a subbundle in codimension one. Thus \begin{equation} \label{inclusion-m} \mathcal C^{\otimes m} \subset S^m \Omega^p_{X}(\log E) \end{equation} is locally free and a subbundle in codimension one, hence a saturated subsheaf. The finite morphism $\tilde \gamma$ is \'etale in the complement of $E$ and $\Omega^p_{X}(\log E)$ is locally free, so the tangent map gives an isomorphism \begin{equation} \label{iso-logarithmic} \tilde \gamma^\star \Omega^p_{X}(\log E) \simeq \Omega_{\tilde Z}^{[p]}(\log E_Z). \end{equation} and hence an isomorphism $$ \tilde \gamma^\star S^m \Omega^p_{X}(\log E) \simeq S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z). $$ Composing the inclusion \eqref{inclusion-m} with this isomorphism we obtain that $$ \tilde \gamma^\star \mathcal C^{\otimes m} \rightarrow S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z) $$ is a saturated subsheaf. Since $Y$ is Stein and $\mathcal A^{[m]}$ is invertible we can choose for every point $y \in Y$ a section $\sigma \in H^0(Y, \mathcal A^{[m]})$ that does not vanish in $y$. In particular $\sigma$ generates $\mathcal A^{[m]}$ as an $\sO_Y$-module near the point $y$. Thus it induces a section $$ \pi_Z^\star \gamma^\star \sigma \in H^0(\tilde Z, S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z)) $$ that generates the image of $\pi_Z^\star \gamma^\star \mathcal A^{[m]}$. The pull-back $\pi^\star \sigma$ defines a meromorphic section of $\mathcal C^{\otimes m}$ that has poles at most along $E$, thus $\tilde \gamma^\star \pi^\star \sigma$ defines a meromorphic section of $\tilde \gamma^\star \mathcal C^{\otimes m}$ that has poles at most along $E_Z$. Since $\tilde \gamma^\star \mathcal C^{\otimes m}$ is saturated in $S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z)$ and $$ \pi_Z^\star \gamma^\star \sigma = \tilde \gamma^\star \pi^\star \sigma \in H^0(\tilde Z, S^{[m]} \Omega_{\tilde Z}^{[p]}(\log E_Z)) $$ has no poles, we see that $$ \tilde \gamma^\star \pi^\star \sigma \in H^0(\tilde Z, \tilde \gamma^\star \mathcal C^{\otimes m}). $$ Thus the local generator of the subsheaf $\pi_Z^\star \gamma^\star \mathcal A^{[m]}$ lies in $\tilde \gamma^\star \mathcal C^{\otimes m}$ and we have an inclusion $$ \tilde \gamma^\star \pi^\star \mathcal A^{[m]} \simeq \pi_Z^\star \gamma^\star \mathcal A^{[m]} \hookrightarrow \tilde \gamma^\star \mathcal C^{\otimes m}. $$ Thus we see that $$ \tilde \gamma^\star \sO_{X}(\sum a_i E_i) \simeq \tilde \gamma^\star (\mathcal C^{\otimes m} \otimes \pi^\star \mathcal A^{[-m]}) $$ is represented by an effective divisor with support in the exceptional locus of $\pi_Z$. Since $\tilde \gamma^\star (\sum a_i E_i)$ is linearly equivalent to an effective, exceptional divisor and has also support in the exceptional locus of $\pi_Z$, it is effective. Thus we have shown that $a_i \geq 0$ for all $i$. \end{proof} As in immediate application we obtain a variant of \cite[Thm.7.2]{GKKP11},\cite[Cor.1.3]{Gra15} for pseudoeffective line bundles. \begin{cor}\label{corollary-pseff} Let $Y$ be a normal compact complex space with lc singularities, and let $\mathcal A \subset \Omega_Y^{[p]}$ be a reflexive subsheaf of rank one that is $\mathbb{Q}$-Cartier, i.e. there exists a $m \in \mathbb{N}$ such that $\mathcal A^{[m]}$ is locally free. Let $\mathcal C \subset \Omega^p_{X}(\log E)$ be the saturation of $\pi^\star \sA$. If $\mathcal A^{[m]}$ is pseudoeffective, then $\mathcal C$ is pseudoeffective. \end{cor} \begin{proof} Since pseudoeffectivity of a line bundle is invariant under taking tensor powers, it is sufficient to show that $\mathcal C^{\otimes m}$ is pseudoeffective. Yet this follows from the non-zero morphism $\pi^* \mathcal A^{[m]} \rightarrow \mathcal C^{\otimes m}$ constructed in Lemma \ref{lemma-pullback}. \end{proof} We need the following proposition. \begin{lemma} \label{lemma-residue} In the situation of Lemma \ref{lemma-pullback}, write \begin{equation}\label{equality} \mathcal{C}^{\otimes m} = \pi^\star \mathcal{A}^{[m]} \otimes \sO_X(\sum a_i E_i), \end{equation} where $a_i \geq 0$ and $E=\sum E_i$ is the exceptional locus. Assume that $Y$ has klt singularities, and let $E_i$ be an irreducible component of the exceptional locus. Let $\mathrm{Res}_{E_i} (\mathcal{C})$ be the residue of the image of $\mathcal{C}$ in $\Omega^p_{X}(\log E)$. If $\mathrm{Res}_{E_i} (\mathcal{C}) \neq 0$, then $a_i >0$. \end{lemma} \begin{proof} The claim is local on $Y$, so we will use the construction from the proof of Lemma \ref{lemma-pullback} summarized in the commutative diagram \eqref{commute}. Fix a prime divisor $\tilde E_i \subset \tilde Z$ that maps onto $E_i \subset X$, and choose a general point $\tilde x \in \tilde E_i \cap \tilde Z_{\nons}$ such that $\tilde E_i$ (resp. $E_i$) is smooth in $\tilde x$ (resp. smooth in $x:=\tilde \gamma(\tilde x)$). Since $\tilde x$ is general, the finite morphism $\tilde \gamma$ has constant rank in an analytic neighborhood of $\tilde \gamma$, hence we can find local coordinates on $\tilde Z$ and $X$ such that $$ E_i = \{ z_1=0 \} $$ and $\tilde \gamma$ is given locally by $$ \widetilde{\gamma}: (t, z_2, .. z_n ) \rightarrow (t^d, z_2, .., z_n ). $$ The exterior power $\Omega^p _{X} (\log E)_x$ is generated by $\{\frac{dz_1}{z_1} \wedge d z_J, d z_I \}$ where $J \subset \{2,\cdots, n\}$ has length $p-1$ and $I \subset \{2,\cdots, n\}$ has length $p$. Thus we obtain a basis $\{e_1, \cdots, e_k\}$ of $S^m \Omega_{X} (\log E)_x$ by taking products of length $m$, where each $e_i$ is of type: $$e_i = (\frac{dz_1}{z_1} \wedge d z_{J_1}) \otimes (\frac{dz_1}{z_1} \wedge d z_{J_2})\otimes \dots \otimes (\frac{dz_1}{z_1} \wedge d z_{J_q}) \otimes d z_{I_1 }\otimes \dots \otimes dz_{I_{m-q}}. $$ In our local coordinates the pull-back becomes $$\widetilde{\gamma}^\star (e_i) = (\frac{dt}{t}\wedge d z_{J_1}) \otimes (\frac{dt}{t} \wedge d z_{J_2 })\otimes \dots \otimes (\frac{dt }{t} \wedge d z_{J_q}) \otimes d z_{I_1 }\otimes \dots \otimes dz_{I_{m-q}} .$$ In particular, the pull back $\{\widetilde{\gamma}^\star (e_i)\}_{i=1}^k$ is a basis of $S^m \Omega_{\widetilde{Z}} (\log E_Z)$ at $\tilde x$. Let $\sigma$ be a generator of $\mathcal{A}^{[m]}$ at $\pi (x)\in Y$. Then $\pi^\star\sigma \in \pi^\star \mathcal{A}^{[m]} \subset S^m \Omega_{X}(\log E)$ is a local generator near $x$. We can write $$\pi^\star\sigma = \sum f_i e_i ,$$ where $f_i$ are holomorphic functions near $x$. Now recall that by Remark \ref{remark-klt-case} $$ \pi_Z^\star \mathcal B^{\otimes m} \simeq \pi_Z^\star \gamma^\star \mathcal A^{[m]} \simeq \tilde \gamma^\star \pi^\star \mathcal A^{[m]} $$ is a subsheaf of $S^{[m]} \Omega^{[p]}_{\widetilde{Z}}$. In particular, since $\tilde Z$ is smooth in $\tilde x$, we have $$ (\widetilde{\gamma}\circ \pi)^\star \sigma \in (S^m \Omega^p_{\widetilde{Z}})_{\tilde x}. $$ As a consequence, $f_i (x)=0$ when $e_i$ is of type $$ e_i = (\frac{dz_1}{z_1} \wedge d z_{J_1}) \otimes (\frac{dz_1}{z_1} \wedge d z_{J_2})\otimes \dots \otimes (\frac{dz_1}{z_1} \wedge d z_{J_m}), $$ since this generator of $(S^m \Omega^p_{\widetilde{Z}}(\log E_Z))_{\tilde x}$ is not contained in $(S^m \Omega^p_{\widetilde{Z}})_{\tilde x}$. \medskip Now we can prove the proposition. Near a general point $x\in E_i$, we suppose that $\mathcal{C}_x \subset (\Omega^p_{\widetilde{Z}})_{\tilde x}$ is generated by $$\sum g_i \cdot (\frac{dz_1}{z_1} \wedge d z_{J_i}) + \sum h_i \cdot d z_{I_i} ,$$ where $g_i, h_i$ are holomorphic functions. Thanks to Lemma \ref{lemma-pullback}, we have $$F \cdot (\sum g_i (\frac{dz_1}{z_1} \wedge d z_{J_i}) + \sum h_i d z_{I_i} )^{\otimes m} = (\sum f_i e_i ) ,$$ where $F$ is a holomorphic function near $x$. If $\mathrm{Res}_{E_i} (\mathcal{C}) \neq 0$, we know that there is one $i_0$ such that $g_{i_0} (x) \neq 0$. Set $$e_{i_0} :=(\frac{dz_1}{z_1} \wedge d z_{J_{i_0}})^{\otimes m} .$$ Then $ F \cdot g_{i_0} ^m =f_{i_0}$. By the above paragraph, we know that $f_{i_0} (x)=0$. Then $F (x)=0$. The proposition is thus proved. \end{proof} We are now in the position to verify the technical condition in Proposition \ref{l2version}: \begin{thm} \label{theorem-conclusion} In the setting of Theorem \ref{theorem-main}, let $\holom{\pi}{X}{Y}$ be a log-resolution and denote by $E$ the exceptional locus. Let $L \subset \Omega_{X}^p(\log E)$ be the saturation of $\pi^\star \sA$, and let $\tilde u \in H^0 (X, \Omega_{X} ^p (\log E) \otimes L^\star)$ the corresponding section. Then there exists a metric $h_1$ on $L$ such that we have $D'_{h_1 ^\star} \tilde u =0$ on $X\setminus E$ \end{thm} \begin{proof} By Lemma \ref{lemma-pullback}, we know that \begin{equation}\label{inclusion2} c_1(L) = \frac{1}{m} \pi^\star c_1(\sA^{[m]}) + \sum_{i\in I} a_i E_i +\sum_{i\in I' } a_i E_i, \end{equation} such that all the coefficients $a_i \geq 0$ and the $i\in I$ correspond to the exceptional divisors $E_i$ such that $\mathrm{Res}_{E_i} (\mathcal{C}) \neq 0$ and $i\in I'$ corresponds to $\mathrm{Res}_{E_i} (\mathcal{C}) = 0$. By Lemma \ref{lemma-residue} we have $a_i >0$ when $i\in I$. Let $h_0$ be a possibly singular metric on $\pi^\star \sA ^{[m]}$ such that $i\Theta_{h_0} (\pi^\star \sA^{[m]})\geq 0$. By \eqref{inclusion2} this induces a metric $h_1$ on $L$. Thanks to Proposition \ref{l2version}, the theorem is proved. \end{proof} \section{Proof of the main results} The setup for the proof of Theorem \ref{theorem-main} and Proposition \ref{proposition-lc} is the same: the non-zero section $u$ determines an injective morphism of sheaves $$ \sA \hookrightarrow \Omega_Y^{[p]}. $$ Let $\holom{\pi}{X}{Y}$ be a log-resolution of $Y$, and denote by $E$ the exceptional locus. Since $Y$ is lc, we have the tangent map \eqref{equation-pull-back-lc} $$ \holom{d \pi}{\pi^\star \Omega_Y^{[p]}}{ \Omega_{X}^{p}(\log E)}, $$ and we denote by $L \subset \Omega^{p}_{X}(\log E)$ the saturation of $\pi^\star \sA$. By Lemma \ref{lemma-pullback} there exists a morphism $\pi^\star \sA^{[m]} \rightarrow L^{\otimes m}$, so $L$ is a pseudoeffective line bundle on $X$. The inclusion $L \subset \Omega^{p}_{X}(\log E)$ corresponds to a non-zero holomorphic section $$ \tilde u \in H^0(X, \Omega_{X}^{p}(\log E) \otimes L^\star) $$ which coincides with $u$ on $X \setminus E \simeq Y_{\nons}$. In particular the subsheaf $S_{\tilde u} \subset T_{X}$ defined by contraction with $\tilde u$ coincides with $S_u \subset T_Y$ on a Zariski open set. Thus we are left to show the integrability of $S_{\tilde u} \subset T_{X}$ on $X \setminus E$. By the formula for the exterior derivative of $p$-forms (cf. \cite[p.97]{Dem02}) the integrability of $S_{\tilde u}$ follows if we find a metric $h$ on $L$ such that $D'_{h^\star} \tilde u=0$ on $X \setminus E$. {\em Proof of Theorem \ref{theorem-main}:} Since $Y$ is klt, the existence of the metric $h$ is guaranteed by Theorem \ref{theorem-conclusion}. {\hfill $\square$} {\em Proof of Proposition \ref{proposition-lc}:} Since $p=1$ we know by Proposition \ref{pless2} that any singular metric with positive curvature current will suffice. Since $L$ is pseudoeffective, such a metric exists. {\hfill $\square$}
\section{Introduction} Two-player zero-sum {\em graph games} are a central class of games. A graph game proceeds as follows. A token is placed on a vertex and the players move it throughout the graph to produce an infinite play, which determines the winner of the game. The central algorithmic problem in graph games is to identify the winner and to construct winning strategies. One key application of graph games is {\em reactive synthesis}~\cite{PR89}, in which the goal is to synthesize a reactive system that satisfies a given specification no matter how the environment behaves. Two orthogonal classifications of graphs games are according to the {\em mode} of moving the token and according to the players' {\em objectives}. For the latter, we focus on two canonical qualitative objectives. In {\em reachability} games, there is a set of target vertices and Player~$1$\xspace wins if a target vertex is reached. In {\em parity} games, each vertex is labeled with a parity index and an infinite path is winning for Player~$1$\xspace iff the highest parity index that is visited infinitely often is odd. The simplest and most studied mode of moving is {\em turn-based}: the players alternate turns in moving the token. We study \emph{bidding graph games}~\cite{LLPU96,LLPSU99}, which use the following mode of moving: both players have budgets, and in each turn, an auction (bidding) determines which player moves the token. Concretely, we focus on {\em Richman bidding} (named after David Richman): in each turn, both players simultaneously submit bids that do not exceed their available budget, the higher bidder moves the token, and pays his bid to the lower bidder. Note that the sum of budgets stays constant throughout the game. We distinguish between {\em continuous}- and {\em discrete}-bidding, where in the latter, the granularity of the players' bids is restricted. The central questions in bidding games revolve around the {\em threshold budgets}, which is a necessary and sufficient initial budget for winning the game. \noindent{\bf Continuous-bidding games.} Bidding games were largely studied under continuous bidding. We briefly survey the relevant literature. Bidding games were introduced in~\cite{LLPU96,LLPSU99}. The objective that was considered is a variant of reachability, which we call {\em double reachability}: each player has a target and a player wins if his target is reached (unlike reachability games in which Player~$2$\xspace's goal is to prevent Player~$1$\xspace from reaching his target). It was shown that in continuous-bidding games, a target is necessarily reached, thus double-reachability games essentially coincide with reachability games under continuous-bidding. Threshold budgets were shown to exist; namely, each vertex $v$ has a value $\texttt{Th}\xspace(v)$ such that if Player~$1$\xspace's budget is strictly greater than $\texttt{Th}\xspace(v)$, he wins the game from $v$, and if his budget is strictly less than $\texttt{Th}\xspace(v)$, Player~$2$\xspace wins the game. Moreover, it was shown that the threshold function $\texttt{Th}\xspace$ is a {\em unique} function that satisfies the following property, which we call the {\em average property}. Suppose that the sum of budgets is $1$, and $t_i$ is Player~$i$\xspace's target, for $i \in \set{1,2}$. Then, $\texttt{Th}\xspace$ assigns a value in $[0,1]$ to each vertex such that at the ``end points'', we have $\texttt{Th}\xspace(t_1) = 0$ and $\texttt{Th}\xspace(t_2) = 1$, and the threshold at every other vertex is the average of two of its neighbors. Uniqueness implies that the problem of finding threshold budgets\footnote{Stated as a decision problem: given a game and a vertex $v$, decide whether $\texttt{Th}\xspace(v) \geq 0.5$.} is in \NP and co\NP. Moreover, an intriguing equivalence was observed between reachability continuous-bidding games and a class of stochastic game~\cite{Con92} called {\em random-turn games}~\cite{PSSW09}. Intricate equivalences between {\em mean-payoff} continuous-bidding games and random-turn games have been shown in \cite{AHC19,AHI18,AHZ19,AJZ21} (see also~\cite{AH20}). Parity continuous-bidding games were studied in \cite{AHC19}. The following key property was identified. Consider a strongly-connected parity continuous-bidding game ${\mathcal G}$. If the maximal parity index in ${\mathcal G}$ is odd, then Player~$1$\xspace wins with any positive initial budget, i.e., the thresholds in ${\mathcal G}$ are all $0$. Dually, if the maximal parity index in ${\mathcal G}$ is even, then the thresholds are all $1$. This property gives rise to a simple reduction from parity bidding games to double-reachability bidding games: roughly, a player's goal is to reach a bottom strongly-connected component in which he can win with any positive initial budget. \noindent{\bf Discrete-bidding games.} {\em Discrete-bidding games} are similar to continuous-bidding games only that we fix the sum of the budgets to be $k \in \mathbb{N}$ and bids are restricted to be integers. Ties in biddings need to be handled explicitly. We focus on the tie-breaking mechanism that was defined in~\cite{DP10}: one of the players has the {\em advantage} and when a tie occurs, the player with the advantage chooses between (1) use the advantage to win the bidding and pass it to the other player, or (2) keep the advantage and let the other player win. Other tie-breaking mechanisms and the properties that they lead to were considered in \cite{AAH19}. The motivation to study discrete-bidding games is practical: in most applications, the assumption that bids can have arbitrary granularity is unrealistic. We point out that the results in continuous-bidding games, particularly those on infinite-duration games, do in fact develop strategies that bid arbitrarily small bids. It is highly questionable whether such strategies would be useful in practice. Bidding games model ongoing and stateful auctions. Such auctions arise in various domains. An immediate example is auctions for online advertisements~\cite{Mut09}. As another example, in {\em blockchain} technology, {\em miners} accept transaction fees, which can be thought of as bids, and prioritize transactions based on them. Verification against attacks is a well-studied problem~\cite{CGV18,ABC16}. Bidding games have been applied as a mechanism for fair allocation of resources~\cite{MKT18}. In addition, researchers have studied training of agents that accept ``advice'' from a ``teacher'', where the advice is equipped with a ``bid'' that represents its importance \cite{AK+16}. Finally, recreation bidding games have been studied, e.g., bidding chess~\cite{BP09}. In all of these applications, the granularity of the bids is restricted. \noindent{\bf Previous results.} Threshold budgets and their properties were previously only studied for reachability discrete-bidding games~\cite{DP10}. In these games, discrete versions of the properties of continuous-bidding games were observed; namely, discrete versions of threshold budgets exist, they satisfy a discrete version of the average property, and, similar to continuous bidding, winning strategies are constructed in which a player's bid is derived from the threshold budgets. A value-iteration algorithm was developed to compute the thresholds with a worst-case exponential running time, when $k$ is given in binary. Parity discrete-bidding games were shown to be determined in~\cite{AAH19}, but the structure of the threshold budgets was not understood. In particular, threshold budgets were not known to have the average property. The previously known algorithm to solve parity discrete-bidding games is naive. Construct an arena based on the exponentially-sized ``configuration graph'' that corresponds to a bidding game. Determinacy implies that it suffices to solve a turn-based game rather than a concurrent game on this arena. The essence of bidding games is completely lost in this construction; namely, the structure given by the threshold budgets is not used and the bids made by winning strategies have no connection with the thresholds. To make things worse, unlike reachability games, the properties of threshold budgets in parity discrete- and continuous-bidding games are known to differ significantly; namely, there are strongly-connected games in which the maximal parity index is odd and Player~$1$\xspace loses with any initial budget, and no reduction is known to reachability discrete-bidding games. \noindent{\bf Our results.} We develop two complementary algorithms for computing threshold budgets in parity discrete-bidding games. Our first algorithm is a fixed-point algorithm. It is based on repeated calls to an algorithm to solve reachability discrete-bidding games in combination with a recursion over the parity indices, similar in spirit to Zielonka~\cite{Zie98} and Kupferman and Vardi's \cite{KV98} algorithms to solve turn-based parity games. An important corollary from the algorithm is that threshold budgets in parity discrete-bidding games satisfy the average property. The worst-case running time of the algorithm is exponential. Second, we show that the problem of finding threshold budgets in parity discrete-bidding game is in NP and coNP. The bound follows to reachability discrete-bidding games for which only an exponential-time algorithm was known. We briefly describe the idea of our proof. We first show that, interestingly, unlike continuous-bidding games, functions that satisfy the discrete average property are not unique, but by definition the threshold budgets are. Thus, one cannot simply guess a function and verify that it satisfies the average property. We overcome this challenge as follows. Given a guess of function $T$, we first verify that it satisfies the average property. Then, we construct a partial bidding strategy $f_T$ for Player~$1$\xspace based on $T$, and construct a turn-based parity game in which a Player~$1$\xspace strategy corresponds to a bidding strategy $f'$ that agrees with $f_T$ and a Player~$2$\xspace strategy corresponds to a response to $f'$. We show that Player~$1$\xspace wins the turn-based game iff $T$ coincides with the threshold budgets. As a corollary, we show the existence of winning strategies that use memory that is polynomial in the size of the arena. Previously, only strategies that use exponential-sized memory were known. \stam{ 1- We study, for the first time, discrete-bidding games with budgets given in binary, and show that solving such games is in NP and coNP. We stress that previously, exponential-time algorithms were only known, including for reachability games. 2- For parity games, previously, the only known algorithm to solve parity discrete-bidding games was naive [1]: construct the exponentially-sized configuration graph and solve it as a turn-based game. The essence of bidding games is completely lost in this construction: winning strategies had no connection between bids and thresholds. We identify the structure of threshold budgets in parity games: we show, for the first time, that threshold budgets in parity discrete-bidding games satisfy the average property. The bids in the winning strategies that we construct are derived from the thresholds. 3- We study, for the first time, the issue of memory in winning strategies and show the first construction of polynomial-sized memory (in the size of the game graph and not the sum of budgets). 4- We provide the first fixed-point algorithm to find threshold budgets in parity discrete-bidding games. Such an algorithm was known only for reachability games [12]. We believe that the fixed-point algorithm provides valuable insight on these games and that it will serve as a stepping stone for further results. } \stam{ In this paper we focus on discrete-bidding games. We briefly describe the model. A discrete-bidding game is given by the {\em arena}, namely, the graph and the players' objectives, as well as the sum of the players' budgets, which we assume is a natural number $N$. The granularity is set to $1$; namely, the smallest positive bid that is allowed is $1$. We consider {\em Richman bidding}: whenever a player wins a bidding, the bid is paid to the other player, thus the sum of budgets is fixed throughout the game. We solve ties according to a previously defined mechanism: one of the players has the ``advantage'', and if a tie occurs, she can choose between two options: (1) use the advantage to win the current bidding, then the advantage changes hands, or (2) let the other player win the bidding and keep the advantage. A {\em configuration} of this game consists of the position of the token, the budgets of the two players, and the state of the tie-breaking mechanism. We consider qualitative objectives. Qualitative bidding games under discrete and continuous bidding are known to be {\em determined}: no matter the initial configuration of the game one of the players has a winning strategy. In bidding games, this property is captured in the concept of {\em threshold budget}, which is roughly a necessary and sufficient budget for a player for winning the game from a vertex. For continuous-bidding games the structure of the threshold budgets is well understood. Threshold budgets in reachability continous-bidding games have an {\em average property}: the budget at a vertex is the average of two of its neighbors. Moreover, functions with the average property are unique, which immediately implies that the complexity of finding threshold budgets is in NP and coNP. Moreover, parity continuous-bidding games reduce easily to reachability games. We turn to describe our results on discrete-bidding games. Threshold budgets were previously studied in reachability discrete-bidding games, where a discrete version of the average property sketched above was identified. We show, somewhat surprisingly, that functions with the discrete average property are not unique. We study, for the first time, the complexity of finding threshold budgets in reachability discrete-bidding games when the sum of budgets $N$ is given in binary. We show membership in NP and coNP using a careful reduction to turn-based reachability games that is based on an intricate analysis of the optimal strategies of the players. For discrete-bidding parity games, threshold budgets are known to exist but their structure was not understood. Moreover, a key difference between thresholds in continuous and discrete bidding parity is: in strongly-connected games, unlike continuous-bidding games, the threshold budgets can be non trivial. This property is the main ingredient in the reduction from parity to reachability continuous-bidding games. We circumvent this difficulty and describe a fixed-point algorithm to find threshold budgets in parity discrete-bidding games. The algorithm reveals the structure of threshold budgets, and is inspired by ideas from turn-based games, thus bringing the two classes of games closer. We are currently working on employing this structure in order to show membership in NP and coNP. In the future, we expect that our techniques will be useful in studying other variants of discrete bidding games, e.g., mean-payoff games, which exhibit interesting properties under continuous bidding but have never been studied under discrete bidding. } \section{Preliminaries} \subsection{Concurrent games} We define the formal semantics of bidding games via two-player {\em concurrent games}~\cite{AHK02}. Intuitively, a concurrent game proceeds as follows. A token is placed on a vertex of a graph. In each turn, both players concurrently select actions, and their joint actions determine the next position of the token. The outcome of a game is an infinite path. A game is accompanied by an objective, which specifies which plays are winning for Player~$1$\xspace. We focus on reachability and parity objectives, which we define later in this section. Formally, a concurrent game is played on an {\em arena} $\zug{A, V, \lambda, \delta}$, where $A$ is a finite non-empty set of actions, $V$ is a finite non-empty set of vertices, the function $\lambda: V \times \set{1,2} \rightarrow 2^A \setminus \{\emptyset\}$ specifies the allowed actions for Player~$i$\xspace in vertex $v$, and the transition function is $\delta: V \times A \times A \rightarrow V$. Suppose that the token is placed on a vertex $v$ and, for $i \in \set{1,2}$, Player~$i$\xspace chooses action $a_i \in \lambda(v)$. Then, the token moves to $\delta(v, a_1, a_2)$. For $u, v \in V$, we call $u$ a {\em neighbor} of $v$ if there is a pair of actions $\zug{a_1,a_2} \in \lambda(v, 1) \times \lambda(v, 2)$ with $u = \delta(v, a_1, a_2)$. We denote the neighbors of $v$ by $N(v) \subseteq V$. A (finite) {\em history} is a sequence $\zug{v_0,a^1_0, a^2_0},\ldots, \zug{v_{n-1},a^1_{n-1},a^2_{n-1}}, v_n \in (V \times A \times A)^*\cdot V$ such that, for each $0 \leq i <n$, we have $v_{i+1} = \delta(v_i, a^1_i, a^2_i)$. A {\em strategy} is a function from histories to actions, thus it is of the form $\sigma: (V \times A \times A)^*\cdot V \rightarrow A$. We restrict attention to {\em legal} strategies; namely, strategies that for each history $\pi \in (V \times A \times A)^*\cdot V$ that ends in $v \in V$, choose an action in $\lambda(v, i)$, for $i \in \set{1,2}$. A {\em memoryless} strategy is a strategy that, for every vertex $v$, assigns the same action to every history that ends in $v$. Two strategies $\sigma_1$ and $\sigma_2$ for the two players and an initial vertex $v_0$, give rise to a unique {\em play}, denoted $\text{play}\xspace(v_0, \sigma_1, \sigma_2)$, which is a sequence in $(V \times A \times A)^\omega$ and is defined inductively as follows. The first element of $\text{play}\xspace(v_0, \sigma_1, \sigma_2)$ is $v_0$. Suppose that the prefix of length $j \geq 1$ of \(\text{play}\xspace(v_0, \sigma_1, \sigma_2)\) is defined to be $\pi^j \cdot v_j$, where $\pi^j \in (V \times A \times A)^*$. Then, at turn $j$, for $i \in \set{1,2}$, Player~$i$\xspace takes action $a^j_i = \sigma_i(\pi^j \cdot v_j)$, the next vertex is $v^{j+1} = \delta(v_j, a^j_1, a^j_2)$, and we define $\pi^{j+1} = \pi^j \cdot \zug{v_j, a^j_1, a^j_2} \cdot v_{j+1}$. The {\em path} that corresponds to $\text{play}\xspace(v_0, \sigma_1, \sigma_2)$ is $v_0,v_1,\ldots$. {\em Turn-based games} are a special case of concurrent games in which the vertices are partitioned between the two players. When the token is placed on a vertex $v$, the player who {\em controls} $v$ decides how to move the token. Formally, a vertex $v$ is controlled by Player~$1$\xspace if for every action $a_1 \in A$, there is a vertex $v'$ such that no matter Player~$2$\xspace takes which action $a_2 \in A$, we have $v' = \delta(v, a_1, a_2)$. The definition is dual for Player~$2$\xspace. Note that a concurrent game that is not turn based might still contain some vertices that are controlled by one of the players. \subsection{Bidding games} A discrete-bidding game is played on an arena ${\mathcal G} = \zug{V, E, k}$, where $V$ is a set of vertices, $E \subseteq V \times V$ is a set of directed edges, and $k \in \mathbb{N}$ is the sum of the players' budgets. For a vertex $v \in V$, we use $N(v)$ to denote its {\em neighbors}, namely $N(v) = \set{u: E(v,u)}$. The size of the arena is $O(|V| + |E| + \log(k))$. Intuitively, in each turn, both players simultaneously choose a bid that does not exceed their available budgets. The higher bidder moves the token and pays the other player. Note that the sum of budgets stays constant throughout the game. Tie-breaking needs to be handled explicitly in discrete-bidding games as it can affect the properties of the game \cite{AAH19}. In this paper, we focus on the tie-breaking mechanism that was defined in \cite{DP10}: exactly one of the players holds the {\em advantage} at every turn, and when a tie occurs, the player with the advantage chooses between (1) win the bidding and pass the advantage to the other player, or (2) let the other player win the bidding and keep the advantage. Following \cite{DP10}, we denote the advantage with $*$. Let $\mathbb{N}$ denote the non-negative integers and $\mathbb{N}^*$ denote the set $\set{0, 0^*, 1, 1^*, 2, 2^*, \ldots}$. Throughout the paper, we use $k$ to denote the sum of budgets, and use $[k]$ to denote the set $\set{0,0^*,\ldots, k, k^*}$. Intuitively, when saying that Player~$1$\xspace has a budget of $m^* \in [k]$, we mean that Player~$1$\xspace can choose a bid in $\set{0,\ldots, m}$ and that he has the advantage. Implicitly, we mean that Player~$2$\xspace's budget is $k-m$ and she does not have the advantage. We define an order $<$ on $\mathbb{N}^*$ by $0 < 0^* < 1 < 1^* < \ldots$. Let $m \in \mathbb{N}^*$. We denote by $|m|$ the integer part of $m$, i.e., $|m^*|=m$. We define operators $\oplus$ and $\ominus$ over $\mathbb{N}^*$: $x^* \oplus y = (x + y)^*$, $x \oplus y = x+y$ for \(x, y \in \bbN\). Intuitively, we use \(\oplus\) to keep track of the budget of a player when they loses a biding to the other player, and as a result their budget gets increased by the other player's bid: therefore, in general \(x^* \oplus y^*\) is not well-defined. The definition of $\ominus$ is \textit{almost} dual, we use the notation to keep track of the budget of a player when they wins a bidding: \(x \ominus y = x-y\), \(x^* \ominus y = (x-y)^*\), and in particular $x^* \ominus y^* = x-y$. For $B \in \mathbb{N}^*$, of exceptional use is $\succb{B}$ and $\predb{B}$, which respectively denote the {\em successor} and {\em predecessor} of $B$ in $\mathbb{N}^*$ according to $<$. Consider an arena ${\mathcal G} = \zug{V, E, k}$ of a bidding game. We describe a concurrent game ${\cal C}$ that corresponds to it. The vertices in ${\cal C}$ consist of {\em configuration} vertices $C = V \times [k]$ and {\em intermediate} vertices $\set{i_{c,b}: c \in C, b \leq k^*}$. A vertex $c = \zug{v, B} \in (V \times [k])$ represents the configuration of the bidding game in which the token is placed on vertex $v \in V$, Player~$1$\xspace's budget is $B$, and Player~$2$\xspace's budget is $k^* \ominus B$. Consider a configuration vertex $c = \zug{v, B}$. The available actions for a player in $c$ represent the legal bids and the vertex to move to upon winning. Thus, the available actions for Player~$1$\xspace are $\set{0,\ldots, |B|} \times N(v)$ and the available actions for Player~$2$\xspace are $\set{0,\ldots, k-|B|} \times N(v)$. Each intermediate vertex is owned by a single player, so we only specify their outgoing transitions below. We describe the transition function. Suppose that the token is placed on a configuration vertex $c = \zug{v, B}$ and Player~$i$\xspace chooses action $\zug{b_i, u_i}$, for $i \in \set{1,2}$. If $b_1 > b_2$, Player~$1$\xspace wins the bidding and the game proceeds to $\zug{u_1, B_1 \ominus b_1}$. The definition for $b_2 > b_1$ is dual. We address the case of a bidding tie, namely the case that $b_1 = b_2 = b$. Assume that Player~$1$\xspace has the advantage, i.e., $c = \zug{v, B_1^*}$, and the other case is dual. The game proceeds to an intermediate vertex $i_{c, b}$ that is controlled by Player~$1$\xspace and has two outgoing edges. The first edge models Player~$1$\xspace using the advantage to win the bidding, and directs to the configuration $\zug{u_1, B_1-b_1}$. The second edge models Player~$1$\xspace allowing Player~$2$\xspace to win the bidding and keeping the advantage, and it directs to $\zug{u_2, (B_1 + b_2)^*}$. We often say that the player who holds the advantage bids $b^*$, and we mean that he bids $b$ and uses the advantage if a tie occurs. Note that the size of the arena is $O(|V| \times k)$, which is exponential in the size of the bidding game. Consider two strategies $f$ and $g$ in ${\cal C}$ and an initial configuration $c = \zug{v, B}$ We often abuse notation and refer to $\tau = \text{play}\xspace(v, f, g)$ as the infinite path in ${\mathcal G}$ that is obtained by removing intermediate vertices from $\pi$. We use $inf(\tau)$ to denote the set of vertices that $\tau$ visits infinitely often. \subsection{Objectives} An objectives in a bidding game specifies the infinite paths that are winning for Player~$1$\xspace. We consider the following two canonical objectives: \begin{itemize} \item {\bf Reachability} A game is equipped with a target set $T \subseteq V$. Player~$1$\xspace, the reachability player, wins an infinite play iff it visits $T$. \item {\bf Parity} Each vertex is labeled by a {\em parity index}, given by a function $p: V \rightarrow \set{1,\ldots, d}$, for $d \in \mathbb{N}$. A play $\tau$ is winning for Player~$1$\xspace iff $\max_{v \in inf(\tau)} p(v)$ is odd. \end{itemize} In addition, we introduce the following extension of the two objectives above. \begin{definition} {\bf Frugal objectives.} Consider an arena $\zug{V, E, k}$. A {\em frugal objective} is a set $S \subseteq V$ of sink states and a function $\texttt{fr}:S \rightarrow [k]$ which assigns a {\em frugal-target budget} to each sink. Player~$1$\xspace's frugal objective is satisfied if the game reaches some $s \in S$ with Player~$1$\xspace's budget at least $\texttt{fr}(s)$. We consider both {\em frugal-reachability} and {\em frugal-parity} games. Player~$1$\xspace wins a frugal-reachability game if the frugal objective is satisfied. Note that a reachability game is a special case of a frugal-reachability game in which $\texttt{fr} \equiv 0$. A frugal-parity game is $\zug{V, E, k, p, S, \texttt{fr}}$, where $p: (V \setminus S) \rightarrow \set{0,\ldots, d}$. Player~$1$\xspace wins a play $\pi$ if (1) $\pi$ does not reach $S$ and satisfies the parity objective, or (2) $\pi$ reaches $S$ and satisfies the frugal objective. \end{definition} A {\em winning strategy} from a configuration $c = \zug{v, B}$ for Player~$1$\xspace is a strategy $f$ such that no matter which strategy $g$ Player~$2$\xspace chooses, $\text{play}\xspace(c, f, g)$ is winning for Player~$1$\xspace. We say that Player~$1$\xspace\ {\em wins} from $c$ if he has a winning strategy. The definition is dual for Player~$2$\xspace. \section{Threshold Budgets and the Average Property} A key quantity in bidding games is the {\em threshold budget} at a vertex, which intuitively represents the necessary and sufficient initial budget at that vertex for Player~$1$\xspace to guarantee winning the game. It is formally defined as follows. \begin{definition} {\bf Threshold budgets.} Consider a bidding game ${\mathcal G}$ in which the sum of budgets is $k \in \mathbb{N}$. The {\em threshold budget} at a vertex $v$ in ${\mathcal G}$, denoted $\texttt{Th}\xspace_{\mathcal G}(v)$, is such that if Player~$1$\xspace's budget at $v$ is at least $\texttt{Th}\xspace_{\mathcal G}(v) \in [k]$, then Player~$1$\xspace wins the game from $v$, and if his budget is at most $\texttt{Th}\xspace_{\mathcal G}(v) \ominus 0^*$, then Player~$2$\xspace wins the game. We refer to the function $\texttt{Th}\xspace_{\mathcal G}$ as the {\em threshold budgets}. \end{definition} \subsection{Reachability continuous-bidding games} The properties of threshold budgets in discrete-bidding games have only been studied for reachability games \cite{DP10}. The properties of the threshold budgets and the techniques to prove them are similar to those used in reachability continuous-bidding games~\cite{LLPU96,LLPSU99}. We thus first survey the latter. \begin{definition} {\bf (Continuous threshold budgets).} Normalize the sum of budgets to~$1$. The {\em continuous threshold budget} at a vertex $v$ is a budget $\texttt{Th}\xspace(v) \in [0,1]$ such that if Player~$1$\xspace's budget exceeds $\texttt{Th}\xspace(v)$, he wins the game from $v$, and if Player~$2$\xspace's budget exceeds $1-\texttt{Th}\xspace(v)$, she wins the game from $v$. \end{definition} We call the objective that was considered in \cite{LLPU96,LLPSU99} {\em double-reachability}. Such a game is $\zug{V, E, t_1, t_2}$, where for $i \in \set{1,2}$, the vertex $t_i$ is the target of Player~$i$\xspace. The game ends once one of the targets is reached, and the player whose target is reached is the winner. Every other vertex has a path to both targets. Even though a priori, it is not implicit that one of the player always wins in a double reachability games (because the game might not reach either of the target vertices), here it is explicitly shown that this is not the case \cite{LLPU96, LLPSU99}. \begin{definition} \label{def:continuous-average} {\bf (Continuous average property).} Consider a double-reachability continuous-~bidding game ${\mathcal G} = \zug{V, E, t_1, t_2}$ and a function $T: V \rightarrow [0,1]$. We say that $T$ has the continuous average property if $T(t_1) = 0$ and $T(t_2) = 1$, and for every other $v \in V \setminus \set{t_1, t_2}$, we have $T(v) = 0.5 \cdot \big(T(v^-) + T(v^+)\big)$, where $v^+ := \arg\max_{u \in N(v)} \texttt{Th}\xspace(u)$ and $v^- := \arg\min_{u \in N(v)} \texttt{Th}\xspace(v)$. \end{definition} We show the main properties of double-reachability continuous-bidding games. The ideas used in the proof are adapted to the discrete setting in later sections. \begin{restatable}{theorem}{contreach} \label{thm:cont-reach} \cite{LLPU96,LLPSU99} Consider a double-reachability continuous-bidding game $\zug{V, E, t_1, t_2}$. Continuous threshold budgets exist, and the threshold budgets $\texttt{Th}\xspace: V \rightarrow [0,1]$ is the unique function that has the continuous average property. \end{restatable} \begin{proof} (SKETCH) Let $\texttt{Th}\xspace$ be a function that satisfies the continuous average property. We prove that $\texttt{Th}\xspace(v)$, for every vertex $v$, is the continuous threshold budget at $v$. Uniqueness follows immediately. We omit the proof of existence of $\texttt{Th}\xspace$. Suppose that Player~$1$\xspace's budget at $v$ is $\texttt{Th}\xspace(v) + \varepsilon$, for $\varepsilon > 0$. We describe a Player~$1$\xspace winning strategy. Player~$1$\xspace maintains the following invariant: \noindent{\bf Invariant:} When the token is on $u \in V$, Player~$1$\xspace's budget is strictly greater than $\texttt{Th}\xspace(u)$. The invariant implies that Player~$1$\xspace does not lose; indeed, it implies that if $t_2$ is reached, Player~$1$\xspace's budget is strictly greater than $1$, which violates the assumption that the sum of budgets is $1$. The invariant holds initially, and we show how to maintain it. Suppose that the token is placed on $v \in V$ and Player~$1$\xspace's budget is $B = \texttt{Th}\xspace(v) + \varepsilon$. Recall that $v^+, v^- \in N(v)$ are respectively the neighbors of $v$ with the maximal and minimal threshold budgets. Let $b = 0.5\cdot \big(\texttt{Th}\xspace(v^+) - \texttt{Th}\xspace(v^-)\big)$. The key observation is that $B + b = \texttt{Th}\xspace(v^+) + \varepsilon$ and $B-b = \texttt{Th}\xspace(v^-) + \varepsilon$. We claim that by bidding $b$, Player~$1$\xspace guarantees that the invariant is maintained. Indeed, if he wins the bidding, he moves the token to $v^-$, and if he loses the bidding, the worst that Player~$2$\xspace can do is move the token to $v^+$. We omit the details of how Player~$1$\xspace guarantees winning, i.e., forcing the token to $t_1$. Finally, we show that Player~$2$\xspace wins when Player~$1$\xspace's budget is $\texttt{Th}\xspace(v) - \varepsilon$. We intuitively ``flip'' the game and associate Player~$1$\xspace with Player~$2$\xspace. Let ${\mathcal G}'$ be the same as ${\mathcal G}$ only that Player~$1$\xspace's goal is to reach $t_2$ and Player~$2$\xspace's goal is to reach $t_1$. For every $u \in V$, define $\texttt{Th}\xspace'$ as $\texttt{Th}\xspace'(u) = 1-\texttt{Th}\xspace(u)$. A key observation is that $\texttt{Th}\xspace'$ satisfies the average property in ${\mathcal G}'$. Now, in order to win from $v$ in ${\mathcal G}$ when Player~$1$\xspace's budget is $\texttt{Th}\xspace(v) - \varepsilon$, Player~$2$\xspace follows a winning Player~$1$\xspace strategy in ${\mathcal G}'$ with an initial budget of $1-\texttt{Th}\xspace(v) + \varepsilon$. \end{proof} \subsection{Constructing strategies based on the discrete average property} \label{sec:average-based-strat} We first adapt the definition of the average property (Def.~\ref{def:continuous-average}) to the discrete setting. \begin{definition} \label{def:average} ({\bf Average property}). Consider a discrete-bidding game ${\mathcal G} = \zug{V, E, k, S, \texttt{fr}}$ with frugal objective. We say that a function $T: V \rightarrow [k] \cup \set{k+1}$ has the {\em average property} if for every $s \in S$, we have $T(s) = \texttt{fr}(s)$, and for every $v \in V \setminus S$, \[ T(v) = \floor{\frac{|T(v^+)| + |T(v^-)|}{2}} +\varepsilon \text{ where } \varepsilon = \begin{cases} 0 &\text{if~} |T(v^+)| + |T(v^-)| \text{ is even and~} T(v^-) \in \mathbb{N} \\ 1 &\text{if~} |T(v^+)| + |T(v^-)| \text{ is odd and~} T(v^-) \in \mathbb{N}^* \setminus \mathbb{N} \\ * &\text{otherwise} \end{cases} \] \stam \begin{align*} T(v) = \floor{\frac{|T(v^+)| + |T(v^-)|}{2}} +\varepsilon \end{align*} where \begin{align*} \varepsilon = \begin{cases} 0 &\text{if~} |T(v^+)| + |T(v^-)| \text{ is even and~} T(v^+) \in \mathbb{N} \\ 1 &\text{if~} |T(v^+)| + |T(v^-)| \text{ is odd and~} T(v^+) \in \mathbb{N}^* \setminus \mathbb{N} \\ * &\text{otherwise} \end{cases} \end{align*} } where $v^+ := \arg\max_{u \in N(v)} \texttt{Th}\xspace(u)$ and $v^- := \arg\min_{u \in N(v)} \texttt{Th}\xspace(v)$ \end{definition} Note that, the range of \(T\) includes \(k+1\), which captures the threshold budget of a player at a vertex from where the other player wins the game with budget \(0\). Consider a function $T: V \rightarrow [k] \cup \set{k+1}$ that satisfies the average property. We develop a {\em partial strategy} $f_T$, which is a function from histories to $[k] \times 2^V$. An output $\zug{b, A}$ of $f_T$ means that the bid is $b$ and upon winning, Player~$1$\xspace must choose an {\em allowed vertex} in $A$ to move the token to. A strategy $f'$ that {\em agrees} with $f_T$ bids in the same manner and upon winning a bidding, it chooses a vertex in $A$. We define $f_T$ so that when Player~$1$\xspace plays according to a strategy that agrees with $f_T$, an invariant is maintained on Player~$1$\xspace's budget, similar to the invariant in the continuous setting (see the proof of Thm.~\ref{thm:cont-reach}). Suppose that a history ends in a vertex $v$ with Player~$1$\xspace's budget $B \geq T(v)$. Intuitively, as in Thm.~\ref{thm:cont-reach}, when Player~$1$\xspace wins the bidding in $v$, he proceeds to some neighbor $v^-$ that attains the minimal value according to $T$, and when Player~$2$\xspace wins the bidding, the worst she can do is move to a vertex $v^+$ that attains the maximal value according to $T$. Formally, $f_T$ restricts the choice of neighbor of $v$ to a set of {\em allowed vertices}, denoted $A(v)$, and depend only $v$. Let $v^+ = \arg \max_{u \in N(v)} T(u)$ and $v^- = \arg \min_{u \in N(v)} T(u)$. We define $A(v) = \set{u \in N(v): T(u) = T(v^-)}$ when \(T(v^-) \in \mathbb{N}\), and \(A(v) = \set{u \in N(v): T(u) \leq \succb{T(v^-)}}\) when \(T(v^-) \in \mathbb{N}^* \setminus \mathbb{N}\). Next, for each $v \in V$, we define a bid that $f_T$ proposes. Suppose that Player~$1$\xspace's budget is $B \in [k]$, for $B \geq T(v)$. We define $f_T$ so that it proposes one of two possible bids $\tbid{v}$ or $\succb{\tbid{v}}$, depending on whether Player~$1$\xspace holds the advantage. Intuitively, Player~$1$\xspace ``attempts'' to bid $\tbid{v}$ at $v$. This is not possible if $\tbid{v} \in \mathbb{N}^*\setminus \mathbb{N}$ and $B \in \mathbb{N}$, i.e., Player~$1$\xspace wants to use the advantage but does not have it. In such a case, Player~$1$\xspace bids $\succb{\tbid{v}} \in \mathbb{N}$. Formally, we define \begin{align} \label{eq: bids} \tbid{v} = \begin{cases} \frac{|T(v^+)| - |T(v^-)|}{2} &\text{~When~} |T(v^+)| + |T(v^-)| \text{~is even and~} T(v^-) \in \bbN \\ \floor{\frac{|T(v^+)| - |T(v^-)|}{2}} &\text{~When~} |T(v^+)| + |T(v^-)| \text{~is odd and~} T(v^-) \in \bbN^*\setminus \mathbb{N} \\ \predb{\frac{|T(v^+)| - |T(v^-)|}{2}} &\text{~When~} |T(v^+)| + |T(v^-)| \text{~is even and~} T(v^-) \in \bbN^*\setminus \mathbb{N} \\ \succb{\floor{\frac{|T(v^+)| - |T(v^-)|}{2}}} &\text{~When~} |T(v^+)| + |T(v^-)| \text{~is odd and~} T(v^-) \in \bbN \\ \end{cases} \end{align} Assuming that the game reaches $v$ with a budget of $B \geq T(v)$, we define $f_T$ to bid $b^T(v,B)$ where $b^T(v,B) = \tbid{v}$ when both $\tbid{v}$ and $B$ belong to either $\mathbb{N}$ of $\mathbb{N}^*\setminus \mathbb{N}$, and $\succb{\tbid{v}}$ otherwise. We formalize the guarantees of $f_T$ in the lemma below. \begin{restatable}{lemma}{invarianttbid} \label{lem:invariant-tbid} For every $v \in V$ and $B \geq T(v)$, we have $B \ominus b^T(v,B) \geq T(v^-)$ and $B \oplus \succb{b^T(v,B)} \geq T(v^+)$. \end{restatable} \begin{proof} Consider a vertex $v$. We first connect the value of $v$, the values of its two neighbors' $v^+$ and $v^-$, and $b_v$ (recall the definition from Eqn. \eqref{eq: bids}) in the following claim. \begin{claim}\label{claim: resultonT} \begin{enumerate} \item $T(v) \ominus \tbid{v} =T(v^-)$, when $T(v^-) \in \bbN$, \item $T(v) \ominus \tbid{v} = \succb{T(v^-)}$, when $T(v^-) \in \mathbb{N}^* \setminus \mathbb{N}$, \item $T(v) \oplus \succb{\tbid{v}} = |T(v^+)|^*$, \item $(\succb{T(v)}) \ominus (\succb{\tbid{v}}) = T(v) \ominus \tbid{v}$, and \item $(\succb{T(v)}) \oplus (\tbid{v} \oplus 1) = |T(v^+)|^* + 1$. \end{enumerate} \end{claim} \begin{proof} When $T(v^+) + T(v^-)$ is odd, we have $\floor{\frac{|T(v^+)|+ |T(v^-)|}{2}} = \frac{|T(v^+)|+ |T(v^-)|}{2} - 0.5$ and \\ $\floor{\frac{|T(v^+)| - |T(v^-)|}{2}} = \frac{|T(v^+)| - |T(v^-)|}{2} - 0.5$. Using the average property of \(T\) (Def. \ref{def:average}), we analyze the four cases. We refer \(|T(v^+)|+|T(v^-)|\) as the {\em sum}, and \(T(v^-)\) as the {\em min. neighbour} \begin{itemize} \item When the sum is even, and the min. neighbour is in \(\mathbb{N}\), \(T(v) \ominus \tbid{v} = \frac{|T(v^+)| + |T(v^-)|}{2} - \frac{|T(v^+)| - |T(v^-)|}{2} = |T(v^-)| = T(v^-)\), and \(T(v) \oplus \succb{\tbid{v}} = \succb{|T(v^+)|} = |T(v^+)|^*\). \item When the sum is odd, and the min. neighbour is in \(\mathbb{N}^* \setminus \mathbb{N}\), \(T(v) \ominus \tbid{v} = |T(v^-)| \oplus 1 = \succb{T(v^-)}\), and \(T(v) \oplus (\succb{\tbid{v}}) = \floor{\frac{|T(v^+)|+ |T(v^-)|}{2}} \oplus 1 \oplus \succb{\floor{\frac{|T(v^+)|- |T(v^-)|}{2}}} = \succb{|T(v^+)|} = |T(v^+)|^*\). \item When the sum is even, and the min. neighbour is in \(\mathbb{N}^* \setminus \mathbb{N}\), \(T(v) \ominus \tbid{v} = \succb{\frac{|T(v^+)|+ |T(v^-)|}{2}} \ominus (\predb{\frac{|T(v^+)|+ |T(v^-)|}{2}}) = |T(v^-)| \oplus 1 = \succb{T(v^-)}\), and \(T(v) \oplus (\succb{\tbid{v}}) = (\succb{\frac{|T(v^+)|+ |T(v^-)|}{2}}) \oplus \frac{|T(v^+)|- |T(v^-)|}{2} = \succb{|T(v^+)|} = |T(v^+)|^*\) \item Finally, when the sum is odd, and the min. neighbour is in \(\mathbb{N}\), \(T(v) \ominus \tbid{v} = \succb{\floor{\frac{|T(v^+)|+ |T(v^-)|}{2}}} \ominus (\succb{\floor{\frac{|T(v^+)| - |T(v^-)|}{2}}}) = |T(v^-)| = T(v^-)\), and \(T(v) \oplus (\succb{\tbid{v}}) = \succb{\floor{\frac{|T(v^+)| + |T(v^-)|}{2}}} \oplus \succb{\floor{\frac{|T(v^+)| - |T(v^-)|}{2}}} \oplus 0^* = \succb{|T(v^+)|} = |T(v^+)|^* \) \end{itemize} Thus, we obtain (1)-(3). Moreover, (4) and (5) are obtained by plain algebra to the above. \end{proof} Next, we prove that $f$ maintains the invariant that when reaching a vertex $v$, Player~$1$\xspace's budget is at least $T(v)$. This is proved by induction. The base case follows from the assumption. Assume that a history ends in a configuration $\zug{v, B}$. The case when $B = T(v)$ is handled in the first three cases above. Since $b^T(v, \succb{T(v)}) = \succb{\tbid{v}}$, the case where $B = \succb{T(v)}$ are handled by the last two cases above. Finally, for $B > \succb{T(v)}$, either both $B$ and $T(v)$ belong to $\bbN$ or $\bbN^*$, or both $B$ and $\succb{T(v)}$ does. Accordingly (because both $T(v)$ and $\tbid{v}$ belong to one of $\bbN$ or $\bbN^*$), $b^T(v,B)$ is either $\tbid{v}$ or $\succb{\tbid{v}}$. Either way, we have $B \ominus b^T(v,B) \geq T(v^-)$ and $B \oplus \succb{b^T(v,B)} \geq T(v^+)$. \end{proof} A corollary of Lem.~\ref{lem:invariant-tbid} is that any strategy that agrees with $f_T$ maintains an invariant on Player~$1$\xspace's budget and is thus a legal strategy, i.e., it never prescribes bids that exceed the available budget. \begin{restatable}{corollary}{invariant} \label{cor:invariant} Suppose that Player~$1$\xspace plays according to a strategy that agrees with $f_T$ starting from configuration $\zug{u, B}$ having $B \geq T(u)$, we have: \begin{itemize} \item When the game reaches $v \in V$, Player~$1$\xspace's budget is at least $T(v)$. \item The bid $b$ prescribed by $f_T$ does not exceed the available budget, i.e., $b \leq B$. \end{itemize} \end{restatable} \subsection{Properties of functions with the average property} We show that, somewhat surprisingly, unlike in continuous-bidding, functions that satisfy the discrete average property are not unique. That is, there are functions that satisfy the average property but do not coincide with the threshold budgets. \begin{theorem} \label{thm:non-unique} The reachability discrete-bidding game ${\mathcal G}_1$ that is depicted in Fig.~\ref{fig:avgbutnotthreshold} with target $t$ for Player~$1$\xspace has more than one function that satisfies the average property. \end{theorem} \begin{proof} Assume a total budget of $k = 5$. We represent a function $T: V \rightarrow [k]$ as a vector $\zug{T(v_0), T(v_1), T(v_2), T(t)}$. It is not hard to verify that both $\zug{4,3^*,3,2}$ and $\zug{5,4^*,3^*,2}$ satisfy the average property. (The latter represents the threshold budgets). \end{proof} \begin{figure} \centering \begin{tikzpicture} \colorlet{gr}{green!70!black} \colorlet{or}{orange!70!black} \draw (0,0) node[rond5] (0) {$v_0$}; \draw (2,0) node[rond5] (1) {$v_1$}; \draw (4,0) node[rond5] (2) {$v_2$}; \draw (6,0) node[rect] (t) {$t$}; \draw[gr] (0,0.5) node (lab0) {\textbf{4}}; \draw[gr] (2,0.5) node (lab1) {\textbf{3*}}; \draw[gr] (4,0.5) node (lab2) {\textbf{3}}; \draw (6.5,0) node (labt) {\textbf{2}}; \draw[or] (0,-0.5) node (lab0) {\textbf{5}}; \draw[or] (2,-0.5) node (lab1) {\textbf{4*}}; \draw[or] (4,-0.5) node (lab2) {\textbf{3*}}; \draw (0) edge[->, bend left = 30] (1); \draw (1) edge[->, bend left = 30] (0); \draw (1) edge[->] (2); \draw (2) edge[->] (t); \draw (2) edge[->, bend left = 40] (0); \draw (0) edge[->, loop left] (0); \end{tikzpicture} \caption{A discrete-bidding reachability game with two functions that satisfy the average property.}\label{fig:avgbutnotthreshold} \end{figure} The following lemma is key in developing a winning Player~$2$\xspace strategy. We intuitively show that the ``complement'' of $T$ satisfies the average property. The idea is similar to the continuous case (see the last point in the proof of Thm.~\ref{thm:cont-reach}). \begin{restatable}{lemma}{flippedaverage} \label{lem:flippedaverage} Let ${\mathcal G} = \zug{V, E, k, S, \texttt{fr}}$ be a discrete-bidding game with a frugal objective. Let \(T: V \rightarrow [k] \cup \{k+1\}\) be a function that satisfies the average property. We define \(T': V \rightarrow [k] \cup \{k+1\}\) as follows. For $v \in V$, let $T'(v) = k^* \ominus \big(\predb{T(v)}\big)$ when $T(v) > 0$, and $T'(v) = k+1$ otherwise. \stam \begin{align*} \centering T'(v) = \begin{cases} k^* \ominus (\predb{T(v)}) &\text{~If~} T(v) > 0\\ k+1 &\text{~otherwise} \end{cases} \end{align*} } Then, \(T'\) satisfies the average property. \end{restatable} \begin{proof} We need to show that \(T'(v) = \floor{\frac{|T'(v^+)|+ |T'(v^-)|}{2}} + \varepsilon'\), where \(\varepsilon'\) is from the definition of the average property. We have \(T(v) = \floor{\frac{|T(v^+)|+ |T(v^-)|}{2}} + \varepsilon\) already. We first note some crucial observations that we will use in the subsequent case analysis. \textbf{Observation I.} \(T(v) \in \mathbb{N} \implies \predb{T(v)} \in \mathbb{N}^* \setminus \mathbb{N}\), which again implies \(T'(v) = k^* \ominus (\predb{T(v)}) \in \mathbb{N}\), and vice versa. That is, \(T(v) \in \mathbb{N}\) if, and only if, \(T'(v) \in \mathbb{N}\) for any \(v \in V\). \textbf{Observation II}. \(T'(v^+) = k^* \ominus (\predb{T(v^-)})\), and \(T'(v^-) = k^* \ominus (\predb{T(v^+)})\). In other words, if \(v'\) is a maximum neighbour with respect to \(T\), then it is a minimum neighbour with respect to \(T'\), and vice-versa. \textbf{Observation III}. \(T(v) \in \mathbb{N}\) implies \(\predb{T(v)} = \succb{(|T(v)|-1)}\). Therefore, \(k^* \ominus (\predb{T(v)}) = k^* \ominus (\succb{(|T(v)| - 1)})\), which implies \(|T'(v)| = k+1 - |T(v)|\). On the other hand, \(T(v) \in \mathbb{N}^*\) implies \(\predb{T(v)} = |T(v)|\). Therefore, \(k^* \ominus (\predb{T(v)}) = k^* \ominus |T(v)| = (k - |T(v)|) \oplus 0^*\), which implies \(|T'(v)| = k - |T(v)|\). Finally, assuming \(T(v) > 0\), we analyse the four possible cases in the following: \begin{itemize} \item \(T(v^+), T(v^-) \in \mathbb{N}\). Therefore, \(|T(v^+)|+|T(v^-)|\) even \(\Leftrightarrow\) \(|T'(v^-)|+|T'(v^+)|\) even. In both the cases (when the sum is even, and when it is odd), \(\varepsilon' = \varepsilon\). When \(\varepsilon = \varepsilon' = 0\) (sum even, minimum in \(\mathbb{N}\)), we have \(\frac{|T'(v^+)|+|T'(v^-)|}{2} = \)\\ \(\frac{(k+1 - |T(v^-)|) + (k+1 - |T(v^+)|)}{2} = k+1 - \frac{|T(v^+)|+|T(v^-)|}{2} = k+1 - |T(v)| = T(v')\). When \(\varepsilon = \varepsilon' = 0^*\)(sum odd, minimum in \(\mathbb{N}\)), then \(\floor{\frac{|T'(v^+)|+|T'(v^-)|}{2}} \oplus 0^* = (k+1 - \floor{\frac{|T(v^+)|+|T(v^-)|}{2}} - 1) \oplus 0^* = (k - (T(v) \ominus 0^*)) \oplus 0^* = k^* \ominus (\predb{T(v)}) = T'(v)\). \smallskip \item \(T(v^+), T(v^-) \in \mathbb{N}^* \setminus \mathbb{N}\). In this case too, \(|T(v^+)|+|T(v^-)|\) even \(\Leftrightarrow\) \(|T'(v^-)|+|T'(v^+)|\) even. Therefore, we have \(\varepsilon' = \varepsilon\). When \(\varepsilon = \varepsilon' = 0^*\) (sum even, minimum in \(\mathbb{N}^* \setminus \mathbb{N}\)), we have \(\frac{|T'(v^+)|+|T'(v^-)|}{2} \oplus 0^* = \frac{(k - |T(v^-)|)+(k - |T(v^+)|)}{2} \oplus 0^* = k \ominus (T(v) \ominus 0^*) \oplus 0^* = k^* \ominus (\predb{T(v)}) = T'(v)\). When \(\varepsilon = \varepsilon' = 1\) (sum odd, minimum in \(\mathbb{N}^* \setminus \mathbb{N}\)), we have \(\floor{\frac{|T'(v^+)|+|T'(v^-)|}{2}} \oplus 1 = (k - \floor{\frac{|T(v^-)|+|T(v^+)|}{2}} - 1) \oplus 1 = k \ominus (T(v) \ominus 1) = (\succb{k}) \ominus (\succb{T(v) \ominus 1}) = k^* \ominus (\predb{T(v)}) = T'(v)\) \smallskip \item \(T(v^+) \in \mathbb{N}\) and \(T(v^-) \in \mathbb{N}^*\) In this case, \(|T(v^+)|+|T(v^-)|\) even \(\Leftrightarrow\) \(|T'(v^-)|+|T'(v^+)|\) odd. When \(\varepsilon = \varepsilon' = 0^*\) (sum even and minimum in \(\mathbb{N}^* \setminus \mathbb{N}\) in \(T\)), we have \(\floor{\frac{|T'(v^+)|+|T'(v^-)|}{2}} \oplus 0^* = \floor{\frac{2k+1 - (|T(v^-)|+|T(v^+)|)}{2}} \oplus 0^* = k \ominus \frac{|T(v^+)|+|T(v^-)|}{2} \oplus 0^* = k \ominus (T(v) \ominus 0^*) \oplus 0^* = k^* \ominus (\predb{T(v)}) = T(v)\). When \(\varepsilon = 1, \varepsilon' = 0\) (sum odd, and minimum in \(\mathbb{N}^* \setminus \mathbb{N}\) in T), \(\frac{|T'(v^+)|+|T'(v^-)|}{2} = \frac{2k+1 - (|T(v^-)|+|T(v^+)|)}{2} = k - \frac{|T(v^+)|+|T(v^-)|-1}{2} = k - \floor{\frac{|T(v^+)|+|T(v^-)|}{2}} = k \ominus (T(v) \ominus 1) = k^* \ominus (\predb{T(v)}) = T'(v)\). \smallskip \item \(T(v^+) \in \mathbb{N}^*\) and \(T(v^-) \in \mathbb{N}\) In this case, \(|T(v^+)|+|T(v^-)|\) even \(\Leftrightarrow\) \(|T'(v^-)|+|T'(v^+)|\) odd. When \(\varepsilon = 0, \varepsilon' = 1\) (sum even, and minimum in \(\mathbb{N}\) in \(T\)), we have \(\floor{\frac{|T'(v^+)|+|T'(v^-)|}{2}} \oplus 1 = \floor{\frac{2k+1 - (|T(v^-)|+|T(v^+)|)}{2}} \oplus 1 = (k - \frac{|T(v^+)|+|T(v^-)|}{2}) \oplus 1 = (k \ominus T(v)) \oplus 1 = k^* \ominus (\predb{T(v)}) = T'(v)\). When \(\varepsilon = \varepsilon' = 0^*\) (sum odd, and minimum in \(\mathbb{N}\) in T), we have \(\frac{|T'(v^+)|+|T'(v^-)|}{2} \oplus 0^* = \frac{2k+1 - (|T(v^-)|+|T(v^+)|)}{2} \oplus 0^* = k - \frac{|T(v^+)|+|T(v^-)|-1}{2} \oplus 0^* = k \ominus \floor{\frac{|T(v^+)|+|T(v^-)|}{2}} \oplus 0^* = k^* \ominus (T(v) \ominus 0^*) = T'(v)\) \end{itemize} If \(T(v) = 0\), then both \(T(v^+)\) and \(T(v^-)\) are \(0\), which implies \(\varepsilon = \varepsilon' = 0\) and both \(T(v^-), T(v^+)\) are \(k+1\), therefore \(\floor{\frac{|T'(v^+)| + |T'(v^-)|}{2}} + \varepsilon' = k+1 = T'(v)\). \end{proof} \subsection{Frugal-reachability discrete-bidding games} We close this section by extending the results of \cite{DP10} from reachability to frugal-reachability discrete-bidding games. \begin{restatable}{lemma}{reachlower} \label{lem:reach-lower} Consider a frugal-reachability discrete-bidding game \({\mathcal G} = \zug{V, E, k, S, \texttt{fr}}\). If \(T: V \rightarrow [k] \cup \{k+1\}\) is a function that satisfies the average property, then \(T(v) \leq \texttt{Th}\xspace_{{\mathcal G}}(v)\) for every \(v \in V\). \end{restatable} \begin{proof} We show that if for some vertex \(v\), Player~$1$\xspace has a budget less than \(T(v)\), then Player~$2$\xspace has a winning strategy, which proves that the threshold budgets for Player~$1$\xspace cannot be less than \(T(v)\), when \(T\) is a average property satisfying function. Given such $T$ that satisfies the average property, we construct $T'$ as in Lem.~\ref{lem:flippedaverage}. Let $\zug{v, B_1}$ be a configuration, where $v \in V$, Player~$1$\xspace's budget is $B_1$, and implicitly, Player~$2$\xspace's budget is $B_2 = k^* \ominus B_1$. Note that $B_1 < T(v)$ iff $B_2 \geq T'(v)$. Moreover, for every $s \in S$, we have $T'(s) = k^* \ominus (\predb{\texttt{fr}(s)})$. We ``flip'' the game; namely, we associate Player~$2$\xspace with Player~$1$\xspace, and construct a partial strategy $f_{T'}$ for Player~$2$\xspace as in Sec.~\ref{sec:average-based-strat}. We construct a Player~$2$\xspace strategy $f'$ that agrees with $f_{T'}$: for each $v \in V$, we arbitrarily choose a neighbor $u$ from the allowed vertices. By Corollary~\ref{cor:invariant}, no matter how Player~$1$\xspace responds, whenever the game reaches $\zug{u, B_1}$, we have $B_2 \geq T'(u)$. The invariant implies that $f'$ is a winning strategy. Indeed, if the game does not reach a sink, Player~$2$\xspace wins, and if it does, Player~$1$\xspace's frugal objective is not satisfied. \end{proof} \begin{restatable}{lemma}{reachupper} \label{lem:reach-upper} Consider a frugal-reachability discrete-bidding game ${\mathcal G} = \zug{V, E, k, S, \texttt{fr}}$. There is a function $T$ that satisfies the average property with $T(v) \geq \texttt{Th}\xspace_{\mathcal G}(v)$, for every $v \in V$. \end{restatable} \begin{proof} The proof is similar to the one in \cite{DP10}. We illustrate the main ideas. For $n \in \mathbb{N}$, we consider the {\em truncated game} ${\mathcal G}[n]$, which is the same as ${\mathcal G}$ only that Player~$1$\xspace wins iff he wins in at most $n$ steps. We find a sufficient budget for Player~$1$\xspace to win in the vertices in ${\mathcal G}[n]$ in a backwards-inductive manner. For the base case, for every vertex $u \in V$, since Player~$1$\xspace cannot win from $u$ in $0$ steps, we have $T_0(u) = k+1$. For $s \in S$, we have $T_0(s) = \texttt{fr}(s)$. Clearly, $T_0 \equiv \texttt{Th}\xspace_{{\mathcal G}[0]}$. For the inductive step, suppose that $T_{n-1}$ is computed. For each vertex $v$, we define $T_n(v) = \floor{\frac{|T_{n-1}(v^+)| + |T_{n-1}(v^-, k)|}{2}} +\varepsilon$ as in Def.~\ref{def:average}. Following a similar argument to Thm.~\ref{thm:cont-reach}, it can be shown that if Player~$1$\xspace's budget is $T_n(v)$, he can bid $b$ so that if he wins the bidding, his budget is at least $T_{n-1}(v^-)$ and if he loses the bidding, his budget is at least $T_{n-1}(v^+)$. By induction we get $\texttt{Th}\xspace_{{\mathcal G}[n]}(v) = T_{n}(v)$, for every $v \in V$. For every vertex $v$, let $T(v) = \lim_{n \to \infty} T_n(v)$. It is not hard to show that $T$ satisfies the average property and that $T(v) \geq \texttt{Th}\xspace_{\mathcal G}(v)$, for every $v \in V$. \end{proof} Let $T$ be a function that results from the fixed-point computation from the proof of Lem.~\ref{lem:reach-upper}. Since it satisfied the average property, we apply Lem.~\ref{lem:reach-lower} to show that Player~$2$\xspace wins from $v$ when Player~$1$\xspace's budget is $\predb{T(v)}$. We thus conclude the following. \begin{restatable}{theorem}{thm:frugal-reach} \label{thm:frugal-reach} Consider a frugal-reachability discrete-bidding game \({\mathcal G} = \zug{V, E, k, S, \texttt{fr}}\). Threshold budgets exist and satisfy the average property. Namely, there exists a function \(T: V \rightarrow [k] \cup \{k+1\}\) such that for every vertex $v \in V$ \begin{itemize} \item if Player~$1$\xspace's budget is $B \geq T(v)$, then Player~$1$\xspace wins the game, and \item if Player~$1$\xspace's budget is $B < T(v)$, then Player~$2$\xspace wins the game \end{itemize} Moreover, there is an exponential-time algorithm for finding such a $T$. \end{restatable} \section{A Fixed-Point Algorithm for Finding Threshold Budgets} In this section, we develop a fixed-point algorithm for finding threshold budgets in frugal-parity discrete-bidding games. As a corollary, we show, for the first time, that threshold budgets in parity discrete-bidding games satisfy the average property. \stam{ Before describing the algorithm we point to a key difference between parity continuous- and discrete-bidding games. \begin{example} \label{ex:parity} Consider the game ${\mathcal G}_2$ that is constructed from the game ${\mathcal G}_1$ that is depicted in Fig.~\ref{fig:avgbutnotthreshold} by adding an edge from $t$ to $v_0$. Suppose that $t$ has parity index $1$ and the other vertices have parity index $0$ (i.e., ${\mathcal G}_2$ is a B\"uchi game in which $t$ is the only accepting vertex). Under continuous-bidding, it was shown in \cite{AHC19} that in any strongly-connected game, and in particular ${\mathcal G}_2$, Player~$1$\xspace can force the game to visit any vertex infinitely often starting with any positive initial budget, no matter how small. Thus, the thresholds budgets in ${\mathcal G}_2$ are all $0$. This property is the main ingredient in a reduction from parity continuous-bidding games to reachability continuous-bidding games. On the other hand, under discrete bidding, when $k=5$ and the game starts at $v_0$, Player~$2$\xspace can prevent Player~$1$\xspace from ever reaching $t$, thus $\texttt{Th}\xspace_{{\mathcal G}_2}(v_0) \geq 5$. The structure of threshold budgets in parity discrete-bidding games was not previously understood. \end{example} } For the remainder of this section, fix a frugal-parity game ${\mathcal G} = \zug{V, E, k, p, S, \texttt{fr}}$. Denote the maximal parity index by $d \in \mathbb{N}$ and let $F_d = \set{v: p(v) = d}$. For a bidding game ${\mathcal G}$, instead of $\texttt{Th}\xspace_{\mathcal G}$, we sometimes use $\texttt{FrRe-Th}_{\mathcal G}$ and $\texttt{FrPa-Th}_{\mathcal G}$ to highlight that ${\mathcal G}$ is respectively a frugal-reachability and frugal-parity game. \paragraph*{A description of the algorithm} The algorithm recurses over the parity indices. The base case is when only one parity index is used. Then, ${\mathcal G}$ is a frugal-reachability game and we use the algorithm in Thm.~\ref{thm:frugal-reach}. \stam Indeed, if $p(v) = 1$, for every $v \in V$, we associate Player~$2$\xspace with the reachability player since an infinite play is winning for Player~$1$\xspace and the only way in which Player~$2$\xspace can win is by satisfying the frugal objective $\predb{k^* \ominus \texttt{fr}(s)}$ at a sink $s$. Alternatively, when $d=2$ is the minimal parity index, Player~$1$\xspace is associated with the reachability player. } For the induction step, suppose that $d > 1$. We describe the key idea. For ease of presentation, we assume that the maximal parity index $d$ is even and we describe the algorithm from Player~$1$\xspace's perspective. The definition for an odd $d$ is dual from Player~$2$\xspace's perspective. Since $d$ is even, in order for Player~$1$\xspace to win, it is necessary (but not sufficient) to visit $F_d$ only finitely often. We iteratively define and solve a sequence of frugal-parity games ${\mathcal G}_0,{\mathcal G}_1,\ldots$. For $i \geq 0$, the arena of ${\mathcal G}_i$ is obtained from ${\mathcal G}$ by setting $F_d$ to be sinks. The games differ in the frugal target in the ``new'' sinks $F_d$. We set the frugal target budgets in ${\mathcal G}_i$ so that, for every vertex $v$ that is not a sink, $\texttt{Th}\xspace_{{\mathcal G}_i}(v)$ is a necessary and sufficient initial budget for winning in ${\mathcal G}$ by visiting $F_d$ at most $i$ times. Since ${\mathcal G}_i$ has only $d-1$ parity indices, we solve it recursively. The definition of the frugal target budgets in ${\mathcal G}_0$ is immediate: since no visits to $F_d$ are allowed, simply set the frugal target budget to be $k+1$ in these vertices. Since the sum of budgets is $k$, a play that ends in $F_d$ in ${\mathcal G}_0$ is necessarily losing for Player~$1$\xspace, thus in order to win, he must satisfy the parity or frugal objective without visiting $F_d$. In order to define the frugal target budgets in ${\mathcal G}_1$, we first construct a frugal-reachability game from ${\mathcal G}$, which we denote ${\mathcal R}_0$. The sinks in ${\mathcal R}_0$ are $V \setminus F_d$. The frugal target budget at $u \in (V \setminus F_d)$ is defined to be $\texttt{fr}(u) = \texttt{Th}\xspace_{{\mathcal G}_0}(u)$. Thus, when the game starts at $v \in F_d$ with a Player~$1$\xspace budget of $\texttt{Th}\xspace_{{\mathcal R}_0}(v)$, Player~$1$\xspace can guarantee that the game eventually reaches $V \setminus F_d$ with a budget that suffices for winning in ${\mathcal G}$ without visiting $F_d$ again. We define the frugal target budgets in ${\mathcal G}_1$. For each $v \in F_d$ we define $\texttt{fr}(v) = \texttt{Th}\xspace_{{\mathcal R}_0}(v)$. Then, when ${\mathcal G}$ starts from $u \in (V \setminus F_d)$ with a Player~$1$\xspace budget of $\texttt{Th}\xspace_{{\mathcal G}_1}(u)$, Player~$1$\xspace plays as follows. He first follows a winning strategy in ${\mathcal G}_1$ to ensure either (1) the parity condition is satisfied, (2) an ``old'' sink $s \in S$ is reached with budget at least $\texttt{fr}(s)$, or (3) the game reaches $v \in F_d$ with a budget of at least $\texttt{Th}\xspace_{{\mathcal R}_0}(v)$. Cases (1)-(2) are winning in ${\mathcal G}$. In Case~(3), Player~$1$\xspace plays as described above to guarantee winning in ${\mathcal G}$ without visiting $F_d$ again. The construction of ${\mathcal R}_1, {\mathcal R}_2,\ldots$ and ${\mathcal G}_2, {\mathcal G}_3,\ldots$ follows the same idea. Formally, for $i \geq 0$, we define ${\mathcal G}_i = \zug{V \setminus F_d, E', p', S \cup F_d, \texttt{fr}_i}$, where $E'$ is obtained from $E$ by removing outgoing edges from vertices in $F_d$, i.e., $E'(v,u)$ iff $E(v,u)$ and $v \notin F_d$, the parity function $p'$ coincides with $p$ but is not defined over $F_d$, and $\texttt{fr}_i$ is defined below. Note that $p'$ assigns at most $d-1$ parity indices. The function $\texttt{fr}_i$ coincides with $\texttt{fr}$ on the ``old'' sinks; namely, $\texttt{fr}_i(s) = \texttt{fr}(s)$, for every $s \in S$. For the ``new'' sinks $F_d$, for $i \geq 0$, the definition $\texttt{fr}_i$ is inductive. Let $v \in F_d$. We define $\texttt{fr}_0(v) = k+1$, meaning that Player~$1$\xspace is not allowed to visit $F_d$ at all in ${\mathcal G}_0$. For $i \geq 1$, assume that $\texttt{fr}_i$ has been defined and we define $\texttt{fr}_{i+1}$ as follows. Since ${\mathcal G}_i$ has less parity indices than ${\mathcal G}$, we can recursively run the algorithm to obtain $\texttt{FrPa-Th}_{{\mathcal G}_i}(u)$, for each $u \in V \setminus F_d$. As we prove formally below, a budget of $\texttt{FrPa-Th}_{{\mathcal G}_i}(v)$ suffices for Player~$1$\xspace to win ${\mathcal G}$ while visiting $F_d$ only $i$ times. For $i \geq 0$, we construct a frugal-reachability game ${\mathcal R}_i = \zug{V, E'', V \setminus F_d, \texttt{FrPa-Th}_{{\mathcal G}_i}}$, where $E''$ is obtained from $E$ by removing outgoing edges from every vertex in $(V \setminus F_d)$. That is, in ${\mathcal R}_i$, the only vertices that are {\em not} sinks are the vertices in $F_d$, and in order to win in a sink $u \in (V \setminus F_d)$, Player~$1$\xspace's budget should be at least $\texttt{FrPa-Th}_{{\mathcal G}_i}(u)$. We can now define the the frugal target $\texttt{fr}_{i+1}$ of ${\mathcal G}_{i+1}$: for each $v \in F_d$, define $\texttt{fr}_{i+1}(v) = \texttt{FrRe-Th}_{{\mathcal R}_i}(v)$. \stam{ We construct ${\mathcal G}_{i+1}$ to allow $i+1$ visits to $F_d$. Intuitively, at the $(i+1)$-th visit to $F_d$, Player~$1$\xspace should have a budget that suffices to exit $F_d$ and reach any $v \in V'$ with a budget of at least $\texttt{FrPa-Th}_{{\mathcal G}_i}(v, k)$, since by induction hypothesis, this suffices to win the game while visiting $F_d$ only $i$ more times. The sufficient budget at $F_d$ is computed via a frugal-reachability game. For $i \geq 0$, we construct a frugal-reachability game ${\mathcal R}_i = \zug{V, E'', V \setminus F_d, \texttt{FrPa-Th}_{{\mathcal G}_i}}$, where $E''$ is obtained from $E$ by removing outgoing edges from every vertex in $(V \setminus F_d)$. That is, in ${\mathcal R}_i$, the only vertices that are not sinks are the vertices in $F_d$. We can now define the the frugal requirement $\texttt{fr}_{i+1}$ of ${\mathcal G}_{i+1}$. For each $u \in F_d$, we define $\texttt{fr}_{i+1}(u) = \texttt{FrRe-Th}_{{\mathcal R}_i}(u, k)$. } The algorithm is described Alg.~\ref{alg:Frugal-parity} for an even $d$ and from Player~$1$\xspace's perspective. \begin{algorithm} \caption{Frugal-Parity-Threshold$({\mathcal G})$} \label{alg:Frugal-parity} \begin{algorithmic} \If {${\mathcal G}$ uses one parity index} \State Return Frugal-Reachability-Threshold(${\mathcal G}$) \EndIf \State $\texttt{fr}_0(v) = k+1$, for $v \in F_d$ \For{$i=0,1,\ldots$} \State $\texttt{FrPa-Th}_{{\mathcal G}_i} \gets \text{Frugal-Parity-Threshold}({\mathcal G}_i)$ \State $\texttt{FrRe-Th}_{{\mathcal R}_i} \gets \text{Frugal-Reachability-Threshold}({\mathcal R}_i)$ \State For each $v \in F_d$, define $\texttt{fr}_{i+1}(v) = \texttt{FrRe-Th}_{{\mathcal R}_i}(v)$ \If {$\texttt{fr}_i(v) = \texttt{fr}_{i+1}(v)$, for all $v \in F_d$} \State Define $\texttt{FrPa-Th}_{{\mathcal G}}(v) = \texttt{fr}_i(v) \text{ for } v \in F_d$ \State Define $\texttt{FrPa-Th}_{{\mathcal G}}(u) = \texttt{FrRe-Th}_{{\mathcal G}_i}(u) \text{ for } u \in V \setminus F_d$. \State Return $\texttt{FrPa-Th}_{{\mathcal G}}$ \EndIf \EndFor \end{algorithmic} \end{algorithm} \paragraph*{Correctness} The intuition for the proof of the following lemma is described above, and we formally prove this below. \begin{restatable}{lemma}{parityupper} \label{lem:parity-upper} Let $d$ be the maximal parity index in ${\mathcal G}$. Define $j=1$ when $d$ is even and $j=2$ when $d$ is odd. For $i \geq 0$, let $\texttt{FrPa-Th}_{{\mathcal G}_i}$ be the threshold budget of Player~$j$\xspace in the game ${\mathcal G}_i$. Then, for $v \in V \setminus F_d$, a budget of $\texttt{FrPa-Th}_{{\mathcal G}_i}(v)$ suffices for Player~$j$\xspace to win ${\mathcal G}$ while visiting $F_d$ at most $i$ times. \end{restatable} \begin{proof} For ease of presentation we assume that $d$ is even, thus we take Player~$1$\xspace's perspective. The case where $d$ is odd is dual from Player~$2$\xspace's perspective. The proof is by induction. For the base case, recall that in ${\mathcal G}_0$, we define $\texttt{fr}_0(u) = k+1$, for $u \in F_d$. That is, if the game reaches $F_d$, Player~$1$\xspace necessarily loses. Thus, for $v \notin F_d$, a budget of $\texttt{FrPa-Th}_{{\mathcal G}_0}(v)$ suffices for satisfying the frugal-parity objective while avoiding $F_d$ completely. The arena of ${\mathcal G}$ and ${\mathcal G}_0$ coincide apart from the missing outgoing edges from $F_d$. But since Player~$1$\xspace's guarantees that $F_d$ is not visited at all, he can play in ${\mathcal G}$ according to his winning strategy in ${\mathcal G}_0$. For the induction step, assume that for $i \geq 1$ and $v \notin F_d$, a budget of $\texttt{FrPa-Th}_{{\mathcal G}_i}(v, k)$ suffices for Player~$1$\xspace to win in ${\mathcal G}$ while visiting $F_d$ at most $i$ times. Suppose the game starts at $v \notin F_d$ with a Player~$1$\xspace budget of at least $\texttt{FrRe-Th}_{{\mathcal G}_{i+1}}(v)$. We show that Player~$1$\xspace can win in ${\mathcal G}$ by visiting $F_d$ at most $i+1$ times. Player~$1$\xspace plays according to his winning strategy in ${\mathcal G}_{i+1}$. Suppose that Player~$2$\xspace plays according to some strategy and that the resulting play is $\pi$. If $\pi$ is infinite or ends in an ``old'' sink $S$, then $\pi$ is a play in ${\mathcal G}_{i+1}$ and since the strategy is winning for Player~$1$\xspace, $\pi$ is also winning in ${\mathcal G}$. Assume that $\pi$ ends in $v \in F_d$. Again, since Player~$1$\xspace's strategy is winning, his budget at $v$ is at least $\texttt{fr}_{i+1}(v) = \texttt{FrRe-Th}_{{\mathcal R}_i}(v)$. Player~$1$\xspace turns to play according to his winning strategy in ${\mathcal R}_i$. This strategy guarantees that when the game visits $u \notin F_d$, Player~$1$\xspace's budget is at least $\texttt{FrPa-Th}_{{\mathcal G}_i}(u, k)$, which by the induction hypothesis, suffices for winning ${\mathcal G}$ while visiting $F_d$ at most $i$ times. In total, such a play visits $F_d$ at most $i+1$ times. \end{proof} It follows from the following lemma that Alg.~\ref{alg:Frugal-parity} reaches a fixed point and terminates. \begin{restatable}{lemma}{monotone} \label{lem:monotone} For every $v \in F_d$ and $i \geq 0$, we have $\texttt{fr}_i(v) \geq \texttt{fr}_{i+1}(v)$. \end{restatable} \begin{proof} The proof is by induction. Consider $v \in F_d$. For the base case, $\texttt{fr}_0(v) = k+1$, which is the maximal possible target frugal-budget, thus necessarily $\texttt{fr}_1(v) \leq k+1$. For the induction step, suppose that for every $v \in F_d$, we have $\texttt{fr}_{i-1}(v) \geq \texttt{fr}_i(v)$, and we prove that $\texttt{fr}_i(v) \geq \texttt{fr}_{i+1}(v)$. Recall that for every $j \geq 0$, we construct the game ${\mathcal G}_j$ with the target frugal budget $\texttt{fr}_j$ and that this target is the only difference between ${\mathcal G}_j$ and ${\mathcal G}_{j+1}$. We claim that for every $u \in V \setminus F_d$, we have $\texttt{FrPa-Th}_{{\mathcal G}_{i-1}}(u) \geq \texttt{FrPa-Th}_{{\mathcal G}_i}(u)$. To show this, note that if a play is winning for Player~$1$\xspace in ${\mathcal G}_{i-1}$, it is also winning for Player~$1$\xspace in ${\mathcal G}_i$. Indeed, the claim is trivial for infinite plays and finite plays that end in $S$. As for finite plays that end in $v \in F_d$, if Player~$1$\xspace wins in ${\mathcal G}_{i-1}$, he necessarily wins in ${\mathcal G}_i$ since by the induction hypothesis $\texttt{fr}_{i-1}(v) \geq \texttt{fr}_i(v)$. Thus, in order to win in ${\mathcal G}_i$ from a vertex $u \in V \setminus F_d$ with a budget of $\texttt{FrPa-Th}_{{\mathcal G}_{i-1}}(u)$, Player~$1$\xspace can simply follow a winning strategy in ${\mathcal G}_{i-1}$. Thus, $\texttt{FrPa-Th}_{G_{i-1}}(u) \geq \texttt{FrPa-Th}_{{\mathcal G}_i}(u)$ for any $u \in V \setminus F_d$. Recall that for $v \in F_d$ and $j \geq 1$, we define $\texttt{fr}_j(v) = \texttt{FrRe-Th}_{{\mathcal R}_{j-1}}(v)$. Similar to the above, ${\mathcal R}_{j-1}$ and ${\mathcal R}_j$ differ only in their target frugal-budget. By the above, the frugal-target budgets in ${\mathcal R}_{i-1}$ (given by $\texttt{FrPa-Th}_{{\mathcal G}_{i-1}}$) are at least as high as in ${\mathcal R}_{i}$ (given by $\texttt{FrPa-Th}_{{\mathcal G}_i}$). Thus, a similar argument to the one used above shows that $\texttt{FrRe-Th}_{{\mathcal R}_{i-1}}(v) \geq \texttt{FrRe-Th}_{{\mathcal R}_i}(v)$, thus $\texttt{fr}_i(v) \geq \texttt{fr}_{i+1}(v)$, and we are done. \stam{ The main argument is that $\texttt{fr}_i(u)$ decreases as $i$ increases. We show that this implies that the thresholds also decrease in the non-sink vertices. That is, for $v \in V'$, we have $\texttt{FrPa-Th}_{{\mathcal G}_i}(v, k) \geq \texttt{FrPa-Th}_{{\mathcal G}_{i+1}}(v, k)$. We prove this formally by induction on $i$, where the induction involves both sequences of games ${\mathcal G}_0, {\mathcal G}_1, \ldots$ and ${\mathcal R}_0, {\mathcal R}_1, \ldots$. Note that in each ``old'' sink $s \in S$, the frugal requirement is constant, i.e., for every $i \geq 0$, we have $\texttt{fr}_i(s) = \texttt{fr}(s)$. Thus, we prove for the other vertices in the game. For the base case, we claim that for every $v \in V'$, we have $\texttt{FrPa-Th}_{{\mathcal G}_1}(v,k) \leq \texttt{FrPa-Th}_{{\mathcal G}_0}(v,k)$ and that for every $u \in F_d$, we have $\texttt{FrRe-Th}_{{\mathcal R}_1}(u,k) \leq \texttt{FrRe-Th}_{{\mathcal R}_0}(u,k)$. Let $u \in F_d$. Recall that we define $\texttt{fr}_0(u) = k+1$, namely the maximum possible budget. Thus, for every $u \in F_d$, we have $\texttt{fr}_0(u) \geq \texttt{fr}_1(u)$. We claim that if a play is winning for Player~$1$\xspace in ${\mathcal G}_0$, it is also winning for Player~$1$\xspace in ${\mathcal G}_1$. Indeed, the claim is trivial for infinite plays and finite plays that end in $S$. As for finite plays that end in $u \in F_d$, if Player~$1$\xspace wins in ${\mathcal G}_0$, he necessarily wins in ${\mathcal G}_1$ since $\texttt{fr}_0(u) \geq \texttt{fr}_1(u)$. Thus, in order to win ${\mathcal G}_1$ from a vertex $v \in V'$ with a budget of $\texttt{FrPa-Th}_{{\mathcal G}_0}(v,k)$, Player~$1$\xspace can simply follow a winning strategy in ${\mathcal G}_0$. This implies $\texttt{FrPa-Th}_{G_1}(v,k) \leq \texttt{FrPa-Th}_{{\mathcal G}_0}(v,k)$ for any $v \in V'$. Since $\texttt{FrPa-Th}_{G_1}$ and $\texttt{FrPa-Th}_{{\mathcal G}_0}$ are used to assign the frugal-budgets in the frugal-reachability games ${\mathcal R}_1$ and ${\mathcal R}_0$, and these two games too only differ in their frugal-budget assignments, a similar claim holds: Player~$1$\xspace can follow a winning strategy in ${\mathcal R}_0$ to win in ${\mathcal R}_1$ from any vertex in $F_d$. Consequently, $\texttt{FrRe-Th}_{{\mathcal R}_1}(u,k) \leq \texttt{FrRe-Th}_{{\mathcal R}_0}(u,k)$, for all $u \in F_d$. For the induction step, we assume that $\texttt{FrPa-Th}_{G_i}(v,k) \geq \texttt{FrPa-Th}_{G_{i+1}}(v,k)$, for all $v \in V'$, and $\texttt{FrRe-Th}_{{\mathcal R}_i}(u,k) \geq \texttt{FrRe-Th}_{{\mathcal R}_{i+1}}(u,k)$, for all $u \in F_d$. We now show the same for $i+1$. Since $\texttt{fr}_{i+1}(u) = \texttt{FrRe-Th}_{{\mathcal R}_i}(v)$ for all $i$, we have from the induction hypothesis, $\texttt{fr}_{i+1}(u) \geq \texttt{fr}_{i+2}(u)$. Again, ${\mathcal G}_{i+1}$ and ${\mathcal G}_{i+2}$ only differ in their frugal-budget assignments. Therefore, Player~$1$\xspace can follow a winning strategy from ${\mathcal G}_{i+1}$ in ${\mathcal G}_{i+2}$, from any vertex $v \in V'$ once he has budget more than $\texttt{FrPa-Th}_{G_{i+1}}(v,k)$, which essentially implies $\texttt{FrPa-Th}_{{\mathcal G}_{i+1}}(v,k) \geq \texttt{FrRe-Th}_{{\mathcal G}_{i+2}}(v,k)$. Consequently, the frugal budgets in ${\mathcal R}_{i+2}$ is less or equal to the corresponding frugal-budgets of ${\mathcal R}_{i+1}$, hence echoing the same argument, we have $\texttt{FrRe-Th}_{{\mathcal R}_{i+1}}(u,k) \geq \texttt{FrRe-Th}_{{\mathcal R}_{i+2}}(u,k)$ for all $u \in F_d$. } \end{proof} Next, we show that the budgets returned by Alg.~\ref{alg:Frugal-parity} are necessary for Player~$1$\xspace to win. \begin{restatable}{lemma}{paritylower} \label{lem:paritylower} Consider an output $T$ of Algorithm~\ref{alg:Frugal-parity} and let $u \in V \setminus F_d$. If Player~$1$\xspace's budget is $\predb{T(u)}$, then Player~$2$\xspace wins ${\mathcal G}$ from $v$. \end{restatable} \begin{proof} The proof is by induction on the number of parity indices in ${\mathcal G}$. When there is one parity index, ${\mathcal G}$ is a frugal-reachability game and the proof follows from Thm.~\ref{thm:frugal-reach}. For the induction step, let $i \geq 0$ be the index at which the algorithm reaches a fixed point. That is, for every $u \in V \setminus F_d$, we have $T(u) = \texttt{FrPa-Th}_{{\mathcal G}_i}(u)$. Since ${\mathcal G}_i$ is a game with less parity indices than ${\mathcal G}$, by the induction hypothesis, a budget of $\texttt{FrPa-Th}_{{\mathcal G}_i}(u)$ is necessary for Player~$1$\xspace to win from $u$ in ${\mathcal G}_i$. That is, if Player~$1$\xspace's budget is less than $\texttt{FrPa-Th}_{{\mathcal G}_i}(u)$, then Player~$2$\xspace has a strategy that guarantees that an infinite play satisfies Player~$2$\xspace's parity objective, and a finite play that ends in $v \in S \cup F_d$ violates Player~$1$\xspace's frugal objective $\texttt{fr}_i(v)$. We construct a winning Player~$2$\xspace strategy in ${\mathcal G}$. Player~$2$\xspace initially follows a winning strategy in ${\mathcal G}_i$. Assume that Player~$1$\xspace plays according to some strategy and let $\pi$ be the resulting play. If $\pi$ is infinite or ends in $S$, then $\pi$ is a play in ${\mathcal G}$ and is thus winning for Player~$2$\xspace in both games. Suppose that $\pi$ ends in $v \in F_d$. Player~$2$\xspace's strategy guarantees that Player~$1$\xspace's budget at $v$ is at most $\predb{\texttt{fr}_i(v)} = \predb{\texttt{FrRe-Th}_{{\mathcal R}_i}(v)}$. Suppose that Player~$2$\xspace follows a winning strategy from $v$ in ${\mathcal R}_i$, Player~$1$\xspace follows some strategy, and let $\pi'$ be the resulting play. Since Player~$2$\xspace's strategy is winning, there are two cases. First, $\pi'$ remains in $F_d$, thus $\pi'$ is a play in ${\mathcal G}$ that is winning for Player~$2$\xspace since $d$ is even. Second, $\pi'$ ends in a vertex $u' \in V \setminus F_d$ is reached with Player~$1$\xspace's budget at most $\predb{\texttt{FrPa-Th}_{{\mathcal G}_{i-1}}(u')}$. Note that since the algorithm terminates at a fixed point, we have $\texttt{FrPa-Th}_{{\mathcal G}_{i-1}}(u') = \texttt{FrPa-Th}_{{\mathcal G}_i}(u')$. Player~$2$\xspace switches to a winning strategy in ${\mathcal G}_i$ and repeats. Note that an infinite play in which Player~$2$\xspace alternates infinitely often between a winning strategy in ${\mathcal G}_i$ and a winning strategy in ${\mathcal R}_i$ necessarily visits $F_d$ infinitely often and is thus winning for Player~$2$\xspace in \({\mathcal G}\). \end{proof} We conclude with the following theorem. Proving that threshold budgets satisfy the average property is done by induction on the parity indices. \begin{theorem} \label{thm:frugal-parity} Given a frugal-parity discrete-bidding game ${\mathcal G}$, Alg.~\ref{alg:Frugal-parity} terminates and returns $\texttt{Th}\xspace_{\mathcal G}$. Moreover, $\texttt{Th}\xspace_{\mathcal G}$ satisfies the average property. \end{theorem} \stam In addition, we observe the following property of threshold budgets. \begin{restatable}{theorem}{parityaverage} \label{thm:parity-average} Threshold budgets in frugal-parity discrete-bidding games satisfy the average property. \end{restatable} \begin{proof} We prove by induction on the parity index. The base case is when for one parity index, then the game is a frugal-reachability game and the proof follows from Thm.~\ref{thm:exists-reach-thresh}. For the inductive step, let ${\mathcal G}$ be a frugal-parity game with $d$ parity indices. Observe the threshold budgets in the frugal-parity game ${\mathcal G}_i$ at which Algorithm~\ref{alg:Frugal-parity} reaches a fixed-point. By the induction hypothesis, $\texttt{FrPa-Th}_{{\mathcal G}_i}$ satisfies the average property. By Thm.~\ref{thm:frugal-parity}, for every $v \in V$, we have $\texttt{FrPa-Th}_{{\mathcal G}_i}(v) = \texttt{Th}\xspace_{\mathcal G}(v)$. For every $v \in F_d$, we have $\texttt{Th}\xspace_{{\mathcal R}_i}(v) = \texttt{Th}\xspace_{\mathcal G}(v)$, and the proof again follows from Thm.~\ref{thm:exists-reach-thresh}. \end{proof} \section{Finding threshold budgets is in \NP and co\NP} We consider the following decision problem. \begin{definition} \label{def:decision-threshold} {\bf Finding threshold budgets.} Given a bidding game ${\mathcal G} = \zug{V, E, k}$, a vertex $v \in V$, and $\ell \in [k]$, decide whether $\texttt{Th}\xspace_{\mathcal G}(v) \geq \ell$. \end{definition} Consider a frugal-parity discrete-bidding game ${\mathcal G}$ with vertices $V$ and consider a function \(T : V \rightarrow [k] \cup \{k+1\}\). We describe a polynomial-time algorithm to check whether \(T \equiv \texttt{Th}\xspace_{\mathcal G}\). Given such an algorithm, it is not hard to show that the problem of finding threshold budgets is in \NP and co\NP. Indeed, given ${\mathcal G}$, a vertex $v$, and $\ell \in [k]$, guess $T$ and verify, using the algorithm, that $T \equiv \texttt{Th}\xspace_{\mathcal G}$. Then, check whether $T(v) \geq \ell$, and answer accordingly. Our algorithm is based on a reduction to turn-based games. We first verify that $T$ satisfies the average property, and if it does not, we reject, following Thm.~\ref{thm:frugal-parity}. Next, we construct the partial strategy $f_T$ based on $T$ as in Sec.~\ref{sec:average-based-strat}. Recall that given a history that ends in $v$, the function $f_T$ prescribes a bid and a set $A(v) \subseteq V$ of allowed vertices for Player~$1$\xspace to choose from upon winning the bidding. A strategy $f'$ agrees with $f_T$ if it bids in the same manner and always chooses only allowed vertices. In order to verify whether $T$ is a correct guess, i.e., $T \equiv \texttt{Th}\xspace_{\mathcal G}$, we construct a parity turn-based game $G_{T, {\mathcal G}}$ in which a Player~$1$\xspace strategy corresponds to a strategy $f'$ that agrees with $f$ in ${\mathcal G}$ and a Player~$2$\xspace strategy corresponds to a response to $f'$ in ${\mathcal G}$. We show that the procedure is sound and complete; namely, if Player~$1$\xspace wins in $G_{T, {\mathcal G}}$, he wins in ${\mathcal G}$ (hence \(T \geq \texttt{Th}\xspace_{\mathcal G}\)), and if $T \geq \texttt{Th}\xspace_{\mathcal G}$, then Player~$1$\xspace wins in $G_{T, {\mathcal G}}$. Finally, in order to verify that $T \leq \texttt{Th}\xspace_{\mathcal G}$, we apply the same procedure from Player~$2$\xspace's perspective. \subsection{From bidding games to turn-based games} Consider a function \(T\) that satisfies the average property, and let \(f_T\) be the partial strategy as constructed in Sec.~\ref{sec:average-based-strat}. We construct a parity turn-based game $G_{T, {\mathcal G}}$ such that if Player~$1$\xspace wins in every vertex in $G_{T, {\mathcal G}}$, then $T \geq \texttt{Th}\xspace_{\mathcal G}$. Intuitively, $G_{T, {\mathcal G}}$ simulates ${\mathcal G}$. In each turn, Player~$1$\xspace's bid is determined according to $f_T$. Suppose that Player~$1$\xspace bids $b$. Player~$2$\xspace's actions in $G_{T, {\mathcal G}}$ represent responses to $b$. Namely, Player~$2$\xspace can choose between winning the bidding by bidding $\succb{b}$ and in addition choosing the successor vertex in ${\mathcal G}$, or losing the bidding by bidding $0$ and letting Player~$1$\xspace decide how the game proceeds. A key challenge is keeping the size of $G_{T, {\mathcal G}}$ polynomial in the size of ${\mathcal G}$. Consider a history that ends in a configuration $\zug{v, B}$, for $B \geq T(v)$. Recall that $f_T$ can prescribe one of two possible bids: the bid that $f_T$ prescribes at $\zug{v, B}$ coincides either with the bid that it prescribes in $\zug{v, T(v)}$ or $\zug{v, \succb{T(v)}}$, depending on which of the two agrees with $B$ on which player has the advantage. We obtain a polynomial-sized arena by representing every configuration $\zug{v, B}$, for $B > \succb{T(v)}$, with a vertex $\zug{v, \top}$. \begin{figure}[ht] \captionsetup{justification=centering} \begin{subfigure}{0.5\linewidth} \captionsetup{justification=centering} \begin{tikzpicture}[xscale=0.8] \colorlet{grayn}{black!50!white} \draw (0,0) node[rond5] (m1) {}; \draw (-1.5,-1.5) node[rond5] (m2) {}; \draw (1.5,-1.5) node[rond5] (m3) {}; \draw (-3,-3.5) node[rond5] (m4) {}; \draw (-.5, -2.8) node[rond5] (m5) {}; \draw (2,-3.5) node[rond5] (t) {}; \draw (0,0.5) node (lab1) {\(\zug{v_0, 4}\)}; \draw (-2.5,-1.5) node (lab2) {\(\zug{v_1, 4}\)}; \draw (2.5,-1.3) node (lab3) {\(\zug{v_0, 4^*}\)}; \draw (-4,-3.5) node (lab4) {\(\zug{v_2, 3}\)}; \draw (-1.5, -2.8) node (lab5) {\(\zug{v_0, \top}\)}; \draw (2.7, -3.8) node (labt) {\(\zug{t, 2}\)}; \draw[-latex'] (m1)--(m2) node[sloped, above, midway, grayn] {\((0,0)\)}; \draw[-latex'] (m2)--(m4) node[sloped, above, midway, grayn] {\((1,0)\)}; \draw[-latex'] (m2)--(m5) node[sloped, above, midway, grayn] {\((1,1^*)\)}; \draw[-latex'] (m1)--(m3) node[sloped, above, midway, grayn] {\((0,0^*)\)}; \draw (m4) edge[->, bend right = 33] node[sloped, below, pos = 0.7, grayn] {\((1,1^*)\)} (m3) ; \draw[-latex'] (m3)--(m2) node[sloped, above, midway, grayn] {\((0^*,0)\)}; \draw[-latex'] (m3)--(m5) node[sloped, above, midway, grayn] {\((0^*,1)\)}; \draw[-latex'] (m4) -- (t) node[sloped, below, midway, grayn] {\((1,0)\)}; \draw[-latex'] (t) to [out= 250, in = 290, looseness = 10] (t); \end{tikzpicture} \centering \caption{Corresponding to \(T_1\)}\label{fig:turn-based-T1} \end{subfigure}\hfill \begin{subfigure}{0.5\textwidth} \captionsetup{justification=centering} \begin{tikzpicture}[xscale=0.8] \colorlet{grayn}{black!50!white} \draw (0,0) node[rond5] (n1) {}; \draw (-1.5, -1.5) node[rond5] (n2) {}; \draw (1.5,-1.5) node[rond5] (n3) {}; \draw (-3,-3.5) node[rond5] (n4) {}; \draw (-.5, -3) node[rond5] (n5) {}; \draw (2.5,-3) node[rond5] (n6) {}; \draw (1,-3.5) node[rond5] (t) {}; \draw (0,0.5) node (lab1) {\(\zug{v_0, 5}\)}; \draw (-2.5,-1.5) node (lab2) {\(\zug{v_1, 5}\)}; \draw (2.5,-1.5) node (lab3) {\(\zug{v_0, 5^*}\)}; \draw (-4,-3.5) node (lab4) {\(\zug{v_2, 4}\)}; \draw (0.5,-3) node (lab5) {\(\zug{v_1, 4^*}\)}; \draw (3.4, -3.4) node (lab6) {\(\zug{v_2, 3^*}\)}; \draw (.3, -3.9) node (labt) {\(\zug{t, 2}\)}; \draw[-latex'] (n1) -- (n2) node[sloped, above, midway, grayn] {$(0,0)$}; \draw[-latex'] (n1) -- (n3) node[sloped, above, midway, grayn] {$(0,0^*)$}; \draw[-latex'] (n2) -- (n4) node[sloped, above, midway, grayn] {$(1,0)$}; \draw[-latex'] (n3) -- (n2) node[sloped, above, midway, grayn] {$(0^*,0)$}; \draw[-latex'] (n4) -- (t) node[sloped, below, midway, grayn] {$(2,0)$}; \draw[-latex'] (n5) --(n4) node[sloped, above, midway, grayn] {\((0^*,0)\)}; \draw[-latex'] (n5) --(n3) node[sloped, above, midway, grayn] {\((0^*,1)\)}; \draw (n6) edge[->, bend right = 35] node[sloped, below, midway, grayn] {\((1^*,2)\)} (n3); \draw[-latex'] (n6) --(t) node[sloped, below, midway, grayn] {\((1^*,0)\)}; \draw[-latex'] (t) to [out= 250, in = 290, looseness = 10] (t); \end{tikzpicture} \caption{Corresponding to \(T_2\)}\label{fig:turn-based-T2} \end{subfigure} \caption{Turn-based games corresponding to \(G_1\) and two different guesses} \label{fig:turn-based} \end{figure} \begin{example} We apply the construction to the frugal-reachability discrete-bidding game \({\mathcal G}_1\) depicted in Fig.~\ref{fig:avgbutnotthreshold}. We use the two functions \(T_1, T_2: V \rightarrow V \rightarrow [k] \cup \{k+1\}\) that are specified in the figure, both of which satisfy the average property and correspond to the vectors \(T_1 = \zug{4,3^*, 3, 2}\) and \(T_2 = \zug{5,4^*, 3^*, 2}\). The turn-based game \(G_{T_1, {\mathcal G}_1}\) is depicted in Fig.~\ref{fig:turn-based-T1} and \(G_{T_2, {\mathcal G}_1}\) in~Fig. \ref{fig:turn-based-T2}. In these two games, the allowed actions given by $f_{T_1}$ and $f_{T_2}$ from each vertex are singletons. Thus, Player~$1$\xspace has no choice of successor vertex when winning a bidding, and so we omit Player~$1$\xspace vertices from the figure. That is, all vertices are controlled by Player~$2$\xspace. Since the games are reachability games, we omit the parity indices from the vertices. Player~$1$\xspace's goal in both games is to reach a sink. We label each edge with the bids of the two players that it represents. Each vertex $c$ has two outgoing edges labeled by $\zug{b_1, 0}$ and $\zug{b_1, \succb{b_1}}$, where $b_1$ is the bid that $f_{T_1}$ or $f_{T_2}$ prescribes at $c$. There are exceptions like $\zug{v_1, 5}$ in $G_{T_2, {\mathcal G}_1}$ where $b_1 = 1$ and Player~$2$\xspace cannot bid $\succb{b_1} = 1^*$ since it exceeds her available budget when $k=5$. Note that in \(G_{T_1, {\mathcal G}_1}\) has a cycle. Thus, Player~$1$\xspace does not win from every vertex and $T_1$ does not coincide with the threshold budgets. On the other hand, \(G_{T_2, {\mathcal G}_1}\) is a DAG. Thus, no matter how Player~$2$\xspace plays, Player~$1$\xspace wins from all vertices, which means that \(T_2 \equiv \texttt{Th}\xspace_{{\mathcal G}_1}\). \end{example} Formally, we define $G_{T, {\mathcal G}} = \zug{V_1, V_2, E, \gamma}$, where for $i \in \set{1,2}$, the vertices $V_i$ are controlled by Player~$i$\xspace, $E \subseteq (V_1 \cup V_2) \times (V_1 \cup V_2)$ is a collection of edges, and \(\gamma: V_1 \cup V_2 \rightarrow \{1,2,, \ldots d\}\) assigns parity indices to the vertices. The vertices of $G_{T, {\mathcal G}}$ are $V_2 = \{\zug{v,T(v)}, \zug{v, \succb{T(v)}}, \zug{v, \top}: v \in (V \cup S)\}$ and $V_1 = \set{w^1: w = \zug{v, B} \in V_2, B \neq \top}$. We define the edges in $G_{T, {\mathcal G}}$. The sinks in $G_{T, {\mathcal G}}$ are of the form $\zug{s, B}$, for $s \in S$, or $\zug{v, \top}$, for $v \in V$. Sinks have self loops. We describe the other edges. Let $w = \zug{v, B} \in V_2$, where $B \neq \top$ and $v \notin S$. Intuitively, reaching $w$ in $G_{T, {\mathcal G}}$ means that ${\mathcal G}$ is in configuration $\zug{v, B_1}$, where $B_1 \geq B$ and they agree on which player has the advantage. Thus, $f_T$ bids $b^T(v,B)$. Outgoing edges from $w$ model Player~$2$\xspace's two options. First, Player~$2$\xspace can choose to win the bidding by bidding $\succb{b^T(v,B)}$ (any higher bid is wasteful on her part) and moving the token to $u \in N(v)$. The next configuration is intuitively $\zug{u, B'}$, where $B' = B \oplus \succb{b^T(v,B)}$. If $T(u) \leq B' \leq \succb{T(u)}$, then $\zug{u, B'} \in V_2$ and we define $E(\zug{v, B}, \zug{u, B'})$. Otherwise, we truncate Player~$1$\xspace budget by defining $E(\zug{v, B}, \zug{u, \top})$. We disallow transitions in which Player~$2$\xspace's bid exceeds her available budget, i.e., when $\succb{b^T(v,B)} > k^* \ominus B$. Second, Player~$2$\xspace can choose to move to $w^1$ modeling Player~$2$\xspace allowing Player~$1$\xspace to win the bidding, e.g., by bidding~$0$. In this case, Player~$1$\xspace's budget is updated to $B' = B \ominus b^T(v,B)$ and he moves the token to some vertex in $A(u)$. Thus, the neighbors of $w^1$ are $\zug{u, B'}$, for $u \in A(v)$. By the proof of Corollary~\ref{cor:invariant}, $B' \in \set{T(u), \succb{T(u)}}$, thus $\zug{u, B'} \in V_2$. Note that all paths in \(G_{T, {\mathcal G}}\) are infinite. Finally, we define the parity indices. A non-sink vertex in $G_{T, {\mathcal G}}$ ``inherits'' its parity index from the vertex in ${\mathcal G}$; namely, for \(w = \zug{v,B} \in V_2\), we define $\gamma(w) = \gamma(w^1) = p(v)$. We define $\gamma$ so that Player~$1$\xspace wins in sinks, thus we set the parity index of a sink to be odd. \stam{ Player~$1$\xspace's parity objective in \(G_{T, {\mathcal G}}\) intuitively corresponds to winning the game by either (1) satisfying the parity condition, (2) satisfying the frugal objective at a sink in $S$, or (3) accumulating a budget of at least \(\succb{\succb{T(u)}}\) at a vertex \(u\). } \stam{ We verify whether Player~$1$\xspace wins from every vertex of \(G_{T, {\mathcal G}}\). If he does, Lemma \ref{lemma:TBparity-iff-thresh} asserts that Player~$1$\xspace wins from any \(v\) of \(V\) with budget \(T(v)\), meaning \(T(v) \geq \texttt{Th}\xspace_{\mathcal G}(v)\) for all vertex \(v \in V\). Lemma } \subsection{Correctness} In this section, we prove soundness and completeness of the approach. We start with soundness. \begin{restatable}{lemma}{TBparityiffthresh} \label{lemma:TBparity-iff-thresh} If Player~$1$\xspace wins from every vertex in $G_{T, {\mathcal G}}$, then $T \geq \texttt{Th}\xspace_{\mathcal G}$. \end{restatable} \begin{proof} Suppose that Player~$1$\xspace wins from every vertex of \(G_{T, {\mathcal G}}\), we need to show that \(T \geq \texttt{Th}\xspace_{{\mathcal G}}\). Let \(f'\) be the Player~$1$\xspace's memoryless winning strategy in \(G_{T, {\mathcal G}}\). We construct a strategy \(f^*\) in \(G\) based on this \(f'\) and \(f_T\), by which Player~$1$\xspace wins in \({\mathcal G}\) whenever he applies it from a configuration \(\zug{v, B_1}\) of \({\mathcal G}\), where \(B_1 \geq T(v)\). Intuitively, this \(f^*\) is a strategy which {\em agrees} with the partial strategy \(f_T\), and \(f'\) determines the choices that \(f^*\) would make. We know \(B_1\) matches in advantage status either with \(T(v)\), or with \(\succb{T(v)}\). Accordingly we consider the vertex \(\zug{v, T(v)}\) (or, symmetrically \(\zug{v, \succb{T(v)}}\)) in \(G_{T, {\mathcal G}}\). We call that vertex of \(G_{T, \calG}\) as \(\zug{v, B}\) (i.e, \(B\) is either \(T(v)\) or \(\succb{T(v)}\)). Intuitively, strategy \(f'\) can be thought of as keeping aside budget \(B_1 \ominus B\), and using only the rest in the game subsequently. We now define \(f^*\) in the following. We first let \(f^*\) bid \(b_T(v, B_1)\) from configuration \(\zug{v, B_1}\), and whatever Player~$2$\xspace bids in response, we simulate that in \(G_{T, {\mathcal G}}\) to determine where to move the token, if there is an opportunity. To show the simulation, we consider an arbitrary Player~$2$\xspace's strategy \(g^*\) in \(G\), and suppose \(g\) denotes the strategy simulating \(g^*\) in \(G_{T, {\mathcal G}}\). If Player~$2$\xspace loses the bid at \(\zug{v, B_1}\) in \({\mathcal G}\), Player~$1$\xspace chooses the vertex what \(f'\) does from \(w^1 \in V_1\), where \(w = \zug{v, B} \in V_2\). If Player~$2$\xspace wins the bid at \(\zug{v, B_1}\) in \({\mathcal G}\) and \(g^*\) moves the token to configuration \(\zug{v', B_1'}\), we simulate the move in \(G_{T, {\mathcal G}}\) by moving the corresponding token in the turn-based game to \(\zug{v', B \oplus \succb{b(v, B_1)}}\), and continue. It can be noted that when the simulation reaches a vertex \(\zug{v', \top}\) of \(G_{T, {\mathcal G}}\) with \(v' \not\in S\), by definition, the game starts over from either \(\zug{v', T_{v'}}\) or \(\zug{v', \succb{T_{v'}}}\), depending on what the current budget is at \(G\). Thus, we are interested in paths of \(G_{T, {\mathcal G}}\) that are, in reality, concatenation of truncated finite plays, possibly followed by an infinite play. We refer these paths as plays of \(G_{T, {\mathcal G}}\). Now, consider \(\text{play}\xspace(\zug{v, B_1}, f^*, g^*)\). By the above simulation, its corresponding play, denoted by \(\text{play}\xspace(\zug{v, B}, f', g)\), in \(G_{T, {\mathcal G}}\) would be concatenation of plays consisting of either plays of the form \(\zug{v, B} \ldots \zug{s, B_s}\) (where, \(B_s \in \{T_s, \succb{T_s}, \top\}\)) for \(s \in S\), or \(\zug{v, B}, \ldots, \zug{u, \top}\) for some \(u \in V\), or infinite plays in \(G_{T, {\mathcal G}}\). Because \(f^*\) agrees with \(f\), from Lemma~\ref{cor:invariant}, we know Player~$1$\xspace must have budget at least \(T_s\) when \(G\) reaches some \(\zug{s, B_s, k^* \ominus B_s}\), and that is type of configuration where a finite play in \(G\) ends. Therefore, \(f^*\) is winning for all finite plays generated by it. So we assume \(\text{play}\xspace(\zug{v, B_1}, f^*, g^*)\) to be infinite. We next claim that \(\text{play}\xspace(\zug{v, B}, f', g)\) cannot be an infinite concatenation of finite plays of \(G_{T, {\mathcal G}}\), which are of the form \(\zug{v, B} \ldots \zug{u, \top} \cdot \zug{u, B_u} \ldots \zug{w, \top} \cdot \ldots \). Recall that simulating the game from \(\zug{v, B}\) in \(G_{T, {\mathcal G}}\), which actually starts from a configuration \(\zug{v, B_1}\) in \({\mathcal G}\), intuitively means Player~$1$\xspace puts aside a ``spare budget'' of \(B_1 \ominus B\), and keeps only \(B\) (which is either \(T(v)\) or \(\succb{T(v)}\)) ``at play''. Now, \(G_{T, {\mathcal G}}\) reaches a vertex \(\zug{u, \top}\) implies Player~$1$\xspace's this ``at play'' budget \(B'\) is at least \(\succb{\succb{T(u)}}\), by definition. However, from the next step, the simulation starts with ``at play'' budget \(T(u)\) or \(\succb{T(u)}\), depending on which one matches with \(B'\) in advantage status. Therefore, at least one unit of budget gets added to the ``spare budget'' account. Because the budget is upper bounded by \(k^*\), infinite concatenation of such finite plays is not possible. That means eventually simulation of a suffix \(\pi\) of an infinite play \(\text{play}\xspace(\zug{v, B_1}, f^*, g^*)\), would look like \(\tau = t_0 t_1 \ldots \), where either \(t_j = \zug{u_j, B_{u_j}}\) for some \(u_j \in V\) and \(B_{u_j} \in \{T_{u_j}, \succb{T_{u_j}}\}\), or \(t_{j+1} = t_j^1\) for all \(j \geq 0\). Moreover, assuming \(\projec{\pi}\) and \(\projec{\tau}\) denotes projection of the plays in \(V\), we have \(\inf(\projec{\pi}) = \inf(\projec{\tau})\). By assumption \(f'\) is winning strategy, thus Player~$1$\xspace wins in \({\mathcal G}\) by \(f^*\). \end{proof} \begin{corollary} In the proof of Lem.~\ref{lemma:TBparity-iff-thresh}, we construct a winning Player~$1$\xspace strategy $f^*$. Note that $f^*$ only keeps track of a vertex in $G_{T, {\mathcal G}}$. Thus, its memory size equals the size of $G_{T, {\mathcal G}}$, which is linear in the size of ${\mathcal G}$. This is significantly smaller than previously known constructions in parity and reachability bidding games, where the strategy size is polynomial in $k$, and is thus exponential when $k$ is given in binary. \end{corollary} The following lemma shows completeness; namely, that a correct guess of $T$ implies that Player~$1$\xspace wins from every vertex in $G_{T, {\mathcal G}}$. \begin{restatable}{lemma}{thresholdpassesthetest} \label{lemma:thresholdpassesthetest} If \(T \equiv \texttt{Th}\xspace_{\mathcal G}\), then Player~$1$\xspace wins from every vertex in \(G_{T, {\mathcal G}}\). \end{restatable} \begin{proof} Assume towards contradiction that $T \equiv \texttt{FrPa-Th}$ and there is \(\zug{v,B} \in V_2\) of \(G_{T, {\mathcal G}}\) that is losing for Player~$1$\xspace. Since \(T(v) \leq B\), Player~$1$\xspace has a winning strategy \(f^*\) in \({\mathcal G}\) starting from \(\zug{v, B}\). On the other hand, let \(g\) be a memoryless winning strategy for Player~$2$\xspace in \(G_{T, {\mathcal G}}\) starting from \(\zug{v, B}\). Now, $f^*$ is a Player~$1$\xspace winning strategy means at each step, he can reveal his bid and choice of next vertex first, and however Player~$2$\xspace responds to that, he must have a way to eventually win the game ${\mathcal G}$. On the contrary, we describe a Player~$2$\xspace strategy $g^*$ in ${\mathcal G}$ in the following, which chooses a bid in response to Player~$1$\xspace's revelation, and is able to make $f^*$ fail. Existence of such a Player~$2$\xspace strategy implies $f^*$ is not indeed a Player~$1$\xspace winning strategy, which is a contradiction to our assumption! Intuitively, we try to simulate \(f^*\) in \(G_{T, {\mathcal G}}\), observe how Player~$2$\xspace responds to that in \(G_{T, {\mathcal G}}\) by \(g\), and simulate back that response in \(G\), by referring it as \(g^*\). Next, we formally define $g^*$ inductively. In order to show that \(f^*\) fails to be a winning strategy, it is enough to show that it fails from some configuration. In particular, here we show that it fails from \(\zug{v, B}\), and thus we will be defining \(g^*\) only from that configuration. Assume that we have defined $g^*$ for plays of length $n \geq 1$. Consider a prefix $\ell = \ell_0, \ell_1,\ldots,\ell_{n-1}$ of length $n$ of $play(\zug{v, B}, f^*, g^*)$, where $\ell_i = \zug{v_i, B_i}$, for $i \geq 0$. Now, suppose \(f^*\) bids \(b^T(v_{n-1}, B_{n-1})\) at \(\ell\). By construction, \(G_{T, {\mathcal G}}\) captures Player~$2$\xspace's reaction to when Player~$1$\xspace bids exactly \(b(v_i, B_i)\). In this scenario, if Player~$2$\xspace chooses \(w_{n-1}^1\) from \(w_{n-1} = \zug{v_{n-1}, B_{n-1}}\) by \(g\) in \(G_{T, {\mathcal G}}\), then \(g^*\) bids \(0\) in \({\mathcal G}\). Otherwise, if she chooses a vertex of the form \(\zug{v_{n}, B_n}\), where \(B_n \in \{T_{v_n}, \succb{T_{v_n}}, \top\}\), then \(g^*\) bids \(\succb{b^T(v_{n-1}, B_{n-1})}\). We now proceed to define $g^*$ in case $f^*$ does not bid \(b^T(v_{n-1}, B_{n-1})\) at \(\ell\). Suppose Player~$1$\xspace bids \(c_n\) at \(\ell\). First we consider, \(c_n > b^T(v_{n-1}, B_{n-1})\). If \(B_{n-1} \ominus c_n < T(v_{n-1}^-)\), which will be definitely be the case if \(c_n > \succb{b^T(v_{n-1}, B_{n-2})}\), then Player~$2$\xspace bids \(0\). Intuitively, this means Player~$2$\xspace recognises that Player~$1$\xspace has wasted at least one unit of budget, and gained that extra budget herself by losing the current bid. Otherwise, she continues playing \(g\). On the other hand, if $c_n < b^T(v_{n-1}, B_{n-1})$, Player~$2$\xspace bids $c_n$ itself if Player~$1$\xspace holds the advantage, otherwise she bids $\succb{c_n}$. Here, Player~$2$\xspace recognises a good opportunity to win the bidding with minimum possible bid. She wins the bidding and proceeds to a vertex \(u\) with \(T(u) = T(v^{+})\). Recall \(f_T\) is the partial strategy (defined in Section \ref{sec:average-based-strat}) associated with \(T\), and for any vertex \(v \in V_1\) in \(G_{T, {\mathcal G}}\), there is an edge from \(v\) to \(w\) for all the allowed vertices \(w\) that Player~$1$\xspace could choose after winning the bid at \(v\), by following \(f_T\). Here, we argue that no matter how \(f^*\) behaves compared to a strategy \textit{agreeing} with \(f_T\), Player~$2$\xspace still wins against \(f^*\), resulting the required contradiction. As we discussed above, at each \(n\), there are exactly three types of possibilities on how \(f^*\) could behave - \begin{itemize} \item \(f^*\) bids \(b^T(v_{n-1}, B_{n-1})\), and chooses some \(u\) with \(T(u) = T(v_{n-1}^-)\), or \(T(u) \leq T(v_{n-1}^-) \oplus 0^*\) in case \(T(v_{n-1}^-) \in \mathbb{N}^* \setminus \mathbb{N}\) \item \(f^*\) bids as above yet chooses a vertex \(u\) such that either \(T(u) > T(v_{n-1}^-) \oplus 0^*\), or he chooses \(u\) with \(T(u) = T(v_{n-1}^-) \oplus 0^*\) when \(T(v_{n-1}^-) \in \mathbb{N}\). \item \(f^*\) does not bid \(b^T(v_{n-1}, B_{n-1})\) at all. \end{itemize} Intuitively, we show in each of these cases, that either the game \({\mathcal G}\) gets simulated in \(G_{T, {\mathcal G}}\) and in that case Player~$1$\xspace cannot win because \(g\) is a Player~$2$\xspace winning strategy there, or the simulation breaks somewhere and at the same step \({\mathcal G}\) reaches a vertex \(u\) with Player~$1$\xspace's budget strictly less than \(T(u)\). Because by hypothesis, \(T \equiv \texttt{Th}\xspace_{{\mathcal G}}\), upon reaching such vertex, Player~$2$\xspace can play her frugal-parity winning strategy from \({\mathcal G}\) itself against \(f^*\). In both cases, \(f^*\) fails to make Player~$1$\xspace the winner in \(G\), which is a contradiction to our assumption that \(f^*\) is a Player~$1$\xspace wining strategy in \(G\). Now, the detailed arguments are as follows: \begin{claim}\label{claim:follows} As long as $f^*$ agrees with $f_T$ (the partial strategy associated with \(G_{T, {\mathcal G}}\)), Player~$1$\xspace cannot win in ${\mathcal G}$. \end{claim} \begin{proof} Because \(g\) is a winning strategy for Player~$2$\xspace in \(G_{T, {\mathcal G}}\). For any Player~$1$\xspace strategy in \(f'\) in \(G_{T, {\mathcal G}}\), \(\text{play}\xspace(\zug{v, B}, f', g)\) is infinite, and of the form \(\tau = \zug{v, B}, \zug{v_1, B_1}, \ldots \) satisfying \(B_j \in \{T_{v_j}, \succb{T_{v_j}}\}\) for all \(j\), and the maximum parity index in \(\inf(\projec{\tau})\) is odd. By assumption \(f^*\) agrees with \(f_T\), hence the projection of \(\text{play}\xspace(\zug{v, B}, f^*, g^*)\) on \(V\) coincides with that of \(\text{play}\xspace(\zug{v, B}, f', g)\) for some Player~$1$\xspace strategy \(f'\) in \(G_{T, {\mathcal G}}\). Therefore, Player~$1$\xspace cannot win in \({\mathcal G}\) with \(f^*\) in this case. \end{proof} \begin{claim} If \(f^*\) bids according to \(f_{T}\), but chooses some vertex that are not in the set of \textit{allowed vertices}, then too Player~$1$\xspace cannot win in \(G\). \end{claim} \begin{proof} Suppose \(n\) is the very first step where \(f^*\) chooses a vertex different from the set of allowed vertices proposed by \(f_T\). From Claim~\ref{claim: resultonT} and the construction of \(A(v_n)\), we can see that only the allowed vertices \(u\) are the ones where \(B_{n-1} \ominus b^T(v_{n-1}, B_{n-1}) \geq T(u)\). Therefore, Player~$1$\xspace chooses a \(v'\) satisfying \(T(v') > B_{n-1} \ominus b^T(v_{n-1}, B_{n-1})\), and his budget at \(v'\) is indeed \(B_{n-1} \ominus b^T(v_{n-1}, B_{n-1})\) by this move. Because, \(T \equiv \texttt{Th}\xspace_{{\mathcal G}}\) by assumption, Player~$2$\xspace has a winning strategy from \(v'\) in \({\mathcal G}\) when this happens, and \(g^*\) will play that. This makes \(f^*\) fail to become a Player~$1$\xspace's winning strategy. \end{proof} \begin{claim} If \(f^*\) diverges from \(f_T\) in bidding itself, then also Player~$1$\xspace cannot win. \end{claim} \begin{proof} We assume Player~$1$\xspace bids \(c_n \neq b^T(v_{n-1}, B_{n-1})\). Suppose Player~$1$\xspace bids \(c_n > \succb{b^T(v_{n-1}, B_{n-1})}\), then from Claim~\ref{claim: resultonT}, we know \(B_{n-1} \ominus c_n < B_{n-1} - \succb{b^T(v_{n-1}, B_{n-1})} \leq T(v_{n-1}^-) \leq T(u)\) for any \(u \in N(v_{n-1})\). Therefore, whatever vertex \(u\) of \(N(v_{n-1})\) he chooses, Player~$2$\xspace can play her winning strategy from \(u\) itself because \(T \equiv \texttt{Th}\xspace_{{\mathcal G}}\) by assumption. We claim that bidding \(c_n = \succb{b^T(v_{n-1}, B_{n-1})}\) will not make Player~$1$\xspace's life any different than when he bids just \(b^T(v_{n-1}, B_{n-1})\), even if \(B_{n-1} \ominus c_{n-1} = T(v_{n-1}^-)\), which is the necessary condition for \(c_n\) to be a safe bid. This is because he can bid \(c_n\) with the safety of \(B_{n-1} \ominus c_{n-1} = T(v_{n-1}^-)\) only when \(T(v_{n-1}^-)\) is in \(\mathbb{N}^* \setminus \mathbb{N}\) (according to Claim~\ref{claim: resultonT}), and \(B_{n-1}\) holds the advantage. But if he bids this \(c_n\) instead of \(b^T(v_{n-1}, B_{n-1})\), his {\em safe} choices (where his budget will still be at least as much as the \(T\)-value) shrink from \(\set{u \in N(v_{n-1}: T(u) \leq \succb{T(v_{n-1}^-)}}\) to only the minimum neighbours of \(T(v_{n-1})\). Moreover, by increasing his bid by \(0^*\), he does not actually increase his chance of winning because Player~$2$\xspace can still win by only bidding \(\succb{b^T(v_{n-1}, B_{n-1})}\). Therefore, Player~$2$\xspace's strategy \(g^*\) can keep following \(g\) from \(G_{T, {\mathcal G}}\), even if \(f^*\) does not following \(f\) in this step, and the the projection of the resultant play on \(V\) still matches with that of a Player~$2$\xspace's winning play in \(G_{T, {\mathcal G}}\). Finally, if \(c_n < b^T(v_{n-1}, B_{n-1})\), and Player~$1$\xspace holds the advantage (i.e, Player~$2$\xspace bids only \(c_n\)), then Player~$1$\xspace's budget becomes \(B_{n-1} \oplus c_n < B_{n-1} \oplus b^T(v_{n-1}, B_{n-1}) < B_{n-1} \oplus \succb{b^T(v_{n-1}, B_{n-1})} = |T(v_{n-1}^+)|^*\). Therefore, Player~$2$\xspace wins and chooses a vertex \(v_{n-1}^+\) where \(B_{n-1} \oplus c_n < T_{v_{n-1}^+}\). Player~$2$\xspace plays her winning strategy in \({\mathcal G}\) from there because \(T \equiv \texttt{Th}\xspace\). The only remaining case is when \(B_{n-1} \in \bbN\), and then both \(b^T(v_{n-1}, B_{n-1})\) is in \(\mathbb{N}\), and \(c_n\) has to be in \(\mathbb{N}\) too. This means \(c_n \leq b^T(v_{n-1}, B_{n-1}) \ominus 1\). Player~$2$\xspace bids \(\succb{c_n}\) to win the current bid, and chooses a \(v_{n-1}^+\). Therefore, Player~$1$\xspace's budget becomes \(B_{n-1} \oplus \succb{c_n} < B_{n-1} \oplus b^T(v_{n-1}, B_{n-1}) < B_{n-1} \oplus \succb{b^T(v_{n-1}, B_{n-1})} = |T(v_{n-1}^+)| \leq T(v_{n-1}^+)\). Hence, from that \(v_{n-1}^+\), Player~$2$\xspace plays her winning strategy in \({\mathcal G}\) which makes \(f^*\) fail. \end{proof} This concludes the proof that if Player~$2$\xspace wins from some \(\zug{v, B}\) in \(G_{T, {\mathcal G}}\), then Player~$1$\xspace does not have a winning strategy in \({\mathcal G}\) from vertex \(v\) with budget \(T(v)\). \end{proof} Finally, we verify that \(T \leq \texttt{Th}\xspace_{{\mathcal G}}\). We define a function \(T': V \rightarrow [k] \cup \set{k+1}\) as follows. For \(v \in V\), when $T(v) > 0$ we define $T(v) = k^* \ominus (T(v) \ominus 0^*)$, and $T'(v) = k+1$ otherwise. Lem.~\ref{lem:flippedaverage} shows that \(T'\) satisfies the average property. We proceed as in the previous construction only from Player~$2$\xspace's perspective. We construct a partial strategy $f_{T'}$ for Player~$2$\xspace from $T'$ just as $f_T$ is constructed from $T$, and construct a turn-based parity game $G_{T', {\mathcal G}}$. Let \(\texttt{Th}\xspace_{{\mathcal G}}^2\) denote Player~$2$\xspace's threshold function in \({\mathcal G}\). That is, at a vertex $v \in V$, Player~$2$\xspace wins when her budget is at least $\texttt{Th}\xspace_{\mathcal G}^2(v)$ and she loses when her budget is at most $\predb{\texttt{Th}\xspace_{\mathcal G}^2(v)}$. Existence of $\texttt{Th}\xspace_{\mathcal G}^2$ follows from Thm.~\ref{thm:frugal-parity}. Applying Lemmas~\ref{lemma:TBparity-iff-thresh} and~\ref{lemma:thresholdpassesthetest} to Player~$2$\xspace, we obtain the following. \begin{lemma} \label{lem:parity-PT} If Player~$2$\xspace wins from every vertex in \(G_{T', {\mathcal G}}\), then \(T' \geq \texttt{Th}\xspace^2_{{\mathcal G}}\). If \(T' \equiv \texttt{Th}\xspace^2_{{\mathcal G}}\), then Player~$2$\xspace wins from every vertex of \(G_{T', {\mathcal G}}\). \end{lemma} Given a frugal-parity discrete-bidding game ${\mathcal G} = \zug{V, E, k, p, S, \texttt{fr}}$, a vertex $v \in V$, and $\ell \in [k]$, we guess $T: V \rightarrow [k] \cup \set{k+1}$ and verify that it satisfies the average property. Note that the size of $T$ is polynomial in ${\mathcal G}$ since it consists of $|V|$ numbers each of size $O(\log k)$. We construct $G_{T, {\mathcal G}}$ and $G_{T', {\mathcal G}}$, guess memoryless winning strategies for Player~$1$\xspace and Player~$2$\xspace, respectively. We check whether $T(v) \geq \ell$, and answer accordingly. Correctness follows from Lemmas~\ref{lemma:TBparity-iff-thresh},~\ref{lemma:thresholdpassesthetest}, and~\ref{lem:parity-PT}. We thus obtain our main result. \stam{ Thus, we can aim for verifying whether \(T' \geq \texttt{Th}\xspace^2_{{\mathcal G}}\), where \(\texttt{Th}\xspace_{{\mathcal G}}^2\) denotes Player~$2$\xspace's threshold function in \({\mathcal G}\). Note that, here we use determinacy of the threshold function in frugal-parity games, which we obtained from the existence of such function from the fixed point algorithm, discussed in Section \ref{sec:fixedpoint}. Suppose \(f'\) denotes the corresponding partial strategy based on \(T'\) for Player~$2$\xspace as constructed \(f\) from \(T\), and \(G_{f', {\mathcal G}}\) is the turn-based parity game where the players' role has been flipped. Then, we verify whether Player~$2$\xspace wins from every vertex of \(G_{f', {\mathcal G}}\). } \begin{restatable}{theorem}{parityNPcoNP} \label{thm:parity-NP-coNP} The problem of finding threshold budgets in frugal-parity discrete-bidding games is in \NP and co\NP. \end{restatable} \section{Discussion} We study, for the first time, the problem of computing threshold budgets in discrete-bidding games in which the budgets are given in binary. Previous algorithms for reachability and parity discrete-bidding games have exponential running time in this setting. We developed two algorithms for finding threshold budgets. The algorithms are complementary, and mirror the situation in the continuous setting; there too, there are two proof techniques to show results for threshold budgets, a fixed-point technique and an NP algorithm that relies on knowledge of the structure of threshold budgets. Prior to this work, a fixed-point algorithm was only known for reachability discrete-bidding games \cite{DP10}. While our fixed-point algorithm for parity discrete-bidding games has exponential worst case running time, it sheds light on the structure of threshold budgets in these games. A structure that was crucial for our \NP and co\NP membership proof. This latter proof adds to the previously observed good news on discrete-bidding games: parity discrete-bidding games are not only a sub-class of concurrent games that is determined~\cite{AAH19}, we show that it is a sub-class of concurrent games that are represented in an exponentially-succinct manner and can still be solved in \NP and co\NP. We leave open the exact complexity of finding threshold budgets. For the lower bound, it was shown in \cite{AAH19} that turn-based parity games reduce to parity discrete-bidding games with constant sum of budgets. Since solving turn-based parity games is a long-standing open problem, we expect that it will be challenging to find a polynomial-time algorithm for solving parity discrete-bidding games. Still, improved upper bounds might be possible to obtain. For example, a quasi-polynomial time algorithm for parity discrete-bidding games or a polynomial-time algorithm for reachability or B\"uchi discrete-bidding games. \stam{ Still, we leave open the question of whether a polynomial-time algorithm for turn-based parity games implies a polynomial-time algorithm for parity discrete-bidding games. We note that a similar question remains open for continuous-bidding games. In continuous-bidding games, there are two ways to prove that thresholds budgets exist: the first proof is based on a fixed-point computation and the second (see Thm.~\ref{thm:cont-reach}) constructs winning strategies based on a function that satisfies the continuous average property. Our proof of membership in \NP and co\NP can be seen as a discrete version of the latter proof technique. For reachability discrete-bidding games, this complements the previously known fixed-point-based proof. For parity discrete-bidding games, previously, existence of threshold budgets was shown through determinacy, and the structure of the thresholds was not understood. For these games, w e provide both types of proof techniques: we show, for the first time, that threshold budgets have the average property, and we show that they are a result of a non-trivial fixed-point computation. }
\chapter[Jet Gravitational Waves]{Jet Gravitational Waves\label{ra_ch1}} \author[T. Piran]{Tsvi Piran} \address{Racah Institute for Physics,\\ The hebrew university, Jerusalem, 91904, Israel, \\ <EMAIL>} \newcommand{\tp}[1]{\textcolor{blue}{\bf #1}} \newcommand{\rtp}[2] {{\textcolor{red}{\sout{#1}}}{\textcolor{blue}{#2}}} \newcommand {\dtp}[1] {\textcolor{red}{\sout{#1}}} \newcommand{\ntp}[1]{\textcolor{cyan}{[TP: #1]}} \newcommand{{\cal E}}{{\cal E}} \newcommand{ApJL}{ApJL} \newcommand{ApJ}{ApJ} \newcommand{Nature}{Nature} \newcommand{Eprint}{Eprint} \newcommand{MNRAS}{MNRAS} \newcommand{Phys. Reports}{Phys. Reports} \newcommand{Phys. Rev. Lett. }{Phys. Rev. Lett. } \newcommand{Phys. Rev. D. }{Phys. Rev. D. } \begin{abstract} The acceleration of a jet to relativistic velocities produces a unique memory type gravitational waves (GW) signal: {\it Jet-GW}. I discuss here resent result concerning properties of these GWs and consider their detectability in current and proposed detectors. Classical sources are long and short Gamma-ray bursts as well as hidden jets in core-collapse supernovae. Detection of jet-GWs from these sources will require detectors, such as the proposed BBO, DECIGO and lunar based detectors, that will operate in the deciHz band. The current LVK detectors could detect jet-GWs from a Galactic SGR flare if it is sufficiently asymmetric. Once detected these signals could reveal information concerning jet acceleration and collimation that cannot be explored otherwise. \end{abstract} \section{Introduction} \label{sec:introduction} The detection of gravitational waves from merging compact objects (black holes and neutron stars) binaries opened a new era in Physics and Astronomy \cite{Abbott2015,Abbott2017GW}. The current detectors have been upgraded and new detectors at other wavelengths are being planned. On the theory side new prospects for detection and utilization of gravitational waves from different sources have been proposed. One such less explored source - {\it gravitational waves from relativistic jets: Jet-GWs}. Any relativistic jet involve acceleration of mass (or energy density - if the jet is Poynting flux dominated) from rest to a speed approaching the speed of light. This acceleration process produces a memory type gravitational waves signal \cite{segalis,piran2002,Sago,ofek,Leiderschneider} (see Fig. \ref{fig:h1}). A low frequency detector, will ``see" this signal as a sudden jump. A higher frequency whose frequency range is comparable to the rise time of this signal, will resolve a temporal structure that can reveal the nature of the jets and the acceleration process. In this article I review the basic features of {\it Jet-GWs} and discuss potential sources and detection prospects. \begin{figure} \centering \centerline{\includegraphics[width=0.7\textwidth]{h-fig.pdf}} \caption{The normalized GW ampliture, $h(t)$, for a jet with an opening angle $\theta_{\rm j} =0.1$ and a final Lorentz factor, $\Gamma=100$ for different observer angles. From ref. [6].} \label{fig:h1} \end{figure} \section{Instantaneously accelerate point particle} Consider, first, a point mass $m$ that is instantaneously accelerated to a Lorentz factor $\Gamma$. The total energy is ${\cal E} = m \Gamma$ (unless specified otherwise I use units in which c=G=1). While non-physical, this limit gives an excellent idea of the emerging patterns. The waveform is a Heaviside step function: \begin{equation} \label{eq:theta} h(t, \theta_{\rm v}) = h(\theta_{\rm v}) \mathcal H (t) \ , \end{equation} where $\theta_{\rm v}$ is the angle between the direction of the motion of the particle and the line of sight to the distant observer in the observer's frame of reference (see Fig. \ref{fig:schematic}). \begin{figure} \centerline{\centerline{\includegraphics[width=0.25\textwidth]{Cap4.pdf}}} \caption{A schematic description of the jet. The top shell has reached the final Lorentz factor at a distance $c t_{\rm acc}$ from the origin. The duration of mass injection is $t_{\rm inj}$. A counter-jet is shown in light colors. From ref.[7].} \label{fig:schematic} \end{figure} The Fourier transform is given by \begin{equation} \tilde h(f , \theta_{\rm v}) ={h(\theta_{\rm v})}/{f} \ . \label{eq.FT} \end{equation} The gravitational wave amplitudes $h_{\rm +}$ and $h_{\rm x}$ of the two polarization modes are given by \cite{segalis}: \begin{equation} \label{eq:phase} h^{TT} (\theta_{\rm v}) = h_{\rm +} + i h_{\rm x} = \frac{2 {\cal E} \beta^2}{r} \frac{\sin^2 \theta_{\rm v}}{1-\beta \cos\theta_{\rm v}} e^{2 i \phi} \ , \end{equation} where $\phi$ is an azimuthal angle. For a single point-particle, the phase, $2 i\phi$, can be ignored. When discussing the metric perturbation of an ensemble of particles the complex phase leads to a interference and must be taken into account. The angular dependence of $h(\theta_{\rm v})$ is shown in Fig. \ref{fig:de_dtheta}. It exhibits anti-beaming: the GW amplitude vanishes along its direction of motion. It remains small at a cone around it, reaching 50\% of the maximal values at an opening angle $\Gamma^{-1}$. The function $h(\theta_{\rm v})$ attains a maximum of \begin{equation} h_{\rm max} = \frac{4{G {\cal E}} }{c^4 r} \frac{\Gamma}{\Gamma+1}, \ \ {\rm at } \ \ \theta_{\rm max}= \cos^{-1}[\frac{1+\Gamma}{\beta \Gamma}] \approx \sqrt{\frac{2}{\Gamma}} \ , \label{eq:hmax} \end{equation} where $r$ is the distance to the source and for clarify Newton's constant, $G$, and the speed of light, $c$, have been added to this equation. Interestingly, this relation resembles the classical quadrupole relation for the GW amplitude $h_{\rm max} \propto (G M /c^2 r) (v/c)^2 $ (with $v = c$), even though the quadrupole approximation is not valid in this case. \begin{figure} \centering \centerline{\includegraphics[width=0.5\textwidth]{Antenna1.pdf}} \caption{An antenna pattern for the GW amplitude, h, from an instantenously accelerated point-like jet for different Lorentz factors. $h$ is anti-beamed with an opening angle $\Gamma^{-1}$ around the jet direction. } \label{fig:de_dtheta} \end{figure} The GW energy is beamed in the forward direction (see Fig. \ref{fig:de_dtheta}). 50\% of the GW energy is deposited in a cone with an opening angle $\theta_{50\%} = \sqrt{{2}/{\Gamma}}$. In many cases there are two jets moving in opposite directions. The GW amplitude in this case is the sum of the two signals: \begin{equation} \label{eq:pha} h (\theta_{\rm v}) = \frac{4 {\cal E} \beta^2}{r} \frac{ 1-\cos^2 \theta_{\rm v}}{1-\beta^2 \cos\theta_{\rm v}^2} \ , \end{equation} (see Fig. \ref{fig:twoJets}). This signal is almost flat apart from two narrow {\it anti-beams} of width $\Gamma^{-1}$ along the directions of the jets. The energy is, however, still beamed into two regions of width $\sqrt{2/\Gamma} $ along the jets. Note, that these figures, that the depicts $h(\theta_v)$ are somewhat misleading. While they depict the correct value of $h$ they ignore a critical factor - the characteristic time scale. This time scale that strongly influences the detectability (as well as the energy flux) may varies with $\theta_v$. \begin{figure}[h!] \centerline{\includegraphics[width=0.5\textwidth]{Antenna2.pdf}} \caption{An antenna pattern for the GW amplitude, h, from two opposite jets for different Lorentz factors. h is almost uniform, apart from being anti-beamed with an opening angle $\Gamma^{-1}$ around the jets directions. } \label{fig:twoJets} \end{figure} Recalling Eq. \ref{eq.FT} we note that formally the total GW energy emitted, \begin{equation} \label{eq:egw} E_{\rm GW} = \frac{1}{32 \pi} \iint (\frac{\partial h}{\partial t})^2 dt d\Omega = \frac{1}{32 \pi} \iint \tilde h(f)^2 f^2 d f d\Omega \ , \end{equation} diverges for an instantaneously accelerating particle. This divergence is not physical as it arises from the instantaneous approximation. If the system has a typical timescale $t_{\rm c}$ than there should be an upper cutoff to the frequency above which $h(f)$ decreases with $f$ much faster than $f^{-1}$ and the integral is finite. The overall energy emitted is of order \cite{Leiderschneider}: \begin{equation} E_{\rm GW} = F(\Gamma) [G {\cal E} /c^5 t_{\rm c}] {\cal E} \ , \end{equation} where $F(\Gamma)$ is a function of the jet's final Lorentz boost. $F(\Gamma)$ vanishes when $\beta \rightarrow 0$. When $\Gamma \rightarrow \infty$ the situation is more complicated and in extreme cases we have to take into account the details of the acceleration process to properly estimate the energy emitted. Note that the factor in square brackets is always smaller than unity. \section{Time Scales and the Temporal Structure} The above considerations stress the importance of the characteristic time scale. There are two timescales in the system and the relevant one is of course the longest. The two intrinsic time scales are the injection timescale,$t_{\rm inj} $ that is measured in the observer's rest frame (which is the same as the source rest frame). It characterizes the overall duration of the jet. A second intrinsic time scale, $t_{\rm acc} $, characterizes the acceleration (it is also measured in the source rest frame). The signal is determined by $t_{\rm acc}$ via the arrival time from different angular regions of the jet. The arrival time is related to $t_{\rm acc}$ as: \begin{equation} t_{\rm o}(\theta_{\rm v}) = (1-\beta \cos\Delta \theta_{\rm v}) t_{\rm acc} , \label{eq:t_obs} \end{equation} where $\beta$ is the jet's velocity and $\Delta \theta_{\rm v} = \theta_{\rm v}+\theta_{\rm j} $ is the sum of $\theta_{\rm v}$ and the angular width of the jet, $\theta_{\rm j}$ (see fig:geometry). $ t_{\rm o}$ is the time difference from the observation of the beginning of the acceleration and the the arrival time of the signal from the furthest point of the jet from observer (see Fig. \ref{fig:schematic}). The observed time scale of the GW signal, $t_{\rm c}$, is the longest between $t_{\rm inj} $ and $t_{\rm o}$: \begin{equation} t_{\rm c}(\theta_{\rm v}) = \max(t_{\rm inj},t_{\rm o}) = \max [t_{\rm inj},(1-\beta \cos\Delta \theta_{\rm v}) t_{\rm acc})] \ . \label{eq.to} \end{equation} As $ t_{\rm o}$ depends on the viewing angle, the dominant time scale may be $t_{\rm inj} $ for some observers and $t_{\rm o}$ for others. More specifically, $t_{\rm inj}$ is independent of the viewing angle. On the other hand $t_{\rm o} \ll t_{\rm acc}$ for small viewing angles. Thus unless $t_{\rm acc} $ is very large, $ t_{\rm c} = t_{\rm inj}$ for these angles. However $t_{\rm o}$ becomes significantly larger when $\Delta \theta$ increases and for those angles we may have $ t_{\rm c} = t_{\rm o}$ The Fourier transform of a memory-type signal that is rising to an asymptotic value $h_0 (\theta_{\rm v})$ over a timescale $t_{\rm c} $, has a general shape: \begin{equation} \label{eq:S} \tilde h(f,\theta_{\rm v}) = \begin{cases} {h_0(\theta_{\rm v})}/{f} , & f \leq f_{\rm c} \\ {h_0(\theta_{\rm v}) {g(f/f_{\rm c})} / f_{\rm c} } ,\ \ & f \geq f_{\rm c} \ . \end{cases} \end{equation} The crossover frequency, $f_{\rm c}$, in which the Fourier transform of the GW signal changes its behavior is the reciprocal of the time scale, $t_{\rm c}$: $f_{\rm c} \equiv 1/t_{\rm c}$. The function $g(f/f_{\rm c})$ depends on the nature of the source. It always decreases faster than $(f/f_{\rm c})^{-1}$. As the total GW energy must be finite, the integral $\int_{0} ^\infty {\dot h}^2 (t) dt = \int _0 ^\infty f^2 {\tilde h}^2 (f) df$ yields an asymptotic bound of $g \propto (f/f_{\rm c})^{-\alpha_{\inf}}$ with $\alpha_{\inf} >3/2$. \begin{figure} \centerline{\includegraphics[width=0.6\textwidth]{acc_models.png}} \centerline{\includegraphics[width=0.575\textwidth]{fourier_fireball.png}} \caption{{\it top: }The Fourier transforms, $\tilde h$ of the GW signals from jets with three different acceleration models (with $\Gamma_f = 100$, $\theta_{\rm j} = 0.1$, $\theta_{\rm v} = 0.9$). In all cases $t_{\rm inj}=0$. The time constant of the third model was chosen such that the high-frequency power laws would coincide. {\it Bottom:} The normalized Fourier waveform multiplied by the frequency for jets with the acceleration model $\Gamma \propto R$, based on the numerical code describe in \cite{ofek} for $\Gamma=100$ and $\theta_{\rm j}=0.1$. Below the crossover frequency, $\tilde h(f) \cdot f$ is a constant. From ref.[7].} \label{fig:h} \end{figure} The {spectral density}, $S(f)\equiv \tilde h(f) \cdot \sqrt{f}$, is used to characterize the sensitivity of GW detectors. \begin{equation} \label{eq:crossover} S(f,\theta_{\rm v}) = \begin{cases} {h_0(\theta_{\rm v})}/{f^{1/2}} , & f \leq f_{\rm c} \\ {h_0(\theta_{\rm v}) {g(f/f_{\rm c}) f^{1/2}} / f_{\rm c} } ,\ \ & f \geq f_{\rm c} \ . \end{cases} \end{equation} The spectral density at the crossover frequency, $S(f_{\rm c}) = {h_0(\theta_{\rm v})}/{f_{\rm c}^{1/2}} $, is critical to determine the detectability of the signal. The condition \begin{equation} S_{det} (f )< S(f_{\rm c} ) (f_{\rm c} /f)^{1/2} = h_0(\theta_{\rm v})/{f^{1/2}} \ \ \ {\rm for ~ some~ f,} \label{eq:Sfc} \end{equation} is a necessary condition for detection. For a low-frequency detector (whose typical frequency range is below $f_{\rm c} $) this condition is sufficient. However, it is not sufficient for a high frequency detector as $S(f)$ decreases faster than $f^{-1/2}$ above $f_{\rm c}$. A more detailed discussion of the Fourier transform, $\tilde h(f,\theta_{\rm v})$ and the spectral density is given in ref. [7]. As an example Fig. \ref{fig:h} depicts $\tilde h$ for different jets. \section{The Angular Structure} \begin{figure}[b] \centerline{\includegraphics[width=0.25\textwidth]{Cap_rings2s.pdf}} \caption{A schematic view of the jet (blue) for $\theta_{\rm v} <\theta_{\rm j}$. Due to the symmetry, the contribution to the GW amplitude of the part of the jet that is spherically symmetric around the observer (shown in red ) vanishes. The amplitude from partial rings with $\theta>\theta_{\rm j}-\theta_{\rm v}$, is reduced compared to the amplitude of a point-particle with the same energy and angle to the observer. The jet is symmetric under the transformation $\phi \rightarrow -\phi$: hence, the metric perturbation component $h_{\rm x}$ vanishes identically. From ref.[7].} \label{fig:rings} \end{figure} To explore the effect of the angular width of the jet we consider a thin spherical shell ejected simultaneously and accelerated instantaneously. The shell has a half opening angle $\theta_{\rm j}$ and its center is moving at an angle $\theta_{\rm v}$ relative to the observer. If $\theta_{\rm j} \lesssim \Gamma^{-1}$ the signal converges to the point-particle limit. So in the rest we consider the case of $\Gamma^{-1} \ll \theta_{\rm j}$. Otherwise cancellations between different parts of the shell become significant and the signal becomes weaker with a broader anti-beaming region around the axis. We define the observer's line of sight to the emitting source as the $z$ axis of our coordinate system. The coordinates $\theta$ and $\phi$ are defined in the observer's coordinate system in the usual manner (see Fig. \ref{fig:schematic}). The direction of the center of the jet is $(\theta,\phi)=(\theta_{\rm v} , 0)$ in the observer's frame of reference. The axial symmetry implies a symmetry under the transformation $\phi \rightarrow -\phi$. Therefore, the metric perturbation $h_{\rm x}$ (which is now summed over the shell) vanishes identically (see Eq. \ref{eq:phase}, and Fig. \ref{fig:rings}). In the following, we simply denote $h=h_{\rm +}$, the only non-vanishing component of the metric perturbation tensor. Integrating over the shell we find: \begin{equation} \label{eq:h_int} h_(\theta_{\rm v} , \theta_{\rm j}) =\frac{2{\cal E} \beta^2}{r \Delta \Omega} \int_{|\theta_{\rm v}-\theta_{\rm j}|} ^{min(\theta_{\rm j}+\theta_{\rm v},\pi)} \frac{\sin^3 \theta \cdot \sin 2\Delta \phi}{1-\beta \cos\theta} d\theta \ , \end{equation} where $\Delta \Omega \equiv 2 \pi (1-\cos\theta_{\rm j})$, the solid angle of the cap, and \begin{equation} \label{eq:dphi} \Delta \phi \equiv \cos^{-1} \left[ \frac{\cos \theta_{\rm j}-\cos \theta_{\rm v} \cos\theta}{\sin\theta_{\rm v} \sin\theta} \right] \ . \end{equation} \begin{figure} \centerline{\includegraphics[width=0.5\textwidth]{AntennaShell.pdf}} \caption{Antenna pattern for the GW amplitude, $h$, from an accelerating spherical shells with different opening angles $(\theta_{\rm j}=0.01,0.1,0.3$ - red, blue and black) and different Lorentz factors $(\Gamma=10,100$ - dashed and solid lines). The anti-beaming region is $ \approx 0.84 \ \theta_{\rm j}$. The narrow jet with $\theta_{\rm j}=0.01 \approx \Gamma^{-1}$ behaves like a point particle. For the larger opening angles ($\theta_{\rm j} >\Gamma^{-1}$) the pattern is almost independent of $\Gamma$. } \label{theta_j_vs_pp} \end{figure} Figure \ref{theta_j_vs_pp} depicts the antenna pattern of $h(\theta_{\rm v},\theta_{\rm j})$ for different opening angles. This angular behavior resembles the point-particle result, with a major difference: the anti-beaming region, which was $ \Gamma^{-1}$ in the point-particle case, is now $ \approx 0.84 \ \theta_{\rm j}$ and it is independent of $\Gamma$ (if $\Gamma^{-1}< \theta_{\rm j}$. If the jet is wide the signal is also weaker because of the cancellation of the signals from different parts of the shell. For $\theta_{\rm v} < \theta_{\rm j}$, only the outer region of the shell, with $\theta> \theta_{\rm j} - \theta_{\rm v}$, contributes. The effect is twofold: regions of the shell with $\theta<\theta_{\rm j}-\theta_{\rm v}$ have a vanishing contribution to the amplitude, and even in the outer region, destructive interference between symmetric regions will reduce the GW amplitude. The maximal GW amplitude is now a function of $\theta_{\rm j}$ (compare with Eq. \ref{eq:hmax}). For small opening angles: \begin{equation} h_{\rm max}(\theta_{\rm j}) \approx \frac{4 {\cal E}}{r} (1-\frac{3}{4} \theta_{\rm j}) \ . \end{equation} Like in the case of a point source the GW signal of two sided jets with angular structure will be the sum of the two signals of the form given by Eq. \ref{eq:h_int}. The amplitude of $h$ will be almost isotropic but now with wider anti-beamed regions along the jets directions. Again the energy flux will be predominantly in the forward directions of the two jets. \section{Detectability} \label{sec:detectability} To estimate detectability, we compare the expected spectral density, $S(f)$, to the detector's sensitivity curve that is characterized by $S_{\rm det}(f)$. $S(f)$ is always a decreasing function of the frequency. At low frequencies, namely for $f< f_{\rm c}$, $S(f) \propto f^{-1/2}$. It decreases faster for $f> f_{\rm c}$. A typical low-frequency detector will be most sensitive to a jet-GW signal at the lowest end of its frequency response. Namely, the lowest frequency below which $S_{\rm det}$ is steeper than $f^{-1/2}$. At high-frequencies ($f>f_{\rm c}$) $S \propto f^{-\alpha}$ with $\alpha > 1/2$. A high-frequency detector is most sensitive for this signal at its lowest frequency below which $S_{\rm det}$ is steeper than $f^{-\alpha}$. Like almost any GW source involving a relativistic motion, the maximal amplitude of the jet GW is of order \begin{equation} h \approx \frac{ 4 G {\cal E} }{ c^4 r}\approx 10^{-24} \bigg(\frac{{\cal E}}{10^{51} ~{\rm erg}}\bigg)~\bigg(\frac{100 {\rm Mpc}}{r} \bigg) \ . \label{eq:magnitude} \end{equation} $h= 10^{-24}$ is lower than the sensitivity of current GW detectors. Additionally, as we discuss later, these detectors don't operate in the deciHz frequency range that is relevant for most sources. However, we have to remember that the sensitivity of current and planned detectors is much nearer to this signal than the situation at the early 90ies when efforts to construct LIGO and Virgo begun. For a one-sided jet this estimate is valid for an observer that is at optimal angle, namely at $\theta_{\rm v} \approx \theta_{\rm j}$. For two-sided jets, this estimate is valid for most observers apart from those along the jets ( $\theta_{\rm v} < \theta_{\rm j}$). Different observers may observer different characteristic crossover frequencies (see Eq. \ref{eq.to}). In the following we will focus on observers that are in the forward direction (but not within the anti-beaming cones). \section{Potential Sources} Detection horizons can be obtained by comparing the crossover frequency and amplitude of potential sources with the characteristics frequencies and noise amplitudes of several detectors. Given the uncertainties in the signals and in properties of planned detectors this simple approach is sufficient at this stage. Table 1. summarizes the basic features of the different sources and their detection horizon (assuming the high end of the energy range, a viewing angle near the jet and the most suitable frequency) with different GW detectors. \begin{table}[h] \tbl{Horizon distances of several current and proposed detectors for different sources. Fig. \ref{fig:LIGO} describes the sensitivity curves of LVK, Einstern telscope, BBO and DECIGO. For a moon type detector such as LWGA \cite{LWGA} or LSGA \cite{LSGA} I use sensitivity of $10^{-22} /\sqrt{Hz} $ at $10^{-3}Hz.$ The values are given using optimistic values of the energy (maximal) and the viewing angle (just outside the anti-beaming cone.} {\begin{tabular}{@{}ccccccccc@{}} \toprule & Energy & Frequency & Typical & LVK & Einstien & BBO & DECIGO & Moon\cite{LWGA,LSGA} \\ Source & ${\cal E}$ (erg) & $f_{\rm c}$ (Hz) &Distance & & Telescope & & & detectors \\ \colrule LGRB & $10^{50-52}$ & 0.1-0.01 & 6 Gpc& - & - & Gpc & 500 Mpc & 30 Mpc \\ sGRB & $10^{48-50}$ & 1-10 & 1 Gpc & - & 5 Mpc & 75 Mpc & 50 Mpc & 3 Mpc\\ Sn Jet & $10^{50-51}$ & 0.1-0.01 & 100 Mpc &- & - & 100 Mpc & 50 Mpc & 3 Mpc \\ SGR & $10^{46-47}$ & 0.001 &10 kpc & 2.5 kpc & 25 kpc & 750 kpc & 500 kpc & 10 kpc \\ \botrule \end{tabular}}\begin{tabnote}\end{tabnote}\label{ra_tbl1} \end{table} \begin{figure} \centerline{\includegraphics[width=0.6\textwidth]{Jet-GW-Figs.pdf}} \caption{The estimated spectral density for a fiducial model\cite{Leiderschneider} of GW170817, $S(f)$, compared with the sensitivity thresholds of GW detectors taken from http://gwplotter.com.\cite{Moore_2014} The dotted red line shows the GW emission from a CCSN jet with $10^{51}$erg at 20 Mpc. The dotted black line corresponds to a Galactic SGR flare of $10^{47}$ erg at 10kpc. Adapted with modifications from ref. [7]. } \label{fig:LIGO} \end{figure} \subsection{GRBs} GRB jets that have motivated these ideas\cite{segalis,piran2002} seems to be the most natural sources for these kind of GWs. These powerful ultra-relativistic jets carry up to $10^{52}$ erg (for long GRBs) and $10^{50}$ erg (for short ones). Given the numerous other differences between the two populations (long GRBs are typically detected from larger distances and they have significantly larger $t_{\rm inj}$) we consider each subgroup independently. The crossover frequency is dominated by $t_{\rm inj}$ for both long and short GRBs. Thus, $f_{\rm c}=f_{\it{l}}= 0.1-0.01$ Hz for the long and $f_{\rm c}=f_{\it{s}}=1-10$ Hz for short GRBs. This frequency range puts the events below the frequency limits of current LIGO-Virgo-Kagra, but around the capability of the planned Big Bang Observer (BBO) \cite{BBO} and DECIGO \cite{Decigo}. \subsubsection{Long GRBs} Long GRBs (LGRBs) are associated with Collapsars - collapsing massive stars. Their typical isotropic equivalent energies range from $10^{51-54}$ ergs. When taking into account beaming, which is typically of order $\theta_{\rm j} \approx 0.1-0.2$ rad (but highly uncertain) this corresponds to ${\cal E} \approx 10^{50-52}$ erg. With typical distances of a few Gpc the GW amplitude from a regular LGRBs is quite low $\sim 10^{-26}$. The duration of LGRBs ranges from 2 sec to a few hundred seconds, with typical duration of $\sim 20$ sec. \begin{figure} \centerline{\includegraphics[width=0.6\textwidth]{BATSE_and_TTE.png}} \caption{The averaged Fourier transform of BATSE's long GRBs \cite{Beloborodov}, vs. that of BATSE's TTE short GRB catalogue \cite{Leiderschneider}. Power law fits for are shown in dashed lines. From ref. [7]. } \label{fig:tte} \end{figure} The average power spectrum of the bursts' $\gamma$-rays light curve shows a crossover frequency of $\approx 10^{-2} Hz$ \cite{Beloborodov}. This crossover frequency reflects the overall duration of the bursts. If the duration of the $\gamma$-rays reflects the activity of the central engine (as in the case of internal shocks \cite{kobayashi}) this implies that $t_{\rm inj}$ determines the dominant crossover frequency. This frequency is below what can achieved by any detector built on Earth. It is at the upper end of LISA's\footnote{\url{https://www.elisascience.org/}} bandwidth. However, the expected signal is about thousand times weaker than LISA's planned sensitivity (see Fig. \ref{fig:LIGO}). It falls nicely within the band of the proposed BBO and DEFIGO. However, a regular LGRB at a few Gpc is too far to be detected with the sensitivity reach of either BBO or DECIGO. \subsubsection{Short GRBs and GRB 170817A} Short GRBs are associated with binary neutron star mergers \cite{eichler89}, as demonstrated recently with the observations of GRB 170817A and the associated GW signal GW 170817 \cite{Abbott2017}. With typical energies of $10^{48-50}$ erg, sGRBs are much weaker than LGRBs. Correspondingly they are observed from nearer distances, typically of order 1 Gpc, with the nearest ones at distances of a few hundred Mpc (170817A was much nearer than average). Typical sGRB duration is less than 2 sec. The expected crossover frequency (which is again, presumable, is dominated by $t_{\rm inj}$ and not by $t_{\rm acc}$) is of order 0.5-5 Hz. This is below current terrestrial detectors, it is too low even for the planned frequency band of more advanced detectors like the Einstein telescope\footnote{\url{http://www.et-gw.eu/}}. Once more it falls within the planned frequency range of BBO and DECIGO. Again a typical sGRB at a few hundred Mpc is too far to be detected. The exceptional sGRB, GRB 170817A, was sufficiently nearby that it could have been marginally detected with these advanced detectors. The properties of this well observed event are well known: ${\cal E} \approx 10^{50} $erg, $\theta_{\rm v} \approx 20^o$, $\theta_{\rm j}\approx 5^o$ \cite{Nakar2020}. Other parameters, and in particular $t_{\rm acc} $ and $t_{\rm inj}$ that are most relevant for our analysis, are unknown. The injection duration $t_{\rm inj}$, is not necessarily related to the duration of the observed $\gamma$-rays in this event, as those arose from a cocoon shock breakout \cite{Kasliwal17,Gottlieb18}. In the following we assume that $t_{\rm acc}< t_{\rm inj} \approx 1$ sec. $\Gamma$, is also unknown but it doesn't factor into the result as we expect $\Gamma^{-1} < \theta_{\rm j} ~ 0.1$ rad. Given the viewing angle and the jet angle, GRB 170817A was also ideally positioned in terms of the strength of the GW signal from its jet. That is, we were not within the anti-beamed jet's cone but not too far from it either. The jet-GW of GRB 170717A signal was not detected. This is not surprising. Fig. \ref{fig:LIGO}, depicts the spectral density of GRB170817A compared with the sensitivity thresholds of GW detectors \cite{Moore_2014}. It is below the frequency band of both LIGO and Virgo and also well below their sensitivity. Jet-GW from 170817 would have been detectable by BBO or DECIGO had such detector been operational at the time! \subsection{Hidden jets in Core-Collapse Supernovae (CCSNe) and {\it low-luminosity} GRBs ({\it ll}GRBs)} Shortly after the discovery of the first {\it ll}GRB 980415 (that was associated with SN98bw) it was suggested \cite{Kulkarni98,MacFadyen01,Tan01} that the emission arose from shock breakout following an energetic jet that was choked deep in the accompanying star. Later on it was realized that, while the detection rate of {\it ll}GRBs is much lower than that of regular long ones, their actual rate is orders of magnitude larger \cite{Soderberg06,Bromberg11}. The detection rate is low because, given their low luminosity, they are detected only from relatively short distances. More recently, it was shown\cite{Piran17} that a significant fraction of CCSNe that are not necessarily associated with GRBs contain energetic ($\sim 10^{51}$ erg) choked relativistic jets. Such a jet deposits all its energy into a cocoon. Upon breakout the cocoon material is observed as a high velocity (0.1-0.2c) material that engulfs the supernova and can be observed within the first few days. Such signatures have been detected\cite{Mazzali00} as early as 1997 in SN 1997EF and in several other SNe since then. This suggestion was nicely confirmed with the exquisite observations of this high velocity material in SN 2017iuk\cite{Izzo19,Nakar19}. It is supported by other evidence for jets in SNe \cite{totani2003,Mazzali2005,Maeda2008,Taubenberger2009,grichener2017}. If such relativistic jets are associated with a significant fraction of CCSNe then, as the supernova rate is significantly larger than the GRB rate \cite{Piran_fireball}, we can expect a significan number of relatively nearby jets that would be sources of jet-GWs. Comparing relativistic CCSNe Jets with GRB jets, we estimate a typical CCSN $h$ to be a factor of 10 larger than the one from a typical long GRB. As we don't have a good clue on $t_{\rm inj}$ we assume that it is of the same order as the one estimated in long GRB, namely a few tens of seconds. Thus, the crossover frequency would be around 0.01 Hz. If the event is accompanied by a {\it ll}GRB (arising from the shock breakout of the cocoon) then there will be almost simultaneous EM signal associated with the GW signal (typical delays could be of order of a dozen seconds). However, if the event is not associated with a {\it ll}GRB then the EM counterpart in the form of a supernova will emerge a few hours or even days after the GW signal. \subsection{Giant SGR Flares} \label{sec:SGR} Magnetars with magnetic fields larger than $10^{15}$ Gauss are among the most surprising objects discovered \cite{Kouveliotou1999}. Magnetars eject giant flares while rearranging their whole magnetic field \cite{Eichler02}. Such flares have been observed roughly once per ten years within the Milky Way. The last one, from SGR1806-20 was observed in 2004\cite{Hurley2005,Mereghetti2005,Palmer2005,Terasawa2005}. It involved the acceleration of $\approx 10^{47}$ erg within a few milliseconds. The corresponding frequency is within the range of current GW detectors. With a Galactic distance the signal might be detectable if the initial injection was beamed. If these flares involve a jet of such energy than they could be detected even with current GW detectors up to distances of a few kpc. Proposed more advanced detectors could observe them from the whole Galaxy or even from M31. \subsection{Contribution to the GW background} \label{sec:GWbackground} The relativistic jets that arise from GRBs (both long and short) and hidden jets in SNe produce a background of jet-GW waves at frequency range of $\sim 0.01-1 $Hz depending on the specific source. Both long and short GRBs are rare and won't make a significant contribution to such a background. However, CCSNe take place at a rate of about one per second in the observable Universe. If a significant fraction of SNe harbor energetic jets the time between two such cosmological events, a few seconds, will be comparable to the characteristic time scale of the GW signals from these jets (assuming that the hidden jets in CCSNe are similar in nature to GRB jets). Depending on the ratio of the time between events and the characteristic frequency of the jet-GW signal we expect either a continuous background, as expected from the GW background from merging binary neutron stars, or a pop-corn like signature, as expected for the GW background from merging binary black holes \cite{LIGOstochastic}. With a typical cosmological distance of a few Gpc the corresponding amplitude of this jet-GW background is $h \approx 10^{-26} {\cal E}/(10^{51} {\rm erg})$. With energy input of about $10^{41}$ erg in GW per SNe (see Eq. \ref{eq:egw}) and SN rate of about one per second in the Universe the resulting energy density of GW of this kind in the 0.1 Hz would be $\Omega_{\rm jet-GW}\approx 10^{-9}$. Note, however, that there is an uncertainty of at least an order of magnitude due to the unclear $t_{\rm c}$ of this signal. \section{Discussion} \label{sec:discussion} The acceleration of a jet to a relativistic velocity generates a unique memory type GW signal. The signal is anti-beamed away from the direction of the jet with an anti-beaming angle of $\max(\Gamma^{-1},\theta_{\rm j}$). Like typical relativistic GW sources, the amplitude is of order $G{\cal E}/c^4 r $, corresponding to an amplitude of $h \approx 10^{-24}$ for a jet of $10^{51}$ erg at $100$ Mpc. At low frequencies the signal can be approximated as a step function. This last feature is of course problematic, as it might be difficult to distinguish it from step function type noise sources. At higher frequencies the details of the signal lightcurve could reveal information about the acceleration and collimation of the jet. Prospects for detection of these jet-GWs depend on construction of appropriate future detectors. Jets from different kinds of GRBs as well as hidden jets in CCSNe are expecte in the deciHz range. Hence most important are detectorslike the proposed BBO, DECIGO and several moon detectors (e.g. LWGA, LSGA). Among those sources hidden jets in CCSNe are the best candidates as they are most frequent and as their expected energy is comparable to those of LGRBs. As jet-GWs are anti-beamed we will most likely miss the $\gamma$-rays associated with GRBs from which we will observe these GWs. However, we expect to observe other associated wider signatures such as the afterglow or an accompanying shock breakout signal from the stellar envelope (in case of a LGRB) or from the merger's ejecta (in a sGRB). This shock breakout signal is also be the most likely EM signal associated temporarily with a jet-GW arising from hidden jet in CCSN. In this case the actual SN signal may appear hours later. Table 1 summarizes (under somewhat optimistic assumptions) the detection horizon of different events. Given the large uncertainties I didn't attempt to incorporate possible estimates of detection rates as these will be highly uncertain. Detection prospects with current detectors, LIGO, Virgo and Kagra that are operating at frequencies above 10 Hz are slim, unless giant SGR flare involve jets. In that case we could detect a Galactic event even with LVK. Otherwise we will have to resort of future planned detectors. What is most important is to remember that these signals are memory type. Usually we are not looking for such astrophysical signals. We should make sure to expand GW searches to include such signatures in all future runs. A detection of Jet-GWs would open a new window on jet engines and would reveal features of jet acceleration in the vicinity of black holes that are impossible to explore in any other way. \begin{acknowledgments} The research was supported by an advanced ERC grant TReX. \end{acknowledgments} \bibliographystyle{ws-rv-van} \chapter[Jet Gravitational Waves]{Jet Gravitational Waves\label{ra_ch1}} \author[T. Piran]{Tsvi Piran} \address{Racah Institute for Physics,\\ The hebrew university, Jerusalem, 91904, Israel, \\ <EMAIL>} \newcommand{\tp}[1]{\textcolor{blue}{\bf #1}} \newcommand{\rtp}[2] {{\textcolor{red}{\sout{#1}}}{\textcolor{blue}{#2}}} \newcommand {\dtp}[1] {\textcolor{red}{\sout{#1}}} \newcommand{\ntp}[1]{\textcolor{cyan}{[TP: #1]}} \newcommand{{\cal E}}{{\cal E}} \newcommand{ApJL}{ApJL} \newcommand{ApJ}{ApJ} \newcommand{Nature}{Nature} \newcommand{Eprint}{Eprint} \newcommand{MNRAS}{MNRAS} \newcommand{Phys. Reports}{Phys. Reports} \newcommand{Phys. Rev. Lett. }{Phys. Rev. Lett. } \newcommand{Phys. Rev. D. }{Phys. Rev. D. } \begin{abstract} The acceleration of a jet to relativistic velocities produces a unique memory type gravitational waves (GW) signal: {\it Jet-GW}. I discuss here resent result concerning properties of these GWs and consider their detectability in current and proposed detectors. Classical sources are long and short Gamma-ray bursts as well as hidden jets in core-collapse supernovae. Detection of jet-GWs from these sources will require detectors, such as the proposed BBO, DECIGO and lunar based detectors, that will operate in the deciHz band. The current LVK detectors could detect jet-GWs from a Galactic SGR flare if it is sufficiently asymmetric. Once detected these signals could reveal information concerning jet acceleration and collimation that cannot be explored otherwise. \end{abstract} \section{Introduction} \label{sec:introduction} The detection of gravitational waves from merging compact objects (black holes and neutron stars) binaries opened a new era in Physics and Astronomy \cite{Abbott2015,Abbott2017GW}. The current detectors have been upgraded and new detectors at other wavelengths are being planned. On the theory side new prospects for detection and utilization of gravitational waves from different sources have been proposed. One such less explored source - {\it gravitational waves from relativistic jets: Jet-GWs}. Any relativistic jet involve acceleration of mass (or energy density - if the jet is Poynting flux dominated) from rest to a speed approaching the speed of light. This acceleration process produces a memory type gravitational waves signal \cite{segalis,piran2002,Sago,ofek,Leiderschneider} (see Fig. \ref{fig:h1}). A low frequency detector, will ``see" this signal as a sudden jump. A higher frequency whose frequency range is comparable to the rise time of this signal, will resolve a temporal structure that can reveal the nature of the jets and the acceleration process. In this article I review the basic features of {\it Jet-GWs} and discuss potential sources and detection prospects. \begin{figure} \centering \centerline{\includegraphics[width=0.7\textwidth]{h-fig.pdf}} \caption{The normalized GW ampliture, $h(t)$, for a jet with an opening angle $\theta_{\rm j} =0.1$ and a final Lorentz factor, $\Gamma=100$ for different observer angles. From ref. [6].} \label{fig:h1} \end{figure} \section{Instantaneously accelerate point particle} Consider, first, a point mass $m$ that is instantaneously accelerated to a Lorentz factor $\Gamma$. The total energy is ${\cal E} = m \Gamma$ (unless specified otherwise I use units in which c=G=1). While non-physical, this limit gives an excellent idea of the emerging patterns. The waveform is a Heaviside step function: \begin{equation} \label{eq:theta} h(t, \theta_{\rm v}) = h(\theta_{\rm v}) \mathcal H (t) \ , \end{equation} where $\theta_{\rm v}$ is the angle between the direction of the motion of the particle and the line of sight to the distant observer in the observer's frame of reference (see Fig. \ref{fig:schematic}). \begin{figure} \centerline{\centerline{\includegraphics[width=0.25\textwidth]{Cap4.pdf}}} \caption{A schematic description of the jet. The top shell has reached the final Lorentz factor at a distance $c t_{\rm acc}$ from the origin. The duration of mass injection is $t_{\rm inj}$. A counter-jet is shown in light colors. From ref.[7].} \label{fig:schematic} \end{figure} The Fourier transform is given by \begin{equation} \tilde h(f , \theta_{\rm v}) ={h(\theta_{\rm v})}/{f} \ . \label{eq.FT} \end{equation} The gravitational wave amplitudes $h_{\rm +}$ and $h_{\rm x}$ of the two polarization modes are given by \cite{segalis}: \begin{equation} \label{eq:phase} h^{TT} (\theta_{\rm v}) = h_{\rm +} + i h_{\rm x} = \frac{2 {\cal E} \beta^2}{r} \frac{\sin^2 \theta_{\rm v}}{1-\beta \cos\theta_{\rm v}} e^{2 i \phi} \ , \end{equation} where $\phi$ is an azimuthal angle. For a single point-particle, the phase, $2 i\phi$, can be ignored. When discussing the metric perturbation of an ensemble of particles the complex phase leads to a interference and must be taken into account. The angular dependence of $h(\theta_{\rm v})$ is shown in Fig. \ref{fig:de_dtheta}. It exhibits anti-beaming: the GW amplitude vanishes along its direction of motion. It remains small at a cone around it, reaching 50\% of the maximal values at an opening angle $\Gamma^{-1}$. The function $h(\theta_{\rm v})$ attains a maximum of \begin{equation} h_{\rm max} = \frac{4{G {\cal E}} }{c^4 r} \frac{\Gamma}{\Gamma+1}, \ \ {\rm at } \ \ \theta_{\rm max}= \cos^{-1}[\frac{1+\Gamma}{\beta \Gamma}] \approx \sqrt{\frac{2}{\Gamma}} \ , \label{eq:hmax} \end{equation} where $r$ is the distance to the source and for clarify Newton's constant, $G$, and the speed of light, $c$, have been added to this equation. Interestingly, this relation resembles the classical quadrupole relation for the GW amplitude $h_{\rm max} \propto (G M /c^2 r) (v/c)^2 $ (with $v = c$), even though the quadrupole approximation is not valid in this case. \begin{figure} \centering \centerline{\includegraphics[width=0.5\textwidth]{Antenna1.pdf}} \caption{An antenna pattern for the GW amplitude, h, from an instantenously accelerated point-like jet for different Lorentz factors. $h$ is anti-beamed with an opening angle $\Gamma^{-1}$ around the jet direction. } \label{fig:de_dtheta} \end{figure} The GW energy is beamed in the forward direction (see Fig. \ref{fig:de_dtheta}). 50\% of the GW energy is deposited in a cone with an opening angle $\theta_{50\%} = \sqrt{{2}/{\Gamma}}$. In many cases there are two jets moving in opposite directions. The GW amplitude in this case is the sum of the two signals: \begin{equation} \label{eq:pha} h (\theta_{\rm v}) = \frac{4 {\cal E} \beta^2}{r} \frac{ 1-\cos^2 \theta_{\rm v}}{1-\beta^2 \cos\theta_{\rm v}^2} \ , \end{equation} (see Fig. \ref{fig:twoJets}). This signal is almost flat apart from two narrow {\it anti-beams} of width $\Gamma^{-1}$ along the directions of the jets. The energy is, however, still beamed into two regions of width $\sqrt{2/\Gamma} $ along the jets. Note, that these figures, that the depicts $h(\theta_v)$ are somewhat misleading. While they depict the correct value of $h$ they ignore a critical factor - the characteristic time scale. This time scale that strongly influences the detectability (as well as the energy flux) may varies with $\theta_v$. \begin{figure}[h!] \centerline{\includegraphics[width=0.5\textwidth]{Antenna2.pdf}} \caption{An antenna pattern for the GW amplitude, h, from two opposite jets for different Lorentz factors. h is almost uniform, apart from being anti-beamed with an opening angle $\Gamma^{-1}$ around the jets directions. } \label{fig:twoJets} \end{figure} Recalling Eq. \ref{eq.FT} we note that formally the total GW energy emitted, \begin{equation} \label{eq:egw} E_{\rm GW} = \frac{1}{32 \pi} \iint (\frac{\partial h}{\partial t})^2 dt d\Omega = \frac{1}{32 \pi} \iint \tilde h(f)^2 f^2 d f d\Omega \ , \end{equation} diverges for an instantaneously accelerating particle. This divergence is not physical as it arises from the instantaneous approximation. If the system has a typical timescale $t_{\rm c}$ than there should be an upper cutoff to the frequency above which $h(f)$ decreases with $f$ much faster than $f^{-1}$ and the integral is finite. The overall energy emitted is of order \cite{Leiderschneider}: \begin{equation} E_{\rm GW} = F(\Gamma) [G {\cal E} /c^5 t_{\rm c}] {\cal E} \ , \end{equation} where $F(\Gamma)$ is a function of the jet's final Lorentz boost. $F(\Gamma)$ vanishes when $\beta \rightarrow 0$. When $\Gamma \rightarrow \infty$ the situation is more complicated and in extreme cases we have to take into account the details of the acceleration process to properly estimate the energy emitted. Note that the factor in square brackets is always smaller than unity. \section{Time Scales and the Temporal Structure} The above considerations stress the importance of the characteristic time scale. There are two timescales in the system and the relevant one is of course the longest. The two intrinsic time scales are the injection timescale,$t_{\rm inj} $ that is measured in the observer's rest frame (which is the same as the source rest frame). It characterizes the overall duration of the jet. A second intrinsic time scale, $t_{\rm acc} $, characterizes the acceleration (it is also measured in the source rest frame). The signal is determined by $t_{\rm acc}$ via the arrival time from different angular regions of the jet. The arrival time is related to $t_{\rm acc}$ as: \begin{equation} t_{\rm o}(\theta_{\rm v}) = (1-\beta \cos\Delta \theta_{\rm v}) t_{\rm acc} , \label{eq:t_obs} \end{equation} where $\beta$ is the jet's velocity and $\Delta \theta_{\rm v} = \theta_{\rm v}+\theta_{\rm j} $ is the sum of $\theta_{\rm v}$ and the angular width of the jet, $\theta_{\rm j}$ (see fig:geometry). $ t_{\rm o}$ is the time difference from the observation of the beginning of the acceleration and the the arrival time of the signal from the furthest point of the jet from observer (see Fig. \ref{fig:schematic}). The observed time scale of the GW signal, $t_{\rm c}$, is the longest between $t_{\rm inj} $ and $t_{\rm o}$: \begin{equation} t_{\rm c}(\theta_{\rm v}) = \max(t_{\rm inj},t_{\rm o}) = \max [t_{\rm inj},(1-\beta \cos\Delta \theta_{\rm v}) t_{\rm acc})] \ . \label{eq.to} \end{equation} As $ t_{\rm o}$ depends on the viewing angle, the dominant time scale may be $t_{\rm inj} $ for some observers and $t_{\rm o}$ for others. More specifically, $t_{\rm inj}$ is independent of the viewing angle. On the other hand $t_{\rm o} \ll t_{\rm acc}$ for small viewing angles. Thus unless $t_{\rm acc} $ is very large, $ t_{\rm c} = t_{\rm inj}$ for these angles. However $t_{\rm o}$ becomes significantly larger when $\Delta \theta$ increases and for those angles we may have $ t_{\rm c} = t_{\rm o}$ The Fourier transform of a memory-type signal that is rising to an asymptotic value $h_0 (\theta_{\rm v})$ over a timescale $t_{\rm c} $, has a general shape: \begin{equation} \label{eq:S} \tilde h(f,\theta_{\rm v}) = \begin{cases} {h_0(\theta_{\rm v})}/{f} , & f \leq f_{\rm c} \\ {h_0(\theta_{\rm v}) {g(f/f_{\rm c})} / f_{\rm c} } ,\ \ & f \geq f_{\rm c} \ . \end{cases} \end{equation} The crossover frequency, $f_{\rm c}$, in which the Fourier transform of the GW signal changes its behavior is the reciprocal of the time scale, $t_{\rm c}$: $f_{\rm c} \equiv 1/t_{\rm c}$. The function $g(f/f_{\rm c})$ depends on the nature of the source. It always decreases faster than $(f/f_{\rm c})^{-1}$. As the total GW energy must be finite, the integral $\int_{0} ^\infty {\dot h}^2 (t) dt = \int _0 ^\infty f^2 {\tilde h}^2 (f) df$ yields an asymptotic bound of $g \propto (f/f_{\rm c})^{-\alpha_{\inf}}$ with $\alpha_{\inf} >3/2$. \begin{figure} \centerline{\includegraphics[width=0.6\textwidth]{acc_models.png}} \centerline{\includegraphics[width=0.575\textwidth]{fourier_fireball.png}} \caption{{\it top: }The Fourier transforms, $\tilde h$ of the GW signals from jets with three different acceleration models (with $\Gamma_f = 100$, $\theta_{\rm j} = 0.1$, $\theta_{\rm v} = 0.9$). In all cases $t_{\rm inj}=0$. The time constant of the third model was chosen such that the high-frequency power laws would coincide. {\it Bottom:} The normalized Fourier waveform multiplied by the frequency for jets with the acceleration model $\Gamma \propto R$, based on the numerical code describe in \cite{ofek} for $\Gamma=100$ and $\theta_{\rm j}=0.1$. Below the crossover frequency, $\tilde h(f) \cdot f$ is a constant. From ref.[7].} \label{fig:h} \end{figure} The {spectral density}, $S(f)\equiv \tilde h(f) \cdot \sqrt{f}$, is used to characterize the sensitivity of GW detectors. \begin{equation} \label{eq:crossover} S(f,\theta_{\rm v}) = \begin{cases} {h_0(\theta_{\rm v})}/{f^{1/2}} , & f \leq f_{\rm c} \\ {h_0(\theta_{\rm v}) {g(f/f_{\rm c}) f^{1/2}} / f_{\rm c} } ,\ \ & f \geq f_{\rm c} \ . \end{cases} \end{equation} The spectral density at the crossover frequency, $S(f_{\rm c}) = {h_0(\theta_{\rm v})}/{f_{\rm c}^{1/2}} $, is critical to determine the detectability of the signal. The condition \begin{equation} S_{det} (f )< S(f_{\rm c} ) (f_{\rm c} /f)^{1/2} = h_0(\theta_{\rm v})/{f^{1/2}} \ \ \ {\rm for ~ some~ f,} \label{eq:Sfc} \end{equation} is a necessary condition for detection. For a low-frequency detector (whose typical frequency range is below $f_{\rm c} $) this condition is sufficient. However, it is not sufficient for a high frequency detector as $S(f)$ decreases faster than $f^{-1/2}$ above $f_{\rm c}$. A more detailed discussion of the Fourier transform, $\tilde h(f,\theta_{\rm v})$ and the spectral density is given in ref. [7]. As an example Fig. \ref{fig:h} depicts $\tilde h$ for different jets. \section{The Angular Structure} \begin{figure}[b] \centerline{\includegraphics[width=0.25\textwidth]{Cap_rings2s.pdf}} \caption{A schematic view of the jet (blue) for $\theta_{\rm v} <\theta_{\rm j}$. Due to the symmetry, the contribution to the GW amplitude of the part of the jet that is spherically symmetric around the observer (shown in red ) vanishes. The amplitude from partial rings with $\theta>\theta_{\rm j}-\theta_{\rm v}$, is reduced compared to the amplitude of a point-particle with the same energy and angle to the observer. The jet is symmetric under the transformation $\phi \rightarrow -\phi$: hence, the metric perturbation component $h_{\rm x}$ vanishes identically. From ref.[7].} \label{fig:rings} \end{figure} To explore the effect of the angular width of the jet we consider a thin spherical shell ejected simultaneously and accelerated instantaneously. The shell has a half opening angle $\theta_{\rm j}$ and its center is moving at an angle $\theta_{\rm v}$ relative to the observer. If $\theta_{\rm j} \lesssim \Gamma^{-1}$ the signal converges to the point-particle limit. So in the rest we consider the case of $\Gamma^{-1} \ll \theta_{\rm j}$. Otherwise cancellations between different parts of the shell become significant and the signal becomes weaker with a broader anti-beaming region around the axis. We define the observer's line of sight to the emitting source as the $z$ axis of our coordinate system. The coordinates $\theta$ and $\phi$ are defined in the observer's coordinate system in the usual manner (see Fig. \ref{fig:schematic}). The direction of the center of the jet is $(\theta,\phi)=(\theta_{\rm v} , 0)$ in the observer's frame of reference. The axial symmetry implies a symmetry under the transformation $\phi \rightarrow -\phi$. Therefore, the metric perturbation $h_{\rm x}$ (which is now summed over the shell) vanishes identically (see Eq. \ref{eq:phase}, and Fig. \ref{fig:rings}). In the following, we simply denote $h=h_{\rm +}$, the only non-vanishing component of the metric perturbation tensor. Integrating over the shell we find: \begin{equation} \label{eq:h_int} h_(\theta_{\rm v} , \theta_{\rm j}) =\frac{2{\cal E} \beta^2}{r \Delta \Omega} \int_{|\theta_{\rm v}-\theta_{\rm j}|} ^{min(\theta_{\rm j}+\theta_{\rm v},\pi)} \frac{\sin^3 \theta \cdot \sin 2\Delta \phi}{1-\beta \cos\theta} d\theta \ , \end{equation} where $\Delta \Omega \equiv 2 \pi (1-\cos\theta_{\rm j})$, the solid angle of the cap, and \begin{equation} \label{eq:dphi} \Delta \phi \equiv \cos^{-1} \left[ \frac{\cos \theta_{\rm j}-\cos \theta_{\rm v} \cos\theta}{\sin\theta_{\rm v} \sin\theta} \right] \ . \end{equation} \begin{figure} \centerline{\includegraphics[width=0.5\textwidth]{AntennaShell.pdf}} \caption{Antenna pattern for the GW amplitude, $h$, from an accelerating spherical shells with different opening angles $(\theta_{\rm j}=0.01,0.1,0.3$ - red, blue and black) and different Lorentz factors $(\Gamma=10,100$ - dashed and solid lines). The anti-beaming region is $ \approx 0.84 \ \theta_{\rm j}$. The narrow jet with $\theta_{\rm j}=0.01 \approx \Gamma^{-1}$ behaves like a point particle. For the larger opening angles ($\theta_{\rm j} >\Gamma^{-1}$) the pattern is almost independent of $\Gamma$. } \label{theta_j_vs_pp} \end{figure} Figure \ref{theta_j_vs_pp} depicts the antenna pattern of $h(\theta_{\rm v},\theta_{\rm j})$ for different opening angles. This angular behavior resembles the point-particle result, with a major difference: the anti-beaming region, which was $ \Gamma^{-1}$ in the point-particle case, is now $ \approx 0.84 \ \theta_{\rm j}$ and it is independent of $\Gamma$ (if $\Gamma^{-1}< \theta_{\rm j}$. If the jet is wide the signal is also weaker because of the cancellation of the signals from different parts of the shell. For $\theta_{\rm v} < \theta_{\rm j}$, only the outer region of the shell, with $\theta> \theta_{\rm j} - \theta_{\rm v}$, contributes. The effect is twofold: regions of the shell with $\theta<\theta_{\rm j}-\theta_{\rm v}$ have a vanishing contribution to the amplitude, and even in the outer region, destructive interference between symmetric regions will reduce the GW amplitude. The maximal GW amplitude is now a function of $\theta_{\rm j}$ (compare with Eq. \ref{eq:hmax}). For small opening angles: \begin{equation} h_{\rm max}(\theta_{\rm j}) \approx \frac{4 {\cal E}}{r} (1-\frac{3}{4} \theta_{\rm j}) \ . \end{equation} Like in the case of a point source the GW signal of two sided jets with angular structure will be the sum of the two signals of the form given by Eq. \ref{eq:h_int}. The amplitude of $h$ will be almost isotropic but now with wider anti-beamed regions along the jets directions. Again the energy flux will be predominantly in the forward directions of the two jets. \section{Detectability} \label{sec:detectability} To estimate detectability, we compare the expected spectral density, $S(f)$, to the detector's sensitivity curve that is characterized by $S_{\rm det}(f)$. $S(f)$ is always a decreasing function of the frequency. At low frequencies, namely for $f< f_{\rm c}$, $S(f) \propto f^{-1/2}$. It decreases faster for $f> f_{\rm c}$. A typical low-frequency detector will be most sensitive to a jet-GW signal at the lowest end of its frequency response. Namely, the lowest frequency below which $S_{\rm det}$ is steeper than $f^{-1/2}$. At high-frequencies ($f>f_{\rm c}$) $S \propto f^{-\alpha}$ with $\alpha > 1/2$. A high-frequency detector is most sensitive for this signal at its lowest frequency below which $S_{\rm det}$ is steeper than $f^{-\alpha}$. Like almost any GW source involving a relativistic motion, the maximal amplitude of the jet GW is of order \begin{equation} h \approx \frac{ 4 G {\cal E} }{ c^4 r}\approx 10^{-24} \bigg(\frac{{\cal E}}{10^{51} ~{\rm erg}}\bigg)~\bigg(\frac{100 {\rm Mpc}}{r} \bigg) \ . \label{eq:magnitude} \end{equation} $h= 10^{-24}$ is lower than the sensitivity of current GW detectors. Additionally, as we discuss later, these detectors don't operate in the deciHz frequency range that is relevant for most sources. However, we have to remember that the sensitivity of current and planned detectors is much nearer to this signal than the situation at the early 90ies when efforts to construct LIGO and Virgo begun. For a one-sided jet this estimate is valid for an observer that is at optimal angle, namely at $\theta_{\rm v} \approx \theta_{\rm j}$. For two-sided jets, this estimate is valid for most observers apart from those along the jets ( $\theta_{\rm v} < \theta_{\rm j}$). Different observers may observer different characteristic crossover frequencies (see Eq. \ref{eq.to}). In the following we will focus on observers that are in the forward direction (but not within the anti-beaming cones). \section{Potential Sources} Detection horizons can be obtained by comparing the crossover frequency and amplitude of potential sources with the characteristics frequencies and noise amplitudes of several detectors. Given the uncertainties in the signals and in properties of planned detectors this simple approach is sufficient at this stage. Table 1. summarizes the basic features of the different sources and their detection horizon (assuming the high end of the energy range, a viewing angle near the jet and the most suitable frequency) with different GW detectors. \begin{table}[h] \tbl{Horizon distances of several current and proposed detectors for different sources. Fig. \ref{fig:LIGO} describes the sensitivity curves of LVK, Einstern telscope, BBO and DECIGO. For a moon type detector such as LWGA \cite{LWGA} or LSGA \cite{LSGA} I use sensitivity of $10^{-22} /\sqrt{Hz} $ at $10^{-3}Hz.$ The values are given using optimistic values of the energy (maximal) and the viewing angle (just outside the anti-beaming cone.} {\begin{tabular}{@{}ccccccccc@{}} \toprule & Energy & Frequency & Typical & LVK & Einstien & BBO & DECIGO & Moon\cite{LWGA,LSGA} \\ Source & ${\cal E}$ (erg) & $f_{\rm c}$ (Hz) &Distance & & Telescope & & & detectors \\ \colrule LGRB & $10^{50-52}$ & 0.1-0.01 & 6 Gpc& - & - & Gpc & 500 Mpc & 30 Mpc \\ sGRB & $10^{48-50}$ & 1-10 & 1 Gpc & - & 5 Mpc & 75 Mpc & 50 Mpc & 3 Mpc\\ Sn Jet & $10^{50-51}$ & 0.1-0.01 & 100 Mpc &- & - & 100 Mpc & 50 Mpc & 3 Mpc \\ SGR & $10^{46-47}$ & 0.001 &10 kpc & 2.5 kpc & 25 kpc & 750 kpc & 500 kpc & 10 kpc \\ \botrule \end{tabular}}\begin{tabnote}\end{tabnote}\label{ra_tbl1} \end{table} \begin{figure} \centerline{\includegraphics[width=0.6\textwidth]{Jet-GW-Figs.pdf}} \caption{The estimated spectral density for a fiducial model\cite{Leiderschneider} of GW170817, $S(f)$, compared with the sensitivity thresholds of GW detectors taken from http://gwplotter.com.\cite{Moore_2014} The dotted red line shows the GW emission from a CCSN jet with $10^{51}$erg at 20 Mpc. The dotted black line corresponds to a Galactic SGR flare of $10^{47}$ erg at 10kpc. Adapted with modifications from ref. [7]. } \label{fig:LIGO} \end{figure} \subsection{GRBs} GRB jets that have motivated these ideas\cite{segalis,piran2002} seems to be the most natural sources for these kind of GWs. These powerful ultra-relativistic jets carry up to $10^{52}$ erg (for long GRBs) and $10^{50}$ erg (for short ones). Given the numerous other differences between the two populations (long GRBs are typically detected from larger distances and they have significantly larger $t_{\rm inj}$) we consider each subgroup independently. The crossover frequency is dominated by $t_{\rm inj}$ for both long and short GRBs. Thus, $f_{\rm c}=f_{\it{l}}= 0.1-0.01$ Hz for the long and $f_{\rm c}=f_{\it{s}}=1-10$ Hz for short GRBs. This frequency range puts the events below the frequency limits of current LIGO-Virgo-Kagra, but around the capability of the planned Big Bang Observer (BBO) \cite{BBO} and DECIGO \cite{Decigo}. \subsubsection{Long GRBs} Long GRBs (LGRBs) are associated with Collapsars - collapsing massive stars. Their typical isotropic equivalent energies range from $10^{51-54}$ ergs. When taking into account beaming, which is typically of order $\theta_{\rm j} \approx 0.1-0.2$ rad (but highly uncertain) this corresponds to ${\cal E} \approx 10^{50-52}$ erg. With typical distances of a few Gpc the GW amplitude from a regular LGRBs is quite low $\sim 10^{-26}$. The duration of LGRBs ranges from 2 sec to a few hundred seconds, with typical duration of $\sim 20$ sec. \begin{figure} \centerline{\includegraphics[width=0.6\textwidth]{BATSE_and_TTE.png}} \caption{The averaged Fourier transform of BATSE's long GRBs \cite{Beloborodov}, vs. that of BATSE's TTE short GRB catalogue \cite{Leiderschneider}. Power law fits for are shown in dashed lines. From ref. [7]. } \label{fig:tte} \end{figure} The average power spectrum of the bursts' $\gamma$-rays light curve shows a crossover frequency of $\approx 10^{-2} Hz$ \cite{Beloborodov}. This crossover frequency reflects the overall duration of the bursts. If the duration of the $\gamma$-rays reflects the activity of the central engine (as in the case of internal shocks \cite{kobayashi}) this implies that $t_{\rm inj}$ determines the dominant crossover frequency. This frequency is below what can achieved by any detector built on Earth. It is at the upper end of LISA's\footnote{\url{https://www.elisascience.org/}} bandwidth. However, the expected signal is about thousand times weaker than LISA's planned sensitivity (see Fig. \ref{fig:LIGO}). It falls nicely within the band of the proposed BBO and DEFIGO. However, a regular LGRB at a few Gpc is too far to be detected with the sensitivity reach of either BBO or DECIGO. \subsubsection{Short GRBs and GRB 170817A} Short GRBs are associated with binary neutron star mergers \cite{eichler89}, as demonstrated recently with the observations of GRB 170817A and the associated GW signal GW 170817 \cite{Abbott2017}. With typical energies of $10^{48-50}$ erg, sGRBs are much weaker than LGRBs. Correspondingly they are observed from nearer distances, typically of order 1 Gpc, with the nearest ones at distances of a few hundred Mpc (170817A was much nearer than average). Typical sGRB duration is less than 2 sec. The expected crossover frequency (which is again, presumable, is dominated by $t_{\rm inj}$ and not by $t_{\rm acc}$) is of order 0.5-5 Hz. This is below current terrestrial detectors, it is too low even for the planned frequency band of more advanced detectors like the Einstein telescope\footnote{\url{http://www.et-gw.eu/}}. Once more it falls within the planned frequency range of BBO and DECIGO. Again a typical sGRB at a few hundred Mpc is too far to be detected. The exceptional sGRB, GRB 170817A, was sufficiently nearby that it could have been marginally detected with these advanced detectors. The properties of this well observed event are well known: ${\cal E} \approx 10^{50} $erg, $\theta_{\rm v} \approx 20^o$, $\theta_{\rm j}\approx 5^o$ \cite{Nakar2020}. Other parameters, and in particular $t_{\rm acc} $ and $t_{\rm inj}$ that are most relevant for our analysis, are unknown. The injection duration $t_{\rm inj}$, is not necessarily related to the duration of the observed $\gamma$-rays in this event, as those arose from a cocoon shock breakout \cite{Kasliwal17,Gottlieb18}. In the following we assume that $t_{\rm acc}< t_{\rm inj} \approx 1$ sec. $\Gamma$, is also unknown but it doesn't factor into the result as we expect $\Gamma^{-1} < \theta_{\rm j} ~ 0.1$ rad. Given the viewing angle and the jet angle, GRB 170817A was also ideally positioned in terms of the strength of the GW signal from its jet. That is, we were not within the anti-beamed jet's cone but not too far from it either. The jet-GW of GRB 170717A signal was not detected. This is not surprising. Fig. \ref{fig:LIGO}, depicts the spectral density of GRB170817A compared with the sensitivity thresholds of GW detectors \cite{Moore_2014}. It is below the frequency band of both LIGO and Virgo and also well below their sensitivity. Jet-GW from 170817 would have been detectable by BBO or DECIGO had such detector been operational at the time! \subsection{Hidden jets in Core-Collapse Supernovae (CCSNe) and {\it low-luminosity} GRBs ({\it ll}GRBs)} Shortly after the discovery of the first {\it ll}GRB 980415 (that was associated with SN98bw) it was suggested \cite{Kulkarni98,MacFadyen01,Tan01} that the emission arose from shock breakout following an energetic jet that was choked deep in the accompanying star. Later on it was realized that, while the detection rate of {\it ll}GRBs is much lower than that of regular long ones, their actual rate is orders of magnitude larger \cite{Soderberg06,Bromberg11}. The detection rate is low because, given their low luminosity, they are detected only from relatively short distances. More recently, it was shown\cite{Piran17} that a significant fraction of CCSNe that are not necessarily associated with GRBs contain energetic ($\sim 10^{51}$ erg) choked relativistic jets. Such a jet deposits all its energy into a cocoon. Upon breakout the cocoon material is observed as a high velocity (0.1-0.2c) material that engulfs the supernova and can be observed within the first few days. Such signatures have been detected\cite{Mazzali00} as early as 1997 in SN 1997EF and in several other SNe since then. This suggestion was nicely confirmed with the exquisite observations of this high velocity material in SN 2017iuk\cite{Izzo19,Nakar19}. It is supported by other evidence for jets in SNe \cite{totani2003,Mazzali2005,Maeda2008,Taubenberger2009,grichener2017}. If such relativistic jets are associated with a significant fraction of CCSNe then, as the supernova rate is significantly larger than the GRB rate \cite{Piran_fireball}, we can expect a significan number of relatively nearby jets that would be sources of jet-GWs. Comparing relativistic CCSNe Jets with GRB jets, we estimate a typical CCSN $h$ to be a factor of 10 larger than the one from a typical long GRB. As we don't have a good clue on $t_{\rm inj}$ we assume that it is of the same order as the one estimated in long GRB, namely a few tens of seconds. Thus, the crossover frequency would be around 0.01 Hz. If the event is accompanied by a {\it ll}GRB (arising from the shock breakout of the cocoon) then there will be almost simultaneous EM signal associated with the GW signal (typical delays could be of order of a dozen seconds). However, if the event is not associated with a {\it ll}GRB then the EM counterpart in the form of a supernova will emerge a few hours or even days after the GW signal. \subsection{Giant SGR Flares} \label{sec:SGR} Magnetars with magnetic fields larger than $10^{15}$ Gauss are among the most surprising objects discovered \cite{Kouveliotou1999}. Magnetars eject giant flares while rearranging their whole magnetic field \cite{Eichler02}. Such flares have been observed roughly once per ten years within the Milky Way. The last one, from SGR1806-20 was observed in 2004\cite{Hurley2005,Mereghetti2005,Palmer2005,Terasawa2005}. It involved the acceleration of $\approx 10^{47}$ erg within a few milliseconds. The corresponding frequency is within the range of current GW detectors. With a Galactic distance the signal might be detectable if the initial injection was beamed. If these flares involve a jet of such energy than they could be detected even with current GW detectors up to distances of a few kpc. Proposed more advanced detectors could observe them from the whole Galaxy or even from M31. \subsection{Contribution to the GW background} \label{sec:GWbackground} The relativistic jets that arise from GRBs (both long and short) and hidden jets in SNe produce a background of jet-GW waves at frequency range of $\sim 0.01-1 $Hz depending on the specific source. Both long and short GRBs are rare and won't make a significant contribution to such a background. However, CCSNe take place at a rate of about one per second in the observable Universe. If a significant fraction of SNe harbor energetic jets the time between two such cosmological events, a few seconds, will be comparable to the characteristic time scale of the GW signals from these jets (assuming that the hidden jets in CCSNe are similar in nature to GRB jets). Depending on the ratio of the time between events and the characteristic frequency of the jet-GW signal we expect either a continuous background, as expected from the GW background from merging binary neutron stars, or a pop-corn like signature, as expected for the GW background from merging binary black holes \cite{LIGOstochastic}. With a typical cosmological distance of a few Gpc the corresponding amplitude of this jet-GW background is $h \approx 10^{-26} {\cal E}/(10^{51} {\rm erg})$. With energy input of about $10^{41}$ erg in GW per SNe (see Eq. \ref{eq:egw}) and SN rate of about one per second in the Universe the resulting energy density of GW of this kind in the 0.1 Hz would be $\Omega_{\rm jet-GW}\approx 10^{-9}$. Note, however, that there is an uncertainty of at least an order of magnitude due to the unclear $t_{\rm c}$ of this signal. \section{Discussion} \label{sec:discussion} The acceleration of a jet to a relativistic velocity generates a unique memory type GW signal. The signal is anti-beamed away from the direction of the jet with an anti-beaming angle of $\max(\Gamma^{-1},\theta_{\rm j}$). Like typical relativistic GW sources, the amplitude is of order $G{\cal E}/c^4 r $, corresponding to an amplitude of $h \approx 10^{-24}$ for a jet of $10^{51}$ erg at $100$ Mpc. At low frequencies the signal can be approximated as a step function. This last feature is of course problematic, as it might be difficult to distinguish it from step function type noise sources. At higher frequencies the details of the signal lightcurve could reveal information about the acceleration and collimation of the jet. Prospects for detection of these jet-GWs depend on construction of appropriate future detectors. Jets from different kinds of GRBs as well as hidden jets in CCSNe are expecte in the deciHz range. Hence most important are detectorslike the proposed BBO, DECIGO and several moon detectors (e.g. LWGA, LSGA). Among those sources hidden jets in CCSNe are the best candidates as they are most frequent and as their expected energy is comparable to those of LGRBs. As jet-GWs are anti-beamed we will most likely miss the $\gamma$-rays associated with GRBs from which we will observe these GWs. However, we expect to observe other associated wider signatures such as the afterglow or an accompanying shock breakout signal from the stellar envelope (in case of a LGRB) or from the merger's ejecta (in a sGRB). This shock breakout signal is also be the most likely EM signal associated temporarily with a jet-GW arising from hidden jet in CCSN. In this case the actual SN signal may appear hours later. Table 1 summarizes (under somewhat optimistic assumptions) the detection horizon of different events. Given the large uncertainties I didn't attempt to incorporate possible estimates of detection rates as these will be highly uncertain. Detection prospects with current detectors, LIGO, Virgo and Kagra that are operating at frequencies above 10 Hz are slim, unless giant SGR flare involve jets. In that case we could detect a Galactic event even with LVK. Otherwise we will have to resort of future planned detectors. What is most important is to remember that these signals are memory type. Usually we are not looking for such astrophysical signals. We should make sure to expand GW searches to include such signatures in all future runs. A detection of Jet-GWs would open a new window on jet engines and would reveal features of jet acceleration in the vicinity of black holes that are impossible to explore in any other way. \begin{acknowledgments} The research was supported by an advanced ERC grant TReX. \end{acknowledgments} \bibliographystyle{ws-rv-van}
\section{Introduction} \label{sec:Introduction} Sulphur monoxide (SO) has many experimental and observational applications, making it a molecule of continuing interest in spectroscopic and kinetic studies. SO is an important intermediate in the oxidation of sulphur compounds within combustion reactions, \citep{48Gaydon.book} making SO studies applicable to environmental chemistry since sulphur oxides lead to the acidification/pollution of Earth’s atmosphere.\citep{04Wang,17Thurston,19Pan,11PAN} \citet{87BuLoHa.SO} show the importance of SO within chemical reactions of Earth’s atmosphere due to its high reactivity and chemical involvement with N\tsub{2} and O\tsub{2}. Additionally, UV lasing in SO was demonstrated through optically pumping transitions within the \ensuremath{B\,{}^{3}\Sigma^{-}}\ -- \ensuremath{X\,{}^{3}\Sigma^{-}} electronic band \citep{91MiYaSm.SO} and then later for UV energy storage lasers. \citep{92StCaPo.SO} SO also has astrophysical importance, its Zeeman splitting has been used to probe the magnetic fields of dense star-forming regions, such as the Orion molecular cloud, for field strengths $\geq 10^{-2}$ G \citep{74ClJoxx.SO,17CaLaCo.SO} and its presence within warm chemistry's mean it is an excellent shock tracer. \citep{93ChMaxx.SO, 91AmElEl.SO} The frontier orbitals of SO resemble that of carbon monoxide where the two $\pi^{*}$ valence electrons mean SO has a \ensuremath{X\,{}^{3}\Sigma^{-}}\ ground state similar to O\tsub{2} and S\tsub{2}. Being isoelectronic with O\tsub{2}, SO has two low-lying metastable \ensuremath{a\,{}^{1}\Delta}\ and \ensuremath{b\,{}^{1}\Sigma^{+}}\ states which are relatively short lived due to large spin-orbit coupling. SO has been subject to pure rotational, \citep{94KlBeSa.SO,93Yamamoto.SO, 15MaHiMo.SO} electronic, \citep{68Colin.SO,82Colin.SO,99SeFiRa.SO,86ClTexx.SO,94StCaPo.SO} and ro-vibrational \citep{85KaBuKa.SO,82WoAmBe.SO,88KaTiHi.SO} experimental spectroscopic studies. More recently, \citet{21BeJoLi.SO,22BeJoLi.SO} produced empirical line lists for the $b\,{}^{1}\Sigma^{+}$--$X\,{}^{3}\Sigma^{-}$ and $a\,{}^{1}\Delta$--$X\,{}^{3}\Sigma^{-}$ rovibronic bands and for the $X\,{}^{3}\Sigma^{-}$ and $a\,{}^{1}\Delta$ rovibrational bands of SO. The literature also contains many theoretical studies of SO, the most comprehensive, and one we compare to often, being \citet{11YuBixx.SO} who give spectroscopic constants on all electronic states we consider here (except $(3)^1\Pi$) computed through internally contracted multireference configuration interaction (ic-MRCI) methods using aug-cc-pV5Z basis sets. Another important theoretical work is by \citet{19SaNaxx.SO} who study the UV region of SO non-adiabatically where they compute PECs, DMCs, and non-adiabatic couplings (NACs) for the \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{A\,{}^{3}\Pi}, \ensuremath{B\,{}^{3}\Sigma^{-}}, \ensuremath{C\,{}^{3}\Pi}, \ensuremath{C'\,{}^{3}\Pi}, $(3)^3\Sigma^-$, $(4)^3\Pi$, and $(5)^3\Pi$ states at a MRCI-F12+Q level of theory using aug-cc-pV(5+d)Z basis sets. \citet{19SaNaxx.SO} are also the first to compute cross-sections for SO longer than 190~nm in the UV. Despite the strong experimental, theoretical, and observational baseline for SO, to this date the existing spectroscopic line list data for SO are limited in coverage. HITRAN \citep{HITRAN2012} contains only transitions between electronic states \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}\ and \ensuremath{b\,{}^{1}\Sigma^{+}} considering relatively low vibrational excitations. SO data and spectroscopic databases NIST \citep{NIST} and CDMS \citep{CDMS} contain data covering the microwave region only. In this study we aim to provide a strong theoretical base from which an accurate spectroscopic description of SO with large coverage can be made through the refinement of our \textit{ab initio}\ model to empirically determined energies in a future work. To achieve this we calculate \textit{ab initio}\ potential energy curves (PECs), spin-orbit curves (SOCs), electronic angular momentum curves (EAMCs), and electric (transition) dipole moment curves ((T)DMCs) for the 13 lowest electronic states of SO (\ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A'\,{}^{3}\Delta}, \ensuremath{A''\,{}^{3}\Sigma^{+}}, \ensuremath{A\,{}^{3}\Pi}, \ensuremath{B\,{}^{3}\Sigma^{-}}, \ensuremath{C\,{}^{3}\Pi}, \ensuremath{d\,{}^{1}\Pi}, \ensuremath{e\,{}^{1}\Pi}, \ensuremath{C'\,{}^{3}\Pi}, $(3)^1\Pi$) at an MRCI level of theory using aug-cc-pV5Z basis sets. The relative phases of the the non-diagonal couplings and transition dipole moments provided are fully self-consistent, \citep{14PaHiTe.AlO} which is crucial for reproducible spectroscopic studies. Our \textit{ab initio}\ curves of SO are adiabatic as computed under the Born-Oppenheimer approximation\citep{27BoOpxx.diabat} and so the spatially degenerate states \ensuremath{e\,{}^{1}\Pi}, $(3)^1\Pi$ and \ensuremath{C\,{}^{3}\Pi}, \ensuremath{C'\,{}^{3}\Pi}\ of SO exhibit avoided crossings due to their shared symmetries, where the non-adiabatic effects play important role. The associated non-adiabatic couplings (NACs) arise from the nuclear motion kinetic energy operator acting on electronic wavefunctions and contain first- and second-order differential operators with respect to the nuclear coordinates. Inclusion of NACs within numerical dynamics calculations are computationally costly when using analytical forms for the PECs and couplings because of both the cusp-like nature of PECs and the NACs having singularities at the region of spatial degeneracy. \citep{82MeTrxx.diabat,04JaKeMe.diabat, 18KaBeVa.diabat,21ShVaZo.diabat} This makes the fitting of analytical forms to the PECs and couplings almost impossible. Here we explore a diabatisation procedure to transform the adiabatic basis to the diabatic basis using NACs reconstructed from PECs as opposed to obtaining them \textit{ab initio} \citep{19SaNaxx.SO}, where the adiabatic first-order differential couplings are negligible or vanish, at the cost of inducing off-diagonal potential energy couplings, \citep{81Delos.diabat} or diabatic couplings (DCs).\citep{82MeTrxx.diabat, 04JaKeMe.diabat} In this representation, the electronic wavefunctions are smooth which lessens both numerical problems encountered in calculations within the adiabatic representation and the computational cost in computing NACs. Diabatisation helps recover non-Born-Oppenheimer dynamics \citep{04JaKeMe.diabat,03NaTrxx.diabat} and is important for processes such as collisions between open-shell molecules with spatially degenerate electronic states.\citep{18KaBeVa.diabat, 16KaVaGr.diabat, 14QiJaMi.diabat, 17JaQiMi.diabat, 17DeKaVo.diabat} The importance of the non-adiabatic effects on the spectral properties of SO is analysed. \section{Computational Details} \label{sec:Computational Details} Internally-contracted multi-reference configuration interaction (icMRCI) \textit{ab initio}\ calculations for the 13 lowest states of SO correlating with S(\textsuperscript{3}P) + O(\textsuperscript{3}P), S(\textsuperscript{1}D) + O(\textsuperscript{3}P) and S(\textsuperscript{1}D) + O(\textsuperscript{1}D) were performed using \textsc{Molpro}\ \citep{MOLPRO2015} with aug-cc-pV5Z basis sets\citep{89Dunning.ai, 93WoDuxx}, using molecular orbitals obtained from state-averaged complete active space self-consistent field (CASSCF) calculations. Under $\rm C_{2V}$ point group symmetry all \textit{ab initio}\ calculations started with 14 (8{}$\sigma$, 3{}$\pi_{x}$, 3{}$\pi_{y}$) orbitals which included 6 closed (4{}$\sigma$, 1{}$\pi_{x}$, 1{}$\pi_{y}$) orbitals. The active space occupying 12 active electrons consisted of 8 ($5\sigma$--$8\sigma$,$2\pi, 3\pi$) valence orbitals. The PECs, including the 8 bound states \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A''\,{}^{3}\Sigma^{+}}, \ensuremath{A'\,{}^{3}\Delta}, \ensuremath{A\,{}^{3}\Pi}, and \ensuremath{B\,{}^{3}\Sigma^{-}}\ are shown in Fig.~\ref{fig:ai_PECs}, as well as the adiabatic \ensuremath{e\,{}^{1}\Pi}\ - $(3)^1\Pi$ and \ensuremath{C\,{}^{3}\Pi}\ - \ensuremath{C'\,{}^{3}\Pi}\ systems. The EAMC, SOCs (both diagonal and non-diagonal), DMCs (diagonal and transition) computed and used later for cross-section calculations are shown in Figs.~\ref{fig:ai_LSZ} -- \ref{fig:ai_EAMCs} in the original adiabatic representation as computed by \textsc{Molpro}\ 2015 \citep{MOLPRO2015} (left) and the diabatic representation (right). Further discussion of the diabatisation is given in the next section. \begin{figure}[!] \centering \includegraphics[width=0.48\linewidth]{adi_PECs.png} \includegraphics[width=0.48\linewidth]{dia_PECs.png} \caption{Plots of our computed 13 \textit{ab initio}\ PECs covering the first 7 triplet and 6 singlet electronic states up to $80,000$ cm$^{-1}$\ over inter-nuclear separations 1.0 \AA\ — 4.5 \AA. The adiabatic and diabatic representations of the PECs are shown in the left and right hand panels respectively.} \label{fig:ai_PECs} \end{figure} \begin{figure}[h!] \centering \includegraphics[width=0.48\linewidth]{adi_LSZ.png} \includegraphics[width=0.48\linewidth]{dia_LSZ.png} \caption{\textit{Ab initio}\ spin-orbit curves between states of the same $\Lambda$ (projection of the angular momentum) as a function of bond length. In general, the spin-orbit coupling is strong also between states of different multiplicity. These curves have been multiplied by $-i$ for visual purposes.} \label{fig:ai_LSZ} \end{figure} \begin{figure}[h!] \centering \includegraphics[width=0.48\linewidth]{adi_LSX.png} \includegraphics[width=0.48\linewidth]{dia_LSX.png} \caption{\textit{Ab initio}\ spin-orbit MOLRPO matrix elements in the adiabatic (left) and diabatic (right) representations between states of different values of $\Lambda$ as a function of bond length. These curves have been multiplied by $-i$ for visual purposes.} \label{fig:ai_LSX} \end{figure} \begin{figure}[h!] \centering \includegraphics[width=0.48\linewidth]{adi_DMZ.png} \includegraphics[width=0.48\linewidth]{dia_DMZ.png} \caption{\textit{Ab initio}\ (transition) dipole moment matrix elements (Debye) between states of the same symmetry ($\Lambda$ and multiplicity) in the adiabatic (left) and diabatic (right) representations as a function of the bond length (\AA).} \label{fig:ai_DMZ} \end{figure} \begin{figure}[h!] \centering \includegraphics[width=0.48\linewidth]{adi_DMY.png} \includegraphics[width=0.48\linewidth]{dia_DMY.png} \caption{\textit{Ab initio}\ transition dipole moment curves (Debye) between states of different symmetry in the adiabatic (left) and diabatic (right) representations as a function of the bond length (\AA).} \label{fig:ai_DMY} \end{figure} \begin{figure}[h!] \centering \includegraphics[width=0.48\linewidth]{adi_LX.png} \includegraphics[width=0.48\linewidth]{dia_LX.png} \caption{\textit{Ab initio}\ electronic angular momentum curves in the adiabatic (left) and diabatic (right) representation plotted over bond length. $L_x$ means the $x$-component of the electronic angular momentum. These curves have been multiplied by $(-i)$ for visual purposes.} \label{fig:ai_EAMCs} \end{figure} \section{Diabatisation} \label{sec:Diabatisation} \subsection{Non-adiabatic couplings (NACs)} \label{subsec:NACs} The commonly employed Born-Oppenheimer approximation assumes the nuclear dynamics evolve adiabatically on a single, uncoupled electronic potential energy surface. This results in the appearance of avoided crossings between electronic states that are degenerate in energy at some geometry and large gradients in couplings connecting these states. The Born-Huang expansion \citep{88BoHuxx.book} allows one to recover the non-adiabatic behaviour in the region of the avoided crossing by including non-adiabatic couplings (NACs) which introduce off-diagonal kinetic energy terms in the molecular Hamiltonian. An alternative approach is to transform the electronic Hamiltonian to the diabatic basis, where electronic states are coupled via off-diagonal potential energy terms, termed diabatic couplings (DCs).\citep{81Delos.diabat, 82MeTrxx.diabat, 04JaKeMe.diabat} The transformation from the adiabatic to the diabatic basis is described by a unitary matrix $U$, which is parametrically dependent on the NAC term, \begin{gather} {\bf U}(\beta(R))= \begin{bmatrix} \cos(\beta(R)) & -\sin(\beta(R)) \\ \sin(\beta(R)) & \cos(\beta(R)) \end{bmatrix}, \label{eq:U(beta)} \end{gather} where the mixing angle $\beta(R)$ is obtained by integrating the functional form of the non-adiabatic derivative coupling $\phi_{12}(R) := \bra{\psi_1}\frac{d}{dR}\ket{\psi_2}$ \citep{99SiHaWe.diabat, 15AnBaxx.diabat, 17BaAnxx.diabat,18KaBeVa.diabat} \begin{equation} \label{eq:beta(R)} \beta(R)= \int^{R}_{-\infty} \phi_{12}(R') dR' \end{equation} with $\ket{\psi_1}$ and $\ket{\psi_2}$ as the lower and upper energy electronic wavefunctions in the adiabatic representation. Writing the two-state electronic Hamiltonian in terms of the adiabatic potential energy curves $V^{\rm a}_1(R)$ and $V^{\rm a}_2(R)$, \begin{equation} {\bf V}^{\rm a}(R)= \begin{pmatrix} \centering V^{\rm a}_1(R) & 0\\ 0 & V^{\rm a}_2(R) \end{pmatrix}, \end{equation} One can obtain the diabatic Hamiltonian by applying the unitary transformation ${\bf U}(\beta(R))$, \begin{multline} {\bf V}^{\rm d}(R) = {\bf U^\dagger}{\bf V}^{\rm a}(R){\bf U} = \begin{pmatrix} \centering V^{\rm d}_1(R) & V^{\rm d}_{12}(R)\\ V^{\rm d}_{12}(R) & V^{\rm d}_2(R) \end{pmatrix} = \\ \begin{bmatrix} V^{\rm a}_1 \cos^2\beta + V^{\rm a}_2 \sin^2\beta & \frac{1}{2} (V^{\rm a}_{2}-V^{\rm a}_{1}) \sin(2\beta) \\ \frac{1}{2} (V^{\rm a}_{2}-V^{\rm a}_{1}) \sin(2\beta) & V^{\rm a}_1 \sin^2\beta + V^{\rm a}_2 \cos^2\beta \label{eq:dia_V} \end{bmatrix}, \end{multline} where the superscripts `d' and `a' refer to the diabatic and adiabatic bases, respectively, and the off-diagonal elements $V^{\rm d}_{12}(R)$ are the DCs. The reverse transformation is obtained by diagonalising the diabatic representation of the electronic Hamiltonian. The NAC can be computed via quantum-chemistry methods from the electronic wavefunctions, as done by \citet{19SaNaxx.SO} for SO. It is symmetrical with a cusp at the crossing point $R_{\rm c}$. Alternatively, the NAC curves are modelled using, e.g. a Lorentzian,\citep{81WeMexx.diabat} as given by \begin{equation} \phi_{ij}(R) = \phi^{\rm Lo}_{ij}(R;\alpha,R_{\rm c}) = \frac{1}{2}\frac{\alpha}{1+\alpha^2(R-R_{\rm c})^2}, \label{eq:lorentzian} \end{equation} where $\alpha$ is the inverse half-width-at-half-maximum (HWHM), or a Laplacian \begin{equation} \phi_{ij}(R)=\phi^{\rm La}_{ij}(R;\gamma, R_{\rm c}) = \frac{\pi}{4\gamma}\exp\left[-\frac{|R-R_{\rm c}|}{\gamma}\right], \label{eq:laplacian} \end{equation} where $\gamma$ is a damping constant related to the HWHM, superscripts `Lo' and `La' mean Lorentzian and Laplacian respectively, and the normalisation \(\int_{-\infty}^{\infty} \phi_{12}(R) \,dR\) = $\pi/2$ is applied. Figure~\ref{fig:NAC_MixAng_comparison} illustrates the \ensuremath{C\,{}^{3}\Pi}\ --\ensuremath{C'\,{}^{3}\Pi}\ NAC modelled in this work using a Lorentzian and Laplacian function. The mixing angle $\beta(R)$, determined through Eq.~\eqref{eq:beta(R)}, ranges from 0 to $\pi/2$ going through $\pi/4$ at the crossing point $R=R_{\rm c}$ can also be seen in Fig.~\ref{fig:NAC_MixAng_comparison}. The Lorentzian was shown to provide a good description of the \textit{ab initio}\ NACs around the crossing point \citep{09Varandas.diabat, 11MoVaxx.diabat, 15AnBaxx.diabat, 17BaAnxx.diabat} (see Fig.~\ref{fig:NAC_MixAng_comparison}) but diverges at large distances $R$ from $R_{\rm c}$ causing improper shaped diabatic PECs by decaying too slowly. \citep{15AnBaxx.diabat,17BaAnxx.diabat, 09Varandas.diabat, 11Varandas.diabat} It has been discussed that some damping functions can be introduced to correct the Lorentzian's slow decay using properties such as dipole moments, but determination of their fitting parameters is both difficult and requires extra calculations. \citep{09Varandas.diabat,81WeMexx.diabat} Laplacians underestimate NACs far in the wings and overestimate them near the crossing point. \citep{15AnBaxx.diabat} One can show that NACs have an overlap dependence on the internuclear separation, \citep{09Varandas.diabat,09Vaxxxx.diabat} $R$, which is given properly by a Laplacian. \citep{15AnBaxx.diabat} The undesirable features of these NAC models can be mitigated by their combination \citep{15AnBaxx.diabat,17BaAnxx.diabat, 09Varandas.diabat, 11Varandas.diabat} to which we base our diabatisation procedure on. Our method of augmenting the Lorentzian with a Laplacian is discussed in section \ref{subsec:Diabatisation}. \subsection{Diabatisation} \label{subsec:Diabatisation} Here we explore the so-called `property based diabatisation' method \citep{18KaBeVa.diabat} and construct diabatic potentials using the condition of having no avoiding crossing, which we define as to minimise their second derivatives in the vicinity of the crossing point $R_{\rm c}$: \begin{equation} \mathcal{F}=\sum_R \frac{d^2V_i^{\rm d}(R)}{dR^2} \to 0, \label{eq:property_based_condition} \end{equation} hence creating the smoothest PECs $V^{\rm d}_1(R)$ and $V^{\rm d}_2(R)$. In order to mitigate the undesirable properties of the Lorentzian and Laplacian functional forms, we follow the approach by \citet{15AnBaxx.diabat} and represent the mixing angle $\beta$ by the following combination of the mixing angles determined from the Lorentzian and Laplacian NACs in Eq.(\ref{eq:beta(R)}), $\beta^{\rm Lo}(R)$ and $\beta^{\rm La}(R)$ \begin{equation} \beta^{\rm ga}_{ij}(R)=\frac{1}{2}\arcsin{\left[\sqrt{\sin(2\beta^{\rm Lo}_{ij}(R))\sin(2\beta^{\rm La}_{ij}(R))}\right]}, \label{eq:beta_ga} \end{equation} where the `ga' superscript refers to the geometrically averaged diabatic mixing angle (See Fig.~\ref{fig:NAC_MixAng_comparison}). Equation \eqref{eq:beta_ga} must not be taken as the geometric average of $\beta^{\rm Lo}$ and $\beta^{\rm La}$, but rather originates from the simple geometric average of $V^{\rm Lo}_{12}$ and $V^{\rm La}_{12}$ (see \citet{15AnBaxx.diabat} and Appendix). \citet{15AnBaxx.diabat} also showed that an optimal relation between the parameters $\alpha$ and $\gamma$ exists which given by \begin{equation} \alpha \times \gamma = 1.397 \label{eq:alpha gamma relation} \end{equation} providing maximal overlap between the Lorentzian and Laplacian functions over the bond length. Where our method diverges from that of \citet{15AnBaxx.diabat} is in the determination of the crossing point $R_{\rm c}$ and the Lorentzian parameter $\alpha$. \citet{15AnBaxx.diabat} obtained $R_{\rm c}$ and $\alpha$ through fitting a Lorentzian to a NAC computed with \textsc{Molpro}. Instead, we determine a set of parameters $\{R_{\rm c}, \alpha \}$ by fulfilling the condition given in Eq.~\eqref{eq:property_based_condition}, to which the Laplacian parameter $\gamma$ is instantly obtained through Eq.~\eqref{eq:alpha gamma relation}. Using the theory developed in section \ref{subsec:NACs} and Eq.~(\ref{eq:beta_ga}) the diabatising transformation $\boldsymbol{U}^{\rm ga}$ corresponding to the `geometrically averaged' NAC is found. With this the diabatic potential energies and DC elements can be obtained through the simple matrix transformation in Eq.(\ref{eq:dia_V}). The diabatic PECs for SO can be seen in Fig.~\ref{fig:ai_PECs} and a closeup of the avoided crossings between the \ensuremath{e\,{}^{1}\Pi}\ - $(3)^1\Pi$ and \ensuremath{C\,{}^{3}\Pi}\ - \ensuremath{C'\,{}^{3}\Pi}\ states of SO superimposed with their DCs, $V^{\rm ga}_{ij}$, and NACs, $\phi^{\rm ga}_{ij}$, are illustrated in Fig.~\ref{fig:DCs}. Figure \ref{fig:DCs} shows that the pair of singlet states are coupled more strongly than the triplet states, and also reveals the DCs to be slightly asymmetric. This is to be expected since the DCs depend on the difference $V^{\rm a}_2-V^{\rm a}_1$ which can be asymmetrical in nature. We see an effect of this especially in the DC between the triplet states where the adiabatic PEC turning points are offset to each other by $\sim 0.01$~\AA. \begin{figure}[h!] \centering \includegraphics[width=0.48\linewidth]{NAC.png} \includegraphics[width=0.48\linewidth]{MixAng.png} \caption{Comparison of example NACs ($\phi_{ij}$) and corresponding diabatic mixing angles ($\beta$) between the Lorentzian (`Lo'), Laplacian (`La'), and geometrically averaged (`ga') cases as described in the text. These curves are computed for the \ensuremath{C\,{}^{3}\Pi}\ and \ensuremath{C'\,{}^{3}\Pi}\ non-adiabatic interaction (see section \ref{subsubsec:PEC} and Fig.~\ref{fig:ai_PECs}).} \label{fig:NAC_MixAng_comparison} \end{figure} \begin{figure}[h!] \centering \includegraphics[width=0.49\linewidth]{C_Cp_NAC_crossing.png} \includegraphics[width=0.49\linewidth]{e_3_NAC_crossing.png} \includegraphics[width=0.49\linewidth]{C_Cp_DC_crossing.png} \includegraphics[width=0.49\linewidth]{e_3_DC_crossing.png} \caption{Illustration of the avoided crossings between \ensuremath{e\,{}^{1}\Pi}\ - $(3)^1\Pi$ and (right panels) and \ensuremath{C\,{}^{3}\Pi}\ - \ensuremath{C'\,{}^{3}\Pi}\ states of SO (left panels) are shown, where adiabatic PECs are presented as dashed lines and diabatic ones in solid lines. Superimposed are the DCs ($V^{\rm ga}_{12}$, bottom panels), and NACs ($\phi^{\rm ga}_{ij}$, top panels).} \label{fig:DCs} \end{figure} \subsubsection{Potential Energy Curves} \label{subsubsec:PEC} Figure~\ref{fig:ai_PECs} presents \textit{ab initio}\ PECs of the 13 lowest energy electronic states of SO. The \ensuremath{C\,{}^{3}\Pi}\ exhibits an avoided crossing at $R$ $\sim$ 2.05~\AA\ due to a non-adiabatic coupling with the dissociative \ensuremath{C'\,{}^{3}\Pi}, which lends a dissociative character to the \ensuremath{C\,{}^{3}\Pi}\ in the long-range region. Similarly, the \ensuremath{e\,{}^{1}\Pi}\ state exhibits an avoided crossing at 1.95~\AA, due to the singlet state $(3)^1\Pi$.\citep{11YuBixx.SO} These non-adiabatic interactions produce large gradients in coupling curves connecting these states within the region of the avoided crossing, as shown for EAMCs, SOC, and DMCs in Figs.~\ref{fig:ai_LSZ}--\ref{fig:ai_EAMCs}. The equilibrium geometry of the \ensuremath{C\,{}^{3}\Pi}\ state also lies very close in energy to those of the \ensuremath{d\,{}^{1}\Pi}\ and \ensuremath{B\,{}^{3}\Sigma^{-}}\ states, and so we can expect perturbations in the energy levels around their minima which was reported and confirmed experimentally by \citet{06LiElWe.SO} It is worth noting that the \ensuremath{A'\,{}^{3}\Delta}\ and \ensuremath{A''\,{}^{3}\Sigma^{+}}\ states lie very close across the range of nuclear geometries included in these calculations, but do not cross. Table \ref{tab:NAC params} provides values for the optimized NAC parameters $\alpha, \gamma, R_{\rm c}$ used to diabatise the energy degenerate pairs, which are visualised in Fig.~\ref{fig:DCs}. We see that the effect of diabatisation is to smooth the PECs, as enforced by Eq.\eqref{eq:property_based_condition} with no avoided-crossing. The non-Born-Oppenheimer dynamics, initially manifested in the nuclear kintetic energy, has been rotated into the potential and coupling terms connecting the non-adiabatically interacting states. We now produce PECs that can be easily modelled by analytical forms in the diabatic representation, allowing us to tune them to experimental data in a future study where we aim to produce an empirically accurate line list. \begin{table} \footnotesize \centering \caption{Optimised parameters $\alpha$ (inverse Lorentzian HWHM), $\gamma$ (Laplacian damping parameter), and $R_{\rm c}$ (avoided crossing/centroid position) for the Lorentzian and Laplacian NACs used to diabatise the \ensuremath{e\,{}^{1}\Pi}\ and \ensuremath{C\,{}^{3}\Pi}\ state PECs (see Fig.~\ref{fig:ai_PECs}).} \label{tab:NAC params} \begin{tabular}{lccc} \hline State & $\alpha$ & $\gamma$ & $R_{\rm c}$ (\AA) \\ \hline\hline \ensuremath{e\,{}^{1}\Pi} & 52.422 & 0.027 & 1.949 \\ \ensuremath{C\,{}^{3}\Pi} & 39.859 & 0.035 & 2.047\\ \hline \end{tabular} \end{table} Table \ref{tab:PEC-params} compares the equilibrium potential energies, $T_{\rm e}$ ($\rm cm^{-1}$), equilibrium bond lengths, $R_{\rm e}$ (\AA), and dissociation energies, $D_{\rm e}$ (eV), of the 11 lowest singlet and triplet states of SO determined directly from the \textit{ab initio}\ adiabatic PECs presented in Fig.~\ref{fig:ai_PECs} to both calculations \citep{19SaNaxx.SO,11YuBixx.SO,00BoOrxx.SO, 00ArElWe.SO, 99BoOrxx.SO} and experiment.\citep{21BeJoLi.SO,79HeHuxx.book, 89Norwood.SO, 00ArElWe.SO, 05WaTaZh.SO} Our bond lengths show good agreement to both theoretical and empirical values, with better agreement to experiment than previous calculations for the \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{A\,{}^{3}\Pi}, and \ensuremath{d\,{}^{1}\Pi}\ states. Worse agreements are seen for our $T_{\rm e}$ values, the most accurate being $T_{\rm e}(\ensuremath{A\,{}^{3}\Pi})$, $T_{\rm e}(\ensuremath{C\,{}^{3}\Pi})$, and $T_{\rm e}(\ensuremath{e\,{}^{1}\Pi})$ within \wav{152}, \wav{210}, and \wav{338} of experiment respectively. Lastly, we see worse agreements between our \textit{ab initio}\ dissociation energies to both experiment and calculations, to which we underestimate. It is apparent that our dissociation asymptotes are the major source of inaccuracy in our \textit{ab initio}\ SO model and probably arise because we do not include Sulfur specific diffuse functions in our basis set during \textit{ab initio}\ calculations. A future goal will be to mitigate the undesirable PEC features by refining our \textit{ab initio}\ model to experimental transition data, to which we will address when producing the final SO line list. We note that the reported \citet{21BeJoLi.SO} $R_{\rm e}$ values in Table \ref{tab:PEC-params} were derived from the $B_{\nu = 0 }$ rotational constant, and show close agreements to within \wav{0.006} \AA\ and \wav{0.002} \AA\ to our bond lengths for the \ensuremath{a\,{}^{1}\Delta}\ and \ensuremath{b\,{}^{1}\Sigma^{+}}\ respectively. Our fundamental vibrational energy of the \ensuremath{X\,{}^{3}\Sigma^{-}}\ state is found approximately \wav{30} too high from the experiment, which is to be expected with MRCI calculations, and provides insight to the accuracy of the other computed states and couplings, which will also require empirical tuning. The intersections between states of different symmetries obtained in our calculations can be seen in Fig.~\ref{fig:ai_PEC_closeup}. The \ensuremath{d\,{}^{1}\Pi}\ and \ensuremath{C\,{}^{3}\Pi}\ states cross at 1.59 and 1.82~\AA, \ensuremath{d\,{}^{1}\Pi}\ and \ensuremath{B\,{}^{3}\Sigma^{-}}\ at 1.64 and 2.20 \AA, both agreeing with \citet{11YuBixx.SO} intersection locations of 1.62 and 1.80 \AA\ and 1.60 and 2.14 \AA, respectively. The intersection of the \ensuremath{e\,{}^{1}\Pi}\ with the \ensuremath{B\,{}^{3}\Sigma^{-}}\ state occurs at 2.4~\AA\ in our calculations, somewhat larger than the value of 2.3~\AA\ reported by \citet{11YuBixx.SO}. Since the \ensuremath{e\,{}^{1}\Pi}\ and \ensuremath{d\,{}^{1}\Pi}\ states become repulsive at 1.92~\AA\ and 1.9~\AA\ respectively, crossings beyond these geometries provide potential predissociation pathways for the \ensuremath{C\,{}^{3}\Pi}\ and \ensuremath{B\,{}^{3}\Sigma^{-}}\ states. \citet{11YuBixx.SO} also show that the \ensuremath{C'\,{}^{3}\Pi}\ state crosses the \ensuremath{B\,{}^{3}\Sigma^{-}}\ state at 2.25~\AA, to which they state predissociation of \ensuremath{B\,{}^{3}\Sigma^{-}}\ through this \ensuremath{C'\,{}^{3}\Pi}\ state is possible. \citet{19SaNaxx.SO} also give intersections $R(C,B)=1.57, 2.21$ \AA\ as opposed to our values of $R(C,B)=1.67, 2.18$ \AA. Lastly, we report further crossings between the \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A'\,{}^{3}\Delta}, and \ensuremath{A''\,{}^{3}\Sigma^{+}}\ states and the \ensuremath{A\,{}^{3}\Pi}\ and \ensuremath{d\,{}^{1}\Pi}\ states of SO at $R(c,A)$ = {1.46}~{\AA}, $R(A',A)$ = {1.48}~{\AA}, $R(A'',A)$ = {1.50}~{\AA}, $R(c,d)$ = {1.40}~{\AA}, $R(A',d)$ = {1.42}~{\AA}, and $R(A'',d)$ = {1.43}~{\AA}. These crossings agree with those reported by \citet{11YuBixx.SO} between \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A'\,{}^{3}\Delta}, and \ensuremath{A''\,{}^{3}\Sigma^{+}} with \ensuremath{A\,{}^{3}\Pi}\ in the region {1.47}--{1.51}~{\AA} and crossings between \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A'\,{}^{3}\Delta}, \ensuremath{A''\,{}^{3}\Sigma^{+}}\ with \ensuremath{d\,{}^{1}\Pi}\ in the region {1.42}--{1.45}~{\AA}. \begin{table*}[h] \footnotesize \centering \caption{Comparison of \textit{ab initio}\ values of the equilibrium potential energies $T_{\rm e}$ ($\rm cm^{-1}$), the dissociation energy $D_{\rm e}$ (eV) to the adiabatically correlated asymptotes, and equilibrium bond length $R_{\rm e}$ (\AA) from this work to the values from the literature. Parameters next to bold state symbols correspond to the \textit{ab initio}\ PECs calculated in this study. Calculations \citep{11YuBixx.SO,00BoOrxx.SO, 00ArElWe.SO, 99BoOrxx.SO} use the MRCI/cc-aug-pV5Z level of theory, calculation by \citet{19SaNaxx.SO} use the MRCI-F12+Q/cc-aug-pV(5+d)Z level of theory, and experiments are Photoion-Photoelectron Coincidence, \citep{89Norwood.SO} Multiphoton Ionization\citep{00ArElWe.SO} and $\rm Ar+SO_2$ afterglow, \citep{05WaTaZh.SO} spectroscopes as well as from the recent analysis by \citet{21BeJoLi.SO}.} \label{tab:PEC-params} \begin{tabular}{lSSS|lSSS} \hline \multicolumn{1}{l}{State} & \multicolumn{1}{l}{$T_{\rm e}$ ($\rm cm^{-1}$)} & \multicolumn{1}{r}{$D_{\rm e}$ (eV)} & \multicolumn{1}{r}{$R_{\rm e}$ (\AA)} & \multicolumn{1}{|l}{State} & \multicolumn{1}{l}{$T_{\rm e}$ ($\rm cm^{-1}$)} & \multicolumn{1}{r}{$D_{\rm e}$ (eV)} & \multicolumn{1}{r}{$R_{\rm e}$ (\AA)} \\ \hline\hline $\boldsymbol{\ensuremath{X\,{}^{3}\Sigma^{-}}}$ & 0 & 5.1253 & 1.4821 & $\boldsymbol{\ensuremath{A'\,{}^{3}\Delta}}$ & 29097.8878 & 1.503 & 1.7571 \\ Calc.\citep{11YuBixx.SO} & 0 & 5.418 & 1.4865 & Calc.\citep{11YuBixx.SO} & 29828 & 1.72 & 1.7649 \\ Expt.\citep{79HeHuxx.book} & & 5.429 & 1.481 & $\boldsymbol{\ensuremath{B\,{}^{3}\Sigma^{-}}}$ & 43255.0097 & 0.9212 & 1.8121 \\ Calc.\citep{19SaNaxx.SO} & 0 & 5.475 & 1.4925 & Calc.\citep{19SaNaxx.SO} & 41706.5886 & 1.4022 & 1.7868 \\ Expt.\citep{89Norwood.SO} & & & 1.481 & Calc.\citep{11YuBixx.SO} & 41314 & 1.387 & 1.782 \\ Calc.\citep{00BoOrxx.SO} & & & 1.481 & Expt.\citep{89Norwood.SO} & 41629 & 1.410\citep{13Rosen.book} & 1.775 \\ Calc.\citep{99BoOrxx.SO} & & & 1.493 & Calc.\citep{99BoOrxx.SO} & 41206 & & 1.794 \\ $\boldsymbol{\ensuremath{a\,{}^{1}\Delta}}$ & 5479.8013 & 4.4486 & 1.4979 & $\boldsymbol{\ensuremath{d\,{}^{1}\Pi}}$ & 45309.0766 & 0.0587 & 1.545 \\ Calc.\citep{11YuBixx.SO} & 5936 & 4.682 & 1.4945 & Calc.\citep{11YuBixx.SO} & 44166 & 0.189 & 1.5475 \\ Expt.\citep{79HeHuxx.book} & 5873 & 4.647 & 1.4919 & Expt.\citep{00ArElWe.SO} & 43902 & 0.195 & 1.5303 \\ Calc.\citep{99BoOrxx.SO} & 5883 & & 1.502 & Calc.\citep{99BoOrxx.SO} & 44975 & 0.059 & 1.723 \\ Expt. \citep{21BeJoLi.SO} & & & 1.4920 & Calc.\citep{00ArElWe.SO} & 44471 & 0.14 & 1.553 \\ $\boldsymbol{\ensuremath{b\,{}^{1}\Sigma^{+}}}$ & 9774.1938 & 3.9154 & 1.5057 & $\boldsymbol{\ensuremath{A''\,{}^{3}\Sigma^{+}}}$ & 29731.2077 & 1.4417 & 1.765 \\ Calc.\citep{11YuBixx.SO} & 10548 & 4.112 & 1.5062 & Calc.\citep{11YuBixx.SO} & 30495 & 1.637 & 1.7701 \\ Expt.\citep{79HeHuxx.book} & 10510 & 4.137 & 1.5001 & Expt.\citep{05WaTaZh.SO} & 30692 & & \\ Calc.\citep{99BoOrxx.SO} & 10576 & & 1.514 & Calc.\citep{99BoOrxx.SO} & 30025 & & 1.776 \\ Expt. \citep{21BeJoLi.SO} & & & 1.5035 & $\boldsymbol{\ensuremath{C\,{}^{3}\Pi}}$ & 44719.2593 & 0.5489 & 1.6786 \\ $\boldsymbol{\ensuremath{A\,{}^{3}\Pi}}$ & 38607.6737 & 0.4246 & 1.6079 & Calc.\citep{11YuBixx.SO} & 44033 & 0.609 & 1.6692 \\ Calc.\citep{19SaNaxx.SO} & 38879.2948 & 0.6441 & 1.5946 & Calc.\citep{19SaNaxx.SO} & 44909.0901 & 0.6027 & 1.6727 \\ Calc.\citep{11YuBixx.SO} & 38334 & 0.665 & 1.6196 & Expt.\citep{00ArElWe.SO} & 44381 & & 1.654 \\ Expt.\citep{79HeHuxx.book} & 38455 & 0.662 & 1.609 & Calc.\citep{99BoOrxx.SO} & 44038 & & 1.681 \\ Calc.\citep{00BoOrxx.SO} & 38880 & & 1.613 & $\boldsymbol{\ensuremath{e\,{}^{1}\Pi}}$ & 51347.9346 & 0.4524 & 1.6864 \\ Calc.\citep{99BoOrxx.SO} & 38931 & & 1.719 & Calc.\citep{11YuBixx.SO} & 51224 & 0.45 & 1.6826 \\ $\boldsymbol{\ensuremath{c\,{}^{1}\Sigma^{-}}}$ & 27274.9752 & 1.7679 & 1.7571 & Expt.\citep{00ArElWe.SO} & 51558 & & 1.6774 \\ Calc.\citep{11YuBixx.SO} & 28544 & 1.879 & 1.7617 & Calc.\citep{99BoOrxx.SO} & 51258 & & 1.685 \\ \hline \end{tabular} \end{table*} \begin{figure}[!ht] \centering \includegraphics[width=\linewidth]{PEC_closeup.png} \caption{Our \textit{ab initio}\ PECs in the region 37,000 – 57,000 cm$^{-1}$\ showcasing the various state crossings.} \label{fig:ai_PEC_closeup} \end{figure} \subsubsection{Spin-Orbit and Electronic Angular Momentum Curves} \label{subsubsec:SOCs} Figure \ref{fig:ai_EAMCs} shows the EAMCs of SO both in the adiabatic and diabatic representations, where their relative phases are carefully maintained according with their \textit{ab initio}\ values \citep{14PaHiTe.AlO}. Without this, using couplings and any other non-diagonal properties in rovibronic calculations become meaningless. The phase of the EAMCs often changes after the crossing point, lending different long-range total angular momenta of the S+O atomic system important in dissociation mechanisms. Figures \ref{fig:ai_LSZ} and \ref{fig:ai_LSX} plot the $z$ (${\rm SO}_z$) and $x$ (${\rm SO}_x$) components of the spin-orbit curves of SO over nuclear geometries where the former couple states of same values of $\Lambda$ (projection of the electronic angular momentum) and the latter couple states of different $\Lambda$. We see again that the effect of diabatisation is to smooth out the curves over $R$, where avoided crossings in the adiabatic picture create steep gradients around the avoided crossing. An example of the diabatisation process can be seen for the \brkt{\ensuremath{e\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}} and \brkt{(3)^1\Pi}{{\rm SO}_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}} pair in Fig.~\ref{fig:ai_LSX:evolve}. Spin-orbit matrix elements at the internuclear separation of the PEC crossings are important in determining the possible spin-orbit induced predissociation mechanisms that occur between states of different spin multiplicity\citep{11YuBixx.SO} (see discussion below). Referring to the spin-orbit couplings \brkt{\ensuremath{e\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{B\,{}^{3}\Sigma^{-}}} and \brkt{\ensuremath{d\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{B\,{}^{3}\Sigma^{-}}} in Fig. \ref{fig:ai_LSX} with the magnitudes of approximately 90 and {20}--{30}~{cm$^{-1}$}, respectively, the predissociation of the \ensuremath{B\,{}^{3}\Sigma^{-}}\ state through \ensuremath{d\,{}^{1}\Pi}\ is likely to be very weak, but will be stronger through the \ensuremath{e\,{}^{1}\Pi}\ state. The construction of diabatic SOCs will hence influence the efficiency of pre-dissociation pathways between states of different symmetry. \begin{figure}[h!] \centering \includegraphics[width=\linewidth]{LSX_diabat_example.png} \caption{The diabatisation process for the curves $\bra{\ensuremath{e\,{}^{1}\Pi}}{\rm SO}_x\ket{\ensuremath{X\,{}^{3}\Sigma^{-}}}$ and $\bra{(3)^1\Pi}{\rm SO}_x\ket{\ensuremath{X\,{}^{3}\Sigma^{-}}}$, which become smooth as a result of the diabatisation. These curves have been multiplied by $-i$ for visual purposes.} \label{fig:ai_LSX:evolve} \end{figure} \begin{table*}[h!] \centering \caption{$\Sigma$ values (total spin angular momentum projection onto the internuclear axis) for the bra and ket electronic states of the SOCs presented in Figs. [\ref{fig:ai_LSZ}, \ref{fig:ai_LSX}]. } \label{tab:SOC Sigma} \begin{tabular}{ccccccccc} \hline SO coupling & bra $\Sigma$ & ket $\Sigma$ & SO coupling & bra $\Sigma$ & ket $\Sigma$ & SO coupling & bra $\Sigma$ & ket $\Sigma$ \\ \hline\hline \brkt{\ensuremath{A\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{e\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{b\,{}^{1}\Sigma^{+}}}{{\rm SO}_{z}}{\ensuremath{B\,{}^{3}\Sigma^{-}}} & 0 & 0 \\ \brkt{\ensuremath{A\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{A'\,{}^{3}\Delta}} & 0 & 1 & \brkt{\ensuremath{e\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{B\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{A'\,{}^{3}\Delta}}{{\rm SO}_{z}}{\ensuremath{A'\,{}^{3}\Delta}} & 1 & 1 \\ \brkt{\ensuremath{C\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{A'\,{}^{3}\Delta}} & 0 & 1 & \brkt{\ensuremath{C\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{A''\,{}^{3}\Sigma^{+}}} & 0 & 1 & \brkt{\ensuremath{A''\,{}^{3}\Sigma^{+}}}{{\rm SO}_{z}}{\ensuremath{X\,{}^{3}\Sigma^{-}}} & 1 & 1 \\ \brkt{\ensuremath{A\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{B\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{e\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{A'\,{}^{3}\Delta}} & 0 & 1 & \brkt{\ensuremath{C\,{}^{3}\Pi}}{{\rm SO}_{z}}{\ensuremath{A\,{}^{3}\Pi}} & 1 & 1 \\ \brkt{\ensuremath{C\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{d\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{A\,{}^{3}\Pi}}{{\rm SO}_{z}}{\ensuremath{A\,{}^{3}\Pi}} & 1 & 1 \\ \brkt{\ensuremath{C\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{B\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{d\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{B\,{}^{3}\Sigma^{-}}} & 0 & 1 & \brkt{\ensuremath{A''\,{}^{3}\Sigma^{+}}}{{\rm SO}_{z}}{\ensuremath{B\,{}^{3}\Sigma^{-}}} & 1 & 1 \\ \brkt{\ensuremath{A\,{}^{3}\Pi}}{{\rm SO}_x}{\ensuremath{A''\,{}^{3}\Sigma^{+}}} & 0 & 1 & \brkt{\ensuremath{b\,{}^{1}\Sigma^{+}}}{{\rm SO}_{z}}{\ensuremath{X\,{}^{3}\Sigma^{-}}} & 0 & 0 & \brkt{\ensuremath{C\,{}^{3}\Pi}}{{\rm SO}_{z}}{\ensuremath{C\,{}^{3}\Pi}} & 1 & 1 \\ \brkt{\ensuremath{d\,{}^{1}\Pi}}{{\rm SO}_x}{\ensuremath{A'\,{}^{3}\Delta}} & 0 & 1 & \brkt{\ensuremath{a\,{}^{1}\Delta}}{{\rm SO}_{z}}{\ensuremath{A'\,{}^{3}\Delta}} & 0 & 0 & & & \\ \hline \end{tabular} \end{table*} \subsubsection{Dipole Moment Curves} Figures \ref{fig:ai_DMZ} and \ref{fig:ai_DMY} plot the $z$- and $y$-components of the dipole moments coupling states of same and different symmetry ($\Lambda$ plus multiplicity) respectively.The corresponding $\mu_{x}$ components can be always reconstructed from $\mu_{y}$ using their symmetry properties. We see again that the effect of diabatisation is to smooth out the curves over $R$, where now the DMCs tend to zero in the long range limit with no steep gradients caused by avoided crossings. The vibronic intensities are directly affected by the derivatives of the dipole moment with respect to the internucelar separation, $R$. Since adiabatic curves are prone to strong, steep-gradient variations around avoided crossings, even small inaccuracies in \textit{ab initio}\ calculations (including the position of the crossing and the corresponding NAC) can lead to large errors in spectral properties of the molecule. For example, the adiabatic \brkt{C^3\Pi}{\rm DM}{\ensuremath{X\,{}^{3}\Sigma^{-}}} dipole moment has a steep gradient at around 2~\AA\ which can be expected to be due to the avoiding crossing between \ensuremath{C\,{}^{3}\Pi}\ and \ensuremath{C'\,{}^{3}\Pi}\ states, therefore the \ensuremath{C\,{}^{3}\Pi}--\ensuremath{X\,{}^{3}\Sigma^{-}}\ electronic band is expected to be sensitive to the quality of its adiabatic description. The diabatic representation can also be sensitive to the quality of the corresponding curves, but to a significantly lesser extend due to their smooth character. Comparison with the \brkt{\ensuremath{A\,{}^{3}\Pi}}{\mu_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}}, \brkt{\ensuremath{C\,{}^{3}\Pi}}{\mu_x}{\ensuremath{X\,{}^{3}\Sigma^{-}}}, and \brkt{\ensuremath{B\,{}^{3}\Sigma^{-}}}{\mu_z}{\ensuremath{X\,{}^{3}\Sigma^{-}}} transition dipoles provided by \citet{19SaNaxx.SO} shows excellent agreements up to dissociation, with values (\{ours,\citet{19SaNaxx.SO}\}) at the ground state equilibrium geometry $R_e(\ensuremath{X\,{}^{3}\Sigma^{-}})=1.48$~{\AA} of $\{0.16,0.18\}$ $D$, $\{0.333,0.337\}$ $D$, $\{1.623,1.633\}$ $D$, respectively. \subsection{Nuclear Motion Calculations} \textsc{Duo}\ \citep{Duo} is a general purpose variational (open access\footnote{\href{https://github.com/Exomol/Duo)}{github.com/Exomol}}) code that solves the rovibronic Schr\"{o}dinger equation for diatomics while allowing an arbitrary number of couplings between various electronic states including spin-spin, spin-orbit, spin-rotation, and rotational Born-Oppenheimer breakdown curves. It is assumed one has solved the Schr\"{o}dinger equation for the electronic motion \textit{a priori} in order to obtain PECs, SOCs, EAMCs, (T)DMCs etc. for the electronic states in question. These curves can be supplied to the program as either a grid of \textit{ab initio}\ points, or in an analytical form. After solving the Schr\"{o}dinger equation for the nuclear motion \textsc{Duo}\ obtains eigenstates and energies for the good quantum numbers $J$ (total angular momentum), and $\tau$ (parity); other quantum numbers are assigned on the basis of the largest coefficient in the basis set. The eigenfunctions are used to compute transition line strengths and Einstein~$A$ coefficients in order to obtain a complete spectroscopy for the system in question. A detailed methodology of \textsc{Duo}\ is given by \citet{Duo}. \subsection{The \textit{ab initio}\ SO Spectrum} Using the diabatic spectroscopic model we produce an \textit{ab initio}\ rovibronic spectrum of SO for the system involving the lowest 11 singlet and triplet electronic states of SO covering the wavelength range up to 147~nm. The ‘active’ couplings within the spectrosocpic model used for cross-section calculations include 23 SOCs, 23 (transition) DMCs, and 14 EAMCs in-line with the couplings shown in Fig. \ref{fig:ai_LSZ}-\ref{fig:ai_EAMCs}. The vibrational sinc-DVR basis set was defined for a grid of 701 internuclear geometries in the range {0.6}--{6.0}~{\AA}. We select 58, 58, 49, 11, 31, 41, 27, 27, 14, 20, and 36 vibrational wavefunctions for the \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{A\,{}^{3}\Pi}, \ensuremath{B\,{}^{3}\Sigma^{-}}, \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A''\,{}^{3}\Sigma^{+}}, \ensuremath{A'\,{}^{3}\Delta}, \ensuremath{C\,{}^{3}\Pi}, \ensuremath{d\,{}^{1}\Pi}, and \ensuremath{e\,{}^{1}\Pi}, respectively, to form the contracted vibronic basis. In total 15~364~624 Einstein A coefficients between 119~600 bound rovibronic states were computed with a maximum total rotational quantum number $J_\text{max}$ = 180 and used to simulate rovibronic absorption spectra at a given temperature using the program \textsc{ExoCross}.\citep{ExoCross} \begin{figure*}[h!] \centering \includegraphics[width=\linewidth]{diabatic_all-comp_spectrum_5000K.png} \caption{Dipole allowed and forbidden components of the \textit{ab initio}\ absorption spectrum simulated with the diabatic model at 5000~K connecting the \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{A'\,{}^{3}\Delta}, and \ensuremath{A''\,{}^{3}\Sigma^{+}} states. The \ensuremath{C'\,{}^{3}\Pi}\ continuum is also plotted in gold. The absorption lines are modelled using Gaussian profiles with a HWHM of \wav{0.6} in the bound cases, and \wav{300} for the continuum band.} \label{fig:All_comp_spec} \end{figure*} Figure \ref{fig:All_comp_spec} shows an absorption rovibronic spectrum of SO computed at {5000}~{K} with all bands plotted using different colours, both electric dipole allowed and forbidden. We model the spectrum at a high temperature for a visual aid since at this temperature there is a good separation between different electronic bands. The grey shaded region in Fig.~\ref{fig:All_comp_spec} marks the total SO bound-bound absorption at {5000}~{K}, which is mostly traced by the strongest bands with the exception for the region between \wav{12000-17000}. Hence, weaker bands, e.g. ones that break dipole selection rules, have negligible contribution to the total SO opacity and will be less important for low resolution studies such as in astrophysical observations. The non-bound diabatic states such as \ensuremath{C'\,{}^{3}\Pi}\ and $(3)^{1}\Pi$ are excluded from the bound-bound spectra simulations. Our tests show that the effect of the unbound states on the bound-bound spectra is negligible, and vice versa, the continuum spectra are negligibly affected by the bound electronic states and therefore can be treated separately. The continuum spectra of the non-bound diabatic \ensuremath{C'\,{}^{3}\Pi}\ state is computed using the method described in \citet{21PeYuTe} and is shown in figure \ref{fig:All_comp_spec}, plotted in gold and overlaying the bound-bound spectrum to demonstrate its contribution to the total SO opacity. For the continuum state a larger basis set of 5000 wavefunctions was used. The structure energetically above (below) the `dip' at \wav{41200} is due to absorption to unbound \ensuremath{C'\,{}^{3}\Pi}\ states above (below) the $\rm S(^1D)+O(^3P)$ dissociation. The \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C'\,{}^{3}\Pi}} continuum band continues to \wav{100000}, peaking at $\sim$\wav{78000} which corresponds to the most vertical transitions from states localised around the minima of \ensuremath{X\,{}^{3}\Sigma^{-}}. We note that the dipole-forbidden bands in Fig.~\ref{fig:All_comp_spec} are not computed using quadrupole or magnetic dipole moments, which have very weak intensities, but rather intensities are `stolen' from other transitions. This intensity stealing propagates through the mixture of electronic wave-functions via couplings such as SOCs and EAMCs. For example, the spin-forbidden {\ensuremath{c\,{}^{1}\Sigma^{-}}}--{\ensuremath{X\,{}^{3}\Sigma^{-}}} band occurs due to the overlap between the \ensuremath{c\,{}^{1}\Sigma^{-}}\ wavefunction both with \ensuremath{e\,{}^{1}\Pi}\ and \ensuremath{d\,{}^{1}\Pi}\ wavefunctions through the EAM couplings, and then with \ensuremath{X\,{}^{3}\Sigma^{-}}\ through a secondary mixing via \brkt{\ensuremath{e\,{}^{1}\Pi}}{\rm SO_X}{\ensuremath{X\,{}^{3}\Sigma^{-}}} and \brkt{\ensuremath{d\,{}^{1}\Pi}}{\rm SO_X}{\ensuremath{X\,{}^{3}\Sigma^{-}}} to produce a direct dipole moment, which dominates over the weaker magnetic and quadrupole moment mechanisms. We compute absolute intensities for every rovibronic transitions between the lowest 11 diabatic singlet and triplet states of SO covering the entire spectroscopic range up to 147 nm, where NACs are treated. We note that the only other study with similar coverage into the UV on SO is from the theoretical work by \citet{19SaNaxx.SO} who compute cross sections for 190--300 nm. However, our spectroscopic model is both more complete and phase consistent (phases carefully reconstructed, see \ref{subsubsec:SOCs}), whereas \citet{19SaNaxx.SO} do not provide any phases. \subsection{Experimental Coverage of the \textit{ab initio}\ SO Spectrum} \label{subsec:Exp_coverage} Currently within the literature a small fraction of the SO spectrum has been measured experimentally covering only the \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{A\,{}^{3}\Pi}, and \ensuremath{B\,{}^{3}\Sigma^{-}}\ states. Figure \ref{fig:HITRAN-THeory_comp} reviews the spectroscopic coverage of SO from 24 experimental sources from the literature. Figure \ref{fig:All_comp_spec} shows our model to supplement the experimental data over the whole spectral range. In particular, we cover the SO spectrum above \wav{40000} and \wav{12000--16000} where no measurements have been taken for any electronic state. We also plot the available \textsc{Hitran} \citep{HITRAN2012} SO line list containing data on the first three electronic states \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, and \ensuremath{b\,{}^{1}\Sigma^{+}}. Our \textit{ab initio}\ model is able to extend the \textsc{Hitran}\ coverage up to dissociation at \wav{40000}. The aim of a future work is to refine our \textit{ab initio}\ SO model to the experimental transition frequencies from these sources and to produce an empirically accurate line list for SO. \begin{figure}[h!] \centering \includegraphics[width=\linewidth]{Experimental_coverage_PCCP.png} \caption{Coverage of experimental measurements for 24 sources illustrated by horizontal bars covering the spectral regions measured, where the named works \citep{02ChWaLi.SO, 87BuLoHa.SO, 99SeFiRa.SO, 05WaTaHa.SO} include some spectral data, mostly with relative intensities: (a) 14 sources \citep{03KiYaxx.SO, 15MaHiMo.SO,17CaLaCo.SO,64PoLixx.SO, 64WiGoSa.SO, 74Tiemann.SO, 76ClDexx.SO, 82Tiemann.SO, 87EnKaHi.SO, 93Yamamoto.SO,94CaClCo.SO,96KlSaBe.SO,97BoCiDe.SO,97KlBeWi.SO,CDMS} cover \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{X\,{}^{3}\Sigma^{-}}}, \band{\ensuremath{a\,{}^{1}\Delta}}{\ensuremath{a\,{}^{1}\Delta}}, \band{\ensuremath{b\,{}^{1}\Sigma^{+}}}{\ensuremath{b\,{}^{1}\Sigma^{+}}} for \wav{0-125}; (b) 3 experimental sources \citep{82Colin.SO,86ClTexx.SO, 94StCaPo.SO} cover the \band{\ensuremath{A\,{}^{3}\Pi}}{\ensuremath{X\,{}^{3}\Sigma^{-}}} and \band{\ensuremath{B\,{}^{3}\Sigma^{-}}}{\ensuremath{X\,{}^{3}\Sigma^{-}}} bands for \wav{38000--39800}; (c) 2 experimental sources \citep{85KaBuKa.SO,88KaTiHi.SO} cover the \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{X\,{}^{3}\Sigma^{-}}} and \band{\ensuremath{a\,{}^{1}\Delta}}{\ensuremath{a\,{}^{1}\Delta}} bands for \wav{1040--1125}.} \label{fig:HITRAN-THeory_comp} \end{figure} \section{Effect of diabatisation on the computed Spectra} \label{sec:effect of dia} In theory, the adiabatic and diabatic representations should provide identical results, provided that the corresponding NACs and DCs are included. However, due to the computational cost of computing NACs through proper \textit{ab initio}\ methods, it is not common practice to include NACs in adiabatic models. Without definition of the NAC, non-Born-Oppenheimer interactions are effectively removed. In this section we analyse the importance of the non-adiabatic couplings between \ensuremath{C\,{}^{3}\Pi}\ and \ensuremath{C'\,{}^{3}\Pi}\ as well as between \ensuremath{e\,{}^{1}\Pi}\ and $(3)^{1}\Pi$ for computing the (absorption) spectra of SO. To this end we consider our diabatic spectroscopic model to be complete and use it to compute a reference absorption spectrum of SO. This spectrum is then used to compare with an `adiabatic' spectrum of SO computed using the non-adiabatic curves \textit{without} NACs. As detailed in section \ref{subsec:NACs}, the diabatisation of the potential energy curves induces non-zero off-diagonal elements via corresponding 2$\times$2 potential energy matrices in the diabatic representation. These off-diagonal coupling elements will be referred to as diabatic couplings, DCs, which are characterised by cusp shaped curves centered at the avoided crossing. As before, in the diabatic spectrum simulations the unbound states are excluded. Figure \ref{fig:C-energies} illustrates the vibrational energy levels of the diabatic \ensuremath{C\,{}^{3}\Pi}, fully bound below its dissociation limit of \wav{50700}. \begin{figure}[h!] \centering \includegraphics[width=\linewidth]{C_dia_ener_plot.png} \caption{The computed \textsc{Duo}\ diabatic vibronic energies of the \ensuremath{C\,{}^{3}\Pi}\ superimposed upon the \ensuremath{C\,{}^{3}\Pi}\ and \ensuremath{C'\,{}^{3}\Pi}\ PECs. The secondary and tertiary `bumps' at $\rm R = 2.42, 3.30$ \AA\ are due to an avoided crossing and numerical noise, respectively.} \label{fig:C-energies} \end{figure} Figure \ref{fig:CX_ea_comp_Spec} illustrates the importance of the non-adiabatic effects when modeling the spectra around avoiding crossings for the \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C\,{}^{3}\Pi}} and \band{\ensuremath{a\,{}^{1}\Delta}}{\ensuremath{e\,{}^{1}\Pi}} bound-bound absorption bands (panel a), and the \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C'\,{}^{3}\Pi}} continuum absorption band (panel b). The adiabatic spectra were computed with the NACs excluded and compared to the diabatic spectra with the non-adiabatic effects fully encountered. Each spectra has been modelled at a temperature of 5000~K -- such that hot bands are populated, aiding our comparisons below -- with Gaussian profiles of a \wav{0.6} half-width-at-half-maximum (HWHM) for the bound-bound spectra and a HWHM of \wav{300} for continuum bands. Great differences between the bound-bound spectra in panel (a) of Fig.~\ref{fig:CX_ea_comp_Spec} are seen towards both the high and low energy regions. In the high energy region the adiabatic spectral bands terminate abruptly at the avoided crossings whereas the diabatic bands continue to the diabatically correlated dissociation asymptotes $\rm S(^1D)+O(^3P)$ \& $\rm S(^1D)+O(^1D)$ (see Fig.~\ref{fig:ai_PECs}). The diabatisation extends these bands by at least a few thousand wavenumbers because of the availability of higher rovibrational states in the deeper diabatic potential wells. For purely bound-bound calculations, the adiabatically computed bands have lower intensities compared to the diabatic spectrum which can be attributed to the increased repulsive character of the adiabatic PECs on the right hand side of the crossing points present. Due to the tunneling through the potential barriers, the adiabatic wavefunctions `leak' to the continuum region thus resulting in reduction of the intensity of their bound absorption spectra. The most interesting feature from Fig.~\ref{fig:CX_ea_comp_Spec} is the extension of the \band{\ensuremath{a\,{}^{1}\Delta}}{\ensuremath{e\,{}^{1}\Pi}} band beyond the stronger \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C\,{}^{3}\Pi}} band at $E/hc >$ \wav{50000}. Although being relatively weak, this band is not covered by stronger bands and therefore may be observable in the $\sim 0.18-0.2$~$\mu$m region, a result only predicted when using a full non-adiabatic theoretical treatment. \begin{figure*}[ht] \centering \includegraphics[width=0.48\linewidth]{adi_dia_CX_ea_band_comparison_PCCP.png} \includegraphics[width=0.48\linewidth]{adi_dia_Cp-X_band_comparison_PCCP.png} \caption{A comparison between the \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C\,{}^{3}\Pi}}, \band{\ensuremath{a\,{}^{1}\Delta}}{\ensuremath{e\,{}^{1}\Pi}}, and \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C'\,{}^{3}\Pi}} band spectra computed with an adiabatic model with no defined NAC and a diabatic model. These bands are dipole allowed and are expected to be observable, we see great differences between the spectra at the dissociation, highlighting the importance of diabatisation. Each spectra has been modelled at a temperature of 5000~K with Guassian line profiles of a \wav{0.6} HWHM. } \label{fig:CX_ea_comp_Spec} \end{figure*} The low intensity regions are very sensitive to changes in the \textit{ab initio}\ model and will be also affected by the changes in the shape of couplings between the adiabatic and diabatic representations. The hump-like structure in the {\ensuremath{C\,{}^{3}\Pi}}--{\ensuremath{X\,{}^{3}\Sigma^{-}}} band at around \wav{10,000} is absent in the adiabatic spectrum because of the unavailability of vibrational states above the avoided crossing. For example, the brightest transitions within this hump for the {\ensuremath{C\,{}^{3}\Pi}}--{\ensuremath{X\,{}^{3}\Sigma^{-}}} band connect the $\nu =13$ state which is energetically above the avoided crossing in the adiabatic PEC. We note that these regions negligibly contribute to the total SO opacity and so are not important for the SO model, but will be important for other systems where non-adiabatic effects occur in the spectroscopically important regions. Panel (b) of Fig.~\ref{fig:CX_ea_comp_Spec} presents a similar analysis for the continuum \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C'\,{}^{3}\Pi}} band, which would include an additional bound structure towards longer wavelengths if the NAC is not included in the adiabatic model since the \ensuremath{C'\,{}^{3}\Pi}\ PEC in this representation is bound. However, the adiabatic \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C'\,{}^{3}\Pi}} bound feature is orders of magnitude weaker than the continuum bands presented here and an analysis on the change of character of bound-bound absorption bands with diabatisation is already provided above. The \band{\ensuremath{X\,{}^{3}\Sigma^{-}}}{\ensuremath{C'\,{}^{3}\Pi}} continuum bands for transitions to unbound \ensuremath{C'\,{}^{3}\Pi}\ states above the $\rm S(^1D)+O(^3P)$ dissociation converge between both representations, since the non-adiabatic effects are far away from the peak at $\sim$\wav{78000} corresponding to vertical transitions from the electronic ground state. However, if the avoided crossing occurred vertically above the \ensuremath{X\,{}^{3}\Sigma^{-}}\ minima, we would expect non-adiabtaic effects to have a greater contribution to the continuum cross sections. From the comparison above, we show that neglecting NACs within an adiabatic model can lead to drastic differences in the physics gleamed from the computed spectra. \section{Conclusions} In this work, we use multireference methods of electronic structure theory combined with a diabatisation procedure to compute a fully diabatic model for the transient diatomic molecule sulphur monoxide. The model includes 23 spin-orbit, 23 (transition) dipole moment, and 14 electronic angular momentum curves for the \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{A\,{}^{3}\Pi}, \ensuremath{B\,{}^{3}\Sigma^{-}}, \ensuremath{c\,{}^{1}\Sigma^{-}}, \ensuremath{A''\,{}^{3}\Sigma^{+}}, \ensuremath{A'\,{}^{3}\Delta}, \ensuremath{C\,{}^{3}\Pi}, \ensuremath{d\,{}^{1}\Pi}, and \ensuremath{e\,{}^{1}\Pi}\ electronic states of SO and were produced \textit{ab initio}\ via CASSCF and MRCI methods using aug-cc-pV5Z basis sets. These curves were then used to compute the nuclear motion via solving the fully-coupled Schr\"{o}dinger equation with the \textsc{Duo}\ program. A further two electronic states (\ensuremath{C'\,{}^{3}\Pi}\ and $(3)^1\Pi$) were computed along with their couplings, which are essential to forming the diabatic representation. The diabatisation procedure we present is a computationally low cost method to reconstruct the non-adiabatic couplings \emph{a priori} to nuclear motion calculations. To assess the importance of non-adiabatic effects for the spectroscopy of SO, we compare spectra computed in the diabatic and adiabatic representations without definition of NACs. The most notable difference is the absence of the UV spectrum above $\sim$ \wav{50000} because of the illusionary predissociation from the adiabatic PECs. We also saw the adiabatically computed bound absorption bands to have lower intensities than the diabatic counterparts. It is therefore important to treat NACs for systems where these non-adiabatic interactions occur in spectroscopically important regions since they have drastic effects on spectral structure. All coupling curves of SO are defined with self-consistent relative phases, which is crucial for spectral calculations \citep{14PaHiTe.AlO}. Therefore our spectroscopic model of SO provides a comprehensive and extensive theoretical baseline, which is the first fully reproducible spectroscopic description of SO longer than 147~nm. Since the existing spectroscopic data on SO only covers \ensuremath{X\,{}^{3}\Sigma^{-}}, \ensuremath{a\,{}^{1}\Delta}, \ensuremath{b\,{}^{1}\Sigma^{+}}, \ensuremath{A\,{}^{3}\Pi}, and \ensuremath{B\,{}^{3}\Sigma^{-}}, our \textit{ab initio}\ model can be used as a benchmark for future rovibronic methods and calculations. The topic of our next work will be to build a semi-empirical line list as part of the ExoMol project \citep{12TeYuxx.exo, 20TeYuAl} for SO through the refinement of our \textit{ab initio}\ model to experimental transition data, where we expect to reduce the shift in line positions relative to experiment. The final SO line list will have applications primarily in the atmospheric modelling of exoplanets \citep{98ZoFexx.SO,21HoRiSh, 12Krasnopolsky} and cool stars. Further applications of this empirical SO line list will be in shock zone modelling \citep{96Bachiller.ISM, 93ChMaxx.SO, 91AmElEl.SO}, SO lasing systems\citep{91MiYaSm.SO, 92StCaPo.SO}, and spectroscopy of Venus \citep{90NaEsSk.SO, 12BeMoBe.SO} and Io \citep{96Lellouch, 02deRoGr.SO}. \section{Conflicts of interest} There are no conflicts to declare. \section*{Acknowledgements} This work was supported by UK STFC under grant ST/R000476/1. This work made use of the STFC DiRAC HPC facility supported by BIS National E-infrastructure capital grant ST/J005673/1 and STFC grants ST/H008586/1 and ST/K00333X/1. We thank the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme through Advance Grant number 883830. \section{Data availability} The \textit{ab initio}\ curves of SO obtained in this study are phase consistent and are provided as part of the supplementary material to this paper along with our spectroscopic model in a form of a \textsc{Duo}\ input file. The line list computed with \textsc{Duo}\ can be directly used with the \textsc{ExoCross}\ program to simulate the spectral properties of SO. We also provide a Julia source code used for the diabatisation procedure is provided as part of the supplementary material.
\section{Introduction and Literature Review} Due to the recent development of machine learning, data science and signal processing, more and more data is generated, but only a part of it might be necessary in order to already make predictions in a sufficiently good manner. Therefore, the question arises to best approximate a signal $b$ by linear combinations of no more than $\sigma$ vectors $A_i$ from a suitable dictionary $A=\begin{pmatrix} A_1, \dots, A_n \end{pmatrix} \in \mathbb{R}^{m \times n}$: \begin{equation} \label{Problem Introduction} \min \norm{Ax-b}_2 \text{ subject to } \norm{x}_0 \leq \sigma, \end{equation} where $\norm{x}_0:=|\lbrace i \in \lbrack n \rbrack: x_i \neq 0 \rbrace|$. Additionally, many areas of application -- as for example portfolio selection theory, sparse linear discriminant analysis, general linear complementarity problems or pattern recognition -- require the solution $x$ to satisfy certain polyhedral constraints. While there exists a large variety of ideas how to tackle this problem, the majority of them relies on the matrix $A$ satisfying conditions such as being sampled in a specific way or being close to behaving like an orthogonal system, that might be hard to verify. Additionally, these algorithms commonly yield results only with a certain probability or within an approximation factor that again highly depends on the properties of $A$. A discussion of these ideas and different names and variants of this problem is postponed to the end of the introduction. In this work, we develop an exact algorithm that, without these limitations on $A$, solves the \emph{Sparse Approximation problem} in $[0,1]$-variables: \begin{equation} \label{P0} \tag{$P_0$} \min_x \| Ax-b \|_2 \text{ subject to } x \in [ 0,1 ]^n \text{ and } \norm{x}_0 \leq \sigma. \end{equation} \begin{restatable}{theorem}{theomain}\label{thm:main-1} Given $A \in \mathbb{Z}^{m \times n}, b \in \mathbb{Z}^m$ and $\sigma \in \mathbb{Z}_{\geq 1}$, we can find an optimal solution $x$ to Problem~\eqref{P0} in $(m \norm{A}_\infty)^{\mathcal{O}(m^2)} \cdot \poly(n, \|b\|_1)$ arithmetic operations. \end{restatable} Relaxing the pseudonorm $\norm{\cdot}_0$ by $\norm{\cdot}_1$ is a commonly used technique in the literature. In contrast to previous results we are able to bound the distance between the images of these solutions under $A$ without any further assumptions on the input data and therefore derive a \emph{proximity result} that -- to the best of our knowledge -- has not been known before. \begin{restatable}{theorem}{theoprox} \label{thm:proximity} Let $\hat{x}$ be an optimal solution to the following relaxation of~\eqref{P0}: \begin{equation*} \min_x \norm{Ax-b}_2 \text{ subject to } x \in \lbrack 0,1 \rbrack^n \text{ and } \norm{x}_1 \leq \sigma. \end{equation*} For an optimal solution $x^\star$ to~\eqref{P0} we have \begin{equation*} \norm{Ax^\star - A\hat{x}}_2 \leq 2\norm{\hat{x} - \lfloor \hat{x} \rfloor}_1 \max_{i=1,\dots,n} \norm{A_i}_2 \leq 2 m^{3/2} \norm{A}_{\infty}, \end{equation*} where $\lfloor \hat{x} \rfloor$ denotes the vector $\hat{x}$ rounded down component-wise. \end{restatable} We also illuminate our approach from a probabilistic point of view. Specifically, the hard instances are those where $b$ is relatively close to the boundary of the polytope $Q \mathrel{\mathop:}= \{Ax: \ x \in [0,1]^n, \ \|x\|_1 \leq \sigma\}$. Conversely, if $b$ is deep inside $Q$ or far outside of $Q$, then with high probability, an optimal solution to the relaxation solves the initial problem~\eqref{P0}. The paper is organized as follows. We conclude the introduction by providing an overview on related literature. Section~\ref{sec:prelim} discusses preliminaries. The probabilistic analysis of a target vector $b$ is carried out in Section~\ref{sec:sampling}. We then discuss a worst-case proximity bound between optimal solutions of~\eqref{P0} and a natural relaxation in Section~\ref{sec:proximity}. This will allow us to formalize a deterministic algorithm in Section~\ref{sec:algorithm}. In the literature, Problem \eqref{Problem Introduction} can be found under various modifications and names, see e.g.\ \cite{DecodingByLinearProgramming, CandesTao, Bresler, Samet}. A common variant in the context of random measurements is often called \textit{Sparse Recovery}, cf.~\cite{Gilbert}, or \textit{Subset Selection for (linear) regression}, cf.~\cite{Das}, while the name \textit{(Best) Subset Selection} is generally used without further interpretation cf.~\cite{Bresler, Weismantel, Zhu}, in contrast to \textit{Signal Recovery} or \textit{Signal Reconstruction} as in \cite{Romberg}. If the vector $b$ can be represented exactly, the problem is called \textit{Exact Sparse Approximation} or \textit{Atomic Decomposition}, cf.~\cite{ChenDonohoSaunders, Gilbert02approximationof, Tropp, Civril}. Since the differences are marginal and the names in the literature not well-defined, we restrain ourselves to the name \textit{Sparse Approximation} for simplicity. In general, there are two common strategies used to tackle \textit{Sparse Approximation}: Greedy algorithms and relaxations -- a detailed discussion of which would be beyond the scope of this paper. These algorithms either recover the optimal support only under certain conditions (compare \cite{ Ament, Bresler, Kempe, Tropp}), recover it with high probability (see for example \cite{Donoho, Zhu}) or approximate the solution (for instance \cite{Das, Ethan, Gilbert02approximationof}). Unfortunately, because of their high computational cost most common greedy algorithms are not sufficient for large systems, though experiments suggest that there still exist applicable greedy approaches, such as the Dropping Forward-Backward Scheme, introduced by Nguyen \cite{Nguyen}. While the idea of relaxing the pseudonorm $\norm{\cdot}_0$ by the norm $\norm{\cdot}_1$, as done for example in Basis Pursuit by Chen, Donoho and Saunders \cite{ChenDonohoSaunders}, might seem intuitive, for a long time the success of this method was not quite understood. This changed as Candes, Romberg and Tao \cite{DecodingByLinearProgramming, Candes} discovered and improved the Uniform Uncertainty Principle. For the usually problematic case of having not enough data points, the Dantzig Selector presented by Candes and Tao \cite{CandesTao} yields a sophisticated estimator with high probability. Similarly, LASSO based methods, see for instance \cite{Samet}, either recover the support with high probability exactly under certain conditions, or fail with high probability if the conditions are not met, cf.~\cite{Wainwright}. Finally, Garmanik and Zadik \cite{David} revealed interesting structural results, that explain the above mentioned all-or-nothing behavior. There also exists a series of papers in a similar line of thought that relaxes $\norm{\cdot}_0$ by smooth, non-decreasing, concave functions, see \cite{RinaldiSchoen, Waechter,Fung, Dongdong,Haddou,Mangasarian, Rinaldi, Schoen}. It can be shown that these relaxations converge towards the optimal solution of \eqref{P0}. Qian et al. \cite{Chao} and Çivril \cite{Civril} proved that, unless $P=NP$, for a general matrix $A$ Pareto Optimization and the two greedy algorithms, Forward Selection and Orthogonal Matching Pursuit, are almost the best we can hope for. This motivated a search for more efficiently solvable classes of $A$, cf. \cite{Romberg, Weismantel, Gao, Gilbert}. Finally, it should be mentioned that there exists a variety of Branch-and-Bound algorithms whose success though is in general only tested experimentally, see \cite{Kendall, Hocking}. \section{Preliminaries} \label{sec:prelim} Let $A \in \mathbb{Z}^{m \times n}$ and $b \in \mathbb{Z}^m$. Moreover, let $\supp (x)$ denote the support of $x$, i.e.\ $\supp (x) \mathrel{\mathop:}= \{ i \in [ n ] : x_i \neq 0 \}$ and set $\norm{x}_0 \mathrel{\mathop:}= |\supp (x)|$. For the rest of the paper, $x^\star$ denotes an optimal solution for \eqref{P0} for a given integer $\sigma \in \mathbb{Z}_{\geq 1}$. A natural convex relaxation of~\eqref{P0} is given by \begin{equation} \label{P1}\tag{$P_1$} \min_x \norm{Ax-b}_2 \text{ subject to } x \in \lbrack 0,1 \rbrack^n \text{ and } \norm{x}_1 \leq \sigma. \end{equation} An optimal solution to~\eqref{P1} will be denoted by $\hat{x}$ throughout the paper. When $m=1$, there exists an optimal solution $\hat{x}$ for~\eqref{P1} that has at most one fractional variable (see Lemma~\ref{lem:frac-entries}). This solution is also feasible for~\eqref{P0}, and hence optimal. The idea of our approach is to establish a proximity result for $A\hat{x}$ and $Ax^\star$ respectively, that we can exploit algorithmically. This proximity bound depends on $m$ which comes as no surprise, given that the problem is NP-hard even for fixed values of $m$. The latter statement can be verified by reducing the NP-hard partition problem to an instance of~\eqref{P0}. \begin{theorem} The problem \eqref{P0} is NP-hard, even if $m=2$. \end{theorem} A simple but important ingredient of our proximity theorem is the following fact that can be derived from elementary linear programming theory. \begin{lemma}[Few fractional entries] \label{lem:frac-entries} \leavevmode \begin{enumerate} \item Let $x$ be a feasible point for~\eqref{P0}. There exists a solution $x^\prime$ such that $Ax = Ax^\prime$ with at most $m$ fractional entries. \label{pt:1} \item Let $x$ be a feasible point for~\eqref{P1}. There exists a solution $x^\prime$ such that $Ax = Ax^\prime$ with at most $m$ fractional entries. \end{enumerate} \end{lemma} \begin{proof} \begin{enumerate} \item Let $x$ be a solution of~\eqref{P0} and denote $S = \supp(x)$. Let $A_S$ denote the submatrix of $A$ comprising the columns with indices in $S$. The set \begin{equation*} P_S(x) \mathrel{\mathop:}= \lbrace y \in \mathbb{R}^{|S|}: \ A x = A_S y, \ 0 \leq y \leq 1 \rbrace \end{equation*} is a polytope. It is non-empty since $x \in P$, hence it has at least one vertex $v$. By standard LP theory, at least $|S|-m$ inequalities of the form $0 \leq y \leq 1$ are tight at $v$. It follows that $v$ has at most $m$ fractional entries. The vertex $v$ can easily be extended to a solution $x^\prime$ of~\eqref{P0} by adding zero-entries. \item Given the solution $x$ to~\eqref{P1}, consider the optimization problem \begin{equation*} \min \{ \sum_{i=1}^n y_i : \ y \in P_{ \{ 1,\dots,n \}}(x) \}. \end{equation*} Let $v$ be an optimal vertex solution. From Part~\ref{pt:1} $v$ has at most $m$ fractional entries. Since $x$ is feasible for the above problem, $\sum_{i=1}^n v_i \leq \sum_{i=1}^n x_i \leq \sigma$. \end{enumerate} \end{proof} \section{The \texorpdfstring{$\ell_1$}{l_1}-Relaxation for Random Targets \texorpdfstring{$b$}{b}} \label{sec:sampling} In order to shed some light on Problem~\eqref{P0} and its natural convex relaxation~\eqref{P1} we first provide a probabilistic analysis to what extend optimal solutions of~\eqref{P1} already solve~\eqref{P0}. Let $Q \mathrel{\mathop:}= \{Ax \in \mathbb{R}^m : \ x \in [0,1]^n, \|x\|_1 \leq \sigma\}$ be the set of all points we can represent with the $\ell_1$-relaxation. This section deals with the question which vectors $b$ are ``easy'' target vectors. It turns out that if $b$ is ``deep'' inside $Q$ or far outside of $Q$, then the corresponding instances of~\eqref{P0} are easy with very high probability. In fact, there almost always exist optimal solutions of~\eqref{P1} that are already feasible for~\eqref{P0} and hence optimal. Conversely, if $b$ is close to the boundary of $Q$, then the probability that an optimal solution of~\eqref{P1} solves~\eqref{P0} is almost $0$. \begin{theorem} \label{thm:inside-Q} Let $A \in \mathbb{R}^{m \times n}$ and $\sigma \geq m$ be an integer. If $b \in \tfrac{\sigma - m + 1}{\sigma} Q$, then there exists $x^\star \in [0,1]^n$ with $\norm{x^\star}_0 \leq \sigma$ and $Ax^\star = b$. \end{theorem} \begin{proof} If $b \in \tfrac{\sigma - m + 1}{\sigma} Q$, there exists a vector $\hat{x} \in [0,\tfrac{\sigma-m + 1}{\sigma}]^n$ such that $b = A\hat{x}$ and $\norm{\hat{x}}_1 \leq \sigma-m + 1$. Let $v$ be a vertex of $\lbrace x \in [0,1]^n: Ax = b,\norm{x}_1 \leq \sigma - m + 1\rbrace$, which contains $\hat{x}$. According to the constraint $\norm{x}_1 \leq \sigma - m + 1$, $v$ has at most $\sigma - m + 1$ integral non-zero entries. By Lemma~\ref{lem:frac-entries}, $v$ has at most $m$ fractional entries. However, if there are fractional entries present, we can only have $\sigma-m$ integral entries, thus, $\|v\|_0 \leq \sigma$. \end{proof} For the next result, we require some theory of \emph{mixed volumes}. We will restrict to stating results necessary for our work, and refer to~\cite[Sec.\ $6$]{gruber2007convex} and references therein for more background. Let $B \mathrel{\mathop:}= B(0,1) \subseteq \mathbb{R}^m$ be the Euclidean ball of radius $1$, $Q \subseteq \mathbb{R}^m$ be a convex body and $\lambda > 0$. The following equality is known as \emph{Steiner's formula}, and shows that the volume of $Q + \lambda B$ is a polynomial in $\lambda$ (\cite[Thm.~$6.6$]{gruber2007convex}): \begin{align} \label{eq:steiner} \vol (Q + \lambda B) &= \sum_{i=0}^m \binom{m}{i} W_i(Q) \lambda^i, \end{align} where the constants $W_i(Q)$ are called the \emph{Quermassintegrals} of $Q$. Let $\mu > 0$ be a constant s.t.\ $Q \subseteq \mu B$. Then, $W_i(Q) \leq \mu^{m - i} \vol(B)$. Combining the two inequalities, we have \begin{align} \label{eq:volume} \vol (Q + \lambda B) &\leq \vol(B) \sum_{i=0}^m \binom{m}{i} \mu^{m-i} \lambda^i = \vol(B) (\lambda + \mu)^m \end{align} for any convex body $Q \subseteq \mu B$. We are now prepared to show the following result. \begin{theorem} \label{thm:b-far} Let $A \in \mathbb{R}^{m \times n}$, and $\sigma \geq 1$ be an integer. If $b$ is sampled uniformly at random from the convex set $Q + \lambda B$, then with probability at least \begin{equation*} \left( \frac{\lambda}{\lambda + \sigma \sqrt{m} \norm{A}_{\infty}} \right)^m \end{equation*} there exists an optimal solution of~\eqref{P1} that is optimal for~\eqref{P0}. \end{theorem} \begin{proof} Define $P \mathrel{\mathop:}= \{x \in [0,1]^n : \ \norm{x}_1 \leq \sigma \}$, and set $Q = \{Ax: \ x \in P\}$. Observe that all vertices of $P$ are in $\{0,1\}^n$, and as a consequence any vertex $v$ of $Q$ can be written as \begin{equation} \label{eq:int-vertex} v = Ax \text{ with } x \text{ a vertex in } P \text{ that is integral.} \end{equation} Hence, whenever an optimal solution to $\min \{\|b-x\|_2: \ x \in Q\}$ is attained by a vertex of $Q$, the problem~\eqref{P1} has an optimal integral vertex solution $v$. Since an integral solution to~\eqref{P1} is also feasible for~\eqref{P0}, the vector $v$ is also optimal for~\eqref{P0}. Let $V$ be the vertex set of $Q$. For $v \in V$, denote the normal cone of $v$ by \begin{equation*} C_v \mathrel{\mathop:}= \{c \in \mathbb{R}^m: \ c^\intercal (w-v) \leq 0 \ \forall w \in Q \}. \end{equation*} Fix a vertex $v$ and assume $b \in v + C_v$. We next show that $v$ is an optimal solution to $\min\{\|b-x\|^2_2: \ x \in Q\}$. Since $b = v + c$ with $c^\intercal (v-w) \geq 0$ for all $w \in Q$, we obtain \[ \norm{b-w}^2_2 = \norm{v-w+c}_2^2 = \norm{v-w}^2_2 + \norm{c}^2_2 + 2 c^\intercal (v-w) \geq \norm{c}^2_2 = \norm{b-v}^2_2, \] showing that $v$ is optimal. By Equation~\eqref{eq:int-vertex} there exists an integral $x \in P$ such that $v = Ax$ and hence $x$ is optimal for~\eqref{P0}. It remains to calculate the probability that $b \in v + C_v$ for some vertex $v$ of $Q$. We obtain \begin{align*} \vol \left( \bigcup_{v \in V} (v + C_v) \cap (Q + \lambda B) \right) &= \vol \left( \bigcup_{v \in V} C_v \cap \lambda B \right) \\ &= \vol \left( \left( \bigcup_{v \in V} C_v \right) \cap \lambda B \right) \\ &= \vol(\lambda B) = \lambda^m \vol(B). \end{align*} In the second to last equality we used that the normal cones $C_v$ tile the space $\mathbb{R}^m$. Let $\mu > 0$ be a constant s.t.\ $Q \subseteq \mu B$, e.g.\ $\mu = \sigma \sqrt{m} \norm{A}_{\infty}$. We now can apply Steiner's Formula~\eqref{eq:steiner} to estimate $\vol(Q + \lambda B) \leq (\lambda + \mu)^m \vol(B)$. The probability that $b$ is sampled in one of the normal cones is therefore \begin{align*} \frac{\vol(\lambda B)}{\vol (Q + \lambda B)} \geq \frac{\lambda^m}{(\lambda + \mu)^m} \geq \left( \frac{\lambda}{\lambda + \sigma \sqrt{m} \norm{A}_{\infty}} \right)^m. \end{align*} \end{proof} Let us briefly comment on the probability quantity $\rho \mathrel{\mathop:}= ( \lambda / (\lambda + \sigma \sqrt{m} \norm{A}_{\infty}) )^m$. If we choose $\lambda = 2m^{3/2}\sigma \|A\|_{\infty}$ in Theorem~\ref{thm:b-far}, then $\rho \geq 1/2$, as one can verify with Bernoulli's inequality. Figure \ref{figure quality of target} depicts the geometry underlying the proof of Theorem \ref{thm:b-far}. The vector $b_1$ is sampled from the dotted area and hence, an optimal solution of~\eqref{P1} may use $2$ fractional entries, and thus have support $\sigma+1$. On the other hand, the vector $b_2$ is sampled from the dashed area, which leads to the solution of~\eqref{P1} corresponding to a vertex of $Q$. In the second case~\eqref{P1} has an integral solution, which automatically solves~\eqref{P0}. \begin{figure} \centering \begin{tikzpicture}[scale=0.6, vert/.style args={of #1 at #2}{insert path={% #2 -- (intersection cs:first line={#1}, second line={#2--($#2+(0,10)$)}) }}, vert outwards/.style args={from #1 by #2 on line to #3}{insert path={ #1 -- ($#1!#2!90:#3$) }}] \coordinate (v1) at (-5,-3); \coordinate (v2) at (-2,-2); \coordinate (v3) at (0,2); \coordinate (v4) at (-2,3); \coordinate (v5) at (-5,2); \coordinate (b1hat) at (-5,0); \coordinate (b1) at (-6, 0); \coordinate (M) at (1,2); \draw[fill = gray, opacity = 0.1] (v1) -- (v2) -- (v3) -- (v4) -- (v5) -- cycle; \draw [dashed] (b1)--(b1hat); \node at (v3) [left = .5mm of v3] {$A\hat{x}_2$}; \draw (v1)--(v2); \draw (v2)--(v3); \draw (v3)--(v4); \draw (v4)--(v5); \draw (v5)--(v1); \coordinate (v51) at ($(v5)!1cm!90:(v4)$); \coordinate (v52) at ($(v5)!1cm!-90:(v1)$); \coordinate (v41) at ($(v4)!1cm!90:(v3)$); \coordinate (v42) at ($(v4)!1cm!-90:(v5)$); \coordinate (v31) at ($(v3)!1cm!90:(v2)$); \coordinate (v32) at ($(v3)!1cm!-90:(v4)$); \draw[dashed] (M)--(v3); \node [right = .5mm of M] at (M) {$b_2$}; \coordinate (v21) at ($(v2)!1cm!90:(v1)$); \coordinate (v22) at ($(v2)!1cm!-90:(v3)$); \draw[pattern=north west lines, pattern color=gray] (v32).. controls +($.16*(v32)-.16*(v41)$) and +($.16*(v31)-.16*(v22)$) .. (v31) -- (v3) -- cycle; \coordinate (v11) at ($(v1)!1cm!90:(v5)$); \coordinate (v12) at ($(v1)!1cm!-90:(v2)$); \node at (-3,0) {$Q$}; \draw[pattern=north west lines, pattern color=gray] (v51).. controls +($.1*(v51)-.1*(v42)$) and +($.1*(v52)-.1*(v11)$) .. (v52) -- (v5) -- cycle; \draw[pattern=north west lines, pattern color=gray] (v11).. controls +($.16*(v11)-.16*(v52)$) and +($.18*(v12)-.18*(v21)$) .. (v12) -- (v1) -- cycle; \draw[pattern=north west lines, pattern color=gray] (v21).. controls +($.1*(v21)-.1*(v12)$) and +($.05*(v22)-.05*(v31)$) .. (v22) -- (v2) --cycle; \draw[pattern=north west lines, pattern color=gray] (v41).. controls +($.1*(v41)-.1*(v32)$) and +($.1*(v42)-.1*(v51)$) .. (v42) -- (v4) -- cycle; \draw[pattern = dots, pattern color = gray] (v41) -- (v4) -- (v3) -- (v32) -- cycle; \draw[pattern = dots, pattern color = gray] (v31) -- (v3) -- (v2) -- (v22) -- cycle; \draw[pattern = dots, pattern color = gray] (v21) -- (v2) -- (v1) -- (v12) -- cycle; \draw[pattern = dots, pattern color = gray] (v11) -- (v1) -- (v5) -- (v52) -- cycle; \draw[pattern = dots, pattern color = gray] (v51) -- (v5) -- (v4) -- (v42) -- cycle; \foreach \p in {v1,v2,v3,v4, v5, b1, b1hat, v11, v12, v21, v22, v31, v32, v41, v42, v51, v52, M} \fill (\p) circle(1pt); \node at (b1)[ left = .5mm of b1]{$b_1$}; \node at (b1hat) [right = .5mm of b1hat] {$A\hat{x}_1$}; \end{tikzpicture} \caption[The sampling of $b$]{The sampling of the vector $b$ from $Q+\lambda B$} \label{figure quality of target} \end{figure} \section{Proximity between Optimal Solutions of~\eqref{P0} and~\eqref{P1}} \label{sec:proximity} In this section we illuminate the Problems~\eqref{P0} and~\eqref{P1} from a deterministic point of view and develop worst-case bounds for the distance of the images of corresponding optimal solutions under $A$. Our point of departure is an optimal solution $\hat{x}$ of~\eqref{P1}. The target is to show that there exists an optimal solution $x^\star$ of~\eqref{P0} satisfying $\norm{A(\hat{x} - x^\star)}_2 \leq 2m^{3/2} \norm{A}_\infty$. Our strategy is to define a hyperplane containing $A\hat{x}$ in the space of target vectors $b$ that separates $b$ from all vectors $Ax$ with $x$ feasible for~\eqref{P0}. The next step is to show that if we perturb $\hat{x}$ along the fractional variables, we will remain in this hyperplane. This has the side-effect that we can find a feasible solution for~\eqref{P0} whose image is in the vicinity of $A \hat{x}$. The triangle inequality and basic geometry then come into play to establish the claimed bound. We introduce the hyperplane tangent to the ball $B(b,\|b-A\hat{x}\|_2)$ in $A\hat{x}$, \begin{equation*} H \mathrel{\mathop:}= \{ y \in \mathbb{R}^m: (b - A\hat{x})^\intercal y = (b - A\hat{x})^\intercal A\hat{x} \}. \end{equation*} \begin{lemma} \label{lem:sep} We have $(b - A\hat{x})^\intercal (A x - A\hat{x}) \leq 0$ for any point $x$ feasible for~\eqref{P1}. \end{lemma} \begin{proof} Assume that there exists a point $x$ feasible for~\eqref{P1} for which the inequality $(b - A\hat{x})^\intercal (Ax - A\hat{x}) > 0$ holds. As a convex combination the point $p \mathrel{\mathop:}= A(\hat{x} + \varepsilon (x - \hat{x}))$ is feasible for~\eqref{P1} for each $\varepsilon \in [0,1]$, and we can estimate the objective value as \[ \| b - p \|_2^2 = \| b-A\hat{x}\|^2_2 + \varepsilon^2 \| A(x-\hat{x}) \|_2^2 - 2\varepsilon (b-A\hat{x})^\intercal (Ax - A\hat{x}) < \|b - A \hat{x} \|_2^2 \] for $\varepsilon$ small enough. This contradicts the optimality of $\hat{x}$. We illustrated the argument geometrically in Figure~\ref{fig:hyperplane}. \begin{figure} \centering \begin{tikzpicture}[scale=0.7] \coordinate (b) at (0, 0); \draw[fill, black] (b) circle[radius=1pt]; \node at (b) [above left = 1mm of b] {$b$}; \coordinate (bhat) at (2,0); \draw[fill, black] (bhat) circle[radius=1pt]; \node at (bhat) [right = .5mm of bhat] {$A\hat{x}$}; \coordinate (H) at (2, -3); \node at (H) [right == 1mm of H] {$H$}; \coordinate (bstar) at (-1.5, -2.5); \draw[fill, black] (bstar) circle[radius = 1pt]; \node at (bstar) [left == 1mm of bstar] {$Ax$}; \draw[gray] (bstar)--(bhat); \coordinate (p) at ($(bstar)!(b)!(bhat)$); \draw[fill, black] (p) circle[radius = 1pt]; \node at (p) [below right == 1mm of p] {$p$}; \draw (2,3)--(2,-3.5); \draw (b) circle(2); \end{tikzpicture} \caption[The separation argument]{ If $H$ does not separate $b$ from $Ax$, there is a point $p$ closer to $b$ than $A\hat{x}$. } \label{fig:hyperplane} \end{figure} \end{proof} An important property is that $H$ contains many points that we can easily generate from $\hat{x}$. This is made precise below. \begin{lemma} \label{lem:H-affine} Define $\mathcal{F} \mathrel{\mathop:}= \{i \in [n]: \ \hat{x}_i \notin \mathbb{Z}\}$ where $\hat{x}$ is an optimal solution to~\eqref{P1}. We have \begin{equation*} A\hat{x} + \left\{ \sum_{i \in \mathcal{F}} \lambda_i A_i: \ \sum_{i \in \mathcal{F}} \lambda_i = 0 \right\} \subseteq H. \end{equation*} \end{lemma} \begin{proof} Let $v \mathrel{\mathop:}= b - A\hat{x} \in \mathbb{R}^m$ be the normal vector of $H$ and let \begin{equation*} y = \sum_{i\in \mathcal{F}} \lambda_i e_i \quad \text{ for some } \lambda_i \in \mathbb{R} \text{ with } \quad \sum_{i \in \mathcal{F}} \lambda_i = 0. \end{equation*} Since $x_i \in (0,1)$ for all $i \in \mathcal{F}$, there exists $\varepsilon >0$ such that both points $\hat{x} + \varepsilon y$ and $\hat{x} - \varepsilon y$ are feasible for~\eqref{P1}. By Lemma~\ref{lem:sep}, we must have $v^\intercal A(\hat{x} +\varepsilon y - \hat{x}) = v^\intercal A \varepsilon y \leq 0$ and $-v^\intercal A \varepsilon y \leq 0$, resulting in $v^\intercal Ay = 0$. Thus, $A(\hat{x} + y) \in H$. \end{proof} With these results we are now able to show a proximity result (Theorem~\ref{thm:proximity}) between $A\hat{x}$ and $Ax^\star$. Here, $\lfloor \hat{x} \rfloor$ denotes the vector $\hat{x}$ rounded down component-wise. \begin{proof}[Theorem~\ref{thm:proximity}] Given an optimal solution $\hat{x}$ of~\eqref{P1}, let $\mathcal{F} = \{i \in [n]: \ x_i \in (0,1)\}$. Without loss of generality, we may assume that $|\mathcal{F}| \leq m$ and $\mathcal{F} = \{1,2,\dots,|\mathcal{F}|\}$. Let $k \mathrel{\mathop:}= \sum_{i \in \mathcal{F}} \hat{x}_i$, and construct a feasible solution $y$ for~\eqref{P0} from $\hat{x}$ as follows: \begin{equation*} y_i:=\begin{cases} 1, & 1\leq i \leq \lfloor k \rfloor \\ k-\lfloor k \rfloor, & i = \lceil k \rceil \\ 0, & \lceil k \rceil +1 \leq i \leq |\mathcal{F}|\\ \hat{x}_i, & i \notin \mathcal{F}. \end{cases} \end{equation*} The point $y$ satisfies $0 \leq y_i \leq 1$ for all $i \in \lbrack n \rbrack$ and $\norm{y}_0 = \lceil \norm{\hat{x}}_1 \rceil \leq \sigma$. Since \begin{equation} \label{eq:affine-diff} \sum_{i \in \mathcal{F}} y_i = \sum_{i \in \mathcal{F}} \hat{x}_i, \end{equation} Lemma~\ref{lem:H-affine} implies that $Ay \in H$ and hence \begin{equation*} \norm{b - Ay}_2^2 = \norm{b - A\hat{x}}_2^2 + \norm{A \hat{x} - A y}_2^2. \end{equation*} Assume $\norm{Ax^\star - A\hat{x}}_2 \geq \norm{Ay - A\hat{x}}_2$ holds for the optimal solution $x^\star$ for~\eqref{P0}. Since $y$ is feasible for~\eqref{P0}, we also know $\norm{b- Ay}_2 \geq \norm{b-Ax^\star}_2$. We are now prepared to estimate (using Lemma~\ref{lem:sep} in the third line) \begin{align*} \norm{b - Ax^\star}_2^2 &= \norm{b - A\hat{x} + A\hat{x}- Ax^\star}_2^2 \\ &= \norm{b - A\hat{x}}_2^2 + \norm{A\hat{x}- Ax^\star}_2^2 + 2(b - A\hat{x})^\intercal (A\hat{x}- Ax^\star) \\ &\geq \norm{b - A\hat{x}}_2^2 + \norm{A\hat{x}- Ax^\star}_2^2 \\ &> \norm{b - A\hat{x}}_2^2 + \norm{A\hat{x}- Ay}_2^2 \\ &= \norm{b-Ay}_2^2, \end{align*} showing that $x^\star$ is not optimal. The proof is finished by observing that Equation~\eqref{eq:affine-diff} also implies $\norm{\hat{x}-y}_1 \leq 2 \norm{\hat{x} - \lfloor \hat{x} \rfloor}_1$, and consequently \begin{equation*} \norm{Ay - A\hat{x}}_2 \leq 2\norm{\hat{x} - \lfloor \hat{x} \rfloor}_1 \max_{i=1,\dots,n} \norm{A_i}_2 \leq 2m^{3/2} \norm{A}_{\infty}. \end{equation*} \qed \end{proof} \section{A Deterministic Algorithm} \label{sec:algorithm} The results presented so far give rise to a conceptually simple algorithm. Compute an optimal solution $\hat{x}$ to~\eqref{P1}. According to the proximity theorem in Section~\ref{sec:proximity}, we can limit our search for an optimal right-hand side vector $b^\star = Ax^\star$ in the vicinity of $A\hat{x}$. Since $b^\star$ might be fractional, we cannot enumerate all possible right-hand sides. Instead, we refine our approach by decomposing $x^\star = z^\star + f^\star$ into its integral part $z^\star$ and its fractional part $f^\star$. We first guess the support $\mathcal{F}$ of the fractional entries, which satisfies $|\mathcal{F}| \leq m$ by Lemma~\ref{lem:frac-entries}. For the remaining variables, we next establish a candidate set $Z^\star$ comprising the potential vectors $z^\star$ in the decomposition of $x^\star$. It will be essential to determine a bound on $|Z^\star|$. This is where the proximity theorem comes into play. We now enumerate the elements of $Z^\star$ and extend each of them by a vector $f^\star$ whose support is in the index set $\mathcal{F}$ that we guessed upfront. A composition of these two solutions will provide $x^\star$. This section is devoted to analyze this conceptually simple algorithm and this way shed some light on some of the details required. Before we describe the decomposition $x^\star = z^\star + f^\star$ in more detail, we discuss the standard obstacle in convex optimization that $\hat{x}$ can only be approximated. To be more precise, we call a solution $\bar{x}$ to~\eqref{P1} \emph{$\varepsilon$-close}, if \begin{equation} \label{eq:eps-close} \|b - A \bar{x}\|_2^2 - \|b - A\hat{x}\|^2_2 \leq \varepsilon^2. \end{equation} We obtain a canonical corollary from the proximity Theorem~\ref{thm:proximity}. \begin{corollary} \label{cor:proximity} Let $\bar{x}$ be an $\varepsilon$-close solution of~\eqref{P1}. \begin{enumerate} \item There exists an optimal solution $x^\star$ of~\eqref{P0} satisfying \begin{equation*} \norm{Ax^\star - A\bar{x}}_\infty \leq 2 m^{3/2} \norm{A}_{\infty} + \varepsilon. \end{equation*} \item The integral part $z^\star$ of $x^\star$ satisfies \label{pt:epsilon-2} \begin{equation*} \norm{A z^\star - A \bar{x}}_{\infty} \leq 3 m^{3/2} \norm{A}_{\infty} + \varepsilon. \end{equation*} \end{enumerate} \end{corollary} \begin{proof} We start by estimating the distance from $A \bar{x}$ to $A \hat{x}$ for an optimal solution $\hat{x}$ of~\eqref{P1}. We have \begin{align*} \| b - A\bar{x} \|_2^2 &= \| b - A \hat{x} + A\hat{x} - A \bar{x} \|_2^2 \\ &= \| b-A \hat{x} \|_2^2 + \| A \hat{x} - A \bar{x} \|_2^2 + 2 (b - A\hat{x})^\intercal (A\hat{x} - A\bar{x}), \end{align*} where the last term is non-negative by Lemma~\ref{lem:sep}. Rearranging terms, we obtain \begin{equation*} \| A\hat{x} - A\bar{x} \|_2^2 = \| b - A \bar{x} \|^2_2 - \| b - A \hat{x} \|^2_2 - 2(b-A\hat{x})^\intercal (A\hat{x} - A\bar{x}) \leq \varepsilon^2. \end{equation*} Applying the triangle inequality and combining the above estimate with Theorem~\ref{thm:proximity}, we have \begin{align*} \|Ax^\star - A\bar{x}\|_{\infty} &\leq \|Ax^\star - A\bar{x}\|_{2} \leq \|Ax^\star - A\hat{x} \|_{2} + \|A\hat{x} - A\bar{x}\|_{2} \\ &\leq 2 m^{3/2} \norm{A}_{\infty} + \varepsilon. \end{align*} For Part~\ref{pt:epsilon-2}, recall that $x^\star - z^\star = f^\star$ with $\|f^\star\|_0 \leq m$, implying the inequality $\|A(x^\star -z^\star)\|_{\infty} \leq m \|A\|_{\infty}$. We obtain \begin{align*} \|Az^\star - A\bar{x} \|_{\infty} &= \|Az^\star - Ax^\star + Ax^\star - A\bar{x}\|_\infty \\ &\leq \|A(z^\star - x^\star)\|_{\infty} + \|Ax^\star - A\bar{x}\|_\infty \\ &\leq m \norm{A}_{\infty} + 2 m^{3/2} \norm{A}_{\infty} + \varepsilon \leq 3 m^{3/2} \norm{A}_{\infty} + \varepsilon. \end{align*} \end{proof} We next outline the decomposition $x^\star = z^\star + f^\star$. If we chose a strict decomposition $f^\star = x^\star - \lfloor x^\star \rfloor$ we would have to guess all sets $\mathcal{F}$ of cardinality at most $m$. When reconstructing $f^\star$ later on however, we also allow entries with index in $\mathcal{F}$ to be integral. This allows us to guess only sets $\mathcal{F} \subseteq [n]$ with $|\mathcal{F}| = m$. As a first step, we guess the support of $f^\star$ in a straightforward way. \begin{lemma} \label{obs:guessing-fractional-entries} There are $n^m$ potentially different index sets $\supp (f^\star)$. \end{lemma} A canonical approach would be to search for the vector $f^\star$. Then we run again into the problem that our objective is a non-linear objective, and hence $f^\star$ depends on $z^\star$. This requires us to first search for an optimal $z^\star$ and then use continuous optimization techniques to compute $f^\star$. We denote by $A_{\setminus f^\star}$ the matrix $A$ without the columns with index in $\supp(f^\star)$. The next theorem shows that we can compute a small set $Z^\star$ of possible vectors for $z^\star$. \begin{theorem} \label{thm:finding-z-star} Let $\bar{x}$ be an $\varepsilon$-close solution to~\eqref{P1}. If $\supp(f^\star)$ is fixed, we can compute a set $Z^\star \subseteq \{0,1\}^n$ of candidate vectors such that \ $x^\star = z^\star + f^\star$ with $z^\star \in Z^\star$. This requires us to solve at most $(6 m^{3/2} \norm{A}_{\infty} + 2\varepsilon +1)^m$ linear integer programming problems. \end{theorem} \begin{proof} We have $Az^\star \in A\bar{x} + [-D_{\varepsilon},D_{\varepsilon}]^m \cap \mathbb{Z}^m$, where $D_{\varepsilon} = 3 m^{3/2} \norm{A}_{\infty} + \varepsilon$ by Corollary~\ref{cor:proximity}. For every $b^\star \in A \bar{x} + [-D_{\varepsilon},D_{\varepsilon}]^m \cap \mathbb{Z}^m$ we solve the integer feasibility problem \[ A_{\setminus f^\star} y = b^\star, \quad \sum_{i=1}^{n-m} y_i \leq \sigma-m, \quad y \in \{ 0, 1\}^{n-m}. \] If it has a feasible solution $y$, we can insert zero entries according to $\supp(f^\star)$ and obtain a vector $z \in \{0,1\}^n$ that qualifies as the vector $z^\star$. The set $Z^\star$ is the set of all extended vectors $z$. \end{proof} It remains to compose each $z^\star \in Z^\star$ with a vector $f^\star$. This is accomplished by solving a series of least-square problems. The reason why we proceed in this way is that it allows us to compute the exact vector $f^\star$ as opposed to an $\varepsilon$-close solution. \begin{lemma}[Extension lemma] For each $z \in Z^\star$ an optimal solution $f$ to $\min \{\|b - Az - Af \|_2 : \ \supp(f) \subseteq \supp(f^\star), 0 \leq f \leq \mathbf{1} \}$ can be computed in $\mathcal{O} (3^m m^3)$ arithmetic operations. \end{lemma} \begin{proof} As $f_i = 0$ for $i \notin \supp (f^\star)$, we can restrict to the matrix $A_{f^\star} \in \mathbb{Z}^{m \times m}$ and solve the equivalent problem $\min \{\|b^\prime - A_{f^\star} g\|_2 : \ g \in [0,1]^m\}$ for $b^\prime \mathrel{\mathop:}= b - Az$. Without the variable bounds this is a least-square problem that can be solved in $\mathcal{O}(m^3)$ arithmetic operations. Let $g^\star$ be an optimal solution. We guess the sets $S_0 \mathrel{\mathop:}= \{i: \ g^\star_i = 0\}$ and $S_1 \mathrel{\mathop:}= \{i: \ g^\star_i = 1\}$, and afterwards solve the modified least-square problem $\min \{\|b - A_{f^\star} g\|_2 : \ g_i = 0 \ \forall i \in S_0, g_i = 1 \ \forall i \in S_1\}$. If the solution $g$ is in $[0,1]^n$, its extension $f \in [0,1]^n$ qualifies as $f^\star$. In the end, we pick the best among all feasible extensions. As there are $3^m$ guesses, this finishes the proof. \end{proof} This completes the presentation of the main steps to prove Theorem~\ref{thm:main-1}. In fact, in order to obtain an optimal solution to~\eqref{P0} one proceeds as follows. We first guess the set $\supp(f^\star)$, determine the set $Z^\star$ and compute for every $z^\star \in Z^\star$ an optimal vector $f^\star$. The best of all those solutions solves~\eqref{P0}. As a last technicality, we have to show how to find an $\varepsilon$-close solution $\bar{x}$ for which we fall back on~\cite[Chap.\ 8]{Nesterov1994InteriorpointPA}. \begin{lemma}[{\cite[Chap.\ 8]{Nesterov1994InteriorpointPA}}] We can find a $\sqrt{m}\|A\|_{\infty}$-close solution for~\eqref{P1} in $\mathcal{O} \left( n^{7/2} \ln \left( n^2 \sigma \|b\|_1 \right) \right)$ arithmetic operations. \end{lemma} \begin{proof} We apply the results presented in~\cite[Chap.\ 8]{Nesterov1994InteriorpointPA} that depend on several parameters. Let $P \mathrel{\mathop:}= \{x \in [0,1]^n: \ \|x\|_1 \leq \sigma \}$ denote the feasible region of~\eqref{P1} and $\hat{x}$ an optimal solution. We first need to estimate \begin{equation*} \mathcal{D} \mathrel{\mathop:}= \max \{ \|b-A y \|_2^2 - \|b-A\hat{x}\|_2^2: \ y \in P \}. \end{equation*} For any $y \in P$ we can estimate \begin{align*} \| b - A y \|_2^2 - \|b - A\hat{x} \|^2_2 &= \|A y \|_2^2 - \|A \hat{x} \|_2^2 + 2b^\intercal A (\hat{x} - y) \\ &\leq \sigma^2 m \| A \|_{\infty}^2 + 4 \| b \|_1 \sigma \|A\|_{\infty} \\ &\leq 4 \sigma^2 m \| A \|_{\infty}^2 (\|b\|_1 + 1), \end{align*} resulting in $\mathcal{D} \leq 4 \sigma^2 m \| A \|_{\infty}^2 (\|b\|_1 + 1)$. As the initial point in the interior of $P$ that is required in~\cite[Chap.\ 8]{Nesterov1994InteriorpointPA} we choose $w \mathrel{\mathop:}= \tfrac{\sigma}{n + \sigma} \cdot \mathbf{1}$ where $\mathbf{1}$ denotes the all-ones vector. Next we estimate the \emph{asymmetry coefficient} \[ \alpha (P:w) \mathrel{\mathop:}= \max \{ t: \ w + t(w-P) \subseteq P \}. \] Since $[0,\tfrac{\sigma}{n}]^n \subseteq P \subseteq [0,1]^n$, for $t = \tfrac{\sigma}{n}$ we obtain \[ w + t ( w-P ) \subseteq w + t ( w - [0,1]^n ) = \left[ 0 , \tfrac{\sigma}{n} \right]^n \subseteq P, \] thus $\alpha (P:w) \geq \tfrac{\sigma}{n}$. By~\cite[Chap.\ 8, Eq. 8.1.5]{Nesterov1994InteriorpointPA} we can compute a feasible solution $\bar{x}$ of \eqref{P1} satisfying $\|b-A\bar{x}\|_2^2-\|b-A\hat{x}\|_2^2 \leq \delta \mathcal{D}$ in $O(1)(2n+1)^{1.5}n^2\ln \left(\frac{2n+1}{\alpha(P:w) \delta}\right)$ arithmetic operations. Finally, by choosing $\delta = \frac{1}{4\sigma^2(\norm{b}_1+1)}$ finding a $\sqrt{m} \|A\|_{\infty}$-close solution takes $\mathcal{O} \left( n^{7/2} \ln \left( n^2 \sigma \|b\|_1 \right) \right)$ arithmetic operations. \end{proof} \section{Extension} \label{sec:conclusion} A natural generalization of our problem is to consider arbitrary upper bounds $u_i>0$, i.e. \begin{equation} \label{l0-problem arbitrary bounds} \tag{$P_0^\prime$} \min_x \| Ax-b \|_2 \text{ subject to } \norm{x}_0 \leq \sigma \text{ and } 0 \leq x_i \leq u_i \text{ for all } i \in \lbrack n \rbrack. \end{equation} The natural convex relaxation of~\eqref{l0-problem arbitrary bounds} is given by: \begin{equation} \label{l1-relaxation arbitrary bounds} \tag{$P_1^\prime$} \min_x \| Ax-b \|_2 \text{ subject to } \sum_{i=1}^n \frac{x_i}{u_i} \leq \sigma \text{ and } 0 \leq x_i \leq u_i \text{ for all } i \in \lbrack n \rbrack. \end{equation} The results of Sections~\ref{sec:proximity} and~\ref{sec:algorithm} extend to this generalization in a straight-forward manner. For the algorithm it implies that the number of arithmetic operations increases by an additional factor of $\norm{u}_{\infty}^m$. The reason is the core of our approach: The proximity bound between optimal solutions for~\eqref{l0-problem arbitrary bounds} and~\eqref{l1-relaxation arbitrary bounds} respectively, increases by this factor. The proximity bound must however depend on $\| u \|_{\infty}$ as the following example shows: Let $n$ and $u$ be even, non-negative integers. Set $A \mathrel{\mathop:}= \mathbb{1}, \sigma \mathrel{\mathop:}= \frac{n}{2}$ and $b=\frac{u}{2}\mathbf{1}$ where $\mathbf{1}$ denotes the all-ones vector. It can easily be checked that $\hat{x}=\frac{u}{2}\mathbf{1}$ is optimal for~\eqref{l1-relaxation arbitrary bounds} while \begin{equation*} x^{\star}_i=\begin{cases} \frac{u}{2} , i \in \lbrack \sigma \rbrack \\ 0, i \in \lbrack n \rbrack \setminus \lbrack \sigma \rbrack \end{cases} \end{equation*} is optimal for~\eqref{l0-problem arbitrary bounds}. This shows that any approach aiming for a logarithmic dependency on $\norm{u}_{\infty}$ requires techniques that are different from the ideas presented in this paper. \subsubsection{Acknowledgements} The second and third author acknowledge support by the Einstein Foundation Berlin. \bibliographystyle{splncs04}
\section{Introduction} \label{sec:Introduction} Radiation pressure on dust grains is a potentially important mechanism in regulating star formation and disrupting dusty gas in star clusters \citep{Krumholz_Matzner_2009,Fall_2010,Murray_2010_clusters,Raskutti_2016,Thompson_Krumholz_2016,Raskutti_2017}, maintaining the vertical stability of starbursts and AGN discs \citep{Scoville_2003,Thompson_2005,Andrews_2011,Krumholz_Thompson_2012}, and launching winds from galaxies, Active Galactic Nuclei (AGN), star clusters, young massive stars, and evolved asymptotic giant branch (AGB) stars \citep{Murray_2011,Roth_2012,Krumholz_2013,Davis_2014,Thompson_2015,Rosen_2016,Wibking_2018,Zhang_2018, Costa_2018, Hofner_2018}. In the context of star/cluster formation, radiation pressure provides a crucial contribution in the expansion of feedback-driven H~{\sc ii} regions/bubbles \citep{Draine_2011,Kim_2016}, which limit the integrated star formation efficiency ($\epsilon_*$) of giant molecular clouds (GMCs) and lead to their inferred short lifetimes \citep{Chevance_2020,Chevance_2022, Chevance_2022b} The mechanism of radiation pressure operates through the absorption of momentum in photons by dust grains, and coupling this momentum to the gas through collisions. Photons in two broad frequency bands are relevant here: the direct UV/optical photons from young stars, and the dust-reprocessed IR photons. The opacity of dust grains to the former is typically $\kappa_{\mathrm{UV}} \sim 100$--$1000 \, \mathrm{cm}^{2} \, \mathrm{g}^{-1}$, and thereby clouds with surface densities $\Sigma \gtrsim \kappa_{\mathrm{UV}}^{-1} \sim 10$--$100 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ are optically thick to these photons, and therefore susceptible to dispersal by direct radiation pressure. That being said, the thermal pressure of photoionised gas can be comparable to or larger than radiation pressure in some range of $\Sigma$; indeed, semi-analytic models \citep{Krumholz_Matzner_2009,Fall_2010, Murray_2010_clusters,Kim_2016,Rahner_2017}, numerical simulations \citep{Kim_2018}, and observations \citep{Lopez_2011,Lopez_2014,Barnes_2020,Olivier_2021} find that radiation pressure is the dominant feedback mechanism only for clouds whose escape velocities are $\gtrsim 10 \, \,\mathrm{km} \, \mathrm{s}^{-1}$. Such conditions are realised in GMCs that go on to form young massive star clusters \citep{Zwart_2010}. On the other hand, the IR opacities of dust are significantly lower \citep[$\kappa_{\mathrm{IR}} \lesssim 10 \, \mathrm{cm}^2 \, \mathrm{g}^{-1}$; ][]{Semenov_2003}, and therefore require much higher cloud surface densities ($\Sigma \gtrsim 10^3 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) to effectively absorb these photons. However, if this condition is satisfied, IR photons can undergo repeated cycles of absorption and emission, enhancing the imparted momentum over the stellar UV/optical photon momentum \citep{Thompson_2005,Murray_2010_clusters}. This is the so-called \textit{multiple-scattering} regime, to differentiate it from the single-scattering regime, where the dust is optically thin to IR photons. Environments in the multiple-scattering regime in the local universe are primarily found in extreme regions such as dwarf starbursts and ultra-luminous infrared galaxies (ULIRGs) like Arp~220, which are subject to high external pressures ($P/k_{\mathrm{B}} \gtrsim 10^8 \, \mathrm{K}\,\mathrm{cm}^{-3}$). These environments potentially host the formation sites of super-star clusters \citep[SSCs; e.g.,][]{Mcgrady_2005,Zwart_2010,Turner_2015,LindaSmith_2020}, and represent a dense mode of star formation that might have existed more commonly at high redshift. Observations suggest that these clusters form stars very efficiently and are mostly bound, with the role of stellar feedback on their formation and evolution largely uncertain \citep{Turner_2017,LindaSmith_2020, Emig_2020, Villas_2020,Costa_2021,Hao_2022}. Recently, observations using the Atacama Large Millimeter/Submillimeter Array (ALMA) have managed to study the young, embedded phase of SSC formation at high resolution ($\sim 2 \,\mathrm{pc}$) in the nearby dwarf starburst NGC~253, shedding light on the properties of their natal GMCs \citep{Leroy_2018}, and the young stellar populations in them \citep{Mills_2021}. \citet{Levy_2021} conducted follow-up observations at even higher resolution ($\sim 0.5 \, \mathrm{pc}$) that have managed to probe the cluster-scale kinematics and feedback in these SSCs. Intriguingly, they find evidence of massive outflows from 3 of the 14 SSCs they characterise, with outflow velocities comparable to the SSC escape velocities, and outflowing masses that are a non-negligible fraction of the cloud/stellar mass. They consider multiple possible mechanisms that could drive these outflows, suggesting that either dust-reprocessed IR radiation pressure and/or stellar winds are the most likely; recent work by \citet{Lancaster_2021} casts doubts on the latter possibility. The former mechanism was raised in light of the semi-analytic model of \citet{Crocker_2018b}, which suggested that IR radiation pressure can drive outflows for $\Sigma \gtrsim 10^5 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ -- a condition satisfied by some of the detected SSCs with outflows. However, we recently presented 3D grey radiation hydrodynamic (RHD) simulations in \citet{Menon_2022b} (\citetalias{Menon_2022b} hereafter) -- which use temperature-dependent $\kappa_{\mathrm{IR}}$ and a state-of-the-art RHD scheme \citep{Menon_2022} -- showing that IR radiation pressure has minor dynamical impacts on clouds, irrespective of $\Sigma$. This is primarily because $\kappa_{\mathrm{IR}}$ is too low for radiation forces to compete with gravity (Eddington ratios, $f_{\mathrm{Edd}} \lesssim 0.4$) even at high $\Sigma$\footnote{\citet{Crocker_2018b} overestimate the impact of radiation forces as they use an analytical power-law approximation for $\kappa_{\mathrm{IR}}$, which significantly overestimates the opacities at higher temperatures.}, and because the efficiency of momentum transfer from radiation to gas is lowered by radiation-matter anticorrelation -- echoing the conclusions of earlier simulations that probed lower $\Sigma$ ranges \citep{Skinner_2015,Tsang_2018}. This raises concerns regarding the possibility that radiation pressure could drive the sort of winds seen in NGC~253. However, these simulations did not consider the contribution of radiation pressure in the UV band, and focused solely on the IR radiation pressure. The factor $\sim 100$ higher opacities in the UV could increase $f_{\mathrm{Edd}}$ significantly, especially in clouds in the lower ranges of the multiple-scattering limit\footnote{For very high $\Sigma$ clouds, the IR radiation force can be factors $\gtrsim 10$~times the corresponding UV one; in these cases, inclusion of the UV component is expected to have negligible effects; an expectation we confirm below.}. UV radiation pressure also has the attractive property that even if the cloud is globally sub-Eddington to this force, it can eject gas in sight lines that have lower $\Sigma$ set by turbulence \citep{Thompson_Krumholz_2016, Raskutti_2017}. Therefore, in this paper, we extend the simulations of \citetalias{Menon_2022b} to model the radiation field in both the UV and IR bands, thereby including the contribution of the direct and reprocessed radiation pressure, and test the dynamical impacts they have on SSC-forming clouds. We also quantify the relative impacts the two forces have at different cloud surface densities to constrain the dominant feedback mechanisms in different environments/conditions \citep[see, e.g., Fig. 12 in][]{Krumholz_2019}. The paper is organised as follows: In Section~\ref{sec:Methods} we describe the equations solved in our simulations, the numerical prescriptions we use, and the initial conditions of our clouds. In Section~\ref{sec:Results} we present the results of our simulation suite, exploring the dynamical impacts of radiation pressure on our model clouds, properties of outflows driven, and the dominant forces (UV vs IR) driving these outflows. In Section~\ref{sec:summary} we provide a summary of our results, and discuss them in the context of the observed outflows in NGC~253. \section{Methods} \label{sec:Methods} The simulation setup in this study largely follows that of \citetalias{Menon_2022b}; therefore, we summarize the salient features of our setup below and refer the reader to Section 2 of \citetalias{Menon_2022b} for further details. \subsection{Equations solved} \label{sec:Equations} We solve the non-relativistic RHD equations in two grey bands that represent the stellar UV and dust-reprocessed IR bands respectively, self-consistently computing the reprocessing of the UV to the IR by dust. We use the mixed-frame formulation \citep{Mihalas_1982} in the RHD equations, retaining terms that are of leading order in all limiting regimes of RHD \citep[see, e.g.,][]{Krumholz_2007a}, given by\footnote{Note that we denote tensor contractions over a single index with dots (e.g., $\mathbfit{a} \cdot \mathbfit{b}$), tensor contractions over two indices by colons (e.g., \mathbfss{A}:\mathbfss{B}), and tensor products of vectors without an operator symbol (e.g., $\mathbfit{a}\mathbfit{b}$).} \begin{gather} \frac{\partial \rho}{\partial t} + \nabla \cdot (\rho \textbf{v}) = 0 \label{eq:continuityeq} \\ \frac{\partial (\rho\textbf{v})}{\partial t} + \nabla \cdot (\rho \textbf{v}\textbf{v}) = - \nabla P - \rho \nabla \Phi + \mathbfit{G}_{\mathrm{UV}} + \mathbfit{G}_{\mathrm{IR}} \label{eq:gasMom} \\ \frac{\partial E_{r,\mathrm{UV}}}{\partial t} + \nabla \cdot \mathbfit{F}_{\mathrm{UV}} = j_* - cG^0_{v,\mathrm{UV}} \label{eq:EradUV} \\ \frac{\partial \mathbfit{F}_{\mathrm{UV}}}{\partial t} + \nabla \cdot (c^2\mathbfss{P}_{r,\mathrm{UV}}) = -c^2\mathbfit{G}_{\mathrm{UV}} \label{eq:FradUV} \\ \frac{\partial E_{r,\mathrm{IR}}}{\partial t} + \nabla \cdot \mathbfit{F}_{\mathrm{IR}} = \rho \kappa_{\mathrm{P},\mathrm{UV}} c E_{r,\mathrm{UV}} -cG^0_{v,\mathrm{IR}} \label{eq:EradIR} \\ \frac{\partial \mathbfit{F}_{\mathrm{IR}}}{\partial t} + \nabla \cdot (c^2\mathbfss{P}_{r,\mathrm{IR}}) = -c^2\mathbfit{G}_{\mathrm{IR}} \label{eq:FradIR} \\ P = c_{\mathrm{s}}^2 \rho \label{eq:Pgas}, \end{gather} where, \begin{equation} \begin{aligned} G^0_{v,\lambda} =\;& \rho \kappa_{\mathrm{P}}(E_{r,\lambda} - j_{\lambda}) + \rho \left(\kappa_{\mathrm{R},\lambda} - 2\kappa_{\mathrm{P},\lambda} \right) \frac{\mathbfit{v} \cdot \mathbfit{F}_{\lambda}}{c^2} \\ &+ \rho \left( \kappa_{\mathrm{P},\lambda} - \kappa_{\mathrm{R},\lambda} \right) \left[\frac{v^2}{c^2}E_{r,\lambda} + \frac{\mathbfit{v}\mathbfit{v}}{c^2} :\mathbfss{P}_{r,\lambda}\right], \end{aligned} \end{equation} and \begin{equation} \label{eq:G} \mathbfit{G}_{\lambda} = \rho \kappa_{\mathrm{R},\lambda} \frac{\mathbfit{F}_{\lambda}}{c} - \rho \kappa_{\mathrm{R},\lambda} E_{r,\lambda}\frac{\mathbfit{v}}{c} - \kappa_{\mathrm{R},\lambda} \frac{\mathbfit{v}}{c} \cdot \mathbfss{P}_{\lambda}, \end{equation} and $\lambda \equiv (\mathrm{UV}, \, \mathrm{IR})$ represent the band evolved in a corresponding equation. In the above equations $\rho$ is the mass density, $P$ the gas thermal pressure, $\mathbfit{v}$ the gas velocity, $\Phi$ the gravitational potential, $\mathbfss{I}$ the identity matrix, and $c$ the speed of light in vacuum. In the radiation moment equations (Equations~\ref{eq:EradUV} -- \ref{eq:FradIR}), $E_{r,\lambda}$ is the lab-frame radiation energy density, $\mathbfit{F}_{\lambda}$ the lab-frame radiation momentum density, $\mathbfss{P}_\lambda$ is the lab-frame radiation pressure tensor, $\kappa_{\rm P, \lambda}$ and $\kappa_{\rm R, \lambda}$ are the Planck and Rosseland mean opacities with avarages computed over the IR and UV bands\footnote{To be precise, by Planck and Rosseland means here we mean averages over the frequency band weighted by $B_\nu(T)$ and $\partial B_\nu/\partial T$, respectively, where $B_\nu(T)$ is the Planck function and $T$ is the radiation temperature.}. $j_*$ represents the direct UV radiation contribution rate from sink particles \citep{Federrath_2010_Sinks,Menon_2022b} and $j_{\lambda}$ represents the solid-angle integrated diffuse emission via dust grains in the given band. Equation~\ref{eq:Pgas} is the closure relation for the gas pressure, for which we assume an isothermal equation of state in our simulations, i.e., $P=c_{\mathrm{s}}^2 \rho$, where $c_{\mathrm{s}}$ is the thermal sound speed of the gas. The assumption of an isothermal equation of state does not considerably affect our results as the thermal pressure is subdominant over the radiation pressure in our simulations, and plays a minor role in the dynamics of our clouds. What would be affected by this assumption is the fragmentation on small scales. Heating by accretion feedback suppresses fragmentation \citep{OffnerEtal2009,Bate2009rad,KrumholzEtAl2016,FederrathEtAl2017,GuszejnovEtAl2018,MathewFederrath2020}, but our current simulations do not resolve these small-scale fragmentation processes anyway. What matters for the present simulations is the radiation output from massive stars and sub-clusters, which is modelled by sampling from a standard initial mass function on un-resolved scales, i.e., our sink particles represent small star clusters rather than individual stars \citepalias[for details, see][]{Menon_2022b}. We pause to explain the radiation energy source terms on the right-hand side of Equations~\ref{eq:EradUV} and \ref{eq:EradIR}. In Equation~\ref{eq:EradUV}, the term $j_*$ represents the UV photons emitted by the sink particles. We set the diffuse emission term $j_{\mathrm{UV}} = 0$, as the dust does not re-emit in the UV. In Equation~\ref{eq:EradIR}, the first term represents the contribution to the dust-reprocessed IR radiation under the (very reasonable) assumption that all the energy the dust has absorbed from UV photons is instantly reprocessed into the IR. This treatment of the IR radiation field is more consistent than the approach in \citetalias{Menon_2022b} where IR photons are injected directly with a term analogous to $j_*$. For the diffuse emission, we set $j_{\mathrm{IR}} = a_{\mathrm{R}} T^4$, where $a_{\mathrm{R}}$ is the radiation constant, to represent the emission in the IR by dust grains. We also invoke the assumption of radiative equilibrium for the IR radiation -- i.e., the dust temperature is always equal to the radiation temperature $T_r = (E_{r,\mathrm{IR}}/a_{\mathrm{R}})^{1/4}$. This assumption is justified in Appendix~A of \citet{Krumholz_2013} considering the regime we are studying. To close the equations above, we require a closure relation for the radiation pressure tensor. In both bands, we adopt the variable Eddington tensor (VET) closure \begin{equation} \label{eq:closure} \mathbfss{P}_{r,\lambda} = \mathbfss{T}_{\lambda}E_{r,\lambda}, \end{equation} where $\mathbfss{T}_{\lambda}$ is the Eddington Tensor for a given band. We use an Eddington tensor directly calculated from angular quadratures of the band specific intensity $I_{r,\lambda}(\hat{\mathbfit{n}}_k)$, using the relations \begin{gather} \label{eq:angularmoment0} E_{r,\lambda}=\int d \Omega\, I_{r,\lambda}(\hat{\mathbfit{n}}_k)/c, \\ \mathbfss{P}_{r,\lambda}=\int d \Omega\, \hat{\mathbfit{n}}_k \hat{\mathbfit{n}}_k\,I_{r,\lambda}(\hat{\mathbfit{n}}_k)/c. \label{eq:angularmoment2} \end{gather} $I_{r,\mathrm{UV}}$ and $I_{r,\mathrm{IR}}$ are calculated from formal solutions of the time-independent radiative transfer equations in the respective bands, \begin{gather} \frac{\partial I_{r,\mathrm{UV}}}{\partial s} = \frac{j_*}{4\pi} - \rho \kappa_{\mathrm{R},\mathrm{UV}} I_{r,\mathrm{UV}} \label{eq:RTeqUV} \\ \frac{\partial I_{r,\mathrm{IR}}}{\partial s} = \rho \kappa_{\mathrm{R},\mathrm{IR}} \left[\frac{c j_{\mathrm{IR}}}{4 \pi} - I_{r,\mathrm{IR}}\right] \label{eq:RTeqIR} \end{gather} where the term $j_*/(4\pi)$ represents the photons from the isotropically emitting sink particle, and $j_{\mathrm{IR}}$ is the frequency-integrated reprocessed emission of the dust grain at the temperature $T_r$, which is also assumed to be directionally isotropic. \subsection{Numerical methods} \renewcommand{\arraystretch}{1.0} \begin{table*} \caption{Summary of our simulation suite and their initial condition parameters.} \centering \label{tab:Simulations} \begin{threeparttable} \begin{tabular}{l c c c c c c c c c} \toprule \multicolumn{1}{l}{Model}& \multicolumn{1}{c}{$M_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$R_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$\Sigma_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$n_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$\sigma_{v}$}& \multicolumn{1}{c}{$v_{\mathrm{esc}}$}& \multicolumn{1}{c}{$t_{\mathrm{ff}}$}& \multicolumn{1}{c}{$\mathrm{UV}$}& \multicolumn{1}{c}{$\mathrm{IR}$}\\ & [$10^6 \, \mathrm{M}_{\sun}$]& [pc]& [$\mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$]& [$\mathrm{cm}^{-3}$]& [km/s]& [km/s]& [Myr]& & \\ \midrule \texttt{S2UVIR} &$1.0$ &$31.5$ &$3.2$$ \times 10^{2}$ &$3.1$$ \times 10^{2}$ &$12$ &16 &3.0 &\checkmark &\checkmark\\ \texttt{S3UVIR} &$1.0$ &$10.0$ &$3.2$$ \times 10^{3}$ &$9.7$$ \times 10^{3}$ &$22$ &29 &0.5 &\checkmark &\checkmark\\ \texttt{S4UVIR} &$1.0$ &$3.2$ &$3.2$$ \times 10^{4}$ &$3.1$$ \times 10^{5}$ &$40$ &52 &0.09 &\checkmark &\checkmark\\ \texttt{S5UVIR} &$1.0$ &$1.0$ &$3.2$$ \times 10^{5}$ &$9.7$$ \times 10^{6}$ &$71$ &92 &0.02 &\checkmark &\checkmark\\ \texttt{S2UV} &$1.0$ &$31.5$ &$3.2$$ \times 10^{2}$ &$3.1$$ \times 10^{2}$ &$12$ &16 &3.0 &\checkmark &$\times$\\ \texttt{S3UV} &$1.0$ &$10.0$ &$3.2$$ \times 10^{3}$ &$9.7$$ \times 10^{3}$ &$22$ &29 &0.5 &\checkmark &$\times$\\ \texttt{S4UV} &$1.0$ &$3.2$ &$3.2$$ \times 10^{4}$ &$3.1$$ \times 10^{5}$ &$40$ &52 &0.09 &\checkmark &$\times$\\ \texttt{S3IR} &$1.0$ &$10.0$ &$3.2$$ \times 10^{3}$ &$9.7$$ \times 10^{3}$ &$22$ &29 &0.5 &$\times$ &\checkmark\\ \texttt{S4IR} &$1.0$ &$3.2$ &$3.2$$ \times 10^{4}$ &$3.1$$ \times 10^{5}$ &$40$ &52 &0.09 &$\times$ &\checkmark\\ \texttt{S5IR} &$1.0$ &$1.0$ &$3.2$$ \times 10^{5}$ &$9.7$$ \times 10^{6}$ &$71$ &92 &0.02 &$\times$ &\checkmark\\ \bottomrule \end{tabular} \begin{tablenotes} \small \item \textbf{Notes}: The row in bold denotes the fiducial simulation of our study. Columns in order indicate - Model: model name, $M_{\mathrm{cloud}}$: mass of cloud, $R_{\mathrm{cloud}}$: radius of cloud, $\Sigma_{\mathrm{cloud}}$: mass surface density of the cloud given by $\Sigma_{\mathrm{cloud}} = M_{\mathrm{cloud}}/(\pi R_{\mathrm{cloud}}^2)$, $n_{\mathrm{cloud}}$: number density of the cloud given by $n_{\mathrm{cloud}} = 3M_{\mathrm{cloud}}/(4 \pi R_{\mathrm{cloud}}^3m_{\mathrm{H}})$ where $m_{\mathrm{H}}$ is the mass of atomic hydrogen, $\sigma_{v}$: turbulent velocity dispersion of the cloud, $v_{\mathrm{esc}}$: escape velocity of the cloud, $t_{\mathrm{ff}}$: free-fall time of the cloud, $\mathrm{UV}$: UV band is on ($\checkmark$) or off ($\times$), $\mathrm{IR}$: IR band is on ($\checkmark$) or off ($\times$). \end{tablenotes} \end{threeparttable} \end{table*} \label{sec:NumMethod} The numerical methods used to solve the equations outlined in the previous section are identical to \citet{Menon_2022b}. We use the Variable Eddington Tensor-closed Transport on Adaptive Meshes (\texttt{VETTAM}; \citealt{Menon_2022}) method coupled to the \texttt{FLASH} magneto-hydrodynamics code \citep{Fryxell_2000,Dubey_2008} for our simulations. For the hydrodynamic updates, we use an explicit Godunov method in the split, five-wave HLL5R (approximate) Riemann solver \citep{Waagan_2011}. The Poisson equation for the self-gravity is solved using a multi-grid algorithm implemented in \texttt{FLASH} \citep{Ricker_2008}. Sink particles are used to follow the evolution of gas at unresolved scales, the formation of which is triggered when gas properties satisfy a series of conditions to test for collapse and star formation \citep{Federrath_2010_Sinks}. Gravitational interactions of sink particles with gas and other sinks are considered, and a second-order leapfrog integrator is used to advance the sink particles\citep{Federrath_2010_Sinks,FederrathBanerjeeSeifriedClarkKlessen2011}. Sink particles in our simulations represent unresolved sub-clusters rather than individual stars. As in \citetalias{Menon_2022b}, we assume that these sub-clusters fully sample the initial mass function (IMF) of a young stellar population, and adopt an appropriate fixed light-to-mass ratio of $\langle L_*/M_*\rangle = 1.7 \times 10^3 \, \mathrm{erg} \, \mathrm{s}^{-1} \, \mathrm{g}^{-1}$, where $M_*$ is the mass of the radiating source. The UV radiation from sink particles is then included via the term $j_*$ in Equation~\ref{eq:EradUV}, given by \begin{equation} \label{eq:jstar} j_{*}(r)=\frac{L_{*}}{\left(2 \pi \sigma_{*}^{2}\right)^{3 / 2}} \exp \left(-\frac{r^{2}}{2 \sigma_{*}^{2}}\right), \end{equation} where $L_* = M_*\langle L_*/M_*\rangle$, and $r$ is the radial distance of a grid cell from the sink particle. We adopt a value of $\sigma_* = 4 \Delta x_{\mathrm{min}}$, where $\Delta x_{\mathrm{min}}$ is the minimum cell size in the domain; we have shown in \citetalias{Menon_2022b} that the radiation forces are fairly insensitive to the choice of this parameter. The radiation moment equations in the UV (Equations~\ref{eq:EradUV} and~\ref{eq:FradUV}) and IR (Equations~\ref{eq:EradIR} and~\ref{eq:FradIR}) bands are operator-split from the hyrodynamic and gravity updates, and solved with an implicit Euler-backward temporal scheme \citep{Menon_2022}. We perform two radiation updates per hydrodynamic timestep: first for the UV band, then followed by the IR band, which uses the time-updated solution in the UV band as a source term (i.e., the first term on the RHS of Equation~\ref{eq:EradIR}) -- hence the scheme is fully implicit in the radiation quantities\footnote{An alternate approach to treat the coupled nature of the two bands is to solve Equations~(\ref{eq:EradUV})--(\ref{eq:FradIR}) together in one global, implicit update for both bands. However, we found that the resulting performance and accuracy with this approach was inferior to the one we adopt. A subtle point worth noting here is that our adopted approach is possible only because the coupling between the bands is unidirectional in frequency space -- i.e., from UV to IR. For a system where this is not the case, a single, coupled update would be required.}. The time-independent radiative transfer equations (Eq.~\ref{eq:RTeqUV} and~\ref{eq:RTeqIR}) for obtaining the VET closure are obtained with a hybrid characteristics ray-tracing scheme \citep{Buntemeyer_2016}, and is computed prior to the radiation moment update for the respective band. In \citetalias{Menon_2022b} we performed a series of tests with \texttt{VETTAM} to quantify the accuracy of our VET-based RHD scheme for IR radiation. Since here is the first time that \texttt{VETTAM} is utilised to model UV radiation pressure, we reproduce the results obtained with our scheme for the fiducial model of \citet{Raskutti_2016} in Appendix~\ref{sec:AppendixUVRP}. \citet{Kim_2017} simulated this model with their Adaptive Ray-Tracing (ART) method, based on the \texttt{HARM}$^2$ algorithm introduced by \citet{Rosen_2017}, to demonstrate that the $M_1$ method (used in \citealt{Raskutti_2016}) underestimates the (UV) radiation forces, and as a result, the net star formation efficiency ($\epsilon_*$) -- obtaining $\epsilon_* \sim 25 \%$ with the ART scheme as opposed to $\sim 42 \%$ in the \citet{Raskutti_2016} version. We find a value of $\epsilon_* \sim 28 \%$, which is closer to the ART result than the $M_1$, demonstrating that a moment method based on the VET closure can be of comparable accuracy to an ART scheme for modelling the dynamical effects of streaming radiation forces\footnote{It is important to point out however, that an ART scheme, while quite accurate for streaming radiation, would be unable to model reprocessed or diffuse radiation (i.e., the IR band).}. \subsection{Initial conditions and parameters} We initialise our simulations as a uniform spherical cloud with mass ($M_{\mathrm{cloud}}$) and radius $R_{\mathrm{cloud}}$, which together define a cloud mass density $\rho_{\mathrm{cloud}} = M_{\mathrm{cloud}}/[(4/3) \pi R_{\mathrm{cloud}}^3]$ and a mass surface density $\Sigma_{\mathrm{cloud}} = M_{\mathrm{cloud}}/(\pi R_{\mathrm{cloud}}^2)$. The clouds are placed in a lower-density ambient medium with $\rho = \rho_{\mathrm{cloud}}/100$ in pressure-equilibrium, achieved using a mass-scalar to represent cloud material (see Section~2.4 of \citetalias{Menon_2022b}). The domain size is fixed to $L= 4 R_{\mathrm{cloud}}$ to allow sufficient volume to track potentially expanding material due to feedback. Clouds are initialised with turbulent velocities that follow a power spectrum $E(k) \propto k^{-2}$ with a natural mixture of solenoidal and compressive modes \citep[appropriate for supersonic molecular-cloud turbulence; see e.g.,][]{HeyerBrunt2004,Federrath_2013} for $k/(2\pi/L) \in \left[2,64 \right]$, generated with the methods described in \citet{Federrath_2010}, and publicly available \citep{FederrathEtAl2022ascl}. The velocity dispersion $\sigma_v$ is set such that the virial parameter $\alpha_{\mathrm{vir}}=2$, where $\alpha_{\mathrm{vir}}$ is given by \begin{equation} \alpha_{\mathrm{vir}} = \frac{2E_{\mathrm{kin}}}{E_{\mathrm{grav}}} = \frac{5R_{\mathrm{cloud}} \sigma_v^2}{3GM_{\mathrm{cloud}}}, \end{equation} where $E_{\mathrm{kin}} = (1/2) M_{\mathrm{cloud}} \sigma_v^2$ and $E_{\mathrm{grav}} = (3/5) G M_{\mathrm{cloud}}^2/R_{\mathrm{cloud}}$. The sound speed $c_{\mathrm{s}}$ is set such that the sonic Mach number $\mathcal{M} = \sigma_v/c_{\mathrm{s}} = 11.5$. We do not include magnetic fields in our simulations; we discuss in \citetalias{Menon_2022b} the caveats associated with this. The domain boundary conditions for the hydrodynamics are set to diode -- i.e., gas is allowed to flow out of the domain, but not allowed to enter it. The opacity in the UV band is set to a constant value of $\kappa_{\mathrm{P},\mathrm{UV}} = \kappa_{\mathrm{R},\mathrm{UV}} = 1000 \, \mathrm{cm}^2 \, \mathrm{g}^{-1}$, consistent with typical estimates of the gray radiation pressure cross section per H atom to blackbody radiation peaking at UV wavelengths \citep[blackbody temperatures $\sim$ few $\times 10^4 \, \mathrm{K}$; ][]{Draine_2011}. The opacity in the IR band is kept identical to \citetalias{Menon_2022b}, i.e., a temperature- (and density-) dependent infrared opacity with $\kappa_{\mathrm{P},\mathrm{IR}} = 0$ (due to radiative equilibrium) and $\kappa_{\mathrm{R},\mathrm{IR}} = \kappa_{\mathrm{Sem}}$, where $\kappa_{\mathrm{Sem}} = \kappa_{\mathrm{Sem}} (\rho, T_{\mathrm{r}})$ is the \citet{Semenov_2003} opacity, calculated at the radiation temperature $T_{\mathrm{r}}$. The temperature dependence of the opacity in the IR is retained, which is crucial to accurately capture the dynamics of the clouds under reprocessed radiation pressure \citepalias{Menon_2022b}. The initial condition for the radiation is as follows: $E_{r,\mathrm{UV}} = \mathbfit{F}_{\mathrm{UV}} = 0$, and $E_{r,\mathrm{IR}} = a_{\mathrm{R}} T_{\mathrm{r},0}^4$, $\mathbfit{F}_{\mathrm{IR}} = 0$, where $T_{\mathrm{r},0} = 40 \, \mathrm{K}$ is the initial dust temperature in the cloud. We adopt Marshak boundary conditions for the radiation field \citep{Marshak_1958}, with boundary radiation temperatures of $T_{\mathrm{b},\mathrm{UV}} = 0$ and $T_{\mathrm{b},\mathrm{IR}} = T_{\mathrm{r},0}$ respectively. We also note that the boundary condition for the ray-tracer is kept consistent with these choices. We note that we do not treat photoionization of gas by UV photons, and the corresponding thermal-pressure driven feedback on the clouds. However, in the regime we are exploring (high surface-density clouds with escape speeds $\gtrsim 10 \, \mathrm{km}/s$), radiation pressure forces have been shown to exceed ionized gas pressure, and dominate the dynamical evolution of clouds \citep{,Dale_2012,Kim_2016,Kim_2018}. \begin{figure*} \centering \includegraphics[width=0.9 \textwidth]{Images/CompareSigmaProjection.pdf} \caption{Surface density maps at $t = 3 t_{\mathrm{ff}}$ for the different values of $\Sigma_{\mathrm{cloud}}$ (panels) with the corresponding star formation efficiency ($\epsilon_*$) annotated. Star symbols indicate sink particles, coloured by their mass (see inset colour bar in lower right panel). Vectors (black) indicate the mass-weighted projected velocity field, with arrow length indicating velocity magnitude. The scale for the velocity vectors is annotated in the lower right panel. The surface densities and positions are scaled to $\Sigma_{\mathrm{cloud}}$ and $R_{\mathrm{cloud}}$, respectively.} \label{fig:CompareSigmasProj} \end{figure*} \begin{figure*} \centering \includegraphics[width=0.9 \textwidth]{Images/CompareSigmaProjection_lateTime.pdf} \caption{Same as Figure~\ref{fig:CompareSigmasProj}, but at time $t = 7 t_{\mathrm{ff}}$.} \label{fig:CompareSigmasProjLate} \end{figure*} \subsection{Simulations} We run a range of simulations with different surface densities $\Sigma_{\mathrm{cloud}}$ -- along the lines of \citetalias{Menon_2022b} -- to test the impact of radiation pressure in different environments. We obtain our target values of $\Sigma_{\mathrm{cloud}}$ by keeping the mass of the clouds fixed to $M_{\mathrm{cloud}} = 10^6 \mathrm{M}_{\sun}$, and scaling $R_{\mathrm{cloud}}$ appropriately. We test values of $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ up to $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, varying by factors of 10 between consecutive runs with different $\Sigma_{\mathrm{cloud}}$; the resulting cloud parameters are tabulated in Table~\ref{tab:Simulations}. All of our clouds are optically thick to UV photons. We note that our parameters cover a range that is more massive and of higher surface density than typical star-forming clouds in local galaxies, a choice motivated by the expectation that radiation pressure is the dominant stellar feedback mechanism in this regime \citep{Krumholz_Matzner_2009,Fall_2010, Kim_2016}. The two lowest surface density points ($\Sigma_{\mathrm{cloud}} \sim 10^2$--$10^3 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) represent conditions appropriate for young massive clusters in regions like the Central Molecular Zone (CMZ), whereas the two higher values of $\Sigma_{\mathrm{cloud}}$ ($\Sigma_{\mathrm{cloud}} \sim 10^4$--$10^5 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) represent super-star clusters that are probably found only in more extreme environments such as starburst galaxies \citep[e.g.,][]{Leroy_2018}. Our standard runs evolve radiation in both the UV and IR bands. To isolate the effects of the radiation pressure in either band, and to quantify their relative importance in the evolution of the clouds, we also run some control simulations where either the UV or IR band is not included. We list all the simulations explored in this study in Table~\ref{tab:Simulations}. The IR-only runs have already been presented in \citetalias{Menon_2022b}; the UV-only runs are new. We adopt as a convention that run names are of the form \texttt{SsUVIR}, \texttt{SsUV}, and \texttt{SsIR} respectively for UV+IR, UV-only, and IR-only runs, while \texttt{s} encodes the cloud surface density $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^{\texttt{s}} \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$. We do not simulate a UV-only version for $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^{5} \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, as we expect UV to be unimportant compared to IR at these high surface densities; low-resolution tests confirm this is the case. Similarly, we do not run an IR-only version for our lowest surface density case ($\Sigma_{\mathrm{cloud}} = 3.2 \times 10^{3} \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$), as it is below the typical surface densities required to be optically thick to IR photons ($\Sigma \lesssim \kappa_{\mathrm{IR}}^{-1} \sim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$). All our simulations use a uniform grid (UG) with $N^3 = 256^3$ grid cells; for our domain of size $L = 4 R_{\rm cloud}$, this corresponds to a resolution in terms of the number of grid cells per cloud radius of $R_{\rm cloud}/\Delta x = 64$. We show that our results are converged with numerical resolution in Appendix~\ref{sec:AppendixResolution}. We adopt a CFL number of 0.4, a relative tolerance of $10^{-8}$ for our implicit update of the radiation moment equations, and perform the solution to the time-independent transfer equation with 48~rays per cell using our ray-tracing scheme \citep[based on the Healpix algorithm;][]{BuntemeyerEtAl2016}. We run all simulations up to the point where all the mass has been accreted onto sink particles or expelled from the computational domain by radiation forces, or to a time $t=8\,t_{\mathrm{ff}}$, where $t_{\mathrm{ff}}$ is the free-fall time of the cloud -- whichever is earlier. \section{Results} \label{sec:Results} Here we present the main results of our study, beginning with a broad overview of the qualitative outcomes in Section \ref{ssec:evolution}. We follow this up with a detailed examining of the radiatively-driven outflows we observe in Section \ref{sec:Outflows}, a comparison of the relative roles of the IR and UV radiation forces in Section \ref{sec:UVIRForces}, and a quantitative analysis of the (in)efficiency of radiation in regulating star formation in Section \ref {sec:radpres_efficiency}. \subsection{Evolution of Clouds} \label{ssec:evolution} \begin{figure} \centering \includegraphics[width = 0.44 \textwidth]{Images/CompareSFE.pdf} \caption{Time evolution of the integrated star formation efficiency ($\epsilon_* = M_*/M_{\mathrm{cloud}}$) (top panel) and the fraction of mass ejected from the computational volume ($\epsilon_{\mathrm{ej}} = M_{\mathrm{ej}}/M_{\mathrm{cloud}}$ where $M_{\mathrm{ej}}$ is the ejected mass) (bottom panel), for different values of $\Sigma_{\rm cloud}$ (colours). Dark grey dashed lines indicate a control run without radiation feedback (No RT).} \label{fig:CompareSFE} \end{figure} \begin{figure*} \centering \includegraphics[width = 0.94 \textwidth]{Images/CompareEddAlt.pdf} \caption{Angle-averaged, volume-weighted Eddington ratio (based on Eq.~\ref{eq:fEdd}) compared at different times for different $\Sigma_{\mathrm{cloud}}$ (panels). The corresponding line for $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ at $t=7 \, t_\mathrm{ff}$ is not plotted as there is no gas remaining in the domain.} \label{fig:CompareEdd} \end{figure*} \begin{figure*} \centering \includegraphics[width = 0.94 \textwidth]{Images/RVelTimes.pdf} \caption{Volume-weighted radial velocity averaged over radial shells at radius $r$ and times $t = [3,5,7] \, t_{\mathrm{ff}}$. The dotted lines indicate zero radial velocities, and the dashed lines indicate the escape speed of the cloud ($v_{\mathrm{esc}}$), with their values annotated.} \label{fig:RVelTimes} \end{figure*} We discuss the time evolution of our fiducial set of model clouds in this section. The initial turbulent fluctuations form filamentary structures that become gravitationally unstable, and go on to collapse until sink particles (which represent sub-clusters of stars) form. This introduces radiation pressure due to feedback -- i.e., UV photons from the sink particles and the subsequently reprocessed IR photons -- which acts as potential support against gravitational collapse. The subsequent dynamics of the clouds are controlled by whether, and at what point, radiation forces are able to compete with gravity, and therefore depend on $\Sigma_{\mathrm{cloud}}$; this can be seen in Figures~\ref{fig:CompareSigmasProj} and \ref{fig:CompareSigmasProjLate}, which show snapshots of the gas surface density at times $t \sim 3 \, t_\mathrm{ff}$ and $t \sim 7 \, t_\mathrm{ff}$ respectively, for the different runs. In model \texttt{S2UVIR} ($\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$), accretion terminates by $\sim 2 \, t_{\mathrm{ff}}$, and radiation forces start driving gas outwards, forming bubbles and filaments characteristic of \ion{H}{II} regions, and evacuating gas from the domain (top-left panel in Figure~\ref{fig:CompareSigmasProj}). Eventually, by $t \sim 4$--$5 \, t_{\mathrm{ff}}$, all the gas is evacuated from the domain, and only the sink particles remain (top-left panel in Figure~\ref{fig:CompareSigmasProjLate}). Model \texttt{S3UVIR} continues to accrete gas even beyond $t \gtrsim 2 t_{\mathrm{ff}}$, and accumulates more mass in sink particles than \texttt{S2UVIR}; however by $t \sim 3 t_{\mathrm{ff}}$, radiation forces become stronger than gravity over a large part of the domain, initiating an outflow (top-right panel in Figure~\ref{fig:CompareSigmasProj}), which becomes stronger and more extended over time (top-right panel in Figure~\ref{fig:CompareSigmasProjLate}). Model \texttt{S4UVIR} evolves similarly at early times, but unlike the earlier cases, there are no signs of radiation-driven outflows at $t \sim 3 t_{\mathrm{ff}}$; once $t\sim 6 \, t_\mathrm{ff}$, however, an outflow is initiated, albeit less pronounced and more asymmetrical than in the cases with lower $\Sigma_{\mathrm{cloud}}$ (Figure~\ref{fig:CompareSigmasProjLate}), however showing indications of increasing strength with time. Finally, model \texttt{S5UVIR} continues to collapse for the whole duration of the simulation, with the snapshots showing only signs of infall and rotation (present due to the non-zero angular momentum imparted by the initial turbulent fluctuations), implying that gravity dominates the dynamics in this case. We quantify the evolutionary stages in the simulations, and the differences with $\Sigma_{\mathrm{cloud}}$, by measuring the the star formation efficiency $\epsilon_*$, given by \begin{equation} \epsilon_* = \frac{M_{*}}{M_{\mathrm{cloud}}}, \label{eq:sfe} \end{equation} where $M_*$ is final stellar mass, and $M_{\mathrm{cloud}}$ is the initial cloud mass; Figure~\ref{fig:CompareSFE} shows $\epsilon_*$ (top panel) as a function of time for the different model clouds. We see that the combined gravitational forces from the sink particles and the gas self-gravity increase $\epsilon_*$ for $t \lesssim 2$--$3 \, t_{\mathrm{ff}}$, after which point it saturates at $\epsilon_* \sim 75 \%$ in all runs except the lowest surface density case ($\Sigma_{\mathrm{cloud}} = 3.2 \times 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$), which saturates at $\epsilon_* \sim 58 \%$. The former value is similar to that obtained in a control run without feedback (labelled \texttt{NoRT} in Figure~\ref{fig:CompareSFE}). This implies that even though radiation forces in runs \texttt{S3UVIR} and \texttt{S4UVIR} drive outflows, this has no discernible impact on $\epsilon_*$. This is because the outflows begin only after these runs reach their respective final $\epsilon_*$ values. The finding that radiation feedback is unable to regulate $\epsilon_*$ for $\Sigma_{\mathrm{cloud}} \gtrsim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ is consistent with the results of \citetalias{Menon_2022b}, who only studied the 3 higher $\Sigma_{\mathrm{cloud}}$ values in our present simulation suite. We note that although \citetalias{Menon_2022b} only considered the effects of IR radiation pressure, and did not include the UV radiation pressure, \textit{this conclusion remains unchanged}. We also quantify the fraction of gas ejected from the volume, $\epsilon_\mathrm{ej}$ (Figure~\ref{fig:CompareSFE}; bottom panel), where \begin{equation} \epsilon_{\mathrm{ej}} = \frac{M_{\mathrm{ej}}}{M_{\mathrm{cloud}}}, \end{equation} such that $M_{\mathrm{ej}}$ is the gas mass ejected from the computational volume. The lowest $\Sigma_{\mathrm{cloud}}$ case, as expected, has the vast majority of its cloud mass ejected ($\epsilon_\mathrm{ej} \sim 45 \%$). However, it is more interesting to notice that there are marginal, but non-negligible differences in $\epsilon_\mathrm{ej}$ between run \texttt{S3UVIR} and the higher $\Sigma_{\mathrm{cloud}}$/No-RT cases for $t> 4 t_{\mathrm{ff}}$, in spite of their evolution in $\epsilon_*$ being indistinguishable. This is due to the outflows driving mass out of the domain. It is interesting to note that even though the gas morphology and kinematics shows signs of outflowing gas in \texttt{S4UVIR}, the mass removed from the domain is negligible -- as evident from Figure~\ref{fig:CompareSFE}. However, this is likely because the outflows are initiated only at late times, and thus we have not run the simulations for sufficient time for this gas to escape the domain; visual inspection of the time evolution of the clouds confirms this is the case. These results suggest that for i) $\Sigma_{\mathrm{cloud}} \sim \mathrm{few} \, 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, radiation pressure can regulate $\epsilon_*$ and drive a significant fraction of its mass as outflows, ii) for $\Sigma_{\mathrm{cloud}} \lesssim 10^3$--$10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, radiation pressure cannot regulate $\epsilon_*$, but once high $\epsilon_*$ is reached, clusters formed in such clouds can drive outflows, and iii) for $\Sigma_{\mathrm{cloud}} \gtrsim 10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, radiation pressure can neither regulate $\epsilon_*$ nor otherwise affect the dynamics at any significant level. To quantify why this is the case, we look at the time-evolution of the Eddington ratio averaged over the full sphere, $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$, where the Eddington ratio $f_{\mathrm{Edd}}$ is given by the ratio of specific radiation ($\dot{p}_{\mathrm{rad}}$) and gravity forces ($\dot{p}_{\mathrm{grav}}$), \begin{equation} f_{\mathrm{Edd}} = \frac{\dot{p}_{\mathrm{rad}}}{\dot{p}_{\mathrm{grav}}}. \label{eq:fEdd} \end{equation} We use the following procedure to compute $\dot{p}_{\mathrm{rad}}$ and $\dot{p}_{\mathrm{grav}}$. We define a spherical coordinate system centred on the instantaneous centre of mass of the sink particles, and assign every computational cell to one of $128$ radial bins relative to this point. We compute the direction of the radial vector $\hat{\mathbfit{r}}$ relative to the centre of mass, and use it to compute \begin{equation} \dot{p}_{\mathrm{rad}} = \frac{\left( \kappa_{\mathrm{R},\mathrm{UV}} \mathbfit{F}_{0,\mathrm{UV} } + \kappa_{\mathrm{R},\mathrm{IR}} \mathbfit{F}_{0,\mathrm{IR} } \right)}{c} \cdot \hat{\mathbfit{r}}, \label{eq:forcerad} \end{equation} where $\mathbfit{F}_{0,\mathrm{UV}}$ and $\mathbfit{F}_{0,\mathrm{IR}}$ are the radiation fluxes in the co-moving frame of the fluid in the UV and IR band, respectively. The corresponding (specific) gravitational force $\dot{p}_{\mathrm{grav}}$ is given by \begin{equation} \dot{p}_{\mathrm{grav}} = g_{\mathrm{gas}} + g_{*}, \end{equation} where $g_{\mathrm{gas}} = -\hat{\mathbfit{r}}\cdot \nabla \Phi_{\mathrm{gas}}$ and $g_{*} = - \hat{\mathbfit{r}}\cdot \nabla \Phi_{*}$, and $\Phi_{\mathrm{gas}}$ and $\Phi_{*}$ are the gravitational potentials of the gas and sink particles, respectively. To compute $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$, we simply take the volume average $f_{\mathrm{Edd}}$ over all the cells in each radial bin. We plot $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ for the different $\Sigma_{\mathrm{cloud}}$ cases for $t = [2,3,5,7] \, t_{\mathrm{ff}}$ in Figure~\ref{fig:CompareEdd}. We see that the differences and temporal behaviour found in our simulations are consistent with the variations in $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$. The $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case is super-Eddington at all times for radii $\lesssim R_{\mathrm{cloud}}$. The $3.2 \times 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ cloud is sub-Eddington at earlier times ($t/t_{\mathrm{ff}}\lesssim 2$) and then becomes super-Eddington at $t \gtrsim 3 t_{\mathrm{ff}}$. Interestingly, the $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case -- at late times ($t \gtrsim 5 t_{\mathrm{ff}}$) -- shows a super-Eddington profile for $r \lesssim R_{\mathrm{cloud}}$, but is sub-Eddington at larger radii, more so at later times. This could potentially explain the behaviour of $\epsilon_{\mathrm{ej}}$ for this run -- i.e., gas at small radii is expelled in an outflow, but rather than escaping to infinity it decelerates and falls back onto the cloud once it reaches larger radii, where the gas is largely sub-Eddington; indeed, this behaviour is visible in the velocity fields in the corresponding panel for this run (lower-left) in Figure~\ref{fig:CompareSigmasProjLate}. Therefore significant mass does not escape the domain in spite of the dynamical signatures of outflows in the gas distributions. \subsection{Outflows driven by radiation pressure} \label{sec:Outflows} Since we find that gas is driven radially outwards by radiation pressure forces in some of our model clouds, in this section we examine the properties of the outflows in more detail. We begin by calculating the radial velocity of the gas $\mathbfit{v} \cdot \hat{\mathbfit{r}}$ over the domain, where $\hat{\mathbfit{r}}$ is the radial unit vector with respect to the centre of mass of the sink particle distribution. We then perform a (volume-)average of this quantity over all solid angles for spherical shells at different $r$ (similar to $\langle f_{\mathrm{Edd}} \rangle_{4\pi}$) to obtain the average radial velocity of gas as a function of radius, i.e., $\langle \mathbfit{v} \cdot \hat{\mathbfit{r}} \rangle_{4\pi}$. We show this quantity at different times for our fiducial runs in Figure~\ref{fig:RVelTimes}. We see that the radial velocities are increasing with time, and are positive over a reasonable extent of the cloud in all cases except the largest $\Sigma_{\mathrm{cloud}}$ case, where the gas is inflowing at all radii. In the lowest $\Sigma_{\mathrm{cloud}}$ case, the gas is outflowing at up to $\sim 6\times$ the escape speed, even at early times. The \texttt{S3UVIR} run exceeds escape speeds by a factor of \mbox{$\sim 2$--$2.5$} at later times, while the \texttt{S4UVIR} cloud does so only at late times, and even then not over the entire extent of the cloud, consistent with the behaviour of $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ in Figure~\ref{fig:CompareEdd}. We also compute the mass flux $\dot{M}_{\mathrm{out}}$ across the cloud boundary (i.e., the Cartesian surfaces at $R_{\mathrm{cloud}}$) as a function of time. To compute $\dot{M}_{\mathrm{out}}$, we integrate the radial component of the momentum flux over the cartesian surfaces at $R_{\mathrm{cloud}}$ (denoted by $\partial S$), i.e., \begin{equation} \dot{M}_{\mathrm{out}} = \int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right), \end{equation} where $\hat{\mathbfit{n}}$ is the unit vector normal to the Cartesian surface, and $dA$ the surface area. We show the time evolution of $\dot{M}_{\mathrm{out}}$ for the fiducial set of simulations in Figure~\ref{fig:Outflow_Rate}, scaled by $M_{\mathrm{cloud}}/t_{\mathrm{ff}}$. We can see that there is a net outflow of material ($\dot{M}_{\mathrm{out}} >0$) for all runs except \texttt{S5UVIR}, with the time at which outflows begin increasing with $\Sigma_{\mathrm{cloud}}$. To compute a characteristic outflow speed for each case, we define $v_{\mathrm{out}}$, the momentum-flux weighted radial velocity, which is given by \begin{equation} v_{\mathrm{out}} = \frac{\int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \mathcal{H} \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \left( \mathbfit{v} \cdot \hat{\mathbfit{r}} \right)}{\int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \mathcal{H} \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right)}, \end{equation} where $\mathcal{H}$ is the Heaveside step function. We apply the Heaveside filter to ensure that $v_{\mathrm{out}}$ does not diverge even if there is a mixture of outflowing and inflowing gas at the cloud boundary surface, so that $\dot{M}_{\mathrm{out}}$ is nearly zero due to cancellations. However, this also means that $v_{\mathrm{out}}>0$ by construction, even if there is no outflow being driven. For this reason we only compute $v_{\mathrm{out}}$ for times where $\dot{M}_{\mathrm{out}}>0$; we show this in the lower panel of Figure~\ref{fig:Outflow_Rate}, scaled by the cloud escape speed ($v_{\mathrm{esc}}$; see Table~\ref{tab:Simulations}). We also compute the time-averaged values of $\dot{M}_{\mathrm{out}}$ and $v_{\mathrm{out}}$ for times where outflows are driven, which we report in Table~\ref{tab:Results}. We can see that there is a clear progression of $v_{\mathrm{out}}$ from larger to smaller values for higher $\Sigma_{\mathrm{cloud}}$. This essentially occurs because the gravitational potential wells are deeper at higher $\Sigma_{\mathrm{cloud}}$, and the resulting Eddington ratios are lower (Figure~\ref{fig:CompareEdd}). We also compute the total radial momentum in the ejected outflow, $p_{\mathrm{out}}$, given by \begin{equation} p_{\mathrm{out}} = \int dt \int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \mathcal{H} \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \left( \mathbfit{v} \cdot \hat{\mathbfit{r}} \right). \end{equation} We normalise this by the final mass of stars formed, to obtain $p_{\mathrm{out}}/M_*$. This is useful to estimate the possible impact the outflows might have on the larger-scale ISM, and to compare with corresponding estimates made for clouds with lower surface densities in earlier studies \citep[e.g.,][]{Kim_2018}. We report the values of $p_{\mathrm{out}}/M_*$ in Table~\ref{tab:Results}. We see that $p_{\mathrm{out}}/M_*$ is relatively low, and is significantly lower than the typical estimates for supernova feedback \citep[e.g.,][]{Kim_2015, Gentry_2017, Gentry_2019}, suggesting that the radiation pressure-driven outflows are relatively insignificant on larger scales. We note, however, that our simulations lack the ionising UV radiation, which could possibly increase the estimates of $p_{\mathrm{out}}/M_*$, although it is likely to be at most a factor $\sim$ few. \begin{figure} \centering \includegraphics[width = 0.48 \textwidth]{Images/Outflow_Velocity_Rate.pdf} \caption{Time evolution of the (normalised) mass outflow rate ($\dot{M}_{\mathrm{out}}$; top), and the momentum-flux weighted outflow velocity ($v_{\mathrm{out}}$), normalised by $v_{\mathrm{esc}}$ (bottom), for runs with different $\Sigma_{\mathrm{cloud}}$. We only show $v_{\mathrm{out}}$ for times at which $\dot{M}_{\mathrm{out}}>0$, indicating a net outflow of gas; the corresponding line for \texttt{S5UVIR} is not present as there is no bulk outflow in this case.} \label{fig:Outflow_Rate} \end{figure} \subsection{UV and IR radiation forces} \label{sec:UVIRForces} \begin{figure} \centering \includegraphics[width = 0.48 \textwidth]{Images/CumForceRatio.pdf} \caption{The cumulative momentum rate over all radii scaled by $L_*/c$ that is imparted individually by the UV (Equation~\ref{eq:forceuv}; squares) and IR (Equation~\ref{eq:forceir}; diamonds) radiation pressures, and the combination of the two (circles), in the \texttt{SnUVIR} series.} \label{fig:CumForce} \end{figure} \begin{figure*} \centering \includegraphics[width = 0.98 \textwidth]{Images/CompareEddUVIR.pdf} \caption{Eddington ratio compared at $t = 7 t_{\mathrm{ff}}$ for different $\Sigma_{\mathrm{cloud}}$ (panels) separated by the bands evolved in the simulations.} \label{fig:CompareEddUVIR} \end{figure*} Our simulations allow us to quantify the relative effects of the radiation forces in the UV and IR band, and thereby their contributions in setting the Eddington ratios in Figure~\ref{fig:CompareEdd}. To do so, we calculate the cumulative radiation pressure forces separately in the UV and IR bands for our fiducial runs. The forces are defined in a similar fashion to Equation~\ref{eq:forcerad}, to produce the cumulative UV radiation force given by \begin{equation} \dot{p}_{\mathrm{UV},\mathrm{cum}} = \int_{0}^{R_{\mathrm{cloud}}} \left( \frac{\kappa_{\mathrm{R},\mathrm{UV}} \mathbfit{F}_{0,\mathrm{UV}}}{c} \cdot \hat{\mathbfit{r}} \right) \, 4\pi r^2 \, dr \label{eq:forceuv}, \end{equation} and the cumulative IR radiation force \begin{equation} \dot{p}_{\mathrm{IR},\mathrm{cum}} = \int_{0}^{R_{\mathrm{cloud}}} \left( \frac{\kappa_{\mathrm{R},\mathrm{IR}} \mathbfit{F}_{0,\mathrm{IR}}}{c} \cdot \hat{\mathbfit{r}} \right) \, 4\pi r^2 \, dr, \label{eq:forceir}. \end{equation} In Figure~\ref{fig:CumForce}, we show the time-averaged values of $\dot{p}_{\mathrm{UV},\mathrm{cum}}$ and $\dot{p}_{\mathrm{IR},\mathrm{cum}}$, and their combined force (i.e., $\dot{p}_{\mathrm{UV},\mathrm{cum}} + \dot{p}_{\mathrm{IR},\mathrm{cum}}$), normalised by $L_*/c$, where $L_*$ is the total (UV) luminosity output from the sink particles at a given time. The quantity $L_*/c$ denotes the maximum cumulative momentum that is available in the single-scattering limit -- i.e., this is the maximum possible value of $\dot{p}_{\mathrm{UV},\mathrm{cum}}$. When the cloud is in the multiple scattering limit, the cumulative IR radiation force can exceed this value, and the factor by which it does so is referred to as the trapping factor, $f_{\mathrm{trap}}$. We can see from Figure~\ref{fig:CumForce} that the true cumulative UV radiation force is $\lesssim 0.1 L_*/c$, for reasons that we explore in Section~\ref{sec:radpres_efficiency}. On the other hand, for the IR, $f_{\mathrm{trap}} \gtrsim 1$ for $\Sigma_{\mathrm{cloud}} \gtrsim 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, with $f_{\mathrm{trap}} \sim 10$ for the highest $\Sigma_{\mathrm{cloud}}$ case. We note that these values of $f_{\mathrm{trap}}$ are lower than those obtained for the same parameters in the IR-only control runs (2.5 and 18, respectively; c.f.~Figure~19 in \citetalias{Menon_2022b}). This is probably due to \citetalias{Menon_2022b}'s idealised approach of injecting IR photons with a Gaussian source term (Equation~\ref{eq:jstar}), which can lead to a more systematic force in the radial direction than an asymmetric injection of IR photons via the reprocessing of UV radiation. We can also quantify the overall relative importance of the UV and IR radiation forces from Figure~\ref{fig:CumForce}. We can see that the lowest (highest) $\Sigma_{\mathrm{cloud}}$ is clearly dominated by the UV (IR) radiation force. The $\Sigma_{\mathrm{cloud}} \sim 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case is also dominated by the IR radiation force, which is $\sim$ 10 times the UV. On the other hand, for $\Sigma_{\mathrm{cloud}} \sim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ the forces in the UV and IR bands are comparable, and hence equally important to the dynamics of the clouds. Therefore, this implies that it is important to consider the contribution of \textit{both} UV and IR radiation forces for clouds with $\Sigma_{\mathrm{cloud}} \sim 10^3$--$10^4 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$; however, for clouds that have higher (lower) surface density, the UV (IR) radiation forces are negligible and can be ignored. Another approach to quantify the relative importance of the UV and IR radiation pressure is to compare the fiducial runs with control runs that do not include one of the bands (i.e., \texttt{SnUV} and \texttt{SnIR} runs; Table~\ref{tab:Simulations}). In Figure~\ref{fig:CompareEddUVIR} we compare $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ at $t = 7\, t_\mathrm{ff}$ between these simulations. The crucial role played by the UV radiation pressure is clearly visible here; the \texttt{SnIR} runs are all sub-Eddington at all $r$. However, $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ can be up to factors of a few higher in the UV+IR runs than the UV-only version, especially at smaller $r$. This is likely because the IR radiation pressure is concentrated at small $r$, as the temperatures, and hence the opacities, are lower at larger $r$; visual inspection confirms this is the case. We can also identify the impact the forces have on the dynamics of the clouds by comparing $\mathbfit{v} \cdot \hat{\mathbfit{r}}$ between the runs at the same time, as shown in Figure~\ref{fig:CompareRvelUVIR}. The differences in this quantity between the fiducial runs and the UV/IR-only control runs are quite evident in the cases of intermediate $\Sigma_{\mathrm{cloud}}$; the lowest and highest $\Sigma_{\mathrm{cloud}}$ cases are more or less indistinguishable from their UV and IR controls runs, respectively, as expected. In both the intermediate $\Sigma_{\mathrm{cloud}}$ cases, the UV+IR cases have higher (positive) $\langle v_r \rangle_{4\pi}$ than the UV-only case, and a larger fraction of gas that exceeds the escape speed of the cloud\footnote{The IR-only cases have negative $\langle v_r \rangle_{4\pi}$ at all $\Sigma_{\mathrm{cloud}}$, consistent with their sub-Eddington states.}. That being said, even the UV-only cases have radial velocities that exceed $v_{\mathrm{esc}}$, suggesting that outflows are still driven in these runs, but that they involve a smaller fraction of the cloud than in the UV+IR runs. This behaviour can also be inferred from the time-averaged properties of the outflows driven in the UV-only control runs -- summarised in Table~\ref{tab:Results}. We see that $v_{\mathrm{out}}$ in these runs is more or less comparable to that in the runs with UV+IR for all $\Sigma_{\mathrm{cloud}}$. However, for intermediate $\Sigma_{\mathrm{cloud}}$, $\dot{M}_{\mathrm{out}}$ is lower in the UV-only runs by a factor $\sim 2$, indicating that the inclusion of the IR radiation pressure significantly enhances the mass in the outflows. Similarly, the outflows carry more momentum ($p_{\mathrm{out}}/M_*$) with the inclusion of the IR component, especially for the \texttt{S4UVIR} run. These findings, combined with the behaviour of $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ and $\langle v_r \rangle_{4\pi}$ in Figures~\ref{fig:CompareEddUVIR} and \ref{fig:CompareRvelUVIR}, suggest that i) the outflows are initiated primarily by the impulse provided by the UV radiation pressure, and ii) the added component of the IR radiation pressure renders a larger fraction of sight-lines around the radiation sources super-Eddington, and thereby entrains more mass into the outflows. \begin{figure*} \centering \includegraphics[width = 0.98 \textwidth]{Images/CompareRvelUVIR_7tff.pdf} \caption{Volume-averaged radial velocity at $t = 7 t_{\mathrm{ff}}$ for different $\Sigma_{\mathrm{cloud}}$ (panels) separated by the bands evolved in the simulations.} \label{fig:CompareRvelUVIR} \end{figure*} \subsection{Low efficiency of radiation pressure forces} \label{sec:radpres_efficiency} \begin{figure*} \centering \includegraphics[width=0.9 \textwidth]{Images/CompareJstrProjection.pdf} \caption{Projected maps of the local UV energy absorption rate at $t = 3 t_{\mathrm{ff}}$ for the different values of $\Sigma_{\mathrm{cloud}}$ (panels). The absorption rate is normalised by the maximum value of the quantity in each panel. The star symbols and axes normalisation are similar to those of Figure~\ref{fig:CompareSigmasProj}. We see that the UV radiation is absorbed close to the sink particles for higher $\Sigma_{\mathrm{cloud}}$, and the scale over which absorption occurs is small compared to the scale over which the sink particles are distributed. This explains the relatively low efficiency of radial momentum injection by radiation pressure due to cancellation of radiation forces.} \label{fig:CompareJstarProj} \end{figure*} \begin{figure} \centering \includegraphics[width=0.48 \textwidth]{Images/Sigma2_CumTime.pdf} \caption{Time evolution of the cumulative UV radiation momentum rate (Equation~\ref{eq:forceuv}, normalised by $L_*/c$ for $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ (run \texttt{S2UVIR}) -- similar to Figure~\ref{fig:CumForce}, which shows the time-averaged value. The increase at $t \gtrsim 1.5 t_{\mathrm{ff}}$ corresponds to when radiation pressure drives the UV-absorption region ($d_{\mathrm{UV}}$) outwards, reducing the effects of cancellation due to multiple sources (see text in Section~\ref{sec:radpres_efficiency}); the decrease at $t \gtrsim 3 t_{\mathrm{ff}}$ corresponds to when the outflowing gas opens up channels for radiation to escape the domain.} \label{fig:Sigma2_Momentum} \end{figure} In Figure~\ref{fig:CumForce}, we quantified the total radial momentum per unit time injected by the UV and IR radiation pressures, in units of $L_*/c$ -- the momentum flux carried by photons from the sink particles. For an idealised spherical distribution with a source at the centre and enough mass around it to be optically thick in the UV, this ratio for the UV case should be 1 (i.e., the momentum per unit time imparted to the gas = $L_*/c$), and should be $\tau_{\mathrm{IR}}$ for IR radiation, where $\tau_{\mathrm{IR}}$ is the cumulative optical depth in the IR. We find that these idealised estimates are much higher than that obtained in our simulations. In \citetalias{Menon_2022b} we explain the origin of this discrepancy for the IR radiation pressure, so we do not repeat that analysis here. However, this still leaves the question of why the cumulative momentum injection rate in the UV $\lesssim 0.1 L_*/c$ in our simulations, as shown in Figure~\ref{fig:CumForce}. We find that the reason the momentum delivered to the gas is small is due to the cancellation of forces in the radial direction -- with respect to the centre of mass of the sources (sink particles) -- which occurs as most of the UV radiation is absorbed close to the sources, over regions whose sizes are smaller than/comparable to the typical separation between sources. We refer to the scales over which the UV radiation is absorbed and over which the sources are distributed as $d_{\mathrm{UV}}$ and $d_{\mathrm{*}}$, respectively. We can see in Figure~\ref{fig:CompareJstarProj} -- which is a projection of the UV energy absorption rate at $t=5t_{\mathrm{ff}}$ for our fiducial runs -- that $d_{\mathrm{UV}} \lesssim d_{\mathrm{*}}$. For such a situation, the individual (radial) vector forces from each sink, which point radially outwards with respect to the sink, need not necessarily point radially outwards with respect to the centre of mass, leading to a reduction in the radial momentum injection to the cloud. If, on the other hand, $d_{\mathrm{UV}}\gg d_{\mathrm{*}}$, the sinks would all lie within their respective UV absorption zones, and would all contribute positively to the radial momentum. This helps explain why the efficiency of UV momentum injection is low in all our runs, and more so in the highest $\Sigma_{\mathrm{cloud}}$ case ($\sim 0.01 L_*/c$) -- since $d_{\mathrm{*}}$ is very small at these high surface densities (see Figure~\ref{fig:CompareJstarProj}). However, the low efficiency of the $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case needs further explanation. The cloud is being dispersed by (UV) radiation pressure in this case, and thus $d_{\mathrm{UV}}$ should increase as time progresses, rendering the UV momentum injection more efficient. However, we find that this is countered by another effect: as the cloud expands, this opens up channels through which UV photons escape, decreasing the efficiency of momentum injection, eventually driving it to zero as the cloud is entirely dispersed. It is possible that the combination of these two effects leads to the low time-averaged efficiency of $\sim 0.1 \%$ we find. To investigate whether this is the case, we show the time evolution of the radial momentum injection rate for this run in Figure~\ref{fig:Sigma2_Momentum}. Consistent with our hypothesis, we find that the efficiency is low at early times, then goes up as the bulk of the gas is pushed outwards and the gas distribution increasingly satisfies the condition $d_{\mathrm{UV}}/d_{\mathrm{*}} \gg 1 $. However, for $t > 3 \, t_{\mathrm{ff}}$, the efficiency decreases again due to the escape of UV photons through channels opened up by the dispersing cloud -- the top-left panel of Figure~\ref{fig:CompareJstarProj} provides a visual confirmation of this scenario. By comparing with Figure~\ref{fig:CompareSFE} we also see that i) the increase in momentum injection at $t\gtrsim 1.5 t_{\mathrm{ff}}$ corresponds to when $\epsilon_*$ starts to saturate due to radiation pressure forces and the associated expansion of a shell, and ii) the decrease in momentum injection for $t\gtrsim 3 t_{\mathrm{ff}}$ corresponds to when $\epsilon_{\mathrm{ej}} >0$, indicating that gas has started to escape the domain, opening up channels for UV radiation to escape. The aforementioned scenario shows that it matters where the UV photons are absorbed with respect to the distribution of the radiating source(s). An interesting implication of this is that the UV radiation pressure is likely to be a much more efficient feedback mechanism for a single massive star/binary system than for a larger system such as a molecular cloud/star cluster\footnote{Efficient in this context is in terms of the fraction of the total available UV radiation momentum ($L_*/c$) that is effectively imparted to gas in the radially outward direction.}. In the former case, there is less potential for cancellation due to a lower number of sources. In addition, for a massive star, the UV absorption front can be moved outwards due to the destruction of dust; indeed, for a single massive star or close binary, the dust destruction radius is much larger than the system scale, while for even the most compact star clusters the opposite is the case. This further reinforces the point made by \citet{Krumholz_2018} that calculations of radiation pressure feedback are only reliable if they resolve the region over which radiation is absorbed, and that naive subgrid models that do not include effects such as cancellation or the trapping of radiation momentum by gravity on small scales may be unreliable. A final implication is that any other feedback mechanism that moves $d_{\mathrm{UV}}$ to larger scales -- such as hot stellar wind-driven bubbles or hard ionising radiation that can destroy dust grains and/or provide additional thermal pressure-driven expansion -- would also increase the momentum injected by UV photons closer to $L_*/c$. Therefore, it is possible that the UV momentum injection efficiency is higher if additional feedback mechanisms are active. \begin{table*} \caption{Summary of key simulation results.} \centering \label{tab:Results} \begin{threeparttable} \begin{tabular}{l c c c c c c c c c c} \toprule \multicolumn{1}{l}{Model}& \multicolumn{1}{c}{$\epsilon_*$}& \multicolumn{1}{c}{$\epsilon_{\mathrm{ej}}$}& \multicolumn{1}{c}{$\dot{M}_{\mathrm{out}}$}& \multicolumn{1}{c}{$\dot{M}_{\mathrm{out}}/(M_{\mathrm{cloud}}/t_{\mathrm{ff}})$}& \multicolumn{1}{c}{$v_{\mathrm{out}}$}& \multicolumn{1}{c}{$v_{\mathrm{out}}/v_{\mathrm{esc}}$}& \multicolumn{1}{c}{$p_{\mathrm{out}}/M_{*}$}& \multicolumn{1}{c}{$\dot{p}_{\mathrm{cum},\mathrm{UV}}/(L_*/c)$}& \multicolumn{1}{c}{$\dot{p}_{\mathrm{cum},\mathrm{IR}}/(L_*/c)$}& \multicolumn{1}{c}{$\dot{p}_{\mathrm{cum},\mathrm{IR}}/\dot{p}_{\mathrm{cum},\mathrm{UV}}$}\\ & & & $\left[ \mathrm{M}_{\sun} \, \mathrm{yr}^{-1} \right]$& & $\left[ \mathrm{km} \, \mathrm{s}^{-1} \right]$& & $\left[ \mathrm{km} \, \mathrm{s}^{-1} \right]$& & & \\ \midrule \texttt{S2UVIR} &$0.58$ &$0.4$ &$0.029$ &$0.085$ &$28$ &$1.7$ &$14.0$ &$0.14$ &$0.0067$ &$0.048$\\ \texttt{S3UVIR} &$0.74$ &$0.18$ &$0.012$ &$0.0064$ &$25$ &$0.88$ &$0.99$ &$0.09$ &$0.11$ &$1.2$\\ \texttt{S4UVIR} &$0.75$ &$0.14$ &$0.093$ &$0.0086$ &$16$ &$0.31$ &$3.1$ &$0.059$ &$1.3$ &$23.0$\\ \texttt{S5UVIR} &$0.73$ &$0.15$ &$-$ &$-$ &$-$ &$-$ &$-$ &$0.0039$ &$12.0$ &$3100.0$\\ \texttt{S2UV} &$0.6$ &$0.32$ &$0.05$ &$0.15$ &$32$ &$2.0$ &$17.0$ &$1.0$ &$0.0$ &$0.0$\\ \texttt{S3UV} &$0.75$ &$0.16$ &$0.0074$ &$0.0039$ &$30$ &$1.3$ &$0.76$ &$1.0$ &$0.0$ &$0.0$\\ \texttt{S4UV} &$0.75$ &$0.15$ &$0.048$ &$0.0045$ &$20$ &$0.39$ &$0.12$ &$1.0$ &$0.0$ &$0.0$\\ \bottomrule \end{tabular} \begin{tablenotes} \small \item \textbf{Notes}: Columns in order indicate - Model: model name, $\epsilon_*$: fraction of mass in stars, $\epsilon_{\mathrm{ej}}$: fraction of mass ejected from the domain, $\dot{M}_{\mathrm{out}}$: mass outflow rate, $\dot{M}_{\mathrm{out}}/(M_{\mathrm{cloud}}/t_{\mathrm{ff}})$: mass outflow rate scaled by the cloud mass and free fall time, $v_{\mathrm{out}}$: average momentum-flux weighted outflow velocity, $v_{\mathrm{out}}/v_{\mathrm{esc}}$: outflow velocity scaled by the cloud escape speed $v_{\mathrm{esc}}$, $p_{\mathrm{out}}/M_{*}$: momentum per unit stellar mass carried by the outflowing gas, $\dot{p}_{\mathrm{cum},\mathrm{UV}}/(L_*/c)$: cumulative momentum imparted by the UV radiation pressure in units of $L_*/c$, $\dot{p}_{\mathrm{cum},\mathrm{IR}}/(L_*/c)$: cumulative momentum imparted by the IR radiation pressure in units of $L_*/c$, $\dot{p}_{\mathrm{cum},\mathrm{IR}}/\dot{p}_{\mathrm{cum},\mathrm{UV}}$: ratio of total momentum imparted by IR and UV radiation pressures. \end{tablenotes} \end{threeparttable} \end{table*} \section{Summary and Discussion} \label{sec:summary} We conduct 3D radiation hydrodynamic (RHD) simulations of star cluster formation and evolution in massive, dusty, self-gravitating clouds under the influence of direct UV and dust-reprocessed IR radiation pressure. We use the \texttt{VETTAM} RHD module \citep{Menon_2022} -- which employs the variable Eddington tensor (VET) closure -- to track the propagation of both UV and IR photon bands, accounting for the coupling between the bands due to the reprocessing of UV photons to the IR by dust. We explore marginally bound clouds with gas surface densities of $\Sigma_{\mathrm{cloud}} \sim 10^2$--$10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, which ranges from the upper end of the single-scattering limit deep into the multiple-scattering regime (see Table~\ref{tab:Simulations}). We also explore the relative importance of the UV and IR radiation pressure mechanisms by comparing with control runs where one band or the other is omitted. Combining IR and UV radiation pressure, we draw the following conclusions: \begin{itemize} \item The star formation efficiency $\epsilon_*$ cannot be regulated by radiation pressure for clouds with $\Sigma_{\mathrm{cloud}} \gtrsim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, even with the inclusion of the UV radiation pressure. In the simulations studied here, which do not include other forms of feedback except radiation pressure, and with isolated clouds that do not receive any energy input from a larger galactic environment, $\epsilon_*$ reaches $\sim 80 \%$ within $t\sim 3 t_{\mathrm{ff}}$ regardless of whether we include IR radiation, UV radiation, or both. \item However, clouds with $\Sigma_{\mathrm{cloud}} \lesssim 10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, on attaining high $\epsilon_*$, become super-Eddington and launch radiation-pressure driven radial outflows -- unlike the lack of any dynamical impact of feedback in \citetalias{Menon_2022b} based on IR only. \item The outflows can reach significant radial velocities with high fractions of the escape speed of the clouds, $v_{\mathrm{out}} \sim 0.5$--$2 \, v_{\mathrm{esc}}$ (see Table~\ref{tab:Results}) -- corresponding to $\sim 15$--$30 \, \,\mathrm{km} \, \mathrm{s}^{-1}$ -- with the outflow velocity decreasing with $\Sigma_{\mathrm{cloud}}$. However, the momentum carried in the ejected outflows ($p_{\mathrm{out}}/M_* \lesssim 10 \,\mathrm{km} \, \mathrm{s}^{-1}$) is too small to \textit{directly} affect ISM dynamics at kiloparsec-scales and beyond. \item The cumulative momentum imparted by the UV and IR radiation pressure is comparable for $\Sigma_{\mathrm{cloud}} \sim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, and is dominated by the IR (UV) component in clouds with higher (lower) surface densities. \item The characteristic outflow velocity for clouds in the multiple-scattering limit ($\Sigma_{\mathrm{cloud}} \gtrsim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) does not depend on whether we include only UV radiation pressure or both UV and IR (Table~\ref{tab:Simulations}), but the mass outflow rates and momentum fluxes do: omitting the IR lowers both by factors $\sim 2$. This suggests that the impulse of the UV radiation force provides the launching mechanism of the outflow, while the effect of IR radiation pressure is to render a larger fraction of the gas unbound, thereby allowing the UV pressure to entrain significantly more mass. \item We find that the cumulative momentum imparted by UV photons can be significantly lower than $L_*/c$, more so at higher $\Sigma_{\mathrm{cloud}}$. This occurs due to radiation forces cancelling each other out when radiation is absorbed on scales smaller than the typical spatial separation between radiation sources (see Section~\ref{sec:radpres_efficiency}). \end{itemize} Our finding that radiation pressure can drive outflows even in clouds with steep gravitational potential wells ($\sim 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) is interesting and may be significant in the context of the formation and evolution of super-star clusters (SSCs). For instance, \citet{Levy_2021} (\citetalias{Levy_2021} hereafter) analyse high-resolution ($\sim 0.5 \, \mathrm{pc}$) ALMA observations of SSCs in the dwarf starburst galaxy NGC~253, and find that a subset of their sample shows signs of (dense-gas) outflows. We can crudely compare the reported properties of the clouds and outflows in their observations (Table~2 in \citetalias{Levy_2021}) with our simulations (Table~\ref{tab:Results}). The clusters with outflows reported in \citetalias{Levy_2021} have $v_{\mathrm{out}} \sim 6$--$20 \, \,\mathrm{km} \, \mathrm{s}^{-1}$, and $p_{\mathrm{out}}/M_* \sim 1$--$5 \, \,\mathrm{km} \, \mathrm{s}^{-1}$ -- in reasonable agreement with the values we find. This suggests that radiation pressure is a strong candidate for driving these outflows. A minor caveat is that the star clusters with outflows in \citetalias{Levy_2021} have estimated surface densities of $\gtrsim 10^5 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, slightly beyond the range of $\Sigma_{\mathrm{cloud}}$ where we find outflows are driven. That being said, there are significant uncertainties in the estimated stellar masses and radii of the clusters that go into calculating $\Sigma$ \citep{Leroy_2018}. Moreover, the $\Sigma$ estimated in \citetalias{Levy_2021} is for the observed snapshot wherein the cluster has already formed, whereas $\Sigma_{\mathrm{cloud}}$ in our simulations is the initial condition; $\Sigma$ would significantly increase as the cloud collapses under the action of gravity and becomes more compact. We also have to point out larger fractions of our clouds could be ejected at a given $\Sigma_{\mathrm{cloud}}$ if i) the clouds were unbound to begin with (i.e., having a larger virial parameter), as suggested by some observations \citep{Evans_2021}, and might be expected to occur in the extreme environments where these clouds form, such as mergers, or ii) through the inclusion of magnetic fields \citep{Federrath_klessen_2012} and/or additional early feedback mechanisms (e.g., stellar winds, photoionisation) in our simulations, and/or iii) a higher dust-to-gas ratio or a more top-heavy IMF, as have been found in some young super-star clusters \citep{Turner_2015}. Therefore, we caution against a direct one-to-one comparison of our model clouds with observed counterparts; rather, we present our findings as evidence that radiation pressure has the momentum budgets to drive such outflows. Follow-up observations to better constrain the properties of SSCs and/or extending the sample size would enable testing the viability of these ideas. \section*{Acknowledgements} S.~H.~M would like to thank Todd A.~Thompson, Eve C.~Ostriker, Ahmad Ali, Shane Davis, Jeong-Gyu Kim and Rebecca Levy for insightful discussions and ideas. C.~F.~acknowledges funding provided by the Australian Research Council through Future Fellowship FT180100495, and the Australia-Germany Joint Research Cooperation Scheme (UA-DAAD). M.~R.~K.~acknowledges funding from the Australian Research Council through its \textit{Discovery Projects} and \textit{Future Fellowship} funding schemes, awards DP190101258 and FT180100375. We further acknowledge high-performance computing resources provided by the Leibniz Rechenzentrum and the Gauss Centre for Supercomputing (grants~pr32lo, pn73fi, and GCS Large-scale project~22542), and the Australian National Computational Infrastructure (grants~ek9 and~jh2) in the framework of the National Computational Merit Allocation Scheme and the ANU Merit Allocation Scheme. \textit{Software}: \texttt{PETSc} \citep{PetscConf,PetscRef}, \texttt{NumPy} \citep{numpy}, \texttt{SciPy} \citep{scipy}, \texttt{Matplotlib} \citep{matplotlib}, \texttt{yt} \citep{yt}. This research has made use of NASA's Astrophysics Data System (ADS) Bibliographic Services. \section*{Data Availability} Outputs of our simulations would be shared on reasonable request to the corresponding author. \bibliographystyle{mnras} \section{Introduction} \label{sec:Introduction} Radiation pressure on dust grains is a potentially important mechanism in regulating star formation and disrupting dusty gas in star clusters \citep{Krumholz_Matzner_2009,Fall_2010,Murray_2010_clusters,Raskutti_2016,Thompson_Krumholz_2016,Raskutti_2017}, maintaining the vertical stability of starbursts and AGN discs \citep{Scoville_2003,Thompson_2005,Andrews_2011,Krumholz_Thompson_2012}, and launching winds from galaxies, Active Galactic Nuclei (AGN), star clusters, young massive stars, and evolved asymptotic giant branch (AGB) stars \citep{Murray_2011,Roth_2012,Krumholz_2013,Davis_2014,Thompson_2015,Rosen_2016,Wibking_2018,Zhang_2018, Costa_2018, Hofner_2018}. In the context of star/cluster formation, radiation pressure provides a crucial contribution in the expansion of feedback-driven H~{\sc ii} regions/bubbles \citep{Draine_2011,Kim_2016}, which limit the integrated star formation efficiency ($\epsilon_*$) of giant molecular clouds (GMCs) and lead to their inferred short lifetimes \citep{Chevance_2020,Chevance_2022, Chevance_2022b} The mechanism of radiation pressure operates through the absorption of momentum in photons by dust grains, and coupling this momentum to the gas through collisions. Photons in two broad frequency bands are relevant here: the direct UV/optical photons from young stars, and the dust-reprocessed IR photons. The opacity of dust grains to the former is typically $\kappa_{\mathrm{UV}} \sim 100$--$1000 \, \mathrm{cm}^{2} \, \mathrm{g}^{-1}$, and thereby clouds with surface densities $\Sigma \gtrsim \kappa_{\mathrm{UV}}^{-1} \sim 10$--$100 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ are optically thick to these photons, and therefore susceptible to dispersal by direct radiation pressure. That being said, the thermal pressure of photoionised gas can be comparable to or larger than radiation pressure in some range of $\Sigma$; indeed, semi-analytic models \citep{Krumholz_Matzner_2009,Fall_2010, Murray_2010_clusters,Kim_2016,Rahner_2017}, numerical simulations \citep{Kim_2018}, and observations \citep{Lopez_2011,Lopez_2014,Barnes_2020,Olivier_2021} find that radiation pressure is the dominant feedback mechanism only for clouds whose escape velocities are $\gtrsim 10 \, \,\mathrm{km} \, \mathrm{s}^{-1}$. Such conditions are realised in GMCs that go on to form young massive star clusters \citep{Zwart_2010}. On the other hand, the IR opacities of dust are significantly lower \citep[$\kappa_{\mathrm{IR}} \lesssim 10 \, \mathrm{cm}^2 \, \mathrm{g}^{-1}$; ][]{Semenov_2003}, and therefore require much higher cloud surface densities ($\Sigma \gtrsim 10^3 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) to effectively absorb these photons. However, if this condition is satisfied, IR photons can undergo repeated cycles of absorption and emission, enhancing the imparted momentum over the stellar UV/optical photon momentum \citep{Thompson_2005,Murray_2010_clusters}. This is the so-called \textit{multiple-scattering} regime, to differentiate it from the single-scattering regime, where the dust is optically thin to IR photons. Environments in the multiple-scattering regime in the local universe are primarily found in extreme regions such as dwarf starbursts and ultra-luminous infrared galaxies (ULIRGs) like Arp~220, which are subject to high external pressures ($P/k_{\mathrm{B}} \gtrsim 10^8 \, \mathrm{K}\,\mathrm{cm}^{-3}$). These environments potentially host the formation sites of super-star clusters \citep[SSCs; e.g.,][]{Mcgrady_2005,Zwart_2010,Turner_2015,LindaSmith_2020}, and represent a dense mode of star formation that might have existed more commonly at high redshift. Observations suggest that these clusters form stars very efficiently and are mostly bound, with the role of stellar feedback on their formation and evolution largely uncertain \citep{Turner_2017,LindaSmith_2020, Emig_2020, Villas_2020,Costa_2021,Hao_2022}. Recently, observations using the Atacama Large Millimeter/Submillimeter Array (ALMA) have managed to study the young, embedded phase of SSC formation at high resolution ($\sim 2 \,\mathrm{pc}$) in the nearby dwarf starburst NGC~253, shedding light on the properties of their natal GMCs \citep{Leroy_2018}, and the young stellar populations in them \citep{Mills_2021}. \citet{Levy_2021} conducted follow-up observations at even higher resolution ($\sim 0.5 \, \mathrm{pc}$) that have managed to probe the cluster-scale kinematics and feedback in these SSCs. Intriguingly, they find evidence of massive outflows from 3 of the 14 SSCs they characterise, with outflow velocities comparable to the SSC escape velocities, and outflowing masses that are a non-negligible fraction of the cloud/stellar mass. They consider multiple possible mechanisms that could drive these outflows, suggesting that either dust-reprocessed IR radiation pressure and/or stellar winds are the most likely; recent work by \citet{Lancaster_2021} casts doubts on the latter possibility. The former mechanism was raised in light of the semi-analytic model of \citet{Crocker_2018b}, which suggested that IR radiation pressure can drive outflows for $\Sigma \gtrsim 10^5 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ -- a condition satisfied by some of the detected SSCs with outflows. However, we recently presented 3D grey radiation hydrodynamic (RHD) simulations in \citet{Menon_2022b} (\citetalias{Menon_2022b} hereafter) -- which use temperature-dependent $\kappa_{\mathrm{IR}}$ and a state-of-the-art RHD scheme \citep{Menon_2022} -- showing that IR radiation pressure has minor dynamical impacts on clouds, irrespective of $\Sigma$. This is primarily because $\kappa_{\mathrm{IR}}$ is too low for radiation forces to compete with gravity (Eddington ratios, $f_{\mathrm{Edd}} \lesssim 0.4$) even at high $\Sigma$\footnote{\citet{Crocker_2018b} overestimate the impact of radiation forces as they use an analytical power-law approximation for $\kappa_{\mathrm{IR}}$, which significantly overestimates the opacities at higher temperatures.}, and because the efficiency of momentum transfer from radiation to gas is lowered by radiation-matter anticorrelation -- echoing the conclusions of earlier simulations that probed lower $\Sigma$ ranges \citep{Skinner_2015,Tsang_2018}. This raises concerns regarding the possibility that radiation pressure could drive the sort of winds seen in NGC~253. However, these simulations did not consider the contribution of radiation pressure in the UV band, and focused solely on the IR radiation pressure. The factor $\sim 100$ higher opacities in the UV could increase $f_{\mathrm{Edd}}$ significantly, especially in clouds in the lower ranges of the multiple-scattering limit\footnote{For very high $\Sigma$ clouds, the IR radiation force can be factors $\gtrsim 10$~times the corresponding UV one; in these cases, inclusion of the UV component is expected to have negligible effects; an expectation we confirm below.}. UV radiation pressure also has the attractive property that even if the cloud is globally sub-Eddington to this force, it can eject gas in sight lines that have lower $\Sigma$ set by turbulence \citep{Thompson_Krumholz_2016, Raskutti_2017}. Therefore, in this paper, we extend the simulations of \citetalias{Menon_2022b} to model the radiation field in both the UV and IR bands, thereby including the contribution of the direct and reprocessed radiation pressure, and test the dynamical impacts they have on SSC-forming clouds. We also quantify the relative impacts the two forces have at different cloud surface densities to constrain the dominant feedback mechanisms in different environments/conditions \citep[see, e.g., Fig. 12 in][]{Krumholz_2019}. The paper is organised as follows: In Section~\ref{sec:Methods} we describe the equations solved in our simulations, the numerical prescriptions we use, and the initial conditions of our clouds. In Section~\ref{sec:Results} we present the results of our simulation suite, exploring the dynamical impacts of radiation pressure on our model clouds, properties of outflows driven, and the dominant forces (UV vs IR) driving these outflows. In Section~\ref{sec:summary} we provide a summary of our results, and discuss them in the context of the observed outflows in NGC~253. \section{Methods} \label{sec:Methods} The simulation setup in this study largely follows that of \citetalias{Menon_2022b}; therefore, we summarize the salient features of our setup below and refer the reader to Section 2 of \citetalias{Menon_2022b} for further details. \subsection{Equations solved} \label{sec:Equations} We solve the non-relativistic RHD equations in two grey bands that represent the stellar UV and dust-reprocessed IR bands respectively, self-consistently computing the reprocessing of the UV to the IR by dust. We use the mixed-frame formulation \citep{Mihalas_1982} in the RHD equations, retaining terms that are of leading order in all limiting regimes of RHD \citep[see, e.g.,][]{Krumholz_2007a}, given by\footnote{Note that we denote tensor contractions over a single index with dots (e.g., $\mathbfit{a} \cdot \mathbfit{b}$), tensor contractions over two indices by colons (e.g., \mathbfss{A}:\mathbfss{B}), and tensor products of vectors without an operator symbol (e.g., $\mathbfit{a}\mathbfit{b}$).} \begin{gather} \frac{\partial \rho}{\partial t} + \nabla \cdot (\rho \textbf{v}) = 0 \label{eq:continuityeq} \\ \frac{\partial (\rho\textbf{v})}{\partial t} + \nabla \cdot (\rho \textbf{v}\textbf{v}) = - \nabla P - \rho \nabla \Phi + \mathbfit{G}_{\mathrm{UV}} + \mathbfit{G}_{\mathrm{IR}} \label{eq:gasMom} \\ \frac{\partial E_{r,\mathrm{UV}}}{\partial t} + \nabla \cdot \mathbfit{F}_{\mathrm{UV}} = j_* - cG^0_{v,\mathrm{UV}} \label{eq:EradUV} \\ \frac{\partial \mathbfit{F}_{\mathrm{UV}}}{\partial t} + \nabla \cdot (c^2\mathbfss{P}_{r,\mathrm{UV}}) = -c^2\mathbfit{G}_{\mathrm{UV}} \label{eq:FradUV} \\ \frac{\partial E_{r,\mathrm{IR}}}{\partial t} + \nabla \cdot \mathbfit{F}_{\mathrm{IR}} = \rho \kappa_{\mathrm{P},\mathrm{UV}} c E_{r,\mathrm{UV}} -cG^0_{v,\mathrm{IR}} \label{eq:EradIR} \\ \frac{\partial \mathbfit{F}_{\mathrm{IR}}}{\partial t} + \nabla \cdot (c^2\mathbfss{P}_{r,\mathrm{IR}}) = -c^2\mathbfit{G}_{\mathrm{IR}} \label{eq:FradIR} \\ P = c_{\mathrm{s}}^2 \rho \label{eq:Pgas}, \end{gather} where, \begin{equation} \begin{aligned} G^0_{v,\lambda} =\;& \rho \kappa_{\mathrm{P}}(E_{r,\lambda} - j_{\lambda}) + \rho \left(\kappa_{\mathrm{R},\lambda} - 2\kappa_{\mathrm{P},\lambda} \right) \frac{\mathbfit{v} \cdot \mathbfit{F}_{\lambda}}{c^2} \\ &+ \rho \left( \kappa_{\mathrm{P},\lambda} - \kappa_{\mathrm{R},\lambda} \right) \left[\frac{v^2}{c^2}E_{r,\lambda} + \frac{\mathbfit{v}\mathbfit{v}}{c^2} :\mathbfss{P}_{r,\lambda}\right], \end{aligned} \end{equation} and \begin{equation} \label{eq:G} \mathbfit{G}_{\lambda} = \rho \kappa_{\mathrm{R},\lambda} \frac{\mathbfit{F}_{\lambda}}{c} - \rho \kappa_{\mathrm{R},\lambda} E_{r,\lambda}\frac{\mathbfit{v}}{c} - \kappa_{\mathrm{R},\lambda} \frac{\mathbfit{v}}{c} \cdot \mathbfss{P}_{\lambda}, \end{equation} and $\lambda \equiv (\mathrm{UV}, \, \mathrm{IR})$ represent the band evolved in a corresponding equation. In the above equations $\rho$ is the mass density, $P$ the gas thermal pressure, $\mathbfit{v}$ the gas velocity, $\Phi$ the gravitational potential, $\mathbfss{I}$ the identity matrix, and $c$ the speed of light in vacuum. In the radiation moment equations (Equations~\ref{eq:EradUV} -- \ref{eq:FradIR}), $E_{r,\lambda}$ is the lab-frame radiation energy density, $\mathbfit{F}_{\lambda}$ the lab-frame radiation momentum density, $\mathbfss{P}_\lambda$ is the lab-frame radiation pressure tensor, $\kappa_{\rm P, \lambda}$ and $\kappa_{\rm R, \lambda}$ are the Planck and Rosseland mean opacities with avarages computed over the IR and UV bands\footnote{To be precise, by Planck and Rosseland means here we mean averages over the frequency band weighted by $B_\nu(T)$ and $\partial B_\nu/\partial T$, respectively, where $B_\nu(T)$ is the Planck function and $T$ is the radiation temperature.}. $j_*$ represents the direct UV radiation contribution rate from sink particles \citep{Federrath_2010_Sinks,Menon_2022b} and $j_{\lambda}$ represents the solid-angle integrated diffuse emission via dust grains in the given band. Equation~\ref{eq:Pgas} is the closure relation for the gas pressure, for which we assume an isothermal equation of state in our simulations, i.e., $P=c_{\mathrm{s}}^2 \rho$, where $c_{\mathrm{s}}$ is the thermal sound speed of the gas. The assumption of an isothermal equation of state does not considerably affect our results as the thermal pressure is subdominant over the radiation pressure in our simulations, and plays a minor role in the dynamics of our clouds. What would be affected by this assumption is the fragmentation on small scales. Heating by accretion feedback suppresses fragmentation \citep{OffnerEtal2009,Bate2009rad,KrumholzEtAl2016,FederrathEtAl2017,GuszejnovEtAl2018,MathewFederrath2020}, but our current simulations do not resolve these small-scale fragmentation processes anyway. What matters for the present simulations is the radiation output from massive stars and sub-clusters, which is modelled by sampling from a standard initial mass function on un-resolved scales, i.e., our sink particles represent small star clusters rather than individual stars \citepalias[for details, see][]{Menon_2022b}. We pause to explain the radiation energy source terms on the right-hand side of Equations~\ref{eq:EradUV} and \ref{eq:EradIR}. In Equation~\ref{eq:EradUV}, the term $j_*$ represents the UV photons emitted by the sink particles. We set the diffuse emission term $j_{\mathrm{UV}} = 0$, as the dust does not re-emit in the UV. In Equation~\ref{eq:EradIR}, the first term represents the contribution to the dust-reprocessed IR radiation under the (very reasonable) assumption that all the energy the dust has absorbed from UV photons is instantly reprocessed into the IR. This treatment of the IR radiation field is more consistent than the approach in \citetalias{Menon_2022b} where IR photons are injected directly with a term analogous to $j_*$. For the diffuse emission, we set $j_{\mathrm{IR}} = a_{\mathrm{R}} T^4$, where $a_{\mathrm{R}}$ is the radiation constant, to represent the emission in the IR by dust grains. We also invoke the assumption of radiative equilibrium for the IR radiation -- i.e., the dust temperature is always equal to the radiation temperature $T_r = (E_{r,\mathrm{IR}}/a_{\mathrm{R}})^{1/4}$. This assumption is justified in Appendix~A of \citet{Krumholz_2013} considering the regime we are studying. To close the equations above, we require a closure relation for the radiation pressure tensor. In both bands, we adopt the variable Eddington tensor (VET) closure \begin{equation} \label{eq:closure} \mathbfss{P}_{r,\lambda} = \mathbfss{T}_{\lambda}E_{r,\lambda}, \end{equation} where $\mathbfss{T}_{\lambda}$ is the Eddington Tensor for a given band. We use an Eddington tensor directly calculated from angular quadratures of the band specific intensity $I_{r,\lambda}(\hat{\mathbfit{n}}_k)$, using the relations \begin{gather} \label{eq:angularmoment0} E_{r,\lambda}=\int d \Omega\, I_{r,\lambda}(\hat{\mathbfit{n}}_k)/c, \\ \mathbfss{P}_{r,\lambda}=\int d \Omega\, \hat{\mathbfit{n}}_k \hat{\mathbfit{n}}_k\,I_{r,\lambda}(\hat{\mathbfit{n}}_k)/c. \label{eq:angularmoment2} \end{gather} $I_{r,\mathrm{UV}}$ and $I_{r,\mathrm{IR}}$ are calculated from formal solutions of the time-independent radiative transfer equations in the respective bands, \begin{gather} \frac{\partial I_{r,\mathrm{UV}}}{\partial s} = \frac{j_*}{4\pi} - \rho \kappa_{\mathrm{R},\mathrm{UV}} I_{r,\mathrm{UV}} \label{eq:RTeqUV} \\ \frac{\partial I_{r,\mathrm{IR}}}{\partial s} = \rho \kappa_{\mathrm{R},\mathrm{IR}} \left[\frac{c j_{\mathrm{IR}}}{4 \pi} - I_{r,\mathrm{IR}}\right] \label{eq:RTeqIR} \end{gather} where the term $j_*/(4\pi)$ represents the photons from the isotropically emitting sink particle, and $j_{\mathrm{IR}}$ is the frequency-integrated reprocessed emission of the dust grain at the temperature $T_r$, which is also assumed to be directionally isotropic. \subsection{Numerical methods} \renewcommand{\arraystretch}{1.0} \begin{table*} \caption{Summary of our simulation suite and their initial condition parameters.} \centering \label{tab:Simulations} \begin{threeparttable} \begin{tabular}{l c c c c c c c c c} \toprule \multicolumn{1}{l}{Model}& \multicolumn{1}{c}{$M_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$R_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$\Sigma_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$n_{\mathrm{cloud}}$}& \multicolumn{1}{c}{$\sigma_{v}$}& \multicolumn{1}{c}{$v_{\mathrm{esc}}$}& \multicolumn{1}{c}{$t_{\mathrm{ff}}$}& \multicolumn{1}{c}{$\mathrm{UV}$}& \multicolumn{1}{c}{$\mathrm{IR}$}\\ & [$10^6 \, \mathrm{M}_{\sun}$]& [pc]& [$\mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$]& [$\mathrm{cm}^{-3}$]& [km/s]& [km/s]& [Myr]& & \\ \midrule \texttt{S2UVIR} &$1.0$ &$31.5$ &$3.2$$ \times 10^{2}$ &$3.1$$ \times 10^{2}$ &$12$ &16 &3.0 &\checkmark &\checkmark\\ \texttt{S3UVIR} &$1.0$ &$10.0$ &$3.2$$ \times 10^{3}$ &$9.7$$ \times 10^{3}$ &$22$ &29 &0.5 &\checkmark &\checkmark\\ \texttt{S4UVIR} &$1.0$ &$3.2$ &$3.2$$ \times 10^{4}$ &$3.1$$ \times 10^{5}$ &$40$ &52 &0.09 &\checkmark &\checkmark\\ \texttt{S5UVIR} &$1.0$ &$1.0$ &$3.2$$ \times 10^{5}$ &$9.7$$ \times 10^{6}$ &$71$ &92 &0.02 &\checkmark &\checkmark\\ \texttt{S2UV} &$1.0$ &$31.5$ &$3.2$$ \times 10^{2}$ &$3.1$$ \times 10^{2}$ &$12$ &16 &3.0 &\checkmark &$\times$\\ \texttt{S3UV} &$1.0$ &$10.0$ &$3.2$$ \times 10^{3}$ &$9.7$$ \times 10^{3}$ &$22$ &29 &0.5 &\checkmark &$\times$\\ \texttt{S4UV} &$1.0$ &$3.2$ &$3.2$$ \times 10^{4}$ &$3.1$$ \times 10^{5}$ &$40$ &52 &0.09 &\checkmark &$\times$\\ \texttt{S3IR} &$1.0$ &$10.0$ &$3.2$$ \times 10^{3}$ &$9.7$$ \times 10^{3}$ &$22$ &29 &0.5 &$\times$ &\checkmark\\ \texttt{S4IR} &$1.0$ &$3.2$ &$3.2$$ \times 10^{4}$ &$3.1$$ \times 10^{5}$ &$40$ &52 &0.09 &$\times$ &\checkmark\\ \texttt{S5IR} &$1.0$ &$1.0$ &$3.2$$ \times 10^{5}$ &$9.7$$ \times 10^{6}$ &$71$ &92 &0.02 &$\times$ &\checkmark\\ \bottomrule \end{tabular} \begin{tablenotes} \small \item \textbf{Notes}: The row in bold denotes the fiducial simulation of our study. Columns in order indicate - Model: model name, $M_{\mathrm{cloud}}$: mass of cloud, $R_{\mathrm{cloud}}$: radius of cloud, $\Sigma_{\mathrm{cloud}}$: mass surface density of the cloud given by $\Sigma_{\mathrm{cloud}} = M_{\mathrm{cloud}}/(\pi R_{\mathrm{cloud}}^2)$, $n_{\mathrm{cloud}}$: number density of the cloud given by $n_{\mathrm{cloud}} = 3M_{\mathrm{cloud}}/(4 \pi R_{\mathrm{cloud}}^3m_{\mathrm{H}})$ where $m_{\mathrm{H}}$ is the mass of atomic hydrogen, $\sigma_{v}$: turbulent velocity dispersion of the cloud, $v_{\mathrm{esc}}$: escape velocity of the cloud, $t_{\mathrm{ff}}$: free-fall time of the cloud, $\mathrm{UV}$: UV band is on ($\checkmark$) or off ($\times$), $\mathrm{IR}$: IR band is on ($\checkmark$) or off ($\times$). \end{tablenotes} \end{threeparttable} \end{table*} \label{sec:NumMethod} The numerical methods used to solve the equations outlined in the previous section are identical to \citet{Menon_2022b}. We use the Variable Eddington Tensor-closed Transport on Adaptive Meshes (\texttt{VETTAM}; \citealt{Menon_2022}) method coupled to the \texttt{FLASH} magneto-hydrodynamics code \citep{Fryxell_2000,Dubey_2008} for our simulations. For the hydrodynamic updates, we use an explicit Godunov method in the split, five-wave HLL5R (approximate) Riemann solver \citep{Waagan_2011}. The Poisson equation for the self-gravity is solved using a multi-grid algorithm implemented in \texttt{FLASH} \citep{Ricker_2008}. Sink particles are used to follow the evolution of gas at unresolved scales, the formation of which is triggered when gas properties satisfy a series of conditions to test for collapse and star formation \citep{Federrath_2010_Sinks}. Gravitational interactions of sink particles with gas and other sinks are considered, and a second-order leapfrog integrator is used to advance the sink particles\citep{Federrath_2010_Sinks,FederrathBanerjeeSeifriedClarkKlessen2011}. Sink particles in our simulations represent unresolved sub-clusters rather than individual stars. As in \citetalias{Menon_2022b}, we assume that these sub-clusters fully sample the initial mass function (IMF) of a young stellar population, and adopt an appropriate fixed light-to-mass ratio of $\langle L_*/M_*\rangle = 1.7 \times 10^3 \, \mathrm{erg} \, \mathrm{s}^{-1} \, \mathrm{g}^{-1}$, where $M_*$ is the mass of the radiating source. The UV radiation from sink particles is then included via the term $j_*$ in Equation~\ref{eq:EradUV}, given by \begin{equation} \label{eq:jstar} j_{*}(r)=\frac{L_{*}}{\left(2 \pi \sigma_{*}^{2}\right)^{3 / 2}} \exp \left(-\frac{r^{2}}{2 \sigma_{*}^{2}}\right), \end{equation} where $L_* = M_*\langle L_*/M_*\rangle$, and $r$ is the radial distance of a grid cell from the sink particle. We adopt a value of $\sigma_* = 4 \Delta x_{\mathrm{min}}$, where $\Delta x_{\mathrm{min}}$ is the minimum cell size in the domain; we have shown in \citetalias{Menon_2022b} that the radiation forces are fairly insensitive to the choice of this parameter. The radiation moment equations in the UV (Equations~\ref{eq:EradUV} and~\ref{eq:FradUV}) and IR (Equations~\ref{eq:EradIR} and~\ref{eq:FradIR}) bands are operator-split from the hyrodynamic and gravity updates, and solved with an implicit Euler-backward temporal scheme \citep{Menon_2022}. We perform two radiation updates per hydrodynamic timestep: first for the UV band, then followed by the IR band, which uses the time-updated solution in the UV band as a source term (i.e., the first term on the RHS of Equation~\ref{eq:EradIR}) -- hence the scheme is fully implicit in the radiation quantities\footnote{An alternate approach to treat the coupled nature of the two bands is to solve Equations~(\ref{eq:EradUV})--(\ref{eq:FradIR}) together in one global, implicit update for both bands. However, we found that the resulting performance and accuracy with this approach was inferior to the one we adopt. A subtle point worth noting here is that our adopted approach is possible only because the coupling between the bands is unidirectional in frequency space -- i.e., from UV to IR. For a system where this is not the case, a single, coupled update would be required.}. The time-independent radiative transfer equations (Eq.~\ref{eq:RTeqUV} and~\ref{eq:RTeqIR}) for obtaining the VET closure are obtained with a hybrid characteristics ray-tracing scheme \citep{Buntemeyer_2016}, and is computed prior to the radiation moment update for the respective band. In \citetalias{Menon_2022b} we performed a series of tests with \texttt{VETTAM} to quantify the accuracy of our VET-based RHD scheme for IR radiation. Since here is the first time that \texttt{VETTAM} is utilised to model UV radiation pressure, we reproduce the results obtained with our scheme for the fiducial model of \citet{Raskutti_2016} in Appendix~\ref{sec:AppendixUVRP}. \citet{Kim_2017} simulated this model with their Adaptive Ray-Tracing (ART) method, based on the \texttt{HARM}$^2$ algorithm introduced by \citet{Rosen_2017}, to demonstrate that the $M_1$ method (used in \citealt{Raskutti_2016}) underestimates the (UV) radiation forces, and as a result, the net star formation efficiency ($\epsilon_*$) -- obtaining $\epsilon_* \sim 25 \%$ with the ART scheme as opposed to $\sim 42 \%$ in the \citet{Raskutti_2016} version. We find a value of $\epsilon_* \sim 28 \%$, which is closer to the ART result than the $M_1$, demonstrating that a moment method based on the VET closure can be of comparable accuracy to an ART scheme for modelling the dynamical effects of streaming radiation forces\footnote{It is important to point out however, that an ART scheme, while quite accurate for streaming radiation, would be unable to model reprocessed or diffuse radiation (i.e., the IR band).}. \subsection{Initial conditions and parameters} We initialise our simulations as a uniform spherical cloud with mass ($M_{\mathrm{cloud}}$) and radius $R_{\mathrm{cloud}}$, which together define a cloud mass density $\rho_{\mathrm{cloud}} = M_{\mathrm{cloud}}/[(4/3) \pi R_{\mathrm{cloud}}^3]$ and a mass surface density $\Sigma_{\mathrm{cloud}} = M_{\mathrm{cloud}}/(\pi R_{\mathrm{cloud}}^2)$. The clouds are placed in a lower-density ambient medium with $\rho = \rho_{\mathrm{cloud}}/100$ in pressure-equilibrium, achieved using a mass-scalar to represent cloud material (see Section~2.4 of \citetalias{Menon_2022b}). The domain size is fixed to $L= 4 R_{\mathrm{cloud}}$ to allow sufficient volume to track potentially expanding material due to feedback. Clouds are initialised with turbulent velocities that follow a power spectrum $E(k) \propto k^{-2}$ with a natural mixture of solenoidal and compressive modes \citep[appropriate for supersonic molecular-cloud turbulence; see e.g.,][]{HeyerBrunt2004,Federrath_2013} for $k/(2\pi/L) \in \left[2,64 \right]$, generated with the methods described in \citet{Federrath_2010}, and publicly available \citep{FederrathEtAl2022ascl}. The velocity dispersion $\sigma_v$ is set such that the virial parameter $\alpha_{\mathrm{vir}}=2$, where $\alpha_{\mathrm{vir}}$ is given by \begin{equation} \alpha_{\mathrm{vir}} = \frac{2E_{\mathrm{kin}}}{E_{\mathrm{grav}}} = \frac{5R_{\mathrm{cloud}} \sigma_v^2}{3GM_{\mathrm{cloud}}}, \end{equation} where $E_{\mathrm{kin}} = (1/2) M_{\mathrm{cloud}} \sigma_v^2$ and $E_{\mathrm{grav}} = (3/5) G M_{\mathrm{cloud}}^2/R_{\mathrm{cloud}}$. The sound speed $c_{\mathrm{s}}$ is set such that the sonic Mach number $\mathcal{M} = \sigma_v/c_{\mathrm{s}} = 11.5$. We do not include magnetic fields in our simulations; we discuss in \citetalias{Menon_2022b} the caveats associated with this. The domain boundary conditions for the hydrodynamics are set to diode -- i.e., gas is allowed to flow out of the domain, but not allowed to enter it. The opacity in the UV band is set to a constant value of $\kappa_{\mathrm{P},\mathrm{UV}} = \kappa_{\mathrm{R},\mathrm{UV}} = 1000 \, \mathrm{cm}^2 \, \mathrm{g}^{-1}$, consistent with typical estimates of the gray radiation pressure cross section per H atom to blackbody radiation peaking at UV wavelengths \citep[blackbody temperatures $\sim$ few $\times 10^4 \, \mathrm{K}$; ][]{Draine_2011}. The opacity in the IR band is kept identical to \citetalias{Menon_2022b}, i.e., a temperature- (and density-) dependent infrared opacity with $\kappa_{\mathrm{P},\mathrm{IR}} = 0$ (due to radiative equilibrium) and $\kappa_{\mathrm{R},\mathrm{IR}} = \kappa_{\mathrm{Sem}}$, where $\kappa_{\mathrm{Sem}} = \kappa_{\mathrm{Sem}} (\rho, T_{\mathrm{r}})$ is the \citet{Semenov_2003} opacity, calculated at the radiation temperature $T_{\mathrm{r}}$. The temperature dependence of the opacity in the IR is retained, which is crucial to accurately capture the dynamics of the clouds under reprocessed radiation pressure \citepalias{Menon_2022b}. The initial condition for the radiation is as follows: $E_{r,\mathrm{UV}} = \mathbfit{F}_{\mathrm{UV}} = 0$, and $E_{r,\mathrm{IR}} = a_{\mathrm{R}} T_{\mathrm{r},0}^4$, $\mathbfit{F}_{\mathrm{IR}} = 0$, where $T_{\mathrm{r},0} = 40 \, \mathrm{K}$ is the initial dust temperature in the cloud. We adopt Marshak boundary conditions for the radiation field \citep{Marshak_1958}, with boundary radiation temperatures of $T_{\mathrm{b},\mathrm{UV}} = 0$ and $T_{\mathrm{b},\mathrm{IR}} = T_{\mathrm{r},0}$ respectively. We also note that the boundary condition for the ray-tracer is kept consistent with these choices. We note that we do not treat photoionization of gas by UV photons, and the corresponding thermal-pressure driven feedback on the clouds. However, in the regime we are exploring (high surface-density clouds with escape speeds $\gtrsim 10 \, \mathrm{km}/s$), radiation pressure forces have been shown to exceed ionized gas pressure, and dominate the dynamical evolution of clouds \citep{,Dale_2012,Kim_2016,Kim_2018}. \begin{figure*} \centering \includegraphics[width=0.9 \textwidth]{Images/CompareSigmaProjection.pdf} \caption{Surface density maps at $t = 3 t_{\mathrm{ff}}$ for the different values of $\Sigma_{\mathrm{cloud}}$ (panels) with the corresponding star formation efficiency ($\epsilon_*$) annotated. Star symbols indicate sink particles, coloured by their mass (see inset colour bar in lower right panel). Vectors (black) indicate the mass-weighted projected velocity field, with arrow length indicating velocity magnitude. The scale for the velocity vectors is annotated in the lower right panel. The surface densities and positions are scaled to $\Sigma_{\mathrm{cloud}}$ and $R_{\mathrm{cloud}}$, respectively.} \label{fig:CompareSigmasProj} \end{figure*} \begin{figure*} \centering \includegraphics[width=0.9 \textwidth]{Images/CompareSigmaProjection_lateTime.pdf} \caption{Same as Figure~\ref{fig:CompareSigmasProj}, but at time $t = 7 t_{\mathrm{ff}}$.} \label{fig:CompareSigmasProjLate} \end{figure*} \subsection{Simulations} We run a range of simulations with different surface densities $\Sigma_{\mathrm{cloud}}$ -- along the lines of \citetalias{Menon_2022b} -- to test the impact of radiation pressure in different environments. We obtain our target values of $\Sigma_{\mathrm{cloud}}$ by keeping the mass of the clouds fixed to $M_{\mathrm{cloud}} = 10^6 \mathrm{M}_{\sun}$, and scaling $R_{\mathrm{cloud}}$ appropriately. We test values of $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ up to $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, varying by factors of 10 between consecutive runs with different $\Sigma_{\mathrm{cloud}}$; the resulting cloud parameters are tabulated in Table~\ref{tab:Simulations}. All of our clouds are optically thick to UV photons. We note that our parameters cover a range that is more massive and of higher surface density than typical star-forming clouds in local galaxies, a choice motivated by the expectation that radiation pressure is the dominant stellar feedback mechanism in this regime \citep{Krumholz_Matzner_2009,Fall_2010, Kim_2016}. The two lowest surface density points ($\Sigma_{\mathrm{cloud}} \sim 10^2$--$10^3 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) represent conditions appropriate for young massive clusters in regions like the Central Molecular Zone (CMZ), whereas the two higher values of $\Sigma_{\mathrm{cloud}}$ ($\Sigma_{\mathrm{cloud}} \sim 10^4$--$10^5 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) represent super-star clusters that are probably found only in more extreme environments such as starburst galaxies \citep[e.g.,][]{Leroy_2018}. Our standard runs evolve radiation in both the UV and IR bands. To isolate the effects of the radiation pressure in either band, and to quantify their relative importance in the evolution of the clouds, we also run some control simulations where either the UV or IR band is not included. We list all the simulations explored in this study in Table~\ref{tab:Simulations}. The IR-only runs have already been presented in \citetalias{Menon_2022b}; the UV-only runs are new. We adopt as a convention that run names are of the form \texttt{SsUVIR}, \texttt{SsUV}, and \texttt{SsIR} respectively for UV+IR, UV-only, and IR-only runs, while \texttt{s} encodes the cloud surface density $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^{\texttt{s}} \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$. We do not simulate a UV-only version for $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^{5} \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, as we expect UV to be unimportant compared to IR at these high surface densities; low-resolution tests confirm this is the case. Similarly, we do not run an IR-only version for our lowest surface density case ($\Sigma_{\mathrm{cloud}} = 3.2 \times 10^{3} \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$), as it is below the typical surface densities required to be optically thick to IR photons ($\Sigma \lesssim \kappa_{\mathrm{IR}}^{-1} \sim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$). All our simulations use a uniform grid (UG) with $N^3 = 256^3$ grid cells; for our domain of size $L = 4 R_{\rm cloud}$, this corresponds to a resolution in terms of the number of grid cells per cloud radius of $R_{\rm cloud}/\Delta x = 64$. We show that our results are converged with numerical resolution in Appendix~\ref{sec:AppendixResolution}. We adopt a CFL number of 0.4, a relative tolerance of $10^{-8}$ for our implicit update of the radiation moment equations, and perform the solution to the time-independent transfer equation with 48~rays per cell using our ray-tracing scheme \citep[based on the Healpix algorithm;][]{BuntemeyerEtAl2016}. We run all simulations up to the point where all the mass has been accreted onto sink particles or expelled from the computational domain by radiation forces, or to a time $t=8\,t_{\mathrm{ff}}$, where $t_{\mathrm{ff}}$ is the free-fall time of the cloud -- whichever is earlier. \section{Results} \label{sec:Results} Here we present the main results of our study, beginning with a broad overview of the qualitative outcomes in Section \ref{ssec:evolution}. We follow this up with a detailed examining of the radiatively-driven outflows we observe in Section \ref{sec:Outflows}, a comparison of the relative roles of the IR and UV radiation forces in Section \ref{sec:UVIRForces}, and a quantitative analysis of the (in)efficiency of radiation in regulating star formation in Section \ref {sec:radpres_efficiency}. \subsection{Evolution of Clouds} \label{ssec:evolution} \begin{figure} \centering \includegraphics[width = 0.44 \textwidth]{Images/CompareSFE.pdf} \caption{Time evolution of the integrated star formation efficiency ($\epsilon_* = M_*/M_{\mathrm{cloud}}$) (top panel) and the fraction of mass ejected from the computational volume ($\epsilon_{\mathrm{ej}} = M_{\mathrm{ej}}/M_{\mathrm{cloud}}$ where $M_{\mathrm{ej}}$ is the ejected mass) (bottom panel), for different values of $\Sigma_{\rm cloud}$ (colours). Dark grey dashed lines indicate a control run without radiation feedback (No RT).} \label{fig:CompareSFE} \end{figure} \begin{figure*} \centering \includegraphics[width = 0.94 \textwidth]{Images/CompareEddAlt.pdf} \caption{Angle-averaged, volume-weighted Eddington ratio (based on Eq.~\ref{eq:fEdd}) compared at different times for different $\Sigma_{\mathrm{cloud}}$ (panels). The corresponding line for $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ at $t=7 \, t_\mathrm{ff}$ is not plotted as there is no gas remaining in the domain.} \label{fig:CompareEdd} \end{figure*} \begin{figure*} \centering \includegraphics[width = 0.94 \textwidth]{Images/RVelTimes.pdf} \caption{Volume-weighted radial velocity averaged over radial shells at radius $r$ and times $t = [3,5,7] \, t_{\mathrm{ff}}$. The dotted lines indicate zero radial velocities, and the dashed lines indicate the escape speed of the cloud ($v_{\mathrm{esc}}$), with their values annotated.} \label{fig:RVelTimes} \end{figure*} We discuss the time evolution of our fiducial set of model clouds in this section. The initial turbulent fluctuations form filamentary structures that become gravitationally unstable, and go on to collapse until sink particles (which represent sub-clusters of stars) form. This introduces radiation pressure due to feedback -- i.e., UV photons from the sink particles and the subsequently reprocessed IR photons -- which acts as potential support against gravitational collapse. The subsequent dynamics of the clouds are controlled by whether, and at what point, radiation forces are able to compete with gravity, and therefore depend on $\Sigma_{\mathrm{cloud}}$; this can be seen in Figures~\ref{fig:CompareSigmasProj} and \ref{fig:CompareSigmasProjLate}, which show snapshots of the gas surface density at times $t \sim 3 \, t_\mathrm{ff}$ and $t \sim 7 \, t_\mathrm{ff}$ respectively, for the different runs. In model \texttt{S2UVIR} ($\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$), accretion terminates by $\sim 2 \, t_{\mathrm{ff}}$, and radiation forces start driving gas outwards, forming bubbles and filaments characteristic of \ion{H}{II} regions, and evacuating gas from the domain (top-left panel in Figure~\ref{fig:CompareSigmasProj}). Eventually, by $t \sim 4$--$5 \, t_{\mathrm{ff}}$, all the gas is evacuated from the domain, and only the sink particles remain (top-left panel in Figure~\ref{fig:CompareSigmasProjLate}). Model \texttt{S3UVIR} continues to accrete gas even beyond $t \gtrsim 2 t_{\mathrm{ff}}$, and accumulates more mass in sink particles than \texttt{S2UVIR}; however by $t \sim 3 t_{\mathrm{ff}}$, radiation forces become stronger than gravity over a large part of the domain, initiating an outflow (top-right panel in Figure~\ref{fig:CompareSigmasProj}), which becomes stronger and more extended over time (top-right panel in Figure~\ref{fig:CompareSigmasProjLate}). Model \texttt{S4UVIR} evolves similarly at early times, but unlike the earlier cases, there are no signs of radiation-driven outflows at $t \sim 3 t_{\mathrm{ff}}$; once $t\sim 6 \, t_\mathrm{ff}$, however, an outflow is initiated, albeit less pronounced and more asymmetrical than in the cases with lower $\Sigma_{\mathrm{cloud}}$ (Figure~\ref{fig:CompareSigmasProjLate}), however showing indications of increasing strength with time. Finally, model \texttt{S5UVIR} continues to collapse for the whole duration of the simulation, with the snapshots showing only signs of infall and rotation (present due to the non-zero angular momentum imparted by the initial turbulent fluctuations), implying that gravity dominates the dynamics in this case. We quantify the evolutionary stages in the simulations, and the differences with $\Sigma_{\mathrm{cloud}}$, by measuring the the star formation efficiency $\epsilon_*$, given by \begin{equation} \epsilon_* = \frac{M_{*}}{M_{\mathrm{cloud}}}, \label{eq:sfe} \end{equation} where $M_*$ is final stellar mass, and $M_{\mathrm{cloud}}$ is the initial cloud mass; Figure~\ref{fig:CompareSFE} shows $\epsilon_*$ (top panel) as a function of time for the different model clouds. We see that the combined gravitational forces from the sink particles and the gas self-gravity increase $\epsilon_*$ for $t \lesssim 2$--$3 \, t_{\mathrm{ff}}$, after which point it saturates at $\epsilon_* \sim 75 \%$ in all runs except the lowest surface density case ($\Sigma_{\mathrm{cloud}} = 3.2 \times 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$), which saturates at $\epsilon_* \sim 58 \%$. The former value is similar to that obtained in a control run without feedback (labelled \texttt{NoRT} in Figure~\ref{fig:CompareSFE}). This implies that even though radiation forces in runs \texttt{S3UVIR} and \texttt{S4UVIR} drive outflows, this has no discernible impact on $\epsilon_*$. This is because the outflows begin only after these runs reach their respective final $\epsilon_*$ values. The finding that radiation feedback is unable to regulate $\epsilon_*$ for $\Sigma_{\mathrm{cloud}} \gtrsim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ is consistent with the results of \citetalias{Menon_2022b}, who only studied the 3 higher $\Sigma_{\mathrm{cloud}}$ values in our present simulation suite. We note that although \citetalias{Menon_2022b} only considered the effects of IR radiation pressure, and did not include the UV radiation pressure, \textit{this conclusion remains unchanged}. We also quantify the fraction of gas ejected from the volume, $\epsilon_\mathrm{ej}$ (Figure~\ref{fig:CompareSFE}; bottom panel), where \begin{equation} \epsilon_{\mathrm{ej}} = \frac{M_{\mathrm{ej}}}{M_{\mathrm{cloud}}}, \end{equation} such that $M_{\mathrm{ej}}$ is the gas mass ejected from the computational volume. The lowest $\Sigma_{\mathrm{cloud}}$ case, as expected, has the vast majority of its cloud mass ejected ($\epsilon_\mathrm{ej} \sim 45 \%$). However, it is more interesting to notice that there are marginal, but non-negligible differences in $\epsilon_\mathrm{ej}$ between run \texttt{S3UVIR} and the higher $\Sigma_{\mathrm{cloud}}$/No-RT cases for $t> 4 t_{\mathrm{ff}}$, in spite of their evolution in $\epsilon_*$ being indistinguishable. This is due to the outflows driving mass out of the domain. It is interesting to note that even though the gas morphology and kinematics shows signs of outflowing gas in \texttt{S4UVIR}, the mass removed from the domain is negligible -- as evident from Figure~\ref{fig:CompareSFE}. However, this is likely because the outflows are initiated only at late times, and thus we have not run the simulations for sufficient time for this gas to escape the domain; visual inspection of the time evolution of the clouds confirms this is the case. These results suggest that for i) $\Sigma_{\mathrm{cloud}} \sim \mathrm{few} \, 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, radiation pressure can regulate $\epsilon_*$ and drive a significant fraction of its mass as outflows, ii) for $\Sigma_{\mathrm{cloud}} \lesssim 10^3$--$10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, radiation pressure cannot regulate $\epsilon_*$, but once high $\epsilon_*$ is reached, clusters formed in such clouds can drive outflows, and iii) for $\Sigma_{\mathrm{cloud}} \gtrsim 10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, radiation pressure can neither regulate $\epsilon_*$ nor otherwise affect the dynamics at any significant level. To quantify why this is the case, we look at the time-evolution of the Eddington ratio averaged over the full sphere, $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$, where the Eddington ratio $f_{\mathrm{Edd}}$ is given by the ratio of specific radiation ($\dot{p}_{\mathrm{rad}}$) and gravity forces ($\dot{p}_{\mathrm{grav}}$), \begin{equation} f_{\mathrm{Edd}} = \frac{\dot{p}_{\mathrm{rad}}}{\dot{p}_{\mathrm{grav}}}. \label{eq:fEdd} \end{equation} We use the following procedure to compute $\dot{p}_{\mathrm{rad}}$ and $\dot{p}_{\mathrm{grav}}$. We define a spherical coordinate system centred on the instantaneous centre of mass of the sink particles, and assign every computational cell to one of $128$ radial bins relative to this point. We compute the direction of the radial vector $\hat{\mathbfit{r}}$ relative to the centre of mass, and use it to compute \begin{equation} \dot{p}_{\mathrm{rad}} = \frac{\left( \kappa_{\mathrm{R},\mathrm{UV}} \mathbfit{F}_{0,\mathrm{UV} } + \kappa_{\mathrm{R},\mathrm{IR}} \mathbfit{F}_{0,\mathrm{IR} } \right)}{c} \cdot \hat{\mathbfit{r}}, \label{eq:forcerad} \end{equation} where $\mathbfit{F}_{0,\mathrm{UV}}$ and $\mathbfit{F}_{0,\mathrm{IR}}$ are the radiation fluxes in the co-moving frame of the fluid in the UV and IR band, respectively. The corresponding (specific) gravitational force $\dot{p}_{\mathrm{grav}}$ is given by \begin{equation} \dot{p}_{\mathrm{grav}} = g_{\mathrm{gas}} + g_{*}, \end{equation} where $g_{\mathrm{gas}} = -\hat{\mathbfit{r}}\cdot \nabla \Phi_{\mathrm{gas}}$ and $g_{*} = - \hat{\mathbfit{r}}\cdot \nabla \Phi_{*}$, and $\Phi_{\mathrm{gas}}$ and $\Phi_{*}$ are the gravitational potentials of the gas and sink particles, respectively. To compute $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$, we simply take the volume average $f_{\mathrm{Edd}}$ over all the cells in each radial bin. We plot $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ for the different $\Sigma_{\mathrm{cloud}}$ cases for $t = [2,3,5,7] \, t_{\mathrm{ff}}$ in Figure~\ref{fig:CompareEdd}. We see that the differences and temporal behaviour found in our simulations are consistent with the variations in $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$. The $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case is super-Eddington at all times for radii $\lesssim R_{\mathrm{cloud}}$. The $3.2 \times 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ cloud is sub-Eddington at earlier times ($t/t_{\mathrm{ff}}\lesssim 2$) and then becomes super-Eddington at $t \gtrsim 3 t_{\mathrm{ff}}$. Interestingly, the $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case -- at late times ($t \gtrsim 5 t_{\mathrm{ff}}$) -- shows a super-Eddington profile for $r \lesssim R_{\mathrm{cloud}}$, but is sub-Eddington at larger radii, more so at later times. This could potentially explain the behaviour of $\epsilon_{\mathrm{ej}}$ for this run -- i.e., gas at small radii is expelled in an outflow, but rather than escaping to infinity it decelerates and falls back onto the cloud once it reaches larger radii, where the gas is largely sub-Eddington; indeed, this behaviour is visible in the velocity fields in the corresponding panel for this run (lower-left) in Figure~\ref{fig:CompareSigmasProjLate}. Therefore significant mass does not escape the domain in spite of the dynamical signatures of outflows in the gas distributions. \subsection{Outflows driven by radiation pressure} \label{sec:Outflows} Since we find that gas is driven radially outwards by radiation pressure forces in some of our model clouds, in this section we examine the properties of the outflows in more detail. We begin by calculating the radial velocity of the gas $\mathbfit{v} \cdot \hat{\mathbfit{r}}$ over the domain, where $\hat{\mathbfit{r}}$ is the radial unit vector with respect to the centre of mass of the sink particle distribution. We then perform a (volume-)average of this quantity over all solid angles for spherical shells at different $r$ (similar to $\langle f_{\mathrm{Edd}} \rangle_{4\pi}$) to obtain the average radial velocity of gas as a function of radius, i.e., $\langle \mathbfit{v} \cdot \hat{\mathbfit{r}} \rangle_{4\pi}$. We show this quantity at different times for our fiducial runs in Figure~\ref{fig:RVelTimes}. We see that the radial velocities are increasing with time, and are positive over a reasonable extent of the cloud in all cases except the largest $\Sigma_{\mathrm{cloud}}$ case, where the gas is inflowing at all radii. In the lowest $\Sigma_{\mathrm{cloud}}$ case, the gas is outflowing at up to $\sim 6\times$ the escape speed, even at early times. The \texttt{S3UVIR} run exceeds escape speeds by a factor of \mbox{$\sim 2$--$2.5$} at later times, while the \texttt{S4UVIR} cloud does so only at late times, and even then not over the entire extent of the cloud, consistent with the behaviour of $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ in Figure~\ref{fig:CompareEdd}. We also compute the mass flux $\dot{M}_{\mathrm{out}}$ across the cloud boundary (i.e., the Cartesian surfaces at $R_{\mathrm{cloud}}$) as a function of time. To compute $\dot{M}_{\mathrm{out}}$, we integrate the radial component of the momentum flux over the cartesian surfaces at $R_{\mathrm{cloud}}$ (denoted by $\partial S$), i.e., \begin{equation} \dot{M}_{\mathrm{out}} = \int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right), \end{equation} where $\hat{\mathbfit{n}}$ is the unit vector normal to the Cartesian surface, and $dA$ the surface area. We show the time evolution of $\dot{M}_{\mathrm{out}}$ for the fiducial set of simulations in Figure~\ref{fig:Outflow_Rate}, scaled by $M_{\mathrm{cloud}}/t_{\mathrm{ff}}$. We can see that there is a net outflow of material ($\dot{M}_{\mathrm{out}} >0$) for all runs except \texttt{S5UVIR}, with the time at which outflows begin increasing with $\Sigma_{\mathrm{cloud}}$. To compute a characteristic outflow speed for each case, we define $v_{\mathrm{out}}$, the momentum-flux weighted radial velocity, which is given by \begin{equation} v_{\mathrm{out}} = \frac{\int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \mathcal{H} \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \left( \mathbfit{v} \cdot \hat{\mathbfit{r}} \right)}{\int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \mathcal{H} \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right)}, \end{equation} where $\mathcal{H}$ is the Heaveside step function. We apply the Heaveside filter to ensure that $v_{\mathrm{out}}$ does not diverge even if there is a mixture of outflowing and inflowing gas at the cloud boundary surface, so that $\dot{M}_{\mathrm{out}}$ is nearly zero due to cancellations. However, this also means that $v_{\mathrm{out}}>0$ by construction, even if there is no outflow being driven. For this reason we only compute $v_{\mathrm{out}}$ for times where $\dot{M}_{\mathrm{out}}>0$; we show this in the lower panel of Figure~\ref{fig:Outflow_Rate}, scaled by the cloud escape speed ($v_{\mathrm{esc}}$; see Table~\ref{tab:Simulations}). We also compute the time-averaged values of $\dot{M}_{\mathrm{out}}$ and $v_{\mathrm{out}}$ for times where outflows are driven, which we report in Table~\ref{tab:Results}. We can see that there is a clear progression of $v_{\mathrm{out}}$ from larger to smaller values for higher $\Sigma_{\mathrm{cloud}}$. This essentially occurs because the gravitational potential wells are deeper at higher $\Sigma_{\mathrm{cloud}}$, and the resulting Eddington ratios are lower (Figure~\ref{fig:CompareEdd}). We also compute the total radial momentum in the ejected outflow, $p_{\mathrm{out}}$, given by \begin{equation} p_{\mathrm{out}} = \int dt \int_{\partial S} dA \, \rho \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \mathcal{H} \left( \mathbfit{v} \cdot \hat{\mathbfit{n}} \right) \left( \mathbfit{v} \cdot \hat{\mathbfit{r}} \right). \end{equation} We normalise this by the final mass of stars formed, to obtain $p_{\mathrm{out}}/M_*$. This is useful to estimate the possible impact the outflows might have on the larger-scale ISM, and to compare with corresponding estimates made for clouds with lower surface densities in earlier studies \citep[e.g.,][]{Kim_2018}. We report the values of $p_{\mathrm{out}}/M_*$ in Table~\ref{tab:Results}. We see that $p_{\mathrm{out}}/M_*$ is relatively low, and is significantly lower than the typical estimates for supernova feedback \citep[e.g.,][]{Kim_2015, Gentry_2017, Gentry_2019}, suggesting that the radiation pressure-driven outflows are relatively insignificant on larger scales. We note, however, that our simulations lack the ionising UV radiation, which could possibly increase the estimates of $p_{\mathrm{out}}/M_*$, although it is likely to be at most a factor $\sim$ few. \begin{figure} \centering \includegraphics[width = 0.48 \textwidth]{Images/Outflow_Velocity_Rate.pdf} \caption{Time evolution of the (normalised) mass outflow rate ($\dot{M}_{\mathrm{out}}$; top), and the momentum-flux weighted outflow velocity ($v_{\mathrm{out}}$), normalised by $v_{\mathrm{esc}}$ (bottom), for runs with different $\Sigma_{\mathrm{cloud}}$. We only show $v_{\mathrm{out}}$ for times at which $\dot{M}_{\mathrm{out}}>0$, indicating a net outflow of gas; the corresponding line for \texttt{S5UVIR} is not present as there is no bulk outflow in this case.} \label{fig:Outflow_Rate} \end{figure} \subsection{UV and IR radiation forces} \label{sec:UVIRForces} \begin{figure} \centering \includegraphics[width = 0.48 \textwidth]{Images/CumForceRatio.pdf} \caption{The cumulative momentum rate over all radii scaled by $L_*/c$ that is imparted individually by the UV (Equation~\ref{eq:forceuv}; squares) and IR (Equation~\ref{eq:forceir}; diamonds) radiation pressures, and the combination of the two (circles), in the \texttt{SnUVIR} series.} \label{fig:CumForce} \end{figure} \begin{figure*} \centering \includegraphics[width = 0.98 \textwidth]{Images/CompareEddUVIR.pdf} \caption{Eddington ratio compared at $t = 7 t_{\mathrm{ff}}$ for different $\Sigma_{\mathrm{cloud}}$ (panels) separated by the bands evolved in the simulations.} \label{fig:CompareEddUVIR} \end{figure*} Our simulations allow us to quantify the relative effects of the radiation forces in the UV and IR band, and thereby their contributions in setting the Eddington ratios in Figure~\ref{fig:CompareEdd}. To do so, we calculate the cumulative radiation pressure forces separately in the UV and IR bands for our fiducial runs. The forces are defined in a similar fashion to Equation~\ref{eq:forcerad}, to produce the cumulative UV radiation force given by \begin{equation} \dot{p}_{\mathrm{UV},\mathrm{cum}} = \int_{0}^{R_{\mathrm{cloud}}} \left( \frac{\kappa_{\mathrm{R},\mathrm{UV}} \mathbfit{F}_{0,\mathrm{UV}}}{c} \cdot \hat{\mathbfit{r}} \right) \, 4\pi r^2 \, dr \label{eq:forceuv}, \end{equation} and the cumulative IR radiation force \begin{equation} \dot{p}_{\mathrm{IR},\mathrm{cum}} = \int_{0}^{R_{\mathrm{cloud}}} \left( \frac{\kappa_{\mathrm{R},\mathrm{IR}} \mathbfit{F}_{0,\mathrm{IR}}}{c} \cdot \hat{\mathbfit{r}} \right) \, 4\pi r^2 \, dr, \label{eq:forceir}. \end{equation} In Figure~\ref{fig:CumForce}, we show the time-averaged values of $\dot{p}_{\mathrm{UV},\mathrm{cum}}$ and $\dot{p}_{\mathrm{IR},\mathrm{cum}}$, and their combined force (i.e., $\dot{p}_{\mathrm{UV},\mathrm{cum}} + \dot{p}_{\mathrm{IR},\mathrm{cum}}$), normalised by $L_*/c$, where $L_*$ is the total (UV) luminosity output from the sink particles at a given time. The quantity $L_*/c$ denotes the maximum cumulative momentum that is available in the single-scattering limit -- i.e., this is the maximum possible value of $\dot{p}_{\mathrm{UV},\mathrm{cum}}$. When the cloud is in the multiple scattering limit, the cumulative IR radiation force can exceed this value, and the factor by which it does so is referred to as the trapping factor, $f_{\mathrm{trap}}$. We can see from Figure~\ref{fig:CumForce} that the true cumulative UV radiation force is $\lesssim 0.1 L_*/c$, for reasons that we explore in Section~\ref{sec:radpres_efficiency}. On the other hand, for the IR, $f_{\mathrm{trap}} \gtrsim 1$ for $\Sigma_{\mathrm{cloud}} \gtrsim 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, with $f_{\mathrm{trap}} \sim 10$ for the highest $\Sigma_{\mathrm{cloud}}$ case. We note that these values of $f_{\mathrm{trap}}$ are lower than those obtained for the same parameters in the IR-only control runs (2.5 and 18, respectively; c.f.~Figure~19 in \citetalias{Menon_2022b}). This is probably due to \citetalias{Menon_2022b}'s idealised approach of injecting IR photons with a Gaussian source term (Equation~\ref{eq:jstar}), which can lead to a more systematic force in the radial direction than an asymmetric injection of IR photons via the reprocessing of UV radiation. We can also quantify the overall relative importance of the UV and IR radiation forces from Figure~\ref{fig:CumForce}. We can see that the lowest (highest) $\Sigma_{\mathrm{cloud}}$ is clearly dominated by the UV (IR) radiation force. The $\Sigma_{\mathrm{cloud}} \sim 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case is also dominated by the IR radiation force, which is $\sim$ 10 times the UV. On the other hand, for $\Sigma_{\mathrm{cloud}} \sim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ the forces in the UV and IR bands are comparable, and hence equally important to the dynamics of the clouds. Therefore, this implies that it is important to consider the contribution of \textit{both} UV and IR radiation forces for clouds with $\Sigma_{\mathrm{cloud}} \sim 10^3$--$10^4 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$; however, for clouds that have higher (lower) surface density, the UV (IR) radiation forces are negligible and can be ignored. Another approach to quantify the relative importance of the UV and IR radiation pressure is to compare the fiducial runs with control runs that do not include one of the bands (i.e., \texttt{SnUV} and \texttt{SnIR} runs; Table~\ref{tab:Simulations}). In Figure~\ref{fig:CompareEddUVIR} we compare $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ at $t = 7\, t_\mathrm{ff}$ between these simulations. The crucial role played by the UV radiation pressure is clearly visible here; the \texttt{SnIR} runs are all sub-Eddington at all $r$. However, $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ can be up to factors of a few higher in the UV+IR runs than the UV-only version, especially at smaller $r$. This is likely because the IR radiation pressure is concentrated at small $r$, as the temperatures, and hence the opacities, are lower at larger $r$; visual inspection confirms this is the case. We can also identify the impact the forces have on the dynamics of the clouds by comparing $\mathbfit{v} \cdot \hat{\mathbfit{r}}$ between the runs at the same time, as shown in Figure~\ref{fig:CompareRvelUVIR}. The differences in this quantity between the fiducial runs and the UV/IR-only control runs are quite evident in the cases of intermediate $\Sigma_{\mathrm{cloud}}$; the lowest and highest $\Sigma_{\mathrm{cloud}}$ cases are more or less indistinguishable from their UV and IR controls runs, respectively, as expected. In both the intermediate $\Sigma_{\mathrm{cloud}}$ cases, the UV+IR cases have higher (positive) $\langle v_r \rangle_{4\pi}$ than the UV-only case, and a larger fraction of gas that exceeds the escape speed of the cloud\footnote{The IR-only cases have negative $\langle v_r \rangle_{4\pi}$ at all $\Sigma_{\mathrm{cloud}}$, consistent with their sub-Eddington states.}. That being said, even the UV-only cases have radial velocities that exceed $v_{\mathrm{esc}}$, suggesting that outflows are still driven in these runs, but that they involve a smaller fraction of the cloud than in the UV+IR runs. This behaviour can also be inferred from the time-averaged properties of the outflows driven in the UV-only control runs -- summarised in Table~\ref{tab:Results}. We see that $v_{\mathrm{out}}$ in these runs is more or less comparable to that in the runs with UV+IR for all $\Sigma_{\mathrm{cloud}}$. However, for intermediate $\Sigma_{\mathrm{cloud}}$, $\dot{M}_{\mathrm{out}}$ is lower in the UV-only runs by a factor $\sim 2$, indicating that the inclusion of the IR radiation pressure significantly enhances the mass in the outflows. Similarly, the outflows carry more momentum ($p_{\mathrm{out}}/M_*$) with the inclusion of the IR component, especially for the \texttt{S4UVIR} run. These findings, combined with the behaviour of $\langle f_{\mathrm{Edd}}\rangle_{4\pi}$ and $\langle v_r \rangle_{4\pi}$ in Figures~\ref{fig:CompareEddUVIR} and \ref{fig:CompareRvelUVIR}, suggest that i) the outflows are initiated primarily by the impulse provided by the UV radiation pressure, and ii) the added component of the IR radiation pressure renders a larger fraction of sight-lines around the radiation sources super-Eddington, and thereby entrains more mass into the outflows. \begin{figure*} \centering \includegraphics[width = 0.98 \textwidth]{Images/CompareRvelUVIR_7tff.pdf} \caption{Volume-averaged radial velocity at $t = 7 t_{\mathrm{ff}}$ for different $\Sigma_{\mathrm{cloud}}$ (panels) separated by the bands evolved in the simulations.} \label{fig:CompareRvelUVIR} \end{figure*} \subsection{Low efficiency of radiation pressure forces} \label{sec:radpres_efficiency} \begin{figure*} \centering \includegraphics[width=0.9 \textwidth]{Images/CompareJstrProjection.pdf} \caption{Projected maps of the local UV energy absorption rate at $t = 3 t_{\mathrm{ff}}$ for the different values of $\Sigma_{\mathrm{cloud}}$ (panels). The absorption rate is normalised by the maximum value of the quantity in each panel. The star symbols and axes normalisation are similar to those of Figure~\ref{fig:CompareSigmasProj}. We see that the UV radiation is absorbed close to the sink particles for higher $\Sigma_{\mathrm{cloud}}$, and the scale over which absorption occurs is small compared to the scale over which the sink particles are distributed. This explains the relatively low efficiency of radial momentum injection by radiation pressure due to cancellation of radiation forces.} \label{fig:CompareJstarProj} \end{figure*} \begin{figure} \centering \includegraphics[width=0.48 \textwidth]{Images/Sigma2_CumTime.pdf} \caption{Time evolution of the cumulative UV radiation momentum rate (Equation~\ref{eq:forceuv}, normalised by $L_*/c$ for $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ (run \texttt{S2UVIR}) -- similar to Figure~\ref{fig:CumForce}, which shows the time-averaged value. The increase at $t \gtrsim 1.5 t_{\mathrm{ff}}$ corresponds to when radiation pressure drives the UV-absorption region ($d_{\mathrm{UV}}$) outwards, reducing the effects of cancellation due to multiple sources (see text in Section~\ref{sec:radpres_efficiency}); the decrease at $t \gtrsim 3 t_{\mathrm{ff}}$ corresponds to when the outflowing gas opens up channels for radiation to escape the domain.} \label{fig:Sigma2_Momentum} \end{figure} In Figure~\ref{fig:CumForce}, we quantified the total radial momentum per unit time injected by the UV and IR radiation pressures, in units of $L_*/c$ -- the momentum flux carried by photons from the sink particles. For an idealised spherical distribution with a source at the centre and enough mass around it to be optically thick in the UV, this ratio for the UV case should be 1 (i.e., the momentum per unit time imparted to the gas = $L_*/c$), and should be $\tau_{\mathrm{IR}}$ for IR radiation, where $\tau_{\mathrm{IR}}$ is the cumulative optical depth in the IR. We find that these idealised estimates are much higher than that obtained in our simulations. In \citetalias{Menon_2022b} we explain the origin of this discrepancy for the IR radiation pressure, so we do not repeat that analysis here. However, this still leaves the question of why the cumulative momentum injection rate in the UV $\lesssim 0.1 L_*/c$ in our simulations, as shown in Figure~\ref{fig:CumForce}. We find that the reason the momentum delivered to the gas is small is due to the cancellation of forces in the radial direction -- with respect to the centre of mass of the sources (sink particles) -- which occurs as most of the UV radiation is absorbed close to the sources, over regions whose sizes are smaller than/comparable to the typical separation between sources. We refer to the scales over which the UV radiation is absorbed and over which the sources are distributed as $d_{\mathrm{UV}}$ and $d_{\mathrm{*}}$, respectively. We can see in Figure~\ref{fig:CompareJstarProj} -- which is a projection of the UV energy absorption rate at $t=5t_{\mathrm{ff}}$ for our fiducial runs -- that $d_{\mathrm{UV}} \lesssim d_{\mathrm{*}}$. For such a situation, the individual (radial) vector forces from each sink, which point radially outwards with respect to the sink, need not necessarily point radially outwards with respect to the centre of mass, leading to a reduction in the radial momentum injection to the cloud. If, on the other hand, $d_{\mathrm{UV}}\gg d_{\mathrm{*}}$, the sinks would all lie within their respective UV absorption zones, and would all contribute positively to the radial momentum. This helps explain why the efficiency of UV momentum injection is low in all our runs, and more so in the highest $\Sigma_{\mathrm{cloud}}$ case ($\sim 0.01 L_*/c$) -- since $d_{\mathrm{*}}$ is very small at these high surface densities (see Figure~\ref{fig:CompareJstarProj}). However, the low efficiency of the $\Sigma_{\mathrm{cloud}} = 3.2 \times 10^2 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$ case needs further explanation. The cloud is being dispersed by (UV) radiation pressure in this case, and thus $d_{\mathrm{UV}}$ should increase as time progresses, rendering the UV momentum injection more efficient. However, we find that this is countered by another effect: as the cloud expands, this opens up channels through which UV photons escape, decreasing the efficiency of momentum injection, eventually driving it to zero as the cloud is entirely dispersed. It is possible that the combination of these two effects leads to the low time-averaged efficiency of $\sim 0.1 \%$ we find. To investigate whether this is the case, we show the time evolution of the radial momentum injection rate for this run in Figure~\ref{fig:Sigma2_Momentum}. Consistent with our hypothesis, we find that the efficiency is low at early times, then goes up as the bulk of the gas is pushed outwards and the gas distribution increasingly satisfies the condition $d_{\mathrm{UV}}/d_{\mathrm{*}} \gg 1 $. However, for $t > 3 \, t_{\mathrm{ff}}$, the efficiency decreases again due to the escape of UV photons through channels opened up by the dispersing cloud -- the top-left panel of Figure~\ref{fig:CompareJstarProj} provides a visual confirmation of this scenario. By comparing with Figure~\ref{fig:CompareSFE} we also see that i) the increase in momentum injection at $t\gtrsim 1.5 t_{\mathrm{ff}}$ corresponds to when $\epsilon_*$ starts to saturate due to radiation pressure forces and the associated expansion of a shell, and ii) the decrease in momentum injection for $t\gtrsim 3 t_{\mathrm{ff}}$ corresponds to when $\epsilon_{\mathrm{ej}} >0$, indicating that gas has started to escape the domain, opening up channels for UV radiation to escape. The aforementioned scenario shows that it matters where the UV photons are absorbed with respect to the distribution of the radiating source(s). An interesting implication of this is that the UV radiation pressure is likely to be a much more efficient feedback mechanism for a single massive star/binary system than for a larger system such as a molecular cloud/star cluster\footnote{Efficient in this context is in terms of the fraction of the total available UV radiation momentum ($L_*/c$) that is effectively imparted to gas in the radially outward direction.}. In the former case, there is less potential for cancellation due to a lower number of sources. In addition, for a massive star, the UV absorption front can be moved outwards due to the destruction of dust; indeed, for a single massive star or close binary, the dust destruction radius is much larger than the system scale, while for even the most compact star clusters the opposite is the case. This further reinforces the point made by \citet{Krumholz_2018} that calculations of radiation pressure feedback are only reliable if they resolve the region over which radiation is absorbed, and that naive subgrid models that do not include effects such as cancellation or the trapping of radiation momentum by gravity on small scales may be unreliable. A final implication is that any other feedback mechanism that moves $d_{\mathrm{UV}}$ to larger scales -- such as hot stellar wind-driven bubbles or hard ionising radiation that can destroy dust grains and/or provide additional thermal pressure-driven expansion -- would also increase the momentum injected by UV photons closer to $L_*/c$. Therefore, it is possible that the UV momentum injection efficiency is higher if additional feedback mechanisms are active. \begin{table*} \caption{Summary of key simulation results.} \centering \label{tab:Results} \begin{threeparttable} \begin{tabular}{l c c c c c c c c c c} \toprule \multicolumn{1}{l}{Model}& \multicolumn{1}{c}{$\epsilon_*$}& \multicolumn{1}{c}{$\epsilon_{\mathrm{ej}}$}& \multicolumn{1}{c}{$\dot{M}_{\mathrm{out}}$}& \multicolumn{1}{c}{$\dot{M}_{\mathrm{out}}/(M_{\mathrm{cloud}}/t_{\mathrm{ff}})$}& \multicolumn{1}{c}{$v_{\mathrm{out}}$}& \multicolumn{1}{c}{$v_{\mathrm{out}}/v_{\mathrm{esc}}$}& \multicolumn{1}{c}{$p_{\mathrm{out}}/M_{*}$}& \multicolumn{1}{c}{$\dot{p}_{\mathrm{cum},\mathrm{UV}}/(L_*/c)$}& \multicolumn{1}{c}{$\dot{p}_{\mathrm{cum},\mathrm{IR}}/(L_*/c)$}& \multicolumn{1}{c}{$\dot{p}_{\mathrm{cum},\mathrm{IR}}/\dot{p}_{\mathrm{cum},\mathrm{UV}}$}\\ & & & $\left[ \mathrm{M}_{\sun} \, \mathrm{yr}^{-1} \right]$& & $\left[ \mathrm{km} \, \mathrm{s}^{-1} \right]$& & $\left[ \mathrm{km} \, \mathrm{s}^{-1} \right]$& & & \\ \midrule \texttt{S2UVIR} &$0.58$ &$0.4$ &$0.029$ &$0.085$ &$28$ &$1.7$ &$14.0$ &$0.14$ &$0.0067$ &$0.048$\\ \texttt{S3UVIR} &$0.74$ &$0.18$ &$0.012$ &$0.0064$ &$25$ &$0.88$ &$0.99$ &$0.09$ &$0.11$ &$1.2$\\ \texttt{S4UVIR} &$0.75$ &$0.14$ &$0.093$ &$0.0086$ &$16$ &$0.31$ &$3.1$ &$0.059$ &$1.3$ &$23.0$\\ \texttt{S5UVIR} &$0.73$ &$0.15$ &$-$ &$-$ &$-$ &$-$ &$-$ &$0.0039$ &$12.0$ &$3100.0$\\ \texttt{S2UV} &$0.6$ &$0.32$ &$0.05$ &$0.15$ &$32$ &$2.0$ &$17.0$ &$1.0$ &$0.0$ &$0.0$\\ \texttt{S3UV} &$0.75$ &$0.16$ &$0.0074$ &$0.0039$ &$30$ &$1.3$ &$0.76$ &$1.0$ &$0.0$ &$0.0$\\ \texttt{S4UV} &$0.75$ &$0.15$ &$0.048$ &$0.0045$ &$20$ &$0.39$ &$0.12$ &$1.0$ &$0.0$ &$0.0$\\ \bottomrule \end{tabular} \begin{tablenotes} \small \item \textbf{Notes}: Columns in order indicate - Model: model name, $\epsilon_*$: fraction of mass in stars, $\epsilon_{\mathrm{ej}}$: fraction of mass ejected from the domain, $\dot{M}_{\mathrm{out}}$: mass outflow rate, $\dot{M}_{\mathrm{out}}/(M_{\mathrm{cloud}}/t_{\mathrm{ff}})$: mass outflow rate scaled by the cloud mass and free fall time, $v_{\mathrm{out}}$: average momentum-flux weighted outflow velocity, $v_{\mathrm{out}}/v_{\mathrm{esc}}$: outflow velocity scaled by the cloud escape speed $v_{\mathrm{esc}}$, $p_{\mathrm{out}}/M_{*}$: momentum per unit stellar mass carried by the outflowing gas, $\dot{p}_{\mathrm{cum},\mathrm{UV}}/(L_*/c)$: cumulative momentum imparted by the UV radiation pressure in units of $L_*/c$, $\dot{p}_{\mathrm{cum},\mathrm{IR}}/(L_*/c)$: cumulative momentum imparted by the IR radiation pressure in units of $L_*/c$, $\dot{p}_{\mathrm{cum},\mathrm{IR}}/\dot{p}_{\mathrm{cum},\mathrm{UV}}$: ratio of total momentum imparted by IR and UV radiation pressures. \end{tablenotes} \end{threeparttable} \end{table*} \section{Summary and Discussion} \label{sec:summary} We conduct 3D radiation hydrodynamic (RHD) simulations of star cluster formation and evolution in massive, dusty, self-gravitating clouds under the influence of direct UV and dust-reprocessed IR radiation pressure. We use the \texttt{VETTAM} RHD module \citep{Menon_2022} -- which employs the variable Eddington tensor (VET) closure -- to track the propagation of both UV and IR photon bands, accounting for the coupling between the bands due to the reprocessing of UV photons to the IR by dust. We explore marginally bound clouds with gas surface densities of $\Sigma_{\mathrm{cloud}} \sim 10^2$--$10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, which ranges from the upper end of the single-scattering limit deep into the multiple-scattering regime (see Table~\ref{tab:Simulations}). We also explore the relative importance of the UV and IR radiation pressure mechanisms by comparing with control runs where one band or the other is omitted. Combining IR and UV radiation pressure, we draw the following conclusions: \begin{itemize} \item The star formation efficiency $\epsilon_*$ cannot be regulated by radiation pressure for clouds with $\Sigma_{\mathrm{cloud}} \gtrsim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, even with the inclusion of the UV radiation pressure. In the simulations studied here, which do not include other forms of feedback except radiation pressure, and with isolated clouds that do not receive any energy input from a larger galactic environment, $\epsilon_*$ reaches $\sim 80 \%$ within $t\sim 3 t_{\mathrm{ff}}$ regardless of whether we include IR radiation, UV radiation, or both. \item However, clouds with $\Sigma_{\mathrm{cloud}} \lesssim 10^5 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, on attaining high $\epsilon_*$, become super-Eddington and launch radiation-pressure driven radial outflows -- unlike the lack of any dynamical impact of feedback in \citetalias{Menon_2022b} based on IR only. \item The outflows can reach significant radial velocities with high fractions of the escape speed of the clouds, $v_{\mathrm{out}} \sim 0.5$--$2 \, v_{\mathrm{esc}}$ (see Table~\ref{tab:Results}) -- corresponding to $\sim 15$--$30 \, \,\mathrm{km} \, \mathrm{s}^{-1}$ -- with the outflow velocity decreasing with $\Sigma_{\mathrm{cloud}}$. However, the momentum carried in the ejected outflows ($p_{\mathrm{out}}/M_* \lesssim 10 \,\mathrm{km} \, \mathrm{s}^{-1}$) is too small to \textit{directly} affect ISM dynamics at kiloparsec-scales and beyond. \item The cumulative momentum imparted by the UV and IR radiation pressure is comparable for $\Sigma_{\mathrm{cloud}} \sim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, and is dominated by the IR (UV) component in clouds with higher (lower) surface densities. \item The characteristic outflow velocity for clouds in the multiple-scattering limit ($\Sigma_{\mathrm{cloud}} \gtrsim 10^3 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) does not depend on whether we include only UV radiation pressure or both UV and IR (Table~\ref{tab:Simulations}), but the mass outflow rates and momentum fluxes do: omitting the IR lowers both by factors $\sim 2$. This suggests that the impulse of the UV radiation force provides the launching mechanism of the outflow, while the effect of IR radiation pressure is to render a larger fraction of the gas unbound, thereby allowing the UV pressure to entrain significantly more mass. \item We find that the cumulative momentum imparted by UV photons can be significantly lower than $L_*/c$, more so at higher $\Sigma_{\mathrm{cloud}}$. This occurs due to radiation forces cancelling each other out when radiation is absorbed on scales smaller than the typical spatial separation between radiation sources (see Section~\ref{sec:radpres_efficiency}). \end{itemize} Our finding that radiation pressure can drive outflows even in clouds with steep gravitational potential wells ($\sim 10^4 \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$) is interesting and may be significant in the context of the formation and evolution of super-star clusters (SSCs). For instance, \citet{Levy_2021} (\citetalias{Levy_2021} hereafter) analyse high-resolution ($\sim 0.5 \, \mathrm{pc}$) ALMA observations of SSCs in the dwarf starburst galaxy NGC~253, and find that a subset of their sample shows signs of (dense-gas) outflows. We can crudely compare the reported properties of the clouds and outflows in their observations (Table~2 in \citetalias{Levy_2021}) with our simulations (Table~\ref{tab:Results}). The clusters with outflows reported in \citetalias{Levy_2021} have $v_{\mathrm{out}} \sim 6$--$20 \, \,\mathrm{km} \, \mathrm{s}^{-1}$, and $p_{\mathrm{out}}/M_* \sim 1$--$5 \, \,\mathrm{km} \, \mathrm{s}^{-1}$ -- in reasonable agreement with the values we find. This suggests that radiation pressure is a strong candidate for driving these outflows. A minor caveat is that the star clusters with outflows in \citetalias{Levy_2021} have estimated surface densities of $\gtrsim 10^5 \, \, \mathrm{M}_{\sun} \, \mathrm{pc}^{-2}$, slightly beyond the range of $\Sigma_{\mathrm{cloud}}$ where we find outflows are driven. That being said, there are significant uncertainties in the estimated stellar masses and radii of the clusters that go into calculating $\Sigma$ \citep{Leroy_2018}. Moreover, the $\Sigma$ estimated in \citetalias{Levy_2021} is for the observed snapshot wherein the cluster has already formed, whereas $\Sigma_{\mathrm{cloud}}$ in our simulations is the initial condition; $\Sigma$ would significantly increase as the cloud collapses under the action of gravity and becomes more compact. We also have to point out larger fractions of our clouds could be ejected at a given $\Sigma_{\mathrm{cloud}}$ if i) the clouds were unbound to begin with (i.e., having a larger virial parameter), as suggested by some observations \citep{Evans_2021}, and might be expected to occur in the extreme environments where these clouds form, such as mergers, or ii) through the inclusion of magnetic fields \citep{Federrath_klessen_2012} and/or additional early feedback mechanisms (e.g., stellar winds, photoionisation) in our simulations, and/or iii) a higher dust-to-gas ratio or a more top-heavy IMF, as have been found in some young super-star clusters \citep{Turner_2015}. Therefore, we caution against a direct one-to-one comparison of our model clouds with observed counterparts; rather, we present our findings as evidence that radiation pressure has the momentum budgets to drive such outflows. Follow-up observations to better constrain the properties of SSCs and/or extending the sample size would enable testing the viability of these ideas. \section*{Acknowledgements} S.~H.~M would like to thank Todd A.~Thompson, Eve C.~Ostriker, Ahmad Ali, Shane Davis, Jeong-Gyu Kim and Rebecca Levy for insightful discussions and ideas. C.~F.~acknowledges funding provided by the Australian Research Council through Future Fellowship FT180100495, and the Australia-Germany Joint Research Cooperation Scheme (UA-DAAD). M.~R.~K.~acknowledges funding from the Australian Research Council through its \textit{Discovery Projects} and \textit{Future Fellowship} funding schemes, awards DP190101258 and FT180100375. We further acknowledge high-performance computing resources provided by the Leibniz Rechenzentrum and the Gauss Centre for Supercomputing (grants~pr32lo, pn73fi, and GCS Large-scale project~22542), and the Australian National Computational Infrastructure (grants~ek9 and~jh2) in the framework of the National Computational Merit Allocation Scheme and the ANU Merit Allocation Scheme. \textit{Software}: \texttt{PETSc} \citep{PetscConf,PetscRef}, \texttt{NumPy} \citep{numpy}, \texttt{SciPy} \citep{scipy}, \texttt{Matplotlib} \citep{matplotlib}, \texttt{yt} \citep{yt}. This research has made use of NASA's Astrophysics Data System (ADS) Bibliographic Services. \section*{Data Availability} Outputs of our simulations would be shared on reasonable request to the corresponding author. \bibliographystyle{mnras}
\section{Introduction} \label{sec:intro} \indent\indent The climate experienced in any local area is rarely consistent from one year to the next. A series of dry years, will eventually be followed by wet ones, cold winters will eventually be followed by warm ones. The rate of switching between these climate regimes can be plotted to determine the expected number of years when conditions will remain either in a {\it low productivity state}, or a {\it high productivity state}. Excessively long series of years under one type of climate, such as that experienced during the extended drought of the Great Depression in North America, can occur but are unusual under typical variability. Much attention has been given to the fact that anthropogenic climate change (henceforth, climate change) is resulting in a gradual warming of global mean temperatures. Climate change, however, is also altering the climatic {\it variability}, that is, climate variations on the scale of years (also called environmental stochasticity). Existing work has shown that alterations in climatic variability can have much greater and more immediate impacts on ecosystems than changes in mean climatic conditions \citep{hastings:2021, petchey:1997, yang:2019}. Short-term variations in climate metrics (e.g. precipitation, temperature) can be quantified by their standard deviation, a measure of the amplitude of deviations from the mean, and their temporal autocorrelation, a measure of the typical frequencies present. One of the major alterations possible under climate change is a shift in the typical frequencies of climate variability. More specifically, if the variability in local climates is analysed to determine the dominant frequencies present, climate change in many geographic locations is expected to lead to a downshift of these frequencies, or an increase in the temporal autocorrelation of the climatic variability. In other words, climatic variability has a particular ``colour" (a non-uniform frequency spectrum) in any given location on the globe, and these frequency spectra are changing shape, on average tending to more ``reddened" - or more autocorrelated - climatic variability \citep{dicecco:2018, lenton:2017,boulton2015slowing}. The amplitude component of climatic variability is also expected to increase with global warming, leading to greater extremes in climate conditions. Since extreme climate conditions tend to be detrimental or, at the very least, challenging for ecosystems, these extremes correspond to a further decrease in productivity during low productivity years. While local conditions can certainly follow different patterns of change, most geographic regions are expected to experience an increase in both the autocorrelation and the amplitude of climatic variability \citep{dicecco:2018}. The combined effect of these two changes in variability is that poor conditions will last longer, and be more detrimental, than would be typical under normal variability. This scenario is the focus of this paper. The effect of changes in climatic variability on population dynamics has become a matter of deep concern for ecologists~\citep{vasseur:2004, vasseur:2007a, vasseur:2007b, petchey:1997, yang:2019, hastings:2021}. It has been well-established that environmental stochasticity has a strong effect on population dynamics, and so it is critical that we understand the effect of changes to this stochasticity. Whether these changes will be beneficial or detrimental to a given ecosystem is a complex issue \citep{yang:2019, petchey:1997}, often with no clear answer \citep{barraquand:2013}. Recent work has demonstrated that increased reddening of climatic variability significantly increases extinction risk in populations whose dynamics include two stable states that are stationary, one with high population numbers and one with very low population numbers~\citep{vanderbolt:2018}. Here we consider the much less-studied case of a cyclic system of interacting populations with two stable states: A self-oscillating (or cyclic) coexistence state and a stationary extinction state. Below we describe the importance of oscillatory states in real ecosystems, and the challenges these states present under climate reddening. High amplitude multi-annual oscillations around cyclic coexistence states are ubiquitous in consumer-resource systems, including predator-prey populations \citep{boutin:1995, hanski:1995, kendall:1999}. Cyclic predator-prey systems are common in the Northern Hemisphere \citep{kendall:1998}, and it is generally accepted that their oscillations are inherent in the interaction dynamics of the system, i.e., they are not simply the result of some external environmental forcing \citep{turchin:2003}. That is, while external environmental factors certainly influence predator-prey cycles, these cycles would continue in the absence of such forcing. Many climate systems also exhibit either periodic oscillations or typical frequencies \citep{bathiany:2018}, which can have strong effects on demographic rates (births, deaths, predation, etc) \citep{paniw:2021, dejager:2020, bastillerousseau:2018, northfield:2013, svensson:2006}. The full ecological-climate system is thus an oscillator with an external forcing that has characteristic oscillatory components. One such component is the variability in climate metrics. A classic example is the variability in the typical frequency and intensity of the El Ni\~{n}o Southern Oscillation (ENSO), which is associated with the frequency and intensity of wet, cold winters on the eastern coast of the Pacific \citep{latif:2009}. Meaningful changes in the amplitude and/or frequency of climate metrics are being observed around the globe and are accelerating as climate change proceeds \citep{lenton:2017, hodgkins:2014}. These changes could have a strong effect on environments in which cyclic predator-prey systems currently exist \citep{bathiany:2018}. One important example is the snowshoe hare and Canada lynx predator prey system in boreal North America: This system exhibits high amplitude multi-annual cycles that affect the entire boreal food web, and is also subject to particularly rapid climate change \citep{hodgkins:2014}. The snowshoe hare is a keystone species in the boreal forest, and so its survival is of critical importance to the entire food web, and to the ecosystem services it provides to human populations. At the moment, however, it is unknown how the hare-lynx system will respond to changes in the irregular oscillatory forcing of climatic variability. It is well-known that externally-driven nonlinear oscillators can exhibit extremely complex behaviour \citep{andreas:2013, coullet:1992}, and so it is possible that changes in the colour and frequency of climate variability could put the persistence and stability of oscillating populations at risk. Here we refer to the stable oscillatory state as the base state, and to the extinction state as the alternative stable state. We are interested in the possibility of critical transitions from the base state to extinction due to changes in the colour and amplitude of climatic variability. Recent analysis of two classic predator-prey models \citep{alkhayuon:2021} shows that oscillatory predator-prey trajectories are vulnerable to collapse under sudden shifts between high productivity and low productivity climatic conditions, even if the oscillatory behaviour is stable under both climates. This new mechanism of collapse, which occurs only during certain phases of the cycle, is called {\it phase tipping} or {\it P-tipping}. This tipping mechanism is in contrast to the more classical bifurcation-induced tipping or {\it B-tipping} that occurs when the base state disappears in a dangerous bifurcation (e.g. a fold bifurcation), and extinction becomes the only stable state. Figure~\ref{fig:p-tipping} illustrates the basic mechanism of P-tipping, and the accompanying {\it escape events} and {\it rescue events}. The purple track represents the limit cycle (the expected steady-state behaviour under constant climate). It is a ribbon bent in a circle, which we are viewing from a slightly elevated angle, so that we can see the upper and lower halves of the circular track, but the sides appear skinny. The green roller-coaster car represents the predator-prey system, which is oscillating as it follows the limit cycle around the circular track. Climatic variability results in a stochastic left-and-right movement of the entire track (limit cycle), as per the black arrows.{\footnote{Note that changes in climatic variability alter the {\it shape} as well as the {\it position} of the limit cycle, and both play a role in determining those phases of the limit cycle that are vulnerable to P-tipping. In Figure~\ref{fig:p-tipping}, however, we focus only on position changes, for the purposes of illustration.}} If the climatic variability is small, and occurs while the car is on side A or C, then, no matter which way the track moves, the car will remain on the track. That is, the predator-prey system will remain in the basin of attraction of the limit cycle. If the track shifts rightward while the car is at D, the car also remains in contact with the track. If, on the other hand, the track shifts rightward while the car is at B, the car will {\it escape}, i.e., disassociate from the track and fall outside the limit cycle basin of attraction. So the car is only at risk of falling off the track if climate variability occurs in a particular direction and during particular phases of the limit cycle. The system may not have tipped, however, as it is possible, for at least a short interval, for climatic variability to shift the system far enough left to {\it rescue} the car and put it back in contact with the track. If the escape event is not followed by a rescue event, however, then the car will never again be able to return to the track, and the system will have {\it tipped} to extinction. \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{climate_change_roller_coaster_Jessa.png} \caption{Illustration of {\it phase tipping} or {\it P-tipping}. The purple elliptical track represents the limit cycle, and the green roller-coaster car represents the predator-prey system. Climate variability results in movement of the entire limit cycle, as per the black arrows. The car remains in contact with the track if the limit cycle shifts either right or left while the car is on side A or C of the track, or if the shift is left/right and the car is in position B/D. If the limit cycle shifts left/right while the car is in position D/B, the car will fall off the track. So the car is only at risk of falling off the track if climate variability occurs in a particular direction and during particular phases of the rotation. Hence, the name {\it phase tipping}.} \label{fig:p-tipping} \end{figure} In comparison with the more extensively studied B-tipping, where the base state disappears, extinction via P-tipping can occur in parameter ranges where the traditional understanding based on classical bifurcations would predict no vulnerability. Thus, our work is demonstration in principle of a ubiquitous but far less obvious mechanism for extinction that occurs even though the base state persists. This mechanism arises from intricate interactions between the timescale of self-oscillatory predator-prey systems and the timescale of changes in the local climatic variability. Having identified this new tipping mechanism, we are led to ask: Will changes in contemporary climate variability interact with the oscillations of real predator-prey systems to trigger P-tipping to extinction? If so, what is the nature of this interaction and the ensuing likelihood of P-tipping? We explore these questions using two paradigmatic predator-prey models with climatic forcing and an Allee effect in the prey equation so that we can determine if extinction is deterministically possible. The predator-prey dynamic is parametrised using the critically important Canada lynx and snowshoe hare system \citep{krebs:2001:book, peers:2020, krebs:2011}. Climate variability is represented as changes in the productivity rate of the prey, and is parametrised using climate data from the boreal forest in North America. We show that P-tipping can indeed occur for realistic parameter values and changes in climate variability. Furthermore, we show that tipping likelihood depends nonmonotonically on the colour of climatic variability, leading to the phenomenon of {\it stochastic resonance}. Our results suggest that the combined effect of anticipated alterations in the climatic variability and stochastic resonance will result in an increased likelihood of P-tipping to extinction in the Canada lynx and snowshoe hare ecosystem in particular, and potentially other cyclic ecosystems in general. \section{Models} \label{sec:models} Our study requires that we model two systems: The predator-prey system, and the climate system. For the predator-prey system we use two paradigmatic predator-prey models presented in \citet{alkhayuon:2021} and described in detail in Section~\ref{sec:pred-prey-models}. To ensure relevance to real predator-prey systems, which is a key aspect of our work, we use realistic parameters of the extensively studied Canada lynx and snowshoe hare interaction. The snowshoe hare is a keystone species in the boreal forest, meaning that its survival is critical to sustaining the boreal forest ecosystem, and the Canada lynx is the hare's most important specialist predator. Both species are famous for exhibiting high amplitude multi-annual oscillations \citep{krebs:2011, turchin:2001:book, krebs:2001:book}. For our climate model, we need a framework that allows us to control the variability in the climate time series, and couple it to the predator-prey system. Each variability component, that is, the amplitude and autocorrelation, responds to global warming in different ways. We therefore model each component with a separate random process; see Section~\ref{sec:climate} for details. Coupling to the predator-prey system is achieved through the prey productivity rate, which we consider to be a function of randomly changing climatic conditions. We use data from four locations in the boreal and deciduous-boreal forest of North America to determine the appropriate value of the autocorrelation parameter in our climate model; see Section~\ref{sec:transform-data}. \subsection{Predator-prey models} \label{sec:pred-prey-models} We use the Rosenzweig-MacArthur and May (or Leslie-Gower-May) predator-prey models, both including an Allee effect, as formulated in \citet{alkhayuon:2021}. We refer to these models the Rosenzweig-MacArthur-Allee (RMA) and May-Allee (MayA) models. The variables $N$ and $P$ represent prey (snowshoe hare) and predator (Canada lynx) respectively. We write the RMA model as \begin{subequations} \begin{eqnarray} \dot{N} & = & r(t) N \left( 1 - \frac{c}{r(t)} N \right) \left( \frac{N-\mu}{\nu+N} \right) - \frac{\alpha NP}{\beta+N}, \label{eq:RM-prey} \\ \dot{P} & = & \chi \frac{\alpha NP}{\beta+N} - \delta P, \end{eqnarray} \label{eq:RM} \end{subequations} and the MayA model as \begin{subequations} \begin{eqnarray} \dot{N} & = & r(t) N \left( 1 - \frac{c}{r(t)} N \right) \left( \frac{N-\mu}{\nu+N} \right) - \frac{\alpha NP}{\beta+N}, \\ \dot{P} & = & sP \left( 1 - \frac{qP}{N+\epsilon} \right). \end{eqnarray} \label{eq:May} \end{subequations} The time-varying productivity rate\footnote{In the absence of the Allee effect, $r(t)$ is the prey intrinsic growth rate, i.e., the prey growth rate at low prey density. With the Allee effect included in~\eqref{eq:RM-prey} however, $r(t)$ is no longer the intrinsic growth rate. Nonetheless, this name continues to be used in the scientific literature, and there is no established name for the new role of $r(t)$ in models with an Allee effect. As a compromise, we have chosen here to call $r(t)$ the prey productivity rate.}, $r(t)$, is directly proportional to the intrinsic growth rate and thus the carrying capacity. Increasing $r(t)$ indicates a change in climate leading to higher productivity. In the model, these conditions constitute an increased ``intrinsic growth rate" and environmental carrying capacity. The Allee term, $(N-\mu)/(\nu+N)$, means that the predator-prey system is vulnerable to extinction if hare densities become sufficiently low. The form of the Allee term is chosen following \citet{drake:2006} and \citet{boukal:2002}. The parameter $\epsilon$ in the May model is introduced so that extinction ($N=0$) is nonsingular. The implication is that the predator has alternate prey that supports a very low density predator population, but this density is so low that the predator can be considered extinct. The remaining parameters are briefly described in Table~\ref{tbl:params}, which also lists the values used. \begin{sidewaystable} { \caption{Parameter values for the two predator-prey models applied to the Canada lynx and snowshoe hare predator-prey system. All of the parameter values, except the Allee parameters, are taken from \citet{strohm:2009,tyson:2009}.} \label{tbl:params} \begin{center} \begin{tabular}{ c c c c c} Parameter & Units & RMA model & MayA model\\ \hline $r$ & 1/yr & $[0,3]$ & $[0,4]$ & {prey productivity rate} \\ $c$ & ha/(prey$\cdot$yr) & $0.19$ & $0.22$ & density-dependent competition parameter\\ $\alpha$ & prey/(pred$\cdot$yr) & $800$ & $505$ & predator saturation kill rate \\ $\beta$ & prey/ha & $1.5$ & $0.3$ & predator kill half-saturation constant.\\ $\chi$ & pred/prey & $0.004$ & n/a & prey-to-predator conversion ratio \\ $\delta$ & 1/yr & $2.2$ & n/a & predator mortality rate\\ $s$ & 1/yr & n/a & $0.85$ & low-density predator growth rate\\ $q$ & prey/pred & n/a & $205$ & the minimum prey-to-predator biomass ratio \\ $\mu$ & prey/ha & $0.03$ & $0.03$ & The Allee threshold parameters \\ $\nu$ & prey/ha & $0.003$ & $0.003$ & The Allee saturation parameters \\ $\epsilon$ & prey/ha & n/a & $0.031$ & predator minimum density parameter \footnote{ It is assumed that the predator have access to other prey which allow it to survive at a low density $\epsilon/q$ in the absence of the primary prey N \citep{alkhayuon:2021}}. \\ \hline \end{tabular} \end{center} } \end{sidewaystable} \subsection{Climate variability model} \label{sec:climate} Our focus here is on the effect of changes in the {\it climate variability} rather than changes in the mean. For $r(t)$ we thus adopt an approach that gives us access to both the amplitude and temporal autocorrelation of climate variability, and keeps the mean constant. Following \citet{wilmers:2007}, we divide climatic conditions into high productivity (type-H) and low productivity (type-L) years. The degree of autocorrelation is given by the length of each period of type-L or type-H years. Increased autocorrelation thus leads to longer periods of a given type of climate (type-L or type-H), on average, before there is a switch to the opposite type. The climatic conditions are reflected in the value of $r(t)$. For the amplitude component, we generalise the approach of \citet{wilmers:2007}, as we allow, in each scenario, a range of values for $r(t)$ selected from a closed interval $[r_{min}, r_{max}]$. Sometimes, we use the {\it average} $r_{mid}$ and the {\it amplitude} $\Delta r$ instead, which are given by \begin{equation} \label{eq:deltar} r_{mid} =\frac{r_{min} + r_{max}}{2}\quad\mbox{and}\quad \Delta r = r_{max} - r_{min}. \end{equation} Mathematically, we use two random processes to model the variability. First, we assume that the amplitude of $r(t)$ is a random variable with a continuous uniform probability distribution on the closed interval $[r_{\rm min}, r_{\rm max}]$. Second, the autocorrelation dictates the number of consecutive years $\ell$ during which the amplitude of $r(t)$ remains constant, and we assume that the length of this interval is a random variable with a discrete probability distribution known as the geometric distribution\footnote{ In the statistical literature, the geometric distribution gives the number of failures in a Bernoulli trail until the first success occurs, where $\rho$ is the probability of success~\cite{Devroye2006}.} \begin{align} g(\ell) = \mbox{Pr} (x = \ell) = (1-\rho)^\ell\, \rho, \label{eq:geometric} \end{align} where $\ell\in\mathbb{Z}_+$ is a positive integer and $\rho\in(0,1)$. Together, these two processes give us an $r(t)$ that can be viewed as bounded autocorrelated noise. The climate simulation algorithm proceeds as follows. Suppose that the initial simulation time is $t=t_0$. The algorithm first selects $\ell$ according to~\eqref{eq:geometric}, and then selects $r$ from a uniform distribution on $[r_{min},r_{max}]$. Then the productivity parameter is set to $r(t)=r$ for $t_0 \leq t \leq t_0+\ell$, and the simulation is run (with constant parameter values) for $\ell$ years. Then, new values of $\ell$ and $r$ are selected, and the simulation run for $\ell$ years. This process repeats until either the prey population goes extinct or the maximum simulation time is reached. To determine realistic values for $\rho$, we examine climate data from the boreal and boreal-deciduous regions in North America where Canada lynx and snowshoe hare populations are found. Very few weather stations in this region have uninterrupted\footnote{Time series missing the occasional isolated data point could be made ``uninterrupted" by replacing the missing data point with the mean of the data points on either side.} data for at least 100 years. We analysed precipitation data from Burlington, Vermont (USA), Fairbanks, Alaska (USA), and temperature data from Pelly Ranch, Northwest Territories (Canada), and Montreal, Quebec (Canada). In order to determine the geometric switching rate, $\rho$, we first had to transform each time series by removing the mean, and classifying conditions as type-H and type-L. Below, we describe this work. \subsection{Determining the geometric switching rate} \label{sec:transform-data} All four data sets show a strong increasing trend over all or part of the time series. We compute the mean of the data over decades (adjacent 10-year windows), and remove these means from the data, leaving an adjusted time series containing just the variability. In order to estimate $\rho$, we then need to convert each adjusted time series into a binary time series where $+1$ corresponds to ``high productivity climate'' and $-1$ corresponds to ``low productivity climate''. What constitutes a ``low'' or ``high'' productivity climate is likely to vary from one organism to another, and from one location to another. We define ``high" and ``low" productivity climates as corresponding to, respectively, data values inside and outside a ``normal variability" band around the mean. This definition is consistent with the notion that mean values are best, and when variability extends outside the "normal variability" band, in either direction, productivity is decreased. With this binary time series of type-H and type-L conditions, we can determine the length (in years) of each interval of constant conditions (type-H or type-L). These measurements are then used to create a histogram showing the frequency with which each each interval length appears in the data. Finally, we use Maximum Likelihood Estimation to fit~\eqref{eq:geometric} to this histogram and find the best-fitting estimate $\hat{\rho}$ of the probability ${\rho}$ (see supplementary material for details). Since we are interested in obtaining estimates for $\hat{\rho}$ before and during climate change, we seek to divide the data into these two respective periods. An increasing trend in the mean is evident in the latter part of the longer data sets we used, but a ``start" date for this increase is difficult to discern. Globally, studies show clear evidence of anthropogenic climate change beginning to be apparent in local climate metrics at about 1940 \citep{hawkins:2020, hegerl:2019}. While this date can vary from one location to another, the 1940 transition date appears consistent with our data. We therefore choose 1940 as the year that defines the ``start" of anthropogenic climate change. To define the ``normal variability" band, we use the pre-1940 data, and set the band half-width (amplitude) as equal to $20\%$ of the maximum deviation from the mean (``before" climate change). To measure $\hat{\rho}$, we divide the data set into two parts, pre- and post-1940, in order to obtain values for $\hat{\rho}$ corresponding to the periods ``before" and ``during" climate change. In Figure~\ref{fig:BurlVTdata} we show the results for Burlington, VT, which is the location with the longest climate time series. The results for the other locations appear in the Supplementary Material. \subsubsection{Example: Burlington, VT} \label{sec:climate-data} For Burlington, VT, annual precipitation data for 1884-2019 is available from NOAA \citep{noaa:2020}. The raw data, transformed data, and switching interval histograms with geometric distributions are shown in Figure~\ref{fig:BurlVTdata}. \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{Burlington-precip.pdf} \caption{Left Column, Precipitation data from Burlington, VT (USA). Plot (a) Annual precipitation from 1884 to 2019 (blue dots) with means calculated over 10-year intervals (red dashed piecewise constant function). Plot (c) Precipitation data with means removed, leaving the variability. The data values between/outside the green band correspond to high/low productivity years. Right Column: Histograms of the length of high and low productivity periods, with the geometric distributions for the most likely value of $\rho$ computed using maximum likelihood. Plot (b): pre-1940 ($\rho=0.349$). Plot (d): post-1940 ($\rho=0.310$). } \label{fig:BurlVTdata} \end{figure} We use Maximum Likelihood Estimation (MLE) to obtain the value of $\rho$ that best fits the data (see Supplement B for details). The maximum of the likelihood function applied to all of the data occurs at $\rho\approx0.32$. The MLE values for $\rho$ corresponding to the other three locations (Fairbanks, Pelly Ranch, and Montreal) are similar, suggesting that $\rho$ between $0.3$ and $0.35$ is appropriate for climatic autocorrelation in the boreal and deciduous-boreal forest over the last one and a half centuries. Separating the pre-1940 and post-1940 data points for Burlington, we find that $\rho$ decreases from 0.35 to 0.31, consistent with the prediction of increasing autocorrelation projected under climate change. In our work below, we find it helpful, in terms of developing our understanding of the system, to investigate the likelihood of P-tipping across the range of $\rho\in[0.1,0.5]$ around the realistic estimate of $\rho\approx0.32$. \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{RM_climateAndPhase.pdf} \caption{ RMA model with switching climate. Plot (a): Climate as represented by $r(t)$ with $\rho=0.2$, $r_{min}=1.6$, and $r_{max}=2.5$. Type-H/type-L years shown in red/blue. Plot (b): Prey (black) and predator (grey) populations as functions of time. Extinction occurs at approximately 90 years. Plot (c): Predator-prey phase plane trajectories for the time series in (b), with type-H/type-L segments shown in red/blue. Plot (d): Predator-prey phase plane under constant climate ($r(t)$ fixed). The limit cycles $\Gamma(r_i)$ obtained under $r=r_{1}= 2.49$ and $r= r_{2}= 1.859$ are shown in red/blue ($ r_{1}$ and $ r_{2}$ are shown in (a)). The corresponding basin boundaries $\theta(r_i)$ separating the limit cycle (below) and extinction state (above) basins of attraction are shown as dashed curves. Other parameter values are given in Table~\ref{tbl:params}. } \label{fig:RM_Tseries} \end{figure} \section{Results} \label{sec:results} Below we describe the phenomenon of P-tipping to extinction and rescue events for cyclic predator-prey systems subject to varying climate. We then move to the main topic of this paper: The impact of predicted changes in climate variability, namely increased amplitude and temporal autocorrelation of deviations from the mean \citep{ lenton:2017,dicecco:2018}, on the likelihood of P-tipping to extinction. \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{may_climateAndPhase.pdf} \caption{MayA model with switching climate. Plot (a): Climate as represented by $r(t)$ with $\rho=0.2$, $r_{min}=2$, and $r_{max}=3.3$. Type-H/type-L years shown in red/blue. Plot (b): Prey (black) and predator (grey) populations as functions of time. Extinction occurs at approximately 80 years. Plot (c): Predator-prey phase plane trajectories for the time series in (b), with type-H/type-L segments shown in red/blue. Plot (d): Predator-prey phase plane under constant climate ($r(t)$ fixed). The limit cycles $\Gamma(r_i)$ obtained under $r= r_{1} = 3.22$ and $r= r_{2} = 2.068$ are shown in red/blue ($ r_{1}$ and $ r_{2}$ are shown in (a)). The corresponding basin boundaries $\theta(r_i)$ separating the limit cycle (below) and extinction state (above) basins of attraction are shown as dashed curves. Other parameter values are given in Table~\ref{tbl:params}. } \label{fig:May_Tseries} \end{figure} \subsection{P-tipping, escape, and rescue events} \label{sec:results:phase} The concept of P-tipping, illustrated in Figure~\ref{fig:p-tipping}, was introduced by \citep{alkhayuon:2021} as a new type of critical transition in nonlinear systems. Here we explain this mechanism through examination of the time series of predator $P(t)$ and prey $N(t)$ populations, and the corresponding phase portraits in the predator-prey phase plane $(N,P)$. Sample time series are shown in Figures~\ref{fig:RM_Tseries} and~\ref{fig:May_Tseries}, for the RMA and MayA models, respectively. All of the time series culminate in P-tipping. Below, we give a detailed description of the subplots in these two figures, referring to both together. As described in Section~\ref{sec:climate}, the productivity rate $r(t)$ varies stochastically between type-H (red) and type-L (blue) years, taking values within the range $[r_{min},r_{max}]$, according to changes in climatic conditions (subplots (a)). Within this range of $r$, there is bistability between extinction and the predator-prey limit cycle. The ensuing predator-prey oscillations in subplots (b) have a timescale of approximately 10 years, consistent with the Canada lynx and snowshoe hare population cycle in the boreal forest. In the phase plane, the cyclic predator and prey populations trace out a counterclockwise trajectory composed of red and blue segments, which correspond to type-H and type-L years of $r(t)$, respectively (subplots (c)). To identify the key phenomena along this trajectory, we consider the limit cycle and its basin of attraction\footnote{A set of all initial conditions $(P_0,N_0)$ that converge to the limit cycle for a fixed $r$.} for two different values of $r$ (subplots (d)). In these subplots, we focus on two productivity values. These are the high productivity value $r_1$ and the low productivity value $r_2$, involved in the switch that triggers extinction. The triggering switch precedes extinction and occurs at approximately $t=88$ in Figure~\ref{fig:RM_Tseries}(b), and at approximately $t=80$ in Figure~\ref{fig:May_Tseries}(b). The limit cycle $\Gamma(r)$ (solid curve) is shown for $r=r_1$ (red) and $r=r_2$ (blue). The basin of attraction of the red/blue limit cycle is the region below its red/blue basin boundary $\theta(r)$ (dashed curve). The region above $\theta(r)$ is the basin of attraction of the extinction state. As the population trajectory in the phase plane follows the flow towards the limit cycle, there are parts or phases\footnote{For every point in the basin of attraction of a limit cycle, one can define a phase of oscillations, for example, using the simple approach in~\citep{alkhayuon:2021} or the concept of isochrons in~\cite{guckenheimer1975isochrons}.} of the plane where the population is vulnerable to extinction if $r$ changes from $r_{1}$ to $ r_{2}$. These vulnerable phases correspond to those portions of the basin of attraction of the high productivity limit cycle, $\Gamma( r_{1})$, that lie above the low productivity basin boundary $\theta( r_{2})$; see the shaded area in subplots (d). Furthermore, we note that the vulnerable phases correspond broadly to those parts of the cycle where the predator population is near its maximum. Now, consulting either Figure~\ref{fig:RM_Tseries} or~\ref{fig:May_Tseries}, consider the following sequence of events. Suppose that $r= r_{1}$ and the predator-prey system is on a counterclockwise trajectory approaching $\Gamma(r_{1})$. When the trajectory enters the (shaded) vulnerable region, the climate switches to $r_2$ conditions. Consequently, the system suddenly finds itself in the basin of attraction of the extinction state. This sudden switch from the basin of attraction of the limit cycle to the basin of attraction of extinction is an {\it escape event}. Once escaped, the system moves towards extinction. Nonetheless, this situation can be followed by two possible dynamical scenarios. If the climate switches quickly enough to some $r= r_3 > r_2$ such that the escaped system finds itself back in the basin of attraction of the limit cycle, extinction will be prevented. This recovery is called a {\it rescue event} illustrated in Figures~\ref{fig:rescue_RM}(a)~and~\ref{fig:rescue_May}(a). On the other hand, if rescue does not occur, then extinction is inevitable and the system has {\it P-tipped}. To summarize: If there is a sudden and large enough drop in productivity {\it while the system is in certain phases}, and this drop lasts long enough, the system is unable to adapt to the modified predator-prey limit-cycle and collapses to extinction. For more details about the phenomenon of P-tipping we refer to \citet{alkhayuon:2021}. \subsection{ P-tipping likelihood under climate change} \label{sec:results:warming} \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{distOfTippingTime_RM.pdf} \caption{ Distribution of the time to extinction (via P-tipping) for the RMA model. Top Row: Distribution for different values of $\Delta r$. Bottom Row: Distribution for different values of $\rho$. Left Column: Probability of extinction at time $t$. Right Column: Box and whisker plots for the data in the left column. For all plots $r_\textrm{mid} = 2.075$. See~\eqref{eq:deltar} for definition of $r_{\textrm{mid}}$. Plots (a,b) $\rho = 0.3$. Plots (c,d) $\Delta r = 0.95$. Results are obtained using $10^4$ replicates at each value of the parameter under investigation (i.e., $\Delta r$ in (a,b) and $\rho$ in (c,d)). Other parameter values are given in Table~\ref{tbl:params} } \label{fig:RM-Ptip-varypr} \end{figure} In this section, we focus on the ecological implications of P-tipping on real predator-prey systems under changes in climatic variability. As the amplitude and autocorrelation of environmental stochasticity increase, we observe new interactions between the predator-prey and the climatic forcing In our model, larger amplitude corresponds to increasing $\Delta r$, and increasing autocorrelation corresponds to decreasing $\rho$. \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{distOfTippingTime_May.pdf} \caption{ Distribution of the time to extinction (via P-tipping) for the MayA model. Top Row: Distribution for different values of $\Delta r$. Bottom Row: Distributions for different values of $\rho$. Left Column: Proobability of extinction at time $t$. Right Column: Box and whisker plots for the data in the left column. For all plots, $r_\textrm{mid} = 2.65$. See~\eqref{eq:deltar} for definition of $r_{\textrm{mid}}$. Plots (a,b): $\rho = 0.3$. Plots (c,d): $\Delta r = 1.3$. Results are obtained using $10^4$ replicates at each value of the parameter under investigation (i.e., $\Delta r$ in (a,b) and $\rho$ in (c,d). Other parameter values are given in Table~\ref{tbl:params}. } \label{fig:LGM-Ptip-varypr} \end{figure} In general we find that P-tipping is likely to happen sooner rather than later (Figures~\ref{fig:RM-Ptip-varypr} and~\ref{fig:LGM-Ptip-varypr}), except for very highly autocorrelated climates (small values of $\rho$). In these cases the likelihood of tipping is relatively constant over all extinction times. As noise amplitude increases, the likelihood of tipping sooner increases in both models, with the RMA model showing a marked increase in early P-tipping times. The effect of increasing temporal autocorrelation is the opposite, leading to a decreased likelihood of tipping sooner. So the predicted changes in climate variability, i.e., increased $\Delta r$ and decreased $\rho$, have opposing effects on expected P-tipping times, respectively causing a decrease and increase in expected extinction times. We point out that the maximum simulation time in Figures~\ref{fig:RM-Ptip-varypr} and~\ref{fig:LGM-Ptip-varypr} is set to be $5\times10^3$ years. All simulations of the MayA model tip before reaching this time limit. On the other hand, up to $20\%$ of the RMA model simulations exceed the time limit without tipping. These simulations are considered safe from tipping and therefore excluded from the computation of the distribution of time to extinction. That is, the maximum time to extinction shown reflects only those extinction events that occurred before the maximum simulation time. \begin{figure}[] \centering \includegraphics[width=0.8\textwidth]{rescueEvents_RM.pdf} \caption{ Rescue before extinction (RBE) in the RMA model. Plot~(a): Two time-varying functions $r(t)$, with the dashed red line jittered for readability; one $r(t)$ switches at $t=1$ (solid), and the other at $t=2$ (dashed). Plot~(b): An example of an escape event (blue dot) followed by either rescue or tipping to extinction, depending on the point where the switch from $r_2$ to $r_3$ occurs. A switch at point $s_1$ ($t = 1$), results in rescue and thereafter the system (thin solid red curve) approaches the limit cycle $\Gamma(r_3)$ (thick solid red loop). A switch at point $s_2$ ($t=2$), results in tipping to extinction (dashed red curve). The extinction point is not shown as the axes are logarithmic. % The blue and red curves in (b) are obtained for $r=r_2=1.6$ and $r=r_3=2.4$, respectively. % The basin of attraction for the limit cycle $\Gamma(r_3)$ appears in white; the extinction state basin of attraction (for the same value of $r$) appears in gray. % Plots~(c,d): The number of RBE events for various values of $\Delta r$ and $\rho$. Plot~(c): $\rho = 0.3$. Plot~(d): $\Delta r = 0.95$. All plots: $r_{mid} = 2.075$. Results are obtained using $10^4$ replicates at each value of $\rho$ and $\Delta r$. Other parameter values are given in Table~\ref{tbl:params}. } \label{fig:rescue_RM} \end{figure} \subsubsection{Rescue events} \label{sec:RBE} In Figures~\ref{fig:rescue_RM}~and~\ref{fig:rescue_May} we examine the number of rescue events that occur before the system finally P-tips to extinction. We call these events ``Rescue Before Extinction'' (RBE). First, we illustrate these rescue events in subplots (a) and (b). We are considering a situation where the system has just switched from $r=r_1$ to $r=r_2$. The initial state of the system is represented by a blue dot. This dot lies inside the basin of attraction of the limit cycle $\Gamma(r_1)$ (not shown) but lies outside the basin of attraction of the limit cycle $\Gamma(r_2)$ (not shown), and so the system is heading toward extinction along the blue trajectory. As discussed earlier (Section~\ref{sec:results:phase}), the system can still be rescued from extinction by another switch to $r=r_3$ sufficiently larger than $r_2$. However, there is only a short time window during which this rescue event can occur. In both of these examples (Figures~\ref{fig:rescue_RM} and~\ref{fig:rescue_May}), rescue is possible if the switch from $r_2$ to $r_3$ takes place by time $t=1$ (subplot (a)), which corresponds to the switching point $s_1$ (subplot (b)). In this case, the system follows the thin solid red trajectory approaching $\Gamma(r_3)$ (thick red loop, subplot (a)). Second, in subplots (c) and (d), we show how $\Delta r$ and $\rho$ affect the likelihood of RBE. Our analysis shows that RBE is equally likely under changes in amplitude ($\Delta r$, subplot (c)), but more likely for less autocorrelated climatic variability ($\rho$ larger, subplot (d)). Our results provide some insight into the escape and rescue dynamics of the forced predator-prey system. Changes in the amplitude of climatic variability have little effect on the likelihood of a rescue event occurring once an escape event has occurred. Increased autocorrelation of climatic variability, however, significantly reduces the likelihood that an escape event will be followed by a rescue event. \subsubsection{Stochastic resonance} \label{sec:SR} \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{rescueEvents_May.pdf} \caption{ Rescue before extinction (RBE) in the MayA model. Plot (a): Two time-varying functions $r(t)$, with the dashed red line jittered for readability; one $r(t)$ switches at $t=1$ (solid), and the other at $t=2$ (dashed). Plot~(b): An example of an escape event (blue dot) followed by either rescue or tipping to extinction, depending on the point where the switch from $r_2$ to $r_3$ occurs. A switch at point $s_1$ ($t = 1$), results in rescue and thereafter the system (thin solid red curve) approaches the limit cycle $\Gamma(r_3)$ (thick solid red loop). A switch at point $s_2$ ($t=2$), results in tipping to extinction (dashed red curve). The extinction point is not shown as the axes are logarithmic. % The basin of attraction for the limit cycle $\Gamma(r_3)$ appears in white; the extinction state basin of attraction (for the same value of $r$) appears in gray. The blue and red curves in (b) are obtained for $r=r_2=2$ and $r=r_3=2.8$, respectively. % Plots (c,d): The number of RBE events for various values of $\Delta r$ and $\rho$. Plot (c): $\rho = 0.3$. Plot (d): $\Delta r = 1.3$. All plots: $r_{mid} = 2.65$. Results are obtained using $10^4$ replicates at each value of $\rho$ and $\Delta r$. Other parameter values are given in Table~\ref{tbl:params}. } \label{fig:rescue_May} \end{figure} In both the RMA and MayA models (see Figure~\ref{fig:resonance-heatmap}, second row) we find stochastic resonance, i.e., a peak in the probability of P-tipping to extinction at intermediate values of climate autocorrelation, (measured by the switching parameter $\rho$ (see~\eqref{eq:geometric})). Tipping probability is a consequence of the separate probabilities of escape and rescue events. The emergence of stochastic resonance indicates that the likelihoods of escape and rescue events evolve differently under changes in climate colour. To understand the emergence of stochastic resonance, we describe the system behaviour as autocorrelation increases, beginning at very low levels ($\rho\rightarrow 1$). At low autocorrelation, the value of $r(t)$ changes frequently, and so escape events are highly likely. The rapid changes in $r(t)$, however, also make rescue events highly likely. These two effects cancel each other out, resulting in a low likelihood of P-tipping. At intermediate levels of autocorrelation, however, the time scales of rescue and climate switching can interact. Climate switching generates both escape and rescue events, but there is an asymmetry in the way each event interacts with climate switching. Escape events can occur at {\it any} switch from large enough to small enough values of $r(t)$, when the system is at the appropriate phase in the cycle, but rescue events must occur within a short window of opportunity after the escape event. Thus, while both escape and rescue events become less likely as the autocorrelation increases, the likelihood of rescue events is more strongly affected. In particular, over any given time interval, the average length of type-L and type-H periods begins to exceed the time window over which rescue events can occur. The result is a significant decrease in the likelihood of rescue events, and thus an increase in the likelihood of P-tipping. Finally, extremely high autocorrelation means much fewer climatic switches between type-H and type-L years. Consequently, escape events are highly unlikely, and so is P-tipping, making the likelihood of rescue events essentially irrelevant. Our data suggest that the current value of $\rho$ is approximately $0.3$, which is worryingly close to the peak of tipping likelihood. \begin{figure}[t] \centering \includegraphics[width=0.8\textwidth]{scanAndSR_RMandMay.pdf} \caption{ Probability of extinction taking place by a certain time $t_\textrm{ref}$. Left Column: RMA model. Right Column: MayA model. Top Row: Extinction probability as a function of $\rho$ and $\Delta r$. Plot (a): $r_{\text{mid}} = 2.075$ and $t_\textrm{ref} = 550$. Plot (b): $r_{\text{mid}} = 2.65$ and $t_\textrm{ref} = 150$. Bottom Row: vertical cross-section of corresponding top plot showing stochastic resonance in the probability function on varying $\rho$ (stepsize in $\rho$ is 0.05) with fixed $\Delta r$. Plot (c): $\Delta r = 0.95$, $r_{\text{mid}} = 2.075$ and $t_\textrm{ref} = 550$. Plot (d): $\Delta r = 1.3$, $r_{\text{mid}} = 2.65$ and $t_\textrm{ref} = 150$. Results are obtained using $10^3$ and $10^4$ replicates, for (a)-(b) and (c)-(d) respectively, at each value of $\rho$ and $\Delta r$. Other parameter values are given in Table~\ref{tbl:params}. } \label{fig:resonance-heatmap} \end{figure} \subsubsection{Net effect of climate change} \label{sec:net-effect} We have shown that the likelihood of P-tipping generally increases with increasing amplitude of climatic variability, but that the effect of increased autocorrelation is non-monotonic. It is unclear, therefore, how these two effects will interact when they occur simultaneously, as is predicted under contemporary climate change. We present these results in Figure~\ref{fig:resonance-heatmap}, top row. Under global warming, we expect the direction of change of $(\Delta r,\rho)$ to be as shown by the black arrow on Plots~(a) and (b). While the actual trajectory will certainly be stochastic, and could exhibit slopes ranging from very steep to very shallow, it is nonetheless clear that the general trend will be a diagonal shift toward the bottom right corner. The results suggest that the combination of increased amplitude and autocorrelation in climate variability will lead, generally, to an increase in the likelihood of P-tipping to extinction. \section{Discussion} \label{sec:discuss} Species persistence in response to climate change has been studied extensively in the context of increasing local mean temperatures \citep{vanselow:2019, culos:2014}, range shifts \citep{tejo:2016, zhou:2011}, and climate variability or frequency of extreme events \citep{huelber:2016, kaneryd:2012, hildebrand:2007, lynch:2014}. More generally, the propensity of climate change to lead to critical transitions in populations (i.e., sudden dramatic changes in population size, generally toward much lower numbers) has been well-explained in models with bistability between two stationary base states \citep{dakos:2019}. These two states could be, for example, a high population coexistence state and either a low population coexistence state or a state with extinction of one or both populations \citep{okeeffe:2019, vanselow:2019, osmond:2017}. However, little is known about the effects of climate change on systems whose base state is oscillatory \citep{sauve:2020, bathiany:2018}. In this paper, we study the impact of {\it changing} climatic variability on the persistence of {\it cyclic} ecosystems, i.e., interacting populations whose base state is a {\it limit cycle}. In many parts of the globe, especially over the northern continents, global warming is generally leading to an increase in the autocorrelation and amplitude of climate metrics \citep{lenton:2017, dicecco:2018}. In our model, changing climatic conditions are represented by changes in prey productivity rate, $r(t)$. Increased autocorrelation and amplitude translate, respectively, to a gradual decrease in the climatic switching rate $\rho$, and a gradual increase in the switching amplitude $\Delta r = r_{max} - r_{min}$. Our starting values for $\rho$ are consistent with precipitation and temperature data from various locations in the boreal and deciduous-boreal forests of North America. For $r_{min}$ and $r_{max}$, we use values that ensure continued existence of the predator-prey limit cycle throughout, meaning that there are no bifurcations that either destabilise or destroy the predator-prey cycle within the range $[r_{min},r_{max}]$. In order to ensure maximum relevance of our study to real ecosystems, we frame our work around contemporary climate and a classic cyclic ecosystem: the oscillatory predator-prey system. In particular, our climate parameter values are obtained from real boreal forest climate data. For the ecosystem, we use parameter values consistent with the Canada lynx and snowshoe hare predator prey system \citep{strohm:2009}. In addition, we use two very different but widely accepted predator-prey models: the Rosenzweig-MacArthur (RMA) and the Leslie-Gower-May (MayA) models \citep{turchin:2003}. Neither of these models is perfect for any particular real system, but together they provide an important baseline from which to investigate the dynamics of predator-prey systems \citep{turchin:2003}. Indeed, both have led to insights into the Canada lynx and snowshoe hare ecosystem dynamics \citep{turchin:2003, strohm:2009, tyson:2009}. Our results show that the extinction risk via P-tipping, quantified in our previous paper under statistically constant climatic variability \citep{alkhayuon:2021}, is likely to be exacerbated under the predicted direction of changes in climate variability. For both the RMA and MayA models, $\Delta r$ has a positive relationship with the likelihood of P-tipping. Larger jumps in $r(t)$ correspond to larger changes in the size and shape of the limit cycle basin of attraction, and therefore increase the likelihood of escape events. That is, after a drop in $r(t)$ the limit cycle and its basin change shape in such a way that the system will be outside the basin of attraction of the changed limit cycle. On the other hand, the mean time to extinction decreases significantly as $\Delta r$ increases, as shown in Figures~\ref{fig:RM-Ptip-varypr} and~\ref{fig:LGM-Ptip-varypr}. Our work suggests that the maximum time to extinction also decreases\footnote{We point out that we limited our simulations to a maximum simulation time of $t=5000$ years} with increasing $\Delta r$. The relationship between likelihood of extinction and the climate switching rate, $\rho$, is more nuanced: Starting from high values of $\rho$, the likelihood of P-tipping initially increases until $\rho\approx0.5$, and then decreases, giving rise to {\em stochastic resonance}. Our data suggests that the current value of $\rho$ is most likely in the range [0.1,0.5], which includes the stochastic resonance peak. We identify escape and rescue events in Section~\ref{sec:results:phase}, and show in Section~\ref{sec:SR} that the stochastic resonance we observe is due to the differences in the way escape and rescue respond to changes in $\rho$. Recently, there has been much interest in the possibility of overshooting tipping-point boundaries for a short period of time without actually prompting dangerous transitions to alternative stable states \citep{ritchie2021overshooting}. Rescue events are a new example of this phenomenon. The fact that we observe P-tipping in two models with widely differing predator growth mechanisms provides strong indication that P-tipping is a phenomenon that exists across different predator-prey systems. The comparison also reveals that the likelihood of P-tipping can vary enormously: For the Canada lynx and snowshoe hare parameter values, subject to the same climate switching rate $\rho$ and climate amplitude $\Delta r$ (held within a range where no bifurcation exists), we find that P-tipping is as much as 10 times more likely in the MayA model than in the RMA model (compare Figures~\ref{fig:RM-Ptip-varypr} and~\ref{fig:LGM-Ptip-varypr}). The increased complexity in more realistic models will certainly affect the likelihood of P-tipping, but results from studies of other tipping phenomena suggest that complexity may \citep{brook:2013} or may not \citep{klose:2020, kroenke:2020} be protective. At this point, we are only able to point to the possible presence of P-tipping and stochastic resonance resulting from changes in climate variability, and so there is a need for future work including climate data sets that are both longer and from many different locations around the globe. The climate reddening currently predicted is largely at the planetary scale \citep{boulton:2015}; there has been less investigation of this phenomenon at local scales. Recent work clearly shows that temporal autocorrelation is increasing in some regions while decreasing in others \citep{dicecco:2018, lenton:2017}. Consequently, the local character of climate variability, and the local ecological effects (i.e., the model parameters affected), are important factors to consider. Here we modeled climatic conditions via changes in prey productivity rate, $r(t)$, but there are other parameters that could also be linked to climatic conditions \citep{marangon:2020, peers:2020}. Furthermore, population dispersal could connect neighbouring regions that are suffering very different changes in climate variability \citep{petchey:1997}, leading to questions about the effect of spatial coupling on the likelihood of P-tipping. While we find only a small likelihood of P-tipping in the models presented here, there are a number of factors that make this phenomenon concerning for management of real systems. First, the 10-fold difference in tipping likelihood between these two models indicates that other models could have a much higher likelihood of P-tipping. In addition, when coupled with other mechanisms such as tipping cascades, P-tipping could be an important factor increasing the overall risk of extinction. Finally, no early warning signals have been identified for escape-type events, which occur far from a stable equilibrium point. As a result, if a system is vulnerable to P-tipping, managers will have no way of knowing if the ecosystem is approaching an escape event. Together, these observations highlight P-tipping as an important mechanism to investigate in studies of ecosystem resilience. { \section*{Data Accessibility} The codes used to conduct simulations and generate figures are available via the GitHub repository \citep{alkhayuon:2021repo} } \section*{Acknowledgements} HA and SW were funded by Enterprise Ireland grant no. 20190771. RCT is funded by NSERC (grant no.s RGPIN-2016-05277 and RGPIN-2022-03589), and the Institute for Biodiversity, Resilience, and Ecosystem Services (UBC Okanagan). RCT would also like to acknowledge the contributions of undergraduate researcher Kim Wilcott who contributed to our understanding of earlier versions of the model. RCT and SW also acknowledge the contribution provided by BIRS through workshop 19W5108 where they met. \printbibliography \end{document}
\section*{Introduction} \label{sec:introduction} Continuous diagnosis and prognosis are of great significance for timely, personalized treatment and rational allocation of medical resources. Especially in the Intensive Care Unit (ICU), the status perception and disease diagnosis are needed at any time as the real-time diagnosis provides more opportunities for doctors to rescue lives \cite{2014The}. For example, sepsis is a life-threatening condition, causing more than half of ICU deaths \cite{sepsis-3}. Early detection and antibiotic treatment are critical for improving sepsis outcomes \cite{2017Time}; Corona Virus Disease 2019 (COVID-19) outbreaks have caused health concerns worldwide \cite{covid-19who}. In the case of a sudden outbreak of the new epidemic, the continuous prognosis can help for personalized treatment and rational allocation of scarce resources \cite{COVID-19}. Different from the single-shot diagnosis, which is often made for the outpatient, the task of continuous diagnosis and prognosis emphasizes the multiple early diagnoses or prognosis for the inpatient at different stages over time. For example, in Figure \ref{fig:introduction}, an ICU patient is monitored for vital signs in real-time. Assuming that he will be in sepsis shock at 17:00, the common diagnostic system will give a warning when he is suffering or about to suffer from sepsis at about 17:00 (the single-shot diagnosis, blue dot). This is likely to miss the emergency treatment time for the acute disease, where each hour of delay has been associated with roughly a 4-8\% increase in sepsis mortality \cite{2017Time}. Thus, we require the continuous prognosis for sepsis (red stars), where we can predict the patient outcome 4 hours early, 1 hour early, etc. at 13:00, 16:00, etc. In order to meet the practical need, we summarized four requirements in the task of continuous diagnosis and prognosis. \begin{figure*}[!t] \centering \includegraphics[width=\linewidth]{figures/introduction.png} \caption{Continuous Diagnosis and Prognosis with Disease Staging} \label{fig:introduction} \end{figure*} \textbf{Requirement 1: the ability to identify symptoms in different time stages before the disease onset.} The single-shot diagnosis only needs to learn the clinical manifestation, which is easy under the guidance of the gold standard \cite{Mariam2008Rapid}. But the continuous prognosis needs to learn the underlying symptoms of the disease, which are usually not obvious in the clinic and cannot be judged by clinicians. And the symptoms are not only from a certain stage but from multiple stages before the onset, leading to diversity and hybridity. \textbf{Requirement 2: potential for earlier diagnosis with guaranteed accuracy.} Earlier diagnosis is necessary for many severe illnesses. E.g., each hour of delayed treatment could cause a 4-8\% increase in sepsis mortality \cite{2017Time}. But basic questions about the limits of early detection remain unanswered. If one wants to pursue higher diagnostic accuracy, it would tend to predict late for clearer features. E.g., the rapid drop of blood pressure (a major symptom of sepsis shock, the red dashed box in Figure \ref{fig:introduction}) always occurs just before the shock \cite{singer2016third}. Thus, we expect the continuous mode to achieve earlier and more accurate results than the single-shot mode. \textbf{Requirement 3: merits of explainability and disease staging.} The 22nd article of the European Union’s General Data Protection Regulation stipulates that a subject of algorithmic decisions has a right to meaningful explanation regarding said decisions \cite{2016EU}. As clinicians always justify a result using medical-domain knowledge familiar to them \cite{DBLP:conf/mlhc/TonekaboniJMG19}, the explainable methods will be more popular in practice. Meanwhile, the continuous prognosis is accompanied by the disease progression. Disease staging is important to understand disease mechanisms and implement targeted treatment. A clinically useful staging system stratifies patients by their baseline risk of an adverse outcome and their potential to respond to therapy. The best developed and most explicit approach has evolved in oncology \cite{cancerstage}, but it is not clear for critical illnesses. E.g., the stratification of sepsis, severe sepsis, and septic shock is questioned in the latest sepsis definition \cite{sepsis-3} and there are no criteria for temporal septic stages \cite{20032001}. \textbf{Requirement 4: function of offline and sustainable use. } In many scenarios, especially in ICU, we need to directly use the mature system without constant adjustment. A well-informed system can reduce the risk of misjudgment \cite{DBLP:conf/icml/SiZZB20}. Further, in subsequent applications, when obtaining a batch of new data, such as new patients and new clinical observations, we hope to continue to use the current system instead of designing a new one. Because the new system cannot handle the old data well, the data accord with the old knowledge may still be generated. Nowadays, many studies have shown that Deep Learning (DL) methods \cite{2015Deep} are superior to medical gold standards and experienced doctors in some medical tasks such as medical image recognition \cite{0Deep} and arrhythmia detection \cite{hannun2019cardiologist}. Surprisingly, in these studies, sequential medical records, such as vital signs, multiple blood samples, and serial medical imaging, provided more possibilities for DL models to implement diagnosis and prognosis. We uniformly name such sequential medical records as medical time series data. However, most DL-based models often give the single-shot diagnosis after learning the full-length medical time series, but can not prognose continuously. Although some sub-disciplines also study the mode of continuous learning (Appendix \ref{sec:related work}). But they cannot satisfy the above requirements at the same time. The requirements ask the DL model to learn multi-distributed medical data with interpretability. The labels (mortality, morbidity, etc.) of the real-world medical time series are usually determined at the final time. If the model simply learns the full-length time series, it can only give the single-shot result at the onset time. For continuous diagnosis and prognosis, the model needs to learn time series from different advanced stages: When the data changes, the model performance needs to maintain. But most medical time series have evolved distribution. In Figure \ref{fig:introduction}, the blood pressure varies among early, middle, and late stages, bringing a triple-distribution. DL models are lack of ability to learn all distributions simultaneously due to the premise of independently and identically distribution \cite{DBLP:conf/aaai/ShimMJSKJ21}. Learning new knowledge could inevitably lead to the forgetting of old ones \cite{DBLP:journals/nn/ParisiKPKW19}, and learning one distribution frequently may fall into the local solution with overfitting \cite{DBLP:conf/iclr/SahaG021}. Meanwhile, unfortunately, interpretability is an elusive concept. The field of artificial intelligence holds no consensus regarding its definition and common opinion holds that DL models are uninterpretable black-boxes \cite{2016Can}. \begin{figure*}[!t] \centering \includegraphics[width=\linewidth]{figures/method.png} \caption{Restricted Update Strategy of Neural Networks (\texttt{RU}\xspace) for Continuous Classification of Time Series (\texttt{CCTS}\xspace)} \label{fig:method} \end{figure*} To this end, we established a novel training method for DL models, Restricted Update strategy of neural network parameters (\texttt{RU}\xspace). \texttt{RU}\xspace can satisfy the above requirements: For Requirement 1, it has the Limitation Mechanism (LM) to avoid catastrophic forgetting and overfitting; For Requirement 2, it has the Promotion Mechanism (PM) to consolidate the knowledge of early distribution; For Requirement 3, we defined the importance coefficient of model parameters to reveal the development of the model and achieve disease staging with typical biomarkers; For Requirement 4, our method trains the DL model by real-world datasets with separate training and test sets and having the test of continual use. Experimental results show that our method is more accurate than all baselines, achieving the accuracy of 90\%, 97\%, and 85\% on sepsis prognosis, COVID-19 mortality prediction, and eight diseases diagnoses. The major advantages of our study are fourfold: (1) For continuous diagnosis and prognosis of time-sensitive illness, we design a \texttt{RU}\xspace strategy for the DL model, which outperforms baselines. (2) \texttt{RU}\xspace has a certain ability to interpret the update of DL models and the change of medical time series through input indicators and parameter visualization. These side effects make our method attractive in medical applications where model interpretation and marker discovery are required. (3) We extend our method to connect the distribution change of vital signs with the parameter change of the DL model and we find typical disease biomarkers and stages of sepsis and COVID-19. (4) \texttt{RU}\xspace is a data-agnostic, model-agnostic, and easy-to-use plug-in. It can be used to train various types of DL models. Note that such a continuous prediction mode is needed in most time-sensitive applications, not just in medical tasks. We define these tasks with a new concept, Continues Classification of Time Series (\texttt{CCTS}\xspace). \section*{Results}\label{sec2} \subsubsection*{A restricted update strategy to train deep learning models for continuous diagnosis and prognosis.} We sought to develop a training strategy that could help deep learning models to classify time series continuously, especially to achieve continuous medical diagnosis and prognosis. To this end, we focused on continuous sepsis prognosis, continuous COVID-19 mortality prediction, and continuous eight diseases classification based on medical time series, including vital signs from various monitors, and continuous blood sample records during hospitalization. All used data is available: CinC-19 dataset \cite{DBLP:conf/cinc/ReynaJSJSWSNC19} has 30,336 ICU patient records with 2,359 diagnosed sepsis from three separate hospital systems; COVID-19 dataset \cite{COVID-19} has 6,877 blood sample records of 485 COVID-19 patients from Tongji Hospital, Wuhan, China; MIMIC-III dataset \cite{johnson2016mimic} has 19,993 admission records from 7,537 patients. We focus on 8 diseases (Appendix \ref{sec:experiments}). A time series dataset $\mathcal{T}=\{X^{n}\}_{n=1}^N$ has $N$ samples. Each sample $X^{n}_{1:M}=\{x^{n}_{m}\}_{m=1}^M$ has $M$ observations with value $x^{n}_{m}$ and time $t^{n}_{m}$. DL models have achieved great success in modeling medical sequential data \cite{LeCun2015, Shenda2020}, especially Recurrent Neural Network (RNN). However, the real-world time series is usually long and irregularly sampled \cite{DBLP:journals/corr/abs-2010-12493}. For example, critically ill patients are often hospitalized for several months, and records often have hundreds of observations. Due to the change in patient's health status, the relevant measurement requirements are also changing, which may be several hours or days apart \cite{ijcai2021-414}. Thus, to model long-term dependency and eliminate the impact of uneven time intervals, we implemented Time-aware Long Short-Term Memory (T-LSTM) \cite{Baytas:2017:PSV:3097983.3097997}. As shown in Figure \ref{fig:method}a, our DL architecture has two blocks: Block 1 uses T-LSTM to model the input data and represent their hidden features with the consideration of time decay $\Delta_{m}=t_{m}-t_{m-1}$; Block 2 uses Multilayer Perceptron (MLP) to map the features to the class of input data. After using the full-length time series $X_{1:M}$ to train the proposed deep learning model, it can achieve the average accuracy of 92\%, 97\%, and 88\% on single-shot diagnosis for sepsis, COVID-19, and eight diseases. However, when applying it to continuous diagnosis and prognosis, the accuracy drops by more than 15\%. Thus, we used the dataset of subsequences of time series in different stages $\mathcal{T}^{*}=\{X^{n}_{1:m}\}_{n,m=1}^{N,M}$ to train the model. As the time series changes dynamically, $X_{1:m-1}$ and $X_{1:m}$ will form different data distributions $D_{m-1}$ and $D_{m}$. For learning such multi-distribution, we design a restricted update strategy \texttt{RU}\xspace to train our model. As shown in Figure \ref{fig:method}b, \texttt{RU}\xspace has two mechanisms: Limitation Mechanism (LM) and Promotion Mechanism (PM). LM helps DL models to learn multi-distributed data, alleviating problems of catastrophic forgetting and overfitting. Due to the observation of many parameter configurations resulting in the same performance \cite{DBLP:journals/nn/ParisiKPKW19}, we could add a regular term to the loss to restrict the updating of model parameters. To this end, when learning a new distribution, LM constrains important parameters $\theta_\text{important}$ for the old distribution to stay close to their old values but changes unimportant parameters $\theta_{\text{unimportant}}$ more. As shown in Figure \ref{fig:method}b, when learning distribution $D_{m}$, $\theta_\text{important}$ is limited to the low error space of distribution $D_{m-1}$ while $\theta_\text{unimportant}$ can be updated to other spaces. The importance of parameter $\theta$ is matured by the importance coefficients $\alpha(\theta)$. PM helps DL models to classify time series earlier in time-sensitive applications. LM regards early distributions and the new distributions as solutions to the same continuous optimization problem \cite{DBLP:journals/corr/abs-1909-05207} with regret minimization. It is projection-free and estimates a stochastic recursive estimator to alleviates the complexity and training instability. As shown in Figure \ref{fig:method}b, when learning distribution $D_{m}$, PM changes the current gradient from an obtuse angle to an acute angle with the gradient on previous distribution $D_{m-1}$. Because when the new gradient and the old gradients are at an acute angle, the model performance on the old distribution will improve, at least not decrease \cite{DBLP:conf/nips/Lopez-PazR17}. The promotion of learning old distributions has the potential for early classification. \begin{figure*}[!t] \centering \includegraphics[width=\linewidth]{figures/result1.png} \caption{Accuracy Results of Continuous Diagnosis and Prognosis} \label{fig:result1} \end{figure*} \subsubsection*{Finding 1: The continuous mode has more potential in medical diagnosis and prognosis than the single-shot mode.} As shown in Figure \ref{fig:result1}g-l, our method can classify more accurately at every time. It is significantly better than baselines. In Bonferroni-Dunn test, $k=9, n=3, m=5, q_{0.05}=2.724$ are the number of methods, datasets, cross-validation fold, critical value, then $N=n\times m=15, CD=q_{0.05}\sqrt{\frac{k(k+1)}{6N}}=2.724$, average rank of baselines $\overline{r}=5.5>CD$. Thus, the accuracy is significantly improved. The average accuracy is about 2\% higher, especially in the early time, being 5\% higher for 10\%-length data. \texttt{CCTS}\xspace is important for time-sensitive applications, especially for acute and critical illnesses. Take sepsis diagnosis as an example, compared with the best baseline, our method improves the accuracy by 1.4\% on average, 2.2\% in the early 50\% time stage when the key features are unobvious. Each hour of delayed treatment increases sepsis mortality by 4-8\% \cite{seymour2017time}. With the same accuracy, we can predict 0.972 hours in advance. \texttt{RU}\xspace can alleviate the catastrophic forgetting and overfitting. As shown in Figure \ref{fig:result1}a-c, it has the highest BWT and FWT (Section \ref{sec:methods}), meaning it has the lowest negative influence that learning the new tasks has on the old tasks and has the highest positive influence that learning the former data distributions has on the task. Both LM and PM strategies contribute to model performance. As shown in Figure \ref{fig:result1}d-f, if we remove two mechanisms respectively, the model performance will decline. \begin{figure*}[!t] \centering \includegraphics[width=\linewidth]{figures/result2.png} \caption{The Importance of Input Features and Network Parameters} \label{fig:result2} \end{figure*} \begin{figure*}[!t] \centering \includegraphics[width=\linewidth]{figures/result3.png} \caption{Disease Stages and Biomarkers of Sepsis and COVID-19} \label{fig:result3} \end{figure*} \subsubsection*{Finding 2: The change of importance coefficients interprets the learning process of deep learning models.} When the model learns time series in different stages, its parameters are updated constantly, and the importance coefficients also change: If the model encounters a new data distribution, the importance coefficient is likely to change significantly. Thus, we explain the learning process of the DL model from the perspective of the change of importance coefficient. We divided the model into three blocks as shown in Figure \ref{fig:result2}. Block 1 is the input block. We focus on the parameter update process related to input features. For an input feature $x_{i}$, we use the overall importance coefficient of its related parameters to measure its importance: $\alpha^{*}(x_{i})=\sum_{n} \alpha(\theta_{x_{i},l_{n}})$, $\theta_{x_{i},l_{n}}$ is the weight between input feature $x_{i}$ and $n$-th neuron $l_{n}$ in layer $l$; Block 2 is the T-LSTM block. We focus on the parameter update process related to different gates. For a gate $G_{i}$, we use the overall importance coefficient of its parameters to measure its importance: $\alpha^{*}(G_{i})=\sum_{n} \alpha(\theta_{n})$; Block 3 is the output block. We focus on the parameter update process related to network neurons. For $j$-th neuron $l_{i,j}$ in layer $l_{i}$, we use the overall importance coefficient of its output weights to measure its importance: $\alpha^{*}(l_{i,j})=\sum_{n} \alpha(\theta_{l_{i,j},l_{i+1,n}})$. The test on Block 1 aims to enhance the model interpretability from the perspective of data, Block 2 and 3 are about network structure. As shown in Figure \ref{fig:result2}a1 and b1, when the model learns time series of different lengths (in different time stages), its perceptual sensitivity to input features is different. For example, for sepsis diagnosis, the importance coefficient $\alpha^{*}$ of the blood pressure increases, which means that the model's perception of blood pressure improved in the later stage; for COVID-19 mortality prediction, the importance coefficient $\alpha^{*}$ of Lymphocytes is always lager, which means that the model pays great attention to this feature at different stages. $\alpha^{*}$ of input features shows their importance. It can be used to evaluate biomarkers. As shown in Figure \ref{fig:result2}a2 and b2, in the process of continuous learning, important model parameters are changing. This change process can be divided into several stages. For example, in the output block, the training process of the model can be roughly divided into 4 stages for sepsis diagnosis, and 3 stages for COVID-19 mortality prediction. In each stage, the important parameters are different. In T-LSTM block, this change is obvious for the output gate, but not obvious for the input gate and output gate. These observations reveal the intrinsic mechanism of model learning under our \texttt{RU}\xspace: For different stages of time series (different distributions), the deep learning model activates different neurons to perceive data. This also shows the potential of wide neural networks for \texttt{CCTS}\xspace. Networks with more neurons in one layer are more likely to learn multi-distributed data. \subsubsection*{Finding 3: Continuous prognosis reveals the disease biomarkers and stages.} Semantically, the important feature is the input that has a great impact on the classification results. To quantify them, we define that the important feature is the input with a large overall importance coefficient $\alpha^{*}$. Thus, for tasks of medical diagnosis and prognosis, we can find biomarkers of specific diseases through this method. As shown in Figure \ref{fig:result2}a1 and b1, for sepsis, biomarkers are heart rate (HR), respiration (Resp), mean arterial pressure (MAP), PaCO2, platelets count, total bilirubin and creatinine. For COVID-19, biomarkers are lymphocytes (lymph), lactic dehydrogenase (LDH), high-sensitivity C-reactive protein (hs-CRP), indirect bilirubin, creatinine, etc. The response change of the model when the learning disease data continuously can reflect the change of the disease. As shown in Figure \ref{fig:result2}a2 and b2, the training process of the model can be roughly divided into 4 stages for sepsis diagnosis and 3 stages for COVID-19 mortality prediction. Thus, we get the disease stage of these two diseases. By visualizing the hidden layer of block 3 at different stages, we get Figure \ref{fig:result3}. Sepsis has 4 disease stages. Each stage has different reference levels of biomarkers. In some cases, the closer to the onset time, the greater the difference in biomarker reference levels in different prognoses. For example, in stage 1 (the interval from early 48 hours to early 40 hours before the onset time), the respiration difference between sepsis class and non-sepsis is 1, while in stage 4 (the interval from early 6 hours to the onset time), the respiration difference is 7. In other cases, reference levels of biomarkers with different prognoses are different at all stages, such as creatinine. These two conditions may explain the two mechanisms of sepsis. The first is that acute sepsis onset will lead to changes in some vital signs, e.g., a drop in blood pressure, increased lactate, and tachycardia. The second is that patients with congenital characteristics are more likely to get sepsis, e.g., nephropathy with abnormal creatinine and hepatopathy with increased total bilirubin. COVID-19 has 3 disease stages. Compared with sepsis, its data with different classes are more different in the presentation space. This also explains the higher accuracy of continuous COVID-19 mortality prediction than that of continuous sepsis diagnosis. Besides, in the presentation space, the hidden features of the two classes in the later stage are further apart. This shows the difficulty in early classification: the conflict between earliness and accuracy. \begin{figure*}[!t] \begin{minipage}[c]{\textwidth} \centering \captionof{table}{COVID-19 Classification Accuracy (AUC-ROC$\uparrow$) with Non-uniform Training Sets and Validation Sets} \footnotesize \setlength{\tabcolsep}{0.9mm}{ \begin{tabular}{l|lllllll} \toprule &SR &ECEC &ORGFW &GEM &CLOPS &\texttt{RU}\xspace \\ \midrule Male &0.968±0.014 &0.969±0.016 &0.965±0.004 &0.978±0.009 &0.978±0.014 &0.971±0.010\\ Female &0.935±0.004 &0.947±0.015 &0.938±0.003 &0.919±0.008$\downarrow$ &0.921±0.009$\downarrow$ &0.947±0.002\\ \midrule Age 30- &0.965±0.014 &0.967±0.015 &0.964±0.009 &0.972±0.008 &0.979±0.012 &0.972±0.010\\ Age 30+ &0.911±0.007$\downarrow$ &0.913±0.018$\downarrow$ &0.923±0.040 &0.932±0.006 &0.914±0.007$\downarrow$ &0.945±0.006\\ \bottomrule \end{tabular}}\label{tb:result4_1}\vspace{+0.5cm} \end{minipage} \begin{minipage}[c]{\textwidth} \centering \captionof{table}{Classification Accuracy (AUC-ROC$\uparrow$) of \texttt{RU}\xspace with Different Orders of Training Sets} \footnotesize \setlength{\tabcolsep}{1.3mm}{ \begin{tabular}{l|lllllll} \toprule &Order &20\% &40\% &60\% &80\% &100\% \\ \midrule \multirow{2}*{SEPSIS} &Time &0.735±0.003 &0.826±0.003 &0.841±0.003 &0.860±0.005 &0.872±0.001\\ &Similarity &0.734±0.006 &0.824±0.004 &0.843±0.004 &0.863±0.007 &0.870±0.002\\ \midrule \multirow{2}*{COVID-19} &Time &0.789±0.002 &0.902±0.002 &0.926±0.000 &0.959±0.001 &0.968±0.000\\ &Similarity &0.790±0.001 &0.910±0.003 &0.924±0.001 &0.958±0.001 &0.967±0.000\\ \bottomrule \end{tabular}}\label{tb:result4_2}\vspace{+0.5cm} \end{minipage} \begin{minipage}[c]{\textwidth} \centering \captionof{table}{Performance (AUC-ROC$\uparrow$, BWT$\uparrow$) for Two Meteorological Datasets.\newline \footnotesize {UCR-EQ dataset \cite{UCRArchive} has 471 earthquake records from UCR time series database archive. It is the univariate time series of seismic feature value. Natural disaster early warning, like earthquake warning, helps to reduce casualties and property losses \cite{2021Earthquake}. USHCN dataset \cite{USHCN} has the daily meteorological data of 48 states in U.S. from 1887 to 2014. It is the multivariate time series of 5 weather features. Rainfall warning is not only the demand of daily life, but also can help prevent natural disasters \cite{2021The}. }} \footnotesize \setlength{\tabcolsep}{1mm}{ \begin{tabular}{l|lllllll} \toprule &SR &ECEC &ORGFW &GEM &CLOPS &\textbf{\texttt{RU}\xspace} \\ \midrule \multirow{2}*{UCR-EQ} &0.902±0.002 &0.909±0.010 &0.920±0.001 &0.921±0.001 &0.919±0.004 &\textbf{0.931±0.004}\\ &0.003 &0.033 &0.112 &0.123 &0.149 &\textbf{0.162}\\ \midrule \multirow{2}*{USHCN} &0.911±0.012 &0.902±0.012 &0.9160±0.004 &0.920±0.003 &0.921±0.005 &\textbf{0.930±0.005}\\ &0.034 &0.047 &0.072 &0.098 &0.082 &\textbf{0.124}\\ \bottomrule \end{tabular}} \label{tb:result4_3} \vspace{+0.5cm} \end{minipage} \begin{minipage}[c]{\textwidth} \centering \captionof{table}{Performance (AUC-ROC$\uparrow$/BWT$\uparrow$) of Different Neural Networks with \texttt{RU}\xspace} \tiny \setlength{\tabcolsep}{0.6mm}{ \begin{tabular}{l|lllllll} \toprule &Sepsis &COVID-19 &10-Diseases &UCR-EQ &USHCN \\ \midrule LSTM &0.867±0.008/0.002 &0.909±0.003/0.047 &0.786±0.002/0.054 &0.881±0.004/0.032 &0.891±0.003/0.054\\ +\texttt{RU}\xspace &0.907±0.008/0.065 &0.969±0.003/0.115 &0.856±0.002/0.102 &0.931±0.004/0.162 &0.930±0.005/0.124\\ \midrule CNN &0.858±0.002/0.004 &0.903±0.002/0.037 &0.774±0.004/0.032 &0.878±0.005/0.030 &0.881±0.004/0.057\\ +\texttt{RU}\xspace &0.904±0.003/0.067 &0.960±0.006/0.075 &0.849±0.002/0.099 &0.929±0.006/0.150 &0.922±0.005/0.118\\ \midrule Transformer &0.843±0.011/0.005 &0.906±0.005/0.040 &0.784±0.006/0.059 &0.889±0.010/0.029 &0.880±0.015/0.059\\ +\texttt{RU}\xspace &0.903±0.008/0.067 &0.960±0.007/0.109 &0.852±0.008/0.124 &0.920±0.008/0.132 &0.921±0.008/0.120\\ \bottomrule \end{tabular}}\label{tb:result4_4} \end{minipage} \end{figure*} \subsubsection*{Finding 4: Restricted update strategy enhances the ability of the model for atypical scenarios and sustainable use.} \texttt{RU}\xspace can avoid model overfitting and guarantee certain model generalization. In Table \ref{tb:result4_1}, we divided the dataset according to gender and age, for most baselines, the accuracy on the validation set is much lower than that on the training set. Mark $\downarrow$ means the accuracy is greatly reduced over 5\%. \texttt{RU}\xspace helps the model maintain robustness. Meanwhile, \texttt{RU}\xspace can prevent the result difference caused by the different orders of training sets. The method we have introduced is to use time series of different stages to train the model, and the order is based on time. Another order is the data similarity \cite{2021A} as many vital signs are periodic. For example, the cycle of blood pressure is one day. Therefore, after using vital signs within 24 hours, we will use the data within 25 hours according to the time order, but use the data within 48 hours according to the similarity order. No matter what order is adopted, \texttt{RU}\xspace has stable accuracy as shown in Table \ref{tb:result4_2}. It shows the potential of PM's global optimization and the potential of \texttt{RU}\xspace's sustainable use. Furthermore, \texttt{RU}\xspace is a data-agnostic, model-agnostic, and easy-to-use plug-in. It can not only improve the accuracy of continuous classification of medical time series but also play a role in other fields. As shown in Table \ref{tb:result4_3}, \texttt{RU}\xspace outperforms baselines on meteorological data for tasks of continuous earthquake early warning and rainfall prediction: It has the best accuracy of continuous classification and the best ability to resist forgetting. \texttt{RU}\xspace can also be used to train other DL models such as Convolutional Neural Network (CNN) \cite{DBLP:journals/nn/0058S21} and Transformer \cite{vaswani2017attention}. It is easy to use and does not need to change the network structure. As shown in Table \ref{tb:result4_4}, if we use \texttt{RU}\xspace to train base models, the accuracy can be improved by more than 5\%. And \texttt{RU}\xspace is not limited by hyper-parameters. The hyper-parameters are $\rho$ and $\lambda$. $\rho$ determines the correlation between current and previous gradients in Equation \ref{eq:d_m}. We find that PM performs well when $\rho$ is the same as the learning rate $\rho_{t}=\eta_{t}=\frac{1}{(t+1)^{a}}, a=1$. $\lambda$ decides the constraint degree on parameter update in Equation \ref{eq:LP}. We can optimize it using the search method supplied by mature tools. \section*{Discussion}\label{sec:discussion} \textbf{Deep learning model has the potential to explore disease mechanisms}. The importance coefficient not only explained the working mechanism of the DL model but also dug out the disease biomarkers and stages. Different from the statistics and case analysis of the medical gold standard, these biomarkers are based on the judgment basis of the DL model. It can provide a new horizon for medical research. For example, based on the learning process of the DL model, for sepsis, a drop in blood pressure, increased lactate, and tachycardia are important in the later stage, while abnormal creatinine and total bilirubin are always important. It can be explained that sepsis is an acute disease and is related to some congenital diseases like nephropathy and hepatopathy. Such behavior is in exact accordance with the sepsis literature \cite{2022renal,2017Liver}; For COVID-19, only lymph, LDH, and hs-CRP are most important throughout the stages. This shows that COVID-19 has a clear reference to measure the disease severity \cite{2022redifine}. Meanwhile, we match the disease stage with the changes in model parameters during the learning process. In this way, the disease stage is no longer defined only by the level of biomarkers or by clustering and patient subtyping, but by the characteristic changes in the high-dimensional space created by the model. \textbf{\texttt{RU}\xspace strategy helps to indefinably disease staging.} At present, except for cancer, it is difficult to define clear stages for most diseases. For sepsis, disease stratification is implemented by recommended clinical criteria (e.g. SIRS \cite{Roger1992Definitions}, SOFA \cite{1996The}, qSOFA \cite{singer2016third}, and etc.). But they focus on severity, not the progression. We emphasize that disease staging is the disease change over time. \texttt{RU}\xspace can achieve this according to the model change when learning the medical time series from different time stages. As shown in Figure \ref{fig:result3}a, \texttt{RU}\xspace can identify stages directly according to the importance coefficient change of model parameters, instead of using unsupervised clustering methods. Without \texttt{RU}\xspace, the clustering method is difficult to find stages: The number of clusters with the best silhouette coefficient is 2, and the number of stages is 1. For COVID-19, most work categorizes it roughly into early stage and late stage \cite{2021Metabolomic}. Some existing DL-based methods can perform disease staging by using representation learning. For example, our previous work \cite{DBLP:journals/BMC/sun} clustered features in hidden layers of T-LSTM and got 4 COVID-19 stages. As shown in Figure \ref{fig:result3}b, this clustering-based method can get a good silhouette coefficient, but can not guarantee the time constraint: When identifying 4 stages, only about 40\% of the samples will be divided into stages corresponding to chronological order. For example, a death sample (green dot) was initially judged to be stage 2, then stage 1, and finally stage 4. But stages 1-4 are in time order. Using \texttt{RU}\xspace, this inconsistency is largely alleviated: In the case of 1-10 clusters, the percentage of samples with a time-increasing stage is raised. The death sample (green dot) was judged as stage 1, then stage 2, and finally stage 3 over time. \textbf{Learning multi-distributed data is the general trend.} Currently, many sophisticated DL models (e.g., RNN \cite{DBLP:journals/tai/GuptaGBD20}, CNN \cite{DBLP:journals/nn/0058S21}, and Transformer \cite{vaswani2017attention}) have shown outstanding achievements in time series modeling in many fields. For offline learning, after the model has learned the dataset, the model is only sensitive to the learned distribution. For example, when the model has learned the full-length vital signs of sepsis, it usually classifies accurately at the onset time. But it's too late for critical illness. To gain treatment time, the model needs to learn early data. However, there are also problems in learning early data at only one stage. For example, a time series may have missed the learned stage at the beginning, the characteristics of early data are not obvious, requiring late data assistance, etc. Thus, it is necessary for the model to learn time series from different stages, i.e. multi-distributed data. In this way, the model can realize continuous classification of time series. \textbf{Reasonable model training strategy is the icing on the cake.} Many studies have shown that a meaningful learning strategy can improve the model performance and generalization power \cite{DBLP:conf/naacl/DevlinCLT19}. Therefore, we realize the ability of model learning multi-distributed data from the perspective of model updating strategy. The experimental results show that a reasonable model training strategy plays a key role in improving the model performance. Different from the design of the model structure, the design and application of strategy will be more extensive. It pays more attention to the overall goal and has few requirements for specific data and used models. That is, our method is data-agnostic, model-agnostic, and easy-to-use. \textbf{Quantifying the updating process makes it possible to interpret the deep learning model}. Interpretability remains one of the key issues to be solved to achieve the trust of clinicians and insert the deep learning algorithm into clinical workflow. DL models are often considered to be black-box because they typically have high-dimensional nonlinear operations, many model parameters and complex model architectures, which makes them difficult for a human to understand. Therefore, showing the parameter changes during training has the potential to explain the DL model. In this work, our method \texttt{RU}\xspace implements \texttt{CCTS}\xspace by updating model parameters with constraints. The constraint is achieved by quantifying the importance of the parameters. Surprisingly, the importance of parameters can be used to explain the deep learning model. As shown in experimental results, it can identify both the input features and the structure part that is important for classification. \textbf{Opportunities of \texttt{CCTS}\xspace.} Currently, some sub-disciplines (e.g. online learning, continual learning anomaly detection) also study the mode of continuous classification. But their setting methods can’t satisfy Requirements 1, 2, 3, 4 simultaneously (Appendix \ref{sec:related work}). \texttt{CCTS}\xspace is a new potential field facing practical problems. Meanwhile, we found that the neural network structure with reasonable width is more conducive to continuous classification and continual learning. Because with the learning of new data distribution, the change of important parameters on the scale of network width is more obvious and regular, but that on the scale of depth is confused. Therefore, future work can study the impact of model structure on \texttt{CCTS}\xspace from the perspective of network depth and network width. Further, we found that different learning orders have little effect on our method \texttt{RU}\xspace. This demonstrates the potential of our approach for off-line continual learning: We use the existing data to train the model and put it into use. After a period of time, new data may be generated. We can continue to train the current model with new data instead of designing a new model. In addition, the method for \texttt{CCTS}\xspace can be context-independent in the future. The model can perform not only different medical tasks, but also tasks in other fields like meteorology at the same time (Appendix \ref{sec:experiments}). \section*{Methods}\label{sec:methods} \subsection*{Problem Formulation} \label{sec:problem formulation} \begin{definition} [Continuous Classification, CC] \label{def:CC} A time series $X=\{x_{1},...x_{M}\}$ is labeled with a class $C\in \mathcal{C}$ at the final time $T$. CC classifies $X$ at every $t$ with loss $\sum_{t=1}^{M}\mathcal{L}(f(X_{1:m}),C)$. \end{definition} Without the loss of generality, we use the univariate time series to present the problem. Multivariate time series can be described by changing $x_{m}$ to $x_{m,i}$. $i$ is the i-th dimension. Note that single-shot classification optimizes the objective with a single loss $\mathcal{L}(f(x),c)$. \texttt{RU}\xspace should consider the multi-distribution and classify more times. \begin{definition} [Continuous Classification of Time Series ]\label{def:CCTS} A dataset $\mathcal{T}=\{X^{n}\}_{n=1}^{N}$ contains $N$ time series. Each time series $X^{n}=\{x^{n}_{m}\}_{m=1}^{M}$ has $M$ observations with value $x^{n}_{m}$ at time $t^{n}_{m}$. At the final time $t^{n}_{M}$, $X^{n}$ is labeled with a class $C\in \mathcal{C}$. As time series varies among time, it has a subsequence series with $M$ different distributions $\mathcal{D}=\{\mathcal{D}_{m}\}_{m=1}^{M}$. \texttt{RU}\xspace learns every $\mathcal{D}_{m}$ and introduces a task sequence $\mathcal{M}=\{\mathcal{M}^{m}\}_{m=1}^{M}$ to minimize the additive risk $\sum_{m=1}^{M}\mathbb{E}_{\mathcal{M}^{m}}[\mathcal{L} (f^{m}(\mathcal{D}_{m};\theta),C)]$ with model $f$ and parameter $\theta$. $f^{m}$ is the model $f$ after being trained for $\mathcal{M}^{m}$. When the model is trained for $\mathcal{M}^{m}$, its performance on all observed data cannot degrade: $\frac{1}{m}\sum_{i=1}^{m}\mathcal{L}(f^{i},\mathcal{M}^{i}) \leq \frac{1}{m-1}\sum_{i=1}^{m-1} \mathcal{L}(f^{i},\mathcal{M}^{i})$. \end{definition} \subsection*{Time-aware Long Short-Term Memory}\label{sec:t-lstm} Recurrent neural networks (RNNs) take sequence data as input, recursion occurs in the direction of sequence evolution, and all units are chained together. In classical RNN, the current state $h_{t}$ is affected by the previous state $h_{t-1}$ and the current input $x_{t}$ and is described as $h_t=\sigma(Wx_{t}+Uh_{t-1}+b)$, where $\sigma$ is an activation function, and $W$, $U$ and $b$ are learnable parameters. However, the real-world time series, especially vital signs, have long sequences and are irregularly sampled. The classical RNN only process uniformly distributed longitudinal data by assuming that the sequences have an equal distribution of time differences. Thus, we implement Time-aware Long Short-Term Memory (T-LSTM) \cite{Baytas:2017:PSV:3097983.3097997} to solve the long-term dependency problem and capture the irregular temporal dynamics. Based on the classical LSTM, T-LSTM possesses some new designs. $C_{m-1}^{S}$ component learns the short-term memory of sequence by learnable network parameters. $C_{m-1}^{T}$ is the long-term memory calculated from the former memory cell $C_{m-1}$ with getting rid of $C_{m-1}^{S}$. $C_{m-1}^{S}$ is adjusted to the discounted short-term memory $\hat{C}_{m-1}^{S}$ by the elapsed time function $g(\Delta_{t})$. The previous memory $C_{m-1}^{*}$ is changed to the complement subspace of $C_{m-1}^T$ combined with $\hat{C}_{m-1}^S$. \begin{equation} \begin{aligned} C_{m-1}^{S}=\tanh(W_{d}C_{m-1}+b_{d})\ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Short-term memory}&\\ \hat{C}_{m-1}^S=C_{m-1}^S\cdot g(\Delta_{t}) \ \ \ \ \ \ \ \ \text{Discounted short-term memory}&\\ C_{m-1}^{T}=C_{m-1}-C_{m-1}^{S} \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Long-term memory}&\\ C_{m-1}^{*}=C_{m-1}^{T}-\hat{C}_{m-1}^{S} \ \ \ \ \ \ \ \ \ \ \ \ \text{Adjusted previous memory}&\\ f_{m}=\sigma(W_{f} x_{m}+U_{f} h_{m-1}+b_{f}) \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Forget gate}&\\ i_{m}=\sigma(W_{i} x_{m}+U_{i} h_{m-1}+b_{i}) \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Input gate}&\\ \tilde{C}_{m}=\tanh(W_{c} x_{m}+U_{c} h_{m-1}+b_{o})\ \ \ \ \quad\text{Candidate memory}&\\ C_{m}=f_{m}\cdot C_{m-1}^{*}+i_{m}\cdot \tilde{C}_{m} \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Current memory}&\\ o_{m}=\sigma(W_{o} x_{m}+U_{o} h_{m-1}+b_{o}) \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Output gate}&\\ h_{m}=o_{m} \cdot \tanh(C_{m}) \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{Current hidden state}& \end{aligned} \end{equation} We use a log calculation for the elapsed time function. $\Delta_{t}$ describes the time gap between two records at two sequential time steps $t_{m}$ and $t_{m-1}$. \begin{equation} \begin{aligned} g(\Delta_{t})&=\frac{1}{\log (e+\Delta_t)} \\ \Delta_{t}&=t_{m}-t_{m-1} \end{aligned} \end{equation} \subsection*{Restricted Update Strategy for Neural Network Parameters}\label{sec:ru} \subsubsection*{Limitation Mechanism} \label{sec:LM} When the model meets a distribution, it will change from $f_{m-1}$ to $f_{m}$. In order to let the model performance on all tasks not degrade, the loss $\mathcal{L}$ of the current $f^{m}$ on tasks $\{\mathcal{M}^{k}\}_{k=1}^{m}$ should be not bigger than that of the previous $f^{m-1}$ on tasks $\{\mathcal{M}^{k}\}_{k=1}^{m-1}$: \begin{equation} \label{eq:CLgoal} \begin{aligned} &\underset{\theta^{m}}{\min}\ \mathcal{L}(f^{m}(X_{1:m},\theta^{m}),C)\\ \text{subject to }\frac{1}{m}\sum_{k=1}^{m}&\mathcal{L}(f^{m},\mathcal{M}^{k}) \leq \frac{1}{m-1}\sum_{k=1}^{m-1} \mathcal{L}(f^{m-1},\mathcal{M}^{k}) \end{aligned} \end{equation} The fundamental cause of catastrophic forgetting is that the arbitrary change of neural network parameters leads to calculation errors on old tasks. Based on the observation of many parameter configurations resulting in the same performance \cite{DBLP:journals/nn/ParisiKPKW19}, we could add a regular term to the loss to restrict the updating of model parameters. Thus, in LM, we constrain important parameters to stay close to their old values, but change unimportant parameters more. We give a new loss in Equation \ref{eq:CLloss}. A regularization term is added to the original loss $\mathcal{L}$, where $\alpha$ is the importance coefficient of parameter $\theta$. With the minimum $\mathcal{O}$, $\theta^{m}$ will be changed less from $\theta^{m-1}$ with a large $\alpha$. As shown in Figure \ref{fig:method}, $\theta_{\text{important}}$ is limited in a region. \begin{equation} \label{eq:CLloss} \mathcal{O}(\theta^{m})=\mathcal{L}(f^{m}(\theta^{m}),\mathcal{M}^{m})+\lambda\sum_{i}\alpha_{i}(\theta^{m}_{i}-\theta^{m-1}_{i})^{2} \end{equation} The second derivative of probability can evaluate the importance coefficient $\alpha=(\log\mathrm{p}(D_{m}\vert\theta^{m}))''$. Elastic weight consolidation \cite{DBLP:journals/corr/KirkpatrickPRVD16} defines $\alpha$ from a probabilistic perspective $\log \mathrm{p}(\theta\vert\mathcal{D})=\log \mathrm{p}(D_{m}\vert\theta)+\log \mathrm{p}(\theta\vert D_{m-1})-\log \mathrm{p}(D_{m})$: Optimizing the parameters is tantamount to finding their most probable values under $\mathcal{D}$. The posterior probability is indicated by Laplace approximation. Taking this inspiration, we use the diagonal of Fisher information matrix \cite{DBLP:journals/corr/abs-1301-3584} to represent the first-order derivatives. \begin{equation} \label{eq:F_} \rm{F}=\frac{1}{N}\sum_{k=1}^{N}\nabla \log p(D_{k}\vert\theta)\nabla \log p(D_{k}\vert\theta)^{\top} \end{equation} Thus, we represent the importance coefficient $\alpha$ by $F$ and re-arrange Equation \ref{eq:CLloss} to: \begin{equation} \label{eq:LP} \mathcal{O}(\theta^{m})=\mathcal{L}(f^{m}(\theta^{m}),\mathcal{M}^{m})+\lambda\sum_{i}\rm{F_{i}}(\theta^{m}_{i}-\theta^{m-1}_{i})^{2} \end{equation} \begin{equation} \label{eq:F} \rm{F_{i}}=\frac{1}{m}\sum_{k=1}^{m}(\frac{\partial\log p(D^{k}\vert \theta^{m}_{i})}{\partial\theta^{m}_{i}})^{2} \end{equation} \subsubsection*{Promotion Mechanism} \label{sec:PM} When we focus on the final task, if the model meets a new distribution, the learned knowledge will be part of the final solution. We regard this as a continuous optimization problem. In this way, different data distributions are treated equally. The new data helps the model learn the old data, which can reduce the unstable solution caused by the different learning orders. Continuous optimization problem \cite{DBLP:journals/corr/abs-1909-05207} is defined as regret minimization. For task $\mathcal{M}$, the regret $\mathcal{R}$ is the difference between the total loss and that of the best parameter $\theta^{*}$ of the fixed decision in hindsight. \begin{equation} \label{eq:regret} \small \mathcal{R}_{M}:=\sum_{m=1}^{M}(\mathcal{L}(f^{m}(\theta^{m}),\mathcal{M})-\mathcal{L}(f^{m}(\theta^{m*}),\mathcal{M})) \end{equation} For regret minimization, we design a Promotion Mechanism (PM) with mechanisms of projection-free and stochastic recursive gradient. It focuses the quality of the final performance instead of iterates produced from the course of optimization. For continuous optimization, the main bottleneck is the computation of projections onto the underlying decision set $\underset{\mathcal{K}}{\prod}(\theta)=\underset{\hat{\theta}\in\mathcal{K}}{\arg \min}\vert\vert\hat{\theta}-\theta\vert\vert$ \cite{DBLP:conf/aaai/WangLH020}. The projection operation is defined as the closest point inside the convex set $\mathcal{K}$ of Euclidean space to a given point. Projection-free methods, like Frank-Wolfe \cite{DBLP:conf/icml/ChenHHK18}, can replace the projection with a linear optimization at each iteration. It alleviates the complexity but remains problems of training non-converging and instability \cite{DBLP:journals/corr/abs-2010-12493}. Thus, we estimate a stochastic recursive estimator based on stochastic gradient technology \cite{DBLP:conf/nips/CutkoskyO19,DBLP:conf/aaai/XieSZWQ20}. Assuming for task $\mathcal{M}^{m}$, the model receives new time series data $X_{1:m}$ with distribution $D_{m}$ and gets the loss $\mathcal{L}$. We first give a random variable $\xi_{m}$ satisfying: \begin{equation} \mathbb{E}_{\xi_{t}\sim D_{m}}[\nabla L(\theta^{m},\xi_{m})]=\nabla \sum_{m=1}^{M} \mathcal{L}(f^{m}(X_{1:m},\theta^{m}),C) \end{equation} Then the stochastic recursive estimator is: \begin{equation} \label{eq:stochastic recursive estimator} \rm{d_{m}}=\nabla \mathcal{L}(\theta^{m},\xi_{m})+(1-\rho_{t})(\rm{d_{m-1}}-\nabla \mathcal{L}(\theta^{m-1},\xi_{m})) \end{equation} It finds a solution $\rm{v_{m}}$ of the linear optimization problem \begin{equation} \label{eq:PP1} \rm{v_{m}}=\arg\min_{\rm{v}\in\mathcal{K}}\vert\vert\rm{d_{m}},\rm{v_{m}}\vert\vert_{2} \end{equation} to update $\theta^{m+1}$ in the direction of gradient $\rm{g_{m+1}}$: \begin{equation} \label{eq:PP2} \rm{g_{m+1}}=\rm{v_{m}}-\theta^{m}, \quad \theta^{m+1}=\theta^{m}+\eta_{m}\cdot \rm{g_{m+1}} \end{equation} Such method randomly selects samples to guide the change of gradient and leads to faster converges. It could achieve a nearly optimal ${O}(\sqrt{M})$ regret bound with high probability. \subsubsection*{Overall Training Process} Gradient Episodic Memory (GEM) \cite{DBLP:conf/nips/Lopez-PazR17} shows that when the new gradient $\rm{g}_{m}$ and the old gradients $\rm{g}_{k}$ are at an acute angle, the model performance on the old task will improve, at least not decrease: \begin{equation} \label{eq:GEM} \left <\rm{g}_{m},\rm{g}_{k}\right>=\left<\frac{\partial \mathcal{L}(f^{m},\mathcal{M}^{m})}{\partial \theta^{m}},\frac{\partial \mathcal{L}(f^{k},\mathcal{M}^{k})}{\partial \theta^{k}}\right>\geq 0,k=1,...,m-1 \end{equation} Thus, the regularization is projecting the current gradient $\rm{g}_{m}$ to the closest gradient $\rm{g}_{m}'$ by satisfying all the constraint of acute angle: \begin{equation} \label{eq:GEM2} \min\vert\vert\rm{g_{m}}-\rm{g_{m}'}\vert\vert_{2},\textit{ }\text{subject to }\left <\rm{g_{k}},\rm{g_{m}'}\right>\geq 0 \textit{, } k=1,...,m-1 \end{equation} In LM, $\rm{F}$ is positive semi-definite \cite{DBLP:conf/nips/SmolaVE03}. This property not only guarantees that seeing each task as a factor of the posterior (LM) but also guarantees the acute angle change of a vector after the product (PM). Thus, \texttt{RU}\xspace updates network parameters by using the regularized loss $\mathcal{O}$ in Equation \ref{eq:LP} instead of the basic loss $\mathcal{L}$. And we re-arrange Equation \ref{eq:stochastic recursive estimator} to \begin{equation} \label{eq:d_m} \rm{d_{m}}\leftarrow\nabla_{\theta^{m}}\mathcal{O}^{m}+(1-\rho_{m})(\rm{d_{m-1}}-\rm{g^{m-1}}) \end{equation} \subsubsection*{Regret and Complexity} PM holds a nearly optimal regret bound $\tilde{O}(\sqrt{M})$. W.p. at least $1-\delta$ for any $\delta \in(0,1)$, $\mathcal{R}_{M}\leq (logT+1)(f(\theta^1)-f(\theta^{*}))+(16LD^2+16\sigma+4B)\sqrt{2Mlog\frac{8M}{\delta}}+\frac{1}{2}LD^2(logM+1)^2$. Where $\eta_{m},\rho_{m}=\frac{1}{m+1}$, $D$ is diameter of convex set, $L$ is $L$-Lipschitz-continuous. PM and LM achieve $O(1)$ per-round computational cost. If the complexity of training a base model to convergence is $O$ and data length is $M$, the overall complexity will be $MO$. More details of mathematical derivation are in Appendix \ref{sec:mathematics}. \subsubsection*{Evaluation Metrics} The classification results are evaluated by assessing the area under the curve of the Receiver Operating Characteristic (AUC-ROC). The ROC is a curve of the True Positive Rate (TPR) and the False Positive Rate (FPR). TN, TP, FP and FN represent true positives, true negatives, false positives and false negatives, respectively. \begin{equation} \label{eq:AUC-ROC} TPR=\frac{TP}{TP+FN}, FPR=\frac{FP}{TN+FP} \end{equation} The continuous classification performance are evaluated by Backward Transfer (BWT) and Forward Transfer (FWT). They are the influence that learning a task has on old and future tasks. $R_{i,j}$ is the accuracy of task $\mathcal{M}^{j}$ after completing task $\mathcal{M}^{i}$. $\overline{b}$ is the accuracy with random initialization. \begin{equation} \label{eq:BWT} \text{BWT}=\frac{1}{\vert\mathcal{M}\vert-1}\sum_{i=1}^{\vert\mathcal{M}\vert-1}R_{\vert\mathcal{M}\vert,i}-R_{i,i} \end{equation} \begin{equation} \label{eq:FWT} \text{FWT}=\frac{1}{\vert\mathcal{M}\vert-1}\sum_{i=2}^{\vert\mathcal{M}\vert}R_{i-1,i}-\overline{b}_{i,i} \end{equation} \subsection*{Data availability} All data used in this paper are publicly available and can be accessed as follows: SEPSIS \cite{DBLP:conf/cinc/ReynaJSJSWSNC19}, COVID-19 \cite{COVID-19}, MIMIC-III \cite{johnson2016mimic}, USHCN \cite{USHCN}, UCR \cite{UCRArchive}. \subsection*{Code availability} The code is available at \url{https://github.com/SCXsunchenxi/CCTS}.
\section{Introduction} \label{sec:intro} Galaxy-galaxy interactions and merging play an important role in the formation and evolution of galaxies, and can trigger intense starburst activity and/or supply the fuel for AGN \citep{1972ApJ...178..623T,2005MNRAS.361..776S}. Studying molecular gas in merging galaxies is important for understanding merging process, triggering of nuclear and off-nuclear starbursts, and the process of star formation in extreme environments. Imaged with good spatial resolution, nearby major mergers allow detailed investigation of the exact location of molecular gas that directly fuels the star formation and/or nuclear activity. Because of low upper-level energy and low critical density ($\sim5\times10^2$cm$^{-3}$), low-$J$ (2-1, 1-0) transitions of CO lines are not necessarily good tracer of star-forming gas \citep{2004ApJ...606..271G,2012ApJ...745..190L}, which is better traced by lines of high-dipole moment molecules, such as HCN, HNC, HCO$^+$ and CS \citep{2004ApJ...606..271G,2015ApJ...800...70S,2019ApJS..241...19I,2021MNRAS.503.4508L}, or high $J$ CO \citep{2003ApJ...588..771Y,2008ApJ...684..957S,2010ApJ...724.1336M}. HCN 1-0 had been used to measure dense gas in a sample of galaxies to study the relation between star formation rate and dense gas mass \citep{2004ApJ...606..271G}. High resolution observations of HCN lines had been done toward several local major mergers, including Arp 299 (IC694+NGC3690) \citep{1997ApJ...475L.107A,1999A&A...346..663C, 2006PASJ...58..813I}, Arp 220 \citep{2015ApJ...800...70S}, NGC 6240 \citep{2015ApJ...800...70S}, VV 114 \citep{2018ApJ...863..129S}, NGC 3256 \citep{2018ApJ...855...49H}, and NGC 4038 \& NGC 4039 (the Antennae galaxy) \citep{2019AJ....157..131B}. However, it was questioned whether HCN was an ideal tracer of dense gas in star forming regions of LIRGs/ULIRGs as HCN can be excited by the mid-IR pumping or shocks \citep{2007ApJ...656..792P}, which can enhance HCN emission. On the other hand, HCN can be transferred to HNC and CN in molecular clouds under certain conditions. For example, it can be transferred to CN with the UV photons in PDRs, which can reduce the HCN flux despite the presence of dense molecular gas. Since multiple line observations of HCN 1-0, HCO$^+$ 1-0, HNC 1-0, and CS 3-2 toward a sample of more than 100 galaxies showed similar linear relationships between their luminosities and infrared luminosities, with a factor of several in variation of line ratios in different galaxies \citep{2021MNRAS.503.4508L}, it is hard and not that important to do correction of conversion factor from HCN line luminosity to dense gas mass in individual galaxy. However, if we would like to probe the detailed dense gas distribution in galaxies, it is essential to observe other dense gas tracers, such as lines of CS, CN, HCO$^+$ and HNC, to obtain a better and unbiased view of the dense gas. High resolution observations of dense gas tracers other than HCN lines had been done toward several nearby major mergers, including CS 7-6 in Arp 220 and NGC 6240 \citep{2015ApJ...800...70S}, HCO$^+$ 1-0, 3-2, and 4-3, HNC 1-0, and CS 7-6 in VV 114 \citep{2018ApJ...863..129S}, HNC, HCO$^+$ and CS lines in NGC 3256 \citep{2018ApJ...855...49H}, and HCO$^+$ 1-0 and HNC 1-0 in the Antennae galaxy \citep{2019AJ....157..131B}. Due to different critical densities and possible different chemical abundances to that of HCN, the lines of other high dipole moment molecules showed different spatial distribution to that of HCN lines \citep{2015ApJ...800...70S,2018ApJ...863..129S,2018ApJ...855...49H,2019AJ....157..131B}. Among those observed sources, Arp 220, NGC 6240 and NGC 3256 are late-stage mergers, while VV 114 is a mid-stage merger and the Antennae galaxy is at early-stage. Overlap starburst is found in the Antennae \citep{2004ApJS..154..193W,2019AJ....157..131B}, while nuclear starburst activities dominate star formation in these mid and late-stage mergers in VV 114, Arp 220, NGC 6240 and NGC 3256. Thus, Arp 299, as a mid-stage merger with both nuclear starburst and overlap region starburst \citep{2009ApJ...697..660A}, is an ideal source to study overlap starburst during merging process. Arp299, at a distance of $\sim$42Mpc \citep{1999A&A...346..663C}, had been observed at high resolution with $^{12}$CO 1-0, $^{13}$CO 1-0 and HCN 1-0 \citep{1997ApJ...475L.107A,1999A&A...346..663C,2006PASJ...58..813I}, HCO$^+$ 1-0 \citep{2006PASJ...58..813I}, $^{12}$CO 3-2 and 2-1 \citep{2012ApJ...753...46S}, and CN 1-0 \citep{2004ASPC..320....3A}. HCN 1-0 showed not only different properties to that of CO 1-0 and 2-1, but also different to that of CN 1-0 \citep{2004ASPC..320....3A} and HCO$^+$ 1-0 \citep{2006PASJ...58..813I}. Based on the high resolution data, most of HCN 1-0 emission comes from the left galaxy IC694 \citep{1997ApJ...475L.107A,1999A&A...346..663C}, while the strongest CN 1-0 emission, with similar critical density to that of HCN 1-0 \citep{ 2015PASP..127..299S}, is at the overlap starburst region \citep{2004ASPC..320....3A}. It is necessary to use other dense gas tracers, such as CS lines, to better probe the dense molecular gas and determine the dense gas properties, including volume density, temperature, and chemistry in Arp 299. In this paper, we will present high resolution observational results of CN 2-1 and CS 5-4 toward Arp 299 with the Submillimeter Array (SMA) \citep{2004ApJ...616L...1H}. Observations and Data reduction will be described in \S2, results and discussion will be present in \S3, and a brief summary will be made in \S4. \section{Observations and Data reduction} \label{sec:obs} The observations of CN 2-1 and CS 5-4 toward Arp 299 were taken with the SMA at compact configuration (Project ID: 2007B-S015, PI: Junzhi Wang) on March 19 th and 20 th, 2008, respectively. CN 2-1 line was set in the lower side band with the local oscillator (LO) frequency of 229.304 GHz, while CS 5-4 was in upper side band with LO frequency of 237.475 GHz. Callisto was used as flux calibrator, while the quasar J1924-292 was used as bandpass calibrator. Two quasars, J1153+495 and J0958+655, were used as gain calibrators to correct time dependent variations of both phase and amplitude. Standard calibrations for the uvdata were made with the IDL MIR package\footnote{https://github.com/qi-molecules/sma-mir}, while imaging and deconvolution with nature weighting were made with CASA to obtain the final data cubes, after smoothing to the velocity resolution of 20 km s$^{-1}$ for both CN 2-1 and CS 5-4. The reference frequency used for data cube of CN 2-1 is 224.415 GHz, which is calculated from CN 2-1 ($J$=$\frac{3}{2}-\frac{1}{2}$ $F$=$\frac{5}{2}-\frac{3}{2}$) at rest frequency of 226.659543 GHz with $z$=0.01, and 242.510 GHz for CS 5-4 calculated from rest frequency of 244935.556 GHz with $z$=0.01. The beam sizes are $3.12''\times2.98''$ with $PA=-12.25^\circ$ for CN 2-1, and $2.93''\times2.67''$ with $PA=-36.95^\circ$ for CS 5-4, while the typical rms noise levels are about 10 mJy beam$^{-1}$ for both CN 2-1 and CS 5-4 at the velocity resolution of 20 km s$^{-1}$. 1.3 mm continuum distribution is also obtained with line free channels of both CN 2-1 and CS 5-4 data, which provide a map with beam size of $3.14''\times2.79''$, $PA=-33.37^\circ$ and rms level of 0.65 mJy beam$^{-1}$. \section{Results and discussion} \label{sec:results} As shown in Figure 1(a) and (b), 1.3 mm continuum emission in Arp 299 can be found in IC 694 (A), NGC 3690 (B) and overlap starburst region (C and C$'$). The coordinates of symbols `+', which indicate the locations of A, B, C and C$'$, in Figure 1 and 2, are from 8.4 GHz continuum \citep{2022A&A...658A...4R}. The velocity integrated CN 2-1 emission is mainly from IC 694 (A) with peak emission at about 20$\sigma$ level, while weak emission can also be seen near NGC 3690 (B) and the overlap starburst region (C and C$'$) at 3 to 4$\sigma$ level. CS 5-4 emission is also mainly from IC 694 (A) with peak emission at about 8$\sigma$ level, while about 3$\sigma$ signal is also detected near B region. The velocity integrated CN 2-1 and CS 5-4 overlaid on 1.3 mm continuum are presented in Figure 1(a) and (b), while spectra of CN 2-1 and CS 5-4 in A, B, and C regions are presented in Figure 1(c-e). A narrow CN 2-1 emission feature around C$'$ region is found at the velocity around -100 km s$^{-1}$. The velocity integrated map of this velocity component and the spectra of CN 2-1 and CS 5-4, are presented in Figure 2(a) and (b), respectively. The spatial distributions of both CN 2-1 and CS 5-4 are generally consistent with that of HCN 1-0 \citep{1997ApJ...475L.107A,1999A&A...346..663C,2006PASJ...58..813I} with strong emission in A and weak emissions in B and C(C$'$) regions, while the strong CN 1-0 emission in the overlap starburst regions of Arp 299 presented in \cite{2004ASPC..320....3A} seems not to be real signal. On the other hand, A and B+C regions had similar total CO 1-0 flux \citep{1992ApJ...387L..55S}, which were confirmed with high resolution observations \citep{1997ApJ...475L.107A,1999A&A...346..663C}. CO 2-1 showed similar spatial distribution to that of CO 1-0 \citep{2012ApJ...753...46S}. Single dish observations of HCO$^+$ and HCN 1-0 lines with IRAM 30meter telescope toward A and B+C regions also showed stronger emission in A than that of B+C regions with flux ratios between A and B+C regions of about 1.55 for HCO$^+$ 1-0 and 1.76 for HCN 1-0 \citep{2011MNRAS.418.1753J}. Amount of molecular gas in the overlap starburst regions (C and C$'$) was further supported by high resolution observations of optically thin $^{13}$CO 1-0 \citep{1997ApJ...475L.107A,1999A&A...346..663C} and $^{13}$CO 2-1 \citep{2012ApJ...753...46S}. The three main components (A, B, C+C$'$) in Arp 299 have different gas properties. There are strong $^{12}$CO emissions and amount of molecular gas traced by $^{13}$CO 1-0 and 2-1, most of which are with high volume density traced by dense gas tracers in IC 694 (A), while only strong $^{12}$CO, $^{13}$CO and HCO$^+$ 1-0 emission without strong emission of tracers with critical density higher than that of HCN 1-0 were detected in the overlap starburst regions (C and C$'$), which means that dense gas fraction is much less in C and C$'$ than A. On the other hand, even though strong $^{12}$CO 1-0 \citep{1997ApJ...475L.107A,1999A&A...346..663C} and 2-1 \citep{1999A&A...346..663C, 2012ApJ...753...46S} were detected in NGC 3690 (B), the molecular gas is much less than that of IC 694 and the overlap starburst regions, based on $^{13}$CO 1-0 \citep{1997ApJ...475L.107A,1999A&A...346..663C} and $^{13}$CO 2-1 \citep{2012ApJ...753...46S} observations. There are several hyperfine lines of CN 2-1 mainly in two groups, near 226.659543 GHz and 226.874764 GHz \citep{1985ApJS...58..341S}. Thus, the line widths of CN 2-1 are broader than that of CS 5-4 in Arp 299 (see Figure 1), because of the confusion of CN 2-1 hyperfine lines. CN 2-1 is stronger than CS 5-4 in A and C regions (see Figure 1), while they are comparable in B region, with low signal to noise ratio (see Figure 1 and Table 1). A narrow CN 2-1 emission feature above 5 $\sigma$ with line width (FWHM) of less than 100 km s$^{-1}$ was found in C$'$ region, while no CS 5-4 emission was detected there (see Figure 2). With comparable CO emission in C and C$'$ regions \citep{1997ApJ...475L.107A,1999A&A...346..663C}, the less CS 5-4 and CN 2-1 in C$'$ than C region indicates that the dense gas fraction in C$'$ is the lowest among the main gas components of A, B, C, and C$'$ regions, in Arp 299. The lack of HCN 1-0 \citep{1997ApJ...475L.107A, 2006PASJ...58..813I}, CN 2-1 and CS 5-4 emission at B, C and C$'$ regions with interferometer observations, indicates that there are weak extended emission of these dense gas tracers, because comparable emissions of dense gas tracers exist in B and C regions to that of region A based on the observational results with single dish telescope \citep{2011MNRAS.418.1753J}. The HCN 1-0 flux in B, C and C$'$ regions picked up by interferometer observation \citep{2006PASJ...58..813I} was only about 4 Jy km s$^{-1}$, which was about 50\% of that detected with single dish telescope \citep{2011MNRAS.418.1753J}. With more sensitive interferometer observation \citep{1999A&A...346..663C}, almost all the HCN 1-0 flux was picked up. Further sensitive observations with millimeter interferometers or large single dish telescopes for lines with critical density higher than that of HCN 1-0, such as CN 2-1 and CS 5-4, are necessary to derive spatially resolved distribution of weak extended dense gas in Arp 299. Dense gas fraction in different regions had been determined by line ratios of CO/HCN 1-0 \citep{1999A&A...346..663C}, which were 7$\pm1$ in A, 20$\pm1$ in B, 45$\pm8$ in C, and 29$\pm2$ in C$'$ regions. So, if the critical density of HCN 1-0 is used as the threshold of dense gas, the dense gas fraction is the highest in A and lowest in C(C$'$) , while in between in B regions. With several times lower critical density than that of HCN 1-0, HCO$^+$ 1-0 showed different properties than that of HCN 1-0 \citep{2006PASJ...58..813I}, with HCO$^+$/HCN 1-0 ratio of 1.2 in A, 4.0 in B, and 2.1 in C regions. However, if the critical density of HCO$^+$ 1-0 is used as the threshold, A and B regions do have similar dense gas fraction with CO/HCO$^+$ 1-0 ratio of $\sim5.8$ in A and $\sim$5.0 in B, while C(C$'$) region with CO/HCO$^+$ 1-0 ratio of $\sim 13.8$ to $\sim $21.4 has lower dense gas fraction than that of A and B regions. The critical density of CN 2-1 is several times higher than that of HCN 1-0 and several times lower than that of CS 5-4 \citep{ 2015PASP..127..299S}. Even though the CN 2-1 and CS 5-4 data are not sensitive enough to present high signal to noise ratio detections in B and C regions with velocity integrated map (see Figure 1), spectra in individual regions can still provide useful information to obtain line ratios of CS 5-4/CN 2-1 (see also Figure 1), just similar to what had been done for HCN/HCO$^+$ 1-0 in \cite{2006PASJ...58..813I}. The velocity integrated intensities of CN 2-1 and CS 5-4 in A, B, and C regions are listed in Table 1. CS 5-4 was not detected in C region. Even though dense gas fraction in B region derived by HCN 1-0 to CO 1-0 ratio is about 1/3 of that in A region \citep{1999A&A...346..663C}, the line ratio between CS 5-4 to CN 2-1 in B region is about 3 times of that in A region, which means the fraction of molecular gas with density higher than the critical density of CS 5-4 in B region is comparable to that in A region. On the other hand, with CN 2-1 emission and non-detection of CS 5-4 in C(C$'$) regions, the fraction of molecular gas with density higher than the critical density of CS 5-4 in C(C$'$) regions is lower than that of A and B regions. Dense gas fraction with different threshold traced by different dense gas tracers, including, HCO$^+$ 1-0, HCN 1-0, CN 2-1, and CS 5-4, provided slightly different properties in A, B, and C(C$'$) regions. We suggest that the differences are mainly caused by volume density instead of astrochemical abundances of different tracers. With generally consistent distribution of different dense gas tracers (HCN 1-0, CN 2-1, and CS 5-4) in Arp 299, the overlap starburst region (C and C$'$) do have lower dense gas fraction than that of A and B regions supporting that starburst is stronger near the two nuclei than that of other regions. Similar results of higher dense gas fraction near two nuclei than other regions were also found for one early stage merger, the Antennae galaxy \citep{2019AJ....157..131B}. The efficient gas density increment near the nucleus due to the loss of angular momentum during merging process \citep{1972ApJ...178..623T} is more important than the overlap starburst activity, even though active overlap starburst can be found in some early and mid stage mergers. The overlap starburst may not be a common phenomenon during merging process of two gas-rich spirals, since there are many mergers without overlap starburst. For Arp 299, because the asymmetric molecular gas distribution in IC 694 revealed by CO lines \citep{1997ApJ...475L.107A,1999A&A...346..663C}, with the lack of molecular gas in the northeastern part of IC 694, the most possible way to form the overlap C and C$'$ starburst regions was that NGC 3690 went across the northeastern part of IC694 during the merging process, which brings the gas from NGC 3690 and the northeastern part of IC 694 to C and C$'$ starburst regions. Such process can explain the lack of molecular gas in the northeastern part of IC 694, much less molecular gas in NGC 3690 than that in IC 694, as well as the location of overlap starburst region, which is not in between the two galaxies (IC 694 and NGC 3690). The star formation activity traced by mid-IR emission at 38${\mu}$m also presented similar properties to that of dense gas tracers in A, B, and C(C$'$) regions, with 46\% of the total flux density in A region, 22\% in B region, 8\% in C(C$'$) in C region, and the remaining 24\% as diffuse emission \citep{2002ApJ...571..282C}. Thus, both the upcoming star formation traced by dense gas tracers and on-going star formation traced by infrared emission indicate that the activities of star formation rank from high to low as A, B, and C(C$'$) regions. \begin{figure*} \gridline{\fig{arp299_cont_CN.pdf}{0.5\textwidth}{(a)} \fig{arp299_cont_CS.pdf}{0.5\textwidth}{(b)} } \gridline{\fig{sp_A.pdf}{0.33\textwidth}{(c)} \fig{sp_B.pdf}{0.33\textwidth}{(d)} \fig{sp_C.pdf}{0.33\textwidth}{(e)} } \caption{a. Spatial distribution of velocity integrated CN 2-1 (red contour) from -380 to 500 km s$^{-1}$ overlaid on 1.3mm continuum (greyscale). The contour levels are 4, 8, 12, 16, 20, 24$\sigma$, while 1$\sigma$ is 1.33 Jy km s$^{-1}$ beam$^{-1}$ and the beam is 3.12$''\times2.98''$ with $P.A.$=-15.25$^{\circ}$ shown at the bottom right corner. The beam of 1.3mm continuum shown at the bottom left corner is 3.14$''\times2.79''$ with $P.A.$= -33.37$^{\circ}$, while 1$\sigma$ is 6.5$\times10^{-4}$Jy. b. Velocity integrated CS 5-4 (red contour) from -180 to 500 km s$^{-1}$ overlaid on 1.3mm continuum (greyscale). The contour levels are 3, 6, 9$\sigma$, while 1$\sigma$ is 1.22 Jy km s$^{-1}$ beam$^{-1}$ and the beam is 2.93$''\times2.67''$ with $P.A.$=-36.95$^{\circ}$ shown at the bottom right corner. c. Spectra of CS 5-4 and CN 2-1 within dashed box of region A. d. Spectra of CS 5-4 and CN 2-1 within dashed box of region B. e. Spectra of CS 5-4 and CN 2-1 within dashed box of region C. \label{fig:fig1}} \end{figure*} \begin{figure*} \gridline{\fig{arp299_cont_CN1.pdf}{0.5\textwidth}{(a)} \fig{sp_C1.pdf}{0.5\textwidth}{(b)} } \caption{a.Velocity integrated CN 2-1 (red contour) from -180 to -40 km s$^{-1}$ overlaid on 1.3mm continuum (greyscale). The contour levels are 4, 5, 6, 8, 12, 16, 24 $\sigma$, while 1$\sigma$ is 0.53 Jy km s$^{-1}$ beam$^{-1}$, with the same beam parameters described in Figure 1. b. Spectra of CS 5-4 and CN 2-1 within dashed box of region C$'$. \label{fig:fig2}} \end{figure*} \begin{table*}[b] \begin{center}{Table 1. CN 2-1 and CS 5-4 velocity integrated intensities in A, B, and C regions. }\end{center} \small \begin{center} \begin{tabular}{cccccc} \hline Lines & A & B &C \\ \hline CN 2-1 & 26.9$\pm$1.0 &3.9$\pm$1.2 & 5.0$\pm$1.4\\ CS 5-4 & 9.3$\pm$0.9 &4.3$\pm$1.2 & $<$3.3 (3$\sigma$)\\ \hline \end{tabular} \end{center} Note: The velocity integrated intensities are based on the spectra shown in Figure 1, with the units of Jy km s$^{-1}$. \end{table*} \section{Summary} \label{sec:sum} With high resolution observations of CN 2-1 and CS 5-4 toward a mid-stage major merger Arp 299 with the SMA, we obtained spatial distribution of dense gas at about 3$''$ level. Most of CN 2-1 and CS 5-4 emissions are detected in the nuclear region of IC 694 (A), while only marginal detection of CN 2-1 and CS 5-4 are seen in NGC 3690 (B) and the overlap starburst region (C and C$'$). Highest CS 5-4 to CN 2-1 line ratio was found in B region among A, B and C regions of Arp 299. The dense gas fraction in different regions can vary with different threshold, observed with tracers with different critical densities, such as HCO$^+$ 1-0, HCN 1-0, CN 2-1, and CS 5-4. Dense gas fraction is the lowest in C(C$'$) region, when dense gas tracers with critical densities higher than that of HCN 1-0, are used. The dense gas fraction decreases from A to B, C, and C$'$ regions in Arp 299. The lack of CN 2-1 and CS 5-4 emissions in B and C+C$'$ regions, together with strong emission of dense gas tracers there detected with single dish telescopes, implies there are weak extended emission of dense gas tracers in B and C+C$'$ regions, which is similar to that of HCN 1-0 seen in \cite{1999A&A...346..663C}. \begin{acknowledgments} We thank Prof. Yu Gao for helpful discussion. This work is supported by National Key Basic Research and Development Program of China (grant No. 2017YFA0402704) and the National Natural Science Foundation of China grant 12173067. We thank the anonymous referee for helpful comments, which improved the manuscript. The Submillimeter Array is a joint project between the Smithsonian Astrophysical Observatory and the Academia Sinica Institute of Astronomy and Astrophysics and is funded by the Smithsonian Institution and the Academia Sinica. \end{acknowledgments} \vspace{5mm} \facilities{SMA} \software{MIR, CASA}
\section{Introduction} \label{sec:introduction} The Semantic Web was envisaged as an extension of the World Wide Web \cite{BernersLee:Hendler:Lassila:2001}. To support this vision, several languages were developed, notably Resource Description Framework (RDF) and Web Ontology Language (OWL). We focus on the latter and in particular its internationalisation goal \cite{SemanticWeb:2015,OwlUseCases:2004}, with multilingualism as a common component in an interconnected world. The Semantic Web landscape has grown substantially since the 2000's, and its multilinguality since \textit{circa} 2010 with the `Multilingual Semantic Web' (MSW) and `Multilingual Web of Data' (MWD) being two widely used terms in the literature \cite{Lemon:2020,Gracia:EtAl:2012,Buitelaar:Cimiano:2014,McCrae:Gracia:2019}. Indexed research literature illustrate this; e.g., a Google Scholar search on the date range 2001--2005 returned 14 hits for MSW and zero for MWD, for 2006--2010, it increased to 27 hits for MSW and still with zero for MWD, for 2011--2015 it comparatively exploded to 296 for both terms combined, with another 298 for the period 2016--2020. This increase is not as evident for the various stock-takings of multilingual ontologies and related artefacts specifically \cite{Buitelaar:Eigner:Declerck:2004,Daquin:2007,Gillis-Webber:Keet:2022}, as shown in Figure~\ref{fig:timeline}. Those 2004 and 2007 reviews on ontologies \cite{Buitelaar:Eigner:Declerck:2004,Daquin:2007} focussed on language-tagged strings, which was practically the only option available in the early years of the Semantic Web, and do not mention the extent of label coverage within an ontology for each natural language, relative to its total class and property axiom count. The very recent review for BioPortal-indexed ontologies \cite{Gillis-Webber:Keet:2022} considered only domain ontologies with `production' status on limited metrics. This raises several questions, including whether the increase in research on the Multilingual Semantic Web has translated to an increase in the ratio of multilingual ontologies in a repository, compared to the latest review in 2007, as it did for support for natural languages in RDF datasets and knowledge graphs (elaborated on below in Section~\ref{sec:related_work}). With this review we seek to answer the following main questions (motivated afterward): \begin{compactitem} \item[RQ1] What are the available modelling options to develop a multilingual ontology? \item[RQ2] Regarding extant ontologies and multilingual ontologies: \begin{compactitem} \item[RQ2a] What are the modelling approach(es) used for extant multilingual ontologies? \item[RQ2b] What is the percentage of multilingual OWL ontologies compared to monolingual ones (in popular repositories)? \item[RQ2c] What is the percentage of natural language completeness of each multilingual ontology? \item[RQ2d] How does that compare the the latest stock-taking, of the 2007 review? \end{compactitem} \item[RQ3] What is the status of tooling support for developing multilingual ontologies? \end{compactitem} First, the aforementioned increase in research papers does include numerous approaches for modelling language information in or for ontologies well beyond a simple language-tagged string, which may benefit from a systematic comparison (RQ1). This is also needed in order to be able to find multilingual ontologies and to assess them (RQ2) on which multilingual approaches are actually used, and how many multilingual ontologies there are. Their presence, or absence, may well be linked to tooling support to be able to conveniently develop and maintain them, and, hence, RQ3. \begin{figure*}[t] \centering \includegraphics[width=0.995\textwidth]{graphics/timeline6.png} \caption{Timeline of the MSW (T1) and MWD (T2) searches, contrasted with reviews pertaining to multilingualism conducted for the period 2001--2021: available data for ontologies, RDF datasets (collections of triples) and knowledge graphs (RDF graphs) are shown in the blue, red and green bars respectively.} \label{fig:timeline} \end{figure*} To answer the questions, the first step was to analyse proposed and related variant approaches to multilingualism in ontologies. To facilitate comparison, we devised a visualisation notation for them. Nine main approaches were identified, which can be grouped into the categories of multilingual labels, linguistic models, and mapping-based strategies. For the assessment of ontologies, we consulted NCBO~BioPortal\footnote{\url{https://bioportal.bioontology.org/ontologies}}, a repository of biomedical ontologies \cite{Salvadores:EtAl:2013}, since there has been wide adoption of (OWL) ontologies in the biomedical domain since the early 2000s \cite{Yu:2006,Hoehndorf:Dumontier:Gkoutos:2013, Hoehndorf:Schofield:Gkoutos:2015}, and Linked Open Vocabularies (LOV)\footnote{\url{https://lov.linkeddata.es/dataset/lov/}}, a curated repository of RDF and OWL vocabularies that is not limited to any one specific domain. Further, we looked beyond the mere number of multilingual ontologies, to also assess how multilingual the more-than-one-language ontologies are, introducing the notion of coverage within an ontology and language-specific completeness. Only a few of the multilingual modelling methods are used, principally just in the labels category, and even less can be considered fully multilingual where there is more than one primary language. Tooling for developing and managing multilingual models is also very limited, where of the several relevant ones, none meets all the requirements specified. In the remainder of this paper, we first describe related work and key reviews of RDF datasets and knowledge graphs in Section~\ref{sec:related_work}. The ways to model multilinguality is described and compared in Section \ref{sec:modelling_multilinguality}. This is followed by the BioPortal and LOV evaluations in Section~\ref{sec:review_ontologies_bioportal}, and the tools assessment in Section~\ref{sec:managing_multilinguality}. A discussion of the reviews and specific answers to the research questions is provided in Section~\ref{sec:discussion}. The paper concludes with Section \ref{sec:conclusion}. \section{Related Work} \label{sec:related_work} As noted in the Introduction, the sampling of counts of multilingual ontologies has been sparse, with just \cite{Buitelaar:Eigner:Declerck:2004,Daquin:2007,Gillis-Webber:Keet:2022}. We therefore cast the net wider to also include RDF datasets and knowledge graph literature pertaining to multilingualism. The ones with such data are included also in Figure \ref{fig:timeline} and they are briefly discussed here. Ell et al. \cite{Ell:Vrandecic:Simperl:2011} conducted a review on the Billion Triple Challenge (BTC) 2010 corpus, which contained over 3~billion triples, including metadata on the source of the resource the triple was crawled from. Excluding metadata, 1.4~billion distinct triples remained and of these triples, 0.7\% were identified to contain two or more language tags \cite{Ell:Vrandecic:Simperl:2011}. This was followed-up in 2018 with a cross-sectional study of labels across seven datasets \cite{Kaffee:Simperl:2018}, including, among others, the BTC~2010 corpus (with the metadata), a 2014 version of BTC (4~billion triples), and a 2017 version of Wikidata (2~billion triples). BTC~2014 was found to support 183 languages (up from 2010's 55) and the Wikidata dataset was found to support 424 languages \cite{Kaffee:Simperl:2018}. That is: languages other than English certainly are being used in the Semantic Web. Due to the way the results were reported, however, it is not possible to determine an accurate percentage of the number of triples containing two or more multilingual labels, but it is an approximate 6\% for BTC~2014 and 40\% for Wikidata\footnote{The data was reported in groups of 2, 2--5, 5--10, and $>$10. 2 was ignored as it is included in 2--5. The sum of the groups for BTC~2014 was 6.3\% and for Wikidata, 4.4\%. Both values were rounded down due to the unavoidable double-counting of 5.}. Coverage was measured for languages together, rather than by language. \begin{table*}[t] \begin{threeparttable} \fontsize{9}{12}\selectfont \caption{\label{table:overview_multilingual_options} Comparison of the Main Approaches for Modelling Multilinguality in Ontologies} \begin{tabular}{ | p{0.446\linewidth} | p{0.17\linewidth} | p{0.14\linewidth} | p{0.13\linewidth} |} \hline & \textbf{Labels} & \textbf{Linguistic Models} \tnote{\dag} & \textbf{Mapping Models} \\ \hline \hline Possible OWL profiles & All & All & All \\ \hline Can account for cross-lingual terms where there is no 1-1 mapping & No & Within the annotation only & Yes \\ \hline Can support inflectional languages & No & Limited & No \\ \hline Annotations reusable by other resources & $\pm$ (not if the annotation is a data literal) & Yes & No \\ \hline Example axiom count for two natural languages in an ontology \tnote{\ddag} & 2 & $\geq$14 & 7 \\ \hline Annotations contained within the OWL file & Yes & No & No \\ \hline Number of files to keep in sync & 1 & Minimum 3 & Minimum 2 \\ \hline Can be managed by an ontology editor & Yes & Limited support & Limited support \\ \hline \end{tabular} \begin{tablenotes} \item[\dag] Values are for OntoLex-Lemon only for the inflectional languages, axiom count, and ontology editor. \item[\ddag] The axiom count was determined for a class in an ontology for two natural languages. Language-specific grammatical features were excluded. OntoLex-Lemon was used for the linguistic model and the simplest method was used, that is, associating two lexical entries with a class. For the mapping model, OWL~2 was used. \end{tablenotes} \end{threeparttable} \end{table*} Other dataset and knowledge graph assessments also indicate substantial use of multiple languages. Notably, the 2015-10 version of Wikidata was found to support 395 languages in 749~million triples, the 2015-04 version of DBpedia supported 13 languages with 412~million triples, and Yet Another Great Ontology (YAGO), which integrates statements of the different language versions of Wikipedia, and YAGO~3 (with the 2014 Wikipedia dump) was found to support 326 languages in 1~billion triples \cite{Farber:EtAl:2018}. Completeness was discussed as a data quality dimension on whether the knowledge graph was suited to the task at hand, within the context of its data. The coverage of selected languages (English, French, German, Spanish, and Italian) was considered relative to the annotations: German and French had a coverage of over 30\% in Wikidata, and German of over 10\% in YAGO. Given the increase in data in multiple languages and an increase in multilingualism over the years, one may expect an increase in multilingual ontologies as well. \section{Modelling Options for Multilingual Ontologies} \label{sec:modelling_multilinguality} Several options to develop multilingual ontologies have been identified \cite{Gracia:EtAl:2012,MontielPonsoda3:EtAl:2011,Adamou:EtAl:2012}: \begin{enumerate} \item {\em Multilingual labels}: the ontology vocabulary is annotated with language-tagged strings. \item {\em Linguistic models}: the ontology is associated with a linguistic model external to it. \item {\em Mapping models}: common interlingua which can be specified between one or more monolingual ontologies. \end{enumerate} A brief comparison of these approaches is included in Table \ref{table:overview_multilingual_options}. We will elaborate, compare, and discuss each approach in turn in the subsections below. In order to represent the options and sub-variants schematically to facilitate comparisons, we use an ad hoc visual language. This consists of a set of primitives. First, an ontology can be visualised as two layers, which separate the semantic and the linguistic components, in line with \cite{Cimiano:EtAl:2010}. The semantic layer, which contains the classes, object properties and other axioms, is indicated with a dark grey box that has further information, such as the type of identifier (opaque or descriptive). The linguistic layer, which typically contains the annotations used to associate language information with an ontology, is indicated by a light grey box, and contains the various options for the language annotations. An example visualisation is shown in Figure~\ref{fig:legend} for a monolingual ontology with descriptive identifiers, i.e., naming the vocabulary elements with a string that is in a natural language or natural language-like (indicated with $L_n$) and meaningful to a human, such as naming a class {\sf Person} or {\sf RumAndRaisinIcecream} instead of {\sf ABC:0000012}. The knowledge represented in the TBox of the ontology may have a natural language-specific vocabulary either in or attached to the ontology as a separate file. It is possible that two monolingual ontologies in two different natural languages may share the same conceptualisation \cite{Guarino:1998}. \begin{figure}[t] \centering \includegraphics[width=0.97\linewidth]{graphics/diagram_legendExample3.png} \caption{Demonstration of the language to visualise the interaction between ontologies, any identifiers, and natural language aspects, shown here for a monolingual ontology that uses descriptive identifiers. The semantic and linguistic layers of the ontology are indicated by the grey boxes; the names of the classes (and other vocabulary elements) are in a natural language $L_n$. The possible relations with their constraints are shown in the legend.} \label{fig:legend} \end{figure} To show the properties and cardinality constraints between the two layers and their objects, the crow's feet notation from Entity-Relationship modelling is used. The notation is extended to indicate the modelling of language-specific label instances. We also introduce a relation that is used to indicate when two elements must have structural equivalence. This pertains specifically to the different annotation values available in OWL~2. See Figure~\ref{fig:legend} for a legend of the different relations. We now proceed to the three groups of options, going from the basic to more elaborate options. \begin{figure*}[t] \centering \includegraphics[width=0.7\textwidth]{graphics/diagram_multilingualLabels6_revised.png} \caption{Three principal options for multilingual labels in the TBox of the ontology: fully language independent (indicated with $L_0$) with a mandatory requirement for at least one label in some language (any one of $L_1 \ldots L_n$) (left), a primary language for the ontology ($L_n$), using a descriptive identifier and optional labels for other languages (centre), and mostly language-independent ($L_0$ in the semantic later) but with the requirement to have at least one label in one specified language (right)} \label{fig:model_languageIndependent} \end{figure*} \subsection{Multilingual Labels} \label{sec:modelling_multilinguality_labels} Multilingual labels are the `low-hanging fruit', being the easiest way to develop a multilingual ontology. An entity in an ontology (i.e., a class, object property, data property, or individual) can have multilingual labels by using {\tt rdfs:label}, which takes as domain {\tt rdfs:resource} and as range an {\tt rdfs:Literal}. Each such label is language-tagged. The language tag typically consists of an ISO 639 language code\footnote{\url{https://www.iso.org/iso-639-language-codes.html}}. However, as ISO 639's Parts 1-3 \cite{ISO:nd} do not provide language codes for all the world's languages, the language tag can be extended to capture other information, as long as it conforms to IETF's BCP 47 \cite{Phillips:Davis:2006, Phillips:Davis:2009}. When this is insufficient \cite{Gillis:Tittel:2019}, other language models, such as MoLA \cite{Gillis-Webber:Tittel:Keet:2019}, may be added to specify additional languages or lects. An example OWL fragment of this labelling approach is shown in Listing \ref{fss:multilingual_label} in Functional-Style syntax (FSS). (Unless explicitly stated otherwise, all further examples are in FSS.) In this example, the class \textsf{Person} has two annotations: one in English and the other in Dutch. Both annotations are a language-tagged string. \begin{lstlisting}[language={fss},caption={OWL fragment illustrating multilingual labels},label=fss:multilingual_label,captionpos=b] SubClassOf(:Person owl:Thing) AnnotationAssertion(rdfs:label :Person "Person"@en) AnnotationAssertion(rdfs:label :Person "Persoon"@nl) \end{lstlisting} The class {\tt :Person} is a named entity, where {\tt Person} is the identifier portion of the URI. An identifier of a URI can be {\em opaque} or {\em descriptive} \cite{Archer:Goedertier:Loutas:2012, LabraGayo:Kontokostas:Auer:2013, MontielPonsoda2:EtAl:2011}. An opaque identifier is semantic-free (non-meaningful) and used in a number of ontologies; e.g., \cite{Archer:Goedertier:Loutas:2012,Manaf:Bechhofer:Stevens:2010,McMurry:EtAl:2017}. If an opaque identifier is used as part of the URI, then an additional sign in the form of an {\tt rdfs:label} annotation should be added for both humans and machines to interpret the URI. For a descriptive identifier, there is a direct relationship between the natural language term used as an identifier and its semantics, e.g., \cite{Manaf:Bechhofer:Stevens:2010,Third:2012}. The descriptive identifier is typically in the primary language of the ontology. Figure~\ref{fig:model_languageIndependent} shows a schematic representation for the TBox for three ways of realising multilingual ontologies with this approach. Consider the TBox of \(O\!_{LI} \), which presents the sub-variant where a class has an opaque identifier and at least one natural language label, with each label a different language. An example OWL fragment is given in Listing \ref{fss:rdfs_labels_owl}. \begin{lstlisting}[language={fss},caption={OWL fragment with an opaque identifier},label=fss:rdfs_labels_owl,captionpos=b] SubClassOf( :493Dk owl:Thing ) AnnotationAssertion( rdfs:label :493Dk "Person"@en ) \end{lstlisting} \noindent An entity can have any number of labels, where \textit{i} is a label and L is the set of languages used for an entity: (L\textsubscript{1} ... L\textsubscript{n}) with \(1 \leq i \leq n\). For a primary language ontology, an entity can either have an opaque or descriptive identifier in L\textsubscript{i}. Because meaning can be surmised by a human from a descriptive identifier, a label is not required. However, as shown in \(O\!_{P\!L\!D} \) in Figure~\ref{fig:model_languageIndependent}, if the ontology is multilingual, all entities may have labels in one language, with the language tag sometimes omitted. Where there are labels for other languages, these are translations from the primary language. \(O\!_{P\!L\!O} \) (Figure \ref{fig:model_languageIndependent}) has an opaque identifier, but since all entities have labels in one language and to a limited extent, labels for other languages, we consider it to be a primary language multilingual ontology. The adaptation of a monolingual ontology to another language is called ontology localisation \cite{Surez-Figueroa:Gomez-Perez:2008}, although this is used for different contexts as well, such as a culture or a geo-political environment for which there is typically a shared language \cite{Cimiano:EtAl2:2010, Bouquet:EtAl:2004, Leon-Arauz:Faber:2014}. If an ontology is localised using labels, then only the linguistic layer of the ontology is affected, and the concept space of the original ontology remains unchanged. Despite the differences with the labels and identifiers between each of the TBoxes in Figure \ref{fig:model_languageIndependent}, \(O\!_{LI} \), \(O\!_{P\!L\!D} \) and \(O\!_{P\!L\!O} \) have commonality in that they share the same so-called `concept spaces', which can be seen as a figurative area of a concept, from a fine-grained concept to a category of concepts, where a concept space applies to each OWL class and object property; e.g., the notion of house and the colour blue. Natural languages may divide up the same concept space differently, which may indicate underlying ontological distinctions. One language may underspecify it compared to that of another. For instance, there is only one notion of `River' in English, whereas the French equivalent distinguishes between two types of river (\textit{Rivi\`ere} and \textit{Fleuve}). Another example is the representation of part-whole relations in isiZulu when compared to English, which also revealed ontological distinctions, in that the list of `universal' part-whole relations required both generalisation and refinements in order to accurately represent them \cite{Keet:Khumalo:2018}. Thus the use of labels has its limitations. In addition, not all grammatical features for a natural language can be dealt with by a label, such as inflected forms, concordial agreement, and agglutination (where words are formed with the addition of affixes to a word root or stem). Inflectional forms on nouns include the grammatical categories number and gender, and tense, aspect and number on verbs, which are typically used for naming classes and properties, respectively. For each of these grammatical categories, the word formation may need to change. An example is the Organization Ontology \cite{OrgOntology:2014}, which provides support for English, Spanish, French, Italian and Japanese. For instance, the property \textit{org:changedBy} with the English label \textit{changed by} has labels for most of the supported languages, but there are two for Spanish: \textit{es modificada por} and \textit{es modificado por}. This is to account for grammatical gender which is determined by the gender of the noun of the name of the class that is in the position of the domain in the axiom. Similarly for plural terms, the concordial agreement in a language such as isiXhosa (a Niger-Congo~B (`Bantu') language spoken in South Africa), combined with its agglutination, will alter the surface realisation of the annotation depending on its domain and range. Indeed, as highlighted by Keet and Khumalo, highly agglutinative languages can represent a challenge in ontologies, where it is possible that no single human-readable label can be prescribed to a property, due to the use of context-dependent affixes that modify the entity's name or their label \cite{Keet:Khumalo:2018}. \begin{table*}[t] \fontsize{9}{12}\selectfont \caption{\label{table:overview_multilingual_labels} Overview of the Limitations of Multilingual Labels} \begin{tabular}{ | p{0.3\linewidth} | p{0.65\linewidth} |} \hline \textbf{Feature/Approach} & \textbf{Shortcoming/Limitation} \\ \hline \hline Natural language identification & The language tag appended to a label identifies the natural language. If this language tagging is not done, or incorrectly, or a custom language tag is created, then human inspection is required to identify the language or a tool needs to be equipped to parse the language tag. \\ \hline Ease of use for realising multilingualism & Although multilingual labels are easy to add, this applies to the linguistic layer of the ontology only. Where there is no 1-1 mapping of the terms for an underlying conceptualisation, the target term will be an approximation of the primary language, losing precision that an ontology is supposed to provide. \\ \hline Handling of certain grammatical features such as gender, agglutination, concordial agreement, and other highly inflectional forms & When these features result in word formation changes, it is not possible to specify these differing word formations in a single label. \\ \hline Use of non-standard labels & When custom annotation properties are created for the purpose of labelling, human inspection is required to identify these properties as labels. This is problematic when ontologies are used on-the-fly by an application. \\ \hline \end{tabular} \end{table*} It may be the case that more than one label for a single language has to be added, fo which Simple Knowledge Organization System (SKOS) can be used. SKOS has the {\tt prefLabel} and {\tt altLabel} properties (subsumed by {\tt rdfs:label}) where labels can be identified as preferred or alternative, respectively. {\tt rdfs:label} does not have cardinality restrictions, but {\tt skos:prefLabel} can only be used once per natural language for an entity. For a succinct list of limitations of multilingual labels, see Table \ref{table:overview_multilingual_labels}. \subsection{Linguistic Models} \label{sec:modelling_multilinguality_linguistic} An ontology can be associated with an external linguistic model, where the lexicon is modelled separately from the ontology. A lexicon is a collection of lexical entries and each lexicon is language-specific \cite{Cimiano:Mccrae:Buitelaar:2016}, which, within the context of the Semantic Web, is typically stored in any one of the RDF serialisations. This approach is in contrast to the aforementioned multilingual labels approach that has all linguistic annotations in the same OWL file. To use a linguistic model in practice, one needs a linguistic model, a way to store the language data must be devised, as well as a way to connect the resources. Many linguistic models have been developed over the years, such as LingInfo \cite{Buitelaar:EtAl:2006}, LexOnto \cite{Cimiano:EtAl:2007}, Linguistic Information Repository (LIR) \cite{Peters:EtAl:2007, MontielPonsoda:EtAl:2008}, Linguistic Watermark 3.0 \cite{Pazienza:Stellato:Turbati:2008}, LexInfo \cite{Cimiano:EtAl:2010, Buitelaar:EtAl:2009}, \textit{lemon} \cite{Lemon:2020, McCrae:EtAl:2012}, and OntoLex-Lemon \cite{Cimiano:Mccrae:Buitelaar:2016, Mccrae:EtAl:2017} (based on \textit{lemon}). As OntoLex-Lemon is now the \textit{de facto} standard for describing linguistic resources in RDF \cite{Cimiano:Mccrae:Buitelaar:2016}, this model is the only one considered for comparative analysis. \begin{figure}[h] \centering \includegraphics[width=1.0\linewidth]{graphics/diagram_linguisticModelEntries5_revised.png} \caption{Visualisation of the use of the OntoLex-Lemon linguistic model, where lexical entries are linked to an entity in the ontology (shown here for a class). The identifier of the entity can be either language-independent ($L_0$) or any of the natural languages and therefore not show in the dark-grey semantics box on the left.} \label{fig:model_linguisticEntries} \end{figure} The ontology-lexicon interface is done in OntoLex-Lemon using the {\em semantics by reference} principle, whereby the semantics of a lexical entry (be it a word, affix or multi-word expression) is expressed by an entity in an ontology \cite{Buitelaar:2010}. This entity can be a class, property or individual. The ontology-lexicon interface can be modelled in several ways, each with increasing degrees of complexity. In Figure \ref{fig:model_linguisticEntries}, an element in the ontology is linked to one or more lexical entries, with each lexical entry in a different language. An example OWL fragment for a class is given in Listing \ref{fss:linguistic_model_lexical_entry_owl}, with a corresponding lexical entry in RDF given in Listing~\ref{fss:linguistic_model_lexical_entry_rdf}. \begin{lstlisting}[language={fss},caption={OWL fragment linking a lexical entry to an entity},label=fss:linguistic_model_lexical_entry_owl,captionpos=b] SubClassOf( :493Dk owl:Thing) AnnotationAssertion(rdfs:label :493Dk "Person"@en) AnnotationAssertion(ontolex:isDenotedBy :493Dk ex:en/lexicalEntry_Person) AnnotationAssertion(ontolex:isDenotedBy :493Dk ex:nl/lexicalEntry_Persoon) \end{lstlisting} \begin{lstlisting}[language={fss},caption={RDF Turtle fragment of a lexical entry that is stored in a file separate from the ontology.},label=fss:linguistic_model_lexical_entry_rdf,captionpos=b] :nl/lexicalEntry_Persoon a ontolex:LexicalEntry ; dcterms:language lang:dutch ; rdfs:label "Persoon"@nl ; ontolex:canonicalForm :nl/lexicalEntry_form_Persoon . :nl/lexicalEntry_form_Persoon a ontolex:Form ; ontolex:writtenRep "persoon"@nl . \end{lstlisting} As a lexical entry can have different meanings depending on the context, it can have more than denotation. This introduces ambiguity; to resolve this difference in meaning, senses can be modelled within a lexical entry, where the sense is then linked to the entity in the ontology \cite{Cimiano:Mccrae:Buitelaar:2016}, as shown in Figure~\ref{fig:model_linguisticSenses}. A lexical sense can only be linked to one lexical entry, and it can also only have one reference in an ontology. \begin{figure*}[t] \centering \includegraphics[width=0.7\linewidth]{graphics/diagram_linguisticModelSenses5_revised.png} \caption{Visualisation of the OntoLex-Lemon linguistic model in a more elaborate setting cf. Figure~\ref{fig:model_linguisticEntries}: lexical senses are linked to an entity in the ontology and each lexical sense is related to a lexical entry.} \label{fig:model_linguisticSenses} \end{figure*} The modelling of an inflected form such as grammatical gender is possible in OntoLex-Lemon. If a term is distinct in gender or inflected forms, then a separate lexical entry is created for each form. For a noun, if the gender holds for all its forms, then one lexical entry suffices. Revisiting the \textit{changed by} property from Section \ref{sec:modelling_multilinguality_labels}, six lexical entries are required for Spanish: a compound lexical entry each for the feminine and masculine using the {\tt decomp:constituent} predicate from OntoLex-Lemon, and four for the individual words. In contrast, only three lexical entries are required for English: one for the present infinitive \textit{`change'}, another for \textit{`by'}, and \textit{`changed by'} is then modelled as a compound lexical entry. Highly inflectional languages such as isiZulu (a Niger-Congo B language spoken in South Africa), and Chichewa (spoken in Southern, South-East, and Eastern Africa) could not be modelled in OntoLex-Lemon's more expressive predecessor \textit{lemon} \cite{Chavula:Keet:2014}. The Morphology module for OntoLex-Lemon remains in development, and perhaps in the future it might become possible. Revisiting the notion of the concept space that was introduced in Section \ref{sec:modelling_multilinguality_labels}, OntoLex-Lemon allows for ``meaning nuances'' of a word to be modelled using the {\tt ontolex:usage} property \cite{Cimiano:Mccrae:Buitelaar:2016}. Continuing with the example of the English `River' to its French equivalents {\em Rivi\`ere} and {\em Fleuve}, the same example is given in \cite{Cimiano:Mccrae:Buitelaar:2016} to demonstrate the {\tt ontolex:usage} property. The usage condition is given by the definition of {\em Fleuve} in English; however, identification of when to apply this usage condition requires human inspection, therefore {\tt ontolex:usage} is not ideal for automated processing. If the reference or denotation can be made more specific in the ontology, then a possible solution is to represent {\em Rivi\`ere} and {\em Fleuve} as sub-classes of {\sf River}, with an associated {\sf flows into} object property; e.g.,: \({\sf Riviere \sqsubseteq River \sqcap \exists flowsInto.(Riviere \sqcup Fleuve) }\) \newline \indent \({\sf Fleuve \sqsubseteq River \sqcap \exists flowsInto.Sea} \) \newline \indent \({\sf Riviere \sqsubseteq \neg Fleuve} \) \noindent Linguistic models that rely on a domain ontology for providing the sense inventory are criticised by Hirst \cite{Hirst:2014}. According to Hirst, there simply is insufficient granularity provided by a domain ontology, particularly once multilinguality is factored in, due to the different sets of word senses across languages~\cite{Hirst:2014}. A challenge with a linguistic model such as OntoLex-Lemon is that the lexical entries for each natural language will differ in terms of how it uses the linguistic model. For instance, English has limited inflection, Spanish has grammatical gender, and isiXhosa has extensive concordial agreement and agglutination. Practically, for automatic processing, such as real-time ontology verbalisation, then the application will have to know the peculiarities (and possibly also additional grammar rules) of each natural language through something like a language specific dispatch mechanism. \begin{table*}[t] \fontsize{9}{12}\selectfont \caption{\label{table:overview_linguistic_model} Overview of the Limitations of OntoLex-Lemon as a Linguistic Model for Modelling Multilingualism} \begin{tabular}{ | p{0.3\linewidth} | p{0.65\linewidth} |} \hline \textbf{Feature/Approach} & \textbf{Shortcoming / Limitation} \\ \hline \hline Use of the semantics by reference principle for meaning & Problematic if the ontology entity is not granular enough or lexical entries with overlapping meanings cannot be accurately referenced or not represented in sufficient detail due to logic limitations. \\ \hline To address the granularity/overlapping meanings issue, OntoLex-Lemon proposes the `usage' property & This property is sufficient for displaying hard-coded text as lexical definitions, but when used in real-time by an application that is, for example, verbalising an ontology, the property still requires human inspection. \\ \hline Modelling grammatical gender and similar inflections & Although modelling is possible, the application that parses this data for purposes of display or verbalisation has to know the grammar rules and have verbalisation templates specific to the language, neither of which can be included in the linguistic model. \\ \hline Modelling highly inflectional languages & Languages such as isiZulu and isiXhosa that have features such as agglutination and concordial agreement, cannot be modelled in OntoLex-Lemon. \\ \hline Modelling of object/data properties & This can be time-consuming as a property may be represented by a compound lexical entry, which in turn consists of multiple lexical entries. \\ \hline \end{tabular} \end{table*} In closing, for an overview of the limitations of OntoLex-Lemon, see Table \ref{table:overview_linguistic_model}. \subsection{Mapping Models} \label{sec:modelling_multilinguality_mapping} Two or more ontologies in different natural languages with overlapping content can be aligned to create a merged ontology, resulting in labels in at least two natural languages. If there is a common natural language between the ontologies being aligned, then the alignment process can be done on the shared language. For example, if O\textsubscript{1} is multilingual with languages L\textsubscript{1} and L\textsubscript{2}, and O\textsubscript{2} has languages L\textsubscript{1} and L\textsubscript{3}, then multilingual alignment can be done between both L\textsubscript{1}'s. If two or more ontologies are aligned and there is no shared natural language between them, then this is referred to as cross-lingual alignment \cite{Trojahn:EtAl:2014}. Alignment can be done in the semantic or the linguistic layer. The former is generally done between the same type of element, where alignments between classes and between properties are expressed as bridge rules and alignments between individuals are expressed as individual correspondences \cite{Inants:Euzenat:2015}. Linguistic mappings are declared in the linguistic layer, using, for example, a linguistic model or synsets from WordNet. We will discuss the merits of each in turn. \subsubsection{Mappings in the ontology.} \label{sec:modelling_multilinguality_mappingConceptual} The ontology alignment relations applicable to classes and properties are equivalence with {\tt owl:EquivalentClass} or subsumption with {\tt rdfs:subClassOf}, as shown in Figure~\ref{fig:model_mappingModelsOwl} and an example for more than two ontologies is shown in Listing \ref{fss:mapping_model_class_equivalence}. \begin{lstlisting}[language={fss},caption={OWL fragment modelling an equivalence relation for three classes from three different ontologies},label=fss:mapping_model_class_equivalence,captionpos=b] EquivalentClasses( a:Person b:Persoon c:Umntu ) \end{lstlisting} \noindent The resultant equivalence and subsumption alignments can be saved as a multilingual OWL ontology, with the matched ontologies imported into it, or merged into one, or soft-imported by IRI. \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{graphics/diagram_mappingModelOwl.png} \caption{Using OWL as a `mapping model' in the TBox: identifiers from monolingual ontologies are mapped to create a multilingual ontology; the ontologies have to be structurally equivalent in OWL.} \label{fig:model_mappingModelsOwl} \end{figure} Aforementioned SKOS can also be used for mappings, using {\tt skos:mappingRelation} \cite{SKOS:2009} and its sub-properties, to map identifiers in a pair-wise fashion between concepts in thesauri and terminologies of the same subject domain. However, such mappings can only be done between individuals of {\tt skos:Concept}, and thus requires an additional step of converting aligned {\tt skos:Concept} individuals into OWL classes to create a multilingual ontology. An example of SKOS-based mappings include the AGROVOC multilingual thesaurus, which uses \mbox{cross-lingual} mappings, where SKOS concepts are mapped to external vocabularies such as the Chinese Agricultural Thesaurus using {\tt skos:exactMatch} and {\tt skos:closeMatch} \cite{Caracciolo:EtAl:2013,Liang:EtAl:2005, Liang:Sini:2006}. Annane et al. \cite{Annane-EtAl:2016} used SKOS and the General Ontology for Linguistic Description (GOLD) \cite{Farrar:Langendoen:2003} to generate 228~000 mappings between English ontologies on BioPortal and its French equivalent. Kuai et al.~\cite{Kuai:EtAl:2016} took two monolingual ontologies in different natural languages, automatically translated the labels of one of the ontologies to the natural language of the other ontology, and then identified mapping relationships between concept pairs. This was further examined with an algorithm to measure semantic similarity and subsequently mapped to SKOS according to its semantic similarity, using {\tt skos:exactMatch}, {\tt skos:closeMatch}, or {\tt skos:relatedMatch}. For pair-wise mappings, if the property used for the mapping is symmetric, then a mapping from a resource in ontology O\textsubscript{1} to a resource in ontology O\textsubscript{2} consists of one axiom. If \textit{n} is the number of classes to be mapped, then the number of correspondences required is \((n(n-1))/2 \), which quickly becomes hard to manage for multiple languages and large vocabularies or ontologies. \subsubsection{Linguistic Mappings.} \label{sec:modelling_multilinguality_mappingLinguistic} Where two monolingual ontologies are structurally equivalent and have labels, then pair-wise mappings could be asserted with {\tt owl:sameAs} (see Figure~\ref{fig:model_mappingAnnotation}), even though a good reason to do so may not be evident. A more elaborate scenario motivating mappings at the linguistic layer is a desire to re-use the ample existing lexical resources that have such mappings. We consider the InterLingual Index (ILI) from Global WordNet and those lexical concepts from OntoLex-Lemon to illustrate this strategy. \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{graphics/diagram_mapping_annotations.png} \caption{Use of OWL as a `mapping model' in the TBox, but where equivalences are declared on the annotation values to create a multilingual ontology.} \label{fig:model_mappingAnnotation} \end{figure} WordNet is a semantic network of synsets, where a synset is a collection of synonymous words that have an equivalent denotation; each word may be used interchangeably, depending on the context \cite{Miller:Fellbaum:2007}. Princeton WordNet (PWN), in English, was the first WordNet developed and eight in European languages were developed afterward \cite{Miller:Fellbaum:2007,Miller:EtAl:1990,Vossen:1997}, with other language WordNets following later. Each new WordNet was interlinked via PWN, with PWN used as a pivot. If a word was not lexicalised in PWN, however, then the concept could not be expressed. The ILI was then introduced, which is a flat list of concepts, each with a unique identifier and each synset in a WordNet is then associated with a concept from the ILI using {\tt owl:sameAs} \cite{Miller:Fellbaum:2007, GlobalWordNetBackground:2004}. This can be linked to a linguistic model, and from there to an ontology. That is, entries in ILI function as an interlingua, where each class in two monolingual ontologies can be associated with a concept from ILI using, e.g., {\tt ontolex:concept} from OntoLex-Lemon. The classes from each ontology that share the same ILI concept may then be aligned with {\tt owl:equivalentClass}. This approach is shown in Figure~\ref{fig:model_mappingWordnet}. \begin{figure*}[t] \centering \includegraphics[width=0.7\textwidth]{graphics/diagram_mappingWordnet5_revised.png} \caption{OntoLex-Lemon is used to demonstrate the theoretical option of linguistic mappings, using Global Wordnet as the interlingua.} \label{fig:model_mappingWordnet} \end{figure*} \begin{figure*}[h] \centering \includegraphics[width=0.83\textwidth]{graphics/diagram_mappingLexicalConcepts3_revised.png} \caption{Lexical concepts can be used as an interlingua, shown here using OntoLex-Lemon.} \label{fig:model_mappingConcepts} \end{figure*} \begin{table*}[t] \fontsize{9}{12}\selectfont \caption{\label{table:overview_mapping_models} Overview of the Limitations of Mapping Models for Modelling Multilingualism} \begin{tabular}{ | p{0.3\linewidth} | p{0.65\linewidth} |} \hline \textbf{Feature/Approach} & \textbf{Shortcoming/Limitation} \\ \hline \hline Alignment of two or more ontologies & It requires effort to update the alignments to keep in sync with any source or target ontology changes, and to ensure the multilingual ontology stays consistent. \\ \hline Different conceptualisations & When ontologies are aligned, it results in non-1-1 mappings. Custom classes may need to be created in the merged ontology to address this. \\ \hline Custom alignment axioms & If custom properties are created to align ontologies, human inspection is required to identify these properties when the merged ontology is reused. \\ \hline SKOS as a mapping model & SKOS can only be used to align instances. It cannot be used to align classes. To create a multilingual ontology from the alignments, each individual would then have to be created as a class in post-processing. \\ \hline Use of a `mapping hub' such as Global WordNet as the interlingua & This can only be used for those languages which have a common interlingua. In the case of Global WordNet, this would be an accompanying WordNet for that natural language. \\ \hline \end{tabular} \end{table*} A lexical concept is associated with an OWL class using the OntoLex-Lemon {\tt ontolex:concept} property \cite{Cimiano:Mccrae:Buitelaar:2016}. In this context, a lexical concept serves as a language-independent `container' that has one or more senses from different language lexicons lexicalised to it, as shown in Figure~\ref{fig:model_mappingConcepts}. An example OWL fragment is given in Listing \ref{fss:mapping_model_lexical_concepts_owl}, with the corresponding lexical concept given in Listing \ref{fss:mapping_model_lexical_concepts_rdf}. \begin{lstlisting}[language={fss},caption={OWL fragment showing an association of a class to a lexical concept},label=fss:mapping_model_lexical_concepts_owl,captionpos=b] SubClassOf( :493Dk owl:Thing ) AnnotationAssertion(rdfs:label :493Dk "Person"@en) AnnotationAssertion(ontolex:concept :493Dk ex:lexicalConcepts/000000001) \end{lstlisting} \begin{lstlisting}[language={fss},caption={RDF Turtle fragment of a lexical concept},label=fss:mapping_model_lexical_concepts_rdf,captionpos=b] :lexicalConcepts/000000001 a ontolex:LexicalConcept ; ontolex:lexicalizedSense :en/lexicalEntry_Person_sense1 ; ontolex:lexicalizedSense :nl/lexicalEntry_Persoon_sense1 ; ontolex:isEvokedBy :en/lexicalEntry_Person ; ontolex:isEvokedBy :nl/lexicalEntry_Persoon . \end{lstlisting} The issue with using lexical concepts or Global WordNet as an interlingua is that both require a conceptualisation to be the same for all languages. However, as shown by, e.g., Hirst \cite{Hirst:2014}, this is rarely universal, in particular for subject domains that rely less on concrete reality or understanding thereof, such as, say, the concept of money and the plethora of feelings. Further, the morphological representation may be such that these forms cannot be represented adequately in lexical entries, senses, or synsets \cite{Chavula:Keet:2014,Miller:Fellbaum:2007}, as mentioned before in Section \ref{sec:modelling_multilinguality_linguistic}) and for which this option has no solution either. As an alternative way to model linguistic cross-lingual mappings, the Translation module in \textit{lemon} and OntoLex-Lemon can be used \cite{Cimiano:Mccrae:Buitelaar:2016, Montiel-Ponsoda:EtAl:2011, Gracia:EtAl:2014}. With this module, two lexical senses of different natural languages can reference equivalent classes in a source and target ontology. The senses can be set as direct equivalent translations using the Translation class. A category registry is used to model the type of translation, and in the examples given in the literature, the Translation Categories RDF Reference Schema (TRCAT) is used \cite{TranslationCategories:2021}. Alternatively, the \textit{translation} property in OntoLex-Lemon can be used as a translation relation between senses \cite{Cimiano:Mccrae:Buitelaar:2016}. The benefit of mapping models is that it allows both homogenous and heterogenous resources (ontologies, vocabularies, etc.) to be combined to create a multilingual ontology. There are limitations to this approach, however. For multilingual alignments, it cannot be assumed that the concept spaces of each language will have a 1-1 mapping. An option here is to be either take one language as the primary language or to edit the conceptualisations of each to render a more language-independent view. This will most likely require manual alignment to resolve. For cross-ontology alignments, there will be local consistency but it is possible that once aligned, there will not be global consistency, and manual alignment will be required to resolve the problematic axioms. Lastly, ontologies may evolve, and if one or more of the base ontologies are updated regularly, it will require effort to keep the multilingual ontology in sync and stay consistent. The mapping model approach differs from the previous two approaches, in that once a merged multilingual ontology is created, the ontology then uses multilingual labels or a linguistic model for its annotations. For example, if the instance identifiers are mapped using SKOS, then the multilingual labels approach applies to the resultant annotations. For the proposed methods for linguistic mappings, namely Global Wordnet as the interlingua, and the use of lexical concepts, then the multilingual labels approach applies to the annotations for the former, however, the annotations use the linguistic model approach for the latter. For an overview of the limitations of mapping models, see Table \ref{table:overview_mapping_models}. \section{Multilingualism in Ontologies in the BioPortal and LOV Repositories} \label{sec:review_ontologies_bioportal} Given the different approaches to develop a multilingual ontology, we now proceed to examine which ones are used in practice, how often, and the extent of multilingualism when it is used in an ontology. To do so, two issues need to be resolved first: the approaches can be realised in different serialisations that have to be covered somehow for a set of ontologies, and what exactly to measure of them. We proceed to the quantitative assessment afterward. \subsection{Preliminaries} We first identified the aspects of the serialisation on which to base search over the ontology files. To include ontology of varying age, several standards may have been used for those approaches, which complicates the details of the search. Annotations in RDF 1.0 use {\tt rdfs:label} and {\tt rdfs:comment}, where the former is a human-readable version of a uniform resource identifier (URI) fragment and the latter is a description of the entity represented by the URI \cite{RDFSchemaOld:1999}. The attribute {\tt xml:lang} is used to specify the natural language of the annotation value (as well as any other literals) \cite{RDFSchemaOld:1999}. To address the issues with both {\tt xml:lang} \cite{RDFIssuesTracking:2000} and the language-sensitivity required for a literal \cite{RDFModelTheoryOld:2001}, {\tt rdf:PlainLiteral}, a string combined with an optional language indicator, was introduced in RDF in 2002 \cite{RDFConceptsOld:2002}. Later, in 2011, this was updated again, in that the language indicator has to adhere to IETF's BCP47 \cite{Phillips:Davis:2006,Phillips:Davis:2009}, a document specifying tags to identify languages \cite{RDF1.1ConceptsOld:2011}, and in 2012, the {\tt rdf:langString} datatype was specified for language-tagged literals \cite{RDF1.1ConceptsOld:2012}. In parallel, for OWL, the annotation value of {\tt rdfs:label} could only be data literals in the original OWL \cite{OwlSemantics:2004}, but for OWL 2 it can be a data literal, URI, or individual \cite{OwlStructural:2012}. Based on these variations, we specified the search criteria for the multilingual labels approach as any class or property in OWL that uses an {\tt rdfs:label} with a language-tagged string or an {\tt xml:lang} attribute. To identify those multilingual ontologies using a URI for the annotation value, the search criteria was determined as any {\tt rdfs:label} which had a URI as the annotation value with a local namespace. For the linguistic model approach, the search criteria consisted of the namespaces of the following models: {\tt ontolex}, {\tt linginfo}, {\tt lexonto}, {\tt lexinfo}, {\tt gold} and {\tt lemon}, with manual analysis of each ontology thereafter for its multilingual aspects. Similarly for the mapping model approach, the search criteria was specified as {\tt owl:sameAs} and the {\tt skos} namespace, with manual analysis thereafter. For metrics, we devised a notion of {\em coverage} and of {\em completeness} specifically for the TBox of the ontology that we are interested in\footnote{Also, the ABox introduces other issues in multilingualism. For instance, it can contain individuals with monolingual proper names, such as a book title, but this does not necessarily extend to all languages. For example, for people's names, `Bill Gates' renders as \textit{uBill Gates} in isiXhosa, and accurately determining the named individuals in an ontology requires manual inspection.}. Coverage is defined as follows. \begin{definition}[\textbf{Coverage (Cov)}] \label{definition_tc} V\textsubscript{C}, V\textsubscript{OP} and V\textsubscript{DP} are the set of classes, object properties, and data properties, respectively, as defined in the OWL 2 Specification \cite{OwlStructural:2012}. {\em Coverage (Cov)} is the sum of the number of elements in V\textsubscript{C}, V\textsubscript{OP} and V\textsubscript{DP}, prior to any ontology imports. If another namespace is used for a class or property without being imported using \verb+owl:imports+, then these elements are included in {\em Cov}. \end{definition} We exclude imported ontologies as their multilinguality may differ from the ontology doing the importing, with the result that coverage may be skewed, particularly when only a few elements may be used from each imported ontology. Language-specific completeness is defined as follows. \begin{definition}[\textbf{Language-Specific Completeness (LCom\textsubscript{lang})}] \label{definition_lcov} LCom\textsubscript{lang} for a natural language {\em lang} is the sum of language-specific literals for each element in V\textsubscript{C}, V\textsubscript{OP}, and V\textsubscript{DP} divided by Cov. \end{definition} \noindent These metrics are illustrated in Example 1. \begin{example} \label{example_lcov} Let us assume there is some ontology \textit{O} that has 50 classes, 10 object properties, and 5 data properties. It uses {\tt rdfs:label} for language-tagged labels for each of the classes and properties, for three natural languages, being English, French, and German. Labels are provided for all classes and object properties for English; only for the classes with `fr' tagged literals for French; and only 30 of the classes have labels with `de' tagged literals for German. The first metric to compute is coverage: \begin{equation*} \mathrm{Cov} {} = |V_{C}| + |V_{\mathrm{OP}}| + |V_{\mathrm{DP}}| = 50 + 10 + 5 = 65 \end{equation*} The language-specific completeness for each of the three languages is then computed as follows: \begin{equation*} \begin{aligned} \mathrm{LCom}_{\mathrm{en}} {} & = (|{V_{C}}|_{labels} + {|V_{\mathrm{OP}}}|_{labels} + {|V_{\mathrm{DP}}}|_{labels})\;/\;\mathrm{Cov} * 100 \\ & = (50 + 10 + 0)\;/\;65 * 100 = 92,3\% \\ \mathrm{LCom}_{\mathrm{fr}} {} & = (50 + 0 + 0)\;/\;65 * 100 = 76,9\% \\ \mathrm{LCom}_{\mathrm{de}} {} & = (30 + 0 + 0)\;/\;65 * 100 = 45,2\% \end{aligned} \end{equation*} \end{example} \noindent The computed LCom\textsubscript{lang} values lead to the notion of a primary language of an ontology: \begin{definition}[\textbf{Primary Language (PL)}] \label{definition_pl} The PL of the ontology is the natural language with the highest percentage LCom\textsubscript{lang}. \end{definition} At least in theory it is possible that more than one natural language is the primary language in an ontology if the percentages are the same or at least very similar. If more than one primary language is supported for an ontology, it suggests that it is a language-independent ontology. To ascertain this, an ontology would need to be manually inspected, focussing on the identifier type and the labels used, particularly the consistency thereof for each of its languages. \subsection{Preparation of the Datasets from the repositories} Since there are multiple ways to model multilinguality and various ontology formats, we first describe in detail the concrete processes for dataset creation. We use two well-known ontology repositories, BioPortal and the LOV dataset for this. \paragraph{Preparation of the BioPortal Dataset} \label{sec:review_ontologies_requirements} The following steps were undertaken: \begin{compactenum} \item Using BioPortal's REST API, both a list of ontologies and categories were downloaded using the \textit{/ontologies} and \textit{/categories} endpoints on the 28/04/2022. The data were saved as JSON files, which were then imported into a MySQL database. The result was a listing of 981 ontologies. Using a script, the metadata of 30 ontologies were retrieved at a time, using the \textit{/ontologies/\{acronym\}/categories} and \textit{/ontologies/\{acronym\}/latest\_submission} endpoints. The list of categories each ontology was linked to, the ontology language used, the status and the description were then saved to the database. \item The dataset was then filtered on OWL ontologies only (other encoding options were UMLS, SKOS, and OBO). This resulted in 730 ontologies. \item The dataset was filtered on those OWL ontologies with a status of `production' (other statuses are `alpha', `beta', `retired' and \textit{null}), which is assumed to be the most mature version of the ontology. 268 ontologies remained after this selection. \end{compactenum} Of the remaining ontologies, two ontologies returned an empty result and were excluded from evaluation. This resulted in a final dataset of 266 ontologies from BioPortal. The methodology for review comprised the following: each ontology file was loaded in memory, with a script used to loop through each line therein. Any line which mapped to one or more of the search criteria was then saved to the database. These saved rows were then manually inspected to confirm their multilingual aspects. \paragraph{Preparation of the LOV Dataset} \label{sec:review_ontologies_requirements_lov} The following steps were undertaken: \begin{compactenum} \item LOV provides an API, with an endpoint to retrieve the list of vocabularies: \textit{/api/v2/vocabulary/list}. On 29/04/2022, the list of vocabularies were retrieved from this URL, and the contents saved as a JSON file. \item The JSON file was then imported into the same MySQL database. The result was a listing of 773 vocabularies. \item Using a script, the contents of each vocabulary were retrieved using a cURL command, with the Content-Type of the header set to {\tt application/rdf+xml}. RDF/XML was selected as it is the mandatory serialisation format of OWL ontologies. \item For those vocabularies that returned an HTTP status code of 4*, the vocabularies were manually reviewed on LOV. Using the VAPOUR hyperlink provided on LOV, if the linked data validator VAPOUR\footnote{\url{http://uriburner.com:8000/vapour}} returned no results, then no further action was taken. \item For those vocabularies that returned an HTTP status code of 0, the vocabularies were manually reviewed using their URI. With the exception of one vocabulary, all vocabularies were unreachable due to timeout or DNS issues. No further action was taken for these vocabularies. \item For those vocabularies that returned an HTTP status code of 200, each RDF document was then manually opened. If the file presented a web document in HTML, then the vocabulary was manually reviewed on LOV, following the same steps in Point 4. If VAPOUR provided a file for a different Content-Type (options included {\tt xhtml+xml} and {\tt text/turtle}) and an RDF document was available, then the web document was updated to this file. If no file could be returned by VAPOUR, then the N3 serialisation was downloaded from LOV. \end{compactenum} \noindent Of the 773 vocabularies, the following was the status at time of evaluation: \begin{compactitem}[-] \item HTTP status code of 0: 75 vocabularies, including one that was manually reviewed and found to have a valid RDF document. \item HTTP status code of 3*: 23 vocabularies \item HTTP status code of 4*: 125 vocabularies \item HTTP status code of 5*: 27 vocabularies \item HTTP status code of 200: 523 vocabularies \end{compactitem} \noindent Regarding the vocabularies with a status code of 200, two returned an RDF document showing only namespaces, of which one was Schema.org, and 103 did not have an RDF document served by their URI using content negotiation. The latter included the Data Catalog Vocabulary (DCAT), three vocabularies from Dublin Core, the ISO 25964 SKOS extension, JSON Schema in RDF (a vocabulary provided by a W3C working group), Lexvo.org Ontology, W3C Shapes Constraint Language (SHACL) Vocabulary, and the RDFa Vocabulary for Term and Prefix Assignment. This last step left a dataset of 521 vocabularies for assessment. The same evaluation process as that for BioPortal was applied to these vocabularies. \begin{table*}[t] \begin{threeparttable} \fontsize{8}{12}\selectfont \caption{\label{table:multilingual_ontologies} Classification of Identified Multilingual Ontologies in BioPortal} \begin{tabular}{@{}p{7.5cm}||M{2.5cm}|M{2.5cm}||M{3.5cm}@{}} \hline \textbf{Ontology} & \textbf{Primary Language(s)} & \textbf{Other Language(s)} & \textbf{Modelling Option} \\ \hline \hline Animal Trait Ontology for Livestock (ATOL) & en, fr & - & Multilingual Labels \\ \hline CIDOC Conceptual Reference Model (CIDOC-CRM) & de, el, en, fr, pt, ru, zh & - & Multilingual Labels \\ \hline Cell Ontology (CL) & en & zh & Multilingual Labels \\ \hline WHO COVID-19 Rapid Version CRF Semantic Data Model (COVIDCRFRAPID) & en & pt-br & Multilingual Labels \\ \hline Data Catalog Vocabulary (DCAT-FDC) & en & ar, da, el, cs, es, fr, it, ja & Multilingual Labels \\ \hline VEuPathDB Ontology (EUPATH) & en & fr, pt & Multilingual Labels \\ \hline Clinical LABoratory Ontology (LABO) & en & fr & Multilingual Labels \\ \hline The MOSAiC Ontology (MOSAIC) & en & es & Multilingual Labels \\ \hline Nanbyo Disease Ontology (NANDO) & en, ja & - & Multilingual Labels \\ \hline Ontology for Biomedical Investigations (OBI) & en & zh & Multilingual Labels \\ \hline Ontology for Biobanking (OBIB) & en & zh & Multilingual Labels \\ \hline Ontology of Chinese Medicine for Rheumatism (OCMR) & en & zh & Multilingual Labels \\ \hline Ontology of Units of Measure (OM) & en & ja & Multilingual Labels \\ \hline Emergency Care Ontology (ONTOLURGENCES) & fr & en & Multilingual Labels \\ \hline The Prescription of Drugs Ontology (PDRO) & en & fr & Multilingual Labels \\ \hline Radiology Lexicon (RADLEX) & de, en & - & Multilingual Labels \\ \hline Sequence Ontology (SEQ) & en & it & Multilingual Labels \\ \hline Viral Disease Ontology Trunk (VDOT) & en & de & Multilingual Labels \\ \hline \hline \end{tabular} \end{threeparttable} \end{table*} \subsection{Identification of Multilingual Ontologies} \label{sec:review_ontologies_identification} The results of the dataset from BioPortal is included in Table~\ref{table:multilingual_ontologies}, with both the primary language(s) and any other natural languages indicated. Of the 266 ontologies, 18 ontologies were identified as multilingual. Their Cov and LCom\textsubscript{lang} metrics are included in Table~\ref{table:multilingual_ontologies_metrics}. For example, for OM, LCom\textsubscript{en} and LCom\textsubscript{ja} is 33.9\% and 2.0\% respectively, where `ja' is the language code for Japanese. If we exclude from consideration all natural languages with 5\% or less completeness in an ontology, then CL, EUPATH, MOSAIC, OBI, OBIB, OCMR, and OM no longer qualify as a multilingual ontology. The extent of multilingualism of the ontologies, including all natural languages regardless of their completeness, amounts to 6.77\% of BioPortal's production ontologies in the dataset. Excluding those natural languages with $\leq 5\%$ completeness, then multilingualism is only 4.14\%. \begin{table*}[t] \begin{threeparttable} \fontsize{6}{10}\selectfont \caption{\label{table:multilingual_ontologies_metrics} Label Metrics: Language-specific Coverage (LCom\textsubscript{lang}) Compared to Total Element Count (Cov) for that Ontology, for each BioPortal ontology identified as multilingual.} \begin{tabular}{@{}p{1.55cm}||M{0.9cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}|M{0.6cm}@{}} \hline \textbf{Ontology} & \textbf{Cov} & \textbf{ar} & \textbf{cs} & \textbf{da} & \textbf{de} & \textbf{el} & \textbf{en} & \textbf{es} & \textbf{fr} & \textbf{it} & \textbf{ja} & \textbf{pt} & \textbf{pt-br} & \textbf{ru} & \textbf{zh} \\ \hline \hline ATOL & 2 352 & - & - & - & - & - & 100\% & - & 100\% & - & - & - & - & - & - \\ \hline CIDOC-CRM & 372 & - & - & - & 92.5\% & 87.4\% & 99.7\% & - & 87.4\% & - & - & 87.4\% & 87.1\% & 90.9\% & - \\ \hline CL & 16 846 & - & - & - & - & - & 1.3\% & - & -& - & - & - & - & - & 0.1\% \\ \hline COVIDCRFR. & 407 & - & - & - & - & - & 78.9\% & - & - & - & - & - & 53.8\% & - & - \\ \hline DCAT-FDC & 39 & 41.0\% & 89.7\% & 92.3\% & - & 41.0\% & 94.9\% & 89.7\% & 41.0\% & 94.9\% & 41.0\% & - & - & - & - \\ \hline EUPATH & 4 184 & - & - & - & - & - & 15.5\% & - & 0.02\% & - & - & 0.1\% & - & - & - \\ \hline LABO & 204 & - & - & - & - & - & 90.7\% & - & 10.3\% & - & - & - & - & - & - \\ \hline MOSAIC & 282 & - & - & - & - & - & 37.9\% & 3.2\% & - & - & - & - & - & - & - \\ \hline NANDO & 2 733 & - & - & - & - & - & 100\% & - & - & - & 100.\% & - & - & - & - \\ \hline OBI & 4 733 & - & - & - & - & - & 25.7\% & - & - & - & - & - & - & - & 0.1\% \\ \hline OBIB & 1 949 & - & - & - & - & - & 32.1\% & - & - & - & - & - & - & - & 0.2\% \\ \hline OCMR & 3 471 & - & - & - & - & - & 5.0\% & - & - & - & - & - & - & - & 1.3\% \\ \hline OM & 833 & - & - & - & - & - & 33.9\% & - & - & - & 2.0\% & - & - & - & - \\ \hline ONTOLURG. & 10 092 & - & - & - & - & - & 28.2\% & - & 99.0\% & - & - & - & - & - & - \\ \hline PDRO & 239 & - & - & - & - & - & 74.1\% & - & 62.3\% & - & - & - & - & - & - \\ \hline RADLEX & 46 813 & - & - & - & 46.3\% & - & 46.5\% & - & - & - & - & - & - & - & - \\ \hline SEQ & 5 & - & - & - & - & - & 80.0\% & - & - & 80.0\% & - & - & - & - & - \\ \hline VDOT & 208 & - & - & - & 37.0\% & - & 29.8\% & - & - & - & - & - & - & - & - \\ \hline \hline \end{tabular} \end{threeparttable} \end{table*} \begin{table} \begin{threeparttable} \fontsize{8}{12}\selectfont \caption{\label{table:multilingual_datasets} Comparison of BioPortal to LOV} \begin{tabular}{@{}p{5cm}||M{1.3cm}|M{1.3cm}@{}} \hline \textbf{} & \textbf{BioPortal} & \textbf{LOV} \\ \hline \hline Number of ontologies in dataset & 266 & 521 \\ \hline \hline \textbf{Completeness $>0\%$} & & \\ \hline Multilingual ontologies & 18 & 82 \\ \hline Percentage of multilingualism & 6.77\% & 15.74\% \\ \hline Total Cov of all multilingual ontologies & 95 762 & 14 644 \\ \hline Mean of Total Cov & 5 320.11 & 178.59 \\ \hline Median of Cov & 1 391 & 66 \\ \hline \hline \textbf{Completeness $>5\%$} & & \\ \hline Multilingual ontologies & 11 & 74 \\ \hline Percentage of multilingualism & 4.14\% & 14.20\% \\ \hline Total Cov of all multilingual ontologies & 63 464 & 9 203 \\ \hline Mean of Total Cov & 5 769.46 & 124.37 \\ \hline Median of Cov & 372 & 63 \\ \hline \hline \end{tabular} \end{threeparttable} \end{table} \begin{figure}[h] \centering \includegraphics[width=0.40\textwidth]{graphics/boxplot.png} \caption{Sizes of multilingual ontologies in LOV compared BioPortal (excluding the outliers ONTOLURGENCES and OM from the BioPortal dataset, and OBI from the LOV dataset, due to visualisation constraints on the graph). A zoomed-in view of LOV is provided on the left. The connecting line between LOV and BioPortal shows the mean between both, and the red line in each is the median.} \label{fig:graph_boxplot} \end{figure} For the LOV dataset, of the 521 vocabularies, 82 multilingual vocabularies were identified, amounting to 15.74\% multilingual. The Cov and LCom\textsubscript{lang} metrics were computed on them as well, but due its size, we made them available as online supplementary material at \url{https://fynbosch.com/article-2022-bioportal-lov-review}. If we exclude those natural languages with $\leq 5\%$ completeness, then multilingualism reduces to 14.20\%. The top 5 languages in LOV is English first, followed by Italian, French, Spanish and German. The smallest vocabulary is TI, with a Cov of 4, and the biggest is OBI\footnote{In LOV, OBI has the acronym of `OBO'; to avoid confusion, we use the acronym OBI as it is the ontology's known acronym.}, with a Cov of 4731. However, OBI is also one of the vocabularies that does not qualify as multilingual if we exclude natural languages with $\leq 5\%$ completeness. If vocabularies with a completeness greater than 5\% are considered, then the biggest vocabulary is KM4C with a Cov of 1033. The vocabularies that support the most number of natural languages is BTO, LINGVO, and MIL, with 16. Again, if we exclude for $\leq 5\%$ completeness, then only BTO supports 16 languages, with LINGVO and MIL dropping to 6 and 3 respectively. The number of vocabularies for each natural language (with $>5\%$ completeness) is in alphabetical order: Afrikaans~(5), Arabic~(2), Catalan~(1), Chinese~(1), Czech~(5), Danish~(3), Dutch~(9), English~(74), Estonian~(1), Farsi~(1), Finnish~(2), French~(27), German~(19), Greek~(1), Italian~(31), Japanese~(2), Korean~(3), Portuguese~(8), Romanian~(5), Russian~(6), Slovak~(1), Spanish~(20), Swedish~(6), and Turkish~(1). \begin{table} \begin{threeparttable} \fontsize{8}{12}\selectfont \caption{\label{table:language_distribution} Number of vocabularies (Vocabs) with 2--16 natural languages in LOV, with language completeness of $>0\%$ compared to $>5\%$} \begin{tabular}{@{}p{3cm}||M{2.3cm}|M{2.3cm}@{}} \hline \textbf{Natural Languages} & $|$\textbf{Vocabs}$|$ with $>0\%$ & $|$\textbf{Vocabs}$|$ with $>5\%$ \\ \hline \hline 2 & 65 & 58 \\ \hline 3 & 3 & 3 \\ \hline 4 & 2 & 2 \\ \hline 5 & 2 & 2 \\ \hline 6 & 1 & 2 \\ \hline 7 & 0 & 0 \\ \hline 8 & 1 & 1 \\ \hline 9 & 0 & 0 \\ \hline 10 & 0 & 0 \\ \hline 11 & 5 & 5 \\ \hline 12 & 0 & 0 \\ \hline 13 & 0 & 0 \\ \hline 14 & 0 & 0 \\ \hline 15 & 0 & 0 \\ \hline 16 & 3 & 1 \\ \hline \hline \end{tabular} \end{threeparttable} \end{table} By number and percentage of ontologies, LOV seems much more multilingual than BioPortal. It is not that simple, which can be seen from the data in Table~\ref{table:multilingual_datasets} and the boxplot in Figure~\ref{fig:graph_boxplot}. We calculated both the mean and median of the multilingual ontologies in each dataset, summing the Cov metric of each multilingual ontology, to determine if the ontologies and vocabularies between BioPortal and LOV are similarly sized. The mean of the BioPortal multilingual dataset is 5~320.11 (95~762/18), and the mean of the LOV multilingual dataset is 178.59 (14~644/82). That is, while the percentage of multilingualism is higher in the LOV dataset, those ontologies are much smaller. Whether they are more multilingual because they are smaller, or for another reason, cannot be determined from the data. The language distribution for LOV is shown in Table~\ref{table:language_distribution}. \section{Management Options for Multilingual Ontologies} \label{sec:managing_multilinguality} Multilingual ontology management is the management of the multilingual aspects of an ontology in an Ontology Development Environment (ODE), whichever form the tooling may take. To be able to do this effectively, such tools need to meet a set of requirements at least to some extent. Of the requirements that were identified, three broad categories emerged: \textit{multilinguality}, \textit{interaction} and \textit{system architecture}. For \textit{multilinguality}, this concerns the ability to implement and manage the different modelling options beyond that of multilingual {\tt rdfs:label}s. \textit{Interaction}, refers to the need for an end-user to at least view an ontology localised to a specific natural language. In addition to this, OWL verbalisation was also identified as a requirement, in a similar vein to that provided by NORMA, a modelling tool for Object-Role Modelling (ORM)\footnote{ORM is a fact-based modelling language formalised with a logic-based reconstruction in first order predicate logic. Using controlled natural languages, verbalisations are visualised for objects and their roles (relations) \cite{Halpin:Curland:2006}.}. This can be similarly applied to an OWL user. Using a controlled natural language for a language allows easier evaluation of those language-specific labels, particularly when used in combination with the different modelling options for multilinguality. For \textit{system architecture}, versioning is a necessity, particularly if the ontology is used by other resources. Although this is not unique to multilingual ontologies, it is more pressing since more can change and has to be maintained in a multilingual setting. There is also an expectation that multiple authors edit the same OWL `codebase', be it the file as the ontology size starts to increase and needing more domain experts, or the related language files, since then also expert linguistic and translation roles may become a necessary. Lastly, guiding principles for scientific data management and stewardship, known as FAIR, were proposed by \cite{Wilkinson:EtAl:2016} in 2016. Since then, the community uptake has been rapid \cite{Jacobsen:EtAl:2020}, with the result that the FAIR principles\footnote{\url{https://www.go-fair.org/fair-principles/}} have also been included with the set of requirements identified for multilingual ontology management. In order to compare tooling support for developing and maintaining multilingual ontologies, we will use the following specific set of requirements: \begin{compactenum} \item \textit{Linguistic Model.} One or more linguistic models should be associable with an editor, ideally with a user interface provided to manage each respective model. \item \textit{Lexicons.} Like that of linguistic models, lexicons should also be able to be associated with an editor, with a user interface provided to view and/or manage them. \item \textit{Mappings.} The bridging axioms/mappings between one or more monolingual ontologies (localisations) should be manageable within a multilingual ontology. Although semantic mappings are typically set in a separate document, a user interface specifically to manage them is deemed useful. \item \textit{Localisation and viewing thereof.} An ontology can be localised on both its lexical and semantic layers. If lexical only, the underlying ontology does not change. It should be possible to view the localisation of a multilingual ontology. \item \textit{Verbalisation.} The verbalisations of entities and axioms using a controlled natural language can bridge the gap between knowledge engineers and domain/language experts \cite{Jarrar:Keet:Dongilli:2006}, therefore verbalisations of OWL statements using a controlled natural language should be possible for each of the languages supported in the multilingual ontology. \item \textit{Synchronisation.} This refers to synchronising localised ontologies to any changes in the external ontology. \item \textit{Multi-Role Collaboration.} In the multilingual ontology development cycle, in addition to the knowledge engineer and domain expert roles, the language expert role is also required \cite{Keet:2018, Dragoni-EtAl:2013}. \item \textit{Versioning.} Versioning of the ontology should be supported in the ODE beyond that of versioned IRIs. Versioning can be state-based or change-based \cite{Dragoni:Ghidini:2012}. For the latter, this should include a history of changes to an ontology, with provenance for each action. For the former, snapshots of the dataset should be able to be taken, with users able to view a specific snapshot, either at resource-level or maintain that snapshot-state as they navigate through the ontology. \item \textit{FAIR Principles.} The ODE should make it possible for the FAIR principles to be supported, where applicable, for an ontology. Of the ten principles, we assume that all but F4 and A2 apply to ontologies and RDF documents; the others are excluded as they apply to the ontology, not the ODE. However, the ontology editor should provide a means to manage the metadata. For instance, for F1's unique identifiers, they should be assignable by the ontology editor (but to be globally unique, there is a dependency on A1), and also F3 and I1 should be supported by the ontology editor, as should F2, I2, I3 and R1 (though noting that making a functionality available may not make the ontology engineer use it to fulfil each principle). \end{compactenum} Requirements 1--3 relate to \textit{multilinguality}, 4 and 5 to \textit{interaction}, and 6--9 to \textit{system architecture}. \subsection{Review of Tools for Multilingual Ontology Management} \label{sec:manage_review} A list of ODEs, plugins, and systems were identified in the literature to support (or in some instances, possibly support) the management of multilingual ontologies. They are briefly described first. General ontology editors included are Prot\'eg\'e, the NeOn Toolkit, Moki, and OntoWiki. Prot\'eg\'e for OWL is a free and open-source ODE available for both desktop and web \cite{Musen:2015}, which remains under active development; the current desktop version released in 2019 is 5.5.0. The NeOn Toolkit (incl. the LabelTranslator plugin) was an open-source ODE consisting of thirty plugins \cite{Adamou:EtAl:2012, Erdmann:Walter:2012, Espinoza:Gomez-Perez:Montiel-Ponsoda:2009}, and last updated in December 2011. MoKi is a wiki-based conceptual modelling tool for ontologies and business process models \cite{Dragoni-EtAl:2013, Ghidini:EtAl:2009}, but at time of writing, the website was not available. OntoWiki is an open-source wiki-type platform for managing semantic content \cite{Martin:EtAl:2011}, which remains under active development, with the last update in July 2017. TopBraid Composer (Maestro edition) \cite{TopBraid:2020} was considered, but as access to the free edition is no longer available, its was excluded from the comparison. Broadening the scope, also two Prot\'eg\'e plugins were included: NaturalOWL and OntoLing. NaturalOWL is an open-source natural language generation system for version 4.1 of Prot\'eg\'e, and was last updated in 2014 \cite{Androutsopoulos:Lampouras:Galanis:2014}. OntoLing is an open-source plugin to support the linguistic enrichment of ontologies \cite{Pazienza:Stellato:2005}, which was last updated in 2006 and is compatible up to version 3.3.1 of Prot\'eg\'e. Further, we included VocBench 3, which is an open-source web platform for the management of RDF datasets \cite{Stellato:EtAl:2020}. It remains under active development and at time of writing, was at version 3.7.0, provides ``an almost Full coverage of OWL2 expressions", and is primarily intended for managing thesauri, vocabularies and lightweight ontologies \cite[p.17]{Stellato:EtAl:2020}. In addition to this, the following tools were identified as possible candidates, but upon closer inspection, they are primarily for lexicography and vocabulary management, which is out of scope: (1) LexO, a web editor used for the creation of linked data resources using OntoLex-Lemon \cite{Bellandi:EtAl:2017, Bellandi:Giovannetti:2020}, (2) Tedi, a multilingual terminology editor which uses a shared ontology to link different terms \cite{Papadopoulou:Roche:2018, Tedi:2020}, and (3) TemaTres, a web application to manage controlled vocabularies \cite{TemaTres:2021}. Of the tools examined, some were no longer available for download (notably MoKI) so assessments were done from information in the literature and available screenshots. All other tools were locally installed for the purpose of inspection. Each tool was then examined against afore-mentioned requirements. \begin{table*}[t] \begin{threeparttable} \fontsize{9}{12}\selectfont \caption{\label{table:multilingual_ontology_management} Feature Assessment of Selected Tools; see text for details} \begin{tabular}{@{}p{2.1cm}||M{1.05cm}||M{1.05cm}|P{1.05cm}|M{1.05cm}||M{1.05cm}|M{1.05cm}||M{1.05cm}|M{1.05cm}|M{1.05cm}|M{1.05cm}@{}} \hline \textbf{ODE} & \textbf{OWL~2} & \multicolumn{3}{c||}{\textbf{Multilinguality}} & \multicolumn{2}{c||}{\textbf{Interaction}} & \multicolumn{4}{c}{\textbf{System Architecture}} \\ \hline & & (1) & (2) & (3) & (4) & (5) & (6) & (7) & (8) & (9) \\ & & Ling. Model & Lexicons & Mapp. & Localis. & Verbal. & Synchr. & Multi-Role Collab. & Version. & FAIR\\ \hline \hline MoKi & - & - & - & \checkmark & - & - & - & \checkmark & - & N/A \\ \hline NaturalOWL & \checkmark & - & \checkmark & - & - & \checkmark & - & - & - & 3 \\ \hline NeOn & \checkmark & \checkmark & \checkmark & - & - & - & - & \checkmark & \checkmark & 8 \\ \hline OntoLing & - & - & \checkmark & - & - & - & - & - & - & 2 \\ \hline OntoWiki & - & - & - & - & - & - & - & - & \checkmark & 8 \\ \hline Prot\'eg\'e 5.x & \checkmark & - & - & - & - & - & - & - & - & 8 \\ \hline VocBench 3 & Some & \checkmark & \checkmark & \checkmark & - & - & - & \checkmark & \checkmark & 8 \\ \hline \hline \end{tabular} \end{threeparttable} \end{table*} The outcomes of the tool assessment against the requirements are shown in Table~\ref{table:multilingual_ontology_management}, with the column headings aligning to that of the requirements, with an additional column to indicate whether the tool supports OWL~2. We briefly discuss selected features for applicable tools. \begin{itemize} \item \textbf{Linguistic models:} A linguistic model is integrated with both NeOn and VocBench~3, with user interfaces provided for both. For the former, this is by way of the LabelTranslator plugin, which supports the Linguistic Information Repository (LIR) model \cite{Adamou:EtAl:2012, Espinoza:Gomez-Perez:Mena:2008}; the latter provides support for OntoLex-Lemon \cite{Stellato:EtAl:2020}. \item \textbf{Lexicons:} For NaturalOWL, an interface is provided to both view and manage the lexicon entries; however, only the English and Greek languages are supported \cite{Androutsopoulos:Lampouras:Galanis:2014}. For NeOn, the lexical entries can be managed separately from the ontology entities, and, in theory, any number of natural languages can be supported \cite{Espinoza:Gomez-Perez:Mena:2008}. For OntoLing, an interface is provided to load and view an external linguistic resource from WordNet or a bilingual dictionary from the DICT Interface for Bilingual Dictionaries \cite{Pazienza:Stellato:2005}. In VocBench 3, lexicons and lexical entries are manageable via the user interface, with any number of natural languages able to be supported \cite{Stellato:EtAl:2020}. \item \textbf{Mappings:} For multilingual mappings, MoKi's dictionary-based translation (DBT) service is used \cite{Dragoni:Ghidini:Bosca:2013}, and for VocBench 3, SKOS is used as the mapping model \cite{Stellato:EtAl:2020}. \item \textbf{Localisations:} Lexical localisations in the form of language-tagged {\tt rdfs:label} strings are typically shown in Prot\'eg\'e. If a particular language has been set, and the user changes their operating system localisation to that language, Prot\'eg\'e will default to this language. It is not possible to visualise any language-specific conceptualisations in the available tools for an ontology. \item \textbf{Verbalisations:} Only NaturalOWL offers this feature, in both English and Greek \cite{Androutsopoulos:Lampouras:Galanis:2014}. Ontology verbalisation and, more broadly, natural language generation from ontologies, is a well-known task, but this is typically done in `third-party' tools or proof-of-concept tools \cite{BouayadAgha14,Safwat16}, such as \cite{KXK17} for isiZulu and in application scenarios like multiple-choice question generation \cite{Kurdi20}. \item \textbf{Multi-Role Collaboration:} Multi-role collaboration is supported by MoKi, including the language expert role \cite{Dragoni-EtAl:2013}. For NeOn, there is a Collaboration Support plugin which only provides support for the Viewer, Subject Expert and Validator roles \cite{NeOnCollaboration:2011}. VocBench 3 supports multi-role collaboration with role-based access control for areas, subjects and scopes \cite{Stellato-EtAl:2017}. Project-local roles provide support for Ontology Editors, Thesaurus and Lexicography Editors, and Validators. For Lexicography Editors, this role can be limited to edit selected natural languages only. Collaborative Prot\'eg\'e \cite{Tudorache:2009} is available for Prot\'eg\'e 3, but as it is not compatible with newer versions, it has not been considered here. The more recent WebProt\'eg\'e is intended for collaboration, which is mainly multiple people in general without designated roles \cite{Horridge19}. \item \textbf{Versioning:} OntoWiki provides support for change-based versioning of RDF data, with all activities tracked, and provenance provided for each changeset \cite{Martin:EtAl:2011, Frischmuth:EtAl:2015}. NeOn provides support for change-based versioning using the Change Capturing plugin \cite{NeOnChange:2011}. VocBench 3 provides support for both change-based and state-based versioning: the former is supported via a history, and for the latter, snapshots of the ontology are also supported \cite{Stellato:EtAl:2020, Stellato-EtAl:2017}. A user can then switch their user interface view between snapshots globally or at resource-level. \item \textbf{FAIR Principles:} NaturalOWL supports I1, I2 and I3, and OntoLing I1 and R1. NeOn, OntoWiki, Prot\'eg\'e and VocBench 3 provide support for all eight principles: F1, F2, F3, A1, I1, I2, I3, and R1. \end{itemize} Overall, VocBench~3 has been shown to be the most promising for managing multilingual ontologies; however, due to its partial support of OWL~2~DL, it is currently more suited to lightweight ontologies or vocabularies. For managing an OWL~2~DL ontology, Prot\'eg\'e is the only option available of actively supported tools, yet to implement any of the multilingual options beyond that of annotations is challenging, as the GUI does not provide alternative views of multilingual information. \section{Discussion} \label{sec:discussion} We revisit the questions from Section \ref{sec:introduction} for a brief discussion. Concerning RQ1, the available modelling options to develop a multilingual ontology, we described nine principal approaches to do so, which were described in Section~\ref{sec:modelling_multilinguality}. The ad hoc visual language may further help to compare or extend any of the approaches, as well as `allocate' one's ontology into one of the approaches when developing a multilingual ontology, or serve as model for a module that could extend an ODE. It also served in the assessment of the extant ontologies and tooling support for developing multilingual ontologies, of which the main observations are that there is very little tooling support (RQ3) and mostly only simple labels are used (RQ2a), as described in Section~\ref{sec:managing_multilinguality} and Section~\ref{sec:review_ontologies_bioportal}, respectively. For the tooling, in particular the interaction with the ontology (localisation and verbalisation) and support for OWL DL or OWL 2 DL can be improved upon, as well as role and versioning support since a multilingual ontology is expected to be a collaboration between multiple parties simultaneously. Percentages of permeation of multilingual ontologies (RQ2b-d) showed that there is a low uptake with 6.77\% for the BioPortal dataset and 15.74\% in the LOV dataset. Even for the higher LOV percentage, the ontologies are substantially smaller than in BioPortal and they are mostly thesauri and vocabularies, i.e., lightweight ontologies at best. In time, although the 433 multilingual ontologies from Watson (1.7\% of 25~467) is higher than the number found here, this may indeed be less or, perhaps more likely, due to sampling and inclusion criteria, since the ratio of multilingual ontologies has increased. For instance, only `production' ontologies from BioPortal and vocabularies returning a `200' HTTP status code in LOV were considered, but if ontologies with alternative statuses were also analysed, there may be more, since prior versions may also be multilingual and new alpha or beta versions might have made use of an alternative modelling option. Overall, the amount of research on multilingual ontologies especially in the 2010s has not translated to a widespread, or even a modest, uptake of the development of multilingual ontologies or tooling support for their development. The data, be it in RDF or similar formats, are distinctly multilingual and increasingly so (recall Section~\ref{sec:related_work} with, among others, \cite{Ell:Vrandecic:Simperl:2011,Kaffee:Simperl:2018}, and Figure~\ref{fig:timeline}), however, and data needs models for management, for which ontologies are exceedingly suited. There may be many reasons for these two mismatches, which could provide ample options for future work. Among others, one could conduct a survey with ontology engineers to attempt to elucidate the reasons for low multilinguality uptake or try to estimate how often the `simple' labelling options do not suffice to be needing a more extensive linguistic model. \section{Conclusion} \label{sec:conclusion} The review of multilingual ontologies showed that there is comparatively limited uptake, and even then with only multilingual labels and a limited number of languages. In this assessment, we devised an ad hoc visualisation method to facilitate comparison of the 9 identified mechanisms of modelling multilinguality in (the TBox of) ontologies, and created a set of tool requirements for managing multilingual ontologies. A review of seven relevant ontology editors showed that there are significant gaps in tooling support, with no single tool that supports all the identified requirements, but with VocBench 3 arriving the closest. Multilingualism in production-level BioPortal ontologies revealed that English was used in every multilingual ontology, which was followed by French and German, with English, Italian and French for LOV, reaching 6.77\% for the BioPortal dataset and 15.74\% in the LOV dataset overall. Regarding future research, it may first need to be established why there is limited uptake of multilingualism. A comparison of the 9 principal approaches `in action', be it for ontology development or a particular ontology-driven task, may shed light on feasibility of the modelling approaches and of the tooling support and shortcomings. Surveys among ontology developers may further elucidate why multilingual ontologies were developed, or explicitly not pursued. \subsubsection*{Acknowledgments} This work was financially supported by Hasso Plattner Institute for Digital Engineering through the HPI Research School at UCT [FGW] and the National Research Foundation (NRF) of South Africa (Grant Number 120852) [CMK].
\section{Introduction} \label{sec:intro} Keyword spotting~(KWS) is to identify a target keyword in the continuous audio streams, which is broadly deployed as a front door to voice assistants in several edge devices such as smartphones and AI speakers. In general, KWS systems predetermine target keywords and are directly optimized for selected keywords. Although existing predefined KWS models show high detection performance~\cite{rybakov2020streaming, berg2021keyword, kim2021broadcasted}, the necessity of a large dataset containing target keywords and inflexibility of changing target keywords hinder KWS models from expanding to various applications. When it comes to user-defined KWS, users can customize the target keywords with only a few enrollment samples~\cite{chen2018meta, mazumder2021few, huh2021metric, parnami2022few} or in the form of string~\cite{sacchi2019open, shin2022learning}. Few-shot KWS~(FS-KWS) especially has shown its feasibility through meta learning~\cite{chen2018meta}, transfer learning~\cite{mazumder2021few}, and metric learning~\cite{huh2021metric, parnami2022few}, operating on the few-shot detection scenario. These approaches typically require learning from a large corpus with lots of different keywords to secure generalization on unseen keywords with few samples. However, user-defined KWS despite its potential in diverse usability has been underexplored due to the deficiency of a large high quality public corpus. Recently, with dramatic advances in deep generative models, there have been several approaches that leverage generative models as a data source to compensate for insufficient or unavailable labeled data. For example, data augmentation using synthesized data has been explored in KWS and automatic speech recognition~(ASR)\cite{lin2020training, chen19f_interspeech, hu2022synt++}. Text-to-speech~(TTS) models are utilized to supplement the less frequent utterances such as named entities which are difficult to collect in the real world. In the vision domain, Besnier et al.~\cite{besnier2020dataset} effectively trains a classifier with several learning strategies only using synthetic image data generated by a conditional GAN. Moreover, Jahanian et al.~\cite{jahanian2021generative} used an unconditional GAN as a data source for representation learning. In ~\cite{jahanian2021generative}, searching in latent space of GAN offers multi-view data sharing the semantics which is necessary for training contrastive objective of representation learning. The aforementioned approaches show that the synthesized dataset has the potential to substitute a real dataset, not only bounded to taking a role as a subsidiary dataset. In this paper, we propose a novel framework for FS-KWS trained on only synthetic data. The proposed framework is based on metric learning so as to detect target keywords with few-shot enrollments. We assume that a good FS-KWS model can extract phonetic information from any short utterances and make clusters of any arbitrary phonetic chunks from various voices. Our motivation stems from the question of whether a labeled KWS dataset is indispensable in metric learning if we can acquire a large bunch of utterances with the same pronunciation by a different route. The notable point is that the metric learning objective in FS-KWS does not require any explicit textual supervision for training. Instead, we exploit pseudo-TTS model~\cite{kim2022transfer}, which is trained on a large-scale unlabeled speech corpus. The pseudo-TTS model takes pseudo phoneme sequence extracted from wav2vec2.0~\cite{baevski2020wav2vec} and reference speech as inputs, and returns utterances with various speakers and prosody reflected. Using a phonetic representation of wav2vec2.0, the pseudo-TTS system takes the role of decomposing the utterances to the fine-grained factors and reassembling to the suitable form for metric learning. We notice that our proposed method is trained in a fully unsupervised manner as all of the components including wav2vec2.0 and pseudo-TTS are trained without any supervision. From our experiments, we find that even without using any real and labeled data, the proposed model demonstrates high performance on KWS datasets~\cite{baevski2020wav2vec, warden2018speech}. The experimental results show the potential of utilizing unsupervised speech synthesis for user-defined KWS. \begin{comment} In this paper, we propose a novel framework for FS-KWS which is trained on only synthetic data. The proposed framework is based on metric learning so as to detect target keywords with few-shot enrollments. As the explicit textual supervision is not employed for training, the labeled KWS dataset is not indispensable. Instead, we exploit pseudo-TTS model~\cite{kim2022transfer}, which is trained on large-scale unlabeled speech corpus. The pseudo-TTS model takes pseudo phoneme sequence extracted from wav2vec2.0~\cite{baevski2020wav2vec} and reference speech as inputs, and returns utterances with various speakers and prosody reflected. By using a phonetic representation of wav2vec2.0, the pseudo-TTS model takes the role of decomposing the utterances to the fine-grained factors and reassembling to the suitable form for metric learning. We can earn massive amount of diverse multi-view samples with the same pronunciation, which is crucial in extracting good representations of phonetic information of short utterances, by leveraging the pseudo TTS model. From our experiments, we find that even without using any real and labeled data, the proposed model demonstrate high performance on KWS datasets~\cite{baevski2020wav2vec, warden2018speech}. The experimental results show the potential of utilizing speech synthesis for user-defined KWS. \end{comment} \begin{comment} As the objective in 3.1 does not require any textual supervision, we assume that the text-labeled corpus is not necessary for such objectives. Instead, we focus the necessity of the diversity of utterances to get representation of pronunciation which is essential for KWS. Thus, the main role of the pseudo-TTS model is to generate arbitrary pronunciation chunks with multi-view including speakers, prosody and environments. The proposed method is trained with the synthetic data sampled from the speech synthesis model, pseudo-TTS\cite{kim2022transfer}. Pseudo-TTS can generate various utterances without any text but using pseudo-phonemes obtained by Wav2Vec2.0\cite{baevski2020wav2vec} embedding controlling the speaker by reference speech and prosody by manipulating duration information and latent variables. Since Pseudo-TTS is trained in a fully unsupervised manner, the entire procedure of the proposed method is only requires unlabeled dataset. We assume that FS-KWS model should make clusters of utterances with the same pronunciation. In order to fulfil the assumption, utterances of the same pronunciation from diverse speakers and prosody are required. We take advantage of Pseudo-TTS in that it is capable of generating any pronunciation even that of nonexistent words which are not readily attainable in the real dataset. We find that even without using any real data, the proposed model demonstrated high performance on real dataset []. The experiment results show the potential of utilizing TTS model for user-defined KWS. \end{comment} \section{Backgrounds} \label{sec:format} \subsection{Metric Learning based KWS} Most current KWS models are trained and evaluated under classification objectives, treating all the possible non-target keywords as a single class. Although there exist countless non-target sounds, limited non-target samples are used during training, which can inhibit the detection performance. Furthermore, customizing target keywords in the classification scenario is difficult since the models are not trained to distinguish the diversity of non-target sounds and only respond to the original target keywords. To overcome these problems, several metric learning based KWS models have recently arisen. The goal of metric learning for KWS is to acquire a general representation for KWS and detect target keywords using distance metrics. For example, Huh et al.\cite{huh2021metric} explore several metric learning objectives such as triplet loss\cite{hoffer2015deep} and prototypical loss\cite{snell2017prototypical} for training KWS. In addition, Kim et al.\cite{kim2022dummy} suggest a multiple dummy prototype generator to handle open-set queries efficiently. Considering that KWS is closer to the detection task rather than the classification task in the real-world scenario, metric learning methods are advantageous over classification approaches, effectively tackling unknown category samples via distance metrics. \begin{comment} Our motivation for adopting metric learning methods is that if the KWS model is proficient in clustering any pronunciation chunks with common characteristics, the model can detect sounds of random keywords even though they are not seen during training. Besides, The fact that any text labels are not involved when training with metric learning objective lead to our main motivation, which is fully unsupervised training of the KWS model. \end{comment} \subsection{TTS with pseudo phoneme} In \cite{kim2022transfer}, TTS with pseudo phoneme was firstly proposed for the transfer learning framework for low-resource TTS. The pseudo phoneme is a phonetic token that can be obtained without any text labels. Instead, the pseudo phoneme is extracted from an unlabeled speech by k-means clustering of wav2vec2.0 embeddings which contain rich phonetic information. Kim et al.~\cite{kim2022transfer} pre-trained VITS~\cite{kim2021conditional} based TTS model using the pseudo phoneme and fine-tuned the pre-trained model on a small amount of transcribed corpus with real phoneme. For convenience, we refer to the pre-trained model in \cite{kim2022transfer} to pseudo-TTS model. The pseudo-TTS model takes pseudo phoneme sequence and a reference speech as inputs and returns synthesized speech that contains phonetic information of pseudo phoneme with the speaker and prosody of reference speech. Using the pseudo-TTS model, with only unlabeled speech corpus, we can get massive groups of the same pronunciation spoken by various speakers with diverse prosody. \section{Proposed method} \label{sec:pagestyle} In this section, we describe the overall framework of the proposed method. The proposed method uses the pseudo-TTS model as a data source for training FS-KWS with metric learning objective. The entire framework is depicted in Figure\ref{figure1}. \subsection{Training} \label{ssec:subhead} \subsubsection{Training objective} \label{ssec:objective} Among the methods of metric learning, we adopt prototypical networks~\cite{snell2017prototypical} which operate in $N$-way $K$-shot classification, where $N$ and $K$ denote the number of classes and supports respectively. At each iteration, the encoder takes $N\times(K+1)$ input speech $x_{1:N, 1:K+1}$ and returns output embeddings. Here, we fix the number of queries per class to 1 for simplicity, so that $x_{n, 1:K}$ represents the support set and $x_{n, K+1}$ represents the query for class $n$. The training objective is formulated as (1)-(3). \begin{equation} \label{eq:kld1} c_n = \frac{1}{K} \sum_{k = 1}^{K} f_\phi(x_{n,k}), \end{equation} \begin{equation} \label{eq:kld2} p(y=n|x) = \frac{\exp(-dist(f_\phi(x),c_n))}{\sum_{n'=1}^{N}{\exp(-dist(f_\phi(x),c_{n'}}))}, \end{equation} \begin{equation} \label{eq:kld3} L = -\frac{1}{N} \sum_{n=1}^{N} \log{p(y=n|x_{n,K+1})}. \end{equation} In (1), $c_n$ is a prototype of class $n$ and $f_\phi$ denotes the encoder parameterized by $\phi$. In (2), $dist(\cdot,\cdot)$ can be any distance metric for which we used euclidean distance. The objective $L$ represents the cross-entropy loss for the given few-shot classification. \subsubsection{Data generation using pseudo-TTS} \label{ssec:subhead} In the proposed method, the entire data is generated by the pseudo-TTS model~\cite{kim2022transfer}. Although the pseudo-TTS model was originally designed for the pre-training stage of transfer learning, we exploit it to generate arbitrary speech under various conditions. The data generation is processed as follows. First, we sample speech from an unlabeled speech corpus and extract pseudo phonemes. Then, we randomly crop the pseudo phoneme sequences to get the arbitrary pseudo keywords with lengths sampled from $(L_{min}, L_{max})$. Both $L_{min}$ and $L_{max}$ are hyperparameters of data generation. After, we sample reference speech from a speech corpus for the speaker and prosody variability. In consequence, we can generate unlimited amounts of pronunciation chunks in an unsupervised manner. Although the multi-view samples of each pseudo keyword can be obtained by the pseudo-TTS model, the domain mismatch between synthesized and real audio can significantly harm the performance. To make the generated speech more realistic, we used several augmentation schemes. First, we scale the volume of each speech by adjusting the maximum value to a randomly sampled value. Second, we add reverberation by convolution with simulated RIR corpus. Lastly, we add noise to the generated samples using additional noise corpus with various SNR. \subsubsection{Buffered samples for efficient training} \label{ssec:subhead} Generating thousands of seconds of speech demands excessive computations and memory consumption, which induces various practical issues such as slow training. Instead of generating $N\times(K+1)$ samples every iteration, we use a data buffer for efficient training. At the beginning of training, we initialize the buffer with $M_{buffer}\times(K+1)$ samples, where $M_{buffer}> N$. At every iteration, we randomly select $N$ classes from the buffer for training and enqueue and dequeue samples of $M_{update}$ classes in the buffer. In the case of $M_{update}\ll N\ll M_{buffer}$, we can save a considerable amount of speech at every iteration without overfitting to the current buffer. \begin{comment} Ideally, we can generate an infinite amount of data without additional cost using generative models. However, massive data generation will pose practical issues such as memory consumption. Generating data every iteration during training is seemingly to be an alternative, but it may suffer from slower training due to increased computational load or may lead to unstable training due to statistical difference. Therefore, we propose a data buffer for efficient training. The main role of the data buffer is to act as a data reservoir providing diverse ready-made samples for faster training, but also gradually updated during training to keep fresh samples and stay away from overfitting. We initialize the data buffer with $M_{buffer}\times(K+1)$ samples, where $M_{buffer}> N$. At each iteration, we randomly select samples from $N$ classes from the buffer instead of generating $N\times(K+1)$ samples every iteration, and enqueue samples from $M_{update}$ classes to the buffer. In the case of $M_{update}\ll N\ll M_{buffer}$, we can save thousands of seconds of speech every iteration avoiding overfitting to the current buffer. \end{comment} \begin{figure}[ht] \centering \begin{subfigure}{\columnwidth} \includegraphics[width=\columnwidth]{figure_a-cropped.pdf} \caption{Training procedure} \label{fig:speech_production} \end{subfigure}\vspace{0.2cm} \begin{subfigure}{\columnwidth} \includegraphics[width=\columnwidth]{figure_b-cropped.pdf} \caption{Inference procedure} \label{fig:speech_production} \end{subfigure} \caption{The entire framework of the proposed method} \label{figure1} \end{figure} \subsection{Inference} \label{ssec:subhead} First, we collect utterances of target keywords for enrollment. The prototype $c_n$ of each class $n$ is calculated in the same manner as (1). Then, the inference process follows the steps in (4)-(5). \begin{equation} \label{eq: kld4} \hat{y} = \underset{n}{\mathrm{argmin}}\ dist(f_\phi (x), c_n), \end{equation} \begin{equation} \label{eq: kld4} y_{pred} = \begin{cases} \hat{y}, & \mbox{if}\ dist(f_\phi (x), c_{\hat{y}}) < D_{th} \\ \hfil N+1, & \hfil \mbox{else} \end{cases}. \end{equation} In (4)-(5), $\hat{y}$ denotes the candidate class with the maximum ~$p(y=n|x)$, where $x$ denotes input query speech and $y$ denotes the class label. Unlike the training objective which conducts classification, the whole inference process serves as a detection task. Thus, the final output class is determined by the distance to the candidate class. Here, $N+1$ means the `unknown' class. The detection threshold $D_{th}$ can be tuned for the desired false positive rate. \begin{table*}[h] \centering \caption{Results of the experiments. All of the measures are tried 100 times, and the average scores of accuracy and AUROC are written in (\%) with 95\% confidence intervals.} \label{tab:my-table} \begin{tabular}{@{}c|c|ccc|ccc@{}} \toprule \multirow{2}{*}{\textbf{Method}} & \multirow{2}{*}{\begin{tabular}[c]{@{}c@{}}\# of\\ supports\end{tabular}} & \multicolumn{3}{c|}{\textbf{GSCv1}} & \multicolumn{3}{c}{\textbf{MSWC}} \\ & & Acc (target) & Acc (total) & AUROC & Acc (target) & Acc (total) & AUROC \\ \midrule Supervised (MSWC) & \multirow{3}{*}{1-shot} & 69.0$\pm$1.67 & 66.0$\pm$1.03 & 77.8$\pm$1.03 & \textbf{72.8$\pm$1.67} & \textbf{64.8$\pm$1.31} & \textbf{75.9$\pm$1.45} \\ Unsupervised (w/o aug) & & 49.5$\pm$1.21 & 51.4$\pm$0.64 & 64.2$\pm$0.83 & 54.0$\pm$1.36 & 54.2$\pm$0.73 & 66.9$\pm$0.90 \\ Unsupervised (w aug) & & \textbf{76.0$\pm$1.29} & \textbf{69.6$\pm$0.75} & \textbf{81.1$\pm$0.83} & 67.1$\pm$1.20 & 62.2$\pm$0.68 & 74.5$\pm$0.87 \\ \midrule Supervised (MSWC) & \multirow{3}{*}{5-shot} & 90.5$\pm$0.53 & 80.6$\pm$0.44 & 89.4$\pm$0.38 & \textbf{91.7$\pm$0.66} & \textbf{81.8$\pm$0.82} & \textbf{90.9$\pm$0.75} \\ Unsupervised (w/o aug) & & 78.0$\pm$0.82 & 64.3$\pm$0.48 & 74.4$\pm$0.57 & 78.3$\pm$1.01 & 66.9$\pm$0.61 & 77.7$\pm$0.69 \\ Unsupervised (w aug) & & \textbf{91.0$\pm$0.45} & \textbf{82.0$\pm$0.39} & \textbf{90.8$\pm$0.36} & 86.5$\pm$0.79 & 76.2$\pm$0.56 & 86.7$\pm$0.58 \\ \midrule Supervised (MSWC) & \multirow{3}{*}{20-shot} & \textbf{93.7$\pm$0.26} & 83.8$\pm$0.33 & 91.5$\pm$0.30 & \textbf{94.4$\pm$0.40} & \textbf{85.6$\pm$0.57} & \textbf{93.5$\pm$0.47} \\ Unsupervised (w/o aug) & & 86.8$\pm$0.46 & 67.9$\pm$0.50 & 76.7$\pm$0.59 & 86.1$\pm$0.62 & 70.5$\pm$0.78 & 80.4$\pm$0.91 \\ Unsupervised (w aug) & & 93.3$\pm$0.31 & \textbf{85.0$\pm$0.33} & \textbf{92.9$\pm$0.28} & 91.4$\pm$0.43 & 80.3$\pm$0.42 & 89.7$\pm$0.40 \\ \bottomrule \end{tabular} \end{table*} \section{Experiments} \label{sec:typestyle} \subsection{Experimental Settings} \label{ssec:subhead} \subsubsection{Pseudo-TTS implementation} \label{ssec:subhead} To implement the pseudo-TTS model, we used an English part of Multilingual LibriSpeech~(MLS)~\cite{pratap2020mls}, one of the largest public speech corpora with high quality. We did not use any transcript of MLS to satisfy the unsupervised condition. For pseudo-phoneme extraction, we leveraged the pre-trained wav2vec2.0 model from an open source\footnote{https://huggingface.co/facebook/wav2vec2-large-xlsr-53}. We mostly followed the implementation details of \cite{kim2022transfer} including model architecture, hyperparameters, and pseudo phoneme extraction. The only difference is the training dataset and the sampling rate, which was changed from 22kHz to 16kHz. We trained the pseudo-TTS model for 500k iterations. When generating speech, we also sampled pseudo keywords from the English part of MLS. \subsubsection{Model Architecture} \label{ssec:subhead} We adopt TC-Resnet~\cite{choi19_interspeech} with several modifications for the encoder. TC-Resnet is originally composed of residual 1D convolution and batch-normalization blocks, followed by an average pooling layer to aggregate along the time axis. We replace an average pooling layer with a single GRU layer to efficiently capture the temporal dynamics. Then, the output embedding corresponds to the linear projection of the last frame of the GRU layer. We also set the scale factor k of TC-Resnet to 2 for higher model complexity. The model takes 40-dimensional MFCC as an input sequence and returns an output embedding with 192 dimensions. \subsubsection{Implementation Details} \label{ssec:subhead} We trained the KWS model on a 512-way 5-shot scenario. For the data buffer described in 3.1.3, we set $M_{buffer}$ to 32768, and $M_{update}$ to 1 for our experiments. For pseudo keyword generation, we set $L_{min}$ to 10 and $L_{max}$ to 20. These lengths were determined to generate plausible spoken keywords. For data augmentation, we used noise corpus from \cite{snyder2015musan} and RIR coefficients from \cite{ko2017study}. The maximum value for volume scale is sampled from $(0.2, 0.9)$ and SNR is sampled from $(10, 20)$. Noise injection and reverberation are applied with the probability of $0.9$. We trained the model with Adam optimizer with the learning rate $0.001$ and cosine scheduler for 300k iterations. \subsubsection{Evaluation} \label{ssec:subhead} To verify the operation of our proposed method in real-world applications, we evaluated the proposed method on two real KWS datasets: Google Speech Commands version one~(GSCv1)~\cite{warden2018speech} and Multilingual Spoken Word Corpus~(MSWC)~\cite{mazumder2021multilingual}. We measured top-1 accuracy and Area Under ROC~(AUROC) for the experiments, which will be described in detail below.\\ \textbf{GSCv1}: GSCv1 is the most common KWS corpus of 30 keywords in total. We followed the official division of train, validation, and test set of ~\cite{warden2018speech}, and did not use the subset of background noise for our experiments. Since the proposed method operates on the open-set and few-shot scenario, we randomly selected target and unknown keywords. To be specific, we sampled 10 target keywords and treated the remaining 20 keywords as the unknown keyword. Then, we sampled $K$ supports from the train set of each target keyword for enrollment and evaluated the test division. We tested for $K=1, 5, 20$ respectively.\\ \textbf{MSWC}: MSWC is the largest public KWS corpus of multiple languages. Among them, we used the English part of MSWC~(MSWC-en). MSWC-en consists of about 7 million samples of 39 thousand keywords. Firstly, we sampled 100 test keywords that have a number of samples in (2000, 3000). For each test keyword, the first 250 samples are used for the test, and the rest samples are regarded as the pool of supports. Then, at every evaluation, we sampled 10 target keywords and 20 unknown keywords from the test keywords to match the experiment condition with GSCv1. Finally, we randomly enrolled $K$ samples from the support pools and tested them on the selected test set, where we set $K=1, 5, 20$.\\ \textbf{Baseline}: For comparison, we implemented three models: Unsupervised~(w aug), Unsupervised~(w/o aug), and Supervised~(MSWC). Unsupervised~(w aug) is the proposed model with all of the described augmentation methods. Unsupervised~(w/o aug) is trained on the entirely same condition of Unsupervised~(w aug), but without any augmentation. To show the effectiveness of unsupervised training, we additionally set a model trained with supervision. Supervised~(MSWC) is trained on MSWC-en, except for the test keywords under the assumption that the size of MSWC-en is large enough for training FS-KWS. For training Supervised~(MSWC), we sampled $N$ classes and $K$ utterances from each class every iteration as we did for the proposed method. All of the other conditions remained the same, excluding the training dataset. We notice that data augmentation was not used for training Supervised~(MSWC).\\ \textbf{Measure}: We used top-1 accuracy and AUROC for measurement. The accuracy is divided into Acc~(target) and Acc~(total). Acc~(target) is measured only for the target keywords~(10 classes) to show the classification performance. On the contrary, Acc~(total) is the accuracy of classification including the unknown class~(11 classes). As Acc~(total) is determined by $D_{th}$, we fixed $D_{th}$ to the threshold at equal error rate~(EER) of the binary classification of whether the sample is unknown. AUROC is also calculated for the same binary classification. Since the measures are susceptible to not only the selected classes but also selected supports, we tested 100 times and reported the average score with 95\% confidence intervals.\\ \begin{figure}[] \centering \includegraphics[width=\columnwidth]{t-SNE.pdf} \caption{Visualization of embeddings of GSCv1 using t-SNE. Ten keywords~(digits) are treated as target keywords, and the remaining 20 keywords are labeled as `unknown'. We plotted 50 randomly selected samples of each keyword.} \label{fig:t-SNE} \end{figure} \subsection{Results} \label{ssec:subhead} \begin{comment} The entire results of the experiments are presented in Table 1. First of all, the three measures of two accuracies and AUROC have almost same tendency, pointing out that good classifier is also good detector for the proposed framework. The most notable point in the results is the gap of scores based on the augmentation. All of the scores with data augmentation are higher than that without augmentation with a large margin. This tendency reveals the domain mismatch between the synthesized speech and real data, while showing that simple data augmentation schemes can significantly mitigate this problem. Compared to the performance of baseline model trained on real data, it has different tendency on GSCv1 and MSWC. In GSCv1, the proposed method with augmentation mostly got a little higher scores, while evaluation on MSWC shows opposite results. Although the proposed model did not use any labeled even real dataset for training, it shows higher performance in GSCv1, which makes our contributions. As there are also domain mismatches between both of real datasets, the baseline model trained on MSWC got higher scores on MSWC than on GSCv1. In addition, all the scores got higher with the more supports, and the variance of measures has tendency of having large variance when the number of support is small, which represents of the necessity larger supports. For a subjective analysis, we visualized the embedding space of the proposed model in Figure2. We plotted embeddings from GSCv1 and colorized ten keywords~(digits), and treated the remaining keywords as `unknown'. Figure2 shows that embeddings with the same class form clusters well so that the discriminability of each cluster verifies the validity of the proposed training and inference scheme. \end{comment} The overall results are presented in Table 1. First of all, the trend of both accuracy and AUROC measures in all the cases showed almost the same behavior, pointing out that classification performance goes along with detection performance. In addition, all the scores increased as more supports were provided. Also, the variance of scores had a tendency to be larger as the number of supports was smaller. These two tendencies imply the necessity of a sufficient number of supports for enrollment. The most notable point in the results is the performance gap between the model with augmentation and the model without augmentation. Showing significant margins in all the scores, the results imply that generating clean speech itself does not always guarantee the utmost performance in the downstream tasks. However, at the same time, even simple data augmentation schemes can considerably mitigate the domain mismatch between the synthesized speech and the real speech. When comparing the performance on the real dataset between the proposed method and baseline model, different consequences were shown in GSCv1 and MSWC. In GSCv1, the proposed method with augmentation mostly showed slightly higher scores, but showed the opposite in MSWC. This result, we believe is mainly due to a mismatch between train and test domain. More importantly, however, the fact that the proposed model showed higher performance in GSCv1 without any labeled and real dataset for training bolsters our contributions. For a subjective analysis, we visualized the embedding space of the proposed model in Figure 2. We plotted embeddings from GSCv1, where we colorized ten keywords~(digits) and assigned the remaining keywords as `unknown'. Figure 2 shows that embeddings from the same class form cluster well so that the discriminative nature of each cluster verifies the validity of both the proposed training and inference scheme. \section{Conclusion and Discussion} \label{sec:print} In this work, we propose an unsupervised training scheme for few-shot KWS by leveraging a speech synthesis system named pseudo-TTS. The proposed method is based on prototypical networks trained on a massive bunch of multi-view samples with the same phonetic information. For this requirement, we used the pseudo-TTS model which uses pseudo phonemes extracted in an unsupervised manner from wav2vec2.0 representation. The experimental results present that the proposed KWS system shows comparable performance to the supervised training in the real speech domain. From this work, we show that the recent speech synthesis systems with high fidelity and controllability have the potential to replace the labeled dataset for user-defined KWS. However, as there are a lot of approaches that haven't been explored yet, we can extend this work in various directions for future works. First of all, we assume that the diversity of synthesized speech is the most important key to improvement. Although recent speech synthesis systems can effectively control factors including speaker, speech rate, and prosody, there remains a limitation in controllability and a gap of variability between real speech recorded from various conditions. Thus, we will follow up the research on the controllability of speech synthesis and adopt them for keyword generation. In addition, domain adaptation or augmentation can be a breakthrough in utilizing synthetic data, boosting model robustness. Beyond the augmentation methods tried in this work, carefully designed domain matching algorithms should be more explored. Lastly, general improvement in architecture designs and manipulating other metric learning methods can lead to better performance. \begin{comment} From this work, the recent speech synthesis systems with high fidelity and controllability have the potential to replace the labeled dataset for user-defined KWS. As there are a lot of approaches that haven't been explored yet, we can extend this work toward various directions for future works. First of all, we assume that the diversity of synthesized speech is the most important key to improvement. Although recent speech synthesis systems can effectively control factors including speaker, speech rate, and prosody, there still remains a limitation in controllability and a gap of variability between real speech recorded from various conditions. Thus, we will follow up the researches on controllability of speech synthesis and adopt them for keyword generation. In addition, domain adaptation or augmentation also can be a breakthrough in utilizing synthetic data. Beyond the augmentation methods tried in this work, carefully designed domain matching algorithms should be more explored. Lastly, general improvement in architecture design and metric learning can help for higher performance.\\ \end{comment} \section{Acknowledgements} \label{sec:print} This work was supported by Institute of Information \& communications Technology Planning \& Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2021-0-00456, Development of Ultra-high Speech Quality Technology for Remote Multi-speaker Conference System). \bibliographystyle{IEEEbib}
\section{Introduction} \label{sec:intro} The long-period variables (LPVs), such as Mira variables, are stars of low to intermediate masses which have reached the late evolutionary stage of Asymptotic Giant Branch (AGB) phase. They are characterised by long-period ($>$100 d) variations in radius, brightness, and temperature, which are caused by stellar surface instability and radial pulsation (see the latest catalogue of \citealt{2022arXiv220605745L}). These stars also have an intense mass-loss phenomenon or a superwind, which leads to formation of a circumstellar envelope (CSE) made of gas and dust (see the review of \citealt{2018A&ARv..26....1H}). The stellar mass loss may be driven, primarily, by the pressure from the stellar radiation on dust grains, while pulsation-induced shocks are expected to enhance the mass loss (e.g., \citealt{2004agbs.book.....H,2011ASPC..445..193H,2016A&A...594A.108H}). In addition, the stellar structure is basically spherically symmetric, while the mass loss often exhibits significant asymmetry on very different spatial (1--10$^4$ AU) and temporal (a few months to a few 10$^4$ years) scales \citep{2018A&ARv..26....1H}. The mass loss asymmetry observed in the vicinity of the stellar surface (e.g., \citealt{2020A&A...635A.200K}) might be linked to the existence of giant gas segments created from convection in the stellar interior. It is interesting to trace how such asymmetry will grow while the gas segments are being accelerated outward. It is likely that the mechanism of dust acceleration in the CSE, the enhancement of the outward flow, and the growth of its asymmetry may be dependent on the property or abundance of the ejected materials (i.e., carbon-rich or oxygen-rich composition) \citep{2018A&ARv..26....1H}. Circumstellar SiO and H$_{2}$O\ masers are located at, respectively, $\sim$2-4 stellar radii (e.g., \citealt{1994ApJ...430L..61D}) and $\sim$5-50 stellar radii (e.g., \citealt{2012A&A...546A..16R}) of a typical oxygen-rich AGB star, while the dust formation layer is co-located between the SiO masers and H$_{2}$O\ masers \citep{1996A&ARv...7...97H,2007A&A...470..191W}. The location of SiO masers corresponds to the innermost part of the CSE, where molecules are still rich and outward and inward motions are often observed (e.g. \citealt{2013MNRAS.433.3133G}). The location of H$_{2}$O\ masers corresponds to the zone of the outward acceleration of dust and gas, where molecular gas is cooled and condensed to dust while H$_{2}$O\ molecules are still enriched. The maser structures are composed of clusters of compact maser features (isolated gas clumps with sizes of $\sim$1~AU). This enables us to measure the three-dimensional velocity field of the CSE through monitoring observations by Very Long Baseline Interferometry (VLBI) with excellent angular resolution (e.g., \citealt{2003ApJ...590..460I}). Groups of maser features may trace giant gas/dust clumps, whose origins have been debated in terms of the convection of the stellar interior or just instability on the stellar surface \citep{2018A&ARv..26....1H}. Thus, the maser spatio-kinematics have direct relationship to such gas/dust dynamics and can illuminate important issues on the mechanisms of maser excitation. The EAVN Synthesis of Stellar Maser Animations (ESTEMA) project has been conducted as one of the KaVA (a combined array of the Korean VLBI Network, KVN, and Japanese VLBI Exploration of Radio Astrometry, VERA) Large Program projects followed by a series of General Proposal projects of the East Asian VLBI Network (EAVN), aiming at intensive VLBI monitoring observations of CSE masers associated with LPVs of different pulsation periods (300---1000~d) over a few stellar pulsation cycles. EAVN is suitable for high cadence VLBI monitoring because more than six telescopes are always available for imaging of CSE masers. The typical angular resolutions are 1.2(K)/0.6(Q) mas with the core array KaVA, and the largest detectable angular scales are 9(K)/5(Q) mas with the short baselines of $\sim$300 km provided by KVN. The expected image sensitivities are $\sim$30(K)/50(Q) mJy~beam$^{-1}$\ for KaVA and $\sim$40(K)/60(Q) mJy~beam$^{-1}$\ for KVN, with an integration time of 4 hours and narrower bandwidth of 15.625 kHz for maser emission. In particular, it enables us to simultaneously monitor four to eight lines of H$_{2}$O\ and SiO masers at four frequency (22/43/86/129~GHz or K/Q/W/D) bands with the KVN. Absolute positions, proper motions of maser gas clumps, and the annual parallax of the maser source system can be determined by precise astrometry with the dual-beam system of VERA. The animation of circumstellar masers would demonstrate in detail the behaviors of maser emission, reflecting the dynamics of the maser clumps and variation in regions of maser excitation around the LPVs. Here we present the first result of ESTEMA, which has been derived from H$_{2}$O\ masers associated with the Mira variable star BX Camelopardalis (BX Cam). This star is an oxygen-rich Mira variable with similar, but slightly inconsistent, reported pulsating periods of 486~d (AAVSO)\footnote{\url{https://www.aavso.org}} or 440~d \citep{2020PASJ...72...56M}. The spectral type is M9.5 \citep{1978A&AS...34..409S}, and the presence of bright SiO, H$_{2}$O, and OH masers have been confirmed \citep{1984A&A...138..343U,2020PASJ...72...56M}. The trigonometric parallax and the spatial distribution of H$_{2}$O\ masers with three collimated flows have been reported by \cite{2020PASJ...72...56M}. This star was selected as one of the ESTEMA targets because of the more flexible allocation of VLBI observation sessions for this Northern-sky star. Similarly to the intensive monitoring observations of SiO ({\it $v$=1, J=1$\rightarrow$0}) masers around TX Cam with the Very Long Baseline Array (VLBA) \citep{2003ApJ...599.1372D,2010MNRAS.406..395G,2013MNRAS.433.3133G}, the present monitoring project enables us to elucidate the global behaviour of an example of CSE H$_{2}$O\ masers for the first time. CSE H$_{2}$O\ masers also should be physically related to the stellar pulsation because of the periodic variation in the maser spectra \citep{2008PASJ...60.1077S,2014AJ....147...22K}. However, the true origin of such a maser behavior can be visualized by an animation of the VLBI images. The astrometry on the maser animation is crucial to exactly trace the motions of the individual maser features. After subtracting maser position modulations due to the annual parallax and the secular motion of the maser source system, the maser maps can be registered on the reference frame, which then provides a fixed frame that can be compared with the location of the pulsating star whose astrometric data is now available from the $Gaia$\ Early Data Release 3 ($Gaia$\ EDR3) \citep{2021A&A...649A...1G}. A maser animation derived based on above astrometric steps enable us to visualize a radial expansion of the CSE masers and some deviations of the maser motions from constant-velocity motions, such as radial accelerations, rotations, etc. \section{Observations and data Reduction} The monitoring observations of H$_{2}$O\ and SiO masers around BX Cam in ESTEMA have been ongoing since 2018 May, except in the EAVN maintenance season (June--August). The EAVN telescopes that have participated in ESTEMA observations include four telescopes of VERA (Mizusawa, Iriki, Ogasawara, and Ishigakijima), three telescopes of the KVN (Yonsei, Ulsan, Tamna), two telescopes of the Chinese VLBI Network (CVN: Tianma, Urumqi in K-band only), and one Japanese telescope (Takahagi in K-band only). The time cadence for a single observational epoch is 3--4 weeks, which is approximately equal to a time resolution of 1/20 stellar pulsation cycles of BX~Cam ($\sim$22~d). Each observation epoch corresponds to a pair of K and Q-band experiments over two consecutive days and lasts for 8~hr (2~d$\times$4~hr). We have designed the observations to use all of the unique capabilities of the KVN and VERA in EAVN, using a hybrid setup of simultaneously monitoring H$_{2}$O\ (22.235080 GHz) and SiO (42.820539, 43.122027, 86.243442, and 129.363358 GHz) maser lines and conducting high-accuracy astrometry by observing the maser and the reference continuum sources simultaneously. In this paper, we mainly focus on the K-band data as listed in Table \ref{tab:obs}, spanning observations from 2018 to 2021. The data sample has crossed three light curve maxima of the stellar pulsation from phase $\phi$ 0.65 to $\phi$ 3.17. Each of the observation sessions had a duration of 4~hr including scans on the target, BX Cam, the fringe finder, NRAO150, and the delay calibrator, J0721+7120 ($\alpha_{\rm J2000}$\ = 07\h21\m53\decs4485$\pm$0.31 mas, $\delta_{\rm J2000}$\ = 71\degr20\arcmin 36\decas363$\pm$0.10 mas). We alternated scans between BX Cam for 7~min and the calibrator for 2~min. The angular separation between these two sources is 7.9\ifmmode{^{\circ}}\else{$^{\circ}$}\fi\ on the sky, which is suitable for source-frequency phase-referencing (SFPR) analysis with KVN data \citep{2014AJ....148...97D}. Meanwhile, the phase reference source J0524$+$7034 ($\alpha_{\rm J2000}$\ = 05\h24\m13\decs4333$\pm$0.39 mas, $\delta_{\rm J2000}$\ = 70\degr34\arcmin 52\decas906$\pm$0.13 mas \footnote{\label{note1} The quasar positions are cited from \url{http://astrogeo.org/sol/rfc/rfc_2021d/}.}), 2.0\ifmmode{^{\circ}}\else{$^{\circ}$}\fi\ away from the target, was observed by the second beam of VERA to determine the absolute positions of the maser spots of BX Cam. The received signals in left circular polarization were recorded in all the EAVN stations with 16 base-band channels (BBCs) each with a bandwidth of 16 MHz, one of which includes the maser emission of BX Cam. In VERA, 15 BBCs were assigned to the signals received by the second beam so as to cover a total width of 496 MHz. The recorded signal data were correlated using three passes with the hardware correlator in Daejeon, Korea \citep{2015JKAS...48..125L}. The first pass was processed for the BBC including H$_{2}$O\ masers with all EAVN antennas and yielded 2048 spectral channels, corresponding to a velocity spacing of 0.105~km~s$^{-1}$\ at 22.235 GHz. The second pass was processed for the phase reference source J0524$+$7034 observed by the second beam of VERA. The third pass was for simultaneously monitoring of H$_{2}$O\ and the four SiO maser lines using the KVN. In this pass, all of the 16 BBCs were processed with 1024 spectral channels per BBC. The data calibration was performed with the Astronomical Image Processing System (AIPS) \citep{2003ASSL..285..109G} developed by the National Radio Astronomy Observatory (NRAO). We have developed the pipeline scripts with ParselTongue \citep{2006ASPC..351..497K} for ESTEMA project. A priori amplitude calibration was done using the system noise temperatures and antenna gains logged during observations at KVN and VERA stations. These system noise temperatures were measured with the chopper-wheel method \citep{1976ApJS...30..247U} and were evaluated using the “R-Sky” method \citep{2004PASJ...56L..15H}, by observing a reference black body. Since the system temperature measurements were absent for Tianma, Urumqi, and Takahagi stations, we applied the template spectrum method \citep{1999ASPC..180..481R}, in which a template spectrum of the H$_{2}$O\ maser emission was obtained from the auto-correlation data. The estimated amplitude calibration errors of both methods were less than 10$\%$ for EAVN \citep{2017PASJ...69...87C}. For imaging the H$_{2}$O\ masers with all the EAVN antennas, the velocity channel including a bright, single, and compact maser spot was selected as the reference for fringe fitting and self-calibration. The detection limit was typically 0.4 Jy beam$^{-1}$ at a 5-$\sigma$ noise level, in maps without bright maser emission. For astrometry with VERA, the instrumental relative delays between the dual beams measured by the horn-on-dish method are applied \citep{2008PASJ...60..935H} and the delay re-calculation tables \citep{2020PASJ...72...52N} were used. In the delay re-calculation tables, the more accurate delay models were updated, with: the tropospheric zenith delay measured by the Global Positioning System (GPS), the ionospheric Total Electron Content (TEC) of the Global Ionosphere Map (GIM) produced by the Center for Orbit Determination in Europe (CODE), the station position measured in the monthly geodetic VLBI observations, and the updated maser positions \citep[and the references therein]{2020PASJ...72...52N}. Then we used J0524$+$7034 as the phase reference source to determine the absolute position of masers. 5 $\sigma$ noise levels of the phase referenced map of VERA data are typically 1.0 Jy beam$^{-1}$. Therefore, we can measure the absolute positions of the bright masers of BX Cam with the VERA dual-beam bona-fide astrometry, then propagate this to all of the maser spots in the EAVN image by registering the bright masers in the pair of images. We used the SFPR technique described in \cite{2014AJ....148...97D} to obtain the astrometric registration of the H$_{2}$O\ and SiO maser spots from the KVN data. \begin{deluxetable*}{lrrllrrcrrrr} \tablenum{1} \tablecaption{EAVN observations of BX~Cam at K band \label{tab:obs}} \tablewidth{0pt} \tablehead{ \colhead{Obs.} & \colhead{Epoch} & \colhead{MJD\tablenotemark{a}} & Optical & \colhead{Stations\tablenotemark{c}} & \colhead{Num.\tablenotemark{d}} & \colhead{RMS\tablenotemark{e}} &\colhead{High-Res.\tablenotemark{d}} & \colhead{VERA\tablenotemark{d}} & \colhead{Problem\tablenotemark{f}} & \nocolhead{Problem}\\ \colhead{Code} & \colhead{} & \colhead{} & \colhead{Phase($\phi$)\tablenotemark{b}} & \colhead{} & \colhead{} & \colhead{} & \colhead{Imaging} & \colhead{Astrometry} & } \startdata k18hi01a & 2018-05-24 & 58262 & 0.65 & VmVrVoVsKyKuKt & 1 & 283 & & & & \\ k18hi01c & 2018-06-06 & 58275 & 0.68 & VmVrVoVsKyKuKt & 1 & 320 & & & & \\ k18hi01e & 2018-09-03 & 58364 & 0.88 & VmVrVoVs~~~~KuKt & 2 & 278 & & & & \\ k18hi01g & 2018-10-07 & 58398 & 0.96 & ~~~~~VrVoVsKyKuKt & 0 & 1513 & & & Kt(N), KyKu(R) & \\ k18hi01i & 2018-10-24 & 58415 & 1.00 & VmVrVoVsKyKuKt~~~~Ur & 13 & 210 & \checkmark & & KyKuKt(R) & \\ k18hi01k & 2018-11-11 & 58433 & 1.04 & VmVrVoVsKyKuKtT6Ur & 16 & 122 & \checkmark & \checkmark & T6Ur(N) &\\ k18hi01m & 2018-12-16 & 58468 & 1.12 & VmVrVoVsKyKuKt & 21 & 83 & \checkmark & \checkmark & & \\ k18hi01o & 2019-01-17 & 58500 & 1.19 & VmVrVoVsKyKuKtT6 & 15 & 62 & \checkmark & \checkmark & & \\ k19hi01a & 2019-02-11 & 58525 & 1.25 & VmVrVoVsKyKuKt & 17 & 89 & \checkmark & & Vm(N) & \\ k19hi01c & 2019-03-14 & 58556 & 1.32 & VmVrVoVsKyKuKt & 12 & 96 & & & & \\ k19hi01e & 2019-04-11 & 58584 & 1.38 & VmVrVoVsKyKuKt & 5 & 123 & & & & \\ k19hi01g & 2019-05-08 & 58611 & 1.44 & VmVrVo~~~~KyKuKt & 7 & 98 & & & & \\ a19hi03a & 2019-09-07 & 58733 & 1.72 & VmVr~~~~Vs~~~~KuKtT6 & 0 & 1461 & & & T6(N) \\ a19hi03c & 2019-10-10 & 58766 & 1.79 & VmVr~~~~VsKy~~~~KtT6 & 6 & 154 & \checkmark & & VmKy(N) &\\ a19hi03e & 2019-10-24 & 58780 & 1.83 & VmVr~~~~VsKyKuKt & 19 & 128 & \checkmark & & & \\ a19hi03g & 2019-11-18 & 58805 & 1.88 & VmVrVoVsKyKuKtT6 & 23 & 61 & \checkmark & \checkmark & &\\ a19hi03i & 2019-12-16 & 58833 & 1.95 & VmVrVoVsKyKuKtT6 & 32 & 65 & \checkmark & \checkmark & & \\ a19hi03l & 2020-01-10 & 58858 & 2.00 & VmVrVoVsKyKuKtT6 & 35 & 52 & \checkmark & \checkmark & & \\ a2004a & 2020-02-07 & 58886 & 2.07 & VmVrVoVsKyKuKt & 38 & 57 & \checkmark & \checkmark & & \\ a2004c & 2020-03-11 & 58919 & 2.14 & VmVrVoVsKyKuKt & 28 & 53 & \checkmark & \checkmark & & \\ a2004e & 2020-03-27 & 58935 & 2.18 & VmVrVoVs~~~~KuKtT6Ur & 16 & 97 & \checkmark & \checkmark & & \\ a2004g & 2020-04-20 & 58959 & 2.23 & VmVrVoVsKyKuKt~~~~Ur & 9 & 94 & \checkmark & \checkmark & Ku(N) &\\ a2004i & 2020-05-13 & 58982 & 2.29 & VmVrVoVsKy~~~~Kt~~~~Ur & 12 & 88 & \checkmark & \checkmark & & \\ a2004k & 2020-06-09 & 59009 & 2.35 & VmVrVo~~~~KyKuKt~~~~Ur & 11 & 136 & & & \\ a2019a & 2020-09-15 & 59107 & 2.57 & Vm~~~~VoVsKyKu~~~~~~~Ur & 0 & 765 & & & Vs(N) \\ a2019c & 2020-09-24 & 59116 & 2.59 & VmVrVoVsKyKuKt~~~~Ur & 0 & 456 & & & & \\ a2019e & 2020-10-18 & 59140 & 2.64 & ~~~~~VrVoVsKyKuKt~~~~Ur & 4 & 167 & & & & \\ a2019g & 2020-11-12 & 59165 & 2.70 & ~~~~~VrVoVsKyKuKt & 6 & 97 & & & & \\ a2019i & 2020-11-26 & 59179 & 2.73 & VmVrVoVsKyKuKt~~~~~~~Tk & 6 & 128 & & & & \\ a2019m & 2021-01-12 & 59226 & 2.84 & VmVrVoVs~~~~KuKt~~~~~~~Tk & 7 & 93 & & & & \\ a2102a & 2021-02-01 & 59246 & 2.89 & VmVrVoVsKyKuKt~~~~~~~Tk & 15 & 68 & \checkmark & & & \\ a2102c & 2021-02-19 & 59264 & 2.93 & VmVrVoVsKyKuKt~~~~~~~Tk & 21 & 51 & \checkmark & \checkmark & & \\ a2102e & 2021-03-12 & 59285 & 2.97 & VmVrVoVsKyKu~~~~~~~~~~~Tk & 7 & 183 & \checkmark & \checkmark & KyKu(R) & \\ a2102g & 2021-04-05 & 59309 & 3.03 & VmVrVoVsKy~~~~KtT6UrTk & 9 & 176 & \checkmark & \checkmark & KyKt(R) & \\ a2102i & 2021-04-17 & 59321 & 3.06 & VmVrVoVsKyKuKt~~~~~~~Tk & 6 & 598 & \checkmark & & Ky(N), KuKt(R) &\\ a2102k & 2021-05-12 & 59346 & 3.11 & VmVrVoVsKyKuKt~~~~~~~Tk & 14 & 439 & \checkmark & & KyKuKt(R) & \\ a2102m & 2021-06-07 & 59372 & 3.17 & VmVrVoVsKyKuKtT6Ur & 16 & 111 & \checkmark & & Ur(N) & \\ \enddata \tablenotetext{a}{MJD: Modified Julian Day.} \tablenotetext{b}{The optical phase is estimated in Figure \ref{fig:curve} using a mean period 440 days, optical maximum at 2020-01-08 and an uncertainty about 4 days.} \tablenotetext{c}{Station codes represent VERA-Mizusawa(Vm), VERA-Iriki(Vr), VERA-Ogasawara(Vo), VERA-Ishigakijima(Vs), KVN-Yonsei(Ky), KVN-Ulsan(Ku), KVN-Tamna(Kt), Tianma(T6), Urumqi(Ur), and Takahagi(Tk), respectively.} \tablenotetext{d}{The purposes of the data sets: (1) ``Num.'': Number of the maser features identified. (2)``High-Res. Imaging'': The images made including $>$2000 km baselines, which are used for analysing the maser features and relative proper motions. (3)``VERA Astrometry'': Phase-referencing astrometry with VERA dual-beam system, which are used for determining the absolute positions, absolute proper motions and annual parallaxes.} \tablenotetext{e}{Noise level (1-$sigma$) of EAVN images in mJy~beam$^{-1}$.} \tablenotetext{f}{(N): No fringe detection. (R) RCP: polarization fault due to wrong observation in right-hand circular polarization.} \end{deluxetable*} \section{Results} \subsection{Periodic variation of the \texorpdfstring{H$_{2}$O}{H2O} maser spectra} \label{sec:spec1} Frequent observations, as well as the time-span of ESTEMA, allow us to study the variability and periodicity of maser intensity on timescales of a few weeks to a few years in terms of the possible correlation with stellar pulsation \citep{2010MNRAS.406..395G}. Figure \ref{fig:spec} demonstrates the changes in the spectrum with time. Since some of imaging observations of the masers failed and some of the maser images are made by different array configurations, we use the maser intensity on the KVN stations for spectral analysis, e.g., making cross-power spectra on a short baseline in Figure \ref{fig:spec}, making the total-power spectra on each KVN stations, and analysing the period and phase of the spectra. The excitation of H$_{2}$O\ masers is sensitive to both the dynamics of a stellar wind and the stellar radiation with periodic variation. The previous monitoring observations of H$_{2}$O\ masers around BX Cam with the VERA Iriki telescope \citep{2008PASJ...60.1077S,2020PASJ...72...56M} did not determine the period and phase lag of the H$_{2}$O\ maser variability. Multiple estimates of the optical period of BX Cam have been reported by the American Association of Variable Star Observers (AAVSO) and \cite{2020PASJ...72...56M}. AAVSO reported a period of 486~d\footnote{\url{https://www.aavso.org/vsx/index.php?view=detail.top&oid=4634}} without the details of the specific time range of data or a specific method. \cite{2020PASJ...72...56M} determined a period of 440~d using the 40 nights in AAVSO database between 2016 February and 2019 December. We also reanalysed 54 nights from the AAVSO database at V-band from 2016 February to 2021 October using two methods. One is the Date Compensated Discrete Fourier Transform (DC DFT) method with the popular analysis tool VStar \citep{2012JAVSO..40..852B}, and another is the Lomb-Scargle Periodogram \citep{1976Ap&SS..39..447L,1982ApJ...263..835S,2018ApJS..236...16V}, which is equivalent to least-squares fitting of sine waves. We obtained an averaged optical period of 440$\pm$5~d using the two methods as shown in Figure \ref{fig:curve}, which is consistent with \cite{2020PASJ...72...56M}. During the period from $\phi$ = 0.65 to 3.17 in stellar light curve phase, the H$_{2}$O\ masers have continuously been found at a local-standard-of-rest velocity ($V_{\mbox{\scriptsize LSR}}$) range from $-7$ to $-16$ ~km~s$^{-1}$. We also detected the red-shifted component at $V_{\mbox{\scriptsize LSR}}$ $=$7--10 ~km~s$^{-1}$\ around the light maxima: from $\phi$ = 1.00 to 1.32 and from $\phi$ = 1.88 to 2.14, which has also been found in previous observations by \cite{1988A&A...191..283E} and \cite{2020PASJ...72...56M}. The peaks of the H$_{2}$O\ maser intensity appeared at the epoch 2018-10-24 ($\phi$ 1.00), 2020-01-10 ($\phi$ 2.00), and 2021-04-05 ($\phi$ 3.03), while the peaks of optical intensity appeared at the epoch 2018-09-16 ($\phi$ 0.91), 2020-01-09 ($\phi$ 2.00), and 2021-02-27 ($\phi$ 2.94). Thus the peaks of the H$_{2}$O\ maser intensity have an average delayed time-lag $\sim$25$\pm9$ days or phase-lag $\sim$0.06$\pm0.02$ related to the peaks of optical intensity. The averaged time interval of H$_{2}$O\ maser peak intensity is $\sim$447$\pm11$ days, which is a better fit to the period 440~d than 486~d (AAVSO). The observed properties of the spectral and flux variability for the H$_{2}$O\ masers are as follows. (1) The H$_{2}$O\ masers are highly variable so that no maser components were detected in some of the maser flux minimum. (2) The maser flux and the optical magnitude exhibit a similar sinusoidal pattern, showing that the maser flux follows the pulsation of the star \citep[same as the SiO masers][]{2010MNRAS.406..395G}. (3) The maxima of the periodic maser flux variation do not have a constant magnitude. (4) Time lags of the maser flux maxima with respect to the optical light maxima are also expected, but they are not necessarily constant as seen in the data \citep[same as for the SiO masers][]{2010MNRAS.406..395G}. (5) The maser flux variations do not follow a specific pattern. The number of spectral features, as well as their fluxes, change not only during a single cycle but also from one cycle to another. (6) Systematic radial velocity drifts in the maser features are also found as shown on the spectrum. \begin{figure*}[t] \plotone{Fig1_spec.pdf} \caption{The cross power H$_{2}$O\ maser spectra on the Ky--Ku baseline (305 km). Few epochs on Ky--Kt baseline (476 km) when Ku is not available. All of the 37 epochs data were used. \label{fig:spec}} \end{figure*} \begin{figure*}[t] \epsscale{1.15} \plotone{Fig2_LightCurve.pdf} \caption{ Integrated flux curves of 22\,GHz H$_{2}$O\ masers from the cross (red circles) and total (green circles) power spectra of the KVN and V-band optical light curve (blue stars) from the AAVSO monitoring data. The total power spectra is using the weighted average of three KVN antennas (Kt,Ky,Ku), while the cross power spectra is using the short baselines as shown in Figure \ref{fig:spec}. The $V_{\mbox{\scriptsize LSR}}$\ velocity range for estimating the integrated flux densities is from $-$16 to $-$7 ~km~s$^{-1}$ and from 7 to 10 ~km~s$^{-1}$. At K band, the beam size of the KVN single-dish telescope is $\sim$130 as and the synthesized beam size of the projected KYS-KUS baseline is $\sim$11 mas for BX Cam. The black solid line shows the sinusoidal fit to the optical light curve with a period of 440~d. \label{fig:curve}} \end{figure*} \subsection{The mapped \texorpdfstring{H$_{2}$O}{H2O} maser features} Figure \ref{fig:integ} shows the comparison between the maser brightness distributions taken with KVN, VERA and EAVN (KVN+VERA+T6) on 2020Jan10 ($\phi$=2.00). KVN is helpful to detect extended structures, while EAVN can detect a larger number of isolated compact maser features. VERA can measure the bona-fide positional information of bright masers using the dual-beam astrometric system. The H$_{2}$O\ masers were spatially well resolved into individual maser features with the EAVN synthesized beam. The image including Urumqi baselines shows no obvious difference, since only the brightest and compact maser features located at the map origin were detected on $>$ 3000~km long baselines. \begin{figure}[t] \epsscale{1.2} \plotone{Fig3_Moment.pdf} \caption{Left to Right: Moment-zero maps of the water maser emission in BX Cam from KVN, VERA, and EAVN (KVN+VERA+T6) observations at the same epoch, Jan 10, 2020. The maps are from images created by collapsing each spectral line cube to a single plane using the AIPS task SQASH, taking the weighted averages of each pixel. An ellipse in the bottom-left corner of each panel indicates the synthesized beam pattern of the image synthesis. The contour map is drawn with contour levels of 3,6,12,24,...×$\sigma$, where 1$\sigma$ corresponds to 0.03 Jy~beam$^{-1}$ (KVN), 0.04 Jy~beam$^{-1}$ (VERA), and 0.03 Jy~beam$^{-1}$ (EAVN), respectively.} \label{fig:integ} \end{figure} The AIPS task SAD was used to extract maser spots information, e.g., positions and brightness, from the EAVN image data cube. For the component identification, a non-constant Gaussian was used and features with flux higher than six times the noise level were accepted. Maser feature candidates were identified as components if found in more than three consecutive channels within the cube \citep{2010MNRAS.406..395G}. Table \ref{tab:obs} gives the possible numbers of maser features detected at individual epochs. We traced the relative positions and radial velocities of maser features at different epochs, which had been stable from one epoch to another within 1 ~km~s$^{-1}$~in LSR velocity and within 6 mas~yr$^{-1}$ $\times \Delta t$ yr in position. The $\Delta t$ is the time gap between two epochs and the limit corresponds to the maximum movement velocity in Table \ref{tab:vel}. In practice it is difficult to automatically cross-identify components just relying on the above velocity and position window, thus we identified the components manually. Figure \ref{fig:maser} shows the example of internal structures of the maser features. Among them, 17 maser features with the lifespan longer than one Cycle are labelled with their identifier (MF\#). Each maser feature is composed of a compact bright part and an extended structure. There are ``spoke-like'' (linearly distributed) \citep{2012ApJ...744...23Z} maser features at all epochs. These maser features appear to be composed of gas flowing outward from the central star and mostly have decreasing (blue-shifted) or increasing (red-shifted) radial velocities. \begin{figure}[t] \epsscale{1.2} \plotone{Fig4_maser_v2.png} \caption{EAVN images of the spatial structures of maser features (top left), with a zoom-in of the colored blocks (top right, bottom left, bottom right), observed on 2020 Jan 10 ($\phi$ 2.00). These images are obtained after component fitting from the image data cube with AIPS task SAD. Each of the filled circles shows a velocity component (maser spot), and each maser feature (MF\#) has a velocity channel spacing of 0.105 ~km~s$^{-1}$. The position reference feature (MF1) is around the map origin. \label{fig:maser}} \end{figure} \begin{figure}[t] \epsscale{1} \plotone{Fig5_SubReg_v2.png} \caption{Temporal variation of maser features in different regions. The locations of the different regions are shown in Figure \ref{fig:maser}, while Region 1 includes MF[1,2,3,17], Region 2 includes MF[4,13,14,15], Region 3 includes MF[5,6], Region 4 includes MF[7,8,9,10,11,12]. The velocity gradient is classified by color and the size of maser spots means the flux density. The color and size of maser spots are the same to Fig \ref{fig:timemaser}. Optical light curve found in the AAVSO photometric data (blue stars). \label{fig:submaser}} \end{figure} \begin{deluxetable*}{llrrrrrr}[ht!] \tablenum{2} \tablecaption{The radial velocity drifts and relative proper motions of the maser features \label{tab:vel}} \tablewidth{700pt} \tabletypesize{\scriptsize} \tablehead{ \colhead{MF\tablenotemark{a}} & \colhead{Cycle \tablenotemark{b}} & \colhead{Radial Velocity\tablenotemark{c}} & \colhead{RV Drift\tablenotemark{d}} & \colhead{RA offset\tablenotemark{c}} & \colhead{Rel \ifmmode {\mu_x}\else {$\mu_x$}\fi \tablenotemark{e}} & \colhead{Dec offset\tablenotemark{c}} & \colhead{Rel \ifmmode {\mu_y}\else {$\mu_y$}\fi \tablenotemark{e}} \\ \colhead{ID} & \colhead{Fitting} & \colhead{~km~s$^{-1}$} & \colhead{~km~s$^{-1}$yr$^{-1}$} & \colhead{mas} & \colhead{mas~yr$^{-1}$} & \colhead{mas} & \colhead{mas~yr$^{-1}$} } \startdata MF1&2+3&-11.25$\pm$0.04&-0.25$\pm$0.05&-0.02$\pm$0.01&0.03$\pm$0.01&0.02$\pm$0.01&-0.02$\pm$0.01\\ &2&-11.23$\pm$0.06&-0.38$\pm$0.27&-0.02$\pm$0.01&0.04$\pm$0.06&0.03$\pm$0.01&-0.09$\pm$0.04\\ MF2&1+2+3&-9.34$\pm$0.03&-0.35$\pm$0.04&-3.53$\pm$0.01&0.10$\pm$0.02&2.18$\pm$0.02&0.11$\pm$0.03\\ &2&-9.29$\pm$0.03&-0.70$\pm$0.19&-3.55$\pm$0.01&0.31$\pm$0.07&2.20$\pm$0.02&0.31$\pm$0.12\\ MF3&1+2&-14.78$\pm$0.03&0.17$\pm$0.05&-9.08$\pm$0.05&0.34$\pm$0.09&1.44$\pm$0.04&-0.77$\pm$0.06\\ &2&-14.79$\pm$0.04&0.31$\pm$0.28&-9.09$\pm$0.08&0.74$\pm$0.55&1.47$\pm$0.06&-1.19$\pm$0.40\\ MF4&1+2&9.07$\pm$0.06&0.79$\pm$0.06&-23.67$\pm$0.16&-1.20$\pm$0.09&-21.26$\pm$0.09&-0.78$\pm$0.10\\ &2&9.04$\pm$0.04&0.75$\pm$0.35&-23.70$\pm$0.08&-0.49$\pm$0.65&-21.34$\pm$0.04&-0.32$\pm$0.35\\ MF5&1+2+3&-6.95$\pm$0.05&-0.20$\pm$0.09&-7.46$\pm$0.11&-0.72$\pm$0.19&-35.87$\pm$0.12&-2.25$\pm$0.21\\ &2&-6.89$\pm$0.11&-0.33$\pm$0.77&-7.48$\pm$0.23&-1.39$\pm$1.56&-35.85$\pm$0.24&-3.90$\pm$1.64\\ MF6&1+2+3&-8.32$\pm$0.02&-0.32$\pm$0.04&-2.75$\pm$0.08&-0.48$\pm$0.13&-39.83$\pm$0.09&-3.75$\pm$0.15\\ &2&-8.32$\pm$0.03&-0.73$\pm$0.17&-2.67$\pm$0.12&0.34$\pm$0.61&-39.94$\pm$0.13&-4.30$\pm$0.70\\ MF7&1+2+3&-11.87$\pm$0.03&-0.38$\pm$0.06&7.60$\pm$0.01&0.64$\pm$0.01&-48.59$\pm$0.04&-3.08$\pm$0.07\\ &2&-11.84$\pm$0.04&-0.68$\pm$0.24&7.62$\pm$0.01&0.47$\pm$0.05&-48.63$\pm$0.05&-3.25$\pm$0.27\\ MF8&1+2+3&-10.86$\pm$0.04&-0.27$\pm$0.04&9.77$\pm$0.03&1.50$\pm$0.03&-51.22$\pm$0.03&-4.82$\pm$0.03\\ &2&-10.77$\pm$0.08&-0.54$\pm$0.40&9.75$\pm$0.10&1.75$\pm$0.47&-51.34$\pm$0.09&-4.97$\pm$0.44\\ MF9&1+2+3&-11.31$\pm$0.03&0.01$\pm$0.04&11.91$\pm$0.03&1.24$\pm$0.05&-50.25$\pm$0.02&-3.65$\pm$0.04\\ &2&-11.34$\pm$0.04&0.20$\pm$0.21&11.95$\pm$0.04&1.13$\pm$0.19&-50.37$\pm$0.03&-3.41$\pm$0.16\\ MF10&1+2&-11.58$\pm$0.03&-0.31$\pm$0.05&14.25$\pm$0.03&1.30$\pm$0.05&-48.84$\pm$0.03&-3.46$\pm$0.06\\ &2&-11.56$\pm$0.04&-0.48$\pm$0.26&14.27$\pm$0.05&1.10$\pm$0.27&-48.84$\pm$0.05&-3.48$\pm$0.30\\ MF11&1+2&-12.86$\pm$0.04&-0.31$\pm$0.06&22.18$\pm$0.04&2.78$\pm$0.05&-49.47$\pm$0.05&-4.26$\pm$0.07\\ &2&-12.85$\pm$0.04&-0.50$\pm$0.32&22.21$\pm$0.02&2.21$\pm$0.16&-49.52$\pm$0.02&-3.29$\pm$0.17\\ MF12&1+2&-11.87$\pm$0.32&0.00$\pm$0.31&23.88$\pm$0.12&3.29$\pm$0.12&-47.21$\pm$0.16&-4.34$\pm$0.15\\ &1&-11.87$\pm$0.83&0.00$\pm$0.80&23.45$\pm$0.31&2.88$\pm$0.29&-47.08$\pm$0.40&-4.21$\pm$0.39\\ MF13&2+3&-8.20$\pm$0.04&-0.49$\pm$0.05&9.57$\pm$0.03&1.31$\pm$0.03&-13.12$\pm$0.03&-0.66$\pm$0.04\\ &2&-8.13$\pm$0.05&-1.01$\pm$0.26&9.53$\pm$0.02&1.66$\pm$0.10&-13.07$\pm$0.05&-1.01$\pm$0.25\\ MF14&2+3&-7.61$\pm$0.03&-0.89$\pm$0.08&12.49$\pm$0.02&1.78$\pm$0.06&-9.46$\pm$0.02&-0.80$\pm$0.05\\ &2&-7.58$\pm$0.03&-1.29$\pm$0.19&12.50$\pm$0.02&1.64$\pm$0.13&-9.49$\pm$0.02&-0.52$\pm$0.11\\ MF15&2+3&-8.16$\pm$0.05&-0.59$\pm$0.11&10.40$\pm$0.03&1.30$\pm$0.07&-5.55$\pm$0.05&-0.45$\pm$0.12\\ &2&-8.15$\pm$0.05&-0.83$\pm$0.37&10.42$\pm$0.03&1.00$\pm$0.23&-5.57$\pm$0.05&0.10$\pm$0.39\\ MF16&2+3&-3.98$\pm$0.05&-0.23$\pm$0.08&36.68$\pm$0.03&3.04$\pm$0.05&5.14$\pm$0.03&0.75$\pm$0.05\\ &2&-3.93$\pm$0.09&-0.46$\pm$0.35&36.60$\pm$0.06&3.37$\pm$0.22&5.15$\pm$0.08&0.74$\pm$0.31\\ MF17&1+2+3&-11.41$\pm$0.03&-0.52$\pm$0.05&2.96$\pm$0.04&0.73$\pm$0.05&-1.48$\pm$0.05&-0.05$\pm$0.07\\ &2&-11.35$\pm$0.05&-0.82$\pm$0.25&2.97$\pm$0.06&0.51$\pm$0.28&-1.41$\pm$0.08&-0.53$\pm$0.36\\ \enddata \tablenotetext{a}{Maser feature ID from Figure \ref{fig:maser}.} \tablenotetext{b}{Each Cycle corresponds to the epochs: Cycle 1 ($\phi\ 1.00\sim 1.25$) , Cycle 2 ($\phi\ 1.89\sim 2.29$), and Cycle 3 ($\phi\ 2.89\sim 3.17$). } \tablenotetext{c}{The reference epoch is J2020.0 and the reference position is MF1. The fitted positions of MF1 with minor offsets are caused by the maser structures.} \tablenotetext{d}{The radial velocity drift} \tablenotetext{e}{The relative proper motions are defined as $\ifmmode {\mu_x}\else {$\mu_x$}\fi = \mu_{\alpha \cos{\delta}}$ and $\ifmmode {\mu_y}\else {$\mu_y$}\fi = \mu_{\delta}$.} \end{deluxetable*} \subsection{Astrometry} \label{sec:metry} \subsubsection{VERA Bona-Fide Astrometry in ESTEMA \label{sec:plx}} As marked in Table \ref{tab:obs}, 14 epochs of data yielded successful phase-referencing astrometry with VERA dual-beam system. The dual-beam astrometry failed at other epochs due to various reasons, such as the masers in the trough of the stellar pulsation cycles being too weak, key stations missing, and low sensitivity due to bad weather. The compact calibrator J0524$+$7034 shown in Figure~\ref{fig:qso} was used as the phase reference source, thus we expect no or little effects from its source structure. \begin{figure}[t] \epsscale{0.5} \plotone{Fig6_qso.pdf} \caption{VERA image of J0524$+$7034 observed on 2020 January 10. The contour map is drawn with contour levels of 3,6,12,24,...×$\sigma$, where 1$\sigma$ corresponds to 0.005 Jy~beam$^{-1}$. \label{fig:qso}} \end{figure} As shown in Figure \ref{fig:integ}, few maser features can be detected with VERA alone. Among them, MF1 is the brightest maser feature, which can be detected over one year. The maser feature position can not be well determined using only one maser spot, because the maser spots are blended in position and frequency and the intensity of the blended components can vary with time (as shown in Figure \ref{fig:timemaser}). Instead, we used positions in about 5 spectral channels (velocity spacing of $\sim$0.5~km~s$^{-1}$) where the maser spots were at the peak brightness, with compact emission and minimal blending. The positions of the maser spots relative to the calibrator J0524$+$7034 were measured as a function of time, and the positions were then modeled by the parallax, proper motion, position at a reference epoch, and the possible acceleration. We then assess the astrometric quality based on the magnitude of the post-fit residuals. The formal position uncertainties were usually smaller than the actual error, since the unknown systematic error (i.e., the tropospheric delay residual, maser structures, etc.) often dominate over random noise \citep{2009ApJ...693..397R,2020PASJ...72...52N}. The systematic error was added in quadrature to the priori error so that the reduced chi-square value became nearly unity. Figure \ref{fig:plxmf1} and Table \ref{tab:mf1_fit} show the outcomes of the astrometric fitting for MF1 positions measured with the VERA astrometric technique \citep{2020PASJ...72...52N}. In this astrometric fitting, we compared the different parameters, such as, using the data at different timescales and including the acceleration or not. We found different deviations from a common constant proper motion, or an acceleration, in declination between 2020 and 2021. This could come from either the variation in the maser structure (Figure \ref{figmf}) or a non-uniform acceleration in the maser feature. Taking into account the ambiguity in the results from these different estimation procedures, we conservatively obtained a parallax value of 1.79$\pm$0.08 mas. This is consistent with 1.76$\pm$0.10 mas from $Gaia$\ EDR3 \citep{2021A&A...649A...1G} and 1.73$\pm$0.03 mas from the previous VERA result \citep{2020PASJ...72...56M} within 1 sigma level. The proper motions of the individual maser features usually are different from the central star, due to the extra internal motions of the masers. However, the proper motion of the maser feature MF1 (14.37$\pm$0.20, -35.46$\pm$ 0.44 mas~yr$^{-1}$) is consistent with $Gaia$\ EDR3 (14.29$\pm$0.07, -34.63$\pm$ 0.10 mas~yr$^{-1}$) within 1 sigma in east direction and 2 sigma in north direction, due to a small projection distance (less than 7 mas as discussed in Section \ref{sec:sfpr}) between MF1 and central star. \begin{deluxetable*}{llllrrrrr}[ht!] \tablenum{3} \tablecaption{Astrometric fitting for MF1 with VERA \label{tab:mf1_fit}} \tablewidth{700pt} \tabletypesize{\scriptsize} \tablehead{ \colhead{MF\tablenotemark{a}} & \colhead{Time} & \colhead{Acceleration}& \colhead{Parallax } & \colhead{\ifmmode {\mu_x}\else {$\mu_x$}\fi \tablenotemark{b}} & \colhead{\ifmmode {\mu_y}\else {$\mu_y$}\fi \tablenotemark{b}} & \colhead{Acc x\tablenotemark{c}} & \colhead{Acc y\tablenotemark{c}} & \colhead{RMS RA/Dec \tablenotemark{d}} \\ \colhead{ID} & \colhead{Range}& \colhead{Estimation} & \colhead{(mas)} & \colhead{mas~yr$^{-1}$} & \colhead{mas~yr$^{-1}$}& \colhead{mas~yr$^{-2}$} & \colhead{mas~yr$^{-2}$} & \colhead{(mas mas)} } \startdata MF1 & 2019.8-2021.3 & No & 1.90$\pm$0.02 & 14.35$\pm$0.02 & $-35.13\pm$0.02 & - & - & 0.082 0.060 \\ & 2019.8-2021.3 & Yes & 1.82$\pm$0.03 & 14.08$\pm$0.06 & $-35.51\pm$0.10 & 0.47$\pm$0.10 &0.70$\pm$0.19 & 0.081 0.040\\ & 2020.2-2021.3& No & 1.75$\pm$0.05 & 14.40$\pm$0.04 & $-35.04\pm$0.03 & - & - & 0.093 0.043 \\ & 2020.2-2021.3& Yes & 1.67$\pm$0.07 & 14.65$\pm$0.25 & $-36.15\pm$0.23 & -0.36$\pm$0.34 &1.53$\pm$0.32 & 0.093 0.027 \\ \hline & Combined\tablenotemark{e} & & 1.79$\pm$0.08 & 14.37$\pm$0.20 & -35.46$\pm$0.44\\ \enddata \tablenotetext{a}{Maser feature ID from Figure \ref{fig:maser}.} \tablenotetext{b}{Absolute proper motions are defined as $\ifmmode {\mu_x}\else {$\mu_x$}\fi = \mu_{\alpha \cos{\delta}}$ and $\ifmmode {\mu_y}\else {$\mu_y$}\fi = \mu_{\delta}$.} \tablenotetext{c}{The fitted accelerations/decelerations.} \tablenotetext{d}{The root mean square (RMS) of the residuals in RA and Dec.} \tablenotetext{e}{The unweighted average and standard deviation.} \end{deluxetable*} \begin{figure*}[t] \epsscale{1}\plotone{Fig7_para_curve_v2.eps} \epsscale{0.55}\plotone{Fig7_res1_v2.pdf} \epsscale{0.55}\plotone{Fig7_res2_v2.pdf} \caption{Parallax fitting for MF1 with VERA astrometry. Top panel: An example of the fitted parallax curve using the data points during the period 2019.8--2021.3 without an acceleration. Bottom-left panel: Residuals of the fitting using the data points during the period 2019.8--2021.3. The data points from the fitting including an acceleration have a constant horizontal offset from those without an acceleration for clarity. Bottom-right panel: Same as the bottom-left panel but the period 2020.2--2021.3. \label{fig:plxmf1}} \end{figure*} \subsubsection{Astrometric fitting for maser features with the EAVN data} \label{sec:plx-other} We can obtain the absolute positions of the bright and compact maser spots from the 14 epochs with the VERA data. The bright and compact maser feature (MF1 in $\phi\ 1.89\sim 2.29$ and $\phi\ 2.93\sim 3.03$ , MF4 in $\phi\ 1.04\sim 1.19$) was then used to register the VERA and EAVN maps. The registration accuracy can be expressed as $\sigma_{registration} = \sqrt{ {\sigma_{{thermal_{\rm VERA}}}}^2 + {\sigma_{{structure_{\rm VERA}}}}^2 + {\sigma_{{thermal_{\rm EAVN}}}}^2 + {\sigma_{{structure_{\rm EAVN}}}}^2}$ , where $\sigma_{thermal}$ is the thermal (random) noise determined by an elliptical Gaussian fitting with the AIPS task ``SAD'' and $\sigma_{structure}$ is the error effected by maser structure estimated by the blended peak components as shown in Figure \ref{fig:timemaser} in the VERA/EAVN images. Because MF1 and MF4 are bright and compact, the thermal noises are $<$ 0.02 mas and structure errors are $\sim$ 0.05 mas for both VERA and EAVN maps. We believe the registration errors between VERA and EAVN maps are typically $\sim$ 0.1 mas. These registration errors are used as the prior errors in the astrometric fitting. Note that this uncertainty may be propagated to the errors in deriving the parallaxes of maser features with the astrometrically registered EAVN maps, as described in Section \ref{subsection4.1-astrometry}. Table~\ref{tab:fitall} shows the independent parallax fits for the residuals of maser feature positions derived after subtracting the modulation of the annual parallax derived from the VERA data. The results were based on the same fitting procedures as mentioned in Section \ref{sec:plx} and with/without acceleration parameters were compared. Averaging all the fitting results, we obtained a combined parallax residual of 0.07$\pm$0.06 mas, which is consistent with the estimated error of the parallax ($\pi=$ 1.79$\pm$0.08 mas). \begin{deluxetable*}{lllrrrrrrr}[ht!] \tablenum{4} \tablecaption{Astrometric fitting for positions of the maser features with EAVN, registered using VERA astrometry \label{tab:fitall}} \tablewidth{700pt} \tabletypesize{\scriptsize} \tablehead{ \colhead{MF\tablenotemark{a}} & \colhead{Time} & \colhead{Acceleration} & \colhead{Residual \tablenotemark{b}} & \colhead{\ifmmode {\mu_x}\else {$\mu_x$}\fi \tablenotemark{c}} & \colhead{\ifmmode {\mu_y}\else {$\mu_y$}\fi \tablenotemark{c}} & \colhead{Acc x\tablenotemark{d}} & \colhead{Acc y\tablenotemark{d}} & \colhead{RMS RA/Dec \tablenotemark{e}} \\ \colhead{ID} & \colhead{Range (Epochs)} & \colhead{Estimation} & \colhead{Parallax (mas)} & \colhead{mas~yr$^{-1}$} & \colhead{mas~yr$^{-1}$}& \colhead{mas~yr$^{-2}$} & \colhead{mas~yr$^{-2}$} & \colhead{(mas mas)} } \startdata MF1 & 2019.8-2021.3 (11) & Yes & 0.00$\pm$0.04 & 14.08$\pm$0.06 & -35.51$\pm$0.10 & 0.47$\pm$0.10 &0.70$\pm$0.19 & 0.081 0.040\\ & & No & 0.00$\pm$0.03 & 14.35$\pm$0.02 & -35.13$\pm$0.02 & - & - & 0.082 0.060 \\ MF2 & 2018.8-2021.3 (13) & Yes & 0.13$\pm$0.04 & 14.40$\pm$0.02 & -34.92$\pm$0.02 & 0.14$\pm$0.05 &-0.48$\pm$0.05 & 0.075 0.094 \\ & & No & 0.05$\pm$0.03 & 14.38$\pm$0.02 & -34.85$\pm$0.03 & - & - & 0.083 0.161 \\ MF3 & 2018.8-2021.2 (11) & Yes & 0.06$\pm$0.09 & 14.79$\pm$0.51 & -36.43$\pm$0.23 & -0.28$\pm$0.28 & -1.82$\pm$0.45 & 0.601 0.470\\ & & No & 0.11$\pm$0.06 & 14.62$\pm$0.08 & -35.51$\pm$0.05 & - & - & 0.609 0.446 \\ MF4 & 2018.8-2020.2 (8) & Yes & 0.09$\pm$0.05 & 13.46$\pm$0.18 & -35.77$\pm$0.20 & 0.73$\pm$0.26 & 0.09$\pm$0.32 & 0.059 0.104 \\ & & No & 0.02$\pm$0.04 & 13.01$\pm$0.03 & -35.84$\pm$0.07 & - & - & 0.057 0.103 \\ MF5 & 2019.0-2021.2 (5) & Yes & 0.07$\pm$0.11 & 13.56$\pm$0.12 & -37.50$\pm$0.17 & 0.66$\pm$0.26 & 0.29$\pm$0.34 & 0.314 0.362\\ & & No & 0.02$\pm$0.09 & 13.85$\pm$0.17 & -37.34$\pm$0.11 & - & - & 0.354 0.360\\ MF7 & 2018.9-2021.3 (13) & Yes & 0.17$\pm$0.07 & 14.81$\pm$0.17 & -38.22$\pm$0.22 & 0.35$\pm$0.29 &-0.62$\pm$0.40 & 0.078 0.189 \\ & & No & 0.09$\pm$0.04 & 14.99$\pm$0.04 & -38.51$\pm$0.05 & - & - & 0.082 0.192 \\ MF8 & 2018.8-2021.2 (9) & Yes & 0.12$\pm$0.09 & 15.78$\pm$0.05 & -39.65$\pm$0.04 & 0.14$\pm$0.11 & -0.04$\pm$0.14 & 0.179 0.141 \\ & & No & 0.08$\pm$0.05 & 15.78$\pm$0.05 & -39.64$\pm$0.03 & - & - & 0.180 0.141\\ MF9 & 2018.8-2021.2 (12) & Yes & 0.05$\pm$0.06 & 15.32$\pm$0.05 & -38.70$\pm$0.05 & -0.17$\pm$0.09 & 0.03$\pm$0.11 & 0.294 0.172\\ & & No & -0.01$\pm$0.04 & 15.37$\pm$0.04 & -38.70$\pm$0.03 & - & - & 0.298 0.172 \\ MF10 & 2019.8-2021.3 (10) & Yes & 0.17$\pm$0.09 & 15.65$\pm$0.26 & -38.28$\pm$0.24 & 0.16$\pm$0.47 & -0.58$\pm$0.48 & 0.139 0.198 \\ & & No & 0.11$\pm$0.06 & 15.59$\pm$0.07 & -38.02$\pm$0.08 & - & - & 0.139 0.200 \\ MF11 & 2018.8-2021.3 (7) & Yes & 0.14$\pm$0.09 & 16.59$\pm$0.29 & -38.87$\pm$0.27 & -0.97$\pm$0.65 & 0.74$\pm$0.52 & 0.115 0.116\\ & & No & 0.11$\pm$0.05 & 17.06$\pm$0.05 & -39.21$\pm$0.07 & - & - & 0.127 0.129\\ MF12 & 2018.8-2020.2 (4) & Yes & 0.03$\pm$0.05 & 17.96$\pm$0.37 & -38.95$\pm$0.48 & 0.86$\pm$0.47 & -0.15$\pm$0.62 & 0.120 0.182\\ & & No & 0.04$\pm$0.05 & 17.48$\pm$0.18 & -39.00$\pm$0.10 & - & - & 0.121 0.184 \\ MF13 & 2018.8-2020.0 (10) & Yes & 0.05$\pm$0.04 & 15.75$\pm$0.07 & -36.26$\pm$0.15 & -0.32$\pm$0.12 &0.90$\pm$0.28 & 0.169 0.228 \\ & & No & 0.01$\pm$0.03 & 15.60$\pm$0.01 & -35.76$\pm$0.02 & - & - & 0.169 0.235 \\ MF14 & 2019.9-2021.2 (9) & Yes & 0.20$\pm$0.07 & 15.86$\pm$0.21 & -35.23$\pm$0.28 & 0.52$\pm$0.37 & -1.35$\pm$0.50 & 0.169 0.101 \\ & & No & 0.05$\pm$0.04 & 16.04$\pm$0.08 & -35.95$\pm$0.08 & - & - & 0.184 0.130 \\ MF15 & 2019.8-2021.2 (7) & Yes & 0.11$\pm$0.12 & 14.90$\pm$0.42 & -34.94$\pm$0.32 & 1.28$\pm$0.65 & -1.21$\pm$0.55 & 0.208 0.308\\ & & No & 0.13$\pm$0.06 & 15.71$\pm$0.08 & -35.60$\pm$0.10 & - & - & 0.210 0.314 \\ MF16 & 2020.1-2021.2 (4) & Yes & 0.07$\pm$0.14 & 16.76$\pm$0.41 & -34.57$\pm$0.46 & 1.03$\pm$0.60 & 0.19$\pm$0.81 & 0.070 0.070\\ & & No & 0.00$\pm$0.09 & 17.46$\pm$0.10 & -34.44$\pm$0.11 & - & - & 0.070 0.068\\ MF17 & 2019.0-2021.3 (12) & Yes & 0.06$\pm$0.07 & 14.75$\pm$0.08 & -35.16$\pm$0.11 & 0.46$\pm$0.14 & -0.09$\pm$0.19 & 0.233 0.322\\ & & No &-0.02$\pm$0.05 & 15.03$\pm$0.05 & -35.18$\pm$0.07 & - & - & 0.250 0.321 \\ \hline & Combined\tablenotemark{f} & Yes & 0.10$\pm$0.05 \\ & Combined\tablenotemark{f} & No & 0.05$\pm$0.05\\ & Combined\tablenotemark{f} & ALL & 0.07$\pm$0.06\\ \enddata \tablenotetext{a}{Maser feature ID from Figure \ref{fig:maser}. } \tablenotetext{b}{The residual parallax after subtracting the parallax 1.82$\pm$0.03 mas for with acceleration(Yes) and 1.90$\pm$0.02 mas for without acceleration(No).} \tablenotetext{c}{The relative proper motions are defined as $\ifmmode {\mu_x}\else {$\mu_x$}\fi = \mu_{\alpha \cos{\delta}}$ and $\ifmmode {\mu_y}\else {$\mu_y$}\fi = \mu_{\delta}$.} \tablenotetext{d}{The possible accelerations/decelerations.} \tablenotetext{e}{The root mean square (RMS) of the residuals in RA and Dec.} \tablenotetext{f}{The unweighted average and standard deviation.} \end{deluxetable*} \subsubsection{The stellar position in the \texorpdfstring{H$_{2}$O}{H2O} maser distribution} \label{sec:sfpr} Determining the stellar position with respect to the H$_{2}$O\ maser distribution is important to estimate the center of 3-D kinematics. $Gaia$\ EDR3 provided the stellar position with optical astrometry, however there may exist uncertainty for this AGB star \citep{2019ApJ...875..114X}. On the other hand, the center of the SiO maser ring should correspond to the position of the star. Figure \ref{fig:sio} shows the registered map of the H$_{2}$O\ and SiO masers with the KVN data, to which the SFPR calibration technique was applied \citep{2014AJ....148...97D}. The positional reference is the H$_{2}$O\ maser at $V_{\rm LSR} = -$11.05 ~km~s$^{-1}$\ (MF1). We obtained the position of the central star ($-5.1\pm 0.3$ mas, $-0.8\pm 0.2$ mas) as indicated as the center of the solid circle in the least-squares circle method \citep{2018NatCo...9.2534Y}. The estimated position of the central star is consistent with $Gaia$\ EDR3 result ($-6.5\pm 0.3$ mas, $+1.5\pm 0.4$ mas) with an uncertainty of 2.7 mas on 2020 January 10. The differences between the estimated position and $Gaia$\ EDR3 result ($-6.5\pm 0.3$ mas, $+1.5\pm 0.4$ mas) are 1.4 mas ($\sim$3 sigma) in east direction and 2.3 mas ($\sim$5 sigma) in north direction on 2020 January 10. \begin{figure}[t] \epsscale{0.7} \plotone{Fig8_sio.png} \caption{Registered map of the H$_{2}$O\ and SiO({\it$v$=1, J=1$\rightarrow$0}) masers observed on 2020 January 10 using the KVN data, which were taken from velocity-channel integration with weights based on the root-mean-square noise level. Black star indicates the estimated position of the star at the center of the SiO maser ring using the least-squares circle method \citep{2018NatCo...9.2534Y}. Red star indicates the position of the star derived from $Gaia$\ EDR3. The contour map is drawn with contour levels of 3,6,12,24,...×$\sigma$, where 1$\sigma$ corresponds to 0.025 Jy~beam$^{-1}$ (H$_{2}$O) and 0.120 Jy~beam$^{-1}$ (SiO), respectively. \label{fig:sio}} \end{figure} \subsection{The expansion of the BX Cam flow traced by H$_{2}$O\ masers} \label{sec:3Dkinematics} Figure \ref{fig:gaiavideo} displays the astrometric animation of H$_{2}$O\ masers at the 33 epochs from 2018 May 24 to 2021 Jun 7. Because of variable intervals of the observation epochs, including large blanks of the observations, the final version of the animation will be edited with some epoch-interpolation technique \citep{2013MNRAS.433.3133G}. Even the current version of the animation, one can recognize radial outward motions of the H$_{2}$O\ maser features, helping us for noting interesting properties of the maser motions described as follows. \begin{figure}[t] \epsscale{1.0} \begin{interactive}{animation}{bxcam_h2o.mp4} \plotone{Fig9_cartoon.png} \end{interactive} \caption{Astrometric Animation of H$_{2}$O\ masers around BX Cam. The coordinate system is astrometrically fixed with the star whose position is determined using $Gaia$\ EDR3. Maser feature motions on the sky with modulation due to the annual parallax (1.79$\pm$0.08 mas) and the proper motion (14.37$\pm$0.20, $-35.46\pm 0.44$ mas~yr$^{-1}$) of the referenced maser feature MF1 subtracted. A red-filled circle denotes the central star whose position (parallax: 1.76$\pm$0.10 mas, proper motion: 14.29$\pm$0.07, $-34.63\pm 0.10$ mas~yr$^{-1}$) has been determined in $Gaia$\ EDR3. The lower panel is the optical light curve of AAVSO and the red vertical line follows the phase. An animated version of this figure is available. It covers 33-epoch maser maps from 2018 May 24 to 2021 Jun 7. The video duration is 16 seconds. \label{fig:gaiavideo}} \end{figure} Figure \ref{fig:exp_time} and \ref{fig:exp_vel} present the combined cube of the maser features synthesized with the cubes from the ``High-Res. Imaging" in Table \ref{tab:obs}. The constant velocity proper motions and spoke-like maser features in BX Cam ``point back" towards the central star. However, the point-back directions of the maser features in different groups (e.g, group MF[7,8,9,10,11,12] and group MF[13,14,15]) may converge into different areas, which may also have offsets from the location of the central star and the ring of SiO masers, as shown by auxiliary dashed lines. Thus the H$_{2}$O\ maser kinematics may have origins different from the central star, if we assume that masers have the constant proper motions. The CSE of BX Cam were reported with the LSR velocity range from -5 to +5 ~km~s$^{-1}$\ for SiO masers \citep{2020PASJ...72...56M}, from -16 to -4 ~km~s$^{-1}$\ and from +7 to +10 ~km~s$^{-1}$\ for H$_{2}$O\ masers (Figure \ref{fig_pos_vel}), from +12 to +17 ~km~s$^{-1}$\ for OH masers \citep{1985A&AS...59..465S} , and up to 21 ~km~s$^{-1}$\ for CO $J=1\rightarrow 0$ line \citep{1985ApJ...292..640K}, which shows a gradual acceleration from SiO maser to CO $J=1\rightarrow 0$ line. Figure \ref{fig_pos_vel} shows the angular distance--LSR velocity diagram of the H$_{2}$O\ maser features. To examine the variation of maser flows on long timescales, we compared the maser maps made by VERA from 2012 to 2014 \citep{2020PASJ...72...56M} and made by ESTEMA from 2018 to 2021 (Figure \ref{fig:exp_time}). Figure \ref{vera} shows the registered map of the ESTEMA maser flows with that of \cite{2020PASJ...72...56M}. Adopting a radial velocity of BX Cam as 0 ~km~s$^{-1}$\ \citep{2020PASJ...72...56M}, we derived the three dimensional expanding velocities of H$_{2}$O\ maser features using $V_{\rm LSR}$\ and internal proper motions. The maser map of \cite{2020PASJ...72...56M} showed only the blueshift dominant features with respect to the central star. They obtained a three-dimensional velocity of 14.8$\pm$1.4 ~km~s$^{-1}$\ with three collimated flows, and concluded that the H$_{2}$O\ masers trace an outflow with a quite uniform velocity. However, our result shows a wider range of 9 ~km~s$^{-1}$\ (inner radii) to 19 ~km~s$^{-1}$\ (outer radii) at different directions. These differences may be caused by the different observational epochs (different pulsation phases) originated from characteristics of the Mira variable star BX Cam, which traces the different expanding shells relative to \cite{2020PASJ...72...56M}. Base on Figure 9--13, there are three main groups of H$_{2}$O\ maser features. The first one (Group A: MF[1,2,3,13,14,15,17]) is associated with the inner blue-shifted maser feature closer to the central star, the second (Group B: MF[5,6,7,8,9,10,11,12]) is associated with the outer blue-shifted lobe of the outflow, and the third (Group C: MF4) is associated with the red-shifted maser feature of the outflow. The red-shifted maser feature of the outflow (from behind the central star) is very time variable as shown in Figure \ref{fig:spec}. The three-dimensional velocities are estimated to be 12.8$\pm$3.5 ~km~s$^{-1}$\ for all maser features, 10.5$\pm$2.0 ~km~s$^{-1}$\ for Group A, 15.5$\pm$2.8 ~km~s$^{-1}$\ for Group B, and 10.1 ~km~s$^{-1}$\ for Group C (MF4). We also made a least-squares model-fitting analysis assuming a model of an outflow that is radially expanding at a constant velocity. The detail of the modeling has already been described in \cite{2012ApJ...744...23Z}. We adopted weights proportional to the square of the accuracy of a measured proper motion. The expansion center was assumed to be at the ring center of the SiO masers whose map registration was yielded in KVN SFPR (Section \ref{sec:metry}). The systemic velocity is adopted to be $\sim$0~~km~s$^{-1}$\ \citep{2020PASJ...72...56M}. Thus the expansion velocity of H$_{2}$O\ masers is estimated to be 13.0 $\pm$ 3.7 ~km~s$^{-1}$, which is consistent with the result (14.8 $\pm$ 1.4 ~km~s$^{-1}$) that found in the VERA observations during 2012--2014 \citep{2020PASJ...72...56M}. Figure \ref{3d} shows the spatial distribution and velocity vectors of the maser features with respect to the outflow origin projected on the R.A.-Distance (XZ) and Distance-Dec (ZY) planes, which was obtained after the model fit assuming a radially expanding flow \citep{2000ApJ...538..751I}. The outer masers roughly exhibit radial expansions and are located at similar distances from the central star at roughly a constant expansion velocity. Thus the masers seem to be associated with a spherically expanding outflow although the directions of the maser excitation are significantly biased and changed from time to time on the timescale of several years. However, there exist some big deviations from the spherical flow for the inner masers projected closely to the central star in the sky, which may be caused by the result of enhancement of large uncertainties in the maser positions on Z-axis and some random maser motions in the modeling. \begin{figure}[t] \epsscale{1.2} \plotone{Fig10_exp_time_bar.png} \caption{Expansion of the BX Cam flow traced by H$_{2}$O\ masers. The positional reference is $Gaia$\ EDR3 (red star). Black circle denotes the fitted ring of SiO masers in Section \ref{sec:sfpr}. The different colors of the maser spots indicate different observation epochs, which are astrometrically fixed using the method in Figure \ref{fig:gaiavideo}. An auxiliary dashed line indicates a possible trajectory of an maser feature from 2012 to 2022 at a constant velocity vector, while the nearby lines in light grey show the position error of the back-extrapolated motion vectors. The lines of motion are drawn with the positions and proper motions of the maser feathers estimated in Table \ref{tab:vel}. \label{fig:exp_time}} \end{figure} \begin{figure}[t] \epsscale{1.2} \plotone{Fig11_exp_vel_bar.png} \caption{Same as Figure \ref{fig:exp_time} but the different colors of the maser spots indicate different LSR velocities. \label{fig:exp_vel}} \end{figure} \begin{figure}[t] \epsscale{1.2} \plotone{Fig12_dis_lsr.png} \caption{Angular distance--LSR velocity diagram. The position of the star was used as the center of the SiO maser ring. \label{fig_pos_vel}} \end{figure} \begin{figure}[t] \epsscale{1.0} \plotone{Fig13_veraCSE.png} \caption{The registered maser flows from EAVN (ESTEMA) and VERA \citep[Table 4 of][] {2020PASJ...72...56M} observed at different pulsation circles. The registration is performed with $Gaia$\ EDR3. The numbers around the maser features are the three-dimensional velocities in ~km~s$^{-1}$. \label{vera}} \end{figure} \begin{figure}[t] \epsscale{0.5} \epsscale{0.5}\plotone{Fig14_1_velXZ} \epsscale{0.5}\plotone{Fig14_2_velZY} \caption{ The Top view (Left panel: R.A.-Distance, XZ-plane) and the East-side view (Right panel: Distance-Dec., ZY-plane) of the estimated positions and proper motions with respect to the outflow origin, using the method of \citet{2000ApJ...538..751I}. The base of the arrow is pointed to the position of the maser feature. The direction and length of the arrow represent the direction and magnitude of the proper motion, respectively. The red and blue arrows show the maser feature motions found in the EAVN (ESTEMA) and VERA observations \citep{2020PASJ...72...56M}, respectively. \label{3d}} \end{figure} \section{Discussion} \subsection{Astrometry for CSE H$_{2}$O\ masers} \label{subsection4.1-astrometry} Our work has evaluated the accuracy of the annual parallax measurement with CSE H$_{2}$O\ masers, majority of whom are located in the stellar neighborhood and exhibit extended brightness distributions. The importance of astrometry is also demonstrated for the maser animation, which is a key to register the maser images at different epochs and extract the intrinsic motions of maser features associated with the CSE. The astrometric accuracy of the VERA was evaluated in detail by \cite{2020PASJ...72...52N}, which achieves the parallax accuracy of 10 $\mu$as\ in the best cases. Our targets were observed with a background calibrator 2\ifmmode{^{\circ}}\else{$^{\circ}$}\fi\ away, and at elevations of $\sim$ 50\ifmmode{^{\circ}}\else{$^{\circ}$}\fi. The single-epoch position accuracy for a given baseline can be estimated to be $\sim$80 $\mu$as\ using the Table 1 of \citet{2020PASJ...72...52N}, indicating an expected parallax uncertainty better than 30 $\mu$as\ with 10 epochs extended over more than one year. However, our derived parallax (1.79$\pm$0.08 mas) has an uncertainty more than twice the expected one, probably due to the variation in the maser structure (MF1 in Figure \ref{figmf}) or an irregular motion due to shocks or radiation-coupled flow as shown in the Figure \ref{fig:plxmf1}. Nevertheless it is consistent with that previously derived with VERA (1.73$\pm$0.03 mas) \citep{2020PASJ...72...56M} and $Gaia$\ EDR3 (1.76$\pm$0.10 mas) \citep{2021A&A...649A...1G} within 1 sigma. These parallaxes also rule out a larger parallax (4.13$\pm$0.25 mas) reported in $Gaia$\ DR2 \citep{2018A&A...616A...1G}. There is evidence that there may exist uncertainty in the $Gaia$\ DR2 parallaxes for the AGB stars from their large sizes, temporal and spatial variation in the surface brightness, and/or extinction by the circumstellar dust \citep{2019ApJ...875..114X}. These factors may prevent the improvement of the parallax accuracy even in future $Gaia$\ results using more measurements and better calibration of systematics. As already shown in Section \ref{sec:metry}, the individual maser features also exhibit some deviations from linear motions. The smaller residuals in Figure \ref{fig:plxmf1} support the parallax fitting including such an acceleration. However, it is obscure whether the observed acceleration really reflects a real one rather than just an illusion caused by a drift of a maser emission area in the maser gas clump. This should be tested with further analysis of the observed accelerations in the combined maser features around this star. The residual parallaxes of all maser features found in the EAVN maps are probably affected by their extended structures, the errors in the astrometric registration of the EAVN and VERA maps, and/or the possible non-linear motions. Note that an additional error contribution as mentioned above may have possibilities to increase and decrease the parallax value. Therefore, we adopted a parallax value using MF1 only (Section \ref{sec:plx}) and give a conservative uncertainty that would cover all of the possible errors (Section \ref{sec:plx-other}). The stellar position in the H$_{2}$O\ maser distribution was estimated to be at the ring center of the SiO masers whose locations are determined in the KVN astrometry with the SFPR technique at a single epoch. The SiO maser ring structure will be further clarified with multiple maser lines \citep{2018NatCo...9.2534Y}. Even the present results, one can clearly see an offset of the expansion center of the H$_{2}$O\ maser flow from the center of the SiO maser ring as shown in Figure \ref{fig:exp_time}. This may be caused by either the uncertainty of the stellar proper motion measured in $Gaia$\ EDR3 and adopted in the maser map registration, or a possible deviation of the outflow from a radial expansion. \subsection{CSE spatio-kinematics: asymmetric maser distribution and its evolution} The asymmetry/inhomogeneity of the spatial distribution is evident throughout the three-dimensional maser kinematics of H$_{2}$O\ masers that we have revealed. The maser outflows are dominated by the blue-shifted H$_{2}$O\ maser features (dominant blue-shifted outflow of bipolar outflow). Compared to the maser features detected with VERA from 2012 to 2014 \citep{2020PASJ...72...56M}, we have detected the central and southern components, and also new red-shifted components. The northern components previously mapped by \cite{2020PASJ...72...56M} have become so faint that they are detected only on KVN baselines, at a few epochs. Although the velocity field of the masers is generally consistent with the expanding shell model, the expansion is not strictly isotropic. For BX Cam, the distribution of the maser features is limited in a thick-shell region (Section \ref{sec:3Dkinematics}), which has inner and outer expansion velocities of 9 ~km~s$^{-1}$\ and 19 ~km~s$^{-1}$\ at radii of $<$20 mas and 60 mas, respectively. There also exist gradual drifts in radial velocities and possible accelerations/decelerations in the proper motion. Here, we suppose a constant/gradual radial acceleration in a CSE (e.g. \citealt{2012IAUS..287..199R}) for BX Cam. Adopting the distance to the star $D=$560~pc, one can calculate a travel time from the inner and outer radii of the expanding maser shell to be $t_{\rm travel}\simeq$7.6~yr and an acceleration to be $a\simeq$1.3~~km~s$^{-1}$\ yr$^{-1}$, corresponding to $\dot{\mu}\simeq$0.5~mas~yr$^{-2}$. This suggests that observed drifts of LSR velocities can be explained by this kind of acceleration while the accelerations/decelerations seen in the maser proper motions (up to 1.8~mas yr$^{-2}$) cannot. Because the accuracy of the observed accelerations/deceleration is currently insufficient for further astrophysical interpretation, we reserve further statistical analysis for a separate paper. Nevertheless, the existence of such accelerations or deviations from constant velocity motion, may be detectable in the systematic residuals after the parallax and proper motion fitting. The expansion velocity and the projected distance to the central star of a mass-losing flow are seem to be time-dependent. The flows found in the ESTEMA data were compared with that in the VERA observations from 2012 to 2014 in Figure \ref{vera}. Different shells and distributions were detected at different times and with different arrays. Temporal variation in the morphology of individual maser features is also determined. The shapes of the maser structures are generally correlated with the direction of expansion. Figure \ref{figmf} also shows the complex variation of the interior structure, such as interior rotation, expansion, sub-structure, and change of direction. This might be due to any or all of: bulk rotation, internal turbulence, or a pattern speed due to shock wave propagation \citep{2012A&A...546A..16R,2020AdSpR..65..780R}. \subsection{Variability of the \texorpdfstring{H$_{2}$O}{H2O} maser } A correlation between the 22\,GHz H$_{2}$O\ maser and optical light curves with a time lag has been reported in AGB stars \citep{1993LNP...412..271B}. BX cam is in also such a case, and the measured time lag between the integrated water maser and optical light curves is about $\sim$25\,d. However, several bright masers often dominate the total integrated intensity, and thus it is hard to depict the variation of individual maser features or spots without spatially resolved maser maps. Our VLBI images allow us to trace individual maser features (shown in Figure \ref{fig:timemaser}) and groups of maser features (shown in Figure \ref{fig:submaser}). We find that the light curves of the individual maser features or groups have different time lags with the optical light curve. We note that H$_{2}$O\ masers are pumped by collision rather than radiation field, and hence other factors should be considered to interpret the correlation between maser and optical light curves, such as shock waves caused by stellar pulsation or giant planets, revolving the central star \citep{1988ApJ...330..986S,2001Icar..151..130R,2012A&A...546A..16R}. \section{SUMMARY} \label{sec:sum} We have measured the trigonometric parallaxes, proper motions, drifts in LSR velocities, and the possible accelerations/decelerations of the H$_{2}$O\ masers around the Mira variable BX Cam using EAVN observations. Our parallax is 1.79 $\pm$ 0.08 mas, which is consistent with $Gaia$\ EDR3 and previously measured VLBI parallaxes within their joint uncertainties. The stellar position with respect to the H$_{2}$O\ masers is registered by a ring of SiO masers using the KVN SFPR astrometry, which is consistent with that of $Gaia$\ EDR3 within 3 mas. There are asymmetries/inhomogeneities in both the spatial and velocity distributions of the H$_{2}$O\ masers although their motions are roughly modeled with a spherically expanding outflow. In fact, the maser locations have been dominant in a blue-shifted outflow with respect to the central star. The 3D H$_{2}$O\ maser kinematics indicates that the circumstellar envelope is expanding at a velocity of $13\pm4$ ~km~s$^{-1}$. A time lag of about 25\,d is also measured between the integrated water maser and optical light curves. More detailed maser kinematics for the CSE around BX Cam will appear in separate papers, covering multiple maser-line movies with SiO masers and the further discussion on the possibility of the maser clump acceleration. \acknowledgments We acknowledge with thanks the variable star observations from the AAVSO International Database contributed by observers worldwide and used in this research. We are grateful to all staff members in EAVN who helped to operate the array and to correlate the data. Particularly, the interferometer model (IM) files are provided by Mr. DongKyu Jung, and the delay re-calculation tables are made by Dr. Takumi Nagayama and Dr. Kazuya Hachisuka. The KVN is a facility operated by Korea Astronomy and Space Science Institute (KASI) and VERA is a facility operated by the National Astronomical Observatory of Japan (NAOJ) in collaboration with associated universities in Japan. Tianma 65-m telescope is operated by Shanghai Astronomical Observatory (SHAO). Nanshan 26-m telescop is operated by Xinjiang Astronomical Observatory (XAO). Takahagi 32- m telescope is operated by NAOJ and Ibaraki University and partially supported by the Inter-university collaborative project ``Japanese VLBI Network (JVN)'' of NAOJ. HI and MO was supported by JSPS KAKENHI JP16H02167. LC is supported by the CAS ``Light of West China'' Program (Grant No. 2021-XBQNXZ-005) and the National Natural Science Foundation of China (Grant No. U2031212). AMS was supported by the Russian Ministry of Science and Higher Education, No. FEUZ-2020-0030. BZ was supported by the National Natural Science Foundation of China (Grant No. U2031212 and U1831136), and Shanghai Astronomical Observatory, Chinese Academy of Sciences (Grant No. N2020-06-19-005). \vspace{5mm} \facilities{EAVN} \software{AIPS \citep{2003ASSL..285..109G}, ParselTongue \citep{2006ASPC..351..497K}, Astropy \citep{2013A&A...558A..33A}}
\section{Introduction} The fundamental method of the combinatorial topology consists in approximating a topological space by a sequence of its $k$-dimensional skeleta. Depending on the chosen combinatorial model for the cells, these skeleta may be cubical or simplicial or of some other type and may satisfy different combinatorial properties but, invariably, the 0th approximation is a discrete set and the first approximation is a graph. If a topological space is equipped with a product (or some other algebraic structure) that is compatible with the skeleta, its restriction to the $k$-skeleton can give rise to a new algebraic structure. When $k=0$, this algebraic structure is just the discrete version of the structure on the space: for instance, the vertices of a simplicial group form a discrete group. When $k=1$, we get genuinely new algebraic structures: simplicial groups give rise to pre-crossed modules, pre-cubical products produce augmented racks and, as a linearized version of the same construction, DG Lie algebras give us (augmented) Leibniz algebras. It has been observed (with some hard work involved) that racks and Leibniz algebras come with a new kind of homology. These invariants were first defined intrinsically, and then it was realized that they have a natural interpretation in terms of the corresponding cubical and DG structures. The goal of the present note is to point out that there is a similar homology for pre-crossed modules. Since both pre-crossed modules and augmented racks are one-dimensional ``shadows" of associative products, the former being simplicial and the latter pre-cubical, it is very natural that these new invariants are related to the rack homology. The definition of the ``pre-crossed'' homology is similar in spirit to the definition of the Leibniz homology via DG Lie algebras: it also uses the left adjoint to the 1-truncation functor, see \cite{MDGLie}. In fact, Loday, in his search of the integration procedure for Leibniz algebras, wrote that ``pre-crossed modules of groups give rise to a notion which almost fulfill the requirements about Leibniz algebras'' \cite[page 124]{LodayK}. However, the ``pre-crossed'' homology of an abelian group is different from what Loday expected from his conjectural Leibniz homology for groups and we do not explore the possible connections with the Leibniz algebras here. Recall that an {augmented rack} with the {augmentation group} $G$ is a right $G$-set $X$ together with a morphism of $G$-sets $$X\xrightarrow{\pi} G$$ where $G$ acts on itself by conjugation. If $X$ is a group on which $G$ acts by automorphisms and $\pi$ is a homomorphism, the augmented rack $X\xrightarrow{\pi} G$ is called a {pre-crossed module}. We will write the action of $G$ on $X$ as $$x\cdot g= x^g.$$ An augmented rack $X\xrightarrow{\pi} G$ gives rise to the pre-crossed module $$F(X)\xrightarrow{\overline{\pi}} G,$$ where $F(X)$ is the free group on $X$ and $\overline{\pi}$ is induced by $\pi$. We will show (Theorem~\ref{ra}) that the ``pre-crossed'' homology of this pre-crossed module coincides with the rack homology of $X\xrightarrow{\pi} G$. Another case when we can identify the ``pre-crossed'' homology is that of a pre-crossed module $X\xrightarrow{\pi} G$ with a trivial action: it turns out to be the tensor algebra on the homology of the group $X$. In other cases, these new invariants remain elusive, not unlike the rack homology. The tools that we use are classical. In order to relate the the rack homology to the ``pre-crossed'' homology we use the group-completion theorem of Quillen \cite{Q}. As for the computation of the homology for the pre-crossed modules with the trivial action (Theorem~\ref{tri}), it rests on the identification of the classifying space for the ``pre-crossed'' homology as a certain twisted version of the Milnor-Carlsson construction of a circle \cite{Carl}. When the action is trivial, the twisting vanishes and we use the result of Carlsson which describes the homotopy type of this space. We provide no background on racks and their homology since extensive literature exists on the subject; see, for instance \cite{FRS}. For details on simplicial groups we refer to \cite{Wu}. \section{The pre-crossed homology} \subsection{The universal simplicial envelope of a pre-crossed module}\label{use} Pre-crossed modules have been studied in some detail in the context of the truncation functors for simplicial groups. A \emph{simpilicial group truncated to order $p$} is a finite sequence of groups $G_p, \ldots, G_0$ together with the face and degeneracy maps between them that satisfy the usual simplicial identities; see \cite{Cond}. Simplicial groups truncated to order $1$ can be identified with pre-crossed modules. Indeed, let $G_1\ \rrl\ G_0$ be a simplicial group truncated to order $1$ with face maps $d_0, d_1$ and the degeneracy $s_0$. The group $G_0$ can be identified with the subgroup $s_0G_0$ of the degenerate simplices in $G_1$ and, therefore, acts on $G_1$ by conjugation. Since $\ker d_0\subseteq G_1$ is a normal subgroup, $G_0$ acts on it by automorphisms. Therefore, $d_1: \ker{d_0}\to G_0$ is a pre-crossed module. Conversely, given a pre-crossed module $X\xrightarrow{\pi} G$, one has the simpilicial group truncated to order $1$ $$X\rtimes G\ \rrl\ G$$ with \begin{align*} d_0(x,g)&=g,\\ d_1(x,g)&=\pi(x) g \end{align*} and $$s_0(g)=(1,g).$$ We see that the categories of pre-crossed modules and simplicial groups truncated to order $1$ are equivalent. In what follows we will identify these categories. The \emph{truncation functor} from the category of simplicial groups to the category of simplicial groups truncated to order $p$ consists in discarding the simplices in dimensions higher than $p$. The truncation functor has the right and the left adjoint functors, known as the \emph{$p$-coskeleton} and the \emph{$p$-skeleton} functors. There is a canonical map from the $p$-skeleton to the $p$-coskeleton whose existence is guaranteed by the fact that they are the two adjoints to the truncation functor. The 1-skeleton $E_*(X,G,\pi)$ of a pre-crossed module $X\xrightarrow{\pi} G$ is constructed as follows. Let $Y_*$ be the simplicial set which in degrees lower than 2 coincides with $X\rtimes G\ \rrl\ G$, and in degrees 2 and higher is obtained by freely adding degenerate simplices. Define the simplicial group $E_*(X,G,\pi)$ to be the quotient of the free simplicial group $F(Y_*)$ generated by $Y_*$ by the relations of the form $$a*b = a\cdot b,$$ for each $a,b\in Y_1$, where the product on the left-hand side is taken in $F(Y_*)$ and on the right-hand side in $Y_1$. We call this group the \emph{universal simplicial envelope} of the pre-crossed module $\pi$. The simplicial group $E_*(X,G,\pi)$ in degree $k$ is generated by $$(x,g)_j = s_0^{j}s_1^{k-1-j}(x,g),$$ where $(x,g)\in Y_1$ and $j=0,\ldots, k-1$, and by $$g \in s_0^k G.$$ With these generators, the relations can be written as $$(x,g)_j = (x, 1)_j *g = g* (x^{g}, 1)_j, $$ $$(x_1, 1)_j* (x_2,1)_j = (x_1 x_2,1)_j,$$ $$g*h=gh,$$ and $$(1,1)_i=(1,1)_j=1.$$ It follows that $E_k(X,G,\pi)$ is a semidirect product of the free product of $k$ copies of $X$ with a copy of the group $G$ (see Remark~2.5 in \cite{Cond}). The faces and degeneracies in $E_*(X,G,\pi)$ restrict to the identity map on the semidirect factor $G$. For $(x,1)_j\in E_k(X,G,\pi)$ we have \begin{equation}\label{e1} s_i (x,1)_j = \left\{ \begin{array}{ll}(x,1)_{j+1}&\ \text{when}\ i\leq j\\(x,1)_{j}&\ \text{when}\ i>j\end{array} \right. \end{equation} and \begin{equation}\label{e2} d_i (x,1)_j = \left\{ \begin{array}{ll} \quad 1& \ \text{when}\ i=j=0,\\ (x,1)_{j}&\ \text{when}\ i>j\ \text{and}\ j<k-1\ ; \\ (x,1)_{j-1}&\ \text{when}\ i\leq j\ \text{and}\ j>0; \\ \ \pi(x)& \ \text{when}\ j=k-1,\ i=k.\end{array} \right. \end{equation} \subsection{The pre-crossed homology} From the explicit constructions in the previous subsection, we see that the group $G$ of the pre-crossed module $X\xrightarrow{\pi} G$ acts on $E_k(X,G,\pi)$ freely on the right by multiplication. Write $$PH_m(X,G,\pi) := H_m(E_*(X,G,\pi)/ G).$$ We call $PH_m(X,G,\pi)$ the $m$th \emph{pre-crossed} homology group of the pre-crossed module $X\xrightarrow{\pi} G$. \medskip One can exclude any mention of the group $G$ in the definition of the pre-crossed homology. Define a \emph{pre-crossed action of $X$ on itself} as a homomorphism $$\phi: X\to \mathrm{Aut}(X)$$ such that $\phi: X\to \phi(X)$ is a pre-crossed module. A pre-crossed module $X\xrightarrow{\pi} G$ gives rise to a pre-crossed action $\phi_\pi$ of $X$ on itself, namely, the composition $$X\xrightarrow{\pi} G\to \mathrm{Aut}(X).$$ Indeed, $\pi$ send the action of $G$ on $X$ to conjugation on $G$ and any surjective homomorphism sends conjugation to conjugation. If $\phi=\phi_\pi$, by the definition of the universal simplicial envelope we have that $$E_*(X,G,\pi)/ G = E_*(X,\phi(X),\phi)/ \phi(X),$$ so that the pre-crossed homology of $X\xrightarrow{\pi} G$ and $X\xrightarrow{\phi} \phi(X)$ are the same. In this manner, the pre-crossed homology does not depend on $G$ but only on the group $X$ and the homomorphism $\phi: X\to \mathrm{Aut}(X)$. Sometimes, we will write $PH_m(X,\phi)$ for $PH_m(X,G,\pi)$. \begin{remark} A pre-crossed action of a group on itself is a natural ``non-augmented'' version of a pre-crossed module. Essentially, it is the same thing as a rack with a compatible group structure. \end{remark} Pre-crossed modules form a category and the pre-crossed homology is easily seen to be functorial. \begin{proposition} There is a natural transformation of functors $$PH_m(X, G,\pi)\to H_m(G)$$ from the pre-crossed homology of $\pi:X\to G$ to the usual homology of the group $G$. \end{proposition} \begin{proof} Write $M_*(X,G,\pi)$ for the 1-coskeleton of the simplicial group truncated to order one $X\rtimes G\ \rrl\ G$. Since $G$ appears as a subgroup of the degenerate simplices in $M_k(X,G,\pi)$ for all $k$, it acts on $M_*(X,G,\pi)$ freely on the right. The canonical map of the 1-skeleton to the 1-coskeleton gives rise to a functorial map $$H_m(E_*(X,G,\pi)/ G)\to H_m(M_*(X,G,\pi)/ G).$$ Without loss of generality, we can assume that $\pi$ is surjective. It follows from \cite[Theorem~1.3]{Cond}, that the Moore complex of $M_*(X,G,\pi)$ is acyclic when $\pi$ is surjective and, therefore, $M_*(X,G,\pi)$ is contractible. Therefore $H_m(M_*(X,G,\pi)/ G)$ is the usual homology of $G$. \end{proof} \begin{remark} As we have already mentioned, the relationship between the pre-crossed and usual homology mirrors the relationship between the Leibniz and the Lie algebra homology in the context of DG Lie algebras, see \cite{MDGLie}. There are, in fact, other cases when a truncation (forgetful) functor has both right and left adjoints which lead to two kinds of (co)homologies with a natural transformation between them. The oldest such example is, probably, that of Lie triple systems that have two different enveloping Lie algebras, the universal and the standard enveloping algebra, which give rise to two versions of cohomology for Lie triple systems, \cite{Ha, Ho, Li}. In fact, the Yamaguti's cohomology of Lie triple systems \cite{Y} may have been the first (covert) appearance of Leibniz cohomology on the mathematical scene, see \cite{Z}. \end{remark} There are two cases of the pre-crossed homology that may be of particular interest: the homology of the pre-crossed module $F(X)\to G$ associated with the augmented rack $X\to G$ and the homology of the pre-crossed module $\mathrm{id}: G\to G$, where $G$ is a group acting on itself by conjugation. We will see in the next section that the first of these homologies coincides with the usual rack homology. Computing the latter is outside the scope of this note, although we explicitly identify it in the case of abelian $G$. \begin{remark} There are many functorially defined simplicial groups that fit in between the 1-skeleton and the 1-coskeleton of a pre-crossed module. For instance, if $R_*(0)$ is the kernel of the natural homomorphism $$E_*=E_*(X,G,\pi)\to M_*(X,G,\pi),$$ define for all integer $n>0$ $$R_*(n)=[E_*, R_*(n-1)].$$ Then $$E_*(n)=E_*/R_*(n)$$ is a simplicial group whose 1-truncation gives the pre-crossed module $X\xrightarrow{\pi} G$ and which carries an action of $G$. One may then consider the homology of $E_*(n)/G$ as a functor that interpolates between the usual homology of $G$ and the pre-crossed homology of $X\xrightarrow{\pi} G$. Similar functors exist for Leibniz algebras \cite{MDGLie}. \end{remark} \section{Relationship with the rack homology} \subsection{The Clauwens monoid and the rack space} Each augmented rack $X\xrightarrow{\pi} G$ embeds into a topological monoid that we call the \emph{Clauwens monoid} of $X\xrightarrow{\pi} G$ (see \cite{Clau}). One way to describe this construction is as follows \cite{MRacks}. Consider the one-dimensional cell complex $\Gamma_\pi$ with the set of vertices $G$ and the set of edges $X\times G$: for each $x\in X$ with $\pi(x)= h g^{-1}$ the complex $\Gamma_\pi$ has one edge $(x,g)$ from $g$ to $h$. The two-sided action of $G$ on itself by multiplications extends to the action of $G$ on $\Gamma_\pi$: $$\quad h\cdot (x, g) = (x^{h^{-1}}, hg)$$ and $$(x, g) \cdot h = (x, gh).$$ The \emph{Clauwens monoid} of $X\xrightarrow{\pi} G$ is obtained from $\Gamma_\pi$ by taking the quotient of the free monoid (that is, the James reduced product) on $\Gamma_\pi $ by the relations $$g*t = g\cdot t\quad \text{and}\quad t*g = t\cdot g,$$ where $g\in G\subset \Gamma_\pi, t\in \Gamma_\pi$, the star denotes the product in the free monoid and the dot -- the two-sided action of $G$ on $\Gamma_\pi$. There is a free right action of $G$ on the Clauwens monoid and the quotient is known as the \emph{rack space} of $X\xrightarrow{\pi} G$. The \emph{rack homology} of $\pi$ is then defined as the homology of the rack space of $X\xrightarrow{\pi} G$. \subsection{The group completion of the Clauwens monoid} The Clauwens monoid and the rack space have a natural structure of cubical complexes. They can, in fact, also be described in terms of simplicial groups. \begin{theorem}\label{ra} Let $X\xrightarrow{\pi} G$ be an augmented rack and $F(X)\xrightarrow{\overline{\pi}} G$ be its associated pre-crossed module. Then, the geometric realization of the simplicial group $E_*(F(X), G, \overline{\pi})$ is homotopy equivalent to the Clauwens monoid of $X\xrightarrow{\pi} G$ and the realization of $E_*(F(X), G, \overline{\pi})/G$ is the rack space of $\pi$. \end{theorem} The proof is, essentially, an application of Quillen's Theorem Q.4 in \cite{Q} on the group completion of a simplicial monoid. This theorem implies that if $M$ is a connected simplicial monoid and the canonical homomorphism of $M$ to its group completion $\overline{M}$ induces a homotopy equivalence of the classifying spaces $BM\to B\overline{M}$, the completion map $M\to \overline{M}$ itself is a homotopy equivalence\footnote{Theorem~Q.4 gives an isomorphism in homology, rather than homotopy, but this is sufficient since a connected monoid is homotopy simple.} after geometric realization. In order to use this result, we need the following: \begin{lemma}\label{above} Assume that a group $G$ acts on a free monoid $F$ by automorphisms. Then, the natural map $$B(F\rtimes G)\to B(\overline{F\rtimes G})$$ is a homotopy equivalence. \end{lemma} \begin{proof} By Proposition~Q.1 of \cite{Q}, $BF\to B\overline{F}$ is a homotopy equivalence. Also, we have $$\overline{F\rtimes G}= \overline{F}\rtimes G.$$ On the other hand, $B(F\rtimes G)$ and $B(\overline{F}\rtimes G)$ are fibre bundles over $BG$ and the natural map $$B(F\rtimes G) \to B(\overline{F}\rtimes G)$$ is a homotopy equivalence on the fibres and, therefore, a homotopy equivalence. \end{proof} We will also need Proposition~Q.2 of \cite{Q} which says that if, for a simplicial monoid $M$ each $M_k$ has the property that $BM_k\to B\overline{M}_k$ is a homotopy equivalence, the same holds true for $M$ itself. \begin{proof}[Proof of Theorem~\ref{ra}] Let $Y_*$ be the simplicial set which in degrees lower than 2 coincides with $X\rtimes G\ \rrl\ G$, and in degrees 2 and higher is obtained by freely adding degenerate simplices; it has been introduced in Section~\ref{use}. (It has been defined in the situation when $X$ is a group but its definition does not use the group structure on $X$). The geometric realization of $Y_*$ is precisely the cell complex $\Gamma_\pi$. Define the simplicial Clauwens monoid $C_*$ as the quotient of the free monoid on $Y_*$ by the relations $$g*h=gh, \ \ g*(x,h) = (x^{g^{-1}}, gh) \text{\ and\ } (x,g)*h = (x, gh),$$ for $g,h\in G, x\in X$. The geometric realization of the simplicial Clauwens monoid is homeomorphic to the topological Clauwens monoid since the operations of forming a free monoid and applying the relations can be expressed in terms of colimits and finite limits and, therefore, commute with the geometric realization. The group completion of $C_*$ coincides with $E_*(F(X),G,\pi)$. Each $C_k$ is a semidirect product of $G$ and a free monoid so, by Lemma~\ref{above}, Proposition~Q.1 and Theorem~Q.4 of \cite{Q}, the geometric realization of $C_*$ is homotopy equivalent to that of $E_*(F(X),G,\pi)$. Since the action of $G$ on $C_*$ and on $E_*(X,G,\pi)$ is free, the rack space of $X\xrightarrow{\pi} G$, which is the realization of $C_*/G$, is also homotopy equivalent to that of $E_*(X,G,\pi)/G$. \end{proof} \section{Pre-crossed modules with the trivial action and the Milnor-Carlsson construction} When we compute $PH_m(X,G,\pi)$ with the trivial action of $G$, the group $G$ can be replaced by the trivial group. In this case, $PH_m(X,G,\pi)$ coincides with the homology of the universal simplicial envelope, which can be explicitly identified: in degree $k$, it is the free product of $k$ copies of $X$, with the faces and degeneracies as in (\ref{e1}), (\ref{e2}). This simplicial group is well-known: it coincides with the based Milnor-Carlsson construction $J_X(S^1,*)$ on the circle $S^1$ with the coefficients in $X$ and the trivial action, as defined in \cite{Carl}. Recall that the original Milnor construction is the simplicial group version of the James reduced product: it assigns to a simplicial set $S$ the free simplicial group generated by $S$. Its homotopy type is that of the loop space on the suspension of $S$. Carlsson generalized it in \cite{Carl} to simplicial sets with a group action. Namely, if $S$ is a simplicial set with an action of a group $X$, Carlsson defines $J_X(S,*)$ as the simplicial group whose group of $n$-simplices has generators $[s,x]$ with $s\in S_n$, the set of $n$-simplices of $S$ and $x\in X$, modulo the relations $$[s, x][s^x, y]=[s, xy]$$ and $$[*, x]=1,$$ where $*$ is the $n$-fold degeneracy of the basepoint. The faces and the degeneracies of $J_X(S,*)$ are induced by those of $S$. Let $S^1$ be the simplicial circle with one non-degenerate simplex $c_0$ in degree 0 and $c_1$ in degree 1; for $n>1$, the $n$-simplices of $S^1$ are all degenerate and form the $(n+1)$-element set $$\{ *=s_0^n c_0, s_0^{n-1} c_1, s_0^{n-2}s_1 c_1, \ldots, s_1^{n-1} c_1\}.$$ We are interested in the case $S=S^1$ with the trivial action of $X$ and $G=1$, the trivial group. In this case, $J_X(S^1,*)$ is identified with $E_*(X,1,\pi)$ by $$[ s_0^{j} s_1^{n-1-j} c_1, x] \mapsto (x,1)_j.$$ The homotopy type of $J_X(S,*)$ has been determined by Carlsson in \cite{Carl}. In particular, for a simplicial set $S$ with the trivial action of $X$, the simplicial set $J_X(S,*)$ has the homotopy type of the loop space on the smash product $S\wedge BX$ of $S$ with the classifying space of $X$. In our case, $$J_X(S^1,*)\simeq \Omega\Sigma BX,$$ the loop space on the suspension of the classifying space of $X$. By the Bott-Samelson Theorem \cite{BS}, its homology with coefficients in a field is the tensor algebra on the homology of $X$ with the same coefficients. As a corollary, we have \begin{theorem}\label{tri} When the action of $G$ on $X$ is trivial, $$PH_*(X,G,\pi)\otimes \mathbb{Q} = T_*(H_*(X,\mathbb{Q})).$$ \end{theorem} When the action in a pre-crossed module is non-trivial, the universal simplicial envelope may be thought of as a ``twisted'' version of $J_X(S^1,*)$; hopefully, this point of view may lead to the identification of the pre-crossed homology in more interesting cases.
\section{\textbf{ Introduction}} \label{sec:intro} Cometari nuclei are among the most pristine bodies currently populating our Solar System. Comets, and planetesimals, formed through the accretion of dust grains, volatiles, and organic matter in the outer regions of the primordial solar nebula \textbf{(Chapter 3, Simon et al., this issue)}. Whatever the origin of cometary matter, whether it is prior to the formation of the solar system or whether it contains materials formed in the solar nebula disk is still a subject of debate. The analysis of the dust samples collected by the Stardust mission show a mixing of presolar grains and minerals formed at high temperature, like forsterite (Mg$_2$SiO$_4$), and enstatite (Mg$_2$SiO$_3$) as well as Calcium-Aluminium Inclusions (CAIs) formed in the hottest regions (>1400 K) of the primordial solar nebula \citep{Brownlee2006} thus suggesting the presence of radial mixing due to turbulence \citep{Bockelee2002} and ballistic transport \citep{Shu2001}. Conversely, other measurements suggest a different formation process: 1) the elemental abundances of many species (C, O, etc) are close to the solar values; 2) the organic matter abundance is similar to molecular clouds and star-forming regions; 3) the nonsolar values of the isotopic ratios of Si, Xe, and S and 4) the high [D$_2$O/HDO]/[HDO/H$_2$O] value measured on 67P/CG are compatible with a scenario in which comets were formed very far from the Sun from presolar matter mixed with never-sublimated (amorphous) ice, at temperature as low as 20 K and in a poorly mixed protoplanetary disk \citep{Altwegg2019}. Differently from larger bodies orbiting closer to the Sun that have sustained thermal processing, impacts, and chemical alterations \citep{DeNiem2018}, comets preserve their original composition being relegated to the outer Solar System for great part of their lifetimes. Comets are currently stored in two large reservoirs, e.g. the Oort Cloud (heliocentric distance between 20.000 and 100.000 AU) and the Kuiper Belt (30-50 AU) where they are orbiting since their formation. Gravitational perturbations and resonances with external planets are capable to deflect them on orbits closer to the Sun. The Jupiter Family Comets (JFC), at which 67P/Churyumov-Gerasimenko (hereafter 67P/CG) belongs, have orbital periods shorter than 20 years, low inclinations ($\le$ 30$^\circ$), aphelia located approximately beyond Jupiter's orbit and perihelia between 1-2 AU from the Sun. \par During their orbital evolution, comets cross different snow lines, corresponding to the equilibrium temperature at which a given ice sublimates in vacuum. In the current Solar System the frost line of water ice (H$_2$O) is located at heliocentric distance of about 3 AU, for carbon dioxide (CO$_2$) is at about 14 AU, for carbon monoxide (CO) is at 28 AU, and for Nitrogen (N$_2$) at 32 AU. Each time a comet orbits inbound one of these snow lines the corresponding ice starts to sublimate. Comets orbiting in the Kuiper belt are kept at cryogenic temperatures continuously during their lifetimes and for this reason their composition remains unaltered until today \citep{Mumma2011}. This equilibrium is broken when comets are perturbed and injected on orbits closer to the Sun \textbf{(Chapter 5, Fraser et al., this issue)}. During their inbound orbits towards the perihelion, all comets show gaseous activity due to the triggering of ices sublimation when they cross the frost lines \citep{Podolak2004}, resulting in the formation of a coma made of accelerated gas and dust grains mainly released from the illuminated areas of the nucleus. Due to the small dimension (typically few km) and irregular shape of the nucleus, the gaseous activity is not homogeneous but is driven by complex relationships among local morphology, solar heating, and availability of volatile species in the subsurface layers \textbf{(Chapter 14, Marschall et al., this issue)}. This activity steadily increases when the comet moves towards the Sun, reaches maximum efficiency immediately after the perihelion passage, and then decreases during the outbound orbit. A similar behavior is common among comets having been observed on both 9P/Tempel 1 \citep{Meech2011} and 67P/CG \citep{Hansen2016}. After crossing again the frost line along the outbound orbit, the water ice sublimation subsides and the coma becomes more tenuous, sustained only by the sublimation of more volatile, less abundant species like CO$_2$ and CO. \par In recent years the classical distinction between comets and asteroids has been reconsidered thanks to the discovery of ice-rich and active asteroids orbiting in the outer part of the Main Belt (see discussion in \textbf{(Chapter 23, Jewitt et al., this issue} and in \cite{HsiehJewitt2006, Snodgrass2017}). In addition, in the last decade a certain number of inactive objects moving on orbits similar to those of comets has been observed \citep{Tancredi2014}. The presence of this population is very relevant because these objects share surface properties comparable with comet nuclei making them likely dormant objects \citep{Licandro2016, Licandro2018}. Moreover, cometary dust samples returned from comet 81P/Wild 2 by Stardust mission \citep{Brownlee2006} or 67P/CG coma grains characterized by Rosetta's COSIMA instrument \citep{Fray2016}, indicate a direct composition link between comets and asteroids as a consequence of the mixing of inner Solar System material which has migrated towards the outer regions. Apart from keeping a record of their primordial composition, comets have played a primary role in planetary evolution being the major carriers of water and C-bearing matter on internal planets: oceans water, and organic matter, the two main recipes necessary to activate biological processes on Earth, have been provided by cometary and asteroidal impacts taking place during the early phases of the Solar System evolution \citep{Delsemme1984, GreenbergMendoza1992}. For these reasons, the exploration of comets and primitive asteroids is an unavoidable step in understanding the Solar System formation processes and evolution. \par Modern exploration of comets has started in 1986 thanks to ESA's Giotto mission who flown a close flyby (minimum distance $\approx$ 600 km) with comet 1P/Halley. Thanks to the data collected by instruments aboard, for the first time it was possible to resolve the very dark surface of a cometary nucleus \citep{Keller1986}, to observe seven active jets releasing matter at a rate of about 3 ton/s \citep{McDonnell1986}, and to characterize organic-rich composition of dust particles in the coma \citep{Kissel1986}. Our knowledge of comets has advanced greatly through the series of NASA missions Deep Space 1, Stardust, and Deep Impact/EPOXI, who have targeted comets 19P/Borrelly, 81P/Wild 2, 9P/Tempel 1, and 103P/Hartley, respectively. With these missions, we have discovered the variability of nuclei and activity processes, including the presence of red-colored dehydrated nuclei surfaces \cite{Soderblom2002}, their very low bulk density ($\approx$ 600 kg/m$^3$) \citep{AHearn2005}, the presence of chuncks of ice ejected from the nucleus by sublimation of CO$_2$ ice \citep{AHearn2011}, and the presence of both presolar and solar system origin materials embedded in dust particles \citep{Brownlee2006}. More recently, ESA's Rosetta mission \citep{Taylor2017} has accomplished a thorough exploration of JFC 67P/CG by orbiting at a close distance from the nucleus during an entire perihelion passage, e.g. from August 2014 (heliocentric distance 3.54 AU), to perihelion in August 2015 (1.23 AU) to end of the mission in September 2016 (3.82 AU). By performing continuous observations for more than two years, the ten scientific instruments aboard Rosetta were able to study 67P/CG's nucleus, coma, and solar wind interactions from a vantage viewpoint, allowing to follow the comet's evolution during the perihelion passage with both remote sensing and in-situ techniques. In the following, we'll discuss the main results from the Rosetta mission on 67P/CG nucleus composition and evolutionary processes in the context of other comets explored by space missions or observed from Earth. \section{\textbf{Comets nuclei properties}} \label{sec:comet_nuclei_properties} \subsection{Photometry} \label{sec:vis_ir_albedo_photometry} The photometric investigation of cometary nuclei is relatively difficult because these bodies are small, irregularly shaped and extremely dark, and thus very faint, spatially unresolved by ground-based telescopes and masked by their coma when approaching the Sun. Cometary nuclei were originally believed to be bright because of their high volatile content deduced from coma measurements. However, the first in-situ images of comet 1P/Halley acquired by the Giotto mission revealed an extremely dark nucleus reflecting only 4$\%$ of the incoming solar light \citep{Keller1987}. All subsequent measurements of the geometric albedo ($A_{geo}$) from ground-based telescopes and space missions confirmed that cometary nuclei are among the darker objects in the Solar System, with 3$\% < A_{geo} <$ 7$\%$ (Table \ref{tab:1}; see also the compendia of comet nuclei albedo by \cite{Lamy2004}), although they are rich in volatiles. Comets 28P/Neujmin 1 and 19P/Borrelly show the darkest surfaces with average albedo values of 2.5-3$\%$ \citep{Buratti2004, Soderblom2002, Delahodde2001}. However, comet 19P/Borrelly displays huge variation in the local photometric parameters and \cite{Li2007b} found a geometric albedo of $7 \pm 2\%$. \\ The unprecedented observations of the 67P/CG nucleus during more than 2 years at different scales of spatial resolution have allowed the Rosetta scientists to perform the most detailed study of a comet ever attempted. In-situ measurements by the Optical, Spectroscopic, and Infrared Remote Imaging System (OSIRIS, see \cite{Keller2007}) and by the Visible, InfraRed, and Thermal Imaging Spectrometer (VIRTIS, see \cite{Coradini2007}) instruments have provided a $A_{geo}$ value of $5.9\pm 0.3 \%$ at 535 nm \citep{Fornasier2015} and $6.2\pm 0.2 \%$ at 550 nm \citep{Ciarniello2015}, respectively, from global photometry, indicating that comet 67P/CG nucleus is among the brightest ones explored so far by space missions, together with comets 9P/Tempel 1 and 81P/Wild 2. \begin{figure*}[h!] \centering \includegraphics[width=0.95\textwidth]{Fig1_colorsalbedomap_osiris.png} \caption{Colors and albedo map of 67P/CG nucleus. Top panel: OSIRIS color images (filters B: 480 nm, G: 649 nm, R: 882 nm) for the north (left and center image, from \cite{Fornasier2015}, and south hemispheres (right image, from \citealt{Fornasier2016}). Spatial resolution is about 2.2 m/px. Center left panel: cylindrical map of the normal albedo at 649 nm by OSIRIS (adapted from \citealt{Fornasier2015}) derived from July-August 2014 observations. Center right panel: boundaries of 67P/CG’s nineteen geomorphological regions of the northern hemisphere in cylindrical projection, from \cite{El-Maarry2015}. Note that regions' boundaries have evolved in more recent works by \cite{Thomas2018} and \cite{Leon-Dasi2021}. Missing data represents the un-illuminated southern hemisphere at the given epochs. Bottom panel: cylindrical maps of the single scattering albedo at 0.55 $\mu$m (left) and 1.8 $\mu$m derived from VIRTIS data \citep{Ciarniello2015}. Note that all cylindrical maps of 67P/CG show degeneration in certain regions due to the irregular shape of the nucleus.} \label{fig1} \end{figure*} \par The $\beta$ coefficient giving the slope of the linear fit of the relation between magnitude and phase angle $\alpha$, is reported in Table \ref{tab:1} for several comets, and it ranges between 0.01 and 0.076 $mag/^{\circ}$. It is usually computed for phase angle $> 5^{\circ}-7^{\circ}$ in order to avoid the opposition surge contribution. For comet 67P/CG \cite{Fornasier2015} and \cite{Ciarniello2015} reported a $\beta$ value of $0.047 \pm 0.002 ~mag/^{\circ}$ and $0.041 \pm 0.001 ~mag/^{\circ}$ for $\alpha > 7^{\circ}$ and $\alpha > 15^{\circ}$, respectively. The linear slope strongly increases when extending the fit to small phase angles reaching values of $0.074 ~mag/^{\circ}$ \citep{Fornasier2015} and $0.082 ~mag/^{\circ}$ \citep{Ciarniello2015}, thus indicating for comet 67P/CG the presence of a strong opposition effect, that is a steep increase of the reflectance at small phase angles. \par The linear slope value of comet 67P/CG is similar to the average value of JFCs ($\beta$ = 0.053$\pm$0.016 mag/$^{\circ}$, \citealt{Snodgrass2011}), close to the values found for comets 1P/Halley, 9P/Tempel 1, 19P/Borelly and 103P/Hartley 2 (Table~\ref{tab:1}), and similar to the value reported in the literature for low-albedo asteroids \citep{BelskayaandShevchenko2000}. \begin{scriptsize} \begin{sidewaystable*}[!htp] \caption{Spectrophotometric properties and Hapke parameters of 67P/CG compared to other cometary nuclei (from \citealt{Filacchione2019}). Legend: $^a$ from \cite{Ciarniello2015},$\beta$ computed for phase angle $\alpha > 15^\circ$; $^b$ values for w, b, $\bar{\theta}$ and $\beta$ from \cite{Fornasier2015}, Hapke global photometric model at $\lambda = $ 0.535 $\mu$m, $\beta$ computed for phase angle $\alpha > 7^\circ$ ; $^c$ from \cite{Fornasier2015}, Hapke (2002) photometric model at $\lambda = $ 0.649 $\mu$m ; ; $^d$ from \cite{Feller2016}, Hapke (2012) photometric model at $\lambda = $ 0.649 $\mu$m ; $^e$ from \cite{Hasselmann2017}, Hapke (2012) photometric model at $\lambda = $ 0.612 $\mu$m ;$^f$ from \cite{Tubiana2011}. B-V has been computed from B-R and V-R index reported in \cite{Tubiana2011}; $^g$ from \cite{Thomas1989}; $^h$ from \cite{Keller1987}; $^i$ from \cite{Hughes1985}; $^j$ from \cite{Sagdeev1986}; $^k$ from \cite{Fernandez2000}, (B-V) and (V-R) colors derived from \cite{LuuandJewitt1990} spectrophotometry; $^l$ photometric parameters derived in V band from \cite{Li2007a}, ground-based and HST observations with solar phase angle down to $4^\circ$ have been included to compute the slope parameter; $^m$ photometric parameters derived in R band from \cite{Li2007b}, ground-based observations with solar phase angle down to $13^\circ$ have been included to compute the slope parameter; $^n$ from \cite{Buratti2004}; $^o$ from \cite{Campins1987} and \cite{Delahodde2001}; $^p$ colors from \cite{Lamy1999}, $\beta$ from \cite{Lamy2004}; $^q$ from \cite{Jewittandsheppard2004}; $^s$ photometric parameters derived in R band by \cite{Li2009}; $^t$ from \cite{Li2013}, Gemini and HST observations at low phase angle have been included to constrain Hapke modeling and derive the slope parameter; $^v$ from \cite{Jewitt2003} .} \begin{tabular}[0.85\columnwidth]{cccccccccc} \hline Comet & $B-V$ & $V-R$ & $R-I$ & $SSA$ & $b$ & $\bar{\theta }[^{\circ}] $ & $A_{geo}$ & $\beta [mag/^{\circ}]$& $\alpha(^\circ)$ \\ \hline 67P/CG$^a$ & $0.73 \pm 0.07$ & $0.57 \pm 0.03$ & $0.59 \pm 0.04$ & $0.052 \pm 0.013$ & $-0.42$ & $19^{\circ}{}^{+4}_{-9}$ & $0.062 \pm 0.002$ & $0.041 \pm 0.001^b$ & $1.2^{\circ}-111.5^{\circ}$ \\ \hline 67P/CG$^b$ & - & - & - & $0.037 \pm 0.002$ & $-0.42 \pm 0.03$& $15^{\circ}$ & $0.059 \pm 0.003$ & $0.047 \pm 0.002 $ & $1.3^{\circ}-53.9^{\circ}$ \\ 67P/CG$^c$ & - & - & - & $0.042$ & $-0.37$& $15^{\circ}$ & $0.065 \pm 0.002$ & $0.047 \pm 0.002 $ & $1.3^{\circ}-53.9^{\circ}$ \\ 67P/CG$^d$ bright spots & - & - & - & $0.067 \pm 0.004$ & $-0.26 \pm 0.07$ & $15^{\circ}$ & $0.077$ & - & $1^{\circ}-30^{\circ}$ \\ 67P/CG$^e$ bright spots & - & - & - & $0.047 \pm 0.001$ & $-0.34 \pm 0.02$ & $15^{\circ}$ & $0.073 \pm 0.05$ & - & $0.1^{\circ}-68^{\circ}$ \\ 67P/CG$^d$ dark boulders & - & - & -& $0.029 \pm 0.004$ & $-0.41 \pm 0.06$ & $15^{\circ}$ & $0.064$ & $0.045 \pm 0.002 $ & $1^{\circ}-30^{\circ}$ \\ 67P/CG$^f$ & $0.83 \pm 0.08$ & $0.54 \pm 0.05$ & $0.46 \pm 0.04$ & - & - & - & - & $0.061-0.076 $ & $0.5^{\circ}-10.6^{\circ}$ \\ \hline 1P/Halley$^g$& $0.72 \pm 0.04$ & $0.41 \pm 0.03$ & $0.39 \pm 0.06$ & - & - & - & - & $0.04^h$ &$107^{\circ}$ \\ 1P/Halley$^i$ & - & - & - & - & - & - & - & $0.05{}^{+0.03}_{-0.01}$ & - \\ 1P/Halley$^j$ & - & - & - & - & - & - & - & $0.04{}^{+0.01}_{-0.02}$ & - \\ \hline 2P/Encke$^k$ & $0.78 \pm 0.02$ &$0.48 \pm 0.02$ & - & - & - & - & $0.046 \pm 0.023$ & $0.06$ & - \\ \hline 9P/Tempel1$^l$ & $0.84 \pm 0.01$ & $0.50 \pm 0.01$ & $0.49 \pm 0.02$ & $0.039 \pm 0.005$ & $-0.49 \pm 0.02$ & $16^{\circ}\pm 8^{\circ}$ & $0.056 \pm 0.009$ & $0.046 \pm 0.007$ & $63^{\circ}-117^{\circ}$\\ \hline 19P/Borrelly$^m$ & - & - & - & $0.057 \pm 0.009$ & $-0.43 \pm 0.07 $ & $22^{\circ} \pm 5^{\circ}$ & $0.072 \pm 0.020 $ & $0.043$ & $51^{\circ}-75^{\circ}$ \\ 19P/Borrelly$^n$ & - & $0.25 \pm 0.78^o$ & - & $0.020 \pm 0.004$ & $-0.45 \pm 0.05$ & $20 \pm 5^{\circ}$ & $0.029 \pm 0.002$ & - & $52^{\circ} - 89^{\circ}$ \\ \hline 28P/Neujmin 1$^o$ &- & $0.45 \pm 0.05$ & - & - & - & - & $0.025$ & $0.006 \pm 0.006$ & $1^{\circ}-19^{\circ}$ \\ \hline 45P/Honda--Mrkos & $1.12 \pm 0.03$ &$0.44 \pm 0.03$ & $0.20 \pm 0.03$ & - & - & - & & $0.06$ & - \\ --Pajdusakova$^p$ &- & - & - & - & - & - & & & - \\ \hline 48P/Johnson$^q$ &- & - & - & - & - & - & & $0.059$ & $6^{\circ}-16^{\circ}$ \\ \hline 55P/Tempel–Tuttle$^p$ &- & - & - & - & - & - & $0.060 \pm 0.025$ & $0.041$ & $3^{\circ}-55^{\circ}$ \\ \hline 81P/Wild 2$^s$ & - & - & - & $0.038 \pm 0.04$ & $-0.52 \pm 0.04$ & $27 \pm 5^{\circ}$ & $0.059 \pm 0.004$ & $0.0513 \pm 0.0002$ & $11^{\circ}-100^{\circ}$\\ \hline 103P/Hartley 2$^t$& $0.75 \pm 0.05$ & $0.43 \pm 0.04$ & - & $0.036 \pm 0.006$ & $ -0.46 \pm 0.06$& $15^{\circ} \pm 10^{\circ}$ & $0.045 \pm 0.009$& $0.046 \pm 0.002$ & $79^{\circ}-93^{\circ}$ \\ \hline 143P/Kowal–Mrkos$^v$ & $0.84 \pm 0.02$ & $0.58 \pm 0.02$ & $0.55 \pm 0.02$ & - & - & - & - & $0.043 \pm 0.014$ & $4.8^{\circ}-12.7^{\circ}$ \\ \hline \end{tabular} \label{tab:1} \end{sidewaystable*} \end{scriptsize} Hapke's semi-empirical models based on the radiative transfer theory \citep{Hapke1993, Hapke2002, Hapke2012} are commonly applied to the global and spatially-resolved photometry of minor bodies to constrain their photometric properties. These models use the parameters listed in the following: \begin{itemize} \item $SSA$ is the particle's single-scattering albedo; \item $b$ is the asymmetric factor which describes the direction in which the medium spreads most of the radiation: backward if $b < 0$ and forward if $b > 0$; \item $\bar{\theta}$ is the angle indicating the average macroscopic roughness slope of the surface medium; \item $B_{sh}$ and $h_{sh}$ are respectively the amplitude and angular width of the peak of the opposition effect (OE) due to the shadow hiding mechanism; \item $B_{cb}$ and $h_{cb}$ are respectively the amplitude and angular width of the peak of the opposition effect due to the coherent backscattering mechanism. \end{itemize} An additional parameter $K$, which takes into account the porosity of the surface, is also included in the latest versions of the Hapke model \citep{Hapke2008, Hapke2012}. The coherent-backscattering mechanism is expected to have a negligible contribution on dark surfaces like those of cometary nuclei, where multiple scattering should have a small contribution relative to single scattering. \par We report in Table~\ref{tab:1} the $SSA$, $b$, and $\bar{\theta}$ parameters for the comets observed by space missions. Cometary nuclei have very low single scattering albedo values (2-6$\%$), strongly backscattering surfaces ($-0.52 < b < -0.42$), and moderately rough surfaces ($15 < \bar{\theta} < 27^{\circ}$). However, spatially resolved data from space missions revealed not only the complex shape and geomorphology of cometary nuclei but also some colors and photometric properties heterogeneity. For instance, for comet 19P/Borrelly \cite{Li2007b} reported variations of the SSA by a factor of 2.5, of the asymmetric factor from almost isotropic (-0.1) to a strongly backscattering (-0.7) behaviour, and a roughness parameter ranging from 13$^{\circ}$ to 55$^{\circ}$. Also at UV wavelengths the single scattering albedo of cometary nuclei is very low: \cite{Feaga2015} have measured a value of 0.031$\pm$0.003 at 1425--1525 \AA \ for 67P/CG. For comet 67P/CG also a number of features with distinct albedo differences from the average terrain, including bright spots, blue veins and dark boulders have been observed and investigated \citep{Hasselmann2017, Feller2016}. \par Among comets explored by space missions 67P/CG is the only one for which the opposition surge has been characterized, thanks to the observations at low phase angles acquired with the OSIRIS imaging system onboard Rosetta. \cite{Fornasier2015} applied the \cite{Hapke1993} model on disk-average photometry of OSIRIS observations acquired with 8 filters covering the 325-990 nm range during the comet approach phase in 2014, and having a spatial resolution up to 2.1 m/px. They found an amplitude of the opposition effect larger than 1.8 and a width larger than 0.021, and no clear wavelength dependence of these parameters, as expected when the shadow-hiding effect is the main cause of the opposition surge. They also model 67P/CG resolved data acquired with the orange filter centered at 649 nm with the latest versions of the Hapke model \citep{Hapke2002, Hapke2012}, finding a strong opposition peak dominated by the shadow-hiding effect ($B_{sh}$ = 2.5, $h_{sh}$= 0.079) with a small contribution coming from the coherent backscattering ($B_{sh}$ = 0.19, $h_{sh}$= 0.017). They also estimate the top surface layer porosity at 87$\%$, suggesting the presence of a very weak and porous mantle with irregular dust particles having structures similar to fractal aggregates. \par These results were further confirmed at greater spatial resolution during two Rosetta flybys designed to observe the nucleus at low phase angles. The pre-perihelion flyby took place in February 2015 and permitted to observe an area near the borders of the Ash, Apis, and Imhotep regions at decimeter scale (see \cite{El-Maarry2015} and \cite{El-Maarry2016} for comet 67P/CG regions definition). The second flyby took place in April 2016 (after perihelion), and it covered the Imhotep–Khepry transition region at a spatial resolution reaching up to 0.5 m/px. These higher spatial scale resolution observations confirmed that the opposition surge is dominated by the shadow-hiding effect and that there is no evidence of a sharp opposition peak at small phase angles associated with the coherent backscattering mechanism. The area observed during the February 2015 \citep{Feller2016} flyby has Hapke parameters indistinguishable from those of the overall nucleus presented in \cite{Fornasier2015}, it shares the same high value of superficial porosity (85-87$\%$) and has a phase function similar to that observed in laboratory for carbon soot samples, or for intramixtures composed of tholins and carbon black \citep{Jost2017}, suggesting the presence of a fluffy and dark regolith coverage in this area \citep{Masoumzadeh2017}. \par \cite{Feller2016} also investigated the photometric properties of some features showing higher (bright spots) or darker (dark boulders) than average albedo values (Table~\ref{tab:1}). In fact, several meter-sized boulders were identified, and all have both colors redder than those of the average nucleus, and a smaller opposition effect. Some bright spots were also observed, but it is worth noting that they are only $\sim$ 50$\%$ brighter than the average terrain and do not have a spectral behavior consistent with exposures of water-ice-rich material as found elsewhere on the 67P/CG nucleus and discussed in the next sections. \par These features have very different SSA and $b$ parameters values: the bright spots have high SSA (6.7$\%$) and low $b$ in absolute value (-0.29), while dark boulders have a very low SSA (2.9$\%$) and they are more backscattering. \par The April 2016 flyby was investigated by \cite{Hasselmann2017} and \cite{Feller2019} using respectively the WAC and the NAC cameras of the OSIRIS imaging system. While the NAC data permitted a high resolution investigation of the flew-by area, highlighting the presence of boulders 20$\%$ darker than the average terrain as well as of several spots at least 2 times brighter than the average terrain, and having colors compatible with a local enrichment in water-ice \citep{Feller2019}, the WAC observations covered the whole Imhotep and surrounding regions catching the opposition surge swiping across the Imhotep region \citep{Hasselmann2017}. The photometric properties of the whole imaged surface during this flyby as well as of some particular features including bright spots and spectrally blue veins were investigated by \cite{Hasselmann2017}, who confirmed the presence of a strong opposition peak produced by the shadow-hiding mechanism, and deduced that the cometary surface is dominated by opaque and dehydrated grains with irregular shape and fairy castle structures. Bright spots and blue veins display a sharper opposition surge consistent with a local enrichment of a few percent water ice mixed with the dark compounds of the comet nucleus. Comparing the area observed both during the February 2015 (pre-perihelion) and April 2016 (post-perihelion) flybys, \cite{Hasselmann2017} find that this area became 7$\%$ darker post-perihelion compared to the pre-perihelion observations and explain this albedo evolution as due to a local air falling deposit of dust. \par The presence on 67P/CG of a surface layer of opaque and dehydrated grains organized in under-dense fairy castle structures is in line with the findings reported by \cite{Emery2006} on Trojans asteroids. Trojans appear covered by a layer of small silicate (likely dehydrated) grains embedded in a relatively transparent matrix, or in very under-dense surface structures. Moreover, the emissivity spectra of Trojans more closely resemble the emission spectra of cometary comae. These results further support the existence of a common link between comets and asteroids. \par Overall, the photometric properties of the 67P/CG nucleus are very similar to those of dark asteroids. Both its linear slope and opposition surge are consistent with the values published in the literature for the majority of dark asteroids \citep{BelskayaandShevchenko2000}, including C and P classes, with the notable exception of D-type, that are the closest ones to cometary nuclei in terms of surface colors. In fact, \cite{Shevchenko2012} investigate the phase function of 3 Trojans D-type asteroids finding no opposition effect, proposing that this could be due to their extremely dark surfaces, where only single light scattering is important and the coherent-backscattering enhancement is completely negligible. They also assumed that asteroids showing no opposition surge should be the darkest one, assumption strengthened by \cite{BelskayaandShevchenko2000} results, who found a strong correlation between the amplitude of the opposition effect and the bodies albedo, with the lowest albedo asteroids showing the smallest opposition effect. \par However, this assumption does not work for the very dark surfaces (albedo of $\sim$ 0.044) of the Near Earth asteroids Ryugu and Bennu, recently visited by the HAYABUSA 2 and OSIRIS-REX missions, respectively. In fact, even if dark, they show a moderate opposition surge. Their opposition surge value, defined as the reflectance at 0.3$^\circ$ over that at 5$^\circ$ phase angle, ranges from 1.2 for Bennu \citep{Golish2021} to 1.26 for Ryugu \citep{Domingue2021}. For comet 67P/CG, the opposition ratio is comprised between 1.25 and 1.34 as extrapolated from \cite{Hasselmann2017} and \cite{Feller2016} reflectance phase curves, thus consistent with that found for P- and C-type asteroids (1.25-1.39 from \cite{BelskayaandShevchenko2000}). The 3 large Trojans investigated by \cite{Shevchenko2012} look thus peculiar among dark bodies, and the opposition surge is not solely related to the surface albedo but very likely to the surface physical properties such as porosity, grain size, and composition. \par Figure \ref{fig1} displays some colors variations and the normal albedo map at 649 nm of comet 67P/CG northern hemisphere obtained from pre-perihelion images acquired with the OSIRIS instrument \citep{Fornasier2015}. Hapi, the region in between the two lobes of the 67P/CG nucleus is the brightest one \citep{Fornasier2015}, followed by Imhotep. The same results are found also by VIRTIS measurements \citep{Ciarniello2015}. Both these regions are characterized by a smooth surface, suggesting that their brightness may be at least partially due to the texture of the surface, even if Hapi clearly shows also evidence of local enrichment of water ice \citep{DeSanctis2015, Filacchione2016b}. The Seth region results to be the darkest of the northern hemisphere. Very similar results are visible on SSA maps from VIRTIS observations \citep{Ciarniello2015, Filacchione2016b}. \cite{Ciarniello2015} derived for the 67P/CG nucleus a SSA spectral slope of 0.20/k\AA \ in the visible range and a lower value, 0.033/k\AA, in the NIR range. The SSA maps at 0.55 and 1.8 $\mu$m derived from VIRTIS data show a SSA distribution consistent with the geometric albedo at 0.649 $\mu$m observed with OSIRIS in the visible range (Fig. \ref{fig1}) during a similar time period. VIRTIS near-infrared 1.8 $\mu$m SSA map highlights the Imhotep region as the brightest one on the surface of 67P/CG. This result is in contrast with the 0.55 $\mu$m albedo distribution which shows a maximum across Hapi (see maps in the bottom row of Fig. \ref{fig1}). \cite{Longobardo2017} derived the photometrically--corrected reflectance at phase angle $\alpha=30^{\circ}$ at several wavelengths for the 67P/CG nucleus finding values ranging from 0.013 at 0.55 $\mu$m to 0.041 at 2.8 $\mu$m and 4 $\mu$m. Examining the correlation between reflectance and SSA as a function of the wavelength, they deduced that the single scattering, even if dominating at all wavelengths, it is larger at shorter wavelengths than at longer ones. \cite{Longobardo2017} also derived the photometrically corrected reflectance at $\alpha = 30^{\circ}$ for the other comets explored by space missions, finding values consistent with those of comet 67P/CG, and confirming the very low reflectance of cometary nuclei. \subsection{Colors of cometary nuclei} As shown in Figure \ref{fig_Jewitt}, cometary nuclei are characterized by red colors (Table~\ref{tab:1}), and their spectrophotometric properties are similar to those of primitive D-type asteroids like the Jupiter Trojans \citep{Fornasier2004, Fornasier2007} and of the moderately red Trans-Neptunians Objects (TNO, see \cite{Sierks2015, Capaccioni2015}). While visible color data on resolved cometary nuclei and asteroid are still very limited to few objects explored by space missions, much better statistics is available from telescopic observations which allow to trace the color gradients among different families of primordial bodies. As discussed by \cite{Jewitt2015}, a color gradient exists across minor bodies groups which increases from C-complex asteroids (C, B, F, G classes), to D types and Trojans, to active comets and Centauri up to the reddest populations of Kuiper Belt Object (KBOs, see Fig. \ref{fig_Jewitt}), including some inactive Centaurs \citep{Lacerda2014}. 67P/CG colors are similar to the average values of active JFCs and are the reddest among the comets (a redder color has been observed only on 143P). During the pre-Rosetta era visible and infrared telescopic observations have provided a large dataset of spectrophotometric observations of disk-integrated cometary nuclei, including comets 162P/Siding Spring \citep{Fernandez2006, Campins2006}, 124P/Mrkos \citep{Licandro2003}, and 28P/Neujmin 1 \citep{Campins2007}. Moreover, to understand the end-states of comets and the sizes of the comet population, IR data from the WISE mission were used by \cite{Licandro2016} to derive the absolute magnitude H of different classes of asteroids in cometary orbits and assess if they are dormant or extinct comet nuclei. All these telescopic observations were not able to distinguish water ice nor other volatile species on the surfaces of cometary nuclei which share similar low albedos and red colored surfaces. \begin{figure}[h!] \centering \includegraphics[width=0.48\textwidth]{Jewitt_2015_mod67P.png} \caption{B-V vs. V-R color indexes diagram showing the colors of various small-body populations including dynamically distinct subsets of: Kuiper belt objects (red circles), comet-related bodies (cyan circles), asteroid spectral types (black circled letters), as defined in the \cite{Tholen1984} classification system, data from \cite{Dandy2003}. The solid line shows the locus of points for reflection spectra of constant gradient, S$^\prime$; numbers give the slope in units of $\%$ k\AA$^{-1}$. The large yellow circle shows the color of the Sun. Some overlapping points have been displaced (by 0.005 mag) for clarity. Error bars show the uncertainties on the respective means. Comets' data, including 67P/CG, from Table \ref{tab:1} are shown in magenta. Figure adapted from \cite{Jewitt2015}.} \label{fig_Jewitt} \end{figure} \par The correlations between colors and surface properties become evident only from disk-resolved observations: in fact, disk-integrated data are not sufficient to distinguish surface regional variability due to the local rough morphology typical of cometary nuclei, nor to take into account their diurnal and seasonal evolution. On 67P/CG different kind of terrains, from the spectrally bluer and water ice-enriched (like Hapi) to the redder ones, associated mostly to dusty regions, have been identified by OSIRIS and VIRTIS since the first resolved images acquired in July-August 2014 \citep{Fornasier2015, Filacchione2016b}, covering mostly the northern hemisphere of the nucleus. No color variability between the small and big lobes nor evidence of vertical diversity in the composition for the first tens of meters was seen on the OSIRIS images at a spatial resolution of about 2 m/pixel. The southern hemisphere, visible from Rosetta since March 2015, shows a lack of spectrally red regions compared to the northern one. This was interpreted as due to the absence of widespread smooth or dust-covered terrains \citep{Fornasier2016, El-Maarry2016} in the highly active southern hemisphere regions, which are exposed to high insolation during the perihelion passage. \par The heterogeneity in colors and albedo was confirmed at a higher (sub-meter) resolution scale \citep{Feller2016, Hasselmann2017, Pommerol2015, Fornasier2019a} by OSIRIS, and brightness variations at centimeter and millimeter scale were reported by the CIVA instrument on-board the Philae lander \citep{Bibring2015}. \par These color changes have been correlated with composition heterogeneities and active areas across the nucleus. In fact, areas characterized by a very high albedo (a factor of 2-10 brighter) and a flat spectrum/bluer colors than the average dark terrain have been proven to be water ice enriched by joint observations carried out with OSIRIS and VIRTIS instruments \citep{Barucci2016, Filacchione2016a}. Therefore, bright and relatively blue regions observed in high-resolution images acquired with OSIRIS permitted the identification of composition inhomogeneities across the nucleus surface. Notable examples are water-ice enriched spots-areas observed in the northern hemisphere \citep{Pommerol2015, Barucci2016}, in the Anhur-Bes regions \citep{Fornasier2016, Fornasier2019a}, with the detection also of CO$_2$ ice by VIRTIS \citep{Filacchione2016c}, in Khonsu \citep{Deshapriya2016, Hasselmann2019}, Hapi \citep{Fornasier2015, DeSanctis2015}, and Wosret regions \citep{Fornasier2021}, in the Aswan cliff after its collapse \citep{Pajola2017}, in several areas in Imhotep \citep{Filacchione2016a, Agarwal2017, Oklay2017}, in the Agilkia and Abydos landing sites \citep{LaForgia2015, Lucchetti2016, Orourke2020}, and in the circular niches of the Seth region \citep{Lucchetti2017}. \par \subsection{Phase reddening} \label{phasereddeningsection} The detailed in-situ investigation of comet 67P/CG permitted for the first time to investigate the spectral phase reddening effect of a cometary nucleus, that is the increase in spectral slope with the phase angle. This effect is a consequence of the small-scale surface roughness and multiple scattering in the surface medium at extreme geometries (high phase angles) and it is commonly observed on several Solar System bodies. A strong spectral phase reddening effect has been noticed for the 67P/CG nucleus since the very first observations with both OSIRIS and VIRTIS instruments covering the northern hemisphere \citep{Fornasier2015, Ciarniello2015, Longobardo2017}, and later confirmed also in the southern hemisphere \citep{Fornasier2016}, for specific areas observed during the 2015 and 2016 flybys \citep{Feller2016, Feller2019}, for Wosret and Anhur regions \citep{Fornasier2017, Fornasier2019a, Fornasier2021}, and for the Abydos landing site \citep{Hoang2020}. The phase reddening coefficients derived from these works for comet 67P/CG are summarized in Table~\ref{tab_reddening}, as well as those for other dark asteroids for comparison. This effect is interpreted as due to the presence of fine, namely, particles of $\sim$ micron size, or to the irregular surface structure of larger grains, having micron-scale surface roughness \citep{Schroeder2014, Fornasier2015, Ciarniello2015}. \par The 67P/CG phase reddening coefficient is a monotonic and wavelength-dependent function (Table~\ref{tab_reddening}), with values of 0.04-0.1 $\times 10^{-4}$ nm$^{-1} deg^{-1}$ in the 535-882 nm range and lower values, 0.015--0.018 $\times 10^{-4}$ nm$^{-1} deg^{-1}$ in the 1 to 2 $\mu$m range. Moreover, the phase reddening effect is also varying over time showing a seasonal cycle linked to the cometary activity. The highest phase reddening effect is observed pre- and post-perihelion at relatively large heliocentric distances when the cometary activity is low or moderate. Conversely, this effect strongly diminished during the peak of the cometary activity close to the perihelion passage \citep{Fornasier2016}, when ungoing surface erosion exposes the underlying layers enriched in volatiles. This seasonal variation of the phase reddening effect is observed globally and in some individual regions like Anhur, Wosret, and in the Abydos landing site \citep{Fornasier2019a, Fornasier2021, Hoang2020}, which is located in Wosret but close to the boundaries with the Bastet and Hatmehit regions. \par The phase reddening effect is lower in the southern hemisphere regions like Wosret and Anhur, which lack widespread dust coating \citep{El-Maarry2016}, and stronger in the northern regions which are overall richer in dust. In fact, \cite{Keller2017} found that the dust particles ejected from the southern hemisphere of comet 67P/CG during the peak of activity partially fall back and are then deposited in the northern hemisphere. \par Compared to other dark minor bodies, the phase reddening effect on 67P/CG nucleus is comparable to that of D-type asteroids and the dwarf planet Ceres, and it is a factor of two or four higher compared to the dusty depleted surfaces of Ryugu and Bennu Apollo asteroids, recently visited by the HAYABUSA2 and OSIRIS-REX missions, respectively (Table~\ref{tab_reddening}). This different reddening behavior is probably a result of the fact that the Apollo family asteroids orbit much closer to the Sun than comets resulting in a surface regolith made by smaller and more thermal processed particles showing a fractal structure affecting their micro- and sub-micro roughness \citep{Fornasier2020}. \begin{table*} \begin{center} \caption{Phase reddening coefficients evaluated for comet 67P/CG and for other dark small bodies (Table adapted from \cite{Fornasier2021}). The quantity $\gamma$ is the phase reddening coefficient; Y$_0$ is the estimated spectral slope at zero phase angle from the linear fit of the data; and $\alpha$ the phase angle range used for computing the phase reddening coefficients.} \label{tab_reddening} \begin{small} \begin{tabular}{|l|l|c|c|c|l|} \hline Body and conditions & Wavel. & $\alpha$ & $\gamma$ & Y$_0$ & References \\ & range (nm) & ($^{o}$) & ($10^{-4}~ nm^{-1}~ deg^{-1}$) & ($ 10^{-4}~ nm^{-1}$) & \\ \hline North. hemisp. pre-perih (2014) & 535-882 & 0--55 & 0.1040$\pm$0.0030 & 11.3$\pm$0.2 & \cite{Fornasier2015} \\ Northern hemisph. pre-perih. (2014-Feb 2015) & 1000-2000 & 25--110 & 0.018 & 2.3 & \cite{Ciarniello2015} \\ Northern hemisph. pre-perih. (2014) & 1100-2000 & 12--100 & 0.015$\pm$0.001 & 2.0 & \cite{Longobardo2017} \\ North\&South hemisph. at perih. (2015) & 535-882 &60--90 & 0.0410$\pm$0.0120 & 12.8$\pm$1.0 & \cite{Fornasier2016} \\ Small region in Imhotep, Ash, Apis & 535-743 & 0--34 & 0.065$\pm$0.001 & 17.9$\pm$0.1 & \cite{Feller2016} \\ (Feb. 2015 Fly-by) &&&&& \\ Small region in Imhotep-Khepry & 535-743 & 0--62 & 0.064$\pm$0.001 & 17.99$\pm$0.01 & \cite{Feller2019} \\ (April 2016 Fly-by) &&&&& \\ Abydos and surroundings (post-perih., 2016) & 535-882 & 20--106 & 0.0486$\pm$0.0075 & & \cite{Hoang2020} \\ Wosret around perih. (2015) & 535-882 & 60--90 & 0.0396$\pm$0.0067 & 12.7$\pm$0.5 & \cite{Fornasier2021}\\ Wosret post-perihelion (2016) & 535-882 & 20--106 & 0.0546$\pm$0.0042 & 13.6$\pm$0.4 & \cite{Fornasier2021} \\ \hline D-type asteroids &450-2400 & 10--73 & 0.05$\pm$0.03 & & \cite{Lantz2017} \\ (1) Ceres & 550-800 & 7--132 & 0.046 & -0.2 & \cite{Ciarniello2017}\\ (101955) Bennu & 550-860 & 7--90 & 0.014$\pm$0.001 & -1.3$\pm$0.1 & \cite{Fornasier2020} \\ (162173) Ryugu & 550-860 & 0--40 & 0.020$\pm$0.007 & & \cite{Tatsumi2020} \\ \hline \end{tabular} \end{small} \end{center} \end{table*} \subsection{UV-VIS-IR spectral properties from optical remote sensing} \label{sec:vis_ir_spectral_properties} During the approximately two-years-long (August 2014-September 2016) escort phase of the Rosetta mission, the nucleus of comet 67P/CG has been extensively imaged by the ALICE, OSIRIS and VIRTIS experiments, characterizing the UV-VIS-IR spectral properties of the surface. \par Nucleus' surface average UV spectrum (700-2050 \AA ) by ALICE show a very dark regolith characterized by a blue spectral slope without significant evidences of exposed water ice absorption \citep{Stern2015}. The average UV spectral reflectance best-fit is compatible with a model made of 99.5$\%$ tholins, 0.5$\%$ water ice plus a neutral darkening agent in a fluffy, light-trapping medium (Figure \ref{fig:alice_67p}). The observed blue spectral slope could be the consequence of a surface rich in tholins or be the result of Rayleigh scattering on very fine particles in the regolith. While the fit is non-unique, it is compatible with very de-hydrated tholins-rich material. \begin{figure}[!h] \centering \includegraphics[width=0.5\textwidth]{67p_alice_fit.png} \caption{UV average I/F of 67P/CG nucleus acquired by ALICE on 14–15 August 2014 (black curve) and best-fit model (red). The fit corresponds to a mixture of 99.5$\%$ tholins (orange curves), 0.5$\%$ water ice (blu) plus a neutral darkening agent like carbon (gray). The tholins are modeled as an intimate mixture made of Triton tholin (abundance 79.9$\%$, grain size 3.5 $\mu$m), Titan tholin (0.9$\%$, grain size 5.0 $\mu$m), and Ice tholin (19.2$\%$, grain size 1.7 $\mu$m). Calibration residuals are the cause of the abrupt changes visible at 800, 975, and 1225 \AA . From \cite{Stern2015}.} \label{fig:alice_67p} \end{figure} \par Hyperspectral images (0.25-5 $\mu$m) of the nucleus acquired by VIRTIS during the pre-perihelion phase, when the comet was orbiting at heliocentric distance of 3.6-3.3 AU \citep{Capaccioni2015, Filacchione2016b} are characterized by a red slope on I/F visible and infrared spectra and display a broad absorption feature between 2.9 $\mu$m and 3.6 $\mu$m (referred to as 3.2 $\mu$m absorption) superimposed over the thermal emission which extends down to approximately 3 $\mu$m (Figure \ref{fig:VIRTIS_spectra}). The 3.2 $\mu$m absorption has been interpreted as carried by a combination of ammoniated salts \citep{Poch2020}, organic materials \citep{Capaccioni2015, Quirico2016, Raponi2020}, and hydroxylated silicates \citep{Mennella2020}, as discussed in greater detail in next Sections \ref{sec:organic_matter} - \ref{sec:ammoniated_salts}. The I/F spectra of most of the surface do not display the diagnostic absorption features of water ice at 1.5 and 2.0 $\mu$m, a result which is compatible with the lack of extended ice-rich patches with sizes much larger than few-tens of meter (See section \ref{sec:volatiles_ices}). \begin{figure*}[!h] \centering \includegraphics[width=\textwidth]{VIRTIS_spectra.png} \caption{Hyperspectral images (at $\sim$13 m/pix resolution) of the nucleus of comet 67P/CG from VIRTIS. Left panel: I/F color image (blue $=$ 0.44 $\mu$m, green $=$ 0.55 $\mu$m, red $=$ 0.7 $\mu$m). Central panel: I/F color image (blue $=$ 1.5 $\mu$m, green $=$ 3 $\mu$m, red $=$ 4.5 $\mu$m). Right panel: average I/F spectra of 5x5 pixels regions indicated by the colored crosses in the left panels. The feature common to all the spectra in the 0.8–1 $\mu$m interval is a calibration artifact in correspondence of the junction of the instrument visible and infrared channels. Adapted from \cite{Filacchione2016b}.} \label{fig:VIRTIS_spectra} \end{figure*} Representative spectra at standard observation geometry (incidence $=30^{\circ}$, emission $=0^{\circ}$, phase angle $=30^{\circ}$) of four nucleus macro-regions (called "head", "neck", "body", "bottom" in the following), as computed by using the corresponding Hapke's parameters derived by spectrophotometric modeling of VIRTIS observations acquired from August 2014 ($\sim$3.6 AU) to February 2015 ($\sim$2.4 AU) \citep{Ciarniello2015}, reveal a limited spectral variability across the surface at global scale (Figure \ref{fig:macroregions}). This result is a consequence of the dust backfall which homogenize the spectral response on great part of the nucleus surface. For this reason, despite the richness of morphological features visible on the surface, from a spectral perspective the nucleus appear quite homogeneous before perihelion passage. Nonetheless, the "neck", connecting the two main lobes of the comet, and corresponding to the Hapi geomorphological region defined by \cite{El-Maarry2015}, stands out displaying reduced VIS \citep{Capaccioni2015, Fornasier2015, Filacchione2016a} and IR spectral slopes \citep{Capaccioni2015, Filacchione2016a}, and a deeper 3.2-$\mu$m absorption feature. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{67_photometry_parameters.png} \caption{67P/CG average photometric parameters: asymmetry factor $b$ (top panel) and single scattering albedo $w$ (centre) derived for four macro-regions: "head" (orange), "neck" (blue), "body" (green), and "bottom" (red) as defined on the map in the bottom panel. Black curves correspond to the average $b$ and $w$ values. Gray bands on the spectral plots indicate the positions of the junctions of instrument order-sorting filters; the dashed box corresponds to the junction of the visible and infrared spectral channels and instrument straylight. Adapted from \cite{Ciarniello2015}} \label{fig:macroregions} \end{figure} The different spectral response of Hapi with respect to the rest of 67P/CG nucleus surface clearly emerges from the mapping of Comet Spectral Indicators (CSI) \citep{Filacchione2016b, Ciarniello2016}, aimed at characterizing the spectral variability across the nucleus. In Figure \ref{fig:CSI_MAPS}, maps of the VIS (0.5-0.8 $\mu$m) and IR (1.0-2.5 $\mu$m) spectral slopes, and of the 3.2-$\mu$m absorption band depth and position are displayed, with the Hapi region again showing VIS and IR slopes lower than the rest of the surface, and a deeper 3.2 $\mu$m band depth characterized by a shift of the feature towards smaller wavelengths. These concomitant variations of the CSI are compatible with an average water ice enrichment in Hapi of approximately 1 vol$\%$ \citep{Ciarniello2016}. \begin{figure*}[h!] \centering \includegraphics{CSI_MAPS.pdf} \caption{Comet Spectral Indicator maps from VIRTIS-M observations. The VIS (panel A) and IR (panel B) spectral slopes, and the band depth (panel C) and band center (panel D) position of the 3.2-$\mu$m absorption feature are shown, for observations performed in the timeframe 2014 August 8–2014 September 2, when 67P/CG was at a heliocentric distance of 3.62-3.44 AU on the inbound orbit. Adapted from \cite{Ciarniello2016}} \label{fig:CSI_MAPS} \end{figure*} Along with 67P/CG, VIS-IR spectral properties of cometary nuclei have been investigated in detail for comets 9P/Tempel 1 (explored by the Deep Impact mission), 103P/Hartley 2 (EPOXI mission), and 19P/Borrelly (Deep Space 1). For Tempel 1, disk-integrated observations of the nucleus at visible wavelengths by means of the High-Resolution Instrument (HRI) and the Medium-Resolution Instrument (MRI) cameras \citep{Hampton2005} reveal a linear red-sloped spectrum (spectral slope of 12.5$\pm$1$\%$/k\AA) laking any feature at the spectral resolution of the multispectral observations of the nucleus \citep{Li2007a}. In addition, disk-resolved observations show limited color variations across the surface ($\sim3\%$ with respect to the nucleus average), as displayed in the color ratio maps (Figure \ref{fig:TEMPEL1_color_ratio}) obtained by rationing images acquired at 750 nm and 550 nm \citep{Li2007a}, with the exception of water-ice-rich regions \citep[color ratio of about $80\%$ of the nucleus average, from][]{Sunshine2006}. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{TEMPEL1_color_ratio.jpg} \caption{Color ratio maps of the nucleus of comet Tempel 1 from HRI and MRI images. The darkest areas correspond to the water-ice-rich (bluest) regions. From \cite{Li2007a}.} \label{fig:TEMPEL1_color_ratio} \end{figure} Similar results are provided by observations at IR wavelengths from the High Resolution Instrument-InfraRed spectrometer \citep[HRI-IR,][]{Hampton2005}, which again indicate minor spatial variability of the spectral slope in the 1.5-2.2 $\mu$m interval (normalized at 1.8 $\mu$m), with typical values of 3.0$\%$/k{\AA} to 3.5$\%/$k{\AA}, and smaller spectral slopes (2.0$\%$/k{\AA}) in correspondence of water-ice-rich areas \citep{Groussin2013} (Figure \ref{fig:Tempel_Hartley_IRslope}, right panel). In addition, \cite{Davidsson2013} found a correlation between 9P/Tempel 1 surface morphology and the 1.5-2.2 $\mu$m spectral slope which appears redder on thick layered terrains (median value 3.4$\%$/k{\AA}) and more neutral on smooth and water ice enriched terrains (median value 3.1$\%$/k{\AA}). \begin{figure*}[h!] \centering \includegraphics{TEMPEL_HARTLEY_IR_slope_fin.pdf} \caption{Top panels: context images of comet Hartley 2 (three left panels) and Tempel 1 (right panel) at visible wavelengths from the HRI camera. Bottom panels: maps of the 1.5-2.2 $\mu$m spectral slope normalized at 1.8 $\mu$m. Adapted from \cite{Groussin2013}.} \label{fig:Tempel_Hartley_IRslope} \end{figure*} \par For the nucleus of comet Hartley 2, HRI and MRI disk-integrated observations at visible wavelengths revealed a linear featureless spectrum in the 400-850 nm interval, with an overall spectral slope of 7.6$\pm$3.6$\%$/k\AA, while color ratio maps indicate relatively larger color variations with respect to Tempel 1, with a FWHM of 12$\%$ \citep{Li2013}. In particular, images acquired during the inbound leg of the Deep Impact spacecraft flyby of Hartley 2 showed areas near the terminator characterized by a smaller spectral slope, indicating a higher fraction of water ice on the surface \citep{Li2013, Sunshine2011}. A similar spatial distribution is revealed for the the 1.5-2.2 $\mu$m spectral slope as inferred from HRI-IR inbound images \citep{Groussin2013}, with red areas (spectral slope of 3.0$\%$/k{\AA} to 3.5$\%/$k{\AA}) close to the nucleus limb, and IR-bluer regions (average spectra slope values of 0$\%$/k{\AA} to 1.5$\%/$k{\AA}) near the terminator (Figure \ref{fig:Tempel_Hartley_IRslope}). \par Comet 19P/Borrelly's nucleus surface has been investigated by means of the Miniature Integrated Camera and Spectrometer (MICAS, \cite{Rodgers2007}), that provided both VIS broadband images and IR (1.3-2.6 $\mu$m) spectral-spatial images. In particular, these latter evidenced a linear red-sloped IR spectrum, possibly exhibiting some variability between the large and small ends of the nucleus. The spectrum lacks significant features (including water ice bands), with the exception of a recurrent 0.1 $\mu$m wide absorption at 2.39 $\mu$m, which remains unassigned \citep{Soderblom2004}. \par In Figure \ref{fig:plot_resolved_nuclei_spectra} we compare representative IR spectra of cometary nuclei exoplored by spacecrafts: 67P/CG, 19P/Borrelly, 103P/Hartley 2, and 9P/Tempel 1. For 67P/CG we report spectra at two different phase angles (40$^{\circ}$ and 90$^{\circ}$), providing a reference for possible phase reddening (see Section \ref{phasereddeningsection}) affecting the overall spectral slope of the other comets, which were observed at different phase angles (from 41$^{\circ}$ to 84$^{\circ}$). Whereas the above-mentioned distinct absorptions at 3.2 $\mu$m on 67P/CG and at 2.39 $\mu$m on 19P/Borrelly are visible, for comet 103P/Hartley 2 and 9P/Tempel 1, no relevant features have been reported so far, with the exception of spectra acquired over water-ice rich areas \citep{Sunshine2006,Sunshine2011}. Comet 67P/CG, 103P/Hartley 2, and 9P/Tempel 1 display a similar IR spectral slope, comparable to D-type objects, which are among the reddest asteroids, whereas 19P/Borrelly displays an even larger IR spectral slope, standing out as the reddest nucleus. Assuming that phase reddening, if present, produce effects with magnitude comparable to the ones observed for 67P/CG, 19P/Borrelly spectrum (phase angle=41$^{\circ}$) appears to be intrinsically redder than the others. In this respect, we also note that the resulting infrared spectral slope can depend on heliocentric distance, as shown for comet 67P/CG \citep{Fornasier2016,Ciarniello2016,Filacchione2016c,Filacchione2020,Ciarniello2022}, for which a reduction of the VIS and IR slope has been observed while approaching the Sun, as the effect of an increase of water ice surface content. The observations of 19P/Borrelly discussed here were acquired at an heliocentric distance of 1.36 AU \citep{Soderblom2004}, significantly smaller than the ones of 67P/CG (3.6-2.4 AU), and intermediate between the cases of Tempel 1 (1.51 AU) and Hartley 2 (1.06 AU) \citep{Groussin2013}. From this, one might speculate that 19P/Borrelly would appear even redder, if observed at heliocentric distances comparable to the ones of the presented 67P/CG spectrum, however, any firm conclusion in this respect would require an orbital monitoring of the surface spectral properties. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{plot_resolved_nuclei_spectra_corr.png} \caption{Comparison among IR spectra of comet 19P/Borrelly (blue curves, phase angle$=$41$^{\circ}$), 103P/Hartley 2 (red, phase angle$=$84$^{\circ}$), 9P/Tempel 1 (cyan, phase angle$=$63$^{\circ}$), and 67P/CG (solid and dashed black curves corresponding to phase angles of 40$^{\circ}$ and 90$^{\circ}$, respectively). Spectra are normalized at 2 $\mu$m and offset for clarity. For comet 19P/Borrelly two spectra of the small end of the nucleus are superimposed (dashed and solid lines), which are affected by negligible thermal contribution \citep{Soderblom2004}. For comet 67P/CG the two spectra are computed by applying the Hapke model from \cite{Ciarniello2015} at 40$^{\circ}$ and 90$^{\circ}$ phase angle, respectively, after the application of a corrective spectral factor resulting from the absolute calibration with star observations described in \cite{Raponi2020}. In this case, a minor contribution of thermal emission is expected longward of $\sim$ 3 $\mu$m. Missing parts of the spectrum for 67P/CG correspond to the junctions of instrumental order sorting filters. The spectra of comet 9P/Tempel 1 and 103P/Hartley 2 have been derived by averaging spectra avoiding water-ice-rich spots from HRII hyperspectral images 9000036 and 5005001, respectively, after removal of the thermal contribution \citep{Raponi2015}. The missing part of the spectrum of 103P/Hartley 2 at $\sim$2.7 $\mu$m corresponds to the wavelength interval of the H$_2$O-vapour emission in the foreground coma, contaminating the nucleus signal \citep{AHearn2011}.} \label{fig:plot_resolved_nuclei_spectra} \end{figure} \subsection{Composition from surface measurements} \label{sec:composition_surface_measurements} \par Prior to the Rosetta-Philae space mission, the main challenge in studying the cometary dust was in the collection method adopted on the spacecraft. As an example, the Stardust mission during the flyby with comet 81P/Wild 2 was moving with a high relative velocity ($\sim$6 km/s) with respect to the nucleus. The spacecraft successfully collected dust grains trapped in the aerogel target exposed on the Sample Return Capsule \citep{Brownlee2003}. The main bias of this method is the high relative motion because at such velocities a fraction of the dust material, especially its organic components, is thermally destroyed or evaporated when impacting the collection target \citep{Brownlee2006}. \par Conversely, the Rosetta orbiter reduced the relative velocity to $\sim$10 m/s; consequently, the chemical composition and physical structure of a substantial number of particles collected by the GIADA dust experiment remained mainly unchanged \citep{Rotundi2015}. Another advantage of the Rosetta mission is the presence of the Philae lander aiming for the first time to sample and analyze the cometary material directly on the nucleus surface. The scientific payload of Philae included two mass spectrometers devoted to the analysis of volatile and refractory material. The task of Philae was a direct analysis of the nucleus composition, other than the physical properties of the cometary surface and interior, bypassing the complex relationship between coma and nucleus compositions \citep{DeAlmeida1996,Huebner1999}. The contributions of in-situ instruments aboard Philae lander and remote sensing payloads on Rosetta orbiter are valuable to obtain a unique picture of the comet composition. On 12 November 2014, 15:34:04 UTC, Philae touched down at Agilkia (335.69$^\circ$ longitude, 12.04$^\circ$ latitude), just 112 m away from the selected landing site \citep{Biele2015}. However, the shooting of the harpoons, necessary to secure the lander to the nucleus' surface, did not happen when the touch-down signal trigger arrived. The lander feet sunk into the soft regolith on the surface, ejecting a cloud of dust grains over the touch-down area imaged by the OSIRIS \citep{Keller2007} and the navigation cameras on-board Rosetta orbiter. After a timespan of about 20 s, Philae bounced back from the surface, starting an almost 2 h-long hopping tour across the surface of the comet. All available orbiter and lander observations and house-keeping data from the Philae touch-down at Agilkia were analysed and permitted the reconstruction of the sequence of events the lander experienced on the ground, and even to derive important physical parameters of the cometary surface at the landing site, and at the second touchdown. In the latter Philae spent almost two minutes of its cross-comet journey, exposing primitive water ice that was analyzed by instrument onboard the orbiter, allowing important findings on the content of pristine water ice in the nucleus material \citep{Orourke2020} which are discussed in section \ref{sec:volatiles_ices}. Lastly, the lander Philae arrived under an overhanging cliff in the Abydos region, where its journey ended. Here the lack of solar illumination prevented the batteries to be further recharged by the solar cells and caused the end of the Philae mission. \par Thus, information on the chemical composition coming from the lander Philae was mainly obtained by the COSAC \citep{Goesmann2007} and the PTOLEMY \citep{Wright2007} instruments, operating in “sniffing mode” during the early hopping phase of the lander and after landing at the Abydos site. Besides species probably released directly from the nucleus (H$_2$O, CO$_2$, CO) most of the peaks in the measured low-resolution mass spectra in both instruments are due to fragment byproducts partly created with or after the release of the species, but mostly by the ionization process inside the instruments. These fragments are associated with organic species. In this respect, the COSAC data were interpreted \citep{Goesmann2015} as being dominated by gas released from cometary dust particles unintentionally collected via the instrument gas exhaust pipe during the formation of the dust cloud following the lander touch-down at Agilkia. Twenty-five minutes after Philae’s initial comet touchdown, the COSAC mass spectrometer took a spectrum, which displayed a suite of 16 compounds, including many nitrogen-bearing species, and four compounds—methyl isocyanate, acetone, propionaldehyde, and acetamide—that had not previously been reported in comets. Sulfur compounds, if any, are below the detection limits for both the COSAC and PTOLEMY instruments \citep{Wright2015, Goesmann2015}. \par The interpretation of the mass spectra peaks measured with PTOLEMY \citep{Wright2015} suggests a fractionation pattern that might be related to chain-forming species. Short-chained polyoxymethylenes, first proposed to explain ion mass spectra during the Giotto flyby at comet 1P/Halley \citep{Huebner1987}, were considered possible candidates. PTOLEMY measurements also indicated an apparent absence of aromatic compounds. Such PTOLEMY preliminary results were partially revised in a successive analysis by comparing PTOLEMY, COSAC, and ROSINA data, being the latter on board the orbiter: the peaks on masses 91 and 92 Da in the PTOLEMY spectrum are most probably due to the aromatic molecule toluene (CH$_3$–C$_6$H$_5$) and not to polyoxymethylene \citep{Altwegg2017}. PTOLEMY measurements also indicate very low concentrations of nitrogenous material. The low m/z 14 signal indicates that N$_2$ is not in high abundance, which agrees with the average N$_2$/CO ratio of 5.7 $\times$ 10$^{-3}$ obtained by ROSINA \citep{Rubin2015}. However, COSAC detected far more nitrogen-bearing compounds than PTOLEMY. The COSAC findings differ from those of PTOLEMY because COSAC sampled particles excavated by Philae's impact on the surface \citep{Goesmann2015} that entered the warm exhaust tubes located on the bottom of the lander, where they pointed toward the surface, whereas PTOLEMY sampled ambient coma gases entering exhaust tubes located on top of the lander, where they pointed toward the sky. This was confirmed by the peak at m/z 44 detected by both instruments, which decays much slower in the COSAC measurements than in the PTOLEMY data: that measured by COSAC was likely dominated by organic species, whereas the peak measured by PTOLEMY was interpreted to be mostly due to CO$_2$ \citep{Kruger2017}. Even if unambiguous detection of NH$_3$ was not possible because of the presence of H$_2$O and other potential compounds, such as CH$_4$, a nitrogen source such as NH$_3$ must originally have been abundant to form the many N-bearing species. All organic molecules detected by COSAC can be formed by UV irradiation and/or radiolysis of ices due to the incidence of galactic and solar cosmic rays: alcohols and carbonyls derived from CO and H$_2$O ices \citep{Goesmann2015}, and amines and nitriles from CH$_4$ and NH$_3$ ices \citep{Kim2011}. Some of the compounds detected by these on-site measurements, especially those containing carbon-nitrogen bonds, play a key role in the synthesis of amino acids, sugars, and nucleins \citep{Dorofeeva2020}. \par Ammonia, combining with many acids, such as HCN, HNCO and HCOOH encountered in the interstellar medium as well as in cometary ice, would also be the source of ammonium salts (NH$_4$ $^+X^-$) that two independent analyses from ROSINA \citep{Altwegg2020} and VIRTIS \citep{Poch2020} data suggested being abundant in the cometary dust of 67P/CG (see discussion in section \ref{sec:ammoniated_salts}). In this respect, cometary dust of 67P/CG analyzed by COSIMA shows a ratio N/C = 0.035 $\pm$ 0.011, which is three times higher than the value observed in carbonaceous chondrites \citep{Fray2017}, as also found for earlier observations of comet 1P/Halley. Conversely, the content of oxygen in the dust fraction of both comets 67P/CG and 1P/Halley is found to be lower than that in primitive chondrites. The explanation of these results is that the cometary material contains only dehydrated minerals, while all silicates in primitive carbonaceous CI-type chondrites are hydrated. The lack of hydrated minerals on 67P/CG surface is also supported by analysis performed with VIRTIS instrument data \citep{Capaccioni2015, Quirico2016}. This is a probable indication of the absence of post-accretional internal heating of the 67P/CG nucleus \citep{Dorofeeva2020}. \subsection{Composition from coma measurements} \label{sec:composition_coma_measurements} By orbiting the Sun, a cometary nucleus undergoes cyclic sublimation and gas release resulting in the formation of the coma, a tenuous atmosphere made of accelerated gas and dust/ice particles encircling the nucleus (for further discussion about coma properties see chapters \textbf{13 Bodewits et al., 15 Biver et al., this issue}). As a consequence, the composition of the gas and dust particles dispersed in the coma allows an indirect characterization of the nucleus composition. The large diversity of volatile ices composition and relative abundances in comets populations \citep{Bockelee2017} can be traced back to formation environments in the outskirts of the protosolar disk, to the chemical, thermal, and radiation evolution during their orbital permanence in Oort and Kuiper clouds far from the Sun, and recent thermal processing during their orbital evolution closer to the Sun. \par Gaseous species are the result of the sublimation of solid ices fraction in the nucleus, mainly H$_2$O, CO$_2$, CO, while the dust grains are made of refractory and organic matter lifted by the gas flux from the surface's regolith. The genetic link between surface and coma composition is complicated for two reasons: \par 1) the volatile species are available on the nucleus as condensed ice or as trapped gases \citep{DeAlmeida1996, Huebner1999}. Each ice species is characterized by its own thermodynamical properties resulting in different sublimation temperatures, pressures, and depths within the nucleus \citep{Huebner2006, Fray2009, Marboeuf2014}. Instead, the availability of trapped gases depends on the molecular structure of the ice matrix (amorphous, crystalline, or clathrate hydrate) which is driven by thermophysical conditions occurring during the gravitational collapse from which the nucleus has been formed \citep{Espinasse1991, DeSanctis2005, Huebner2006, Marboeuf2014, Blum2017}. This means that the sublimation of each volatile species occurs at different heliocentric distances, with the more volatile species (CO$_2$, CO) still active at far distances from the Sun while water ice becomes active while the comet is orbiting inside the frost line (about 3.2 AU from the Sun). The formation of the dust coma is in general associated with the diurnal sublimation of water ice whose flux is capable to lift small grains from active areas \citep{Vincent2019} whereas larger icy chuncks are associated with CO$_2$ activity \citep{AHearn2011}; \par 2) the dust mantle blanketing the nucleus surface has a primary role in driving the intensity of the outgassing through its thickness and porosity \citep{Marboeuf2014}. Dust grains, once lifted from the surface by the gas flux, are illuminated by the Sun and experience rapid heating as a result of their low albedo and low heat capacity \citep{Bockelee2019}. Moreover, dust grains and gas molecules experience intense solar UV photons irradiation and electronic bombardment, causing the formation of ionized particles \citep{Cravens1987, Heritier2018}: particles erosion, aggregation and chemical reactions can alter the original properties of dust grains. All these mechanisms develop during the time of flight of each dust particle and are related with the heliocentric distance, the orbital obliquity, the irregular shape of the nucleus and the period of rotation \citep{Huebner1999, Fulle2016b}. \par The combined effects of these processes alter the coma properties which could not represent directly the initial abundances of volatiles on the nucleus \citep{Espinasse1991, Benkhoff1995, DeAlmeida1996, Huebner2008, Marboeuf2014}. Several studies tried to link the spatial distribution of the coma composition with a homogeneous or either heterogeneous nucleus composition taking advantage of the few observations available. Their results show very different cases: the analysis of two fragments of comet 73P/Schwassmann-Wachmann 3 revealed very similar properties suggesting a homogeneous composition of the nucleus \citep{DelloRusso2007}. On the contrary, Deep Impact mission found that the fresh material excavated from comet 9P/Tempel 1 was remarkably different from the rest of the nucleus' surface \citep{Feaga2007}. As shown in Fig. \ref{fig:hartley2coma}, also comet 103P/Hartley 2 (characterized by a bilobate nucleus shape similar to 67P/CG) shows a coma with a heterogeneous spatial distribution as a consequence of intrinsic variations of composition within the nucleus \citep{AHearn2011, Protopapa2014}. \begin{figure}[h!] \includegraphics[width=0.49\textwidth]{hartley2_coma_emissions.png} \caption{Top panels: distribution of Hartley 2 coma emissions due to water vapor, CO$_2$, and organic matter, in addition to a map of water ice particle absorption. These species are identified on spectral radiances (bottom panel) measured on H$_2$O vapour outflow and CO$_2$ jet regions. These two regions are localized within the two red squares shown on top panels images. Water ice particles, identified through the 2.9 $\mu$m absorption band visible on the red spectrum, are associated with the CO$_2$ gas emission which drags them out of the nucleus surface. From \cite{AHearn2011}.} \label{fig:hartley2coma} \end{figure} Before the Rosetta mission, a great part of the coma observations was too sparse and biased by the limited time series and surface coverage to allow a reliable estimate of the nucleus composition from coma properties. This explains the difficulties in interpreting cometary outgassing data and the resulting vivacious ongoing debate on the measurement of the dust-to-gas and refractory-to-ice mass ratios in comets and in 67P/CG in particular \citep{Choukroun2020}: these ratios are the key parameters necessary to understand if the observed heterogeneity is primordial or a consequence of the evolutionary processes. \begin{figure*}[!h] \includegraphics[width=\textwidth]{rosina_gas_density.png} \caption{ROSINA time series of the flux of H$_2$O, CO and CO$_2$ in 67P/CG coma. Left panel: fluxes measured between August 4-8 2014 (top plot). The corresponding position of the Rosetta spacecraft in longitude and latitude is shown in the bottom plot. Right panel: fluxes (top plot) correlated with the relative orientation of the nucleus (bottom) for September 18, 2014. From \cite{Hassig2015}.} \label{fig:rosina_gas_density} \end{figure*} \par For 67P/CG, the ROSINA instrument \citep{Balsiger2007} has provided the time series of the H$_2$O, CO and CO$_2$ fluxes allowing to explore the coma properties from different distances, nucleus orientations and illumination conditions (Fig. \ref{fig:rosina_gas_density}). The time series collected along the inbound orbit show large fluctuations of the gases flux \citep{Hassig2015, LuspayKuti2015}. By linking gas flux, Rosetta's relative position, and nucleus orientation, \cite{Lauter2019} has inverted H$_2$O and CO$_2$ flux measured by ROSINA in the coma with localized gas emission sources on the nucleus surface. A similar study by \cite{Hoang2019} evidenced that during the inbound orbit the outgassing of CO$_2$ and CO was more pronounced in the southern than in the northern hemisphere and that the water vapour maximum sublimation was taking place on the Hapi active region. These results are in agreement 1) with the cyclic condensation of water frost in Hapi occurring at each nucleus' rotation observed at infrared wavelengths \citep{DeSanctis2015}; 2) with the detection of transient CO$_2$ ice deposit in the southern Anhur region \citep{Filacchione2016c}. Both results will be discussed in the following sections. Near perihelion, several water ice-rich locations placed on steep scarps and cliffs were identified as the sources of short living outbursts repeating across several nucleus rotations \citep{Vincent2016b}: these places were the major sources of water vapour activity measured on the coma by ROSINA at that time. Finally, carbon dioxide distribution in the coma appears compatible with the outgassing taking place above the transient CO$_2$ ice layer observed in the Anhur region while transiting from seasonal night to dayside \citep{Filacchione2016c, Fornasier2016, Fornasier2017}. The complete inventory of gases and parent species measured by ROSINA on 67P/CG is discussed in \cite{Altwegg2019}. The gas production rates of 14 gas species (including H$_2$O, CO$_2$, CO, H$_2$S, O$_2$, C$_2$H$_6$, CH$_3$OH, H$_2$CO, CH$_4$, NH$_3$, HCN, C$_2$H$_5$OH, OCS, and CS$_2$) inferred from a 2 years-long (2014-2016) time series are reported by \cite{Lauter2020}. In general, from ROSINA data appears evident that 67P/CG is enriched not only in CO and CO$_2$ with respect to other JFC, but also in organic and highly volatile molecules \citep{LeRoy2015}. Finally, mass spectroscopy has been successful in identifying other prebiotic species, including phosphorous, simple amino acid glycine \citep{Altwegg2016}, ammoniated salts \citep{Altwegg2020} and cyano radical (CN) \citep{Hanni2021}. \par Dust particles can be characterized with dedicated in situ instruments designed to collect and analyze them while the spacecraft is orbiting near the nucleus. On Rosetta, a suite of three payloads is employed, each of them dedicated to a specific range of particle sizes: 1) MIDAS (Micro-Imaging Dust Analysis System) is an atomic-force microscope designed to measure grains from nanometers to micron sizes \citep{Riedler2007}; 2) COSIMA (Cometary Secondary Ion Mass Analyser) is a time-of-flight secondary-ion mass spectrometer (TOF-SIMS) \citep{Kissel2007} sensitive to particles ranging from 10's of microns to millimeters in size and to image them after impacting on exposed targets \citep{Langevin2016}; 3) GIADA (Grain Impact Analyser and Dust Accumulator) measures the dust flux, including single grains' velocity and mass, for particles $\ge$ 100 $\mu$m \citep{Colangeli2007}. \par The smallest dust grains observed by MIDAS are made by hierarchical agglomerates of compact and fractal particles \citep{Mannel2016, Bentley2016}. The elemental composition of collected grains is determined through secondary ion mass spectroscopy by COSIMA which has inferred anhydrous mineral phases for 55$\%$ of the mass and organic matter for 45$\%$ \citet{Bardyn2017} (see Table \ref{tbl:bardyn}). This retrieval is based on certain assumptions on the H/C and O/C ratios which cannot be determined by the instrument. Grains collected by Rosetta's dust instruments appear in general depleted in ices because they undergo rapid heating after ejection from the nucleus' surface. \begin{table}[!h] \begin{center} \begin{tabular}{|c|r|r|} \hline \textbf{Element} & \textbf{Atomic fraction} & \textbf{Weight fraction} \\ \hline Oxygen & 30$\%$ & 41$\%$ \\ Carbon & 30$\%$ & 30$\%$ \\ Hydrogen & 30$\%$ & 2.5$\%$ \\ Silicon & 5.5$\%$ & 13$\%$ \\ Iron & 1.6$\%$ & 7.5$\%$ \\ Magnesium & 0.6$\%$ & 1.3$\%$ \\ \hline \end{tabular} \end{center} \caption{Averaged composition of 67P/CG’s dust particles as measured by COSIMA. From \citet{Bardyn2017}.} \label{tbl:bardyn} \end{table} A remarkable result concerns the purity of the individual grains: within the COSIMA's dust size range sensitivity (from 50 to 1000 $\mu$m) all collected particles contain both minerals and organics. This means that the non-volatile matter is intimately mixed up to 10's of micron-scale, suggesting the presence of macromolecular carbonaceous assemblage made of the elements listed in Table \ref{tbl:bardyn}. \par The dust flux of grains larger than 100 $\mu$m is measured by GIADA. \cite{Rotundi2015} and \cite{Fulle2016a} have determined that the dust-to-water ice mass ratio is equal to 6 during the inbound orbit (from 3.6 AU heliocentric distance to 1.23 AU perihelion) and that the mass distribution of the dust particles is dominated by compact grains with a density of about 2000 kg m$^{-3}$ and with sizes $\ge$ 1 mm. Moreover, GIADA data indicate that when measuring dust grains mass two different families appear: compact particles and fluffy porous aggregates having masses from $10^{-10}$ to $10^{-7}$ kg \citep{DellaCorte2015}. \par By merging Rosetta's in-situ and remote sensing data, \cite{Guttler2019} have obtained a comprehensive classification of 67P/CG's dust particles (Fig. \ref{fig:guttler_classification}) including 1) solid particles (e.g. irregular grains, roundish monomers, dense aggregate of grains); 2) fluffy particles (fractal dendritic agglomerates); 3) porous particles (agglomerates and cluster of agglomerates). Apart from these classes, combinations of them are possible, e.g. porous aggregates with fluffy chains attached. \begin{figure}[!ht] \includegraphics[width=0.5\textwidth]{guttler_classification.pdf} \caption{67P/CG's dust grains classifications. The gray/blue color indicates different compositions, as refractories and ices. From \cite{Guttler2019}.} \label{fig:guttler_classification} \end{figure} \par Apart from Rosetta, we have few insights into cometary dust composition. Stardust mission collected and returned to Earth several dust samples from comet 81P/Wild 2. As said, the high relative velocity during the sample collection ($\approx 6.1$ km/s) caused the loss of volatiles and organic matter fraction \citep{Brownlee2006}. Elemental analysis of collected grains shows that 81P's particles are made by a matrix containing sulfide pyrrhotite, enstatite, and fine-grained porous chondritic aggregate. The existence of crystalline and high-temperature minerals in comet's dust \citep{Bockelee2002} indicates some transport mechanism of these materials from the inner regions of the solar nebula to the outer fringes \citep{Cuzzi2003}. A great part of dust grains larger than 1 micron returned by Stardust mission are made of olivine and pyroxene: similar silicates have been observed on infrared spectra of Hale-Bopp \citep{Wooden1999} and Tempel 1 \citep{Lisse2006}. Moreover, the presence of chondritic material suggests a further evolutionary link between comets and asteroids \citep{Gounelle2011}. \section{\textbf{Composition Endmembers}} \label{sec:composition_endmembers} Materials assembled in cometary nuclei preserve the composition of the presolar disk at the time of their formation. There is a general consensus among scientists that comets nuclei are dark and dirty snowballs as described by the \cite{Whipple1950} model. The cometary matter is made by a macromolecular assemblage containing a mixture of ices, CHONS (organic matter rich in Carbon, Hydrogen, Oxygen, Nitrogen, and Sulfur), and minerals. In the following, we review recent results by space missions which have allowed us to better constrain endmembers' composition and relative abundances. \subsection{Water and Carbon Dioxide Ices} \label{sec:volatiles_ices} Optical remote sensing observations at visible and near-infrared wavelengths allow sampling nucleus' surface composition within a shallow layer (corresponding to about 10 times the wavelength, i.e. 10 $\mu$m at $\lambda=1 \ \mu$m) assuming a uniform slab. In porous media, like the surface of comets, photons can be scattered multiple times among nearby grains allowing in principle to sample larger depths. However, due to the extremely low albedo of the grains, the multiple scattering is very limited in the cometary regolith. Moreover, the presence of dust particles, e.g. dehydrated fine and dark material, falling back on the nucleus' surface, is blanketing and coating underneath pristine layers, effectively hiding ices' spectral signatures. These effects must be taken into serious consideration when trying to extrapolate the nucleus' internal composition from surface composition measurements. While the spectral identification of cometary volatile species in extended comas is possible from Earth, surface ices are much more difficult to resolve due to the small dimensions of the nuclei and small amount of exposed ices and for these reasons they have been recognized only through remote sensing observations performed by space missions able to navigate near the nuclei. So far, the only two space missions able to accomplish these measurements were Deep Impact at 9P/Tempel 1 and Rosetta at 67P/CG. Both comets have shown the presence of crystalline water ice while only on 67P/CG was possible to identify carbon dioxide ice. In general, the presence of ices on cometary surfaces is regulated by solar illumination and by local topography. \subsubsection{Water Ice} \label{sct:waterice} Despite water ice is the dominant volatile species in cometary nuclei, its presence has been assessed by VIS-IR spectroscopy only in very limited locations on 9P/Tempel 1 and 67P/CG where specific processes are active at the time of the observations. In the following paragraphs are discussed the main modalities in which water ice has been detected. \paragraph{Recently exposed landslides and debris fields:} due to the rough surface topography, is not uncommon that elevated and overhang structures can collapse due to erosion and thermal stresses. This is the case of at least two specific areas located on 67P/CG's Imhotep region (see Fig. \ref{fig:virtis_baps}) where recent collapses have exposed bright material within the debris fields located at their bases \citep{Filacchione2016a}. The study of these areas, called BAPs (Bright Area Patches), allows therefore to derive the characteristics of more fresh ice as present in the outer layers of the nucleus. The best spectral fit to VIRTIS data evidence that the pixel's area located on the debris fields contain up to 1.2$\%$ of water ice grains with a diameter $\approx$2 mm while the residual 98.8$\%$ of the pixel area consists of an intimate mixture made of 3.4$\%$ water ice grains of 56 $\mu$m and average dark terrain for the remaining 95.4$\%$ (Fig. \ref{fig:virtis_baps}, panel g). On average, the total amount of exposed water ice on the debris fields is $\approx4.6\%$ given a 2.5 m/pixel spatial resolution. The surface temperature of the water ice-rich areas is T $<$160–180 K, about 20–25 K colder than in the surrounding dehydrated areas. Despite these low temperatures, the debris fields are still warm enough to justify the presence of water ice in the crystalline state. The presence of a mm-sized grain population can be explained by the recent sintering of smaller grains or by the growth of ice crystals from vapour diffusion in cold layers of the subsurface. \begin{figure}[!h] \includegraphics[width=0.5\textwidth]{VIRTIS_BAPS.png} \caption{Exposed water ice on recently disrupted terrains, like landslides and debris fields seen by Rosetta-VIRTIS on 67P/CG. Panel a) color image showing BAPs 1-2 (white and yellow arrows, respectively) in the Imhotep region. b) Water–ice-rich BAP 1 (blue area) is on the right side of a circular elevated structure. c) High-resolution image of debris field 1 better shows the distribution of the water–ice-rich unit (bluish color). d) Temperature image map shows that the water–ice-rich terrain is at T$<$160 K resulting in colder than the neighboring dark terrain. e) color image showing BAP 2. f) Temperature map of BAP 2 showing the colder water–ice-rich terrain. All previous color images are rendered from 1.3 $\mu$m (blue), 2.0 $\mu$m (green) and 2.9 $\mu$m (red) wavelengths. g) a water–ice-rich VIRTIS spectrum (black curve with error bars in red) from BAP 1 compared with the best-fit spectral model (blue curve) showing the percentage of crystalline water ice ($a_{H2O}$) and the water–ice grain diameter ($d_{H2O}$). The spectral ranges colored in gray correspond to positions of instrumental order sorting filters where responsivity is uncertain. From \cite{Filacchione2016a}.} \label{fig:virtis_baps} \end{figure} \paragraph{Localized icy patches:} these features are preferentially located on equatorial regions and in dust-free areas. High albedo-icy patches have been observed on high-resolution visible images by OSIRIS \citep{Pommerol2015} and for eight of them VIRTIS has confirmed the presence of water \citep{Barucci2016}. The icy patch size spans from a few to about 60 meters and appears distributed in clusters of small bright spots or in much larger individual ones. Some of them are probable sources of activity and outbursts \citep{Vincent2016b}. The surface water ice localized in the patches is almost stable for months on some of them, while in others it appears more variable and correlated with the illumination conditions \citep{Raponi2016}. Co-located spectral analysis by VIRTIS evidence very variable water ice abundances and grain sizes: mixing with the ubiquitous dark terrain is in both areal and in intimate modalities. The derived water ice abundance is in the 0.3 to 4$\%$ range with the presence of both tens of micron-sized grains in intimate mixing with the dark terrain or very large mm-sized grains in areal mixing. \begin{figure*}[h!] \centering \includegraphics[width=0.8\textwidth]{VIRTIS_barucci.png} \caption{Examples of localized icy patches observed by Rosetta OSIRIS and VIRTIS on 67P/CG. a) top row: OSIRIS images and VIS I/F spectra for patch $\#1$. Spectrum in red color is the one on the icy patch, the one in black is taken on the nearby nonicy terrain. The plot in column 3 shows I/F corrected spectra with higher values on the icy patch while in column 4 the same data are normalized at 0.55 $\mu$m to enhance the flat slope of the ice at visible wavelengths. b) the same as a) but for patch $\#5$. c) VIRTIS context image, reflectance spectrum, and best fit solution for spot $\#1$; d) same as c) but for spot $\#5$. Both patches $\#1-\#5$ are located in Imhotep, respectively at lat=-5.8$^\circ$, lon=189.4$^\circ$ and at lat=-22$^\circ$, lon=182.8$^\circ$. From \cite{Barucci2016}.} \label{fig:virtis_barucci} \end{figure*} Although water is the dominant volatile observed in the coma, exposed water ice on the cometary surface has been detected in relatively small amounts (a few percent) in several regions of the 67P/CG comet \citep{DeSanctis2015, Filacchione2016a, Pommerol2015, Barucci2016, Oklay2016b, Fornasier2017}, and in higher amounts ($>$ 20\%) in localized areas observed by OSIRIS camera in the Anhur, Bes, Khonsu, Wosret, and Imhotep regions \citep{Fornasier2016, Fornasier2019a, Fornasier2021, Deshapriya2016, Oklay2017, Hasselmann2019, Leon-Dasi2021}, in the Aswan site \citep{Pajola2017}, and in the Abydos landing site and sourroudings \citep{Hoang2020, Orourke2020}. Unfortunately, for many of those last detections infrared spectroscopic data are not available and ice identification and abundance are based on modeling albedo and visible colors. \par The wider surface exposures of water ice were detected in the boundary between the Anhur and Bes regions in the southern hemisphere \citep{Fornasier2016}. These two patches were 4-7 times brighter than the surrounding regions, and about 1500 m$^2$ wide each. As shown in Fig.~\ref{fig:Anhur_osiris_BSpots} they were observed for the first time on 27 April 2015 and survived on the surface for at least ten days. They were located on a flat terrace bounded by two 150 m-high scarps and were formed on a smooth terrain made up of a thin seam of fine deposits covering the consolidated material. \begin{figure*}[h] \centering \includegraphics[width=0.8\textwidth]{OSIRISFORNASIER-eps-converted-to.png} \caption{Composite images (882 nm, 649 nm, and 480nm filters) showing the appearance and evolution of the bright patches in the Anhur/Bes regions of 67P/CG (the arrows indicate two common boulders for reference). The reflectance relative to 535 nm and the normal albedo are represented in the bottom panels. The black line represents the mean spectrum of the comet from a region close to the patches. Dashed and dotted lines show the best fit spectral models to the patches (in gray the associated uncertainty), produced by the linear mixture of the comet dark terrain enriched with 21 $\pm$ 3\% of water ice (dashed line), or 23 $\pm$ 3\% of water frost (dotted line) for patch B, and with 29 $\pm$ 3\% of water ice (dashed line), or 32 $\pm$ 3\% of water frost (dotted line) for patch A. Simulation are performed assuming a water ice grain of 30 $\mu$m. From \cite{Fornasier2016}}. \label{fig:Anhur_osiris_BSpots} \end{figure*} Figure~\ref{fig:Anhur_osiris_BSpots} shows an example of the spectrophotometric evolution of these bright patches: on 12 April 2015 the terrain looks spectrally bluer, a hint for higher water ice abundance, but at this time the bright patches were not exposed yet. Instead they become clearly visible on 27 April and 2 May images when they show a relatively flat spectrum, consistent with the direct exposure of water ice. On 5 June 2015, that region was observed again and the two bright patches had fully sublimated \citep{Fornasier2016, Fornasier2017}, leaving a layer spectrally indistinguishable from the average dark terrain. A water ice abundance of 20-30\% was estimated in these bright area from linear mixing models. This corresponds to an ice loss rate between 1.4 and 2.5 kg day$^{-1}$ m$^{-2}$ for an intimate mixture and the estimated solid ice-equivalent thickness layer was of 1.5-27 mm \citep{Fornasier2016}. Notably, the presence of a small amount of CO$_2$ ice was detected by the VIRTIS spectrometer in an 80 m by 60 m area corresponding to the location of patch A \citep{Filacchione2016c}, about one month before the detection of the bright patches with OSIRIS (see discussion in next section \ref{sct:cg_co2}). \paragraph{Diurnal condensation cycle:} this process is driven by the alternate illumination conditions occurring during each comet's rotation which are able to induce cyclic sublimation during the day and condensation during the night time or when a given area moves into shadows \citep{DeSanctis2015}. The net effect of this process is the condensation of water vapor, released from the subsurface when reached by the propagation of the diurnal thermal wave, on the cold surface during the nighttime. In these conditions, in fact, the temperature inversion occurs between the colder surface regolith and the warmer internal layer. On 67P/CG, this cycle has been observed on the active Hapi region during the inbound orbit. Since the 67P/CG rotation period is about 12.4 hr \citep{Jorda2016} and due to the bilobate shape of the nucleus, the Hapi region was experiencing two Sun exposures, one shadow transit (caused by the small lobe) and one night period for each comet rotation. Infrared spectral analysis performed on the areas close to the transition line between night and dayside (see Fig. \ref{fig:virtisdesanctis}) shows that during the cold night very fine ($<3 \ \mu$m) water ice grains were condensing and accumulating on the surface reaching a maximum abundance of 14 $\%$ and resulting in intimate mixing with the ubiquitous dark terrain \citep{DeSanctis2015}. The volatile condensation–sublimation process has been suggested by \cite{Prialnik2008} who correlated the diurnal cycle with the presence of outbursts occurring during morning hours on 9P/Tempel 1 comet. \begin{figure}[h!] \includegraphics[width=0.48\textwidth]{VIRTISDESANCTIS.png} \caption{The diurnal water-ice cycle on 67P/CG: a) Images showing the ice abundance (by volume) across the Hapi active area while transiting across dawn hours; b) Corresponding temperature images derived from thermal emission show that close the shadow line the minimum temperature is about 160-170 K; c) VIRTIS spectrum on a specific location compared with the best spectral fit matches to a mixture of average dark terrain and water ice grains with an abundance of 8$\%$ and grain size of 2 $\mu$m. From \cite{DeSanctis2015}.} \label{fig:virtisdesanctis} \end{figure} \paragraph{Dust-covered icy boulders:} during the Philae landing process, the lander collided two times with the nucleus surface before stopping under an overhanging cliff located in the Abydos region. \begin{figure*}[h] \centering \includegraphics[width=0.8\textwidth]{ORourke_Nature_2020.pdf} \caption{Discovery of dust-covered icy boulders on the surface of 67P/CG. Panels A to C: Philae's landing trajectory and touch-down locations. Panel D: high-resolution image (4.9 cm/px) showing TD2 (green dashed line) and Philae final position on TD3 (blue dashed line). Note the crevice in the TD2 place. Panels E-F: images of the high albedo icy interiors of the boulders in the crevice. From \cite{Orourke2020}.} \label{fig:ORourke_Nature_2020} \end{figure*} The touch-down (TD) sites are shown in Fig. \ref{fig:ORourke_Nature_2020}, panels A-B-C. While Philae was bouncing on the TD2 site (area marked with the green dashed line in panel D), the lander has impacted in a crevice located between two boulders causing the removal of their dust-covered surface and the exposure of an area of $\approx$ 3.5 $m^2$ showing their pristine interiors \citep{Orourke2020}. A multi-instrument campaign based on both Philae and Rosetta data, shows that the boulders' interiors material is very bright (up to 6 times more than the average dark terrain nearby), enriched in water ice (46.4$\%$ with grain sizes of the order of 30-100 $\mu$m) and it has a very low compressive strength ($<$12 Pa). The measurements show that the local dust-to-ice mass ratio is 2.3:1 \citep{Orourke2020}. So far, this very peculiar measurement is the one that has allowed us to measure the highest abundance of water ice on the surface of 67P/CG and it suggests that in the sub-surface pristine ice-rich localizations are available. \paragraph{Water ice on 67P/CG: a summary} Thanks to infrared observations performed by Rosetta it is possible to understand the distribution of the superficial water ice grains. A first result is that the water ice appears only in crystalline form, a result derived from the observation of the diagnostic properties of the 1.5-1.65 and 2.05 $\mu$m bands. Remote sensing observations cannot resolve the question about the presence of primordial amorphous ice in the deep nucleus since it cannot be reached at optical wavelengths. Moreover, at the typical surface temperature measured on water ice-rich locations (from 160 to 180 K, from \cite{Filacchione2016a}), ice's lattice structure is crystalline (cubic) since the phase transition from amorphous to crystalline form occurs at lower temperature (137 K from \cite{Lynch2005}). The crystalline surface ice evidences its presence in three distinct grain size populations whose existence is related to the processes behind the ice formation: 1) micron-sized grains are characteristic of the more active areas where diurnal variations occurring on timescales of few hours preclude the condensation of larger grains \citep{DeSanctis2015}. This presence of micron-sized water ice grains is evidenced by the very absorbing H$_2$O stretch band between 2.7-3.0 $\mu$m and by the contemporary absence of the other diagnostic bands at 1.05, 1.25, 1.5, 1.65, 2.05 $\mu$m which instead are associated to larger grains. Such micron-sized grains are also probably contributing to the 1-2$\%$ abundance of water ice (upper limit) associated with the dark and red dehydrated material ubiquitously seen across 67P/CG surface \citep{Capaccioni2015}. 2) tens of microns, or intermediate grains, are instead associated with intimate mixtures of water ice and dark material localized in bright icy patches; 3) coarse mm-size grains are probably the consequence of condensation of ice crystals from the vapor diffusion occurring in ice-rich colder layers or by ice grain coalescing and sintering caused by thermal evolution. Due to their larger dimensions, this family of grains appears preferentially distributed in areal mixtures together with dark terrain grains. \paragraph{Ices on other comets} Before 67P/CG exploration by Rosetta, other space missions have searched hints of ices on comets nuclei. Deep Space 1 mission to comet 19P/Borrelly \citep{Nelson2004} was not able to detect any water ice signatures in the 1.3-2.6 $\mu$m spectral range with its near IR spectrometer \citep{Soderblom2002, Soderblom2004}. On the contrary three large blue colored-high visible albedo areas were identified on comet 9P/Tempel 1 by the High and Medium Resolution Imagers (HRI-MRI) onboard the Deep Impact mission \citep{Sunshine2006}. Concurrent observations of the same areas by the onboard IR spectrometer confirmed the presence of water ice thanks to the detection of the diagnostic absorption bands at 1.5, 2.0, and 3.0 $\mu$m (see Fig. \ref{fig:Sunshine_tempel_science_2006}). The ice-rich areas correspond to three depressions reaching about 80 m below the neighborhood. The overall area occupied by these depressions is estimated in about 0.5 km$^2$ or 0.5$\%$ of the total nucleus surface. \begin{figure*}[h!] \centering \includegraphics[width=0.8\textwidth]{Sunshine_tempel_science_2006.pdf} \caption{Spectral identification of water ice on 9P/Tempel 1 by Deep Impact. Left panel (A-): HRI visible image at 16 m/pixel spatial resolution showing the three blue colored-high albedo depressions (marked in light blue color) and relative spectral reflectance (B). Central panel (C-D): MRI visible image and spectrum at 82 m/pixel confirms HRI data. Right panel (E): IR image showing the 2.0 $\mu$m water ice band depth at 120 m/pixel spatial resolution. The relative reflectances of the 3 water ice-rich areas are shown in panel (F). Note the presence of the water ice diagnostic bands on the three spectra shown in Figure. From \cite{Sunshine2006}.} \label{fig:Sunshine_tempel_science_2006} \end{figure*} Spectral modeling points out that in the depressions the water ice is mixed with the average dark terrain reaching an average abundance of 6$\pm$ 3$\%$ and grain sizes of 30 $\pm$ 20 $\mu$m (Fig. \ref{fig:Sunshine_tempel_fit_science_2006}). Moreover, the depressions are acting like cold traps having a diurnal temperature of 280-290 K, much colder than nearby terrains ($\ge$300 K). \begin{figure}[h!] \includegraphics[width=0.49\textwidth]{Sunshine_tempel_fit_science_2006.pdf} \caption{Comparison of the water ice-rich spectra on 9P/Tempel 1 (black curve) with the best spectral fit corresponding to a mixture of 4$\%$ water ice grains of 20 $\mu$m size and 96$\%$ of nucleus dark terrain (blue curve). The average dehydrated dark terrain spectrum is shown in red. All curves are relative reflectances. From \cite{Sunshine2006}.} \label{fig:Sunshine_tempel_fit_science_2006} \end{figure} Finally, as already discussed in Fig. \ref{fig:hartley2coma}, water ice grains emitted from the surface Hartley 2 have been observed in the coma associated with the emission of CO$_2$ \citep{AHearn2011}. \subsubsection{Carbon dioxide ice} \label{sct:cg_co2} After water ice, carbon dioxide is the second most abundant gaseous species observed on cometary comae \citep{Bockelee2017}. Despite its high abundance as gas, the observation of the solid form on nuclei surfaces is extremely difficult due to the high volatility: in vacuum carbon dioxide rapidly sublimates starting from 70 K \citep{Huebner2006}. So far, the only spectroscopic detection of carbon dioxide ice on a cometary nucleus has been reported by VIRTIS on 67P/CG \citep{Filacchione2016c} on a 60$\times$80 m wide area located in the Anhur region. This specific area was transiting outside the four-year-long winter-night season and returning on the dayside, an event occurring only in the proximity of the perihelion passage. During a great part of the orbit far from the Sun, including the aphelion passage, the Anhur area is constantly in the nightside. As a consequence of the lack of solar illumination it reaches very low surface temperatures, probably of the order of $<50$ K. Thanks to Rosetta's close orbit to the nucleus and trajectory's excursion, on 21 March 2015, it was possible to observe the areas close to terminator where VIRTIS has detected the diagnostic 2.0 $\mu$m triplet feature and the 2.6-2.75 $\mu$m bands characteristic of CO$_2$ ice (Fig. \ref{fig:VIRTIS_CO2_Filacchione}). \begin{figure*}[h!] \centering \includegraphics[width=0.99\textwidth]{VIRTIS_CO2_Filacchione.png} \caption{Spectral identification and modeling of transient CO$_2$ ice in the Anhur region by Rosetta/VIRTIS. Left panel: on observations taken on 21 March 2015 IR spectra are showing CO$_2$ ice signatures. Right panel: when observing again the same area on 12-13 April 2015, the CO$_2$ ice features disappeared because the ice was sublimating in the meanwhile. The spectral ranges in gray color correspond to instrumental order sorting filters. From \cite{Filacchione2016c}.} \label{fig:VIRTIS_CO2_Filacchione} \end{figure*} The best spectral fits to VIRTIS data give an abundance of CO$_2$ ice of $<1 \% $ in both areal or intimate mixing with the dark terrain (Fig. \ref{fig:VIRTIS_CO2_Filacchione}, left panel). Subsequent observations confirm that the $CO_2$ ice deposit was rapidly sublimating in the next weeks, until completely disappearing when VIRTIS was observing again the same area in Anhur on 12-13 April 2015 (right panel). The thermal history experienced by this area evidences that the surface underwent a loss of 56 kg of CO$_2$ ice corresponding to an erosion of a layer of 9 cm. To explain this process one could presume that the ice patch was formed during the previous orbit when the carbon dioxide outgassing from the nucleus' deeper layers reached by perihelion's thermal heatwave was condensing on the cold winter surface. The Anhur region in fact is placed on the nucleus' southern part which, after a continuous and intense insolation at perihelion, enters a four years long winter night. This occurs with a fast drop in illumination after the outbound equinox, as a consequence of which the outgassing of CO$_2$ coming from the inner warm layers finds a rapidly cooling surface acting as a point of condensation and accumulation for the ice. When the comet orbits towards the perihelion, the Anhur region moves out from winter night to local summer day: the abrupt increase of the solar illumination causes the rapid disappearance of carbon dioxide ice from the surface. \subsection{Organic Matter} \label{sec:organic_matter} \par Prior to Rosetta space mission, direct information on the refractory component of the organic material on a comet were provided by 81P/Wild (Wild 2) grains gathered by the Stardust sample-return mission, and by meteorites of probable cometary origin such as Interplanetary Dust Particles (IDP), and Antarctic Micro Meteorites (AMM). Analysis performed on Wild 2 grains demonstrates the presence of complex aromatic organic matter. N-rich material appear to be present in the form of aromatic nitriles. However, aromatic organics consist of a small fraction of the total organic matter present \citep{Clemett2010}. Infrared spectra of Wild 2 grains reveal indigenous aliphatic hydrocarbons with longer chain lengths than those observed in the diffuse interstellar medium \citep{Keller2006}. Stratospherically collected IDP and AMM show a close match with organic species in the Stardust samples, relatively to the above-mentioned properties \citep{Keller2006,Clemett2010}. In turn, refractory organic matter in stratospheric IDP and AMM of cometary origin shares similarities with chondritic IOM. Raman spectroscopy analyses have revealed that these particles also contain a disordered polyaromatic structure \citep{Quirico2005,Quirico2016}. However, H/C values reported in stratospheric IDPs display a larger range of values than reported in chondritic IOM \citep{Aleon2001}. \par Scientific payload onboard Rosetta spacecraft and the lander Philae provided unprecedented amount of data on organics of 67P/CG comet. The refractory dust component analysed in situ by COSIMA revealed a mixture of carbonaceous matter and anhydrous mineral phases, consistent with the composition of chondritic porous–IDP and anhydrous AMM \citep{Bardyn2017}. The elemental composition of 67P/CG dust shares similarities with the macromolecular insoluble organic matter (IOM) extracted from primitive chondrites \citep{Fray2016}, with the exception of carbon, which greatly exceeds the abundance measured in carbonaceous chondrites \citep{Bardyn2017}. The mass spectrometers of ROSINA, COSAC, and PTOLEMY, investigated the semi-volatile compounds, finding a relatively high abundance of the aromatic compound toluene \citep{Altwegg2017}. \par The organic-rich nature of 67P/CG has also been highlighted by the reflectance spectra measured by the VIRTIS instrument in the 1–4 $\mu m$ range \citep{Capaccioni2015}, which showed a dark and red surface \citep{Ciarniello2015}, similarly to other spectra of cometary nuclei, although with slight differences (see section \ref{sec:vis_ir_spectral_properties}). Moreover, VIRTIS detected a broad absorption at 2.8–3.6 $\mu m$, centered at 3.2 $\mu m$, never detected on other cometary nuclei, nor on meteorites spectra. Analysis on laboratory analogues show that the reddish slope of 67P/CG should be attributed by a significant fraction of dark refractory polyaromatic carbonaceous component mixed with opaque minerals \citep{Quirico2016,Rousseau2018}. However, most of the spectral information on the nature of 67P/CG organic come from the broad 3.2 $\mu m$ absorption. It is compatible with a complex mixture of various types of carbon–hydrogen (C–H) and/or oxygen–hydrogen (O–H) chemical groups, with contribution from nitrogen–hydrogen (N–H) groups such as ionized ammonium (NH$_4^+$). A firm identification of the exact compounds was made possible thanks to a calibration refinement and performing an average spectrum from a few million surface spectra, producing a spectrum of unprecedented quality in terms of signal-to-noise ratio \citep{Raponi2020}. It revealed that the complex spectral structure of the broad 3.2 $\mu m$ band is made up of weaker and ubiquitous spectral features (Figure \ref{fig:67P_absorption}). The strongest ones are centred at 3.10 $\mu m$, 3.30 $\mu m$, 3.38 $\mu m$, 3.42 $\mu m$ and 3.47 $\mu m$. The whole broad 2.8–3.6 $\mu m$ absorption feature can be affected by the presence of O–H stretching in compounds such as carboxylic acids, alcohols, phenols \citep{Quirico2016}, and O–H bearing minerals. The 3.3 $\mu m$ as well as the 3.1 $\mu m$ subfeature, have been attributed to a significant abundance of ammonium salts by \cite{Poch2020} (see section \ref{sec:ammoniated_salts}). Micrometre-sized water ice grains also contribute to the short-wavelength part of the absorption band, consistently with the findings about temporal variability of the broad absorption (see section \ref{sec:volatiles_ices}). The absorption bands at 3.38 $\mu m$ and 3.42 $\mu m$ identify the asymmetric C–H stretching modes of the methyl (CH$_3$) and methylene (CH$_2$) aliphatic groups, respectively. The absorption at 3.47 $\mu m$ can be assigned to the symmetric modes of CH$_3$ and CH$_2$ groups \citep{Moroz1998}, which in 67P/CG spectrum are blended for the possible presence of perturbing groups such as aromatic molecules \citep{Sandford1991,Keller2004}. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{67P_absorption.jpg} \caption{Continuum-removed average spectrum of 67P/CG across the broad absorption at 2.8-3.6 $\mu$m. From \cite{Raponi2020}.} \label{fig:67P_absorption} \end{figure} The strength of the features detected in the spectrum of the surface of 67P/CG is peculiar: the asymmetric stretching mode of CH$_3$ (3.38 $\mu m$) seems more intense than the asymmetric stretching of CH$_2$ (3.42 $\mu m$). Such configuration is unusual for most of the other investigated extraterrestrial materials, except for the interstellar medium (ISM) \citep{Pendleton1994,Dartois2004} and for IOM extracted from primitive carbonaceous chondrites \citep{Kaplan2018,Kebukawa2011K,Orthous-Daunay2013}. This suggest both a possible evolutionary link between hydrocarbons in the diffuse ISM and comets, and a link in carbon composition among chondrites and comets \citep{Mennella2010,Raponi2020}. \subsection{Ammoniated Salts} \label{sec:ammoniated_salts} \par Remote sensing spectroscopic observations of cometary gaseous comae indicate that the abundance of nitrogen-bearing volatile species with respect to water is about ~1$\%$, being mainly represented by NH$_3$ and HCN, ranging between 0.3-0.7$\%$ and 0.08-0.25$\%$, respectively \citep{Bockelee2017, DelloRusso2016, Lippi2021}. A deficiency of nitrogen in comets was first pointed out by \cite{Geiss1987}, from the composition analysis of the gas and dust of the coma of comet 1P/Halley by in situ and ground-based data. In particular, for the refractory phase, a nitrogen-to-carbon atomic ratio (N/C) of 0.052$\pm$0.028 was reported by \cite{Jessberger1988}, significantly smaller than the solar value of 0.3$\pm$0.1 \citep{Lodders2010}. A similar result was obtained for comet 67P/CG, by the analysis of the cometary dust particles collected by COSIMA providing N/C=0.035$\pm$0.011 \citep{Fray2017}. Although different formation scenarios have been proposed to explain the puzzling nitrogen deficiency in comets \citep[][and reference therein]{Willacy2015}, a possible answer comes only recently with the discovery of significant amounts of ammoniated salts on 67P/CG, resulting from the separate analysis of the data collected by the VIRTIS experiment \citep{Poch2020} and the ROSINA instrument \citep{Altwegg2020} onboard the Rosetta mission. Analysis of the surface VIS-IR spectrum of comet 67P/CG pointed out that the low-reflectance level and red slope were compatible with refractory polyaromatics organics mixed with opaque mineral, while a semi-volatile component with low-molecular-weight, including carboxylic (-COOH)-bearing molecules or NH$_4^+$ ions were considered as the best candidates to explain the broad 3.2 $\mu m$ feature \citep{Capaccioni2015, Quirico2016}. Dedicated laboratory spectral reflectance measurements carried out by \cite{Poch2020}, provided further insight on the nature of the carrier of the 3.2 $\mu m$ feature, by showing that the main characteristic of the 67P/CG average spectrum are reproduced by the spectrum of sublimate residues of mixtures originally containing water ice, fine-grained iron sulfides, and ammonium salts (Figure \ref{fig:amm_salts_Poch}). \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Poch_amm_salts.jpeg} \caption{Comparison of the average 67P/CG spectrum from VIRTIS-M (black line) and a sublimation residue containing $\le 17$ wt$\%$ ammonium formate and pyrrhotite submicrometric grains (red curve). The 67P/CG spectrum is obtained from the refined calibration of VIRTIS-M data described in \cite{Raponi2020}. Dashed lines indicate the 3.1 $\mu$m and 3.3 $\mu$m spectral minima in the broad 67P/CG 3.2-$\mu$m absorption, corresponding to the spectral minima observed in the sublimation residue. The bottom panel reports the spectral ratio between the comet spectrum and sublimation residue spectrum. Adapted from \cite{Poch2020}.} \label{fig:amm_salts_Poch} \end{figure} In particular, the spectrum of the sublimate residue (a porous mixture of submicrometer grains of pyrrhotite and ammonium salt) reproduces the position and asymmetry of the cometary 3.2-$\mu$m absorption, along with the 3.1 $\mu$m and 3.3 $\mu$m spectral minima, resulting from the N-H vibration modes in NH$_4^+$ (Figure \ref{fig:amm_salts_Poch}). The comet spectrum exhibits additional features in the 3.35-3.60 $\mu$m spectral interval that are not observed in the ammonium salt-bearing mixture spectra, and are assigned by \cite{Raponi2020} to the C-H modes in aliphatic organics (see Section \ref{sec:organic_matter}), while further differences can be ascribed to the presence of minor amounts of water ice in the comet spectrum, along with the occurrence of other compounds, among which hydroxylated Mg-silicates (see Section \ref{sec:inorganic_refractories}), and possible different properties of the ammonium salts on the comet surface (e.g. counter-ions, abundance, mixing modality). Depending on the nature of the counter-ions, the position of the NH$_4^+$-related absorptions may shift and vary in relative intensity. \cite{Poch2020} investigated the spectral effects of different ammonium salts, and found that ammonium formate, ammonium sulfate, and ammonium citrate are characterized by spectral features similar to the ones observed in 67P/CG, making it possible that a mixture of different NH$_4^+$-bearing salts is present on the comet surface. Further evidence for ammonium salts was provided by \cite{Altwegg2020} taking advantage of measurements carried out by the ROSINA experiment during a short-lived outburst event that occurred on 5 September 2016 at 18:00 UTC. At this time the Rosetta spacecraft and the ROSINA sensors were directly hit by dust particles which were fragmented by the impact. A comparison of the mass spectra before (around 5 September 2016, 17:00 UTC) and after (around 5 September 2016, 20:00 UTC) the impact showed a marked increment of species which are possible products of ammonium salts (NH$_4$Cl, NH$_4$CN, NH$_4$OC, NH$_4$HCOO, and NH$_4$CH3COO). This is shown in Figure \ref{fig:amm_salts_Altwegg} where the relative abundances normalized to H$_2$O of the different species, after and before the dust impact event, are reported. The post-event increase of ammonium salts-related products has been interpreted as the results of ongoing sublimation of ammonium salts in the grains that entered the Double Focusing Mass spectrometer (DFMS) of the ROSINA instrument, being at a temperature of 273K. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Altwegg_amm_salts.png} \caption{ROSINA measurements of abundance ratios normalized to H$_2$O for the post-impact period (around 5 September 2016, 20:00 UTC) compared with the pre-impact period (around 5 September 2016, 17:00 UTC). Although ammonium salt sublimation can produce H$_2$O, CO, and CO$_2$, the corresponding contribution to their abundance is considered small, as these are dominant species in the undisturbed coma. Thus, H$_2$O, CO, and CO$_2$ are considered as uncorrelated with ammonium salts. From \cite{Altwegg2020}, where further details can be found.} \label{fig:amm_salts_Altwegg} \end{figure} This is compatible with the fact that ammonium salts are more volatile than the typical cometary refractory materials while being generally less volatile than water ice \citep[see Supplementary Table 1 of ][and references therein]{Altwegg2020}. It also suggests that the N/C ratio inferred by COSIMA, is likely a lower limit of the real value of 67P/CG, as most of the ammonium salts in the collected particles would have sublimated during the pre-analysis storage phase in the instrument at 283 K \citep{Fray2017}. The detection of abundant ammonium salts on the nucleus and in the dust of comet 67P/CG provides an explanation for the apparent nitrogen depletion in cometary comae \citep{Poch2020,Altwegg2020}. Ammonium salts sequester nitrogen in a semi-volatile form, not accessible to spectroscopic investigations of the coma unless the cometary dust is exposed to temperatures high enough to trigger ammonium salts sublimation. This could be the case for comets reaching small heliocentric distances, which in fact tend to display a larger abundance of NH$_3$ \citep{DelloRusso2016}, suggesting that a significant fraction of the ammonium salts would sublimate. By assuming that the refractory component of 67P/CG dark material is composed of $\sim$45 wt$\%$ organics and $\sim$55 wt$\%$ minerals, as indicated by COSIMA measurements \citep{Bardyn2017}, \cite{Poch2020} estimate an upper limit of $\lesssim$ 40 wt$\%$ ammonium salts in the cometary dust. Furthermore, depending on the nature of NH$_4^+$ counter-ion they find that amounts of ammonium salts ranging between 10 wt$\%$ and 30 wt$\%$ would provide a cometary N/C ratio matching the solar values. In addition, \cite{Altwegg2020} show that the abundance of nitrogen in comets 67P/CG and 1P/Halley gets close to solar abundances if one assumes that their actual ammonia content is the one observed in comets reaching the smallest heliocentric distance \citep[$\sim$4 $\%$ relative to H$_2$O,][]{DelloRusso2016}, which means accounting also for the ammonia hidden in ammonium salts. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Poch_amm_salts_comp_mod.jpg} \caption{IR spectrum of comet 67P/CG compared to the main belt asteroids 24 Themis \citep{Rivkin2010}, 65 Cybele \citep{Licandro2011}, 52 Europa \citep{Takir2012}, and 361 Bononia \citep{Takir2012}, and the average spectrum of six Jupiter trojans (the "less red" group from \cite{Brown2016}). The spectrum of the Jupiter trojans is divided by 3. Also Himalia is indicated, as its spectrum is indistinguishable from Europa \citep{Brown2014}. Running averages (solid lines) are superimposed over the observation data (dots). The blue dashed line indicates the average extrapolation of the K-band spectra of six Jupiter trojan \citep{Emery2011}. The vertical dashed line indicates the position of the 3.11 $\mu$m feature in the 67P/CG spectrum. The positions of the two main absorptions for pyrrhotite-ammonium formate (red vertical marks) and pyrrhotite-ammonium chloride (green vertical marks) sublimate residue, respectively, are indicated. The plot is adapted from \cite{Poch2020}.} \label{fig:67P_comp_amm_salts} \end{figure} Ammonium salts may represent an important reservoir of nitrogen in comets and, as suggested by similarities in the IR spectrum with 67P/CG, possibly on other solar system small bodies \citep{Poch2020}. This is shown in Figure \ref{fig:67P_comp_amm_salts}, where the 67P/CG spectrum is compared with the ones from a few main-belt asteroids (Themis, Cybele, Europa, and Bononia) and Jupiter trojans. All these bodies evidence a relatively broad absorption feature at 3.1-3.2 $\mu$m, that could be compatible with ammonium salts if we take into account that the ammonium salt-related features show some variability in intensity and position depending on the counter-ions, the matrix materials, and surface temperature \citep{Poch2020}. \subsection{Inorganic refractories} \label{sec:inorganic_refractories} Together with volatiles and organic matter, inorganic refractories are the third major composition endmember observed in comets. Inorganic refractories include different mineral species, among which silicates are the more abundant. Silicates were first observed in comet 1P/Halley by means of infrared spectrophotometric measurements by \cite{Bregman1987} and \cite{Campins1989} and later confirmed in C/1995 O1 Hale–Bopp by \cite{Crovisier1997}. Also, the samples of dust collected by Stardust on 81P/Wild 2 evidenced a large fraction of Mg-silicates \citep{Brownlee2006}. There is a general consensus about the origin of silicates which were synthesized around evolved stars and then went through evolution in the Inter-Stellar Medium (ISM) where the irradiation with ions resulted in amorphization, implantation, and sputtering \citep{Demyk2001, Carrez2002, Jager2003, Brucato2004, Djouadi2005}. The effects caused by ion-induced processing on silicates have been observed also on Interplanetary Dust Particles (IDPs) by \cite{Bradley1999, Bradley2005}. The composition of silicates in the ISM is dominated by the amorphous form (98$\%$) with only a minor presence of the crystalline form (2$\%$). As reported by \cite{Sugita2005}, the amount of amorphous silicates is between 70-98$\%$ in the Jupiter family comets population where the Mg-rich species are the dominant ones \citep{Brownlee2006, Kelley2017}. During their evolution in the ISM, Mg-rich silicates undergo irradiation with H atoms resulting in the formation of OH bonds. As reported by \cite{Zeller1966}, \cite{Djouadi2011}, and \cite{Schaible2014}, the implantation of protons within the keV - MeV energy range in silicates with different compositions and structures, causes the formation of an OH bond recognizable by means of its spectral signature around 2.8 $\mu$m. \par A similar mechanism has been explored through laboratory experiments to synthesize hydroxylated Mg-rich Amorphous Silicates by \cite{Mennella2020} interpreting the wide absorption signature visible on 67P/CG spectra around 3.2 $\mu$m. In Fig. \ref{fig:mennella2020}-top panel is shown the appearance of the broad 3.2 $\mu$m absorption band on an Mg-rich silicate after a cycle of annealing at 300$^\circ$C and irradiation with a flux of 10$^{18}$ H atoms 1/cm$^{2}$. The processed sample (SIL3) is derived from natural olivine with Mg/Si=1.7 and Fe/Si=0.2 ratios. The 3.2 $\mu$m band is reproduced also on other low Magnesium (Mg/Si=1.2) types of silicates after H atoms irradiation. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Mennella_2020.pdf} \caption{Top panel: the 3.2 $\mu$m absorption band observed in SIL3 sample (blue line) underwent annealing at 300$^\circ$C and then exposed to a flux of 10$^{18}$ H atoms 1/cm$^{2}$ is compared to the observed main absorption band visible in the 67P/CG I/F spectrum (black line). Bottom panel: best fit solution from Hapke's model corresponds to a mixture of 15$\%$ hydroxylated amorphous silicate and 85$\%$ comet's average dark-red endmember (blue dashed line, from \cite{Raponi2020}) with 5 $\mu$m grain size distribution. For comparison, the black line corresponds to the observed average 67P/CG reflectance spectrum. From \cite{Mennella2020}.} \label{fig:mennella2020} \end{figure} \begin{figure*}[htb!] \centering \includegraphics[width=0.8\textwidth]{Rousseau2018.png} \caption{Comparison of 67P/CG VIRTIS reflectance with laboratory-measured spectra of intimate mixtures of carbon (PSOC 1532) and pyrrhotite in 67:33wt$\%$ proportion plus dunite (from 5wt$\%$ to 30wt$\%$) in intimate (dot line) or coating mixture (solid line). From \cite{Rousseau2018}.} \label{fig:rousseau2018} \end{figure*} The measured optical depth allows computing the best-fit I/F to observed comet's spectrum shown in Fig. \ref{fig:mennella2020}-bottom panel. The two figures show that the hydroxylated magnesium silicate component is able to reproduce the general shape of the band, suggesting a contribution to observed absorption, in addition to aromatic and aliphatic organic matter (section \ref{sec:organic_matter}), and ammonium salts (section \ref{sec:ammoniated_salts}). \par Supplementary clues about 67P/CG mineral composition can be derived from the analysis of the VIS-NIR spectral range. \cite{Rousseau2018} measured several ternary mixtures of cometary analogs with the aim to reproduce the low reflectance, red color slope, and featureless continuum observed in the 0.4-2.5 $\mu$m range. The investigated mixtures are made by three components, including carbon (lignite coal PSCO1532), iron sulfide (pyrrhotite), and silicate (dunite, 95$\%$ olivine). At the initial sample made by a 67:33wt$\%$ proportion of carbon and pyrrhotite is added an increasing amount of dunite from 5wt$\%$ to 30wt$\%$ (Fig. \ref{fig:rousseau2018}) to explore variations in color and albedo. The mineral phases composition and grain size are selected to match the values measured by dust instruments (GIADA, COSIMA) on Rosetta. The experiment, repeated in both intimate mixing and submicron grains coating larger clumps, shows that these solutions are capable to reproduce the low albedo level and featureless continuum but fail to match the red slope observed in VIRTIS data which is higher than the simulated one. This experiment shows that additional reddening can be introduced by adding complex organic matter to the mineral phases mixtures. \par \cite{Moroz2017} reports the spectral properties of mixtures of organic matter and minerals, including pyrrhotites and troilites. The reflectance of these sulfides shows a decrease when grains become small (e.g. submicron-sized), a behavior described by \cite{Hunt1971}. The low albedo of 67P/CG could be therefore explained by a mixture of fine-grained minerals mixed with organic matter. The additional presence of silicates appears less relevant to model spectral slopes and albedo \citep{Moroz2017, Rousseau2018}. Spectral measurements on several kerite-troilite and kerite-pyrrhotite mixtures evidence that iron-sulfides mixed with organic matter can modify the fine structure of the aromatic-aliphatic group absorption bands within the wide 3.2 $\mu$m band \citep{Moroz2017}. \section{\textbf{Activity-driven composition evolution}} The composition of comets' nuclei is driven by the level of gaseous activity which in turn is a complex result of heliocentric distance, surface morphology, rotational state and volatiles abundance. In the next subsections we are describing the nucleus evolution caused by diurnal (\ref{sec:diurnal_evolution}) and seasonal cycles (\ref{sec:seasonal_evolution}) as well as the changes occurring at local scales where activity events are observed (\ref{sec:activity_evolution}). Finally, in subsection \ref{sct:webs}, is discussed a model of cometary nucleus internal structure and composition derived from the surface seasonal evolution. \subsection{\textbf{Diurnal composition variation}} \label{sec:diurnal_evolution} The first evidence of the diurnal cycle of water on comet 67P/CG was reported by \cite{DeSanctis2015} who detected an area close to shadows in the Hapi region, showing variations in the absorption band near 3 $\mu$m, being deeper and shifted at shorter wavelengths with respect to the average comet spectrum as measured by VIRTIS. They explain these features as a local enrichment of water frost formed when water vapor released from the warm subsurface re-condenses on the cold surface after sunset, and then it rapidly sublimates when exposed to the Sun. Molecules in the inner coma may also be back-scattered to the nucleus surface and re-condense on cold areas contributing to the frost formation \citep{Davidsson2004}. After this first evidence of the diurnal cycle of water relatively far from the Sun (heliocentric distance $\sim$ 3 AU at the time of the observations), no other evidence of surface frost was reported until the comet approached perihelion. Starting from June 2015, that is a couple of months before 67P/CG's perihelion passage, the nucleus shown repeatedly diurnal color variations on extended areas and the occurrence of water frost close to morning shadows, on both lobes of the comet, as reported in \cite{Fornasier2016}. An example of these phenomena is illustrated in the middle panel of Fig.~\ref{diurnalseasonacolors}, showing the color changes on large areas in the Imhotep region from images acquired on 27 June 2015 with a cadence of only 40 minutes. Areas just emerging from the shadows are spectrally bluer than their surroundings (Fig.~\ref{diurnalseasonacolors}, left side of the middle panel), and their spectral slope increased, i.e. the regions got relatively redder, in the images acquired 40 minutes later (Fig.~\ref{diurnalseasonacolors}, right side of the middle panel). \cite{Fornasier2016} interpreted the relatively blue surface at dawn as the presence of additional water frost that condensed during the previous night, and that suddenly sublimates when the region is illuminated by the Sun. These rapid color changes are accompanied by the presence of bright material close to the shadows, proven to be morning water frost that sublimate within few minutes once illuminated (see the bottom panel of Fig.~\ref{diurnalseasonacolors}). This material is six times brighter than the mean comet reflectance, and shows a spectrum which is flat in the visible and near infrared range, but with a flux enhancement in the ultraviolet region, consistent with the spectra of laboratory water frost \citep{Wagner1987}. \cite{Fornasier2016} reproduced the spectral behavior by linear mixing of the cometary dark terrain with 17$\pm$4 \% of water frost, and estimated the frost layer is extremely thin, with depth of only 10-15 microns. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{OSIRIS_seasonaldiurnalevol.png} \caption{Seasonal [top], and diurnal [center and bottom panels] colors evolution of comet 67P/CG from OSIRIS observations \citep{Fornasier2016}. Top panel: Seasonal evolution of the spectral slope from August 2014 (when the comet was at 3.6 AU inbound) to August 2015 (just after the perihelion passage). Middle panel: Diurnal evolution of the spectral slope in the Imhotep region. The two images shown were acquired on 27 June 2015 and only 40 minutes apart. The corresponding heliocentric distance was 1.37 AU, the spatial resolution 3.2 m/pixel, and the phase angle 90$^{\circ}$. The Sun is toward the top. Bottom panel: radiance factor (I/F) of the regions indicated by the white rectangle on the middle panels showing morning frosts (evidenced by the yellow arrows), disappearing and moving with shadows.} \label{diurnalseasonacolors} \end{figure} \subsection{\textbf{Seasonal composition evolution}} \label{sec:seasonal_evolution} By orbiting in formation with 67P/CG nucleus, Rosetta had the unique opportunity to follow the evolution of the surface and coma properties as a function of the heliocentric distance and seasonal changes. Due to the 52.4$^\circ$ obliquity of the rotation axis \citep{Jorda2016}, the summer season on the north and south hemispheres of the nucleus is reached in different orbital periods: the northern regions are continuously illuminated by the Sun during the 5.5 years-long northern summer season. This includes the aphelion passage which occurs at heliocentric distance of 5.68 AU (beyond Jupiter's orbit). The inbound equinox was reached in May 2015 when the comet was orbiting at 1.7 AU from the Sun: this date marks the beginning of the 10 months-long and intense summer on the southern hemisphere while the north hemisphere was moving in night and was no more illuminated by the Sun. The perihelion passage occurred on August 13 2015 when the comet reached the minimum heliocentric distance of 1.24 AU. During this phase the southern hemisphere was experiencing its brief summer season when the Sun becomes circumpolar (never going below the line of the horizon during a comet's day) and the surface was receiving the maximum solar flux resulting in the maximum activity and erosion of a surface's layer of thickness $\approx$ 4 m \citep{Fulle2019}. Depending from models, a percentage between 20$\%$ \citep{Keller2017} to 50$\%$ \citep{Hu2017} of the dust flux lifted from the south hemisphere at perihelion falls back on the northern hemisphere. The grain size distribution of the fall-back flux is dominated by tens cm-size dehydrated aggregates containing only a very small fraction of water ice \citep{Keller2017}. Along the outbound orbit, the equinox is repeating again in March 2016 when the southern hemisphere returned in nightside and the northern in dayside. In this phase, with the progressive settling of the activity on the southern regions, the layering of the dust on the surface blankets again the exposed pristine icy material and the nucleus surface returns darker and redder. This condition is the same observed at the beginning of the Rosetta's mission. \par Nucleus' surface colors have been routinely monitored by VIRTIS onboard Rosetta allowing to catch the changing color and brightness occurring on different regions, as more pristine, water-ice rich material was progressively exposed on the surface \citep{Filacchione2016b, Ciarniello2016}. On average, the comet's surface appears dark and red where dehydrated dust made out of a mixture of minerals and organic matter, prevails. Localized active regions (as discussed in \textbf{Pajola et al., chapter 10}) and the occasional ice-rich exposures are characterized by higher albedo and more neutral colors. VIRTIS and OSIRIS observations show that global changes are noticeable, with an overall trend of the comet becoming bluer and more water-ice-rich while approaching perihelion \citep{Fornasier2016, Filacchione2020, Ciarniello2022}. \par The heliocentric distance is also driving the long-term stability of the water-ice-rich BAPs discussed in section \ref{sec:volatiles_ices} which starts to sublimate when the solar exposure becomes substantial \citep{Raponi2016}. These patches are buried below a dust layer when the comet is at relatively large heliocentric distances ($\gtrsim$3.4 AU) and for this reason, they are scarcely recognizable at 1.5-2 $\mu$m where the diagnostic absorption bands of water ice are located. Approaching the Sun the activity rapidly starts to remove dust particles from the surface gradually exposing the ice beneath it. The patch keeps sublimating thanks to the steady increase of the solar flux until the ice deposit is completely lost. This trend is shown in Fig. \ref{fig:Raponi2016} where we report the 6-months temporal sequence of the water ice band area for heliocentric distances between 3.44 and 2.23 AU along the inbound orbit. During this period the Imhotep region is moving from winter to spring season. Long-term ice stability on the surface of 67P/CG has been reported for many other ice deposits observed by OSIRIS \citep{Oklay2017}. \begin{figure*}[htb!] \centering \includegraphics[width=0.8\textwidth]{Raponi2016.png} \caption{Temporal evolution of the water ice band area at 2.0 $\mu$m for BAP 1 (discussed in Fig. \ref{fig:virtis_baps}). Each panel represents the extension and intensity of the water ice band for heliocentric distances between 3.443 and 2.230 AU along the inbound orbit corresponding to a period of 6 months. The feature steadily increases on the first six panels, and then decreases in the last three. In the last panel, the feature is very weak or absent. The dark areas are in shadow. All acquisitions were taken with similar illumination conditions (average incidence angle between $53^\circ - 67^\circ$ corresponding to early morning local time). The white areas outside the edge of the map are out the field of view of the acquisitions. From \cite{Raponi2016}.} \label{fig:Raponi2016} \end{figure*} \par Spectral modeling of synthetic spectra of water ice and dark terrain mixtures, in both areal and intimate mixing, has been exploited by \cite{Raponi2016} to correlate visible slope and 2 $\mu$m band area, that are the two widely-used spectral indicators sensitive to water ice abundance on 67P/CG spectra. \par Theoretical trends from models are compared with experimental data collected at 95$^\circ$ phase angle. The choice of the phase angle reflects the fact that Rosetta was passing great part of its time orbiting along terminator orbits. A similar relationship is useful to infer water ice abundance by visible colors in absence of infrared data. Noteworthy, since both slope and band area are phase-dependent, this correspondence is valid only at the specific 95$^\circ$ phase angle. As computed by \cite{Ciarniello2015}, the slope changes with phase by +0.007 $\mu$m$^{-1}$ deg$^{-1}$. \begin{figure}[htb!] \centering \includegraphics[width=0.49\textwidth]{Raponi2016bis.png} \caption{The theoretical abundance of water ice as a function of the slope at a phase angle of 95$^\circ$ for different mixing modalities (color lines) compared with VIRTIS data (points in black). From \cite{Raponi2016}.} \label{fig:Raponi2016bis} \end{figure} \par Few studies have focused their analyses on the variability of the comet's environment at different heliocentric distances with the aim to correlate the spectral changes occurring on the nucleus and in the coma. The evolution of the nucleus and coma spectral properties evidences the presence of an orbital cycle of water ice which can be observed by measuring multiple spectral indicators, like the integrated radiance, the spectral slopes, and the wavelength of the radiance's peak measured across the visible spectral range \citep{Filacchione2020}. Comets' gaseous activity is strongly dependant on solar heating which provides the energy input to sublimate volatile species. The sublimation of volatile species is responsible for the removal of the dust grains from the surface, a process which depends on multiple factors, such as the heliocentric distance, the local orientation of the surface with respect to the solar direction, the composition, and physical properties of the subsurface \citep{Gundlach2015, Tubiana2019}. As a consequence of the activity, both the nucleus \citep{Filacchione2016b, Ciarniello2016, Fornasier2016, Ciarniello2022} and the coma \citep{Hansen2016, Bockelee2019} change their appearance along the orbit. The light scattered by dust grains in the coma, taking into account for grain size distribution, shapes \citep{Guttler2019}, and viewing geometry, allows to infer their composition: carbonaceous-organic grains are recognizable by their red-color \citep{Jewitt1986} while magnesium silicate \citep{Zubko2011, Hadamcik2014} and water ice \citep{Fernandez2007} grains by their distinctive blue color. \par By modeling the light scattering properties of the dust particles in 67P/CG coma \cite{Filacchione2020} have found different populations of grains along the orbit: during the inbound orbit water ice grains are the dominant group, at perihelion submicron sized organic material and carbon-rich particles are the more abundant, and along the outbound orbit water ice (or possibly magnesium silicate which has similar color) return to be dominant. Such dust composition end-members and grain sizes are reconcilable with other Rosetta studies: 1) during the emission of outbursts \cite{Agarwal2017} have observed the release of submicron-size water-ice grains mixed with 100's $\mu$m size refractory grains; 2) at the same time, \cite{Bockelee2017} have reported a broad emission feature centered at 3.5 $\mu$m visible on the outbursts that is compatible with the sublimation of organic materials caused by the grains' heating by the solar flux; 3) similar dust grains composition has been inferred by \cite{Frattin2017} which modeled resolved dust grains color images by OSIRIS with three composition classes: organic material grains corresponding to high spectral slope, mixtures of silicate and organic material grains with intermediate slope, and water ice grains with flat slope; 4) the presence of elemental carbon, silicon and magnesium in dust grains has been inferred by COSIMA (see Table \ref{tbl:bardyn} from \cite{Bardyn2017}); 5) predictions on the dust properties (composition and size) from the theoretical "cometary model" of \cite{Fulle2021}. \begin{figure*}[h!] \centering \includegraphics[width=0.9\textwidth]{Filacchione2020.png} \caption{Time-series of spectral indicators as measured in 67P/CG coma during inbound, perihelion, and outbound orbital phases. Panel a): visible integrated radiance; b) 0.4-0.5 $\mu$m spectral slope; c) visible radiance wavelength peak; d) 0.5-0.8 $\mu$m spectral slope. Each point corresponds to the average value of the spectral indicators as computed on an annulus defined by a tangent altitude between 1 and 2.5 km from the nucleus' surface on a single observation. For comparison, the temporal changes occurring on the nucleus are shown in Fig. \ref{fig:Filacchione2020bis}. From \cite{Filacchione2020}.} \label{fig:Filacchione2020} \end{figure*} \begin{figure*}[h!] \centering \includegraphics[width=0.9\textwidth]{Filacchione2020bis.png} \caption{Time-series of 67P/CG nucleus colors evolution as measured through the 0.5–0.8 $\mu$m spectral slope on 12 areas of the surface. MTPs are Rosetta's Medium Term Planning Phases starting from MTP5 (July 2014) and ending in MTP28 (May 2016). Each MTP is one month-long. Orbital passage at perihelion is during MTP19 (marked by the vertical dashed line on each plot). The region name and position (lon, lat) of the 12 test areas are indicated in each plot. For comparison, the temporal changes occurring on the coma are shown in Fig. \ref{fig:Filacchione2020}. From \cite{Filacchione2020}.} \label{fig:Filacchione2020bis} \end{figure*} When comparing spectral properties derived from two years of continuous VIRTIS observations of the dust dispersed in 67P/CG coma and nucleus surface (Fig. \ref{fig:Filacchione2020}), two opposite seasonal colour cycles become evident through its perihelion passage \citep{Filacchione2020}: when far from the Sun the nucleus appears redder than the dust particles in the bluish coma, which are dominated by water ice grains of about 100 $\mu$m in size; moving on the inbound orbit towards perihelion passage the nucleus shows a progressive exposure of water ice-rich and pristine materials; as a consequence of this process the nucleus reaches the maximum blueing at perihelion (Fig. \ref{fig:Filacchione2020bis}); concurrently, the large quantities of dust lifted in the coma become progressively redder orbiting closer to the Sun due to an enrichment of organic matter and amorphous carbon-rich submicron grains (Fig. \ref{fig:Filacchione2020}); the high temperatures reached by the grains cause the rapid sublimation of any residual ice within them, a mechanism through which the grains are rapidly dehydrated once lifted off from the nucleus surface \citep{Bockelee2019}. This process develops in reverse order after the perihelion passage (plus about one month of delay) along the outbound orbit when the activity settles and the redeposition of dehydrated dust particles on the nucleus make it red-colored again while water ice particles start again to populate the coma. The overall cycle of colors developing on the nucleus and coma of 67P/CG along its orbit is summarised in Fig. \ref{fig:Filacchione2020tris}. \begin{figure*}[h!] \centering \includegraphics[width=0.80\textwidth]{Filacchione2020tris.png} \caption{A synthesis of the color cycling occurring on the nucleus surface and inner coma of 67P/CG. From ESA's Science and Technology Blog, \texttt{https://sci.esa.int/s/8kaR0bw}.} \label{fig:Filacchione2020tris} \end{figure*} \par The trends observed by VIRTIS were also confirmed by OSIRIS observations: \cite{Fornasier2016} monitored the color evolution of the nucleus from 3.6 AU to perihelion (1.24 AU) and beyond by measuring changes in the spectral slope in the 535-882 nm range (Fig.~\ref{diurnalseasonacolors}). They found that the whole nucleus became relatively bluer near perihelion, when the increasing level of activity provides a progressive exposure of water ice. This color evolution is accompanied by a change in the phase reddening effect, that decreases at perihelion, as reported in section~\ref{sec:vis_ir_albedo_photometry}. \subsection{\textbf{Local activity-driven composition evolution}} \label{sec:activity_evolution} The Rosetta spacecraft has been orbiting comet 67P/CG for more than 2 years, providing the unique opportunity to study the surface evolution over time. It has been therefore possible for the very first time not only to identify a number of morphological changes in several regions of the nucleus, but also to follow the composition variations produced by the cometary activity and by the diurnal and seasonal cycles of water (see section~\ref{sec:seasonal_evolution}). A number of jets and outbursts have been identified and investigated in the literature: the very first outburst was caught by OSIRIS on April 2014, when the comet was far from the Sun ($\sim$ 4 AU) and unresolved \citep{Tubiana2015}, followed shortly after by the detection of water vapor with the MIRO instrument \citep{Gulkis2015}; Hapi was the most active region during the first resolved observations \citep{Pajola2019}, and characterized by a brighter than average and relatively blue colors \citep{Fornasier2015}, indicating a local enrichment of water ice which was in fact detected by VIRTIS \citep{Capaccioni2015}; but it was during the cometary summer close to the perihelion passage that a number of outbursts and jets were individually identified and their source position on the nucleus retrieved through geometrical tracing \citep{Vincent2016b, Knollenberg2016}, or direct imaging \citep{Vincent2016a, Shi2016, Pajola2017, Fornasier2019b}; finally, during the Rosetta extended mission from January to September 2016, some plumes/faint jets were observed in the equatorial and southern regions in the high-resolution images \citep{Fornasier2017, Fornasier2019a, Agarwal2017, Deshapriya2018, Hasselmann2019}. \par Thanks to the direct identification of activity sources on the nucleus, a number of regions were carefully investigated to look for morphological and composition changes produced by the activity. The main processes originating composition variations on the nucleus can be categorized as the following: \begin{figure*}[h!] \centering \includegraphics[width=0.9\textwidth]{changes_compositebis.png} \caption{Examples of composition changes associated with activity events. Panel A: The Anhur region showing the two larger water-ice rich patches (left), the new scarp formed between August and December 2015 nearby the patches (center), and the corresponding RGB map from images acquired on 7 May 2016, UT 04:15, showing the new scarp and the bluer and water ice-rich material at its feet (from \cite{Fornasier2017}). Panel B: example of jet locations (left side) and some associated activity events in the Anhur region, including the perihelion outburst which took place on 12 August 2015 (from \cite{Fornasier2019b}). The right side of panel B shows a RGB composite image (from the images acquired with filters centered at 882, 649, and 480 nm) of the Anhur region from observations acquired on 25 June 2016 at UT01h37 at a resolution of 0.35 m/px. Several exposures of water ice are also detected, notably at the base of a new scarp, and frost observed within the canyon structure (Figure adapted from \cite{Fornasier2019a}). Panel C: the plume and associated new cavity formation with exposure of water ice identified in the Imhotep region by \cite{Agarwal2017}. Panel D: the outburst and cliff collapse in Aswan site with the exposure of the fresh water ice rich layer at the wall of the cliff (from \cite{Pajola2017}).} \label{surfacechanges_activity} \end{figure*} \begin{enumerate} \item {\it Dust removal and redeposition by volatiles sublimation}: the surface dust is mobilized by means of the sublimation of volatile species (mainly CO$_2$ \cite{Gundlach2020} and H$_2$O). The cometary activity progressively removes dust and exposes pristine material including water ice able to survive on the surface until sublimation occurs. This is causing the composition changes observed on the overall nucleus, or on extended areas of it, where the seasonal and diurnal cycle of water (as detailed in section~\ref{sec:seasonal_evolution}) are manifested, as well as the spectral phase reddening effect variations (see section~\ref{sec:vis_ir_albedo_photometry}). \par The transfer and redeposition of the dust are strongly related to the sublimation of volatiles and thus to the activity level, lift pressure and local topography \citep{Thomas2015, Keller2017, Hu2017, Pajola2017b}. Because the southern hemisphere experiences strong thermal effects being intensely illuminated during, and close to, the perihelion passage, it is highly eroded. By modeling only water ice sublimation \cite{Keller2017} has found that dust ejection occurs from the south and a significant fraction of it is redeposited in the northern regions. \cite{Lai2016} estimated a dust loss of about 0.4 m in depth per orbit in Hapi, and up to 1.8 m in Wosret, where the highest water production rate was measured by MIRO during the perihelion passage \citep{Marshall2017}. Concurrent OSIRIS measurements during the inbound orbit show an erosion of about 1.7$\pm$0.2 m in the Hapi region which is nearly balanced by a 1.4$\pm$0.8 m fallout layer from the southern hemisphere during perihelion \citep{Cambianica2020}. \par The first consequence of dust mobilization is the seasonal variation of colors, with the nucleus becoming bluer approaching perihelion because of the exposure of underlying layers enriched in water ice (Fig.~\ref{diurnalseasonacolors}). \par Secondly, the morphological landscape changed locally: a local removal of $\sim$ 4 m dust coating was observed in part of Imhotep, with the exhumation of boulders and roundish features \citep{El-Maarry2017}, and up to $\sim$14 m in a cavity of Khonsu region \citep{Hasselmann2019} and within the canyon-like structure in Anhur \citep{Fornasier2019a}. Both these southern hemisphere regions originated several jets, and in particular, the canyon in Anhur was the source of the so-called perihelion outburst, one of the strongest activity events reported for comet 67P/CG. Moreover, several ice exposures were observed in the Anhur and Khonsu regions \citep{Deshapriya2018, Fornasier2019a, Hasselmann2019}, and water frost was repeatedly observed within the Anhur canyon (see panel B in Fig.~\ref{surfacechanges_activity}). \par Finally, the dust that fell back onto the nucleus is preserving some water ice, as suggested by \cite{Keller2017} and observed by \cite{Fornasier2019a}. In fact, these authors noticed an asymmetry in the presence of frost/water ice on the 67P/CG comet by comparing pre- and post-perihelion images acquired at similar spatial resolutions and at similar heliocentric distances. While during the inbound orbits water frost/ice was observed only in Hapi, in the outbound orbits it was observed in several regions, including Seth, Anhur, Khonsu, Imhotep, and, in a minor amount, in Khonsu \citep{Lucchetti2017, Fornasier2019a, Fornasier2021, Hasselmann2019, Deshapriya2016, Deshapriya2018, Oklay2017}. All these pieces of evidence proved that the falling back dust still preserves some ice. \item {\it local surface deflation}: this mechanism is associated with the sublimation of subsurface reservoirs of volatiles, resulting in a local surface erosion. An example of manifestation of this mechanism has occurred in the large smooth central area of the Imhotep region with the appearance of two roundish depressions with sizes increasing in time up to several hundred meters and depth of 5$\pm$2 m when the comet was approaching perihelion \citep{Groussin2015b}. These authors invoked exothermic processes such as the crystallization of water ice and/or the clathrate destabilization to explain the expansion rate of these features, which was higher than 18 cm hour$^{-1}$. Tiny bright spots, as well as relatively bluer colors/spectral slopes near the rims/edges of these roundish features, were observed, indicating a local enrichment in volatiles. \item {\it cliffs/overhangs collapse}: they may be triggered by episodic and explosive activity events, producing the mechanical disruption of old terrains \citep{Groussin2015a, Pommerol2015}. A notable example is the July 2015 outburst associated with the cliff's collapse in the Aswan site in the Seth region \citep{Pajola2017}. Following the cliff's collapse, an inner layer enriched in fresh and bright icy material (with albedo beyond 40$\%$) has been exposed. This layer has survived for several months: few examples of this kind of event are shown in panels A and D in Fig.~\ref{surfacechanges_activity}. Several jets were identified by \cite{Fornasier2019b} directly on the nucleus and they were found arising below or close to cliffs or scarps. Often, the walls or the debris fields of cliffs and overhangs are spectrally bluer and brighter indicating the local enrichment of water ice, from the freshly exposed underneath layers \citep{Pommerol2015, Filacchione2016a, Vincent2016a, Oklay2017, Fornasier2017, Fornasier2019a}. \item {\it local activity}: outburst and jets arise from cliffs, pits, bright spots, fractures, or from cavities that cast shadows and favor the recondensation of volatiles showing periodic activity. These activity sources are often observed to be brighter and relatively bluer in colors/spectral slope, showing a local enrichment in volatiles \citep{Vincent2016a, Agarwal2017, Fornasier2017, Fornasier2019a, Fornasier2019b, Hasselmann2019, Deshapriya2018, Hoang2020}. Examples are reported in panels B and C of Fig.~\ref{surfacechanges_activity}. The investigation of activity events from \cite{Vincent2016b} and \cite{Fornasier2019b} shows that cometary activity is triggered by the local illumination conditions and it is stable between several nucleus rotation. \cite{Fornasier2019b} identified the source areas of more than 200 jets and found that the activity events are not correlated with the nucleus morphology, originating both from consolidated and smooth terrains. Interestingly, \cite{Fornasier2019b} found that some faint jets may have an extremely short duration time, less than a couple of minutes, so it may be difficult to catch this kind of events that are probably common in comets. \begin{table*} \begin{center} \caption{Summary of the observed behavior and physical properties of active areas located on the small and big lobe of comet 67P/CG from \cite{Fornasier2021}. These properties are derived from the investigation of southern hemisphere regions submitted to similar high heating at perihelion.} \label{tbl:differences} \begin{small} \begin{tabular}{|l|l|l|l| } \hline & {\bf Small lobe (Wosret)} & {\bf Big lobe} & {\bf References } \\ \hline \hline incoming solar flux & $\sim$ 550 W m$^{-2}$ & $\sim$ 550 W m$^{-2}$ (Anhur and Khonsu) & \cite{Marshall2017} \\ \hline morphology & Consolidated material that appears & Consolidated material with significant & \cite{Thomas2018} \\ & highly fractured with occasional pits & intermediate scale roughness (Anhur) & \\ \hline exposed water ice & in a few and small bright spots ($\sim m^2$) & in many bright spots and & \cite{Fornasier2021} \\ & & some in big patches (1500 m$^2$) & \cite{Fornasier2016, Fornasier2019a} \\ \hline relatively blue area & in very spatially limited area, & in extended area, periodic & \cite{Fornasier2016, Fornasier2017} \\ enriched in frost/ice & periodic, not frequently observed & often observed & \cite{Fornasier2019a, Fornasier2021} \\ & & & \cite{Hasselmann2019} \\ \hline average & the largest in 67P/CG: 4.7$\pm$1.5 m & 2.2-3.2 m (Seth, Imhothep, & \cite{Fornasier2021} \\ goosebump & & Anubis, & \cite{Sierks2015} \\ diameter & & Atum) & \cite{Davidsson2016} \\ \hline level of activity & very high & very high & \cite{Fornasier2021, Fornasier2019b}\\ & & & \cite{Hasselmann2019}\\ \hline surface morphology & few and not so important: & many and important : & \cite{Fornasier2021}, \\ changes & a relatively small cavity, & local dust removal up to 14m in depth, & \cite{Fornasier2017, Fornasier2019a} \\ & local dust removal ($\sim$ 1m depth) & new relatively big scarps and cavities, & \cite{Hasselmann2019} \\ & revealing a cluster of outcrops & big vanishing structures, boulders & \\ & & displacements and fragmentation & \\ \hline surface mass loss & $\sim$ 1.2$\times 10^6$ kg & $> 50 \times$10$^6$ kg in Anhur & \cite{Fornasier2016, Fornasier2019a}\\ & & $\sim 2\times$10$^8$ kg in Khonsu & \cite{Hasselmann2019} \\ \hline \end{tabular} \end{small} \end{center} \end{table*} \item {\it composition heterogeneities}: local color and composition heterogeneities have been identified in different regions of the 67P/CG nucleus and several of them are associated with the local exposure of volatiles. A notable example is Anhur which, as discussed in section~\ref{sec:volatiles_ices}, showed a first exposure of CO$_2$ ice \citep{Filacchione2016c}, followed by the exposure of two large water ice rich patches \citep{Fornasier2016} on the same area. These authors deduced composition heterogeneities in the subsurface composition on a scale of tenths of meters in the Anhur region. The sublimation of the surface and subsurface volatile reservoir here observed is at the origin of the fragile terrain where a new scarp formed as shown in Fig.~\ref{surfacechanges_activity} (panel A), just nearby the two bright patches location. \par Also in comet 9P/Tempel 1 some composition inhomogeneities linked to the detection of dirty water-ice rich material have been reported by \cite{Sunshine2006}. Moreover, the comparison of Tempel 1 images from Deep Impact and the Stardust flybys show morphological changes \citep{Veverka2013}, interpreted as the progressive sublimation and depletion of volatiles. \par Comparing the physical and composition properties of two southern hemisphere regions, Anhur and Wosret, subject to the same strong thermal heating during the cometary summer but located in the large and small lobes, respectively, \cite{Fornasier2021} have noticed a number of differences in the physical and mechanical properties among the two lobes, although no appreciable differences were reported in the literature on the global surface composition \citep{Capaccioni2015} and on the $D/H$ ratio \citep{Schroeder2019}. Wosret, in the small lobe, shows larger goosebumps features, very few morphological changes compared to Anhur and Khonsu regions, despite they all experienced the same high insolation, and less frequent and smaller frost and water ice enriched areas. Considering that Wosret is highly eroded and thus exposes the inner layers of the small lobe, \cite{Fornasier2021} deduced that the small lobe has a lower volatile content, at least in its top layers, than the big one, and different mechanical properties, as already noticed by \cite{El-Maarry2016}. \par A comparison of the observed surface properties on the active regions of the small and big lobes of 67P/CG (Table \ref{tbl:differences}) allows to appreciate how the latter is more eroded and processed by solar heating during the perihelion passages. \end{enumerate} \subsection{From surface evolution to the internal structure of cometary nuclei} \label{sct:webs} Even though the blueing evolution hints a global water ice enrichment towards perihelion passage (see section \ref{sec:seasonal_evolution}), the water ice is observed in a patchy distribution across the nucleus. As we have discussed in the previous section \ref{sct:waterice}, high spatial resolution observations of 67P/CG have revealed a rich phenomenology of localized water-ice rich spots, ranging in size from less than one meter up to tens of meters. These spots appear distributed across the nucleus surface and are recognizable thanks to their intrinsic high reflectance and blue-colored visible spectra which distinguish them from the average dark and red-colored terrain (we refer to such spots as Blue Patches, or BPs in brief). \begin{figure*}[h!] \centering \includegraphics[width=0.8\textwidth]{WEBs_cycle.png} \caption{The progressive blueing of 67P/CG surface orbiting towards perihelion is caused by the progressive exposure to sunlight of Water-Ice-Enriched Blocks (WEBs). In this model the comet nucleus is made by two populations of pebbles composed of refractories (organic matter and minerals) and CO$_2$ ice with, respectively: 1) high abundance of H$_2$O ice (composing the WEBs); and 2) low abundance of H$_2$O ice (H$_2$O-ice poor pebbles). The composition of the H$_2$O-ice poor pebbles corresponds to the material observed during the occasional exposure of CO$_2$ ice \citep{Filacchione2016c}, making most of the nucleus. The CO$_2$ ice is stable at depths $>0.1$m where is localized its condensation front \citep{Gundlach2020}. When approaching perihelion, the sublimation rate of CO$_2$ steadily increases causing the erosion of the surface through the ejection of chunks and exposing the sub-surface WEBs. Once exposed, the WEBs rapidly lose their CO$_2$ content and appear as blue patches (BPs). After this, the solar flux activates the sublimation of the H$_2$O ice which erodes the BPs, while removing sub-cm sized dust from their surface and preventing the formation of a dry crust \citep{Fulle2020}. The BPs can survive on the surface until their water-ice fraction is gone. In the meanwhile, their presence is the origin of the observed surface blueing. While WEBs evolve along this path, H$_2$O-ice poor pebbles experience dehydration rather than erosion due to their intrinsic lower abundance of water ice \citep{Fulle2020}, whereas the formation of a crust is hampered by the concurrent CO$_2$ driven erosion. The same water flux is released by the BPs and the dehydrating surface units as both contain some water ice and are assumed to share the same temperature \citep{Fulle2020}. The resulting blueing trend when 67P/CG approaches perihelion is shown along the right axis. Adapted from \cite{Ciarniello2022}, where further details can be found.} \label{fig:WEBs_cycle} \end{figure*} A similar property is also in agreement with the dust ejection rates reported by \cite{Fulle2016c} derived by GIADA at perihelion \citep{Fulle2020}. \par Starting from these observational evidences, \cite{Ciarniello2022} have explained the color changes occurring on 67P surface in the framework of the water-driven activity model of \cite{Fulle2020} for a nucleus made of cm-sized pebbles \citep{Blum2017}, by defining a new model of the comet internal structure. According to the proposed scenario (Fig. \ref{fig:WEBs_cycle}), the perihelic blueing of 67P is interpreted as an increase of the areal fraction covered in BPs. In this respect, the BPs represent the exposed counterparts of a population of Water-Ice-Enriched Blocks (WEBs, in the following), formed of pebbles with high content of water ice, immerse in a matrix of drier pebbles (see details in Fig. \ref{fig:WEBs_cycle} and caption). The WEBs are exposed as a consequence of the surface erosion through chunk ejection induced by CO$_2$ ice sublimation \citep{Gundlach2020}, and are eroded by H$_2$O ice sublimation ejecting sub-cm dust \citep{Fulle2020} when directly reached by sunlight. The observed color evolution of the nucleus is the result of these two competing mechanisms. By matching the temporal variation of the surface color while taking into account the constraints on the surface erosion by CO$_2$-driven chunk emission \citep{Fulle2019, Cambianica2020, Fulle2020} and the modeled water-driven erosion rates 1.57 m$^2$ and, \cite{Ciarniello2022} infer a dominant size for the WEBs of 0.5-1 m, with a volumetric abundance in the nucleus from 9.5 to 5.5$\%$. The presence of sub-metre WEBs in the nucleus of 67P/CG is in agreement with CONSERT radar observations, which found a homogeneous internal structure down to a few-metres scale \citep{Ciarletti2017}. \par A uniform distribution of WEBs in the interior of 67P/CG nucleus allows to explain both the observed seasonal spectral changes and the measured dust ejection rates, making the macroscopic compositional dishomogeneities observed in comets, e.g. BPs, compatible with the homogeneous structure at small scale (the cm-sized pebbles), and with the sublimation processes occurring at microscopic (sub-pebble) scales. If this is the case, WEBs must be of primordial origin: in fact, during the orbital evolution water ice can recondensate only within a very shallow layer \citep{DeSanctis2015, Fornasier2016} but not in the deep internal parts. With similar characteristics, WEBs are imposing strict constraints on comets' formation scenarios. The detection of crystalline water ice in Proto-Planetary Disks (PPDs) by \cite{Min2016} would be compatible with the formation of water ice-rich pebbles from local ice recondensation, likely stickier than the water poor ones, and possibly favouring the accretion into WEBs during the gravitational collapse originated by the streaming instabilities in PPDs \citep{Blum2017}. \section{\textbf{Conclusions}} \label{sec:conclusions} Comets' nuclei are repository of primordial materials syntethized in the ISM and then processed in the protosolar disk. As such, they are cold time-capsules able to preserve primordial matter until nowadays and offer us the possibility, through their exploration, to understand the conditions occurring during the formation of our Solar System. To reach this purpose, the Rosetta mission has implemented an innovative approach in which measurements performed thorough a wide range of techniques were aiming to infer 67P/CG composition from the orbiter and from the Philae lander at different heliocentric distances. In this respect, Rosetta mission has been a game-changer in cometary science. \par So far, the analysis of Rosetta data discussed in this chapter in the context of previous cometary space missions, gives us some important clues about the nature of cometary matter which is compatible with a \emph{macromolecular assemblage in which ices, organic matter, salts and minerals} are bound together. While the volatile species have been measured and characterized as ices on the nucleus and as gases in the coma by multiple instruments, the determination of the non-volatile fraction is much more complicated to achieve. At now it is still unclear how to reconcile the elemental composition of gaseous species and dust grains achieved by in situ instruments (ROSINA, COSIMA, PTOLEMY, COSAC) with the optical properties of the nucleus at VIS-IR wavelengths (VIRTIS, OSIRIS). The complex organic matter, showing both aromatic and aliphatic bonds, appears well-mixed with minerals, as silicates, Fe-sulfides, carbon, and ammoniated salts. The mixing of all these materials results in the low albedo and red color of the dust covering the whole nucleus. When far from the Sun, the majority of the surface appears very dehydrated, with a water ice residual of no more than 1 $\%$. \par The composition of the non-icy materials allows to back-trace the origins of comets: the nature of the refractories, including organic aromatic and aliphatic matter and silicates, shares similarities with pre-solar matter. The stronger intensity of the CH$_3$ asymmetric stretch (3.38 $\mu$m) with respect to the CH$_2$ (3.42 $\mu$m) resembles the properties observed in the ISM and IOM in primitive carbonaceous condrites. Also the 2.8 $\mu$m OH band in hydroxylated-magnesium silicates indicates a possible genetic link between cometary refractories and ISM, where amorphous silicates are irradiated by keV-MeV energy protons. Moreover, Rosetta's results allow to explain the apparent nitrogen depletion observed in cometary comae being it sequestered in semi-volatile ammoniated salts. In this respect, comets shows analogies with other asteroids and outer solar system objects observed at VIS-IR wavelengths, suggesting an evolutionary link among all these objects. These evidences show that to understand comets' composition it will be necessary to improve statistics (so far only 6 comets have been explored by space missions) and comparisons with asteroids, outer solar system objects and ISM data. \par The Rosetta mission faced multiple (and unexpected) challenges in exploring 67P/CG: the very low albedo, the complex shape and morphology of nucleus, the evolution of the solar heating, the changing activity responsible of the dust and gas environment in the coma were factors playing against a straightforward determination of the nucleus' composition. Moreover, the un-nominal landing of Philae further complicated the mission planning and the scientific interpretation of the results. Similar difficulties will remain in place for any future cometary mission relying on remote sensing and in-situ payloads. In order to overcome them we need a paradigm shift in cometary exploration by implementing a more ambitious exploration approach, such as by adopting a cryogenic sample return, in which a sample containing original cometary material, keeping unaltered the ices and refractory parts, it is returned to Earth to conduct composition analyses with multiple analitical techniques \citep{Bockelee2021}. A similar sample shall be the "Holy Grail" for the cosmochemistry community allowing to shed light on many unresolved questions: apart determining cometary material composition and solar or pre-solar origin, it would permit to understand cometary formation mechanisms, internal structure, dust-to-ice ratio and presence of prebiotic molecules. \par \vskip .5in \noindent \textbf{Acknowledgments.} \\ The authors gratefully thank dr. Sébastien Besse (ESA-ESAC, Madrid, Spain) and dr. Javier Licandro (Instituto de Astrofísica de Canarias, Spain) for their thorough reviews which helped to improve the quality of the manuscript. G.F, M.C., and A.R. acknowledge support from INAF-IAPS and ASI, Italian Space Agency. S.F. acknowledges the support from LESIA, the France Agence Nationale de la Recherche (programme Classy, ANR-17-CE31-0004), and from the Institut Universitaire de France. This research has made use of NASA’s Astrophysics Data System (NASA-ADS). \bibliographystyle{sss-three.bst} \section{\textbf{ Introduction}} \label{sec:intro} Cometari nuclei are among the most pristine bodies currently populating our Solar System. Comets, and planetesimals, formed through the accretion of dust grains, volatiles, and organic matter in the outer regions of the primordial solar nebula \textbf{(Chapter 3, Simon et al., this issue)}. Whatever the origin of cometary matter, whether it is prior to the formation of the solar system or whether it contains materials formed in the solar nebula disk is still a subject of debate. The analysis of the dust samples collected by the Stardust mission show a mixing of presolar grains and minerals formed at high temperature, like forsterite (Mg$_2$SiO$_4$), and enstatite (Mg$_2$SiO$_3$) as well as Calcium-Aluminium Inclusions (CAIs) formed in the hottest regions (>1400 K) of the primordial solar nebula \citep{Brownlee2006} thus suggesting the presence of radial mixing due to turbulence \citep{Bockelee2002} and ballistic transport \citep{Shu2001}. Conversely, other measurements suggest a different formation process: 1) the elemental abundances of many species (C, O, etc) are close to the solar values; 2) the organic matter abundance is similar to molecular clouds and star-forming regions; 3) the nonsolar values of the isotopic ratios of Si, Xe, and S and 4) the high [D$_2$O/HDO]/[HDO/H$_2$O] value measured on 67P/CG are compatible with a scenario in which comets were formed very far from the Sun from presolar matter mixed with never-sublimated (amorphous) ice, at temperature as low as 20 K and in a poorly mixed protoplanetary disk \citep{Altwegg2019}. Differently from larger bodies orbiting closer to the Sun that have sustained thermal processing, impacts, and chemical alterations \citep{DeNiem2018}, comets preserve their original composition being relegated to the outer Solar System for great part of their lifetimes. Comets are currently stored in two large reservoirs, e.g. the Oort Cloud (heliocentric distance between 20.000 and 100.000 AU) and the Kuiper Belt (30-50 AU) where they are orbiting since their formation. Gravitational perturbations and resonances with external planets are capable to deflect them on orbits closer to the Sun. The Jupiter Family Comets (JFC), at which 67P/Churyumov-Gerasimenko (hereafter 67P/CG) belongs, have orbital periods shorter than 20 years, low inclinations ($\le$ 30$^\circ$), aphelia located approximately beyond Jupiter's orbit and perihelia between 1-2 AU from the Sun. \par During their orbital evolution, comets cross different snow lines, corresponding to the equilibrium temperature at which a given ice sublimates in vacuum. In the current Solar System the frost line of water ice (H$_2$O) is located at heliocentric distance of about 3 AU, for carbon dioxide (CO$_2$) is at about 14 AU, for carbon monoxide (CO) is at 28 AU, and for Nitrogen (N$_2$) at 32 AU. Each time a comet orbits inbound one of these snow lines the corresponding ice starts to sublimate. Comets orbiting in the Kuiper belt are kept at cryogenic temperatures continuously during their lifetimes and for this reason their composition remains unaltered until today \citep{Mumma2011}. This equilibrium is broken when comets are perturbed and injected on orbits closer to the Sun \textbf{(Chapter 5, Fraser et al., this issue)}. During their inbound orbits towards the perihelion, all comets show gaseous activity due to the triggering of ices sublimation when they cross the frost lines \citep{Podolak2004}, resulting in the formation of a coma made of accelerated gas and dust grains mainly released from the illuminated areas of the nucleus. Due to the small dimension (typically few km) and irregular shape of the nucleus, the gaseous activity is not homogeneous but is driven by complex relationships among local morphology, solar heating, and availability of volatile species in the subsurface layers \textbf{(Chapter 14, Marschall et al., this issue)}. This activity steadily increases when the comet moves towards the Sun, reaches maximum efficiency immediately after the perihelion passage, and then decreases during the outbound orbit. A similar behavior is common among comets having been observed on both 9P/Tempel 1 \citep{Meech2011} and 67P/CG \citep{Hansen2016}. After crossing again the frost line along the outbound orbit, the water ice sublimation subsides and the coma becomes more tenuous, sustained only by the sublimation of more volatile, less abundant species like CO$_2$ and CO. \par In recent years the classical distinction between comets and asteroids has been reconsidered thanks to the discovery of ice-rich and active asteroids orbiting in the outer part of the Main Belt (see discussion in \textbf{(Chapter 23, Jewitt et al., this issue} and in \cite{HsiehJewitt2006, Snodgrass2017}). In addition, in the last decade a certain number of inactive objects moving on orbits similar to those of comets has been observed \citep{Tancredi2014}. The presence of this population is very relevant because these objects share surface properties comparable with comet nuclei making them likely dormant objects \citep{Licandro2016, Licandro2018}. Moreover, cometary dust samples returned from comet 81P/Wild 2 by Stardust mission \citep{Brownlee2006} or 67P/CG coma grains characterized by Rosetta's COSIMA instrument \citep{Fray2016}, indicate a direct composition link between comets and asteroids as a consequence of the mixing of inner Solar System material which has migrated towards the outer regions. Apart from keeping a record of their primordial composition, comets have played a primary role in planetary evolution being the major carriers of water and C-bearing matter on internal planets: oceans water, and organic matter, the two main recipes necessary to activate biological processes on Earth, have been provided by cometary and asteroidal impacts taking place during the early phases of the Solar System evolution \citep{Delsemme1984, GreenbergMendoza1992}. For these reasons, the exploration of comets and primitive asteroids is an unavoidable step in understanding the Solar System formation processes and evolution. \par Modern exploration of comets has started in 1986 thanks to ESA's Giotto mission who flown a close flyby (minimum distance $\approx$ 600 km) with comet 1P/Halley. Thanks to the data collected by instruments aboard, for the first time it was possible to resolve the very dark surface of a cometary nucleus \citep{Keller1986}, to observe seven active jets releasing matter at a rate of about 3 ton/s \citep{McDonnell1986}, and to characterize organic-rich composition of dust particles in the coma \citep{Kissel1986}. Our knowledge of comets has advanced greatly through the series of NASA missions Deep Space 1, Stardust, and Deep Impact/EPOXI, who have targeted comets 19P/Borrelly, 81P/Wild 2, 9P/Tempel 1, and 103P/Hartley, respectively. With these missions, we have discovered the variability of nuclei and activity processes, including the presence of red-colored dehydrated nuclei surfaces \cite{Soderblom2002}, their very low bulk density ($\approx$ 600 kg/m$^3$) \citep{AHearn2005}, the presence of chuncks of ice ejected from the nucleus by sublimation of CO$_2$ ice \citep{AHearn2011}, and the presence of both presolar and solar system origin materials embedded in dust particles \citep{Brownlee2006}. More recently, ESA's Rosetta mission \citep{Taylor2017} has accomplished a thorough exploration of JFC 67P/CG by orbiting at a close distance from the nucleus during an entire perihelion passage, e.g. from August 2014 (heliocentric distance 3.54 AU), to perihelion in August 2015 (1.23 AU) to end of the mission in September 2016 (3.82 AU). By performing continuous observations for more than two years, the ten scientific instruments aboard Rosetta were able to study 67P/CG's nucleus, coma, and solar wind interactions from a vantage viewpoint, allowing to follow the comet's evolution during the perihelion passage with both remote sensing and in-situ techniques. In the following, we'll discuss the main results from the Rosetta mission on 67P/CG nucleus composition and evolutionary processes in the context of other comets explored by space missions or observed from Earth. \section{\textbf{Comets nuclei properties}} \label{sec:comet_nuclei_properties} \subsection{Photometry} \label{sec:vis_ir_albedo_photometry} The photometric investigation of cometary nuclei is relatively difficult because these bodies are small, irregularly shaped and extremely dark, and thus very faint, spatially unresolved by ground-based telescopes and masked by their coma when approaching the Sun. Cometary nuclei were originally believed to be bright because of their high volatile content deduced from coma measurements. However, the first in-situ images of comet 1P/Halley acquired by the Giotto mission revealed an extremely dark nucleus reflecting only 4$\%$ of the incoming solar light \citep{Keller1987}. All subsequent measurements of the geometric albedo ($A_{geo}$) from ground-based telescopes and space missions confirmed that cometary nuclei are among the darker objects in the Solar System, with 3$\% < A_{geo} <$ 7$\%$ (Table \ref{tab:1}; see also the compendia of comet nuclei albedo by \cite{Lamy2004}), although they are rich in volatiles. Comets 28P/Neujmin 1 and 19P/Borrelly show the darkest surfaces with average albedo values of 2.5-3$\%$ \citep{Buratti2004, Soderblom2002, Delahodde2001}. However, comet 19P/Borrelly displays huge variation in the local photometric parameters and \cite{Li2007b} found a geometric albedo of $7 \pm 2\%$. \\ The unprecedented observations of the 67P/CG nucleus during more than 2 years at different scales of spatial resolution have allowed the Rosetta scientists to perform the most detailed study of a comet ever attempted. In-situ measurements by the Optical, Spectroscopic, and Infrared Remote Imaging System (OSIRIS, see \cite{Keller2007}) and by the Visible, InfraRed, and Thermal Imaging Spectrometer (VIRTIS, see \cite{Coradini2007}) instruments have provided a $A_{geo}$ value of $5.9\pm 0.3 \%$ at 535 nm \citep{Fornasier2015} and $6.2\pm 0.2 \%$ at 550 nm \citep{Ciarniello2015}, respectively, from global photometry, indicating that comet 67P/CG nucleus is among the brightest ones explored so far by space missions, together with comets 9P/Tempel 1 and 81P/Wild 2. \begin{figure*}[h!] \centering \includegraphics[width=0.95\textwidth]{Fig1_colorsalbedomap_osiris.png} \caption{Colors and albedo map of 67P/CG nucleus. Top panel: OSIRIS color images (filters B: 480 nm, G: 649 nm, R: 882 nm) for the north (left and center image, from \cite{Fornasier2015}, and south hemispheres (right image, from \citealt{Fornasier2016}). Spatial resolution is about 2.2 m/px. Center left panel: cylindrical map of the normal albedo at 649 nm by OSIRIS (adapted from \citealt{Fornasier2015}) derived from July-August 2014 observations. Center right panel: boundaries of 67P/CG’s nineteen geomorphological regions of the northern hemisphere in cylindrical projection, from \cite{El-Maarry2015}. Note that regions' boundaries have evolved in more recent works by \cite{Thomas2018} and \cite{Leon-Dasi2021}. Missing data represents the un-illuminated southern hemisphere at the given epochs. Bottom panel: cylindrical maps of the single scattering albedo at 0.55 $\mu$m (left) and 1.8 $\mu$m derived from VIRTIS data \citep{Ciarniello2015}. Note that all cylindrical maps of 67P/CG show degeneration in certain regions due to the irregular shape of the nucleus.} \label{fig1} \end{figure*} \par The $\beta$ coefficient giving the slope of the linear fit of the relation between magnitude and phase angle $\alpha$, is reported in Table \ref{tab:1} for several comets, and it ranges between 0.01 and 0.076 $mag/^{\circ}$. It is usually computed for phase angle $> 5^{\circ}-7^{\circ}$ in order to avoid the opposition surge contribution. For comet 67P/CG \cite{Fornasier2015} and \cite{Ciarniello2015} reported a $\beta$ value of $0.047 \pm 0.002 ~mag/^{\circ}$ and $0.041 \pm 0.001 ~mag/^{\circ}$ for $\alpha > 7^{\circ}$ and $\alpha > 15^{\circ}$, respectively. The linear slope strongly increases when extending the fit to small phase angles reaching values of $0.074 ~mag/^{\circ}$ \citep{Fornasier2015} and $0.082 ~mag/^{\circ}$ \citep{Ciarniello2015}, thus indicating for comet 67P/CG the presence of a strong opposition effect, that is a steep increase of the reflectance at small phase angles. \par The linear slope value of comet 67P/CG is similar to the average value of JFCs ($\beta$ = 0.053$\pm$0.016 mag/$^{\circ}$, \citealt{Snodgrass2011}), close to the values found for comets 1P/Halley, 9P/Tempel 1, 19P/Borelly and 103P/Hartley 2 (Table~\ref{tab:1}), and similar to the value reported in the literature for low-albedo asteroids \citep{BelskayaandShevchenko2000}. \begin{scriptsize} \begin{sidewaystable*}[!htp] \caption{Spectrophotometric properties and Hapke parameters of 67P/CG compared to other cometary nuclei (from \citealt{Filacchione2019}). Legend: $^a$ from \cite{Ciarniello2015},$\beta$ computed for phase angle $\alpha > 15^\circ$; $^b$ values for w, b, $\bar{\theta}$ and $\beta$ from \cite{Fornasier2015}, Hapke global photometric model at $\lambda = $ 0.535 $\mu$m, $\beta$ computed for phase angle $\alpha > 7^\circ$ ; $^c$ from \cite{Fornasier2015}, Hapke (2002) photometric model at $\lambda = $ 0.649 $\mu$m ; ; $^d$ from \cite{Feller2016}, Hapke (2012) photometric model at $\lambda = $ 0.649 $\mu$m ; $^e$ from \cite{Hasselmann2017}, Hapke (2012) photometric model at $\lambda = $ 0.612 $\mu$m ;$^f$ from \cite{Tubiana2011}. B-V has been computed from B-R and V-R index reported in \cite{Tubiana2011}; $^g$ from \cite{Thomas1989}; $^h$ from \cite{Keller1987}; $^i$ from \cite{Hughes1985}; $^j$ from \cite{Sagdeev1986}; $^k$ from \cite{Fernandez2000}, (B-V) and (V-R) colors derived from \cite{LuuandJewitt1990} spectrophotometry; $^l$ photometric parameters derived in V band from \cite{Li2007a}, ground-based and HST observations with solar phase angle down to $4^\circ$ have been included to compute the slope parameter; $^m$ photometric parameters derived in R band from \cite{Li2007b}, ground-based observations with solar phase angle down to $13^\circ$ have been included to compute the slope parameter; $^n$ from \cite{Buratti2004}; $^o$ from \cite{Campins1987} and \cite{Delahodde2001}; $^p$ colors from \cite{Lamy1999}, $\beta$ from \cite{Lamy2004}; $^q$ from \cite{Jewittandsheppard2004}; $^s$ photometric parameters derived in R band by \cite{Li2009}; $^t$ from \cite{Li2013}, Gemini and HST observations at low phase angle have been included to constrain Hapke modeling and derive the slope parameter; $^v$ from \cite{Jewitt2003} .} \begin{tabular}[0.85\columnwidth]{cccccccccc} \hline Comet & $B-V$ & $V-R$ & $R-I$ & $SSA$ & $b$ & $\bar{\theta }[^{\circ}] $ & $A_{geo}$ & $\beta [mag/^{\circ}]$& $\alpha(^\circ)$ \\ \hline 67P/CG$^a$ & $0.73 \pm 0.07$ & $0.57 \pm 0.03$ & $0.59 \pm 0.04$ & $0.052 \pm 0.013$ & $-0.42$ & $19^{\circ}{}^{+4}_{-9}$ & $0.062 \pm 0.002$ & $0.041 \pm 0.001^b$ & $1.2^{\circ}-111.5^{\circ}$ \\ \hline 67P/CG$^b$ & - & - & - & $0.037 \pm 0.002$ & $-0.42 \pm 0.03$& $15^{\circ}$ & $0.059 \pm 0.003$ & $0.047 \pm 0.002 $ & $1.3^{\circ}-53.9^{\circ}$ \\ 67P/CG$^c$ & - & - & - & $0.042$ & $-0.37$& $15^{\circ}$ & $0.065 \pm 0.002$ & $0.047 \pm 0.002 $ & $1.3^{\circ}-53.9^{\circ}$ \\ 67P/CG$^d$ bright spots & - & - & - & $0.067 \pm 0.004$ & $-0.26 \pm 0.07$ & $15^{\circ}$ & $0.077$ & - & $1^{\circ}-30^{\circ}$ \\ 67P/CG$^e$ bright spots & - & - & - & $0.047 \pm 0.001$ & $-0.34 \pm 0.02$ & $15^{\circ}$ & $0.073 \pm 0.05$ & - & $0.1^{\circ}-68^{\circ}$ \\ 67P/CG$^d$ dark boulders & - & - & -& $0.029 \pm 0.004$ & $-0.41 \pm 0.06$ & $15^{\circ}$ & $0.064$ & $0.045 \pm 0.002 $ & $1^{\circ}-30^{\circ}$ \\ 67P/CG$^f$ & $0.83 \pm 0.08$ & $0.54 \pm 0.05$ & $0.46 \pm 0.04$ & - & - & - & - & $0.061-0.076 $ & $0.5^{\circ}-10.6^{\circ}$ \\ \hline 1P/Halley$^g$& $0.72 \pm 0.04$ & $0.41 \pm 0.03$ & $0.39 \pm 0.06$ & - & - & - & - & $0.04^h$ &$107^{\circ}$ \\ 1P/Halley$^i$ & - & - & - & - & - & - & - & $0.05{}^{+0.03}_{-0.01}$ & - \\ 1P/Halley$^j$ & - & - & - & - & - & - & - & $0.04{}^{+0.01}_{-0.02}$ & - \\ \hline 2P/Encke$^k$ & $0.78 \pm 0.02$ &$0.48 \pm 0.02$ & - & - & - & - & $0.046 \pm 0.023$ & $0.06$ & - \\ \hline 9P/Tempel1$^l$ & $0.84 \pm 0.01$ & $0.50 \pm 0.01$ & $0.49 \pm 0.02$ & $0.039 \pm 0.005$ & $-0.49 \pm 0.02$ & $16^{\circ}\pm 8^{\circ}$ & $0.056 \pm 0.009$ & $0.046 \pm 0.007$ & $63^{\circ}-117^{\circ}$\\ \hline 19P/Borrelly$^m$ & - & - & - & $0.057 \pm 0.009$ & $-0.43 \pm 0.07 $ & $22^{\circ} \pm 5^{\circ}$ & $0.072 \pm 0.020 $ & $0.043$ & $51^{\circ}-75^{\circ}$ \\ 19P/Borrelly$^n$ & - & $0.25 \pm 0.78^o$ & - & $0.020 \pm 0.004$ & $-0.45 \pm 0.05$ & $20 \pm 5^{\circ}$ & $0.029 \pm 0.002$ & - & $52^{\circ} - 89^{\circ}$ \\ \hline 28P/Neujmin 1$^o$ &- & $0.45 \pm 0.05$ & - & - & - & - & $0.025$ & $0.006 \pm 0.006$ & $1^{\circ}-19^{\circ}$ \\ \hline 45P/Honda--Mrkos & $1.12 \pm 0.03$ &$0.44 \pm 0.03$ & $0.20 \pm 0.03$ & - & - & - & & $0.06$ & - \\ --Pajdusakova$^p$ &- & - & - & - & - & - & & & - \\ \hline 48P/Johnson$^q$ &- & - & - & - & - & - & & $0.059$ & $6^{\circ}-16^{\circ}$ \\ \hline 55P/Tempel–Tuttle$^p$ &- & - & - & - & - & - & $0.060 \pm 0.025$ & $0.041$ & $3^{\circ}-55^{\circ}$ \\ \hline 81P/Wild 2$^s$ & - & - & - & $0.038 \pm 0.04$ & $-0.52 \pm 0.04$ & $27 \pm 5^{\circ}$ & $0.059 \pm 0.004$ & $0.0513 \pm 0.0002$ & $11^{\circ}-100^{\circ}$\\ \hline 103P/Hartley 2$^t$& $0.75 \pm 0.05$ & $0.43 \pm 0.04$ & - & $0.036 \pm 0.006$ & $ -0.46 \pm 0.06$& $15^{\circ} \pm 10^{\circ}$ & $0.045 \pm 0.009$& $0.046 \pm 0.002$ & $79^{\circ}-93^{\circ}$ \\ \hline 143P/Kowal–Mrkos$^v$ & $0.84 \pm 0.02$ & $0.58 \pm 0.02$ & $0.55 \pm 0.02$ & - & - & - & - & $0.043 \pm 0.014$ & $4.8^{\circ}-12.7^{\circ}$ \\ \hline \end{tabular} \label{tab:1} \end{sidewaystable*} \end{scriptsize} Hapke's semi-empirical models based on the radiative transfer theory \citep{Hapke1993, Hapke2002, Hapke2012} are commonly applied to the global and spatially-resolved photometry of minor bodies to constrain their photometric properties. These models use the parameters listed in the following: \begin{itemize} \item $SSA$ is the particle's single-scattering albedo; \item $b$ is the asymmetric factor which describes the direction in which the medium spreads most of the radiation: backward if $b < 0$ and forward if $b > 0$; \item $\bar{\theta}$ is the angle indicating the average macroscopic roughness slope of the surface medium; \item $B_{sh}$ and $h_{sh}$ are respectively the amplitude and angular width of the peak of the opposition effect (OE) due to the shadow hiding mechanism; \item $B_{cb}$ and $h_{cb}$ are respectively the amplitude and angular width of the peak of the opposition effect due to the coherent backscattering mechanism. \end{itemize} An additional parameter $K$, which takes into account the porosity of the surface, is also included in the latest versions of the Hapke model \citep{Hapke2008, Hapke2012}. The coherent-backscattering mechanism is expected to have a negligible contribution on dark surfaces like those of cometary nuclei, where multiple scattering should have a small contribution relative to single scattering. \par We report in Table~\ref{tab:1} the $SSA$, $b$, and $\bar{\theta}$ parameters for the comets observed by space missions. Cometary nuclei have very low single scattering albedo values (2-6$\%$), strongly backscattering surfaces ($-0.52 < b < -0.42$), and moderately rough surfaces ($15 < \bar{\theta} < 27^{\circ}$). However, spatially resolved data from space missions revealed not only the complex shape and geomorphology of cometary nuclei but also some colors and photometric properties heterogeneity. For instance, for comet 19P/Borrelly \cite{Li2007b} reported variations of the SSA by a factor of 2.5, of the asymmetric factor from almost isotropic (-0.1) to a strongly backscattering (-0.7) behaviour, and a roughness parameter ranging from 13$^{\circ}$ to 55$^{\circ}$. Also at UV wavelengths the single scattering albedo of cometary nuclei is very low: \cite{Feaga2015} have measured a value of 0.031$\pm$0.003 at 1425--1525 \AA \ for 67P/CG. For comet 67P/CG also a number of features with distinct albedo differences from the average terrain, including bright spots, blue veins and dark boulders have been observed and investigated \citep{Hasselmann2017, Feller2016}. \par Among comets explored by space missions 67P/CG is the only one for which the opposition surge has been characterized, thanks to the observations at low phase angles acquired with the OSIRIS imaging system onboard Rosetta. \cite{Fornasier2015} applied the \cite{Hapke1993} model on disk-average photometry of OSIRIS observations acquired with 8 filters covering the 325-990 nm range during the comet approach phase in 2014, and having a spatial resolution up to 2.1 m/px. They found an amplitude of the opposition effect larger than 1.8 and a width larger than 0.021, and no clear wavelength dependence of these parameters, as expected when the shadow-hiding effect is the main cause of the opposition surge. They also model 67P/CG resolved data acquired with the orange filter centered at 649 nm with the latest versions of the Hapke model \citep{Hapke2002, Hapke2012}, finding a strong opposition peak dominated by the shadow-hiding effect ($B_{sh}$ = 2.5, $h_{sh}$= 0.079) with a small contribution coming from the coherent backscattering ($B_{sh}$ = 0.19, $h_{sh}$= 0.017). They also estimate the top surface layer porosity at 87$\%$, suggesting the presence of a very weak and porous mantle with irregular dust particles having structures similar to fractal aggregates. \par These results were further confirmed at greater spatial resolution during two Rosetta flybys designed to observe the nucleus at low phase angles. The pre-perihelion flyby took place in February 2015 and permitted to observe an area near the borders of the Ash, Apis, and Imhotep regions at decimeter scale (see \cite{El-Maarry2015} and \cite{El-Maarry2016} for comet 67P/CG regions definition). The second flyby took place in April 2016 (after perihelion), and it covered the Imhotep–Khepry transition region at a spatial resolution reaching up to 0.5 m/px. These higher spatial scale resolution observations confirmed that the opposition surge is dominated by the shadow-hiding effect and that there is no evidence of a sharp opposition peak at small phase angles associated with the coherent backscattering mechanism. The area observed during the February 2015 \citep{Feller2016} flyby has Hapke parameters indistinguishable from those of the overall nucleus presented in \cite{Fornasier2015}, it shares the same high value of superficial porosity (85-87$\%$) and has a phase function similar to that observed in laboratory for carbon soot samples, or for intramixtures composed of tholins and carbon black \citep{Jost2017}, suggesting the presence of a fluffy and dark regolith coverage in this area \citep{Masoumzadeh2017}. \par \cite{Feller2016} also investigated the photometric properties of some features showing higher (bright spots) or darker (dark boulders) than average albedo values (Table~\ref{tab:1}). In fact, several meter-sized boulders were identified, and all have both colors redder than those of the average nucleus, and a smaller opposition effect. Some bright spots were also observed, but it is worth noting that they are only $\sim$ 50$\%$ brighter than the average terrain and do not have a spectral behavior consistent with exposures of water-ice-rich material as found elsewhere on the 67P/CG nucleus and discussed in the next sections. \par These features have very different SSA and $b$ parameters values: the bright spots have high SSA (6.7$\%$) and low $b$ in absolute value (-0.29), while dark boulders have a very low SSA (2.9$\%$) and they are more backscattering. \par The April 2016 flyby was investigated by \cite{Hasselmann2017} and \cite{Feller2019} using respectively the WAC and the NAC cameras of the OSIRIS imaging system. While the NAC data permitted a high resolution investigation of the flew-by area, highlighting the presence of boulders 20$\%$ darker than the average terrain as well as of several spots at least 2 times brighter than the average terrain, and having colors compatible with a local enrichment in water-ice \citep{Feller2019}, the WAC observations covered the whole Imhotep and surrounding regions catching the opposition surge swiping across the Imhotep region \citep{Hasselmann2017}. The photometric properties of the whole imaged surface during this flyby as well as of some particular features including bright spots and spectrally blue veins were investigated by \cite{Hasselmann2017}, who confirmed the presence of a strong opposition peak produced by the shadow-hiding mechanism, and deduced that the cometary surface is dominated by opaque and dehydrated grains with irregular shape and fairy castle structures. Bright spots and blue veins display a sharper opposition surge consistent with a local enrichment of a few percent water ice mixed with the dark compounds of the comet nucleus. Comparing the area observed both during the February 2015 (pre-perihelion) and April 2016 (post-perihelion) flybys, \cite{Hasselmann2017} find that this area became 7$\%$ darker post-perihelion compared to the pre-perihelion observations and explain this albedo evolution as due to a local air falling deposit of dust. \par The presence on 67P/CG of a surface layer of opaque and dehydrated grains organized in under-dense fairy castle structures is in line with the findings reported by \cite{Emery2006} on Trojans asteroids. Trojans appear covered by a layer of small silicate (likely dehydrated) grains embedded in a relatively transparent matrix, or in very under-dense surface structures. Moreover, the emissivity spectra of Trojans more closely resemble the emission spectra of cometary comae. These results further support the existence of a common link between comets and asteroids. \par Overall, the photometric properties of the 67P/CG nucleus are very similar to those of dark asteroids. Both its linear slope and opposition surge are consistent with the values published in the literature for the majority of dark asteroids \citep{BelskayaandShevchenko2000}, including C and P classes, with the notable exception of D-type, that are the closest ones to cometary nuclei in terms of surface colors. In fact, \cite{Shevchenko2012} investigate the phase function of 3 Trojans D-type asteroids finding no opposition effect, proposing that this could be due to their extremely dark surfaces, where only single light scattering is important and the coherent-backscattering enhancement is completely negligible. They also assumed that asteroids showing no opposition surge should be the darkest one, assumption strengthened by \cite{BelskayaandShevchenko2000} results, who found a strong correlation between the amplitude of the opposition effect and the bodies albedo, with the lowest albedo asteroids showing the smallest opposition effect. \par However, this assumption does not work for the very dark surfaces (albedo of $\sim$ 0.044) of the Near Earth asteroids Ryugu and Bennu, recently visited by the HAYABUSA 2 and OSIRIS-REX missions, respectively. In fact, even if dark, they show a moderate opposition surge. Their opposition surge value, defined as the reflectance at 0.3$^\circ$ over that at 5$^\circ$ phase angle, ranges from 1.2 for Bennu \citep{Golish2021} to 1.26 for Ryugu \citep{Domingue2021}. For comet 67P/CG, the opposition ratio is comprised between 1.25 and 1.34 as extrapolated from \cite{Hasselmann2017} and \cite{Feller2016} reflectance phase curves, thus consistent with that found for P- and C-type asteroids (1.25-1.39 from \cite{BelskayaandShevchenko2000}). The 3 large Trojans investigated by \cite{Shevchenko2012} look thus peculiar among dark bodies, and the opposition surge is not solely related to the surface albedo but very likely to the surface physical properties such as porosity, grain size, and composition. \par Figure \ref{fig1} displays some colors variations and the normal albedo map at 649 nm of comet 67P/CG northern hemisphere obtained from pre-perihelion images acquired with the OSIRIS instrument \citep{Fornasier2015}. Hapi, the region in between the two lobes of the 67P/CG nucleus is the brightest one \citep{Fornasier2015}, followed by Imhotep. The same results are found also by VIRTIS measurements \citep{Ciarniello2015}. Both these regions are characterized by a smooth surface, suggesting that their brightness may be at least partially due to the texture of the surface, even if Hapi clearly shows also evidence of local enrichment of water ice \citep{DeSanctis2015, Filacchione2016b}. The Seth region results to be the darkest of the northern hemisphere. Very similar results are visible on SSA maps from VIRTIS observations \citep{Ciarniello2015, Filacchione2016b}. \cite{Ciarniello2015} derived for the 67P/CG nucleus a SSA spectral slope of 0.20/k\AA \ in the visible range and a lower value, 0.033/k\AA, in the NIR range. The SSA maps at 0.55 and 1.8 $\mu$m derived from VIRTIS data show a SSA distribution consistent with the geometric albedo at 0.649 $\mu$m observed with OSIRIS in the visible range (Fig. \ref{fig1}) during a similar time period. VIRTIS near-infrared 1.8 $\mu$m SSA map highlights the Imhotep region as the brightest one on the surface of 67P/CG. This result is in contrast with the 0.55 $\mu$m albedo distribution which shows a maximum across Hapi (see maps in the bottom row of Fig. \ref{fig1}). \cite{Longobardo2017} derived the photometrically--corrected reflectance at phase angle $\alpha=30^{\circ}$ at several wavelengths for the 67P/CG nucleus finding values ranging from 0.013 at 0.55 $\mu$m to 0.041 at 2.8 $\mu$m and 4 $\mu$m. Examining the correlation between reflectance and SSA as a function of the wavelength, they deduced that the single scattering, even if dominating at all wavelengths, it is larger at shorter wavelengths than at longer ones. \cite{Longobardo2017} also derived the photometrically corrected reflectance at $\alpha = 30^{\circ}$ for the other comets explored by space missions, finding values consistent with those of comet 67P/CG, and confirming the very low reflectance of cometary nuclei. \subsection{Colors of cometary nuclei} As shown in Figure \ref{fig_Jewitt}, cometary nuclei are characterized by red colors (Table~\ref{tab:1}), and their spectrophotometric properties are similar to those of primitive D-type asteroids like the Jupiter Trojans \citep{Fornasier2004, Fornasier2007} and of the moderately red Trans-Neptunians Objects (TNO, see \cite{Sierks2015, Capaccioni2015}). While visible color data on resolved cometary nuclei and asteroid are still very limited to few objects explored by space missions, much better statistics is available from telescopic observations which allow to trace the color gradients among different families of primordial bodies. As discussed by \cite{Jewitt2015}, a color gradient exists across minor bodies groups which increases from C-complex asteroids (C, B, F, G classes), to D types and Trojans, to active comets and Centauri up to the reddest populations of Kuiper Belt Object (KBOs, see Fig. \ref{fig_Jewitt}), including some inactive Centaurs \citep{Lacerda2014}. 67P/CG colors are similar to the average values of active JFCs and are the reddest among the comets (a redder color has been observed only on 143P). During the pre-Rosetta era visible and infrared telescopic observations have provided a large dataset of spectrophotometric observations of disk-integrated cometary nuclei, including comets 162P/Siding Spring \citep{Fernandez2006, Campins2006}, 124P/Mrkos \citep{Licandro2003}, and 28P/Neujmin 1 \citep{Campins2007}. Moreover, to understand the end-states of comets and the sizes of the comet population, IR data from the WISE mission were used by \cite{Licandro2016} to derive the absolute magnitude H of different classes of asteroids in cometary orbits and assess if they are dormant or extinct comet nuclei. All these telescopic observations were not able to distinguish water ice nor other volatile species on the surfaces of cometary nuclei which share similar low albedos and red colored surfaces. \begin{figure}[h!] \centering \includegraphics[width=0.48\textwidth]{Jewitt_2015_mod67P.png} \caption{B-V vs. V-R color indexes diagram showing the colors of various small-body populations including dynamically distinct subsets of: Kuiper belt objects (red circles), comet-related bodies (cyan circles), asteroid spectral types (black circled letters), as defined in the \cite{Tholen1984} classification system, data from \cite{Dandy2003}. The solid line shows the locus of points for reflection spectra of constant gradient, S$^\prime$; numbers give the slope in units of $\%$ k\AA$^{-1}$. The large yellow circle shows the color of the Sun. Some overlapping points have been displaced (by 0.005 mag) for clarity. Error bars show the uncertainties on the respective means. Comets' data, including 67P/CG, from Table \ref{tab:1} are shown in magenta. Figure adapted from \cite{Jewitt2015}.} \label{fig_Jewitt} \end{figure} \par The correlations between colors and surface properties become evident only from disk-resolved observations: in fact, disk-integrated data are not sufficient to distinguish surface regional variability due to the local rough morphology typical of cometary nuclei, nor to take into account their diurnal and seasonal evolution. On 67P/CG different kind of terrains, from the spectrally bluer and water ice-enriched (like Hapi) to the redder ones, associated mostly to dusty regions, have been identified by OSIRIS and VIRTIS since the first resolved images acquired in July-August 2014 \citep{Fornasier2015, Filacchione2016b}, covering mostly the northern hemisphere of the nucleus. No color variability between the small and big lobes nor evidence of vertical diversity in the composition for the first tens of meters was seen on the OSIRIS images at a spatial resolution of about 2 m/pixel. The southern hemisphere, visible from Rosetta since March 2015, shows a lack of spectrally red regions compared to the northern one. This was interpreted as due to the absence of widespread smooth or dust-covered terrains \citep{Fornasier2016, El-Maarry2016} in the highly active southern hemisphere regions, which are exposed to high insolation during the perihelion passage. \par The heterogeneity in colors and albedo was confirmed at a higher (sub-meter) resolution scale \citep{Feller2016, Hasselmann2017, Pommerol2015, Fornasier2019a} by OSIRIS, and brightness variations at centimeter and millimeter scale were reported by the CIVA instrument on-board the Philae lander \citep{Bibring2015}. \par These color changes have been correlated with composition heterogeneities and active areas across the nucleus. In fact, areas characterized by a very high albedo (a factor of 2-10 brighter) and a flat spectrum/bluer colors than the average dark terrain have been proven to be water ice enriched by joint observations carried out with OSIRIS and VIRTIS instruments \citep{Barucci2016, Filacchione2016a}. Therefore, bright and relatively blue regions observed in high-resolution images acquired with OSIRIS permitted the identification of composition inhomogeneities across the nucleus surface. Notable examples are water-ice enriched spots-areas observed in the northern hemisphere \citep{Pommerol2015, Barucci2016}, in the Anhur-Bes regions \citep{Fornasier2016, Fornasier2019a}, with the detection also of CO$_2$ ice by VIRTIS \citep{Filacchione2016c}, in Khonsu \citep{Deshapriya2016, Hasselmann2019}, Hapi \citep{Fornasier2015, DeSanctis2015}, and Wosret regions \citep{Fornasier2021}, in the Aswan cliff after its collapse \citep{Pajola2017}, in several areas in Imhotep \citep{Filacchione2016a, Agarwal2017, Oklay2017}, in the Agilkia and Abydos landing sites \citep{LaForgia2015, Lucchetti2016, Orourke2020}, and in the circular niches of the Seth region \citep{Lucchetti2017}. \par \subsection{Phase reddening} \label{phasereddeningsection} The detailed in-situ investigation of comet 67P/CG permitted for the first time to investigate the spectral phase reddening effect of a cometary nucleus, that is the increase in spectral slope with the phase angle. This effect is a consequence of the small-scale surface roughness and multiple scattering in the surface medium at extreme geometries (high phase angles) and it is commonly observed on several Solar System bodies. A strong spectral phase reddening effect has been noticed for the 67P/CG nucleus since the very first observations with both OSIRIS and VIRTIS instruments covering the northern hemisphere \citep{Fornasier2015, Ciarniello2015, Longobardo2017}, and later confirmed also in the southern hemisphere \citep{Fornasier2016}, for specific areas observed during the 2015 and 2016 flybys \citep{Feller2016, Feller2019}, for Wosret and Anhur regions \citep{Fornasier2017, Fornasier2019a, Fornasier2021}, and for the Abydos landing site \citep{Hoang2020}. The phase reddening coefficients derived from these works for comet 67P/CG are summarized in Table~\ref{tab_reddening}, as well as those for other dark asteroids for comparison. This effect is interpreted as due to the presence of fine, namely, particles of $\sim$ micron size, or to the irregular surface structure of larger grains, having micron-scale surface roughness \citep{Schroeder2014, Fornasier2015, Ciarniello2015}. \par The 67P/CG phase reddening coefficient is a monotonic and wavelength-dependent function (Table~\ref{tab_reddening}), with values of 0.04-0.1 $\times 10^{-4}$ nm$^{-1} deg^{-1}$ in the 535-882 nm range and lower values, 0.015--0.018 $\times 10^{-4}$ nm$^{-1} deg^{-1}$ in the 1 to 2 $\mu$m range. Moreover, the phase reddening effect is also varying over time showing a seasonal cycle linked to the cometary activity. The highest phase reddening effect is observed pre- and post-perihelion at relatively large heliocentric distances when the cometary activity is low or moderate. Conversely, this effect strongly diminished during the peak of the cometary activity close to the perihelion passage \citep{Fornasier2016}, when ungoing surface erosion exposes the underlying layers enriched in volatiles. This seasonal variation of the phase reddening effect is observed globally and in some individual regions like Anhur, Wosret, and in the Abydos landing site \citep{Fornasier2019a, Fornasier2021, Hoang2020}, which is located in Wosret but close to the boundaries with the Bastet and Hatmehit regions. \par The phase reddening effect is lower in the southern hemisphere regions like Wosret and Anhur, which lack widespread dust coating \citep{El-Maarry2016}, and stronger in the northern regions which are overall richer in dust. In fact, \cite{Keller2017} found that the dust particles ejected from the southern hemisphere of comet 67P/CG during the peak of activity partially fall back and are then deposited in the northern hemisphere. \par Compared to other dark minor bodies, the phase reddening effect on 67P/CG nucleus is comparable to that of D-type asteroids and the dwarf planet Ceres, and it is a factor of two or four higher compared to the dusty depleted surfaces of Ryugu and Bennu Apollo asteroids, recently visited by the HAYABUSA2 and OSIRIS-REX missions, respectively (Table~\ref{tab_reddening}). This different reddening behavior is probably a result of the fact that the Apollo family asteroids orbit much closer to the Sun than comets resulting in a surface regolith made by smaller and more thermal processed particles showing a fractal structure affecting their micro- and sub-micro roughness \citep{Fornasier2020}. \begin{table*} \begin{center} \caption{Phase reddening coefficients evaluated for comet 67P/CG and for other dark small bodies (Table adapted from \cite{Fornasier2021}). The quantity $\gamma$ is the phase reddening coefficient; Y$_0$ is the estimated spectral slope at zero phase angle from the linear fit of the data; and $\alpha$ the phase angle range used for computing the phase reddening coefficients.} \label{tab_reddening} \begin{small} \begin{tabular}{|l|l|c|c|c|l|} \hline Body and conditions & Wavel. & $\alpha$ & $\gamma$ & Y$_0$ & References \\ & range (nm) & ($^{o}$) & ($10^{-4}~ nm^{-1}~ deg^{-1}$) & ($ 10^{-4}~ nm^{-1}$) & \\ \hline North. hemisp. pre-perih (2014) & 535-882 & 0--55 & 0.1040$\pm$0.0030 & 11.3$\pm$0.2 & \cite{Fornasier2015} \\ Northern hemisph. pre-perih. (2014-Feb 2015) & 1000-2000 & 25--110 & 0.018 & 2.3 & \cite{Ciarniello2015} \\ Northern hemisph. pre-perih. (2014) & 1100-2000 & 12--100 & 0.015$\pm$0.001 & 2.0 & \cite{Longobardo2017} \\ North\&South hemisph. at perih. (2015) & 535-882 &60--90 & 0.0410$\pm$0.0120 & 12.8$\pm$1.0 & \cite{Fornasier2016} \\ Small region in Imhotep, Ash, Apis & 535-743 & 0--34 & 0.065$\pm$0.001 & 17.9$\pm$0.1 & \cite{Feller2016} \\ (Feb. 2015 Fly-by) &&&&& \\ Small region in Imhotep-Khepry & 535-743 & 0--62 & 0.064$\pm$0.001 & 17.99$\pm$0.01 & \cite{Feller2019} \\ (April 2016 Fly-by) &&&&& \\ Abydos and surroundings (post-perih., 2016) & 535-882 & 20--106 & 0.0486$\pm$0.0075 & & \cite{Hoang2020} \\ Wosret around perih. (2015) & 535-882 & 60--90 & 0.0396$\pm$0.0067 & 12.7$\pm$0.5 & \cite{Fornasier2021}\\ Wosret post-perihelion (2016) & 535-882 & 20--106 & 0.0546$\pm$0.0042 & 13.6$\pm$0.4 & \cite{Fornasier2021} \\ \hline D-type asteroids &450-2400 & 10--73 & 0.05$\pm$0.03 & & \cite{Lantz2017} \\ (1) Ceres & 550-800 & 7--132 & 0.046 & -0.2 & \cite{Ciarniello2017}\\ (101955) Bennu & 550-860 & 7--90 & 0.014$\pm$0.001 & -1.3$\pm$0.1 & \cite{Fornasier2020} \\ (162173) Ryugu & 550-860 & 0--40 & 0.020$\pm$0.007 & & \cite{Tatsumi2020} \\ \hline \end{tabular} \end{small} \end{center} \end{table*} \subsection{UV-VIS-IR spectral properties from optical remote sensing} \label{sec:vis_ir_spectral_properties} During the approximately two-years-long (August 2014-September 2016) escort phase of the Rosetta mission, the nucleus of comet 67P/CG has been extensively imaged by the ALICE, OSIRIS and VIRTIS experiments, characterizing the UV-VIS-IR spectral properties of the surface. \par Nucleus' surface average UV spectrum (700-2050 \AA ) by ALICE show a very dark regolith characterized by a blue spectral slope without significant evidences of exposed water ice absorption \citep{Stern2015}. The average UV spectral reflectance best-fit is compatible with a model made of 99.5$\%$ tholins, 0.5$\%$ water ice plus a neutral darkening agent in a fluffy, light-trapping medium (Figure \ref{fig:alice_67p}). The observed blue spectral slope could be the consequence of a surface rich in tholins or be the result of Rayleigh scattering on very fine particles in the regolith. While the fit is non-unique, it is compatible with very de-hydrated tholins-rich material. \begin{figure}[!h] \centering \includegraphics[width=0.5\textwidth]{67p_alice_fit.png} \caption{UV average I/F of 67P/CG nucleus acquired by ALICE on 14–15 August 2014 (black curve) and best-fit model (red). The fit corresponds to a mixture of 99.5$\%$ tholins (orange curves), 0.5$\%$ water ice (blu) plus a neutral darkening agent like carbon (gray). The tholins are modeled as an intimate mixture made of Triton tholin (abundance 79.9$\%$, grain size 3.5 $\mu$m), Titan tholin (0.9$\%$, grain size 5.0 $\mu$m), and Ice tholin (19.2$\%$, grain size 1.7 $\mu$m). Calibration residuals are the cause of the abrupt changes visible at 800, 975, and 1225 \AA . From \cite{Stern2015}.} \label{fig:alice_67p} \end{figure} \par Hyperspectral images (0.25-5 $\mu$m) of the nucleus acquired by VIRTIS during the pre-perihelion phase, when the comet was orbiting at heliocentric distance of 3.6-3.3 AU \citep{Capaccioni2015, Filacchione2016b} are characterized by a red slope on I/F visible and infrared spectra and display a broad absorption feature between 2.9 $\mu$m and 3.6 $\mu$m (referred to as 3.2 $\mu$m absorption) superimposed over the thermal emission which extends down to approximately 3 $\mu$m (Figure \ref{fig:VIRTIS_spectra}). The 3.2 $\mu$m absorption has been interpreted as carried by a combination of ammoniated salts \citep{Poch2020}, organic materials \citep{Capaccioni2015, Quirico2016, Raponi2020}, and hydroxylated silicates \citep{Mennella2020}, as discussed in greater detail in next Sections \ref{sec:organic_matter} - \ref{sec:ammoniated_salts}. The I/F spectra of most of the surface do not display the diagnostic absorption features of water ice at 1.5 and 2.0 $\mu$m, a result which is compatible with the lack of extended ice-rich patches with sizes much larger than few-tens of meter (See section \ref{sec:volatiles_ices}). \begin{figure*}[!h] \centering \includegraphics[width=\textwidth]{VIRTIS_spectra.png} \caption{Hyperspectral images (at $\sim$13 m/pix resolution) of the nucleus of comet 67P/CG from VIRTIS. Left panel: I/F color image (blue $=$ 0.44 $\mu$m, green $=$ 0.55 $\mu$m, red $=$ 0.7 $\mu$m). Central panel: I/F color image (blue $=$ 1.5 $\mu$m, green $=$ 3 $\mu$m, red $=$ 4.5 $\mu$m). Right panel: average I/F spectra of 5x5 pixels regions indicated by the colored crosses in the left panels. The feature common to all the spectra in the 0.8–1 $\mu$m interval is a calibration artifact in correspondence of the junction of the instrument visible and infrared channels. Adapted from \cite{Filacchione2016b}.} \label{fig:VIRTIS_spectra} \end{figure*} Representative spectra at standard observation geometry (incidence $=30^{\circ}$, emission $=0^{\circ}$, phase angle $=30^{\circ}$) of four nucleus macro-regions (called "head", "neck", "body", "bottom" in the following), as computed by using the corresponding Hapke's parameters derived by spectrophotometric modeling of VIRTIS observations acquired from August 2014 ($\sim$3.6 AU) to February 2015 ($\sim$2.4 AU) \citep{Ciarniello2015}, reveal a limited spectral variability across the surface at global scale (Figure \ref{fig:macroregions}). This result is a consequence of the dust backfall which homogenize the spectral response on great part of the nucleus surface. For this reason, despite the richness of morphological features visible on the surface, from a spectral perspective the nucleus appear quite homogeneous before perihelion passage. Nonetheless, the "neck", connecting the two main lobes of the comet, and corresponding to the Hapi geomorphological region defined by \cite{El-Maarry2015}, stands out displaying reduced VIS \citep{Capaccioni2015, Fornasier2015, Filacchione2016a} and IR spectral slopes \citep{Capaccioni2015, Filacchione2016a}, and a deeper 3.2-$\mu$m absorption feature. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{67_photometry_parameters.png} \caption{67P/CG average photometric parameters: asymmetry factor $b$ (top panel) and single scattering albedo $w$ (centre) derived for four macro-regions: "head" (orange), "neck" (blue), "body" (green), and "bottom" (red) as defined on the map in the bottom panel. Black curves correspond to the average $b$ and $w$ values. Gray bands on the spectral plots indicate the positions of the junctions of instrument order-sorting filters; the dashed box corresponds to the junction of the visible and infrared spectral channels and instrument straylight. Adapted from \cite{Ciarniello2015}} \label{fig:macroregions} \end{figure} The different spectral response of Hapi with respect to the rest of 67P/CG nucleus surface clearly emerges from the mapping of Comet Spectral Indicators (CSI) \citep{Filacchione2016b, Ciarniello2016}, aimed at characterizing the spectral variability across the nucleus. In Figure \ref{fig:CSI_MAPS}, maps of the VIS (0.5-0.8 $\mu$m) and IR (1.0-2.5 $\mu$m) spectral slopes, and of the 3.2-$\mu$m absorption band depth and position are displayed, with the Hapi region again showing VIS and IR slopes lower than the rest of the surface, and a deeper 3.2 $\mu$m band depth characterized by a shift of the feature towards smaller wavelengths. These concomitant variations of the CSI are compatible with an average water ice enrichment in Hapi of approximately 1 vol$\%$ \citep{Ciarniello2016}. \begin{figure*}[h!] \centering \includegraphics{CSI_MAPS.pdf} \caption{Comet Spectral Indicator maps from VIRTIS-M observations. The VIS (panel A) and IR (panel B) spectral slopes, and the band depth (panel C) and band center (panel D) position of the 3.2-$\mu$m absorption feature are shown, for observations performed in the timeframe 2014 August 8–2014 September 2, when 67P/CG was at a heliocentric distance of 3.62-3.44 AU on the inbound orbit. Adapted from \cite{Ciarniello2016}} \label{fig:CSI_MAPS} \end{figure*} Along with 67P/CG, VIS-IR spectral properties of cometary nuclei have been investigated in detail for comets 9P/Tempel 1 (explored by the Deep Impact mission), 103P/Hartley 2 (EPOXI mission), and 19P/Borrelly (Deep Space 1). For Tempel 1, disk-integrated observations of the nucleus at visible wavelengths by means of the High-Resolution Instrument (HRI) and the Medium-Resolution Instrument (MRI) cameras \citep{Hampton2005} reveal a linear red-sloped spectrum (spectral slope of 12.5$\pm$1$\%$/k\AA) laking any feature at the spectral resolution of the multispectral observations of the nucleus \citep{Li2007a}. In addition, disk-resolved observations show limited color variations across the surface ($\sim3\%$ with respect to the nucleus average), as displayed in the color ratio maps (Figure \ref{fig:TEMPEL1_color_ratio}) obtained by rationing images acquired at 750 nm and 550 nm \citep{Li2007a}, with the exception of water-ice-rich regions \citep[color ratio of about $80\%$ of the nucleus average, from][]{Sunshine2006}. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{TEMPEL1_color_ratio.jpg} \caption{Color ratio maps of the nucleus of comet Tempel 1 from HRI and MRI images. The darkest areas correspond to the water-ice-rich (bluest) regions. From \cite{Li2007a}.} \label{fig:TEMPEL1_color_ratio} \end{figure} Similar results are provided by observations at IR wavelengths from the High Resolution Instrument-InfraRed spectrometer \citep[HRI-IR,][]{Hampton2005}, which again indicate minor spatial variability of the spectral slope in the 1.5-2.2 $\mu$m interval (normalized at 1.8 $\mu$m), with typical values of 3.0$\%$/k{\AA} to 3.5$\%/$k{\AA}, and smaller spectral slopes (2.0$\%$/k{\AA}) in correspondence of water-ice-rich areas \citep{Groussin2013} (Figure \ref{fig:Tempel_Hartley_IRslope}, right panel). In addition, \cite{Davidsson2013} found a correlation between 9P/Tempel 1 surface morphology and the 1.5-2.2 $\mu$m spectral slope which appears redder on thick layered terrains (median value 3.4$\%$/k{\AA}) and more neutral on smooth and water ice enriched terrains (median value 3.1$\%$/k{\AA}). \begin{figure*}[h!] \centering \includegraphics{TEMPEL_HARTLEY_IR_slope_fin.pdf} \caption{Top panels: context images of comet Hartley 2 (three left panels) and Tempel 1 (right panel) at visible wavelengths from the HRI camera. Bottom panels: maps of the 1.5-2.2 $\mu$m spectral slope normalized at 1.8 $\mu$m. Adapted from \cite{Groussin2013}.} \label{fig:Tempel_Hartley_IRslope} \end{figure*} \par For the nucleus of comet Hartley 2, HRI and MRI disk-integrated observations at visible wavelengths revealed a linear featureless spectrum in the 400-850 nm interval, with an overall spectral slope of 7.6$\pm$3.6$\%$/k\AA, while color ratio maps indicate relatively larger color variations with respect to Tempel 1, with a FWHM of 12$\%$ \citep{Li2013}. In particular, images acquired during the inbound leg of the Deep Impact spacecraft flyby of Hartley 2 showed areas near the terminator characterized by a smaller spectral slope, indicating a higher fraction of water ice on the surface \citep{Li2013, Sunshine2011}. A similar spatial distribution is revealed for the the 1.5-2.2 $\mu$m spectral slope as inferred from HRI-IR inbound images \citep{Groussin2013}, with red areas (spectral slope of 3.0$\%$/k{\AA} to 3.5$\%/$k{\AA}) close to the nucleus limb, and IR-bluer regions (average spectra slope values of 0$\%$/k{\AA} to 1.5$\%/$k{\AA}) near the terminator (Figure \ref{fig:Tempel_Hartley_IRslope}). \par Comet 19P/Borrelly's nucleus surface has been investigated by means of the Miniature Integrated Camera and Spectrometer (MICAS, \cite{Rodgers2007}), that provided both VIS broadband images and IR (1.3-2.6 $\mu$m) spectral-spatial images. In particular, these latter evidenced a linear red-sloped IR spectrum, possibly exhibiting some variability between the large and small ends of the nucleus. The spectrum lacks significant features (including water ice bands), with the exception of a recurrent 0.1 $\mu$m wide absorption at 2.39 $\mu$m, which remains unassigned \citep{Soderblom2004}. \par In Figure \ref{fig:plot_resolved_nuclei_spectra} we compare representative IR spectra of cometary nuclei exoplored by spacecrafts: 67P/CG, 19P/Borrelly, 103P/Hartley 2, and 9P/Tempel 1. For 67P/CG we report spectra at two different phase angles (40$^{\circ}$ and 90$^{\circ}$), providing a reference for possible phase reddening (see Section \ref{phasereddeningsection}) affecting the overall spectral slope of the other comets, which were observed at different phase angles (from 41$^{\circ}$ to 84$^{\circ}$). Whereas the above-mentioned distinct absorptions at 3.2 $\mu$m on 67P/CG and at 2.39 $\mu$m on 19P/Borrelly are visible, for comet 103P/Hartley 2 and 9P/Tempel 1, no relevant features have been reported so far, with the exception of spectra acquired over water-ice rich areas \citep{Sunshine2006,Sunshine2011}. Comet 67P/CG, 103P/Hartley 2, and 9P/Tempel 1 display a similar IR spectral slope, comparable to D-type objects, which are among the reddest asteroids, whereas 19P/Borrelly displays an even larger IR spectral slope, standing out as the reddest nucleus. Assuming that phase reddening, if present, produce effects with magnitude comparable to the ones observed for 67P/CG, 19P/Borrelly spectrum (phase angle=41$^{\circ}$) appears to be intrinsically redder than the others. In this respect, we also note that the resulting infrared spectral slope can depend on heliocentric distance, as shown for comet 67P/CG \citep{Fornasier2016,Ciarniello2016,Filacchione2016c,Filacchione2020,Ciarniello2022}, for which a reduction of the VIS and IR slope has been observed while approaching the Sun, as the effect of an increase of water ice surface content. The observations of 19P/Borrelly discussed here were acquired at an heliocentric distance of 1.36 AU \citep{Soderblom2004}, significantly smaller than the ones of 67P/CG (3.6-2.4 AU), and intermediate between the cases of Tempel 1 (1.51 AU) and Hartley 2 (1.06 AU) \citep{Groussin2013}. From this, one might speculate that 19P/Borrelly would appear even redder, if observed at heliocentric distances comparable to the ones of the presented 67P/CG spectrum, however, any firm conclusion in this respect would require an orbital monitoring of the surface spectral properties. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{plot_resolved_nuclei_spectra_corr.png} \caption{Comparison among IR spectra of comet 19P/Borrelly (blue curves, phase angle$=$41$^{\circ}$), 103P/Hartley 2 (red, phase angle$=$84$^{\circ}$), 9P/Tempel 1 (cyan, phase angle$=$63$^{\circ}$), and 67P/CG (solid and dashed black curves corresponding to phase angles of 40$^{\circ}$ and 90$^{\circ}$, respectively). Spectra are normalized at 2 $\mu$m and offset for clarity. For comet 19P/Borrelly two spectra of the small end of the nucleus are superimposed (dashed and solid lines), which are affected by negligible thermal contribution \citep{Soderblom2004}. For comet 67P/CG the two spectra are computed by applying the Hapke model from \cite{Ciarniello2015} at 40$^{\circ}$ and 90$^{\circ}$ phase angle, respectively, after the application of a corrective spectral factor resulting from the absolute calibration with star observations described in \cite{Raponi2020}. In this case, a minor contribution of thermal emission is expected longward of $\sim$ 3 $\mu$m. Missing parts of the spectrum for 67P/CG correspond to the junctions of instrumental order sorting filters. The spectra of comet 9P/Tempel 1 and 103P/Hartley 2 have been derived by averaging spectra avoiding water-ice-rich spots from HRII hyperspectral images 9000036 and 5005001, respectively, after removal of the thermal contribution \citep{Raponi2015}. The missing part of the spectrum of 103P/Hartley 2 at $\sim$2.7 $\mu$m corresponds to the wavelength interval of the H$_2$O-vapour emission in the foreground coma, contaminating the nucleus signal \citep{AHearn2011}.} \label{fig:plot_resolved_nuclei_spectra} \end{figure} \subsection{Composition from surface measurements} \label{sec:composition_surface_measurements} \par Prior to the Rosetta-Philae space mission, the main challenge in studying the cometary dust was in the collection method adopted on the spacecraft. As an example, the Stardust mission during the flyby with comet 81P/Wild 2 was moving with a high relative velocity ($\sim$6 km/s) with respect to the nucleus. The spacecraft successfully collected dust grains trapped in the aerogel target exposed on the Sample Return Capsule \citep{Brownlee2003}. The main bias of this method is the high relative motion because at such velocities a fraction of the dust material, especially its organic components, is thermally destroyed or evaporated when impacting the collection target \citep{Brownlee2006}. \par Conversely, the Rosetta orbiter reduced the relative velocity to $\sim$10 m/s; consequently, the chemical composition and physical structure of a substantial number of particles collected by the GIADA dust experiment remained mainly unchanged \citep{Rotundi2015}. Another advantage of the Rosetta mission is the presence of the Philae lander aiming for the first time to sample and analyze the cometary material directly on the nucleus surface. The scientific payload of Philae included two mass spectrometers devoted to the analysis of volatile and refractory material. The task of Philae was a direct analysis of the nucleus composition, other than the physical properties of the cometary surface and interior, bypassing the complex relationship between coma and nucleus compositions \citep{DeAlmeida1996,Huebner1999}. The contributions of in-situ instruments aboard Philae lander and remote sensing payloads on Rosetta orbiter are valuable to obtain a unique picture of the comet composition. On 12 November 2014, 15:34:04 UTC, Philae touched down at Agilkia (335.69$^\circ$ longitude, 12.04$^\circ$ latitude), just 112 m away from the selected landing site \citep{Biele2015}. However, the shooting of the harpoons, necessary to secure the lander to the nucleus' surface, did not happen when the touch-down signal trigger arrived. The lander feet sunk into the soft regolith on the surface, ejecting a cloud of dust grains over the touch-down area imaged by the OSIRIS \citep{Keller2007} and the navigation cameras on-board Rosetta orbiter. After a timespan of about 20 s, Philae bounced back from the surface, starting an almost 2 h-long hopping tour across the surface of the comet. All available orbiter and lander observations and house-keeping data from the Philae touch-down at Agilkia were analysed and permitted the reconstruction of the sequence of events the lander experienced on the ground, and even to derive important physical parameters of the cometary surface at the landing site, and at the second touchdown. In the latter Philae spent almost two minutes of its cross-comet journey, exposing primitive water ice that was analyzed by instrument onboard the orbiter, allowing important findings on the content of pristine water ice in the nucleus material \citep{Orourke2020} which are discussed in section \ref{sec:volatiles_ices}. Lastly, the lander Philae arrived under an overhanging cliff in the Abydos region, where its journey ended. Here the lack of solar illumination prevented the batteries to be further recharged by the solar cells and caused the end of the Philae mission. \par Thus, information on the chemical composition coming from the lander Philae was mainly obtained by the COSAC \citep{Goesmann2007} and the PTOLEMY \citep{Wright2007} instruments, operating in “sniffing mode” during the early hopping phase of the lander and after landing at the Abydos site. Besides species probably released directly from the nucleus (H$_2$O, CO$_2$, CO) most of the peaks in the measured low-resolution mass spectra in both instruments are due to fragment byproducts partly created with or after the release of the species, but mostly by the ionization process inside the instruments. These fragments are associated with organic species. In this respect, the COSAC data were interpreted \citep{Goesmann2015} as being dominated by gas released from cometary dust particles unintentionally collected via the instrument gas exhaust pipe during the formation of the dust cloud following the lander touch-down at Agilkia. Twenty-five minutes after Philae’s initial comet touchdown, the COSAC mass spectrometer took a spectrum, which displayed a suite of 16 compounds, including many nitrogen-bearing species, and four compounds—methyl isocyanate, acetone, propionaldehyde, and acetamide—that had not previously been reported in comets. Sulfur compounds, if any, are below the detection limits for both the COSAC and PTOLEMY instruments \citep{Wright2015, Goesmann2015}. \par The interpretation of the mass spectra peaks measured with PTOLEMY \citep{Wright2015} suggests a fractionation pattern that might be related to chain-forming species. Short-chained polyoxymethylenes, first proposed to explain ion mass spectra during the Giotto flyby at comet 1P/Halley \citep{Huebner1987}, were considered possible candidates. PTOLEMY measurements also indicated an apparent absence of aromatic compounds. Such PTOLEMY preliminary results were partially revised in a successive analysis by comparing PTOLEMY, COSAC, and ROSINA data, being the latter on board the orbiter: the peaks on masses 91 and 92 Da in the PTOLEMY spectrum are most probably due to the aromatic molecule toluene (CH$_3$–C$_6$H$_5$) and not to polyoxymethylene \citep{Altwegg2017}. PTOLEMY measurements also indicate very low concentrations of nitrogenous material. The low m/z 14 signal indicates that N$_2$ is not in high abundance, which agrees with the average N$_2$/CO ratio of 5.7 $\times$ 10$^{-3}$ obtained by ROSINA \citep{Rubin2015}. However, COSAC detected far more nitrogen-bearing compounds than PTOLEMY. The COSAC findings differ from those of PTOLEMY because COSAC sampled particles excavated by Philae's impact on the surface \citep{Goesmann2015} that entered the warm exhaust tubes located on the bottom of the lander, where they pointed toward the surface, whereas PTOLEMY sampled ambient coma gases entering exhaust tubes located on top of the lander, where they pointed toward the sky. This was confirmed by the peak at m/z 44 detected by both instruments, which decays much slower in the COSAC measurements than in the PTOLEMY data: that measured by COSAC was likely dominated by organic species, whereas the peak measured by PTOLEMY was interpreted to be mostly due to CO$_2$ \citep{Kruger2017}. Even if unambiguous detection of NH$_3$ was not possible because of the presence of H$_2$O and other potential compounds, such as CH$_4$, a nitrogen source such as NH$_3$ must originally have been abundant to form the many N-bearing species. All organic molecules detected by COSAC can be formed by UV irradiation and/or radiolysis of ices due to the incidence of galactic and solar cosmic rays: alcohols and carbonyls derived from CO and H$_2$O ices \citep{Goesmann2015}, and amines and nitriles from CH$_4$ and NH$_3$ ices \citep{Kim2011}. Some of the compounds detected by these on-site measurements, especially those containing carbon-nitrogen bonds, play a key role in the synthesis of amino acids, sugars, and nucleins \citep{Dorofeeva2020}. \par Ammonia, combining with many acids, such as HCN, HNCO and HCOOH encountered in the interstellar medium as well as in cometary ice, would also be the source of ammonium salts (NH$_4$ $^+X^-$) that two independent analyses from ROSINA \citep{Altwegg2020} and VIRTIS \citep{Poch2020} data suggested being abundant in the cometary dust of 67P/CG (see discussion in section \ref{sec:ammoniated_salts}). In this respect, cometary dust of 67P/CG analyzed by COSIMA shows a ratio N/C = 0.035 $\pm$ 0.011, which is three times higher than the value observed in carbonaceous chondrites \citep{Fray2017}, as also found for earlier observations of comet 1P/Halley. Conversely, the content of oxygen in the dust fraction of both comets 67P/CG and 1P/Halley is found to be lower than that in primitive chondrites. The explanation of these results is that the cometary material contains only dehydrated minerals, while all silicates in primitive carbonaceous CI-type chondrites are hydrated. The lack of hydrated minerals on 67P/CG surface is also supported by analysis performed with VIRTIS instrument data \citep{Capaccioni2015, Quirico2016}. This is a probable indication of the absence of post-accretional internal heating of the 67P/CG nucleus \citep{Dorofeeva2020}. \subsection{Composition from coma measurements} \label{sec:composition_coma_measurements} By orbiting the Sun, a cometary nucleus undergoes cyclic sublimation and gas release resulting in the formation of the coma, a tenuous atmosphere made of accelerated gas and dust/ice particles encircling the nucleus (for further discussion about coma properties see chapters \textbf{13 Bodewits et al., 15 Biver et al., this issue}). As a consequence, the composition of the gas and dust particles dispersed in the coma allows an indirect characterization of the nucleus composition. The large diversity of volatile ices composition and relative abundances in comets populations \citep{Bockelee2017} can be traced back to formation environments in the outskirts of the protosolar disk, to the chemical, thermal, and radiation evolution during their orbital permanence in Oort and Kuiper clouds far from the Sun, and recent thermal processing during their orbital evolution closer to the Sun. \par Gaseous species are the result of the sublimation of solid ices fraction in the nucleus, mainly H$_2$O, CO$_2$, CO, while the dust grains are made of refractory and organic matter lifted by the gas flux from the surface's regolith. The genetic link between surface and coma composition is complicated for two reasons: \par 1) the volatile species are available on the nucleus as condensed ice or as trapped gases \citep{DeAlmeida1996, Huebner1999}. Each ice species is characterized by its own thermodynamical properties resulting in different sublimation temperatures, pressures, and depths within the nucleus \citep{Huebner2006, Fray2009, Marboeuf2014}. Instead, the availability of trapped gases depends on the molecular structure of the ice matrix (amorphous, crystalline, or clathrate hydrate) which is driven by thermophysical conditions occurring during the gravitational collapse from which the nucleus has been formed \citep{Espinasse1991, DeSanctis2005, Huebner2006, Marboeuf2014, Blum2017}. This means that the sublimation of each volatile species occurs at different heliocentric distances, with the more volatile species (CO$_2$, CO) still active at far distances from the Sun while water ice becomes active while the comet is orbiting inside the frost line (about 3.2 AU from the Sun). The formation of the dust coma is in general associated with the diurnal sublimation of water ice whose flux is capable to lift small grains from active areas \citep{Vincent2019} whereas larger icy chuncks are associated with CO$_2$ activity \citep{AHearn2011}; \par 2) the dust mantle blanketing the nucleus surface has a primary role in driving the intensity of the outgassing through its thickness and porosity \citep{Marboeuf2014}. Dust grains, once lifted from the surface by the gas flux, are illuminated by the Sun and experience rapid heating as a result of their low albedo and low heat capacity \citep{Bockelee2019}. Moreover, dust grains and gas molecules experience intense solar UV photons irradiation and electronic bombardment, causing the formation of ionized particles \citep{Cravens1987, Heritier2018}: particles erosion, aggregation and chemical reactions can alter the original properties of dust grains. All these mechanisms develop during the time of flight of each dust particle and are related with the heliocentric distance, the orbital obliquity, the irregular shape of the nucleus and the period of rotation \citep{Huebner1999, Fulle2016b}. \par The combined effects of these processes alter the coma properties which could not represent directly the initial abundances of volatiles on the nucleus \citep{Espinasse1991, Benkhoff1995, DeAlmeida1996, Huebner2008, Marboeuf2014}. Several studies tried to link the spatial distribution of the coma composition with a homogeneous or either heterogeneous nucleus composition taking advantage of the few observations available. Their results show very different cases: the analysis of two fragments of comet 73P/Schwassmann-Wachmann 3 revealed very similar properties suggesting a homogeneous composition of the nucleus \citep{DelloRusso2007}. On the contrary, Deep Impact mission found that the fresh material excavated from comet 9P/Tempel 1 was remarkably different from the rest of the nucleus' surface \citep{Feaga2007}. As shown in Fig. \ref{fig:hartley2coma}, also comet 103P/Hartley 2 (characterized by a bilobate nucleus shape similar to 67P/CG) shows a coma with a heterogeneous spatial distribution as a consequence of intrinsic variations of composition within the nucleus \citep{AHearn2011, Protopapa2014}. \begin{figure}[h!] \includegraphics[width=0.49\textwidth]{hartley2_coma_emissions.png} \caption{Top panels: distribution of Hartley 2 coma emissions due to water vapor, CO$_2$, and organic matter, in addition to a map of water ice particle absorption. These species are identified on spectral radiances (bottom panel) measured on H$_2$O vapour outflow and CO$_2$ jet regions. These two regions are localized within the two red squares shown on top panels images. Water ice particles, identified through the 2.9 $\mu$m absorption band visible on the red spectrum, are associated with the CO$_2$ gas emission which drags them out of the nucleus surface. From \cite{AHearn2011}.} \label{fig:hartley2coma} \end{figure} Before the Rosetta mission, a great part of the coma observations was too sparse and biased by the limited time series and surface coverage to allow a reliable estimate of the nucleus composition from coma properties. This explains the difficulties in interpreting cometary outgassing data and the resulting vivacious ongoing debate on the measurement of the dust-to-gas and refractory-to-ice mass ratios in comets and in 67P/CG in particular \citep{Choukroun2020}: these ratios are the key parameters necessary to understand if the observed heterogeneity is primordial or a consequence of the evolutionary processes. \begin{figure*}[!h] \includegraphics[width=\textwidth]{rosina_gas_density.png} \caption{ROSINA time series of the flux of H$_2$O, CO and CO$_2$ in 67P/CG coma. Left panel: fluxes measured between August 4-8 2014 (top plot). The corresponding position of the Rosetta spacecraft in longitude and latitude is shown in the bottom plot. Right panel: fluxes (top plot) correlated with the relative orientation of the nucleus (bottom) for September 18, 2014. From \cite{Hassig2015}.} \label{fig:rosina_gas_density} \end{figure*} \par For 67P/CG, the ROSINA instrument \citep{Balsiger2007} has provided the time series of the H$_2$O, CO and CO$_2$ fluxes allowing to explore the coma properties from different distances, nucleus orientations and illumination conditions (Fig. \ref{fig:rosina_gas_density}). The time series collected along the inbound orbit show large fluctuations of the gases flux \citep{Hassig2015, LuspayKuti2015}. By linking gas flux, Rosetta's relative position, and nucleus orientation, \cite{Lauter2019} has inverted H$_2$O and CO$_2$ flux measured by ROSINA in the coma with localized gas emission sources on the nucleus surface. A similar study by \cite{Hoang2019} evidenced that during the inbound orbit the outgassing of CO$_2$ and CO was more pronounced in the southern than in the northern hemisphere and that the water vapour maximum sublimation was taking place on the Hapi active region. These results are in agreement 1) with the cyclic condensation of water frost in Hapi occurring at each nucleus' rotation observed at infrared wavelengths \citep{DeSanctis2015}; 2) with the detection of transient CO$_2$ ice deposit in the southern Anhur region \citep{Filacchione2016c}. Both results will be discussed in the following sections. Near perihelion, several water ice-rich locations placed on steep scarps and cliffs were identified as the sources of short living outbursts repeating across several nucleus rotations \citep{Vincent2016b}: these places were the major sources of water vapour activity measured on the coma by ROSINA at that time. Finally, carbon dioxide distribution in the coma appears compatible with the outgassing taking place above the transient CO$_2$ ice layer observed in the Anhur region while transiting from seasonal night to dayside \citep{Filacchione2016c, Fornasier2016, Fornasier2017}. The complete inventory of gases and parent species measured by ROSINA on 67P/CG is discussed in \cite{Altwegg2019}. The gas production rates of 14 gas species (including H$_2$O, CO$_2$, CO, H$_2$S, O$_2$, C$_2$H$_6$, CH$_3$OH, H$_2$CO, CH$_4$, NH$_3$, HCN, C$_2$H$_5$OH, OCS, and CS$_2$) inferred from a 2 years-long (2014-2016) time series are reported by \cite{Lauter2020}. In general, from ROSINA data appears evident that 67P/CG is enriched not only in CO and CO$_2$ with respect to other JFC, but also in organic and highly volatile molecules \citep{LeRoy2015}. Finally, mass spectroscopy has been successful in identifying other prebiotic species, including phosphorous, simple amino acid glycine \citep{Altwegg2016}, ammoniated salts \citep{Altwegg2020} and cyano radical (CN) \citep{Hanni2021}. \par Dust particles can be characterized with dedicated in situ instruments designed to collect and analyze them while the spacecraft is orbiting near the nucleus. On Rosetta, a suite of three payloads is employed, each of them dedicated to a specific range of particle sizes: 1) MIDAS (Micro-Imaging Dust Analysis System) is an atomic-force microscope designed to measure grains from nanometers to micron sizes \citep{Riedler2007}; 2) COSIMA (Cometary Secondary Ion Mass Analyser) is a time-of-flight secondary-ion mass spectrometer (TOF-SIMS) \citep{Kissel2007} sensitive to particles ranging from 10's of microns to millimeters in size and to image them after impacting on exposed targets \citep{Langevin2016}; 3) GIADA (Grain Impact Analyser and Dust Accumulator) measures the dust flux, including single grains' velocity and mass, for particles $\ge$ 100 $\mu$m \citep{Colangeli2007}. \par The smallest dust grains observed by MIDAS are made by hierarchical agglomerates of compact and fractal particles \citep{Mannel2016, Bentley2016}. The elemental composition of collected grains is determined through secondary ion mass spectroscopy by COSIMA which has inferred anhydrous mineral phases for 55$\%$ of the mass and organic matter for 45$\%$ \citet{Bardyn2017} (see Table \ref{tbl:bardyn}). This retrieval is based on certain assumptions on the H/C and O/C ratios which cannot be determined by the instrument. Grains collected by Rosetta's dust instruments appear in general depleted in ices because they undergo rapid heating after ejection from the nucleus' surface. \begin{table}[!h] \begin{center} \begin{tabular}{|c|r|r|} \hline \textbf{Element} & \textbf{Atomic fraction} & \textbf{Weight fraction} \\ \hline Oxygen & 30$\%$ & 41$\%$ \\ Carbon & 30$\%$ & 30$\%$ \\ Hydrogen & 30$\%$ & 2.5$\%$ \\ Silicon & 5.5$\%$ & 13$\%$ \\ Iron & 1.6$\%$ & 7.5$\%$ \\ Magnesium & 0.6$\%$ & 1.3$\%$ \\ \hline \end{tabular} \end{center} \caption{Averaged composition of 67P/CG’s dust particles as measured by COSIMA. From \citet{Bardyn2017}.} \label{tbl:bardyn} \end{table} A remarkable result concerns the purity of the individual grains: within the COSIMA's dust size range sensitivity (from 50 to 1000 $\mu$m) all collected particles contain both minerals and organics. This means that the non-volatile matter is intimately mixed up to 10's of micron-scale, suggesting the presence of macromolecular carbonaceous assemblage made of the elements listed in Table \ref{tbl:bardyn}. \par The dust flux of grains larger than 100 $\mu$m is measured by GIADA. \cite{Rotundi2015} and \cite{Fulle2016a} have determined that the dust-to-water ice mass ratio is equal to 6 during the inbound orbit (from 3.6 AU heliocentric distance to 1.23 AU perihelion) and that the mass distribution of the dust particles is dominated by compact grains with a density of about 2000 kg m$^{-3}$ and with sizes $\ge$ 1 mm. Moreover, GIADA data indicate that when measuring dust grains mass two different families appear: compact particles and fluffy porous aggregates having masses from $10^{-10}$ to $10^{-7}$ kg \citep{DellaCorte2015}. \par By merging Rosetta's in-situ and remote sensing data, \cite{Guttler2019} have obtained a comprehensive classification of 67P/CG's dust particles (Fig. \ref{fig:guttler_classification}) including 1) solid particles (e.g. irregular grains, roundish monomers, dense aggregate of grains); 2) fluffy particles (fractal dendritic agglomerates); 3) porous particles (agglomerates and cluster of agglomerates). Apart from these classes, combinations of them are possible, e.g. porous aggregates with fluffy chains attached. \begin{figure}[!ht] \includegraphics[width=0.5\textwidth]{guttler_classification.pdf} \caption{67P/CG's dust grains classifications. The gray/blue color indicates different compositions, as refractories and ices. From \cite{Guttler2019}.} \label{fig:guttler_classification} \end{figure} \par Apart from Rosetta, we have few insights into cometary dust composition. Stardust mission collected and returned to Earth several dust samples from comet 81P/Wild 2. As said, the high relative velocity during the sample collection ($\approx 6.1$ km/s) caused the loss of volatiles and organic matter fraction \citep{Brownlee2006}. Elemental analysis of collected grains shows that 81P's particles are made by a matrix containing sulfide pyrrhotite, enstatite, and fine-grained porous chondritic aggregate. The existence of crystalline and high-temperature minerals in comet's dust \citep{Bockelee2002} indicates some transport mechanism of these materials from the inner regions of the solar nebula to the outer fringes \citep{Cuzzi2003}. A great part of dust grains larger than 1 micron returned by Stardust mission are made of olivine and pyroxene: similar silicates have been observed on infrared spectra of Hale-Bopp \citep{Wooden1999} and Tempel 1 \citep{Lisse2006}. Moreover, the presence of chondritic material suggests a further evolutionary link between comets and asteroids \citep{Gounelle2011}. \section{\textbf{Composition Endmembers}} \label{sec:composition_endmembers} Materials assembled in cometary nuclei preserve the composition of the presolar disk at the time of their formation. There is a general consensus among scientists that comets nuclei are dark and dirty snowballs as described by the \cite{Whipple1950} model. The cometary matter is made by a macromolecular assemblage containing a mixture of ices, CHONS (organic matter rich in Carbon, Hydrogen, Oxygen, Nitrogen, and Sulfur), and minerals. In the following, we review recent results by space missions which have allowed us to better constrain endmembers' composition and relative abundances. \subsection{Water and Carbon Dioxide Ices} \label{sec:volatiles_ices} Optical remote sensing observations at visible and near-infrared wavelengths allow sampling nucleus' surface composition within a shallow layer (corresponding to about 10 times the wavelength, i.e. 10 $\mu$m at $\lambda=1 \ \mu$m) assuming a uniform slab. In porous media, like the surface of comets, photons can be scattered multiple times among nearby grains allowing in principle to sample larger depths. However, due to the extremely low albedo of the grains, the multiple scattering is very limited in the cometary regolith. Moreover, the presence of dust particles, e.g. dehydrated fine and dark material, falling back on the nucleus' surface, is blanketing and coating underneath pristine layers, effectively hiding ices' spectral signatures. These effects must be taken into serious consideration when trying to extrapolate the nucleus' internal composition from surface composition measurements. While the spectral identification of cometary volatile species in extended comas is possible from Earth, surface ices are much more difficult to resolve due to the small dimensions of the nuclei and small amount of exposed ices and for these reasons they have been recognized only through remote sensing observations performed by space missions able to navigate near the nuclei. So far, the only two space missions able to accomplish these measurements were Deep Impact at 9P/Tempel 1 and Rosetta at 67P/CG. Both comets have shown the presence of crystalline water ice while only on 67P/CG was possible to identify carbon dioxide ice. In general, the presence of ices on cometary surfaces is regulated by solar illumination and by local topography. \subsubsection{Water Ice} \label{sct:waterice} Despite water ice is the dominant volatile species in cometary nuclei, its presence has been assessed by VIS-IR spectroscopy only in very limited locations on 9P/Tempel 1 and 67P/CG where specific processes are active at the time of the observations. In the following paragraphs are discussed the main modalities in which water ice has been detected. \paragraph{Recently exposed landslides and debris fields:} due to the rough surface topography, is not uncommon that elevated and overhang structures can collapse due to erosion and thermal stresses. This is the case of at least two specific areas located on 67P/CG's Imhotep region (see Fig. \ref{fig:virtis_baps}) where recent collapses have exposed bright material within the debris fields located at their bases \citep{Filacchione2016a}. The study of these areas, called BAPs (Bright Area Patches), allows therefore to derive the characteristics of more fresh ice as present in the outer layers of the nucleus. The best spectral fit to VIRTIS data evidence that the pixel's area located on the debris fields contain up to 1.2$\%$ of water ice grains with a diameter $\approx$2 mm while the residual 98.8$\%$ of the pixel area consists of an intimate mixture made of 3.4$\%$ water ice grains of 56 $\mu$m and average dark terrain for the remaining 95.4$\%$ (Fig. \ref{fig:virtis_baps}, panel g). On average, the total amount of exposed water ice on the debris fields is $\approx4.6\%$ given a 2.5 m/pixel spatial resolution. The surface temperature of the water ice-rich areas is T $<$160–180 K, about 20–25 K colder than in the surrounding dehydrated areas. Despite these low temperatures, the debris fields are still warm enough to justify the presence of water ice in the crystalline state. The presence of a mm-sized grain population can be explained by the recent sintering of smaller grains or by the growth of ice crystals from vapour diffusion in cold layers of the subsurface. \begin{figure}[!h] \includegraphics[width=0.5\textwidth]{VIRTIS_BAPS.png} \caption{Exposed water ice on recently disrupted terrains, like landslides and debris fields seen by Rosetta-VIRTIS on 67P/CG. Panel a) color image showing BAPs 1-2 (white and yellow arrows, respectively) in the Imhotep region. b) Water–ice-rich BAP 1 (blue area) is on the right side of a circular elevated structure. c) High-resolution image of debris field 1 better shows the distribution of the water–ice-rich unit (bluish color). d) Temperature image map shows that the water–ice-rich terrain is at T$<$160 K resulting in colder than the neighboring dark terrain. e) color image showing BAP 2. f) Temperature map of BAP 2 showing the colder water–ice-rich terrain. All previous color images are rendered from 1.3 $\mu$m (blue), 2.0 $\mu$m (green) and 2.9 $\mu$m (red) wavelengths. g) a water–ice-rich VIRTIS spectrum (black curve with error bars in red) from BAP 1 compared with the best-fit spectral model (blue curve) showing the percentage of crystalline water ice ($a_{H2O}$) and the water–ice grain diameter ($d_{H2O}$). The spectral ranges colored in gray correspond to positions of instrumental order sorting filters where responsivity is uncertain. From \cite{Filacchione2016a}.} \label{fig:virtis_baps} \end{figure} \paragraph{Localized icy patches:} these features are preferentially located on equatorial regions and in dust-free areas. High albedo-icy patches have been observed on high-resolution visible images by OSIRIS \citep{Pommerol2015} and for eight of them VIRTIS has confirmed the presence of water \citep{Barucci2016}. The icy patch size spans from a few to about 60 meters and appears distributed in clusters of small bright spots or in much larger individual ones. Some of them are probable sources of activity and outbursts \citep{Vincent2016b}. The surface water ice localized in the patches is almost stable for months on some of them, while in others it appears more variable and correlated with the illumination conditions \citep{Raponi2016}. Co-located spectral analysis by VIRTIS evidence very variable water ice abundances and grain sizes: mixing with the ubiquitous dark terrain is in both areal and in intimate modalities. The derived water ice abundance is in the 0.3 to 4$\%$ range with the presence of both tens of micron-sized grains in intimate mixing with the dark terrain or very large mm-sized grains in areal mixing. \begin{figure*}[h!] \centering \includegraphics[width=0.8\textwidth]{VIRTIS_barucci.png} \caption{Examples of localized icy patches observed by Rosetta OSIRIS and VIRTIS on 67P/CG. a) top row: OSIRIS images and VIS I/F spectra for patch $\#1$. Spectrum in red color is the one on the icy patch, the one in black is taken on the nearby nonicy terrain. The plot in column 3 shows I/F corrected spectra with higher values on the icy patch while in column 4 the same data are normalized at 0.55 $\mu$m to enhance the flat slope of the ice at visible wavelengths. b) the same as a) but for patch $\#5$. c) VIRTIS context image, reflectance spectrum, and best fit solution for spot $\#1$; d) same as c) but for spot $\#5$. Both patches $\#1-\#5$ are located in Imhotep, respectively at lat=-5.8$^\circ$, lon=189.4$^\circ$ and at lat=-22$^\circ$, lon=182.8$^\circ$. From \cite{Barucci2016}.} \label{fig:virtis_barucci} \end{figure*} Although water is the dominant volatile observed in the coma, exposed water ice on the cometary surface has been detected in relatively small amounts (a few percent) in several regions of the 67P/CG comet \citep{DeSanctis2015, Filacchione2016a, Pommerol2015, Barucci2016, Oklay2016b, Fornasier2017}, and in higher amounts ($>$ 20\%) in localized areas observed by OSIRIS camera in the Anhur, Bes, Khonsu, Wosret, and Imhotep regions \citep{Fornasier2016, Fornasier2019a, Fornasier2021, Deshapriya2016, Oklay2017, Hasselmann2019, Leon-Dasi2021}, in the Aswan site \citep{Pajola2017}, and in the Abydos landing site and sourroudings \citep{Hoang2020, Orourke2020}. Unfortunately, for many of those last detections infrared spectroscopic data are not available and ice identification and abundance are based on modeling albedo and visible colors. \par The wider surface exposures of water ice were detected in the boundary between the Anhur and Bes regions in the southern hemisphere \citep{Fornasier2016}. These two patches were 4-7 times brighter than the surrounding regions, and about 1500 m$^2$ wide each. As shown in Fig.~\ref{fig:Anhur_osiris_BSpots} they were observed for the first time on 27 April 2015 and survived on the surface for at least ten days. They were located on a flat terrace bounded by two 150 m-high scarps and were formed on a smooth terrain made up of a thin seam of fine deposits covering the consolidated material. \begin{figure*}[h] \centering \includegraphics[width=0.8\textwidth]{OSIRISFORNASIER-eps-converted-to.png} \caption{Composite images (882 nm, 649 nm, and 480nm filters) showing the appearance and evolution of the bright patches in the Anhur/Bes regions of 67P/CG (the arrows indicate two common boulders for reference). The reflectance relative to 535 nm and the normal albedo are represented in the bottom panels. The black line represents the mean spectrum of the comet from a region close to the patches. Dashed and dotted lines show the best fit spectral models to the patches (in gray the associated uncertainty), produced by the linear mixture of the comet dark terrain enriched with 21 $\pm$ 3\% of water ice (dashed line), or 23 $\pm$ 3\% of water frost (dotted line) for patch B, and with 29 $\pm$ 3\% of water ice (dashed line), or 32 $\pm$ 3\% of water frost (dotted line) for patch A. Simulation are performed assuming a water ice grain of 30 $\mu$m. From \cite{Fornasier2016}}. \label{fig:Anhur_osiris_BSpots} \end{figure*} Figure~\ref{fig:Anhur_osiris_BSpots} shows an example of the spectrophotometric evolution of these bright patches: on 12 April 2015 the terrain looks spectrally bluer, a hint for higher water ice abundance, but at this time the bright patches were not exposed yet. Instead they become clearly visible on 27 April and 2 May images when they show a relatively flat spectrum, consistent with the direct exposure of water ice. On 5 June 2015, that region was observed again and the two bright patches had fully sublimated \citep{Fornasier2016, Fornasier2017}, leaving a layer spectrally indistinguishable from the average dark terrain. A water ice abundance of 20-30\% was estimated in these bright area from linear mixing models. This corresponds to an ice loss rate between 1.4 and 2.5 kg day$^{-1}$ m$^{-2}$ for an intimate mixture and the estimated solid ice-equivalent thickness layer was of 1.5-27 mm \citep{Fornasier2016}. Notably, the presence of a small amount of CO$_2$ ice was detected by the VIRTIS spectrometer in an 80 m by 60 m area corresponding to the location of patch A \citep{Filacchione2016c}, about one month before the detection of the bright patches with OSIRIS (see discussion in next section \ref{sct:cg_co2}). \paragraph{Diurnal condensation cycle:} this process is driven by the alternate illumination conditions occurring during each comet's rotation which are able to induce cyclic sublimation during the day and condensation during the night time or when a given area moves into shadows \citep{DeSanctis2015}. The net effect of this process is the condensation of water vapor, released from the subsurface when reached by the propagation of the diurnal thermal wave, on the cold surface during the nighttime. In these conditions, in fact, the temperature inversion occurs between the colder surface regolith and the warmer internal layer. On 67P/CG, this cycle has been observed on the active Hapi region during the inbound orbit. Since the 67P/CG rotation period is about 12.4 hr \citep{Jorda2016} and due to the bilobate shape of the nucleus, the Hapi region was experiencing two Sun exposures, one shadow transit (caused by the small lobe) and one night period for each comet rotation. Infrared spectral analysis performed on the areas close to the transition line between night and dayside (see Fig. \ref{fig:virtisdesanctis}) shows that during the cold night very fine ($<3 \ \mu$m) water ice grains were condensing and accumulating on the surface reaching a maximum abundance of 14 $\%$ and resulting in intimate mixing with the ubiquitous dark terrain \citep{DeSanctis2015}. The volatile condensation–sublimation process has been suggested by \cite{Prialnik2008} who correlated the diurnal cycle with the presence of outbursts occurring during morning hours on 9P/Tempel 1 comet. \begin{figure}[h!] \includegraphics[width=0.48\textwidth]{VIRTISDESANCTIS.png} \caption{The diurnal water-ice cycle on 67P/CG: a) Images showing the ice abundance (by volume) across the Hapi active area while transiting across dawn hours; b) Corresponding temperature images derived from thermal emission show that close the shadow line the minimum temperature is about 160-170 K; c) VIRTIS spectrum on a specific location compared with the best spectral fit matches to a mixture of average dark terrain and water ice grains with an abundance of 8$\%$ and grain size of 2 $\mu$m. From \cite{DeSanctis2015}.} \label{fig:virtisdesanctis} \end{figure} \paragraph{Dust-covered icy boulders:} during the Philae landing process, the lander collided two times with the nucleus surface before stopping under an overhanging cliff located in the Abydos region. \begin{figure*}[h] \centering \includegraphics[width=0.8\textwidth]{ORourke_Nature_2020.pdf} \caption{Discovery of dust-covered icy boulders on the surface of 67P/CG. Panels A to C: Philae's landing trajectory and touch-down locations. Panel D: high-resolution image (4.9 cm/px) showing TD2 (green dashed line) and Philae final position on TD3 (blue dashed line). Note the crevice in the TD2 place. Panels E-F: images of the high albedo icy interiors of the boulders in the crevice. From \cite{Orourke2020}.} \label{fig:ORourke_Nature_2020} \end{figure*} The touch-down (TD) sites are shown in Fig. \ref{fig:ORourke_Nature_2020}, panels A-B-C. While Philae was bouncing on the TD2 site (area marked with the green dashed line in panel D), the lander has impacted in a crevice located between two boulders causing the removal of their dust-covered surface and the exposure of an area of $\approx$ 3.5 $m^2$ showing their pristine interiors \citep{Orourke2020}. A multi-instrument campaign based on both Philae and Rosetta data, shows that the boulders' interiors material is very bright (up to 6 times more than the average dark terrain nearby), enriched in water ice (46.4$\%$ with grain sizes of the order of 30-100 $\mu$m) and it has a very low compressive strength ($<$12 Pa). The measurements show that the local dust-to-ice mass ratio is 2.3:1 \citep{Orourke2020}. So far, this very peculiar measurement is the one that has allowed us to measure the highest abundance of water ice on the surface of 67P/CG and it suggests that in the sub-surface pristine ice-rich localizations are available. \paragraph{Water ice on 67P/CG: a summary} Thanks to infrared observations performed by Rosetta it is possible to understand the distribution of the superficial water ice grains. A first result is that the water ice appears only in crystalline form, a result derived from the observation of the diagnostic properties of the 1.5-1.65 and 2.05 $\mu$m bands. Remote sensing observations cannot resolve the question about the presence of primordial amorphous ice in the deep nucleus since it cannot be reached at optical wavelengths. Moreover, at the typical surface temperature measured on water ice-rich locations (from 160 to 180 K, from \cite{Filacchione2016a}), ice's lattice structure is crystalline (cubic) since the phase transition from amorphous to crystalline form occurs at lower temperature (137 K from \cite{Lynch2005}). The crystalline surface ice evidences its presence in three distinct grain size populations whose existence is related to the processes behind the ice formation: 1) micron-sized grains are characteristic of the more active areas where diurnal variations occurring on timescales of few hours preclude the condensation of larger grains \citep{DeSanctis2015}. This presence of micron-sized water ice grains is evidenced by the very absorbing H$_2$O stretch band between 2.7-3.0 $\mu$m and by the contemporary absence of the other diagnostic bands at 1.05, 1.25, 1.5, 1.65, 2.05 $\mu$m which instead are associated to larger grains. Such micron-sized grains are also probably contributing to the 1-2$\%$ abundance of water ice (upper limit) associated with the dark and red dehydrated material ubiquitously seen across 67P/CG surface \citep{Capaccioni2015}. 2) tens of microns, or intermediate grains, are instead associated with intimate mixtures of water ice and dark material localized in bright icy patches; 3) coarse mm-size grains are probably the consequence of condensation of ice crystals from the vapor diffusion occurring in ice-rich colder layers or by ice grain coalescing and sintering caused by thermal evolution. Due to their larger dimensions, this family of grains appears preferentially distributed in areal mixtures together with dark terrain grains. \paragraph{Ices on other comets} Before 67P/CG exploration by Rosetta, other space missions have searched hints of ices on comets nuclei. Deep Space 1 mission to comet 19P/Borrelly \citep{Nelson2004} was not able to detect any water ice signatures in the 1.3-2.6 $\mu$m spectral range with its near IR spectrometer \citep{Soderblom2002, Soderblom2004}. On the contrary three large blue colored-high visible albedo areas were identified on comet 9P/Tempel 1 by the High and Medium Resolution Imagers (HRI-MRI) onboard the Deep Impact mission \citep{Sunshine2006}. Concurrent observations of the same areas by the onboard IR spectrometer confirmed the presence of water ice thanks to the detection of the diagnostic absorption bands at 1.5, 2.0, and 3.0 $\mu$m (see Fig. \ref{fig:Sunshine_tempel_science_2006}). The ice-rich areas correspond to three depressions reaching about 80 m below the neighborhood. The overall area occupied by these depressions is estimated in about 0.5 km$^2$ or 0.5$\%$ of the total nucleus surface. \begin{figure*}[h!] \centering \includegraphics[width=0.8\textwidth]{Sunshine_tempel_science_2006.pdf} \caption{Spectral identification of water ice on 9P/Tempel 1 by Deep Impact. Left panel (A-): HRI visible image at 16 m/pixel spatial resolution showing the three blue colored-high albedo depressions (marked in light blue color) and relative spectral reflectance (B). Central panel (C-D): MRI visible image and spectrum at 82 m/pixel confirms HRI data. Right panel (E): IR image showing the 2.0 $\mu$m water ice band depth at 120 m/pixel spatial resolution. The relative reflectances of the 3 water ice-rich areas are shown in panel (F). Note the presence of the water ice diagnostic bands on the three spectra shown in Figure. From \cite{Sunshine2006}.} \label{fig:Sunshine_tempel_science_2006} \end{figure*} Spectral modeling points out that in the depressions the water ice is mixed with the average dark terrain reaching an average abundance of 6$\pm$ 3$\%$ and grain sizes of 30 $\pm$ 20 $\mu$m (Fig. \ref{fig:Sunshine_tempel_fit_science_2006}). Moreover, the depressions are acting like cold traps having a diurnal temperature of 280-290 K, much colder than nearby terrains ($\ge$300 K). \begin{figure}[h!] \includegraphics[width=0.49\textwidth]{Sunshine_tempel_fit_science_2006.pdf} \caption{Comparison of the water ice-rich spectra on 9P/Tempel 1 (black curve) with the best spectral fit corresponding to a mixture of 4$\%$ water ice grains of 20 $\mu$m size and 96$\%$ of nucleus dark terrain (blue curve). The average dehydrated dark terrain spectrum is shown in red. All curves are relative reflectances. From \cite{Sunshine2006}.} \label{fig:Sunshine_tempel_fit_science_2006} \end{figure} Finally, as already discussed in Fig. \ref{fig:hartley2coma}, water ice grains emitted from the surface Hartley 2 have been observed in the coma associated with the emission of CO$_2$ \citep{AHearn2011}. \subsubsection{Carbon dioxide ice} \label{sct:cg_co2} After water ice, carbon dioxide is the second most abundant gaseous species observed on cometary comae \citep{Bockelee2017}. Despite its high abundance as gas, the observation of the solid form on nuclei surfaces is extremely difficult due to the high volatility: in vacuum carbon dioxide rapidly sublimates starting from 70 K \citep{Huebner2006}. So far, the only spectroscopic detection of carbon dioxide ice on a cometary nucleus has been reported by VIRTIS on 67P/CG \citep{Filacchione2016c} on a 60$\times$80 m wide area located in the Anhur region. This specific area was transiting outside the four-year-long winter-night season and returning on the dayside, an event occurring only in the proximity of the perihelion passage. During a great part of the orbit far from the Sun, including the aphelion passage, the Anhur area is constantly in the nightside. As a consequence of the lack of solar illumination it reaches very low surface temperatures, probably of the order of $<50$ K. Thanks to Rosetta's close orbit to the nucleus and trajectory's excursion, on 21 March 2015, it was possible to observe the areas close to terminator where VIRTIS has detected the diagnostic 2.0 $\mu$m triplet feature and the 2.6-2.75 $\mu$m bands characteristic of CO$_2$ ice (Fig. \ref{fig:VIRTIS_CO2_Filacchione}). \begin{figure*}[h!] \centering \includegraphics[width=0.99\textwidth]{VIRTIS_CO2_Filacchione.png} \caption{Spectral identification and modeling of transient CO$_2$ ice in the Anhur region by Rosetta/VIRTIS. Left panel: on observations taken on 21 March 2015 IR spectra are showing CO$_2$ ice signatures. Right panel: when observing again the same area on 12-13 April 2015, the CO$_2$ ice features disappeared because the ice was sublimating in the meanwhile. The spectral ranges in gray color correspond to instrumental order sorting filters. From \cite{Filacchione2016c}.} \label{fig:VIRTIS_CO2_Filacchione} \end{figure*} The best spectral fits to VIRTIS data give an abundance of CO$_2$ ice of $<1 \% $ in both areal or intimate mixing with the dark terrain (Fig. \ref{fig:VIRTIS_CO2_Filacchione}, left panel). Subsequent observations confirm that the $CO_2$ ice deposit was rapidly sublimating in the next weeks, until completely disappearing when VIRTIS was observing again the same area in Anhur on 12-13 April 2015 (right panel). The thermal history experienced by this area evidences that the surface underwent a loss of 56 kg of CO$_2$ ice corresponding to an erosion of a layer of 9 cm. To explain this process one could presume that the ice patch was formed during the previous orbit when the carbon dioxide outgassing from the nucleus' deeper layers reached by perihelion's thermal heatwave was condensing on the cold winter surface. The Anhur region in fact is placed on the nucleus' southern part which, after a continuous and intense insolation at perihelion, enters a four years long winter night. This occurs with a fast drop in illumination after the outbound equinox, as a consequence of which the outgassing of CO$_2$ coming from the inner warm layers finds a rapidly cooling surface acting as a point of condensation and accumulation for the ice. When the comet orbits towards the perihelion, the Anhur region moves out from winter night to local summer day: the abrupt increase of the solar illumination causes the rapid disappearance of carbon dioxide ice from the surface. \subsection{Organic Matter} \label{sec:organic_matter} \par Prior to Rosetta space mission, direct information on the refractory component of the organic material on a comet were provided by 81P/Wild (Wild 2) grains gathered by the Stardust sample-return mission, and by meteorites of probable cometary origin such as Interplanetary Dust Particles (IDP), and Antarctic Micro Meteorites (AMM). Analysis performed on Wild 2 grains demonstrates the presence of complex aromatic organic matter. N-rich material appear to be present in the form of aromatic nitriles. However, aromatic organics consist of a small fraction of the total organic matter present \citep{Clemett2010}. Infrared spectra of Wild 2 grains reveal indigenous aliphatic hydrocarbons with longer chain lengths than those observed in the diffuse interstellar medium \citep{Keller2006}. Stratospherically collected IDP and AMM show a close match with organic species in the Stardust samples, relatively to the above-mentioned properties \citep{Keller2006,Clemett2010}. In turn, refractory organic matter in stratospheric IDP and AMM of cometary origin shares similarities with chondritic IOM. Raman spectroscopy analyses have revealed that these particles also contain a disordered polyaromatic structure \citep{Quirico2005,Quirico2016}. However, H/C values reported in stratospheric IDPs display a larger range of values than reported in chondritic IOM \citep{Aleon2001}. \par Scientific payload onboard Rosetta spacecraft and the lander Philae provided unprecedented amount of data on organics of 67P/CG comet. The refractory dust component analysed in situ by COSIMA revealed a mixture of carbonaceous matter and anhydrous mineral phases, consistent with the composition of chondritic porous–IDP and anhydrous AMM \citep{Bardyn2017}. The elemental composition of 67P/CG dust shares similarities with the macromolecular insoluble organic matter (IOM) extracted from primitive chondrites \citep{Fray2016}, with the exception of carbon, which greatly exceeds the abundance measured in carbonaceous chondrites \citep{Bardyn2017}. The mass spectrometers of ROSINA, COSAC, and PTOLEMY, investigated the semi-volatile compounds, finding a relatively high abundance of the aromatic compound toluene \citep{Altwegg2017}. \par The organic-rich nature of 67P/CG has also been highlighted by the reflectance spectra measured by the VIRTIS instrument in the 1–4 $\mu m$ range \citep{Capaccioni2015}, which showed a dark and red surface \citep{Ciarniello2015}, similarly to other spectra of cometary nuclei, although with slight differences (see section \ref{sec:vis_ir_spectral_properties}). Moreover, VIRTIS detected a broad absorption at 2.8–3.6 $\mu m$, centered at 3.2 $\mu m$, never detected on other cometary nuclei, nor on meteorites spectra. Analysis on laboratory analogues show that the reddish slope of 67P/CG should be attributed by a significant fraction of dark refractory polyaromatic carbonaceous component mixed with opaque minerals \citep{Quirico2016,Rousseau2018}. However, most of the spectral information on the nature of 67P/CG organic come from the broad 3.2 $\mu m$ absorption. It is compatible with a complex mixture of various types of carbon–hydrogen (C–H) and/or oxygen–hydrogen (O–H) chemical groups, with contribution from nitrogen–hydrogen (N–H) groups such as ionized ammonium (NH$_4^+$). A firm identification of the exact compounds was made possible thanks to a calibration refinement and performing an average spectrum from a few million surface spectra, producing a spectrum of unprecedented quality in terms of signal-to-noise ratio \citep{Raponi2020}. It revealed that the complex spectral structure of the broad 3.2 $\mu m$ band is made up of weaker and ubiquitous spectral features (Figure \ref{fig:67P_absorption}). The strongest ones are centred at 3.10 $\mu m$, 3.30 $\mu m$, 3.38 $\mu m$, 3.42 $\mu m$ and 3.47 $\mu m$. The whole broad 2.8–3.6 $\mu m$ absorption feature can be affected by the presence of O–H stretching in compounds such as carboxylic acids, alcohols, phenols \citep{Quirico2016}, and O–H bearing minerals. The 3.3 $\mu m$ as well as the 3.1 $\mu m$ subfeature, have been attributed to a significant abundance of ammonium salts by \cite{Poch2020} (see section \ref{sec:ammoniated_salts}). Micrometre-sized water ice grains also contribute to the short-wavelength part of the absorption band, consistently with the findings about temporal variability of the broad absorption (see section \ref{sec:volatiles_ices}). The absorption bands at 3.38 $\mu m$ and 3.42 $\mu m$ identify the asymmetric C–H stretching modes of the methyl (CH$_3$) and methylene (CH$_2$) aliphatic groups, respectively. The absorption at 3.47 $\mu m$ can be assigned to the symmetric modes of CH$_3$ and CH$_2$ groups \citep{Moroz1998}, which in 67P/CG spectrum are blended for the possible presence of perturbing groups such as aromatic molecules \citep{Sandford1991,Keller2004}. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{67P_absorption.jpg} \caption{Continuum-removed average spectrum of 67P/CG across the broad absorption at 2.8-3.6 $\mu$m. From \cite{Raponi2020}.} \label{fig:67P_absorption} \end{figure} The strength of the features detected in the spectrum of the surface of 67P/CG is peculiar: the asymmetric stretching mode of CH$_3$ (3.38 $\mu m$) seems more intense than the asymmetric stretching of CH$_2$ (3.42 $\mu m$). Such configuration is unusual for most of the other investigated extraterrestrial materials, except for the interstellar medium (ISM) \citep{Pendleton1994,Dartois2004} and for IOM extracted from primitive carbonaceous chondrites \citep{Kaplan2018,Kebukawa2011K,Orthous-Daunay2013}. This suggest both a possible evolutionary link between hydrocarbons in the diffuse ISM and comets, and a link in carbon composition among chondrites and comets \citep{Mennella2010,Raponi2020}. \subsection{Ammoniated Salts} \label{sec:ammoniated_salts} \par Remote sensing spectroscopic observations of cometary gaseous comae indicate that the abundance of nitrogen-bearing volatile species with respect to water is about ~1$\%$, being mainly represented by NH$_3$ and HCN, ranging between 0.3-0.7$\%$ and 0.08-0.25$\%$, respectively \citep{Bockelee2017, DelloRusso2016, Lippi2021}. A deficiency of nitrogen in comets was first pointed out by \cite{Geiss1987}, from the composition analysis of the gas and dust of the coma of comet 1P/Halley by in situ and ground-based data. In particular, for the refractory phase, a nitrogen-to-carbon atomic ratio (N/C) of 0.052$\pm$0.028 was reported by \cite{Jessberger1988}, significantly smaller than the solar value of 0.3$\pm$0.1 \citep{Lodders2010}. A similar result was obtained for comet 67P/CG, by the analysis of the cometary dust particles collected by COSIMA providing N/C=0.035$\pm$0.011 \citep{Fray2017}. Although different formation scenarios have been proposed to explain the puzzling nitrogen deficiency in comets \citep[][and reference therein]{Willacy2015}, a possible answer comes only recently with the discovery of significant amounts of ammoniated salts on 67P/CG, resulting from the separate analysis of the data collected by the VIRTIS experiment \citep{Poch2020} and the ROSINA instrument \citep{Altwegg2020} onboard the Rosetta mission. Analysis of the surface VIS-IR spectrum of comet 67P/CG pointed out that the low-reflectance level and red slope were compatible with refractory polyaromatics organics mixed with opaque mineral, while a semi-volatile component with low-molecular-weight, including carboxylic (-COOH)-bearing molecules or NH$_4^+$ ions were considered as the best candidates to explain the broad 3.2 $\mu m$ feature \citep{Capaccioni2015, Quirico2016}. Dedicated laboratory spectral reflectance measurements carried out by \cite{Poch2020}, provided further insight on the nature of the carrier of the 3.2 $\mu m$ feature, by showing that the main characteristic of the 67P/CG average spectrum are reproduced by the spectrum of sublimate residues of mixtures originally containing water ice, fine-grained iron sulfides, and ammonium salts (Figure \ref{fig:amm_salts_Poch}). \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Poch_amm_salts.jpeg} \caption{Comparison of the average 67P/CG spectrum from VIRTIS-M (black line) and a sublimation residue containing $\le 17$ wt$\%$ ammonium formate and pyrrhotite submicrometric grains (red curve). The 67P/CG spectrum is obtained from the refined calibration of VIRTIS-M data described in \cite{Raponi2020}. Dashed lines indicate the 3.1 $\mu$m and 3.3 $\mu$m spectral minima in the broad 67P/CG 3.2-$\mu$m absorption, corresponding to the spectral minima observed in the sublimation residue. The bottom panel reports the spectral ratio between the comet spectrum and sublimation residue spectrum. Adapted from \cite{Poch2020}.} \label{fig:amm_salts_Poch} \end{figure} In particular, the spectrum of the sublimate residue (a porous mixture of submicrometer grains of pyrrhotite and ammonium salt) reproduces the position and asymmetry of the cometary 3.2-$\mu$m absorption, along with the 3.1 $\mu$m and 3.3 $\mu$m spectral minima, resulting from the N-H vibration modes in NH$_4^+$ (Figure \ref{fig:amm_salts_Poch}). The comet spectrum exhibits additional features in the 3.35-3.60 $\mu$m spectral interval that are not observed in the ammonium salt-bearing mixture spectra, and are assigned by \cite{Raponi2020} to the C-H modes in aliphatic organics (see Section \ref{sec:organic_matter}), while further differences can be ascribed to the presence of minor amounts of water ice in the comet spectrum, along with the occurrence of other compounds, among which hydroxylated Mg-silicates (see Section \ref{sec:inorganic_refractories}), and possible different properties of the ammonium salts on the comet surface (e.g. counter-ions, abundance, mixing modality). Depending on the nature of the counter-ions, the position of the NH$_4^+$-related absorptions may shift and vary in relative intensity. \cite{Poch2020} investigated the spectral effects of different ammonium salts, and found that ammonium formate, ammonium sulfate, and ammonium citrate are characterized by spectral features similar to the ones observed in 67P/CG, making it possible that a mixture of different NH$_4^+$-bearing salts is present on the comet surface. Further evidence for ammonium salts was provided by \cite{Altwegg2020} taking advantage of measurements carried out by the ROSINA experiment during a short-lived outburst event that occurred on 5 September 2016 at 18:00 UTC. At this time the Rosetta spacecraft and the ROSINA sensors were directly hit by dust particles which were fragmented by the impact. A comparison of the mass spectra before (around 5 September 2016, 17:00 UTC) and after (around 5 September 2016, 20:00 UTC) the impact showed a marked increment of species which are possible products of ammonium salts (NH$_4$Cl, NH$_4$CN, NH$_4$OC, NH$_4$HCOO, and NH$_4$CH3COO). This is shown in Figure \ref{fig:amm_salts_Altwegg} where the relative abundances normalized to H$_2$O of the different species, after and before the dust impact event, are reported. The post-event increase of ammonium salts-related products has been interpreted as the results of ongoing sublimation of ammonium salts in the grains that entered the Double Focusing Mass spectrometer (DFMS) of the ROSINA instrument, being at a temperature of 273K. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Altwegg_amm_salts.png} \caption{ROSINA measurements of abundance ratios normalized to H$_2$O for the post-impact period (around 5 September 2016, 20:00 UTC) compared with the pre-impact period (around 5 September 2016, 17:00 UTC). Although ammonium salt sublimation can produce H$_2$O, CO, and CO$_2$, the corresponding contribution to their abundance is considered small, as these are dominant species in the undisturbed coma. Thus, H$_2$O, CO, and CO$_2$ are considered as uncorrelated with ammonium salts. From \cite{Altwegg2020}, where further details can be found.} \label{fig:amm_salts_Altwegg} \end{figure} This is compatible with the fact that ammonium salts are more volatile than the typical cometary refractory materials while being generally less volatile than water ice \citep[see Supplementary Table 1 of ][and references therein]{Altwegg2020}. It also suggests that the N/C ratio inferred by COSIMA, is likely a lower limit of the real value of 67P/CG, as most of the ammonium salts in the collected particles would have sublimated during the pre-analysis storage phase in the instrument at 283 K \citep{Fray2017}. The detection of abundant ammonium salts on the nucleus and in the dust of comet 67P/CG provides an explanation for the apparent nitrogen depletion in cometary comae \citep{Poch2020,Altwegg2020}. Ammonium salts sequester nitrogen in a semi-volatile form, not accessible to spectroscopic investigations of the coma unless the cometary dust is exposed to temperatures high enough to trigger ammonium salts sublimation. This could be the case for comets reaching small heliocentric distances, which in fact tend to display a larger abundance of NH$_3$ \citep{DelloRusso2016}, suggesting that a significant fraction of the ammonium salts would sublimate. By assuming that the refractory component of 67P/CG dark material is composed of $\sim$45 wt$\%$ organics and $\sim$55 wt$\%$ minerals, as indicated by COSIMA measurements \citep{Bardyn2017}, \cite{Poch2020} estimate an upper limit of $\lesssim$ 40 wt$\%$ ammonium salts in the cometary dust. Furthermore, depending on the nature of NH$_4^+$ counter-ion they find that amounts of ammonium salts ranging between 10 wt$\%$ and 30 wt$\%$ would provide a cometary N/C ratio matching the solar values. In addition, \cite{Altwegg2020} show that the abundance of nitrogen in comets 67P/CG and 1P/Halley gets close to solar abundances if one assumes that their actual ammonia content is the one observed in comets reaching the smallest heliocentric distance \citep[$\sim$4 $\%$ relative to H$_2$O,][]{DelloRusso2016}, which means accounting also for the ammonia hidden in ammonium salts. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Poch_amm_salts_comp_mod.jpg} \caption{IR spectrum of comet 67P/CG compared to the main belt asteroids 24 Themis \citep{Rivkin2010}, 65 Cybele \citep{Licandro2011}, 52 Europa \citep{Takir2012}, and 361 Bononia \citep{Takir2012}, and the average spectrum of six Jupiter trojans (the "less red" group from \cite{Brown2016}). The spectrum of the Jupiter trojans is divided by 3. Also Himalia is indicated, as its spectrum is indistinguishable from Europa \citep{Brown2014}. Running averages (solid lines) are superimposed over the observation data (dots). The blue dashed line indicates the average extrapolation of the K-band spectra of six Jupiter trojan \citep{Emery2011}. The vertical dashed line indicates the position of the 3.11 $\mu$m feature in the 67P/CG spectrum. The positions of the two main absorptions for pyrrhotite-ammonium formate (red vertical marks) and pyrrhotite-ammonium chloride (green vertical marks) sublimate residue, respectively, are indicated. The plot is adapted from \cite{Poch2020}.} \label{fig:67P_comp_amm_salts} \end{figure} Ammonium salts may represent an important reservoir of nitrogen in comets and, as suggested by similarities in the IR spectrum with 67P/CG, possibly on other solar system small bodies \citep{Poch2020}. This is shown in Figure \ref{fig:67P_comp_amm_salts}, where the 67P/CG spectrum is compared with the ones from a few main-belt asteroids (Themis, Cybele, Europa, and Bononia) and Jupiter trojans. All these bodies evidence a relatively broad absorption feature at 3.1-3.2 $\mu$m, that could be compatible with ammonium salts if we take into account that the ammonium salt-related features show some variability in intensity and position depending on the counter-ions, the matrix materials, and surface temperature \citep{Poch2020}. \subsection{Inorganic refractories} \label{sec:inorganic_refractories} Together with volatiles and organic matter, inorganic refractories are the third major composition endmember observed in comets. Inorganic refractories include different mineral species, among which silicates are the more abundant. Silicates were first observed in comet 1P/Halley by means of infrared spectrophotometric measurements by \cite{Bregman1987} and \cite{Campins1989} and later confirmed in C/1995 O1 Hale–Bopp by \cite{Crovisier1997}. Also, the samples of dust collected by Stardust on 81P/Wild 2 evidenced a large fraction of Mg-silicates \citep{Brownlee2006}. There is a general consensus about the origin of silicates which were synthesized around evolved stars and then went through evolution in the Inter-Stellar Medium (ISM) where the irradiation with ions resulted in amorphization, implantation, and sputtering \citep{Demyk2001, Carrez2002, Jager2003, Brucato2004, Djouadi2005}. The effects caused by ion-induced processing on silicates have been observed also on Interplanetary Dust Particles (IDPs) by \cite{Bradley1999, Bradley2005}. The composition of silicates in the ISM is dominated by the amorphous form (98$\%$) with only a minor presence of the crystalline form (2$\%$). As reported by \cite{Sugita2005}, the amount of amorphous silicates is between 70-98$\%$ in the Jupiter family comets population where the Mg-rich species are the dominant ones \citep{Brownlee2006, Kelley2017}. During their evolution in the ISM, Mg-rich silicates undergo irradiation with H atoms resulting in the formation of OH bonds. As reported by \cite{Zeller1966}, \cite{Djouadi2011}, and \cite{Schaible2014}, the implantation of protons within the keV - MeV energy range in silicates with different compositions and structures, causes the formation of an OH bond recognizable by means of its spectral signature around 2.8 $\mu$m. \par A similar mechanism has been explored through laboratory experiments to synthesize hydroxylated Mg-rich Amorphous Silicates by \cite{Mennella2020} interpreting the wide absorption signature visible on 67P/CG spectra around 3.2 $\mu$m. In Fig. \ref{fig:mennella2020}-top panel is shown the appearance of the broad 3.2 $\mu$m absorption band on an Mg-rich silicate after a cycle of annealing at 300$^\circ$C and irradiation with a flux of 10$^{18}$ H atoms 1/cm$^{2}$. The processed sample (SIL3) is derived from natural olivine with Mg/Si=1.7 and Fe/Si=0.2 ratios. The 3.2 $\mu$m band is reproduced also on other low Magnesium (Mg/Si=1.2) types of silicates after H atoms irradiation. \begin{figure}[h!] \centering \includegraphics[width=0.49\textwidth]{Mennella_2020.pdf} \caption{Top panel: the 3.2 $\mu$m absorption band observed in SIL3 sample (blue line) underwent annealing at 300$^\circ$C and then exposed to a flux of 10$^{18}$ H atoms 1/cm$^{2}$ is compared to the observed main absorption band visible in the 67P/CG I/F spectrum (black line). Bottom panel: best fit solution from Hapke's model corresponds to a mixture of 15$\%$ hydroxylated amorphous silicate and 85$\%$ comet's average dark-red endmember (blue dashed line, from \cite{Raponi2020}) with 5 $\mu$m grain size distribution. For comparison, the black line corresponds to the observed average 67P/CG reflectance spectrum. From \cite{Mennella2020}.} \label{fig:mennella2020} \end{figure} \begin{figure*}[htb!] \centering \includegraphics[width=0.8\textwidth]{Rousseau2018.png} \caption{Comparison of 67P/CG VIRTIS reflectance with laboratory-measured spectra of intimate mixtures of carbon (PSOC 1532) and pyrrhotite in 67:33wt$\%$ proportion plus dunite (from 5wt$\%$ to 30wt$\%$) in intimate (dot line) or coating mixture (solid line). From \cite{Rousseau2018}.} \label{fig:rousseau2018} \end{figure*} The measured optical depth allows computing the best-fit I/F to observed comet's spectrum shown in Fig. \ref{fig:mennella2020}-bottom panel. The two figures show that the hydroxylated magnesium silicate component is able to reproduce the general shape of the band, suggesting a contribution to observed absorption, in addition to aromatic and aliphatic organic matter (section \ref{sec:organic_matter}), and ammonium salts (section \ref{sec:ammoniated_salts}). \par Supplementary clues about 67P/CG mineral composition can be derived from the analysis of the VIS-NIR spectral range. \cite{Rousseau2018} measured several ternary mixtures of cometary analogs with the aim to reproduce the low reflectance, red color slope, and featureless continuum observed in the 0.4-2.5 $\mu$m range. The investigated mixtures are made by three components, including carbon (lignite coal PSCO1532), iron sulfide (pyrrhotite), and silicate (dunite, 95$\%$ olivine). At the initial sample made by a 67:33wt$\%$ proportion of carbon and pyrrhotite is added an increasing amount of dunite from 5wt$\%$ to 30wt$\%$ (Fig. \ref{fig:rousseau2018}) to explore variations in color and albedo. The mineral phases composition and grain size are selected to match the values measured by dust instruments (GIADA, COSIMA) on Rosetta. The experiment, repeated in both intimate mixing and submicron grains coating larger clumps, shows that these solutions are capable to reproduce the low albedo level and featureless continuum but fail to match the red slope observed in VIRTIS data which is higher than the simulated one. This experiment shows that additional reddening can be introduced by adding complex organic matter to the mineral phases mixtures. \par \cite{Moroz2017} reports the spectral properties of mixtures of organic matter and minerals, including pyrrhotites and troilites. The reflectance of these sulfides shows a decrease when grains become small (e.g. submicron-sized), a behavior described by \cite{Hunt1971}. The low albedo of 67P/CG could be therefore explained by a mixture of fine-grained minerals mixed with organic matter. The additional presence of silicates appears less relevant to model spectral slopes and albedo \citep{Moroz2017, Rousseau2018}. Spectral measurements on several kerite-troilite and kerite-pyrrhotite mixtures evidence that iron-sulfides mixed with organic matter can modify the fine structure of the aromatic-aliphatic group absorption bands within the wide 3.2 $\mu$m band \citep{Moroz2017}. \section{\textbf{Activity-driven composition evolution}} The composition of comets' nuclei is driven by the level of gaseous activity which in turn is a complex result of heliocentric distance, surface morphology, rotational state and volatiles abundance. In the next subsections we are describing the nucleus evolution caused by diurnal (\ref{sec:diurnal_evolution}) and seasonal cycles (\ref{sec:seasonal_evolution}) as well as the changes occurring at local scales where activity events are observed (\ref{sec:activity_evolution}). Finally, in subsection \ref{sct:webs}, is discussed a model of cometary nucleus internal structure and composition derived from the surface seasonal evolution. \subsection{\textbf{Diurnal composition variation}} \label{sec:diurnal_evolution} The first evidence of the diurnal cycle of water on comet 67P/CG was reported by \cite{DeSanctis2015} who detected an area close to shadows in the Hapi region, showing variations in the absorption band near 3 $\mu$m, being deeper and shifted at shorter wavelengths with respect to the average comet spectrum as measured by VIRTIS. They explain these features as a local enrichment of water frost formed when water vapor released from the warm subsurface re-condenses on the cold surface after sunset, and then it rapidly sublimates when exposed to the Sun. Molecules in the inner coma may also be back-scattered to the nucleus surface and re-condense on cold areas contributing to the frost formation \citep{Davidsson2004}. After this first evidence of the diurnal cycle of water relatively far from the Sun (heliocentric distance $\sim$ 3 AU at the time of the observations), no other evidence of surface frost was reported until the comet approached perihelion. Starting from June 2015, that is a couple of months before 67P/CG's perihelion passage, the nucleus shown repeatedly diurnal color variations on extended areas and the occurrence of water frost close to morning shadows, on both lobes of the comet, as reported in \cite{Fornasier2016}. An example of these phenomena is illustrated in the middle panel of Fig.~\ref{diurnalseasonacolors}, showing the color changes on large areas in the Imhotep region from images acquired on 27 June 2015 with a cadence of only 40 minutes. Areas just emerging from the shadows are spectrally bluer than their surroundings (Fig.~\ref{diurnalseasonacolors}, left side of the middle panel), and their spectral slope increased, i.e. the regions got relatively redder, in the images acquired 40 minutes later (Fig.~\ref{diurnalseasonacolors}, right side of the middle panel). \cite{Fornasier2016} interpreted the relatively blue surface at dawn as the presence of additional water frost that condensed during the previous night, and that suddenly sublimates when the region is illuminated by the Sun. These rapid color changes are accompanied by the presence of bright material close to the shadows, proven to be morning water frost that sublimate within few minutes once illuminated (see the bottom panel of Fig.~\ref{diurnalseasonacolors}). This material is six times brighter than the mean comet reflectance, and shows a spectrum which is flat in the visible and near infrared range, but with a flux enhancement in the ultraviolet region, consistent with the spectra of laboratory water frost \citep{Wagner1987}. \cite{Fornasier2016} reproduced the spectral behavior by linear mixing of the cometary dark terrain with 17$\pm$4 \% of water frost, and estimated the frost layer is extremely thin, with depth of only 10-15 microns. \begin{figure}[h!] \centering \includegraphics[width=0.5\textwidth]{OSIRIS_seasonaldiurnalevol.png} \caption{Seasonal [top], and diurnal [center and bottom panels] colors evolution of comet 67P/CG from OSIRIS observations \citep{Fornasier2016}. Top panel: Seasonal evolution of the spectral slope from August 2014 (when the comet was at 3.6 AU inbound) to August 2015 (just after the perihelion passage). Middle panel: Diurnal evolution of the spectral slope in the Imhotep region. The two images shown were acquired on 27 June 2015 and only 40 minutes apart. The corresponding heliocentric distance was 1.37 AU, the spatial resolution 3.2 m/pixel, and the phase angle 90$^{\circ}$. The Sun is toward the top. Bottom panel: radiance factor (I/F) of the regions indicated by the white rectangle on the middle panels showing morning frosts (evidenced by the yellow arrows), disappearing and moving with shadows.} \label{diurnalseasonacolors} \end{figure} \subsection{\textbf{Seasonal composition evolution}} \label{sec:seasonal_evolution} By orbiting in formation with 67P/CG nucleus, Rosetta had the unique opportunity to follow the evolution of the surface and coma properties as a function of the heliocentric distance and seasonal changes. Due to the 52.4$^\circ$ obliquity of the rotation axis \citep{Jorda2016}, the summer season on the north and south hemispheres of the nucleus is reached in different orbital periods: the northern regions are continuously illuminated by the Sun during the 5.5 years-long northern summer season. This includes the aphelion passage which occurs at heliocentric distance of 5.68 AU (beyond Jupiter's orbit). The inbound equinox was reached in May 2015 when the comet was orbiting at 1.7 AU from the Sun: this date marks the beginning of the 10 months-long and intense summer on the southern hemisphere while the north hemisphere was moving in night and was no more illuminated by the Sun. The perihelion passage occurred on August 13 2015 when the comet reached the minimum heliocentric distance of 1.24 AU. During this phase the southern hemisphere was experiencing its brief summer season when the Sun becomes circumpolar (never going below the line of the horizon during a comet's day) and the surface was receiving the maximum solar flux resulting in the maximum activity and erosion of a surface's layer of thickness $\approx$ 4 m \citep{Fulle2019}. Depending from models, a percentage between 20$\%$ \citep{Keller2017} to 50$\%$ \citep{Hu2017} of the dust flux lifted from the south hemisphere at perihelion falls back on the northern hemisphere. The grain size distribution of the fall-back flux is dominated by tens cm-size dehydrated aggregates containing only a very small fraction of water ice \citep{Keller2017}. Along the outbound orbit, the equinox is repeating again in March 2016 when the southern hemisphere returned in nightside and the northern in dayside. In this phase, with the progressive settling of the activity on the southern regions, the layering of the dust on the surface blankets again the exposed pristine icy material and the nucleus surface returns darker and redder. This condition is the same observed at the beginning of the Rosetta's mission. \par Nucleus' surface colors have been routinely monitored by VIRTIS onboard Rosetta allowing to catch the changing color and brightness occurring on different regions, as more pristine, water-ice rich material was progressively exposed on the surface \citep{Filacchione2016b, Ciarniello2016}. On average, the comet's surface appears dark and red where dehydrated dust made out of a mixture of minerals and organic matter, prevails. Localized active regions (as discussed in \textbf{Pajola et al., chapter 10}) and the occasional ice-rich exposures are characterized by higher albedo and more neutral colors. VIRTIS and OSIRIS observations show that global changes are noticeable, with an overall trend of the comet becoming bluer and more water-ice-rich while approaching perihelion \citep{Fornasier2016, Filacchione2020, Ciarniello2022}. \par The heliocentric distance is also driving the long-term stability of the water-ice-rich BAPs discussed in section \ref{sec:volatiles_ices} which starts to sublimate when the solar exposure becomes substantial \citep{Raponi2016}. These patches are buried below a dust layer when the comet is at relatively large heliocentric distances ($\gtrsim$3.4 AU) and for this reason, they are scarcely recognizable at 1.5-2 $\mu$m where the diagnostic absorption bands of water ice are located. Approaching the Sun the activity rapidly starts to remove dust particles from the surface gradually exposing the ice beneath it. The patch keeps sublimating thanks to the steady increase of the solar flux until the ice deposit is completely lost. This trend is shown in Fig. \ref{fig:Raponi2016} where we report the 6-months temporal sequence of the water ice band area for heliocentric distances between 3.44 and 2.23 AU along the inbound orbit. During this period the Imhotep region is moving from winter to spring season. Long-term ice stability on the surface of 67P/CG has been reported for many other ice deposits observed by OSIRIS \citep{Oklay2017}. \begin{figure*}[htb!] \centering \includegraphics[width=0.8\textwidth]{Raponi2016.png} \caption{Temporal evolution of the water ice band area at 2.0 $\mu$m for BAP 1 (discussed in Fig. \ref{fig:virtis_baps}). Each panel represents the extension and intensity of the water ice band for heliocentric distances between 3.443 and 2.230 AU along the inbound orbit corresponding to a period of 6 months. The feature steadily increases on the first six panels, and then decreases in the last three. In the last panel, the feature is very weak or absent. The dark areas are in shadow. All acquisitions were taken with similar illumination conditions (average incidence angle between $53^\circ - 67^\circ$ corresponding to early morning local time). The white areas outside the edge of the map are out the field of view of the acquisitions. From \cite{Raponi2016}.} \label{fig:Raponi2016} \end{figure*} \par Spectral modeling of synthetic spectra of water ice and dark terrain mixtures, in both areal and intimate mixing, has been exploited by \cite{Raponi2016} to correlate visible slope and 2 $\mu$m band area, that are the two widely-used spectral indicators sensitive to water ice abundance on 67P/CG spectra. \par Theoretical trends from models are compared with experimental data collected at 95$^\circ$ phase angle. The choice of the phase angle reflects the fact that Rosetta was passing great part of its time orbiting along terminator orbits. A similar relationship is useful to infer water ice abundance by visible colors in absence of infrared data. Noteworthy, since both slope and band area are phase-dependent, this correspondence is valid only at the specific 95$^\circ$ phase angle. As computed by \cite{Ciarniello2015}, the slope changes with phase by +0.007 $\mu$m$^{-1}$ deg$^{-1}$. \begin{figure}[htb!] \centering \includegraphics[width=0.49\textwidth]{Raponi2016bis.png} \caption{The theoretical abundance of water ice as a function of the slope at a phase angle of 95$^\circ$ for different mixing modalities (color lines) compared with VIRTIS data (points in black). From \cite{Raponi2016}.} \label{fig:Raponi2016bis} \end{figure} \par Few studies have focused their analyses on the variability of the comet's environment at different heliocentric distances with the aim to correlate the spectral changes occurring on the nucleus and in the coma. The evolution of the nucleus and coma spectral properties evidences the presence of an orbital cycle of water ice which can be observed by measuring multiple spectral indicators, like the integrated radiance, the spectral slopes, and the wavelength of the radiance's peak measured across the visible spectral range \citep{Filacchione2020}. Comets' gaseous activity is strongly dependant on solar heating which provides the energy input to sublimate volatile species. The sublimation of volatile species is responsible for the removal of the dust grains from the surface, a process which depends on multiple factors, such as the heliocentric distance, the local orientation of the surface with respect to the solar direction, the composition, and physical properties of the subsurface \citep{Gundlach2015, Tubiana2019}. As a consequence of the activity, both the nucleus \citep{Filacchione2016b, Ciarniello2016, Fornasier2016, Ciarniello2022} and the coma \citep{Hansen2016, Bockelee2019} change their appearance along the orbit. The light scattered by dust grains in the coma, taking into account for grain size distribution, shapes \citep{Guttler2019}, and viewing geometry, allows to infer their composition: carbonaceous-organic grains are recognizable by their red-color \citep{Jewitt1986} while magnesium silicate \citep{Zubko2011, Hadamcik2014} and water ice \citep{Fernandez2007} grains by their distinctive blue color. \par By modeling the light scattering properties of the dust particles in 67P/CG coma \cite{Filacchione2020} have found different populations of grains along the orbit: during the inbound orbit water ice grains are the dominant group, at perihelion submicron sized organic material and carbon-rich particles are the more abundant, and along the outbound orbit water ice (or possibly magnesium silicate which has similar color) return to be dominant. Such dust composition end-members and grain sizes are reconcilable with other Rosetta studies: 1) during the emission of outbursts \cite{Agarwal2017} have observed the release of submicron-size water-ice grains mixed with 100's $\mu$m size refractory grains; 2) at the same time, \cite{Bockelee2017} have reported a broad emission feature centered at 3.5 $\mu$m visible on the outbursts that is compatible with the sublimation of organic materials caused by the grains' heating by the solar flux; 3) similar dust grains composition has been inferred by \cite{Frattin2017} which modeled resolved dust grains color images by OSIRIS with three composition classes: organic material grains corresponding to high spectral slope, mixtures of silicate and organic material grains with intermediate slope, and water ice grains with flat slope; 4) the presence of elemental carbon, silicon and magnesium in dust grains has been inferred by COSIMA (see Table \ref{tbl:bardyn} from \cite{Bardyn2017}); 5) predictions on the dust properties (composition and size) from the theoretical "cometary model" of \cite{Fulle2021}. \begin{figure*}[h!] \centering \includegraphics[width=0.9\textwidth]{Filacchione2020.png} \caption{Time-series of spectral indicators as measured in 67P/CG coma during inbound, perihelion, and outbound orbital phases. Panel a): visible integrated radiance; b) 0.4-0.5 $\mu$m spectral slope; c) visible radiance wavelength peak; d) 0.5-0.8 $\mu$m spectral slope. Each point corresponds to the average value of the spectral indicators as computed on an annulus defined by a tangent altitude between 1 and 2.5 km from the nucleus' surface on a single observation. For comparison, the temporal changes occurring on the nucleus are shown in Fig. \ref{fig:Filacchione2020bis}. From \cite{Filacchione2020}.} \label{fig:Filacchione2020} \end{figure*} \begin{figure*}[h!] \centering \includegraphics[width=0.9\textwidth]{Filacchione2020bis.png} \caption{Time-series of 67P/CG nucleus colors evolution as measured through the 0.5–0.8 $\mu$m spectral slope on 12 areas of the surface. MTPs are Rosetta's Medium Term Planning Phases starting from MTP5 (July 2014) and ending in MTP28 (May 2016). Each MTP is one month-long. Orbital passage at perihelion is during MTP19 (marked by the vertical dashed line on each plot). The region name and position (lon, lat) of the 12 test areas are indicated in each plot. For comparison, the temporal changes occurring on the coma are shown in Fig. \ref{fig:Filacchione2020}. From \cite{Filacchione2020}.} \label{fig:Filacchione2020bis} \end{figure*} When comparing spectral properties derived from two years of continuous VIRTIS observations of the dust dispersed in 67P/CG coma and nucleus surface (Fig. \ref{fig:Filacchione2020}), two opposite seasonal colour cycles become evident through its perihelion passage \citep{Filacchione2020}: when far from the Sun the nucleus appears redder than the dust particles in the bluish coma, which are dominated by water ice grains of about 100 $\mu$m in size; moving on the inbound orbit towards perihelion passage the nucleus shows a progressive exposure of water ice-rich and pristine materials; as a consequence of this process the nucleus reaches the maximum blueing at perihelion (Fig. \ref{fig:Filacchione2020bis}); concurrently, the large quantities of dust lifted in the coma become progressively redder orbiting closer to the Sun due to an enrichment of organic matter and amorphous carbon-rich submicron grains (Fig. \ref{fig:Filacchione2020}); the high temperatures reached by the grains cause the rapid sublimation of any residual ice within them, a mechanism through which the grains are rapidly dehydrated once lifted off from the nucleus surface \citep{Bockelee2019}. This process develops in reverse order after the perihelion passage (plus about one month of delay) along the outbound orbit when the activity settles and the redeposition of dehydrated dust particles on the nucleus make it red-colored again while water ice particles start again to populate the coma. The overall cycle of colors developing on the nucleus and coma of 67P/CG along its orbit is summarised in Fig. \ref{fig:Filacchione2020tris}. \begin{figure*}[h!] \centering \includegraphics[width=0.80\textwidth]{Filacchione2020tris.png} \caption{A synthesis of the color cycling occurring on the nucleus surface and inner coma of 67P/CG. From ESA's Science and Technology Blog, \texttt{https://sci.esa.int/s/8kaR0bw}.} \label{fig:Filacchione2020tris} \end{figure*} \par The trends observed by VIRTIS were also confirmed by OSIRIS observations: \cite{Fornasier2016} monitored the color evolution of the nucleus from 3.6 AU to perihelion (1.24 AU) and beyond by measuring changes in the spectral slope in the 535-882 nm range (Fig.~\ref{diurnalseasonacolors}). They found that the whole nucleus became relatively bluer near perihelion, when the increasing level of activity provides a progressive exposure of water ice. This color evolution is accompanied by a change in the phase reddening effect, that decreases at perihelion, as reported in section~\ref{sec:vis_ir_albedo_photometry}. \subsection{\textbf{Local activity-driven composition evolution}} \label{sec:activity_evolution} The Rosetta spacecraft has been orbiting comet 67P/CG for more than 2 years, providing the unique opportunity to study the surface evolution over time. It has been therefore possible for the very first time not only to identify a number of morphological changes in several regions of the nucleus, but also to follow the composition variations produced by the cometary activity and by the diurnal and seasonal cycles of water (see section~\ref{sec:seasonal_evolution}). A number of jets and outbursts have been identified and investigated in the literature: the very first outburst was caught by OSIRIS on April 2014, when the comet was far from the Sun ($\sim$ 4 AU) and unresolved \citep{Tubiana2015}, followed shortly after by the detection of water vapor with the MIRO instrument \citep{Gulkis2015}; Hapi was the most active region during the first resolved observations \citep{Pajola2019}, and characterized by a brighter than average and relatively blue colors \citep{Fornasier2015}, indicating a local enrichment of water ice which was in fact detected by VIRTIS \citep{Capaccioni2015}; but it was during the cometary summer close to the perihelion passage that a number of outbursts and jets were individually identified and their source position on the nucleus retrieved through geometrical tracing \citep{Vincent2016b, Knollenberg2016}, or direct imaging \citep{Vincent2016a, Shi2016, Pajola2017, Fornasier2019b}; finally, during the Rosetta extended mission from January to September 2016, some plumes/faint jets were observed in the equatorial and southern regions in the high-resolution images \citep{Fornasier2017, Fornasier2019a, Agarwal2017, Deshapriya2018, Hasselmann2019}. \par Thanks to the direct identification of activity sources on the nucleus, a number of regions were carefully investigated to look for morphological and composition changes produced by the activity. The main processes originating composition variations on the nucleus can be categorized as the following: \begin{figure*}[h!] \centering \includegraphics[width=0.9\textwidth]{changes_compositebis.png} \caption{Examples of composition changes associated with activity events. Panel A: The Anhur region showing the two larger water-ice rich patches (left), the new scarp formed between August and December 2015 nearby the patches (center), and the corresponding RGB map from images acquired on 7 May 2016, UT 04:15, showing the new scarp and the bluer and water ice-rich material at its feet (from \cite{Fornasier2017}). Panel B: example of jet locations (left side) and some associated activity events in the Anhur region, including the perihelion outburst which took place on 12 August 2015 (from \cite{Fornasier2019b}). The right side of panel B shows a RGB composite image (from the images acquired with filters centered at 882, 649, and 480 nm) of the Anhur region from observations acquired on 25 June 2016 at UT01h37 at a resolution of 0.35 m/px. Several exposures of water ice are also detected, notably at the base of a new scarp, and frost observed within the canyon structure (Figure adapted from \cite{Fornasier2019a}). Panel C: the plume and associated new cavity formation with exposure of water ice identified in the Imhotep region by \cite{Agarwal2017}. Panel D: the outburst and cliff collapse in Aswan site with the exposure of the fresh water ice rich layer at the wall of the cliff (from \cite{Pajola2017}).} \label{surfacechanges_activity} \end{figure*} \begin{enumerate} \item {\it Dust removal and redeposition by volatiles sublimation}: the surface dust is mobilized by means of the sublimation of volatile species (mainly CO$_2$ \cite{Gundlach2020} and H$_2$O). The cometary activity progressively removes dust and exposes pristine material including water ice able to survive on the surface until sublimation occurs. This is causing the composition changes observed on the overall nucleus, or on extended areas of it, where the seasonal and diurnal cycle of water (as detailed in section~\ref{sec:seasonal_evolution}) are manifested, as well as the spectral phase reddening effect variations (see section~\ref{sec:vis_ir_albedo_photometry}). \par The transfer and redeposition of the dust are strongly related to the sublimation of volatiles and thus to the activity level, lift pressure and local topography \citep{Thomas2015, Keller2017, Hu2017, Pajola2017b}. Because the southern hemisphere experiences strong thermal effects being intensely illuminated during, and close to, the perihelion passage, it is highly eroded. By modeling only water ice sublimation \cite{Keller2017} has found that dust ejection occurs from the south and a significant fraction of it is redeposited in the northern regions. \cite{Lai2016} estimated a dust loss of about 0.4 m in depth per orbit in Hapi, and up to 1.8 m in Wosret, where the highest water production rate was measured by MIRO during the perihelion passage \citep{Marshall2017}. Concurrent OSIRIS measurements during the inbound orbit show an erosion of about 1.7$\pm$0.2 m in the Hapi region which is nearly balanced by a 1.4$\pm$0.8 m fallout layer from the southern hemisphere during perihelion \citep{Cambianica2020}. \par The first consequence of dust mobilization is the seasonal variation of colors, with the nucleus becoming bluer approaching perihelion because of the exposure of underlying layers enriched in water ice (Fig.~\ref{diurnalseasonacolors}). \par Secondly, the morphological landscape changed locally: a local removal of $\sim$ 4 m dust coating was observed in part of Imhotep, with the exhumation of boulders and roundish features \citep{El-Maarry2017}, and up to $\sim$14 m in a cavity of Khonsu region \citep{Hasselmann2019} and within the canyon-like structure in Anhur \citep{Fornasier2019a}. Both these southern hemisphere regions originated several jets, and in particular, the canyon in Anhur was the source of the so-called perihelion outburst, one of the strongest activity events reported for comet 67P/CG. Moreover, several ice exposures were observed in the Anhur and Khonsu regions \citep{Deshapriya2018, Fornasier2019a, Hasselmann2019}, and water frost was repeatedly observed within the Anhur canyon (see panel B in Fig.~\ref{surfacechanges_activity}). \par Finally, the dust that fell back onto the nucleus is preserving some water ice, as suggested by \cite{Keller2017} and observed by \cite{Fornasier2019a}. In fact, these authors noticed an asymmetry in the presence of frost/water ice on the 67P/CG comet by comparing pre- and post-perihelion images acquired at similar spatial resolutions and at similar heliocentric distances. While during the inbound orbits water frost/ice was observed only in Hapi, in the outbound orbits it was observed in several regions, including Seth, Anhur, Khonsu, Imhotep, and, in a minor amount, in Khonsu \citep{Lucchetti2017, Fornasier2019a, Fornasier2021, Hasselmann2019, Deshapriya2016, Deshapriya2018, Oklay2017}. All these pieces of evidence proved that the falling back dust still preserves some ice. \item {\it local surface deflation}: this mechanism is associated with the sublimation of subsurface reservoirs of volatiles, resulting in a local surface erosion. An example of manifestation of this mechanism has occurred in the large smooth central area of the Imhotep region with the appearance of two roundish depressions with sizes increasing in time up to several hundred meters and depth of 5$\pm$2 m when the comet was approaching perihelion \citep{Groussin2015b}. These authors invoked exothermic processes such as the crystallization of water ice and/or the clathrate destabilization to explain the expansion rate of these features, which was higher than 18 cm hour$^{-1}$. Tiny bright spots, as well as relatively bluer colors/spectral slopes near the rims/edges of these roundish features, were observed, indicating a local enrichment in volatiles. \item {\it cliffs/overhangs collapse}: they may be triggered by episodic and explosive activity events, producing the mechanical disruption of old terrains \citep{Groussin2015a, Pommerol2015}. A notable example is the July 2015 outburst associated with the cliff's collapse in the Aswan site in the Seth region \citep{Pajola2017}. Following the cliff's collapse, an inner layer enriched in fresh and bright icy material (with albedo beyond 40$\%$) has been exposed. This layer has survived for several months: few examples of this kind of event are shown in panels A and D in Fig.~\ref{surfacechanges_activity}. Several jets were identified by \cite{Fornasier2019b} directly on the nucleus and they were found arising below or close to cliffs or scarps. Often, the walls or the debris fields of cliffs and overhangs are spectrally bluer and brighter indicating the local enrichment of water ice, from the freshly exposed underneath layers \citep{Pommerol2015, Filacchione2016a, Vincent2016a, Oklay2017, Fornasier2017, Fornasier2019a}. \item {\it local activity}: outburst and jets arise from cliffs, pits, bright spots, fractures, or from cavities that cast shadows and favor the recondensation of volatiles showing periodic activity. These activity sources are often observed to be brighter and relatively bluer in colors/spectral slope, showing a local enrichment in volatiles \citep{Vincent2016a, Agarwal2017, Fornasier2017, Fornasier2019a, Fornasier2019b, Hasselmann2019, Deshapriya2018, Hoang2020}. Examples are reported in panels B and C of Fig.~\ref{surfacechanges_activity}. The investigation of activity events from \cite{Vincent2016b} and \cite{Fornasier2019b} shows that cometary activity is triggered by the local illumination conditions and it is stable between several nucleus rotation. \cite{Fornasier2019b} identified the source areas of more than 200 jets and found that the activity events are not correlated with the nucleus morphology, originating both from consolidated and smooth terrains. Interestingly, \cite{Fornasier2019b} found that some faint jets may have an extremely short duration time, less than a couple of minutes, so it may be difficult to catch this kind of events that are probably common in comets. \begin{table*} \begin{center} \caption{Summary of the observed behavior and physical properties of active areas located on the small and big lobe of comet 67P/CG from \cite{Fornasier2021}. These properties are derived from the investigation of southern hemisphere regions submitted to similar high heating at perihelion.} \label{tbl:differences} \begin{small} \begin{tabular}{|l|l|l|l| } \hline & {\bf Small lobe (Wosret)} & {\bf Big lobe} & {\bf References } \\ \hline \hline incoming solar flux & $\sim$ 550 W m$^{-2}$ & $\sim$ 550 W m$^{-2}$ (Anhur and Khonsu) & \cite{Marshall2017} \\ \hline morphology & Consolidated material that appears & Consolidated material with significant & \cite{Thomas2018} \\ & highly fractured with occasional pits & intermediate scale roughness (Anhur) & \\ \hline exposed water ice & in a few and small bright spots ($\sim m^2$) & in many bright spots and & \cite{Fornasier2021} \\ & & some in big patches (1500 m$^2$) & \cite{Fornasier2016, Fornasier2019a} \\ \hline relatively blue area & in very spatially limited area, & in extended area, periodic & \cite{Fornasier2016, Fornasier2017} \\ enriched in frost/ice & periodic, not frequently observed & often observed & \cite{Fornasier2019a, Fornasier2021} \\ & & & \cite{Hasselmann2019} \\ \hline average & the largest in 67P/CG: 4.7$\pm$1.5 m & 2.2-3.2 m (Seth, Imhothep, & \cite{Fornasier2021} \\ goosebump & & Anubis, & \cite{Sierks2015} \\ diameter & & Atum) & \cite{Davidsson2016} \\ \hline level of activity & very high & very high & \cite{Fornasier2021, Fornasier2019b}\\ & & & \cite{Hasselmann2019}\\ \hline surface morphology & few and not so important: & many and important : & \cite{Fornasier2021}, \\ changes & a relatively small cavity, & local dust removal up to 14m in depth, & \cite{Fornasier2017, Fornasier2019a} \\ & local dust removal ($\sim$ 1m depth) & new relatively big scarps and cavities, & \cite{Hasselmann2019} \\ & revealing a cluster of outcrops & big vanishing structures, boulders & \\ & & displacements and fragmentation & \\ \hline surface mass loss & $\sim$ 1.2$\times 10^6$ kg & $> 50 \times$10$^6$ kg in Anhur & \cite{Fornasier2016, Fornasier2019a}\\ & & $\sim 2\times$10$^8$ kg in Khonsu & \cite{Hasselmann2019} \\ \hline \end{tabular} \end{small} \end{center} \end{table*} \item {\it composition heterogeneities}: local color and composition heterogeneities have been identified in different regions of the 67P/CG nucleus and several of them are associated with the local exposure of volatiles. A notable example is Anhur which, as discussed in section~\ref{sec:volatiles_ices}, showed a first exposure of CO$_2$ ice \citep{Filacchione2016c}, followed by the exposure of two large water ice rich patches \citep{Fornasier2016} on the same area. These authors deduced composition heterogeneities in the subsurface composition on a scale of tenths of meters in the Anhur region. The sublimation of the surface and subsurface volatile reservoir here observed is at the origin of the fragile terrain where a new scarp formed as shown in Fig.~\ref{surfacechanges_activity} (panel A), just nearby the two bright patches location. \par Also in comet 9P/Tempel 1 some composition inhomogeneities linked to the detection of dirty water-ice rich material have been reported by \cite{Sunshine2006}. Moreover, the comparison of Tempel 1 images from Deep Impact and the Stardust flybys show morphological changes \citep{Veverka2013}, interpreted as the progressive sublimation and depletion of volatiles. \par Comparing the physical and composition properties of two southern hemisphere regions, Anhur and Wosret, subject to the same strong thermal heating during the cometary summer but located in the large and small lobes, respectively, \cite{Fornasier2021} have noticed a number of differences in the physical and mechanical properties among the two lobes, although no appreciable differences were reported in the literature on the global surface composition \citep{Capaccioni2015} and on the $D/H$ ratio \citep{Schroeder2019}. Wosret, in the small lobe, shows larger goosebumps features, very few morphological changes compared to Anhur and Khonsu regions, despite they all experienced the same high insolation, and less frequent and smaller frost and water ice enriched areas. Considering that Wosret is highly eroded and thus exposes the inner layers of the small lobe, \cite{Fornasier2021} deduced that the small lobe has a lower volatile content, at least in its top layers, than the big one, and different mechanical properties, as already noticed by \cite{El-Maarry2016}. \par A comparison of the observed surface properties on the active regions of the small and big lobes of 67P/CG (Table \ref{tbl:differences}) allows to appreciate how the latter is more eroded and processed by solar heating during the perihelion passages. \end{enumerate} \subsection{From surface evolution to the internal structure of cometary nuclei} \label{sct:webs} Even though the blueing evolution hints a global water ice enrichment towards perihelion passage (see section \ref{sec:seasonal_evolution}), the water ice is observed in a patchy distribution across the nucleus. As we have discussed in the previous section \ref{sct:waterice}, high spatial resolution observations of 67P/CG have revealed a rich phenomenology of localized water-ice rich spots, ranging in size from less than one meter up to tens of meters. These spots appear distributed across the nucleus surface and are recognizable thanks to their intrinsic high reflectance and blue-colored visible spectra which distinguish them from the average dark and red-colored terrain (we refer to such spots as Blue Patches, or BPs in brief). \begin{figure*}[h!] \centering \includegraphics[width=0.8\textwidth]{WEBs_cycle.png} \caption{The progressive blueing of 67P/CG surface orbiting towards perihelion is caused by the progressive exposure to sunlight of Water-Ice-Enriched Blocks (WEBs). In this model the comet nucleus is made by two populations of pebbles composed of refractories (organic matter and minerals) and CO$_2$ ice with, respectively: 1) high abundance of H$_2$O ice (composing the WEBs); and 2) low abundance of H$_2$O ice (H$_2$O-ice poor pebbles). The composition of the H$_2$O-ice poor pebbles corresponds to the material observed during the occasional exposure of CO$_2$ ice \citep{Filacchione2016c}, making most of the nucleus. The CO$_2$ ice is stable at depths $>0.1$m where is localized its condensation front \citep{Gundlach2020}. When approaching perihelion, the sublimation rate of CO$_2$ steadily increases causing the erosion of the surface through the ejection of chunks and exposing the sub-surface WEBs. Once exposed, the WEBs rapidly lose their CO$_2$ content and appear as blue patches (BPs). After this, the solar flux activates the sublimation of the H$_2$O ice which erodes the BPs, while removing sub-cm sized dust from their surface and preventing the formation of a dry crust \citep{Fulle2020}. The BPs can survive on the surface until their water-ice fraction is gone. In the meanwhile, their presence is the origin of the observed surface blueing. While WEBs evolve along this path, H$_2$O-ice poor pebbles experience dehydration rather than erosion due to their intrinsic lower abundance of water ice \citep{Fulle2020}, whereas the formation of a crust is hampered by the concurrent CO$_2$ driven erosion. The same water flux is released by the BPs and the dehydrating surface units as both contain some water ice and are assumed to share the same temperature \citep{Fulle2020}. The resulting blueing trend when 67P/CG approaches perihelion is shown along the right axis. Adapted from \cite{Ciarniello2022}, where further details can be found.} \label{fig:WEBs_cycle} \end{figure*} A similar property is also in agreement with the dust ejection rates reported by \cite{Fulle2016c} derived by GIADA at perihelion \citep{Fulle2020}. \par Starting from these observational evidences, \cite{Ciarniello2022} have explained the color changes occurring on 67P surface in the framework of the water-driven activity model of \cite{Fulle2020} for a nucleus made of cm-sized pebbles \citep{Blum2017}, by defining a new model of the comet internal structure. According to the proposed scenario (Fig. \ref{fig:WEBs_cycle}), the perihelic blueing of 67P is interpreted as an increase of the areal fraction covered in BPs. In this respect, the BPs represent the exposed counterparts of a population of Water-Ice-Enriched Blocks (WEBs, in the following), formed of pebbles with high content of water ice, immerse in a matrix of drier pebbles (see details in Fig. \ref{fig:WEBs_cycle} and caption). The WEBs are exposed as a consequence of the surface erosion through chunk ejection induced by CO$_2$ ice sublimation \citep{Gundlach2020}, and are eroded by H$_2$O ice sublimation ejecting sub-cm dust \citep{Fulle2020} when directly reached by sunlight. The observed color evolution of the nucleus is the result of these two competing mechanisms. By matching the temporal variation of the surface color while taking into account the constraints on the surface erosion by CO$_2$-driven chunk emission \citep{Fulle2019, Cambianica2020, Fulle2020} and the modeled water-driven erosion rates 1.57 m$^2$ and, \cite{Ciarniello2022} infer a dominant size for the WEBs of 0.5-1 m, with a volumetric abundance in the nucleus from 9.5 to 5.5$\%$. The presence of sub-metre WEBs in the nucleus of 67P/CG is in agreement with CONSERT radar observations, which found a homogeneous internal structure down to a few-metres scale \citep{Ciarletti2017}. \par A uniform distribution of WEBs in the interior of 67P/CG nucleus allows to explain both the observed seasonal spectral changes and the measured dust ejection rates, making the macroscopic compositional dishomogeneities observed in comets, e.g. BPs, compatible with the homogeneous structure at small scale (the cm-sized pebbles), and with the sublimation processes occurring at microscopic (sub-pebble) scales. If this is the case, WEBs must be of primordial origin: in fact, during the orbital evolution water ice can recondensate only within a very shallow layer \citep{DeSanctis2015, Fornasier2016} but not in the deep internal parts. With similar characteristics, WEBs are imposing strict constraints on comets' formation scenarios. The detection of crystalline water ice in Proto-Planetary Disks (PPDs) by \cite{Min2016} would be compatible with the formation of water ice-rich pebbles from local ice recondensation, likely stickier than the water poor ones, and possibly favouring the accretion into WEBs during the gravitational collapse originated by the streaming instabilities in PPDs \citep{Blum2017}. \section{\textbf{Conclusions}} \label{sec:conclusions} Comets' nuclei are repository of primordial materials syntethized in the ISM and then processed in the protosolar disk. As such, they are cold time-capsules able to preserve primordial matter until nowadays and offer us the possibility, through their exploration, to understand the conditions occurring during the formation of our Solar System. To reach this purpose, the Rosetta mission has implemented an innovative approach in which measurements performed thorough a wide range of techniques were aiming to infer 67P/CG composition from the orbiter and from the Philae lander at different heliocentric distances. In this respect, Rosetta mission has been a game-changer in cometary science. \par So far, the analysis of Rosetta data discussed in this chapter in the context of previous cometary space missions, gives us some important clues about the nature of cometary matter which is compatible with a \emph{macromolecular assemblage in which ices, organic matter, salts and minerals} are bound together. While the volatile species have been measured and characterized as ices on the nucleus and as gases in the coma by multiple instruments, the determination of the non-volatile fraction is much more complicated to achieve. At now it is still unclear how to reconcile the elemental composition of gaseous species and dust grains achieved by in situ instruments (ROSINA, COSIMA, PTOLEMY, COSAC) with the optical properties of the nucleus at VIS-IR wavelengths (VIRTIS, OSIRIS). The complex organic matter, showing both aromatic and aliphatic bonds, appears well-mixed with minerals, as silicates, Fe-sulfides, carbon, and ammoniated salts. The mixing of all these materials results in the low albedo and red color of the dust covering the whole nucleus. When far from the Sun, the majority of the surface appears very dehydrated, with a water ice residual of no more than 1 $\%$. \par The composition of the non-icy materials allows to back-trace the origins of comets: the nature of the refractories, including organic aromatic and aliphatic matter and silicates, shares similarities with pre-solar matter. The stronger intensity of the CH$_3$ asymmetric stretch (3.38 $\mu$m) with respect to the CH$_2$ (3.42 $\mu$m) resembles the properties observed in the ISM and IOM in primitive carbonaceous condrites. Also the 2.8 $\mu$m OH band in hydroxylated-magnesium silicates indicates a possible genetic link between cometary refractories and ISM, where amorphous silicates are irradiated by keV-MeV energy protons. Moreover, Rosetta's results allow to explain the apparent nitrogen depletion observed in cometary comae being it sequestered in semi-volatile ammoniated salts. In this respect, comets shows analogies with other asteroids and outer solar system objects observed at VIS-IR wavelengths, suggesting an evolutionary link among all these objects. These evidences show that to understand comets' composition it will be necessary to improve statistics (so far only 6 comets have been explored by space missions) and comparisons with asteroids, outer solar system objects and ISM data. \par The Rosetta mission faced multiple (and unexpected) challenges in exploring 67P/CG: the very low albedo, the complex shape and morphology of nucleus, the evolution of the solar heating, the changing activity responsible of the dust and gas environment in the coma were factors playing against a straightforward determination of the nucleus' composition. Moreover, the un-nominal landing of Philae further complicated the mission planning and the scientific interpretation of the results. Similar difficulties will remain in place for any future cometary mission relying on remote sensing and in-situ payloads. In order to overcome them we need a paradigm shift in cometary exploration by implementing a more ambitious exploration approach, such as by adopting a cryogenic sample return, in which a sample containing original cometary material, keeping unaltered the ices and refractory parts, it is returned to Earth to conduct composition analyses with multiple analitical techniques \citep{Bockelee2021}. A similar sample shall be the "Holy Grail" for the cosmochemistry community allowing to shed light on many unresolved questions: apart determining cometary material composition and solar or pre-solar origin, it would permit to understand cometary formation mechanisms, internal structure, dust-to-ice ratio and presence of prebiotic molecules. \par \vskip .5in \noindent \textbf{Acknowledgments.} \\ The authors gratefully thank dr. Sébastien Besse (ESA-ESAC, Madrid, Spain) and dr. Javier Licandro (Instituto de Astrofísica de Canarias, Spain) for their thorough reviews which helped to improve the quality of the manuscript. G.F, M.C., and A.R. acknowledge support from INAF-IAPS and ASI, Italian Space Agency. S.F. acknowledges the support from LESIA, the France Agence Nationale de la Recherche (programme Classy, ANR-17-CE31-0004), and from the Institut Universitaire de France. This research has made use of NASA’s Astrophysics Data System (NASA-ADS). \bibliographystyle{sss-three.bst}
\section{Introduction} This \texttt{hyperbox-brain} toolbox has been developed by the researchers within the Complex Adaptive Systems laboratory at the University Technology Sydney. It is a result of many years of developing versatile machine learning algorithms with hyperboxes as the foundational representation element at their core. Hyperbox-based machine learning algorithms use min-max hyperboxes as their fundamental building blocks to partition the sample space into various regions. A collection of hyperboxes representing the same class can form the regions of arbitrary shape and complexity. Each min-max hyperbox is usually characterised by the minimum and maximum vertices together with a fuzzy membership function acting as a distance or similarity measure. During the training procedure, these hyperboxes are formed, as needed, and adjusted to accommodate the incoming input samples based on the degree-of-fit of each input pattern to given hyperboxes expressed by their membership values. The use of hyperboxes for learning systems can deal effectively with the pattern classification and clustering problems \citep{khga20}. Moreover, this kind of learning exposes numerous essential properties for lifelong machine learning systems \citep{ha01, crca20} such as scalability, explainability, incremental adaptation in dynamically changing environments, continuously learning ability from a limited amount of data and new samples, absorption of new knowledge as well as accommodating new classes with a better ability to avoid catastrophic forgetting, due to their local data cluster representations, and capability to manage the stability-plasticity dilemma \citep{mcco89}. According to a recent survey \citep{khru21}, hyperbox-based machine learning algorithms can be divided into three main groups as illustrated in Fig. \ref{fig_1}. The first group includes network structured learning models. This group contains two types of learning algorithms. The first sub-group allows the occurrence of overlapped areas among hyperboxes representing different class labels, while the hyperboxes belonging to different classes generated by the algorithms in the other sub-group are not allowed to overlap with each other. The second main group consists of hybrid tree and network structured models. The last group includes non-network structured models. The learning algorithms supported by this initial release of the \texttt{hypebox-brain} library primarily come from the network structured models with non-overlapping inter-class hyperboxes. \begin{figure}[!ht] \centering \includegraphics[width=0.55\textwidth]{hyperbox-ml-classification.pdf} \caption{Taxonomy of hyperbox-based machine learning algorithms.} \label{fig_1} \end{figure} \vspace{-0.4cm} The use of hyperbox fuzzy sets as fundamental representation blocks for machine learning based classifiers dates back to the early 1990s with the most prominent early works including a fuzzy min-max neural network (FMNN) \citep{simpson1992fuzzy} proposed by Simpson and the variations and extension to the Adaptive Resonance Theory (ART) such as Fuzzy ART \citep{Carpenter1991fuzzy} and ARTMAP \citep{Carpenter1991artmap} proposed by Carpenter et al. This \texttt{hyperbox-brain} library focuses mainly on the FMNN and its improved, later variants such as the general fuzzy min-max neural network (GFMMNN) \citep{gabrys2000general}. Apart from scalability, explainability, incremental adaptation, and continuous learning from limited input samples, learning algorithms of GFMMNN also exhibit unique learning abilities such as learning from interval input data, native learning ability from a mixed labelled and unlabelled training sets \citep{gabrys2000general, gabrys2002agglomerative}, directly learning from data with missing values without the need for data imputation \citep{Gabrys02missing}, combining all resulting hyperboxes in an ensemble model into a single model \citep{Gabrys04multi, gabrys2002combining}, combination of multiple decision trees into a single interpretable hyperbox-based model \citep{Eastwood11}, and the capability of growing and including new classes of data without retraining the whole classifier \citep{Gabrys99water}. All of these unique learning characteristics are supported by the library, and their details will be presented in the next sections. Although many hyperbox-based machine learning algorithms have been developed over the years with many very recent examples \citep{khru21}, there is no comprehensive software library gathering them in one convenient package allowing their easy usage, benchmarking and further development. Therefore, this paper presents a \texttt{scikit-learn} compatible hyperbox-based machine learning library in Python to fill this gap and serve as a facilitator for further research and applications in this field. \section{Overview and Design} To achieve a high performance when applying machine learning algorithms for real-world problems, it is necessary to combine learning algorithms with a hyperparameter search, cross-validation, and feature engineering techniques at a large scale. The \texttt{hyperbox-brain} library, therefore, is designed to be compatible with the \texttt{scikit-learn} toolbox \citep{pedregosa2011scikit} to take advantage of the availability of cross-validation, feature transformation, hyperparameter optimisation, and model evaluation methods. As a result, each model in \texttt{hyperbox-brain} inherits from \texttt{BaseEstimator} or \texttt{BaseEnsemble} and \texttt{ClassifierMixin} in the module \texttt{sklearn.base}. By this inheritance mechanism, the library can set hyperparameters using \texttt{set\_params()}, train a model using \texttt{fit(X, y)}, make a prediction via \texttt{predict(X)}, and evaluate the trained model on a hold-out dataset using \texttt{score()}. To integrate with \texttt{scikit-learn}, \texttt{hyperbox-brain} employs \texttt{numpy}'s structured arrays \citep{harris2020array} whose data type is a combination of simpler data types. This library aims to provide users with a wide range of learning algorithm categories suitable for addressing different ML problems and is therefore organised into the following modules:\\ \textit{base}: Providing base classes and functions for all hyperbox-based models in the library.\\ \textit{mixed data learner}: Containing the specialised estimators which can work on mixed-attribute data. However, categorical features given in a text form can also be encoded by various encoding methods so that they can be processed by the following learning algorithms for the numerical data only \citep{khuat2021depth}.\\ \textit{incremental learner}: Including estimators for numerical data which use the instance based incremental learning approaches.\\ \textit{batch learner}: Comprising hyperbox-based learning algorithms for numerical data using batch learning approaches.\\ \textit{multigranular learner}: Containing classifiers for numerical data using the multigranularity learning methods.\\ \textit{ensemble learner}: Including the combination of hyperbox-based learners integrated with various ensemble learning methods.\\ \textit{utils}: Containing utility functions associated with unit tests which can be executed on all supported Python versions by the continuous integration workflow. \section{The \texttt{hyperbox-brain} Library at a Glance} The \texttt{hyperbox-brain} library is intended for researchers and practitioners as an easily accessible toolbox of hyperbox-based machine learning algorithms. This library is implemented in Python, providing numerous learning algorithms using hyperboxes as fundamental building blocks for solving classification and clustering problems. Our purpose is to create an easy-to-use package which may be extended by the community, while also providing essential functionality and characteristics to enable researchers and practitioners to benchmark, reproduce, further develop and apply this type of algorithms for their problems. \subsection{Supported Hyperbox-based Machine Learning Algorithms} The \texttt{hyperbox-brain} library currently includes 18 hyperbox-based algorithms, which are used to train network-structured learning models without enabling the overlapped areas among inter-class hyperboxes. All of them are original and improved learning algorithms for the fuzzy min-max neural network \citep{simpson1992fuzzy} and the general fuzzy min-max neural network \citep{gabrys2000general}. Of these 18 algorithms, there are three mixed-data learners and 15 learners for numerical data. Out of 15 numerical data learners, there are six instance-incremental learners, two batch learners, six ensemble learners, and one multi-granularity learner. These algorithms are summarised in Table \ref{table_1}. \begin{table}[!ht] \centering \scriptsize{ \begin{tabular}{p{7cm}ccl} \toprule \textbf{Model} & \textbf{Feature type} & \textbf{Model type} & \textbf{Learning type}\\ \midrule EIOL-GFMM \citep{khuat2020online} & Mixed & Single & Instance-incremental \\ \midrule Freq-Cat-Onln-GFMM \citep{khga20} & Mixed & Single & Batch-incremental \\ \midrule OneHot-Onln-GFMM \citep{khuat2020online} & Mixed & Single & Batch-incremental \\ \midrule Onln-GFMM \citep{gabrys2000general} & Numerical & Single & Instance-incremental \\ \midrule IOL-GFMM \citep{khch20} & Numerical & Single & Instance-incremental \\ \midrule FMNN \citep{simpson1992fuzzy} & Numerical & Single & Instance-incremental \\ \midrule EFMNN \citep{mohammed2014enhanced} & Numerical & Single & Instance-incremental \\ \midrule KNEFMNN \citep{mohammed2017improving} & Numerical & Single & Instance-incremental \\ \midrule RFMNN \citep{al2020refined} & Numerical & Single & Instance-incremental \\ \midrule AGGLO-SM \citep{gabrys2002agglomerative} & Numerical & Single & Batch \\ \midrule AGGLO-2 \citep{gabrys2002agglomerative} & Numerical & Single & Batch \\ \midrule MRHGRC \citep{khuat2021effective} & Numerical & Single & Multi-Granularity \\ \midrule Decision-level Bagging \citep{gabrys2002combining} & Numerical & Combination & Ensemble \\ \midrule Decision-level Bagging + hyperparameter optimisation for base learners & Numerical & Combination & Ensemble \\ \midrule Model-level Bagging \citep{gabrys2002combining} & Numerical & Combination & Ensemble \\ \midrule Model-level Bagging + hyperparameter optimisation for base learners & Numerical & Combination & Ensemble \\ \midrule Random hyperboxes \citep{khuat2021random} & Numerical & Combination & Ensemble \\ \midrule Random hyperboxes + hyperparameter optimisation for base learners & Numerical & Combination & Ensemble \\ \bottomrule \end{tabular} \caption{Hyperbox-based machine learning algorithms are supported by \texttt{hyperbox-brain}.} \label{table_1} } \end{table} \subsection{Typical Features of the Library} \textbf{\texttt{scikit-learn} compatibility}: The library is designed to be compatible with and benefits from the \texttt{scikit-learn} toolbox's many features including hyperparameter search, model section and evaluation techniques as well as the pipeline composition approaches (see Section \ref{compatibility}). Moreover, the library can be compatible with other hyperparameter optimisation libraries which may be integrated with \texttt{scikit-learn} such as \texttt{hyperopt} \citep{bergstra2013making}.\\ \textbf{Explainability}: One of the interesting characteristics of the use of hyperbox fuzzy sets for building pattern classifiers is the explainability of the predicted results (see the Appendix A for more details). The library supports this functionality by possible parallel coordinates plots based visualisation of representative hyperboxes from different classes together with an input pattern to be classified.\\ \textbf{Capability of directly handling missing data}: General fuzzy min-max neural networks supported by the library have the ability to handle the classification of inputs with missing data directly without the need for replacing or imputing missing values as in other classifiers \citep{Gabrys02missing}.\\ \textbf{Combination of multiple models at the model level}: Learning algorithms for the GFMMNN in the library can combine multiple decision trees \citep{Eastwood11} or resulting hyperboxes generated by multiple hyperbox-based models \citep{gabrys2002combining} into a single model. This feature contributes to the increase of explainability of ensemble models.\\ \textbf{Data editing and pruning approaches}: By integrating the repeated cross-validation methods provided by \texttt{scikit-learn} and hyperbox-based learning algorithms, evidence from training multiple models can be used for identifying which points from the original data set or the hyperboxes from the generated multiple models should be retained and those that should be edited out \citep{Gabrys01editing} or pruned \citep{Gabrys04multi} before further processing.\\ \textbf{Native ability to learn from both labelled and unlabelled data}: One of the outstanding features of learning algorithms for the GFMMNN is the ability to form classification boundaries between known classes and ability to cluster data and represent them as hyperboxes when labels are not available in the data \citep{gabrys2000general, gabrys2002agglomerative}. Unlabelled hyperboxes may be then labelled based on the evidence of incoming input patterns.\\ \textbf{Ability to learn from new classes in an incremental manner}: Incremental learning algorithms of hyperbox-based models provided in the library can grow and include new classes of data without the need for retraining the whole classifier \citep{Gabrys99water}. Incremental learning algorithms themselves can develop new hyperboxes to represent clusters of new data with potentially new labels both in the middle of normal training process and in the operating time where the initial training has been completed. This characteristic is a key feature for life-long learning systems.\\ \textbf{Documentation and tutorials}: A comprehensive documentation is developed using \texttt{sphinx} and \texttt{numpydoc} and is provided to users via the \textit{Read the Doc} platform\footnote{\url{https://hyperbox-brain.readthedocs.io/en/latest/}}. It provides a detailed API reference, essential background, and a wide range of tutorials and examples\footnote{\url{https://hyperbox-brain.readthedocs.io/en/latest/tutorials/tutorial\_index.html}} under the interactive \textit{Jupyter notebook} to allow new users to explore how the classifiers in the library are used for solving classification problems.\\ \textbf{Build robustness}: The library uses GitHub Actions for continuous integration. Automated scripts are used for automated testing and building the library under different versions of Python and operating systems. Tests are executed for each commit made to master branch or when a pull request is opened.\\ \textbf{Quality assurance}: Code in the project follows the PEP8 style standard for Python. In addition, essential utility functions and code blocks with high complexity are accompanied with a set of unit tests. Furthermore, continuous integration is conducted to guarantee backward compatibility and integrate new code in an easy fashion.\\ \textbf{Community-based development}: We welcome the contributions from the community to the library via collaborative tools such as Git and GitHub. We provide a documented contribution guideline\footnote{\url{https://hyperbox-brain.readthedocs.io/en/latest/developers/contributing.html}} to describe various ways that contributors can join and contribute to the library. In addition, GitHub's issue tracker and discussion are used to discuss ideas and report bugs regarding the library. The \texttt{hyperbox-brain} library is distributed under the GPL-3.0 license. \subsection{Installation and Usage}\label{usage} The \texttt{hyperbox-brain} toolbox can be downloaded and installed via \texttt{PyPI} using the command \texttt{pip install hyperbox-brain} or from \texttt{conda-forge} using the command \texttt{conda install -c conda-forge hyperbox-brain}. It is also possible to clone the source code directly from GitHub\footnote{\url{https://github.com/UTS-CASLab/hyperbox-brain}}. In this case, the library can be installed by executing the existing setup script in the root directory through the command \texttt{python setup.py install}. Once installed, all available hyperbox-based algorithms and functions in the library can be accessed via importing the desirable class within the \texttt{hbbrain} module. A simple example of fitting and assessing a model in \texttt{hyperbox-brain} is given below. More elaborate examples and tutorials can be accessed via the online documentation. \begin{footnotesize} \begin{lstlisting}[language=Python] >>> from sklearn.datasets import load_iris >>> from sklearn.preprocessing import MinMaxScaler >>> from sklearn.model_selection import train_test_split >>> from sklearn.metrics import accuracy_score >>> from hbbrain.numerical_data.incremental_learner.onln_gfmm import OnlineGFMM >>> # Load dataset >>> X, y = load_iris(return_X_y=True) >>> # Normalise features into [0, 1] as required by hyperbox-based models >>> scaler = MinMaxScaler() >>> scaler.fit(X) MinMaxScaler() >>> XX = scaler.transform(X) >>> # Split data into training and testing sets >>> X_train, X_test, y_train, y_test = train_test_split(XX, y, test_size=0.3, random_state=42) >>> # Training a model >>> clf = OnlineGFMM(theta=0.1).fit(X_train, y_train) >>> # Make prediction >>> y_pred = clf.predict(X_test) >>> acc = accuracy_score(y_test, y_pred) >>> print(f'Accuracy = {acc * 100: .2f Accuracy = 97.78% \end{lstlisting} \end{footnotesize} \section{\texttt{scikit-learn} Compatibility} \label{compatibility} A critical property of the compatibility of \texttt{hyperbox-brain} with \texttt{scikit-learn} is the inheritance and usage of hyperparameter optimisation, model selection and evaluation, and pipeline functionalities. For example, \begin{itemize} \item \texttt{train\_test\_split} of \texttt{scikit-learn} can be used with hyperbox-based models of \texttt{hyperbox-brain} as shown in the example in subsection \ref{usage}. \item \texttt{cross\_val\_score} method of \texttt{scikit-learn} can be transparently applied to hyperbox-based models for cross-validation evaluation as below: \begin{footnotesize} \begin{lstlisting}[language=Python] >>> # Instantiating a hyperbox-based model >>> clf = OnlineGFMM(theta=0.1) >>> from sklearn.model_selection import cross_val_score >>> # usage cross_val_score on the hyperbox-based model >>> cross_val_score(clf, XX, y, cv=5) array([0.96666667, 0.96666667, 0.86666667, 0.9, 1.]) \end{lstlisting} \end{footnotesize} \item Hyperparameter search functions such as \texttt{grid\_search} and \texttt{random\_search} can be used directly for models in \texttt{hyperbox-brain} as described in the online examples\footnote{\url{https://hyperbox-brain.readthedocs.io/en/latest/tutorials/hyperparameter\_opt.html}}. \item Hyperbox-based estimators can be integrated with \texttt{Pipeline} of \texttt{scitkit-learn} to form a combination of feature engineering methods and classifiers as various examples shown in the online tutorials\footnote{\url{https://hyperbox-brain.readthedocs.io/en/latest/tutorials/pipline_integration.html}}. \end{itemize} \section{Conclusion} \texttt{hypberbox-brain} is a free licensed Python toolbox which implements popular hyperbox-based machine learning models. With the high compatibility with \texttt{scikit-learn} API, this library provides users with an easy-to-use package of algorithms which can be integrated with existing cross-validation, pipeline, model selection and evaluation techniques to formulate powerful data analytics pipelines. As shown in Fig. \ref{fig_1}, there are many existing hyperbox-based learning algorithms in the literature, therefore, we are continuously adding new models, enhancing usability, code quality, unit tests, documents, and tutorials. Finally, we strongly encourage the contributions of the community to expand this free library for the benefit of both researchers and practitioners interested in and able to benefit from this type of ML algorithms.
\section*{Acknowledgements} This work was supported by ANRT (CIFRE [2020/0870]) in collaboration with SolutionData Group and IRIT. \section{Introduction}\label{section:Intro} Machine Learning (ML) models are now widely used in the industry. However, their lack of understandability delays their adoption in high stakes domains such as the medical field \cite{markus2020role}, digital security \cite{brown2018recurrent}, judicial field \cite{tan2018distill}, or autonomous driving \cite{9616449}. In such contexts, decision-makers should understand ML models and their results to detect biases \cite{tan2018distill} or meaningless relationships \cite{ribeiro2016should}. During the last decade, the eXplainable Artificial Intelligence (XAI) field proposed a wide variety of solutions to facilitate the understanding of ML models \cite{adadi2018peeking,carvalho2019machine, molnar2020interpretable, arrieta2020explainable,doshi2017towards,lipton2018mythos,gilpin2018explaining}. In view of the growing number of XAI proposals \cite{arrieta2020explainable}, evaluating the quality of explanations has become necessary to choose an appropriate XAI solution as well as its hyperparameters. It is worth noting that the evaluation of explanations can either be done subjectively by humans or objectively with metrics \cite{nguyen2020quantitative,zhou2021evaluating,nauta2022anecdotal}. However, data scientists who want to include an XAI solution have the following issues: \begin{itemize} \item They must check which XAI solutions are compatible with the data type and the ML model. \item The XAI solutions should explain specifically what the data scientists want to understand and it should be explained in an appropriate format. \item They should evaluate the effectiveness of the explanations produced by the selected XAI solutions. \item The context requires that the explanations match specific quality criteria (called explanations' properties) which imposes the use of appropriate evaluation metrics. \item They have to find the best hyperparameters for each of the selected XAI solutions to keep the best of them. \end{itemize} These are tedious and time-consuming tasks. Theoretical guides have been proposed by \cite{Axa,Palacio_2021_ICCV} but, to the best of our knowledge, automating the complete XAI recommendation approach has never been formalized and implemented before. In this paper, we propose to automate these tasks in a framework to assist data scientists in choosing the best XAI solutions according to their context (dataset, ML model, XAI needs and constraints). Suggesting an adapted XAI solution requires defining the elements of the data scientists' contexts and using them to filter the compatible XAI solutions. This task is challenging because there are as many formalizations as there are authors in the XAI field and very few works have attempted to unify XAI elements with a formalization \cite{lundberg2017unified,Palacio_2021_ICCV,nauta2022anecdotal}. As we want to evaluate the XAI solutions, we must automatically find the XAI evaluation metrics that are compatible with the XAI solutions and are meaningful to the context. Moreover, it is necessary to find a way to validate multiple complementary properties by optimizing corresponding XAI evaluation metrics while considering the data scientists' preferences. Indeed, properties' importance is subjective and depend on the context. In addition, ranking XAI solutions requires finding the best hyperparameters using XAI evaluation metrics. As it is computationally expensive, we draw inspiration from time-saving strategies for model evaluation in AutoML \cite{he2021automl}. The contributions of this paper are as follows: \begin{itemize} \item AutoXAI, a framework that recommends XAI solutions to match the data scientists' context and optimize their hyperparameters with respect to XAI evaluation metrics \cite{zhou2021evaluating,nauta2022anecdotal}. \item A more generic formalization of the data scientists' context for XAI. \item A new evaluation metric to assess the completeness of example-based explanations. \item New time-saving strategies adapted to XAI evaluation. \end{itemize} We illustrate AutoXAI's recommendations through two use cases with different users' constraints and needs as well as different datasets and models. These studies let us uncover interactions between hyperparameters and properties of explanations, as well as interactions between the properties themselves. The rest of the paper is organized as follows. Related work are described in Section \ref{section:Related}. Formal definitions are illustrated by an example of context in Section \ref{section:exandformal}. The core of our framework is detailed in Sections \ref{section:framework} and \ref{section:time}. Experiments of Section \ref{section:experiments} show that our framework is well adapted to propose an explanation matching the user's context and that time-saving strategies considerably reduce the computation time. Finally, we conclude the paper and give possible perspectives in Section \ref{section:Conclusion}. \section{Related work}\label{section:Related} Four research topics interact in this paper: the XAI solutions, which are being assessed by XAI evaluation metrics while context-aware recommender systems and AutoML are means used to propose the most adapted solution. \subsection{XAI solutions}\label{subsection:XAI} In this paper, we define an XAI solution as any algorithm that produces an explanation related to an ML problem. This includes methods that explain black-box models but also naturally interpretable models. As mentioned in Section \ref{section:Intro}, many XAI solutions now exist and different taxonomies have been proposed such as \cite{arrieta2020explainable, carvalho2019machine,adadi2018peeking,gilpin2018explaining,nauta2022anecdotal}. \cite{carvalho2019machine} also suggests grouping XAI solutions according to the type of explanation produced. They list: feature summary, model internals, data point, surrogate intrinsically interpretable model, rule sets, explanations in natural language, and question-answering. Later, \cite{liao2020questioning} suggests that XAI explanations answer specific questions about data, its processing and results in ML. They map existing XAI solutions to questions and create an XAI question bank that supports the design of user-centered XAI applications. \cite{overton2011scientific} defines an explanation as an explanan: the answer to the question and an explanandum: what is to be explained. These two elements provide a user-friendly characterization of explanations and thus allow the user to specify which explanation is more adapted. The diversity of existing XAI solutions makes it hard to find an XAI solution adapted to one's needs. Moreover, as the XAI field is growing, more and more XAI solutions proposed in the literature are producing similar kinds of explanations. Hence, it has become necessary to objectively compare XAI solutions by assessing the effectiveness of their explanations. In this direction, the recent literature has focused on quantitative XAI evaluations \cite{nauta2022anecdotal}. \subsection{Evaluation of XAI solutions}\label{subsection:evaluation} \cite{doshi2017towards} distinguishes three strategies of evaluation: application-grounded evaluation, human-grounded evaluation, and functionality-grounded evaluation that does not imply human intervention. Application-grounded evaluation tests the effectiveness of explanations in a real-world application with domain experts and human-grounded evaluation are carried out with lay humans. While explanations are intended for humans, functionality-grounded evaluations are interesting because of their objectivity. Thus, this type of evaluation is inexpensive, fast and can lead to a formal comparison of explanation methods \cite{zhou2021evaluating}. Since the notion of "good explanations" is not trivial, some quality properties have been proposed by \cite{robnik2018perturbation}. These are man-made criteria that attest to the quality of the explanations. Functionality-grounded evaluation metrics are constructed to calculate scores to measure how well a property is met. \cite{nauta2022anecdotal} focuses on the functionality-grounded evaluation and proposed the Co-12 Explanation Quality Properties to unify the diverse properties proposed in the literature. They reviewed most XAI evaluation metrics and associate each of them with properties. Examples of their properties that will be studied in this paper are as follow: \textit{Continuity} describes how continuous and generalizable the explanation function is, \textit{Correctness} describes how faithful the explanation is w.r.t. the black box, \textit{Compactness} describes the size of the explanation, and \textit{Completeness} describes how much of the black box behavior is described in the explanation. In practice, XAI evaluation metrics produce scores for properties of interest, making it possible to compare and choose an XAI solution. However, the data scientists still have to find the desired XAI solutions and their corresponding XAI evaluation metrics. This issue could be addressed with strategies that have been studied in context-aware recommender systems. \subsection{Context-aware recommender systems}\label{subsection:CARS} Recommender systems filter information to present the most relevant elements to a user. To the best of our knowledge, there is no recommender system for XAI solutions. To recommend adapted XAI solutions, one should consider the whole context of the data scientist. According to \cite{adomavicius2011context}, context-aware recommender systems offer more relevant recommendations by adapting them to the user's situation. They also state that context may be integrated during three phases: contextual prefiltering which selects a subset of possible candidates before the recommendation, contextual modeling which uses context in the recommendation process, and contextual postfiltering which adjusts the recommendation afterward. These three phases require formally defining the elements of the context, which is one of our objectives for the framework we propose in this paper. While recommending an adapted XAI solution is a first interesting step, the data scientist eventually wants a reliable explanation, i.e. an explanation that verifies the properties of interest. To achieve this, a possible approach is to use previously detailed XAI evaluation metrics to optimize hyperparameters of adapted XAI solutions. For this kind of approach, many strategies have been proposed in the AutoML domain. \subsection{AutoML}\label{subsection:automl} Designing ML algorithms is an iterative task of testing and modifying both the architecture and the hyperparameters of the algorithm. It is a repetitive task that requires a lot of time. For this reason, a part of the research has focused on automating the design of ML algorithms, namely AutoML \cite{he2021automl}. AutoML frameworks look for the best performing ML pipeline treatment to solve a task on a given dataset. According to \cite{he2021automl}, AutoML consists of several processes: data preparation, feature engineering, model generation, and model evaluation. They divide the model generation process into two steps: search space and optimization methods. The first step defines the design principles of models that are tested, and the second is how to obtain the best scores in the model evaluation process. The main strategy of interest here is HyperParameter Optimization (HPO) which consists in finding the best hyperparameters according to a loss function. As model performances cannot be derived according to a hyperparameter, it is a non-differentiable optimization problem, therefore the HPO methods do not rely on the model to propose a solution. Moreover, since training a model until convergence is a costly operation, model evaluation is a very time-consuming step. Thus, several strategies have been proposed to accelerate the evaluation of models. \cite{he2021automl} lists four types of strategies: \textit{low fidelity}, \textit{weight sharing}, \textit{surrogate}, and \textit{early stopping}. The \textit{low fidelity} strategy consists in reducing the number of observations to reduce the number of epochs, or the size of observations to reduce the number of parameters to optimize. \textit{Weight sharing} reuses learned parameters between models. The \textit{surrogate} strategy replaces a computationally expensive model with an approximation to estimate the performance of neural architecture and guide architecture research. \textit{Early stopping} can accelerate model evaluation by stopping iterations if performances are predicted to be lower than the current best score. \subsection{Approaches for choosing an XAI solution} As mentioned in Section \ref{section:Intro}, to select an XAI solution, the data scientist can currently rely on XAI libraries, benchmarks, and AutoML frameworks. Currently, available XAI libraries such as DeepExplain \cite{ancona2017towards}, AI Explainability 360 \cite{aix360-sept-2019}, and Alibi \cite{JMLR:v22:21-0017} are gathering state-of-the-art XAI solutions. However, they neither integrate automatic evaluation of explanation nor recommend XAI solutions according to data scientists' needs and constraints. Comparatives and benchmarks \cite{yeh2019fidelity, hooker2019benchmark, alvarez2018robustness} compare XAI solutions efficiency using XAI evaluation metrics. They are often joint with the proposal of an XAI solution or an XAI evaluation metric on which they are focusing. However, the results obtained depend on the dataset and the ML model that may not be the ones the data scientist uses, and thus the results may be different. Moreover, the hyperparameters of the XAI solutions are not optimized to maximize the various properties needed by the data scientist. This last point is problematic as some XAI properties such as correctness and compactness are not independent \cite{nauta2022anecdotal}. Eventually, \cite{Axa} highlights that users should be guided in choosing XAI solutions and proposes a methodology for this issue, while \cite{Palacio_2021_ICCV} proposes a theoretical framework to facilitate the comparison between XAI solutions.\\ To summarize, as there is a high diversity of XAI solutions, it is a complex and tedious task for data scientists to find XAI solutions that fit their needs. Yet, there is no recommendation system to automate this task. Moreover, data scientists look for the best XAI solution as they want a reliable solution. XAI evaluation metrics allow for objective comparison, but XAI libraries do not implement them and comparatives are not adapted to the user's context. Eventually, data scientists have to find hyperparameters to maximize the desired properties. However, this task should be done for multiple XAI solutions and multiple properties according to the data scientists' preferences. This paper aims to address these issues in the following sections. \section{Example and formalization}\label{section:exandformal} \subsection{Illustrative example} \label{section:scenario} Let's first consider a data scientist in a medical laboratory, Alice and Bob, a physician colleague. Bob uses a ML black box model as a decision support tool and asks if it is possible to have an explanation for the predictions of the model to check some rare cases. Alice has access to the model, as well as the data that were used to build it, and now wants to implement an XAI solution to produce explanations. Here, the needs of Bob, the physician, are the following: the explanations must focus on predictions (as it is asked why they are obtained) and the XAI solution must explain a trained model without modifying it. Moreover, Bob wants to know how the collected data for a patient (the features) influence the result of the model. Regarding the constraints of the context, the high-stakes decisions impose the use of a precise model and the most faithful explanations possible (correctness property). Nevertheless, the explanations should not be completely changed by small perturbations as blood measurements might be noisy, therefore, stable explanations are mandatory (continuity property). Eventually, since Bob will be the main user of these explanations, concise explanations should be encouraged as physicians shouldn't waste time on unimportant features (compactness property). \subsection{Definitions}\label{section:formalization} \begin{definition}[Dataset] Let $X,Y$ be a dataset with $X = \{x_i\}_{i=1}^n | x_i \in \mathbb{R}^d$ the observations and $Y = \{y_i\}_{i=1}^n | y_i \in \mathbb{R}$ their corresponding labels, $n$ is the number of observations and $d$ is the number of dimensions of the dataset (also called features). \end{definition} \textit{In our illustrative example}, the diabetes dataset \cite{efron2004least} $X$ is composed of $n=442$ patients with $d=10$ features (physiological information) and $Y$ is the disease progression for each patient. \begin{definition}[ML model] A ML model is trained on a dataset $X,Y$ by inferring statistical relationships between $X$ and $Y$. This model can then be used as predictive function which we note $f:X \rightarrow \hat{Y}$ with $\hat{Y} = \{\hat{y}_i\}_{i=1}^n | \hat{y}_i \in \mathbb{R}$, the produced predictions. \end{definition} \textit{In our illustrative example}, a Multilayer Perceptron learns a predictive function $f$ that predicts the disease progressions $\hat{Y}$ based on the observations $X$ and the labels $Y$. \begin{definition}[Explanandum and explanan] We note $\mathcal{E} = \{\mathcal{E}_i\}_{i=1}^k$ the set of all possible explanandum, where the explanandum $\mathcal{E}_i$ is a descriptor for explanation functions that specifies \textit{what is explained}. We also note $\mathcal{E}^\prime = \{\mathcal{E}^\prime_j\}_{j=1}^{k^\prime}$ the set of all possible explanan, where the explanan $\mathcal{E}^\prime_j$ is a descriptor for explanation functions that specifies \textit{how it is explained}. \end{definition} \textit{In our illustrative example}, $\mathcal{E}_i=$\textit{Why this prediction?} and $\mathcal{E}^\prime_j=$\textit{feature summaries}. \begin{definition}[XAI properties] XAI properties are descriptive quality criteria for explanations. We note $P_r$, the set properties that explanations verify or not. \end{definition} \textit{In our illustrative example}, the properties of interest are correctness, continuity, and compactness. Thus, in AutoXAI the data scientist can specify the needs with $(\mathcal{E},\mathcal{E}^\prime)$ and constraints with $P_r$. \begin{definition}[XAI solution] An XAI solution acts as a function that produces one or several explanations. We note $E =\{e_t\}_{t=1}^l$, the explanations set with $l \in \mathbb{N}$ the number of explanations. We note $f_e^{(h)} : P(X,Y,F,\hat{Y}) \to E$ the explanation function with $P(X,Y,F,\hat{Y})$ a partition of $\{X,Y,F,\hat{Y}\}$ and $h$ the hyperparameters of the XAI solution. $f_e^{(h)} \in F_e$ with $F_e$ the set of explanation functions. The hyperparameters refer to the static parameters that determine the behaviors of the XAI solution. For naturally interpretable models $f=f_e^{(h)}$. \end{definition} \textit{In our illustrative example}, the XAI solutions LIME \cite{ribeiro2016should} and Kernel SHAP \cite{lundberg2017unified} are considered as $f_e^{(h)} : (X,F) \to E$. Both produce one feature importance explanation $e_t \in \mathbb{R}^d$ for each patient so that $E =\{e_t\}_{t=1}^n$. \begin{definition}[XAI evaluation metrics]\label{def:metric} An XAI evaluation metric evaluates one property and is often adapted to one specific type of explanation. We note the set of XAI evaluation metrics $M = \{m_q\}_{q=1}^{c}$, where $m_q : P(X,F,F_e,Y) \to \mathbb{R}$, with $P(X,F,F_e,Y)$ a partition of $\{X,F,F_e,Y\}$, so that $m_q$ evaluates $p_q\in P_r$. \end{definition} \textit{In our illustrative example}, robustness $m_q:(X,F_e)\to \mathbb{R}$ is an evaluation metric that assess the property of continuity $p_q$. \section{Our framework proposal}\label{section:framework} We first describe a global step-by-step AutoXAI process with its components as shown in Figure \ref{fig:archia}, then we detail the Hyperparameters Optimizer in Figure \ref{fig:archib} and eventually each component using the definitions of Section \ref{section:formalization}. Here are the operations as they are performed, starting with Figure \ref{fig:archia}: \begin{enumerate} \item The User gives the elements of the context, the parameters for AutoXAI and its preferences regarding the properties. \item The Context Adapter component selects a subset of XAI solutions matching the needs and a subset of evaluation metrics to ensure that the constraints are met. \item For each XAI solution, the Hyperparameters Optimizer looks for hyperparameters that will reduce the loss function based on the aggregated scores of the evaluation metrics. To do so, it performs the following operations in a loop, see Figure \ref{fig:archib}. \begin{enumerate} \item The Hyperparameters Estimator proposes new hyperparameters according to the chosen optimization algorithm. \item The Explainer uses the XAI solution and the newly proposed hyperparameters to produce explanations. \item The Evaluator applies the evaluation metrics to the explanations and aggregates the scores thus obtained. \end{enumerate} \end{enumerate} \begin{figure*}[t!] \centering \begin{subfigure}{\textwidth} \includestandalone[width=\textwidth]{figures/autoxai_archi1} \caption{Global architecture of AutoXAI} \label{fig:archia} \end{subfigure} ~ \begin{subfigure}{0.6\textwidth} \includestandalone[width=\columnwidth]{figures/autoxai_archi2} \caption{Details on Hyperparameters Optimizer} \label{fig:archib} \end{subfigure} \caption{Architecture of AutoXAI.} The figures are read by following the number of the steps. In Figure \ref{fig:archia}, for each XAI solution, step (3) optimizes its hyperparameters with respect to the aggregated scores of the evaluation metrics by entering the loop in Figure \ref{fig:archib}. \label{fig:archi} \end{figure*} \subsection{Context adapter}\label{subsection:context} As detailed in Section \ref{section:formalization}, XAI solutions can be grouped according to $(\mathcal{E}_i,\mathcal{E}^\prime_j)$, their explanandum and their explanan. This grouping also determines $P_{r\mathcal{E}_i,\mathcal{E}^\prime_j}$, the properties that can describe the XAI solutions, and therefore $M_{\mathcal{E}_i,\mathcal{E}^\prime_j}$, the XAI evaluation metrics that can be applied. To get $(\mathcal{E}_i,\mathcal{E}^\prime_j)$, we ask what the user wants in natural language with pre-written answers. To do so, AutoXAI uses the question bank from \cite{liao2020questioning} for explanandum proposals, letting the user choose which question the XAI solution should answer. For the explanan, AutoXAI uses the list of explanation types from \cite{carvalho2019machine}. With this knowledge, a contextual prefiltering (see Section \ref{subsection:CARS}) is possible by selecting $F_{e\mathcal{E}_i,\mathcal{E}^\prime_j}$ in $F_e$, $P_{r\mathcal{E}_i,\mathcal{E}^\prime_j}$ in $P_r$ and $M_{\mathcal{E}_i,\mathcal{E}^\prime_j}$ in $M$. This is possible by tagging each of these proposals with a tuple from $(\mathcal{E},\mathcal{E}^\prime)$ using \cite{liao2020questioning,nauta2022anecdotal} correspondence tables. $P_{r\mathcal{E}_i,\mathcal{E}^\prime_j}$ serve for contextual modeling (see Section \ref{subsection:CARS}). Indeed, the user can choose the weights (degree of importance) for each of the properties in $P_{r\mathcal{E}_i,\mathcal{E}^\prime_j}$. These weights are used in the evaluation of the XAI solutions which guide the optimization and therefore the ranking of XAI solutions that are produced. 1 is the default value, increasing a weight $w_q$ makes its property $p_q$ more important and conversely, 0 means that the property is ignored. In addition to these elements, AutoXAI can retrieve the model and the dataset on which it was trained if necessary. \subsection{Hyperparameters estimator} This component's goal is to propose new hyperparameters to obtain the best aggregated score. The optimization algorithms are iterative and some, such as Bayesian optimization \cite{nogueira2014bayesian}, associate the hyperparameters to a score for building a probabilistic model. This probabilistic model estimates the hyperparameters that should give the best score. Here, $f_e$, with previously estimated hyperparameters, is evaluated with the aggregated scores of $M_{\mathcal{E}_i,\mathcal{E}^\prime_j}$ (further detailed in Section \ref{subsection:evaluator}) and it results in a new entry to update the probabilistic model. This component estimates hyperparameters according to previous score results in case there are. Otherwise, the values of the hyperparameters are set according to the initialization of the chosen algorithm, for example at random. \subsection{Explainer component} This component's objective is to produce explanations using the XAI solution and the defined hyperparameters. As the implementations of XAI solutions vary in their programming paradigm and in the data structure they use and return, it is necessary to set up a wrapper that standardizes the input and output for each XAI solution of a given group. This component serves as a base to include all implemented XAI solutions and is made to be completed with new XAI solutions. \subsection{Evaluator component}\label{subsection:evaluator} This component aims at computing the scores of XAI evaluation metrics corresponding to the XAI properties requested by the user. Like the precedent component, this one also acts as a wrapper that standardizes the input and output of XAI evaluation metrics and serves as a base to include any XAI evaluation metrics. It also aggregates the properties' scores to provide a unique optimization objective for HPO. To find the best hyperparameters $h$ of the XAI solution $f_e$, we define the optimization objective as follows: \begin{equation} \max_{h\in H}A(f_e,h) \end{equation} With $A$ the aggregation function and $H$ the set of every possible hyperparameters. $A$ should gather the multiple scores returned by the XAI evaluation metrics assessing the properties chosen and weighted according to the user's preferences for properties. To do so, we opt for a linear scalarization \cite{miettinen2012nonlinear}: \begin{equation}\label{eq:agg_score} A(f_e,h)=\frac{1}{c^\prime}\sum _{q=1}^{c^\prime}w_{q} \times sc_q(m_q(f_e^{(h)})) \end{equation} The XAI evaluation metric for $p_q$ is written $m_q(f_e^{(h)})$ for a shorter notation, thought it might use any partition of $\{X,F,F_e,Y\}$ as defined in \ref{def:metric}. $c^\prime$ is the number of chosen properties and therefore XAI evaluation metrics. The weights $w_q$ are the degree of importance set by the user and $sc_q(.)$ is a scaling function based on previous results for a property $p_q$. This scaling function allows not to favor one XAI evaluation metric over another. For the first epoch, there are no previous results and scaling cannot be defined. Therefore, we initialize $sc_q(.)$ using the evaluation scores of XAI solutions with the default hyperparameters. This cold start also verifies whether XAI solutions can perform well with default hyperparameters. Although this framework already produces a ranking of XAI solutions, the computation time should be taken into account. \section{Time-saving evaluation strategies}\label{section:time} Some XAI solutions and XAI evaluation metrics were not designed to be used multiple times in a row and have high algorithmic complexity. To reduce the time cost of these algorithms, without changing their architecture, we propose to adapt the existing heuristic strategies from the AutoML field. AutoXAI adapts three AutoML strategies to reduce computing time: low fidelity which becomes sampling, early stopping, and weight sharing which becomes information sharing. These strategies are detailed below. \subsubsection{Sampling} Reducing the number of explanations produced reduces the number of operations in explanation making and in explanation evaluation. It is also possible to use a subset of the dataset to create explanations, which can reduce the number of operations for explanation making. These approximations can be accurate enough depending on the diversity of the dataset, the complexity of the model, and the sensitivity of the XAI solution. This issue is addressed by specifying the percentage of explanations to be processed. \subsubsection{Early stopping} Early stopping can be performed during the calculation of the XAI evaluation metric or the HPO. In both cases, this strategy can save a lot of time but it must be set up correctly to avoid approximating too roughly. For the calculation of evaluation metrics, this option is only possible if the XAI evaluation metric is applied sequentially to the explanations. Moreover, this strategy is more efficient if explanations are also calculated sequentially, indeed, fewer explanations are computed this way. The stopping condition is that the XAI evaluation metric only updates itself by a small percentage below a threshold during multiple iterations. We then consider that it stabilizes. For early stopping applied to HPO, the reasoning is that if the best score does not change during several iterations, then it has been found. Here, the choice of a threshold matters to avoid missing a better solution. \subsubsection{Information sharing} Another way to save computing time is to reuse intermediate results and share information between evaluations. In AutoML, the weight-sharing strategy of an old model speeds up the training of a new one \cite{he2021automl}. In AutoXAI, some intermediate calculations can be reused in the same way. This strategy is especially efficient for some costly intermediate calculations like a Gaussian process \cite{alvarez2018robustness}. \begin{table*}[] \caption{XAI evaluation metrics} \resizebox{\textwidth}{!}{ \begin{tabular}{|c|c|c|} \hline \textbf{Property}&\textbf{Metric}&\textbf{Formula}\\ \hline \textit{Continuity}&\textbf{Robustness}&$\hat{L}(x_i)=\max\limits_{x_j\in B_\epsilon(x_i)}\frac{\|f_e^{(h)}(x_i)-f_e^{(h)}(x_j)\|_2}{\|x_i-x_j\|_2}$ \\&& \parbox{17cm}{With $B_\epsilon(x_i)$ a ball of radius $\epsilon$* centered in $x_i$ the studied data point. The optimization method looks for the point in the data space with the highest ratio in the neighborhood. This value is kept as a measure for the lack of robustness $\hat{L}(x_i)$.}\\ \hline \textit{Correctness}&\textbf{Infidelity}&$INFD(e_i,f,x_i) = \mathbb{E}_{I\sim\mu I}[(I^Te_i-(f(x_i)-f(x_i-I)))^2]$ \\&& With $I$, perturbations around $x_i$ so that $I = x_i - x_i'$, here we choose a noisy implementation with $x_i' = x_i + \epsilon$ and $\epsilon$ a uniform noise.\\ \hline \textit{Compactness}&\textbf{Number of features}&$NoF(e_i) = \operatorname{Card}(e_i)$ \\&& With $e_i \in E$, the $i$-th explanation vector, a feature summary.\\ \hline \textit{Completeness}&\textbf{Non-representativeness}& $NR(E) = \frac{1}{n}\sum\limits_{i=1}^n \min\limits_{e_j\in E} d(x_i,e_j)$ \\&& With $n=\operatorname{Card}(X)$, $d$ a distance function and $E$ the explanations set composed of representative data points $e_j$ also called prototypes.\\ \hline \textit{Compactness}&\textbf{Diversity}&$Div(E) = \sum\limits_{\{e_i,e_j\} \in P_2(E)}\frac{d(e_i,e_j)}{C_2^l} $\\(\textit{Redundancy})&& With $P_2(E)$, the set of combinations of two prototypes, $d$ a distance function and $C_2^l$ the number of combination with $l=\operatorname{Card}(E)$ prototypes.\\ \hline \textit{Compactness}&\textbf{Number of prototypes}& $NoP(E) = \operatorname{Card}(E)$ \\(\textit{Size})&& With $E$, the prototypes set. \\ \hline \multicolumn{3}{l}{\small{*The implementation is a box having the size of the standard deviation, it is a variation proposed by the original authors.}} \end{tabular}} \label{tab:evaluation} \end{table*} \section{Experiments}\label{section:experiments} In the following experiments, an implementation of the AutoXAI framework described in Section \ref{section:framework} is applied to two use cases including the illustrative example described in Section \ref{section:scenario}. The code to reproduce the results of these use cases is available at \url{https://github.com/RobinCugny/AutoXAI}. \subsection{Diabetes estimation}\label{subsection:expe_diab} For the illustrative example, the datasets used are diabetes dataset \cite{efron2004least} and Pima Indians dataset \cite{smith1988using}. Diabetes dataset has 10 features and is designed for a regression task to predict disease progression. Pima Indians dataset has 8 features and is made for a binary classification to predict if patients have diabetes. The black box model used is the scikit-learn implementation of a Multilayer Perceptron \cite{scikit-learn}. For the regression we use MLPRegressor\footnote{\url{https://scikit-learn.org/stable/modules/generated/sklearn.neural_network.MLPRegressor.html}} and for the classification we use MLPClassifier\footnote{\url{https://scikit-learn.org/stable/modules/generated/sklearn.neural_network.MLPClassifier.html}}. The implemented XAI solutions are LIME \cite{ribeiro2016should} and Kernel SHAP \cite{lundberg2017unified}. LIME provides explanations using the weights of a local linear model for each observation. SHAP captures features' interactions using Shapley values \cite{shapley1953} as previously done by \cite{strumbelj2010efficient}. We use Kernel SHAP, one of their contributions, that builds a linear model like LIME but uses Shapley values as coefficients and therefore as feature importance. In this paper, SHAP refers to Kernel SHAP for short. The implemented XAI evaluation metrics and their corresponding properties are: \begin{itemize} \item \textbf{Robustness} \cite{alvarez2018robustness} \textit{Continuity} \item \textbf{Infidelity} \cite{yeh2019fidelity} \textit{Correctness} \item \textbf{Number of features} \cite{rosenfeld2021better} \textit{Compactness} \end{itemize} \cite{alvarez2018robustness} proposes the measure of \textbf{robustness} that evaluates \textit{Continuity} by adapting Lipschitzian continuity. The objective is to measure changes in explanations while the input has small perturbations. Indeed, explanations should not radically change if the observation does not either. \cite{yeh2019fidelity} proposes to evaluate \textit{Correctness} with an \textbf{infidelity} metric. It consists in perturbing the input, based on the order of the features in explanations, and measuring for each new input the change in the output of the predictive function $f$. The \textit{Compactness} is evaluated with the \textbf{number of features} which is obtained with the cardinal of the explanation vector. See Table \ref{tab:evaluation} for the formulas. For the aggregation in this scenario, Alice and Bob set the weights to 1, 2, 0.5 for \textbf{robustness}, \textbf{infidelity} and \textbf{number of features} respectively. Alice, sets the number of epochs to 25. The HPO strategy is a Bayesian optimization, we use \cite{nogueira2014bayesian} implementation of the Gaussian Process. The time-saving evaluation strategies are early stopping for XAI evaluation metrics computation and HPO, and information sharing for robustness and infidelity. For robustness, information shared between epochs are the data points giving the maximum score of robustness (see Table \ref{tab:evaluation}) we call maxima for short. For infidelity, the information shared between epochs are the generated perturbation points and the model predictions for them. An extract from the ranking produced by AutoXAI for Diabetes dataset is in Table \ref{table:results_diab} and the one for Pima Indians dataset is in Table \ref{table:results_pima}. The XAI solutions are sorted in descending order according to the Aggregated score produced by Equation \ref{eq:agg_score}. To show diverse XAI solutions we present three combinations of hyperparameters with LIME and three with SHAP. The choice of the number of features in the explanation is a subjective process requiring to visualize the explanations, we decide on a number of features of 1, 3, and 5. Thus, the user can verify if short explanations are enough to understand the prediction or if more features would help. In the Hyperparameter columns, the two first hyperparameters for LIME as for SHAP are: first, the number of features in the explanation, and second, the number of perturbations used to build the linear model. The last hyperparameter for SHAP is the l1 regularization to use for feature selection\footnote{\url{https://shap-lrjball.readthedocs.io/en/latest/generated/shap.KernelExplainer.html}}. \begin{table*}[] \centering \small \caption{Extract from the ranking produced by AutoXAI on Diabetes dataset.} \begin{tabular}{@{}c|ccc|cc@{}} \hline \begin{tabular}[c]{@{}l@{}}Aggregated\\score\end{tabular} & \begin{tabular}[c]{@{}l@{}}Scaled\\Robustness\end{tabular} & \begin{tabular}[c]{@{}l@{}}Scaled\\Fidelity\end{tabular}& \begin{tabular}[c]{@{}l@{}}Scaled\\NoF\end{tabular}& \begin{tabular}[c]{@{}l@{}}XAI\\Solution\end{tabular}& Hyperparameters \\ \hline 1.023 & 0.727 & 0.833 & 1.351 & LIME & 1;3656 \\ 1.019 & 0.703 & 0.991 & 0.745 & LIME & 3;8782 \\ 0.963 & 0.682 & 1.068 & 0.139 & LIME & 5;5392 \\ -0.287 & 0.310 & -0.924 & 1.351 & SHAP & 1;1304;auto \\ -0.633 & -0.319 & -0.975 & 0.745 & SHAP & 3;1571;aic \\ -0.639 & 0.014 & -1.000 & 0.139 & SHAP & 5;1148;aic \end{tabular} \label{table:results_diab} \end{table*} \begin{table*}[] \centering \small \caption{Extract from the ranking produced by AutoXAI on Pima Indians dataset.} \begin{tabular}{@{}c|ccc|cc@{}} \hline \begin{tabular}[c]{@{}l@{}}Aggregated\\score\end{tabular} & \begin{tabular}[c]{@{}l@{}}Scaled\\Robustness\end{tabular} & \begin{tabular}[c]{@{}l@{}}Scaled\\Fidelity\end{tabular}& \begin{tabular}[c]{@{}l@{}}Scaled\\NoF\end{tabular}& \begin{tabular}[c]{@{}l@{}}XAI\\Solution\end{tabular}& Hyperparameters \\ \hline 1.412 & 0.744 & 1.435 & 1.243 & LIME & 1;5347 \\ 1.282 & 0.575 & 1.325 & 1.243 & SHAP & 1;509;bic \\ 0.361 & 0.633 & 0.117 & 0.430 & LIME & 3;8329 \\ 0.176 & 0.339 & -0.014 & 0.430 & SHAP & 3;713;auto \\ 0.070 & 0.262 & 0.070 & -0.383 & SHAP & 5;537;bic \\ -0.185 & 0.599 & -0.481 & -0.383 & LIME & 5;7023 \end{tabular} \label{table:results_pima} \end{table*} \begin{figure} \begin{subfigure}{.5\textwidth} \includegraphics [width=\textwidth]{figures/diabetes_scores.pdf} \caption{Scores of XAI solutions for Diabetes dataset} \label{fig:diab_scores} \end{subfigure} ~ \begin{subfigure}{.5\textwidth} \includegraphics [width=\textwidth]{figures/pima_scores.pdf} \caption{Scores of XAI solutions for Pima indians dataset} \label{fig:pima_scores} \end{subfigure} \caption{Robustness loss and Fidelity loss} \end{figure} Regarding Table \ref{table:results_diab}, LIME is systematically higher than SHAP in the rankings with these XAI evaluation metrics. Several factors could explain why SHAP does not score better: with default hyperparameters, SHAP has lower average robustness than LIME on certain UCI classification datasets \cite{Dua:2019} (glass, wine, and leukemia) and especially a larger standard deviation \cite{alvarez2018robustness}. For Diabetes dataset, as we can see in Figure \ref{fig:diab_scores}, we also observe a large standard deviation and higher average robustness loss for SHAP with different hyperparameters. We observe especially that it has constantly a higher fidelity loss with a narrow distribution on this score. According to \cite{yeh2019fidelity}, this means that SHAP captures less well how the model prediction changes in response to the perturbations. As Kernel SHAP relies on LIME strategy to build a local linear model, this means that the loss might come from the inclusion of Shapley values. A hypothesis here would be that the black box model does not make much use of the relationships between features or not in the same way as Kernel SHAP detects it with its linear approximation. Besides, a similar conclusion has already been observed in \cite{DBLP:conf/dolap/DoumardAEEMS22}. Regarding the Pima Indians dataset, however, it seems that SHAP performs slightly better. In Figure \ref{fig:pima_scores}, we can see that SHAP is less robust than LIME most of the time but that it has equivalent fidelity. Here SHAP seems to succeed in capturing the predictor function changes, therefore it might find more feature interactions in common with the model. Compactness has an impact on the other properties \cite{nauta2022anecdotal}. Moreover, Bob, the physician, should observe the explanations to confirm the number of features that are necessary to understand the prediction. Thus, it is appropriate to compare the XAI solutions using the aggregated score while taking into account the number of features. For that, let's pick a particular observation from the Diabetes dataset. The model makes a prediction and Bob asks \textit{Why this prediction?} and wants to know the features contributing to this prediction. The explanations produced by the XAI solutions recommended by AutoXAI are in Figure \ref{fig:explanations}. At the bottom right is LIME with default hyperparameters. We can see that some features have little influence on the prediction and are useless to answer the question of Bob. With these different-sized explanations, Bob can see what is important and what is negligible to him. He can thus choose the size of explanation he wants, keeping in mind the scores of the properties and the aggregated score. \begin{figure} \includegraphics [width=0.49\columnwidth]{figures/lime_exp_1.pdf} \includegraphics [width=0.49\columnwidth]{figures/lime_exp_3.pdf} \includegraphics [width=0.49\columnwidth]{figures/lime_exp_5.pdf} \includegraphics [width=0.49\columnwidth]{figures/lime_exp_10.pdf} \caption{Different sizes of explanations produced by LIME for an observation from Diabetes dataset} \label{fig:explanations} \end{figure} \subsection{SPAM detection} For the second use case, let's first describe the context. We consider a computer security manager in a laboratory, Charli. The staff complains about receiving spam in the chat service of the laboratory. Charli manages this service and knows little about ML, Charli wants to use an ML algorithm to automatically detect spam. Therefore, Charli finds an off-the-shelf GloVe embedding \cite{pennington2014glove} and implement a LSTM \cite{10.1162/neco.1997.9.8.1735}. Charli trains the model on a spam dataset, obtains a good accuracy, and decides to try it one week on the chat service. At the end of this week, a colleague of Charli shows a message that has not been sent because suspected as a spam. Therefore, Charli ends up wondering "Where does the model fail ?", more specifically, "What do false positives and false negatives look like?". To answer these questions, Charli wants to implement an XAI solution. In the end, Charli wants to use this knowledge to be able to explain to users the decisions made with their data and possibly reduce the error rate. Charli needs examples of messages with specific predictions to know what they look like. Therefore, we define $\mathcal{E}_{i'}=$\textit{What kind of data lead to this prediction?} and $\mathcal{E}^\prime_{j'}=$\textit{data points as explanations} (also called prototypes). For the constraints of the context, Charli does not want to miss any type of message leading to an error. Ideally, Charli wishes that each data point should have a similar prototype (completeness). However, Charli also wants to avoid having too many prototypes and avoid redundancies (compactness). \begin{table*}[] \caption{Extract from the ranking produced by AutoXAI on SMS Spam dataset} \centering \begin{tabular}{c|ccc|cc} \hline Aggregated & Scaled & Scaled & Scaled & XAI & Hyperparameters \\score & Representativeness & Diversity & NoP & solution & \\ \hline 0.483 & 0.904 & 0.248 & -0.303 & k-medoids & heuristic;300;pam;cosine;16 \\ 0.466 & 0.463 & 0.412 & 0.030 & MMD-critic & 1.000;13 \\ 0.384 & 0.224 & 0.201 & 0.251 & Protodash & gaussian;11.90;11 \\ 0.367 & -0.660 & 0.589 & 0.917 & MMD-critic & 1.000;5 \\ 0.331 & -0.444 & 0.048 & 0.917 & k-medoids & build;224;alternate;cosine;5 \\ 0.255 & -0.580 & 0.092 & 0.917 & Protodash & gaussian;21.43;5 \end{tabular} \label{table:results_spam} \end{table*} The dataset used is derived from the UCI SMS Spam dataset \cite{Dua:2019}, it has 8714 features for 5572 data samples and was built using TFIDF \cite{jones1972statistical}. Charli separates the dataset into 4 subsets according to the model results: true positives, true negatives, false positives, and false negatives. Thus, the ML model (GloVe and LSTM) is no longer necessary for this experiment. The implemented XAI solutions are MMD-critic \cite{kim2016examples}, Protodash \cite{gurumoorthy2019efficient} and k-medoids \cite{kaufman1990partitioning}. MMD-critic \cite{kim2016examples} proposes prototypes as explanations. To accurately represent the data distribution, it minimizes the discrepancy between the prototypes distribution and the data distribution. It also proposes critics which are points that are not well represented by the prototypes. Protodash \cite{gurumoorthy2019efficient} generalizes \cite{kim2016examples}, it is a fast prototype selection that also associates non-negative weights to prototypes which are indicative of their importance. Eventually, although it was not proposed for XAI, we use k-medoids \cite{kaufman1990partitioning} as it is a baseline that gives comparable results. It finds medoids (prototypes here) such that the distance between one prototype and the other points of its data group is minimal. The implemented XAI evaluation metrics and their corresponding properties are: \begin{itemize} \item \textbf{Non-representativeness} \textit{Completeness} \item \textbf{Diversity} \cite{nguyen2020quantitative} \textit{Compactness} (\textit{redundancy}) \item \textbf{Number of prototypes} \textit{Compactness} (\textit{size}) \end{itemize} We propose a new \textbf{non-repre\-sen\-ta\-ti\-ve\-ness} metric to assess whether there is a close prototype for each data sample on average. Unlike \cite{nguyen2020quantitative}, it is model-agnostic, as XAI solutions that do not use an ML model should not be evaluated according to the ML model. To assess the \textit{Compactness}, we use the \textbf{number of prototypes} for the size of the explanation and \textbf{diversity}. For \textbf{diversity}, we adapt \cite{nguyen2020quantitative} proposal to measure the mean distance between prototypes. As \textbf{diversity} and \textbf{number of prototypes} are fundamentally different, we consider that they correspond to two different sub-properties (\textit{redundancy} and \textit{size} respectively) and let the user give a weight to each. See Table \ref{tab:evaluation} for the formulas. For the aggregation in this scenario, Charli sets the weights to 2, 1, 2 for \textbf{non-representativeness}, \textbf{diversity} and \textbf{number of prototypes} respectively. Charli, sets the number of epochs to 25. The HPO strategy is also the Gaussian Process here. An extract from the ranking produced by AutoXAI for SMS Spam dataset is in Table \ref{table:results_spam}. As previously, the XAI solutions are sorted in descending order according to the Aggregated score. For each XAI solution, we present 2 results, the overall best score and the best score for a number of prototypes lower or equal to 5. In the Hyperparameter columns, k-medoids has the following hyperparameters: the initialization method, the maximum number of iterations, the algorithm to use, the metric and the number of medoids to generate \footnote{\url{https://scikit-learn-extra.readthedocs.io/en/stable/generated/sklearn_extra.cluster.KMedoids.html}}. MMD-critic has the following hyperparameters: the gamma value and the number of prototypes to find. Protodash has the following hyperparameters: the kernel to use, the value of sigma, and the number of prototypes to find. \begin{table*}[] \caption{Computation time and scores for LIME evaluation without and with the time-saving evaluation strategies} \resizebox{\textwidth}{!}{ \begin{tabular}{ccccccccc} \cmidrule[\heavyrulewidth]{2-9} & \multicolumn{2}{c}{No strategy} & \multicolumn{2}{c}{Early stopping} & \multicolumn{2}{c}{Information sharing} & \multicolumn{2}{c}{Both strategies} \\ \cline{2-9} & Time & Score & Time & Score & Time & Score & Time & Score \\ \hline Robustness & 488.04 $\pm$ 14.79 & -70.67 $\pm$ 0.64 & 17.45 $\pm$ 1.37 & -67.41 $\pm$ 3.26 & 34.15 $\pm$ 1.70 & -69.22 $\pm$ 2.24 & 1.22 $\pm$ 0.13 & -67.62 $\pm$ 3.12\\ Infidelity & 11.84$\pm$ 0.27 & -5.29 $\pm$ 0.06 & 0.46 $\pm$ 0.05 & -5.00 $\pm$ 0.78 & 9.32 $\pm$ 0.37 & -5.40 $\pm$ 0.12 & 0.35 $\pm$ 0.03 & -5.48 $\pm$ 0.6\\ \bottomrule \multicolumn{9}{l}{\small{Computation times are in seconds. For evaluation scores, the higher, the better.}} \end{tabular}} \label{table:time-saved} \end{table*} \begin{figure} \begin{subfigure}{.5\textwidth} \centering \includegraphics [width=\textwidth]{figures/rpz-vs-nop.pdf} \caption{Influence of the number of prototypes on representativeness} \label{fig:rpz_nop} \end{subfigure} ~ \begin{subfigure}{.5\textwidth} \centering \includegraphics [width=\textwidth]{figures/div-vs-nop.pdf} \caption{Influence of the number of prototypes on diversity} \label{fig:div_nop2} \label{div_nop_main} \end{subfigure} \caption{Influence of properties on each others for SMS Spam dataset} \end{figure} Regarding Table \ref{table:results_spam}, we observe that k-medoids has the best Aggregated score with high representativeness. We also observe that the representativeness score is systematically lower with fewer prototypes. This trend is shown in Figure \ref{fig:rpz_nop}. It can be seen that representativeness is more important with more prototypes. Indeed, intuitively, the more prototypes there are, the more likely it is that a data point is close to one of them. It results in a trade-off between compactness and completeness that encourage choosing appropriate weights for the properties. In Table \ref{table:results_spam}, we observe that the two algorithms for k-medoids (pam and alternate) are performing well, while Protodash seems to have better results with the Gaussian kernel. This is confirmed in Figure \ref{fig:div_nop2} where Protodash performs better in terms of diversity with Gaussian kernel while k-medoids have equivalent results with pam and alternate algorithm. MMD-critic regularly has the best scores in diversity and k-medoids has a higher variance in scores on both diversity and representativeness. Using the best scoring XAI solution on the SMS Spam dataset, Charli obtains the following prototypes for false positives: \begin{itemize} \item Hey pple...\$700 or \$900 for 5 nights...Excellent location wif breakfast hamper!!! \item Unlimited texts. Limited minutes. \end{itemize} As well as the following protoypes for false negatives: \begin{itemize} \item FROM 88066 LOST £12 HELP \item Money i have won wining number 946 wot do i do next \end{itemize} With these representative examples, Charli can explain to users what kind of messages the model may misclassify and can work on the data and the ML model while tracking predictions for these messages. \subsection{Time-saving evaluation strategies} Preliminary results for time-saving evaluation strategies (see Section \ref{section:time}) are obtained on the first use case (see Section \ref{subsection:expe_diab}) with diabetes dataset and MLPRegressor model. The XAI solution is LIME with default hyperparameters and the XAI evaluation metrics are robustness and infidelity. AutoXAI is run on a laptop with a 2.40 GHz octa-core CPU. Table \ref{table:time-saved} shows the average with its standard deviation of computation time and evaluation score. Early stopping saves 96.42\% of the time for robustness and 96.13\% for infidelity. Information sharing saves 93\% of the time for robustness and 21.26\% of the time for infidelity. For Information sharing with robustness, the maxima used for computing scores are obtained with LIME with other hyperparameters, hence the scores difference. With infidelity, the generated perturbation points and their corresponding predictions are obtained with another seed which explains the small difference in score compared to the no strategy baseline. Using both strategies saves 99.75\% of the time for robustness and 97\% for infidelity. \section{Conclusion and perspectives}\label{section:Conclusion} In this paper, we propose AutoXAI, a framework that recommends the best XAI solutions according to the context of its user. AutoXAI automates the tedious task of selecting an XAI solution and its hyperparameters. It produces a ranking of solutions taking into account the preferences of the user. Although AutoXAI is system-centric like AutoML, here the user specifies the needs, the constraints and chooses the XAI solution in the ranking. It saves time and does not require the user to have deep knowledge of XAI. AutoXAI can also serve a researcher who wants to test an XAI proposal and monitor results. Indeed, as AutoXAI tests multiple XAI evaluation metrics on multiple XAI solutions and hyperparameters, potential relationships could be discovered. In this paper, we show there might be a trade-off between properties. Compactness, in particular, should be monitored and the user should decide by checking the explanations. The choice of one explanation over another one may raise ethical issues. Indeed, encouraging too much particular properties of explanations can lead to bias. For instance, reducing the number of prototypes can lead to missing the less represented data samples. Alternatively, a small number of features in an explanation can hide a bias in a model. A short-term work could complement AutoXAI with new adaptations of AutoML methods. Longer perspectives should be to apply AutoXAI in a real-world setting and analyze users' feedback to assess its usefulness and give opportunities to improve it. Lastly, studying the influence of XAI properties on each other will be an important topic of study in the field of XAI solution evaluation. \bibliographystyle{unsrtnat}
\section{Introduction} The study of differences and similarities between positive definite Finsler geometry and indefinite Finsler geometry is still in its beginnings and far from complete \cite{Voicu2018,Fuster:2020upk,Javaloyes:2022hph}. The most prominent application of indefinite (to be precise Lorentzian) Finsler geometry is the one of Finsler spacetimes in classical and quantum gravitational physics \cite{Tavakol_1986,Voicu:2009wi,Pfeifer:2011xi,Lammerzahl:2018lhw,Pfeifer_2019,Hohmann_2019,Hohmann:2019sni,Lobo:2020qoa,Addazi:2021xuf, Kapsabelis:2022plf,Carvalho:2022sdz,Garcia-Parrado:2022ith,Zhu:2022blp}, which recently put \mbox{(pseudo-)Riemannian} geometry and its applications into the focus of interest \cite{Pfeifer:2011tk,Minguzzi:2014fxa,Gomez-Lobo:2016qik,Minguzzi2016,Javaloyes2018,Hohmann:2020mgs,Minculete_2021,Aazami:2022bib,Javaloyes:2022fmp}. Hence, a better understanding of the properties of indefinite Finsler geometry would be of great interest for physics as well as for mathematics. \\ Berwald spaces constitute an important class of Finsler spaces. They can be defined by the property that the canonical (Cartan) non-linear connection reduces to a linear connection on the tangent bundle \cite{Berwald1926}. It is natural to ask under what conditions this linear connection is (Riemann) \textit{metrizable}, in the sense that there exists a \mbox{(pseudo-)Riemannian} metric that has the given linear connection as its Levi-Civita connection. In positive definite Finsler geometry the answer to this question was given in 1988 by Szabo's well-known metrization theorem \cite{Szabo}, which guarantees that in this case the connection is \textit{always} metrizable. In the more general context, where the fundamental tensor is allowed to have arbitrary, not necessarily positive definite, signature, the situation is more complex. It only became clear very recently that Szabo's metrization theorem cannot be extended in general to arbitrary signatures~\cite{Fuster_2020}. In other words, there exist Finsler metrics of Berwald type (most examples being not positive definite and not smooth on the entire slit tangent bundle) for which the affine connection is not metrizable by a \mbox{(pseudo-)Riemannian} metric. It would be of great interest to know the precise conditions for metrizability in this more general context. As a first step in this direction, we investigate in this article the metrizability of a specific class of Finsler metrics, namely $m$-Kropina metrics with a closed null 1-form. The main result in this article, Theorem \ref{theorem:main}, states that the affine connection of such a space is metrizable if and only if the Ricci tensor constructed from the affine connection is symmetric, and gives a second equivalent characterization in terms of the local expression of the defining \mbox{(pseudo-)Riemannian} metric and 1-form. \\ $m$-Kropina metrics, also called generalized Kropina metrics, were introduced by Hashiguchi, Hojo and Matsumoto in \cite{Hashiguchi1973} as a generalization of the standard Kropina metric \cite{Kropina}. While the original Kropina metric has found a wide range of applications, $m$-Kropina metrics gained some popularity in the physics literature when it was discovered that they can be used to describe a modification of special relativity with local anisotropy \cite{Bogoslovsky,Bogoslovsky1973}, named very special relativity (VSR) \cite{Cohen:2006ky, Gibbons:2007iu} and later generalized to \textit{Very General Relativity} (VGR) \cite{Fuster:2018djw} or \textit{General Very Special Relativity} (GVSR) \cite{Kouretsis:2008ha} in order to account for spacetime curvature, leading to physical predictions from curved $m$-Kropina spacetime geodesics \cite{Elbistan:2020mca} and pp-waves\cite{Fuster:2015tua}. \\ The structure of this article is as follows. We start in section \ref{sec:FSFST} by recalling the basic notions of Finsler geometry that are relevant for our purpose and Szabo's metrization theorem for positive definite Berwald spaces. In section \ref{sec:VGR} we recall the definition of $m$-Kropina metrics and the precise necessary and sufficient condition under which they are of Berwald type (section \ref{sec:berwald_condition}). In fact we provide a new proof of this Berwald condition in apppendix \ref{app:BerwCondProof}. Subsequently in section \ref{sec:metrizability} we specialize to $m$-Kropina metrics constructed from a \mbox{(pseudo-)Riemannian} metric $\alpha$ and a 1-form $\beta$ that is null with respect to this metric and closed. We first prove Lemma \ref{lem:coordinates}, stating that such a space is of Berwald type if and only if $\alpha$ and $\beta$ have a very specific form in local coordinates. In particular, when the signature of $\alpha$ is Lorentzian, $\alpha$ belongs to a certain subclass of the Kundt class and $\beta$ generates the corresponding null congruence. This construction generalizes in a natural way to arbitrary signature. The coordinates introduced in this lemma allow us to find a simple expression for the linear connection coefficients and the skew-symmetric part of the affine Ricci tensor. We then prove our main result, Theorem \ref{theorem:main}, providing two equivalent necessary and sufficient conditions for metrizability: symmetry of the affine Ricci tensor and a local condition for the coordinate expressions of the \mbox{(pseudo-)Riemannian} metric $\alpha$. We end with a conclusion and discussion of the work in section \ref{sec:conc}. \section{Finsler geometry}\label{sec:FSFST} Finsler geometry is a natural extension of Riemannian geometry \cite{Finsler,Bao,Szilasi}. Given the philosophy that the length of a curve is obtained by integrating the norm of the tangent vector along the cuve, Finsler geometry provides the most general way of assigning, smoothly, a length to curves on a smooth manifold. While in Riemannian geometry the length of a tangent vector is given by a quadratic (metric-induced) norm, Finsler geometry relaxes this quadratic requirement. \\ First of all some remarks about notation are in order. Throughout this work we will usually work in local coordinates, i.e., given a smooth manifold $M$ we assume that some chart $\phi:U\subset M\to \mathbb R^n$ is provided, and we identify any $p\in U$ with its image $(x^1,\dots,x^n) = \phi(p)\in\mathbb R^n$. For $p\in U$ each $Y\in T_pM$ in the tangent space to $M$ at $p$ can be written as $Y = y^i\partial_i\big|_p$, where the tangent vectors $\partial_i \equiv \frac{\partial}{\partial x_i}$ furnish the chart-induced basis of $T_pM$. This provides natural local coordinates on the tangent bundle $TM$ via the chart \begin{align} \tilde\phi: \tilde U \to \mathbb R^n\times\mathbb R^n,\qquad \tilde U = \bigcup_{p\in U} \left\{p\right\}\times T_p M\subset TM,\qquad \tilde\phi(p,Y) = (\phi(p),y^1,\dots,y^n)\eqqcolon (x,y). \end{align} These local coordinates on $TM$ in turn provide a natural basis of its tangent spaces $T_{(x,y)}TM$, namely \begin{align} \bigg\{\partial_i\equiv \frac{\partial}{\partial x^i}, \bar{\partial}_i\equiv \frac{\partial}{\partial y^i}\bigg\}. \end{align} \subsection{Finsler spaces} For our purposes, a Finsler space is triple $(M,\mathcal A,F)$, where $M$ is a smooth manifold, $\mathcal A$ is a conic subbundle\footnote{By conic subbundle we mean a non-empty open subset $\mathcal A\subset TM\setminus\{0\}$ such that for any $(x,y)\in\mathcal A$ it follows that $(x,\lambda y)\in\mathcal A$ for any $\lambda>0$.} of $TM\setminus\{0\}$ with non-empty fibers and $F$, the so-called Finsler metric, is a continuous map $F: TM\setminus\{0\}\to \mathbb R$, smooth on $\mathcal A$, that satisfies the following axioms: \begin{itemize} \item $F$ is positively homogeneous of degree one with respect to $y$: \begin{align} F(x,\lambda y) =\lambda F(x, y)\,,\quad \forall \lambda>0\,; \end{align} \item The \textit{fundamental tensor}, with components $g_{ij} = \bar\partial_i\bar\partial_j \left(\frac{1}{2}F^2\right)$, is non-degenerate on $\mathcal A$. \end{itemize} In the positive definite setting (i.e. if $g_{ij}$ is assumed to be positive definite) one usually requires that $\mathcal A = TM\setminus\{0\}$. In the more general setting, however, this would exclude almost all interesting examples that have been studied in the literature. In fact there there is no consensus on a standard definition of Finsler space when the signature is indefinite (see e.g. \cite{Beem,Asanov,Pfeifer:2011tk, Pfeifer:2011xi, Javaloyes2014-1, Javaloyes2014-2}). A fundamental result essential for doing computations in Finsler geometry is Euler's theorem for homogeneous functions, which states that if a function $f$ is positively homogeneous of degree $r$, i.e., $f(\lambda y) =\lambda^r f(y)$ for all $\lambda>0$, then $y^i\frac{\partial f}{\partial y_i}(y) = r f(y)$. In particular, this implies the identity \begin{align} g_{ij}(x,y)y^i y^j = F(x,y)^2. \end{align} The coefficients of the \textit{Cartan non-linear connection}, the unique homogeneous (non-linear) connection on $TM$ that is smooth on $\mathcal A$, torsion-free and compatible with the Finsler metric, can be expressed as \begin{align} N^i_j(x,y) = \frac{1}{4}\bar{\partial}_j \bigg(g^{ik}\big(y^l\partial_l\bar{\partial}_k F^2 - \partial_k F^2\big)\bigg). \end{align} Torsion-freeness is the property that $\bar\partial_iN^k_j = \bar\partial_jN^k_i$, and metric-compatibility is the property that $\delta_k F^2 $ $\equiv \left(\partial_k-N^\ell_k\bar\partial_\ell\right)F^2 $ $=0$. Alternatively, metric compatibility can be defined by the property that $\nabla g_{ij} \equiv y^k\delta_k g_{ij} - N^k_i g_{kj} - N^k_j g_{ki} = 0$. For torsion-free homogeneous connections the latter definition of metric-compatibility is equivalent to the former. The curvature tensor, Finsler Ricci scalar and Finsler Ricci tensor of $(M,F)$ are defined, respectively, as \begin{align}\label{eq:definition_curvatures} R^i{}_{jk}(x,y) = -[\delta_j,\delta_k]^i = \delta_j N^i_k(x,y)-\delta_k N^i_j(x,y),\qquad \text{Ric}(x,y) = R^i{}_{ij}(x,y)y^j,\qquad R_{ij}(x,y) = \frac{1}{2}\bar\partial_i \bar\partial_j\text{Ric}. \end{align} \subsection{Berwald spaces} \label{sec:Berwald} A Finsler space is said to be of Berwald type\footnote{See \cite{Szilasi2011} for an overview of the various equivalent characterizations of Berwald spaces and \cite{Pfeifer:2019tyy} for a more recent one in terms of a first order partial differential equation.} if the Cartan non-linear connection defines a linear connection on $TM$, or in other words, an affine connection on the base manifold, in the sense that the connection coefficients are of the form \begin{align} N^i_j(x,y) = \Gamma^i_{jk}(x)y^k \end{align} for a set of smooth functions $\Gamma^i_{jk}:M\to\mathbb R$. From the transformation behavior of $N^i_j$ it follows that the functions $\Gamma^i_{jk}$ have the correct transformation behavior to be the connection coefficients of a (torsion-free) affine connection on $M$. We will refer to this affine connection as the associated affine connection, or simply \textit{the} affine connection on the Berwald space. In addition to the curvature tensors defined in Eq. \eqref{eq:definition_curvatures} one may define additional curvature tensors for Berwald spaces, namely the ones associated to the uniquely defined affine connection. \begin{align}\label{eq:affine_curvatures} \bar R_l{}^i{}_{jk}= 2\partial_{[j} \Gamma^i_{k]l} + 2\Gamma^i_{m[j}\Gamma^m_{k]l}, \qquad \bar R_{lk} = \bar R_l{}^i{}_{ik}, \end{align} where we have employed the notation $T_{[ij]} = \frac{1}{2}\left(T_{ij}-T_{ji}\right)$ and $T_{(ij)} = \frac{1}{2}\left(T_{ij}+T_{ji}\right)$ for (anti-)symmetrization. We will refer to these as the \textit{affine curvature tensor} and the \textit{affine Ricci tensor}, respectively. We note that $\bar R_l{}^i{}_{jk}$ coincides (up to some reinterpretations) with the $hh$-curvature tensor of the Chern-Rund connection. A straightforward calculation reveals the following relation between the different curvature tensors \begin{align} \label{eq:symm_ricci} R^j{}_{kl} = \bar R_i{}^j{}_{kl}(x)y^i, \qquad \text{Ric} = \bar R_{ij}(x)y^i y^j, \qquad R_{ij} = \frac{1}{2}\left(\bar R_{ij}(x) + \bar R_{ji}(x)\right). \end{align} It is appropriate to stress here that, although $R_{ij}$ and $\bar R_{ij}$ coincide in the positive definite setting and more generally whenever the Finsler function is defined on all of $\mathcal A = TM\setminus\{0\}$ \cite{Fuster_2020}, this is \textit{not} true in general, as $\bar R_{ij}$ need not be symmetric. As this distinction is essential for our results we end this section with a schematic overview of some important properties of the two Ricci tensors.\\ \noindent \textbf{Ricci tensors} \begin{enumerate} \item The \textit{Finsler Ricci Tensor} $ R_{ij}$ is constructed from the canonical non-linear connection associated to $F$, according to Eq. \eqref{eq:definition_curvatures}. The Finsler Ricci Tensor: \begin{itemize} \item Always exists; \item Is symmetric, by definition; \item Contains the same information as the \textit{Finsler Ricci scalar}. More precisely, Ric $= R_{ij} y^i y^j$ and $R_{ij} = \frac{1}{2}\bar\partial_i \bar\partial_j\text{Ric}$. \end{itemize} \item The \textit{affine Ricci Tensor} $\bar R_{ij}$ is constructed from the affine connection associated to $F$ according to Eq. \eqref{eq:affine_curvatures}. The affine Ricci Tensor: \begin{itemize} \item Exists only for Berwald spaces, because otherwise there is no uniquely defined affine connection; \item Coincides with the Ricci tensor\footnote{In principle one could list the Ricci tensors associated to the four well-known linear connections in Finsler geometry here as well, but we will not do so here. For Berwald spacetimes they are all identical anyway.} constructed from any of the four well-known linear connections associated to $F$ (Chern-Rund, Berwald, Cartan, Hashiguchi); \item Is \textit{not} necessarily symmetric (except in the positive definite case). Its symmetrization coincides with the Finsler Ricci Tensor, see Eq. \eqref{eq:symm_ricci}. \end{itemize} \end{enumerate} In this work we are primarily concerned with the \textit{affine Ricci tensor}, and in particular its property of being in general \textit{not} symmetric, as it can be used to characterize whether a given Finsler space is metrizable or not. \subsection{Szabo's metrization theorem} Given a Finsler space of Berwald type, the Cartan non-linear connection defines a linear connection on $TM$, by definition. Hence the natural question arises whether there exists a \mbox{(pseudo-)Riemannian} metric (desirably of the same signature) that has this connection as its Levi-Civita connection. Simply put, is every Berwald space metrizable? For positive definite Finsler spaces defined on all of $TM\setminus\{0\}$ the answer is affirmative, as proven by Szabo \cite{Szabo}. \begin{theor}[Szabo's metrization theorem] Any positive definite Berwald space is metrizable by a Riemannian metric. \end{theor} The proof of this theorem relies on averaging procedures \cite{CrampinAveraging} for which it is essential that the Finsler function $F$ is defined everywhere on $TM\setminus\{0\}$. In the case of Finsler \textit{spacetimes}, however, the domain where $F$ is defined is typically only a conic subset of $TM\setminus\{0\}$ and hence the classical proof does not extend to this case. It was indeed shown in \cite{Fuster_2020} that Szabo's metrization theorem is in general not valid for Finsler spacetimes. The culprit behind all counterexamples known to the authors is the fact that the affine Ricci tensor is in general not symmetric. Clearly the property that the affine Ricci tensor be symmetric is a necessary condition for metrizability. We will see (Theorem \ref{theorem:main}) that for $m$-kropina spacetimes with closed 1-form this is in fact also a sufficient condition, at least locally. \section{m-Kropina metrics}\label{sec:VGR} An $m$-Kropina space (sometimes called generalized Kropina space) is a Finsler space of $(\alpha,\beta)$-type with a Finsler function of the form $F = \alpha^{1+m}\beta^{-m}$, where $\alpha = \sqrt{a_{ij}(x)y^iy^j}$ is constructed from a \mbox{(pseudo-)Riemannian} metric $a = a_{ij}\text{d} x^i\text{d} x^j$, $\beta = b_iy^i$ is constructed from a 1-form $b = b_i\text{d} x^i$ and $m$ is a real parameter. By a slight abuse of terminology one also refers to $\alpha$ and $\beta$ simply as the \mbox{(pseudo-)Riemannian} metric and the 1-form, respectively. We also introduce the notation $b^2 \equiv ||b||^2 = a_{ij}b^ib^j$ for the squared norm of $\beta$ with respect to $\alpha$. Throughout the remainder of this article all indices are raised and lowered with $a_{ij}$. \\ In the physics literature spacetimes with metric of $m$-Kropina type have been dubbed \textit{Very General Relativity} (VGR) spacetimes \cite{Fuster:2018djw} or \textit{General Very Special Relativity} (GVSR) spacetimes \cite{Kouretsis:2008ha}, introduced as generalizations of \textit{Very Special Relativity} (VSR) \cite{Cohen:2006ky,Gibbons:2007iu}, which appears in the limiting case where $\alpha$ is flat. In the latter case the corresponding $m$-Kropina metric is often referred to as the Bogoslovsky line element. When $m=1$ the $m$-Kropina metric reduces to the standard Kropina metric \cite{Kropina} $F = \alpha^2/\beta$. \subsection{The Berwald condition}\label{sec:berwald_condition} The Berwald condition for m-Kropina spaces $F = \alpha^{1+m}\beta^{-m}$ formulated by Matsumoto in\footnote{The result is proven only for \textit{non-null} 1-forms $\beta$ in Theorem 6.3.2.3 on page 904 of \cite{handbook_Finsler_vol2}, but as long as the dimension of the manifold is greater than 2 the proof is still completely valid also for null 1-forms, as the other results around Theorem 6.3.2.3 clearly show.} \cite{handbook_Finsler_vol2} states that such a space is of Berwald type if and only if there exists a vector field $f^i$ on $M$ such that \begin{align}\label{eq:VGR_Berwald_new} \nabla_j b_i = m (f_k b^k)a_{ij} + b_i f_j - m f_i b_j. \end{align} Here and throughout the remainder or the article $\nabla$ denotes the Levi-Civita connection corresponding to the \mbox{(pseudo-)Riemannian} metric $\alpha$. In the special case that $\beta$ is a closed and hence locally exact 1-form, any $f_k$ satisfying this condition can always be written as $f_k = cb_k$ for some function\footnote{Note that our $c$ is related to $C(x)$ in \cite{Fuster:2018djw} by $C(x) = (1+m)c/2$. Also note that our power $m$ is related to the power $n$ in \cite{Fuster:2018djw} by $n = -2m/(1+m)$.} $c$ on the base manifold and the condition reduces to the simpler one obtained in \cite{Fuster:2018djw}, namely \begin{align}\label{eq:VGR_Berwald_old} \nabla_j b_i = c \left[ mb^2 a_{ij} + (1-m)b_i b_j\right], \end{align} To see this, assume that Matsumoto's Berwald condition \eqref{eq:VGR_Berwald_new} holds. We have $(\text{d} b)(\partial_i,\partial_j)= \partial_i b_j -\partial_j b_i = \nabla_i b_j - \nabla_j b_i = (1+m)(f_i b_j - f_j b_i)$, so if $b_i$ is locally exact then this expression vanishes and hence $f_i b_j = f_j b_i$ must hold for all $i,j$, which is only possible if $f_i$ is proportional to $b_i$ (this can be checked easily at any given point in $M$ by choosing coordinates in which $b_i$ has only one non-vanishing component at that point). In other words, $f_k = cb_k$. In this case \eqref{eq:VGR_Berwald_new} reduces to \eqref{eq:VGR_Berwald_old}. \\ Note that the opposite holds (trivially) as well: the latter condition implies that $\beta$ is locally exact. The fact that \eqref{eq:VGR_Berwald_new} and \eqref{eq:VGR_Berwald_old} do not agree for 1-forms $\beta$ that are not closed has recently caused some confusion and this seems like a good opportunity to resolve this issue. It turns out the reason for the discrepancy is that the contribution of the anti-symmetric part of the covariant derivative of $\beta$ was overlooked in the proof given in \cite{Fuster:2018djw}. Indeed in appendix \ref{app:BerwCondProof} we reproduce the argument from \cite{Fuster:2018djw} taking the anti-symmetric part into account, and we show that the resulting Berwald condition coincides with \eqref{eq:VGR_Berwald_new}, as expected. Thus, we want to stress here again that \eqref{eq:VGR_Berwald_new} is the correct Berwald condition in general, whereas \eqref{eq:VGR_Berwald_old} only applies to the case in which the 1-form $\beta$ is closed.\\ As also proved in \cite{handbook_Finsler_vol2}, whenever the condition \eqref{eq:VGR_Berwald_new} is satisfied, the affine connection coefficients of the Berwald space can be expressed in terms of the Christoffel symbols ${}^\alpha\Gamma^k_{ij}$ for the Levi-Civita connection corresponding to $\alpha$ as \begin{align} \Gamma^\ell_{ij} = {}^\alpha\Gamma^\ell_{ij} + m a^{\ell k}\left(a_{ij}f_k - a_{jk}f_i - a_{ki}f_j\right). \end{align} When the 1-form $\beta$ is closed, and we write $f_k = cb_k$ as before, this reduces to \begin{align}\label{eq:affine_conn} \Gamma^\ell_{ij} = {}^\alpha\Gamma^\ell_{ij} + m c \left(a_{ij}b^\ell - \delta^\ell_j b_i - \delta^\ell_i b_j\right), \end{align} which agrees with the result obtained in \cite{Fuster:2018djw}. \subsection{Metrizability of $m$-Kropina spaces with closed null 1-form} \label{sec:metrizability} From here onwards we will focus on $m$-Kropina metrics with closed null 1-form and we will assume that $n=\dim M>2$. In other words, we will assume that $\text{d} b = 0$ and $b^2 = a_{ij}b^ib^j=0$. This will allow us to deduce the exact conditions for local metrizability. As a remark we point out that the case $m=1$ is excluded by our definition of Finsler space, as can be seen from the expression of the determinant of the fundamental tensor, \begin{align} \frac{\det g}{\det a} = (1+m)^3\alpha^{8m}|\beta|^{-2(1+4m)}\left(m b^2\alpha^2 + (1-m)\beta^2\right), \end{align} which vanishes identically when $m=1$ and $b^2=0$.\\ The following lemma extends a result from \cite{Gomez-Lobo:2016qik}. We will use the convention that indices $a,b,c,\dots$ run from $3$ to $n$, whereas indices $i,j,k,\dots$ run from $1$ to $n$. \begin{lem}\label{lem:coordinates} $F$ is Berwald if and only if around each $p\in M$ there exist local coordinates $(u,v,x^3,\dots,x^n)$ such that\footnote{By the product notation $\text{d} u\text{d} v$ we mean the symmetrized tensor product $\text{d} u \text{d} v \equiv (1/2)(\text{d} u\otimes \text{d} v + \text{d} v \otimes \text{d} u)$ and similarly in other instances.} \begin{align} {\normalfont a = -2\text{d} u\text{d} v + H(u,v,x)\text{d} u^2 + W_a(u,x)\text{d} u\text{d} x^a + h_{ab}(u,x)\text{d} x^a\text{d} x^b,\quad b = \text{d} u}, \end{align} with $h$ some \mbox{(pseudo-)Riemannian} metric. In this case the metric satisfies the Berwald condition $\eqref{eq:VGR_Berwald_old}$ with \begin{align} c =- \frac{\partial_v H}{2(1-m)}. \end{align} \end{lem} \begin{proof} First, we may pick coordinates $(v,x^2,\dots,x^n)$ around $p$ adapted to $b$ in the sense that $b =\partial_v$, i.e. $b^i = \delta^i_1$. At this point the metric has the general form $a = a_{ij}\text{d} x^i\otimes\text{d} x^j$. (Abusing notation a little bit, $b$ sometimes denotes the 1-form and sometimes the vector field uniquely corresponding to it via the isomorphism induced by $a$. It should be clear from context which is meant.). The null character of $b$ manifests as the fact that $a_{11}=a_{vv}=0$ in these coordinates. Because $b$ is closed and hence locally exact, we may write, locally, $b= \text{d} u$ for some function $u(v,x^2,\dots,x^n)$. Equivalently, $b_i = \partial_i u$. Note also that $\partial_i u = b_i = a_{ij}b^j = a_{ij}\delta^j_1 = a_{i 1}$. Since $a_{11}=0$ it follows that $\partial_v u=\partial_1 u=0$. As $b\neq 0$ by assumption, there must be some $i\geq 2$ such that $\partial_i u = a_{i1}\neq 0$ in a neighborhood of $p$. Order the coordinates $x^2,\dots,x^n$ such that this is true for $i=2$, i.e. assume without loss of generality that $a_{21}\neq 0$. Next define the map \begin{align} x = (v,x^2,\dots,x^n)\mapsto \tilde x = (v,u(x^2,\dots,x^n),x^3,\dots,x^n). \end{align} Its Jacobian matrix and its inverse are given by \begin{align} J^i{}_j = \frac{\partial\tilde x^i}{\partial x^j} = \begin{pmatrix} 1 & 0 & 0 & 0&\hdots & 0 \\ 0 & a_{21} & a_{31} & a_{41} & \hdots & a_{n1} \\ 0 & 0 & 1 & 0 & \hdots & 0 \\ 0 & 0 & 0 & 1 & \hdots & 0\\ \vdots & \vdots & \vdots & \vdots & \ddots & \vdots \\ 0 & 0 & 0 & 0 & \hdots & 1 \end{pmatrix},\qquad (J^{-1})^i{}_j = \frac{\partial x^i}{\partial \tilde x^j} &= \begin{pmatrix} 1 & 0 & 0 & 0&\hdots & 0 \\ 0 & 1/a_{21} & -a_{31}/a_{21} & -a_{41}/a_{21} & \hdots & a_{n1}/a_{21} \\ 0 & 0 & 1 & 0 & \hdots & 0 \\ 0 & 0 & 0 & 1 & \hdots & 0\\ \vdots & \vdots & \vdots & \vdots & \ddots & \vdots \\ 0 & 0 & 0 & 0 & \hdots & 1 \end{pmatrix} \end{align} and since $\det J = a_{21}\neq 0$ this matrix is invertible, so $x\mapsto \tilde x$ is a local diffeomorphism at $p$. It remains to find the form of the metric in the new coordinates. We have \begin{align} \tilde a_{ij} = \frac{\partial x^k}{\partial \tilde x^i} \frac{\partial x^\ell}{\partial \tilde x^j}a_{k\ell},\qquad \text{i.e.} \qquad \tilde a = J^{-1T}aJ^{-1}. \end{align} Therefore \begin{align} \tilde a_{11} &= (J^{-1}{}^T)_1{}^i a_{ij}(J^{-1}{})^j{}_1 = a_{11} = 0,\\ \tilde a_{12} &= (J^{-1}{}^T)_1{}^i a_{ij}(J^{-1}{})^j{}_2 = 1 \\ \tilde a_{1b} &= (J^{-1}{}^T)_1{}^i a_{ij}(J^{-1}{})^j{}_b = a_{12}(-a_{b1}/a_{21}) + a_{1b} = 0,\qquad b = 3,\dots, n. \end{align} This shows that $a = \tilde a_{ij}\text{d} \tilde x^i\text{d} \tilde x^j = 2\text{d} u\text{d} v + H\text{d} u^2 + W_b\text{d} u\text{d} x^b + h_{bc}\text{d} x^b\text{d} x^c$ for certain functions $H$, $W_a$, $h_{ab}$, and hence after a redefinition $v \to -v$ we may write the metric in the form \begin{align} a = -2\text{d} u\text{d} v + H\text{d} u^2 + W_b\text{d} u\text{d} x^b + h_{bc}\text{d} x^b\text{d} x^c. \end{align} It follows from the easily checked fact that $\det h = -\det a \neq 0$ that $h_{ab}$ is itself a \mbox{(pseudo-)Riemannian} metric of dimension $n-2$.\\ Our arguments thus far are independent of whether the $m$-Kropina space is of Berwald type or not. All we have used is that the \mbox{(pseudo-)Riemannian} metric $a$ admits a 1-form that is null and closed. We will prove next that the $m$-Kropina space is Berwald if and only if the functions $W_a$ and $h_{ab}$ do not depend on coordinate $v$. To this end we employ the Berwald condition \eqref{eq:VGR_Berwald_new}. In fact, since the 1-form is assumed to be closed we may use the simpler version, Eq. \eqref{eq:VGR_Berwald_old}. And since the 1-form is null ($b^2=0$) as well, this condition reduces to \begin{align}\label{1} \nabla_i b_j = c(1-m)b_ib_j. \end{align} The $m$-Kropina space is Berwald if and only if there exists a function $c$ on $M$ such that this condition is satisfied. On the other hand, computing $\nabla_i b_j$ explicitly in the new coordinates, using the fact that $b_i = \delta^u_i$ and $g^{ui} = -\delta^i_v$ and $g_{iv} = 0$, yields \begin{align}\label{2} \nabla_ib_j = -\frac{1}{2}\frac{\partial a_{ij}}{\partial v}. \end{align} Combining equations \eqref{1} and \eqref{2}, using again that $b_i = \delta^u_i$, yields $c(1-m)\delta^u_i\delta^u_j = -\partial_va_{ij}/2$, or equivalently, \begin{align} c =- \frac{\partial_v H}{2(1-m)}\qquad \&\qquad \partial_v W_a = \partial_vh_{ab} = 0. \end{align} From this it follows that $F$ is Berwald if and only if $\partial_v W_a = \partial_vh_{ab} = 0$, and that $c$ is in that case given by the desired expression, completing the proof. \end{proof} From here onwards we will assume our space is Berwald. Substituting the form of $c$ into Eq. \eqref{eq:affine_conn} and using that $b_i = \delta^u_ i$ and consequently $b^\ell = a^{\ell k}b_k =a^{\ell k}\delta^u_k = a^{\ell u} = -\delta^\ell_v$, we obtain the following. \begin{cor}\label{cor:connection_coeff} In the coordinates $(u,v,x^3,\dots,x^n)$, the affine connection coefficients can be expressed in terms of the Levi-Civita Christoffel symbols ${}^\alpha\Gamma^k_{ij}$ of the \mbox{(pseudo-)Riemannian} metric $\alpha$ as \begin{align} \Gamma^k_{ij} = {}^\alpha\Gamma^k_{ij} + \Delta\Gamma^k_{ij} \equiv {}^\alpha\Gamma^k_{ij} + \frac{m}{2(1-m)}\partial_v H \left(a_{ij}\delta^k_v + \delta^k_j \delta^u_ i + \delta^k_i \delta^u_ j\right) \end{align} \end{cor} We can use the preceding results to analyze the (deviation from the) symmetry of the affine Ricci tensor, which has a very simple expression in these coordinates, as the following result shows. \begin{lem}\label{lem:ricci} In the coordinates $(u,v,x^3,\dots,x^n)$, the skew-symmetric part of the affine Ricci tensor is given by \begin{align} \bar R_{[ij]} = -\frac{mn}{4(1-m)}(\delta^u_i\partial_j\partial_vH-\delta^u_j\partial_i\partial_vH) \end{align} \end{lem} \begin{proof} From the definition \eqref{eq:affine_curvatures} of the affine Ricci tensor of a Berwald space it follows that its skew-symmetric part can be written as \begin{align} \bar R_{[ij]} \equiv \frac{1}{2}\left(\bar R_{ij} - \bar R_{ji}\right) = \partial_{[k}\Gamma^k_{j]i} - \partial_{[k}\Gamma^k_{i]j}. \end{align} We now use the expression for the connection coefficients found in Corollary \ref{cor:connection_coeff}. Note that \begin{align} \Delta\Gamma^k_{kj} = \frac{m}{2(1-m)}\partial_v H\left(a_{vj} + \delta^u_ j+ n \delta^u_j\right) = \frac{mn}{2(1-m)}\partial_v H \delta^u_j. \end{align} Substituting this in the skew-symmetric part of the affine Ricci tensor we obtain \begin{align} \bar R_{[ij]} &= \partial_{[k}\Gamma^k_{j]i} - \partial_{[k}\Gamma^k_{i]j} = \partial_{[k}\Delta\Gamma^k_{j]i} - \partial_{[k}\Delta\Gamma^k_{i]j} = \frac{1}{2}\left(-\partial_{j}\Delta\Gamma^k_{ki} + \partial_{i}\Delta\Gamma^k_{kj}\right) \\ &= \frac{mn}{4(1-m)}\left(\delta^u_j\partial_{i}\partial_v H-\delta^u_i\partial_{j}\partial_v H \right), \end{align} where we have used the fact that the Ricci tensor corresponding to $\alpha$ is symmetric. \end{proof} Let us now prove our main result. \begin{theor}\label{theorem:main} Let $(M,F=\alpha^{1+m}\beta^{-m})$ be an $m$-Kropina space of Berwald type with closed null 1-form $\beta$. The following are equivalent: \begin{enumerate}[(i)] \item The affine connection is locally metrizable by a \mbox{(pseudo-)Riemannian} metric \item The affine Ricci tensor is symmetric, $\bar R_{ij} = \bar R_{ji}$ \item There exist local coordinates $(u,v,x^3,\dots,x^n)$ such that \begin{align} {\normalfont a = -2\text{d} u\text{d} v + \left[\tilde H(u,x) + \phi(u)v\right]\text{d} u^2 + W_a(u,x)\text{d} u\text{d} x^a + h_{ab}(u,x)\text{d} x^a\text{d} x^b,\quad b = \text{d} u}, \end{align} with $h$ some \mbox{(pseudo-)Riemannian} metric of dimension $n-2$. \end{enumerate} In this case the affine connection is metrizable, in the chart corresponding to the coordinates $(u,v,x^3,\dots x^n)$, by the following \mbox{(pseudo-)Riemannian} metric: \begin{align}\label{eq:metrizing_metric} {\normalfont \tilde a = e^{\frac{m}{1-m}\int^u \phi(\tilde u)\text{d} \tilde u } a} \end{align} \end{theor} Before we present the proof, we want to point out two things. First, we note that if $\phi = 0$ then $\tilde a = a$, i.e. the affine connection is metrizable by the defining \mbox{(pseudo-)Riemannian} metric $\alpha$. This was to be expected, since in that case the 1-form $\beta$ is parallel with respect to $\alpha$. It is a well-known result that any $(\alpha,\beta)$-metric for which $\beta$ is parallel with respect to $\alpha$, is of Berwald type, and that its affine connection coicides with the Levi-Civita connection of $\alpha$. Second, since $\tilde a$ is conformally equivalent to $a$, the two metrics have identical causal structure and moreover their null geodesics coincide (as unparameterized curves). This implies that the null geodesics of any $F$ satisfying any (and hence all) of the equivalent conditions of Theorem \ref{theorem:main} coincide with the null geodesics of the defining \mbox{(pseudo-)Riemannian} metric $\alpha$. \begin{proof} (i) trivially implies (ii). For (ii)$\Rightarrow$(iii) we use the preferred coordinates introduced in the lemma above. By Lemma \ref{lem:ricci}, the only non-vanishing skew symmetric components of the affine Ricci tensor are \begin{align} \bar R_{[uj]} = -\frac{mn}{4(1-m)}\partial_j\partial_vH,\qquad j = 2,\dots, n. \end{align} Note that the fact that there's an index $u$ on the LHS and an index $v$ on the RHS is not a typo. The anti-symmetric part of the $uj$ component of the Ricci tensor, are determined by the $vj$-derivative of $H$. By assumption the Ricci tensor is symmetric. The $uv$ component therefore yields $\partial_v^2 H = 0$ and the remaining components yield $\partial_v\partial_{a} H=0$, $a = 3,\dots n$. % In other words, $H$ must be linear in $v$ and the corresponding linear coefficient can depend only on the coordinate $u$. That is, \begin{align} g = -2\text{d} u\text{d} v + \left[\tilde H(u,x) + \phi(u)v\right]\text{d} u^2 + W_a(u,x)\text{d} u\text{d} x^a + h_{ab}(u,x)\text{d} x^a\text{d} x^b. \end{align} This proves $(ii)\Rightarrow(iii)$. For the last implication $(iii)\Rightarrow (i)$, recall from Corollary \ref{cor:connection_coeff} that the affine connection coefficients can be expressed as \begin{align} \Gamma^k_{ij}= {}^\alpha\Gamma^k_{ij} + \Delta\Gamma^k_{ij} \equiv {}^\alpha\Gamma^k_{ij} + \frac{m}{2(1-m)}\phi(u) \left(a_{ij}\delta^k_v + \delta^k_j \delta^u_ i + \delta^k_i \delta^u_ j\right) \end{align} On the other hand, an elementary calculation shows that the Levi-Civita Christoffel symbols of a \mbox{(pseudo-)Riemannian} metric $\tilde a = e^{\psi(u)}a$ can be expressed in terms of the original Christoffel symbols as \begin{align} {}^{\tilde a}\Gamma^\ell_{ij} = {}^\alpha\Gamma^k_{ij} +\frac{1}{2}\psi'(u) \left(a_{ij}\delta^\ell_v + \delta^\ell_j \delta^u_ i + \delta^\ell_i \delta^u_ j\right). \end{align} Hence, since $\psi'(u) = -2mc = \frac{m}{1-m}\phi(u)$ for the \mbox{(pseudo-)Riemannian} metric $\tilde a$ indicated in the theorem, it follows that the connection coefficients of $\tilde a$ coincide with the affine connection coefficients of our $m$-Kropina metric. This completes the proof of the theorem. \end{proof} Theorem \ref{theorem:main} provides necessary and sufficient conditions for an m-Kropina space with closed null 1-form to be locally metrizable. In the next section we apply our results to an explicit example from the physics literature. \subsection{An explicit example: Finsler VSI spacetimes} In this section we apply our results to the Finsler VSI spacetimes presented in \cite{Fuster:2018djw}, with the 4-dimensional Finsler metric \begin{align} F = \left(-2\text{d} u \text{d} v +\left[\tilde H(u,x,y) + \phi(u,x,y)v\right]\text{d} u^2 + W_1(u,x,y)\text{d} u\text{d} x + W_2(u,x,y)\text{d} u\text{d} y +\text{d} x^2 + \text{d} y^2\right)^{(1+m)/2}\left(\text{d} u\right)^{-m}, \end{align} By Lemma 2, this spacetime is of Berwald type. It is in general not metrizable since the corresponding affine Ricci tensor is not symmetric. By Theorem \ref{theorem:main}, the exact condition for metrizability in this case is that $\partial_x\phi = \partial_y\phi = 0$. The case $\phi=0$ provides a Finsler version of the gyratonic pp-wave metric \cite{gyraton,Maluf2018}, which according to Theorem \ref{theorem:main} is metrizable by the Lorentzian gyratonic pp-wave metric.\\ A simple non-trivial locally metrizable example is provided by the case where $\tilde H(u,x,y) = 0$, $\phi(u,x,y)=u$ and $W_a(u,x,y) =0$. This leads to the Finsler metric \begin{align} F = \left(-2\text{d} u \text{d} v + u\,v\,\text{d} u^2 + \text{d} x^2 + \text{d} y^2\right)^{(1+m)/2}\left(\text{d} u\right)^{-m}, \end{align} which has an affine connection given by following non-vanishing affine connection coefficients: \begin{align} \Gamma^u_{uu} = \frac{1+m}{2(1-m)}u, \quad \Gamma^v_{uu} = -\frac{1-m-u^2}{2(1-m)}v, \quad \Gamma^v_{uv} = -\frac{u}{2}, \quad \Gamma^v_{xx} = \Gamma^v_{yy} = \Gamma^x_{ux} = \Gamma^y_{uy} = -\frac{-m}{2(1-m)}u. \end{align} As indicated by Eq. \eqref{eq:metrizing_metric} in Theorem \ref{theorem:main} this connection is metrizable by the Lorentzian metric \begin{align} \tilde g = e^{\frac{m u^2}{2(1-m)} }\left(-2\text{d} u \text{d} v + u\,v\,\text{d} u^2 + \text{d} x^2 + \text{d} y^2\right). \end{align} \section{Discussion}\label{sec:conc} Recent developments around the non-metrizability of Berwald spaces of indefinite (in particular, Lorentzian) signature contrast the well-known metrizability theorem by Szabo for \textit{positive definite} Berwald spaces. These findings inspired us to investigate the question of metrizability for $m$-Kropina Finsler metrics constructed from a \mbox{(pseudo-)Riemannian} metric and a closed null 1-form, in this article. Our main result, Theorem \ref{theorem:main}, gives a necessary and sufficient condition for local metrizability, namely that the \textit{affine Ricci tensor} -- the Ricci tensor constructed from the affine connection, not to be confused with the more commonly discussed Finsler Ricci tensor -- must be symmetric. Also, in the coordinates introduced in Lemma \ref{lem:coordinates}, any Berwald $m$-Kropina metric attains a pretty simple form. It can then be seen at a glance whether a given geometry is locally metrizable or not. Moreover, in the metrizable case our theorem gives the explicit form of a (non-unique) \mbox{(pseudo-)Riemannian} metric that `metrizes' the affine connection, in terms of those coordinates.\\ The question of metrizability is not only a natural one from the mathematical point of view, but it is also of interest in the realm of physics. In particular, in the field of Finsler gravity, which asserts that the spacetime geometry of our physical universe might be Finslerian. One of its postulates is that physical objects and light rays moving only under the influence of gravity, follow Finslerian geodesics through spacetime. If the Finsler metric on spacetime were metrizable, this would imply that these trajectories reduce to the geodesics of a \mbox{(pseudo-)Riemannian} metric, precisely as is the case in Einstein gravity\footnote{It is not the case that the whole theory can be reduced to \mbox{(pseudo-)Riemannian} geometry, however. In order accurately describe, for instance, the causal character of the geodesics, or the flow of proper time attributed to observers, one would still need the Finsler metric.}. Apart from obvious mathematical implications, it would be interesting to investigate the conceptual and physical consequences of this as well.\\ It would obviously be of great interest to have a generalization of Theorem \ref{theorem:main} to arbitrary Finsler spaces of Berwald type. To this effect, we note that, curiously, all examples of non-metrizable Berwald spaces currently available in the literature, as well as all of the additional examples known privately to the authors, have an affine Ricci tensor that is not symmetric. Together with the results obtained in this article in the specific case of $m$-Kropina metrics, this leads us to hypothesize that perhaps a Berwald space is metrizable by a \mbox{(pseudo-)Riemannian} metric if and only if its affine Ricci tensor is symmetric. In fact, some general results about Riemann-metrizability of arbitrary symmetric affine connections are known \cite{Tanaka:2011we,Tamassy1996,Schmidt1973}. An affine connection is metrizable if and only if the holonomy group is a subgroup of the generalized \mbox{(pseudo-)orthogonal} group \cite{Schmidt1973}. Hence, a future project is to investigate the structure of the holonomy group of the affine connection corresponding to a Berwald space and how it relates to the geometry-defining Finsler function. \begin{acknowledgments} C.P. was funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) - Project Number 420243324 and acknowledges support from cluster of excellence Quantum Frontiers funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy - EXC-2123 QuantumFrontiers - 390837967. All of us would like to acknowledge networking support by the COST Action CA18108, supported by COST (European Cooperation in Science and Technology). \end{acknowledgments} \newpage
\section{Introduction}\label{s:0} \subsection{Motivation and backgrounds} The motivation of this note is to investigate the Hopf algebroid structure of elliptic quantum groups and its relation to the Hopf algebra structure of Ding-Iohara quantum algebras. Let us explain briefly these two objects, Ding-Iohara quantum algebras and elliptic quantum groups. \subsubsection*{Ding-Iohara quantum algebras} Ding and Iohara \cite{DI} introduced a family of (topological or formal) Hopf algebras which generalize the Drinfeld realization \cite{D} of the quantum affine algebras $U_q(\wh{\fsl}_{l+1})$ with the Drinfeld comultiplication \cite{DI0}. This Hopf algebra depends on a quantum parameter $q$ and a set $g$ of structure functions satisfying certain conditions. we denote it by $U_q(g,A_l)$ and call it \emph{the Ding-Iohara quantum algebra}. A brief review will be given in \cref{ss:pre:DI}. Let us briefly recall the algebra structure of the Ding-Iohara quantum algebra $U_q(g,A_l)$. See \cref{dfn:DI:U} for the detail. The algebra $U_q(g,A_l)$ is compactly presented by generating currents \[ e_i(z) \ceq \sum_{n \in \bbZ}e_{i,n}z^{-n}, \quad f_i(z) \ceq \sum_{n \in \bbZ}f_{i,n}z^{-n}, \quad \psi^+_i(z) \ceq \sum_{n \in \bbZ}\psi^+_{i,n} z^{-n}, \quad \psi^-_i(z) \ceq \sum_{n \in \bbZ}\psi^-_{i,n} z^{-n}, \] for $i=1,\dotsc,l$ and current relations among them. The genuine generators of the algebra are the Fourier modes $e_{i,n},f_{i,n},\psi^\pm_{i,n}$, and the genuine relations are obtained by expanding the current relations. See \cref{rmk:DI:top} for the precise treatment. The current relations involve the structure functions $g=\{g_{ij}(z) \mid i,j =1,\dotsc,l\}$. If we set $g_{ij}(z) \ceq q^{-a_{ij}}(1-q^{a_{ij}}z)/(1-q^{-a_{ij}}z)$ with $(a_{ij})_{i,j=1}^l$ being the Cartan matrix of type $A_l$, then the algebra $U_q(g,A_l)$ recovers the Drinfeld realization \cite{D} of the quantum affine algebra $U_q(\wh{\fsl}_{l+1})$. See \cref{eg:DI:qaff} for the detail. The algebra structure of $U_q(g,A_l)$ is designed to admit the \emph{Drinfeld-type comultiplication}, which involves infinite-summation of the genuine generators. In the case $g_{ij}(z) = q^{-a_{ij}}(1-q^{a_{ij}}z)/(1-q^{-a_{ij}}z)$, this comultiplication reduces to the Drinfeld comultiplication \cite{DI0} of the quantum affine algebra $U_q(\wh{\fsl}_{l+1})$. To admit such a comultiplication, the structure functions $g$ must satisfy a certain condition, which we call the Ding-Iohara condition. See \eqref{eq:DI:cond0} and \eqref{eq:DI:cond} for the detail. Let us give one more comment on the algebra structure of $U_q(g,A_l)$, which is the starting point of our study. Among the current relations, we have the \emph{Serre-type relations} \eqref{eq:DI:Serre}. For the generating currents $e_i(z)$ and $e_j(z)$ with $a_{ij}=-1$, the Serre-type relation is given by \begin{align*} & e_i(z_1) e_i(z_2) e_j(w) - h_{ij}(\tfrac{z_1}{w},\tfrac{z_2}{w}) e_i(z_1) e_j(w) e_i(z_2) +e_j(w) e_i(z_1) e_i(z_2) \\ +\, &e_i(z_2) e_i(z_1) e_j(w) - h_{ij}(\tfrac{z_2}{w},\tfrac{z_1}{w}) e_i(z_2) e_j(w) e_i(z_1) +e_j(w) e_i(z_2) e_i(z_1) = 0, \end{align*} where $h_{ij}(x,y)$ is given in terms of the structure functions $g_{ij}(z)$ as \eqref{eq:DI:hij}: \begin{align}\label{eq:0:hij} h_{ij}(x,y) \ceq \frac{(g_{ii}(x/y)+1) (g_{ij}(x) g_{ij}(y)+1)}{g_{ij}(y)+g_{ii}(x/y)g_{ij}(x)}. \end{align} If the structure functions are set to be $g_{ij}(z) = q^{-a_{ij}}(1-q^{a_{ij}}z)/(1-q^{-a_{ij}}z)$, then the function $h_{ij}$ is equal to the $q$-binomial coefficient $\bnm{2}{1}{q}=(q^2-q^{-2})/(q-q^{-1})$, and the above relation is nothing but the Serre relation of the quantum affine algebra $U_q(\wh{\fsl}_{l+1})$. As mentioned in the final paragraph of \cite{DI}, the argument carries over the simply-laced types $D_l$ and $E_{6,7,8}$, and we have \emph{the Ding-Iohara quantum algebra $U_q(g,X_l)$ of simply-laced type $X_l$}. At present, this class of quantum algebras appears in various contexts, some of which will be reviewed in \cref{ss:pre:DI}. \subsubsection*{Elliptic quantum groups} Elliptic quantum groups are still under active investigation, and the meaning of the word ``elliptic quantum group'' is less definite than the word ``quantum group'', as far as we understand. Roughly speaking, the notion of elliptic quantum groups refers to an ``elliptic deformation'' or a ``dynamical analogue'' of quantum groups. It originates in the classification of solutions of the Yang-Baxter equation: the rational, trigonometric, and elliptic solutions, and also in the (classical or quantum) dynamical Yang-Baxter equation. We refer to \cite[\S1.1]{Ko} for the history and backgrounds of elliptic quantum groups. At present, there are several objects in literature which are called elliptic quantum groups. This note focuses on \emph{the elliptic algebra $U_{q,p}(\wh{\frg})$ for the untwisted affine Lie algebra $\wh{\frg}$ of a finite-dimensional simple Lie algebra $\frg$}, which was first introduced by Konno \cite{Ko98} for the case $\frg=\fsl_2$, and by Jimbo-Konno-Odake-Shiraishi \cite[Appendix]{JKOS} for general $\frg$. Here $q$ denotes the quantum parameter, and $p$ denotes the elliptic nome. We will give a review of $U_{q,p}(\wh{\frg})$ in \cref{ss:pre:E}. For a comprehensive review of the relation between the elliptic algebra $U_{q,p}(\wh{\frg})$ and the other ``elliptic quantum groups'', we refer to \cite[\S1.2]{Ko}. Here we give a brief explanation on the algebra structure of the elliptic algebra $U_{q,p}(\wh{\frg})$. See \cref{dfn:E:U} for the detail. Let $\frg$ be a simple Lie algebra of rank $l$, and $\wh{\frg}$ be the untwisted affine Lie algebra of $\frg$. The algebra $U_{q,p}(\wh{\frg})$ is presented by generators and generating currents \begin{align}\label{eq:0:Egen} \clM(\wtH^*), \ q^{\pm c/2}, \ d, \ K^{\pm}_i, \ e_i(z), \ f_i(z), \ \psi^\pm_i(z) \end{align} for $i=1,\dotsc,l$, subject to the relations given in \cref{dfn:E:U}. Here $\clM(\wtH^*)$ denotes the field of meromorphic functions on the affine space $\wtH$ of dimension $2l$, given in \eqref{eq:E:wtH}. There is a distinguished basis \eqref{eq:E:wtHbas} of $\wtH$, and the elements $P_i$ among them are called \emph{the dynamical parameters}. See \cref{sss:E:dyn} for the detail. As mentioned in \cite[p.613]{JKOS}, if $\frg$ is of simply-laced type $X_l$, then the subalgebra of $U_q(\wh{\frg})$ generated by the currents $e_i(z),f_i(z),\psi^\pm_i(z)$ is essentially the special case of the Ding-Iohara quantum algebra $U_q(g,X_l)$ with structure function $g$ set to be certain theta functions. Note that we should take care of the Serre-type relations in the case $l \ge 2$. Although the algebra structure of the elliptic algebra $U_{q,p}(\wh{\frg})$ has a definite sense, the situation seems to be complicated on the coalgebra structure. As far as we understand, there are two coalgebra structures in literature. \begin{itemize} \item The paper \cite{JKOS} gave the quasi-Hopf formulation of $U_{q,p}(\wh{\frg})$ based on the Drinfeld realization of the quantum affine algebra $U_q(\wh{\frg})$. Hence the quasi-Hopf algebra $U_{q,p}(\wh{\frg})$ has a comultiplication induced by the Drinfeld comultiplication on $U_q(\wh{\frg})$. We call the induced comultiplication $\Delta$ on $U_{q,p}(\wh{\frg})$ the Drinfeld-type comultiplication. Note that this comultiplication $\Delta$ is not coassociative in terms of the ordinary tensor product $\otimes$. \item After a decade, another coalgebra structure $\Delta'$ on $U_{q,p}(\wh{\frg})$ was introduced for the case $\frg=\fsl_2$ by Konno \cite{Ko09}, and for general $\frg$ by Farghly-Konno-Oshima \cite{FKO}. They used the notion of $\frh$-Hopf algebroids in the sense of Etingof and Varchenko \cite{EV}, which will be reviewed in \cref{ss:pre:Halgd}. Here we only remark that one uses the modified tensor product $\totimes$ in the Hopf algebroid formulation. The comultiplication $\Delta'$ can be written neatly in terms of the $L$-operators. \end{itemize} One of the motivations of this note is to investigate the Drinfeld-type coalgebra structure $\Delta$ of the elliptic algebra $U_{q,p}(\wh{\frg})$ in terms of the $\frh$-Hopf algebroid formulation. \subsubsection*{The goal of this note} At this point, it is natural to ask the following questions. \begin{itemize} \item Is there an extension $U_q(g,X_l)$ of the Ding-Iohara quantum algebra for a simple Lie algebra $\frg$ of \emph{non-simply-laced type} $X_l=B_l,C_l,F_4$ or $G_2$ so that the quantum affine algebra $U_q(\wh{\frg})$ of the same type $X_l$ is a special case of $U_q(g,X_l)$ with structure functions $g$ set to be some rational functions? \item Is there an algebra $U_{q,p}(g,X_l)$ which extends the above $U_q(g,X_l)$, has the additional elliptic parameter $p$, and gives the elliptic algebra $U_{q,p}(\wh{\frg})$ of the same type $X_l$ if the structure functions $g$ set to be some theta functions? \item Does the algebra $U_{q,p}(g,X_l)$ admit a Hopf algebroid structure with Drinfeld-type comultiplication? \end{itemize} The goal of this note is to introduce a family of Hopf algebroids $U_{q,p}(g,X_l)$ which gives a simultaneous answer to the above questions. \subsection{Results and organization} \subsubsection*{Summary of results} As stated above, the goal of this note is to introduce a family of Hopf algebroids which unifies the elliptic algebras $U_{q,p}(\wh{\frg})$ and the Ding-Iohara quantum algebras $U_q(g,A_l)$. For this, we will construct a Hopf algebroid $U_{q,p}(g,X_l)$ depending on \begin{itemize} \item a complex parameter $q$ (\emph{quantum parameter}), \item a formal parameter $p$ (\emph{elliptic nome}), \item a finite root system of type $X_l$, \item a set $g=\{g_{ij}(z;p) \mid i,j =1,\dotsc,l\}$ of functions depending on $p$ (\emph{structure functions}), \end{itemize} and require the following conditions. \begin{clist} \item \label{0:g:1} Specializing the structure functions $g$ appropriately, we recover the elliptic algebras $U_{q,p}\bigl(\wh{\frg}(X_l)\bigr)$ with the Drinfeld-type comultiplication $\Delta$. \item \label{0:g:2} In the case $X_l=A_l$, we recover the Ding-Iohara quantum algebra $U_q(\ol{g},A_l)$ by taking the limit $p \to 0$ in $U_{q,p}(g,A_l)$ and setting the structure functions to be $\ol{g} \ceq \lim_{p \to 0}g$. \end{clist} Let us give a summary of the results obtained in this note. We will introduce the following three objects. \begin{itemize} \item \emph{The dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$}, a Hopf algebroid satisfying the above conditions \ref{0:g:1} and \ref{0:g:2}. The generators are \eqref{eq:0:Egen}, the same as the elliptic algebra $U_q(\wh{\frg})$: \[ \clM(\wtH^*), \ q^{\pm c/2}, \ d, \ K^{\pm}_i, \ e_i(z), \ f_i(z), \ \psi^\pm_i(z) \] The precise definitions are given in the following places. \begin{itemize} \item \cref{dfn:U:ADE,lem:U:Halg,lem:U:Delta,lem:ADE:ve,thm:ADE:Halgd} for simply-laced type $X_l=A_l,D_l,E_{6,7,8}$ \item \cref{dfn:U:BCF} and \cref{thm:BCF:Halgd} for type $X_l=B_l,C_l,F_4$. \item \cref{dfn:U:G} and \cref{thm:G:Halgd} for type $G_2$. \end{itemize} \item A Hopf algebroid structure on the elliptic algebra $U_{q,p}(\wh{\frg})$ whose comultiplication is the Drinfeld-type comultiplication $\Delta$, given in \cref{prp:E:Halgd}. \item The Ding-Iohara quantum algebra $U_q(g,X_l)$ of non-simply-laced type $X_l=B_l,C_l,F_4$ or $G_2$, given in \cref{dfn:ns:DI} and \cref{prp:ns:DI}. \end{itemize} The first and third objects are definitely new, and the first one is the main object of this note. The second object might be known already, although we cannot find it in literature. The main statements of this note are the check of the conditions \ref{0:g:1} and \ref{0:g:2} for the dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$. Note that \ref{0:g:2} makes sense for general $X_l$ after the extension of Ding-Iohara quantum algebras. The check are given in: \begin{itemize} \item \cref{cor:U:ADE}, and \cref{prp:ADE:p=0} for type $X_l=A_l,D_l,E_{6,7,8}$. \item \cref{prp:U:BCF} and \cref{prp:ns:p=0} for type $X_l=B_l,C_l,F_4$. \item \cref{prp:U:G} and \cref{prp:ns:p=0} for type $G_2$. \end{itemize} Our Hopf algebroid $U_{q,p}(g,X_l)$ is an example of $H$-Hopf algebroid in the sense of Etingof-Varchenko \cite[Chap.\ 4]{EV}, where $H$ is a certain finite-dimensional commutative Lie algebra constructed from the root system of type $X_l$ (see \eqref{eq:U:H}). Let us also mention that $H$-Hopf algebroids form a subclass of \emph{dynamical Hopf algebroids} introduced in \cite[Chap.\ 5]{EV}. Thus, our $U_{q,p}(g,X_l)$ is a dynamical Hopf algebroid, as indicated in the title and abstract of this note. There is a non-trivial point in the algebra structure of our dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$: the Serre-type relations. To spell out the point, let us cite from \cref{dfn:U:ADE} the Serre-type relations in the case of simply-laced type $X_l=A_l,D_l,E_{6,7,8}$. For the generating currents $e_i(z), e_j(z)$ with the Cartan matrix entry $a_{ij}=-1$, the Serre-type relation is given by \eqref{eq:U:eS}: \begin{align}\label{eq:0:eS} \begin{split} &\wt{g}^*_{ii}(\tfrac{z_1}{z_2}) \wt{g}^*_{ij}(\tfrac{z_1}{z }) \wt{g}^*_{ij}(\tfrac{z_2}{z }) e_i(z_1) e_i(z_2) e_j(z) -h_{ij} \wt{g}^*_{ii}(\tfrac{z_1}{z_2}) \wt{g}^*_{ij}(\tfrac{z_1}{z }) e_i(z_1) e_j(z) e_i(z_2) \\ & +\wt{g}^*_{ii}(\tfrac{z_1}{z_2}) e_j(z) e_i(z_1) e_i(z_2) +\wt{g}^*_{ij}(\tfrac{z_1}{z }) \wt{g}^*_{ij}(\tfrac{z_2}{z }) e_i(z_2) e_i(z_1) e_j(z) \\ & -h_{ij} \wt{g}^*_{ij}(\tfrac{z_2}{z }) e_i(z_2) e_j(z) e_i(z_1) +e_j(z) e_i(z_2) e_i(z_1)=0. \end{split} \end{align} Here $\wh{g}^*_{ij}(z)$ is determined from the structure function $g_{ij}(z;p)$, and the function $h_{ij}$ is given by \eqref{eq:U:hij}: \begin{align*} h_{ij} \ceq \frac{(\ol{g}_{ii}(\frac{z_1}{z_2})+1)(\ol{g}_{ij}(\frac{z_1}{z })\ol{g}_{ij}(\frac{z_2}{z})+1)} { \ol{g}_{ij}(\frac{z_2}{z })+ \ol{g}_{ii}(\frac{z_1}{z_2})\ol{g}_{ij}(\frac{z_1}{z}) }, \end{align*} which is essentially equal to \eqref{eq:0:hij}. The Serre-type relation \eqref{eq:0:eS} is guessed from \eqref{eq:DI:hij} of the Ding-Iohara algebra $U_q(g,X_l)$ and \eqref{eq:E:eS} of the elliptic algebra $U_{q,p}(\wh{\frg})$. If we specialize the structure function $g_{ij}(z;p)$ to the theta function as \eqref{eq:U:gijE}, then $h_{ij}$ is equal to the $q$-binomial $\bnm{2}{1}{q}$, and the above Serre relation \eqref{eq:U:eS} coincides with \eqref{eq:E:eS}. Thus the dynamical Ding-Iohara algebroid under the specialization coincides with the elliptic algebra $U_{q,p}(\wh{\frg})$ (see \cref{prp:U:ADE}). However, in the case of non-simply-laced type $X_l=B_l,C_l,F_4,G_2$ explained in \cref{s:ns}, we need special care since there seems no definition of the Ding-Iohara algebra of type $X_l$ in literature. To find out correct Serre-type relations for non-simply-laced types, we build certain principles to find an admissible form of the function $h_{ij}$ for the Cartan matrix entry $a_{ij}=-2,-3$, and the result is summarized in the ``strange formulas'' in \cref{ss:ns:h}. Due to the behavior of the obtained formulas, we need to divide the argument into the two cases: type $B_l,C_l,F_4$ and type $G_2$. The former case is treated in \cref{ss:ns:BCF}, and the latter is in \cref{ss:ns:G}. The Serre-type relation of the generating currents $e_i(z),e_j(z)$ with the Cartan matrix entry $a_{ij}=-2$ in the type $X_l=B_l,C_l,F_4$ is given by \eqref{eq:BCF:eS2} in \cref{dfn:U:BCF}: \begin{align*} &\Phi_2(z;z_1,z_2,z_3) +\wt{g}^*_{ii}(z_{12}) \Phi_2(z;z_2,z_1,z_3) \\ & +\wt{g}^*_{ii}(z_{12}) \wt{g}^*_{ii}(z_{13}) \Phi_2(z;z_2,z_3,z_1) +\wt{g}^*_{ii}(z_{23}) \Phi_2(z;z_1,z_3,z_2) \\ & +\wt{g}^*_{ii}(z_{13}) \wt{g}^*_{ii}(z_{23}) \Phi_2(z;z_3,z_1,z_2) +\wt{g}^*_{ii}(z_{12}) \wt{g}^*_{ii}(z_{13}) \wt{g}^*_{ii}(z_{23}) \Phi_2(z;z_3,z_2,z_1) = 0. \end{align*} Here $\Phi_2$ is given by \eqref{eq:BCF:Phi2}: \begin{align*} \Phi_2(z;z_1,z_2,z_3) \ceq \ &\wt{g}^*_{ij}(z_{10}) \wt{g}^*_{ij}(z_{20}) \wt{g}^*_{ij}(z_{30}) e_i(z_3)e_i(z_2)e_i(z_1)e_j(z) \\ &-h^3_{ij} \wt{g}^*_{ij}(z_{20}) \wt{g}^*_{ij}(z_{30}) e_i(z_3)e_i(z_2)e_j(z)e_i(z_1) \\ &+h^3_{ij} \wt{g}^*_{ij}(z_{30}) e_i(z_3)e_j(z)e_i(z_2)e_i(z_1) -e_j(z)e_i(z_3)e_i(z_2)e_i(z_1) \end{align*} with the function $h^3_{ij} \ceq \bigl(\wh{g^{123}_{000}}-\wh{1}\bigr)/\bigl(\wh{g^{23}_{00}}-\wh{g^3_0}\bigr)$ given in \eqref{eq:ns:h3}. For the Serre-type relations of type $G_2$, there involve two functions $h^{4,1}_{ij}$ and $h^{4,2}_{ij}$, given in \eqref{eq:G:h4}. See \cref{dfn:U:G} for the detail. There is one problem on these Serre-type relations which remains unclear. For all the type $X_l$ except $G_2$, our Serre-type relations are ``unique'' in the sense that there is no other cubic or quartic relation satisfying the following two conditions. \begin{itemize} \item It respects the Drinfeld-type comultiplication in \cref{lem:U:Delta}. \item It reduces to the Serre-type relation of the elliptic algebra $U_{q,p}(\wh{\frg})$ under the specialization of structure functions $g$ to the theta functions \eqref{eq:U:gijE}. \end{itemize} See \cref{rmk:ADE:h,rmk:BCF:h} for the detail. However, for the type $G_2$, the compatibility of the Drinfeld-type comultiplication only yields the vanishing condition on a certain linear combination of the functions $h^{4,1}_{ij}$ and $h^{4,2}_{ij}$, and there remains freedom of choice of these functions (the ideal $J$ in \eqref{eq:G:h4}). This problem will be mentioned in \cref{rmk:G:h} and \cref{s:cnc}. \subsubsection*{Organization} Let us explain the organization of this note. The starting \cref{s:pre} is a preliminary part, consisting of three parts. The first part is \cref{ss:pre:Halgd}, where we explain the notion of $\frh$-Hopf algebroids in the sense of Etingof and Varchenko \cite{EV}. We also introduce the basic terminology of Hopf algebras. The second part is \cref{ss:pre:DI}, where we review the Ding-Iohara quantum algebras $U_q(g,A_l)$ \cite{DI}. The last part \cref{ss:pre:E} gives a review of the elliptic algebra $U_{q,p}(\wh{\frg})$. We also give in \cref{prp:E:Halgd} a Hopf algebroid structure on $U_{q,p}(\wh{\frg})$ with Drinfeld-type comultiplication $\Delta$. Some part of the verification of \cref{prp:E:Halgd} will be given in the following sections. In \cref{s:ADE}, we introduce the dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$ for simply-laced type $X_l=A_l,D_l$ or $E_{6,7,8}$. In \cref{ss:ADE:alg}, we give the algebra structure on $U_{q,p}(g,X_l)$ in \cref{dfn:U:ADE}, and show that the elliptic algebra $U_{q,p}(\wh{\frg})$ is a specialization of $U_{q,p}(g,X_l)$ in \cref{prp:U:ADE}. Then, in \cref{ss:ADE:Halgd}, we give the $H$-Hopf algebroid structure, and check in \cref{cor:U:ADE} that the special case $U_{q,p}(\wh{\frg})$ recovers the Drinfeld-type comultiplication $\Delta$ mentioned above. Finally, in \cref{ss:ADE:p=0}, we check that the $p \to 0$ limit of $U_{q,p}(g,X_l)$ recovers the general Ding-Iohara algebra $U_q(\ol{g},X_l)$ with structure functions $\ol{g} \ceq \lim_{p \to 0}g$. In \cref{s:ns}, we extend our Hopf algebroid $U_{q,p}(g,X_l)$ to non-simply-laced types $X_l=B_l,C_l,F_4$ and $G_2$. After the search of possible Serre-type relations explained in \cref{ss:ns:h}, we treat the former case in \cref{ss:ns:BCF} and the latter in \cref{ss:ns:G}. The organization of each subsection is similar to \cref{ss:ADE:alg} and \cref{ss:ADE:Halgd}, and we omit the explanation. The limit $p \to 0$ is treated in \cref{ss:ns:DI}, where we first introduce the Ding-Iohara quantum algebra for non-simply-laced type $X_l$ in \cref{dfn:ns:DI} and \cref{prp:ns:DI}, and then check that the condition \ref{0:g:2} holds. We close this note by concluding remarks in \cref{s:cnc} \subsubsection*{Global notations} Here are the notations and terminology used throughout in this paper. \begin{itemize}[nosep] \item We denote by $\bbN = \bbZ_{\ge 0} \ceq \{0,1,2,\ldots\}$ the set of non-negative integers. \item We denote by $\delta_{i,j}$ the Kronecker delta on a set $I \ni i,j$. \item The symbol $\diag(x_1,\dotsc,x_n)$ denotes the diagonal matrix of size $n$ with diagonal entries $x_1,\dotsc,x_n$. \item The word `ring' or `algebra' means a unital associative one unless otherwise stated. The unit of a ring $R$ is denoted by $1_R$. \item For a commutative ring $k$, we use the word ``an algebra over $k$'' and do not use the word ``a $k$-algebra'' to distinguish it from ``an $\frh$-algebra'' for a finite-dimensional Lie algebra $\frh$ which will be explained in \cref{ss:pre:Halgd}. \item For a commutative ring $k$ and a variable $x$, we denote the Laurent polynomial ring by $k[x^{\pm1}]$, the formal series ring by $k\dbr{x}$, the Laurent series ring by $k\dpr{x}$, and the module of formal Laurent series by $k\dbr{x^{\pm1}}$. \item We use Gasper and Rahman's notation \cite{GR} for $q$-shifted factorials \begin{align}\label{eq:ntn:qsf} (x;q)_\infty \ceq \prod_{n=0}^\infty (1-x q^n), \quad (x_1,\dotsc,x_n;q)_\infty \ceq \prod_{i=1}^n (x_i;q)_\infty. \end{align} \item We denote by $\frS_n$ the symmetric group of degree $n$. \end{itemize} \section{Recollections on Ding-Iohara quantum algebras and elliptic algebras} \label{s:pre} \subsection{Hopf algebroid}\label{ss:pre:Halgd} We begin with the definition of $\frh$-Hopf algebroid for a finite-dimensional Lie algebra $\frh$ in the sense of Etingof and Varchenko \cite[Chap.\ 4]{EV}. Let $\frh$ be a finite-dimensional commutative Lie algebra over the complex number field $\bbC$. We denote the field $\clM(\frh^*)$ of meromorphic functions on the linear dual $\frh^*$, regarded as a complex affine space, by \[ \bbF \ceq \clM(\frh^*). \] An algebra $A$ over $\bbC$ is called an \emph{$\frh$-algebra} if it is equipped with an $\frh^*$-bigrading $A = \bigoplus_{\alpha, \beta \in \frh^*}A_{\alpha, \beta}$, and with two algebra embeddings $\mu_l, \mu_r\colon \bbF \to A_{0, 0}$, called \emph{the left} and \emph{right moment maps}, such that \begin{align*} \mu_l(F)a = a \mu_l(T_{\alpha}F), \quad \mu_r(F)a=a\mu_{r}(T_{\beta}F) \quad (F \in \bbF, \, a \in A_{\alpha,\beta}), \end{align*} where $T_{\alpha}$ is the shift operator \[ (T_{\alpha}F)(x) \ceq F(x+\alpha) \quad (x \in \frh^*). \] An \emph{$\frh$-algebra morphism $A \to B$} is an algebra homomorphism consistent with the moment maps. Such a morphism automatically preserves the $\frh^*$-bigrading. We define \emph{the modified tensor product} of two $\frh$-algebras $A$ and $B$ to be the $\frh$-algebra \begin{align}\label{eq:Halgd:mtp} \bigl(A \totimes B,\bigoplus_{\alpha,\beta \in \frh^*}(A \totimes B)_{\alpha,\beta}, \mu_l^{A \totimes B},\mu_r^{A \totimes B}\bigr) \end{align} as follows. We set \begin{align}\label{eq:Halgd:to} A \totimes B \ceq \bigoplus_{\alpha,\beta \in \frh^*}(A \totimes B)_{\alpha,\beta}, \quad (A \totimes B)_{\alpha,\beta} \ceq \bigoplus_{\gamma \in \frh^*}A_{\alpha,\gamma} \otimes_{\bbF} B_{\gamma,\beta}, \end{align} where $A_{\alpha,\gamma} \otimes_{\bbF} B_{\gamma,\beta}$ is the quotient of the standard tensor product $A_{\alpha,\gamma} \otimes_{\bbC} B_{\gamma,\beta}$ of linear spaces over $\bbC$ by the linear subspace generated by the elements \begin{align}\label{eq:Halgd:totimes} \mu^A_r(F)a \otimes b - a \otimes \mu^B_l(F)b \quad (a \in A, \, b \in B, \, F \in \bbF). \end{align} We denote an element of $A \totimes B$ by $a \totimes b$ for $a \in A$ and $b \in B$. The modified tensor product $A \totimes B$ is again an $\frh$-algebra by the multiplication \[ (a \totimes b)(a' \totimes b') \ceq (a a') \totimes (b b') \] and the moment maps \begin{align}\label{eq:Halgd:mu-totimes} \mu^{A \totimes B}_l(F) \ceq \mu_l^A(F) \totimes 1_B, \quad \mu^{A \totimes B}_r(F) \ceq 1_A \totimes \mu_r^B(F) \quad (F \in \bbF). \end{align} We also have the natural notion of \emph{the modified tensor product $f \totimes g$ of $\frh$-algebra homomorphisms $f$ and $g$}, whose detail is omitted. The category of $\frh$-algebras has a monoidal structure whose tensor product is the above $\totimes$ and the unit object is \emph{the $\frh$-algebra $D_\frh$ of difference operators on the meromorphic function field $\bbF=\clM(\frh^*)$}. As a $\bbC$-linear space, $D_\frh$ is defined to be the subspace of $\bbC$-linear endomorphisms $\End_{\bbC}(\bbF)$ spanned by the operators of the form $f T_{\alpha}$ with $f \in \bbF$ and $\alpha \in \frh^*$. It is a subalgebra of $\End_{\bbC}(\bbF)$, and has the $\frh^*$-bigrading \begin{align}\label{eq:Halgd:Dh} D_\frh = \bigoplus_{\alpha,\beta \in \frh^*} (D_\frh)_{\alpha,\beta}, \quad (D_\frh)_{\alpha,\beta} \ceq \begin{cases} \{f T_{-\alpha} \mid f \in \bbF\} & (\alpha = \beta) \\ 0 & (\alpha \ne \beta) \end{cases}. \end{align} Note that $(D_\frh)_{0,0}=\bbF T_0 =\bbF \id_{\bbF}$. The moment maps are given by \[ \mu_l=\mu_r\colon \bbF \lto (D_\frh)_{0,0} = \bbF T_0, \quad f \lmto f T_0. \] These data give $D_\frh$ a structure of an $\frh$-algebra, and it is a monoidal unit with respect to the modified tensor product $\totimes$ \cite[Lemma 4.1]{EV}. An \emph{$\frh$-bialgebroid} is a triple $(A,\Delta,\ve)$ consisting of an $\frh$-algebra $A$ and two $\frh$-algebra homomorphisms $\Delta\colon A \to A \totimes A$ and $\ve\colon A \to D_\frh$ satisfying \emph{the coassociativity and counit axioms} \begin{align}\label{eq:Halgd:Delta-ve} \begin{split} (\Delta \totimes \id_A) \Delta = (\id_A \totimes \Delta) \Delta &: A \lto (A \totimes A) \totimes A \cong A \totimes (A \totimes A), \\ (\ve \totimes \id_A)\Delta = \id_A = (\id_A \totimes \ve)\Delta &: A \lto D_{\frh} \totimes A \cong A \cong A \totimes D_{\frh}, \end{split} \end{align} where $\totimes$ denotes the modified tensor product of $\frh$-algebra homomorphisms, and $\cong$'s denote the natural isomorphisms. The map $\Delta$ is called \emph{the comultiplication}, and $\ve$ is called \emph{the counit} of the $\frh$-bialgebroid $A$. Let $(A,\Delta,\ve)$ be an $\frh$-bialgebroid. A linear map $S \in \End_{\bbC}A$ is called an \emph{antipode} if the following relations hold for $f \in \bbF$ and $a \in A_{\alpha,\beta}$. \begin{align}\label{eq:Halgd:S} \begin{split} S(\mu_r(f)a) = S(a)\mu_l(f), \quad &S(a\mu_l(f)) = \mu_r(f)S(a), \\ m(\id_A \otimes S)\Delta(a) = \mu_l(\ve(a)1), \quad &m(S \otimes \id_A)\Delta(a) = \mu_r\bigl(T_{\alpha}(\ve(a)1)\bigr), \end{split} \end{align} where $\ve(a)1$ denotes the action of the operator $\ve(a) \in D_{\frh}$ on the constant function $1$, and $\otimes$ in the second line denotes the ordinary tensor product of linear maps over $\bbC$. An $\frh$-bialgebroid equipped with an antipode is called an \emph{$\frh$-Hopf algebroid}. Note that for $\frh=0$, the zero-dimensional commutative Lie algebra, we have $\bbF=\bbC$ and $\frh$-algebra is nothing but an algebra $A$ over $\bbC$ whose moment maps are the unit $\eta\colon \bbC \to A$. Then the modified tensor product $\totimes$ is equal to the standard tensor product $\otimes_{\bbC}$ and $D_\frh=\bbC$. Moreover, an $\frh$-bialgebroid $(A,\Delta,\ve)$ is a bialgebra over $\bbC$ with comultiplication $\Delta\colon A \to A \otimes A$ and counit $\ve\colon A \to \bbC$, and an $\frh$-Hopf algebroid $(A,\Delta,\ve,S)$ is a Hopf algebra with antipode $S$. Thus, an ordinary Hopf algebra is a special case of $\frh$-Hopf algebroid. To close this \cref{ss:pre:Halgd}, let us mention the relation of $\frh$-bialgebroids and Hopf algebroids in the sense of \cite{Lu,Xu}. As far as we know, what is today commonly called a Hopf algebroid means the one introduced in loc.\ cit. Our presentation follows \cite[\S 3]{Xu}. A Hopf algebroid is a tuple $(A,R,\alpha,\beta,m,\Delta,\ve)$ consisting of: \begin{clist} \item An algebra $(A,m)$. \item Another algebra $R$. \item An algebra homomorphism $\alpha\colon R \to A$ and an algebra anti-homomorphism $\beta\colon R \to A$ such that the images of $\alpha$ and $\beta$ commute in $A$. \end{clist} At this point, the algebra $A$ has an $R$-$R$-bimodule structure with $r.a \ceq \alpha(r)a$ and $a.r \ceq \beta(r)a$ for $a \in A$ and $r \in R$. In particular, we have the $R$-$R$-bimodule product $A \otimes_R A$, which admits a natural $R$-$R$-bimodule structure. \begin{clist}[resume] \item An $R$-$R$-bimodule homomorphism $\Delta\colon A \to A \otimes_R A$. \item An $R$-$R$-bimodule homomorphism $\ve\colon A \to R$. \end{clist} These should satisfy the following conditions. \begin{enumerate} \item The map $\Delta$ satisfies $\Delta(1_A) = 1_A \otimes 1_A$ and $(\Delta \otimes_R \id_A)=(\id_A \otimes_R \Delta)$ under the natural isomorphism $(H \otimes_R H) \otimes_R H \cong H \otimes_R (H \otimes_R H)$. \item The maps $m$ and $\Delta$ are compatible in the sense that $\Delta(a)\bigl(\beta(r) \otimes 1_A - 1_A \otimes \alpha(r)\bigr)=0$ for any $r \in R$ and $a \in A$, and that $\Delta(a b)=\Delta(a)\Delta(b)$ for any $a,b \in A$. \item The map $\ve$ satisfies $\ve(1_A)=1_R$ and $(\ve \otimes_R \id_A)\Delta = \id_A = (\id_A \otimes_R \ve)\Delta$ under the natural isomorphisms $R \otimes_R A \cong A \cong A \otimes_R R$. \end{enumerate} An $\frh$-bialgebroid $(A,\Delta,\ve)$ is an Hopf algebroid in the above sense by setting $R \ceq \bbF = \clM(\frh)$ and $\alpha \ceq \mu_l$, $\beta \ceq \mu_R$. In fact, $\bbF$ is commutative so that the commuting condition in (iii) holds. Then we find that $A \otimes_{\bbF} A \cong A \totimes A$ (see \eqref{eq:Halgd:totimes}). The conditions (1)--(3) are checked immediately. \subsection{Ding-Iohara quantum algebras}\label{ss:pre:DI} Here we give an overview of the quantum algebras introduced by Ding and Iohara in \cite{DI}. For $l \in \bbZ_{>0}$, let $(a_{ij})_{i,j=1}^l$ be the Cartan matrix of type $A_l$, i.e., \[ a_{ij} = \begin{cases} 2 & (i=j) \\ {-1} & (\abs{i-j}=1) \\ 0 & (\text{otherwise}) \end{cases}. \] We will also denote it as $(a_{ij})_{i,j \in I}$ with $I \ceq \{1,\dotsc,l\}$. Also, we denote \begin{align}\label{eq:DI:clA} \clA \ceq \{\text{analytic functions of $z$ without poles except $z=0$ or $\infty$}\}, \end{align} regarded as a commutative algebra over $\bbC$. Let \[ g = \{g_{ij}(z) \mid i,j \in I\} \] be a set of analytic functions satisfying the following condition. \begin{clist} \item There are some $G_{ij}^{\pm}(z) \in \clA$ such that \begin{align}\label{eq:DI:cond0} g_{ij}(z) = G_{ij}^+(z)/G_{ij}^-(z). \end{align} \item We have \begin{align}\label{eq:DI:cond} g_{ij}(z) = g_{ji}(z^{-1})^{-1}. \end{align} \end{clist} We call the set $g$ \emph{the structure functions}, and call the condition on $g$ \emph{the Ding-Iohara condition}. Note that the condition $G^{\pm}_{ij}(z) \in \clA$ implies that we can expand $G^{\pm}_{ij}(z)$ and $g_{ij}(z) = G_{ij}^+(z)/G_{ij}^-(z)$ as \begin{align}\label{eq:DI:gexp} G^{\pm}_{ij}(z) = \sum_{n=-L^{\pm}}^{M^{\pm}} G^{\pm}_{ij,n} z^n \in \bbC[z^{\pm1}], \quad g_{ij}(z)^{\pm1} = \sum_{n=-N^{\pm}}^\infty g_{ij,n} z^n \in \bbC\dpr{z} \end{align} for some $L^{\pm}, M^{\pm}, N^{\pm} \in \bbN$. Let also $q$ be a complex number such that $\abs{q} \ne 0,1$, called \emph{the quantum parameter}. Using these data $A,g$ and $q$, we define the topological algebra $U_q(g,A_l)$ as follows. See \cref{rmk:DI:top} for the meaning of the phrase ``topological''. \begin{dfn}\label{dfn:DI:U} Using the Cartan matrix $A=(a_{ij})_{i,j \in I}$ of type $A_l$, the structure functions $g$ and the quantum parameter $q$, we define \[ U = U_q(g,A_l), \] to be the topological algebra over $\bbC$ generated by the elements \begin{align}\label{eq:DI:gen} q^{\pm c/2}, \ e_{i,n}, \ f_{i,n}, \ \psi^+_{i,n}, \ \psi^-_{i,n} \quad (i \in I, \, n \in \bbZ) \end{align} with the following defining relations. We will use the \emph{generating currents} \begin{align}\label{eq:DI:gc} e_i(z) \ceq \sum_{n \in \bbZ}e_{i,n}z^{-l}, \quad f_i(z) \ceq \sum_{n \in \bbZ}f_{i,n}z^{-l}, \quad \psi^\pm_i(z) \ceq \sum_{n \in \bbZ}\psi^\pm_{i,n} z^{-n}, \end{align} where $z$ is a formal variable. \begin{itemize} \item The generators $q^{\pm c/2}$ satisfy that \begin{align}\label{eq:DI:qc} \text{$q^{\pm c/2}$ are central and $q^{c/2}q^{-c/2}=1$.} \end{align} Below we denote $q^{r c/2} \ceq (q^{c/2})^r$ for $r \in \bbZ$. \item The generating currents $\psi^{\pm}(z)$ satisfy that \begin{align} \text{$\psi^{\pm}(z)$ are invertible as series of $z$,} \end{align} which means that $\psi^{\pm}(z)$ are bounded above or bounded below, and the initial terms are invertible in $U$. Explicitly, in the case $\psi^+(z)$ is bounded above, we have \begin{align* \text{there is some $N \in \bbZ$ such that $\psi^+_{i,n}=0$ for $n>N$, and $\psi^+_{i,N}$ is invertible in $U$.} \end{align*} \item For any $i,j \in I$, we have in terms of the formal variables $z$ and $w$ that \begin{align} \psi^+_i(z) \psi^+_j(w) = \psi^+_j(w) \psi^+_i(z), \quad &\psi^-_i(z) \psi^-_j(w) = \psi^-_j(w) \psi^-_i(z), \\ \psi^+_i(z) \psi^-_j(w) \psi^+_i(z)^{-1} \psi^-_j(w)^{-1} = \ &g_{ij}(q^{-c}z/w) g_{ij}(q^c z/w)^{-1}, \\ \label{eq:DI:ppe} \psi^+_i(z) e_j(w) = g_{ij}(q^{-c/2}z/w)^{ } e_j(w) \psi^+_i(z), \quad &\psi^+_i(z) f_j(w) = g_{ij}(q^{ c/2}z/w)^{-1} f_j(w) \psi^+_i(z), \\ \label{eq:DI:pme} \psi^-_i(z) e_j(w) = g_{ij}(q^{ c/2}z/w)^{ } e_j(w) \psi^-_i(z), \quad &\psi^-_i(z) f_j(w) = g_{ij}(q^{-c/2}z/w)^{-1} f_j(w) \psi^-_i(z), \\ \label{eq:DI:ee} G_{ij}^-(z/w) e_i(z) e_j(w) = G_{ij}^+(z/w) e_j(w) e_i(z), \quad &G_{ij}^+(z/w) f_i(z) f_j(w) = G_{ij}^-(z/w) f_j(w) f_i(z), \\ \label{eq:DI:ef} [e_i(z),f_j(w)] = \frac{\delta_{i,j}}{q-q^{-1}} \bigl(\delta(q^{-c}z/w) &\psi^-_i(q^{c/2}w) - \delta(q^{ c}z/w) \psi^+_i(q^{c/2} z) \bigr). \end{align} In each equality, we expand both sides as series of $z$ and $w$ using \eqref{eq:DI:gexp} and \eqref{eq:DI:gc}, and compare the coefficients of $z^r w^s$ for each $(r,s) \in \bbZ^2$ to get genuine relations. Here we should consider an appropriate topology for general structure functions $g$, which will be explained in \cref{rmk:DI:top}. Also, in \eqref{eq:DI:ef}, we used the commutator $[X,Y] \ceq X Y- Y X$ and the formal delta function \begin{align}\label{eq:DI:delta} \delta(x) \ceq \sum_{n \in \bbZ} x^n. \end{align} \item For $i,j \in I$ with $a_{ij}=0$, we have in terms of the formal variables $z$ and $w$ that \begin{align}\label{eq:DI:eeff} [e_i(z),e_j(w)] = [f_i(z),f_j(w)] = 0. \end{align} The meaning of these equalities are the same as the previous item. \item For $i,j \in I$ such that $a_{ij}={-1}$, we have in terms of the formal variables $z_1,z_2$ and $w$ \emph{the Serre-type} (or \emph{cubic}) \emph{relations} \begin{align}\label{eq:DI:Serre} \begin{split} X_i(z_1) X_i(z_2) X_j(w) &- h_{ij}(\tfrac{z_1}{w},\tfrac{z_2}{w}) X_i(z_1) X_j(w) X_i(z_2) +X_j(w) X_i(z_1) X_i(z_2) \\ &+ (\text{three terms given by $z_1 \lrto z_2$}) = 0 \end{split} \end{align} for $X=e$ or $f$. Here we set \begin{align}\label{eq:DI:hij} h_{ij}(x,y) \ceq \frac{(g_{ii}(x/y)+1) (g_{ij}(x) g_{ij}(y)+1)}{g_{ij}(y)+g_{ii}(x/y)g_{ij}(x)}, \end{align} regarded as a series belonging to $\bbC\dpr{x,y,x/y}$ by expanding $g_{ij}$ and $g_{ii}$ as in \eqref{eq:DI:gexp}. \end{itemize} \end{dfn} \begin{rmk}\label{rmk:DI:top} Let us comment on the topology of $U$. As mentioned after \eqref{eq:DI:ef}, the genuine relations are obtained by expanding the current relations. For example, the first equality of \eqref{eq:DI:ee} yields \[ \sum_{k=-L^-}^{M^-} G_{ij,k}^- e_{i,m} e_{j,n} = \sum_{k'=-L^+}^{M^+} G_{ij,k}^+ e_{j,n+k-k'} e_{i,m-k+k'} \] for each $m,n \in \bbZ$, under the expansion \eqref{eq:DI:gexp}. This involves finite summations only, and we can apply the ordinary diamond lemma \cite{Be}. On the other hand, the first equality in \eqref{eq:DI:ppe} yields \begin{align}\label{eq:DI:infsum} \psi_{i,m}^+ e_{j,n} = \sum_{k=-N^+}^\infty g_{ij,k} q^{-k c/2} e_{j,n-k} \psi^+_{i,m+k} \end{align} for each $m,n \in \bbZ$. Thus, unless $\psi^+_i(z)$ is bounded above or $e_j(z)$ is bounded on both sides, we have an infinite summation in the defining relation, and cannot obtain a genuine algebra. Largely speaking, there are two solutions of this problem. \begin{clist} \item \label{i:rmk:DI:top:b} Require $\psi^+_i(z)$ to be bounded above, and $\psi^-_i(z)$ to be bounded below, so that the genuine relations contain finite summations only. This is the case of the Drinfeld realization of quantum affine algebras \cite{D}, recalled in \cref{eg:DI:qaff}. \item \label{i:rmk:DI:top:p} Equip the structure functions $g_{ij}(z)$ with a parameter, say $p$, and require $g_{ij}(z)=g_{ij}(z;p)$ to have a series expansion $g_{ij}(z;p)=\sum_{k=-N}^\infty g_{ij,k}(z) p^k \in \bbC[z^{\pm1}]\dpr{p}$. Now we equip $U$ with the $p$-adic topology. Then, since $g_{ij,k}(z) \in \bbC[z^{\pm1}]$, we see that each $p$-adic component of the relations like \eqref{eq:DI:infsum} contains finite summation only, Thus we can regard $U$ as a complete algebra with respect to the $p$-adic topology. We only consider this situation in the following text. \end{clist} In a general situation, where no parameters are available, we are not sure how to resolve the problem. One possible solution may be to use the diamond lemma adapted to the formal power series \cite{H}, which requires an appropriate choice of the norm on the formal power series ring. \end{rmk} \begin{rmk} There are some typos in the quadratic relations of \cite[Definitions 2.1,2.2]{DI}. We should define the relations between the generating currents $\psi^-_i(z)$ and $e_j(w),f_j(w)$ as \eqref{eq:DI:pme}, which are consistent with those of the Drinfeld realization of quantum affine algebras \cite[\S2, Remark]{D} and of the quantum toroidal algebras of simply-laced type \cite[\S 3]{GKV}. \end{rmk} \begin{fct}[{\cite[Theorem 2.2]{DI}}]\label{fct:DI:U} The topological algebra $U=U_q(g,A_l)$ has the following topological Hopf algebra structure. \begin{itemize} \item Formal comultiplication $\Delta$: \begin{gather} \label{eq:DI:Delta0} \Delta(q^{\pm c/2}) \ceq q^{c/2} \otimes q^{\pm c/2}, \quad \\ \label{eq:DI:Delta1} \Delta(e_i(z)) \ceq e_i(z) \otimes 1 + \psi_i^+(q^{c_1/2} z) \otimes e_i(q^{c_1} z), \quad \Delta(f_i(z)) \ceq 1 \otimes f_i(z) + f_i(q^{c_2} z) \otimes \psi^-_i(q^{c_2/2}z), \\ \label{eq:DI:Delta2} \Delta(\psi^+_i(z)) \ceq \psi^+_i(q^{-c_2/2}z) \otimes \psi^+_i(q^{ c_1/2}z), \quad \Delta(\psi^-_i(z)) \ceq \psi^-_i(q^{ c_2/2}z) \otimes \psi^-_i(q^{-c_1/2}z), \end{gather} where $q^{r c_1/2} \ceq q^{r c/2} \otimes 1$ and $q^{r c_2/2} \ceq 1 \otimes q^{r c/2}$ for $r \in \bbZ$. In each equality, we expand both sides to get the value of $\Delta$ on each generator. See \cite{DI0,DI} for the detail of such a calculation. Since infinite summations appear in this calculation, the obtained comultiplication $\Delta$ is called formal. The infinite sums make sense if we take into account the topology given by a good gradation on the generators \eqref{eq:DI:gen}. \item Counit $\ve$: \begin{align} \ve(q^c) \ceq 1, \quad \ve(\psi^{\pm}_i(z)) \ceq 1, \quad \ve(e_i(z))=\ve(f_i(z))=0. \end{align} Again, we expand the left hand sides to get the value of $\ve$ on each generator. \item Formal antipode $S$: \begin{align} S(q^c) \ceq q^c \otimes q^c, \quad &S(\psi^\pm_i(z)) \ceq \psi^\pm_i(z)^{-1} \\ \label{eq:DI:S} S(e_i(z)) \ceq -\psi^+_i(q^{-c/2}z)^{-1} e_i(q^{-c}z), \quad &S(f_i(z)) \ceq -f_i(q^{-c}z)\psi_i^-(q^{-c/2}z)^{-1}. \end{align} \end{itemize} We call this topological Hopf algebra $U_q(g,A_l)$ \emph{the Ding-Iohara quantum algebra of type $A_l$}, and \emph{the Ding-Iohara algebra} for short. \end{fct} Let us give an example of the Ding-Iohara algebra. \begin{eg}\label{eg:DI:qaff} The motivational example of the algebra $U=U_q(g,A_l)$ is given in \cite[Example 2.1, Case I]{DI} by setting the structure functions $g=\{g_{ij}(z) \mid i,j \in I\}$ to be \begin{align* g_{ij}(z) = \frac{G^+_{ij}(z)}{G^-_{ij}(z)} \ceq \frac{q^{-a_{ij}} (1-q^{a_{ij}}z)}{1-q^{-a_{ij}}z}. \end{align*} If we quote this $U$ by the relations $\psi^{\pm}_{i,n}=0$ for $n>0$ and $\psi^+_{i,0}\psi^-_{i,0}=1$, then the resulting object is isomorphic as a topological Hopf algebra to the quantum affine algebra $U_q(\wh{\fsl}_{l+1})$ equipped with Drinfeld comultiplication. See also \cite{DI0} for the related discussion. \end{eg} Let us mention that the quantum toroidal algebra $U_{q,t}(\fgl_{1,\tor})$, also called the Ding-Iohara-Miki algebra, is a version of the Ding-Iohara quantum algebra of type $A_1$ in the above meaning. This quantum algebra is nowadays under extensive studies. See \cite{FFJMM1,FHHSY,FT,M} for example. The structure function is set to be \begin{align}\label{eq:DI:qtor} g(z) \ceq \frac{(1-q z)(1-z/t)(1-t z/q)}{(1-z/q)(1-t z)(1-q z/t)}. \end{align} The additional parameter $t$ corresponds to the (Hecke) parameter of the Macdonald symmetric polynomials $P_\lambda(x;q,t)$. \begin{rmk}\label{rmk:DI:ADE} As mentioned in the last paragraph of \cite{DI}, replacing the root system $A_l$ by the simply-raced system $X_l=D_l$ or $E_{6,7,8}$, we get a topological Hopf algebra $U_q(g,X_l)$, which we call \emph{the Ding-Iohara quantum algebra of the simply-laced type $X_l$}. \end{rmk} \subsection{Elliptic algebras \texorpdfstring{$U_{q,p}(\wh{\frg})$}{Uqp(g)}}\label{ss:pre:E} Here we explain the elliptic algebra $U_{q,p}(\wh{\frg})$ associated to each untwisted affine Lie algebra $\wh{\frg}$. As mentioned in \cref{s:0}, there are many objects named ``elliptic quantum groups'' or ``elliptic algebras'' in literature. The algebra $U_{q,p}(\wh{\frg})$ was introduced first in \cite{JKOS} as a quasi-Hopf twist of the quantum affine algebra $U_q(\wh{\frg})$ associated to $\wh{\frg}$ with Drinfeld comultiplication. In the paper \cite[\S2]{FKO}, the algebra $U_{q,p}(\wh{\frg})$ was reformulated as a Hopf algebroid (see \cref{ss:pre:Halgd}), and our explanation mainly follows this Hopf algebroid formulation. \subsubsection{Preliminaries on finite root systems}\label{sss:E:root} Let us consider the Cartan matrix $A=(a_{ij})_{i,j=1}^l$ of finite type $X_l$ in the sense of Kac \cite[Theorem 4.3, \S 4.8, TABLE Fin]{Ka}. Hence, we have $X_l=A_{l \ge 1}$, $B_{l \ge 3}$, $C_{l \ge 2}$, $D_{l \ge 4}$, $E_{6,7,8}$, $F_4$ or $G_2$ as usual. We denote the index set as \[ I \ceq \{1,2,\dotsc,l\}, \] so that we can write $A=(a_{ij})_{i,j \in I}$. For definiteness, we write down some examples of the Cartan matrix $A=A(X_l)$ of non-simply-laced type $X_l$. Note that, except for type $G_2$, they are transpose of those in Bourbaki \cite{B}. \[ A(B_4) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & {-1} & 2 & {-1} \\ & & {-2} & 2 \end{psm}, \quad A(C_4) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & {-1} & 2 & {-2} \\ & & {-1} & 2 \end{psm}, \quad A(F_4) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & {-2} & 2 & {-1} \\ & & {-1} & 2 \end{psm}, \quad A(G_2) = \begin{psm} 2 & {-1} \\ {-3} & 2 \end{psm}. \] Let us take a symmetrization $A = D B$ of the Cartan matrix $A$ \cite[\S2.3]{Ka}. In other words, $B$ is symmetric, $D$ is invertible and diagonal, and $B$ and $D$ have rational entries. We denote the entries of $B$ and $D$ as $B = (b_{ij})_{i,j \in I}$ and $D^{-1} = \diag(d_i)_{i \in I}$. Note that $d_i$ is defined to be the entry of the \emph{inverse} of $D$, so that we have \begin{align}\label{eq:E:BDA} b_{ij} = d_i a_{ij}, \quad b_{ij}=b_{ji} \quad (i,j \in I), \end{align} matching the convention in \cite[A.1]{JKOS} and \cite{FKO}. Also, recall from \cite[Remark 2.3]{Ka} that $D$ is uniquely determined by the condition $\trs{(D^{-1} A)}=D^{-1} A$ up to a constant factor, where $\trs{M}$ denotes the transpose of a matrix $M$. Any choice of $D$ will work in the following discussion (see \cref{rmk:E:U} \ref{i:rmk:E:U:d'} for the detail). For definiteness, we make the following choice. Let $\wh{A}=(a_{ij})_{i,j \in \wh{I}}$, $\wh{I} \ceq \{0\} \cup I$ be the generalized Cartan matrix of affine type $X_l^{(1)}$ in the sense of Kac \cite[Theorem 4.3, \S 4.8, TABLE Aff1]{Ka}. We have the labels $a_0,a_1,\dotsc,a_l$ and colabels $a_0^\vee,a_1^\vee,\dotsc,a_l^\vee$ \cite[\S 4.8, \S 6.1]{Ka}, which are the sequences of positive coprime integers uniquely determined by the conditions \[ \wh{A} \, \trs{(a_0,a_1,\dotsc,a_l)} = \trs{(0,0,\dotsc,0)}, \quad (a_0^\vee,a_1^\vee,\dotsc,a_l^\vee) \, \wh{A} = (0,0,\dotsc,0). \] Then, by \cite[(6.1.2)]{Ka}, the diagonal matrix $\wh{D}^{-1} \ceq \diag(a_0^\vee/a_0,a_1^\vee/a_1,\dotsc,a_l^\vee/a_l)$ gives a symmetrization $\wh{A}=\wh{D} \wh{B}$. Since $A=\rst{\wh{A}}{I \times I}$, we obtain the symmetrization $A=D B$ with \[ D^{-1} = \diag(d_1,\dotsc,d_n) = \diag(a_1^\vee/a_1,a_2^\vee/a_2,\dotsc,a_l^\vee/a_l). \] Explicitly, the entries $d_i$ are given as: \begin{align}\label{eq:E:D} \begin{split} A_l, D_l, E_{6,7,8}: &\quad (d_1,\dotsc,d_l)=(1,\dotsc,1), \\ B_l: &\quad (d_1,\dotsc,d_l)=(1,\dotsc,1,\thf), \\ C_l: &\quad (d_1,\dotsc,d_l)=(1,\dotsc,1,2), \\ F_4: &\quad (d_1,\dotsc,d_4)=(1,1,\thf,\thf) \\ G_2: &\quad (d_1,d_2)=(1,\tfrac{1}{3}). \end{split} \end{align} Note that our choices for types $A,D,E$ and $B,C$ coincide with those in \cite{FKO}. We denote by $\frg$ the Kac-Moody Lie algebra associated to $A=(a_{ij})_{i,j \in I}$, and by $(\frh,\Pi,\Pi^\vee)$ a fixed realization of $A$ \cite[\S 1.1]{Ka}. Thus, $\frg$ is a simple finite-dimensional Lie algebra of type $X_l$, $\frh \subset \frg$ is the Cartan subalgebra with $\dim \frh=l$, and $\Pi = \{\alpha_i \mid i \in I\} \subset \frh^*$ and $\Pi^\vee = \{\alpha^\vee_i \mid i \in I\} \subset \frh$ are linearly independent indexed subsets of the dual space $\frh^*$ and of $\frh$ satisfying \[ \pair{\alpha_i,\alpha^\vee_j} = a_{ji} \quad (i,j \in I). \] Here $\pair{\cdot,\cdot}\colon \frh^* \times \frh \to \bbC$ denotes the canonical pairing of the linear space $\frh$ and its linear dual $\frh^*$. The elements $\alpha_i$'s are called \emph{simple roots}, and $\alpha^\vee_i$'s are called \emph{simple coroots}. We denote by $\ipd{\cdot}{\cdot}\colon \frh \times \frh \to \bbC$ the invariant form of $\frg$ with the normalization \begin{align}\label{eq:E:ipd} \ipd{\alpha^\vee_i}{\alpha^\vee_j} = b_{i j} \quad (i,j \in I). \end{align} Since $\ipd{\cdot}{\cdot}$ is non-degenerate, it induces a linear isomorphism \begin{align}\label{eq:E:nu} \nu\colon \frh \lsto \frh^* \quad \text{s.t.} \quad \pair{\nu(h),h'} = \ipd{h}{h'} \quad (h,h' \in \frh). \end{align} The induced bilinear form on $\frh$ is denoted by the same symbol $\ipd{\cdot}{\cdot}$. We have \begin{align}\label{eq:E:ipd*} \alpha_i = \nu(\alpha^\vee_i), \quad \ipd{\alpha_i}{\alpha_j} = b_{ij} \quad (i,j \in I). \end{align} \subsubsection{Dynamical parameters}\label{sss:E:dyn} We keep the notation in the last \cref{sss:E:root}. In particular, $I=\{1,\dotsc,l\}$, and $A=(a_{ij})_{i,j \in I}$ denotes the Cartan matrix of finite type $X_l$. We also fix a realization $(\frh,\Pi,\Pi^\vee)$ of $A$, and denote by $\frg$ the corresponding simple Lie algebra. Let $R \subset \frh^*$ be the root system of $\frg$, which is a reduced irreducible root system of type $X_l$ in the sense of Bourbaki \cite{B}. The set $\Pi = \{\alpha_i \mid i \in I\} \subset R$ gives the simple roots of $R$, which spans \emph{the root lattice} $\clQ \ceq \sum_{i \in I}\bbZ \alpha_i \subset \frh^*$. Similarly, the set $\Pi^\vee = \{\alpha^\vee_i \mid i \in I\} \subset \frh$ gives the simple coroots of $R$, spanning \emph{the coroot lattice} $\clQ^\vee \ceq \sum_{i \in I}\bbZ \alpha^\vee_i \subset \frh$. Then \emph{the weight lattice} $\clP \subset \frh^*$ is defined to be $\clP \ceq \{\lambda \in \frh^* \mid \forall i \in I, \, \pair{\lambda,\alpha_i^\vee} \in \bbZ\}$, where $\pair{\cdot,\cdot}\colon \frh^* \times \frh \to \bbC$ is the canonical pairing as before. We have $\clP = \sum_{i \in I}\bbZ \varpi_i \subset \frh^*$, where $\varpi_i \in \frh^*$ is \emph{the fundamental weight} determined uniquely by the condition $\pair{\varpi_i,\alpha_j^\vee}=\delta_{i,j}$ for any $j \in I$. Recall the well-known inclusions \[ \clQ \subset \clP \subset \clQ \otimes_{\bbZ} \bbQ \subset \frh^*. \] Let us consider a copy of the $\bbC$-linear space $\frh^*$, regarded as $\frh^* = \clP \otimes_{\bbZ} \bbC$, and denote it by \begin{align}\label{eq:E:H} H \ceq \{P_\mu \mid \mu \in \frh^*\}, \end{align} following the notation in \cite{FKO,Ko}. Thus we have $P_{c_1 \mu_1 + c_2 \mu_2}=c_1 P_{\mu_1}+c_2 P_{\mu_2}$ for $c_1,c_2 \in \bbC$ and $\mu_1,\mu_2 \in \frh^*$. A basis of $H$ is given by \begin{align}\label{eq:E:Hbas} P_{\alpha_1},\dotsc,P_{\alpha_l}. \end{align} Next, we introduce the $\bbC$-linear space $\wtH$ of dimension $2l$ spanned by the expressions $P_i+h_i$ and $P_i$ ($i \in I$): \begin{align}\label{eq:E:wtH} \wtH \ceq \sum_{i \in I}\bbC\bigl(P_i+h_i\bigr) + \sum_{i \in I}\bbC P_i. \end{align} Following the notation in \cite{FKO,Ko}, for $h=\sum_{i \in I}c_i \alpha^\vee_i \in \frh$, we denote $P+h \ceq \sum_{i \in I}c_i(P_i+h_i)$. Identifying $(P_i+h_i)-P_i = h_i$ with $\alpha^\vee_i$, we have an isomorphism \begin{align}\label{eq:E:wtH=Hh} \wtH \cong H \oplus \frh. \end{align} Under this identification, the linear space $\wtH$ has the basis \begin{align}\label{eq:E:wtHbas} \{P_i, h_i \mid i \in I\}, \quad P_i = P_{\alpha_i}, \quad h_i \cong \alpha_i^\vee, \end{align} which extends the basis \eqref{eq:E:Hbas} of $H$. The elements $P_i$ are called \emph{the dynamical parameters}. Hereafter we regard $\wtH$ as a commutative Lie algebra over $\bbC$, and consider the field $\clM(\wtH^*)$ of meromorphic functions on the dual space of $\wtH$ as in \cref{ss:pre:Halgd}. We can express an element $F \in \clM(\wtH^*)$ as a function \begin{align}\label{eq:E:finF} F = F(P+h,P) \end{align} of variables $P+h = (P_i+h_i)_{i \in I}$ and $P = (P_i)_{i \in I}$. Then the value of $F$ at $\mu \in \wtH^*$ can be written as $F(\mu) = F\bigl(\pair{\mu,P+h},\pair{\mu,P}\bigr)$, where $\pair{\cdot,\cdot}\colon \wtH^* \times \wtH \to \bbC$ denotes the canonical pairing. In particular, we regard the elements of $\wtH$ as meromorphic functions on $\wtH^*$. We also denote by \begin{align}\label{eq:E:clM} f(P+h), \, f(P) \ \in \ \clM(\wtH^*) \end{align} a meromorphic function containing the variables $P+h=(P_i+h_i)_{i \in I}$ only, and one containing the variables $P=(P_i)_{i \in I}$ only. Let us also introduce the dual spaces $H^*$ and $\wtH^*$ as \begin{align}\label{eq:E:H*} \begin{split} &H^* = \{Q_\alpha \mid \alpha \in \frh^*\} = \sum_{i \in I}\bbC Q_i, \quad Q_i \ceq Q_{\alpha_i}, \\ &\wtH^* = \sum_{i \in I}\bbC(Q_i+\alpha_i) + \sum_{i \in I}\bbC Q_i. \end{split} \end{align} Here we consider $H^*$ as a copy of $\frh^*$ regarded as $\frh^* = \clQ \otimes_{\bbZ} \bbC$. Thus $H^*$ has a basis \begin{align}\label{eq:E:H*bas} \{Q_i, \alpha_i \mid i \in I\}, \quad Q_i \ceq Q_{\alpha_i}. \end{align} We call $Q_i$ \emph{the dual} (\emph{dynamical}) \emph{parameters}. The choice of $Q_i$ and $\alpha_i$ are as follows: For this basis of $H^*$ and the basis \eqref{eq:E:wtHbas} of $H$, the canonical pairing $\pair{\cdot,\cdot}\colon H^* \times H \to \bbC$ has the values \begin{align}\label{eq:E:Hpair} \pair{Q_i,P_j} = \ipd{\alpha_i}{\alpha_j} = b_{ij}, \quad \pair{\alpha_i,h_j} = a_{ji}, \end{align} and the other pairings are $0$. We close this part with \begin{rmk} \begin{enumerate} \item We modified the notations in \cite{FKO} in several places. In particular, the linear space $\wtH$ is denoted as $H$ in loc.\ cit., and defined to be an extension of ours by $\bbC c$. \item We use the symbol $P+h$ in two meanings: the one is an element $P+h \in \wtH$ associated to $h=\sum_{i \in I}c_i \alpha^\vee_i \in \frh$, and the other is the set of variables $P+h=\bigl(P_i+\nu(h_i)\bigr)_{i \in I}$. \item Let us give an example of the calculation of the pairing \eqref{eq:E:Hpair}: $\pair{Q_i+\alpha_i,P_j+h_j}=\pair{Q_i,P_j}+\pair{\alpha_i,h_j}=\pair{Q_i,P_j}+\pair{\alpha_i,h_j}=b_{ij}+a_{ji}$. \end{enumerate} \end{rmk} \subsubsection{Definition}\label{sss:E:EA} Keep the notations in the previous \cref{sss:E:root} and \cref{sss:E:dyn}. We borrow from \cite[p.106]{FKO} the notations on $q$-numbers. Let $q$ be a complex number with $0<\abs{q}<1$, and $i \in I=\{1,2,\dotsc,l\}$. For $m,n \in \bbN$ with $m \le n$, we define \begin{gather} \label{eq:E:qi} q_i \ceq q^{d_i}, \quad [n]_i \ceq \frac{q_i^n-q_i^{-n}}{q_i-q_i^{-1}}, \quad [n)_i \ceq \frac{q^n-q^{-n}}{q_i-q_i^{-1}}, \\ \label{eq:E:bini} [n]_i! \ceq [n]_i [n-1]_i \dotsm [1]_i, \quad \bnm{m}{n}{i} \ceq \frac{[m]_i!}{[n]_i! \, [m-n]_i!}. \end{gather} Let us also fix a formal parameter $p$. Below a \emph{topological algebra over $\bbC\dbr{p}$} means the one with respect to the $p$-adic topology. The following definition is due to \cite[Appendix A]{JKOS} and \cite[Definition 2.1]{FKO} for general $\wh{\frg}$, and due to \cite{Ko98}, \cite[\S2.2]{Ko09} and \cite[Definition 2.3.1]{Ko} for $\wh{\frg}=\wh{\fsl}_2$. \begin{dfn}\label{dfn:E:U} Let $A = A(X_l) = (a_{ij})_{i,j \in I}$ be the Cartan matrix of type $X_l$. The elliptic algebra \[ U_{q,p}(\wh{\frg}) = U_{q,p}(\wh{\frg}(X_l)) \] associated to $A$ is a topological algebra over $\bbC\dbr{p}$ generated by \begin{align}\label{eq:E:Ugen} \clM(\wtH^*), \ q^{\pm c/2}, \ d, \ K^{\pm}_i, \ e_{i,m}, \ f_{i,m}, \ \alpha^\vee_{i,n} \quad (i \in I, \, m \in \bbZ, \, n \in \bbZ \setminus \{0\}) \end{align} satisfying the following relations. \begin{itemize} \item $\clM(\wtH^*)$ is a subalgebra. \item $q^{\pm c/2}$ are central and $q^{c/2}q^{-c/2}=1$. \item $K^{\pm}_i$ are invertible. \item It is useful to introduce the generating currents, regarded as formal Laurent series in $z$, by \[ e_i(z) \ceq \sum_{m \in \bbZ}e_{i,m}z^{-m}, \quad f_i(z) \ceq \sum_{m \in \bbZ}f_{i,m}z^{-m} \quad (i \in I). \] Using the functions $F(P),F(P+h) \in \clM(H^*)$ (see \eqref{eq:E:clM}) and the basis elements $Q_i=Q_{\alpha_i}$ of $H^*$ in \eqref{eq:E:H*bas}, the relations containing the elements in $\bbF$ are given as follows. \begin{align} \label{eq:E:U:1} &F(P+h) \, d = d \, F(P+h), & &F(P ) \, d = d \, F(P), \\ \label{eq:E:U:2} &F(P+h) \, K_i^\pm = K^\pm_i \, F\bigl(P+h \mp \pair{Q_i,P+h}\bigr), & &F(P ) \, K_i^\pm = K^\pm_i \, F\bigl(P \mp \pair{Q_i,P }\bigr), \\ \label{eq:E:U:3} &F(P+h) \, e_i(z) = e_i(z) \, F(P+h), & &F(P ) \, e_i(z) = e_i(z) \, F(P-\pair{Q_i,P}), \\ \label{eq:E:U:4} &F(P+h) \, f_i(z) = f_i(z) \, F(P+h-\pair{Q_i, P+h}), & &F(P ) \, f_i(z) = f_i(z) \, F(P), \\ \label{eq:E:U:5} &F(P+h) \, \alpha^\vee_{i,n} = \alpha^\vee_{i,n} \, F(P+h). & &F(P ) \, \alpha^\vee_{i,n} = \alpha^\vee_{i,n} \, F(P ), \end{align} Similarly as the Ding-Iohara algebra in \cref{ss:pre:DI}, the equalities containing the generating currents are understood as those of formal Laurent series in $z$, and the genuine relations are obtained by comparing the coefficients of $z^k$ ($k \in \bbZ$) in both sides. \item The remaining relations containing $d$ are given by \begin{align} \label{eq:E:dK} [d,K^\pm_i] = 0, \quad [d,e_{i,m}] = m e_{i,m}, \quad [d,f_{i,m}] = m f_{i,m}, \quad [d,\alpha^\vee_{j,n}] = n \alpha^\vee_{i,n}. \end{align} \item The remaining relations containing $K^\pm_i$ are given by \begin{align} \label{eq:E:Ke} K^\pm_i e_j(z) = q_i^{\mp a_{ij}} e_j(z) K^\pm_i, \quad K^\pm_i f_j(z) = q_i^{\pm a_{ij}} f_j(z) K^\pm_i, \quad [K^\pm_i, \alpha^\vee_{j,n}]=0. \end{align} \item Using \eqref{eq:E:qi}, the remaining relations containing $\alpha^\vee_{i,n}$ are given by \begin{align} \label{eq:E:2.14} &[\alpha^\vee_{i,m},\alpha^\vee_{j,n}] = \delta_{m+n,0} \frac{[a_{ij} m]_i [c m)_j}{m} \frac{1-p^m}{1-p^{* m}} q^{-cm}, \\ \label{eq:E:2.15} &[\alpha^\vee_{i,m},e_j(z)] = \frac{[a_{ij}m]_i}{m} \frac{1-p^m}{1-p^{* m}} q^{-cm}z^m e_j(z), \\ \label{eq:E:2.16} &[\alpha^\vee_{i,m},f_j(z)] = -\frac{[a_{ij}m]_i}{m} z^m f_j(z). \end{align} Here and hereafter, we use \begin{align}\label{eq:E:p*} p^* \ceq p q^{-2c}, \end{align} and the term $\frac{1}{1-p^{*m}}$ is understood as the formal series $\sum_{n \ge 0} p^{* m n}$. \item For the other relations, it is useful to introduce additional generating currents \begin{gather*} \psi^+_i(q^{-c/2}z) \ceq K^+_i \exp\Bigl(-(q_i-q_i^{-1})\sum_{n>0} \frac{ \alpha^\vee_{i,-n}}{1-p^n}z^{ n}\Bigr) \exp\Bigl( (q_i-q_i^{-1})\sum_{n>0} \frac{p^n\alpha^\vee_{i, n}}{1-p^n}z^{-n}\Bigr), \\ \psi^-_i(q^{ c/2}z) \ceq K^-_i \exp\Bigl(-(q_i-q_i^{-1})\sum_{n>0} \frac{p^n\alpha^\vee_{i,-n}}{1-p^n}z^{ n}\Bigr) \exp\Bigl( (q_i-q_i^{-1})\sum_{n>0} \frac{ \alpha^\vee_{i, n}}{1-p^n}z^{-n}\Bigr), \end{gather*} where $\exp(x) \ceq \sum_{n \in \bbN}\frac{1}{n!}x^n$ denotes the formal exponential, and the expression $\frac{1}{1-p^n}$ is understood as $\sum_{k \ge 0} p^{k n}$. One can check that these generating currents have well-defined coefficients in the $p$-adic topology (c.f.\ \cref{rmk:DI:top} \ref{i:rmk:DI:top:p}). Then the remaining relations are given as follows. \begin{itemize} \item For any $i,j \in I$, the quadratic relations of $e_{i,m}$'s and $f_{i,m}$'s are given by \begin{align} \label{eq:E:ee} z \, \gamma(\tfrac{w}{z};q^{ b_{ij}},p^*) e_i(z)e_j(w) &= -w \, \gamma(\tfrac{z}{w};q^{ b_{ij}},p^*) e_j(w)e_i(z), \\ \label{eq:E:ff} z \, \gamma(\tfrac{w}{z};q^{-b_{ij}},p ) f_i(z)f_j(w) &= -w \, \gamma(\tfrac{z}{w};q^{-b_{ij}},p ) f_j(w)f_i(z), \end{align} where the structure function $G$ is given by \begin{align*} \gamma(x;q,p) \ceq \frac{(q x;p)_\infty}{(p q^{-1}x;p)_\infty}. \end{align*} See \eqref{eq:ntn:qsf} for the shifted factorial $(x;p)_\infty$. We regard $G(x;q,p) \in \bbC[x^{\pm1}]\dbr{p}$ by expanding the denominator using $\frac{1}{1-x p^k}=\sum_{n \ge 0}(x p^k)^n$. The quantity $b_{ij}$ is the entry of the symmetrization $A=D B$ of the Cartan matrix $A$ with the diagonal matrix $D^{-1}=(d_1,\dotsc,d_l)$ given by \eqref{eq:E:D}. As before, the genuine relations are obtained by expanding both sides into formal Laurent series of $z,w$ and comparing the coefficients of $z^m w^n$ ($m,n \in \bbZ$) in both sides. \item For $i,j \in I$ with $i \ne j$, assume $a \ceq 1-a_{ij} \ge 2$. We define \begin{align}\label{eq:E:wtgam} \wtgm(x;q,p) \ceq \frac{(p q x;p)_\infty}{(p q^{-1} x;p)_\infty}, \end{align} regarded as a formal series of $p$. Then, using \eqref{eq:E:bini}, the Serre-type relation of $e_i(z),e_j(z)$ is \begin{align}\label{eq:E:eS} \begin{split} \sum_{\sigma \in \frS_a} &\prod_{1 \le m<n \le a} \wtgm(\tfrac{z_{\sigma(n)}}{z_{\sigma(m)}};q^2,p^*) \\ &\cdot \sum_{s=0}^a (-1)^s \bnm{a}{s}{i} \prod_{m= 1}^s \wtgm(\tfrac{w}{z_{\sigma(m)}};q^{b_{ij}},p^*) \prod_{m=s+1}^a \wtgm(\tfrac{z_{\sigma(m)}}{w};q^{b_{ij}},p^*) \\ &\cdot e_i(z_{\sigma(1)}) \dotsm e_i(z_{\sigma(s)}) e_j(w) e_i(z_{\sigma(s+1)}) \dotsm e_i(z_{\sigma(a)}) = 0, \end{split} \end{align} and that of $f_i(z),f_j(z)$ is \begin{align} \label{eq:E:fS} \begin{split} \sum_{\sigma \in \frS_a} &\prod_{1 \le m<n \le a} \wtgm(\tfrac{z_{\sigma(n)}}{z_{\sigma(m)}};q^{-2},p) \\ &\cdot \sum_{s=0}^a (-1)^s \bnm{a}{s}{i} \prod_{m= 1}^s \wtgm(\tfrac{w}{z_{\sigma(m)}};q^{-b_{ij}},p) \prod_{m=s+1}^a \wtgm(\tfrac{z_{\sigma(m)}}{w};q^{-b_{ij}},p) \\ &\cdot f_i(z_{\sigma(1)}) \dotsm f_i(z_{\sigma(s)}) f_j(w) f_i(z_{\sigma(s+1)}) \dotsm f_i(z_{\sigma(a)}) = 0. \end{split} \end{align} Here $\frS_a$ denotes the symmetric group of degree $a$. \item Finally, the relations of $e_{i,m}$ and $f_{i,m}$ are given by \begin{align} \label{eq:E:ef} [e_i(z),f_j(w)] = \frac{\delta_{i,j}}{q-q^{-1}} \bigl(\delta(q^{-c}\tfrac{z}{w}) \psi^-_i(q^{ c/2}w) -\delta(q^{ c}\tfrac{z}{w}) \psi^+_i(q^{-c/2}z)\bigr), \end{align} where $\delta$ denotes the formal delta function $\delta(x) \ceq \sum_{n \in \bbZ} x^n$ in \eqref{eq:DI:delta}. \end{itemize} \end{itemize} \end{dfn} \begin{rmk}\label{rmk:E:U} Some comments on \cref{dfn:E:U} are in order. \begin{enumerate} \item If we take $p$ to be a complex number such that $\abs{p}<1$, then $U_{p,q}(\wh{g})$ is a genuine algebra over $\bbC$. \item The definition in \cite[Definition 2.1]{FKO} and \cite[Definition 2.3.1]{Ko} has a typo. There $U_{q,p}(\wh{\frg})$ is defined to be a topological algebra over $\bbF\dbr{p}$ with $\bbF \ceq \clM(P(\frh)^*)$, but then the functions $F(P+h),F(P) \in \bbF$ would commute with the other generators. A correct definition of the $\wh{\fsl}_2$ case is given in \cite[\S2.2]{Ko09}. \item The relations $[d,K^\pm_i]=0$ are missed in \cite[Definition 2.1]{FKO}. \item The relations \eqref{eq:E:ee} and \eqref{eq:E:ff} can be rewritten as \begin{align} \label{eq:E:ee''} z \, \theta^*(q^{ b_{ij}}\tfrac{w}{z}) e_i(z) e_j(w) &= -w \, \theta^*(q^{ b_{ij}}\tfrac{z}{w}) e_j(w) e_i(z), \\ \label{eq:E:ff''} z \, \theta (q^{-b_{ij}}\tfrac{w}{z}) f_i(z) f_j(w) &= -w \, \theta (q^{-b_{ij}}\tfrac{z}{w}) f_j(w) f_i(z). \end{align} where we used the theta series \begin{align}\label{eq:E:theta} \theta(x) \ceq \theta(x;p), \quad \theta^*(x) \ceq \theta(x;p^*), \quad \theta(x;p) \ceq (x,p x^{-1};p)_{\infty} \in \bbC[x^{\pm1}]\dbr{p}. \end{align} See \eqref{eq:ntn:qsf} for the symbol of infinite product. These relations are given in \cite[(A.17), (A.18)]{JKOS}. \item \label{i:rmk:E:U:d'} The definition of $U=U_{q,p}$ is independent of the choice of symmetrization $A=D B$, $D^{-1}=(d_1,\dotsc,d_l)$, of the Cartan matrix $A$ up to isomorphism. Indeed, if we take another symmetrization $A=D' B'$ with $D'^{-1}=(d'_1,\dotsc,d'_l)$, then by \cite[Remark 2.4]{Ka}, there is an $r \in \bbQ \setminus \{0\}$ such that $d'_i = r d_i$ for any $i \in I$. Thus, replacing \[ q \lmto q' \ceq q^{1/r}, \quad c \lmto c' \ceq r c, \] we have $q_i=q^{d_i}=(q')^{d'_i}=q'_i$, $q^{-2c}=(q')^{-2c'}$ and $q^{b_{ij}}=q^{d_i a_{ij}}=(q')^{d'_i a_{ij}}=(q')^{b'_{ij}}$, so that the defining relations \eqref{eq:E:Ke}--\eqref{eq:E:2.16}, \eqref{eq:E:ee}--\eqref{eq:E:ef} are preserved. Thus, we have an isomorphism $U_{q,p} \cong U_{q',p}$ of topological algebras. \end{enumerate} \end{rmk} For the later purpose, let us rewrite some of the defining relations. \begin{lem}\label{lem:E:pef} The relations \eqref{eq:E:2.15} and \eqref{eq:E:2.16} are equivalent (under \eqref{eq:E:Ke}) to the following current relations. \begin{align} \label{eq:E:ppe'} \psi_i^+(z)e_j(w) &= g_{ij}^*(q^{-c/2}\tfrac{z}{w})e_j(w)\psi_i^+(z), & \psi_i^+(z)f_j(w) &= g_{ij}(q^{c/2}\tfrac{z}{w})^{-1}f_j(w)\psi_i^+(z), \\ \label{eq:E:pme'} \psi_i^-(z)e_j(w) &= g_{ij}^*(q^{c/2}\tfrac{z}{w})e_j(w)\psi_i^-(z), & \psi_i^-(z)f_j(w) &= g_{ij}(q^{-c/2}\tfrac{z}{w})^{-1}f_j(w)\psi_i^-(z). \end{align} Here the formal series $g_{ij}(x)=g_{ij}(x;p)$, $g_{ij}^*(x)=g_{ij}(x;p^*)$ are the expansion of \begin{align}\label{eq:E:gij} g_{ij}(x;p) = \frac{G^+_{ij}(x;p)}{G^-_{ij}(x;p)} \ceq \frac{q^{-b_{ij}} \theta(q^{b_{ij}}x;p)}{\theta(q^{-b_{ij}}x;p)} \end{align} with respect to $p$, where $\theta (x;p)$ is given in \eqref{eq:E:theta}. \end{lem} \begin{proof} We only derive $\psi_i^+(z)e_j(w) = g_{ij}^*(q^{-c/2}\tfrac{z}{w})e_j(w)\psi_i^+(z)$ from \eqref{eq:E:2.15} and \eqref{eq:E:Ke}. Using the relation $\exp(A) \exp(B) = \exp([A,B])\exp(B) \exp(A)$ in case $[A,B]$ commutes with $A$ and $B$, we have $\psi^+_i(z) e_j(w) = C(\frac{z}{w}) e_j(w) \psi^+_i(z)$ with \begin{align*} C(x) \ceq q_i^{-a_{ij}} \exp\Bigl[-\sum_{n >0} \frac{1}{n} \frac{q_i^{a_{ij} n}-q_i^{-a_{ij}n}}{1-p^{*n}} (q^{-c/2} x)^n\Bigr] \exp\Bigl[ \sum_{n >0} \frac{1}{n} \frac{q_i^{a_{ij} n}-q_i^{-a_{ij}n}}{1-p^{*n}} (p^* q^{ c/2}x^{-1})^n\Bigr]. \end{align*} Then, using $\exp(-\sum_{n>0}\frac{1}{n}x^n)=1-x$ and $q_i^{a_{ij}}=q^{d_i a_{ij}}=q^{b_{ij}}$, we have \begin{align*} C(x) = q^{-b_{ij}} \frac{( q^{ b_{ij}}q^{-c/2}x;p^*)_\infty} {( q^{-b_{ij}}q^{-c/2}x;p^*)_\infty} \frac{(p^* q^{-b_{ij}}q^{ c/2}x^{-1};p^*)_\infty} {(p^* q^{ b_{ij}}q^{ c/2}x^{-1};p^*)_\infty} = q^{-b_{ij}} \frac{\theta(q^{ b_{ij}}q^{-c/2}x;p^*)}{\theta(q^{-b_{ij}}q^{-c/2}x;p^*)} = g^*_{ij}(q^{-c/2}x). \end{align*} Thus we have the desired equality. \end{proof} \begin{lem}\label{lem:E:pp} The relations \eqref{eq:E:2.14} are equivalent (under \eqref{eq:E:Ke}) to the current relations \begin{align}\label{eq:E:pp'} \psi_i^{\pm}(z)\psi_j^{\pm}(w) = \frac{g^*_{ij}(\frac{z}{w})}{g_{ij}(\frac{z}{w})}\psi_j^{\pm}(w)\psi_i^{\pm}(z), \quad \psi_i^{+}(z)\psi_j^{-}(w) = \frac{g^*_{ij}(q^{-c}\frac{z}{w})}{g_{ij}(q^c\frac{z}{w})}\psi_j^{-}(w)\psi_i^{+}(z) \end{align} with $g_{ij}(x)=g_{ij}(x;p)$ and $g_{ij}^*(x)=g_{ij}(x;p^*)$ given in \eqref{eq:E:gij}. \end{lem} \begin{proof} Let us derive $\psi_i^{\pm}(z)\psi_j^{\pm}(w) = \frac{g^*_{ij}(\frac{z}{w})}{g_{ij}(\frac{z}{w})}\psi_j^{\pm}(w)\psi_i^{\pm}(z)$. The same argument as in \cref{lem:E:pef} yields \[ \psi_i^{\pm}(z) \psi_j^{\pm}(w) = C_{ji}(\tfrac{z}{w}) C_{ij}(\tfrac{w}{z})^{-1} \psi_j^{\pm}(w) \psi_i^{\pm}(z), \] where, using $(x;p,p^*)_\infty \ceq \prod_{n \in \bbN}(x p^{*n};p)_\infty = \prod_{m,n\in\bbN}(1-xp^m p^{*n})$, we set \[ C_{ji}(x) \ceq \exp\Bigl[\sum_{n>0} \frac{1}{n} \frac{q_j^{a_{ji}n}-q_j^{-a_{ji}n}}{1-p^n} \frac{1-q^{-2cn}}{1-p^{*n}} (p x)^n\Bigr]. \] By $\exp(-\sum_{n>0}\frac{1}{n}x^n)=1-x$ and $q_j^{a_{ji}}=q^{d_j a_{ji}}=q^{b_{ji}}$, we have \[ C_{ji}(x) = \frac{(q_j^{-a_{ji}}x p ,q_i^{a_{ji}}x p^*;p,p^*)_\infty} {(q_j^{-a_{ji}}x p^*,q_j^{a_{ji}}x p ;p,p^*)_\infty} = \frac{(q^{-b_{ji}}x p ,q^{b_{ji}}x p^*;p,p^*)_\infty} {(q^{-b_{ji}}x p^*,q^{b_{ji}}x p ;p,p^*)_\infty}. \] Then, using \[ \frac{(x p;p,p^*)_\infty}{(x q;p,p^*)_\infty} = \frac{\prod_{m,n \in \bbN}(1-x p^{m+1}p^{*n})}{\prod_{m,n \in \bbN}(1-x p^m (p^*)^{n+1})} = \frac{\prod_{m \in \bbN}(1-x p^{m+1})}{\prod_{n \in \bbN}(1-x (p^*)^{n+1})} = \frac{(x p;p)_\infty}{(x p^*;p^*)_\infty} \] and $b_{ij}=b_{ji}$, we have \begin{align*} C_{ji}(x) C_{ij}(x^{-1})^{-1} &=\frac{(q^{-b_{ji}}x p ;p )_\infty}{(q^{-b_{ji}}x p^*,p^*)_\infty} \frac{(q^{ b_{ji}}x p^*;p^*)_\infty}{(q^{ b_{ji}}x p ;p )_\infty} \cdot \frac{(q^{ b_{ij}}x^{-1}p^*;p^*)_\infty}{(q^{ b_{ij}}x^{-1}p ;p )_\infty} \frac{(q^{ b_{ij}}x^{-1}p ;p )_\infty}{(q^{ b_{ij}}x^{-1}p^*;p^*)_\infty} \\ &=\frac{(q^{-b_{ij}}x,p q^{b_{ij}}/x;p)_\infty}{(q^{b_{ij}}x,p q^{-b_{ij}}/x;p)_\infty} \frac{1-q^{b_{ij}}x}{1-q^{-b_{ij}}x} \cdot \frac{(q^{b_{ij}}x,p^* q^{-b_{ij}}/x;p^*)_\infty}{(q^{-b_{ij}}x,p^* q^{b_{ij}}/x;p^*)_\infty} \frac{1-q^{-b_{ij}}x}{1-q^{b_{ij}}x} \\ &=\frac{\theta(q^{ b_{ij}}x;p^*)}{\theta(q^{-b_{ij}}x;p^*)} \frac{\theta(q^{-b_{ij}}x;p )}{\theta(q^{ b_{ij}}x;p)} =\frac{g_{ij}^*(x)}{g_{ij}(x)}. \end{align*} \end{proof} \begin{lem}\label{lem:E:ee} The relations \eqref{eq:E:ee} and \eqref{eq:E:ff} can be rewritten as \begin{align} \label{eq:E:ee'} G_{ij}^{-*}(\tfrac{z}{w}) e_i(z) e_j(w) = G_{ij}^{+*}(\tfrac{z}{w}) e_j(w) e_i(z), \quad G_{ij}^{+ }(\tfrac{z}{w}) f_i(z) f_j(w) = G_{ij}^{- }(\tfrac{z}{w}) f_j(w) f_i(z), \end{align} respectively, where we used $G_{ij}^{\pm}(x) \ceq G_{ij}^{\pm}(x;p)$ and $G_{ij}^{\pm *}(x) \ceq G_{ij}^{\pm}(x;p^*)$ with $G_{ij}^{+}(x;p) \ceq q^{-b_{ij}} \theta(q^{b_{ij}}x;p)$, $G_{ij}^-(x;p) \ceq \theta(q^{-b_{ij}}x;p)$ as introduced in \eqref{eq:E:gij}. \end{lem} \begin{proof} Recall the rewritten form \eqref{eq:E:ee''} of \eqref{eq:E:ee}. Then, \eqref{eq:E:ee''} can be rewritten as \[ z \, G_{ij}^{+*}(\tfrac{w}{z}) e_i(z) e_j(w) = -w \, G_{ij}^{+*}(\tfrac{z}{w}) e_j(w) e_i(z), \] which is equivalent to the first half of \eqref{eq:E:ee'} by the equality $x^{-1} G_{ij}^{+*}(x^{-1}) = G_{ij}^{-*}(x)$. We can similarly show the equivalence between \eqref{eq:E:ff} and the second half of \eqref{eq:E:ee'}. \end{proof} \begin{rmk} Note the similarity between the fundamental relations of the Ding-Iohara quantum algebra $U_q(g,A_l)$ and those of the elliptic algebra $U_{q,p}(\wh{\frg})$ of type $A_l$: \eqref{eq:DI:ppe} and \eqref{eq:E:ppe'}, \eqref{eq:DI:pme} and \eqref{eq:E:pme'}, \eqref{eq:DI:ee} and \eqref{eq:E:ee'}. \end{rmk} \subsubsection{Hopf algebroid structure of $U_{q,p}(\wh{\frg})$} Now we explain a Hopf algebroid structure on the elliptic algebra $U_{q,p}(\wh{\frg})$ of \cref{dfn:E:U}. Let us first remark that the definitions on Hopf algebroids in \cref{ss:pre:Halgd} are given for algebras over $\bbC$, and since $U_{q,p}(\wh{\frg})$ is not an algebra over $\bbC$ but a topological algebra over $\bbC\dbr{p}$, we should modify the definitions in \cref{ss:pre:Halgd} appropriately. The obtained notions will be called topological $H$-algebras, topological $H$-bialgebroids, and topological $H$-Hopf algebroids. We leave it for the reader to write down the precise definitions. Let us keep the notation in \S\S \ref{sss:E:root}--\ref{sss:E:EA}, and fix the Cartan matrix $A=(a_{ij})_{i,j \in I}$ of finite type $X_l$. For simplicity, we often denote the elliptic algebra associated to $A$ by \[ U \ceq U_{q,p}(\wh{\frg}). \] Recall the linear space $H$ in \eqref{eq:E:H} and the basis $\{P_i \mid i \in I\}$ in \eqref{eq:E:wtHbas}. We denote the field of meromorphic functions on the dual space $H^*$ by \[ \bbF = \clM(H^*). \] Let us consider the extension $\bbF\dbr{p} \ceq \bbF \otimes_{\bbC}\dbr{p}$ since we will work over $\bbC\dbr{p}$. Following the notation \eqref{eq:E:finF}, we express an element $F \in \bbF\dbr{p}$ as \begin{align}\label{eq:E:fPp} F = F(P,p) = \sum_{n \in \bbN}p^n F_n(P), \end{align} where $F_n(P)$ is an element of $\bbF$ for each $n \in \bbN$. Let us also recall from \eqref{eq:E:H} that the linear space $\wtH$ spanned by $P_i+h_i$, $P_i$ ($i \in I$). By \cref{dfn:E:U}, the extension $\clM(H^*)\dbr{p}$ of the meromorphic function field on $H^*$ is a subalgebra of $U$ over $\bbC\dbr{p}$. Now, let us regard $H$ as a finite-dimensional commutative Lie algebra, so that we have the notion of $H$-algebra (see \cref{ss:pre:Halgd}). In order to define the $H^*$-bigrading on $U$, we consider the actions of $q^{P+h},q^P \in \clM(\wtH^*)$ on $U$, where we regard $q^{P+h} = \exp((P+h) \log q)$, $q^P = \exp(P \log q)$ and apply \eqref{eq:E:U:1}--\eqref{eq:E:U:5}. \begin{lem}\label{lem:E:Halg} The elliptic algebra $U$ has the following topological $H$-algebra structure. \begin{clist} \item The $H^*$-bigrading $U = \bigoplus_{\alpha,\beta \in H^*} U_{\alpha,\beta}$ is given by \begin{align*} U_{\alpha,\beta} \ceq \{a \in U \mid q^{P} a q^{-P} = q^{\pair{\alpha,P}}a, \ q^{P+h} a q^{-(P+h)} = q^{\pair{\beta,P+h}}a \quad (\forall P,P+h \in \wtH) \}, \end{align*} Here $\pair{\cdot,\cdot}$ denotes the the canonical pairing on $\wtH^* \times \wtH$ (see \eqref{eq:E:Hpair}) restricted to $H^* \times \wtH$ with respect to the embedding $H =\sum_i \bbC Q_i \inj \wtH=\sum_i \bbC(Q_i+\alpha_i)+\sum_i \bbC Q_i$, $Q_i \mto Q_i$. \item The moment maps $\mu_l,\mu_r\colon \bbF\dbr{p} \to U_{0,0}$ are defined by \begin{align}\label{eq:E:mu} \mu_l(F) \ceq F(P,p^*), \quad \mu_r(F) \ceq F(P+h,p) \end{align} for $F = F(P,p) \in \bbF\dbr{p}$. \end{clist} Moreover, the following statements hold. \begin{enumerate} \item \label{i:lem:E:gen} The images $\mu_l(\bbF)$ and $\mu_r(\bbF)$ generate $\clM(\wtH^*)$. \item \label{i:lem:E:Halg:Q} The generators have the following bigrading: \begin{align*} e_i(z) \in U_{-Q_i,0}, \quad f_i(z) \in U_{0,-Q_i}, \quad \psi^\pm_i(z) \in U_{-Q_i,-Q_i}, \quad K^\pm_i \in U_{-Q_i,-Q_i}, \end{align*} and the others belong to $U_{0,0}$, where, for a current $x(z)=\sum_{m \in \bbZ} x_m z^{-m}$, the expression $x(z) \in U'_{\alpha,\beta}$ means $x_m \in U_{\alpha,\beta}$ for each $m \in \bbZ$. In particular, the bigrading values in the lattice $\clQ$: \[ U = \bigoplus_{\alpha,\beta \in \clQ} U_{\alpha,\beta}, \quad \clQ \ceq \bigoplus_{i \in I} \bbZ Q_i \subsetneq H^*. \] \end{enumerate} \end{lem} \begin{proof} This is a special case of \cref{lem:U:Halg}. \end{proof} Note that $\clQ$ is isomorphic to the root lattice of the Lie algebra $\frg$. We also have $\clM(\wtH^*)\dbr{p} \subset U_{0,0}$, so that the values \eqref{eq:E:mu} of the moment maps do belong to $U_{0,0}$. \begin{prp}\label{prp:E:Halgd} The topological $H$-algebra $U$ in \cref{lem:E:Halg} has the following topological $H$-Hopf algebroid structure $(\Delta,\ve,S)$. \begin{enumerate} \item \label{i:E:Halgd:Delta} The comultiplication $\Delta\colon U \to U \totimes U$ is given by the Drinfeld-type formulas. For $F=F(P,p) \in \bbF\dbr{p}$, we have \begin{align*} \Delta(\mu_l(F)) \ceq \mu_l(F) \totimes 1, \quad \Delta(\mu_r(F)) \ceq 1 \totimes \mu_r(F). \end{align*} By \cref{lem:E:Halg} \ref{i:lem:E:gen}, these define $\Delta$ on the whose $\clM(\wtH^*)$. The formulas for the generators $q^{\pm c/2}$, $d$ and $K^\pm_i$ are \[ \Delta(q^{\pm c/2}) \ceq q^{\pm c/2} \totimes q^{\pm c/2}, \quad \Delta(d) \ceq d \totimes 1 + 1 \totimes d, \quad \Delta(K^\pm_i) \ceq K^\pm_i \totimes K^\pm_i. \] The remaining formulas are given in terms of the generating currents: \begin{align} \label{eq:E:De} &\Delta(e_i(z)) \ceq e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z), \\ \label{eq:E:Df} &\Delta(f_i(z)) \ceq 1 \totimes f_i(z) + f_i(q^{c_2}z) \totimes \psi^-_i(q^{c_2/2}z), \\ \label{eq:E:Dp+} &\Delta(\psi_i^+(z)) \ceq \psi_i^+(q^{ c_2/2}z) \totimes \psi_i^+(q^{-c_1/2}z), \\ \label{eq:E:Dp-} &\Delta(\psi_i^-(z)) \ceq \psi_i^-(q^{-c_2/2}z) \totimes \psi_i^-(q^{ c_1/2}z). \end{align} For the symbols $q^{\pm c_1/2}$ and $q^{\pm c_2/2}$, see the comment after \eqref{eq:DI:Delta2}. \item \label{i:E:Halgd:ve} The counit $\ve\colon U \to D_H\dbr{p}$ is given by \begin{gather*} \ve(\mu_l(F)) = \ve(\mu_r(F)) \ceq F T_0, \quad \ve(q^{\pm c/2}) \ceq 1, \quad \ve(d) \ceq 0, \quad \ve(K^\pm_i) \ceq T_{Q_i}, \\ \ve(e_i(z)) = \ve(f_i(z)) \ceq 0, \quad \ve(\psi_i^{\pm}(z)) \ceq T_{Q_i}. \end{gather*} Here $D_H$ denotes the $H$-algebra of difference operators on $H^*$ (see the paragraph of \eqref{eq:Halgd:Dh}), and $D_H\dbr{p} \ceq D_H \otimes_{\bbC} \bbC\dbr{p}$ is its $\bbC\dbr{p}$-extension with the naturally induced topological $H$-algebra structure. \item \label{i:E:Halgd:S} The antipode $S\colon U \to U$ is given by \begin{gather*} S(\mu_l(F)) = \mu_r(F), \quad S(\mu_r(F)) \ceq \mu_l(F), \quad S(d) \ceq d, \quad S(q^{\pm c/2}) \ceq q^{\mp c/2}, \\ S(e_i(z)) \ceq -\psi^+_i(q^{-c/2}z)^{-1}e_i(q^{-c}z), \quad S(f_i(z)) \ceq -f_i(q^{-c}z)\psi^-_i(q^{-c/2}z), \\ S(K^\pm_i) \ceq (K^\pm_i)^{-1}, \quad S(\psi_i^{\pm}(z)) \ceq \psi_i^{\pm}(z)^{-1}. \end{gather*} \end{enumerate} \end{prp} \begin{proof} The simply-laced types will be proved in \cref{s:ADE}, \cref{prp:U:ADE} and \cref{cor:U:ADE}. The non-simply types will be treated in \cref{s:ns}. The $BCF$ types will be proved in \cref{prp:U:BCF}, and the type $G_2$ will be proved in \cref{prp:U:G}. \end{proof} The operations in \cref{prp:E:Halgd} are collected and inspected from those in \cite[Appendix B]{JKOS}, and the topological $H$-algebra structure in \cref{lem:E:Halg} is designed to fit with these operations. \subsubsection{Opposite Hopf algebroid structure} In this part, we will explain another $H$-algebra structure on the elliptic algebra $U_{q,p}(\wh{\frg})$ appearing in the literature \cite[\S3]{Ko09}, \cite[Proposition 2.4]{FKO}\footnote{There are some typos in \cite{FKO}, Proposition 2.4 and after, on the choice of the finite-dimensional commutative Lie algebra $H$. The right choice should be our $H$, denoted by $P_{\ol{\frh}}$ in loc.\ cit.} and \cite[Proposition 3.1.1]{Ko}. We start with a general argument on $\frh$-algebras. As in \cref{ss:pre:Halgd}, let $\frh$ be a finite-dimensional commutative Lie algebra over $\bbC$, $\bbF \ceq \clM(\frh^*)$, and $A=\bigl(A,\bigoplus_{\alpha,\beta \in \frh^*}A_{\alpha,\beta},\mu_l,\mu_r\bigr)$ be an $\frh$-algebra with moment maps $\mu_l,\mu_r\colon \bbF \to A_{0,0}$. Then, exchanging the bigrading and the moment maps, we have another $\frh$-algebra $A^\dagger=\bigl(A^\dagger,\bigoplus_{\alpha,\beta \in \frh^*}A^\dagger_{\alpha,\beta},\mu^\dagger_l,\mu^\dagger_r\bigr)$ with \begin{align}\label{eq:E:Adag} A^\dagger \ceq A, \quad A^\dagger_{\alpha,\beta} \ceq A_{\beta,\alpha}, \quad \mu^\dagger_l \ceq \mu_r, \quad \mu^\dagger_r \ceq \mu_l. \end{align} We now want to introduce an $\frh$-Hopf algebroid structure on the $\frh$-algebra $A^\dagger$. Recall the modified tensor product $\totimes$ of $\frh$-algebras \eqref{eq:Halgd:mtp}. \begin{lem}\label{lem:E:wtau} We have an $\frh$-algebra isomorphism \begin{align} \wt{\tau}\colon A \totimes A \lto (A^\dagger \totimes A^\dagger)^\dagger, \quad a \totimes b \lmto b \totimes a. \end{align} \end{lem} \begin{proof} We prove that $\wt{\tau}$ is well-defined as an $\frh$-algebra homomorphism. Note that, by definition, $(A^\dagger \totimes A^\dagger)^\dagger=A^\dagger \totimes A^\dagger$ as an algebra, and the bigrading and the moment maps are given by \begin{align*} &(A^\dagger \totimes A^\dagger)^\dagger_{\alpha,\beta} \ceq (A^\dagger \totimes A^\dagger)_{\beta,\alpha} = \bigoplus_{\gamma \in \frh^*} A^\dagger_{\beta,\gamma} \otimes_{\bbF} A^\dagger_{\gamma,\alpha} = \bigoplus_{\gamma \in \frh^*} A_{\gamma,\beta} \otimes_{\bbF} A_{\alpha,\gamma}, \\ &\mu_l^{\totimes^\dagger} \ceq 1 \totimes \mu^\dagger_r = 1 \totimes \mu_l, \quad \mu_r^{\totimes^\dagger} \ceq \mu^\dagger_l \totimes 1 = \mu_r \totimes 1. \end{align*} Now, let $a,a' \in A_{\alpha,\gamma}$ and $b,b' \in A_{\gamma,\beta}$, and assume $a \totimes b = a' \totimes b'$ in $A \totimes A$. Then, by the definition \eqref{eq:Halgd:totimes} of $\totimes$, we have \begin{align*} a \otimes b - a' \otimes b' =\sum_i(\mu_r(f_i)a_i \otimes b_i-a_i \otimes \mu_l(f_i)b_i) \end{align*} for some $f_i \in \bbF$ and $a_i,b_i \in A$, where $\otimes$ denotes the ordinary tensor product over $\bbC$ of $A_{\alpha, \gamma}$ and $A_{\gamma, \beta}$. The definition of the moment maps of $A'$ implies \begin{align*} b \otimes a -b' \otimes a' = \sum_i(b_i \otimes \mu_r (f_i)a_i -\mu_l (f_i)b_i \otimes a_i) = \sum_i(b_i \otimes \mu'_l(f_i)a_i -\mu'_r(f_i)b_i \otimes a_i), \end{align*} which yields $\wt{\tau}(a \totimes b) = b \totimes a = b' \totimes a' = \wt{\tau}(a' \totimes b')$ in $(A^\dagger \totimes A^\dagger)^\dagger$. Thus $\wt{\tau}$ is well-defined as an algebra homomorphism. Next, if $a \in A_{\alpha,\gamma}$ and $b \in A_{\gamma,\beta}$, then $a \totimes b \in (A \totimes A)_{\alpha,\beta}$ and $b \totimes a \in (A^\dagger \totimes A^\dagger)^\dagger_{\alpha,\beta}$. Also, for $f \in \bbF$, we have \begin{align*} &\wt{\tau}(\mu^{\totimes}_l(f)) = \wt{\tau}(\mu_l(f) \totimes 1) = 1 \totimes \mu_l(f) = \mu^{\totimes'}_l(f), \\ &\wt{\tau}(\mu^{\totimes}_r(f)) = \wt{\tau}(1 \totimes \mu_r(f)) = \mu_r(f) \totimes 1 = \mu^{\totimes'}_r(f). \end{align*} Thus $\wt{\tau}$ is an $\frh$-algebra homomorphism. The bijectivity is clear. \end{proof} Recall (see \cite[Corollary III.3.5]{Kas} for example) that, for a Hopf algebra $H=(H,m,\Delta,S)$ with multiplication $m$, comultiplication $\Delta$ and antipode $S$, we can associate the following new Hopf algebras. \[ H^{\op} \ceq (H,m^{\op},\Delta, S^{-1}), \quad H^{\cop} \ceq (H,m, \Delta^{\op},S^{-1}), \quad H^{\op,\cop} \ceq (H,m^{\op},\Delta^{\op},S), \] where the opposite operations are defined as $m^{\op} \ceq m \circ \tau$ and $\Delta^{\op} \ceq \tau \circ \Delta$, using the flip $\tau\colon H \otimes H \to H \otimes H$, $a \otimes b \mto b \otimes a$. Moreover, the antipode $S$ induces Hopf algebra isomorphisms $H \sto H^{\op,\cop}$ and $H^{\op} \sto H^{\cop}$. Using the $\frh$-algebra isomorphism $\wt{\tau}$ in \cref{lem:E:wtau}, we have a natural analogue of the above opposite theory for $\frh$-Hopf algebroids. Besides $A^\dagger$ in \eqref{eq:E:Adag}, we introduce another $\frh$-algebra $\dot{A}=(A,\bigoplus_{\alpha,\beta}\dot{A}_{\alpha,\beta},\mu_l,\mu_r)$ with \[ \dot{A}_{\alpha,\beta} \ceq A_{-\alpha,-\beta}. \] \begin{prp}\label{prp:E:Aopcop} Let $A$ be an $\frh$-algebra, and $(m,\Delta,S)$ be an $\frh$-Hopf algebroid structure on $A$ with multiplication $m\colon A \otimes A \to A$, comultiplication $\Delta\colon A \to A \totimes A$ and antipode $S\colon A \to A$. Then we have the following new $\frh$-Hopf algebroids. \begin{align}\label{eq:E:Hop} A^{\op} \ceq (\dot{A}, m^{\op},\Delta, S^{-1}), \quad A^{\cop} \ceq (A^\dagger,m, \Delta^{\op},S^{-1}), \quad A^{\op,\cop} \ceq (\dot{A}^\dagger,m^{\op},\Delta^{\op},S). \end{align} Here we defined the opposite operations as $m^{\op} \ceq m \circ \tau$ and $\Delta^{\op} \ceq \wt{\tau} \circ \Delta$, using the flip $\tau\colon A \otimes A \to A \otimes A$, $a \otimes b \mto b \otimes a$ and the map $\wt{\tau}\colon A \totimes A \to (A^\dagger \totimes A^\dagger)^\dagger$ in \cref{lem:E:wtau}. Moreover, the antipode $S$ induces $\frh$-Hopf algebroid isomorphisms $A \sto A^{\op,\cop}$ and $A^{\op} \sto A^{\cop}$. \end{prp} The proof is straightforward, and we omit it. Note that in the case $\frh=0$, we have $\totimes=\otimes$ and $\wt{\tau}=\tau$, and recover the opposite Hopf algebras in \eqref{eq:E:Hop}. Now we go back to the elliptic algebra $U=U_{q,p}(\wh{\frg})$. We equip it with the $H$-algebra structure in \cref{lem:E:Halg}. Then the $H$-algebra $U^\dagger$ in \eqref{eq:E:Adag} has the $H^*$-bigrading $U^\dagger = \bigoplus_{\alpha,\beta \in H^*} U^\dagger_{\alpha,\beta}$ with \[ U^\dagger_{\alpha,\beta} \ceq \{a \in U \mid q^{P+h} a q^{-(P+h)} = q^{\pair{\alpha,P+h}}a, \, q^P a q^{-P} = q^{\pair{\beta,P}} a \ (\forall \, P+h,P \in \wtH)\}, \] and the moment maps are $\mu^\dagger_l(F) \ceq F(P+h,p^*)$ and $\mu^\dagger_r(F) \ceq F(P,p)$ for $F=F(P,p) \in \bbF\dbr{p}$. \begin{rmk} The $H$-algebra structure on $U^\dagger$ is used in \cite[\S3.1]{Ko09} and \cite[\S3.2]{Ko} to study the comultiplication given in terms of the $L$-operators. Also, it is used in \cite{FKO} to analyze the quantum $Z$-algebra. The tensor product $(U^\dagger \totimes U^\dagger)^\dagger$ is nothing but the opposite tensor product of $U$ used in \cite{Ko09,Ko}. Let us denote \[ U \totimes^{\op} U \ceq U^\dagger \totimes U^\dagger. \] Then, the opposite comultiplication $\Delta^{\op}$ in \cref{prp:E:Aopcop} can be written as \begin{align*} &\Delta^{\op}(e_i(z)) = 1 \totimes^{\op} e_i(z) + e_i(q^{c_1}z) \totimes^{\op} \psi^+_i(q^{c_1/2}z), \\ &\Delta^{\op}(f_i(z)) = f_i(z) \totimes^{\op} 1 + \psi^-_i(q^{c_2/2}z) \totimes^{\op} f_i(q^{c_2}z), \\ &\Delta^{\op}(\psi_i^+(z)) = \psi_i^+(q^{-c_1/2}z) \totimes^{\op} \psi_i^+(q^{ c_2/2}z), \\ &\Delta^{\op}(\psi_i^-(z)) = \psi_i^-(q^{ c_1/2}z) \totimes^{\op} \psi_i^-(q^{-c_2/2}z). \end{align*} These formulas coincide with the Drinfeld-type comultiplication in \cite[Appendix B]{JKOS} up to $q$-factors. See also \cite{Fa,KO} where similar comultiplication appears. \end{rmk} \section{Dynamical Ding-Iohara algebroids of simply-laced root systems}\label{s:ADE} In this section, we introduce an family of Hopf algebroids which includes the elliptic algebras $U_{q,p}(\wh{g})$ (see \cref{ss:pre:E}) of simply-laced types, and whose Hopf algebra degeneration is the Ding-Iohara quantum algebra (see \cref{ss:pre:DI}). As in the previous \cref{ss:pre:E}, we use the word ``a topological algebra'' to mean the algebra over $\bbC\dbr{p}$ with $p$-adic topology. \subsection{Algebra structure}\label{ss:ADE:alg} We use the notation of finite root systems in \cref{sss:E:root}. Thus, let \[ A = A(X_l) = (a_{ij})_{i,j \in I}, \quad I=\{1,\dotsc,l\} \] be the Cartan matrix of finite type $X_l$ in the sense of Kac \cite[Theorem 4.3, \S 4.8, TABLE Fin]{Ka}. At this moment, we do not restrict $X_l$ to be simply-laced. We choose the symmetrization \eqref{eq:E:BDA}: \[ A = D B, \quad B = (b_{ij})_{i,j \in I}, \quad D^{-1} = \diag(d_i)_{i \in I} \] with $(d_1,\dotsc,d_l)$ in \eqref{eq:E:D}, and fix a realization $(\frh,\Pi,\Pi^\vee)$ of $A$, consisting of the Cartan subalgebra $\frh \subset \frg$, the simple roots $\Pi = \{\alpha_i \mid i \in I\} \subset \frh^*$ and the simple coroots $\Pi^\vee = \{\alpha^\vee_i \mid i \in I\} \subset \frh$. We also use the notation of dynamical parameters in \cref{sss:E:dyn}. Thus, we have the linear spaces \eqref{eq:E:H}, \eqref{eq:E:wtH}, \eqref{eq:E:H*} \begin{align}\label{eq:U:H} \begin{split} H = \sum_{i \in I} \bbC P_i \ \subset \ &\wtH = \sum_{i \in I} \bbC(P_i+h_i) + \sum_{i \in I} \bbC P_i, \\ H^* = \sum_{i \in I} \bbC Q_i \ \subset \ &\wtH^* = \sum_{i \in I} \bbC(Q_i+\alpha_i) + \sum_{i \in I} \bbC Q_i \end{split} \end{align} equipped with the bilinear form \eqref{eq:E:Hpair}: \[ \pair{Q_i,P_j} = b_{ij}, \quad \pair{\alpha_i,h_j} = a_{ji}, \quad \pair{\text{others}} = 0. \] We will regard $H$ as a commutative Lie algebra, and apply the formalism of $H$-Hopf algebroids in \cref{ss:pre:Halgd}. Finally, we introduce the structure functions satisfying a modified Ding-Iohara condition. \begin{dfn}\label{dfn:U:DI} Let $p$ be a formal parameter, and $\{G^\pm_{ij}(z;p) \mid i,j \in I\}$ be a set of functions satisfying either of the following \emph{Ding-Iohara condition}. \begin{clist} \item $G^\pm_{ij}(z;p) \in \bbC[z^{\pm1}]\dbr{p}$, and is invertible in $\bbC\dpr{z}\dbr{p}$. \item The series \[ g_{ij}(z;p) \ceq \frac{G^+_{ij}(z;p)}{G^-_{ij}(z;p)} \in \bbC\dpr{z}\dbr{p} \] satisfies \[ g_{ij}(z^{-1};p) = g_{ji}(z;p)^{-1}. \] \end{clist} We call $g \ceq \{g_{ij}(z;p) \mid i,j \in I\}$ \emph{the structure functions}. \end{dfn} Note that we have definite limits \begin{align}\label{eq:U:olG} \ol{G}^\pm_{ij}(z) \ceq \lim_{p \to 0}G^\pm_{ij}(z;p) \end{align} which belong to $\bbC[z^{\pm1}]$, and these limits are invertible in the field $\bbC\dpr{z}$. In particular, we have a well-defined function \begin{align}\label{eq:U:olg} \ol{g}_{ij}(z) \ceq \frac{\ol{G}^+_{ij}(z)}{\ol{G}^-_{ij}(z)} \ \in \bbC\dpr{z}, \end{align} which satisfy the condition \eqref{eq:DI:cond}: \begin{align}\label{eq:U:olg-cond} \ol{g}_{ij}(z^{-1}) = \ol{g}_{ji}(z)^{-1}. \end{align} Recall that we are considering the $p$-adic topology. Now let us introduce: \begin{dfn}\label{dfn:U:ADE} Let $A=A(X_l)$ be the Cartan matrix of type $X_l=A_l,D_l$ or $E_{6,7,8}$, and take the symmetrization $A=D B$ with $D^{-1}=(d_1,\dotsc,d_l)$ in \eqref{eq:E:D}, a complex parameter $q$ with $0<\abs{q}<1$, a formal parameter $p$, and the structure functions $g=\{g_{i,j} \mid i,j \in I\}$ as in \cref{dfn:U:DI}. We define \[ U_{q,p}(g,X_l) \] to be the topological algebra over $\bbC\dbr{p}$ generated by \begin{align}\label{eq:ADE:gen} \clM(\wtH^*), \ q^{\pm c/2}, \ d, \ K^{\pm}_i, \ e_{i,m}, \ f_{i,m}, \ \psi^{\pm}_{i,m} \quad (i \in I, \, m \in \bbZ) \end{align} with the following relations. Below we use the generating currents \[ e_i(z) \ceq \sum_{m \in \bbZ} e_{i,m} z^{-m}, \quad f_i(z) \ceq \sum_{m \in \bbZ} f_{i,m} z^{-m}, \quad \psi^\pm_i(z) \ceq \sum_{m \in \bbZ} \psi^\pm_{i,m} z^{-m}, \] and the genuine relations are obtained by expansion with respect to $p$, as in \cref{dfn:E:U} of the elliptic algebra $U_{q,p}(\wh{\frg})$. \begin{itemize} \item The generators $\clM(\wtH^*),q^{\pm c/2},\psi_i^{\pm}(z)$ and $K^\pm_i$ should satisfy: \begin{align}\label{eq:U:qc} \begin{split} &\text{The field $\clM(\wtH^*)$ is a subalgebra.} \\ &\text{$q^{\pm c/2}$ are central and $q^{c/2}q^{-c/2}=1$.} \\ &\text{$\psi_i^{\pm}(z)$ and $K^\pm_i$ are invertible.} \end{split} \end{align} \item For $F(P),F(P+h) \in \clM(\wtH^*)$, we have \begin{align} \label{eq:U:Fd} &F(P+h) d = d F(P+h), & &F(P ) d = d F(P), \\ \label{eq:U:FK} &F(P+h) K^\pm_i = K^\pm_i F(P+h \mp \pair{Q_i,P+h}), & &F(P ) K^\pm_i = K^\pm_i F(P \mp \pair{Q_i,P }), \\ \label{eq:U:Fe} &F(P+h) e_i(z) = e_j(z) F(P+h), & &F(P ) e_i(z) = e_i(z) F(P -\pair{Q_i,P}), \\ \label{eq:U:Ff} &F(P+h) f_i(z) = f_i(z) F(P+h-\pair{Q_i,P+h}), & &F(P ) f_i(z) = f_i(z) F(P), \\ \label{eq:U:Fp} &F(P+h) \psi^\pm_i(z) = \psi^\pm_i(z) F(P+h-\pair{Q_i,P+h}), & &F(P ) \psi^\pm_i(z) = \psi^\pm_i(z) F(P -\pair{Q_i,P }). \end{align} \item The remaining relations with $d$ are \begin{align} [d,K^\pm_i] = 0, \quad [d,e_{i,m}] = m e_{i,m}, \quad [d,f_{i,m}] = m f_{i,m}, \quad [d,\psi^\pm_i] = m \psi^\pm_{i,m}. \end{align} \item The remaining relations containing $K^\pm_i$ are given by \begin{align}\label{eq:U:Ke} K^\pm_i e_j(z) = q_i^{\mp a_{ij}} e_j(z) K^\pm_i, \quad K^\pm_i f_j(z) = q_i^{\pm a_{ij}} f_j(z) K^\pm_i, \quad [K^\pm_i, \psi^\pm_{i,m}]=0. \end{align} \item Hereafter we use \[ g^{ }_{ij}(z) \ceq g_{ij}(z;p ), \quad g^{*}_{ij}(z) \ceq g_{ij}(z;p^*). \] Then the remaining relations containing $\psi^\pm_i$ are given by \begin{align} \label{eq:U:pp} &\psi^\pm_i(z) \psi^\pm_j(w) = \frac{g^*_{ij}( \frac{z}{w})}{g_{ij}( \frac{z}{w})} \psi^\pm_j(w) \psi^\pm_i(z), & &\psi^{+}_i(z) \psi^{-}_j(w) = \frac{g^*_{ij}(q^{-c}\frac{z}{w})}{g_{ij}(q^c\frac{z}{w})} \psi^{-}_j(w) \psi^{+}_i(z), \\ \label{eq:U:ppe} &\psi^+_i(z) e_j(w) = g_{ij}^*(q^{-c/2}\tfrac{z}{w}) e_j(w) \psi^+_i(z), & &\psi^+_i(z) f_j(w) = g_{ij} (q^{ c/2}\tfrac{z}{w})^{-1}f_j(w) \psi^+_i(z), \\ \label{eq:U:pme} &\psi^-_i(z) e_j(w) = g_{ij}^*(q^{c/2}\tfrac{z}{w})e_j(w) \psi^-_i(z), & &\psi^-_i(z) f_j(w) = g_{ij} (q^{-c/2}\tfrac{z}{w})^{-1} f_j(w) \psi^-_i(z). \end{align} \item Hereafter we use \[ G^{\pm }_{ij}(z) \ceq G^{\pm}_{ij}(z;p ), \quad G^{\pm *}_{ij}(z) \ceq G^{\pm}_{ij}(z;p^*). \] Then the remaining relations consist of the quadratic relations \begin{gather} \label{eq:U:ee} G^{-*}_{ij}(\tfrac{z}{w}) e_i(z) e_j(w) = G^{+*}_{ij}(\tfrac{z}{w}) e_j(w) e_i(z), \quad G^{+ }_{ij}(\tfrac{z}{w}) f_i(z) f_j(w) = G^{- }_{ij}(\tfrac{z}{w}) f_j(w) f_i(z), \\ \label{eq:U:ef} [e_i(z), f_j(w)] = \frac{\delta_{i,j}}{q-q^{-1}} \bigl(\delta(q^{-c}\tfrac{z}{w})\psi^-_i(q^{c/2}w) -\delta(q^{ c}\tfrac{z}{w})\psi^+_i(q^{c/2}z)\bigr) \end{gather} for any $i,j \in I$, and the following Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS} for $i,j \in I$ such that $a_{ij}=-1$. Using $\wt{g}^*_{ij}(z) \ceq \ol{g}_{ij}(z)/g^*_{ij}(z)$ with $\ol{g}_{ij}(z)$ given in \eqref{eq:U:olg} and \begin{align}\label{eq:U:hij} h_{ij} \ceq \frac{(\ol{g}_{ii}(\frac{z_1}{z_2})+1)(\ol{g}_{ij}(\frac{z_1}{z })\ol{g}_{ij}(\frac{z_2}{z})+1)} { \ol{g}_{ij}(\frac{z_2}{z })+ \ol{g}_{ii}(\frac{z_1}{z_2})\ol{g}_{ij}(\frac{z_1}{z}) }, \end{align} the Serre-type relation for $e_i(z),e_j(z)$ is given by \begin{align}\label{eq:U:eS} \begin{split} &\wt{g}^*_{ii}(\tfrac{z_1}{z_2}) \wt{g}^*_{ij}(\tfrac{z_1}{z }) \wt{g}^*_{ij}(\tfrac{z_2}{z }) e_i(z_1) e_i(z_2) e_j(z) -h_{ij} \wt{g}^*_{ii}(\tfrac{z_1}{z_2}) \wt{g}^*_{ij}(\tfrac{z_1}{z }) e_i(z_1) e_j(z) e_i(z_2) \\ & +\wt{g}^*_{ii}(\tfrac{z_1}{z_2}) e_j(z) e_i(z_1) e_i(z_2) +\wt{g}^*_{ij}(\tfrac{z_1}{z }) \wt{g}^*_{ij}(\tfrac{z_2}{z }) e_i(z_2) e_i(z_1) e_j(z) \\ & -h_{ij} \wt{g}^*_{ij}(\tfrac{z_2}{z }) e_i(z_2) e_j(z) e_i(z_1) +e_j(z) e_i(z_2) e_i(z_1)=0. \end{split} \end{align} Similarly, using $\wt{g}_{ij}(z) \ceq g_{ij}(z)/\ol{g}_{ij}(z)$, the Serre-type relation for $f_i(z),f_j(z)$ is given by \begin{align}\label{eq:U:fS} \begin{split} &\wt{g}_{ii}(\tfrac{z_1}{z_2}) \wt{g}_{ij}(\tfrac{z_1}{z }) \wt{g}_{ij}(\tfrac{z_2}{z }) f_i(z_1)f_i(z_2)f_j(z) -h_{ij} \wt{g}_{ii}(\tfrac{z_1}{z_2}) \wt{g}_{ij}(\tfrac{z_1}{z }) f_i(z_1)f_j(z)f_i(z_2) \\ & +\wt{g}_{ii}(\tfrac{z_1}{z_2}) f_j(z)f_i(z_1)f_i(z_2) +\wt{g}_{ij}(\tfrac{z_1}{z }) \wt{g}_{ij}(\tfrac{z_2}{z }) f_i(z_2)f_i(z_1)f_j(z) \\ & -h_{ij} \wt{g}_{ij}(\tfrac{z_2}{z}) f_i(z_2)f_j(z)f_i(z_1) +f_j(z)f_i(z_2)f_i(z_1)=0. \end{split} \end{align} Note that the function $h_{ij}$ of \eqref{eq:U:hij} coincides with \eqref{eq:DI:hij} appearing in the Serre-type relations for the Ding-Iohara quantum algebra with $g_{ij}(z)$ replaced by $\ol{g}_{ij}(z)$. \end{itemize} \end{dfn} \begin{rmk} By the same discussion of \cref{rmk:E:U} \ref{i:rmk:E:U:d'}, the topological algebra $U_{q,p}(g,X_l)$ is independent, up to isomorphism, of the choice of a symmetrization of the Cartan matrix $A$. \end{rmk} \begin{rmk}\label{rmk:ADE:top} Instead of \cref{dfn:U:DI}, we can use broader class of the structure functions $g=\{g_{ij}(z;p) \mid i,j \in I\}$ with some care. Let us explain two such classes. \begin{enumerate} \item \label{i:rmk:ADE:top:p'} Let $p$ and $p'$ be formal parameters, and $\{G^\pm_{ij}(z;p) \mid i,j \in I\}$ be a set of series satisfying the following two conditions. \begin{clist} \item $G^\pm_{ij}(z;p) \in \bbC[z^{\pm1}]\dbr{p'}\dbr{p}$, and is invertible in $\bbC\dpr{z}\dbr{p'}\dbr{p}$. \item The series $g_{ij}(z;p) \ceq G^+_{ij}(z;p)/G^-_{ij}(z;p) \in \bbC\dpr{z}\dbr{p'}\dbr{p}$ satisfies $g_{ij}(z^{-1};p) = g_{ji}(z;p)^{-1}$. \end{clist} Then we have the definite limits $\ol{g}_{ij}(z) \in \bbC\dbr{z}\dbr{p'}$, and considering the $p$- and $p'$-adic topology, we obtain the topological algebra $U$. \item Let $\{G^\pm_{ij}(z;p) \mid i,j \in I\}$ satisfy the following two conditions. \begin{clist} \item $G^\pm_{ij}(z;p) \in \clA \dbr{p}$, and is invertible in $(\Frac \clA)\dbr{p}$. Here we used the function ring $\clA$ in \eqref{eq:DI:clA}. \item The series $g_{ij}(z;p) \ceq G^+_{ij}(z;p)/G^-_{ij}(z;p) \in (\Frac \clA)\dbr{p}$ satisfies $g_{ij}(z^{-1};p) = g_{ji}(z;p)^{-1}$. \end{clist} Then we have the definite limits $\ol{g}_{ij}(z) \in \Frac \clA$, and obtain the genuine relations of $U$ by expanding generating currents and series first in terms of $p$, and second in terms of the current/series variable. However, this process yields relations containing infinite summations in general, and we should take some solution such as \ref{i:rmk:DI:top:b} in \cref{rmk:DI:top}. \end{enumerate} \end{rmk} The Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS} look rather complicated, but the other defining relations are the same as those of the elliptic algebra $U_{q,p}(\wh{g})$ of type $X_l=A_l,D_l$ or $E_{6,7,8}$ in \cref{dfn:E:U}. Indeed, recalling \eqref{eq:E:gij}, we have: \begin{prp}\label{prp:U:ADE} In \cref{dfn:U:ADE} of $U_{q,p}(g,X_l)$ for type $X_l=A_l,D_l,E_{6,7,8}$, set the structure functions $g=\{g_{ij}(z;p) \mid i,j \in I\}$ as \begin{align}\label{eq:U:gijE} g_{ij}(x;p) = \frac{G_{ij}^+(x;p)}{G_{ij}^-(x;p)} \ceq \frac{q^{-b_{ij}} \theta(q^{b_{ij}}x;p)}{\theta(q^{-b_{ij}}x;p)}, \end{align} where $B=(b_{ij})_{i,j \in I}$ is the symmetrization $A=D B$ of the Cartan matrix $A=A(X_l)$. Note that these satisfy the Ding-Iohara condition (\cref{dfn:U:DI}). Then we have an isomorphism of topological algebras \[ U_{q,p}(g,X_l) \cong U_{q,p}(\wh{g}). \] \end{prp} \begin{proof} The generators of both topological algebra coincide. Also, using \cref{lem:E:pef,lem:E:pp,lem:E:ee} and comparing the fundamental relations of $U_{q,p}(\wh{g})$ in \cref{dfn:E:U} and those of $U_{q,p}(g,X_l)$ in \cref{dfn:U:ADE}, we immediately find that they coincide except the Serre-type relations \eqref{eq:E:eS} and \eqref{eq:E:fS}. So it remains to check that the specialization \eqref{eq:U:gijE} turns the relations \eqref{eq:U:eS} and \eqref{eq:U:fS} into \eqref{eq:E:eS} and \eqref{eq:E:fS}, respectively. First, since we are considering the simply-laced types, the structure functions $g^*_{ij}(z)=g_{ij}(z;p^*)$ and their limits $\ol{g}_{ij}(z)$ are given by \begin{align*} g^*_{ii}(z) = q^{-2} \frac{\theta^*(q^{ 2}z)}{\theta^*(q^{-2}z)}, \quad g^*_{ij}(z) = q^{ } \frac{\theta^*(q^{-1}z)}{\theta^*(q^{ }z)}, \quad \ol{g}_{ii}(z) = q^{-2} \frac{1-q^{ 2}z}{1-q^{-2}z}, \quad \ol{g}_{ij}(z) = q^{ } \frac{1-q^{-1}z}{1-q^{ }z} \end{align*} with $\theta^*(x) \ceq \theta(x;p^*) = (x,p^*/x;p^*)_\infty$. Then, using \eqref{eq:E:bini}, the function $h_{ij}$ in \eqref{eq:U:hij} is equal to \begin{align}\label{eq:ADE:h=2q} h_{ij} = q+q^{-1} = \bnm{2}{1}{i} \end{align} for any $i \ne j$. (See \cref{ss:ns:h} for a generalization of this equality.) Also, denoting $z_{a0} \ceq z_a/z_0$ and $z_{0a} \ceq z_0/z_a$ for $a=1,2$, we have \begin{align}\label{eq:ADE:olg/g*} \frac{\ol{g}_{ij}(z_{a0})}{g^*_{ij}(z_{a0})} = \frac{(p^* q z_{a0},p^*/(q z_{a0});p^*)}{(p^* q^{-1}z_{a0},p^*/(q^{-1} z_{a0});p^*)} = \frac{\wtgm^*(z_{0a};q^{-1})}{\wtgm^*(z_{a0};q^{-1})}, \end{align} where $\wtgm^*(z;q) \ceq \wtgm(z;q,p^*)=(p^* q x;p^*)_\infty/(p^* q^{-1} z;p^*)_\infty$ using the function $\wtgm$ in \eqref{eq:E:wtgam}. Now, we can rewrite the last second term of \eqref{eq:U:eS} as \begin{align}\label{eq:ADE:eS5} -h_{ij} \frac{\ol{g}_{ij}(z_{20})}{g^*_{ij}(z_{20})} e_i(z_2) e_j(z) e_i(z_1) = -\bnm{2}{1}{i} \frac{\wtgm^*(z_{12};q^{ 2})}{\wtgm^*(z_{12};q^{ 2})} \frac{\wtgm^*(z_{02};q^{-1})}{\wtgm^*(z_{20};q^{-1})} \frac{\wtgm^*(z_{10};q^{-1})}{\wtgm^*(z_{10};q^{-1})} e_i(z_2) e_j(z) e_i(z_1), \end{align} where we denoted $z_{12} \ceq z_1/z_2$. Note that we inserted two trivial fractions in the right hand side. We can similarly rewrite the fourth term of \eqref{eq:U:eS} as \begin{align}\label{eq:ADE:eS4} \frac{\ol{g}_{ij}(z_{10})}{g^*_{ij}(z_{10})} \frac{\ol{g}_{ij}(z_{20})}{g^*_{ij}(z_{20})} e_i(z_2) e_i(z_1) e_j(z) = \frac{\wtgm^*(z_{12};q^{ 2})}{\wtgm^*(z_{12};q^{ 2})} \frac{\wtgm^*(z_{01};q^{-1})}{\wtgm^*(z_{10};q^{-1})} \frac{\wtgm^*(z_{02};q^{-1})}{\wtgm^*(z_{20};q^{-1})} e_i(z_2) e_i(z_1) e_j(z). \end{align} Next, using \begin{align}\label{eq:ADE:olg/g} \frac{\ol{g}_{ii}(z_{12})}{g^*_{ii}(z_{12})} = \frac{(p^* q^{-2} z_{12},p^*/(q^{-2} z_{12});p^*)}{(p^* q^2 z_{12},p^*/(q^2 z_{12});p^*)} = \frac{\wtgm^*(z_{21};q^2)}{\wtgm^*(z_{12};q^2)} \end{align} with $z_{21} \ceq z_2/z_1$, we can rewrite the third term of \eqref{eq:U:eS} as \begin{align}\label{eq:ADE:eS3} \frac{\ol{g}_{ii}(z_{12})}{g^*_{ii}(z_{12})} e_j(z) e_i(z_1) e_i(z_2) = \frac{\wtgm^*(z_{21};q^{ 2})}{\wtgm^*(z_{12};q^{ 2})} \frac{\wtgm^*(z_{10};q^{-1})}{\wtgm^*(z_{10};q^{-1})} \frac{\wtgm^*(z_{20};q^{-1})}{\wtgm^*(z_{20};q^{-1})} e_j(z) e_i(z_1) e_i(z_2), \end{align} By a similar calculation, we can rewrite the second term as \begin{align} \label{eq:ADE:eS2} \begin{split} &-h_{ij} \frac{\ol{g}_{ii}(z_{12})}{g^*_{ii}(z_{12})} \frac{\ol{g}_{ij}(z_{10})}{g^*_{ij}(z_{10})} e_i(z_1) e_j(z) e_i(z_2) \\ &=-\bnm{2}{1}{i} \frac{\wtgm^*(z_{21};q^{ 2})}{\wtgm^*(z_{12};q^{ 2})} \frac{\wtgm^*(z_{01};q^{-1})}{\wtgm^*(z_{10};q^{-1})} \frac{\wtgm^*(z_{20};q^{-1})}{\wtgm^*(z_{20};q^{-1})} e_i(z_1) e_j(z) e_i(z_2), \end{split} \end{align} and the first terms as \begin{align} \label{eq:ADE:eS1} \begin{split} &\frac{\ol{g}_{ii}(z_{12})}{g^*_{ii}(z_{12})} \frac{\ol{g}_{ij}(z_{10})}{g^*_{ij}(z_{10})} \frac{\ol{g}_{ij}(z_{20})}{g^*_{ij}(z_{20})} e_i(z_1) e_i(z_2) e_j(z) \\ &= \frac{\wtgm^*(z_{21};q^{ 2})}{\wtgm^*(z_{12};q^{ 2})} \frac{\wtgm^*(z_{01};q^{-1})}{\wtgm^*(z_{10};q^{-1})} \frac{\wtgm^*(z_{02};q^{-1})}{\wtgm^*(z_{20};q^{-1})} e_i(z_1) e_i(z_2) e_j(z). \end{split} \end{align} Finally, combining \eqref{eq:ADE:eS5}--\eqref{eq:ADE:eS1}, reordering, and multiplying by $\wtgm^*(z_{21};q^2) \wtgm^*(z_{20};q^{-1}) \wtgm^*(z_{10};q^{-1})$, we can rewrite \eqref{eq:U:eS} as \begin{align*} 0= &\wtgm^*(z_{21};q^2)\Bigl( \wtgm^*(z_{10};q^{-1}) \wtgm^*(z_{20};q^{-1}) e_j(z) e_i(z_1) e_i(z_2) -\bnm{2}{1}{i} \wtgm^*(z_{01};q^{-1}) \wtgm^*(z_{20};q^{-1}) e_i(z_1) e_j(z) e_i(z_2) \\ &\hspace{4em} +\wtgm^*(z_{01};q^{-1}) \wtgm^*(z_{02};q^{-1}) e_i(z_1) e_i(z_2) e_j(z)\Bigr) \\ + &\wtgm^*(z_{12};q^2)\Bigl( \wtgm^*(z_{20};q^{-1}) \wtgm^*(z_{10};q^{-1}) e_j(z) e_i(z_2) e_i(z_1) -\bnm{2}{1}{i} \wtgm^*(z_{02};q^{-1}) \wtgm^*(z_{10};q^{-1}) e_i(z_2) e_j(z) e_i(z_1) \\ &\hspace{4em} +\wtgm^*(z_{02};q^{-1}) \wtgm^*(z_{01};q^{-1}) e_i(z_2) e_i(z_1) e_j(z)\Bigr), \end{align*} which is nothing but \eqref{eq:E:eS} for simply-laced types. In the same way, we can check that \eqref{eq:U:fS} is equivalent to \eqref{eq:E:fS} under the assumption \eqref{eq:U:gijE}. Hence we have the statement. \end{proof} \begin{rmk} We discovered the combination $\ol{g}_{ij}(z_a/z_b)/g_{ij}(z_a/z_b)$ and $\ol{g}_{ij}(z_a/z_b)/g^*_{ij}(z_a/z_b)$ in the Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS} to establish the equalities \eqref{eq:ADE:olg/g*} and \eqref{eq:ADE:olg/g} with the function $\wt{\gamma}$. The function $h_{ij}$ is discovered by the well-definedness of the Drinfeld-type comultiplication, which will be commented in \cref{rmk:ADE:h}. \end{rmk} \subsection{\texorpdfstring{$H$}{H}-Hopf algebroid structure}\label{ss:ADE:Halgd} Hereafter in this \cref{ss:ADE:Halgd}, we denote \[ U \ceq U_{q,p}(g,X_l), \quad \bbF \ceq \clM(H^*) \] for simplicity. Let us introduce an $H$-Hopf algebroid structure on $U$ with $H=\sum_{i \in I}\bbC P_i$ in \eqref{eq:U:H}. We begin with: \begin{lem}\label{lem:U:Halg} $U=U_{q,p}(g,X_l)$ is a topological $H$-algebra with the $H^*$-bigrading $U=\bigoplus_{\alpha,\beta \in H^*} U_{\alpha,\beta}$ given by \begin{align*} U_{\alpha,\beta} \ceq \{a \in U \mid q^{P } a q^{-P } = q^{\pair{\alpha,P }}a, \ q^{P+h} a q^{-P-h} = q^{\pair{\beta,P+h}}a \quad (P,P+h \in \wtH) \}, \end{align*} and the moment maps $\mu_l,\mu_r\colon \bbF\dbr{p} \to U_{0,0}$ defined by \begin{align*} \mu_l(F) \ceq F(P,p^*), \quad \mu_r(F) \ceq F(P+h,p) \end{align*} for $F=F(P,p) \in \bbF\dbr{p}$. Moreover, the bigrading values in the lattice $\clQ \ceq \bigoplus_{i \in I} \bbZ Q_i \subsetneq H^*$. \end{lem} \begin{proof} The conditions of the moment maps can be checked directly. For instance, \begin{align*} &\mu_l(F)(e_i(z)) = F(P,p^*) e_i(z) = e_i(z) F(P-\pair{Q_i,P},p) = e_i(z) \mu_l\bigl(T_{-Q_i}(F)\bigr), \\ &\mu_r(F)(e_i(z)) = F(P+h,p^*)e_i(z) = e_i(z) F(P+h,p) = e_i(z) \mu_r\bigl(T_0(F)\bigr). \end{align*} The last statement on the bigrading holds since \begin{align*} e_i(z) \in U_{-Q_i,0}, \quad f_i(z) \in U_{0,-Q_i}, \quad \psi^\pm_i(z) \in U_{-Q_i,-Q_i}, \quad K^\pm_i \in U_{-Q_i,-Q_i} \end{align*} (see \cref{lem:E:Halg} \ref{i:lem:E:gen} for the meaning) and the other generators belong to $U_{0,0}$ \end{proof} For later use, let us write down the isomorphisms $D_H \totimes U \cong U \cong U \totimes D_H$ in \eqref{eq:Halgd:Delta-ve}. By \eqref{eq:Halgd:to} and \eqref{eq:Halgd:Dh}, we have \begin{align*} & (D_H \totimes U)_{\alpha,\beta} = (D_H)_{\alpha,\alpha} \otimes_{\bbF} U_{\alpha,\beta} = \bbF T_{-\alpha} \otimes_{\bbF} U_{\alpha,\beta}, \\ & (U \totimes D_H)_{\alpha,\beta} = U_{\alpha,\beta} \otimes_{\bbF} (D_H)_{\beta,\beta} = U_{\alpha,\beta} \otimes_{\bbF} \bbF T_{-\beta} \end{align*} for $\alpha,\beta \in \clQ \subset H^*$. Then, by \eqref{eq:Halgd:totimes}, we find that the isomorphisms are given by \begin{align}\label{eq:ADE:DU=U} (D_H \totimes U)_{\alpha,\beta} = \bbF T_{-\alpha} \otimes_{\bbF} U_{\alpha,\beta} \lsto U_{\alpha,\beta}, \quad F T_{-\alpha} \totimes a = T_{-\alpha} \totimes \mu_l(F) a \lmto \mu_l(F) a \end{align} and \begin{align}\label{eq:ADE:UD=U} (U \totimes D_H)_{\alpha,\beta} = U_{\alpha,\beta} \otimes_{\bbF} \bbF T_{-\beta} \lsto U_{\alpha,\beta}, \quad a \totimes F T_{-\beta} = \mu_r(F) a \otimes T_{-\beta} \lmto a \mu_r(F) \end{align} for $a \in U_{\alpha,\beta}$ and $F \in \bbF\dbr{p}$. Next, we introduce a Drinfeld-type comultiplication on $U$. \begin{lem}\label{lem:U:Delta} We define a homomorphism $\Delta \colon U \to U \totimes U$ of topological algebras by \begin{align}\label{eq:U:Delta0} \Delta(\mu_l(F)) \ceq \mu_l(F) \totimes 1, \quad \Delta(\mu_r(F)) \ceq 1 \totimes \mu_r(F) \end{align} for $F=F(P,p) \in \bbF\dbr{p}$, \begin{align} \Delta(q^{\pm c/2}) \ceq q^{\pm c/2} \totimes q^{\pm c/2}, \quad \Delta(d) \ceq d \totimes 1 + 1 \totimes d, \quad \Delta(K^\pm_i) \ceq K^\pm_i \totimes K^\pm_i, \end{align} and \begin{align} \Delta(e_i(z)) \ceq e_i(z) \totimes 1+ \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z), \qquad &\Delta(f_i(z)) \ceq 1 \totimes f_i(z)+ f_i(q^{c_2}z) \totimes \psi^-_i(q^{c_2/2}z), \\ \label{eq:U:Delta1} \Delta(\psi_i^+(z)) \ceq \psi_i^+(q^{-c_2/2}z) \totimes \psi_i^+(q^{c_1/2}z), \qquad &\Delta(\psi_i^-(z)) \ceq \psi_i^-(q^{c_2/2}z) \totimes \psi_i^-(q^{- c_1/2}z) \end{align} for the generating currents. Then $\Delta$ is a topological $H$-algebra homomorphism. \end{lem} \begin{proof} First, we show that $\Delta$ is well-defined as a homomorphism of topological algebras. We will only write down the check for a part of the defining relations of $U$. We can check the block \eqref{eq:U:FK}--\eqref{eq:U:Fp} as \begin{align*} \Delta(F(P))\Delta(e_i(z)) &=\bigl(1 \totimes F(P)\bigr) \bigl(1 \totimes e_i(z)+ e_i(q^{c_2}z)\totimes \psi_i^+(q^{c_2/2}z)\bigr) \\ &=1 \totimes F(P)e_i(z)+ e_i(q^{c_2}z)\totimes F(P)\psi_i^+(q^{c_2/2}z) \\ &=1 \totimes e_i(z)F(P-\pair{Q_i,P}) + e_i(q^{c_2}z) \totimes \psi_i^+(q^{c_2/2}z)F(P-\pair{Q_i,P}) \\ &=\Delta(e_i(z))\Delta(F(P-\pair{Q_i, P})). \end{align*} The relations \eqref{eq:U:Ke} can be checked as \begin{align*} \Delta(K^\pm_i)\Delta(\psi^+_j(w)) &=\bigl(K^\pm_i \totimes K^\pm_i\bigr) \bigl( \psi^+_j(q^{c_2/2}w) \totimes \psi^+_j(q^{-c_1/2}w)\bigr) =K^\pm_i\psi^+_j(q^{c_2/2}w) \totimes K^\pm_i \psi^+_j(q^{-c_1/2}w) \\ &=\psi_j^+(q^{c_2/2}w) K^\pm_i \totimes \psi^+_j(q^{-c_1/2}w) K^\pm_i =\Delta(\psi^+_j(w)) \Delta(K^\pm_i). \end{align*} The block \eqref{eq:U:pp}--\eqref{eq:U:pme} can be checked as \begin{align*} \Delta(\psi_i^+(z))\Delta(\psi_j^+(w)) &=\psi_i^+(q^{ c_2/2}z)\psi_j^+(q^{ c_2/2}w) \totimes \psi_i^+(q^{-c_1/2}z)\psi_j^+(q^{-c_1/2}w) \\ &=\frac{g_{ij}^*(\frac{z}{w})}{g_{ij}(\frac{z}{w})} \psi_j^+(q^{ c_2/2}w)\psi_i^+(q^{c_2/2}z) \totimes \frac{g_{ij}^*(\frac{z}{w})}{g_{ij}(\frac{z}{w})} \psi_j^+(q^{-c_1/2}w) \psi_i^+(q^{-c_1/2}z) \\ &=\Delta\left(\frac{g_{ij}^*(\frac{z}{w})}{g_{ij}(\frac{z}{w})}\right) \Delta(\psi_j^+(w))\Delta(\psi_i^+(z)), \\ \Delta(\psi_i^+(z))\Delta(\psi_j^-(w)) &=\psi_i^+(q^{ c_2/2}z) \psi_j^-(q^{-c_2/2}w) \totimes \psi_i^+(q^{-c_1/2}z) \psi_j^-(q^{ c_1/2}w) \\ &=\frac{g_{ij}^*(q^{-c_1+c_2}\frac{z}{w})}{g_{ij}(q^{ c_1+c_2}\frac{z}{w})} \psi_j^-(q^{-c_2/2}w)\psi_i^+(q^{ c_2/2}z) \totimes \frac{g_{ij}^*(q^{-c_1-c_2}\frac{z}{w})}{g_{ij}(q^{-c_1+c_2}\frac{z}{w})} \psi_j^-(q^{-c_2/2}w)\psi_i^+(q^{ c_2/2}z) \\ &=\Delta\left(\frac{g_{ij}^*(q^{-c}\frac{z}{w})}{g_{ij}(q^{c}\frac{z}{w})}\right) \Delta(\psi_j^-(w))\Delta(\psi_i^+(z)), \\ \Delta(\psi_i^+(z))\Delta(e_j(w)) &=\bigl(\psi_i^+(q^{-c_2/2}z) \totimes \psi_i^+(q^{c_1/2}z)\bigr) \bigl(e_j(w) \totimes 1+\psi^+_j(q^{c_1/2}w) \totimes e_j(q^{c_1}w)\bigr) \\ &=\psi_i^+(q^{-c_2/2}z)e_j(w) \totimes \psi_i^+(q^{c_1/2}z) +\psi_i^+(q^{-c_2/2}z) \psi^+_j(q^{c_1/2}w) \totimes \psi_i^+(q^{c_1/2}z) e_j(q^{c_1}w) \\ &=g^*_{ij}(q^{\frac{-c_1-c_2}{2}}\tfrac{z}{w})e_j(w)\psi_i^+(q^{-c_2/2}z) \totimes \psi_i^+(q^{c_1/2}z) \\ &\quad +\frac{g_{ij}^*(q^{\frac{-c_1-c_2}{2}}\frac{z}{w})}{g_{ij}(q^{\frac{-c_1-c_2}{2}}\frac{z}{w})} \psi^+_j(q^{c_1/2}w)\psi^+_i(q^{-c_2/2}z) \totimes g_{ij}^*(q^{\frac{-c_1-c_2}{2}}\tfrac{z}{w}) e_j(q^{c_1}w)\psi^+_i(q^{c_1/2}z) \\ &=\Delta\bigl(g_{ij}(q^{-c/2}\tfrac{z}{w})\bigr) \Delta(e_j(w)) \Delta(\psi_i^+(z)). \end{align*} As for the quadratic relation \eqref{eq:U:ee}, we have \begin{align*} & [\Delta(e_i(z)), \Delta(f_i(w))] \\ &=\bigl(e_i(z) \totimes 1+\psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) \bigl(1 \totimes f_i(w) + f_i(q^{c_2}w) \totimes \psi^-_i(q^{\frac{c_2}{2}}w)\bigr) \\ &\quad -\bigl(1 \totimes f_i(w) + f_i(q^{c_2}w) \totimes \psi^-_i(q^{\frac{c_2}{2}}w)\bigr) \bigl(e_i(z) \totimes 1+\psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) \\ &=\psi_i^+(q^{c_1/2}z) \totimes [e_i(q^{c_1}z),f_i(w)] + [e_i(z),f_i(q^{c_2}w)] \totimes \psi_i^+(q^{c_2/2}w) \\ &\quad +\bigl(\psi^+_i(q^{c_1/2}z)f_i(q^{c_2}w) \totimes e_i(q^{c_1}z)\psi^-_i(q^{c_2/2}w) -f_i(q^{c_2}w)\psi^+_i(q^{c_1/2}z) \totimes \psi^-_i(q^{c_2/2}w)e_i(q^{c_1}z)\bigr). \end{align*} The defining relations imply that the last term vanishes. The first and second terms are \begin{align*} & \psi_i^+(q^{c_1/2}z) \totimes [e_i(q^{c_1}z),f_i(w)] + [e_i(z),f_i(q^{c_2}w)] \totimes \psi_i^+(q^{c_2/2}w) \\ &=\frac{1}{q-q^{-1}}\Bigl( \psi_i^+(q^{c_1/2}z) \totimes \bigl(\delta(q^{c_1-c_2}\tfrac{z}{w}) \psi_i^-(q^{c_2/2}w) - \delta(q^{c_1+c_2}\tfrac{z}{w}) \psi_i^+(q^{c_1+c_2/2}z) \bigr) \\ &\hspace{5em} +\bigl(\delta(q^{-c_1-c_2}\tfrac{z}{w}) \psi_i^-(q^{c_1/2+c_2}w) - \delta(q^{ c_1-c_2}\tfrac{z}{w}) \psi_i^+(q^{c_1/2}z) \bigr) \totimes \psi_i^-(q^{c_2/2}w) \Bigr) \\ &=\frac{1}{q-q^{-1}}\bigl( \delta(q^{-c_1-c_2}\tfrac{z}{w}) \psi_i^-(q^{c_1/2+c_2}w) \totimes \psi_i^+(q^{c_2/2}w) \totimes - \psi^+_i(q^{c_1/2}z) \totimes \delta(q^{ c_1+c_2}\tfrac{z}{w}) \psi_i^+(q^{c_1+c_2/2}z) \\ &=\frac{1}{q-q^{-1}}\Bigl( \Delta\bigl(\delta(q^{-c}\tfrac{z}{w})\bigr) \Delta\bigl(\psi_i^-(q^{c/2}w)\bigr) - \Delta\bigl(\delta(q^{ c}\tfrac{z}{w})\bigr) \Delta\bigl(\psi_i^+(q^{c/2}z)\bigr)\Bigr), \end{align*} by which we have checked \eqref{eq:U:ee}. As for the Serre-type relation \eqref{eq:U:eS}, we have \begin{align} \label{eq:ADE:DS} \begin{split} & \Delta\Bigl( \frac{\ol{g}_{ii}(\frac{z_1}{z_2})}{g^*_{ii}(\frac{z_1}{z_2})} \frac{\ol{g}_{ij}(\frac{z_1}{z})}{g^*_{ij}(\frac{z_1}{z})} \frac{\ol{g}_{ij}(\frac{z_2}{z})}{g^*_{ij}(\frac{z_2}{z})}\Bigr) \Delta(e_i(z_1)) \Delta(e_i(z_2)) \Delta(e_j(z)) \\ &-\Delta\Bigl(h_{ij} \frac{\ol{g}_{ii}(\frac{z_1}{z_2})}{g^*_{ii}(\frac{z_1}{z_2})} \frac{\ol{g}_{ij}(\frac{z_1}{z})}{g^*_{ij}(\frac{z_1}{z})}\Bigr) \Delta(e_i(z_1)) \Delta(e_j(z)) \Delta(e_i(z_2)) \\ &+\Delta\Bigl(\frac{\ol{g}_{ii}(\frac{z_1}{z_2})}{g^*_{ii}(\frac{z_1}{z_2})}\Bigr) \Delta(e_j(z)) \Delta(e_i(z_1)) \Delta(e_i(z_2)) +\Delta\Bigl( \frac{\ol{g}_{ij}(\frac{z_1}{z})}{g^*_{ij}(\frac{z_1}{z})} \frac{\ol{g}_{ij}(\frac{z_2}{z})}{g^*_{ij}(\frac{z_2}{z})}\Bigr) \Delta(e_i(z_2)) \Delta(e_i(z_1)) \Delta(e_j(z)) \\ &-\Delta\Bigl(h_{ij} \frac{\ol{g}_{ij}(\frac{z_2}{z})}{g^*_{ij}(\frac{z_2}{z})}\Bigr) \Delta(e_i(z_2)) \Delta(e_j(z)) \Delta(e_i(z_1)) +\Delta(e_j(z)) \Delta(e_i(z_2)) \Delta(e_i(z_1)) = 0. \end{split} \end{align} The remaining relations can be checked similarly. Next we prove that $\Delta$ is a homomorphism of topological $H$-algebras. It is clear that $\Delta$ preserves the $H^*$-bigradings. The compatibility with the moment maps can be checked as \begin{align*} \Delta(\mu_l(F)) = \mu_l(F) \totimes 1 = \mu_l^{\totimes}(F), \quad \Delta(\mu_r(F)) = 1 \totimes \mu_r(F) = \mu_r^{\totimes}(F) \end{align*} for $F=F(P,p) \in \bbF\dbr{p}$, where $\mu_l^{\totimes}$ and $\mu_r^{\totimes}$ denote the moment maps of the tensor product $U \totimes U$ (see \eqref{eq:Halgd:mu-totimes}). \end{proof} \begin{rmk}\label{rmk:ADE:h} The condition that \eqref{eq:ADE:DS} vanishes uniquely determines the function $h_{ij}$ in \eqref{eq:U:hij}. \end{rmk} Next, we introduce the counit of $U$. Recall the topological $H$-algebra $D_H\dbr{p}$ explained in \cref{prp:E:Halgd} \ref{i:E:Halgd:ve}. \begin{lem}\label{lem:ADE:ve} Let $\ve\colon U \to D_H\dbr{p}$ be the homomorphism of topological algebra with \begin{align}\label{eq:U:ve0} \ve(\mu_l(F)) = \ve(\mu_r(F)) \ceq F T_0, \quad \ve(q^{\pm c/2}) \ceq 1, \quad \ve(d) \ceq 0 \end{align} for $F=F(P,p) \in \bbF\dbr{p}$ and \begin{align}\label{eq:U:ve1} \ve(K^\pm_i) \ceq T_{Q_i}, \quad \ve(e_i(z)) = \ve(f_i(z)) \ceq 0, \quad \ve(\psi_i^{\pm}(z)) \ceq T_{Q_i}. \end{align} Then $\ve$ is a topological $H$-algebra homomorphism. \end{lem} \begin{proof} We can check that $\ve$ is well-defined as a topological algebra morphism by direct calculations as in \cref{lem:U:Delta} (the calculation is much simpler). On the check of $\ve$ being a topological $H$-algebra homomorphism, it is clear that $\ve$ preserves the $H^*$-bigradings. The compatibility with the moment maps can be checked as \begin{align*} &\ve(\mu_l(F)) = \ve(F(P,p^*)) = F(P,p) = F(P,p) T_0 = \mu_l^{D_H}(F), \\ &\ve(\mu_r(F)) = \ve(F(P+h,p)) = F(P,p) = F(P,p) T_0 = \mu_r^{D_H}(F) \end{align*} for $F=F(P,p) \in \bbF\dbr{p}$, where $\mu_l^{D_H}$ and $\mu_r^{D_H}$ are the moment maps of $D_H$. \end{proof} To state the $H$-bialgebroid structure, let us write down the natural isomorphisms $D_H \totimes U \cong U \cong U \totimes D_H$ in \eqref{eq:Halgd:Delta-ve}. By the argument of \eqref{eq:ADE:DU=U} and \eqref{eq:ADE:UD=U}, we have \begin{align}\label{eq:U:DU=U} (D_H \totimes U)_{\alpha,\beta} = \bbF T_{-\alpha} \otimes_{\bbF} U_{\alpha,\beta} \lsto U_{\alpha,\beta}, \quad F T_{-\alpha} \totimes a = T_{-\alpha} \totimes \mu_l(F) a \lmto \mu_l(F) a \end{align} and \begin{align}\label{eq:U:UD=U} (U \totimes D_H)_{\alpha,\beta} = U_{\alpha,\beta} \otimes_{\bbF} \bbF T_{-\beta} \lsto U_{\alpha,\beta}, \quad a \totimes F T_{-\beta} = \mu_r(F) a \totimes T_{-\beta} \lmto a \mu_r(F) \end{align} for $a \in U_{\alpha,\beta}$ and $F \in \bbF\dbr{p}$. Now we can show: \begin{prp}\label{prp:ADE:Halgd} $(U,\Delta,\ve)$ is a topological $H$-bialgebroid. That is, the following relations hold under the isomorphisms $(U \totimes U) \totimes U \cong U \totimes (U \totimes U)$ and $D_H \totimes U \cong U \cong U \totimes D_H$. \begin{align*} (\Delta \totimes \id)\Delta = (\id \totimes \Delta)\Delta, \quad (\ve \totimes \id)\Delta = \id = (\id \totimes \ve)\Delta. \end{align*} \end{prp} \begin{proof} We check the relations for each generator. By direct calculation, we have \begin{align*} & (\Delta \totimes 1)\Delta(e_i(z)) =(\Delta \totimes 1) \bigl(e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) \\ &=e_i(z) \totimes 1 \totimes 1 + \psi^+_i(q^{\frac{c_1}{2}}z) \totimes e_i(q^{c_1}z) \totimes 1 +\psi^+_i(q^{\frac{c_1}{2}+\frac{c_2}{2}-\frac{c_2}{2}}z) \totimes \psi^+_i(q^{\frac{c_1}{2}+\frac{c_2}{2}+\frac{c_1}{2}}z) \totimes e_i(q^{c_1+c_2}z) \\ &=e_i(z) \totimes 1 \totimes 1 + \psi^+_i(q^{\frac{c_1}{2}}z) \totimes e_i(q^{c_1}z) \totimes 1 + \psi^+_i(q^{\frac{c_1}{2}}z) \totimes \psi^+_i(q^{c_1+\frac{c_2}{2}}z) \totimes e_i(q^{c_1+c_2}z), \\ & (1 \totimes \Delta)\Delta(e_i(z)) =(1 \totimes \Delta)\bigl(e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) \\ &=e_i(z) \totimes 1 \totimes 1 + \psi^+_i(q^{\frac{c_1}{2}}z) \totimes e_i(q^{c_1}z) \totimes 1 + \psi^+_i(q^{\frac{c_1}{2}}z) \totimes \psi^+_i(q^{c_1+\frac{c_2}{2}}z) \totimes e_i(q^{c_1+c_2}z), \end{align*} which yields $(\Delta \totimes 1)\Delta(e_i(z))=(1 \totimes \Delta)\Delta(e_i(z))$. We also have \begin{align*} (\Delta \totimes 1)\Delta(\psi_i^+(z)) &=(\Delta \totimes 1)(\psi_i^+(zq^{\frac{c_2}{2}}) \totimes \psi_i^+(zq^{-\frac{c_1}{2}})) \\ &=\psi_i^+(q^{\frac{c_2}{2}+\frac{c_3}{2}}z) \totimes \psi_i^+(\psi_i^+(q^{-\frac{c_1}{2}+\frac{c_3}{2}}z)) \totimes \psi_i^+(q^{-\frac{c_1}{2}-\frac{c_2}{2}}z), \\ (1 \totimes \Delta)\Delta(\psi_i^+(z)) &=(1 \totimes \Delta)(\psi_i^+(zq^{\frac{c_2}{2}}) \totimes \psi_i^+(zq^{-\frac{c_1}{2}})) \\ &=\psi_i^+(q^{\frac{c_2}{2}+\frac{c_3}{2}}z) \totimes \psi_i^+(\psi_i^+(q^{-\frac{c_1}{2}+\frac{c_3}{2}}z)) \totimes \psi_i^+(q^{-\frac{c_1}{2}-\frac{c_2}{2}}z), \end{align*} which yields $(\Delta \totimes 1)\Delta(\psi^+_i(z))=(1 \totimes \Delta)\Delta(\psi^+_i(z))$. By similar calculations, we can check $(\Delta \totimes 1)\Delta=(1 \totimes \Delta)\Delta$ for the other generators. On the relations $(\ve \totimes \id)\Delta = \id = (\id \totimes \ve)\Delta$, we have \begin{align*} (\ve \totimes 1)\Delta(e_i(z)) &=(\ve \totimes 1)\bigl(e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) = T_{Q_i} \totimes e_i(z) = e_i(z), \\ (1 \totimes \ve)\Delta(e_i(z)) &=(1 \totimes \ve)\bigl(e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) =e_i(z) \totimes 1 = e_i(z); \\ (\ve \totimes 1)\Delta(\psi_i^+(z)) &=(\ve \totimes 1)\bigl(\psi_i^+(q^{c_2/2}z) \totimes \psi_i^+(q^{-c_1/2}z)\bigr) =T_{Q_i} \totimes \psi_i^+(z) = \psi_i^+(z), \\ (1 \totimes \ve)\Delta(\psi_i^+(z)) &=(1 \totimes \ve)\bigl(\psi_i^+(q^{c_2/2}z) \totimes \psi_i^+(q^{-c_1/2}z)\bigr) =\psi_i^+(z) \totimes T_{Q_i} = \psi_i^+(z). \end{align*} Here we used \eqref{eq:U:DU=U} and \eqref{eq:U:UD=U}. By similar calculations, we can check $(\ve \totimes \id)\Delta = \id = (\id \totimes \ve)\Delta$ for the other generators. \end{proof} Finally, we introduce the antipode of $U$. \begin{lem}\label{lem:U:S} We introduce a $\bbC$-linear map $S\colon U \to U$ by \begin{align}\label{eq:U:S} S(\mu_l(F)) \ceq \mu_r(F), \quad S(\mu_r(F)) \ceq \mu_l(F) \end{align} for $F=F(P,p) \in \bbF\dbr{p}$ and \begin{align} &S(d) \ceq d, \quad S(q^{\pm c/2}) \ceq q^{\mp c/2}, \quad S(K^\pm_i) \ceq (K^\pm_i)^{-1}, \quad S(\psi^\pm_i(z)) \ceq \psi^\pm_i(z)^{-1}, \\ \label{eq:U:S1} &S(e_i(z)) \ceq -\psi_i^+(q^{-c/2}z)^{-1}e_i(q^{-c}z) , \quad S(f_i(z)) \ceq - f_i(q^{-c}z)\psi_i^-(q^{-c/2}z)^{-1}. \end{align} Then $S$ is well-defined as an anti-homomorphism of topological algebras. \end{lem} \begin{proof} We will only write down the check for a part of the defining relations of $U$. The block \eqref{eq:U:FK}--\eqref{eq:U:Fp} can checked as \begin{align*} S(K^\pm_i) S\bigl(\mu_r(F)\bigr) &=(K^\pm_i)^{-1} F(P+h,p) =F(P+h-\pair{Q_i,P+h},p) (K^\pm_i)^{-1} =S\bigl(\mu_r(F')\bigr) S(K), \\ S(e_i(z)) S(\mu_r(F)) &=-\psi_i^+(q^{-c/2}z)^{-1} e_i(q^{-c}z) F(P+h,p) \\ &=-\psi_i^+(q^{-c/2}z)^{-1} F(P+h, p) e_i(q^{-c}z) \\ &=-F(P+h-\pair{Q_i,P+h},p) \psi_i^+(q^{-c/2}z)^{-1} e_i(q^{-c}z) =S\bigl(\mu_r(F')\bigr) S(e_i(z)) \end{align*} for $F=F(P,p), F'=F(P-\pair{Q_i,P},p) \in \bbF\dbr{p}$. The relations \eqref{eq:U:Ke} can be checked as \begin{align*} S(\psi_j^+(w)) S(K^\pm_i) &=\psi_j^+(w)^{-1} (K^\pm_i)^{-1} = (K^\pm_i)^{-1} \psi_j^+(w)^{-1} = S(K^\pm_i) S(\psi_j^+(w)). \end{align*} The block \eqref{eq:U:pp}--\eqref{eq:U:pme} can checked as \begin{align*} S(e_j(w)) S(\psi_i^+(z)) = \psi_j^+(q^{-c/2}w)^{-1} e_j(q^{-c}w) \psi_i^+(z)^{-1} =-\psi_j^+(q^{-c/2}w)^{-1} g^*_{ij}(q^{c/2}\tfrac{z}{w}) \psi_i^+(z)^{-1} e_j(q^{-c}w) \\ =-\frac{g_{ij}(q^{c/2}\frac{z}{w})}{g^*_{ij}(q^{c/2}\frac{z}{w})}g^*_{ij}(q^{c/2}\tfrac{z}{w}) \psi_i^+(z)^{-1} \psi_j^+(q^{-c/2}w)^{-1} e_j(q^{-c}w) =S\bigl(g_{ij}^*(q^{-c/2}\tfrac{z}{w})\bigr) S(\psi_i^+(z)) S(e_j(w)). \end{align*} As for the relation \eqref{eq:U:ef}, we have \begin{align*} & [S(f_i(w)), S(e_i(z))] =[-f_i(q^{-c}w)\psi_i^-(q^{-c/2}w)^{-1}, - \psi_i^+(q^{-c/2}z)^{-1}e_i(q^{-c}z)] \\ &=f_i(q^{-c}w)\psi_i^-(q^{-c/2}w)^{-1}\psi_i^+(q^{-c/2}z)^{-1}e_i(q^{-c}z) -\psi_i^+(q^{-c/2}z)^{-1}e_i(q^{-c}z)f_i(q^{-c}w)\psi_i^-(q^{-c/2}w)^{-1}, \end{align*} and the first term in the last line can be calculated as \begin{align*} &\text{(1st term)} =\frac{g_{ii}(q^{c}\frac{z}{w})}{g^*_{ii}(q^{-c}\frac{z}{w})} f_i(q^{-c}w) \psi_i^+(q^{-c/2}z)^{-1} \psi_i^-(q^{-c/2}w)^{-1} e_i(q^{-c}z) \\ &=\frac{g_{ii}(q^{c}\frac{z}{w})}{g^*_{ii}(q^{-c}\frac{z}{w})} g_{ii}(q^c\tfrac{z}{w})^{-1} \psi_i^+(q^{-c/2}z)^{-1} f_i(q^{-c}w) \psi_i^-(q^{-c/2}w)^{-1} e_i(q^{-c}z) \\ &=g_{ii}^*(q^{-c}\tfrac{z}{w})^{-1} g_{ii}^*(q^{-c}\tfrac{z}{w}) \psi_i^+(q^{-c/2}z)^{-1} f_i(q^{-c}w) e_i(q^{-c}z) \psi_i^-(q^{-c/2}w)^{-1} \\ &=\text{(2nd term)} - \tfrac{1}{q-q^{-1}} \psi_i^+(q^{-c/2}z)^{-1} \bigl(\delta(q^{-c}\tfrac{z}{w}) \psi_i^-(q^{-c/2}w) -\delta(q^{ c}\tfrac{z}{w}) \psi_i^+(q^{-c/2}z)\bigr) \psi_i^-(q^{-c/2}w)^{-1} \\ &=\text{(2nd term)} - \tfrac{1}{q-q^{-1}} \bigl(\delta(q^{-c}\tfrac{z}{w}) \psi_i^+(q^{-c/2}z)^{-1} -\delta(q^{ c}\tfrac{z}{w}) \psi_i^-(q^{-c/2}w)^{-1}\bigr). \end{align*} Thus we have \begin{align*} [S(f_i(w)), S(e_i(z))] &=\tfrac{1}{q-q^{-1}} \bigl(\delta(q^{ c}\tfrac{z}{w}) \psi_i^-(q^{-c/2}w)^{-1} -\delta(q^{-c}\tfrac{z}{w}) \psi_i^+(q^{-c/2}z)^{-1}\bigr) \\ &=\tfrac{1}{q-q^{-1}} \bigl(S(\delta(q^{-c}\tfrac{z}{w})) S(\psi_i^-(q^{c/2}w)) -S(\delta(q^{ c}\tfrac{z}{w})) S(\psi_i^+(q^{c/2}z))\bigr). \end{align*} We can also check the Serre relations as follows. Using \eqref{eq:U:pp} and \eqref{eq:U:ppe}, we have \begin{align*} &S(e_j(z)) S(e_i(z_2)) S(e_i(z_1))\\ &=-\psi^+_j(q^{-c/2}z)^{-1} e_j(q^{-c}z) \psi^+_i(q^{-c/2}z_2)^{-1} e_i(q^{-c}z_2) \psi^+_j(q^{-c/2}z_1)^{-1} e_j(q^{-c}z_1) \\ &=-g^*_{ij}\bigl(\tfrac{z_1}{z }\bigr) g^*_{ij}\bigl(\tfrac{z_2}{z}\bigr) g^*_{ii}\bigl(\tfrac{z_1}{z_2}\bigr) \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_j(q^{-c}z) e_i(q^{-c}z_2) e_i(q^{-c}z_1) \\ &=-g^*_{ij}\bigl(\tfrac{z_1}{z }\bigr) g^*_{ij}\bigl(\tfrac{z_2}{z }\bigr) g^*_{ii}\bigl(\tfrac{z_1}{z_2}\bigr) g^*_{ji}\bigl(\tfrac{z }{z_1}\bigr) g^*_{ji}\bigl(\tfrac{z }{z_2}\bigr) g^*_{ii}\bigl(\tfrac{z_2}{z_1}\bigr), \\ &\qquad \cdot \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_j(q^{-c}z) e_i(q^{-c}z_1) e_i(q^{-c}z_2) e_j(q^{-c}z) \\ &=-\psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_j(q^{-c}z) e_i(q^{-c}z_1) e_i(q^{-c}z_2) e_j(q^{-c}z), \end{align*} and a similar calculation yields \begin{align*} &S(e_i(z_2)) S(e_j(z)) S(e_i(z_1)) \\ &=-\frac{g^*_{ij}(\tfrac{z_2}{z})}{g_{ij}(\tfrac{z_2}{z})} \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_i(q^{-c}z_1) e_j(q^{-c}z) e_i(q^{-c}z_2), \\ &S(e_i(z_2)) S(e_i(z_1)) S(e_j(z)) \\ &=-\frac{g^*_{ij}(\tfrac{z_1}{z})}{g_{ij}(\tfrac{z_1}{z})} \frac{g^*_{ij}(\tfrac{z_2}{z})}{g_{ij}(\tfrac{z_2}{z})} \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_j(q^{-c}z) e_i(q^{-c}z_1) e_i(q^{-c}z_2), \\ &S(e_j(z)) S(e_i(z_1)) S(e_i(z_2)) \\ &=-\frac{g^*_{ii}(\tfrac{z_1}{z_2})}{g_{ii}(\tfrac{z_1}{z_2})} \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_i(q^{-c}z_2) e_i(q^{-c}z_1) e_j(q^{-c}z), \\ &S(e_i(z_1)) S(e_j(z)) S(e_i(z_2)) \\ &=-\frac{g^*_{ij}(\tfrac{z_1}{z })}{g_{ij}(\tfrac{z_1}{z })} \frac{g^*_{ii}(\tfrac{z_1}{z_2})}{g_{ii}(\tfrac{z_1}{z_2})} \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_i(q^{-c}z_2) e_j(q^{-c}z) e_i(q^{-c}z_1), \\ &S(e_i(z_1)) S(e_i(z_2)) S(e_j(z)) \\ &=-\frac{g^*_{ij}(\tfrac{z_1}{z })}{g_{ij}(\tfrac{z_1}{z })} \frac{g^*_{ij}(\tfrac{z_2}{z })}{g_{ij}(\tfrac{z_2}{z })} \frac{g^*_{ii}(\tfrac{z_1}{z_2})}{g_{ii}(\tfrac{z_1}{z_2})} \psi^+_j(q^{-c/2}z)^{-1} \psi^+_i(q^{-c/2}z_2)^{-1} \psi^+_j(q^{-c/2}z_1)^{-1} e_j(q^{-c}z) e_i(q^{-c}z_2) e_i(q^{-c}z_1). \end{align*} Comparing with \eqref{eq:U:eS}, we conclude that the antipode $S$ is compatible with the Serre relation for $e_i(z)$. Similarly we can check the Serre relation \eqref{eq:U:fS} for $f_i(z)$. \end{proof} Now we have the main statement. \begin{thm}\label{thm:ADE:Halgd} The tuple $(\Delta,\ve,S)$ is a topological $H$-Hopf algebroid structure on the topological $H$-algebra $U=U_{q,p}(g,X_l)$. That is, the relations \begin{align*} S(\mu_r(F)a) = S(a) \mu_l(F), \quad &S(a\mu_l(F)) = \mu_r(F)S(a), \\ m(\id_U \totimes S)\Delta(a) = \mu_l(\ve(a)1), \quad &m(S \totimes \id_U)\Delta(a) = \mu_r\bigl(T_{\alpha}(\ve(a)1)\bigr) \end{align*} hold for any $a \in U_{\alpha,\beta}$ and $F \in \bbF\dbr{p}$, where $m$ is the multiplication of the topological algebra $U$. \end{thm} \begin{proof} The first line of the statement is built in the definition \eqref{eq:U:S} of $S$. The second line can be checked on the generators as \begin{align*} m(\id \totimes S)\Delta(\mu_l(F)) &=m(\id \totimes S)(\mu_l(F) \totimes 1) = \mu_l(F), \quad \mu_l(\ve(\mu_l(F)) 1) = \mu_l(F T_0 1)=\mu_l(F); \\ m(\id \totimes S)\Delta(e_i(z)) &=m(\id \totimes S)\bigl(e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr)\\ &=e_i(z)-\psi^+_i(q^{c/2}z)\psi^+_i(q^{c/2}z)^{-1}e_i(z) = 0, \\ \mu_l(\ve(e_i(z)) 1) &= \mu_l(0) = 0; \\ m(\id \totimes S)\Delta(\psi_i^+(z)) &=m(\id \totimes S)\psi_i^+(zq^{-c_2/2})\totimes \psi_i^+(zq^{c_1/2}) =\psi_i^+(zq^{c/2})\cdot \psi_i^+(zq^{c/2})^{-1} = 1, \\ \mu_l(\ve(\psi_i^+(z)) 1) &=\mu_l(T_{Q_i} 1) = \mu_l(1) = 1. \end{align*} By a similar calculation on the other generators, we get $m(1 \totimes S)\Delta(a) = \mu_l(\ve(a)\cdot 1)$. Similarly, we have \begin{align*} m(S \totimes \id)\Delta(\mu_l(F)) &=m(S \totimes \id)(\mu_l(F) \totimes 1) = \mu_r(F), \\ \mu_r\bigl(T_0(\ve(\mu_l(F)) 1)\bigr) &= \mu_r\bigl(T_0(F)\bigr)=\mu_r(F); \\ m(S \totimes \id)\Delta(e_i(z)) &=m(S \totimes \id) \bigl(e_i(z) \totimes 1 + \psi^+_i(q^{c_1/2}z) \totimes e_i(q^{c_1}z)\bigr) \\ &=- \psi^+_i(q^{-c/2}z)^{-1} e_i(q^{-c}z) \cdot 1 - \psi^+_i(q^{-c/2}z)^{-1}e_i(q^{-c}z) =0, \\ \mu_r\bigl(T_{-Q_i}(\ve(e_i(z)) 1)\bigr) &=\mu_r(T_{-Q_i}(0)) = \mu_r(0) = 0; \\ m(S \totimes \id)\Delta(\psi_i^+(z)) &=m(S \totimes \id) \bigl(\psi_i^+(z q^{-c_2/2}) \totimes \psi_i^+(z q^{c_1/2})\bigr) =\psi_i^+(q^{-c/2}z)^{-1} \cdot \psi_i^+(q^{-c/2}z) = 1, \\ \mu_r\bigl(T_{-Q_i}(\ve(\psi_i^+(z)) 1)\bigr) &=\mu_r\bigl(T_{-Q_i}(T_{Q_i} 1)\bigr) =\mu_r(T_{-Q_i}(1)) = \mu_r(1) = 1. \end{align*} The other generators can be checked similarly, and we have $m(S \totimes \id)\Delta(a)=\mu_r\bigl(T_{\alpha}(\ve(a) 1)\bigr)$ for any $a \in U_{\alpha, \beta}$. \end{proof} \begin{dfn}\label{dfn:ADE:U} The obtained $H$-Hopf algebroid $U_{q,p}(g,X_l)$ is called \emph{the dynamical Ding-Iohara algebroid of type $X_l$} for $X=ADE$. \end{dfn} We close this subsection by the relation of $U_{q,p}(g,X_l)$ and the elliptic algebra $U_{q,p}(\wh{\frg}(X_l))$. By \cref{prp:U:ADE}, they are isomorphic as topological algebras. By comparing the $H$-Hopf algebroid structures, we have: \begin{cor}\label{cor:U:ADE} Let $A=A(X_l)$ be the Cartan matrix of type $X_l=A_l,D_l$ or $E_{6,7,8}$. In \cref{dfn:U:ADE}, set the structure functions $g=\{g_{ij}(z;p) \mid i,j \in I\}$ to be \[ g_{ij}(x;p) = \frac{G_{ij}^+(x;p)}{G_{ij}^-(x;p)} \ceq \frac{q^{-b_{ij}} \theta(q^{b_{ij}}x;p)}{\theta(q^{-b_{ij}}x;p)}, \] where $B=(b_{ij})_{i,j \in I}$ is the symmetrization $A=D B$. Then we have an isomorphism of topological $H$-Hopf algebroids \[ U_{q,p}(g,X_l) \cong U_{q,p}(\wh{\frg}(X_l)), \] mapping each generator in the dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$ to the corresponding one in the elliptic algebra $U_{q,p}(\wh{\frg}(X_l))$. \end{cor} \subsection{Hopf algebra limit}\label{ss:ADE:p=0} Here we discuss the limit $p \to 0$. \begin{prp}\label{prp:ADE:p=0} Let $X_l=A_l,D_l$ or $E_{6,7,8}$, and denote by $U''_{q,p}(g,X_l) \subset U_{q,p}(g,X_l)$ the topological $H$-Hopf sub-algebroid of the dynamical Ding-Iohara algebroid generated by \[ q^{\pm c/2}, \ e_{i,m}, \ f_{i,m}, \ \psi^{\pm}_{i,m} \quad (i \in I, \, m \in \bbZ) \] i.e., generators in \eqref{eq:ADE:gen} except $\clM(\wtH^*)$, $d$, and $K_i^{\pm}$. Then, taking the limit $p \to 0$ of $U''_{q,p}(g,X_l)$, we have a topological Hopf algebra isomorphism \[ \lim_{p \to 0} U''_{q,p}(g,X_l) \cong U_q(\ol{g},X_l), \] where $\ol{g} \ceq \{\ol{g}_{ij}(z) \mid i,j \in I\}$ denotes the set of the limit structure functions in \eqref{eq:U:olg}, and $U_q(\ol{g},X_l)$ denotes the Ding-Iohara quantum algebra of the simply-laced type $X_l$ with structure functions $\ol{g}$ (see \cref{dfn:DI:U}, \cref{fct:DI:U} and \cref{rmk:DI:ADE}) \end{prp} \begin{proof} For the algebra structure, compare the defining relations \eqref{eq:DI:qc}--\eqref{eq:DI:Serre} and \eqref{eq:U:qc}--\eqref{eq:U:fS}, noting that the functions $\wt{g}_{ij}(z)$ and $\wt{g}^*_{ij}(z)$ in the Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS} reduce to $1$ in the limit $p \to 0$. For the Hopf algebra structure, note that the modified tensor product $\totimes$ reduces to the ordinary tensor product $\otimes$ in the limit $p \to 0$, and compare the formulas \eqref{eq:DI:Delta0}--\eqref{eq:DI:S} and \eqref{eq:U:Delta0}--\eqref{eq:U:Delta1}, \eqref{eq:U:ve0}, \eqref{eq:U:ve1}, \eqref{eq:U:S}--\eqref{eq:U:S1}. \end{proof} \begin{rmk} The limit Hopf algebra $U_q(\ol{g},X_l)$ is independent of the parameter $p$. To keep a parameter, say $p'$, in the limit, then use \cref{rmk:ADE:top} \ref{i:rmk:ADE:top:p'} for the class of the structure functions $g$. \end{rmk} Thus we reached the goal of this note for simply-laced root systems. \section{Dynamical Ding-Iohara algebroids of non-simply-laced root systems}\label{s:ns} In this section, we extend the dynamical Ding-Iohara algebroid associated to the simply-laced simple root systems in \cref{dfn:ADE:U} to the non-simply-laced systems. \subsection{Strange formulas}\label{ss:ns:h} Let us start with the recollection of \cref{prp:U:ADE}, where we recovered the elliptic algebra $U_{q,p}(\wh{\frg}(X_l))$ from our dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$ of simply-laced root systems $X_l$ by setting the structure functions as \eqref{eq:U:gijE}. There we used a strange equality \eqref{eq:ADE:h=2q}, which claims that the term \[ h_{ij} \ceq \frac{(\ol{g}_{ii}(\frac{z_1}{z_2})+1)(\ol{g}_{ij}(\frac{z_1}{z})\ol{g}_{ij}(\frac{z_2}{z})+1)} { \ol{g}_{ij}(\frac{z_2}{z})+\ol{g}_{ii}(\frac{z_1}{z_2})\ol{g}_{ij}(\frac{z_1}{z})}. \] in the Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS} of $U_{q,p}(g,X_l)$ reduces under the setting \begin{align}\label{eq:ns:olg-sp} \ol{g}_{ii}(z) = \frac{1-q^2 z}{q^2-z}, \quad \ol{g}_{ij}(z) = \frac{q- z}{1-q z}. \end{align} to the $q$-integers $[2]_i$ (see \eqref{eq:E:qi}) in those \eqref{eq:E:eS} and \eqref{eq:E:fS} of $U_{q,p}(\wh{\frg}(X_l))$. As mentioned in \cref{rmk:ADE:h}, we found the term $h_{ij}$ by the compatibility with the Drinfeld-type comultiplication $\Delta$ in \eqref{lem:U:Delta}. For the discussion of non-simply-laced types, let us give a slight modification of the equality \eqref{eq:ADE:h=2q}. \begin{lem}\label{lem:ns:sr2} For a parameter $q^d$ and variables $z_{12} \ceq z_1/z_2$, $z_{10} \ceq z_1/z$ and $z_{20} \ceq z_2/z$ and the rational functions \begin{align}\label{eq:ns:ADEolg} g^1_2 \ceq \frac{1-q^{2d} z_{12}}{q^{2d}-z_{12}}, \quad g^m_0 \ceq \frac{q^d-z_{m0}}{1-q^d z_{m0}} \quad (m=1,2), \end{align} the following equality holds \begin{align}\label{eq:ns:2q} [2]_{q^d} \bigl(\ceq \tfrac{q^d-q^{-d}}{q-q^{-1}}\bigr) = \frac{(1+g^1_2)+(g^1_0 g^2_0+g^1_2 g^1_0 g^2_0)}{g^2_0+g^1_2 g^1_0}. \end{align} \end{lem} \begin{proof} Direct calculation. \end{proof} Let us give some observations of the formula \eqref{eq:ns:2q}. \begin{itemize} \item The variables $z_1,z_2$ and $z$ come from the Serre-type relations \eqref{eq:E:eS} and \eqref{eq:E:fS} of the elliptic algebra $U_{q,p}(\wh{\frg})$, and the number $2=\abs{\{1,2\}}$ corresponds to the quantity $a=1-a_{ij}=2$ determined by the off-diagonal entry $a_{ij}=-1$ of the Cartan matrix $A=A(X_l)$ (see the line before \eqref{eq:E:wtgam}). \item Set $z_{21} \ceq z_2/z_1$ and $g^2_1 \ceq (1-q^{2d}z_{21})/(q^{2d}-z_{21})$. Then we have $g^2_1 = (g^1_2)^{-1}$, which is a rewritten form of the Ding-Iohara condition \eqref{eq:DI:cond} or \eqref{eq:U:olg-cond}. \item Let us focus on the invariance of \eqref{eq:ns:2q} under the permutation of variables $z_1$ and $z_2$. Then, the denominator and the numerator of the right hand side of \eqref{eq:ns:2q} can be regarded as the $\frS_2$-orbit summations in the following sense. Consider the set of rational functions \begin{align}\label{eq:ns:R2} R_2 \ceq \{(g^1_2)^{p_{12}} (g^1_0)^{p_1} (g^2_0)^{p_2} \mid p_{12},p_1,p_2 = 0,1\}. \end{align} The symmetric group $\frS_2$ acts on $R_2$ by letting the generator $s_1 \ceq (1,2) \in \frS_2$ act as \begin{align}\label{eq:ns:s1-R2} s_1\bigl((g^1_2)^{p_{12}} (g^1_0)^{p_1} (g^2_0)^{p_2}\bigr) \ceq g^1_2 (g^2_1)^{p_{12}} (g^2_0)^{p_1} (g^1_0)^{p_2} = (g^1_2)^{1-p_{12}} (g^1_0)^{p_2} (g^2_0)^{p_1}. \end{align} In the second equality, we used $g^2_1 = (g^1_2)^{-1}$. By the condition on the power indices $p_{12},p_1,p_2$, we find that this action is well-defined. For $f \in R_2$, we denote its orbit sum by $\wh{f} \ceq \sum_{\sigma \in \frS_2} \sigma(f)$. Then, we have \[ \wh{1} = 1+g^1_2, \quad \wh{g^1_0 g^2_0} = g^1_0 g^2_0 + g^1_2 g^1_0 g^2_0, \quad \wh{g^2_0} = g^2_0 + g^1_2 g^1_0, \] so that \eqref{eq:ns:2q} can be rewritten as \begin{align}\label{eq:ns:hij2} [2]_{q^d} = \frac{\wh{1}+\wh{g^1_0 g^2_0}}{\wh{g^2_0}}. \end{align} \end{itemize} Now we turn to the non-simply-laced type $X_l$, where the $q$-binomials $\bnm{3}{s}{i}$ and $\bnm{4}{s}{i}$ appear in the Serre-type relations \eqref{eq:E:eS} and \eqref{eq:E:fS} of the elliptic algebra $U_{q,p}\bigl(\wh{\frg}(X_l)\bigr)$. We want to find a correct term $h_{ij}$ which yields Serre-type relations of the would-be Ding-Iohara algebroids of types $B,C,F$ under the following three principles. \begin{clist} \item The compatibility with the Drinfeld-type comultiplication $\Delta$ in \eqref{lem:U:Delta}. \item The invariance under the permutation of variables $z_i$'s. \item Recovering the $q$-binomials under the specialization \eqref{eq:ns:olg-sp}. \end{clist} In this \cref{ss:ns:h}, we give the consequence and check the second and third principle. The compatibility of these functions with the Drinfeld-type comultiplication will be shown in the following subsections. First, we consider the $q$-integer $[3]_{i}$ appearing in the types $B,C$ and $F$. Following the above observations, let us consider the variables \begin{align}\label{eq:ns:BCF-z} z_{mn} \ceq z_m/z_n \quad (1\le m < n \le 3), \quad z_{m0} \ceq z_m/z \quad (1 \le m \le 3) \end{align} and the rational functions \begin{align}\label{eq:ns:BCF-sp} g^m_n \ceq \frac{1-q^{2d} z_{mn}}{q^{2d}-z_{mn}} \quad (1 \le m < n \le 3), \quad g^m_0 \ceq \frac{q^{2d}-z_{m0}}{1-q^{2d} z_{m0}} \quad (1 \le m \le 3). \end{align} Then, following \eqref{eq:ns:R2}, we define a set $R_3$ of rational functions by \begin{align}\label{eq:ns:R3} R_3 \ceq \bigl\{\tprd_{1 \le m < n \le 3}(g^m_n)^{p_{mn}} \tprd_{1 \le m \le 3}(g^m_0)^{p_m} \mid p_{mn},p_m = 0,1 \bigr\}. \end{align} We also define an action of the symmetric group $\frS_3$ on $R_3$ by letting the generators $s_1 \ceq (1,2)$ and $s_2 \ceq (2,3)$ act as \begin{align} \label{eq:ns:s1-R3} &s_1\Bigl(\prod_{1 \le m < n \le 3}(g^m_n)^{p_{mn}} \prod_{1 \le m \le 3}(g^m_0)^{p_m}\Bigr) \ceq g^1_2\prod_{1 \le m < n \le 3}\bigl(g^{s_1(m)}_{s_1(n)}\bigr)^{p_{mn}} \prod_{1 \le m \le 3}\bigl(g^{s_1(m)}_{0}\bigr)^{p_{m}}, \\ \label{eq:ns:s2-R3} &s_2\Bigl(\prod_{1 \le m < n \le 3}(g^m_n)^{p_{mn}} \prod_{1 \le m \le 3}(g^m_0)^{p_m}\Bigr) \ceq g^2_3\prod_{1 \le m < n \le 3}\bigl(g^{s_2(m)}_{s_2(n)}\bigr)^{p_{mn}} \prod_{1 \le m \le 3}\bigl(g^{s_2(m)}_{0 }\bigr)^{p_m}. \end{align} We can check $s_1(R_3) \subset F$ using $s_1(g^m_n),s_1(g^m_0)\in R_3$ except for $g^1_2$ and $g^n_m=(g^m_n)^{-1}$. We can similarly show $s_2(R_3) \subset R_3$, and hence the $\frS_3$-action on $R_3$ is well-defined. Note that this well-definedness only uses $g^n_m=(g^m_n)^{-1}$, which is a rewritten form of the Ding-Iohara condition \eqref{eq:DI:cond} or \eqref{eq:U:olg-cond}. We seek an analogue of \eqref{eq:ns:hij2} for the $q$-integer $[3]_{q^d}$, i.e., want to express $[3]_{q^d}$ as a ratio of the $\frS_3$-orbit summations in $R_3$. We abbreviate the product of the functions by $g^{11}_{23} \ceq g^1_2 g^1_3$ and so on, and denote the orbit sum of $f \in R_3$ by $\wh{f} \ceq \sum_{\sigma \in \frS_3}\sigma(f)$. For example, we have \[ \wh{1} \ceq \sum_{\sigma \in \frS_3} \sigma(1) = 1+g^1_2+g^2_3+g^{11}_{23}+g^{12}_{33}+g^{112}_{233}. \] Under these notation, we can obtain the following formula by tedious but direct calculation. \begin{align}\label{eq:ns:hij3} [3]_{q^d} \bigl(\ceq \tfrac{q^{3d}-q^{-3d}}{q^d-q^{-d}}\bigr) = \frac{\wh{g^{123}_{000}}-\wh{1}}{\wh{g^{23}_{00}}-\wh{g^3_0}} \end{align} Thus, we found the desired term $h_{ij}$ for the types $B,C$ and $F$. For later use, we rename it as $h^3_{ij}$, and summarize the result in: \begin{cor}\label{cor:ns:BCF} Let $X_l=B_l,C_l$ or $F_4$, and $A=A(X_l)=(a_{rs})_{r,s \in I}$ be the Cartan matrix in \cref{sss:E:root}. Let $(i,j) \in I^2 = \{1,\dotsc,l\}^2$ be the (unique) pair such that the entry $a_{ij}$ is equal to $-2$. Also, let $g=\{g_{rs}(z;p) \mid r,s \in I\}$ be the structure functions (\cref{dfn:U:DI}), and $\ol{g}_{mn}(z)$ be the limit $\lim_{p \to 0}g_{ij}(z;p)$. \begin{enumerate} \item For the variables \eqref{eq:ns:BCF-z}, we set the rational functions \[ g^m_n \ceq \ol{g}_{ii}(z_{mn}) \quad (1 \le m < n \le 3), \quad g^m_0 \ceq \ol{g}_{ij}(z_{m0}) \quad (1 \le m \le 3). \] Then \eqref{eq:ns:s1-R3} and \eqref{eq:ns:s2-R3} define an $\frS_3$-action on the set $R_3$ given by \eqref{eq:ns:R3}. \item Using the abbreviation of the product $g^{11}_{23} \ceq g^1_2 g^1_3$ and so on, and of the orbit sum $\wh{f} \ceq \sum_{\sigma \in \frS_3}\sigma(f)$, we define \begin{align}\label{eq:ns:h3} h^3_{ij} \ceq \frac{\wh{g^{123}_{000}}-\wh{1}}{\wh{g^{23}_{00}}-\wh{g^3_0}}. \end{align} We also specialize the structure functions as \[ g_{rs}(z;p) = q^{-b_{rs}} \frac{\theta(q^{b_{rs}}z;p)}{\theta(q^{-b_{rs}}z;p)} \quad (r,s \in I) \] (see \eqref{eq:U:gijE}) with the following symmetrization $A=D B$, $B=(b_{rs})_{r,s \in I}$. \begin{clist} \item For the type $B_l$, we take $D(B_l)^{-1} \ceq (d_1,\dotsc,d_l)=(1,\dotsc,1,\thf)$, so that we have \begin{align*} B(B_l) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & \ddots & \ddots & \ddots \\ & & {-1} & 2 & {-1} \\ & & & {-1} & 1 \end{psm}. \end{align*} We also have $(i,j)=(l,l-1)$, $q_i=q^{d_i}=q^{1/2}$ (recall \eqref{eq:E:qi}) and \begin{align}\label{eq:B:olg} \begin{split} &\ol{g}_{rr}(z) = \frac{1-q^{2} z}{q^{2}-z} \quad (1 \le r < l=i),\quad \ol{g}_{ii}(z) = \frac{1-q^{ } z}{q^{ }-z},\\ &\ol{g}_{rs}(z) = \frac{ q^{ }-z}{1 -q z} \quad (1 \le r,s \le l, \, \abs{r-s}=1). \end{split} \end{align} Then, using the notation \eqref{eq:E:bini}, we have \begin{align}\label{eq:B:hij3} h^3_{ij} = q+1+q^{-1} = \frac{q^{3/2}-q^{-3/2}}{q^{1/2}-q^{-1/2}} = \bnm{3}{1}{i} = \bnm{3}{2}{i}. \end{align} Also, for $(r,s) \in I^2$ such that $\abs{r-s}=1$ and $(r,s) \ne (i,j)$, we have \begin{align}\label{eq:B:hij2} h_{rs} \ceq \frac{\wh{1}+\wh{g^{12}_{00}}}{\wh{g^2_0}} = \bnm{2}{1}{r}, \end{align} where $q_r=q$ and $g^m_n$ is given by \eqref{eq:ns:ADEolg} with $d \ceq d_r=1$. \item For the type $C_l$, we take $D(C_l)^{-1}=(d_1,\dotsc,d_l)=(1,\dotsc,1,2)$, so that \begin{align*} B(C_l) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & \ddots & \ddots & \ddots \\ & & {-1} & 2 & {-2} \\ & & & {-2} & 4 \end{psm}, \end{align*} $(i,j)=(l-1,l)$ and \begin{align}\label{eq:C:olg} \begin{aligned} &\ol{g}_{rr}(z) = \frac{1-q^2 z}{q^2-z} \quad (1 \le r <l=j), & &\ol{g}_{jj}(z) = \frac{1-q^4 z}{q^4-z},\\ &\ol{g}_{rs}(z) = \frac{q-z}{1-q z} \quad (1 \le r,s<l, \ \abs{r-s}=1), & &\ol{g}_{ij}(z) = \ol{g}_{ji}(z) = \frac{q^2-z}{1-q^2 z}. \end{aligned} \end{align} Then we have $q_i=q$ and \begin{align}\label{eq:C:hij3} h^3_{ij} = \frac{q^3-q^{-3}}{q-q^{-1}} = \bnm{3}{1}{i} = \bnm{3}{2}{i}. \end{align} For $(r,s) \in I^2$ such that $\abs{r-s}=1$ and $(r,s) \ne (i,j)$, we have \begin{align}\label{eq:C:hij2} h_{rs} \ceq \frac{\wh{1}+\wh{g^{12}_{00}}}{\wh{g^2_0}} = \bnm{2}{1}{r}, \end{align} where $q_r=q$ ($r<l-1$) or $q_r=q^2$ ($r=l$), and $g^m_n$ is given by \eqref{eq:ns:ADEolg} with $d=d_r$. \item For the type $F_4$, we take $D(F_4)^{-1}=(d_1,\dotsc,d_4)=(2,2,1,1)$, so that \begin{align*} B(F_4) = \begin{psm} 4 & {-2} \\ {-2} & 4 & {-2} \\ & {-2} & 2 & {-1} \\ & & {-1} & 2 \end{psm}, \end{align*} $(i,j)=(3,2)$ and \begin{align}\label{eq:F:olg} \begin{aligned} &\ol{g}_{11}(z) = \ol{g}_{22}(z) = \frac{1-q^4 z}{q^4-z}, & &\ol{g}_{33}(z) = \ol{g}_{44}(z) = \frac{1-q^2 z}{q^2-z}, \\ &\ol{g}_{rs}(z) = \frac{q^2-z}{1-q^2 z} \quad (\{r,s\}=\{1,2\},\{2,3\}), & &\ol{g}_{rs}(z) = \frac{q-z}{1-qz} \quad (\{r,s\}=\{3,4\}). \end{aligned} \end{align} Then we have $q_i=q$ and \begin{align}\label{eq:F:hij3} h^3_{ij} = \frac{q^3-q^{-3}}{q-q^{-1}} = \bnm{3}{1}{i} = \bnm{3}{2}{i}. \end{align} For $(r,s) \in I^2$ such that $\abs{r-s}=1$ and $(r,s) \ne (i,j)$, we have \begin{align}\label{eq:F:hij2} h_{rs} \ceq \frac{\wh{1}+\wh{g^{12}_{00}}}{\wh{g^2_0}} = \bnm{2}{1}{r}, \end{align} where $q_r=q^2$ ($r=1,2$) or $q_r=q$ ($r=3,4$), and $g^m_n$ is given by \eqref{eq:ns:ADEolg} with $d=d_r$. \end{clist} \end{enumerate} \end{cor} \begin{proof} For the type $B_l$, the formula \eqref{eq:B:olg} of $h^3_{ij}$ is obtained from \eqref{eq:ns:hij3} since $\ol{g}_{ii}$ and $\ol{g}_{ij}$ in \eqref{eq:B:olg} are given by \eqref{eq:ns:BCF-sp} with $d=d_i=\hf$. The formula \eqref{eq:B:hij2} of $h_{rs}$ is the consequence of \eqref{eq:ns:hij2} since we have $a_{rs}=-1$. The formulas for the other types can be obtained by similar arguments using \eqref{eq:ns:hij3} and \eqref{eq:ns:hij2}. \end{proof} We can similarly discuss the $q$-binomials $\bnm{4}{s}{i}$ appearing in the type $G_2$. Define the variables \begin{align}\label{eq:ns:G-z} z_{m,n} \ceq z_m/z_n \quad (1 \le m < n \le 4), \quad z_{m,0} \ceq z_m/z \quad (1 \le m \le 4), \end{align} the rational functions \begin{align}\label{eq:ns:G-sp} g^m_n \ceq \frac{1-q^{2d}z_{m,n}}{q^{2d}-z_{m,n}} \quad (1 \le m < n \le 4), \quad g^m_0 \ceq \frac{q^{3d}-z_{m,0}}{1-q^{3d}z_{m,0}} \quad (1 \le m \le 4), \end{align} and the set of rational functions \begin{align}\label{eq:ns:R4} R_4 \ceq \bigl\{\tprd_{1 \le m < n \le 4}(g^m_n)^{p_{mn}} \tprd_{1 \le m \le 4}(g^m_0)^{p_m} \mid p_{mn},p_m = 0,1 \bigr\}. \end{align} Similarly as the $\frS_2$-action \eqref{eq:ns:s1-R2} on $R_2$ and the $\frS_3$-action \eqref{eq:ns:s1-R3} and \eqref{eq:ns:s2-R3} on $R_3$, we can define the $\frS_4$-action on $R_4$ by letting the generators $s_r=(r,r+1) \in \frS_4$ ($r=1,2,3$) act as \begin{align}\label{eq:ns:sr-R4} s_r\Bigl(\prod_{1 \le m < n \le 4}(g^m_n)^{p_{mn}} \prod_{1 \le m \le 4}(g^m_0)^{p_m}\Bigr) \ceq g^r_{r+1} \prod_{1 \le m < n \le 4}(g^{s_r(m)}_{s_r(n)})^{p_{mn}} \prod_{1 \le m \le 4}(g^{s_r(m)}_{ 0})^{p_{m }}. \end{align} Then, using the symbols $\wh{f} \ceq \sum_{\sigma \in \frS_4}\sigma(f)$ for $f \in R_4$, $g^{11}_{23} \ceq g^1_2 g^1_3$ and so on, we have the following formulas. \begin{align} \label{eq:ns:G01} &0=\wh{g_{003}^{121}}+\wh{g_{004}^{122}}-\wh{g_{004}^{232}}-\wh{g_{003}^{141}}, \\ \label{eq:ns:G02} &0=\wh{g_{003}^{121}}+\wh{g_{004}^{122}}+\wh{g_{004}^{141}}+\wh{g_{004}^{231}}, \\ \label{eq:ns:G03} &0=\wh{g_{003}^{121}}+\wh{g_{004}^{122}}+\wh{g_{004}^{131}}+ 2\wh{g_{004}^{141}}+\wh{g_{004}^{241}}, \\ \label{eq:ns:G-4q} &[4]_{q^d} = \Bigl(\wh{1}+\wh{g^{1234}_{0000}}+\wh{g^{34}_{00}} \cdot \bnm{4}{2}{q^d}\Bigr) / \bigl(\wh{g^4_0}+\wh{g^{234}_{000}}\bigr), \\ \label{eq:ns:G-42q} & \bnm{4}{2}{q^d} = \Bigl( \tfrac{1}{2}(\wh{g_{00004}^{12341}}+\wh{g_{00004}^{12342}}+\wh{g_4^1}+\wh{g_4^2}) -\tfrac{2}{3} \wh{g_{00}^{13}} +\tfrac{5}{3}(\wh{g_{00}^{14}}-\wh{g_{00 }^{23}}) -\tfrac{4}{3} \wh{g_{00}^{34}}+\wh{g_{003}^{121}} +\tfrac{1}{3} \wh{g_{004}^{122}}\Bigr) / \wh{g^{34}_{00}}. \end{align} Here we used $[n]_{q^d} \ceq \frac{q^{nd}-q^{-nd}}{q^d-q^{-d}}$, $[n]_{q^d}! \ceq \prod_{m=1}^n [m]_{q^d}$ and $\bnm{n}{m}{q^d} \ceq \frac{[n]_{q^d}!}{[m]_{q^d}! \, [n-m]_{q^d}!}$. For the later reference, let us summarize the result in: \begin{cor}\label{cor:ns:G} Let $X_l=G_2$ with Cartan matrix $A(G_2)=(a_{ij})_{i,j \in I} = \begin{psm}2 & {-1} \\ {-3} & 2\end{psm}$, $g=\{g_{rs}(z;p) \mid r,s \in I\}$ be the structure functions (\cref{dfn:U:DI}), and $\ol{g}_{rs}(z) \ceq \lim_{p \to 0}g_{rs}(z;p)$. We set $(i,j) \ceq (2,1)$ so that $a_{ij}=-3$. \begin{enumerate} \item For the variables \eqref{eq:ns:G-z}, set the rational functions \[ g^m_n \ceq \ol{g}_{22}(z_{mn}) \quad (1 \le m < n \le 4), \quad g^m_0 \ceq \ol{g}_{21}(z_{m0}) \quad (1 \le m \le 4). \] Then \eqref{eq:ns:sr-R4} defines an $\frS_4$-action on the set $R_4$ given by \eqref{eq:ns:R4}. \item Using the orbit sum $\wh{f} \ceq \sum_{\sigma \in \frS_4}\sigma(f)$ and the abbreviations $g^{11}_{23} \ceq g^1_2 g^1_3$ and so on, we define \begin{align}\label{eq:ns:h4} \begin{split} h^{4,2}_{21} &\ceq \text{the RHS of \eqref{eq:ns:G-42q}} \\ &=\Bigl( \tfrac{1}{2}(\wh{g_{00004}^{12341}}+\wh{g_{00004}^{12342}}+\wh{g_4^1}+\wh{g_4^2}) -\tfrac{2}{3} \wh{g_{00}^{13}} +\tfrac{5}{3}(\wh{g_{00}^{14}}-\wh{g_{00 }^{23}}) -\tfrac{4}{3} \wh{g_{00}^{34}}+\wh{g_{003}^{121}} +\tfrac{1}{3} \wh{g_{004}^{122}}\Bigr) / \wh{g^{34}_{00}}, \\ h^{4,1}_{21} &\ceq \text{the RHS of \eqref{eq:ns:G-4q}} \\ &=\Bigl(\wh{1}+\wh{g^{1234}_{0000}}+\wh{g^{34}_{00}} \cdot h^{4,2}_{21} \Bigr)/ \bigl(\wh{g^4_0}+\wh{g^{234}_{000}}\bigr). \end{split} \end{align} We also define $J$ to be the ideal in the symmetric function ring of variables $z_1,\dotsc,z_4$ generated by the right hand sides of \eqref{eq:ns:G01}, \eqref{eq:ns:G02} and \eqref{eq:ns:G03}. We also specialize the structure functions as \[ g_{rs}(z;p) = q^{-b_{rs}} \frac{\theta(q^{b_{rs}}z;p)}{\theta(q^{-b_{rs}}z;p)} \quad (r,s \in I) \] (see \eqref{eq:U:gijE}) with the symmetrization \[ D(G_2)^{-1}=\diag(3,1), \quad B(G_2) = (b_{rs})_{r,s \in I} = \begin{psm}6 & {-3} \\ {-3} & 2 \end{psm}, \] so that the functions $\ol{g}_{rs}$ are given by \[ \ol{g}_{11}(z) = \frac{1-q^6 z}{q^6-z}, \quad \ol{g}_{12}(z) = \ol{g}_{21}(z) = \frac{q^3-z}{1-q^3 z}, \quad \ol{g}_{22}(z) = \frac{1-q^2 z}{q^2-z}. \] Under this specialization, we have $q_i=q_2=q$ and \[ J=0, \quad h^{4,1}_{21} = [4]_2, \quad h^{4,2}_{21} = \bnm{4}{2}{2}. \] We also have $q_j=q_1=q^3$ and \[ h_{12} \ceq \frac{\wh{1}+\wh{g^{12}_{00}}}{\wh{g^2_0}} = \bnm{2}{1}{1}, \] where $g^m_n$ is given by \eqref{eq:ns:ADEolg} with $d=d_1=3$. \end{enumerate} \end{cor} \begin{rmk} We found out the formulas \eqref{eq:ns:h3} and \eqref{eq:ns:h4} with the help of computer algebra system under the three principles explained above. \end{rmk} \subsection{Types \texorpdfstring{$B_l,C_l,F_4$}{Bl,Cl,F4}}\label{ss:ns:BCF} In this subsection, we define the dynamical Ding-Iohara algebroids of types $B,C,F$. The construction is basically similar to the simply-laced case, but the difference appears in the existence of the quartic Serre-type relations \eqref{eq:BCF:eS2} and \eqref{eq:BCF:fS2}. Hereafter in this \cref{ss:ns:BCF}, we denote by $X_l$ one of the finite root systems of types $B_l,C_l$ and $F_4$. To define the dynamical Ding-Iohara algebroid, we choose a symmetrization $A=D B$ of the Cartan matrix $A=A(X_l)$ (see \cref{sss:E:root}). Our choice in this \cref{ss:ns:BCF} is the same one in \cref{cor:ns:BCF}, i.e., \begin{align*} \begin{split} D(B_l)^{-1} &= (d_1,\dotsc,d_l) = (1,\dotsc,1,\thf), \\ D(C_l)^{-1} &= (d_1,\dotsc,d_l) = (1,\dotsc,1,2), \\ D(F_4)^{-1} &= (d_1,\dotsc,d_4) = (2,2,1,1). \end{split} \end{align*} and \begin{align}\label{eq:BCF:B} \begin{split} B(B_l) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & \ddots & \ddots & \ddots \\ & & {-1} & 2 & {-1} \\ & & & {-1} & 1 \end{psm}, \quad B(C_l) = \begin{psm} 2 & {-1} \\ {-1} & 2 & {-1} \\ & \ddots & \ddots & \ddots \\ & & {-1} & 2 & {-2} \\ & & & {-2} & 4 \end{psm}, \quad B(F_4) = \begin{psm} 4 & {-2} \\ {-2} & 4 & {-2} \\ & {-2} & 2 & {-1} \\ & & {-1} & 2 \end{psm}. \end{split} \end{align} Note that the choice for type $F_4$ is different from \eqref{eq:E:D}. We will also use the symbols in \cref{s:ADE} and \cref{ss:ns:h}. For example, we denote $g_{ij}(z) \ceq g_{ij}(z;p)$, $g_{ij}^*(z) \ceq g_{ij}(z;p^*)$ and $\ol{g}_{ij}(z) \ceq \lim_{p \to 0}g_{ij}(z;p)$ for a given structure function $g_{ij}(z;p)$. \begin{dfn}\label{dfn:U:BCF} Let $A=A(X_l)=(a_{ij})_{i,j \in I}$ be the Cartan matrix of type $X_l=B_l,C_l$ or $F_4$, and take the symmetrization $A=D B$ as \eqref{eq:BCF:B}, a complex parameter $q$ with $0<\abs{q}<1$, a formal parameter $p$, and the structure functions $\{g_{i,j}(x;p) \mid i,j \in I\}$ as in \cref{dfn:U:DI}. We define \[ U_{q,p}(g,X_l) \] to be the topological algebra over $\bbC\dbr{p}$ with the same generators $\clM(\wtH^*)$, $q^{\pm c/2}$, $K^{\pm}_i$, $e_{i,m}$, $f_{i,m}$, $\psi^{\pm}_{i,m}$ as the simply-laced case \eqref{eq:ADE:gen}, and with the same relations \eqref{eq:U:qc}--\eqref{eq:U:ef} and the following Serre-type relations. \begin{itemize} \item For the pair $(i,j) \in I^2$ with $a_{ij}=-1$, we have the Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS}. \item For the pair $(i,j) \in I^2$ with $a_{ij}=-2$, set \begin{align}\label{eq:BCF:Phi2} \begin{split} \Phi_2(z;z_1,z_2,z_3) \ceq \ &\wt{g}^*_{ij}(z_{10}) \wt{g}^*_{ij}(z_{20}) \wt{g}^*_{ij}(z_{30}) e_i(z_3)e_i(z_2)e_i(z_1)e_j(z) \\ &-h^3_{ij} \wt{g}^*_{ij}(z_{20}) \wt{g}^*_{ij}(z_{30}) e_i(z_3)e_i(z_2)e_j(z)e_i(z_1) \\ &+h^3_{ij} \wt{g}^*_{ij}(z_{30}) e_i(z_3)e_j(z)e_i(z_2)e_i(z_1) -e_j(z)e_i(z_3)e_i(z_2)e_i(z_1) \end{split} \end{align} with $\wt{g}^*_{ij}(x) \ceq \ol{g}_{ij}(x)/g^*_{ij}(x)$, $z_{m0} \ceq z_m/z$ and $h^3_{ij} \ceq \bigl(\wh{g^{123}_{000}}-\wh{1}\bigr)/\bigl(\wh{g^{23}_{00}}-\wh{g^3_0}\bigr)$ in \eqref{eq:ns:h3}. Then the Serre-type relation for $e_i(z),e_j(z)$ is \begin{align}\label{eq:BCF:eS2} \begin{split} &\Phi_2(z;z_1,z_2,z_3) +\wt{g}^*_{ii}(z_{12}) \Phi_2(z;z_2,z_1,z_3) \\ & +\wt{g}^*_{ii}(z_{12}) \wt{g}^*_{ii}(z_{13}) \Phi_2(z;z_2,z_3,z_1) +\wt{g}^*_{ii}(z_{23}) \Phi_2(z;z_1,z_3,z_2) \\ & +\wt{g}^*_{ii}(z_{13}) \wt{g}^*_{ii}(z_{23}) \Phi_2(z;z_3,z_1,z_2) +\wt{g}^*_{ii}(z_{12}) \wt{g}^*_{ii}(z_{13}) \wt{g}^*_{ii}(z_{23}) \Phi_2(z;z_3,z_2,z_1) = 0, \end{split} \end{align} where we used $\wt{g}^*_{ii}(x) \ceq \ol{g}_{ii}(x)/g^*_{ii}(x)$ and $z_{mn} \ceq z_m/z_n$. Similarly, setting \begin{align*} \Psi_2(z;z_1,z_2,z_3) \ceq \ &\wt{g}_{ij}(z_{10}) \wt{g}_{ij}(z_{20}) \wt{g}_{ij}(z_{30}) f_j(z)f_i(z_1)f_i(z_2)f_i(z_3) \\ &-h^3_{ij} \wt{g}_{ij}(z_{20}) \wt{g}_{ij}(z_{30})f_i(z_1)f_j(z)f_i(z_2)f_i(z_3) \\ &+h^3_{ij} \wt{g}_{ij}(z_{30}) f_i(z_1)f_i(z_2)f_j(z)f_i(z_3) - f_i(z_1)f_i(z_2)f_i(z_3)f_j(z) \end{align*} with $\wt{g}_{ij}(x) \ceq \ol{g}_{ij}(x)/g_{ij}(x)$, the Serre-type relation for $f_i(z),f_j(z)$ is given by \begin{align}\label{eq:BCF:fS2} \begin{split} &\Psi_2(z;z_1,z_2,z_3) +\wt{g}_{ii}(z_{12}) \Psi_2(z;z_2,z_1,z_3) \\ & +\wt{g}_{ii}(z_{12}) \wt{g}_{ii}(z_{13}) \Psi_2(z;z_2,z_3,z_1) +\wt{g}_{ii}(z_{23}) \Psi_2(z;z_1,z_3,z_2) \\ & +\wt{g}_{ii}(z_{13}) \wt{g}_{ii}(z_{23}) \Psi_2(z;z_3,z_1,z_2) +\wt{g}_{ii}(z_{12}) \wt{g}_{ii}(z_{13}) \wt{g}_{ii}(z_{23}) \Psi_2(z;z_3,z_2,z_1) = 0. \end{split} \end{align} \end{itemize} \end{dfn} \begin{rmk}\label{rmk:BCF:Serre} A few comments on the definition are in order. \begin{enumerate} \item By the same discussion of \cref{rmk:E:U} \ref{i:rmk:E:U:d'}, the topological algebra $U_{q,p}(g,X_l)$ is independent, up to isomorphism, of the choice of a symmetrization of the Cartan matrix $A$. \item The Serre-type relation \eqref{eq:BCF:eS2} can be rewritten as \[ \sum_{\sigma \in \frS_3} (\sigma \Phi_2)(z;z_1,z_2,z_3) = 0, \] where the $\frS_3$-action on a function $\phi(z_1,z_2,z_3)$ is given by \begin{align}\label{eq:BCF:eS-S3} (s_1 \phi)(z_1,z_2,z_3) = \wt{g}^*_{ii}(z_{12}) \phi(z_2,z_1,z_3), \quad (s_2 \phi)(z_1,z_2,z_3) = \wt{g}^*_{ii}(z_{23}) \phi(z_1,z_3,z_2) \end{align} for the generators $s_1=(1,2)$ and $s_2=(2,3)$ of $\frS_3$. Similarly, \eqref{eq:BCF:fS2} can be rewritten as \[ \sum_{\sigma \in \frS_3} (\sigma \Psi_2)(z;z_1,z_2,z_3) = 0 \] where the $\frS_3$-action is given by \eqref{eq:BCF:eS-S3}, replacing $\wt{g}^*_{ii}$ by $\wt{g}_{ii}$. \end{enumerate} \end{rmk} As in the case of simply-laced types (\cref{prp:U:ADE}), the Serre-type relations \eqref{eq:BCF:eS2} and \eqref{eq:BCF:fS2} are designed to recover those \eqref{eq:E:eS} and \eqref{eq:E:fS} of the elliptic algebras $U_{q,p}\bigl(\wh{\frg}(X_l)\bigr)$. More precisely, we have: \begin{prp}\label{prp:U:BCF} In \cref{dfn:U:BCF} of $U_{q,p}(g,X_l)$ for type $X_l=B_l,C_l$ or $F_4$, set the structure functions $g=\{g_{ij}(z;p) \mid i,j \in I\}$ as \begin{align* g_{ij}(x;p) = \frac{G_{ij}^+(x;p)}{G_{ij}^-(x;p)} \ceq \frac{q^{-b_{ij}} \theta(q^{b_{ij}}x;p)}{\theta(q^{-b_{ij}}x;p)}, \end{align*} where $B=(b_{ij})_{i,j \in I}$ is the symmetrization $A=D B$ of the Cartan matrix $A=A(X_l)$. Then, the map sending the generators to the corresponding elements gives an isomorphism of topological algebras \[ U_{q,p}(g,X_l) \cong U_{q,p}\bigl(\wh{g}(X_l)\bigr). \] \end{prp} \begin{proof} As in the proof of \cref{prp:U:ADE}, the non-trivial point lies only in the Serre-type relations. For $(i,j) \in I^2$ with $a_{ij}=-1$, the cubic relations in $U_{q,p}(g,X_l)$ are equivalent to those of $U_{q,p}\bigl(\wh{g}(X_l)\bigr)$ by the argument of \cref{prp:U:ADE} and the formulas \eqref{eq:B:hij2}, \eqref{eq:C:hij2} and \eqref{eq:F:hij2} of $h_{rs}$ in \cref{cor:ns:BCF}. Thus, it is enough to show that the quartic relations \eqref{eq:BCF:eS2} and \eqref{eq:BCF:fS2} for $(i,j) \in I^2$ with $a_{ij}=-2$ are equal to \eqref{eq:E:eS} and \eqref{eq:E:fS}. In the case $X_l=B_l$, we have $(i,j)=(l,l-1)$, and by the formula \eqref{eq:B:hij3} in \cref{cor:ns:BCF}, we have \[ h^3_{ij} = \bnm{3}{1}{i} = \bnm{3}{2}{i}, \] using \eqref{eq:E:bini} with $q_i=q^{d_i}=q^{1/2}$. Then the first term $\Phi_2(z;z_1,z_2,z_3)$ of \eqref{eq:BCF:eS2} is equal to \begin{align*} \Phi_2&(z;z_1,z_2,z_3) = \frac{-1}{\wt{\gamma}^*(z_{23},z_{13},z_{12};q^2) \wt{\gamma}^*(z_{30},z_{20},z_{10};q^{-1})} \cdot \wt{\gamma}^*(z_{23},z_{13},z_{12};q^2)\Bigl( \\ & \wt{\gamma}^*(z_{30},z_{20},z_{10};q^{-1}) e_j(z ) e_i(z_3) e_i(z_2) e_i(z_1) -\bnm{3}{1}{i} \wt{\gamma}^*(z_{03},z_{20},z_{10};q^{-1}) e_i(z_3) e_j(z ) e_i(z_2) e_i(z_1) \\ &+\bnm{3}{2}{i} \wt{\gamma}^*(z_{03},z_{02},z_{10};q^{-1}) e_i(z_3) e_i(z_2) e_j(z ) e_i(z_1) -\wt{\gamma}^*(z_{03},z_{02},z_{01};q^{-1}) e_i(z_3) e_i(z_2) e_i(z_1) e_j(z ) \Bigr) \\ &=\frac{-1}{\wt{\gamma}^*(z_{23},z_{13},z_{12};q^2) \wt{\gamma}^*(z_{30},z_{20},z_{10};q^{-1})} \cdot \bigl(\text{the term in \eqref{eq:E:eS}, $a=3$ with $\sigma=(13)$}\bigr). \end{align*} Here we used the abbreviation $\wt{\gamma}^*(x,y,z;q) \ceq \wt{\gamma}(x;q,p^*) \wt{\gamma}(y;q,p^*) \wt{\gamma}(z;q,p^*)$ with $\wt{\gamma}$ in \eqref{eq:E:wtgam}. A similar calculation yields that the second, third, fourth, fifth and sixth terms in \eqref{eq:BCF:eS2} are equal, up to the factor $-\wt{\gamma}^*(z_{23},z_{13},z_{12};q^2) \wt{\gamma}^*(z_{30},z_{20},z_{10};q^{-1})$, to the terms in \eqref{eq:E:eS}, $a=3$ with $\sigma=(132),(23),(123),(12)$ and $e$, respectively. Thus, \eqref{eq:BCF:eS2} is equivalent to \eqref{eq:E:eS}. In the same way, we can show the equivalence of \eqref{eq:BCF:fS2} and \eqref{eq:E:fS}. Similar arguments work for the types $C_l$ and $F_4$. We omit the detail. \end{proof} The main statement of this \cref{ss:ns:BCF} is: \begin{thm}\label{thm:BCF:Halgd} $U_{q,p}(g,X_l)$ has a Hopf algebroid structure with $(\Delta,\ve,S)$ given by the formulas in \cref{ss:ADE:Halgd}. \end{thm} \begin{proof} We only check that the morphisms $\Delta,\ve$ and $S$ are compatible with \eqref{eq:BCF:eS2} and \eqref{eq:BCF:fS2}. The rest of the proof is completely same as in \cref{ss:ADE:Halgd}. For $\Delta$, we have \begin{align*} &\Delta(e_i(z_1))\Delta(e_i(z_2))\Delta(e_i(z_3))\Delta(e_j(z)) \\ &=(e_i(z_1) \totimes 1+ \psi^+_i(q^{c_1/2}z_1) \totimes e_i(q^{c_1}z_1)) (e_i(z_2) \totimes 1+ \psi^+_i(q^{c_1/2}z_2) \totimes e_i(q^{c_1}z_2)) \\ & \quad \cdot (e_i(z_3) \totimes 1+ \psi^+_i(q^{c_1/2}z_3) \totimes e_i(q^{c_1}z_3)) (e_j(z ) \totimes 1+ \psi^+_j(q^{c_1/2}z ) \totimes e_j(q^{c_1}z)). \end{align*} We expand it and exchange each term with \eqref{eq:U:pp} and \eqref{eq:U:ppe}. Note that the exchange between two $\psi^+$ in LHS and the exchange between two $e_i$ in RHS of the tensor product occur simultaneously. Then we find \begin{align*} &\Delta(e_i(z_1))\Delta(e_i(z_2))\Delta(e_i(z_3))\Delta(e_j(z)) \\ &=\Bigl(\bigl(g^*_{ij}(z_{10}) g^*_{ij}(z_{20}) g^*_{ij}(z_{30}) g^*_{ii}(z_{12}) g^*_{ii}(z_{13}) g^*_{ii}(z_{23}) \bigr) \totimes 1 \Bigr) \Delta(e_j(z)) \Delta(e_i(z_3)) \Delta(e_i(z_2)) \Delta(e_i(z_1)). \end{align*} By similar calculation, we can check that each $g^*$ in \eqref{eq:BCF:eS2} are canceled by sorting $\Delta(e_i(z_k))$ and $\Delta(e_j(z))$ in the order $\Delta(e_j(z))\Delta(e_i(z_3))\Delta(e_i(z_2))\Delta(e_i(z_1))$. Thus we obtain \begin{align}\label{eq:BCF:DE-hij3} \Delta(\ref{eq:BCF:eS2}) = \Bigl(\bigl((\wh{g^{123}_{000}}-\wh{1})-h^3_{ij}(\wh{g^{23}_{00}}-\wh{g^3_0})\bigr) \totimes 1\Bigr) \Delta(e_j(z)) \Delta(e_i(z_3)) \Delta(e_i(z_2)) \Delta(e_i(z_1)) = 0. \end{align} Similarly, for \ref{eq:BCF:fS2}, we have \begin{align}\label{eq:BCF:DF-hij3} \Delta(\ref{eq:BCF:fS2}) =&\Bigl(1 \totimes \bigl((\wh{g^{123}_{000}}-\wh{1})-h^3_{ij}(\wh{g^{23}_{00}}-\wh{g^3_0})\bigr) \Bigr) \Delta(f_i(z_1)) \Delta(f_i(z_2)) \Delta(f_i(z_3)) \Delta(f_j(z))=0. \end{align} The compatibility with $\ve$ is clear. For the antipode $S$, it can be checked in the same manner as in \cref{lem:U:S}. \end{proof} \begin{rmk}\label{rmk:BCF:h} As in the case of the function $h_{ij}$ (\cref{rmk:ADE:h}), the function $h^3_{ij}$ is uniquely determined by the vanishing condition of the Drinfeld-type comultiplication \eqref{eq:BCF:DE-hij3} and \eqref{eq:BCF:DF-hij3} of the Serre-type relation. \end{rmk} \subsection{Type \texorpdfstring{$G_2$}{G2}}\label{ss:ns:G} Finally we construct the dynamical Ding-Iohara algebroid of type $G_2$. Recall that the Cartan matrix of type $G_2$ is $A(G_2)=(a_{ij})_{i,j \in I} = \begin{psm} 2 & {-1} \\ {-3} & 2 \end{psm}$. We take the symmetrization given in \cref{cor:ns:G}, i.e., \[ D(G_2)^{-1}= \diag(3,1), \quad B(G_2) = \begin{psm} 6 & {-3} \\ {-3} & 2 \end{psm}. \] In this case, the Serre-type relations for $(i,j)=(2,1)$ are quite complicated in the form \eqref{eq:BCF:eS2} and \eqref{eq:BCF:fS2}. However, using the symmetric group action as in \cref{rmk:BCF:Serre}, we can display them in compact form as follows. \begin{dfn}\label{dfn:U:G} Let $A(G_2)$ be the Cartan matrix of type $G_2$, and take a complex parameter $q$ with $0<\abs{q}<1$, a formal parameter $p$, and the structure functions $g=\{g_{i,j} \mid i,j \in I\}$. We define $U_{q,p}(g,G_2)$ to be the topological algebra over $\bbC\dbr{p}$ with the same generators $\clM(\wtH^*)$, $q^{\pm c/2}$, $K^{\pm}_i$, $e_{i,m}$, $f_{i,m}$, $\psi^{\pm}_{i,m}$ as in \eqref{eq:ADE:gen}, and with the same relations \eqref{eq:U:qc}--\eqref{eq:U:ef} and the following Serre-type relations. \begin{itemize} \item For $(i,j)=(1,2)$, we have the Serre-type relations \eqref{eq:U:eS} and \eqref{eq:U:fS}. \item For $(i,j)=(2,1)$, we set \begin{align*} \Phi_3(z;z_1,z_2,z_3,z_4) \ceq \ \wt{g}^*_{21}(z_{10}) \wt{g}^*_{21}(z_{20}) \wt{g}^*_{21}(z_{30}) \wt{g}^*_{21}(z_{10}) e_2(z_4)e_2(z_3)e_2(z_2)e_2(z_1)e_1(z) \\ -h^{4,1}_{21} \wt{g}^*_{21}(z_{20}) \wt{g}^*_{21}(z_{30}) \wt{g}^*_{21}(z_{40}) e_2(z_4)e_2(z_3)e_2(z_2)e_1(z)e_2(z_1) \\ +h^{4,2}_{21} \wt{g}^*_{21}(z_{30}) \wt{g}^*_{21}(z_{40}) e_2(z_4)e_2(z_3)e_1(z)e_2(z_1)e_1(z) \\ -h^{4,1}_{21} \wt{g}^*_{21}(z_{40}) e_2(z_4)e_1(z)e_2(z_3)e_2(z_2)e_2(z_1) \\ +e_1(z)e_2(z_4)e_2(z_3)e_2(z_2)e_2(z_1), \end{align*} where we used $\wt{g}^*_{ij}(x) \ceq \ol{g}_{ij}(x)/g^*_{ij}(x)$, $z_{m0} \ceq z_m/z_0$ and the functions in \eqref{eq:ns:h4}: \begin{align}\label{eq:G:h4} \begin{split} h^{4,1}_{ij} \ceq &\bigl(\wh{1}+\wh{g}^{1234}_{0000}+\wh{g}^{34}_{00} \cdot h^{4,2}_{ij}\bigr) / \bigl(\wh{g}^4_0+\wh{g}^{234}_{000}\bigr), \\ h^{4,2}_{ij} \ceq &\bigl( \tfrac{1}{2}(\wh{g}_{00004}^{12341}+\wh{g}_{00004}^{12342}+\wh{g}_4^1+\wh{g}_4^2) -\tfrac{2}{3} \wh{g}_{00}^{13}+\tfrac{5}{3}(\wh{g}_{00}^{14}-\wh{g}_{00}^{23}) -\tfrac{4}{3} \wh{g}_{00}^{34}+\wh{g}_{003}^{121}+\tfrac{1}{3}\wh{g}_{004}^{122} + J. \end{split} \end{align} The symbol $+J$ in the last part means that we can add any element of the ideal $J$ defined right after \eqref{eq:ns:h4}. Then the Serre-type relation for $e_i(z),e_j(z)$ is \begin{align}\label{eq:G:eS3} \sum_{\sigma \in \frS_4} (\sigma \Phi_3)(z;z_1,z_2,z_3,z_4) = 0 \end{align} where the $\frS_4$-action on a function $\phi(z_1,z_2,z_3,z_4)$ is given by \begin{align}\label{eq:G:S4a} (s_r \phi) (z_1,z_2,z_3,z_4) \ceq \wt{g}^*_{22}(z_{r,r+1}) \phi(z_{s_r(1)},z_{s_r(2)},z_{s_r(3)},z_{s_r(4)}) \quad (r=1,2,3) \end{align} for the generators $s_r=(r,r+1)$ of $\frS_4$. Similarly, setting $\wt{g}_{21}(x) \ceq \ol{g}_{21}(x)/g_{21}(x)$ and \begin{align*} \Psi_3(z;z_1,z_2,z_3,z_4) \ceq \wt{g}_{21}(z_{10})\wt{g}_{21}(z_{20})\wt{g}_{21}(z_{30})\wt{g}_{21}(z_{40}) f_1(z)f_2(z_1)f_2(z_2)f_2(z_3)f_2(z_4) \\ -h^{4,1}_{21}\wt{g}_{21}(z_{20})\wt{g}_{21}(z_{30})\wt{g}_{21}(z_{40}) f_2(z_1)f_1(z)f_2(z_2)f_2(z_3)f_2(z_4) \\ +h^{4,2}_{21}\wt{g}_{21}(z_{30})\wt{g}_{21}(z_{40}) f_2(z_1)f_2(z_2)f_1(z)f_2(z_3)f_2(z_4) \\ -h^{4,1}_{21}\wt{g}_{21}(z_{40})f_2(z_1)f_2(z_2)f_2(z_3)f_1(z)f_2(z_4) \\ +f_2(z_1)f_2(z_2)f_2(z_3)f_2(z_4)f_1(z), \end{align*} the Serre-type relation for $f_i(z),f_j(z)$ is given by \begin{align}\label{eq:G:fS3} \sum_{\sigma \in \frS_4} (\sigma \Psi_3)(z;z_1,z_2,z_3,z_4) = 0, \end{align} where the $\frS_4$-action is given by \eqref{eq:G:S4a}, replacing $\wt{g}^*_{22}(x)$ by $\wt{g}_{22}(x)$. \end{itemize} \end{dfn} \begin{rmk} By the same discussion of \cref{rmk:E:U} \ref{i:rmk:E:U:d'}, the topological algebra $U_{q,p}(g,X_l)$ is independent, up to isomorphism, of the choice of a symmetrization of the Cartan matrix $A$. \end{rmk} Similarly as in the simply-laced types (\cref{prp:U:ADE}) and the $BCF$ types (\cref{prp:U:BCF}), the specialization \eqref{eq:U:gijE} of the structure functions reduces $U_{q,p}(g,G_2)$ to the elliptic algebra $U_{q,p}\bigl(\wh{\frg}(G_2)\bigr)$. \begin{prp}\label{prp:U:G} In \cref{dfn:U:G} of $U_{q,p}(g,G_2)$, set the structure functions $g=\{g_{ij}(x;p) \mid i,j \in \{1, 2\}\}$ as \begin{align* g_{ij}(x;p) = \frac{G_{ij}^+(x;p)}{G_{ij}^-(x;p)} \ceq \frac{q^{-b_{ij}} \theta(q^{b_{ij}}x;p)}{\theta(q^{-b_{ij}}x;p)}, \end{align*} where $B=(b_{ij})_{i,j \in \{1, 2\}}= \begin{psm} 6 & {-3} \\ {-3} & 2 \end{psm}$ is the symmetrization of the Cartan matrix $G_2$ we are taking. Then we have an isomorphism of topological algebras \[ U_{q,p}(g,X_l) \cong U_{q,p}(\wh{g}). \] \end{prp} \begin{proof} By the same argument in the $BCF$ types (\cref{prp:U:BCF}), but now using \cref{cor:ns:G} instead of \cref{cor:ns:BCF}. \end{proof} \begin{thm}\label{thm:G:Halgd} $U_{q,p}(g,G_2)$ has a Hopf algebroid structure with $(\Delta,\ve,S)$ defined in \cref{ss:ADE:Halgd}. \end{thm} \begin{proof} The proof is essentially the same as \cref{thm:BCF:Halgd}. Let us only explain that the comultiplication $\Delta$ is compatible with \eqref{eq:G:eS3} and \eqref{eq:G:fS3}. By a similar calculation as loc.\ cit., we find \begin{align*} &\Delta(e_2(z_1))\Delta(e_2(z_2))\Delta(e_2(z_3))\Delta(e_2(z_4))\Delta(e_1(z)) \\ &=\Bigl(\bigl(g^*_{21}(z_{10}) g^*_{21}(z_{20}) g^*_{21}(z_{30}) g^*_{21}(z_{40}) g^*_{22}(z_{12}) g^*_{22}(z_{13}) g^*_{22}(z_{14}) g^*_{22}(z_{23}) g^*_{22}(z_{24}) g^*_{22}(z_{34}) \bigr) \totimes 1\Bigr)\\ & \qquad \Delta(e_1(z))\Delta(e_2(z_4))\Delta(e_2(z_3))\Delta(e_2(z_2))\Delta(e_2(z_1)), \end{align*} and so on. With these equations and the $\frS_4$-invariance of $h^{4,1}_{21}$ and $h^{4,2}_{21}$, we get \begin{align}\label{eq:G:DE} \begin{split} \Delta(\ref{eq:G:eS3}) &=\Bigl(\bigl(\wh{1}+\wh{g^{1234}_{0000}}-h^{4,1}_{21}(\wh{g^4_0}+\wh{g^{234}_{000}}) +h^{4,2}_{21}\wh{g^{34}_{00}}\bigr) \totimes 1\Bigr) \\ & \quad \cdot \Delta(e_1(z))\Delta(e_2(z_4))\Delta(e_2(z_3))\Delta(e_2(z_2))\Delta(e_2(z_1)) =0. \end{split} \end{align} Applying the same discussion for \ref{eq:G:fS3}, we obtain \begin{align}\label{eq:G:DF} \begin{split} \Delta(\ref{eq:G:fS3}) &=\Bigl( 1 \totimes \bigl(\wh{1}+\wh{g^{1234}_{0000}}-h^{4,1}_{21}(\wh{g^4_0}+\wh{g^{234}_{000}}) +h^{4,2}_{21}\wh{g^{34}_{00}}\bigr)\Bigr) \\ & \quad \cdot \Delta(f_2(z_1))\Delta(f_2(z_2))\Delta(f_2(z_3))\Delta(f_2(z_4))\Delta(f_1(z)) =0. \end{split} \end{align} \end{proof} \begin{rmk}\label{rmk:G:h} Note that the vanishing conditions \eqref{eq:G:DF} and \eqref{eq:G:DF} only yield a linear dependence of the functions $h^{4,1}_{21}$ and $h^{4,2}_{21}$. Thus, unlike the other root systems (\cref{rmk:ADE:h,rmk:BCF:h}), the compatibility with the comultiplication does not determine the functions $h$ in the Serre-type relations (see the three principles in \cref{ss:ns:h}). \end{rmk} \subsection{Hopf algebra limit} \label{ss:ns:DI} Here we discuss the limit $p \to 0$. Unlike the simply-laced case (\cref{prp:ADE:p=0}), there seems to be no definition of the Ding-Iohara quantum algebra of a non-simply-laced type in literature. \begin{dfn}\label{dfn:ns:DI} Let $X_l=B_l,C_l,F_4$ or $G_2$. Using the Cartan matrix $A=(a_{ij})_{i,j \in I}$ of type $X_l$, the structure functions $g$ as in \cref{ss:pre:DI} and a complex number $q$ with $\abs{q} \ne 0,1$, we define \[ U = U_q(g,A_l), \] to be the topological algebra over $\bbC$ generated by the elements \[ q^{\pm c/2}, \ e_{i,n}, \ f_{i,n}, \ \psi^+_{i,n}, \ \psi^-_{i,n} \quad (i \in I, \, n \in \bbZ) \] with the relations \eqref{eq:DI:qc}--\eqref{eq:DI:eeff}, the Serre-type relations \eqref{eq:DI:Serre} for $i,j \in I$ such that $a_{ij}=-1$, and the following higher Serre-type relations. We use the generating currents in \eqref{eq:DI:gc}. \begin{itemize} \item In the case $X_l=B_l,C_l$ or $F_4$, for $i,j \in I$ such that $a_{ij}=-2$, we set \begin{align*} \ol{\Phi}_2(z;z_1,z_2,z_3) \ceq \ & e_i(z_3)e_i(z_2)e_i(z_1)e_j(z) -h^3_{ij} e_i(z_3)e_i(z_2)e_j(z)e_i(z_1) \\ &+h^3_{ij} e_i(z_3)e_j(z)e_i(z_2)e_i(z_1) - e_j(z)e_i(z_3)e_i(z_2)e_i(z_1) \end{align*} with $h^3_{ij} \ceq \bigl(\wh{g^{123}_{000}}-\wh{1}\bigr)/\bigl(\wh{g^{23}_{00}}-\wh{g^3_0}\bigr)$ in \eqref{eq:ns:h3}. Then the Serre-type relation for $e_i(z),e_j(z)$ is \begin{align \sum_{\sigma \in \frS_3} (\sigma \ol{\Phi}_2)(z;z_1,z_2,z_3)=0, \end{align} where $\frS_3$ acts on a function $\phi(z_1,z_2,z_3)$ by permuting the indices of $z_k$. Similarly, the Serre-type relation for $f_i(z),f_j(z)$ is \begin{align \sum_{\sigma \in \frS_3} (\sigma \ol{\Psi}_2)(z;z_1,z_2,z_3)=0, \end{align} where $\ol{\Psi}_2$ is defined from $\ol{\Phi}_2$ by replacing $e_i,e_j$ by $f_i,f_j$, and the $\frS_3$-action is the same as $\ol{\Phi}_2$. \item In the case $X_l=G_2$, for $(i,j)=(2,1)$, we set \begin{align*} \ol{\Phi}_3(z;z_1,z_2,z_3,z_4) \ceq \ & e_2(z_4)e_2(z_3)e_2(z_2)e_2(z_1)e_1(z) -h^{4,1}_{21} e_2(z_4)e_2(z_3)e_2(z_2)e_1(z)e_2(z_1) \\ &+h^{4,2}_{21} e_2(z_4)e_2(z_3)e_1(z)e_2(z_1)e_1(z) -h^{4,1}_{21} e_2(z_4)e_1(z)e_2(z_3)e_2(z_2)e_2(z_1) \\ &+ e_1(z)e_2(z_4)e_2(z_3)e_2(z_2)e_2(z_1), \end{align*} with $h^{4,1}_{ij}$ and $h^{4,2}_{ij}$ given in \eqref{eq:G:h4}. Then the Serre-type relation for $e_i(z),e_j(z)$ is \begin{align \sum_{\sigma \in \frS_4} (\sigma \ol{\Phi}_3)(z;z_1,z_2,z_3,z_4)=0, \end{align} where $\frS_4$ acts on a function $\phi(z_1,z_2,z_3,z_4)$ by permuting the indices of $z_k$. Similarly, the Serre-type relation for $f_i(z),f_j(z)$ is \begin{align \sum_{\sigma \in \frS_4} (\sigma \ol{\Psi}_3)(z;z_1,z_2,z_3,z_4)=0, \end{align} where $\ol{\Psi}_3$ is defined from $\ol{\Phi}_3$ by replacing $e_i,e_j$ by $f_i,f_j$, and the $\frS_4$-action is the same as $\ol{\Phi}_2$. \end{itemize} \end{dfn} Note that $\ol{\Phi}_{2}$ is equal to $\lim_{p \to 0} \Phi_2$, where $\Phi_2$ is given by \eqref{eq:BCF:Phi2}. We have similar relations for $\ol{\Phi}_3, \ol{\Psi}_2$ and $\ol{\Psi}_3$. Then \cref{thm:BCF:Halgd,thm:G:Halgd} implies the following analogue of \cref{fct:DI:U} and \cref{rmk:DI:ADE} for the non-simply-laced case. \begin{prp}\label{prp:ns:DI} For $X_l=B_l,C_l,F_4$ or $G_2$, the topological algebra $U=U_q(g,X_l)$ in \cref{dfn:ns:DI} has a topological Hopf algebra structure given by the formulas \eqref{eq:DI:Delta0}--\eqref{eq:DI:S}. The resulting topological Hopf algebra is called \emph{the Ding-Iohara quantum algebra of the non-simply-laced type $X_l$}. \end{prp} Now we have an analogue of \cref{prp:ADE:p=0} for the non-simply-laced case. The proof is straightforward as in \cref{prp:ADE:p=0}, and we omit it. \begin{prp}\label{prp:ns:p=0} Let $X_l=B_l,C_l$ or $F_4$, and denote by $U''_{q,p}(g,X_l) \subset U_{q,p}(g,X_l)$ the topological $H$-Hopf sub-algebroid of the dynamical Ding-Iohara algebroid generated by \[ q^{\pm c/2}, \ e_{i,m}, \ f_{i,m}, \ \psi^{\pm}_{i,m} \quad (i \in I, \, m \in \bbZ) \] i.e., generators in \eqref{eq:ADE:gen} except $\clM(\wtH^*)$, $d$, and $K_i^{\pm}$. Then, taking the limit $p \to 0$ of $U''_{q,p}(g,X_l)$, we have a topological Hopf algebra isomorphism \[ \lim_{p \to 0} U''_{q,p}(g,X_l) \cong U_q(\ol{g},X_l), \] where $\ol{g} \ceq \{\ol{g}_{ij}(z) \mid i,j \in I\}$ denotes the set of the limit structure functions $\ol{g}_{ij}(z)$ in \eqref{eq:U:olg}, and $U_q(\ol{g},X_l)$ denotes the Ding-Iohara quantum algebra of the non-simply-laced type $X_l$ with structure functions $\ol{g}$. \end{prp} Thus we reached the goal of this note for all finite root systems. \section{Concluding remarks}\label{s:cnc} Let us give some possible directions of future works as concluding remarks. \begin{itemize} \item As mentioned in the introduction \cref{s:0} and \cref{rmk:ADE:h,rmk:BCF:h,rmk:G:h}, unlike the other root systems, the Serre relations of type $G_2$ are not determined uniquely in this note. Recall that to generalize the quantum affine algebras $U_q(\wh{\frg})$ (resp.\ the elliptic quantum algebras $U_{q,p}(\wh{\frg})$) to the Ding-Iohara quantum algebras $U_q(g,X_l)$ (resp.\ the dynamical Ding-Iohara algebroids $U_{q,p}(g,X_l)$), certain $q$-binomials in the original Serre relations are replaced by the functions $h_{ij}$. We impose some principles to the functions (see \cref{ss:ns:h}), and then, except for the type $G_2$, we can determine the functions $h_{ij}$ and $h^3_{ij}$ uniquely (\cref{rmk:ADE:h,rmk:BCF:h}). However, as for the type $G_2$, the functions $h^{4,1}_{ij}$ and $h^{4,2}_{ij}$ can be determined only up to the ideal $J$ in \eqref{rmk:G:h}. We may resolve this ambiguity by building some additional principles on the functions $h$. \item This note only considers elliptic quantum groups attached to finite root systems, or to finite-dimensional simple Lie algebras. However, there are important elliptic quantum groups attached to the Lie algebra $\fgl_n$. For example, the paper \cite{Ko18} studies the elliptic algebra $U_{q,p}(\wh{\fgl}_n)$ whose algebra structure is akin to $U_{q,p}(\wh{\frg})$ in \cref{ss:pre:E}, and reveals its relation to Felder's elliptic quantum group. Another example is the elliptic quantum toroidal algebra $U_{q,t,p}(\fgl_{1,\tor})$ introduced in a recent paper \cite{KO}, which can be regarded as a dynamical analogue of the quantum toroidal algebra $U_{q,t}(\fgl_{1,\tor})$ mentioned in \cref{ss:pre:DI}, \eqref{eq:DI:qtor}. It would be nice to extend our dynamical Ding-Iohara algebroid $U_{q,p}(g,X_l)$ to the $\fgl_n$ case, and construct a class of Hopf algebroids $U_{q,p}(g,\fgl_n)$ including the algebras $U_{q,p}(\wh{\fgl}_n)$ and $U_{q,t,p}(\fgl_{1,\tor})$. \item To the best of our knowledge, it is still unclear whether there is a sort of Drinfeld double construction for the Ding-Iohara quantum algebra for general structure functions $g$, which was already mentioned in the final paragraph of \cite{DI}. We have a similar problem for our dynamical Ding-Iohara algebroids. The point is the construction of well-behaved Hopf pairing and its dynamical analogue. We guess that this problem relates to the elliptic weight functions \cite[Chap.\ 6]{Ko}. \item Finally, let us recall that there is a Hall-algebraic construction of quantum groups. It is known that the quantum affine algebras and the quantum toroidal algebras (both with Drinfeld comultiplication) can be constructed as Drinfeld double of Ringel-Hall algebras. Is there a dynamical analogue of this construction? If such a construction exists, does it relate to our dynamical Ding-Iohara algebroids? \end{itemize} \begin{Ack} The authors would like to express gratitude to Professor Hitoshi Konno for valuable comments. S.Y.\ is supported by JSPS KAKENHI Grant Number 19K03399. \end{Ack}
\section{Introduction} In the last few decades, the rapid development of revolutionary laser techniques, such as chirped pulse amplification \cite{RN1} and optical parametric chirped pulse amplification \cite{RN2}, has significantly improved the peak intensity of lasers and opened up new avenues for fundamental research in fields such as strong field quantum electrodynamics \cite{RN3,RN4}, high-energy-density physics \cite{RN5} and relativistic optics \cite{RN6}. The highest laser intensity available at the moment is delivered by high-power petawatt (PW) lasers \cite{RN7} and can realize intensities up to $\sim{10}^{23}W/cm^2$ after being focused \cite{RN8}. With the increasing peak intensity of lasers, manipulation of such high-power lasers has become increasingly challenging because the size of the traditional solid-state optical components must be enlarged to avoid laser-induced thermal damage \cite{RN9}, which can be extremely costly and technically challenging for large-scale PW laser systems \cite{RN10}. As a result, plasma-based optical components composed of free electrons and ions, which are not limited by optical damage as the traditional solid-state optical components, have become potential alternatives for high-power laser manipulation and have been extensively studied in recent years \cite{RN11,RN12,RN13,RN14,RN15,RN16,RN17,RN18,RN19,RN20,RN21,RN22,RN23}. A series of plasma-based optical components and applications have been proposed, such as plasma gratings or photonic crystals with band structure \cite{RN11,RN12,RN13}, plasma holograms for focusing and mode conversion \cite{RN14}, plasma mirrors for probing strong field quantum electrodynamics \cite{RN15,RN16}, plasma lenses for laser shaping \cite{RN17}, plasma waveplates for polarization manipulation \cite{RN18,RN19,RN20} and plasma-based ellipsoidal mirror \cite{RN21} and compound parabolic concentrator \cite{RN22} with an intensity toleration over ${10}^{12} W/cm^2$ for focusing lasers. Recently, Edwards \etal demonstrated a highly-efficient plasma-based zone plate by two copropagating lasers which tolerates a maximum intensity of ${10}^{17} W/{cm}^2$ \cite{RN23}. The structure of the zone plate reminds us of the intensity patterns of Laguerre-Gaussian lasers. Laguerre-Gaussian (LG) beams, the eigensolution of the Helmholtz equation in a cylindrical coordinate system under the paraxial condition, are characterized by the azimuthal mode index $l$ and the radial mode index $p$, where $l$ denotes the number of $2\pi$ phase cycles around the circumference and $(p+1)$ denotes the number of radial nodes in the mode profile \cite{RN24}. Almost all previous works on the interaction between LG lasers and plasma focus on optical angular momentum related properties, which are characterized by the azimuthal mode index $l$ \cite{RN25,RN26,RN27}. The intensity pattern of an LG beam with a nonzero $l$ consists of $p$ halos separated from each other by dark rings and a dark center. In this work, we propose a plasma zone plate (PZP) driven by the ponderomotive force generated by an LG beam with a nonzero $p$. The formation and functioning of PZP are considered theoretically and verified by numerical and particle-in-cell (PIC) simulations. The merit of using an LG beam is that as an eigenstate in vacuum, the distance of stable propagation is longer and the engineering complexity is lower compared with a non-eigenstate beam, which makes it more plausible for potential experiments. This study extends the understanding of the plasma density evolution driven by the ponderomotive force, which could be of great benefit to both theoretical and experimental works of related research. The paper is organized as follows: Proof-of-principle demonstrations of our scheme by 3D-PIC simulations are shown in section 2. The theoretical model of PZP formation is presented in section 3. The formation process is divided into three main stages and a detailed comparison between the theoretical and simulation results is demonstrated. The functioning of the PZP is specified in section 4. On the one hand, the theoretical model and typical examples for focusing infrared and terahertz (THz) lights are presented. On the other hand, the more realistic scenario of an obliquely incident probe beam is discussed. Conclusions are summarized in section 5. \section{Proof-of-principle PIC demonstrations} First of all, we present proof-of-principle demonstrations of our scheme using 3D-PIC simulations by the code EPOCH \cite{RN28} to illustrate the formation and focusing function of a typical PZP. The schematic is shown in figure 1(a). A circularly polarized (CP) LG beam ($\lambda_p=1\mu m, l=2, p=4$), the intensity of which is shown in figure 1(b), is launched from the –z boundary as the pump beam to irradiate a thin plasma slab for demonstration. The beam radius is $w_p=10\mu m$ and the maximum intensity is $2.7 \times {10}^{16} W/{cm}^2$. The plasma slab consists of a constant density slab of length $2\lambda_p$ with Gaussian density ramps of length $1\lambda_p$ at each side along the z-direction while uniformly distributed on the x-y plane. The maximum density is set to be $n_{e0}=0.3n_c(\lambda_p)$, where $n_c(\lambda_p)[{cm}^{-3}]=1.12\times{10}^{21}/\lambda_p^2[\mu m]$ is the critical density for the laser with wavelength $\lambda_p$. We assume a fully-ionized electron-ion plasma with the ions set to be $q_i=e$ and $m_i=100m_e$ ($e$: the elementary charge, $m_e$: the electron mass) to reduce the simulation time. The plasma temperature is $T_e=25eV$, $T_i=2.5eV$. The dimensions of the simulation box are $L_x \times L_y \times L_z = 160 \mu m \times 160 \mu m \times 40 \mu m$ and the spatial resolutions are $\Delta x = \Delta y = 0.25 \mu m$ and $\Delta z = 0.1 \mu m$. The plasma slab is placed at the center of the simulation box and padded on both sides with sufficiently long vacuum regions. \begin{figure} \sidesubfloat[]{\label{(a)}\includegraphics[width=0.925\linewidth]{figure1a.pdf}} \vfil \sidesubfloat[]{\label{(b)}\includegraphics[width=0.25\linewidth]{figure1b.pdf}} \hfil \sidesubfloat[]{\label{(c)}\includegraphics[width=0.25\linewidth]{figure1c.pdf}} \hfil \sidesubfloat[]{\label{(d)}\includegraphics[width=0.3\linewidth]{figure1d.pdf}} \caption{(a) Schematic of a PZP. An LG beam ($l=2,p=4$) is launched into the plasma and generates a PZP. At a delayed time, a probe beam is focused by the PZP. (b) Intensity pattern for the pump beam. (c) Transverse density distribution of the PZP. (d) The laser intensity of the probe beam before, during, and after the interaction with PZP. The white dotted lines ($z=18.2/21.8\mu m$) represent the position of the PZP.} \end{figure} As the pump beam interacts with the plasma, an annular density modulation starts to develop and reaches the maximum at around $4ps$, which is shown in figure 1(c). Then a CP probe beam ($\lambda_b=1\mu m$) is launched into this modulated plasma slice. Figure 1(d) shows the intensity distribution of the probe beam through its propagation. The modulated plasma functions as a plasma zone plate (PZP), which magnifies the intensity of the incoming probe beam up to approximately two orders of magnitude at several foci, as can be seen in figure 1(d). Such a multi-focal laser field structure is the typical intensity structure after traversing the Fresnel zone plate (FZP). In the following, we formulated the theoretical model for the formation of PZP and verified it by simulations in detail. \section{Formation of PZP} Considering a non-relativistic CP LG laser traveling in the z-direction as the pump beam through an initially homogeneous underdense plasma consisting of electrons (density $n_{e0}=0.3n_c$) and ions (charge $Ze$ and density $n_{i0}=n_{e0}/Z$), in the cylindrical coordinate system, the complex amplitude of the electric field of the laser can be expressed as \begin{figure} \sidesubfloat[]{\includegraphics[width=0.45\linewidth]{figure2a.pdf}} \hfil \sidesubfloat[]{\includegraphics[width=0.45\linewidth]{figure2b.pdf}} \vfil \sidesubfloat[]{\includegraphics[width=0.45\linewidth]{figure2c.pdf}} \hfil \sidesubfloat[]{\includegraphics[width=0.45\linewidth]{figure2d.pdf}} \caption{Example PIC simulation: pump beam: $\lambda_p = 1 \mu m,l=2,p=2,w_p= 5 \mu m$, plasma: $n_{e0} = {10}^{-4}n_c(\lambda_p)$. The initial density in the example simulation is set to be as low as $n_{e0} = {10}^{-4}n_c(\lambda_p)$ to obtain an observable electron density variation in stage \uppercase\expandafter{\romannumeral1} according to equation (\ref{eq6}). (a) Transverse evolution of the ion density. The white dotted lines indicate the characteristic times of stage \uppercase\expandafter{\romannumeral1} ($t=0.125ps$), stage \uppercase\expandafter{\romannumeral2} ($t=1ps$) and stage \uppercase\expandafter{\romannumeral3} ($t=4ps$). (b) Blue line: theoretical electron density variation of stage \uppercase\expandafter{\romannumeral1}. Orange line: electron density variation from PIC simulation. Green line: ion density variation from PIC simulation. (c) Blue line: theoretical ion density variation of stage \uppercase\expandafter{\romannumeral2}. Green line: ion density variation from PIC simulation. (d) Blue line: ion density variation from numerical simulation. Green line: ion density variation from PIC simulation.} \end{figure} \begin{eqnarray} E_{x,y}=\frac{E_p}{C_p^l}exp(-\frac{r^2}{w_p^2})(\frac{\sqrt{2}r}{w_p})^lL_p^l(\frac{2r^2}{w_p^2})exp[i(kz+l\phi + \varphi_{x,y})] \label{eq1} \end{eqnarray} where $E_p$ is the peak amplitude of the electric field, $C_p^l$ is the normalization constant, $L_p^l$ is the Laguerre polynomial, $\varphi_{x,y}$ is the initial phase of $x/y$ polarization, and $k$ is the wavenumber. Here, our analysis is within the Rayleigh range so that the diffraction can be neglected \cite{RN29}.The LG laser intensity is only related to $r$, i.e., $I=I_0f(r)$ where $I_0=\sqrt{\epsilon/\mu}E_p^2$ is the maximum intensity ($\epsilon$ is the permittivity and $\mu$ is the magnetic permeability) and $f(r)$ is the normalized distribution function. Introducing the dimensionless laser amplitude $a_p=eE_p/\omega m_ec$, where $\omega$ is the laser frequency and $c$ is the speed of light in vacuum, the ponderomotive force on the electrons can be expressed by the negative gradient of the ponderomotive potential $\phi_p=\frac{a_p^2}{2}m_ec^2f(r)$ \cite{RN30}: \begin{eqnarray} \mathbf{F_p^e}=-\nabla\phi_p \label{eq2} \end{eqnarray} The ponderomotive force on the ions is negligible since it is smaller than that on the electrons by a factor $Z^2m_e/m_i$ \cite{RN31}. Let $\tilde{n}_\alpha = n_\alpha - n_{\alpha0}$ and $\delta{n_\alpha} = \tilde{n}_\alpha / n_{\alpha0}$ ($\alpha=i,e$) be the absolute and normalized density variation. The temporal evolution of the density can be divided into three stages. Stage \uppercase\expandafter{\romannumeral1} is the beginning of the laser-plasma interaction: ions are assumed to be stationary and the normalized electron density is much less than unity, i.e. $\delta n_i\approx0, \delta n_e\ll1$. During this stage, an electrostatic charge-separation field is generated to balance the ponderomotive force. In stages \uppercase\expandafter{\romannumeral2} and \uppercase\expandafter{\romannumeral3}, the ions move together with the electrons driven by the electrostatic charge-separation field. We define the period when $\delta n_i,\delta n_e\ll1$ as stage \uppercase\expandafter{\romannumeral2} and the period when $\delta n_i,\delta n_e\gtrsim1$ as stage \uppercase\expandafter{\romannumeral3}. In the following, we formulate the theoretical model for the density evolutions in each stage, and verify it with an example simulation, the results of which are shown in figure 2. In stage \uppercase\expandafter{\romannumeral1}, the ions are assumed to be stationary due to their large inertial mass. The thermal pressure on electrons $\nabla p_e = \nabla(n_eT_e)$ is negligible because $\delta n_e\ll1$ and the convective term of electrons is negligible as well. Therefore, the fluid equations for electrons can be linearized as: \begin{eqnarray} \frac{\partial\tilde{n}_e}{\partial t}+n_{e0}\nabla\cdot\mathbf{v_e}=0 \label{eq3} \end{eqnarray} \begin{eqnarray} \frac{\partial\mathbf{v_e}}{\partial t}=\frac{e}{m_e}\nabla\phi+\frac{\mathbf{F_p^e}}{m_e} \label{eq4} \end{eqnarray} where $\phi$ is the electrostatic charge-separation field generated by the Poisson equation: \begin{eqnarray} \nabla^2\phi = \frac{e}{\epsilon_0}(n_e-Zn_i) \label{eq5} \end{eqnarray} Combining equations (\ref{eq3}), (\ref{eq4}) and (\ref{eq5}), one finds the normalized electron density variation as: \begin{eqnarray} \delta n_e = \frac{a_p^2c^2}{2\omega_{pe}^2}\nabla^2f(r) \label{eq6} \end{eqnarray} where $\omega_{pe}$ is the electron plasma frequency. The comparison between the theory and PIC simulation at the initial time of $t=0.125ps$ is shown in figure 2(b), where the ions are still almost homogeneous, while the electron density variation in accordance with the theory has been established. As the electrostatic charge-separation field is created in stage \uppercase\expandafter{\romannumeral1}, the ions are driven to move together with the electrons, and a cumulative density modulation will be formed in stage \uppercase\expandafter{\romannumeral2}. During this stage, the electrons are assumed to remain in force equilibrium while the ion density variation becomes non-negligible, thus $\delta n_e(r)-Z\delta n_i(r)=\frac{a_p^2c^2}{2\omega_{pe}^2}\nabla^2f(r)$. From the linearized fluid equations of ions \begin{eqnarray} \frac{\partial\tilde{n}_i}{\partial t}+n_{i0}\nabla\cdot\mathbf{v_i}=0 \label{eq7} \end{eqnarray} \begin{eqnarray} \frac{\partial\mathbf{v_i}}{\partial t}=-\frac{Ze}{m_i}\nabla\phi \label{eq8} \end{eqnarray} one finds the spatiotemporal evolution of the ion density: \begin{eqnarray} \delta n_i = \frac{Za_p^2c^2}{4}\frac{m_e}{m_i}\nabla^2f(r)t^2 \label{eq9} \end{eqnarray} Comparing equations (\ref{eq6}) and (\ref{eq9}), it is recognized that the electron and ion density variations follow the same spatial pattern, which is directly proportional to $\nabla^2f(r)$. Therefore, an annular density variation that grows quadratically with time is obtained, as can be seen from figures 2(b) and 2(c). A comparison between the simulation and the theory of the ion density variation in stage \uppercase\expandafter{\romannumeral2} ($t=1ps$) is presented in figure 2(c) and exhibits a fair conformity. As the normalized density variations continue to grow close to unity, the divergence of the particle flux $\nabla\cdot(n_\alpha\mathbf{v_\alpha})$ ($\alpha=i,e$) cannot be further simplified as $n_{\alpha0} \nabla\cdot \mathbf{v_\alpha}$ any more and the thermal pressure becomes non-negligible. Therefore, the linearized approximation is no longer valid and thus the density variations are no longer theoretically analytic, we define this stage as stage \uppercase\expandafter{\romannumeral3}. To analyze the density evolutions in stage \uppercase\expandafter{\romannumeral3}, we start from the momentum equations of electrons and ions: \begin{eqnarray} n_em_e\frac{d\mathbf{v_e}}{dt} = n_ee\nabla\phi+n_e\mathbf{F_p^e}-\nabla p_e \label{eq10} \end{eqnarray} \begin{eqnarray} n_im_i\frac{d\mathbf{v_i}}{dt} = -n_iZe\nabla\phi-\nabla p_i \label{eq11} \end{eqnarray} Thermal pressure terms are introduced according to the adiabatic law, which implies $p_\alpha n_\alpha^{-\gamma}=const$ with $p_\alpha=n_\alpha T_\alpha$, where $T_\alpha$ is the particle temperature and $\gamma$ is the adiabatic index \cite{RN32}. Combining equations (\ref{eq10}) and (\ref{eq11}) and neglecting electron momentum \cite{RN33} yields \begin{eqnarray} m_i\frac{d\mathbf{v_i}}{dt} = -Z\nabla \phi_p - \frac{\nabla(p_e+p_i)}{n_i} \label{eq12} \end{eqnarray} Thermal pressure does not play an essential role at first while the density variation is small. As the density variation grows continuously, the thermal pressure grows along and reaches the same order of magnitude as the electrostatic force at $|\delta n_i|\sim|\frac{Zm_ec^2a_p^2}{ZT_{e0}+T_{i0}}|$. According to equation (\ref{eq12}), ions will eventually be trapped in the troughs of the ponderomotive potential and so will the electrons. Since the ponderomotive potential is proportional to the laser intensity, we conclude that eventually a density modulation where the particles are trapped at the low intensity nodes of the pump beam will be formed. This implies that the density variations in stage \uppercase\expandafter{\romannumeral3} are negatively correlated with $f(r)$, while proportional to $\nabla^2f(r)$ in stage \uppercase\expandafter{\romannumeral1} and \uppercase\expandafter{\romannumeral2}. The transition from stage \uppercase\expandafter{\romannumeral2} to stage \uppercase\expandafter{\romannumeral3} can be found as the density variation develops from proportional to $\nabla^2f(r)$ in figure 2(c) to negatively correlated with $f(r)$ in figure 2(d), which is marked by the emergence of the density peak at $x=0,y=0$ at around $2.5ps$ as shown in figure 2(a). As the density variation in stage \uppercase\expandafter{\romannumeral3} is analytically difficult to resolve, we designed a particle-fluid program \cite{2020Growth} to numerically calculate the ion density evolution based on equation (\ref{eq12}). A comparison of the ion density in stage \uppercase\expandafter{\romannumeral3} ($t=4ps$) between our particle-fluid program and the PIC simulation is presented in figure 2(d). The final modulated plasma slice is composed of alternating high and low density rings corresponding to the alternating dark and bright rings of the incident LG beam. According to the dispersion relation of electromagnetic waves in plasma \cite{RN34}, such a density distribution can be interpreted as an annular refractive index structure with alternating low and high refractive index rings, thus we regard the obtained modulated plasma as a PZP. \section{Functioning of PZP} In this section, the focusing effect of PZP on the probe beam is considered based on the laser propagation equation and verified by PIC simulations. Considering a probe beam normally incident on the PZP and approximate the plasma as a typical medium, the refraction of the probe beam is governed by \cite{RN35}: \begin{eqnarray} (\frac{\partial^2}{\partial t^2}-c^2\nabla^2)a_b=-\frac{n_ee^2a_b}{\gamma\epsilon_0m_e} \label{eq13} \end{eqnarray} where $\epsilon_0$ is the vacuum permittivity and $\gamma$ is the relativistic factor given by $\gamma=\sqrt{1+\frac{a_b^2}{2}}$. The corresponding refractive index is given by $n=\sqrt{1-\frac{n_e}{\gamma n_c}}$. Thus, the alternating high and low density rings are alternating low and high refractive index rings for the probe beam. During propagation through the PZP, most of the energy of the probe beam will be refracted to the high refractive index rings and a phase shift is generated between adjacent rings. Let $n_l$ and $n_h$ be the refractive indexes of two adjacent rings, $\Delta r$ be the distance between the two rings, $D$ be the thickness of the PZP and $k_b$ be the wavenumber of the probe beam. The characteristic length to produce a significant amplitude modulation can be given by $L=(\frac{n_h^2}{n_l^2}-1)^{-\frac{1}{2}}\Delta r$ \cite{1969self} and the phase shift can be given by $\Delta\phi=(n_h-n_l)k_bD$ \cite{RN23}. Therefore, the probe beam will be modulated into an emergent beam composed of alternating bright and dark rings (when $D \gtrsim L$) together with phase shift, which is similar to that of an FZP, and focused at multiple foci during the further propagation. In the PIC verification simulation, a CP probe beam ($\lambda_b=1\mu m$, $a_b=0.5$) with a maximum intensity of $I_0=6.8\times{10}^{17}W/{cm}^2$ is launched into the PZP obtained in section 2 as shown in figure 1(d). The intensity distribution on the optical axis is presented by the blue solid line in figure 3(a), which indicates that the PZP magnifies the intensity of the incoming probe beam up to a maximum of approximately two orders of magnitude at several foci. The maximum intensity obtained is about $9\times{10}^{19}W/{cm}^2$. The spot size in both the transverse and longitudinal directions is on the same order of the probe wavelength, and increases with the focal length in the same pattern as the traditional FZP \cite{RN36}. We conducted a contrast simulation in which the same probe beam is launched on the PZP generated by the pump beam with $p=2$ and obtained similar laser field structures, as shown by the black dashed line in figure 3(a). The result indicates that the intensity amplification increases with the increasing $p$, because LG beams of higher $p$ generate more alternating rings corresponding to zone plates of higher orders. The LG-light-modulated plasma slab functions as an FZP to focus the probe beam. \begin{figure} \sidesubfloat[]{\includegraphics[width=0.45\linewidth,height=5cm]{figure3a.pdf}} \hfil \sidesubfloat[]{\includegraphics[width=0.45\linewidth,height=5cm]{figure3b.pdf}} \caption{(a) Magnification of the probe beam on the optical axis. Blue solid line: the PZP generated by an $l=2,p=4$. LG laser in section 2. Black dashed line: the PZP generated by an $l=2,p=2$ LG laser. Purple dash-dotted line: THz PZP. (b) The laser intensity of a $15^\circ$ obliquely incident probe beam before, during, and after the interaction with PZP. The white dotted lines represent the location of the PZP.} \end{figure} To focus a probe beam with a given wavelength, the plasma density should be on the order of $n_{e}\sim0.1n_c(\lambda_b)$ to realize significant modulation of the probe beam during its propagation, and the pump beam should be with a frequency higher than the plasma frequency. Therefore, one can create a PZP designed to manipulate lasers of longer wavelength with a pump beam of a shorter wavelength and larger spotsize with an extremely underdense plasma. For instance, as it is challenging to obtain high-power terahertz (THz) lasers in the laboratory, one can use a pump beam of a wavelength on the order of micrometers and a beam waist on the order of millimeters, to modulate an extremely underdense plasma whose density is set to be on the order of the critical density of THz lasers to produce a zone plate for THz laser manipulation. As an example, a PIC simulation is conducted where a $10\mu m$ LG laser is launched into a homogeneous plasma of density $n_{e0}=3.35\times{10}^{22}m^{-3}$ to create a THz PZP. A THz laser ($\lambda_b = 100\mu m,\nu=3THz$) is launched as the probe beam and the focusing result on the optical axis is shown by the purple dash-dotted line in figure 3(a). Here the difference in wavelength between the pump beam and the probe beam in the simulation is only 10 times due to the limited computing resources. It can be much more significant to meet the demands of practical applications. The given scheme may pave a new way for THz and visible laser manipulation at higher intensities. In previous simulations, both the pump beam and the probe beam are normally incident onto the plasma slab for demonstration. However, traditional FZP bears a certain robustness to the incident angle, which means that an obliquely incident probe beam within a specific range of incident angle produces a tilted laser field \cite{RN37}.We carried out a contrast simulation launching an obliquely incident probe beam with an incident angle of $15^\circ$ into the PZP obtained in section 2. The intensity distribution in the longitudinal plane is shown in figure 3(b), compared to that of the normally incident case as shown in figure 2(d). The result shows that the foci are tilted with the incident angle while the focal lengths and magnifications remain almost the same as the normally incident case, which is consistent with the traditional FZP. \section{Conclusions} In this manuscript, we have shown that an LG beam with a nonzero $p$ can be used to generate a plasma zone plate (PZP) for high-power laser focusing. The formation of PZP was divided into three stages according to the physical characteristics, and formulae were derived for calculating the density modulation based on the fluid model. We verified our model by PIC and numerical simulations and obtained an annular density distribution composed of alternating rings of high and low densities. The maximum density can be higher than the critical density while the minimum density is close to zero. The alternating rings of high and low densities imply alternating rings of low and high refractive index for the probe beam. Therefore, the plasma structure we obtained may be used as a zone plate to focus high-power lasers. We verified the function of PZP by PIC simulations with both normally and obliquely incident probe beams, and obtained multi-focal intensity distributions consistent with the characteristics of the traditional FZP. The intensity is magnified up to more than two orders of magnitude in the simulations. Furthermore, it is demonstrated that PZP is also applicable for focusing terahertz (THz) sources. The proposed PZP is a new addition to the plasma-based class of optical components for manipulating high-power lasers. The multi-focal laser field achieved owns potential applications to various scenarios, such as laser drilling, microscopy and particle acceleration. \ack This research was supported by the National Natural Science Foundation of China (NSFC) under Grant No. 11975014, by the Strategic Priority Research Program of Chinese Academy of Sciences, Grant Nos. XDA25050400 and XDA25010200. The numerical calculations in this paper have been done on the supercomputing system in the Supercomputing Center of University of Science and Technology of China. \section*{References} \input{main.bbl} \bibliographystyle{unsrt} \end{document}.
\section{Introduction}\label{sec:introduction} In recent years, the practical use of quantum computers has been advancing. While the ability to build quantum computers is improving dramatically\cite{arute2019quantum}, the ability to develop quantum algorithms is very limited and relies on human insight and ingenuity. Although a number of quantum programming languages such as Q\#~\cite{svore2018q}, Scaffold~\cite{abhari2012scaffold}, OpenQASM~\cite{cross2017open}, ProjectQ~\cite{haner2016high}, and Qiskit~\cite{gadi_aleksandrowicz_2019_2562111} have been developed, it is still challenging for software developers who are not familiar with quantum computing to learn and use these languages. Therefore, it is necessary to develop tools to support the automated development of new quantum algorithms and circuits. Program synthesis~\cite{gulwani2017program} is the task of automatically constructing executable code fragments, given a user's intent, using various forms of constraints, such as input-output examples, demonstrations, and natural languages. Program synthesis has direct applications~\cite{singh2013automated,gulwani2010dimensions} for various users such as students and teachers, software developers, and algorithm designers in classical computing. Recently, the idea of program synthesis has also been applied to quantum computing to support the synthesis of quantum circuits during the quantum compiling process~\cite{di2016parallelizing,davis2020towards}. In this thread of research, quantum circuit synthesis is regarded as a process in which an arbitrary unitary operation is decomposed into a sequence of gates from a universal set, typically one which a quantum computer can implement both efficiently and fault-tolerantly. That is, given an arbitrary quantum circuit $C$ and a universal gate set $G$, one seeks to find a decomposition $U_{k}U_{k-1} \ldots U_{2}U_{1} = C$, where $U_{i} \in G$. However, there is little research on program synthesis in the quantum computing domain that aims to help software developers synthesize quantum circuits and code pieces. This paper proposes $AutoQC$, an approach to automatically synthesizing quantum circuits using the neural network from input and output pairs. In contrast, to support the quantum compilation process, our goal is to help software developers automatically synthesize a quantum circuit or algorithm using machine learning from a problem specification provided as an example of assumed input/output pairs. As the first step, this paper focuses on quantum circuits with classical inputs and outputs, i.e., the problem to be solved by the quantum algorithm is classical bits. Our paper makes the following contributions: \begin{itemize} \item \textbf{Synthesis Approach.} It presents a novel automated synthesis approach that uses a neural network to explore the space of possible quantum circuit designs by using the input-output pairs. \item \textbf{Tool Support}: It implements a synthesis tool called $AutoQC$ to support the automated synthesis of quantum circuits. \item \textbf{Experimental Results:} It presents experimental results using $AutoQC$ to synthesize seven quantum circuits from their input-output pairs automatically. The results highlight the ability of $AutoQC$ to synthesize some important quantum circuits. \end{itemize} The rest of the paper is organized as follows. Section~\ref{sec:preliminaries} briefly introduces quantum computers and their computations as a prerequisite for explaining our approach. Section~\ref{sec:synthesis} describes our approach for automatically synthesizing quantum circuits, and Section~\ref{sec:experimental} describes some experiments on synthesizing quantum circuits using our approach. Section~\ref{sec:related work} discusses related work, and concluding remarks are given in Section~\ref{sec:conclusion}. \section{Background}\label{sec:preliminaries} First, we introduce some basic information on quantum computation. More detailed reading material can be found in the book by Nielsen and Chuang~\cite{nielsen2002quantum}. \iffalse \subsection{Quantum Computer} A quantum computer is a computer that performs calculations using quantum-mechanical phenomena such as superposition and quantum entanglement. The most significant difference between a quantum computer and a conventional classical computer is how the information is represented. In a classical computer, information is represented by "classical bits" in one of two states, 0 or 1. On the other hand, in a quantum computer, information is represented by quantum bits (qubits for short), which can be in both 0 and 1 states simultaneously. A quantum computer can perform many calculations in parallel using qubits, and by appropriately processing the results, it may perform calculations faster than a classical computer. The word "may" is used earlier because not all real-world tasks can be computed faster by a quantum computer. In fact, there are many more problems for which it is not yet known whether quantum computers are faster than classical computers. Nevertheless, it has been mathematically proven that quantum computers are faster for some problems than the algorithms of classical computers. A typical example is a prime factorization. A simple case such as $12 = 3 \times 2 \times 2$ can be computed in her/his head. However, as the number of digits of the integer to be decomposed increases, the computational complexity rises exponentially. Even with a supercomputer, an enormous amount of time is required, on the order of years or even the universe's age. The RSA cipher, which is widely used in cryptography today, takes advantage of the fact that it takes a very long time to solve. However, in 1995, the mathematician Peter Shor discovered a quantum algorithm~\cite{shor1999polynomial} that performs prime factorization much more quickly than the classical algorithm, which led to much interest in quantum computers. \fi \subsection{Quantum State and Quantum Bit} In a classical computer, information is represented by two states, 0 and 1. For example, the two states are represented by the on/off state of a switch, the state in which a charge is accumulated and the state in which it is not, and the high/low voltage. On the other hand, quantum mechanics allows the superposition of two different states, so the "quantum" bit, the smallest unit of information in the quantum world, can be described using two complex numbers $\alpha$ and $\beta$. $\alpha$ and $\beta$ are called complex probability amplitudes and represent the weight with which the 0 and 1 states are superimposed. The reason why $\alpha$ and $\beta$ are complex numbers is that in quantum theory, discrete quantities such as 0 and 1 have the properties of waves and can interfere. The states corresponding to the 0 and 1 of the classical bits can be represented using Dirac's bracket notation, which is a simplified representation of the column vector, as follows: $$ \ket{0} = \left( \begin{array}{cc} 1 \\ 0 \\ \end{array} \right), \ket{1} = \left( \begin{array}{cc} 0 \\ 1 \\ \end{array} \right) $$ Since $\ket{0}$ and $\ket{1}$ form an orthonormal basis, the qubit state $\ket{\psi}$ can be represented by a linear combination of $\ket{0}$ and $\ket{1}$. $$ \ket{\psi} = \alpha \ket{0} + \beta \ket{1} = \left( \begin{array}{cc} \alpha \\ \beta \end{array} \right)\\ $$ \subsubsection{Probability Amplitude} In quantum mechanics, the observer cannot directly interfere with the complex probability amplitude, and the probability of 0 or 1 is determined only when a measurement operation is performed. The complex probability amplitude influences the probability distribution of the measurement result. The probability that the measurement result will be 0 or 1 is denoted as $p_0$ and $p_1$, respectively. Then these probabilities are expressed as the square of the absolute value of the complex probability amplitude: $$ p_0 = |\alpha|^2, p_1 = |\beta|^2 $$ A normalization condition $|\alpha|^2 + |\beta|^2 = 1$ is imposed to make the sum of the probabilities be equal to 1. When a measurement is performed, the quantum state transitions to the state corresponding to the measurement result. Specifically, when the measurement result is 0, the state transitions to $\ket{0}$; when it is 1, the state transitions to $\ket{1}$. This measurement is called a projective measurement in the orthonormal basis $\ket{0}$ and $\ket{1}$. \subsubsection{Multiple Qubits} When there are n qubits, their states are represented using tensor products. The states of the n classical bits are represented by n 0 or 1 number, with a total of $\text{2}^n$ patterns. Since quantum mechanics allows the superposition of all these patterns, the state of n qubits can be described by $\text{2}^n$ complex probability amplitudes. Each complex probability amplitude represents which bit sequence is superimposed with which weight. $$ \ket{\psi} = c_{00\ldots0}\ket{00\ldots0} + c_{00\ldots1}\ket{00\ldots0} + \cdots + c_{11\ldots1}\ket{11\ldots1} = $$ $$ \left( \begin{array}{cc} c_{00\ldots0} \\ c_{00\ldots1} \\ \vdots \\ c_{11\ldots1} \end{array} \right) $$ The complex probability amplitudes are assumed to be normalized: $$ \sum_{i_i, \ldots, i_n}|c_{i_i, \ldots, i_n}|^2 = 1 $$ Then, when we measure the quantum state of these n qubits, the bit sequence $i_i, \ldots, i_n$ is obtained randomly with probability $p_{i_i, \ldots, i_n} = |c_{i_i, \ldots, i_n}|^2$, and the state after the measurement is $\ket{i_i, \ldots, i_n}$. Thus, the state of n-qubits must be described by a complex vector of $2^n$ dimensions, which is exponentially large with respect to n. This is where the difference between a classical bit and a qubit becomes apparent. The operations on an n-qubits system are then represented as a $2^n \times 2^n$ dimensional unitary matrix. \subsection{Quantum Gates}\label{chap:quantum gate} We first describe how operations on qubits are represented, which is closely related to the following properties of quantum mechanics: \begin{itemize \item \textbf{Liniarity:} The time evolution of a quantum state is always linear with respect to the superposition of the states. Since the quantum state of a qubit is represented as a normalized two-dimensional complex vector, operations on a qubit, linear operations, are represented by a $2 \times 2$ complex matrix. \item \textbf{Unitarity:} Furthermore, using the normalization condition that the sum of the probabilities is always 1, we can derive the following constraint on quantum operations $U$: $$ U^{\dagger}U = UU^{\dagger} = I $$ In other words, quantum operations are represented by unitary matrices. \end{itemize} Here, let us review the terminology. In quantum mechanics, a linear transformation of a state vector is called an operator, and the term operator refers to any linear transformation that is not necessarily unitary. On the other hand, linear transformations that satisfy the unitarity are called quantum gates. A quantum operation can be thought of as an operator on a quantum state that is physically feasible, at least theoretically. \subsubsection{Single Qubit Gates} The first single-qubit gate is the X gate, corresponding to NOT in classical computers. The X gate is one of the Pauli operators of basic quantum arithmetic and is a matrix such that \begin{equation*} \text{X} = \left( \begin{array}{cc} 0 & 1 \\ 1 & 0 \\ \end{array} \right) \end{equation*} X gate acts as follows: $$ X\ket{0} = \ket{1}, X\ket{1} = \ket{0} $$ Next is the V and $\text{V}^\dagger$ gates, both of which are a square root of the X gate as described below: $$ \text{V} = X^{\frac{1}{2}} = \frac{i+1}{2}\left( \begin{array}{cc} 1 & -i \\ -i & 1 \\ \end{array} \right) $$ $$ \text{V}^\dagger = X^{-\frac{1}{2}} = \frac{i+1}{2}\left( \begin{array}{cc} 1 & i \\ i & 1 \\ \end{array} \right) $$ \subsubsection{Multi-Qubit Gate} Controlled gates are important for operations on two-qubit. Take the Controlled-X gate (CX) as an example, the matrix is written as follows: \begin{equation*} \text{CX} = \left( \begin{array}{cccc} 1 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \\ 0 & 0 & 0 & 1 \\ 0 & 0 & 1 & 0 \end{array} \right) \end{equation*} CX gate takes two qubits as arguments, a control qubit and a target qubit, and has the following properties: \begin{itemize} \item The CX gate does not modify the control qubit. \item If the control qubit is 0, no change is made to the target qubit. \item If the control qubit is 1, the X-gate is applied to the target qubit. \end{itemize} Such an action corresponds to XOR in classical computation. Therefore, the CX gate can be regarded as a reversible version of XOR. In the same way, we can consider the controlled gate for the V gate and $\text{V}^\dagger$ gate and are denoted as CV and $\text{CV}^\dagger$. \begin{figure}[bth] \begin{tabular}{ccc} \begin{minipage}[t]{.3\linewidth} \centering \[ \Qcircuit @C=1em @R=.8em{ \lstick{A} & \ctrl{1} & \rstick{O_0} \qw \\ \lstick{B} & \targ & \rstick{O_1} \qw }\] \subcaption{CX gate.} \label{fig:cx} \end{minipage}% \begin{minipage}[t]{.3\linewidth} \centering \[ \Qcircuit @C=1em @R=.8em{ \lstick{A} & \ctrl{1} & \rstick{O_0} \qw \\ \lstick{B} & \gate{V} & \rstick{O_1} \qw }\] \subcaption{CV gate.} \label{fig:cv} \end{minipage}% \begin{minipage}[t]{.3\linewidth} \centering \[ \Qcircuit @C=1em @R=.8em{ \lstick{A} & \ctrl{1} & \rstick{O_0} \qw \\ \lstick{B} & \gate{V^\dagger} & \rstick{O_1} \qw }\] \subcaption{$\text{CV}^\dagger$ gate.} \label{fig:cv+} \end{minipage} \end{tabular} \caption{Symbols of quantum gates CX, CV, and $\text{CV}^\dagger$.} \label{fig:symbols} \end{figure} \subsection{Quantum Circuit} A quantum circuit is a symbolic representation of the structure of the basic operations that realize a given operation, as shown in Figure~\ref{fig:HNG}. The basic operations are described by symbols as shown in Figure~\ref{fig:symbols}, with the operations as described above. Each line running corresponds to a qubit, and the symbols on the lines are the basic operations applied to that qubit, arranged in chronological order from left to right. According to the quantum circuit, the desired output state can be reached by performing the basic operations in order from left to right. Therefore, a quantum circuit can represent a sequence of execution instructions. \begin{figure}[bth] \centering \[ \Qcircuit @C=1.2em @R=1em{ \lstick{A} & \ctrl{3} & \qw & \qw & \ctrl{2} & \qw & \qw & \rstick{O_0} \qw \\ \lstick{B} & \qw & \ctrl{2} & \qw & \qw & \ctrl{1} & \qw & \rstick{O_1} \qw \\ \lstick{C} & \qw & \qw & \ctrl{1} & \targ & \targ & \ctrl{1} & \rstick{O_2} \qw \\ \lstick{D} & \gate{V} & \gate{V} & \gate{V} & \qw & \qw & \gate{V^\dagger} & \rstick{O_3} \qw \\ }\] \caption{HNG~\cite{HNG}. A, B, C and D are the inputs, and $O_0=A$, $O_1=B$, $O_2=A\oplus B\oplus C$ and $O_3=(A\oplus B)C\oplus AB\oplus D$ are the outputs.} \label{fig:HNG} \end{figure} \section{Quantum Circuit Synthesis Using Neural Network}\label{sec:synthesis} A quantum system performs reversible transformations on a quantum state composed of qubits. In principle, a sparse quantum circuit can be generated automatically if a decision procedure exists that can directly reason about the algebraic representation of the quantum circuit and search for a quantum circuit that can perform the given operation. The search for a correct quantum algorithm requires a search for the correct topology of the network representing the quantum circuit and the correct quantum gates to be placed in this topology. However, existing combinatorial search algorithms cannot search high-dimensional spaces with complex values, making this direct approach impractical. Therefore, we propose to use a neural network to perform an efficient search. In this section, we describe the specific procedure of the proposed approach. The objective of the proposed approach is to generate a quantum circuit that satisfies the conditions from the input-output pairs of the quantum circuit to be generated. \subsection{Input and Output} First, the input to the synthesis algorithm is the final state after applying the desired quantum circuit to the $2^n$ computational basis. Then, the quantum gates are generated backward to return the final state to the initial state. The restriction of the quantum circuit specification description to $2^n$ bases of computation is based on the insight that most quantum algorithms are expected to work with a finite number of classical inputs. Taking the quantum circuit in Figure~\ref{fig:bell} as an example, we describe the inputs and outputs of the approach in detail. \begin{figure}[h] \large{ \centering \[ \Qcircuit @C=1em @R=1em{ \lstick{A} & \gate{H} & \ctrl{1} & \rstick{O_0} \qw \\ \lstick{B} & \qw & \targ & \rstick{O_1} \qw }\] \caption{A quantum circuit that creates an entanglement state, also called bell state. For example, applying this circuit to $\ket{00}$, there is a 0.5 probability of observing a state of $\ket{00}$ and a 0.5 probability of observing a state of $\ket{11}$. Moreover, there is a 0 probability that observing a state of $\ket{01}$ or $\ket{10}$.} \label{fig:bell} } \end{figure} The number of qubits in the quantum circuit shown in Figure~\ref{fig:bell} is 2, so the size of the input-output vector is $2^2=4$. The elements of this vector are complex numbers, and the four inputs are the computational basis from 0 to 3, resulting in four complex vectors, as shown below. \begin{eqnarray*} \ket{00} &=& \left( \begin{array}{cccc} 1 & 0 & 0 & 0 \end{array} \right)^T \\ \ket{01} &=& \left( \begin{array}{cccc} 0 & 1 & 0 & 0 \end{array} \right)^T \\ \ket{10} &=& \left( \begin{array}{cccc} 0 & 0 & 1 & 0 \end{array} \right)^T \\ \ket{11} &=& \left( \begin{array}{cccc} 0 & 0 & 0 & 1 \end{array} \right)^T \end{eqnarray*} We apply the quantum circuit U shown in Figure~\ref{fig:bell} to the above inputs. Then, we get the so-called bell state, as shown below. \begin{eqnarray*} U\ket{00} &=& \left( \begin{array}{cccc} \frac{1}{\sqrt{2}} & 0 & 0 & \frac{1}{\sqrt{2}} \end{array} \right)^T \\ U\ket{01} &=& \left( \begin{array}{cccc} 0 & \frac{1}{\sqrt{2}} & \frac{1}{\sqrt{2}} & 0 \end{array} \right)^T \\ U\ket{10} &=& \left( \begin{array}{cccc} \frac{1}{\sqrt{2}} & 0 & 0 & -\frac{1}{\sqrt{2}} \end{array} \right)^T \\ U\ket{11} &=& \left( \begin{array}{cccc} 0 & \frac{1}{\sqrt{2}} & -\frac{1}{\sqrt{2}} & 0 \end{array} \right)^T \end{eqnarray*} The input to the algorithm is the state after applying the quantum circuit to the computational basis as described above. Through a search, the synthesis algorithm generates a quantum circuit that satisfies at least the input-output conditions of the computational basis. There are three types of quantum gates that are used by our synthesis approach: CX gate, CV gate, and $\text{CV}^\dagger$ gate. Here, we used the same quantum gates as previous work~\cite{various_gate} proposed quantum versions of classical circuits. The purpose is to compare the cost of quantum circuits designed by humans and synthesized automatically by our synthesis approach. \subsection{The Synthesis Algorithm} We next describe the details of our synthesis algorithm. We represent a quantum circuit as a sequence of quantum gates. Then, the following sequence would be the HNG~\cite{HNG} shown in Figure~\ref{fig:HNG}. $$ \text{CV}(0, 3), \text{CV}(1, 3), \text{CV}(2, 3), \text{CX}(0, 2), \text{CX}(1, 2), \text{CV}^\dagger(2, 3) $$ In our approach, we generate such a sequence of quantum gates from back to front. At each step, quantum gates are generated stochastically. Here, the word "stochastically" does not mean random but rather some prioritization. The neural network assigns this priority. To demonstrate the effectiveness of this prioritization, we have also conducted an experiment of random search synthesis. In the following, we explain the random search-based approach first. \subsubsection{Random Search} In a random search, the quantum gate is chosen completely randomly at each step. This procedure is repeated a certain number of times to generate a quantum circuit. The generated quantum circuit is checked to see if it satisfies the input and output conditions, and if not, another quantum circuit is generated. The reason for not searching all possible quantum circuits in order is to find the average performance for an arbitrary input. In the case of sequential search, the worst and best times can be produced intentionally if the search algorithm is known. On the other hand, if we search randomly, we can expect the average time to be the same for all inputs. If the number of quantum gates used is $N$ and the depth of the quantum circuit is $d$, then the search space is $N^d$. The search space increases exponentially with the depth of the quantum circuit, and we performed a random search as a baseline to show how long it would take if we computed it. \subsubsection{Neural Network Guided Search} In the neural network-guided search which we propose in this paper, a neural network is used to prioritize the generation probability of quantum gates. The neural network inputs the state vector after applying the quantum gates generated up to that point in reverse order to the final state and outputs the selected probability for each quantum gate. Based on the probabilities, the next quantum gate is selected. Moreover, the conjugate transposition of the quantum gate is applied to the current state to obtain the next quantum state. This process is repeated a certain number of times until the state is on a computational basis. If the desired quantum circuit cannot be generated, it returns to the beginning. The description of the algorithm is shown in Figure~\ref{fig:algorithm}. \begin{figure}[h] \centering \includegraphics[width=1.0\linewidth]{algorithm2.png} \caption{Synthesis algorithm: neural network guided synthesis.} \label{fig:algorithm} \end{figure} \subsection{Neural Network} \subsubsection{The Structure of Network} The structure of the neural network is shown in Figure~\ref{fig:network}. The network consists of a 10-layer CvNN (complex-valued neural network) and two fully connected layers. A CvNN has real and imaginary weights and performs complex number calculations during inference and loss calculation~\cite{hirose2012complex}. In contrast to CvNN, general neural networks are sometimes called "real neural networks." The word "real" means a real number. The advantage of CvNN is that it can increase the expressiveness of periodic motions. Specifically, it can handle shifts and rotations, at which real neural networks are not good. We adopt a CvNN since the quantum operation is unitary, corresponding to a rotation on the hypersphere in complex space. The fully connected layer at the back is a layer that maps complex numbers to real numbers and outputs the probability of selecting a quantum gate. \begin{figure*}[tbh] \centering \includegraphics[width=0.7\linewidth]{network.png} \caption{Structure of network. The network consists of a 10-layer complex neural network and two fully connected layers.} \label{fig:network} \end{figure*} \subsubsection{Generating Training Data} A neural network requires a large amount of data to function effectively. In this case, a large number of quantum circuits are required, but designing quantum circuits is a costly task for humans. For this reason, we generate the training data automatically. As mentioned above, a neural network takes a quantum state as input and outputs a quantum gate that looks promising at the time. Such input-output pairs are extracted from randomly generated quantum circuits. At this time, the generated quantum circuits should not overlap with other quantum circuits. Moreover, quantum circuits that loop quantum states, such as applying H-gates to the same qubit twice in a row, are eliminated. Figure~\ref{fig:multi correct circuit} gives an example of a quantum circuit with multiple quantum gates. We use it to describe the input and output of the neural network. The input and output are denoted by $sv$ and $p$, respectively, where $sv$ is a vector of quantum states at a certain time, and $p$ is a vector of gates to be generated next. In this example, $p$ is represented as follows: $$p = (p_{H_0}, p_{H_1}, p_{CX_{01}}, p_{CX_{10}})$$ $p_{G_i}$ is 1 for the next gate to be generated, and 0 otherwise, and $G_i$ denotes which gate G is applied to which qubit $i$. Since circuit~\ref{fig:multi correct circuit} is represented as a sequence, as shown in Figure~\ref{fig:multi correct seq}, the input and output of the neural network are as follows: $$ (sv_5, (0, 1, 0, 0)), \cdots, (sv_1, (1, 0, 0, 0)) $$ Note that there may be quantum gates that can be generated from either side, as shown in Figure~\ref{fig:multi correct}. In such a case, all combinations are considered. The set of candidate quantum gates for the correct answer is $T$, and $ T'$ denotes an arbitrary subset of $T$. Let $y$ be the difference set of $T$ and $T'$, $y$ are the correct quantum gates. The input is the state after applying the quantum gate of $y$ to the state at that time, and the output is $y$. Therefore, the input and output of the neural network are as follows: $$ (sv_5, (1, 1, 0, 0)), (sv_4, (1, 0, 0, 0)), (sv_3, (0, 1, 0, 0)), \cdots $$ Next, we describe how to find the set of quantum gates that are candidates for the correct answer. We use the property of quantum circuits as DAG (Directed Acyclic Graph). A quantum circuit is a DAG if the quantum gates are represented as nodes and the input-output relationship as an edge. A correct quantum gate is not an input to another quantum gate. In other words, a node without outgoing edges is a correct quantum gate. In this way, several input-output pairs can be extracted from a single quantum circuit. \begin{figure}[tbh] \large{ \centering \begin{tabular}{cc} \begin{minipage}{.7\linewidth} \centering \[ \Qcircuit @C=1.2em @R=1em{ \lstick{A} & \gate{H} & \ctrl{1} & \gate{H} & \rstick{O_0} \qw \\ \lstick{B} & \gate{H} & \targ & \gate{H} & \rstick{O_1} \qw }\] \subcaption{Circuit.} \label{fig:multi correct circuit} \end{minipage}% \\ \\ \begin{minipage}{.7\linewidth} \centering \includegraphics[width=1.1\linewidth]{sequence.png} \subcaption{Sequence.} \label{fig:multi correct seq} \end{minipage} \end{tabular} \caption{Example of a quantum circuit with multiple correct quantum gates (left), and its sequence representation (right). The two H-gates can be generated from either side.} \label{fig:multi correct} } \end{figure} \subsubsection{Learning Neural Network} Using the above method, we randomly generated 100,000 quantum circuits (quantum cost: 10) and extracted the input-output pairs. The quantum cost is the number of two-qubit gates used in the quantum circuit. The number of extracted input-output pairs was approximately 1.13 million. Using this training data, we trained a neural network with a batch size of 64 and several epochs of 40. \section{Experimental Evaluation}\label{sec:experimental} To evaluate our approach, we implemented an $AutoQC$ prototype and acquired seven benchmark quantum circuits to evaluate this prototype. Each quantum circuit is derived from the widely used quantum circuits in the community. For each quantum circuit, we generated input-output pairs automatically, fed these pairs into the $AutoQC$ prototype, and obtained the output results, including the topology of the synthesized quantum circuit. Our experiments were performed on a system with AMD Ryzen 5 5600X 6-Core Processor 3.70 GHz, 32GB RAM, NVIDIA GeForce RTX 3060 ti. \subsection{A Benchmark of Quantum Circuits for Synthesis} We use a benchmark consisting of the following quantum circuits for performing our synthesis experiment. These quantum circuits are important building blocks for the implementation of reversible logic circuits, more complex quantum multiplication circuits, and quantum ALUs~\cite{ALU1,ALU2} because they can simultaneously compute various logic functions, including full addition. In the following, we briefly describe each circuit, and for more detailed descriptions of these quantum circuits, please refer to the related papers. \vspace*{3mm} \begin{itemize}[leftmargin=2em,itemsep=0.5em] \item \textbf{HNG}~\cite{HNG}: HNG is a 4-input, 4-output reversible logic gate that can be used to work singly as a reversible full adder circuit when its fourth input is set to zero. \item \textbf{PFAG}~\cite{PFAG}: PFAG gate is almost similar to HNG except that PFAG provides half adder sum output besides providing full adder sum output. \item \textbf{IG}~\cite{IG}: IG gate is used to construct a Full Adder-Subtractor circuit. \item \textbf{MIG}~\cite{MIG}: MIG gate is the modified version of the IG gate. MIG gate is used to design carry look-ahead adder. \item \textbf{OTG}~\cite{OTG}: OTG gate is suitable for online testability in reversible logic circuits. \item \textbf{MKG}~\cite{MKG}: MKG gate is used to construct the reversible multiplier circuit. \item \textbf{TSG}~\cite{TSG1,TSG2}: TSG gate is used to design ripple carry adder, BCD adder, and the carry look-ahead adder. \end{itemize} \vspace*{3mm} \subsection{Experimental Results} First, we conducted a random search experiment as a baseline, which gives a rough idea of how complex the quantum circuit synthesis problem is. The HNG in Figure~\ref{fig:HNG} was searched for one hour by random search, and the number of quantum circuits seen during that time was used to estimate the running time of the entire search. In our environment, it took about 169 hours to generate a quantum circuit with four qubits and a quantum cost of 6 (the order of the search space is about $10^9$) with 50\% probability. We next conducted an experiment using our approach to generate quantum circuits from our benchmark based on their input-output pairs. This approach can be easily applied to these benchmarks and other quantum circuits with publicly available input and output specifications. The results of the proposed approach can be seen in Table~\ref{tab:result20}, which shows the results of 100 trials. Moreover, the mean and standard deviation of running time and the number of circuits explored to find the desired quantum circuit, and the minimum quantum cost is shown. The quantum cost is the number of two-qubit gates used in the quantum circuit. TSG is shown as a failure in the table because the search was terminated after 1,000 trials based on the number of search spaces for other quantum circuits. \begin{table*}[tb] \centering \caption{Results of 100 experiments performed on a network trained on quantum circuits with quantum cost 10 (AutoQC10) and quantum cost 20 (AutoQC20). We could not calculate the mean and standard deviation of TSG because we could only synthesize TSG once.} \label{tab:result10} \scalebox{1.0}{ \begin{tabular}{@{}cccccccccc@{}} \toprule \multicolumn{1}{l}{} & \multicolumn{4}{c}{Quantum Cost} & \multicolumn{3}{c}{Time[sec]} & \multicolumn{2}{c}{Loop} \\ \cmidrule(r){2-10} Circuit & AutoQC10 & AutoQC20 & \cite{velasquez2021automated} & \cite{various_gate} & AutoQC10 & AutoQC20 & \cite{velasquez2021automated} & AutoQC10 & AutoQC20 \\ \midrule HNG & 6 & 6 & 6 & 6 & 2.67 $\pm$ 2.06 & 3.98 $\pm$ 3.21 & 224.50 & 131.68 $\pm$ 105.60 & 184.95 $\pm$ 155.56 \\ PFAG & 6 & 6 & 6 & - & 5.50 $\pm$ 3.97 & 6.30 $\pm$ 4.94 & 193.92 & 284.43 $\pm$ 213.60 & 320.72 $\pm$ 260.54 \\ MIG & \textbf{7} & \textbf{7} & - & 8 & 8.60 $\pm$ 6.41 & 3.73 $\pm$ 3.06 & - & 325.12 $\pm$ 250.44 & 128.22 $\pm$ 108.73 \\ IG & \textbf{7} & \textbf{7} & - & 9 & 8.96 $\pm$ 7.82 & 2.40 $\pm$ 2.88 &- & 293.38 $\pm$ 266.00 & 72.40 $\pm$ 91.10 \\ OTG & \textbf{8} & \textbf{8} & - & 10 & 6.29 $\pm$ 5.70 & 13.25 $\pm$ 9.26 &- & 176.16 $\pm$ 165.22 & 368.91 $\pm$ 262.92 \\ MKG & \textbf{9} & \textbf{9} & 15 & 17 & 7.31 $\pm$ 7.29 & 4.15 $\pm$ 4.03 & 159,473.84 & 120.38 $\pm$ 123.64 & 64.45 $\pm$ 64.15 \\ TSG & fail & 19 & 13 & 20 & - & 15.06 & 144,326.49 & 1000 & 183 \\ \bottomrule \end{tabular} } \end{table*} The search is clearly more efficient than a random one, which suggests that the neural network can select the appropriate quantum gate. In addition, although there is no comparison, the number of searches is small enough. A comparison with the previous study is also made in Table~\ref{tab:result10}. In the previous study, SWAP gates can be used unlike our approach, but since SWAP gates can be created with three CX gates, SWAP gates are counted as three CX gates. Since the experimental environment is different from the previous study, a simple comparison of execution time is not possible. However, except for TSG, which failed to generate, our approach was faster and achieved the lowest quantum cost. The distribution of the quantum cost of synthesized MKG is shown in Figure~\ref{fig:MKG_dist}. The quantum cost distributions of other quantum circuits and the generated quantum circuits are summarized in Appendix A. It is noteworthy that, contrary to our expectations, we could synthesize a quantum circuit with a cost greater than the trained cost. \begin{figure}[tb] \centering \includegraphics[width=1.0\linewidth]{MKG_m10.png} \caption{Distribution of quantum cost of synthesized MKG using a network trained on cost 10 circuits.} \label{fig:MKG_dist} \end{figure} In addition, to synthesize TSG that could not be synthesized at the cost 10 model, we generated training data and trained the neural network in a circuit at cost 20. The number of input-output pairs is 2.28 million, about twice as many as the cost of 10 cases. The results of the cost 20 model are also shown in Table~\ref{tab:result20}. As a result, we succeeded in synthesizing only one out of 100 trials. Moreover, the cost 20 model is generally better in terms of loop count. Therefore, the accuracy may be further improved by increasing the cost and the training data. \begin{table*}[tbh] \centering \caption{Results of 100 experiments performed on a network trained on quantum circuits with cost 20. We could not calculate the mean and standard deviation because we could only synthesize TSG once.} \label{tab:result20} \scalebox{1.0}{ \begin{tabular}{@{}ccccccc@{}} \toprule \multicolumn{1}{l}{} & \multicolumn{2}{c}{Quantum Cost} & \multicolumn{2}{c}{Time[sec]} & \multicolumn{2}{c}{Loop} \\ \cmidrule(r){2-7} Circuit & cost10 & cost20 & cost10 & cost20 & cost10 & cost20 \\ \midrule HNG & 6 & 6 & 2.67 $\pm$ 2.06 & 3.98 $\pm$ 3.21 & 131.68 $\pm$ 105.60 & 184.95 $\pm$ 155.56 \\ PFAG & 6 & 6 & 5.50 $\pm$ 3.97 & 6.30 $\pm$ 4.94 & 284.43 $\pm$ 213.60 & 320.72 $\pm$ 260.54 \\ MIG & 7 & 7 & 8.60 $\pm$ 6.41 & 3.73 $\pm$ 3.06 & 325.12 $\pm$ 250.44 & 128.22 $\pm$ 108.73 \\ IG & 7 & 7 & 8.96 $\pm$ 7.82 & 2.40 $\pm$ 2.88 & 293.38 $\pm$ 266.00 & 72.40 $\pm$ 91.10 \\ OTG & 8 & 8 & 6.29 $\pm$ 5.70 & 13.25 $\pm$ 9.26 & 176.16 $\pm$ 165.22 & 368.91 $\pm$ 262.92 \\ MKG & 9 & 9 & 7.31 $\pm$ 7.29 & 4.15 $\pm$ 4.03 & 120.38 $\pm$ 123.64 & 64.45 $\pm$ 64.15 \\ TSG & - & 19 & - & 15.06 & - & 183 \\ \bottomrule \end{tabular} } \end{table*} The problem with our approach is that even if we succeed in synthesizing a quantum circuit in a single trial, we do not know if it is an optimal quantum circuit. Therefore, it is necessary to select a suitable circuit after several trials, as in this experiment. \section{Related work} \label{sec:related work} Cruz-Benito {\it et al.}~\cite{cruz2018deep} use deep learning to learn how people are using the OpenQASM language and provide help and guidance to coders by recommending different code sequences, logical steps, or small pieces of code. They use a seq2seq neural network to learn the code of a quantum programming language and predict the next sentence based on the previous sentences written. Several automatic synthesis approaches for quantum circuits have been proposed using genetic algorithms. Ruican {\it et al.}~\cite{ruican2007automatic} proposed an automatic quantum circuit synthesis approach using genetic algorithms. The basic idea of the approach is to divide the potential circuits into vertical levels called "sections" and horizontal levels called "planes" to achieve a consistent representation of genetic algorithms for chromosome definition. They also suggest using a database to specify the gates used in the synthesis process. Lukac and Perkowski~\cite{lukac2002evolving} proposed an approach to evolve quantum circuits using genetic algorithms. The genetic algorithm automatically searches for an appropriate circuit design that produces the desired output state. The fitness function compares the current output to the desired output and stops the search when a close match is found. Velasquez {\it et al.}~\cite{velasquez2021automated} proposed an approach to automatically synthesizing a quantum circuit using a decision procedure that performs symbolic reasoning for combinatorial search. This automatic synthesis approach automatically constructs a finite symbolic abstract model of the quantum gate and generates constraints from this symbolic model and the input-output pairs of the quantum circuit. An SMT solver then solves the constraints to discover the quantum circuits. They demonstrate the potential of this approach by automatically synthesizing four quantum circuits and rediscovering the Bernstein-Vazirani quantum algorithm~\cite{bernstein1997quantum}. Compared to the above approaches, our approach uses a neural network-based approach to synthesizing quantum circuits automatically, which is more efficient and at a lower cost and shows that neural networks can effectively support the automated development of quantum circuits. \section{Concluding Remarks}\label{sec:conclusion} This paper has proposed an approach to automatically synthesizing quantum circuits using a neural network from input-output pairs. Our approach can generate quantum circuits at a lower cost, which shows that neural networks can effectively support the development of quantum circuits. In the future, we would like to investigate how well the proposed approach can scale up in future work. We have shown that the algorithm scales to some extent, but it is necessary to investigate increasing the number of qubits, the depth of the quantum circuit, and training data. In addition, since the input size of the algorithm increases in proportion to the exponent of the number of qubits, an efficient way to represent the quantum state is also required. \bibliographystyle{IEEEtran}
\section{Introduction} During the last years, pressure-robustness has emerged as an important property that discretizations for incompressible flow problems should possess. For the Stokes problem in a domain $\Omega$ that for a data function $\vec{f}\in \vec{L}^2(\Omega)$ and viscosity $\nu>0$ is given by \begin{subequations}\label{eq:Stokes} \begin{align} &&-\nu \Delta \vec{u} + \nabla p &= \vec{f} &&\text{in } \Omega,&&\\ &&\nabla \cdot \vec{u} &= 0 &&\text{in } \Omega,&& \end{align} \end{subequations} a pressure-robust method yields velocity error estimates of the form, see \cite{Linke2014}, \begin{equation*} \norm{\vec{u}-\vec{u}_h}_{1,h} \lesssim \inf_{\vec{v}_h \in \vec{X}_h} \norm{\vec{u}-\vec{v}_h}_{1,h} + h^m \abs{\vec{u}}_{m+1}, \end{equation*} where $\vec{X}_h$ is the discrete velocity space and $\norm{\vec{v}}_{1,h}^2 = \sum_{T\in{\mathcal{T}_h}} \norm{\nabla\vec{v}}^2_{0,T}$. Missing pressure-robustness on the other hand, e.g., in the case of the classical family of Taylor--Hood elements, leads to error estimates of the type \begin{equation*} \norm{\vec{u}-\vec{u}_h}_{1} \lesssim \inf_{\vec{v}_h \in \vec{X}_h} \norm{\vec{u}-\vec{v}_h}_1 + \frac{1}{\nu} \inf_{q_h \in Q_h} \norm{p-q_h}_0, \end{equation*} where $Q_h$ is the discrete pressure space. Both estimates contain the best-approximation error for the velocity in the discrete velocity space, however the advantage of the first estimate is obvious and leads to the descriptive name \emph{pressure-robust}: the velocity error does not depend on the pressure approximability and the viscosity of the fluid. Due to intensive research, many pressure-robust methods are known, e.g., the Scott--Vogelius element \cite{ScottVogelius1985}, $\vec{H}(\mathrm{div})$-conforming discontinuous Galerkin methods \cite{CockburnKanschatSchotzau2007,LehrenfeldSchoberl2016} or classical methods using a reconstruction approach to gain pressure-robustness \cite{Linke2014}. The proofs for all of these methods however rely on the assumption of shape-regularity on the mesh elements, which excludes anisotropically graded meshes for boundary layers or edge singularities, which may occur in flow problems. This shortcoming was treated in our publications \cite{ApelKempfLinkeMerdon2021,ApelKempf2021}, where the pressure-robust variant of the Crouzeix--Raviart method was used and we could show error estimates for anisotropic meshes in the boundary layer and edge singularity settings. Since the velocity approximation of the Crouzeix--Raviart method is non-conforming, the aim of this contribution is to present a pressure-robust and conforming method which can be used for meshes that contain anisotropic elements. The presented theory of this paper is contained in \cite{Kempf2022:PhD} in a more abstract setting. \section{Reconstruction approach for pressure-robustness} In order to achieve pressure-robustness, we employ the reconstruction approach introduced in \cite{Linke2014}. Consider problem \eqref{eq:Stokes} on a domain $\Omega\subset\mathbb{R}^2$ with viscosity parameter $\nu > 0$ and homogeneous Dirichlet boundary conditions. The weak form of this problem is well known: Find $(\vec{u},p)\in\vec{X}\times Q = \vec{H}_0^1(\Omega)\times L_0^2(\Omega)$ so that \begin{align}\label{eq:Stokesweak} &\nu (\nabla \vec{u}, \nabla\vec{v}) - (\nabla\cdot\vec{v},p) - (\nabla\cdot\vec{u},q) = (\vec{f},\vec{v}) &&\forall (\vec{v}, q) \in \vec{X}\times Q. \end{align} Since we later require that for the solution $(\vec{u},p)\in\vec{H}^2(\Omega)\times H^1(\Omega)$ holds, we assume that $\Omega$ is a convex polygon where this required regularity is guaranteed \cite{KelloggOsborn1976}. By using the Helmholtz--Hodge decomposition of the data $\vec{f}=\mathbb{P} \vec{f}+\nabla\phi$ into a divergence-free part $\mathbb{P}\vec{f}$ and an irrotational part $\nabla\phi$, and looking at the problem in the subspace of divergence free functions $\vec{X}^0=\{\vec{v}\in\vec{X}: (\nabla\cdot\vec{v},q)=0\ \forall q\in Q\}$ \begin{equation}\label{eq:stokes_elliptic} \text{Find}\quad \vec{u}\in\vec{X}^0 \quad\text{so that}\quad \nu(\nabla \vec{u},\nabla\vec{v}) = (\vec{f},\vec{v}) = (\mathbb{P}\vec{f},\vec{v}) \quad\forall \vec{v}\in\vec{X}^0, \end{equation} we see that the velocity solution is independent of the gradient part $\nabla \phi$ of the data, see \cite{Linke2014}, as the test functions from $\vec{X}^0$ are $\vec{L}^2$-orthogonal on gradients. We aim to preserve this property in the discrete setting by using a reconstruction operator $I_h$, see \cite{Linke2014}, on the velocity test functions on the right hand side of the problem, so that the discrete version of \eqref{eq:Stokesweak} is given by \begin{align}\label{eq:Stokesdiscrete} &\nu a_h(\vec{u}_h,\vec{v}_h) + b_h(\vec{v}_h,p_h) + b_h(\vec{u}_h,q_h) = (\vec{f},I_h \vec{v}_h) &&\forall (\vec{v}_h, q_h) \in \vec{X}_h\times Q_h, \end{align} where $a_h(\vec{u}_h,\vec{v}_h)=(\nabla \vec{u}_h, \nabla\vec{v}_h)$ and $b_h(\vec{v}_h,p_h) = -(\nabla\cdot\vec{v}_h,p_h)$. Similar to \eqref{eq:stokes_elliptic} we can write this problem in the subspace of discretely divergence-free functions $\vec{X}_h^0=\{\vec{v}_h\in\vec{X}_h:b_h(\vec{v_h},q_h)=0\ \forall q_h\in Q_h\}$: \begin{equation}\label{eq:stokesdiscrete_elliptic} \text{Find}\quad \vec{u}_h\in\vec{X}_h^0 \quad\text{so that}\quad \nu a_h(\vec{u}_h,\vec{v}_h) = (\vec{f},I_h\vec{v}_h) \quad\forall \vec{v}_h\in\vec{X}_h^0. \end{equation} The reconstruction operator $I_h:\vec{X}_h\to \vec{H}_0(\mathrm{div},\Omega)=\{\vec{v}\in\vec{H}(\mathrm{div},\Omega): \vec{v}\cdot\vec{n}_{\partial\Omega} = 0\} $ needs to satisfy the properties \begin{subequations}\label{eq:as:reconstruction_operator} \begin{align} \nabla\cdot(I_h\vec{v}_h) &= \nabla \cdot \vec{v}_h &&\forall \vec{v}_h\in\vec{X}_h^0,\label{eq:as:reconstruction_operator_divergence}\\ \norm{\vec{v}_h-I_h \vec{v}_h}_0 &\lesssim h \norm{\vec{v}_h}_{1,h} &&\forall \vec{v}_h\in\vec{X}_h. \label{eq:as:reconstruction_operator_interpolation} \end{align} \end{subequations} This way, the right hand side of \eqref{eq:Stokesdiscrete}, when tested with $\vec{v}_h\in\vec{X}_h^0$, satisfies \begin{equation*} (\vec{f},I_h\vec{v}_h) = (\mathbb{P}\vec{f},I_h\vec{v}_h) + (\nabla\phi,I_h\vec{v}_h) = (\mathbb{P}\vec{f},I_h\vec{v}_h). \end{equation*} \section{Modified Bernardi--Raugel discretization and error estimates} For the Bernardi--Raugel method, the velocity and pressure approximation spaces are defined by, see \cite{BernardiRaugel1985}, \begin{align*} &\vec{X}_h = (\vec{P}_1(\mathcal{T}_h)\oplus \mathrm{span}\{\lambda_F^1\lambda_F^2\vec{n}_F\ \forall F\in\mathcal{F}_h\})\cap\vec{X}, \\ &Q_h = \{q_h\in L^2(\Omega): q_h|_T \in P_0(T)\ \forall T\in\mathcal{T}_h\}, \end{align*} where $\mathcal{T}_h$ is the set of mesh elements, $\mathcal{F}_h$ is the set of mesh edges, $\vec{n}_F$ the unit normal on facet $F$, and $\lambda_F^i$ the linear nodal basis functions associated with the endpoints of facet $F$. Thus, the velocity space is the space of continuous piecewise linear functions enriched by normal-weighted quadratic facet bubble functions and the pressure space is the space of piecewise constants. With $I_h=\operatorname{id}$ we get the standard Bernardi--Raugel method (BR), while for the pressure-robust modification we can choose $I_h$ as the lowest-order Raviart--Thomas (BR-RT) or Brezzi--Douglas--Marini (BR-BDM) interpolation operators, see \cite{LinkeMerdon2016}, which we write as $\RTIk{0}$ and $\BDMIk{1}$, respectively. \begin{lemma}\label{lem:reconstruction_operator} Let $\vec{X}_h$ and $Q_h$ be the Bernardi--Raugel finite element pair and let the reconstruction operator $I_h$ be defined by either $(I_h\vec{v}_h)|_T = \BDMIk{1}\vec{v}_h|_T$ or $(I_h\vec{v}_h)|_T = \RTIk{0}\vec{v}_h|_T$ for all $\vec{v}_h\in\vec{X}_h$ and $T\in{\mathcal{T}_h}$. Then $I_h$ satisfies \eqref{eq:as:reconstruction_operator} independently of the mesh aspect ratio. \end{lemma} \begin{proof} Since $\vec{X}_h\subset \vec{C}(\overline{\Omega})\cap \vec{X}$, the operator $I_h$ maps to a subspace of ${\vec{H}_0(\operatorname{div},\Omega)}$. Estimate \eqref{eq:as:reconstruction_operator_interpolation} is proved by summing the elementwise error estimates for the Raviart--Thomas and Brezzi--Douglas--Marini interpolation operators from \cite{AcostaApelDuranLombardi2011} and \cite{ApelKempf2020}, respectively. To show \eqref{eq:as:reconstruction_operator_divergence} we prove that the reconstruction operator preserves the discrete divergence of functions from $\vec{X}_h$, i.e., \begin{equation*} \int_T \nabla\cdot I_h\vec{v}_h q_h\dd{\vec{x}} = \int_T \nabla\cdot\vec{v}_h q_h\dd{\vec{x}}\qquad\forall q_h \in Q_h \end{equation*} holds for all $\vec{v}_h\in\vec{X}_h$ and all $T\in{\mathcal{T}_h}$. Integrating by parts we get \begin{equation*} \int_T \nabla\cdot(I_h\vec{v}_h - \vec{v}_h) q_h\dd{\vec{x}} = \int_T (\vec{v}_h - I_h\vec{v}_h)\cdot \nabla q_h\dd{\vec{x}} + \sum_{F\in\Facets{T}}\int_F (I_h\vec{v}_h - \vec{v}_h)\cdot\vec{n}_F q_h\dd{\vec{s}}, \end{equation*} where $\mathcal{F}(T)$ is the set of facets of the element $T$. Since $q_h$ is piecewise constant it holds $\nabla q_h = \vec{0}$ and by using the definition of the operators $\BDMIk{1}$ and $\RTIk{0}$ we see that the right hand side vanishes. \end{proof} \begin{lemma} There is an operator $I_F:\vec{X}\to\vec{X}_h$ that for all $\vec{v}\in\vec{X}$ satisfies the properties \begin{align*} b_h(\vec{v},q_h) &= b_h(I_h^F\vec{v},q_h) \qquad \forall q_h\in Q_h, \\ \norm{I_h^F\vec{v}}_{1,h} &\leq C_F \norm{\vec{v}}_{1,h}, \end{align*} with a stability constant $C_F$ that is independent of the aspect ratio of the mesh and the mesh size parameter $h$. \end{lemma} \begin{proof} This is proofed in \cite[Theorem 1]{ApelNicaise2004} for a wide class of anisotropic two-dimensional meshes. In particular boundary layer adapted meshes are included in the results from the reference. \end{proof} The previous lemma provides the inf-sup stability result for the Bernardi--Raugel method in the form \begin{equation}\label{eq:discrete_inf_sup} \inf_{0\neq q_h\in Q_h} \sup_{\vec{0}\neq\vec{v}_h\in\vec{X}_h}\frac{b_h(\vec{v}_h,q_h)}{\norm{\vec{v}_h}_{1,h} \norm{q_h}_0} \geq \widetilde{\beta} >0, \end{equation} where $\widetilde{\beta}$ is the discrete inf-sup constant, as the existence of a Fortin operator is equivalent to inf-sup stability, see, e.g., \cite[Lemma 4.19]{ErnGuermond2004}. We have to keep in mind that the results from \cite{ApelNicaise2004} that are used in the proof are restricted to a wide class of two-dimensional meshes. The next result is a consistency estimate in the subspace of divergence-free functions. \begin{lemma}\label{lem:consistency} Let $(\vec{u}, p)$ be the solution of the Stokes problem with unit viscosity. The consistency error estimate \begin{align} \abs{a_h(\vec{u}, \vec{v}_h) - (\vec{f}, \vec{v}_h)} &\lesssim h \norm{\vec{v}_h}_{1,h} \norm{\vec{f}}_0 \qquad \forall \vec{v}_h\in \vec{X}_h^0\label{eq:consistency2} \end{align} holds, where the constant is independent of the aspect ratio of the mesh and the mesh size parameter $h$. \end{lemma} \begin{proof} We write for $\vec{v}_h\in\vec{X}_h^0$ \begin{align*} \abs{a_h(\vec{u},\vec{v}_h) - (\vec{f},\vec{v}_h)} \leq \abs{a_h(\vec{u},\vec{v}_h) + b_h(\vec{v}_h,p) - (\vec{f},\vec{v}_h)} + \abs{b_h(\vec{v}_h,p)}, \end{align*} where the first term vanishes since $\vec{X}_h^0 \subset \vec{X}_h \subset \vec{X}$. Estimating the second term, using the $L^2$-projection operator $\pi_h$ onto $Q_h$, we get \begin{align*} \abs{a_h(\vec{u},\vec{v}_h) - (\vec{f},\vec{v}_h)} &\leq \abs{b_h(\vec{v}_h,p)} = \abs{b_h(\vec{v}_h,\pi_h p) + b_h(\vec{v}_h,p - \pi_h p)} = \abs{b_h(\vec{v}_h,p - \pi_h p)} \\ &\leq \norm{\nabla_h\cdot\vec{v}_h}_0 \norm{p-\pi_h p}_0 \leq \norm{\vec{v}_h}_{1,h}\norm{p-\pi_h p}_0. \end{align*} The error of the $L^2$-projection onto the piecewise constant functions can be estimated using \cite[Theorem 1.103]{ErnGuermond2004} which, using the result that the Stokes solution is bounded by the data function, see, e.g., \cite[Theorem 4.3]{ErnGuermond2004}, leads to the final estimate \begin{align*} \abs{a_h(\vec{u},\vec{v}_h) - (\vec{f},\vec{v}_h)} &\lesssim h \norm{\vec{v}_h}_{1,h}\norm{p}_1 \lesssim h \norm{\vec{v}_h}_{1,h}\norm{\vec{f}}_0. \qedhere \end{align*} \end{proof} \begin{lemma}\label{lem:approximation} Let $(\vec{u}, p)$ be the solution of the Stokes problem \eqref{eq:Stokesweak}. Then for the Bernardi--Raugel element the approximation properties \begin{align*} \inf_{\vec{v}_h\in\vec{X}_h^0}\norm{\vec{u}-\vec{v}_h}_{1,h} &\lesssim h \norm{\mathbb{P}(\Delta\vec{u})}_0,& \inf_{q_h\in Q_h}\norm{p-q_h}_0 &\lesssim h \norm{\vec{f}}_0 \end{align*} hold, where the constants are independent of the aspect ratio of the mesh and the mesh size parameter $h$. \end{lemma} \begin{proof} We first need the stability estimate for the Bernardi--Raugel interpolation operator from \cite[Section 5.2]{ApelNicaise2004}, where it was shown that for $\vec{v} \in \vec{H}^2(\Omega)$ the estimate \begin{equation}\label{eq:BR_stability} \norm{{I_h^{\text{BR}}} \vec{v}}_{1,h} \lesssim \norm{\vec{v}}_{1,h} + h \abs{\vec{v}}_2 \end{equation} holds on the types of meshes we use. With the technique from the proof of \cite[II.(1.16)]{GiraultRaviart1986}, we get \begin{equation*} \inf_{\vec{v}_h\in\vec{X}_h^0} \norm{\vec{u}-\vec{v}_h}_{1,h} \lesssim \inf_{\vec{v}_h\in\vec{X}_h} \norm{\vec{u}-\vec{v}_h}_{1,h} \lesssim \norm{\vec{u}-{I_h^{\text{BR}}}\vec{u}}_{1,h}, \end{equation*} so that now only the error of the Bernardi--Raugel interpolation needs to be estimated. Since the operator ${I_h^{\text{BR}}}$ preserves linear polynomials we can use the stability estimate \eqref{eq:BR_stability} and a Bramble--Hilbert type argument, which in the end leads to the estimate \begin{equation*} \inf_{\vec{v}_h\in\vec{X}_h^0} \norm{\vec{u}-\vec{v}_h}_{1,h} \lesssim h \abs{\vec{u}}_2. \end{equation*} As $\vec{u}\in\vec{H}^2(\Omega)$ is the Stokes velocity solution for data $\vec{f}$, we know, see, e.g., \cite[Lemma 2]{ApelKempf2021}, that it also solves a Stokes system with data $\nu^{-1}\mathbb{P}\vec{f}$. We can thus again use that the Stokes solution is bounded by the data function, see, e.g., \cite[Theorem 4.3]{ErnGuermond2004}, and estimate \begin{equation*} \abs{\vec{u}}_2 \lesssim \nu^{-1}\norm{\mathbb{P}\vec{f}}_0. \end{equation*} With \cite[Equation (9)]{ApelKempf2021} we now get the desired estimate \begin{equation*} \inf_{\vec{v}_h\in\vec{X}_h^0} \norm{\vec{u}-\vec{v}_h}_{1,h} \lesssim h \norm{\mathbb{P}(\Delta \vec{u})}_0. \end{equation*} The estimate for the pressure can be acquired by again using the error estimate for the $L^2$-projection into piecewise constants $\pi_h$ from \cite[Theorem 1.103]{ErnGuermond2004}, with which we can compute \begin{equation*} \inf_{q_h\in Q_h} \norm{p-q_h}_0 = \norm{p-\pi_h p}_0 \lesssim h \norm{p}_1 \lesssim h \norm{\vec{f}}_0.\qedhere \end{equation*} \end{proof} With these lemmas as preparation, we are able to prove the discretization error estimates. \begin{theorem}\label{th:main_result} Let $\Omega \subset \mathbb{R}^2$ be a convex polygon, $\vec{X}_h$, $Q_h$ the Bernardi--Raugel finite element pair and $(\vec{u},p)$, $(\vec{u}_h,p_h)$ the solutions to \eqref{eq:Stokesweak} and \eqref{eq:Stokesdiscrete}. Further let the reconstruction operator $I_h$ be defined by either $(I_h\vec{v}_h)|_T = \BDMIk{1}\vec{v}_h|_T$ or $(I_h\vec{v}_h)|_T = \RTIk{0}\vec{v}_h|_T$ for all $\vec{v}_h\in\vec{X}_h$ and $T\in{\mathcal{T}_h}$, and let ${\mathcal{T}_h}$ satisfy the mesh conditions from \cite{ApelNicaise2004}. Then the estimates \begin{align*}\label{eq:main_result} \norm{\vec{u}-\vec{u}_h}_{1,h} &\lesssim \inf_{\vec{v}_h\in\vec{X}_h^0} \norm{\vec{u}-\vec{v}_h}_{1,h} + h \norm{\mathbb{P}( \Delta \vec{u})}_0,\\ \norm{p-p_h}_0 &\lesssim \inf_{q_h\in Q_h} \norm{p-q_h}_0 + \frac{\nu}{\tilde{\beta}} \inf_{\vec{v}_h\in\vec{X}_h^0}\norm{\vec{u}-\vec{v}_h}_{1,h} + \frac{h}{\tilde{\beta}} \norm{\vec{f}}_0 \end{align*} hold, where $\tilde{\beta}$ is the discrete inf-sup constant. \end{theorem} \begin{proof} Let $\vec{v}_h\in \vec{X}_h^0$ be the best-approximation of $\vec{u}$ with respect to $\norm{\cdot}_{1,h}$ and set $\vec{w}_h=\vec{u}_h-\vec{v}_h\in\vec{X}_h^0$. Then due to the Pythagorean theorem we have \begin{equation}\label{eq:main_result_pythagoras} \norm{\vec{u}-\vec{u}_h}_{1,h}^2 = \norm{\vec{u}-\vec{v}_h}_{1,h}^2 + \norm{\vec{w}_h}_{1,h}^2. \end{equation} Using \eqref{eq:stokesdiscrete_elliptic} and $a_h(\vec{u}-\vec{v}_h,\vec{w}_h)=0$ we can estimate \begin{align*} \norm{\vec{w}_h}_{1,h}^2 &= a_h(\vec{w}_h, \vec{w}_h) = a_h(\vec{u}_h-\vec{v}_h,\vec{w}_h)=a_h(\vec{u}-\vec{v}_h, \vec{w}_h) - a_h(\vec{u},\vec{w}_h) + a_h(\vec{u}_h,\vec{w}_h)\\ &\leq \abs{a_h(\vec{u},\vec{w}_h) - \nu^{-1}(\vec{f},I_h\vec{w}_h)}. \end{align*} Dividing by $\norm{\vec{w}_h}_{1,h}$ and combining this inequality with \eqref{eq:main_result_pythagoras} yields \begin{equation}\label{eq:main_result_proof_0} \norm{\vec{u}-\vec{u}_h}_{1,h} \leq \norm{\vec{u}-\vec{v}_h}_{1,h} + \frac{ \abs{a_h(\vec{u}, \vec{w}_h) - \nu^{-1} (\vec{f},I_h\vec{w}_h)}}{\norm{\vec{w}_h}_{1,h}}. \end{equation} Recall the Helmholtz--Hodge decomposition of the data $\vec{f} = \mathbb{P} \vec{f} + \nabla \phi$ and note that $\nabla\cdot I_h\vec{w}_h = 0$ due to \Cref{lem:reconstruction_operator} and $\vec{w}_h\in\vec{X}_h^0$. With $(\nabla\phi,I_h\vec{w}_h) = 0$ we get \begin{align} \abs{a_h(\vec{u},\vec{w}_h) - \frac{1}{\nu}(\vec{f},I_h\vec{w}_h)} &= \abs{a_h(\vec{u},\vec{w}_h) - \nu^{-1}(\mathbb{P}\vec{f},I_h\vec{w}_h)} \nonumber\\ &= \abs{a_h(\vec{u},\vec{w}_h) - \nu^{-1}(\mathbb{P} \vec{f},\vec{w}_h) + \nu^{-1}(\mathbb{P} \vec{f},\vec{w}_h - I_h\vec{w}_h)} \nonumber\\ &\leq \abs{a_h(\vec{u},\vec{w}_h) - \nu^{-1}(\mathbb{P} \vec{f},\vec{w}_h)} + \abs{\nu^{-1}(\mathbb{P} \vec{f},\vec{w}_h - I_h\vec{w}_h)}. \label{eq:main_result_proof_1} \end{align} By \cite[Lemma 2]{ApelKempf2021}, $\vec{u}$ is also the velocity solution of the Stokes problem with unit viscosity and right hand side $\nu^{-1}\mathbb{P}\vec{f}$, which means that we can apply the consistency estimate of \Cref{lem:consistency}, which yields \begin{align} \abs{a_h(\vec{u},\vec{w}_h) - \nu^{-1}(\mathbb{P} \vec{f},\vec{w}_h)} &\lesssim \nu^{-1} h \norm{\vec{w}_h}_{1,h} \norm{\mathbb{P}\vec{f}}_0. \label{eq:main_result_proof_2} \end{align} The second term in \eqref{eq:main_result_proof_1} can be estimated using the Cauchy--Schwarz inequality and the interpolation error estimate for the reconstruction operator $I_h$ from \Cref{lem:reconstruction_operator}, which gets us \begin{equation}\label{eq:main_result_proof_3} \abs{\nu^{-1}(\mathbb{P} \vec{f},\vec{w}_h - I_h\vec{w}_h)} \leq \nu^{-1}\norm{\mathbb{P}\vec{f}}_0 \norm{\vec{w}_h - I_h\vec{w}_h}_0 \lesssim \nu^{-1} h \norm{\mathbb{P}\vec{f}}_0 \norm{\vec{w}_h}_{1,h}. \end{equation} We can now combine the individual estimates \eqref{eq:main_result_proof_2}, \eqref{eq:main_result_proof_3} with \eqref{eq:main_result_proof_1} and insert the result in \eqref{eq:main_result_proof_0}. Since $\vec{v}_h$ was chosen as the best-approximation of $\vec{u}$ in $\vec{X}_h^0$, we now have the final estimate \begin{equation*} \norm{\vec{u}-\vec{u}_h}_{1,h} \lesssim \inf_{\vec{v}_h\in\vec{X}_h^0}\norm{\vec{u}-\vec{v}_h}_{1,h} + h \norm{\mathbb{P}(\Delta \vec{u})}_0, \end{equation*} where we also used the identity \cite[Equation (9)]{ApelKempf2021}. To get the pressure estimate we also use the Pythagorean theorem to get \begin{equation*} \norm{p-p_h}_0^2 = \norm{p-\pi_h p}_0^2 + \norm{\pi_h p - p_h}_0^2, \end{equation*} where $\pi_h: L_0^2(\Omega) \to Q_h$ is the $L^2$-projection into the discrete pressure space. For the first term it holds $\norm{p-\pi_h p}_0^2 = \inf_{q_h\in Q_h}\norm{p-q_h}_0^2$. Since $\pi_h p-p_h \in Q_h$ and using the discrete inf-sup condition \eqref{eq:discrete_inf_sup} we get \begin{align} \norm{\pi_h p - p_h}_0 &\leq \frac{1}{\tilde{\beta}} \sup_{\vec{v}_h\in \vec{X}_h} \frac{b_h(\vec{v}_h,\pi_h p - p_h)}{\norm{\vec{v}_h}_{1,h}} = \frac{1}{\tilde{\beta}} \sup_{\vec{v}_h\in \vec{X}_h} \frac{b_h(\vec{v}_h,\pi_h p - p) + b_h(\vec{v}_h,p-p_h)}{\norm{\vec{v}_h}_{1,h}}.\label{eq:proof_p_estimate_1} \end{align} The first term in the numerator can be estimated using the Cauchy--Schwarz inequality, the error estimate for the $L^2$-projection into piecewise constant functions from \cite[Theorem 1.103]{ErnGuermond2004} which yields \begin{align} \abs{b_h(\vec{v}_h,\pi_hp - p)} \leq \norm{\nabla_h\cdot\vec{v}_h}_0 \norm{\pi_h p -p}_0 \lesssim \norm{\vec{v}_h}_{1,h} \norm{\pi_h p -p}_0 \lesssim h \norm{\vec{v}_h}_{1,h} \norm{\vec{f}}_0.\label{eq:proof_p_estimate_2} \end{align} Since $p_h$ solves the discrete problem we get for the second term \begin{align} \abs{b_h(\vec{v}_h,p-p_h)} &= \abs{b_h(\vec{v}_h,p) + \nu a_h(\vec{u}_h, \vec{v}_h) - (\vec{f}, I_h\vec{v}_h)} \nonumber\\ &= \abs{\nu a_h(\vec{u},\vec{v}_h) + b_h(\vec{v}_h, p) - (\vec{f}, \vec{v}_h) + \nu a_h(\vec{u}_h-\vec{u},\vec{v}_h) + (\vec{f}, \vec{v}_h - I_h\vec{v}_h)} \nonumber\\ &\lesssim \nu \norm{\vec{u}-\vec{u}_h}_{1,h}\norm{\vec{v}_h}_{1,h} + h \norm{\vec{f}}_0\norm{\vec{v}_h}_{1,h}, \label{eq:proof_p_estimate_3} \end{align} where in the last step the consistency of the method, the Cauchy--Schwarz inequality and the interpolation error estimate from \Cref{lem:reconstruction_operator} was used. Now putting \eqref{eq:proof_p_estimate_2} and \eqref{eq:proof_p_estimate_3} into \eqref{eq:proof_p_estimate_1} and using the estimate for the velocity error yields the claimed pressure estimate. \end{proof} \begin{corollary} Under the assumptions from \Cref{th:main_result} we have the estimates \begin{align*} \norm{\vec{u}-\vec{u}_h}_{1,h} &\lesssim h \norm{\mathbb{P}(\Delta \vec{u})}_0, & \norm{p-p_h}_0 &\lesssim h \tilde{\beta}^{-1} \norm{\vec{f}}_0, \end{align*} \end{corollary} \begin{proof} This is a direct application of \Cref{lem:approximation} to the estimates from \Cref{th:main_result}. \end{proof} \section{Numerical example} We now present an academic numerical example to see the performance of the method on anisotropic meshes. The example employs a manufactured solution of the Stokes equations on the unit square $\Omega = (0,1)^2$ described by the velocity and pressure functions \begin{equation*} \vec{u}(\vec{x}) = \begin{pmatrix}\tanh\left(\frac{y}{\sqrt{\varepsilon}}\right) \\ 0 \end{pmatrix}, \qquad p(\vec{x}) = \tanh\left(\frac{y}{\sqrt{\varepsilon}}\right) - C(\varepsilon), \end{equation*} with a positive parameter $\varepsilon$. Both functions exhibit a boundary layer near $y = 0$, as can be seen in the visualization in \Cref{fig:boundary_layer}. \begin{figure}[t] \centering \includegraphics{Boundary_layer_2D_velocity}\hfill \includegraphics{boundary_layer_mesh_2d} \caption{Left: Magnitude of velocity solution for $\varepsilon=10^{-3}$. Right: Shishkin-type mesh.} \label{fig:boundary_layer} \end{figure} \begin{figure}[t] \centering \includegraphics{conv_BL_BR} \includegraphics{conv_BL_BR_legend} \caption{Convergence plots for the boundary layer example for $\varepsilon\in\{10^{-4},10^{-5}\}$, $\nu=10^{-4}$, with BR and BR-BDM methods.\\} \label{fig:boundary_layer_convergence_BR} \end{figure} The functions can be viewed as a fluid flow along a wall with no-slip boundary condition. The parameter $\varepsilon$ can be used to adjust the width of the boundary layer. Defining the boundary layer width as the distance from the wall where $99 \%$ of the free flow velocity is reached, we compute \begin{align*} \abs{\vec{u}(\cdot,\tau)} &= \tanh\left(\frac{\tau}{\sqrt{\varepsilon}}\right) = 0.99 & \Leftrightarrow \qquad\qquad \tau &= 0.5\sqrt{\varepsilon}\ln\left(199\right)\approx 2.65\sqrt{\varepsilon} \end{align*} for the transition point parameter $\tau$ of the Shishkin-type meshes we want to use. This type of mesh has a uniform element size in $x$-direction and half of the total elements up to $\tau$ in the $y$-direction, see the bottom illustration in \Cref{fig:boundary_layer}. The constant $C(\varepsilon)$ is needed to set the mean pressure to zero and can be computed by \begin{equation*} C(\varepsilon) = \int_\Omega \tanh\left(\frac{y}{\sqrt{\varepsilon}}\right) \dd{\vec{x}} = \sqrt{\varepsilon} \ln (\cosh(\varepsilon^{-\frac{1}{2}})). \end{equation*} Computations were performed with the BR and BR-BDM methods for parameter choices $\varepsilon\in\{10^{-4},10^{-5}\}$ and $\nu=10^{-4}$ on uniform and Shishkin-type meshes. For the presentation of the numerical results we use the relative errors \begin{align*} &\norm{\vec{u}-\vec{u}_h}_{1,h,\mathrm{rel}} = \frac{\norm{\vec{u}-\vec{u}_h}_{1,h}}{\norm{\vec{u}}_{1,h}}, && \norm{p-p_h}_{0,\mathrm{rel}} = \frac{\norm{p-p_h}_{0}}{\norm{p}_0}. \end{align*} The results are shown in \Cref{fig:boundary_layer_convergence_BR}. The plots show on the one hand the clear advantage of the pressure-robust methods, where the velocity errors are significantly smaller than for the standard method. On the other hand, the effect of the anisotropic mesh grading is obvious in the velocity errors as well as the pressure errors. \printbibliography \end{document}
\section{Introduction} Visual description or storytelling (VST) seeks to create a sequence of meaningful sentences to narrate a set of images. It has attracted significant interest from the vision to language field. However, compared to image \cite{li2022comprehending,fei2022deecap} and video \cite{pan2020spatio,seo2022end,lin2022swinbert} captioning, narrative storytelling \cite{9647213,kim2018glac,Liu_Fu_Mei_Chen_2017} has more complex structures and incorporates themes that do not appear explicitly in the given set of images. Moreover, describing a set of images is challenging because it demands algorithms to not only comprehend the semantic information, such as activities and objects in each of the five images along with their relationships, but also demands fluency in the phrases as well as the visually unrepresented notions. \begin{figure} \includegraphics[width=\textwidth]{ex11.png} \caption{An example of three vision description techniques includes a single picture caption, story-like caption, and narrative storytelling, which is our aim.} \label{fig1} \end{figure} Recent storytelling techniques utilise sequence-to-sequence (seq2seq) models \cite{visapp21,kim2018glac} to produce narratives based story on a set of images. The key idea behind these approaches is to implement a convolutional neural network (CNN), (\emph{i.e}, {\em a sequence encoder}), to extract the visual features of the set of images. Then, combining these visual features, a complete set of image representations is obtained. The next step is to input this representational vector into a hierarchical long-short-term memory (LSTM) model to form a sequence of sentences as a story. This approach has dominated this area of research owing to its capacity to generate high-quality and adaptable narratives. Figure \ref{fig1} illustrates the technical challenges between single image captioning style, isolation style, and storytelling style for a set of five images. For example, the first sentence of all the three blocks in Figure \ref{fig1} annotations show the following: ``A picture of cars around.", ``The car is parked in the street.", and ``I went to the park yesterday, and there were many cars there.". The first description is known as image captioning style which conveys the actual and physical picture information. The second description is known as storytelling in-isolation style which catches the image content as well, but it is not linked to the following sentence. The final description is known as first-person storytelling style which explains more inferences about the image as a story-based sentence and also links to the subsequent sentence. In order to solve the above challenges and difficulties, we propose a novel methodology that explores the significance of spatial dimension conversion and its efficacy on Vision Transformer (ViT) \cite{dosovitskiy2020image} based model. Our method proceeds by extracting the feature vectors from the given images by dividing them into 16X16 patches and feeding them into a {\em Bidirectional-LSTM} ({\em Bi-LSTM}). This models the visual patches as a temporal link among the set of images. By using the {\em Bidirectional-LSTM}, we represent the temporal link between patches in both forward and backward directions. To preserve the visual-specific context and relevance, we convert the visual features and contextual vectors from {\em Bi-LSTM} into a shared latent space using a {\em Mogrifier-LSTM} architecture \cite{melis2019mogrifier}. During the first layer's gated modulation, the initial gating step scales the input embedding based on the ground truth context, producing a contextualized representation of the input. This combination of multi-view feature extraction and highly context-dependent input information allows the language model to provide more meaningful and contextual descriptions of the input set of images. \noindent The following is a summary of the contributions presented in this paper: \begin{itemize} \item We propose a novel ViT sequence encoder framework, that utilises multi-view visual information extraction for appropriate narrative based story on the given set of images as input. \item We take into account the context of the past as well as the future and employ an attention mechanism over the contextualized characteristics that have been obtained from Vision Transformer (ViT) to construct semantically rich narratives from a language model. \item We propose to combine {\em Mogrifier-LSTM} with enriched visual characteristics (patches) and semantic inputs to generate data-driven narratives that are coherent and relevant. \item We demonstrate the utility of our proposed method through multiple evaluation metrics on the largest known Visual Story-Telling dataset (VIST) \cite{huang2016visual}\footnote{https://visionandlanguage.net/VIST/}. In addition, we compare the performance of our technique with existing state of the art techniques and show that it outperforms them on various evaluation metrics. \end{itemize} \section{Related Works} This section presents a review of literature on different visual captions that directly relate to narrative storytelling techniques, followed by the literature on visual storytelling methods. \subsection{Visual Understanding} Visual understanding algorithms, which include image and video captioning, are the most significant sort of networks utilized to tackle the problem of narrative storytelling. Since it is most relevant to our study, we briefly discuss the recent literature on neural network-based image and video captioning. Typically, these models extract a vector of visual features using a CNN and then transmit this vector to a language model for caption synthesis. \subsubsection{Image Captioning (IC)}consists of a single frame (\emph{i.e}, an image) defined by a single phrase. Approaches may be further classified as rule-based methods \cite{do2020reference,mogadala2020integrating} and deep learning-based methods \cite{phukan2020efficient,huang2019attention}. The rule-based approaches apply the traditional methodology of recognizing a restricted number of pre-defined objects, activities and locations in the image, and describing them in natural language using template-based techniques. On the other hand, due to recent advances in deep learning, the vast majority of current methods are dependent on deep learning as well as scientifically advanced techniques such as attention \cite{wang2020learning}, reinforcement learning \cite{shen2020remote}, semantic attributes integration \cite{li2019entangled}, and modeling of subjects and objects \cite{ding2019image}. However, none of these algorithms are designed to produce a narrative-based description of a set or collection of images. \subsubsection{Video Captioning (VC)}defined as multi-frame description that can explain many frames (\emph{i.e}, a video) in a single statement. VC and storytelling techniques are quite similar as they both utilize an encoder-decoder framework. The encoder is composed of a 2D/3D CNN that extracts visual information from a set of input frames. This information is subsequently converted into normal language phrases using a decoder or a language model based on either a recurrent neural network \cite{cho2014properties,pang2022video} or a transformer network \cite{zhou2018end,li2022long,jiang2022double}. Although VC methods can describe multi-frames in a single caption efficiently, it does not generate a story or multi-sentence descriptions for a given set of images. \subsection{Storytelling Methods} Telling a story based on a set of images is an easy task for humans, but an extremely difficult task for machines. Coherent, relevant, and grammatically correct sentences must be generated for a story-based description. For example, Park et al. (2015) \cite{park2015expressing} illustrated that using bidirectional recurrent neural network (BRNN) is more efficient than a usual recurrent neural network (RNN) because BRNN captures forward and backward image features, which enables the model to interact with the whole story's sentences. Similarly, Sequence-to-Sequence (Seq2Seq) techniques, which utilize CNN+Bi-LSTM \cite{kim2018glac}\footnote{https://github.com/tkim-snu/GLACNet} or CNN+GRU \cite{wang2018show} as an encoder and RNN as a decoder enhanced storytelling prediction from a set of images. In addition, the concept of designing composite rewards as a strategy for storytelling problems was introduced \cite{hu2020makes}\footnote{https://github.com/JunjieHu/ReCo-RL}, which improved the natural flow of the generated story. A novel decoder-encoder framework using {\em Mogrifier-LSTM} \cite{visapp21} was also proposed to improve the coherence, relevance, and information of the generated story. Recently, the object detection technique using {\em YOLO}v5 \cite{9647213} is embedded with the encoder to improve the relevance of the story sentences. Different from previous works, our proposed method derives characteristics from the multiple visual features (i.e., patch features) based on the human-like approach to generate stories. This helps to propose an approach that is both computationally efficient and capable of producing coherent, relevant, and informative stories. \begin{figure} \includegraphics[width=\textwidth]{Method1.png} \caption{An overview of our proposed model which consists of a sequence encoder and decoder. The sequence encoder process is implemented by both the Vision Transformer (ViT) and the {\em Bidirectional-LSTM}. The decoder process is performed by the {\em Mogrifier-LSTM} as well as the standard LSTM.} \label{method} \end{figure} \section{Proposed Method} Figure \ref{method} presents the overall architecture of our proposed model which comprises of Vision Transformer (ViT), sequence encoder and decoder modules. In the first step, the image features are extracted using ViT, which divides each image into {\em16X16} patches and encodes them. Then all extracted image patch features are further encoded by {\em Bidirectional-LSTM} module which extracts the temporal context of the images. The connection between the sequence encoding and image features is captured by the Attention module on two levels: the patch level and the image-set patch level. Finally, the decoder module is responsible for the generation of a sequence of sentences as human story-like by making use of the {\em Mogrifier-LSTM} architecture. The following discussion delves into the specifics of the aforementioned three modules. \subsection{Vision Transformer (ViT)} A set of {\em I} images are fed by the data-loader as $I_s = (I_1, I_2, ..., I_s)$, where \begin{equation} I = [ I_1, I_2, ..., I_N]~~s.t.~~ I_N \in \mathbb{R}^{H\times W \times C}, \end{equation} $s \in \{1, 2, 3, 4, 5\}$ which is a set of five images with HxWxC (Height x Width x Channels) shape that presents a unique representation of storytelling from the dataset. To extract image features, we utilized Vision Transformer (ViT) \cite{dosovitskiy2020image} which breaks the given {\em I} image into {\em N} equal-sized, non-overlapping patches of shape (P, P, C) and linearly maps each patch to a visual representation. We define the extracted features as the combination of patches from the ViT model as follows: \begin{equation} I_0 = [ I_p^1E; I_p^2E; ...; I_p^NE]~~s.t.~~ E \in \mathbb{R}^{(P^2.C) \times D} \end{equation} where {\em P} is the defined parameter as in grid order (left to right, up to down) while C represents the total number of channels. Then we flatten all patches which produces {\em n} line feature vectors of shape $(1, P^{2\star} C)$. The patches that have been flattened are multiplied by a trainable embedding tensor of shape $(P^{2\star} C, D)$, which gains the ability to linearly project each flat patch to dimension D. As a result, we produce rich embedded patches of shape {\em n} = $ (1, D)\in \mathbb{R}^{(1, D)}$. \subsection{Features Encoding} The purpose of visual storytelling is first to comprehend the flow of events occurring in each image and then to produce a consistent narrative similar to how humans narrate a story. As a set of $P = P_1, P_2, ..., P_l$, where P represents the total number of image patches included in I as well as the number of corresponding contexts in each story. In order to represent these relationship features, we utilize a {\em Bidirectional-LSTM}, which compiles the sequential information of $P$ patches in both {\em forward} and {\em backward} direction. Our sequence encoder requires an input of image feature vector $\boldsymbol f_i$ at every time step `$t$' where $i \in \{1, 2,.., 5\}$. Eventually, the sequence encoder part of the model encodes the whole image set, comprising all the image patches and provides contextual information $\boldsymbol h_{se} = [\overrightarrow{\boldsymbol h_{se}}; \overleftarrow{\boldsymbol h_{se}}]$ through the final hidden-state at time step number $t=5$. \subsection{Story Generation} Since modelling sequential inputs must lead to generating coherent sentences, the solution to the challenge lies in how well the model learns the context. This is particularly problematic for issues that need high levels of coherence and relevance. To solve this, we utilize the standard LSTM \cite{hochreiter1997long}, which forms the current hidden state denoted by $\boldsymbol h^{\langle t \rangle}$, based on the previous hidden state, represented by $\boldsymbol h_{prev}$, and refreshes its memory state $\boldsymbol c^{\langle t \rangle}$. Further, standard LSTM utilizes input gates $\boldsymbol \Gamma_i$, forget gates $\boldsymbol \Gamma_f$, and output gates $\boldsymbol \Gamma_o$ which are determined as follows: \begin{equation} \boldsymbol \Gamma_f^{\langle t \rangle} = \sigma(\boldsymbol M_f[\boldsymbol h_{prev}, \boldsymbol w_{t}] + \boldsymbol B_f), \end{equation} \begin{equation} \boldsymbol \Gamma_i^{\langle t \rangle} = \sigma(\boldsymbol M_i[\boldsymbol h_{prev}, \boldsymbol w_{t}] + \boldsymbol B_i), \end{equation} \begin{equation} \boldsymbol {\tilde c}^{\langle t \rangle} = \tanh{(\boldsymbol M_c[\boldsymbol h_{prev}, \boldsymbol w_{t}] + \boldsymbol B_c)}, \end{equation} \begin{equation} \boldsymbol c^{\langle t \rangle} = \boldsymbol \Gamma_f^{\langle t \rangle} \odot \boldsymbol c^{\langle t-1 \rangle} + \boldsymbol \Gamma_i^{\langle t \rangle} \odot \boldsymbol {\tilde c}^{\langle t \rangle}, \end{equation} \begin{equation} \boldsymbol \Gamma_o^{\langle t \rangle} = \sigma(\boldsymbol M_o[\boldsymbol h_{prev}, \boldsymbol w_{t}] + \boldsymbol B_o), \end{equation} \begin{equation} \boldsymbol h^{\langle t \rangle} = \boldsymbol \Gamma_o^{\langle t \rangle} \odot tanh(\boldsymbol c^{\langle t \rangle}) \end{equation} where $\boldsymbol w$ is the word vector embedded in the input at time step `$t$' (for simplicity, we eliminate $t$), $\boldsymbol M_*$ represents the transformation matrix that is learned at each state, $\boldsymbol B_*$ are the biases, $\sigma$ shows the logistic sigmoid function, and $\odot$ is the product of the vectors' Hadamard transform. In our generation module, the attention vector $\boldsymbol \zeta_i$ from the sequence encoder output is used to set up the LSTM hidden state $\boldsymbol h$. Furthermore, we boost the standard LSTM functionality to generate more cohesive and relevant story-like sentences by integrating a {\em Mogrifier-LSTM} \cite{melis2019mogrifier}. The two inputs,~$\boldsymbol w$ and $\boldsymbol h_{prev}$, modulate each other in an odd and even fashion before being sent into the standard LSTM. In order to accomplish this goal, the {\em Mogrifier-LSTM} instead scales the columns of each of its weight matrices throughout $\boldsymbol M_*$ via {\em Mogrifier-LSTM} gated modulation. In formal terms, ~$\boldsymbol w$ is gated based on the previous step $\boldsymbol h_{prev}$ as gated input. A similar approach of gating prior time step output is used with the previous gated input. Following the completion of five rounds of mutual gating, as recommended by Malakan \textit{et al.} \cite{9647213}, the most highly indexed versions of $\boldsymbol w$ and $\boldsymbol h_{prev}$ are subsequently fed into the standard LSTM in the order shown in Figure \ref{method}. Therefore, it may also be stated as: {\em mogrification} $(\boldsymbol w, \boldsymbol c_{prev}, \boldsymbol h_{prev}) = LSTM(\boldsymbol w^{\uparrow}, \boldsymbol c_{prev}, \boldsymbol h_{prev}^{\uparrow})$ where $\boldsymbol w^{\uparrow}$ and $\boldsymbol h_{prev}^{\uparrow}$ are the most significant possible indexed for the LSTM inputs $\boldsymbol w^i$ and $\boldsymbol h_{prev}^i$ respectively. Mathematically, \begin{equation} \boldsymbol w^i = 2 \sigma (\boldsymbol M_{xh}^i \boldsymbol h_{prev}^{i-1}) \odot \boldsymbol w^{i-2}, \hspace{4mm} \text{\rm for~odd~} i \in [1,2,...,r], \end{equation} \vspace{-3mm} \begin{equation} \boldsymbol h_{prev}^i = 2 \sigma (\boldsymbol M_{hx}^i \boldsymbol w^{i-1}) \odot \boldsymbol h_{prev}^{i-2}, \text{\rm ~~for~even~} i \in [1,2,...,r], \end{equation} where Hadamard product is $\odot$, which $\boldsymbol w^{-1} = \boldsymbol w$, $\boldsymbol h^0_{prev} = \boldsymbol h_{prev} = \boldsymbol \zeta_i$ and $r$ represents the total number of mogrification rounds which is a mogrifier hyperparameter. In addition, the default standard LSTM configuration, with $r$ set to $0$, operates without gated mogrification at the input stage. The use of matrix multiplication with a constant of $2$ ensures that the resulting transformations of the matrices $\boldsymbol M_{xh}^i$ and $\boldsymbol M_{hx}^i$ are close to the identity matrix. \subsection{Data Pre-processing And Model Training} A vocab size of $6464$ was extracted from the Visual Story-Telling dataset (VIST) with a minimum word count threshold of 8. In addition, we used the size of $256$ as a dimension of word embedding vectors. Then, all VIST images are resized to $224$ $\times$ $224$ pixels from the original size and used as an input to the pre-trained Vision Transformer (ViT). For the training parameters, the Adam optimizer was used, and the learning rate was set at 0.001, while the weight decay was established at 1e-5. Also, a teacher-forcing strategy was utilized in our proposed model to help the model train faster. All of these settings were calibrated on our NVIDIA GPU, which has 12 GB of memory. For the maximum possible usage of available memory, the batch size was set to 8 during training. This ensured that we obtained the most out of the memory that was available to us. It's worth mentioning that greater GPU memory provides increased batch sizes, which assist the model to train faster. The model has been successfully trained for a total of 83 epochs utilizing about 390K steps. Finally, each epoch of our model was saved locally on our computer. Then, the optimum performance of the model was carefully chosen from epoch 59 since, after epoch 59, the model began to overfit the data and the loss error began to increase, resulting in decreased model accuracy. \section{Experiments and Results} First, we introduce the Visual Story-Telling dataset (VIST) used to evaluate our proposed model. Next, we discuss the results of our proposed model and compare them to other state of the art models. Finally, we give detailed analysis of a few cases in terms of the generated stories and the scores. \subsection{Dataset} \label{datadet} Visual Story-Telling dataset (VIST) \cite{huang2016visual}\footnote{https://visionandlanguage.net/VIST/} is the only publicly accessible dataset that we are aware for storytelling problems. It comprises 210,819 distinct images that can be found in 10,117 different albums on Flickr and is arranged in sets of five different images. Two types of stories accompany each set of images. One is called Description In Isolation (DII) and includes individual image descriptions that can be useful for research in image captioning. The second one is called Story In Sequence (SIS) which is more relevant to storytelling problems and comprises a whole paragraph in precisely five sentences representing a story. In all dataset statements, it is essential to note that the names of the individuals are adjusted by ``[male and female]", places by ``[location]", and organizations by ``[organization]". \subsection{Performance Comparison} Automatic evaluation metrics are the most common technique for estimating the effectiveness of the automatically generated story. Therefore, we validate our proposed model using automatic evaluation metrics, which also allows us to compare it to the current state-of-the-art methods. Table \ref{tableStateOfArt} displays the most recent frameworks used in storytelling challenges. These frameworks were published since 2018 and obtained promising results on the VIST dataset. We compare our proposed model using multiple evaluation metrics, which are: BLEU-1, BLEU-2, BLEU-3, BLEU-4, CIDEr, METEOR, and ROUGE-L. The script for computing the evaluation measures was released by \cite{hu2020makes}\footnote{https://github.com/JunjieHu/ReCo-RL}. From the experiments, we observe that our model performs better than the state-of-the-art models on all of the given evaluation measures, except for the BLEU-1, BLEU-4, and CIDEr. Table \ref{tableStateOfArt} presents the results for all of the mentioned models sorted by the year in which they were released. Overall, our proposed model outperforms the compared models by 0.3 points in BLUE-2, 1.1 points in BLUE-3, 0.7 points in ROUGE-L and 0.2 points in METEOR. \begin{table}[t] \caption{A comparison of our proposed model with the recently published methods on the Visual Story-Telling dataset (VIST). Quantitative results were obtained using seven different automated measures of evaluation. ``-" indicates that the authors of the corresponding study did not publish the results. The higher scores represent higher accuracy and the results in bold represent the best scores.} \label{tableStateOfArt} \resizebox{\textwidth}{!}{\begin{tabular}{|l|l|l|l|l|l|l|l|} \hline \textbf{Model} & \textbf{B-1} & \textbf{B-2} & \textbf{B-3} & \textbf{B-4} & \textbf{CIDEr} & \textbf{ROUGE-L} & \textbf{METEOR} \\ \hline \hline AREL 2018 \cite{wang2018no}& 0.536 & 0.315 & 0.173 & 0.099 & 0.038 & 0.286 & 0.352 \\ \hline GLACNet 2018 \cite{kim2018glac}& 0.56 & 0.321 & 0.171 & 0.091 & 0.041 & 0.264 & 0.306 \\ \hline HCBNet 2019 \cite{al2019hierarchical} & 0.59 & 0.348 & 0.191 & 0.105 & 0.051 & 0.274 & 0.34 \\ \hline HCBNet(w/o prev. sent. attention) \cite{al2019hierarchical}& 0.59 & 0.338 & 0.180 & 0.097 & 0.057 & 0.271 & 0.332 \\ \hline HCBNet(w/o description attention) \cite{al2019hierarchical} & 0.58 & 0.345 & 0.194 & 0.108 & 0.043 & 0.271 & 0.337 \\ \hline HCBNet(VGG) 2019 \cite{al2019hierarchical} & 0.59 & 0.34 & 0.186 & 0.104 & 0.051 & 0.269 & 0.334 \\ \hline ReCo-RL 2020 \cite{hu2020makes} & -& - & - & 0.124 & 0.086 & 0.299 & 0.339 \\ \hline BLEU-RL 2020 \cite{hu2020makes} & -& - & - & 0.144 & 0.067 & 0.301 & 0.352 \\ \hline VS with MPJA 2021 \cite{guo2021steganographic} & 0.601 & 0.325 & 0.133& 0.082 & 0.042 & 0.303 & 0.344 \\ \hline CAMT 2021 \cite{visapp21} & 0.64 & 0.361 & 0.201 & \textbf{0.184} & 0.042 & 0.303 & 0.335 \\ \hline Rand+RNN 2021 \cite{chen2021commonsense} & - & - & 0.133 & 0.061 & 0.022 & 0.272 & 0.311 \\ \hline SAES Encoder-Decoder OD 2021 \cite{9647213} & 0.64 & 0.363 & 0.196 & 0.106 & 0.051 & 0.294 & 0.330 \\ \hline SAES Encoder-Decoder OD \& Noun 2021 \cite{9647213} & 0.63 & 0.357 & 0.195 & 0.109 & 0.048 & 0.299 & 0.331 \\ \hline SAES Encoder OD 2021 \cite{9647213} & \textbf{0.65} & 0.372 & 0.204 & 0.12 & \textbf{0.054} & 0.303 & 0.335 \\ \hline \hline Our Proposed Model & 0.63 & \textbf{0.375} & \textbf{0.215} & 0.123 & 0.044 & \textbf{0.310} & \textbf{0.354} \\ \hline \end{tabular}} \end{table} \begin{figure} \includegraphics[width=\textwidth]{exp22.png} \caption{Examples of our generated stories in comparison to the CAMT model \cite{visapp21} and ground truth. Text highlighted in green indicates high relevance to the image/story, while text highlighted in yellow means that it is not highly relevant but instead contains general information. BLEU-1 (B-1), BLEU-2 (B-2), BLEU-3 (B-3), BLEU-4 (B-4), ROUGE (R), and METEOR (M) scores are shown below each story, with bold scores indicating the highest value.} \label{exp2} \end{figure} \subsection{Storytelling Example Analysis} Automatic metrics are not a perfect reflection of the accuracy of the stories. Therefore, we conducted an in-depth analysis of the stories produced by our proposed model and the ground truth. In addition, we compared our stories with stories produced by the recently proposed CAMT 2021 model \cite{visapp21}. Figure \ref{exp2} illustrates two different stories from a set of five images from our proposed model, followed by the stories that were Generated using CAMT. The highlighted text in green shows parts that are highly relevant to the story, while the highlighted text in yellow indicates less relevant or general information that is not obvious from the images. We also report the automatic evaluation metrics below each story in Fig. \ref{exp2}. \subsubsection{Text Generation Analysis:}Both selected models have shown a persuasive example of a narrative that is representative of how humans write a story, and both of these examples are captivating. In contrast to CAMT model, our proposed model is able to extract more useful information from each input image. For instance, the 3rd sentence in the first scenario shows more relevance to the story, i.e. ``they were so happy to be married," as compared to CAMT model which predicted a less relevant sentence ``they were very excited." In addition, we noticed that the third and the last sentences in the second examples, which are ``They were all smiling" and ``Everyone was happy to be at the event."; the two sentences do not relate to the image itself in any manner, and the information they provide seems to be generic and applicable to many images. On the other hand, our proposed model generated a story that was more logically consistent with the story and relevant to the images. \subsubsection{Generated Story Scores:}It is essential to demonstrate the model's performance in contrast with traditional automated evaluation metrics. Each set of images comes with a total of five different stories that were written by real people (\emph{i.e.}, ground truth), as mentioned in section \ref{datadet}. One of these stories was extracted randomly and removed from the collection. Next, we compared the story generated by our proposed model, CAMT model and the removed ground truth story (we name this Human Generated Story or HGS) with the rest of the four stories in the collection of VIST dataset. In BLEU-1, we found that our proposed model obtains the highest score on the second example, with almost 0.17 points more than HGS and 0.65 points more than the CAMT model; in BLEU-2, our generated story obtains over 0.14 points more than HGS and CAMT model; in BLEU-3, our model obtains 0.9 points more than the HGS and CAMT model in the first example, but the CAMT model receives 0.2 points more than ours and 0.16 points over the HGS in the second example; in BLEU-4, CAMT obtains almost 0.77 points more than our model and the HGS in the first example, while the HGS receives 0.74 points more than our model and 0.10 points over the CAMT model in the second example; in ROUGE-L, we reported that our model obtains almost 0.2 points more than both the HGS and the CAMT model in both examples; and in METEOR, we find that our model obtains almost 0.7 points more than both the HGS and the CAMT model in both examples. On the other hand, the performance of our proposed model is sufficiently high across practically all of the automated evaluation metrics, with the exception of BLEU-4, as is shown through Figure \ref{exp2}. \section{Conclusion} This article presented a novel storytelling approach for describing a set of images in a coherent manner. Our proposed framework is robust, which consists of a sequence encoder that receives multi-view image patches from Vision Transformer (ViT) as an input to a {\em Bidirectional-LSTM}, and a decoder with a standard LSTM enhanced by {\em Mogrifier-LSTM} that has five rounds of mogrifircation. Furthermore, we utilize an attention mechanism that enables our model to capture a specific significant context in response to a particular visual area while still keeping the more significant story context in mind. We found that our proposed model performs better on most of the automatic evaluation metrics than current state-of-the-art approaches except for BLEU-1, BLEU-4 and CIDEr scores. Additionally, we presented a comprehensive analysis of multiple examples, which indicated that our generated stories are more relevant and coherent. \subsubsection*{Acknowledgments:} This research received complete funding from the Australian Government, which was sponsored through the Australian Research Council (DP190102443). \bibliographystyle{splncs04}
\section{Introduction} \label{sec-1} Let $\Omega$ be a bounded domain in $\mathbb R^n$ ($n\ge 2$). In this work we aim to examine the inner relationship between weak and viscosity solutions to the following nonhomogeneous double phase equation \begin{equation} \label{main} -\dive (|Du|^{p-2}Du+a(x)|Du|^{q-2}Du)=f(x,u,Du) \quad \text{in } \Omega, \end{equation} where $1<p\leq q<\infty$, $a(x)\geq0$ and $f(x,\tau,\xi):\Omega\times\mathbb{R}\times\mathbb{R}^n\rightarrow\mathbb{R}$ is a continuous function. The double phase problems, stemming from the models of strongly anisotropic materials, were originally investigated by Zhikov \cite{Zhi86,Zhi93} and Marcellini \cite{Mar91} in the context of homogenization and Lavrentiev phenomenon. Over the last years, problems of the type considered in \eqref{main} have attracted intensive attention from the variational point of view, whose celebrated prototype is given by the following unbalanced energy functional $$ W^{1,1}(\Omega)\ni u\mapsto\mathcal{P}(u,\Omega):=\int_\Omega (|Du|^p+a(x)|Du|^q)\,dx. $$ The significant characteristics of this functional are that its ellipticity and growth rate will change drastically according to the modulating coefficient $a(\cdot)$ equal to 0 or not. The regularity of minimizers is determined via a delicate interaction between the growth conditions and the pointwise behaviour of $a(\cdot)$. For instance, under the hypotheses that \begin{equation} \label{2-0} 0\le a(\cdot)\in C^{0,\alpha}(\Omega), \alpha\in (0,1] \quad\text{and}\quad \frac{q}{p}\le1+\frac{\alpha}{n}, \end{equation} Colombo, Mingione {\it et. al.} \cite{CM15,BCM18,BCM15} established the gradient H\"{o}lder continuity and Harnack inequality for the minimizers of $\mathcal{P}$. A key feature of this problem is that the minimizers could be even discontinuous when condition \eqref{2-0} is violated, by means of the counterexamples presented in \cite{ELM04,FMM04}. For the double phase equation $$ -\dive (|Du|^{p-2}Du+a(x)|Du|^{q-2}Du)=-\dive (|F|^{p-2}F+a(x)|F|^{q-2}F) \quad \text{in } \Omega, $$ the Calder\'{o}n-Zygmund estimates of weak solutions were derived in \cite{CM16,DeFM} under the assumptions in \eqref{2-0} (see also \cite{BO17, BBO20}). More recently, De Filippis and Mingione \cite{DeFM21} considered a very large class of vector-valued nonautonomous variational problems involving integral functionals of the double phase type, where the authors provided a comprehensive treatment of Lipschitz regularity of solutions under sharp conditions. Despite their relatively short history, double phase problems have achieved very fruitful results with several connections to other aspects, such as the existence and multiplicity of solutions \cite{PRR20}, the nonlocal version \cite{DeFP19, FZ210}, the properties of eigenvalues and eigenfunctions \cite{CS16,PPR22}, and the removability and obstacle problems \cite{CDeF20,KL21}. We also refer to \cite{BDS20, DeFM22, FRZZ22, HJ22, L22, Mar21, MR21} and references therein for more results. The topic on equivalence of different solutions starts from the works of Lions \cite{Lions} and Ishii \cite{Ish95} on linear equations. For what concerns the quasilinear case, Juutinen, Lindqvist and Manfredi \cite{JLM01} proved that the weak solutions coincide with the viscosity solutions to $p$-Laplace equation and its parabolic version based on the uniqueness machinery of solutions; see \cite{JLP10} for $p(x)$-Laplace type equation. The equivalence of solutions was generalized to the fractional $p$-Laplace equation in \cite{KKP19} by following the analogous ideas. Julin and Juutinen \cite{JJ12} gave a more immediate proof for the equivalence of viscosity and weak solutions to the $p$-Laplace equation without relying on the comparison principle of viscosity solutions. They introduced a technical regularization process through infimal convolution, which was applied to various equations incorporating the normalized $p(x)$-Laplace equation \cite{Sil18}, the nonhomogeneous nonlocal $p$-Laplace equation \cite{BM21} and the normalized $p$-Possion equation \cite{APR17}. More related results can be found in \cite{MO19,Sil21,PV,MO22}. From the results mentioned above, we can see that the research achievements for the double phase problems mainly focus on the weak solutions from the variational perspective and there are few results concerning the relationship between viscosity and weak solutions for the general nonuniformly elliptic equations. In particular, De Filippis and Palatucci \cite{DeFP19} showed that the bounded viscosity solutions of the nonlocal counterpart to \eqref{main} are locally H\"{o}lder continuous. For the homogeneous case of \eqref{main}, the first and third authors \cite{FZ2020} demonstrated the equivalence between weak and viscosity solutions through introducing $\mathcal{A}_{H(\cdot)}$-harmonic functions that serve as a bridge. Motivated by the previous works \cite{DeFP19,FZ2020}, our intention in the present paper is to prove the equivalence of weak and viscosity solutions for the nonhomogeneous problem \eqref{main}. Due to the presence of lower-order term, we cannot introduce $\mathcal{A}_{H(\cdot)}$-harmonic functions any more and it is hard to use the full uniqueness machinery of viscosity solutions. To this end, we revisit the inf(sup)-convolution approximation, developed by \cite{JJ12}, to verify directly that weak solutions are equivalent to viscosity solutions under some proper preconditions. We are now in a position to state the main contributions of this manuscript. The first one is as follows: \begin{theorem} \label{thm1} Let $0<a(x)\in C^1(\Omega)$ and $\frac{q}{p}\le 1+\frac{1}{n}$ be in force. Suppose that $f(x,\tau,\xi)$ is uniformly continuous in $\Omega\times\mathbb{R}\times\mathbb{R}^n$, decreasing in $\tau$, Lipschitz continuous with respect to $\xi$ and fulfill the following growth condition \begin{equation} \label{0-2} |f(x,\tau,\xi)|\le \gamma(|\tau|)(|\xi|^{p-1}+a(x)|\xi|^{q-1})+\Phi(x), \end{equation} where $\gamma(\cdot)\ge0$ is continuous and $\Phi\in L^\infty_{\rm loc}(\Omega)$. Let $u$ be a viscosity supersolution with local Lipschitz continuity to \eqref{main} in $\Omega$. Then $u$ is a weak supersolution as well. \end{theorem} We would like to mention that the double phase operator, compared to the usual $p$-Laplace operator, lacks translation invariance property and exhibits two diverse growth terms owing to the presence of $a(x)$. It will lead to an additional error term $E(\varepsilon)$ in the key Lemma \ref{lem3-1} and demand an {\em a priori} assumption that the viscosity solution $u$ is locally Lipschictz continuous. The second result is about the local Lipschitz continuity of viscosity solutions, which is also of independent interest. \begin{theorem} \label{thm1-1} Let $u$ be a bounded viscosity solution to \eqref{main} in $\Omega$. Under the assumptions that $0\le a(x)\in C^1(\Omega)$, $p\le q\le p+\frac{1}{2}$ and \eqref{0-2}, for any $\Omega'\subset\subset\Omega$, there is a constant $C$ that depends on $n,p,q,\gamma_\infty,\Omega',\Omega,\|a\|_{C^1(\Omega)}$, $\|u\|_{L^\infty(\Omega)}$ and $\|\Phi\|_{L^\infty(\Omega)}$, such that $$ |u(x)-u(y)|\le C|x-y| $$ for all $x,y\in \Omega'$. Here $\gamma_\infty:=\max_{t\in[0,\|u\|_{L^\infty(\Omega)}]} \gamma(t)$. \end{theorem} In order to verify Theorem \ref{thm1-1}, we need to utilize the Ishii-Lions methods in \cite{IL90} twice, and adjust carefully the distance $q-p$ in order to get a contradiction. Combining the above two theorems yields that the bounded viscosity solutions are weak solutions with some explicit conditions. For showing weak solutions are viscosity solutions, we consider a class of functions satisfying comparison principle. \begin{definition} \label{0-1} Suppose that $u$ is a weak supersolution to \eqref{main} in $\Omega'\subset\Omega$. If for any weak subsolution $v$ of \eqref{main} such that $v\le u$ a.e. in $\partial\Omega'$ there holds that $v\le u$ a.e. in $\Omega'$, then we say that $(u,f)$ fulfills comparison principle property (CCP) in $\Omega'$. \end{definition} Finally, the weak solutions being viscosity solutions could be obtained under the (CCP) condition by contradiction argument. \begin{theorem} \label{thm2} Let $u$ be a lower semicontinuous weak supersolution to \eqref{main} in $\Omega$. Assume that $f(x,\tau,\xi)$ is uniformly continuous in $\Omega\times\mathbb{R}\times\mathbb{R}^n$. If (CPP) holds true, then $u$ is also a viscosity supersolution to \eqref{main}. \end{theorem} \begin{remark} When the nonlinear term $f$ only depends on $x$, not on $u$ and $\nabla u$, we know from \cite{DeFM21} that the weak solutions are locally Lipschitz continuous under the minimal hypotheses that $0\le a\in W^{1,d}(\Omega),d>n$, and $f$ belongs to a proper Lorentz space along with $q/p\le 1+1/n-1/d$, if $n>2$ and $q/p<p$, if $n=2$. \end{remark} This paper is organized as follows. We in Section \ref{sec-2} introduce some basic properties of function spaces and concepts of solutions as well as some necessary known results. Section \ref{sec-3} is devoted to proving that viscosity solutions are weak solutions to \eqref{main}, and the reverse implication is showed in Section \ref{sec-4}, where we also establish the comparison principle for two equations with different nonlinearities. In Section \ref{sec-5}, we verify the bounded viscosity solutions of \eqref{main} are locally Lipschitz continuous, which is the indispensable element of equivalence. \section{Preliminaries} \label{sec-2} In this section, we summarize some basic properties of Musielak-Orlicz-Sobolev space $W^{1,H(\cdot)}(\Omega)$. These properties can be found in \cite{CGSW21,HH19,Mus83}. In addition, we give the different notions of solutions to Eq. \eqref{main} together with some auxiliary results. \subsection{Function spaces} In the rest of this paper, unless otherwise stated, we always assume \eqref{2-0} holds. For all $x\in\Omega$ and $\xi\in \mathbb{R}^n$, we shall use the notation \begin{equation} \label{2-0-1} H(x,\xi):=|\xi|^p+a(x)|\xi|^q. \end{equation} With abuse of notation, we shall also denote $H(x,\xi)$ when $\xi\in\mathbb{R}$. Observe that the generalized Young function $H$ is a Musielak-Orlicz function fulfilling $(\Delta_2)$ and $(\nabla_2)$ conditions. Let us introduce some important properties, to be used later, of energy density $H$ given by \eqref{2-0-1}. We will keep on denoting $H(x,t)=t^p+a(x)t^q$ for $t\ge0$, that is, $\xi$ is a non-negative number in \eqref{2-0-1}. By the Fenchel-Young conjugate of $H$, we mean the function $H^*(x,t):=\sup_{s\ge0}\{st-H(x,s)\}$. It is well known that the equivalence \begin{equation} \label{2-0-2} H^*(x,H(x,t)/t)\sim H(x,t) \end{equation} holds up to some constants depending on $p,q$, and moreover the Young's inequality \begin{equation} \label{2-0-3} st\le H^*(x,t)+H(x,s) \end{equation} holds for all $x\in\Omega$, $s,t\in[0,+\infty)$. The Musielak-Orlicz space $L^{H(\cdot)}(\Omega)$ is defined as $$ L^{H(\cdot)}(\Omega):=\left\{u:\Omega\rightarrow \mathbb{R } \text{ measurable}:\varrho_H(u)<\infty\right\}, $$ endowed with the norm $$ \|u\|_{L^{H(\cdot)}(\Omega)}:=\inf\left\{\lambda>0:\varrho_H\left(\frac{u}{\lambda}\right)\leq1\right\}, $$ where $$\varrho_H(u):=\int_\Omega H(x,u)\,dx=\int_\Omega|u|^p+a(x)|u|^q\,dx$$ is called $\varrho_H$-modular. The space $L^{H(\cdot)}(\Omega)$ is a separable, uniformly convex Banach space. From the definitions of $\varrho_H$-modular and norm, we can find \begin{equation} \label{2-1} \min\left\{\|u\|^p_{L^{H(\cdot)}(\Omega)}, \|u\|^q_{L^{H(\cdot)}(\Omega)}\right\}\leq \varrho_H(u)\leq\max\left\{\|u\|^p_{L^{H(\cdot)}(\Omega)}, \|u\|^q_{L^{H(\cdot)}(\Omega)}\right\}. \end{equation} It follows from \eqref{2-1} that $$ \|u_n-u\|_{L^{H(\cdot)}(\Omega)}\rightarrow0 \quad \Longleftrightarrow \quad \varrho_H(u_n-u)\rightarrow0, $$ which indicates the equivalence of convergence in $\varrho_H$-modular and in norm. For the space $L^{H^*(\cdot)}(\Omega)$ we know that \begin{align} \label{2-1-1} \min\left\{\left(\varrho_{H^*}(u)\right)^\frac{p}{p+1},\left(\varrho_{H^*}(u)\right)^\frac{q}{q+1}\right\}&\leq \|u\|_{L^{H^*(\cdot)}(\Omega)} \nonumber\\ &\le\max\left\{\left(\varrho_{H^*}(u)\right)^\frac{p}{p+1},\left(\varrho_{H^*}(u)\right)^\frac{q}{q+1}\right\}. \end{align} If $u\in L^{H(\cdot)}(\Omega)$ and $v\in L^{H^*(\cdot)}(\Omega)$, the following H\"{o}lder inequality \begin{align} \label{2-1-2} \left|\int_\Omega uv\,dx\right|\le 2\|u\|_{L^{H(\cdot)}(\Omega)}\|v\|_{L^{H^*(\cdot)}(\Omega)} \end{align} holds. The Musielak-Orlicz-Sobolev space $W^{1,H(\cdot)}(\Omega)$ is the set of those functions $u\in L^{H(\cdot)}(\Omega)$ satisfying $Du\in L^{H(\cdot)}(\Omega)$. We equip the space $W^{1,H(\cdot)}(\Omega)$ with the norm $$ \|u\|_{W^{1,{H(\cdot)}}(\Omega)}:=\|u\|_{L^{H(\cdot)}(\Omega)}+\|Du\|_{L^{H(\cdot)}(\Omega)}. $$ The space $W^{1,H(\cdot)}(\Omega)$ is a separable and reflexible Banach space. The local space $W^{1,H(\cdot)}_{\rm loc}(\Omega)$ is composed of those functions belonging to $W^{1,H(\cdot)}(\Omega')$ for any subdomain $\Omega'$ compactly involved in $\Omega$. Finally, we denote by $W^{1,H(\cdot)}_0(\Omega)$ the closure of $C^{\infty}_0(\Omega)$ in $W^{1,H(\cdot)}(\Omega)$. Indeed, the condition \eqref{2-0} ensures that the set $C^\infty_0(\Omega)$ is dense in $W^{1,H(\cdot)}_0(\Omega)$ (see \cite{ELM04,ACGY18}). \subsection{Notions of solutions} Set $$ A(x,\xi):=|\xi|^{p-2}\xi+a(x)|\xi|^{q-2}\xi $$ for all $x\in \Omega$ and $\xi\in\mathbb{R}^n$. We now give the definition of solutions of diverse type to \eqref{main}. \begin{definition} [weak solution] \label{def2-1} We say that $u\in W^{1,H(\cdot)}_{\rm loc}(\Omega)$ is a weak superslotion to \eqref{main}, if $$ \int_\Omega\langle A(x,Du), D\phi\rangle\,dx\geq \int_\Omega f(x,u,Du) \phi\,dx $$ for each nonnegative function $\phi\in W^{1,H(\cdot)}_0(\Omega)$. The inequality is reverse for weak subsolution. When $u\in W^{1,H(\cdot)}_{\rm loc}(\Omega)$ is both weak super- and subsolution, we call $u$ a weak solution to \eqref{main}, that is $$ \int_\Omega\langle A(x,Du), D\phi\rangle\,dx=\int_\Omega f(x,u,Du) \phi\,dx $$ for any $\phi\in W^{1,H(\cdot)}_0(\Omega)$. \end{definition} Let $\xi,\eta\in\mathbb{R}^n, X\in \mathcal{S}^n$ with $\mathcal{S}^n$ being the set of symmetric $n\times n$ matrices. We introduce some notations $$ M(x,\xi)=a(x)|\xi|^{q-2}\left(I+(q-2)\frac{\xi}{|\xi|}\otimes\frac{\xi}{|\xi|}\right), $$ $$ F_1(\xi,X)=-|\xi|^{p-2}\left(\mathrm{tr}X+(p-2)\left\langle X\frac{\xi}{|\xi|},\frac{\xi}{|\xi|}\right\rangle\right), $$ $$ F_2(x,\xi,X)=-a(x)|\xi|^{q-2}\left(\mathrm{tr}X+(q-2)\left\langle X\frac{\xi}{|\xi|},\frac{\xi}{|\xi|}\right\rangle\right)=-\mathrm{tr}(M(x,\xi)X) $$ and $$ F_3(x,\xi)=-|\xi|^{q-2}\xi\cdot Da(x), $$ where $\xi\otimes\eta$ denotes an $n\times n$ matrix whose $(i,j)$ entry is $\xi_i\eta_j$, and $\langle \xi,\eta\rangle$ or $\xi\cdot\eta$ stands for the inner product of $\xi,\eta$. For a matrix $X$, we set the matrix norm $\|X\|:=\sup_{|\xi|\le1}\{|X\xi|\}$. In order to define the viscosity solutions of \eqref{main}, we let $a\in C^1(\Omega)$ and easily check that \begin{align} \label{double} -\dive(|Du|^{p-2}Du+a(x)|Du|^{q-2}Du)&=F_1(Du,D^2u)+F_2(x,Du,D^2u)+F_3(x,Du) \nonumber\\ &=:F(x,Du,D^2u). \end{align} We now recall the notion of semi-jets. The subjet of $u:\Omega\rightarrow\mathbb{R}$ at $x$ is given by letting $(\eta,X)\in J^{2,-}u(x)$ if $$ u(y)\ge u(x)+\eta\cdot(y-x)+\frac{1}{2}\langle X(y-x),(y-x)\rangle+\mathfrak{o}(|y-x|^2) $$ as $y\rightarrow x$. The closure of a subjet is defined by $(\eta,X)\in \overline{J}^{2,-}u(x)$ if there exists a sequence $(\eta_j,X_j)\in J^{2,-}u(x_j)$ such that $(x_j,\eta_j,X_j)\rightarrow(x,\eta,X)$. The superjet $J^{2,+}$ and its closure $\overline{J}^{2,+}$ are defined by a similar way but the above inequality needs to be converse. \begin{definition}[viscosity solution] \label{def2-3} A lower semicontinuous function $u:\Omega\rightarrow(-\infty,\infty)$ is a viscosity supersolution to \eqref{main} in $\Omega$, if $(\eta,X)\in J^{2,-}u(x)$ with $x\in\Omega$ and $\eta\neq0$ implies that $$ F(x,\eta,X)\ge f(x,u(x),\eta). $$ An upper semicontinuous function $u:\Omega\rightarrow(-\infty,\infty)$ is a viscosity subsolution to \eqref{main} in $\Omega$, if for each $(\eta,X)\in J^{2,+}u(x)$ with $x\in\Omega$ and $\eta\neq0$ there holds that $$ F(x,\eta,X)\le f(x,u(x),\eta). $$ A function $u$ is called viscosity solution to \eqref{main} if and only if it is viscosity super- and subsolution. \end{definition} \begin{remark} The preceding concept of viscosity solutions is equivalently given by the jet-closures or test functions. For instance, the following conditions are equivalent: \begin{itemize} \item[(1)] A function $u$ is a viscosity supersolution to \eqref{main} in $\Omega$; \smallskip \item[(2)] If $(\eta,X)\in \overline{J}^{2,-}u(x)$ with $x\in\Omega$ and $\eta\neq0$, then $F(x,\eta,X)\ge f(x,u(x),\eta)$; \smallskip \item[(3)] If $\varphi\in C^2(\Omega)$ touches $u$ from below at $x$, that is, $\varphi(x)=u(x), \varphi(y)\le u(y)$ and moreover $D\varphi(x)\neq0$, then we have $F(x,D\varphi(x),D^2\varphi(x))\ge f(x,u(x),D\varphi(x))$. \end{itemize} In the case $2\le p\leq q$, we can remove the requirement that $\eta\neq0$ or $D\varphi(x)\neq0$. \end{remark} \subsection{Inf-convolution} We now give the definition together with some properties of infimal convolution. Define the inf-convolution as \begin{equation*} u_\varepsilon(x)=\inf_{y\in\Omega} \left\{u(y)+\frac{|x-y|^s}{s\varepsilon^{s-1}}\right\}, \end{equation*} where $\varepsilon>0$ and $s\geq\max\left\{2,\frac{p}{p-1}\right\}$ is a constant to be fixed by the growth powers in Eq. \eqref{main}. Indeed, when $2\leq p\leq q$, $s=2$; when $1<p\leq q<2$, $s>\max\left\{\frac{p}{p-1},\frac{q}{q-1}\right\}=\frac{p}{p-1}$; when $1<p<2\leq q$, $s>\max\left\{\frac{p}{p-1},2\right\}=\frac{p}{p-1}$. The following well-known properties of the inf-convolution $u_\varepsilon$ can be found in much literature, such as \cite{JJ12,Sil18}. \begin{proposition} \label{pro2-1} Suppose that $u:\Omega\rightarrow\mathbb{R}$ is a bounded and lower semicontinuous function. Then the inf-convolution $u_\varepsilon$ satisfies the following properties: \begin{itemize} \item[(1)] $u_\varepsilon\leq u$ in $\Omega$ and $u_\varepsilon\rightarrow u$ locally uniformly as $\varepsilon\rightarrow0$. \smallskip \item[(2)] There is $r(\varepsilon)>0$ such that $$ u_\varepsilon(x)=\inf_{y\in{B_{r(\varepsilon)}(x)\cap\Omega}} \left\{u(y)+\frac{|x-y|^s}{s\varepsilon^{s-1}}\right\} $$ with $r(\varepsilon)\rightarrow0$ as $\varepsilon\rightarrow0$. In particular, if $x\in\Omega_{r(\varepsilon)}:=\{x\in\Omega:\mathrm{dist}(x,\partial\Omega)>r(\varepsilon)\}$, then there exists a point $x_\varepsilon\in B_{r(\varepsilon)}(x)$ fulfilling $$ u_\varepsilon(x)=u(x_\varepsilon)+\frac{|x-x_\varepsilon|^s}{s\varepsilon^{s-1}}. $$ \smallskip \item[(3)] The function $u_\varepsilon$ is semi-concave in $\Omega_{r(\varepsilon)}$, that is, we can find a constant $C$, depending only on $u, s$ and $\varepsilon$, such that the function $x\mapsto u_\varepsilon(x)-C|x|^2$ is concave. \smallskip \item[(4)] If $(\eta,X)\in J^{2,-}u_\varepsilon(x)$ with $x\in\Omega_{r(\varepsilon)}$, then we have $$ \eta=\frac{|x-x_\varepsilon|^{s-2}(x-x_\varepsilon)}{\varepsilon^{s-1}} \quad\text{and}\quad X\le \frac{s-1}{\varepsilon}|\eta|^\frac{s-2}{s-1}I. $$ \end{itemize} \end{proposition} \section{Viscosity solutions are weak solutions} \label{sec-3} In this part, we are going to make use of inf-convolution approximation technique to show that the locally Lipschitz continuous viscosity solutions are weak solutions to \eqref{main}. Furthermore, the Lipschitz continuity of viscosity solutions can be proved precisely, whose proof is postponed to Section \ref{sec-5}. We therefore draw a conclusion that viscosity solutions are weak solutions under some suitable conditions. We will only discuss viscosity and weak supersolutions below. The case of subsolution is similar. We begin with stating that if $u$ is a (local Lipschitz) viscosity supersolution to \eqref{main} in $\Omega$, then its inf-convolution $u_\varepsilon$ also is a viscosity supersolutions of such equation (whose form may be slightly changed) in a shrinking domain. From the following lemma, we can find that owing to the presence of modulating coefficient $a(x)$, there will exist an error term $E(\varepsilon)$ on the right-hand side of equation. In what follows, $X\le Y$ ($X,Y\in\mathcal{S}^n$) means that $\langle(X-Y)\xi,\xi\rangle\leq0$ for any $\xi\in \mathbb{R}^n$. We denote by $C$ a generic constant, which may vary from line to line. If necessary, relevant dependencies on parameters will be emphasised using parentheses. \begin{lemma} \label{lem3-1} Assume that $0<a(x)\in C^1(\Omega)$ and $f(x,\tau,\xi)$ is continuous in $\Omega\times\mathbb{R}\times\mathbb{R}^n$ and decreasing with respect to $\tau$. Let $u$ be a viscosity supersolution with local Lipschitz to \eqref{main} in $\Omega$. Then if $(\eta,X)\in J^{2,-}u_\varepsilon(x)$ with $\eta\neq0$ and $x\in\Omega_{r(\varepsilon)}$, there holds that \begin{equation} \label{3-1} F(x,\eta,X)\ge f_\varepsilon(x,u_\varepsilon(x),\eta)+E(\varepsilon), \end{equation} where $$ f_\varepsilon(x,\tau,\xi):=\inf_{y\in B_{r(\varepsilon)}(x)}f(y,\tau,\xi) $$ and $E(\varepsilon)\rightarrow0$ as $\varepsilon\rightarrow0$. \end{lemma} \begin{remark} It is worth mentioning that the requirement $a(x)>0$ is just needed in this lemma for the technical reason. \end{remark} \begin{proof} Let $x^o\in \Omega_{r(\varepsilon)}$ and $(\eta,X)\in J^{2,-}u_\varepsilon(x^o)$ with $\eta\neq0$. Then via the properties of inf-convolution $u_\varepsilon$ in Proposition \ref{pro2-1}, we have $$ u_\varepsilon(x^o)=u(x^o_\varepsilon)+\frac{|x^o-x^o_\varepsilon|^s}{s\varepsilon^{s-1}} $$ with $x^o_\varepsilon\in B_{r(\varepsilon)}(x^o)$, and moreover $\eta=\frac{|x^o-x^o_\varepsilon|^{s-2}}{\varepsilon^{s-1}}(x^o-x^o_\varepsilon)$. There is a function $\varphi\in C^2(\Omega)$ such that it touches $u_\varepsilon$ from below at $x^o$ and $D\varphi(x^o)=\eta, D^2\varphi(x^o)=X$. Hence by the definition of inf-convolution $u_\varepsilon$ we can see that $$ 0\leq u_\varepsilon(x)-\varphi(x)\le u(y)+\frac{|x-y|^s}{s\varepsilon^{s-1}}-\varphi(x) $$ for any $x,y\in \Omega_{r(\varepsilon)}$. Notice also that $$ u(x^o_\varepsilon)+\frac{|x^o-x^o_\varepsilon|^s}{s\varepsilon^{s-1}}-\varphi(x^o)=u_\varepsilon(x^o)-\varphi(x^o)=0. $$ Then the function $-u(y)+\varphi(x)-\frac{|y-x|^s}{s\varepsilon^{s-1}}$ attains the maximum at $(x^o_\varepsilon,x^o)$. Therefore, by applying theorem of sums in \cite{CIL92}, we can find $Y,Z\in\mathcal{S}^n$ satisfying $$ (-D_y\psi(x_\varepsilon^o,x^o),-Y)\in \overline{J}^{2,-}u(x_\varepsilon^o), \quad (D_x\psi(x_\varepsilon^o,x^o),-Z)\in \overline{J}^{2,+}\varphi(x^o) $$ and \begin{equation*} \left(\begin{array}{cc} Y & \\[2mm] &-Z \end{array} \right)\\ \leq D^2\psi(x_\varepsilon^o,x^o)+\varepsilon^{1-s}(D^2\psi(x_\varepsilon^o,x^o))^2, \end{equation*} where $\psi(y,x):=\frac{|y-x|^s}{s\varepsilon^{s-1}}$ and \begin{equation*} D^2\psi(x_\varepsilon^o,x^o)=\left(\begin{array}{cc} D_{yy}\psi(x_\varepsilon^o,x^o) &D_{yx}\psi(x_\varepsilon^o,x^o) \\[2mm] D_{xy}\psi(x_\varepsilon^o,x^o) &D_{xx}\psi(x_\varepsilon^o,x^o) \end{array}\right). \end{equation*} Via direct computation, $$ -D_y\psi(x_\varepsilon^o,x^o)=\eta=D_x\psi(x_\varepsilon^o,x^o) $$ and $$ B:=D_{yy}\psi(x_\varepsilon^o,x^o)=\varepsilon^{1-s}|x_\varepsilon^o-x^o|^{s-4}[|x_\varepsilon^o-x^o|^2I+(s-2)(x_\varepsilon^o-x^o)\otimes (x_\varepsilon^o-x^o)]. $$ Furthermore, \begin{equation} \label{3-2} \left(\begin{array}{cc} Y & \\[2mm] &-Z \end{array} \right)\\[2mm] \leq \left(\begin{array}{cc} B &-B\\[2mm] -B &B \end{array}\right)+2\varepsilon^{1-s}\left(\begin{array}{cc} B^2 &-B^2\\[2mm] -B^2 &B^2 \end{array}\right). \end{equation} It is straightforward to derive that $Y\leq Z$ and moreover $Z\le-X$. Since $u$ is a viscosity supersolution to \eqref{main} and $f$ is continuous in all variables, then \begin{align*} f(x_\varepsilon^o,u(x_\varepsilon^o),\eta)&\le F(x_\varepsilon^o,\eta,-Y)\\ &=F_1(\eta,Z)-F_1(\eta,Y)-F_1(\eta,Z)+F_2(x^o,\eta,Z)-F_2(x_\varepsilon^o,\eta,Y)\\ &\quad-F_2(x^o,\eta,Z)+F_3(x^o,\eta)+F_3(x^o_\varepsilon,\eta)-F_3(x^o,\eta)\\ &\le F(x^o,\eta,-Z)+F_2(x^o,\eta,Z)-F(x_\varepsilon^o,\eta,Y)+F_3(x^o_\varepsilon,\eta)-F_3(x^o,\eta) \end{align*} with the notations given in \eqref{double}, where in the last line we have used the decreasing property of $F_1(\xi,X)$ in the $X$-variable, that is, $Y\le Z$ implies $F_1(\eta,Z)\le F_1(\eta,Y)$. Next, in view of $a\in C^1(\Omega)$ we estimate \begin{align} \label{3-3} F_3(x^o_\varepsilon,\eta)-F_3(x^o,\eta)&=|\eta|^{q-2}\eta\cdot Da(x^o)-|\eta|^{q-2}\eta\cdot Da(x^o_\varepsilon) \nonumber\\ &\le |\eta|^{q-1}|Da(x^o)-Da(x^o_\varepsilon)| \nonumber\\ &\le |\eta|^{q-1}\omega(r(\varepsilon)), \end{align} where $\omega(\cdot)$ represents the modulus of continuity of $Da$. We finally evaluate the term $F_2(x^o,\eta,Z)-F_2(x_\varepsilon^o,\eta,Y)$ in a similar way to address $F_2(y_j,\eta_j,Y_j)-F_2(x_j,\eta_j,X_j)$ in \cite[Proposition 5.1]{FZ2020}. Observe that it follows from \eqref{3-2} that \begin{equation} \label{3-4} \langle \xi,Y\xi\rangle-\langle \zeta,Z\zeta\rangle\le \varepsilon^{1-s}\left[(s-1)|x^o_\varepsilon-x^o|^{s-2}+2(s-1)^2|x^o_\varepsilon-x^o|^{2(s-2)}\right]|x^o_\varepsilon-x^o|^2 \end{equation} with $\xi,\zeta\in\mathbb{R}^n$. We can easily verify the matrix $M(x,\xi)\ge0$ (positive semi-definite) as $a(x)\ge0$ so that it has matrix square root denoted by $M^\frac{1}{2}(x,\xi)$. Additionally, by $M^\frac{1}{2}_l(x,\xi)$ we mean the $l$-th column of $M^\frac{1}{2}(x,\xi)$. Then employing \eqref{3-4} and decomposition of matrix yields that \begin{align*} & \quad F_2(x^o,\eta,Z)-F_2(x_\varepsilon^o,\eta,Y)\\ &=\mathrm{tr}\left(M^\frac{1}{2}(x^o,\eta)M^\frac{1}{2}(x^o,\eta)Z\right)-\mathrm{tr}\left(M^\frac{1}{2}(x^o_\varepsilon,\eta)M^\frac{1}{2}(x^o_\varepsilon,\eta)Y\right)\\ &=\sum^n_{l=1}\left\langle M^\frac{1}{2}_l(x^o,\eta),Z M^\frac{1}{2}_l(x^o,\eta)\right\rangle- \sum^n_{l=1}\left\langle M^\frac{1}{2}_l(x^o_\varepsilon,\eta),YM^\frac{1}{2}_l(x^o_\varepsilon,\eta)\right\rangle\\ &\leq C\varepsilon^{1-s}|x^o_\varepsilon-x^o|^{s-2}\left\|M^\frac{1}{2}(x^o,\eta)-M^\frac{1}{2}(x^o_\varepsilon,\eta)\right\|^2_2\\ &\leq \frac{C\varepsilon^{1-s}|x^o_\varepsilon-x^o|^{s-2}}{\left(\lambda_{\mathrm{min}}\left(M^\frac{1}{2}(x^o,\eta)\right) +\lambda_{\mathrm{min}}\left(M^\frac{1}{2}(x^o_\varepsilon,\eta)\right)\right)^2}\|M(x^o,\eta)-M(x^o_\varepsilon,\eta)\|^2_2\\ &\le \frac{C\varepsilon^{1-s}|x^o_\varepsilon-x^o|^{s-2}|\eta|^{2(q-2)}|a(x^o)-a(x_\varepsilon^o)|^2}{|\eta|^{q-2}\left(\sqrt{a(x^o)}+\sqrt{a(x^o_\varepsilon)}\right)^2}, \end{align*} where $\lambda_{\mathrm{min}}(M)$ stands for the smallest eigenvalue of the matrix $M$. For more details of the above display can be found in \cite[Proposition 5.1]{FZ2020}. On the other hand, from the local Lipschitz continuity of $u$, $$ \frac{|x^o-x^o_\varepsilon|^s}{s\varepsilon^{s-1}}=u_\varepsilon(x^o)-u(x^o_\varepsilon)<u(x^o)-u(x^o_\varepsilon)\le C|x^o_\varepsilon-x^o|, $$ i.e., $$ |\eta|=\frac{|x^o-x^o_\varepsilon|^{s-1}}{\varepsilon^{s-1}}\le C. $$ By means of $a(x)\in C^1(\Omega)$, we proceed to treat \begin{align*} F_2(x^o,\eta,Z)-F_2(x_\varepsilon^o,\eta,Y)&\le \frac{C\varepsilon^{1-s}|x^o_\varepsilon-x^o|^{s-2}|\eta|^{q-2}|x^o-x_\varepsilon^o|^2}{\left(\sqrt{a(x^o)}+\sqrt{a(x^o_\varepsilon)}\right)^2}\\ &= \frac{C|\eta|^{q-1}|x^o-x_\varepsilon^o|}{\left(\sqrt{a(x^o)}+\sqrt{a(x^o_\varepsilon)}\right)^2}\\ &\le \frac{Cr(\varepsilon)}{\left(\sqrt{a(x^o)}+\sqrt{a(x^o_\varepsilon)}\right)^2}. \end{align*} Here we remark that if $a(x^o)=0$, then the quantity $\frac{|\eta|^{q-1}|x^o-x_\varepsilon^o|}{a(x^o_\varepsilon)}$ does not necessarily go to 0 as $\varepsilon\rightarrow0$, so the condition $a(x)>0$ is required. Besides, by the boundedness of $\eta$ the inequality \eqref{3-3} becomes $$ F_3(x^o_\varepsilon,\eta)-F_3(x^o,\eta)\le C\omega(r(\varepsilon)). $$ Since $f(x,\tau,\xi)$ is decreasing in $\tau$ and $u(x^o_\varepsilon)\le u_\varepsilon(x^o)$, $$ f(x^o_\varepsilon,u(x^o_\varepsilon),\eta)\ge f(x^o_\varepsilon,u_\varepsilon(x^o),\eta)\ge \inf_{y\in B_{r(\varepsilon)}(x^o)}f(y,u_\varepsilon(x^o),\eta). $$ Now define $$ E(\varepsilon):=C\omega(r(\varepsilon))+\frac{Cr(\varepsilon)}{\left(\sqrt{a(x^o)}+\sqrt{a(x^o_\varepsilon)}\right)^2}. $$ Consequently, we get $$ f_\varepsilon(x^o,u_\varepsilon(x^o),\eta)+E(\varepsilon)\le F(x^o,\eta,X) $$ with $E(\varepsilon)\rightarrow0$ as $\varepsilon\rightarrow0$. Here we have employed $F(x^o,\eta,X)\ge F(x^o,\eta,-Z)$ by $Z\le-X$ and the error term $E(\varepsilon)$ depends on $\varepsilon,n,p,q,a$ and the Lipschitz constant of $u$. The proof is now completed. \end{proof} Based on the preceding lemma, we further demonstrate that when $u$ is a viscosity supersolution to \eqref{main}, then the inf-convolution $u_\varepsilon$ is a weak supersolution of this equation up to a certain error term. Let $\Delta_\infty u=\langle Du,D^2uDu\rangle$ below. \begin{lemma} \label{lem3-2} Suppose that the assumptions on $a, f$ in Lemma \ref{lem3-1} are in force, and that $f(x,\tau,0)\le0$ for all $(x,\tau)\in \Omega\times\mathbb{R}$. Let $u$ be a locally Lipschitz continuous viscosity supersolution to \eqref{main}. Then, for each nonnegative function $\varphi\in W^{1,H(\cdot)}_0(\Omega_{r(\varepsilon)})$, it holds that $$ \int_{\Omega_{r(\varepsilon)}}\varphi f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)\,dx+E(\varepsilon)\int_{\{Du_\varepsilon\neq0\}}\varphi\,dx\leq \int_{\Omega_{r(\varepsilon)}}\langle A(x,Du_\varepsilon),D\varphi\rangle\,dx, $$ where $E(\varepsilon)\rightarrow0$, which is from Lemma \ref{lem3-1}, as $\varepsilon\rightarrow0$. \end{lemma} \begin{proof} It suffices to consider the nonnegative function $\varphi\in C^\infty_0(\Omega_{r(\varepsilon)})$, because the function space $C^\infty_0(\Omega_{r(\varepsilon)})$ is dense in $W^{1,H(\cdot)}_0(\Omega_{r(\varepsilon)})$. Owing to $u_\varepsilon$ being semi-concave, we can see by Proposition \ref{pro2-1} that $$ h(x):=u_\varepsilon(x)-C(s,\varepsilon,u)|x|^2 $$ is concave in $\Omega_{r(\varepsilon)}$. Let $\{h_j\}_j$ be a sequence of smooth concave functions, obtained from standard mollification, such that \begin{equation*} (h_j,Dh_j,D^2h_j)\rightarrow(h,Dh,D^2h) \quad \text{a.e. in } \Omega_{r(\varepsilon)}. \end{equation*} Additionally, we define $$ u_{\varepsilon,j}=h_j+C(s,\varepsilon,u)|x|^2 $$ and let $\delta\in(0,1)$. In this proof, the condition $0\le a(x)\in C^{0,1}(\Omega)$ is sufficient except applying Lemma \ref{lem3-1}. Now denote the standard mollification of $a$ as $a_j$. \textbf{Case 1.} $1<p\le q<2$. In this singular case, we first regularize the equation by adding a small $\delta>0$ as follows, and eventually pass to the limit as $\delta\rightarrow0$. Recalling that $u_{\varepsilon,j}$ and $a_j$ are smooth, we can calculate by integration by parts \begin{align} \label{3-5} &\quad\int_{\Omega_{r(\varepsilon)}}-\varphi\dive\left[(|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon,j}+a_j(x)(|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2} Du_{\varepsilon,j}\right]\,dx \nonumber\\ &=\int_{\Omega_{r(\varepsilon)}}\left\langle(|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon,j}+a_j(x)(|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2} Du_{\varepsilon,j},D\varphi\right\rangle\,dx. \end{align} We are ready to consider the limit as $j\rightarrow\infty$, and claim that \begin{align} \label{3-6} &\quad-\int_{\Omega_{r(\varepsilon)}}\varphi\dive\left[(|Du_{\varepsilon}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon}+a(x)(|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2} Du_{\varepsilon}\right]\,dx \nonumber\\ &\le\int_{\Omega_{r(\varepsilon)}}\left\langle(|Du_{\varepsilon}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon}+a(x)(|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2} Du_{\varepsilon},D\varphi\right\rangle\,dx. \end{align} It follows, from the Lipschitz continuity of $u_\varepsilon$ and $a$, that for some constant $M>0$ $$ \|Du_{\varepsilon,j}\|_{L^\infty(\rm supp\,\varphi)}, \ \|a_j\|_{L^\infty(\rm supp\,\varphi)},\ \|Da_j\|_{L^\infty(\rm supp\,\varphi)}\le M, \quad j=1,2,3,\cdots. $$ Thus we could apply the Lebesgue dominated convergence theorem to the integral at the right-hand side of \eqref{3-5}. On the other hand, via direct computation, \begin{align} \label{3-7} &\quad-\int_{\Omega_{r(\varepsilon)}}\varphi\dive\left[(|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon,j}+a_j(x)(|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2} Du_{\varepsilon,j}\right]\,dx \nonumber\\ &=-\int_{\Omega_{r(\varepsilon)}}\varphi(|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}\left(\Delta u_{\varepsilon,j}+\frac{p-2}{|Du_{\varepsilon,j}|^2+\delta}\Delta_\infty u_{\varepsilon,j}\right)\,dx \nonumber\\ &\quad-\int_{\Omega_{r(\varepsilon)}}\varphi a_j(|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2}\left(\Delta u_{\varepsilon,j}+\frac{q-2}{|Du_{\varepsilon,j}|^2+\delta}\Delta_\infty u_{\varepsilon,j}\right)\,dx \nonumber\\ &\quad-\int_{\Omega_{r(\varepsilon)}}\varphi (|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2}Du_{\varepsilon,j}\cdot Da_j\,dx. \end{align} Obviously, by the dominated convergence theorem, when $j\rightarrow\infty$, $$ \int_{\Omega_{r(\varepsilon)}}\varphi (|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2}Du_{\varepsilon,j}\cdot Da_j\,dx\rightarrow \int_{\Omega_{r(\varepsilon)}}\varphi (|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2}Du_{\varepsilon}\cdot Da\,dx. $$ Note that $h_j$ is concave. Then we have $D^2u_{\varepsilon,j}\leq C(s,\varepsilon,u)I$. For $Du_{\varepsilon,j}\neq0$, we arrive at \begin{align*} (|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}\left(\Delta u_{\varepsilon,j}+\frac{p-2}{|Du_{\varepsilon,j}|^2+\delta}\Delta_\infty u_{\varepsilon,j}\right)\le C(s,\varepsilon,u)\delta^\frac{p-2}{2}(2n+p-2) \end{align*} and \begin{align*} a_j(x)(|Du_{\varepsilon,j}|^2+\delta)^\frac{q-2}{2}\left(\Delta u_{\varepsilon,j}+\frac{q-2}{|Du_{\varepsilon,j}|^2+\delta}\Delta_\infty u_{\varepsilon,j}\right)\le MC(s,\varepsilon,u)\delta^\frac{q-2}{2}(2n+q-2). \end{align*} For $Du_{\varepsilon,j}=0$, the case becomes easier. Therefore, we can exploit Fatou's lemma to the display \eqref{3-7}, and further justify \eqref{3-6}. Next, we shall let $\delta\rightarrow0$ in the inequality \eqref{3-6}. It follows from the dominated convergence theorem that, when $\delta$ goes to 0, \begin{equation*} \begin{split} &\quad\int_{\Omega_{r(\varepsilon)}}\left\langle(|Du_{\varepsilon}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon}+a(x)(|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2} Du_{\varepsilon},D\varphi\right\rangle\,dx\\ &\rightarrow\int_{\Omega_{r(\varepsilon)}}\left\langle|Du_{\varepsilon}|^{p-2}Du_{\varepsilon}+a(x)|Du_{\varepsilon}|^{q-2} Du_{\varepsilon},D\varphi\right\rangle\,dx. \end{split} \end{equation*} Besides, we show that the integrand at the left-hand side of \eqref{3-6} is bounded from below, which can justify the use of Fatou's lemma. If $Du_\varepsilon=0$, this follows immediately from the inequality (see Proposition \ref{pro2-1}) $$ D^2u_\varepsilon\le \frac{s-1}{\varepsilon}|Du_\varepsilon|^\frac{s-2}{s-1}I. $$ In other words, since $s>2$, then $D^2u_\varepsilon$ is negative semi-definite when $Du_\varepsilon=0$. If $Du_\varepsilon\neq0$, we will find that \begin{align*} &\quad -(|Du_{\varepsilon}|^2+\delta)^\frac{p-2}{2}\left(\Delta u_{\varepsilon}+\frac{p-2}{|Du_{\varepsilon}|^2+\delta}\Delta_\infty u_{\varepsilon}\right)\\ &\ge -\frac{(|Du_{\varepsilon}|^2+\delta)^\frac{p-2}{2}}{|Du_{\varepsilon}|^2+\delta}\frac{s-1}{\varepsilon}\left(|Du_\varepsilon|^{\frac{s-2}{s-1}+2}(n+p-2) +\delta n|Du_\varepsilon|^\frac{s-2}{s-1}\right)\\ &\ge -|Du_\varepsilon|^{\frac{s-2}{s-1}+p-2}\frac{s-1}{\varepsilon}(2n+p-2)\\ &\ge -\|Du_\varepsilon\|^{\frac{s-2}{s-1}+p-2}_{L^\infty(\Omega_{r(\varepsilon)})}\frac{s-1}{\varepsilon}(2n+p-2), \end{align*} where in the last inequality we need to recall the local Lipschitz continuity of $u_\varepsilon$ and $s>\frac{p}{p-1}$. Likewise, \begin{align*} &\quad -a(x)(|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2}\left(\Delta u_{\varepsilon}+\frac{q-2}{|Du_{\varepsilon}|^2+\delta}\Delta_\infty u_{\varepsilon}\right)\\ &\ge -\|a\|_{L^\infty(\Omega_{r(\varepsilon)})}\|Du_\varepsilon\|^{\frac{s-2}{s-1}+q-2}_{L^\infty(\Omega_{r(\varepsilon)})}\frac{s-1}{\varepsilon}(2n+q-2). \end{align*} Here we note $s>\frac{p}{p-1}\ge \frac{q}{q-1}$. Moreover, we have $$ \left|(|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2}Du_{\varepsilon}\cdot Da\right|\le \|Da\|_{L^\infty(\Omega_{r(\varepsilon)})}\|Du_\varepsilon\|^{q-1}_{L^\infty(\Omega_{r(\varepsilon)})}. $$ On the other hand, we know that $(Du_\varepsilon(x),D^2u_\varepsilon(x))\in J^{2,-}u_\varepsilon(x)$ for almost every $x\in\Omega_{r(\varepsilon)}$. Then by means of Lemma \ref{lem3-1} we deduce \begin{equation} \label{3-8} F(x,Du_\varepsilon(x),D^2u_\varepsilon(x))\ge f_\varepsilon(x,u_\varepsilon(x),Du_\varepsilon(x))+E(\varepsilon) \end{equation} in $\{x\in\Omega_{r(\varepsilon)}:Du_\varepsilon\neq0\}$. As a consequence, exploiting Fatou's lemma along with observing that $D^2u_\varepsilon$ is negative semi-definite when $Du_\varepsilon=0$, we derive from \eqref{3-6} that \begin{align} \label{3-9} &\quad \int_{\Omega_{r(\varepsilon)}}\left\langle|Du_{\varepsilon}|^{p-2}Du_{\varepsilon}+a(x)|Du_{\varepsilon}|^{q-2} Du_{\varepsilon},D\varphi\right\rangle\,dx \nonumber\\ &\ge \liminf_{\delta\rightarrow0}\left[\int_{\{Du_\varepsilon\neq0\}}+\int_{\{Du_\varepsilon=0\}}-\varphi (|Du_{\varepsilon}|^2+\delta)^\frac{p-2}{2}\left(\Delta u_{\varepsilon}+\frac{p-2}{|Du_{\varepsilon}|^2+\delta}\Delta_\infty u_{\varepsilon}\right)\,dx\right] \nonumber\\ &\quad+\liminf_{\delta\rightarrow0}\left[\int_{\{Du_\varepsilon\neq0\}}+\int_{\{Du_\varepsilon=0\}}-\varphi a(x) (|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2}\left(\Delta u_{\varepsilon}+\frac{q-2}{|Du_{\varepsilon}|^2+\delta}\Delta_\infty u_{\varepsilon}\right)\,dx\right] \nonumber\\ &\quad+\liminf_{\delta\rightarrow0}\left[\int_{\{Du_\varepsilon\neq0\}}+\int_{\{Du_\varepsilon=0\}}-\varphi (|Du_{\varepsilon}|^2+\delta)^\frac{q-2}{2}Du_{\varepsilon}\cdot Da\,dx\right] \nonumber\\ &\ge \int_{\{Du_\varepsilon\neq0\}}-\varphi |Du_{\varepsilon}|^{p-2}\left(\Delta u_{\varepsilon}+\frac{p-2}{|Du_{\varepsilon}|^2}\Delta_\infty u_{\varepsilon}\right)\,dx \nonumber\\ &\quad+\int_{\{Du_\varepsilon\neq0\}}-\varphi a(x) |Du_{\varepsilon}|^{q-2}\left(\Delta u_{\varepsilon}+\frac{q-2}{|Du_{\varepsilon}|^2}\Delta_\infty u_{\varepsilon}\right)\,dx \nonumber\\ &\quad+\int_{\{Du_\varepsilon\neq0\}}-\varphi |Du_{\varepsilon}|^{q-2}Du_\varepsilon\cdot Da\,dx \nonumber\\ &=\int_{\{Du_\varepsilon\neq0\}}\varphi F(x,Du_\varepsilon,D^2u_\varepsilon)\,dx \nonumber\\ &\ge \int_{\{Du_\varepsilon\neq0\}}\varphi f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)\,dx+E(\varepsilon)\int_{\{Du_\varepsilon\neq0\}}\varphi\,dx \nonumber\\ &\ge\int_{\Omega_{r(\varepsilon)}}\varphi f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)\,dx+E(\varepsilon)\int_{\{Du_\varepsilon\neq0\}}\varphi\,dx, \end{align} where in the penultimate line we employed the inequality \eqref{3-8}, and in the last line we used the assumption that $f(x,\tau,0)\le0$. \textbf{Case 2.} $1<p<2\leq q$. We need to substitute the identity \eqref{3-5} with \begin{align*} &\quad\int_{\Omega_{r(\varepsilon)}}-\varphi\dive\left[(|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon,j}+a_j(x)|Du_{\varepsilon,j}|^{q-2} Du_{\varepsilon,j}\right]\,dx \nonumber\\ &=\int_{\Omega_{r(\varepsilon)}}\left\langle(|Du_{\varepsilon,j}|^2+\delta)^\frac{p-2}{2}Du_{\varepsilon,j}+a_j(x)|Du_{\varepsilon,j}|^{q-2} Du_{\varepsilon,j},D\varphi\right\rangle\,dx, \end{align*} since the $q$-growth term does not have singularity so that it is not necessarily regularized as the $p$-growth term. Then the subsequent processes are analogous to Case 1. \textbf{Case 3.} $2\le p\leq q$. In this non-singular scenario, we replace the display \eqref{3-5} by \begin{align*} &\quad\int_{\Omega_{r(\varepsilon)}}-\varphi\dive\left[|Du_{\varepsilon,j}|^{p-2}Du_{\varepsilon,j}+a_j(x)|Du_{\varepsilon,j}|^{q-2} Du_{\varepsilon,j}\right]\,dx \nonumber\\ &=\int_{\Omega_{r(\varepsilon)}}\left\langle|Du_{\varepsilon,j}|^{p-2}Du_{\varepsilon,j}+a_j(x)|Du_{\varepsilon,j}|^{q-2} Du_{\varepsilon,j},D\varphi\right\rangle\,dx. \end{align*} The other procedures are also similar to Case 1, even more straightforward due to the absence of $\delta$. All in all, we finally deduce the desired result. \end{proof} In the previous lemma, in order to get the inequality \eqref{3-9}, $f(x,\tau,0)$ is {\em a priori} assumed to be non-positive. The forthcoming lemma states this hypotheses exactly can be realized when $Du_\varepsilon=0$. \begin{lemma} \label{lem3-3} Let $u$ be a bounded viscosity supersolution to \eqref{main} in $\Omega$. Let also $0\le a(x)\in C^1(\Omega)$ and the function $f(x,\tau,\xi)$ be continuous in all variables. Whenever $Du_\varepsilon(\hat{x})=0$ for some $\hat{x}\in \Omega_{r(\varepsilon)}$, we have $$ f_\varepsilon(\hat{x},u_\varepsilon(\hat{x}),Du_\varepsilon(\hat{x}))\le 0. $$ \end{lemma} \begin{proof} We have known by \cite[Lemma 4.3]{JJ12} that if $Du_\varepsilon(\hat{x})=0$, then $$ u_\varepsilon(\hat{x})=u(\hat{x}). $$ From the definition of inf-convolution, $$ u(\hat{x})\le u(y)+\frac{|\hat{x}-y|^s}{s\varepsilon^{s-1}} \quad\text{for all } y\in\Omega. $$ Now introduce an auxiliary function $$ \phi(y)=u(\hat{x})-\frac{|\hat{x}-y|^s}{s\varepsilon^{s-1}} \quad\text{with } y\in\Omega, $$ where $s=2$ if $p\ge2$, and $s>\max\left\{\frac{p}{p-1},\frac{q}{q-1}\right\}=\frac{p}{p-1}$ if $1<p<2$. We can apparently see that $$ \phi\in C^2(\Omega), \ D\phi(\hat{x})=0, \ D\phi(y)\neq0 \quad \text{for } y\neq \hat{x}, $$ and $\phi$ touches $u$ from below at $\hat{x}$. For the case $s>2$ (i.e., $1<p<2$), we next evaluate some important quantities, $$ D\phi=\varepsilon^{1-s}|\hat{x}-y|^{s-2}(\hat{x}-y),\ D^2\phi=-\varepsilon^{1-s}|\hat{x}-y|^{s-2}\left(I+(s-2)\frac{\hat{x}-y}{|\hat{x}-y|}\otimes\frac{\hat{x}-y}{|\hat{x}-y|}\right) $$ and $$ \mathrm{tr}D^2\phi=-(n+s-2)\varepsilon^{1-s}|\hat{x}-y|^{s-2}, \ \left\langle\frac{D\phi}{|D\phi|},D^2\phi\frac{D\phi}{|D\phi|}\right\rangle=-(s-1)\varepsilon^{1-s}|\hat{x}-y|^{s-2}. $$ Combining these quantities leads to \begin{align*} &\quad\dive(|D\phi|^{p-2}D\phi+a(y)|D\phi|^{p-2}D\phi)\\ &=\Delta_p\phi+a(y)\Delta_q\phi+|D\phi|^{p-2}D\phi\cdot Da(y)\\ &=-(n+(p-1)(s-1)-1)\varepsilon^{(1-s)(p-1)}|\hat{x}-y|^{(s-1)(p-1)-1}\\ &\quad-a(y)(n+(q-1)(s-1)-1)\varepsilon^{(1-s)(q-1)}|\hat{x}-y|^{(s-1)(q-1)-1}\\ &\quad+\varepsilon^{(1-s)(q-1)}|\hat{x}-y|^{(s-1)(q-1)-1}(\hat{x}-y)\cdot Da(y). \end{align*} Observe that $s>\max\left\{\frac{p}{p-1},\frac{q}{q-1}\right\}$, which implies that $$ (s-1)(p-1)-1>0 \quad \textmd{and} \quad (s-1)(q-1)-1>0. $$ Thereby, $$ \lim_{r\rightarrow0}\sup_{y\in B_r(\hat{x})\setminus\{\hat{x}\}}(-\dive(|D\phi|^{p-2}D\phi+a(y)|D\phi|^{p-2}D\phi))=0. $$ As for $s=2$ (i.e., $p\ge 2$), the previous identity is valid obviously. Because $u$ is a viscosity supersolution of \eqref{main}, there holds that $$ \lim_{r\rightarrow0}\sup_{y\in B_r(\hat{x})\setminus\{\hat{x}\}}(-\dive(|D\phi|^{p-2}D\phi+a(y)|D\phi|^{p-2}D\phi))\ge f(\hat{x},u(\hat{x}),D\phi(\hat{x})). $$ Recalling that $u(\hat{x})=u_\varepsilon(\hat{x})$, $Du_\varepsilon(\hat{x})=0=D\phi(\hat{x})$, we obtain, from the above two displays, $$ 0\ge f(\hat{x},u_\varepsilon(\hat{x}),Du_\varepsilon(\hat{x}))\ge f_\varepsilon(\hat{x},u_\varepsilon(\hat{x}),Du_\varepsilon(\hat{x})), $$ as desired. \end{proof} Next, we show the convergence of inf-convolution $u_\varepsilon$ in the Musielak-Orlicz-Sobolev space $W^{1,H(\cdot)}(\Omega)$ in the following two lemmas. \begin{lemma} \label{lem3-4} Under \eqref{0-2} and the preconditions of Lemma \ref{lem3-1}, we infer that the function $u\in W^{1,H(\cdot)}_{\rm loc}(\Omega)$ and, up to a subsequence, $Du_\varepsilon\rightarrow Du$ weakly in $L^{H(\cdot)}(\Omega')$ for every $\Omega'\subset\subset\Omega$. \end{lemma} \begin{proof} Take a cut-off function $\psi\in C^\infty_0(\Omega)$ fulfilling $\psi\equiv1$ in $\Omega'$ and $0\le\psi\le1$ in $\Omega$. Set $\varepsilon$ so small that $\mathrm{supp}\,\psi=:E\subset\Omega_{r(\varepsilon)}$. Notice that $u_\varepsilon\rightarrow u$ locally uniformly in $\Omega$, so we can define a test function $$ \varphi:=(K-u_\varepsilon)\psi^q(\ge0) $$ with $K:=\sup_{\varepsilon;\, x\in \Omega'}|u_\varepsilon(x)|$ (finite). Hence, utilizing Lemma \ref{lem3-2}, \begin{align*} &\quad \int_{\Omega_{r(\varepsilon)}}\varphi f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)\,dx+E(\varepsilon)\int_{\Omega_{r(\varepsilon)}\setminus\{Du_\varepsilon=0\}}\varphi\,dx\\ &\leq \int_{\Omega_{r(\varepsilon)}}\langle |Du_\varepsilon|^{p-2}Du_\varepsilon+a(x)|Du_\varepsilon|^{q-2}Du_\varepsilon,D\varphi\rangle\,dx\\ &=\int_{\Omega_{r(\varepsilon)}}q\psi^{q-1}(K-u_\varepsilon)\langle |Du_\varepsilon|^{p-2}Du_\varepsilon+a(x)|Du_\varepsilon|^{q-2}Du_\varepsilon,D\psi\rangle\,dx\\ &\quad-\int_{\Omega_{r(\varepsilon)}}\psi^q H(x,Du_\varepsilon)\,dx. \end{align*} Namely, \begin{align*} \int_{\Omega_{r(\varepsilon)}}\psi^q H(x,Du_\varepsilon)\,dx&\leq q\int_{\Omega_{r(\varepsilon)}}\psi^{q-1}(K-u_\varepsilon) (|Du_\varepsilon|^{p-1}+a(x)|Du_\varepsilon|^{q-1})|D\psi|\,dx\\ &\quad+\int_{\Omega_{r(\varepsilon)}}\varphi |f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)|\,dx+|E(\varepsilon)|\int_{\Omega_{r(\varepsilon)}}\varphi\,dx\\ &=:I_1+I_2+I_3. \end{align*} Noting $q-1\ge \frac{q(p-1)}{p}$, $0\le \psi\le1$ and applying Young's inequality with $\epsilon$, we have \begin{equation*} \begin{split} I_1&\le q\int_{\Omega_{r(\varepsilon)}}(K-u_\varepsilon)|D\psi|\psi^\frac{q(p-1)}{p}|Du_\varepsilon|^{p-1}+a(x)(K-u_\varepsilon)|D\psi|\psi^{q-1}|Du_\varepsilon|^{q-1}\,dx\\ &\le \epsilon\int_{\Omega_{r(\varepsilon)}}\psi^qH(x,Du_\varepsilon)\,dx+C(q,\epsilon)\int_{\Omega_{r(\varepsilon)}}H(x,(K-u_\varepsilon)|D\psi|)\,dx. \end{split} \end{equation*} In view of the growth condition on $f$, we can deal with $I_2$ as \begin{align*} I_2&\le \int_{\Omega_{r(\varepsilon)}}(K-u_\varepsilon)\psi^q \gamma_\infty(|Du_\varepsilon|^{p-1}+a(x)|Du_\varepsilon|^{q-1})+(K-u_\varepsilon)\psi^q\Phi\,dx\\ &\le\epsilon\int_{\Omega_{r(\varepsilon)}}\psi^qH(x,Du_\varepsilon)\,dx+C(\gamma_\infty,\epsilon)\int_{\Omega_{r(\varepsilon)}}\psi^qH(x,K-u_\varepsilon)\,dx +C(K,\|\Phi\|_{L^\infty(E)},E). \end{align*} Here $\gamma_\infty:=\max_{\tau\in[0,K]}\gamma(\tau)$. For $I_3$, we have $$ I_3\le C(K,E), $$ where we assume $|E(\varepsilon)|\le 1$ without loss of generality. Choosing proper $\epsilon\in(0,1)$ and merging these above estimates yields that $$ \int_{\Omega'}H(x,Du_\varepsilon)\,dx\le \int_{\Omega_{r(\varepsilon)}}\psi^qH(x,Du_\varepsilon)\,dx\le C(p,q,a,K,\gamma,\Phi,D\psi,E). $$ This indicates that $Du_\varepsilon$ is uniformly bounded in $L^{H(\cdot)}(\Omega')$ with respect to $\varepsilon$, which further deduces that there exists a function $Du\in L^{H(\cdot)}(\Omega')$ such that $Du_\varepsilon\rightarrow Du$ weakly in $L^{H(\cdot)}(\Omega')$ up to a subsequence owing to $L^{H(\cdot)}(\Omega')$ being a reflexible Banach space. Finally, $u$ belongs to $W^{1,H(\cdot)}(\Omega')$ with $Du$ as its weak derivative. \end{proof} \begin{lemma} \label{lem3-5} With \eqref{0-2} and the hypotheses of Lemma \ref{lem3-1}, we arrive at $u_\varepsilon\rightarrow u$ as $\varepsilon\rightarrow0$, up to a subsequence, in $W^{1,H(\cdot)}(\Omega')$ for each $\Omega'\subset\subset\Omega$. \end{lemma} \begin{proof} Take a cut-off function $\psi\in C^\infty_0(\Omega)$ satisfying $\psi\equiv1$ in $\Omega'$ and $0\le\psi\le1$ in $\Omega$. Let $\varepsilon$ so small that $\mathrm{supp}\,\psi=:E\subset\Omega_{r(\varepsilon)}$. Notice that $u_\varepsilon\le u$ in $\Omega$, so we define a test function $$ \varphi:=(u-u_\varepsilon)\psi(\ge0). $$ It is easy to find that $\varphi\in W^{1,H(\cdot)}_0(\Omega_{r(\varepsilon)})$. Employing again Lemma \ref{lem3-2} obtains \begin{align*} &\quad\int_{\Omega_{r(\varepsilon)}}\langle A(x,Du)-A(x,Du_\varepsilon),D\varphi\rangle\,dx\\ &\le \int_{\Omega_{r(\varepsilon)}}\langle A(x,Du),D\varphi\rangle\,dx+\int_{\Omega_{r(\varepsilon)}}\varphi|f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)|\,dx+|E(\varepsilon)|\int_{\Omega_{r(\varepsilon)}}\varphi\,dx. \end{align*} After manipulation, we get \begin{align*} &\quad\int_{\Omega_{r(\varepsilon)}}\langle A(x,Du)-A(x,Du_\varepsilon),Du-Du_\varepsilon\rangle\psi\,dx\\ &\le \int_E\psi\langle A(x,Du),Du-Du_\varepsilon\rangle\,dx+\int_E(u-u_\varepsilon)\langle A(x,Du_\varepsilon),D\psi\rangle\,dx\\ &\quad+\int_E\psi(u-u_\varepsilon)|f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)|\,dx+|E(\varepsilon)|\int_E(u-u_\varepsilon)\psi\,dx\\ &=J_1+J_2+J_3+J_4. \end{align*} For $J_2$, via the inequalities \eqref{2-0-2} and \eqref{2-0-3}, we derive \begin{align*} J_2&\le \|u-u_\varepsilon\|_{L^\infty(E)}\int_E|A(x,Du_\varepsilon)||D\psi|\,dx\\ &\le C\|u-u_\varepsilon\|_{L^\infty(E)}\int_EH^*(x,|A(x,Du_\varepsilon)|)+H(x,|D\psi|)\,dx\\ &\le C\|u-u_\varepsilon\|_{L^\infty(E)}\int_EH(x,|Du_\varepsilon|)+H(x,|D\psi|)\,dx. \end{align*} Using the growth assumption on $f$ and Young's inequality leads to \begin{align*} J_3&\le \|u-u_\varepsilon\|_{L^\infty(E)}\int_E\gamma_\infty(|Du_\varepsilon|^{p-1}+a(x)|Du_\varepsilon|^{q-1})+\Phi\,dx\\ &\le C\|u-u_\varepsilon\|_{L^\infty(E)}\left[\int_EH(x,|Du_\varepsilon|)\,dx+(1+\|\Phi\|_{L^\infty(E)})|E|\right], \end{align*} where $\gamma_\infty$ is the same as that in Lemma \ref{lem3-4}. As for $J_4$, $$ J_4\le|E(\varepsilon)|\|u-u_\varepsilon\|_{L^\infty(E)}|E|. $$ Recalling that $Du_\varepsilon\rightarrow Du$ weakly in $L^{H(\cdot)}(E)$ in Lemma \ref{lem3-4} and $u_\varepsilon\rightarrow u$ locally uniformly in Proposition \ref{pro2-1}, we know $J_1+J_2+J_3+J_4$ tends to 0. In other words, $$ \lim_{\varepsilon\rightarrow0}\int_{\Omega'}\langle A(x,Du)-A(x,Du_\varepsilon),Du-Du_\varepsilon\rangle\,dx=0. $$ Following the calculations in \cite[page 9]{FZ2020}, we further arrive at $$ \lim_{\varepsilon\rightarrow0}\int_{\Omega'}H(x,Du-Du_\varepsilon)\,dx=0, $$ which implies the desired result. \end{proof} Finally, we end this section by verifying that the locally Lipschitz continuous viscosity supersolutions to \eqref{main} are also weak supersolutions, as stated in Theorem \ref{thm1}. We next intend to apply the previous convergence results to pass to the limit in the display of Lemma \ref{lem3-2}. \bigskip \noindent\textbf{Proof of Theorem \ref{thm1}.} Let $\varphi\in C^\infty_0(\Omega)$ be a nonnegative test function and set an open $\Omega'\subset\subset\Omega$ such that $\mathrm{supp}\,\varphi\subset\Omega'$. Fix a sufficiently small $\varepsilon_0>0$ fulfilling $\Omega'\subset\Omega_{r(\varepsilon)}$ for $0<\varepsilon<\varepsilon_0$. Now we want to show \begin{equation} \label{3-10} \int_\Omega\langle |Du|^{p-2}Du+a(x)|Du|^{q-2}Du,D\varphi\rangle\,dx\ge\int_\Omega\varphi f(x,u,Du)\,dx, \end{equation} which is the definition of weak supersolution of \eqref{main}. This desired claim shall follow through Lemma \ref{lem3-2}, once the forthcoming displays are justified: \begin{equation} \label{3-11} \begin{split} &\quad\lim_{\varepsilon\rightarrow0}\int_{\Omega'}\langle |Du_\varepsilon|^{p-2}Du_\varepsilon+a(x)|Du_\varepsilon|^{q-2}Du_\varepsilon,D\varphi\rangle\,dx\\ &=\int_{\Omega'}\langle |Du|^{p-2}Du+a(x)|Du|^{q-2}Du,D\varphi\rangle\,dx, \end{split} \end{equation} \begin{equation} \label{3-12} \lim_{\varepsilon\rightarrow0}\int_{\Omega'}\varphi f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)\,dx=\int_{\Omega'}\varphi f(x,u,Du)\,dx \end{equation} and \begin{equation} \label{3-13} \lim_{\varepsilon\rightarrow0}E(\varepsilon)\int_{\Omega'}\varphi\,dx=0. \end{equation} First, the limit \eqref{3-13} is obviously valid. Next, we demonstrate the validity of \eqref{3-11}. We shall employ the elementary vector inequality (see \cite{Lin17}): \begin{equation} \label{3-14} \big||\xi_1|^{t-2}\xi_1-|\xi_2|^{t-2}\xi_2\big|\leq\begin{cases}(t-1)|\xi_1-\xi_2|(|\xi_1|^{t-2}+|\xi_2|^{t-2}), \quad &\textmd{if }{t\geq2}, \\[2mm] 2^{2-t}|\xi_1-\xi_2|^{t-1}, \quad &\textmd{if }{1<t<2},\end{cases} \end{equation} where $\xi_1,\xi_2\in \mathbb{R}^n$. We split the proof of \eqref{3-11} into three cases. For the case $1<p\le q<2$, we use \eqref{2-0-2}, \eqref{2-1}--\eqref{2-1-2}, the basic inequality \eqref{3-14} to get \begin{align*} &\quad\int_{\Omega'}\langle |Du_\varepsilon|^{p-2}Du_\varepsilon-|Du|^{p-2}Du+a(x)(|Du_\varepsilon|^{q-2}Du_\varepsilon-|Du|^{q-2}Du),D\varphi\rangle\,dx\\ &\le\int_{\Omega'}(||Du_\varepsilon|^{p-2}Du_\varepsilon-|Du|^{p-2}Du|+a(x)||Du_\varepsilon|^{q-2}Du_\varepsilon-|Du|^{q-2}Du|)|D\varphi|\,dx\\ &\le C\int_{\Omega'}(|Du_\varepsilon-Du|^{p-1}+a(x)|Du_\varepsilon-Du|^{q-1})|D\varphi|\,dx\\ &\le C\|h(x,Du_\varepsilon-Du)\|_{L^{H^*(\cdot)}(\Omega')}\|D\varphi\|_{L^{H(\cdot)}(\Omega')}\\ &\le C\|D\varphi\|_{L^{H(\cdot)}(\Omega')}\max\left\{\left(\varrho_{H^*}(h(x,Du_\varepsilon-Du))\right)^\frac{q}{q+1},\left(\varrho_{H^*}(h(x,Du_\varepsilon-Du))\right)^\frac{p}{p+1}\right\}\\ &\le C\|D\varphi\|_{L^{H(\cdot)}(\Omega')}\max\left\{\left(\int_{\Omega'}H(x,Du_\varepsilon-Du)\,dx\right)^\frac{q}{q+1},\left(\int_{\Omega'}H(x,Du_\varepsilon-Du)\,dx\right)^\frac{p}{p+1}\right\}\\ &\rightarrow0 \end{align*} as $\varepsilon\rightarrow0$, by applying $Du_\varepsilon\rightarrow Du$ in $L^{H(\cdot)}(\Omega')$ in Lemma \ref{lem3-5}. Here $h(x,z):=|z|^{p-1}+a(x)|z|^{q-1}$. When $2\le p\le q$, exploiting again \eqref{2-0-2}, \eqref{2-1}--\eqref{2-1-2} as well as \eqref{3-14}, and applying $Du_\varepsilon\rightarrow Du$ in $L^{H(\cdot)}(\Omega')$, we can see that \begin{align*} &\quad\int_{\Omega'}\langle |Du_\varepsilon|^{p-2}Du_\varepsilon-|Du|^{p-2}Du+a(x)(|Du_\varepsilon|^{q-2}Du_\varepsilon-|Du|^{q-2}Du),D\varphi\rangle\,dx\\ &\le C\int_{\Omega'}\left[(|Du_\varepsilon|^{p-2}+|Du|^{p-2})+a(x)(|Du_\varepsilon|^{q-2}+|Du|^{q-2})\right]|Du_\varepsilon-Du||D\varphi|\,dx\\ &\le C\|D\varphi\|_{L^\infty(\Omega')}\int_{\Omega'}\left[(1+|Du_\varepsilon|^{p-1}+|Du|^{p-1})+a(x)(1+|Du_\varepsilon|^{q-1}+|Du|^{q-1})\right]\\ &\qquad\qquad\qquad\qquad\qquad\times|Du_\varepsilon-Du|\,dx\\ &=C\|D\varphi\|_{L^\infty(\Omega')}\int_{\Omega'}[(1+a(x))+h(x,Du_\varepsilon)+h(x,Du)]|Du_\varepsilon-Du|\,dx\\ &\le C\|Du_\varepsilon-Du\|_{L^{H(\cdot)}(\Omega')}+C\|h(x,Du)\|_{L^{H^*(\cdot)}(\Omega')}\|Du_\varepsilon-Du\|_{L^{H(\cdot)}(\Omega')}\\ &\quad+C\|h(x,Du_\varepsilon)\|_{L^{H^*(\cdot)}(\Omega')}\|Du_\varepsilon-Du\|_{L^{H(\cdot)}(\Omega')}\\ &\rightarrow0 \end{align*} as $\varepsilon\rightarrow0$, where the constant $C$ depends on $p,q,\|a\|_{L^\infty(\Omega')},\|D\varphi\|_{L^\infty(\Omega')},|\Omega|$. Here we need to notice that the quantity $\int_{\Omega'}H(x,Du_\varepsilon)\,dx$ is uniformly bounded. In the last case $1<p<2\le q$, we combine the previous two scenarios to deduce the claim \eqref{3-11}. Specifically, \begin{align*} &\quad\int_{\Omega'}\langle |Du_\varepsilon|^{p-2}Du_\varepsilon-|Du|^{p-2}Du+a(x)(|Du_\varepsilon|^{q-2}Du_\varepsilon-|Du|^{q-2}Du),D\varphi\rangle\,dx\\ &\le C\int_{\Omega'}\left[|Du_\varepsilon-Du|^{p-1}+a(x)(|Du_\varepsilon|^{q-2}+|Du|^{q-2})|Du_\varepsilon-Du|\right]|D\varphi|\,dx\\ &\le C\int_{\Omega'}(|Du_\varepsilon-Du|^{p-1}+a(x)|Du_\varepsilon-Du|^{q-1})|D\varphi|\,dx\\ &\quad+C\int_{\Omega'} a(x)(1+|Du_\varepsilon|^{q-1}+|Du|^{q-1})|Du_\varepsilon-Du||D\varphi|\,dx\\ &\le C\int_{\Omega'}h(x,Du_\varepsilon-Du)|D\varphi|\,dx+C\int_{\Omega'}|Du_\varepsilon-Du|\,dx\\ &\quad+ C\int_{\Omega'}h(x,Du_\varepsilon)|Du_\varepsilon-Du|\,dx+C\int_{\Omega'}h(x,Du)|Du_\varepsilon-Du|\,dx, \end{align*} which tends to 0 as $\varepsilon\rightarrow0$, where $C$ depends upon $p,q,\|a\|_{L^\infty(\Omega')},\|D\varphi\|_{L^\infty(\Omega')},|\Omega'|$. Eventually, let us prove the claim \eqref{3-12}. Via the uniform continuity of $f$, for each $\epsilon>0$, there is a $\delta>0$ depending only on $\epsilon$ such that $$ |f(x,u_\varepsilon(x),Du_\varepsilon(x))-f(y,u_\varepsilon(x),Du_\varepsilon(x))|\le\epsilon \quad \text{for } y\in B_\delta(x). $$ Now select $\varepsilon'_0>0$ to satisfy $r(\varepsilon)<\delta$ if $0<\varepsilon<\varepsilon'_0$. Then we have $$ f(x,u_\varepsilon(x),Du_\varepsilon(x))<\epsilon+f(y,u_\varepsilon(x),Du_\varepsilon(x)) $$ for each $x\in \Omega'$ and $y\in B_{r(\varepsilon)}(x)$. In particular, $$ f(x,u_\varepsilon(x),Du_\varepsilon(x))<\epsilon+f_\varepsilon(x,u_\varepsilon(x),Du_\varepsilon(x)) $$ by the definition of $f_\varepsilon$, and moreover $$ 0\le |f(x,u_\varepsilon(x),Du_\varepsilon(x))-f_\varepsilon(x,u_\varepsilon(x),Du_\varepsilon(x))|\le\epsilon. $$ We thus have $$ \int_{\Omega'}|f(x,u_\varepsilon,Du_\varepsilon)-f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)|\varphi\,dx\leq\epsilon\|\varphi\|_{L^\infty(\Omega')}|\Omega|. $$ In view of (1) in Proposition \ref{pro2-1}, it is known that $\|u_\varepsilon\|_{L^\infty(\Omega')}\le\|u\|_{L^\infty(\Omega')}$ for any $\varepsilon$. Namely, $$ \max_{[0,\|u_\varepsilon\|_{L^\infty(\Omega')}]}\{\gamma(\tau)\}\le\max_{[0,\|u\|_{L^\infty(\Omega')}]}\{\gamma(\tau)\}=:\gamma_\infty. $$ According to the growth condition on $f$, $$ |f(x,u_\varepsilon,Du)|\le\gamma_\infty(|Du|^{p-1}+a(x)|Du|^{q-1})+\Phi(x) \quad\text{in } \Omega', $$ which belongs to $L^{H^*(\cdot)}(\Omega')$. Thereby we can exploit the dominated convergence theorem to infer $$ \lim_{\varepsilon\rightarrow0}\int_{\Omega'}|f(x,u_\varepsilon,Du)-f(x,u,Du)|\varphi\,dx=0. $$ We finally address the term $\int_{\Omega'}|f(x,u_\varepsilon,Du_\varepsilon)-f(x,u_\varepsilon,Du)|\varphi\,dx$, \begin{align*} &\quad\int_{\Omega'}|f(x,u_\varepsilon,Du_\varepsilon)-f(x,u_\varepsilon,Du)|\varphi\,dx\\ &\le C\int_{\Omega'}|Du_\varepsilon-Du|\varphi\,dx\\ &\le C\|\varphi\|_{L^{H^*(\cdot)}(\Omega')}\|Du_\varepsilon-Du\|_{L^{H(\cdot)}}(\Omega')\\ &\rightarrow0 \quad \text{as } \varepsilon\rightarrow0, \end{align*} where we have utilized the Lipschitz continuity of $f$ in the third variable, and the convergence $Du_\varepsilon\rightarrow Du$ in $L^{H(\cdot)}(\Omega')$. Merging these above estimates yields that \begin{align*} &\quad\int_{\Omega'}|f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)-f(x,u,Du)|\varphi\,dx\\ &\le \int_{\Omega'}|f_\varepsilon(x,u_\varepsilon,Du_\varepsilon)-f(x,u_\varepsilon,Du_\varepsilon)|\varphi\,dx+\int_{\Omega'}|f(x,u_\varepsilon,Du_\varepsilon)-f(x,u_\varepsilon,Du)|\varphi\,dx\\ &\quad+\int_{\Omega'}|f(x,u_\varepsilon,Du)-f(x,u,Du)|\varphi\,dx \end{align*} converges to 0 by sending $\varepsilon\rightarrow0$. Hereto, we have verified the displays \eqref{3-11}--\eqref{3-13}, from which we get the inequality \eqref{3-10}. \section{weak solutions are viscosity solutions} \label{sec-4} In this section, we prove that weak supersolutions are viscosity supersolutions to \eqref{main}, that is Theorem \ref{thm2}, by using comparison principle for weak solutions, subsequently giving two examples of comparison results. Then weak subsolutions can be showed to be viscosity subsolutions in a similar way. \bigskip \noindent\textbf{Proof of Theorem \ref{thm2}.} We argue by contradiction. If not, there exists a $\varphi\in C^2(\Omega)$ touching $u$ from below at $x_0\in\Omega$, that is, \begin{equation*} \begin{cases} u(x_0)=\varphi(x_0),\\ u(x)>\varphi(x) \quad\textmd{for } x\neq x_0,\\ D\varphi(x_0)\neq 0, \end{cases} \end{equation*} and however, $$ -\dive A(x_0,D\varphi(x_0))<f(x_0,u(x_0),D\varphi(x_0)). $$ By means of continuity, for some $\delta>0$ there is a small enough $r>0$ such that \begin{equation} \label{4-1} -\dive A(x,D\varphi(x))\le f(x,\varphi,D\varphi)-\delta \end{equation} for $x\in B_r:=B_r(x_0)$. Denote $\widetilde{\varphi}:=\varphi+m$ with $m>0$ to be chosen later. In view of \eqref{4-1}, we have \begin{align*} &\quad-\dive A(x,D\widetilde{\varphi})-f(x,\widetilde{\varphi},D\widetilde{\varphi})\\ &=-\dive A(x,D\varphi)-f(x,\varphi,D\varphi)+f(x,\varphi,D\varphi)-f(x,\widetilde{\varphi},D\widetilde{\varphi})\\ &\le -\delta+f(x,\varphi,D\varphi)-f(x,\varphi+m,D\varphi)\\ &\le -\frac{\delta}{2}, \end{align*} if $m>0$ is sufficiently small. Indeed, we can pick $m\in \left(0,\frac{1}{2}\min_{\partial B_r}\{u-\varphi\}\right)$ (note the lower semicontinuity of $u$) small, taking into account the uniform continuity of $f$, such that $$ |f(x,\varphi,D\varphi)-f(x,\varphi+m,D\varphi)|\le \frac{\delta}{2}. $$ Hence, $\widetilde{\varphi}$ is a weak subsolution to \eqref{main} in $B_r$ as well. Observe that $\widetilde{\varphi}=\varphi+m<\varphi+u-\varphi=u$ on $\partial B_r$. Thereby through the (CPP) we get $u\ge \widetilde{\varphi}$ in $B_r$. Nonetheless, $u(x_0)=\varphi(x_0)<\varphi(x_0)+m$, which is a contradiction. Then $u$ is a viscosity supersolution to \eqref{main}. \medskip A fundamental issue in Theorem \ref{thm2} is the availability of comparison principle for weak solutions. Nevertheless, it is not undemanding to establish such principle for the nonhomogeneous double phase equations with very general structure. Hence, we next for two slightly special cases prove comparison principle for weak solutions. \begin{lemma} \label{lem4-1} Assume that $u,v$ are the weak subsolution and supersolution, respectively, to $-\dive A(x,Dw)=f(x,w)$ in $\Omega$, where $f$ is decreasing in the $w$-variable. If $u\le v$ on $\partial \Omega$, then $u\le v$ a.e. in $\Omega$. \end{lemma} \begin{proof} Since $u,v$ are separately weak subsolution and supersolution such that $u\le v$ on $\partial\Omega$, the auxiliary function $$ w:=(u-v-l)_+, \ l>0, $$ can be chosen as a test function, which belongs to the space $W^{1,H(\cdot)}_0(\Omega)$. Therefore, we get $$ \int_\Omega\langle A(x,Du)-A(x,Dv),Dw\rangle\,dx\le\int_\Omega(f(x,u)-f(x,v))w\,dx. $$ We use the fact that $f$ is decreasing with respect to the second variable to arrive at $$ \int_\Omega(f(x,u)-f(x,v))(u-v-l)_+\,dx\le0. $$ Furthermore, due to the strictly monotone increasing property of the operator $A(x,\cdot)$, i.e., $\langle A(x,\xi)-A(x,\zeta),\xi-\zeta\rangle>0$ for $\xi\neq\zeta\in \mathbb{R}^n$, it follows that $$ 0\le \int_{\Omega\cap\{(u-v-l)_+>0\}}\langle A(x,Du)-A(x,Dv),Du-Dv\rangle\,dx\le0. $$ This implies that $w\equiv0$ a.e. in $\Omega$. In other words, $u\le v+l$ a.e. in $\Omega$. Letting $l\rightarrow0$, we can see that $u\le v$ a.e. in $\Omega$. \end{proof} \begin{lemma} \label{lem4-2} Suppose that $f(x,\tau,\eta)$ is decreasing in $\tau$, and is locally Lipschitz continuous with respect to $\eta$ in $\Omega\times\mathbb{R}\times\mathbb{R}^n$. Let $u,v$ be the weak subsolution and supersolution respectively to \eqref{main} such that $$ |Du(x)|+|Dv(x)|\ge \delta \quad \text{a.e.} \ x\in\Omega $$ with $\delta>0$ any number. Let also $2\le p\le q$. Then there is $\varepsilon>0$ such that, for every domain $E\subset\subset\Omega$ fulfilling $|E|\le\varepsilon$, whenever $u\le v$ on $\partial E$ then it holds that $u\le v$ a.e. in $E$. \end{lemma} \begin{proof} Selecting $w=(u-v)_+\chi_E\in W^{1,H(\cdot)}_0(\Omega)$ as a test function in the weak formulation of \eqref{main}, we derive, from the hypotheses on $f$, \begin{align} \label{4-2} &\quad\int_\Omega\langle A(x,Du)-A(x,Dv),Dw\rangle\,dx \nonumber\\ &\le\int_\Omega(f(x,u,Du)-f(x,v,Dv))w\,dx \nonumber\\ &=\int_\Omega(f(x,u,Du)-f(x,v,Du))(u-v)_+\chi_E+(f(x,v,Du)-f(x,v,Dv))(u-v)_+\chi_E\,dx \nonumber\\ &\le \int_\Omega(f(x,v,Du)-f(x,v,Dv))(u-v)_+\chi_E\,dx \nonumber\\ &\le C\int_E|Du-Dv|(u-v)_+\,dx. \end{align} Now by the basic inequality $$ C(|\xi|+|\eta|)^{p-2}|\xi-\eta|^2\le (|\xi|^{p-2}\xi-|\eta|^{p-2}\eta)\cdot(\xi-\eta) \quad\text{for } p\ge2, $$ \eqref{4-2} turns into \begin{align*} &\quad\int_E(|Du|+|Dv|)^{p-2}|D(u-v)_+|^2+a(x)(|Du|+|Dv|)^{q-2}|D(u-v)_+|^2\,dx\\ &\leq C\int_E|Du-Dv|(u-v)_+\,dx\\ &\le C(E)\int_E|D(u-v)_+|^2\,dx\\ &\le C(E)\int_E(|Du|+|Dv|)^{2-p}(|Du|+|Dv|)^{p-2}|D(u-v)_+|^2\,dx\\ &\le \delta^{2-p}C(E)\int_E(|Du|+|Dv|)^{p-2}|D(u-v)_+|^2\,dx, \end{align*} where in the third line we utilized the H\"{o}lder and Poincar\'{e} inequalities, and the quantity $C(E)$ will tend to 0 when the measure $|E|$ goes to 0. From above, we can find that if the domain $E$ is small enough, the last inequality is self-contradictory. That is, $(u-v)_+\equiv0$ in $E$, which leads to $u\le v$ a.e. in $E$. \end{proof} \begin{remark} Lemma \ref{lem4-1} could be exploited in the proof of Theorem \ref{thm2} apparently. Observe that $D\varphi(x_0)\neq0$ and $\varphi\in C^2(\Omega)$, so we can take such small ball $B_r(x_0)$ that $|B_r(x_0)|\le \varepsilon$ ($\varepsilon$ is provided by Lemma \ref{lem4-2}) and moreover $|D\varphi(x)|\ge\delta>0$ in $B_r(x_0)$. Thus we can keep track of the proof of Theorem \ref{thm2} to deduce that a lower semicontinuous weak supersolution is a viscosity supersolution to \eqref{main} by Lemma \ref{lem4-2}. \end{remark} \section{Lipschitz continuity of viscosity solutions} \label{sec-5} We in this part show that the bounded viscosity solutions to \eqref{main} are locally Lipschitz continuous. The strategy is to verify first the H\"{o}lder continuity of viscosity solutions by using the Ishii-Lions methods, and further, based on the H\"{o}lder continuity, to demonstrate the Lipschitz continuity of viscosity solutions through the Ishii-Lions methods again. The similar idea can be found for instance in \cite{AR18}. For the sake of convenience, we suppose the domain $\Omega$ is a unit ball $B_1$. \begin{lemma}[Local H\"{o}lder continuity] \label{lem5-1} Let $u$ be a bounded viscosity solution to \eqref{main} in $B_1$. Assume that $0\le a(x)\in C^1(B_1)$, $p\le q\le p+1$ and \eqref{0-2} are in force. Then for each $\beta\in(0,1)$, there exists a constant $C>0$, depending on $n,p,q,\beta,\gamma_\infty,\|a\|_{C^1(B_1)},\|u\|_{L^\infty(B_1)}$ and $\|\Phi\|_{L^\infty(B_1)}$, such that $$ |u(x)-u(y)|\le C|x-y|^\beta $$ for any $x,y\in B_{3/4}$, where $\gamma_\infty:=\max_{t\in[0,\|u\|_{L^\infty(B_1)}]} \gamma(t)$. \end{lemma} \begin{proof} Fix $x_0,y_0\in B_{3/4}$. We now aim at showing that there are two proper constants $L_1,L_2>0$ such that \begin{equation} \label{5-1} \omega:=\sup_{x,y\in \overline{B_{3/4}}} \left(u(x)-u(y)-L_1\phi(|x-y|)-\frac{L_2}{2}|x-x_0|^2-\frac{L_2}{2}|y-y_0|^2\right)\le0, \end{equation} where $\phi(r)=r^\beta$ with $\beta\in(0,1)$. To this end, assume on the contrary that \eqref{5-1} is not true and moreover $(\overline{x},\overline{y})\in\overline{B_{3/4}}\times\overline{B_{3/4}}$ stands for the point where the supremum is achieved. We can easily know two facts that $\overline{x}\neq\overline{y}$ by $\omega>0$, and $\overline{x},\overline{y}\in B_{3/4}$ by choosing $$ L_2\ge \frac{64\|u\|_{L^\infty(B_1)}}{(\min\{\mathrm{dist}(x_0,\partial B_{3/4}),\mathrm{dist}(y_0,\partial B_{3/4})\})^2}.\ $$ Besides, $$ |\overline{x}-\overline{y}|\leq\left(\frac{2\|u\|_{L^\infty(B_1)}}{L_1}\right)^\frac{1}{\beta} $$ is small enough, provided that $L_1$ is sufficiently large, which shall be utilized later. Now by invoking theorem of sums \cite[Theorem 3.2]{CIL92}, there are $X,Y\in \mathcal{S}^n$ such that $$ (\eta_1,X+L_2I)\in \overline{J}^{2,+}u(\overline{x}) \quad \text{and}\quad (\eta_2,Y-L_2I)\in \overline{J}^{2,-}u(\overline{y}) $$ with \begin{align*} &\eta_1=L_1D_x\phi(|\overline{x}-\overline{y}|)+L_2(\overline{x}-x_0)=L_1\phi'(|\overline{x}-\overline{y}|)\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}+L_2(\overline{x}-x_0),\\ &\eta_2=-L_1D_y\phi(|\overline{x}-\overline{y}|)-L_2(\overline{y}-y_0)=L_1\phi'(|\overline{x}-\overline{y}|)\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}-L_2(\overline{y}-y_0). \end{align*} Via selecting $L_1\ge C(\beta)L_2$ large enough, there holds that \begin{equation} \label{5-2} \frac{\beta L_1}{2}|\overline{x}-\overline{y}|^{\beta-1}\leq |\eta_1|,|\eta_2|\leq 2\beta L_1|\overline{x}-\overline{y}|^{\beta-1}. \end{equation} Furthermore, applying \cite[Theorem 12.2]{Cra97}, for any $\tau>0$ such that $\tau Z<I$, we obtain \begin{equation} \label{5-3} -\frac{2}{\tau}\left(\begin{array}{cc} I & \\ &I \end{array} \right)\leq\left(\begin{array}{cc} X&\\ &-Y \end{array} \right)\leq \left(\begin{array}{cc} Z^\tau&-Z^\tau\\ -Z^\tau&Z^\tau \end{array} \right), \end{equation} where \begin{align*} Z&=L_1\phi''(|\overline{x}-\overline{y}|)\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|} \otimes\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}+\frac{L_1\phi'(|\overline{x}-\overline{y}|)}{|\overline{x}-\overline{y}|} \left(I-\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|} \otimes\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}\right)\\ &=\beta L_1|\overline{x}-\overline{y}|^{\beta-2}\left(I+(\beta-2)\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|} \otimes\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}\right) \end{align*} and $$ Z^\tau=(I-\tau Z)^{-1}Z $$ with $(I-\tau Z)^{-1}$ denoting the inverse of the matrix $I-\tau Z$. Now pick $\tau=\frac{1}{2\beta L_1|\overline{x}-\overline{y}|^{\beta-2}}$ such that $$ Z^\tau=2\beta L_1|\overline{x}-\overline{y}|^{\beta-2}\left(I-2\frac{2-\beta}{3-\beta}\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|} \otimes\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}\right). $$ Observe that \begin{equation} \label{5-4} \langle Z^\tau\xi,\xi\rangle=2\beta\frac{\beta-1}{3-\beta}L_1|\overline{x}-\overline{y}|^{\beta-2}<0 \end{equation} for $\xi=\frac{\overline{x}-\overline{y}}{|\overline{x}-\overline{y}|}$. In addition, it follows from \eqref{5-3} that $X\le Y$ and \begin{equation} \label{5-5} \|X\|,\|Y\|\le 4\beta L_1|\overline{x}-\overline{y}|^{\beta-2}. \end{equation} Let $$ A_s(\eta):=I+(s-2)\frac{\eta}{|\eta|}\otimes\frac{\eta}{|\eta|} \quad\text{for } \eta\in\mathbb{R}^n\setminus\{0\} $$ with $s\in\{p,q\}$. An obvious fact is that the eigenvalues of $A_s(\eta)$ belong to the interval $[\min\{1,s-1\},\max\{1,s-1\}]$. Now since $u$ is a viscosity solution to \eqref{main}, we have $$ F(\overline{x},\eta_1,X+L_2I)-f(\overline{x},u(\overline{x}),\eta_1)\le0 $$ and $$ F(\overline{y},\eta_2,Y-L_2I)-f(\overline{y},u(\overline{y}),\eta_2)\ge0. $$ Adding these two inequalities becomes \begin{align} \label{5-6} 0&\le |\eta_1|^{p-2}\mathrm{tr}(A_p(\eta_1)(X+L_2I))-|\eta_2|^{p-2}\mathrm{tr}(A_p(\eta_2)(Y-L_2I)) \nonumber\\ &\quad+a(\overline{x})|\eta_1|^{q-2}\mathrm{tr}(A_q(\eta_1)(X+L_2I))-a(\overline{y})|\eta_2|^{q-2}\mathrm{tr}(A_q(\eta_2)(Y-L_2I)) \nonumber\\ &\quad+|\eta_1|^{q-2}\eta_1\cdot Da(\overline{x})-|\eta_2|^{q-2}\eta_2\cdot Da(\overline{y})+f(\overline{x},u(\overline{x}),\eta_1)-f(\overline{y},u(\overline{y}),\eta_2) \nonumber\\ &=:I_1+I_2+I_3+I_4. \end{align} In what follows, our goal is to justify $I_1+I_2+I_3+I_4<0$ under suitable conditions, which reaches a contradiction so that the claim \eqref{5-1} is precisely true. First, we examine the term $I_2$ as \begin{align*} I_2&=(a(\overline{x})-a(\overline{y}))|\eta_1|^{q-2}\mathrm{tr}(A_q(\eta_1)(X+L_2I))\\ &\quad+a(\overline{y})(|\eta_1|^{q-2}-|\eta_2|^{q-2})\mathrm{tr}(A_q(\eta_1)(X+L_2I))\\ &\quad+a(\overline{y})|\eta_2|^{q-2}[\mathrm{tr}(A_q(\eta_1)(X+L_2I))-\mathrm{tr}(A_q(\eta_2)(Y-L_2I))]\\ &=(a(\overline{x})-a(\overline{y}))|\eta_1|^{q-2}\mathrm{tr}(A_q(\eta_1)(X+L_2I))+a(\overline{y})(|\eta_1|^{q-2}-|\eta_2|^{q-2})\mathrm{tr}(A_q(\eta_1)(X+L_2I))\\ &\quad+a(\overline{y})|\eta_2|^{q-2}\mathrm{tr}(A_q(\eta_1)(X-Y))+a(\overline{y})|\eta_2|^{q-2}\mathrm{tr}((A_q(\eta_1)-A_q(\eta_2))Y)\\ &\quad+L_2a(\overline{y})|\eta_2|^{q-2}(\mathrm{tr}(A_q(\eta_1)+\mathrm{tr}(A_q(\eta_2)))\\ &=:I_{21}+I_{22}+I_{23}+I_{24}+I_{25}. \end{align*} Let us mention that the treatment of $I_2$ is similar to that of $J_1$ in \cite[Lemma 6.1]{FZ21}. However, we here give some details for the sake of readability. For $I_{21}$, by virtue of \eqref{5-2}, \eqref{5-5} and the eigenvalues of $A_q(\eta_1)$, we have \begin{align*} I_{21}&\le C(\beta,q,\|a\|_{C^1(B_1)})|\overline{x}-\overline{y}| L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)}(n\|A_q(\eta_1)\|\|X\|+nL_2\|A_q(\eta_1)\|)\\ &\le C(n,\beta,q,\|a\|_{C^1(B_1)})L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)+1}(L_1|\overline{x}-\overline{y}|^{\beta-2}+L_2). \end{align*} We now consider $I_{22}$, \begin{align*} I_{22}&\le C(q,\beta)a(\overline{y})L_1^{q-3}|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}L_2(n\|A_q(\eta_1)\|\|X\|+nL_2\|A_q(\eta_1)\|)\\ &\le C(n,\beta,q)a(\overline{y})L_2L_1^{q-3}|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}(L_1|\overline{x}-\overline{y}|^{\beta-2}+L_2). \end{align*} Indeed, we evaluate $|\eta_1|^{q-2}-|\eta_2|^{q-2}$ as \begin{align*} |\eta_1|^{q-2}-|\eta_2|^{q-2}&=(q-2)|\xi_{12}|^{q-3}(|\eta_1|-|\eta_2|)\\ &\le |q-2|C(q,\beta)L_1^{q-3}|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}|\eta_1-\eta_2|\\ &\le C(q,\beta)L_2L^{q-3}_1|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}, \end{align*} where $|\xi_{12}|$ is between $|\eta_1|$ and $|\eta_2|$, and we have used \eqref{5-2} and $|\eta_1-\eta_2|\le 4L_2$. Due to \eqref{5-3} and \eqref{5-4}, any eigenvalue of $X-Y$ is nonnegative and at least one eigenvalue, denoted by $\overline{\lambda}(X-Y)$, is less than or equal to $8\beta\frac{\beta-1}{3-\beta}L_1|\overline{x}-\overline{y}|^{\beta-2}$. Next, we deal with the term $I_{23}$ as \begin{align*} I_{23}&\leq a(\overline{y})|\eta_2|^{q-2}\sum^n_{i=1}\lambda_i(A_q(\eta_1))\lambda_i(X-Y)\\ &\leq a(\overline{y})|\eta_2|^{q-2}\min\{1,q-1\}\overline{\lambda}(X-Y)\\ &\leq a(\overline{y})C(q,\beta)L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)}\left(-8\beta\frac{1-\beta}{3-\beta}\right)L_1|\overline{x}-\overline{y}|^{\beta-2}\\ &\le -C(q,\beta)a(\overline{y})L^{q-1}_1|\overline{x}-\overline{y}|^{(\beta-1)(q-1)-1} \end{align*} with $\lambda_1(A_q(\eta_1))\le \lambda_2(A_q(\eta_1))\le \cdots\le \lambda_n(A_q(\eta_1))$ and $\lambda_1(X-Y)\le\lambda_2(X-Y)\le\cdots\le \lambda_n(X-Y)$. Here we need to note $0<\beta<1$. In order to evaluate $I_{24}$, we first notice \begin{align*} \|A_q(\eta_1)-A_q(\eta_2)\| &\le 2|q-2|\left|\frac{\eta_1}{|\eta_1|}-\frac{\eta_2}{|\eta_2|}\right|\\ &\leq2|q-2|\max\left\{\frac{|\eta_1-\eta_2|}{|\eta_1|},\frac{|\eta_1-\eta_2|}{|\eta_2|}\right\}\\ &\leq C(q,\beta)\frac{L_2}{L_1|\overline{x}-\overline{y}|^{\beta-1}}. \end{align*} Thereby, from \eqref{5-2}, \eqref{5-5} and the preceding inequality, \begin{align*} I_{24}&\leq a(\overline{y})|\eta_2|^{q-2}n\|A_q(\eta_1)-A_q(\eta_2)\|\|Y\|\\ &\leq C(n,q,\beta)a(\overline{y})(L_1|\overline{x}-\overline{y}|^{\beta-1})^{q-2}\frac{L_2}{L_1|\overline{x}-\overline{y}|^{\beta-1}} L_1|\overline{x}-\overline{y}|^{\beta-2}\\ &=C(n,q,\beta)a(\overline{y})L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)-1}. \end{align*} The term $I_{25}$ finally can be treated by \begin{align*} I_{25}\le a(\overline{y})|\eta_2|^{q-2}L_22n\max\{1,q-1\}\le C(n,q,\beta)a(\overline{y})L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)}. \end{align*} Now merging these estimates of $I_{21}$--$I_{25}$ yields that \begin{align*} I_{2}\le& -C(q,\beta)a(\overline{y})L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)-1}+C(n,q,\beta)a(\overline{y})L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)-1}\\ &+C(n,q,\beta)a(\overline{y})L_2^2L_1^{q-3}|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}+C(n,q,\beta,\|a\|_{C^1(B_1)})L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)}\\ &+C(n,q,\beta,\|a\|_{C^1(B_1)})L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)+1}, \end{align*} where we have employed the fact that $|\overline{x}-\overline{y}|<1$. Analogously, we could derive \begin{align*} I_{1}\le& -C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}+C(n,p,\beta)L_2L_1^{p-2}|\overline{x}-\overline{y}|^{(\beta-1)(p-2)-1}\\ &+C(n,p,\beta)L_2^2L_1^{q-3}|\overline{x}-\overline{y}|^{(\beta-1)(p-3)}, \end{align*} where we just note $a(\cdot)\equiv1$. The term $I_3$ is directly estimated as $$ I_3\le |\eta_1|^{q-1}|Da(\overline{x})|+|\eta_2|^{q-1}|Da(\overline{y})|\le C(q,\beta,\|a\|_{C^1(B_1)})L^{q-1}_1|\overline{x}-\overline{y}|^{(\beta-1)(q-1)} $$ by applying \eqref{5-2}. As for $I_4$, according to the growth condition on $f$, \begin{align*} I_4&\le |f(\overline{x},u(\overline{x}),\eta_1)|+|f(\overline{y},u(\overline{y}),\eta_2)|\\ &\le \gamma(|u(\overline{x})|)(|\eta_1|^{p-1}+a(\overline{x})|\eta_1|^{q-1})+\Phi(\overline{x})+\gamma(|u(\overline{y})|)(|\eta_2|^{p-1}+a(\overline{y})|\eta_2|^{q-1})+\Phi(\overline{y})\\ &\le \gamma_\infty C(p,q,\beta)(L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)}+\|a\|_{L^\infty(B_1)}L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)})+\|\Phi\|_{L^\infty(B_1)} \end{align*} with $\gamma_\infty:=\max_{t\in[0,\|u\|_{L^\infty(B_1)}]} \gamma(t)$. We eventually gather the estimates on $I_1$--$I_4$ with \eqref{5-6} to infer that \begin{align*} 0&\leq\big[-C(p,\beta)L^{p-1}_1|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}+C(n,p,\beta)L_2L_1^{p-2}|\overline{x}-\overline{y}|^{(\beta-1)(p-2)-1}\\ &\quad+C(n,p,\beta)L_2^2L_1^{p-3}|\overline{x}-\overline{y}|^{(\beta-1)(p-3)}+C(p,q,\beta,\gamma_\infty)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)}\\ &\quad+C(n,p,q,\beta,\|a\|_{C^1(B_1)},\gamma_\infty)L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)}+\|\Phi\|_{L^\infty(B_1)}\\ &\quad+C(n,q,\beta,\|a\|_{C^1(B_1)})L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)+1}\big]\\ &\quad+a(\overline{y})\big[-C(q,\beta)L^{q-1}_1|\overline{x}-\overline{y}|^{(\beta-1)(q-1)-1} +C(n,q,\beta)L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)-1}\\ &\quad+C(n,q,\beta)L^2_2L_1^{q-3}|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}\big]. \end{align*} Now our aim is to make the term at the right-hand side of the above display to be strictly less than 0, through choosing $L_1$ large enough. We first select $L_1$ so large that \begin{equation*} \begin{cases} \frac{1}{3}C(q,\beta)L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)-1}\geq C(n,q,\beta)L_2L^{q-2}_1|\overline{x}-\overline{y}|^{(\beta-1)(q-2)-1},\\[2mm] \frac{1}{3}C(q,\beta)L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)-1}\geq C(n,q,\beta)L_2^2L^{q-3}_1|\overline{x}-\overline{y}|^{(\beta-1)(q-3)}, \end{cases} \end{equation*} i.e., \begin{equation*} L_1|\overline{x}-\overline{y}|^{\beta-1}\geq C(n,q,\beta,L_2). \end{equation*} This can be realized if $L_1$ is sufficiently large, since $|\overline{x}-\overline{y}|<1$ and the power of it is negative. Next, we proceed to choose $L_1$ so large that \begin{equation*} \begin{cases} \frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}\geq C(n,p,\beta)L_2L^{p-2}_1|\overline{x}-\overline{y}|^{(\beta-1)(p-2)-1},\\[2mm] \frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}\geq C(n,p,\beta)L_2^2L^{p-3}_1|\overline{x}-\overline{y}|^{(\beta-1)(p-3)},\\[2mm] \frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}\geq C(p,q,\beta,\gamma_\infty)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)},\\[2mm] \frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}\geq C(n,p,q,\beta,\|a\|_{C^1(B_1)},\gamma_\infty)L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)},\\[2mm] \frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}\geq C(n,q,\beta,\|a\|_{C^1(B_1)})L_2L_1^{q-2}|\overline{x}-\overline{y}|^{(\beta-1)(q-2)+1},\\[2mm] \frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}\geq \|\Phi\|_{L^\infty(B_1)}. \end{cases} \end{equation*} We arrange the previous display as \begin{equation} \label{5-7} \begin{cases} L_1|\overline{x}-\overline{y}|^{\beta-1}\geq C(n,p,\beta,L_2,\|\Phi\|_{L^\infty(B_1)}),\\[2mm] |\overline{x}-\overline{y}|^{-1}\geq C(p,q,\beta,\gamma_\infty),\\[2mm] L_1^{p-q}|\overline{x}-\overline{y}|^{(\beta-1)(p-q)-1}\geq C(n,p,q,\beta,\|a\|_{C^1(B_1)},\gamma_\infty),\\[2mm] L_1^{p-q+1}|\overline{x}-\overline{y}|^{(\beta-1)(p-q+1)-2}\geq C(n,p,q,\beta,\|a\|_{C^1(B_1)},L_2). \end{cases} \end{equation} Making use of the fact $|\overline{x}-\overline{y}|\le \left(\frac{2\|u\|_{L^\infty(B_1)}}{L_1}\right)^\frac{1}{\beta}$, we can pick such large $L_1>1$ that the first two inequalities of \eqref{5-7} hold true. To assure the inequality $\eqref{5-7}_3$ holds, we first require $$ (\beta-1)(p-q)-1<0 \ \Rightarrow \ q<p+\frac{1}{1-\beta}\quad (\beta\in(0,1)). $$ We in turn enforce \begin{align*} L_1^{p-q}|\overline{x}-\overline{y}|^{(\beta-1)(p-q)-1}&\ge L_1^{p-q}\left(\frac{2\|u\|_{L^\infty(B_1)}}{L_1}\right)^\frac{(\beta-1)(p-q)-1}{\beta}\\ &\geq C(n,p,q,\beta,\|a\|_{C^1(B_1)},\gamma_\infty), \end{align*} that is, $$ L_1^\frac{p-q+1}{\beta}\ge C(n,p,q,\beta,\|a\|_{C^1(B_1)},\gamma_\infty,\|u\|_{L^\infty(B_1)}) $$ which is true precisely if $$ p-q+1>0\ \Rightarrow \ q<p+1. $$ Under this condition, the inequality $\eqref{5-7}_4$ shall hold true by choosing $L_1$ large. As has been shown above, if $q<p+1$, we can select $L_1$ large enough, which depends on $n,p,q,\beta,\|a\|_{C^1(B_1)},\gamma_\infty$, $\|u\|_{L^\infty(B_1)}$ and $\|\Phi\|_{L^\infty(B_1)}$, to get $$ 0\le -\frac{1}{7}C(p,\beta)L_1^{p-1}|\overline{x}-\overline{y}|^{(\beta-1)(p-1)-1}-\frac{1}{3}C(q,\beta)a(\overline{y})L_1^{q-1}|\overline{x}-\overline{y}|^{(\beta-1)(q-1)-1}<0. $$ This is a contradiction. Thus the claim \eqref{5-1} holds true, which means that the viscosity solution $u$ is locally $\beta$-H\"{o}lder continuous. The proof is finished now. \end{proof} Based on the local $\beta$-H\"{o}lder continuity of $u$ in Lemma \ref{lem5-1}, we could further deduce $u$ is locally Lipschitz continuous. \begin{lemma}[Local Lipschitz continuity] \label{lem5-2} Let $u$ be a bounded viscosity solution to \eqref{main} in $B_1$. Under the assumptions that $0\le a(x)\in C^1(B_1)$, $p\le q\le p+\frac{1}{2}$ and \eqref{0-2}, there is a constant $C$ that depends on $n,p,q,\gamma_\infty,\|a\|_{C^1(B_1)}$, $\|u\|_{L^\infty(B_1)}$ and $\|\Phi\|_{L^\infty(B_1)}$, such that $$ |u(x)-u(y)|\le C|x-y| $$ for all $x,y\in B_{1/2}$. Here $\gamma_\infty:=\max_{t\in[0,\|u\|_{L^\infty(B_1)}]} \gamma(t)$. \end{lemma} \begin{proof} Let $x_0,y_0\in B_{1/2}$. Construct an auxiliary function $$ \Psi(x,y):=u(x)-u(y)-M_1\varphi(|x-y|)-\frac{M_2}{2}|x-x_0|^2-\frac{M_2}{2}|y-y_0|^2, \quad M_1,M_2>0, $$ where \begin{equation*} \varphi(t):=\begin{cases}t-\kappa_0t^\nu, &\textmd{if } {0\leq t\leq t_1:=\left(\frac{1}{4\nu\kappa_0}\right)^\frac{1}{\nu-1}},\\[2mm] \varphi(t_1), &\textmd{if } {t>t_1} \end{cases} \end{equation*} with $1<\nu<2$ and $0<\kappa_0<1$ such that $2<t_1$. We are ready to verify $\Psi(x,y)\le 0$ for $(x,y)\in B_{3/4}\times B_{3/4}$ under the appropriate choice of $M_1,M_2$, which leads to Lipschitz continuity of $u$. We argue by contradiction. Suppose that $\Psi$ reaches its positive maximum at $(\hat{x},\hat{y})\in \overline{B}_{3/4}\times \overline{B}_{3/4}$. As in the beginning of the proof of Lemma \ref{lem5-1}, we can see that $\hat{x}\neq\hat{y}$ and $\hat{x},\hat{y}\in B_{3/4}$ for large $M_2\geq C\|u\|_{L^\infty(B_1)}$. Moreover, by Lemma \ref{lem5-1}, we know that $$ |u(x)-u(y)|\leq c_\beta|x-y|^\beta \quad \text{for } x,y\in B_{3/4}, $$ where $c_\beta$ is the same as the $C$ in Lemma \ref{lem5-1}. From the assumptions, we further get \begin{equation} \label{5-8} M_2|\hat{x}-x_0|,M_2|\hat{y}-y_0|\le c_\beta|\hat{x}-\hat{y}|^\frac{\beta}{2} \end{equation} by adjusting the constants (by letting $2M_2\le c_\beta$). Additionally, it follows, by selecting $\kappa_0$ sufficiently small, that $$ M_1(|\hat{x}-\hat{y}|-\kappa_0|\hat{x}-\hat{y}|^\nu)\le 2\|u\|_{L^\infty(B_1)}, $$ i.e., \begin{equation} \label{5-8-1} |\hat{x}-\hat{y}|\le \frac{4\|u\|_{L^\infty(B_1)}}{M_1}. \end{equation} Indeed, due to $|\hat{x}-\hat{y}|\le2$ and $\nu-1>0$, we can fix $\kappa_0\in(0,1)$ such that $\frac{1}{2}\le 1-\kappa_0|\hat{x}-\hat{y}|^{\nu-1}$. From theorem of sums, for any $\mu>0$, there exist $X,Y\in\mathcal{S}^n$ such that $$ (\eta_1,X+M_2I)\in \overline{J}^{2,+}u(\hat{x}) \quad \text{and}\quad (\eta_2,Y-M_2I)\in \overline{J}^{2,-}u(\hat{y}) $$ and \begin{equation} \label{5-9} -(\mu+2\|B\|)\left(\begin{array}{cc} I & \\ &I \end{array} \right)\leq\left(\begin{array}{cc} X&\\ &-Y \end{array} \right)\leq \left(\begin{array}{cc} B&-B\\ -B&B \end{array} \right)+\frac{2}{\mu}\left(\begin{array}{cc} B^2&-B^2\\ -B^2&B^2 \end{array} \right), \end{equation} where \begin{align*} &\eta_1=M_1\varphi'(|\hat{x}-\hat{y}|)\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|}+M_2(\hat{x}-x_0),\\ &\eta_2=M_1\varphi'(|\hat{x}-\hat{y}|)\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|}-M_2(\hat{y}-y_0) \end{align*} and \begin{align*} B&=M_1\varphi''(|\hat{x}-\hat{y}|)\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|} \otimes\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|}+\frac{M_1\varphi'(|\hat{x}-\hat{y}|)}{|\hat{x}-\hat{y}|} \left(I-\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|} \otimes\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|}\right). \end{align*} Notice that, for $t\in[0,t_1]$, \begin{equation} \label{5-10} \begin{cases} \varphi'(t)=1-\nu\kappa_0t^{\nu-1}, \\[2mm] \varphi''(t)=-\nu(\nu-1)\kappa_0t^{\nu-2}, \end{cases} \end{equation} and then $\frac{3}{4}\leq \varphi'(t)\leq1$ and $\varphi''(t)<0$ when $t\in(0,2]$. Through straightforward calculation we get \begin{equation} \label{5-11} \frac{M_1}{2}\leq|\eta_1|,|\eta_2|\leq2M_1, \quad \text{if } M_1\geq4c_\beta, \end{equation} \begin{equation} \label{5-12} \|B\|\leq M_1\frac{\varphi'(|\hat{x}-\hat{y}|)}{|\hat{x}-\hat{y}|} \end{equation} and \begin{equation} \label{5-13} \|B^2\|\leq M_1^2\left(|\varphi''(|\hat{x}-\hat{y}|)|+\frac{\varphi'(|\hat{x}-\hat{y}|)}{|\hat{x}-\hat{y}|}\right)^2. \end{equation} According to \eqref{5-9}, we obtain $X\le Y$ and furthermore $\|X\|,\|Y\|\le 2\|B\|+\mu$. Via taking $$ \mu=4M_1\left(|\varphi''(|\hat{x}-\hat{y}|)|+\frac{\varphi'(|\hat{x}-\hat{y}|)}{|\hat{x}-\hat{y}|}\right), $$ we have, for $\xi=\frac{\hat{x}-\hat{y}}{|\hat{x}-\hat{y}|}$, \begin{equation} \label{5-14} \langle(X-Y)\xi,\xi\rangle\leq 4\left(\langle B\xi,\xi\rangle+\frac{2}{\mu}\langle B^2\xi,\xi\rangle\right)\leq 2M_1\varphi''(|\hat{x}-\hat{y}|)<0. \end{equation} It follows from the last inequality that at lowest one eigenvalue of $X-Y$, denoted by $\hat{\lambda}$, is smaller than $2M_1\varphi''(|\hat{x}-\hat{y}|)<0$. Besides, putting together \eqref{5-12}, \eqref{5-13} and \eqref{5-9}, we derive \begin{align} \label{5-15} \|Y\| &\leq 2|\langle B\overline{\xi},\overline{\xi}\rangle|+\frac{4}{\mu}|\langle B^2\overline{\xi},\overline{\xi}\rangle| \nonumber\\ &\leq4M_1\left(|\varphi''(|\hat{x}-\hat{y}|)|+\frac{\varphi'(|\hat{x}-\hat{y}|)}{|\hat{x}-\hat{y}|}\right), \end{align} where $\overline{\xi}$ is a unit vector. Because $u$ is a viscosity solution, we arrive at \begin{align} \label{5-16} 0&\le |\eta_1|^{p-2}\mathrm{tr}(A_p(\eta_1)(X+M_2I))-|\eta_2|^{p-2}\mathrm{tr}(A_p(\eta_2)(Y-M_2I)) \nonumber\\ &\quad+a(\hat{x})|\eta_1|^{q-2}\mathrm{tr}(A_q(\eta_1)(X+M_2I))-a(\hat{y})|\eta_2|^{q-2}\mathrm{tr}(A_q(\eta_2)(Y-M_2I)) \nonumber\\ &\quad+|\eta_1|^{q-2}\eta_1\cdot Da(\hat{x})-|\eta_2|^{q-2}\eta_2\cdot Da(\hat{y})+f(\hat{x},u(\hat{x}),\eta_1)-f(\hat{y},u(\hat{y}),\eta_2) \nonumber\\ &=:T_1+T_2+T_3+T_4. \end{align} In the following, we want to prove $T_1+T_2+T_3+T_4<0$ by taking $M_1$ large enough, the procedure of which is analogous to that in proof of Lemma \ref{lem5-1}. Here we shall briefly write down it. We first consider the term $T_2$, \begin{align*} T_2 &=(a(\hat{x})-a(\hat{y}))|\eta_2|^{q-2}\mathrm{tr}(A_q(\eta_2)(Y-M_2I))+a(\hat{x})|\eta_1|^{q-2}\mathrm{tr}(A_q(\eta_1)(X-Y))\\ &\quad+a(\hat{x})(|\eta_1|^{q-2}-|\eta_2|^{q-2})\mathrm{tr}(A_q(\eta_2)Y)+a(\hat{x})|\eta_1|^{q-2}\mathrm{tr}((A_q(\eta_1)-A_q(\eta_2))Y)\\ &\quad+M_2a(\hat{x})[|\eta_1|^{q-2}\mathrm{tr}(A_q(\eta_1))+|\eta_2|^{q-2}\mathrm{tr}(A_q(\eta_2))]\\ &=:T_{21}+T_{22}+T_{23}+T_{24}+T_{25}. \end{align*} In view of \eqref{5-10}, \eqref{5-11} and \eqref{5-15}, there holds that \begin{align*} T_{21}&\le C(q,\|a\|_{C^1(B_1)})M_1^{q-2}|\hat{x}-\hat{y}|(n\|A_q(\eta_2)\|\|Y\|+nqM_2)\\ &\le C(n,q,\|a\|_{C^1(B_1)})M_1^{q-2}[M_1(1+|\hat{x}-\hat{y}||\varphi''(|\hat{x}-\hat{y}|)|)+M_2]\\ &\le C(n,q,\|a\|_{C^1(B_1)})M_1^{q-2}[M_1(1+|\hat{x}-\hat{y}|^{\nu-1})+M_2]\\ &\le C(n,q,\|a\|_{C^1(B_1)})(M_1^{q-1}+M_1^{q-2}M_2). \end{align*} Applying the mean value theorem along with \eqref{5-8}, \eqref{5-10} and \eqref{5-11}, we obtain $$ \big||\eta_1|^{q-2}-|\eta_2|^{q-2}\big|\le C(q,c_\beta)M_1^{q-3}|\hat{x}-\hat{y}|^\frac{\beta}{2}, $$ which indicates that \begin{align*} T_{23}&\le C(n,q,c_\beta)a(\hat{x})M_1^{q-3}|\hat{x}-\hat{y}|^\frac{\beta}{2}\|Y\|\\ &\le C(n,c_\beta,q)a(\hat{x})M_1^{q-2}(|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}+|\hat{x}-\hat{y}|^{\nu-2}). \end{align*} Thanks to \eqref{5-11} and \eqref{5-14}, we derive \begin{align*} T_{22}&\leq a(\hat{x})|\eta_1|^{q-2}\sum^n_{i=1}\lambda_i(A_q(\eta_1))\lambda_i(X-Y)\\ &\leq C(q)a(\hat{x})M_1^{q-1}\varphi''(|\hat{x}-\hat{y}|)\\ &= -C(q,\nu,\kappa_0)a(\hat{x})M_1^{q-1}|\hat{x}-\hat{y}|^{\nu-2}. \end{align*} According to \eqref{5-8}, \eqref{5-11} and \eqref{5-15}, \begin{align*} T_{24}&\leq a(\hat{x})|\eta_1|^{q-2}n\|A_q(\eta_1)-A_q(\eta_2)\|\|Y\|\\ &\leq C(n,q)a(\hat{x})|\eta_1|^{q-2}\max\left\{\frac{|\eta_1-\eta_2|}{|\eta_1|},\frac{|\eta_1-\eta_2|}{|\eta_2|}\right\}\|Y\|\\ &\le C(n,q,c_\beta)a(\hat{x})M_1^{q-2}|\hat{x}-\hat{y}|^\frac{\beta}{2}\left(|\varphi''(|\hat{x}-\hat{y}|)|+\frac{\varphi'(|\hat{x}-\hat{y}|)}{|\hat{x}-\hat{y}|}\right)\\ &\le C(n,q,c_\beta)a(\hat{x})M_1^{q-2}(|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}+|\hat{x}-\hat{y}|^{\nu-2}). \end{align*} Finally, by \eqref{5-11} we have \begin{align*} T_{25}\le C(n,q)a(\hat{x})M_2M_1^{q-2}. \end{align*} Thus taking $\nu=\frac{\beta}{2}+1$ and combining these previous inequalities yields that \begin{align*} T_{2}\le& -C(q,\beta)a(\hat{x})M_1^{q-1}|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}+C(n,q,c_\beta)a(\hat{x})M_1^{q-2}|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\\ &+C(n,q,\|a\|_{C^1(B_1)})(M_1^{q-1}+M_1^{q-2}M_2). \end{align*} Similarly, we have $$ T_1\le -C(p,\beta)M_1^{p-1}|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}+C(n,p,c_\beta)M_1^{p-2}|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1} +C(n,p)M_1^{p-2}M_2. $$ For $T_3$, it is easy to get $$ T_3\le C(q,\|a\|_{C^1(B_1)})M_1^{q-1}. $$ Owing to the growth condition on $f$, we can see that \begin{align*} T_4&\le \gamma_\infty(|\eta_1|^{p-1}+a(\hat{x})|\eta_1|^{q-1})+\gamma_\infty(|\eta_2|^{p-1}+a(\hat{y})|\eta_2|^{q-1})+2\|\Phi\|_{L^\infty(B_1)}\\ &\le C(p,q,\gamma_\infty,\|a\|_{L^\infty(B_1)})(M_1^{p-1}+M_1^{q-1})+2\|\Phi\|_{L^\infty(B_1)}\\ &\le C(p,q,\gamma_\infty,\|a\|_{L^\infty(B_1)},\|\Phi\|_{L^\infty(B_1)})M_1^{q-1} \end{align*} with $\gamma_\infty:=\max_{t\in[0,\|u\|_{L^\infty(B_1)}]} \gamma(t)$. Here we note $M_1>1$ is a sufficiently large number. It follows from merging the estimates on $T_1$--$T_4$ with \eqref{5-16} that \begin{align} \label{5-17} 0&\leq\big[-C(p,\beta)M^{p-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}+C(n,p,c_\beta)M^{p-2}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1} \nonumber\\ &\quad+C(p,q,\gamma_\infty,\|a\|_{C^1(B_1)},\|\Phi\|_{L^\infty(B_1)})M_1^{q-1}\big] \nonumber\\ &\quad+a(\hat{x})\big[-C(q,\beta)M^{q-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}+C(n,q,c_\beta)M_1^{q-2}|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\big], \end{align} where we have used the relation $M_1\ge M_2$ to simplify the display. To get a contradiction, we have to select such large $M_1$ that \begin{equation} \label{5-18} \begin{cases} \frac{1}{3}C(p,\beta)M^{p-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\geq C(n,p,c_\beta)M_1^{p-2}|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1},\\[2mm] \frac{1}{3}C(p,\beta)M^{p-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\geq C(p,q,\gamma_\infty,\|a\|_{C^1(B_1)},\|\Phi\|_{L^\infty(B_1)})M_1^{q-1},\\[2mm] \frac{1}{2}C(q,\beta)M^{q-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\geq C(n,q,c_\beta)M^{q-2}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}, \end{cases} \end{equation} that is, \begin{equation*} \begin{cases} M_1\geq C(n,p,q,c_\beta),\\[2mm] M^{p-q}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\geq C(p,q,\beta,\gamma_\infty,\|a\|_{C^1(B_1)},\|\Phi\|_{L^\infty(B_1)}). \end{cases} \end{equation*} Remembering \eqref{5-8-1}, we arrive at $$ M^{p-q}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}\geq (4\|u\|_{L^\infty(B_1)})^{\frac{\beta}{2}-1}M_1^{p-q+1-\frac{\beta}{2}}. $$ Now enforcing $$ q<p+1-\frac{\beta}{2}, $$ we could choose such large $M_1$ that $$ M_1\ge C(n,p,q,\beta,\gamma_\infty,\|a\|_{C^1(B_1)},\|\Phi\|_{L^\infty(B_1)},\|u\|_{L^\infty(B_1)}), $$ which ensures \eqref{5-18} holds true. Then the display \eqref{5-17} becomes $$ 0\leq -\frac{1}{3}CM^{p-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}-\frac{1}{2}a(\hat{x})CM^{q-1}_1|\hat{x}-\hat{y}|^{\frac{\beta}{2}-1}<0, $$ which is a contradiction. Let us mention that we can fix $\beta$ to a specific number so that $M_1$ does not depend on $\beta$. Up to now, we have justified the local Lipschitz continuity of $u$. \end{proof} Once Lemma \ref{lem5-2} is proved in $B_1$, then the case of a bounded domain $\Omega$ follows by the covering arguments. Therefore, we finish the proof of Theorem \ref{thm1-1}. \section*{Acknowledgments} This work was supported by the National Natural Science Foundation of China (No. 12071098) and the National Postdoctoral Program for Innovative Talents of China (No. BX20220381). The second author was supported by a grant of the Romanian Ministry of Research, Innovation, and Digitization, CNCS/CCCDI-UEFISCDI (project no. PCE 137/2021), within PNCDI III.
\section{Introduction} Hecke characters are, from the modern point of view, continuous characters of id\`ele class groups, in other words automorphic forms for~$\GL_1$. They were introduced by Hecke~\cite{HeckeWork} who proved the functional equation of their $L$-function, and are the starting point of many developments that blossom in modern number theory: automorphic $L$-functions via Tate's thesis~\cite{TateThesis}, $\ell$-adic Galois representations via Weil's notion of algebraic characters~\cite{Weil1956}, Shimura varieties via CM theory~\cite{TaniyamaCM}, and the Langlands programme via class field theory and the global Weil group~\cite{WeilGroup}. Despite their fundamental role, Hecke characters have not received a full algorithmic treatment, perhaps due to the fact that they are considered well-understood compared to automorphic forms on higher rank groups. The existing literature only describes how to compute with finite order characters, since they are characters of ray class groups~\cite{CohenAdvanced}, and algebraic Hecke characters~\cite{WatkinsComputingHecke}. As part of a collective effort to enumerate and compute $L$-functions, automorphic representations and Galois representations, we believe that the~$\GL_1$ case also deserves close scrutiny, and this is the goal of the present paper. We describe algorithms to compute, given a number field~$F$ and a modulus~$\gm$ over~$F$, a basis of the group of Hecke quasi-characters of modulus~$\gm$ (Algorithm~\ref{algo:group}) and its subgroup of algebraic characters (Algorithm~\ref{algo:algchar}), in a form suitable for evaluation at arbitrary ideals and decomposition into local characters (Algorithm~\ref{algo:log}). In particular, we describe a polynomial time algorithm to compute the maximal CM subfield of~$F$ (Algorithm~\ref{algo:cmsubfield}). It is sometimes believed that the ad\`elic point of view is not suitable for computational purposes; we claim the contrary, and adopt an ad\`elic setting throughout the paper. Our implementation \cite{parigp:gchar} in Pari/GP~\cite{PariGP} is available from version~2.15 of the software. We provide examples that illustrate the use of our algorithms and showcase some interesting features of Hecke characters: a presentation of the software interface, small degree examples, illustrations of automorphic induction from quadratic fields, examples of CM abelian varieties with emphasis on the rigorous identification of the corresponding Hecke character, illustration of the density of the gamma shifts of Hecke $L$-functions in the conjectured space of possible ones (Proposition~\ref{prop:density}), examples of provably partially algebraic Hecke characters (Proposition~\ref{prop:partcm}) and of twists of $L$-functions by Hecke characters. The only previous work on computation of infinite order Hecke characters is that of Watkins~\cite{WatkinsComputingHecke}, so we give a short comparison: in Watkins's paper, only algebraic characters were considered, and only over a CM field, whereas we treat arbitrary Hecke characters over arbitrary number fields; the values of characters were represented exactly by algebraic numbers, whereas we represent values by approximations since this is forced in the transcendental case; the emphasis was on individual Hecke characters, which the user had to construct by hand, whereas our emphasis is on groups of Hecke characters, which we construct for the user, simply from the modulus. Our implementation makes it possible to tabulate Hecke characters and their $L$-functions systematically by increasing analytic conductor; we think that this is a valuable project but we leave it for future work. The paper is organized as follows. In Section~\ref{sec:reminder} we recall the definitions and basic properties of Hecke characters and their $L$-functions. In Section~\ref{sec:computing} we describe our algorithms to compute groups of Hecke characters and evaluate them. In Section~\ref{sec:algebraic} we present our algorithms to compute the maximal CM subfield and groups of algebraic Hecke characters. Finally, Section~\ref{sec:examples} contains a variety of examples. \paragraph{Acknowledgements} We thank the anonymous reviewers for their careful reading of our manuscript and their many comments and suggestions. We also thank Karim Belabas and Bill Allombert for their help in integrating our code to Pari/GP. The first author acknowledges support of ANR FLAIR ANR-17-CE40-0012. The second author was supported by the grants ANR CIAO ANR-19-CE48-0008 and ANR CHARM ANR-21-CE94-0003. \section{Hecke characters}\label{sec:reminder} We recall the definition of Hecke characters in the adèlic setting. This material is standard and can be found in \cite[chap. XIV]{LangANT} or \cite{Schappacher1988}. Let $F$ be a number field of degree $[F:\Q]=n$ and discriminant~$\Delta_F$. When~$K/F$ is a finite extension, we denote by~$\Nm_{K/F}$ the norm from~$K$ to~$F$; we also denote~$\Nm = \Nm_{F/\Q}$ when~$F$ is clear from the context. For every prime ideal~$\gp$ of~$F$, we consider the completion~$F_\gp$ and its ring of integers $\Z_\gp$. We choose a uniformizer~$\pi_\gp\in\Z_\gp$ and denote by~$v_\gp \colon F_\gp^\times \twoheadrightarrow \Z$ the~$\gp$-adic valuation. We will always use~$\sigma$ to denote an archimedean place of~$F$ and the corresponding real or complex embedding. For every place~$v$, let~$n_v = [F_v:\Q_v]$, and let~$|\cdot|_v$ be the normalized absolute value, i.e.~$n_\sigma=1$ and~$ |\cdot |_\sigma = |\cdot |$ for a real embedding~$\sigma$, $n_\sigma=2$ and~$|\cdot|_\sigma = |\cdot|^2$ for a complex embedding~$\sigma$, and $|\pi_\gp|_\gp = \Nm(\gp)^{-1}$ for a prime ideal~$\gp$. We denote by $\AFs = \prod'F_v^\times$ the group of idèles of $F$. We write~$F_\R = F\otimes_\Q\R \cong \prod_{\sigma}F_\sigma \cong \R^{r_1}\times\C^{r_2}$, where~$r_1$ (resp.~$r_2$) is the number of real embeddings (resp. pairs of non-real complex embeddings) of~$F$. Let~$\U$ denote the group of complex numbers of absolute value~$1$. For~$G$ a topological group, $G^\circ$ will denote the connected component of~$1$ in~$G$. \subsection{Pontryagin duality}\label{sec:pontryagin} We recall some definitions and properties of locally compact abelian groups that will be used later. See~\cite{MorrisDualityLayman, MorrisDuality} for general reference. Let~$G$ be a locally compact abelian group. A \emph{quasi-character} of~$G$ is a continuous morphism \[ \chi\colon G \to \C^\times. \] A \emph{character} of~$G$ is a continuous morphism \[ \chi\colon G \to \U. \] The group of characters of~$G$, which we denote by~$\widehat{G}$, is the Pontryagin dual~$\Hom_{\rm cont}(G,\U)$ of~$G$, and is a locally compact abelian group. The canonical map \[ G \to \widehat{\widehat{G\, }} \] given by~$g \mapsto (\chi \mapsto \chi(g))$ is an isomorphism. Let~$H\subset G$ be a subgroup. Let \[ H^\perp = \{\chi\in \widehat{G} \mid \chi(h) = 1 \text{ for all }h \in H\} \] be the Pontryagin orthogonal of $H$ in $\widehat G$. Then~$H^\perp$ is a closed subgroup of~$\widehat{G}$, and $(H^\perp)^\perp$ is the closure of~$H$, where the second orthogonal is taken in~$G$. If~$H$ is a closed subgroup of~$G$, then we have canonical isomorphisms \[ \widehat{G/H} \cong H^\perp \text{ and } \widehat{G}/(H^\perp) \cong \widehat{H}. \] The group~$G$ is compact if and only if~$\widehat{G}$ is discrete. Pontryagin duality is an exact contravariant functor on the category of locally compact abelian groups. Let~$(x,y) \mapsto x\cdot y$ denote a nondegenerate $\R$-bilinear form on a finite dimensional $\R$-vector space~$V$. The pairing~$V\times V \to \U$ defined by~$(x,y) \mapsto \exp(2i\pi x\cdot y )$ induces an isomorphism~$V \cong \widehat{V}$. We will use this isomorphism to identify characters on~$V$ with elements of $V$. Let~$\Lambda$ be a full rank lattice in $V$. The pairing above identifies the dual lattice~$\Lambda^\vee = \Hom(\Lambda,\Z)$ with the subgroup \[ \Lambda^\perp = \{x\in V \mid x\cdot y \in \Z \text{ for all }y \in \Lambda\}, \] which is canonically isomorphic to~$\widehat{V/\Lambda}$ by the above, and we have $\widehat{\Lambda} \cong V/\Lambda^\perp$. In particular for $V = \R$ and $\Lambda = \Z$ we consider the standard bilinear form and we have $\widehat{\R/\Z}=\Z^\perp=\Z$ and $\widehat{\Z}=\R/\Z$. The dual~$\mathbb{V} = \widehat{\Q}$ of the group of rationals equipped with the discrete topology, is the compact topological group~$\displaystyle \lim_{\ot n}\R/n\Z$, called the \emph{solenoid}. \subsection{General Hecke characters} A Hecke quasi-character is a quasi-character of~$C_F = \AFs/F^\times$, and a Hecke character is a character of~$C_F$. The \emph{norm} is the Hecke quasi-character \[ \|\cdot\| \colon C_F \to \C^\times \] defined by \[ x = (x_v)_v \mapsto \|x\| = \prod_v |x_v|_v. \] This is a well-defined Hecke quasi-character by the product formula. Every Hecke quasi-character~$\chi$ is of the form~$\chi = \chi_0 \|\cdot\|^s$ for a unique Hecke character~$\chi_0$ and a unique~$s\in\R$. We refer to~$\chi_0$ as the \emph{unitary component} of $\chi$. In the algebraic setting, the value $w=-2s$ is the \emph{weight} of $\chi$. We also define~$C_F^1 = \ker (\|\cdot\|\colon C_F \to \R_{>0})$ to be the kernel of the norm, which is a compact group. We have a canonical embedding \[ \R_{>0} \to C_F, \] by sending~$t\in\R_{>0} \mapsto ((t^{1/n})_\sigma,1,\dots)\in\AFs$ where~$t\mapsto (t^{1/n})_\sigma$ denotes the diagonal embedding~$\R_{>0} \to \prod_\sigma F_\sigma^\times$, and a canonical decomposition \[ C_F \cong C_F^1 \times\R_{>0}. \] As a consequence, it suffices to compute the characters of $C_F^1$ to deduce the full groups of Hecke characters and Hecke quasi-characters \begin{equation} \label{eq:normsplitting} \Hom_{\rm cont}(C_F,\C^\times) = \widehat{C}_F \|\cdot\|^\R = \widehat{C}^1_F\|\cdot\|^\C. \end{equation} Every quasi-character~$\chi$ of~$\AFs$ (and in particular every Hecke quasi-character) admits a factorization~$\chi = \prod_v\chi_v$, where~$\chi_v$ is a quasi-character of~$F_v^\times$. We therefore describe quasi-characters of local fields. \subsection{Local characters} \begin{itemize} \item Every quasi-character~$\chi$ of~$\C^\times$ is of the form \[ \chi(z) = \Bigl(\frac{z}{|z|}\Bigr)^k |z|_\C^s = \Bigl(\frac{z}{|z|}\Bigr)^k |z|^{2s} \] for a unique pair~$(k,s)\in\Z\times\C$. The quasi-character~$\chi$ is a character if and only if~$\Re(s) = 0$, i.e.~$s = i\varphi$ for some~$\varphi\in\R$. \item Every quasi-character~$\chi$ of~$\R^\times$ is of the form \[ \chi(x) = \sgn(x)^k |x|^s \] for a unique pair~$(k,s)\in\set{0,1}\times\C$. We say that~$\chi$ is \emph{unramified} if~$k=0$. The quasi-character~$\chi$ is a character if and only if~$\Re(s) = 0$, i.e.~$s = i\varphi$ for some~$\varphi\in\R$. \item Let~$\gp$ be a prime ideal of~$\Z_F$. Every quasi-character~$\chi$ of~$F_\gp^\times$ is of the form \[ \chi(x) = \chi_0(x\pi_\gp^{-v_\gp(x)} \bmod \gp^m) \chi(\gp)^{v_\gp(x)} \] for a unique~$m\ge 0$ and a unique primitive character~$\chi_0$ of~$(\Z_\gp/\gp^m)^\times$, and where we write~$\chi(\gp)=\chi(\pi_\gp)\in\C^\times$. Note that in general~$\chi(\gp)$ depends on the choice of uniformizer~$\pi_\gp$, but~$\chi(\gp)$ is well defined up to the roots of unity of the same order as~$\chi_0$. We call~$\gp^m$ the conductor of~$\chi$ and~$m$ its conductor exponent. If~$m=0$ we call~$\chi$ \emph{unramified}; in this case, $\chi(\gp)$ does not depend on the choice of uniformizer, and the quasi-character~$\chi$ only depends on~$\chi(\gp)$. Regardless of~$m$, the quasi-character~$\chi$ is a character if and only if~$\chi(\gp)\in\U$. \end{itemize} Whenever we write a global id\`ele character~$\chi$ as a product of local characters~$\chi_v$, we write its local parameters~$k_\sigma,\varphi_\sigma$, and~$m_\gp$, and we let~$\gf_\chi = \prod_\gp \gp^{m_\gp}$ be the conductor of~$\chi$. Note that for a complex place, the pair~$(k_\sigma,\varphi_\sigma)$ depends on the choice of a complex embedding among the two conjugate ones, or equivalently on the choice of an isomorphism between the completion of~$F$ and~$\C$: we have~$\varphi_{\bar{\sigma}} = \varphi_{\sigma}$ and~$k_{\bar{\sigma}} = -k_{\sigma}$. \subsection{$L$-function} Let~$\chi$ be a Hecke character such that~$\sum_\sigma n_\sigma\varphi_\sigma = 0$, i.e. that is trivial on the embedded~$\R_{>0}$ in~\eqref{eq:normsplitting}. Let~$N_\chi = |\Delta_F|\cdot \Nm(\gf_\chi)$. Let \[ L(\chi,s) = \prod_{\gp\nmid \gf_\chi}(1-\chi(\gp)\Nm(\gp)^{-s})^{-1} \] and \[ \gamma(\chi,s) = \prod_{\sigma\text{ real}}\Gamma_{\R}(s+i\varphi_\sigma+k_\sigma) \cdot \prod_{\sigma\text{ complex}}\Gamma_{\C}(s+i\varphi_\sigma+|k_\sigma|/2). \] where $\Gamma_\R(s)=\pi^{-\frac s2}\Gamma(\frac s2)$ and $\Gamma_\C(s)=2(2\pi)^{-s}\Gamma(s)$. Then \[ \Lambda(\chi,s) = N_\chi^{s/2}\gamma(\chi,s)L(\chi,s) \] satisfies the functional equation \[ \Lambda(\chi,1-s) = W(\chi) \Lambda(\bar{\chi},s) \] for some complex number~$W(\chi)$ of absolute value~$1$. \ifarxiv We have the formula \[ W(\chi) = \prod_v W(\chi_v), \] where \[ W(\chi_v) = \begin{cases} 4^{i\varphi_\sigma}i^{|k_\sigma|} \text{ if }v=\sigma\text{ is complex,}\\ i^{k_\sigma} \text{ if }v=\sigma\text{ is real,}\\ \chi(\gp)^{d_\gp} \overline{\tau(\chi_\gp)} \Nm(\gp)^{-m_\gp/2} \text{ if }v=\gp\mid \gf_\chi\text{, and} \\ \chi(\gp)^{d_\gp}\text{ if }v=\gp\nmid\gf_\chi. \end{cases} \] where~$d_\gp = v_\gp(\mathfrak{D} \gf_\chi)$ and~$\mathfrak{D}$ is the different of~$F$ (so that the product is finite), and \[ \tau(\chi_\gp) = \sum_{\epsilon\in(\Z_\gp/\gf_{\chi,\gp})^\times}\chi(\epsilon)\exp(2i\pi \lambda\circ \Tr_{F_\gp/\Q}(\epsilon/\pi_\gp^{d_\gp})) \] where~$\lambda\colon \Q_p \to \Q_p/\Z_p \to \Q/\Z$. \fi \subsection{Algebraic Hecke characters} \textbf{Warning}: an algebraic Hecke character is usually not a Hecke character, it is only a quasi-character. Let~$\chi$ be a Hecke quasi-character. It is called~\emph{algebraic} if for every archimedean place~$\sigma$ of~$F$, there exists integers~$p_\sigma,q_\sigma\in \Z$ such that for all~$z\in (F_\sigma^\times)^\circ$ we have \footnote{The choice of sign in the exponents is such that the values of~$\chi$ at integral ideals are algebraic integers if and only if all~$p_\sigma$ and~$q_\sigma$ are nonnegative.} \[ \chi_\sigma(z) = z^{-p_\sigma}(\bar{z})^{-q_\sigma}. \] Note: if~$\sigma$ is complex, then~$p_\sigma$ and~$q_\sigma$ are uniquely determined; if~$\sigma$ is real then only their sum is well-defined. We say that~$\chi$ is \emph{of type}~$(p_\sigma,q_\sigma)_\sigma$. \begin{ex} The norm~$\|\cdot\|$ is an algebraic character, of type~$(p_\sigma,q_\sigma)=(-1,-1)$ if~$\sigma$ is complex. We have~$\|\gp\| = \Nm(\gp)^{-1}$ for every prime ideal~$\gp$. \end{ex} \begin{defi}\label{defi:algebraic} We call a Hecke character \emph{almost-algebraic} if~$\varphi_\sigma=0$ for all~$\sigma$. We denote by $\bigl(\widehat{C}_F\bigr)^{\mathrm{a.a.}}$ the subgroup of almost-algebraic characters. \end{defi} \begin{rmk} Algebraic characters correspond to~\emph{type~$A_0$} and almost-algebraic to~\emph{type~$A$} with trivial norm component in Weil's terminology \cite{Weil1956}. By a theorem of Waldschmidt \cite{Waldschmidt1981}, these definitions coincide with the fact that a quasi-character has~type~$A$ if and only if its values are algebraic, and~type~$A_0$ if and only if there exists a finite extension of~$\Q$ containing all of its values. \end{rmk} \subsubsection{Parameters at infinity of algebraic Hecke characters} \label{sec:almostalg} It is known that if $F$ has a real embedding, then every algebraic Hecke character is an integral power of the norm times a Hecke character of finite order (see~\cite{Weil1956}). So from now on we assume that~$F$ is totally complex. We recall the following well-known lemma. \begin{lem} \label{lem:infinitytype} Let~$\chi_0$ be a Hecke character and let~$(k_\sigma,\varphi_\sigma)$ denote its local parameters at infinite places. The character~$\chi_0$ is the unitary component of an algebraic Hecke character if and only if~$\chi_0$ is almost algebraic and all~$k_\sigma$ have the same parity. More precisely, let~$\chi = \chi_0\|\cdot\|^{-w/2}$ be a Hecke quasi-character with~$w\in\R$. If~$\chi$ is algebraic of type~$(p_\sigma,q_\sigma)$, then \begin{itemize} \item $w\in\Z$; \item $p_\sigma+q_\sigma=w$ for all~$\sigma$; \item $k_\sigma = q_\sigma-p_\sigma$ for all~$\sigma$; \item $\varphi_\sigma = 0$ for all~$\sigma$. \end{itemize} Conversely, if~$\chi_0$ is almost-algebraic and all~$k_\sigma$ have the same parity, let~$w\in\Z$ have the same parity as the~$k_\sigma$; then~$\chi = \chi_0\|\cdot\|^{-w/2}$ is algebraic. \end{lem} \begin{proof} Let~$\chi = \chi_0\|\cdot\|^{-w/2}$ be a Hecke quasi-character with~$w\in\R$, so that for all~$z\in\C^\times$ we have \[ \chi_\sigma(z) = \Bigl(\frac{z}{|z|}\Bigr)^{k_\sigma}|z|^{2i\varphi_\sigma-w}. \] Let~$p,q\in\Z$. For all~$z\in\C^\times$ we have \[ z^{-p}(\bar{z})^{-q} = \Bigl(\frac{z}{|z|}\Bigr)^{q-p}|z|^{-p-q}. \] By uniqueness of parameters of quasi-characters of~$\C^\times$, the quasi-character~$\chi$ is algebraic of type~$(p_\sigma,q_\sigma)$ if and only if for all~$\sigma$ we have $k_\sigma = q_\sigma-p_\sigma$, $\varphi_\sigma=0$ and $w = p_\sigma+q_\sigma$. In this case, $\chi_0$ is almost-algebraic and for all~$\sigma$ we have~$k_\sigma \equiv q_\sigma-p_\sigma \equiv p_\sigma+q_\sigma \equiv w \bmod{2}$, so that all~$k_\sigma$ have the same parity. This also validates the construction of an algebraic~$\chi$ from an almost-algebraic~$\chi_0$ satisfying the parity condition. \end{proof} Thus the group of unitary components~$\chi_0$ of algebraic Hecke characters~$\chi=\chi_0\|\cdot\|^{-w/2}$ is a finite index subgroup of the group of almost-algebraic Hecke characters. \subsubsection{$L$-function of an algebraic Hecke character} Let~$\chi = \chi_0\|\cdot\|^{-w/2}$ be an algebraic Hecke character as above. Let~$\gf_\chi = \gf_{\chi_0}$ be its conductor and~$N_\chi = N_{\chi_0}$. Let \[ L(\chi,s) = \prod_{\gp\nmid \gf_\chi}(1-\chi(\gp)\Nm(\gp)^{-s})^{-1} = L(\chi_0,s-w/2), \] and \[ \gamma(\chi,s) = \prod_\sigma \Gamma_{\C}(s-\min(p_\sigma,q_\sigma)) = \gamma(\chi_0,s-w/2). \] Then \[ \Lambda(\chi,s) = N_\chi^{s/2}\gamma(\chi,s)L(\chi,s) \] satisfies the functional equation \[ \Lambda(\chi, w+1-s) = W(\chi) \Lambda(\bar{\chi},s) \] for some complex number~$W(\chi) = W(\chi_0)$ of absolute value~$1$. \section{Computing the group of Hecke characters}\label{sec:computing} \subsection{Filtration by modulus} \label{sec:filtration} We have a non-canonical isomorphism \[ \widehat{C}_F \cong T \times \Q^{r_1+r_2-1} \times \Z^{r_2} \times \R, \] where~$T$ is an infinite torsion abelian group. Indeed, we have the classical decomposition~\cite{WeilGroup} \[ 1 \to C_F^\circ \to C_F \to \pi_0(C_F) \to 1 \text{, where }C_F^\circ\cong \mathbb{V}^{r_1+r_2-1} \times (\R/\Z)^{r_2}\times \R , \] where~$\mathbb{V} = \widehat{\Q}$ is the solenoid, and~$\pi_0(C_F)$ is profinite; by Pontryagin duality, we get \[ 0 \to T \to \widehat{C}_F \to \Q^{r_1+r_2-1}\times \Z^{r_2} \times \R\to 0, \] and this exact sequence splits. Since we cannot give a finite description of the whole group~$T$, we will filter~$\widehat{C}_F$ according to moduli. Let $\gm = \gm_f\gm_\infty$ be a modulus, meaning that~$\gm_f$ is an integral ideal and~$\gm_\infty$ is a set of real embeddings of~$F$. We write \[ (\Z_F/\gm)^\times = (\Z_F/\gm_f)^\times \times \prod_{\sigma\in\gm_\infty}\set{\pm 1}. \] A Hecke character~$\chi$ is said to have modulus $\gm$ if $\chi$ is trivial on the group~$U(\gm)$ of idèles congruent to 1 mod $\gm$: \[ U(\gm) = \prod_{\gp\mid \gm_f}(1+\gp^{v_\gp(\gm)}\Z_\gp) \times\prod_{\gp\nmid\gm_f}\Z_\gp^\times \times\prod_{\sigma\in\gm_\infty}\set{1} \times\prod_{\substack{\sigma\notin\gm_\infty\\\sigma\text{ real}}}\set{\pm 1} \times\prod_{\sigma\text{ complex}}\set{1}. \] Equivalently, the conductor of~$\chi$ divides~$\gm_f$ and~$\chi$ is unramified at all the real places not dividing~$\gm_\infty$. The character group of modulus $\gm$ is the dual of \[ C_\gm = \AFs/(F^\times \cdot U(\gm)), \] and we have \[ \widehat{C}_F = \bigcup_{\gm}\widehat{C}_\gm. \] In the remainder of this section, we fix a modulus~$\gm$. \subsection{Explicit description} The character group~$\widehat{C}_\gm$ is isomorphic to~$T_\gm \times \Z^{n-1} \times \R$ where~$T_\gm$ is finite. Our goal in the next paragraphs is to prove the following \begin{prop} \label{prop:explicit} There exist an integer $\ell\geq 0$, a lattice~$\Lambda$ of rank~$\ell+n-1$, and two isomorphisms \[ \begin{aligned} \cL\colon &C_\gm {\mathop{\longrightarrow}^\sim} (\Z^\ell\times\R^n)/\Lambda \\ \cL^*\colon &\widehat{C}_\gm {\mathop{\longrightarrow}^\sim} \Lambda^\bot/\Z^\ell \end{aligned} \] where $\Lambda^\bot$ is the Pontryagin orthogonal of $\Lambda$ in $\R^{\ell+n}$, and such that for all $\chi\in \widehat{C}_\gm$ and $x\in\AFs$ we have \begin{equation} \label{eq:chareval} \chi(x) = \exp(2i\pi \cL^*(\chi)\cdot \cL(x)). \end{equation} \end{prop} The lattice~$\Lambda$ and the isomorphisms~$\cL$ and~$\cL^*$ will be made explicit in the next subsections. \subsection{Idèle class groups} \begin{defi} Let~$x\in\A_F^\times$. We define the \emph{ideal attached to~$x$} to be \[ \prod_{\gp}\gp^{v_\gp(x_\gp)}. \] Let~$S$ be a finite set of primes of~$F$. Define the group of \emph{$S$-idèles} to be \[ U_S = \prod_{\gp\in S}F_\gp^\times \times \prod_{\gp\notin S}\Z_\gp^\times \times F_\R^\times, \] and the group of~\emph{$S$-units} $\Z_{F,S}^\times = F^\times \cap U_S$. \end{defi} \begin{lem} \label{lem:surj2} Let~$x\in\A_F^\times$. Then~$x\in U_S$ if and only if the ideal attached to~$x$ belongs to the group~$\langle S\rangle$ generated by~$S$. If~$S$ generates the class group of~$F$, then~$\A_F^\times = U_S \cdot F^\times$. \end{lem} \begin{proof} The first property follows from rewriting the definition of~$U_S$ as~$U_S = \{x\in \A_F^\times \mid v_\gp(x) = 0 \text{ for all }\gp\notin S\}$. Let~$x\in \A_F^\times$ and~$\ga$ the ideal attached to~$x$. Assuming~$S$ generates the class group, let~$\alpha$ be such that~$\ga(\alpha^{-1})\in \langle S\rangle$. Then~$x\alpha^{-1}\in U_S$. \end{proof} \newcommand{\Z^S \times (\Z_F/\gm)^\times \times (F_\R^\times)^\circ}{\Z^S \times (\Z_F/\gm)^\times \times (F_\R^\times)^\circ} \begin{defi}\label{def:decomp} Let~$S$ be a set of primes generating the class group of~$F$. Let \[ \decomp_S \colon U_S \to \Z^S \times (\Z_F/\gm)^\times \times (F_\R^\times)^\circ \] be defined by \[ \decomp_S(x) = \bigl( v_\gp(x_\gp)_{\gp\in S}, (u\bmod \gm_f), (\sgn(x_\sigma))_{\sigma\in\gm_\infty}, (|x_\sigma|)_{\sigma\text{ real}}, (x_\sigma)_{\sigma\text{ complex}} \bigr), \] where~$u\in\prod_\gp\Z_\gp^\times$ is defined by~$u_\gp = x_\gp \pi_\gp^{-v_\gp(x_\gp)}$, where we recall that~$\pi_\gp\in\Z_\gp$ is a chosen uniformiser. Let \[ \decomp \colon \A_F^\times/F^\times \to \Bigl[\Z^S \times (\Z_F/\gm)^\times \times (F_\R^\times)^\circ\Bigr] / \decomp_S(\Z_{F,S}^\times) \] be defined by~$\decomp(x\cdot F^\times) = \decomp_S(x\alpha^{-1})$ where~$\alpha\in F^\times$ such that~$x\alpha^{-1}\in U_S$. \end{defi} \begin{lem} \label{lem:cmisom2} Let $S$ be a finite set of primes generating the class group. Then~$\decomp$ is well-defined and induces an isomorphism \begin{equation} \label{eq:finalquotient2} C_\gm \cong \Bigl[\Z^S \times (\Z_F/\gm)^\times \times (F_\R^\times)^\circ\Bigr]/\decomp_S(\Z_{F,S}^\times). \end{equation} \end{lem} \begin{proof} The existence of the element~$\alpha$ from the definition of~$\decomp$ exists by Lemma~\ref{lem:surj2}. If~$x\alpha^{-1}$ and~$x\beta^{-1}$ belong to~$U_S$ with~$\alpha,\beta\in F^\times$, then~$\beta/\alpha\in F^\times\cap U_S = \Z_{F,S}^\times$, so~$\decomp$ is well-defined. By the decompositions~$F_\gp^\times \cong \pi_\gp^\Z \times \Z_\gp^\times$ and~$F_\R^\times \cong \{\pm 1\}^{r_1}\times (F_\R^\times)^\circ$ and the Chinese remainder theorem, the map~$\decomp_S$ is onto, and~$\ker \decomp_S = U(\gm) \subset U_S$. Moreover by definition~$\decomp(F^\times) = 1$. This proves that~$\ker\decomp = F^\times\cdot U(\gm)$ and therefore~$\decomp$ induces an isomorphism from~$C_\gm = \A_F^\times/(F^\times\cdot U(\gm))$ to its codomain. \end{proof} \subsection{Logarithm maps} In this section we fix a finite set~$S$ of primes that generates the class group of~$F$ and a modulus~$\gm$. \begin{defi} \label{def:mapL} Consider the usual archimedean logarithm $\log_\infty:(F_\R^\times)^\circ\to\R^{r_1+r_2}\times(\R/\Z)^{r_2} = \R^n/\Z^{r_2}$ \begin{equation} \label{eq:logoo} \log_\infty(z) = \left(\Bigl(\frac{n_\sigma}{2\pi}\log\abs{z_\sigma}\Bigr)_{\sigma}, \Bigl(\frac{\arg(z_\sigma)}{2\pi}\Bigr)_{\sigma\text{ complex}}\right), \end{equation} and choose an integer~$r(\gm)\ge 0$, a full sublattice~$\Lambda_{\gm} \subset \Z^{r(\gm)}$ and an isomorphism \begin{equation} \label{eq:logm} \log_\gm : (\Z_F/\gm)^\times {\mathop{\longrightarrow}^\sim} \Z^{r(\gm)}/\Lambda_{\gm}. \end{equation} Let~$\ell = \card{S}+{r(\gm)}$, and let \[ \cL_S \colon U_S \to \frac{\Z^\ell\times \R^n}{\Lambda_{\gm}+\Z^{r_2}} \] be the composition of~$\decomp_S$ with \[ \Id_{\Z^S} \times \log_\gm \times \log_\infty. \] We identify $\Lambda_{\gm}$ and $\Z^{r_2}$ with their embedding in $\Z^\ell\times\R^n$. Let \begin{equation} \label{deflambda} \Lambda = \cL_S(\Z_{F,S}^\times) + \Lambda_{\gm} + \Z^{r_2}, \end{equation} and let \[ \cL \colon \A_F^\times/F^\times \to \frac{\Z^\ell\times \R^n}{\Lambda} \] be defined by~$\cL(x \cdot F^\times) = \cL_S(x\alpha^{-1})$ where~$\alpha\in F^\times$ is such that~$x\alpha^{-1}\in U_S$. \end{defi} \begin{defi} We define the dual logarithm~$\cL^* \colon \widehat{C}_\gm \to (\R/\Z)^{\ell}\times \R^n$ by \begin{equation} \label{duallogmap} \cL^*(\chi) = \! \left( \Bigl(\frac{\arg \chi(\gp)}{2\pi}\Bigr)_{\gp\in S}, \Bigl(\frac{\arg \chi(\log_\gm^{-1}(g_i))}{2\pi}\Bigr)_{i=1}^{r(\gm)}, (\varphi_\sigma)_\sigma, (k_\sigma)_{\sigma \text{ complex}} \right) \end{equation} where~$(g_i)_{i=1}^{r(\gm)}$ is the image in~$\Z^{r(\gm)}/\Lambda_{\gm}$ of the standard basis of~$\Z^{r(\gm)}$ and~$\varphi_\sigma,k_\sigma$ are the parameters at infinity of~$\chi$. \end{defi} Recall that we defined~$\chi(\gp) = \chi(\pi_\gp)$, so that~$\cL^*$ depends on the choices of~$\pi_\gp$ for~$\gp\in S$. We now prove Proposition \ref{prop:explicit} in the following precise form. \begin{prop} Let $\Lambda^\bot$ be the Pontryagin orthogonal of~$\Lambda$ in~$\R^{\ell+n}$. The homomorphisms~$\cL$ and~$\cL^*$ induce isomorphisms \[ \cL\colon C_{\gm} \longrightarrow \frac{\Z^\ell\times\R^n}{\Lambda} \text{ and } \cL^*\colon \widehat{C}_\gm \longrightarrow \Lambda^\bot/\Z^\ell. \] Let $\chi\in \widehat{C}_\gm$ be a character of modulus $\gm$ and let~$x\in\AFs$, then \begin{equation} \label{eq:chareval-bis} \chi(x) = \exp(2i\pi \cL^*(\chi)\cdot \cL(x)), \end{equation} where~$(w,v) \mapsto w\cdot v$ denotes the standard inner product on~$\R^{\ell+n}$. \end{prop} \begin{proof} The fact that~$\cL$ is well-defined and induces an isomorphism follows immediately from Lemma~\ref{lem:cmisom2}. Applying Pontryagin duality to the sequence \[ 0\to C_\gm \to \R^{\ell+n}/\Lambda \to (\R/\Z)^\ell\to 0 \] gives~$\widehat{C}_\gm = \Lambda^\bot/\Z^\ell$. Let~$x\in\A_F^\times$ and write~$x = \alpha \cdot x\alpha^{-1}$ with~$\alpha\in F^\times$ and~$x\alpha^{-1}\in U_S$ by Lemma~\ref{lem:surj2}, and let~$u$ be as in Definition~\ref{def:decomp}. We have \[ x = \alpha \prod_{\gp\in S}\pi_\gp^{v_\gp(x_\gp\alpha^{-1})} \cdot u \cdot \prod_\sigma (x_\sigma\sigma(\alpha)^{-1}), \] and therefore \[ \chi(x) = \chi(\alpha) \cdot \prod_{\gp\in S}\chi_\gp(\pi_\gp^{v_\gp(x_\gp\alpha^{-1})}) \cdot \chi(u) \cdot \prod_\sigma \chi_\sigma(x_\sigma \sigma(\alpha)^{-1}) , \] where~$\chi(\alpha)=1$ and~$\chi(u) = \prod_{\gp\mid\gm_f}\chi_\gp(u_\gp \bmod \gp^{m_\gp})$. By definition the product of local character evaluations is $\exp(2i\pi \cL^*(\chi)\cdot\cL(x))$. This also proves that the image of~$\cL^*$ lies in~$\Lambda^\perp$ and that~$\cL^*$ induces an isomorphism as claimed. \end{proof} \begin{rmk} The lattice $\Lambda$ is not cocompact in $\R^{\ell+n}$, so that the Pontryagin orthogonal~$\Lambda^\perp$ is not discrete. In the next section we factor out the norm, so that the resulting lattice is cocompact and its Pontryagin orthogonal can be expressed as a dual lattice as in Section~\ref{sec:pontryagin}. \end{rmk} \subsection{Characters modulo the norm} Let~$C_\gm^1 = C_F^1\cap C_\gm = \ker (C_\gm \to \R_{>0})$ be the kernel of the norm, which is compact. We have a canonical splitting inherited from (\ref{eq:normsplitting}) \[ C_\gm \cong C_\gm^1\times\R_{>0}, \] and the corresponding decomposition \[ \widehat{C}_\gm \cong \widehat{C}^1_\gm \times \|\cdot\|^{i\R} \] where $\widehat{C}^1_\gm$ is a discrete finitely generated abelian group. \begin{prop} \label{prop:groupmodnorm} Let~$v_0\in\R^{\ell+n}$ be the vector having coordinate~$n_\sigma$ at the components corresponding to~$\varphi_\sigma$ and~$0$ elsewhere, and $p_0:\R^{\ell+n}\to (\R v_0)^\perp$ the orthogonal projection. Then $p_0\circ \cL$ induces an isomorphism \[ \widehat{C}^1_\gm \cong p_0(\Lambda)^\vee /\Z^\ell. \] \end{prop} \begin{proof} Let $H=(\R v_0)^\perp=\set{x \mid \sum n_\sigma x_\sigma=0}$, we have an exact sequence \[ 0\to C_\gm^1 \to H/p_0(\Lambda)\to(\R/\Z)^\ell\to 0, \] where $p_0(\Lambda)$ has full rank in $H$, so that we identify $p_0(\Lambda)^\perp = p_0(\Lambda)^\vee$ in the dual sequence. \end{proof} \begin{rmk} By an appropriate choice of basis of the lattice $\Lambda$, we naturally obtain a structured basis of $C_\gm$ according to the filtration \[ \widehat{\Cl(\gm)} \subset \widehat{C}^1_\gm \subset \widehat{C}_\gm. \] It is even possible to obtain a basis exhibiting the filtration \[ \widehat{\Cl_F} \subset \widehat{\Cl(\gm)} \subset (\widehat{C}^1_\gm)_{k=0} \subset \widehat{C}^1_\gm \subset \widehat{C}_\gm, \] but our implementation makes a different choice of basis, using an SNF basis for the torsion subgroup and exhibiting the subgroup of almost-algebraic characters, as explained in Section~\ref{sec:algebraic}. \end{rmk} \subsection{Algorithms} Since a precise discussion of the complexity is not the main point of the paper, we delegate the difficult operations to oracles. \begin{defi}\label{def:bnfinit} Let $F$ be a number field and $I_F$ the set of fractional ideals of $\Z_F$. We say that $F$ is \emph{strongly computable} if it is equipped with \begin{itemize} \item algorithms to compute field operations in $F$, factorizations into prime ideals and valuations in $I_F$; \item a finite set $S$ of prime ideals generating the class group; \item generators of the $S$-units $\Z_{F,S}^\times$; \item a principalization oracle $p_S\colon I_F\to F^\times\times\Z^S$ such that for every ideal~$\ga\in I_F$ the output~$p_S(\ga) = (\alpha,(a_\gp)_{\gp\in S})$ satisfies~$\ga = (\alpha)\prod_{\gp\in S}\gp^{a_\gp}$; \item for each modulus $\gm$, a lattice $\Lambda_\gm$ of rank $r(\gm)$ and a logarithm oracle $\log_\gm\colon \Z_F\to\Z^{r(\gm)}$ inducing an isomorphism~$(\Z_F/\gm)^\times \cong \Z^{r(\gm)}/\Lambda_\gm$. \end{itemize} \end{defi} Note that these oracles are available in Pari/GP, using the algorithms described in~\cite{Buchmann1990},\cite{CohenFirst}, \cite[Section 4.2]{CohenAdvanced} and~\cite{DiscreteLogs}. Using the notations introduced in Definition~\ref{def:mapL} and Proposition~\ref{prop:groupmodnorm}, our algorithms are the following. \begin{algo}\label{algo:log}~ \begin{itemize} \item Input: a strongly computable number field $F$, a modulus~$\gm$ and an ideal $\ga\in I_F$. \item Output: a vector $z$ in $\R^{\ell+n}$ such that $\cL(\ga)\equiv z\bmod \Lambda$. \end{itemize} \begin{enumerate} \item Let $(\alpha,(a_\gp)_\gp)=p_S(\ga)$. \item Let $u\in \Z_F$ such that $\alpha\pi_\gp^{-v_\gp(\alpha)}\equiv u\bmod\gp^{v_\gp(\gm_f)}$ for all $\gp\mid\gm_f$. \item Return $z=((a_\gp)_{\gp\in S},-\log_\gm(u),-\log_\infty(\alpha))$. \end{enumerate} \end{algo} \begin{algo}\label{algo:group}~ \begin{itemize} \item Input: a strongly computable number field $F$ and a modulus $\gm$. \item Output: a matrix $B$ whose rows generate $\widehat{C}^1_\gm$ in $\R^{\ell+n}$. \end{itemize} \begin{enumerate} \item Let $A$ be a matrix whose columns form a basis of $\cL_S(\Z_{F,S}^\times)+\Lambda_\gm+\Z^{r_2}+\Z v_0$ in $\R^{\ell+n}$. \item Let $B = A^{-1}$: the rows of~$B$ form the basis dual to the columns of~$A$. \item Delete from~$B$ the row corresponding to the linear form dual to~$v_0$. \item Replace the rows of~$B$ by their orthogonal projections onto $(\R v_0)^\perp$. \item Return the $(\ell+n-1)\times(\ell+n)$ matrix~$B$. \end{enumerate} \end{algo} \begin{rmk} These algorithms output numerical approximations in $\R^{\ell+n}$: their validity to any prescribed accuracy can be certified as follows. In both cases, the numerical approximations come from log embeddings of number field elements, which can be obtained to arbitrary accuracy in polynomial time. All subsequent numerical operations come from linear algebra and can be implemented using certified numerical algorithms \cite{Johansson2017arb} with automatic precision increase until a target precision is reached. Our package implements this strategy except that we rely on Pari/GP's arithmetic which is not certified. \end{rmk} \begin{thm} Algorithm~\ref{algo:group} and Algorithm~\ref{algo:log} are correct. They are polynomial time, meaning a polynomial number of calls to the oracles with polynomial size input and a polynomial number of other operations. \end{thm} \begin{proof} Algorithm~\ref{algo:group} is correct by Proposition~\ref{prop:groupmodnorm}. We verify that the value $z$ computed in Algorithm~\ref{algo:log} equals $\cL(\ga)\bmod\Lambda$: let $x=(\pi_\gp^{v_\gp(\ga)})$ be an idèle defining $\ga$, we have $\cL(\ga)=\cL(x)=\cL_S(x\alpha^{-1})$ by definition of $\cL$. Now we have $v_\gp(x\alpha^{-1})=a_\gp$ for $\gp \in S$ by definition of $p_S$, and $x\alpha^{-1}\equiv u^{-1}\bmod \gm$ by definition of $u$. At infinite places $(x\alpha^{-1})_\sigma=\alpha^{-1}_\sigma$. Hence $\cL_S(x\alpha^{-1})\equiv z\bmod \Lambda$, and Algorithm~\ref{algo:log} is correct. All operations not provided by the oracles can clearly be performed in polynomial time. \end{proof} \section{The subgroup of algebraic characters}\label{sec:algebraic} Among Hecke quasi-characters, we would like to exhibit the subgroup of algebraic Hecke characters. By Lemma~\ref{lem:infinitytype}, it is equivalent to compute the subgroup of almost-algebraic characters inside the group of Hecke characters. More precisely, let~$H_0^\bot\subset\R^{\ell+n}$ be the subgroup of characters defined by H_0^\perp = \set{\varphi_\sigma = 0\text{ for all }\sigma}, $ then \[ \begin{aligned} \bigl(\widehat{C}_\gm\bigr)^{\mathrm{a.a.}} &= \widehat{C}_\gm\cap \bigl(\widehat{C}_F\bigr)^{\mathrm{a.a.}} \\ &\cong \Lambda^\perp\cap H_0^\perp/\Z^\ell =\set{\lambda\in\Lambda^\perp \mid \lambda(h)=1 \text{ for all }h\in H_0}/\Z^\ell. \end{aligned} \] However, we do not want to solve the equation~$\varphi_\sigma=0$ since the components~$\varphi_\sigma$ on~$\Lambda^\perp$ are only known approximately. We are therefore going to use the known structure of algebraic characters. Recall that a number field~$K$ is \emph{CM} if it is a totally complex quadratic extension of a totally real field, denoted~$K^+$. In this case, the automorphism corresponding to this quadratic extension induces complex conjugation on every complex embedding of~$K$, and we therefore denote it by~$x\mapsto \bar{x}$. A classical theorem of Weil and Artin states the following~\cite{Weil1956,Patrikis2019}: \begin{itemize} \item If~$F$ does not admit a CM subfield, then every algebraic Hecke character is a finite order character times an integral power of the norm. \item If~$F$ admits a CM subfield, then it admits a maximal CM subfield~$K$. The type of every algebraic Hecke character of~$F$ is the lift of the type of an algebraic character of~$K$. Equivalently, every almost-algebraic Hecke character of~$F$, up to a finite order character, factors through the norm~$\Nm_{F/K}$ to~$K$. \end{itemize} \subsection{Determining the subgroup of algebraic characters from the maximal CM subfield} In this section, we assume that~$F$ contains a CM subfield. In particular, $F$ is totally complex. Let~$G = \R^{\ell+n}$ be equipped with its standard inner product and $\Lambda_0=\Lambda+\Z v_0=\cL_S(\Z_{F,S}^\times) +\Lambda_{\gm} + \Z^{r_2}+\Z v_0$, so that~$\widehat{C}^1_\gm\times\|\cdot\|^{i\Z} \cong \Lambda_0^\bot/\Z^\ell$, with $\Lambda_0^\bot=\Lambda_0^\vee$ in $G$. Our strategy is to capture the algebraic characters in a smaller subspace $H^\perp\subset G$ by using the additional known constraints on almost-algebraic characters, in order to apply the following lemma. \begin{lem} \label{lem:subgroupexact} Let~$G$ be a finite dimensional $\R$-vector space, let~$H\subset G$ be an~$\R$-vector subspace and let~$\Lambda_0\subset G$ be a lattice such that~$H\cap \Lambda_0$ has full rank in~$H$. Then \[ \Lambda_0^\bot\cap H^\bot=\set{\lambda\in \Lambda_0^\bot, \lambda\cdot h=0 \text{ for all }h\in H\cap \Lambda_0}. \] \end{lem} \begin{proof} We use the fact that~$H$ is an~$\R$-subspace generated by~$H\cap \Lambda_0$ to write \[ \begin{aligned} \Lambda_0^\bot\cap H^\bot &= \set{x\in \Lambda_0^\bot, x\cdot h\in\Z \text{ for all }h\in H} \\&= \set{x\in \Lambda_0^\bot, x\cdot h = 0 \text{ for all }h\in H} \\&= \set{x\in \Lambda_0^\bot, x\cdot h = 0 \text{ for all }h\in H\cap \Lambda_0}, \end{aligned} \] proving the claim. \end{proof} \begin{rmk} The point of Lemma~\ref{lem:subgroupexact} is that since the inner products between elements of~$\Lambda_0$ and~$\Lambda_0^\perp$ are in~$\Z$, the given expression for~$\Lambda_0^\perp\cap H^\perp$ can be computed exactly as a subgroup of~$\Lambda_0^\perp$ by linear algebra over~$\Z$. \end{rmk} \begin{ex} When~$H_0^\perp =\set{\varphi_\sigma=0}$ as above, we have~$H_0 = \R^{r_2}$. Then $H_0\cap \Lambda_0$ is~$\cL_S(\Z_{K^+}^\times) + \Z v_0$, which has rank~$r_1(K^+) = r_2(K)$. This has full rank in~$H_0$ if and only if~$K=F$. \end{ex} This example shows that using~$H_0$ is sufficient when~$F$ itself is CM. In the general case, we proceed as follows. \begin{prop}\label{prop:algchar} Let~$K$ be the maximal CM subfield of~$F$, let \[ H^\perp = \{\varphi_\sigma=0 \text{ for all }\sigma, \text{ and } (k_\sigma)_\sigma \text{ factors through }K\} \] and~$\Lambda_0=\cL_S(\Z_{F,S}^\times) +\Lambda_{\gm} + \Z^{r_2} + \Z v_0$. Then \[ \bigl(\widehat{C}_\gm\bigr)^{\mathrm{a.a.}} = (\Lambda_0^\bot\cap H^\bot)/\Z^\ell. \] where~$\Lambda_0\cap H$ has full rank in~$H$. More precisely, the group~$U\subset \Lambda_0$ generated by~$v_0$, the kernel~$\ker(\Nm_{F/K} \colon \Z^{r_2} \to \Z^{r_2(K)})$ and~$\cL_S(u)$ for all~$u\in\ker (\Z_F^\times \to (\Z_F/\gm)^\times)$ such that~$\Nm_{F/K}(u)\in K^+$, is contained in~$H$ and has full rank. \end{prop} \begin{proof} Almost-algebraic characters are contained in~$H^\perp$ since their infinity types factor through $\Nm_{F/K}$, and we have $H = \R^{r_2} \times \ker(\Nm_{F/K} : \R^{r_2} \to \R^{r_2(K)})$. The group~$U$ described in the Proposition is clearly contained in~$H\cap\Lambda_0$. The map~$\Nm_{F/K} \colon \Z^{r_2} \to \Z^{r_2(K)}$ is surjective since every complex place of~$K$ extends to a complex place of~$F$, so that its kernel has rank~$r_2-r_2(K)$. Finally, the units described form a finite index subgroup of~$\Z_F^\times$, so the group~$U$ has full rank in~$H$. \end{proof} \subsection{The maximal CM subfield}\label{sec:cmsubfield} In this section we reformulate the problem of determining the maximal CM subfield in a way that is suitable for an efficient algorithm. Indeed enumerating all subfields, regardless of the algorithm used, could not lead to a polynomial time algorithm since the number of subfields is not polynomially bounded, as the example of multi-quadratic fields shows. One may consider a pure Galois-theoretic approach, but it is currently not known whether one can compute in polynomial time, given a number field~$F$, the Galois group of the Galois closure of~$F$ (see \cite{ComplexityGalois2003,SolvabilityRadicals1985,ElsenhansKluners2019}). Our method relies on the following Lemma. \begin{lem}\label{lem:cmsubfield} Let~$F$ be a number field. For~$\varepsilon\in\{\pm\}$, let \[ F^\varepsilon = \{x\in F\mid \sigma(x) = \varepsilon\bar\sigma(x) \text{ for all }\sigma\in\Hom(F,\C)\}. \] The following are equivalent: \begin{enumerate}[(i)] \item $F$ admits a CM subfield; \item $F^-\neq 0$; \item $\dim_\Q F^+ = \dim_\Q F^-$. \end{enumerate} If those conditions are satisfied, then the largest CM subfield of~$F$ is~$F^+ + F^-$; it also equals~$\Q(a)$ for every~$a\in F^-$ having minimal polynomial of degree~$2\dim_\Q F^-$, and such an element exists. \end{lem} \begin{proof} First note that~$F^+$ is the largest totally real subfield of~$F$. It is clear that~(i) implies~(ii). Since~$\dim_\Q F^+\ge 1$, (iii) implies~(ii). Let~$a,b\in F^-$ be nonzero; then~$a/b\in F^+$ and therefore~$F^-$ is a one-dimensional vector space over~$F^+$, so~(ii) implies~(iii). Let~$a\in F^-$ be nonzero; then~$a^2\in F^+$ is totally negative, so~$F^+(a) = F^+ + F^-$ is a CM subfield of~$F$, so that~(ii) implies~(i). If the conditions are satisfied, then the maximal CM subfield~$K$ of~$F$ is a quadratic extension of its totally real subfield~$F^+$ containing~$F^+ + F^-$, so there is equality as claimed. Let~$a\in F^-\subset K$ have minimal polynomial of degree~$2\dim_\Q F^- = [K:\Q]$; then it generates~$K$ over~$\Q$. For every subfield~$L\subset K$, if~$F^-\subset L$ then~$F^+\subset L$ by taking ratios, so~$K\subset L$ and therefore~$L = K$. The set of elements of~$F^-$ lying in a proper subfield of~$K$ is therefore a finite union of proper subspaces, and is therefore nonempty. \end{proof} It is therefore enough to compute~$F^-$. Proposition~\ref{prop:twoemb} below gives a general algorithm to solve this type of problem. \begin{prop}\label{prop:twoemb} Let~$F$ be a number field. Let~$\Omega$ be a field of characteristic~$0$, let~$R\subset \Hom(F,\Omega)^2$ be a subset and let~$(\lambda_r)_{r\in R} \in \Q^R$ be a family of rational numbers. Define \[ F_{R,\lambda} = \{x\in F \mid \sigma_1(x) = \lambda_r \sigma_2(x) \text{ for all } r=(\sigma_1,\sigma_2)\in R\}. \] Write~$F\otimes_\Q F \cong \prod_{i=1}^k L_i$ where each~$L_i$ is a field. Let~$p_i \colon F\otimes_\Q F \to L_i$ be the projection onto~$L_i$. For each~$r\in R$, let~$i(r)\in\{1,\dots,k\}$ be the index such that~$r$ corresponds to an element of~$\Hom(L_i,\Omega)$ under the natural bijection \[ \Hom(F,\Omega)^2 \cong \Hom(F\otimes_\Q F, \Omega) \cong \bigsqcup_{i=1}^k \Hom(L_i,\Omega), \] where the last union is disjoint. Let~$f : F \to \bigoplus_{r\in R}L_{i(r)}$ be the~$\Q$-linear map defined by \[ f(x)_r = p_{i(r)}\bigl(x\otimes 1 - \lambda_r(1\otimes x)\bigr) \text{ for all }r\in R. \] Then~$F_{R,\lambda} = \ker f$. \end{prop} \begin{proof} Let~$i\in\{1,\dots,k\}$ and~$\varphi \in \Hom(L_i,\Omega)$ correspond to~$(\sigma_1,\sigma_2)\in\Hom(F,\Omega)^2$. Then, for all~$x\in F$, we have~$\sigma_1(x) = \varphi(p_i(x\otimes 1))$ and~$\sigma_2(x) = \varphi(p_i(1\otimes x))$. Noting that~$\varphi$ is injective since~$L_i$ is a field, we obtain for every~$\lambda\in\Q$ the equivalence \[ \sigma_1(x) = \lambda\sigma_2(x) \Leftrightarrow \varphi\left(p_i\bigl(x\otimes 1-\lambda (1\otimes x)\bigr)\right)=0 \Leftrightarrow p_i\bigl(x\otimes 1 - \lambda (1\otimes x)\bigr)=0. \] This proves the claim. \end{proof} The advantage of rewriting the equations this way is that instead of having conditions in~$\Omega$ (which might be a field in which we cannot compute exactly such as~$\Omega = \C$ or~$\Omega = \overline\Q_p$), the conditions take place in the number fields~$L_i$ and~$f$ is a linear map between finite-dimensional~$\Q$-vector spaces. \begin{rmks}~ \begin{itemize} \item There are obvious generalizations to conditions expressed with more than two embeddings, but they become more and more expensive as the number of embeddings increases; eventually one may have to compute the full Galois closure of~$F$. \item The application to the maximal CM subfield can be generalized to other natural conditions, such as the maximal real subfield, the maximal subfield fixed by some ramification group, or the maximal subfield in which the residue degree of a certain prime divides a given integer. \item When~$\lambda_r=1$ for all~$r\in R$, Proposition~\ref{prop:twoemb} expresses the subfields of interest as intersections of \emph{principal subfields} in the terminology of van Hoeij, Kl\"uners and Novocin~\cite{subfields}. \end{itemize} \end{rmks} \subsection{Algorithms} Section~\ref{sec:cmsubfield} leads to the following algorithm to compute the maximal CM subfield. \begin{algo}\label{algo:cmsubfield}~ \begin{itemize} \item Input: an irreducible monic~$P\in\Q[X]$ representing~$F=\Q[X]/(P(X))$. \item Output: an element~$a\in F$ such that~$\Q(a)$ is the maximal CM subfield of~$F$, or~$\bot$ if~$F$ does not contain a CM subfield. \end{itemize} \begin{enumerate} \item Let~$P(Y) \equiv \prod_{i} Q_i(X,Y) \bmod P(X)$ be the irreducible factorization of~$P$ over~$F$. \item Let~$J$ be the set of indices~$i$ such that there exists a complex root~$\alpha$ of~$P$ such that~$Q_i(\alpha,\bar\alpha)=0$. \item Let~$V\subset F$ be the~$\Q$-subspace of~$a(X)\bmod P(X)$ such that for all~$i\in J$, $a(X)+a(Y)\equiv0\bmod (P(X),Q_i(X,Y))$. \item If~$V=0$, return~$\bot$. \item Let~$a\in V$ be such that the minimal polynomial of~$a$ has degree~$2\dim_\Q V$. Return~$a$. \end{enumerate} \end{algo} \begin{thm}\label{thm:algocmsubfield} Algorithm~\ref{algo:cmsubfield} is a deterministic polynomial-time algorithm that, given a number field~$F$, computes the maximal CM subfield of~$F$. \end{thm} \begin{proof} Algorithm~\ref{algo:cmsubfield} is correct by Lemma~\ref{lem:cmsubfield} and Proposition~\ref{prop:twoemb} since~$F\otimes_\Q F \cong \Q[X,Y]/(P(X),P(Y))$. It runs in polynomial time because factorization of polynomials over number fields can be performed in polynomial time~\cite{nffactor}. \end{proof} We obtain the following algorithm to compute the group of almost-algebraic characters. \begin{algo}\label{algo:algchar}~ \begin{itemize} \item Input: a strongly computable number field~$F$ and a modulus~$\gm$. \item Output: the group of almost-algebraic characters of modulus~$\gm$. \end{itemize} \begin{enumerate} \item Let~$K$ be the maximal CM subfield of~$F$, as computed by Algorithm~\ref{algo:cmsubfield}. \item If~$K = \bot$, return the group of finite order characters. \item Let~$A,B$ be the matrices computed by Algorithm~\ref{algo:group} with input~$(F,\gm)$. \item Let~$U$ be the subgroup described in Proposition~\ref{prop:algchar}. \item Let~$C$ be the subgroup of the row span of~$B$, consisting of elements~$c$ such that~$u\cdot c = 0$ for all~$u\in U$. \item Output~$C$. \end{enumerate} \end{algo} \begin{thm} Algorithm~\ref{algo:algchar} is correct. It is polynomial time, meaning a polynomial number of calls to the oracles with polynomial size input and a polynomial number of other operations. \end{thm} \begin{proof} If~$F$ does not contain a CM subfield, then almost-algebraic characters are exactly finite order characters by the Artin--Weil theorem. The group~$U$ can be computed by linear algebra using the oracles. The group~$C$ can be computed by linear algebra over~$\Q$ since all the inner products that occur are in~$\Z$. The group~$C$ is the correct output by the Artin--Weil theorem and Lemma~\ref{lem:subgroupexact} in combination with Proposition~\ref{prop:algchar}. All operations not provided by the oracles or Theorem~\ref{thm:algocmsubfield} can clearly be performed in polynomial time. \end{proof} \section{Examples} \label{sec:examples} We illustrate the interface of our Pari/GP package \cite{parigp:gchar} with a list of examples of mathematical interest. \subsection{Pari/GP interface} The \kbd{gcharinit(F,m)} function initializes a group structure~\kbd{gc} for a number field~$F$ and a modulus~$\gm$. The character group structure $\widehat{C}_\gm \cong \prod_{i=1}^k\Z/c_i\Z\times \Z^{n-1}\times\R$ is obtained via the vector \kbd{gc.cyc} $= [c_1,\dots c_k, 0, \dots, 0, 0.]$. As an example, \begin{code} > gc = gcharinit(x^2+23,3); > gc.cyc [6, 0, 0.E-57] \end{code} expresses the group of Hecke quasi-characters of modulus~$\gm=(3)$ over~$F=\Q(\sqrt{-23})$ (see also Equation~(\ref{eq:normsplitting})) \[ \Hom_{\rm cont}(C_3,\C^\times) = \chi_3^{\Z/6\Z}\times\chi_{CM}^\Z\times\|\cdot\|^\C, \] where~$\chi_3$ is a character of the ray class group~$\Cl_F(3)$ and $\chi_{CM}$ is an infinite order almost-algebraic character Characters are described as columns of coordinates in this basis. \begin{code} > gchareval(gc,[1,0,0]~,idealprimedec(gc.nf,3)[1]) -0.5000 - 0.8660*I \\ the prime above 3 is not principal > gcharconductor(gc,[2,0,0]~) [1, []] \\ a class group character \end{code} The maps~$\cL$ and~$\cL^*$ are accessible as \kbd{gcharlog} and \kbd{gcharduallog}, except that these functions have an extra component corresponding to the norm. For example the character~$\chi_{CM}$ has the following parameters in $\bigl((\R/\Z)^3\times\R\times\Z\bigr)\times\C$, where: \begin{itemize} \item the set~$S$ is~$\bigl\{(2,\frac{\sqrt{-23}-1}{2})\bigr\}$; \item the map~$\log_\gm\colon (\Z_F/\gm)^\times \to \Z^2/2\Z^2$ is characterized by~$\log_\gm(2) = (1,1)$ and~$\log_\gm(\sqrt{-23}) = (1,0)$. \end{itemize} \begin{code} > gcharduallog(gc,[0,1,0]~) [0.11298866677205092301511538301498585720, 0, 1/2, 0, 1, 0] \end{code} For closer scrutiny we retrieve the local quasi-characters of $\chi = \chi_{CM}\|\cdot\|$. In particular for a prime $\gp_3$ dividing the conductor $\gm=3$ we obtain a character of the \kbd{idealstar} structure $(\Z_F/\gp_3)^\times$ in addition to a value~$\theta\in\C$ such that~$\chi(\gp_3) = \exp(2\pi i \theta)$. \begin{code} > gcharlocal(gc,[0,1,1]~,1) \\ complex place [1, -I] \\ k = 1, phi = -I > gcharlocal(gc,[0,1,1]~,idealprimedec(gc.nf,3)[2],&grp) [1, 0.1042940216...+ 0.1748495762...*I] \\ [grp char, theta] > grp.cyc [2] \\structure of (ZF/p3)^* \end{code} The interface gives a basis of the subgroup of algebraic characters. We can work with these characters via their type. \begin{code} > Vec(gcharalgebraic(gc)) [[1, 0, 0]~, [0, 1, -1/2]~, [0, 0, -1]~] > gcharisalgebraic(gc,[2,-3,5/2]~,&t); t [[-1, -4]] \\ type (-1,-4) > gcharalgebraic(gc,[[-1,2]]) [[0,3,-1/2]~] \\ an algebraic character of type (-1,2) \end{code} The $L$-function machinery is readily accessible. \begin{code} > lfunzeros([gc,[1,3,0]~],5) [2.34520501265099..., 3.90705697239550...] > lfunan([gc,[0,3,-3/2]~],8) [1,4.795...*I,2+4.795...*I,-15,0,-23+9.591...*I,0,-33.570...*I] > [ algdep(an,2) | an <- [x-1, x^2+23, x^2-4*x+27, x+15, x, x^2+46*x+621, x, x^2+1127] \end{code} \ifarxiv \subsection{Small degree examples} We describe explicitly the form taken by infinite order Hecke characters and our choice of basis for low degree fields. We denote $z=(z_1,\dots, z_{r_1+r_2})$ the elements of $F_\R\simeq\R^{r_1}\times\C^{r_2}$. The characters of $(F_\R^\times)^\circ$ are of the form \[ \chi_\infty(z) = \prod_{j=1}^{r_1+r_2}\abs{z_j}^{i n_j\varphi_j}\prod_{j=r_1+1}^{r_1+r_2}\left(\frac{z_j}{\abs{z_j}}\right)^{k_j} \] and conversely, such a character $\chi_\infty$ can be extended to a global Hecke character if it is trivial on a finite index subgroup of~$\Z_F^\times$ Working modulo the norm, we therefore consider the characters of \[ G^1_\infty=(F_\R^\times)^\circ/(\Z_F^\times\cdot \R_{>0}) \] where~$\R_{>0}$ is embedded diagonally. \newcommand{\widehat{G^1_\infty}}{\widehat{G^1_\infty}} The group~$\widehat{G^1_\infty}$ is free of rank~$n-1$ and is a full rank lattice in the~$\Q$-vector space of all possible parameters at infinity. When~$F$ has class number one and totally positive fundamental units, $\widehat{G^1_\infty}$ is precisely the lattice of infinite order characters of modulus~$\gm=1$. \begin{ex} For $F=\Q$, infinite order characters are powers of the norm, and finite order characters are Dirichlet characters. \end{ex} \begin{ex}[real quadratic] Let $F=\Q(\sqrt{D})$ be real quadratic with fundamental unit $\eta_1>1$ and regulator $R_F=\log(\eta_1)$. Then $\widehat{G^1_\infty}$ is generated by \[ \chi(z)=\abs{\frac{z_1}{z_2}}^{i\frac{\pi}{R_F}}. \] \end{ex} \begin{ex}[imaginary quadratic] Let $F=\Q(\sqrt{D})$ be imaginary quadratic with torsion units of order~$m$. Then $\widehat{G^1_\infty}$ is generated by \[ \chi(z)=\Bigl(\frac{z_1}{\abs{z_1}}\Bigr)^{m}. \] \end{ex} \begin{ex}[complex cubic] Let $F$ be complex cubic, and consider a fundamental unit whose complex embeddings are $e^{-\frac{R_F}2\pm 2i\pi\alpha}$, where $R_F>0$ is the regulator and $\alpha\in \R/\Z$ is an angle. Then $\widehat{G^1_\infty}$ is generated by \[ \chi_1(z) = \abs{\frac{z_1}{z_2}}^{2i\pi\frac{2}{3 R_F}} \] and \[ \chi_2(z) = \abs{\frac{z_1}{z_2}}^{-2i\pi\frac{4\alpha}{3 R_F}} \left(\frac{z_2}{\abs{z_2}}\right)^2. \] \end{ex} \begin{ex}[real cubic] Let $F$ be real cubic, and $(\pm e^{\alpha_i})_i,(\pm e^{\beta_i})_i\in F_\R$ the embeddings of two fundamental units, so that the regulator is~$R_F=\abs{\alpha_1\beta_2-\alpha_2\beta_1}$. Then $\widehat{G^1_\infty}$ is generated by \[ \chi_1(z) = \abs{z_1}^{2i\pi\frac{\alpha_1+2\alpha_2}{3R_F}} \abs{z_2}^{2i\pi\frac{-2\alpha_1-\alpha_2}{3R_F}} \abs{z_3}^{2i\pi\frac{\alpha_1-\alpha_2}{3R_F}} \] and \[ \chi_2(z) = \abs{z_1}^{2i\pi\frac{\beta_1+2\beta_2}{3R_F}} \abs{z_2}^{2i\pi\frac{-2\beta_1-\beta_2}{3R_F}} \abs{z_3}^{2i\pi\frac{\beta_1-\beta_2}{3R_F}}. \] \end{ex} \fi \subsection{Modular forms} By automorphic induction, Hecke characters of an extension $F/K$ are expected to induce automorphic representations of $\GL_{[F:K]}$ over $K$. This is known in a number of cases. Here we provide some explicit examples for quadratic fields, where converse theorems prove the existence of a global automorphic form. \subsubsection{Classical forms over $\GL_2$} Let $F=\Q(\sqrt{-D})$ be an imaginary quadratic field of discriminant $-D<0$ and $k>0$. To an algebraic character $\chi$ of type $(k,0)$ and conductor $\gm$ we associate the $q$-series \[ f_\chi(z) = \sum_{(\ga,\gm)=1}\chi(\ga)q^{\Nm(\ga)}, q=e^{2i\pi z}, \im(z)>0 \] where the sum runs over integral ideals $\ga$ coprime to $\gm$. \begin{thm}[Hecke\cite{HeckeWork}, Weil\cite{WeilConverse}, Shimura\cite{ShimuraEllCM,ShimuraConductorEllCM}] Let $\chi$ be an algebraic character of type $(k,0)$ and conductor $\gm$ over $F=\Q(\sqrt{-D})$, then \[ f_\chi\in S_{k+1}(\Gamma_0(N,\psi_F\psi_\chi)) \] is a newform of weight $k+1$, level $N=D\Nm_{F/\Q}(\gm)$ and character $\psi_F\psi_\chi$ where $\psi_F = \bigl(\frac{-D}\cdot\bigr)$ is the quadratic character of $F$ and $\psi_\chi(a) = a^{-k}\chi((a))$ is the Dirichlet character of modulus $\Nm_{F/\Q}(\gm)$ attached to $\chi$. \end{thm} In the other direction, Ribet proved that all CM newforms come from algebraic Hecke characters \cite[Theorem 4.5]{RibetCM}. \newcommand\mfref[1]{\lmfdbref{#1}{ModularForm/GL2/Q/holomorphic/#1}} \newcommand\dirref[1]{\lmfdbref{#1}{Character/Dirichlet/#1}} \begin{ex} Consider $F=\Q(\sqrt{-19})$ and $\gm=3$. Our implementation show that up to integral powers of the norm, the algebraic characters are of the form $\chi_3^i\chi_\infty^k$ where $\chi_3$ has order~$4$ and generates $\widehat{\Cl(\gm)}$, and $\chi_\infty$ has type $(1,0)$. In Table~\ref{tab:mf} we list the first algebraic characters and the corresponding CM modular forms referenced in \cite{lmfdb:modularforms}. \begin{table}\centering \begin{tabular}[t]{llll} $(i,k)$ & quasi-character & modular form & first zero \\ \hline $(1,0)$ & \texttt{[1,0,0]} & \mfref{171.1.c.a.37.1} & $2.55662379\dots$ \\ $(2,0)$ & \texttt{[2,0,0]} & Dirichlet \dirref{57.56} & $2.40313422\dots$ \\ $(3,0)$ & \texttt{[3,0,0]} & \mfref{171.1.c.a.37.1} & $2.55662379\dots$ \\ $(0,1)$ & \texttt{[0,-1,-1/2]} & \mfref{171.2.d.a.170.3} & $1.19761556\dots$ \\ $(1,1)$ & \texttt{[1,-1,-1/2]} & \mfref{171.2.d.a.170.1} & $3.03101717\dots$ \\ $(2,1)$ & \texttt{[2,-1,-1/2]} & \mfref{171.2.d.a.170.2} & $2.19220898\dots$ \\ $(3,1)$ & \texttt{[3,-1,-1/2]} & \mfref{171.2.d.a.170.4} & $0.57935987\dots$ \\ $(0,2)$ & \texttt{[0,-2,-1]} & \mfref{171.3.c.d.37.2} & $1.76815328\dots$ \\ $(1,2)$ & \texttt{[1,-2,-1]} & \mfref{171.3.c.a.37.1} & $1.84559250\dots$ \\ $(2,2)$ & \texttt{[2,-2,-1]} & \mfref{171.3.c.d.37.1} & $1.54865425\dots$ \\ $(3,2)$ & \texttt{[3,-2,-1]} & \mfref{19.3.b.a.18.1} & $3.78194741\dots$ \\ $(0,3)$ & \texttt{[0,-3,-3/2]} & \mfref{171.4.d.a.170.4} & $1.59003776\dots$ \\ $(1,3)$ & \texttt{[1,-3,-3/2]} & \mfref{171.4.d.a.170.3} & $1.36085197\dots$ \\ $(2,3)$ & \texttt{[2,-3,-3/2]} & \mfref{171.4.d.a.170.1} & $0.08123213\dots$ \\ $(3,3)$ & \texttt{[3,-3,-3/2]} & \mfref{171.4.d.a.170.2} & $0.70404412\dots$ \\ \end{tabular} \caption{Some modular forms with CM by $\Q(\sqrt{-19})$} \label{tab:mf} \end{table} \end{ex} \subsubsection{Maass waveforms} Let $F=\Q(\sqrt{D})$ be a real quadratic field of discriminant $D$ and fundamental unit $\eta_1>1$, and $\chi_m$ a Hecke character of conductor $\gm=(\infty_1\infty_2)^\epsilon$ for $\epsilon\in\set{0,1}$ whose restriction to $F_\R^\times$ is \[ \chi_m(z)=\sgn(z_1z_2)^\epsilon\abs{\frac{z_1}{z_2}}^{ir_m},\, r_m = \frac{m\pi}{2\log(\eta_1)}, \] where $\epsilon\equiv m\bmod 2$. It corresponds to a CM Maass form \cite[section 15.3.10]{CohenStromberg}. \begin{prop} Let $\cos^{(0)}(x)=\cos(x)$ and $\cos^{(-1)}(x)=\sin(x)$, and $K_{ir}$ denote the modified Bessel function of the second kind of parameter $ir$. The function \begin{equation} f(x+iy) = \sqrt{y}\sum_{\ga} \chi_m(\ga) K_{ir_m}(2\pi \Nm(\ga)y)\cos^{(-\epsilon)}(2\pi \Nm(\ga)x) \end{equation} is a cusp form of weight $0$ and character $\psi_F$ on $\Gamma_0(D)$ with Laplace eigenvalue $\lambda_m=\frac14+r_m^2$, where $\psi_F = \bigl(\frac{D}\cdot\bigr)$ is the quadratic character of $F$. \end{prop} \begin{ex} Let $F=\Q(\sqrt5)$, this field has trivial class group and fundamental unit $\eta=\frac{1+\sqrt5}2$. The character $\chi_m$ above is an actual Hecke character of modulus $\gm=(\infty_1\infty_2)^\epsilon$. Using the $L$-function facilities in Pari/GP we compute the first zero $0<\gamma_1$ such that $L(\chi_m,\tfrac12+i\gamma_1)=0$. Results are shown in Table~\ref{table:maass}. \begin{table}[h]\centering \begin{tabular}[t]{lll} $m$ & $r_m=\frac{\pi m}{2\log(\eta_1)}$ & first zero \\ \hline 1 & $ 3.2642513026\dots$ & $7.4947673145\dots$ \\ 2 & $ 6.5285026053\dots$ & $1.9926333454\dots$ \\ 3 & $ 9.7927539079\dots$ & $1.3437292832\dots$ \\ 4 & $13.0570052105\dots$ & $1.3684744255\dots$ \\ 5 & $16.3212565132\dots$ & $0.9723034858\dots$ \\ 6 & $19.5855078158\dots$ & $1.2974789657\dots$ \\ 7 & $22.8497591185\dots$ & $0.7849215584\dots$ \\ 8 & $26.1140104211\dots$ & $1.1328362023\dots$ \\ 9 & $29.3782617237\dots$ & $0.8591419101\dots$ \\ 10 & $32.6425130264\dots$ & $0.8952928125\dots$ \\ 11 & $35.9067643290\dots$ & $0.7861064128\dots$ \\ 12 & $39.1710156316\dots$ & $1.1315449163\dots$ \\ 13 & $42.4352669343\dots$ & $0.5067080421\dots$ \\ 14 & $45.6995182369\dots$ & $0.9758042566\dots$ \\ 15 & $48.9637695395\dots$ & $0.8620736129\dots$ \\ \end{tabular} \caption{First zero of Maass form $L$-functions of real quadratic field $\Q(\sqrt 5)$.} \label{table:maass} \end{table} Note that we obtain arbitrary large imaginary spectral parameters: this raises computational issues on the $L$-function side which are currently not addressed in Pari/GP. See \cite{BookerThen} for the case of degree 2 Maass forms. \end{ex} \subsection{CM abelian varieties In this section we give examples of CM abelian varieties and the corresponding algebraic Hecke characters. We insist on proving equalities of $L$-functions rather than observing a numerical coincidence, as this is possible thanks to CM theory. For the general terminology of CM theory, we refer to~\cite{LangCM,MilneCM}. The following is a special case of~\cite[Chapter~4 Theorem~6.2]{LangCM}. \begin{thm}[Shimura~\cite{ShimuraZetaCM}, Milne~\cite{MilneZetaCM}]\label{thm:cm} Let~$A/\Q$ be a simple abelian variety of dimension~$g$. Let~$K$ be a CM field of degree~$2g$ and~$\iota \colon K \to \End^0(A)$ an embedding, and let~$\Phi$ be the corresponding CM type on~$K$. Let~$F$ be the field of definition of~$\iota(K)$, and let~$\Phi^*$ be the dual type on~$F$. Then~$F/\Q$ is Galois; let~$G = \Gal(F/\Q)$. Let~$\pi$ be the injective morphism~$\pi \colon G \to \Aut(K)$ such that~$\iota(\lambda)^\sigma = \iota(\lambda^{\pi(\sigma)})$ for all~$\lambda\in K$ and~$\sigma\in G$. Then there exists an algebraic Hecke character~$\chi$ over~$F$ of type~$\Phi^*$ and valued in~$K$ such that \[ L(A,s) = \prod_{\tau\in \Hom(K,\C)/\pi(G)} L(\chi^\tau, s). \] \end{thm} \begin{ex} Let~$A$ be the Jacobian of the genus~$2$ curve \lmfdbref{28561.a.371293.1}{Genus2Curve/Q/28561/a/371293/1} from the LMFDB~\cite{lmfdb:genus2} \[ y^2 + x^3y = -2x^4 - 2x^3 + 2x^2 + 3x - 2. \] Let~$K = \Q[x]/(x^{4} - x^{3} + 2 x^{2} + 4 x + 3) = \Q(\alpha)$ be the unique degree~$4$ subfield of~$\Q(\zeta_{13})$. The surface~$A$ is simple, has CM by~$K$, and all endomorphisms of~$A$ are defined over~$K$, as recorded in the LMFDB and proved by the algorithms of~\cite{CostaMascotGenus2,LombardoGenus2}. We therefore have~$F=K$ in the notation of Theorem~\ref{thm:cm}. Since~$K/\Q$ is Galois, $\pi(G)$ acts transitively on~$\Hom(K,\C)$. All CM types of~$K$ are in the same Galois orbit; let~$\Phi^* = \{\alpha \mapsto -0.65\ldots + 0.52\ldots i, \alpha \mapsto 1.15\ldots + 1.72\ldots i \}$. By Theorem~\ref{thm:cm}, there exists an algebraic Hecke character~$\chi$ of~$K$ of type~$\Phi^*$ such that \[ L(A,s) = L(\chi,s). \] The conductor of~$A$ is~$28561 = 13^4$, and the discriminant of~$K$ is~$2197 = 13^3$. Moreover, $K$ has a unique prime~$\gp$ above~$13$, so the conductor of~$\chi$ must be~$\gp$. Using our implementation we compute the group of characters of modulus~$\gp$. The subgroup of finite order characters has order~$3$, and there exists an algebraic character, unique up to multiplication by a finite order character, of type~$\Phi^*$. Among the three algebraic characters of this type, two have a non-real $L$-function coefficient~$a_3$, and therefore cannot be~$\chi$. So~$\chi$ is the remaining one, which is uniquely characterized by its type and the approximate value \[ \chi(\gq) = -1.65138\ldots - 0.52241\ldots i \] where~$\gq = (3,\alpha)$ (label~\texttt{3.1} as defined in~\cite{labels}). The restriction of~$\chi$ to~$(\Z_K/\gp)^\times$ has order~$2$. The values of $\chi$ at some prime ideals are given in Table~\ref{table:genus2}. \begin{table}[h] \begin{tabular}[t]{c|c|c} prime~$\gr$ & $\chi(\gr)\in \C$ & $\chi(\gr)\in K$ \\ \hline \texttt{3.1} & $-1.65138\ldots - 0.52241\ldots i$ & $-\frac{1}{3}\alpha^3 - \frac{2}{3}\alpha - 2$ \\ \texttt{3.2} & $0.15138\ldots - 1.72542\ldots i$ & $-\frac{1}{3}\alpha^3 + \alpha^2 - \frac{5}{3}\alpha - 1$ \\ \texttt{3.3} & $-1.65138\ldots + 0.52241\ldots i$ & $\alpha-1$ \\ \texttt{3.4} & $0.15138\ldots + 1.72542\ldots i$ & $ \frac{2}{3}\alpha^3 - \alpha^2 + \frac{4}{3}\alpha + 1$\\ \texttt{13.1} & $\pm 3.60555\ldots$ & $\pm \sqrt{13} = \pm (\frac{2}{3}\alpha^3 - \frac{2}{3}\alpha + 3)$ \\ \texttt{16.1} & $-4$ & $-4$ \\ \texttt{29.1} & $-3.45416\ldots - 4.13143\ldots i$ & $-\frac{5}{3}\alpha^3 + 3\alpha^2 - \frac{7}{3}\alpha - 5$\\ \texttt{29.2} & $1.95416\ldots + 5.01809\ldots i$ & $2\alpha^3 - 2\alpha^2 + 5\alpha + 5$ \\ \texttt{29.3} & $-3.45416\ldots + 4.13143\ldots i$ & $\frac{2}{3}\alpha^3 - 3\alpha^2 + \frac{10}{3}\alpha - 1$ \\ \texttt{29.4} & $1.95416\ldots - 5.01809\ldots i$ & $-\alpha^3 + 2\alpha^2 - 6\alpha - 2$ \end{tabular} \caption{Values of the algebraic character~$\chi$ attached to an abelian surface}\label{table:genus2} \end{table} \end{ex} \begin{ex} Let~$A$ be the Jacobian of the genus~$3$ curve \lmfdbref{3.9-1.0.3-9-9.6}{HigherGenus/C/Aut/3.9-1.0.3-9-9.6} from the LMFDB~\cite{lmfdb:genus3} \[ C : y^3 = x(x^3-1). \] Let~$K = \Q(\zeta_9)$. The curve~$C$ has an automorphism of order~$9$, defined over~$K$ and given by~$(x,y) \mapsto (\zeta_9^3 x, \zeta_9 y)$. In particular, the threefold~$A$ has CM by~$K$ defined over~$K$. By point counting, the Euler polynomial of~$A$ at~$p=7$ is \[ 1 + pT^3 + p^3T^6, \] which is irreducible over~$\Q$, proving that~$A$ is simple. Since~$K/\Q$ is Galois, $\pi(G)$ acts transitively on~$\Hom(K,\C)$ in the notations of Theorem~\ref{thm:cm}. There are two Galois orbits of CM types on~$K$: one lifted from the CM subfield~$\Q(\zeta_3)\subset K$, and a primitive one. Let~$\Phi^* = \{\zeta_9 \mapsto \exp(2i\pi \frac{4}{9}), \zeta_9 \mapsto \exp(2i\pi \frac{1}{9}), \zeta_9 \mapsto \exp(2i\pi \frac{2}{9}) \}$, which is primitive. By Theorem~\ref{thm:cm}, there exists an algebraic Hecke character~$\chi$ of~$K$ of type~$\Phi^*$ with values in~$K$ such that \[ L(A,s) = L(\chi,s). \] Let~$\gp$ be the unique prime of~$K$ above~$3$. By computing resultants we see that~$A$ has good reduction away from~$3$. In particular the conductor of~$\chi$ is a power of~$\gp$, say~$\gp^m$. The restriction of~$\chi$ to~$(\Z_K/\gp^m)^\times$ has finite order and takes values in~$K$, and therefore has order dividing~$18$. By studying the $3$-adic convergence of~$(1+x)^{1/18}$ we see that~$1+\gp^{16}\subset (K_\gp^\times)^{18}$ and in particular we have~$m\le 16$. Alternatively, we could bound~$m$ by using the reduction theory of Picard curves~\cite{BouwPicard}, but the above method works in cases where no reduction theory is available. \begin{table}[h] \begin{tabular}[t]{c|c|c} prime~$\gr$ & $\chi(\gr)\in \C$ & $\chi(\gr)\in K$ \\ \hline \texttt{3.1} & $\langle\exp(\frac{i\pi}{9})\rangle 1.73205\ldots i$ & $\langle -\zeta_9\rangle\sqrt{-3} = \langle -\zeta_9\rangle(1+2\zeta_9^3) $ \\ \texttt{19.1} & $4.34002\ldots + 0.40522\ldots i$ & $2\zeta_9^5 + 2\zeta_9^4 + 2\zeta_9^3 + \zeta_9^2 - 2\zeta_9 + 2$ \\ \texttt{19.2} & $-4.11721\ldots + 1.43128\ldots i$ & $-\zeta_9^5 + 2\zeta_9^4 + 2\zeta_9^3 - 2\zeta_9^2 + 4\zeta_9 + 2$ \\ \texttt{19.3} & $4.34002\ldots - 0.40522\ldots i$ & $4\zeta_9^5 + \zeta_9^4 - 2\zeta_9^3 + 2\zeta_9^2 - \zeta_9$ \\ \texttt{19.4} & $-4.11721\ldots - 1.43128\ldots i$ & $-2\zeta_9^5 + \zeta_9^4 - 2\zeta_9^3 - 4\zeta_9^2 + 2\zeta_9$ \\ \texttt{19.5} & $2.77718\ldots + 3.35964\ldots i$ & $-\zeta_9^5 - 4\zeta_9^4 + 2\zeta_9^3 + \zeta_9^2 - 2\zeta_9 + 2$ \\ \texttt{19.6} & $2.77718\ldots - 3.35964\ldots i$ & $-2\zeta_9^5 - 2\zeta_9^4 - 2\zeta_9^3 + 2\zeta_9^2 - \zeta_9$ \\ \texttt{37.1} & $4.34002\ldots - 4.26194\ldots i$ & $4\zeta_9^5 + 4\zeta_9^4 - 2\zeta_9^3 + 5\zeta_9^2 + 2\zeta_9$ \\ \texttt{37.2} & $2.77718\ldots - 5.41176\ldots i$ & $-5\zeta_9^5 - 2\zeta_9^4 - 2\zeta_9^3 - \zeta_9^2 - 4\zeta_9$ \\ \texttt{37.3} & $-4.11721\ldots - 4.47756\ldots i$ & $-4\zeta_9^5 + 5\zeta_9^4 + 2\zeta_9^3 - 2\zeta_9^2 + 4\zeta_9 + 2$ \\ \texttt{37.4} & $4.34002\ldots + 4.26194\ldots i$ & $2\zeta_9^5 - \zeta_9^4 + 2\zeta_9^3 - 2\zeta_9^2 - 5\zeta_9 + 2$ \\ \texttt{37.5} & $2.77718\ldots + 5.41176\ldots i$ & $2\zeta_9^5 - 4\zeta_9^4 + 2\zeta_9^3 + 4\zeta_9^2 + \zeta_9 + 2$ \\ \texttt{37.6} & $-4.11721\ldots + 4.47756\ldots i$ & $\zeta_9^5 - 2\zeta_9^4 - 2\zeta_9^3 - 4\zeta_9^2 + 2\zeta_9$ \\ \texttt{64.1} & $-8$ & $-8$ \end{tabular} \caption{Values of the algebraic character~$\chi$ attached to an abelian threefold}\label{table:genus3} \end{table} Using our implementation we compute the group of characters of modulus~$\gp^{16}$. The subgroup of finite order characters is isomorphic to~$C_9^4$. There exists an algebraic character of type~$\Phi^*$, unique up to multiplication by a finite order character. Out of these $9^4 = 6561$ candidate characters, checking that the value of~$a_{19}$ is sufficiently close to the value for~$A$, namely~$a_{19}(A) = 6$, eliminates all but~$2$ candidates. Checking that the value of~$a_{109}$ is sufficiently close to~$a_{109}(A) = -21$ leaves only one remaining candidate, which must therefore be~$\chi$. The conductor of~$\chi$ is~$\gp^4$ and~$\chi$ is in fact the unique algebraic character of type~$\Phi^*$ and conductor~$\gp^4$, and the restriction of~$\chi$ to~$(\Z_K/\gp^4)^\times$ has order~$18$. The values of $\chi$ at some prime ideals \footnote{Labels are as in~\cite{labels} but with respect to the cyclotomic polynomial~$\Phi_9$, which is not the \texttt{polredabs} polynomial.} are given in Table~\ref{table:genus3}. \end{ex} \subsection{Density of gamma shifts} The spectral parameters of an $L$-function are the gamma shifts $\mu_j$ appearing in the gamma factor \[ \gamma(s) = \prod_{j=1}^{r_1} \Gamma_{\mathbb R}(s+\mu_j) \prod_{j={r_1+1}}^{r_1+r_2} \Gamma_{\mathbb C}(s+\mu_j). \] of its normalized functional equation $L(s)\gamma(s)=\Lambda(s)=\epsilon\overline{\Lambda}(1-s)$. In this setting, the real parts $\Re(\mu_j)_{j\leq r_1}$ and $\Re(2\mu_j)_{j>r_1}$ are expected to be integers, whereas the imaginary parts can be arbitrary transcendentals subject to $\sum_{j=1}^{r_1} \mu_j+\sum_{j=r_1+1}^{r_1+r_2} 2\mu_j \in\R$. As a matter of fact, Hecke characters allow us to attain a dense subspace of these possible gamma shifts. The following statement must be well-known but we could not find a reference for it. \begin{prop}\label{prop:density} Let $r_1,r_2\geq 0$ and $(\mu_j^*)\in(\set{0,1}+i\R)^{r_1}\times(\frac12\Z_{\geq0}+i\R)^{r_2}$ a family of spectral parameters such that $\sum_{j\leq r_1} \mu_j^*+2\sum_{j>r_1} \mu_j^* \in\R$. Then for every number field $F$ of signature $(r_1,r_2)$ and every $\epsilon>0$, there exists a Hecke character $\chi$ of $F$ whose $L$-function gamma shifts~$\mu_j(\chi)$ satisfy \[ |\mu_j(\chi) - \mu_j^*| < \epsilon. \] \end{prop} \begin{proof} Let~$F$ be a number field of signature $(r_1,r_2)$. For every modulus~$\gm$, let~$G_\gm \subset \widehat{F_\R^\times}$ be the image of the map~$\widehat{C}_\gm \to \widehat{F_\R^\times}$, that is, the group of infinity-types of characters of modulus~$\gm$. The group~$G_\gm$ is the group of elements~$\chi\in \widehat{F_\R^\times}$ such that~$\chi(u)=1$ for all~$u\in \Z_F^\times(\gm) = \ker (\Z_F^\times \to (\Z_F/\gm)^\times)$. Let~$M>0$ be an integer. By the congruence subgroup property for unit groups of number fields~\cite[Th\'eor\`eme~$1$]{congrunits}, there exists a modulus~$\gm$ such that~$\Z_F^\times(\gm) \subset (\Z_F^\times)^M$. In particular, we get that \[ \left\{\chi \in \widehat{F_\R^\times} \mid \chi^M \in G_1\right\} \subset G_\gm. \] Since the image of~$G_1$ in~$\R^{r_1+r_2}\times\Z^{r_2}$ has full rank, this proves that~$\bigcup_\gm G_\gm$ is dense in~$\widehat{F_\R^\times}$, which implies the claim. \end{proof} This makes Hecke characters good test cases for $L$-functions software, since their coefficients are relatively easy to compute compared to other transcendental automorphic forms. \begin{ex} We exhibit a character of conductor $2^{20}$ over the real cubic field $F=\Q[x]/(x^3-3x+1)$ whose parameters $\varphi_1$ and $\varphi_2$ approximate the constants $\pi$ and $e$ to 5 digits. \begin{code} > g=gcharinit(x^3-3*x+1,2^20); chi = [0,-2033118, 694865]~; > gcharlocal(g,chi,1) [0, 3.1415922385511383833775758885544915179] > gcharlocal(g,chi,2) [0, 2.7182831477529933175766620889117919084] \end{code} \end{ex} \subsection{Partially algebraic Hecke characters} In view of the special role played by algebraic Hecke characters, it is natural to ask whether there exists partially algebraic Hecke characters, that is, characters such that~$\varphi_\sigma=0$ for some~$\sigma$ but not all \footnote{See \url{https://mathoverflow.net/questions/310706}}. We provide a construction of such characters. \begin{prop}~\label{prop:partcm} Assume~$F$ is a quadratic extension of another number field~$F_0$. Let~$R$ be the set of real places of~$F_0$ that become complex in~$F$, and let~$n_0$ be the degree of~$F_0$. Then for every modulus~$\gm$ of~$F$, there exists a subgroup~$H$ of~$\widehat{C}_\gm$ of rank~$n_0$ in which every character satisfies~$\varphi_\sigma=0$ for every~$\sigma\in R$. \end{prop} \begin{proof} It suffices to prove the statement for the modulus~$\gm = 1$. Let~$g$ be the nontrivial element of~$\Gal(F/F_0)$, which acts on~$\widehat{C_1}$. Let~$H$ be the subgroup of~$\chi\in \widehat{C_1}$ such that there exists a finite order~$\xi\in \widehat{C_1}$ with~$\chi^g = \xi \chi^{-1}$. We have~$\rank(\widehat{C_1^1(F)})=n-1=2n_0-1$ and~$\rank(\widehat{C_1(F_0)})=n_0-1$ (as is well-known but also easily seen from Proposition~\ref{prop:groupmodnorm}), so the rank of~$H$ is exactly~$n_0$. Moreover, for every infinite place~$\sigma$ of~$F$, every element of~$H$ satisfies~$\varphi_{\sigma \circ g} = - \varphi_{\sigma}$. In particular for~$\sigma\in R$ this means that~$\varphi_\sigma = 0$. \end{proof} \begin{cor} Under the same hypotheses as Proposition~\ref{prop:partcm}, let~$r=0$ if~$F$ does not contain a CM subfield and~$r$ be the degree of the maximal real subfield of~$F$ otherwise. Then for every modulus~$\gm$ of~$F$, there exists a subgroup~$H$ of~$\widehat{C}_\gm$ of rank~$n_0-r$ in which every character satisfies~$\varphi_\sigma=0$ for every~$\sigma\in R$ and such that~$H$ contains no nonzero almost-algebraic character. In particular, if~$F$ is not CM then there exists a partially algebraic character over~$F$. \end{cor} \begin{proof} The integer~$r$ is the rank of the group of almost-algebraic characters. \end{proof} \begin{ex} Consider~$F_0 = \Q(\sqrt{5}) \subset F = \Q(5^{1/4})$. \begin{code} > gc=gcharinit(x^4-5,1); > chi = [1,0,0]~; > gcharlocal(gc,chi,1) [0, -0.72908519629282042564585827345932876864] > gcharlocal(gc,chi,2) [0, 0.72908519629282042564585827345932876864] > gcharlocal(gc,chi,3) [2, 0] \end{code} The character~$\chi$ satisfies \[ \chi_{\sigma_1} \colon x \mapsto |x|^{-i\times0.729\dots},\ \chi_{\sigma_2} \colon x \mapsto |x|^{i\times0.729\dots},\text{ and } \chi_{\sigma_3} \colon z \mapsto (z/|z|)^{2}, \] and is therefore an example of a partially algebraic character. Since~$n_0 = 2$ there is another independent partially algebraic character (namely~\texttt{[0,1,0]\~}). \end{ex} In a general number field~$F$, if one fixes a set of infinite places~$\Sigma$, a natural question is to determine the group of \emph{$\Sigma$-algebraic} characters, i.e. characters such that~$\varphi_\sigma = 0$ for every~$\sigma\in\Sigma$. The field~$F$ contains a maximal subfield~$K_0$ that is real at places below~$\Sigma$, and may contain a quadratic extension~$K$ of~$K_0$ in which all places below~$\Sigma$ are complex. When this is the case, one obtains a corresponding group of $\Sigma$-algebraic characters. Does this construction account for all the possible infinity types? Unlike the algebraic case where Galois theory is sufficient to obtain a complete characterisation, the general case seems to involve transcendence problems. By automorphic induction to~$\GL_2$, partially algebraic characters yield automorphic representations that are non-algebraic principal series at some infinite places and discrete series at other ones. Analogously to~\cite{partialwtone}, one may ask to explicitly construct such "partial Maass forms" that do not come from Hecke characters. A possible way of doing this would be to compute Maass forms on a well-chosen quaternion algebra and to use the Jacquet--Langlands correspondence. \subsection{Twists and special values} Another interesting use of Hecke characters is to twist other $L$-functions to obtain new ones. Our implementation makes it easy to follow the experiments of \cite{Visser2021} on twists of elliptic curve $L$-functions. Let $E/F$ be an elliptic curve of conductor $N_{E/F}$ over an imaginary quadratic field $F$, and $\chi$ be an algebraic Hecke character of type $(a,b)$ and conductor $\gf$ over $F$. Assume $\gcd(\gf,N_{E/F})=1$, then the twist \[ L(E\otimes\chi,s) = \sum_{(\gn,\gf)=1} a_\gn(E)\chi(\gn)\Nm(\gn)^{-s} \] conjecturally satisfies the functional equation \[ \Lambda(E\otimes \chi,s) = W \Lambda(E\otimes\overline{\chi},1+a+b-s) \] where \[ \Lambda(E\otimes \chi,s) = (\Nm(\gf)^2N_{E/F})^{\frac s2} \Gamma_\C(s-\min(a,b)) \Gamma_\C(s-\min(a,b)-\mymathbb{1}_{a\neq b}) L(E\otimes\chi,s) \] with special values predicted by Deligne's period conjecture~\cite{DelignePeriodes}. \begin{ex} Let~$F=\Q(\sqrt{-43})$, $E/F$ the curve~\lmfdbref{43.1.a.1}{EllipticCurve/2.0.43.1/43.1/a/1} of equation $y^2+y=x^3+x^2$, and $\chi$ the algebraic character of conductor $1$ and type $(-2,2)$. We check numerically that the special value is a period related to $F$. \[ \begin{aligned} L(E\otimes \chi,1) &\approx 2.996120826544463\dots \\ &\approx \frac{2\pi}{\sqrt{43}^5} \Omega_F^8, \text{ where } \Omega_F=\sqrt{\prod_{a=1}^{42}\Gamma(\frac{a}{43})^{\left(\frac{-43}{a}\right)}}. \end{aligned} \] \end{ex} \ifarxiv \else \section{Data availability} Data sharing is not applicable to this article as no datasets were generated or analysed during the current study. \section{Statements and Declarations} The authors certify that there is no actual or potential conflict of interest in relation to this article. \fi \printbibliography \section{Implementation notes} This appendix collects notes on the matrix transformations used in our implementation~\cite{parigp:gchar}. Let~$\zeta$ be a generator of the group of roots of unity of~$F$, let~$\Lambda_u$ (computed with~\texttt{bnfinit.fu}) be the image by~$\cL_S$ of the span of a basis of~$\Z_F^\times/\langle \zeta\rangle$, and let~$\Lambda_S$ (computed with~\texttt{bnfsunit[1]}) be the image by~$\cL_S$ of the span of a basis of~$\Z_{F,S}^\times/\Z_F^\times$. Let~$\Z_F^\times(\gm) = \ker(\Z_F^\times \to (\Z_F/\gm)^\times)$. We define the following subgroup: \[ (\widehat{C}_\gm^1)_{k=0} = \left\{\chi\in \widehat{C}_\gm^1 \mid k_\sigma=0 \text{ for every complex embedding }\sigma\right\}. \] We will describe a sequence of matrices representing a generating set of~$\Lambda_0 = \Lambda + \Z v_0 = \Lambda \stackrel{\perp}{\oplus} \Z v_0$. We only write the ring to which the coefficients of the matrices belong. We also indicate the number of rows and columns, with the following notations: $n_s = |S|$, the integer~$n_c$ is the rank of~$\Lambda_\gm$ ($r(\gm)$ in the main paper, but here we follow the notations from the code). We want to apply matrix operations so that we compute a basis of~$\Lambda$ from the generating set, exhibit interesting subgroups of the group of Hecke characters, and preserve exactness of coefficients whenever possible. At each step, we apply column operations to modify the generating set of~$\Lambda$. These column operations are obtained by applying a HNF reduction to the submatrix displayed as a red block. As a matter of fact, we rely on the following property: from two lattices~$G,H$ the HNF computes a subgroup~$H'$ of~$H$ that is saturated (i.e. the intersection of~$H$ with a vector space), defined by some rows being~$0$, and a complement~$G'$ of~$H'$ in~$G+H$. At the end we compute an inverse to get a basis of~$\Lambda_0^\vee$ from which we deduce a basis of~$\Lambda^\vee$, and we describe various subgroups of the group of Hecke characters that appear naturally. In the end tables, the meaning of the rows is as follows: the title of the row is the subgroup generated by all the previous rows. In other words, the corresponding rows generate a complement of the previous rows in the subgroup in the title of the row. The column labelled~$\chi(\gp)$ contains the values~$\frac{1}{2\pi}\arg\chi(\gp)$ and the column labelled~$\chi_\gm(g_i)$ contains the values~$\frac{1}{2\pi}\arg\chi(\log_\gm^{-1}(g_i))$. \subsection{Case without a CM subfield} Here we do not assume that we have a CM subfield. This subsection is no longer implemented, but serves as a simpler version of the next subsection. Initial matrix. \[ \begin{array}{cc|ccccc} & & n_s & r_1+r_2-1 & n_c & 1 & r_2 \\ & & \Lambda_S & \Lambda_u & \Lambda_{\gm} & \zeta & \Z^{r_2} \\ \hline n_s & v_S & \Z & 0 & 0 & 0 & 0 \\ n_c & \log_\gm & \Z & \Z & \hi\Z & \hi\Z & 0 \\ r_1+r_2 & \log_\sigma & \R & \R & 0 & 0 & 0 \\ r_2 & \arg_\sigma & \R & \R & 0 & \Q & \Z \end{array} \] \begin{enumerate} \renewcommand{\labelenumi}{Step \arabic{enumi}. } \item We compute the subgroup~$\langle\zeta(\gm)\rangle = \langle\zeta\rangle\cap\Z_F^\times(\gm)$ and a complement~$\Lambda_{\gm,\zeta}$ of~$\langle\zeta(\gm)\rangle$ in~$\Lambda_{\gm} + \langle\zeta\rangle$. \[ \begin{array}{cc|ccccc} & & n_s & r_1+r_2-1 & n_c & 1 & r_2 \\ & & \Lambda_S & \Lambda_u & \Lambda_{\gm,\zeta} & \zeta(\gm) & \Z^{r_2} \\ \hline n_s & v_S & \Z & 0 & 0 & 0 & 0 \\ n_c & \log_\gm & \Z & \hi\Z & \hi\Z & 0 & 0 \\ r_1+r_2 & \log_\sigma & \R & \R & 0 & 0 & 0 \\ r_2 & \arg_\sigma & \R & \R & \Q & \Q & \Z \end{array} \] \item We compute the span~$\Lambda_u(\gm)\subset\Lambda_u$ of a basis of~$\Z_F^\times(\gm)/\langle\zeta(\gm)\rangle$ and a complement~$\Lambda_{\gm,u}$ of~$\Lambda_u(\gm)$ in~$\Lambda_{\gm,\zeta} + \Lambda_u$. \[ \begin{array}{cc|ccccc} & & n_s & n_c & r_1+r_2-1 & 1 & r_2 \\ & & \Lambda_S & \Lambda_{\gm,u} & \Lambda_u(\gm) & \zeta(\gm) & \Z^{r_2} \\ \hline n_s & v_S & \Z & 0 & 0 & 0 & 0 \\ n_c & \log_\gm & \Z & \Z & 0 & 0 & 0 \\ r_1+r_2 & \log_\sigma & \R & \R & \R & 0 & 0 \\ r_2 & \arg_\sigma & \R & \R & \R & \hi\Q & \hi\Z \end{array} \] \item We compute~$\Lambda_{\zeta} = \Z^{r_2}+\langle\zeta(\gm)\rangle$. \[ \begin{array}{cc|cccc} & & n_s & n_c & r_1+r_2-1 & r_2 \\ & & \Lambda_S & \Lambda_{\gm,u} & \Lambda_u(\gm) & \Lambda_\zeta \\ \hline n_s & v_S & \Z & 0 & 0 & 0 \\ n_c & \log_\gm & \Z & \Z & 0 & 0 \\ r_1+r_2 & \log_\sigma & \R & \R & \R & 0 \\ r_2 & \arg_\sigma & \R & \R & \R & \Q \end{array} \] \item We include $v_0$ to obtain a square block on the $\log_\sigma$ components. \[ \begin{array}{cc|ccccc} & & n_s & n_c & r_1+r_2-1 & 1 & r_2 \\ & & \Lambda_S & \Lambda_{\gm,u} & \Lambda_u(\gm) & v_0 & \Lambda_\zeta \\ \hline n_s & v_S & \Z & 0 & 0 & 0 & 0 \\ n_c & \log_\gm & \Z & \Z & 0 & 0 & 0 \\ r_1+r_2 & \log_\sigma & \R & \R & \R & \Z & 0 \\ r_2 & \arg_\sigma & \R & \R & \R & 0 & \Q \end{array} \] \item We now compute the dual lattice by taking the inverse of the matrix (note that all the diagonal blocks are invertible). We obtain the following shape, where the red blocks a priori have coefficients in~$\R$. However, the coefficients in the~$\chi_\gm(g_i)$ columns (dual to the previous~$\log_\gm$ rows) represent a character on~$(\Z_F/\gm)^\times$, which is a finite group, so they must be rationals with denominator divisible by the exponent of this group, and the coefficients in the~$k_\sigma$ columns (dual to the previous~$\arg_\sigma$ rows) represent characters on~$(\R/\Z)^{r_2}$, so they must be integers. \[ \begin{array}{cc|cccc} & & n_s & n_c & r_1+r_2 & r_2 \\ & & \chi(\gp) & \chi_\gm(g_i) & \varphi_\sigma & k_\sigma \\ \hline n_s & \widehat{\Cl_F} & \Q & 0 & 0 & 0 \\ n_c & \widehat{\Cl(\gm)} & \Q & \Q & 0 & 0 \\ r_1+r_2-1 & (\widehat{C}_\gm^1)_{k=0} & \R & \rr\Q & \R & 0 \\ 1 & v_0^\vee & \R & \rr\Q & \R & 0 \\ r_2 & \widehat{C}_\gm^1 & \R & \rr\Q & \R & \rr\Z \end{array} \] \item We remove~$v_0^\vee$, obtaining a basis of~$\Lambda^\vee$. \[ \begin{array}{cc|cccc} & & n_s & n_c & r_1+r_2 & r_2 \\ & & \chi(\gp) & \chi_\gm(g_i) & \varphi_\sigma & k_\sigma \\ \hline n_s & \widehat{\Cl_F} & \Q & 0 & 0 & 0 \\ n_c & \widehat{\Cl(\gm)} & \Q & \Q & 0 & 0 \\ r_1+r_2-1 & (\widehat{C}_\gm^1)_{k=0} & \R & \Q & \R & 0 \\ r_2 & \widehat{C}_\gm^1 & \R & \Q & \R & \Z \end{array} \] \end{enumerate} \subsection{Case with a CM subfield} In this section we assume that~$F$ contains a CM subfield. The implementation takes advantage of the following rationality result. \begin{lem} \label{lem:int-narg} Let~$K$ be a CM field and let~$\rootsofone{K}$ be the number of roots of unity in~$K$. Then for every~$u\in\Z_K^\times$ and~$\sigma\colon K\hookrightarrow\C$, we have \[ \frac{\arg \sigma(u)}{2\pi} \in \frac{1}{2\rootsofone{K}}\Z. \] \end{lem} \begin{proof} Let~$z = u/\bar{u}\in\Z_K^\times$. Then for every complex embedding~$\sigma$, we have~$|\sigma(z)|=1$. So~$z$ is a root of unity: $z^{\rootsofone{K}}=1$. We obtain \[ 2\arg(\sigma(u)) = \arg(z) \in \frac{2\pi}{\rootsofone{K}}\Z, \] hence the result. \end{proof} For the remainder of this section, we assume that we are given~$K$ the maximal CM subfield of~$F$. We will write~$\tau$ for the complex embeddings of~$K$ and~$\sigma$ for the complex embeddings of~$F$. For every complex embedding~$\tau$ of~$K$, we let~$N\tau(x) = \prod_{\sigma\mid\tau}\sigma(x)$. We start by applying Steps 1 to 3 as in the previous case, obtaining the same shape, but we change the order of the columns. \[ \begin{array}{cc|ccccc} & & n_s & n_c & r_2 & r_1+r_2-1 \\ & & \Lambda_S & \Lambda_{\gm,u} & \Lambda_\zeta & \Lambda_u(\gm) \\ \hline n_s & v_S & \Z & 0 & 0 & 0 \\ n_c & \log_\gm & \Z & \Z & 0 & 0 \\ r_1+r_2 & \log_\sigma & \R & \R & 0 & \R \\ r_2 & \arg_\sigma & \R & \R & \Q & \R \end{array} \] We now focus on the archimedean block, where we will apply extra column operations to exhibit the subgroup of almost-algebraic characters. \begin{enumerate} \renewcommand{\labelenumi}{Step \arabic{enumi}'. } \setcounter{enumi}{3} \item We introduce extra rows, parametrised by the complex embeddings~$\tau$ of~$K$, with values~$\arg\bigl(N\tau(\epsilon)\bigr)/2\pi$ for~$\epsilon\in \Lambda_u(\gm)$. Those values are in~$\frac{1}{2\rootsofone{K}}\Z$ by Lemma~\ref{lem:int-narg}. We also select a subset of~$r_2-r_2(K)$ complex embeddings such that the corresponding coordinates on~$\R^{r_2}$ are linearly independent, as linear forms, of the ones corresponding to~$N\tau$. In the following matrices, we label the corresponding row by~$\arg'$. \[ \begin{array}{cc|cc} & & r_2 & r_1+r_2-1 \\ & & \Lambda_\zeta & \Lambda_u(\gm) \\ \hline r_1+r_2 & \log_\sigma & 0 & \R \\ r_2-r_2(K) & \arg' & \Q & \R \\ r_2(K) & \arg_{N\tau} & \hi\Q & \hi\Q \end{array} \] \item We apply a column HNF on the red blocks: this computes the subgroup~$\Lambda(\arg)$ of elements of~$\Lambda_{\zeta} + \Lambda_u(\gm)$ that have trivial~$\arg N\tau$, and a complement~$\Lambda_{\arg}$ of~$\Lambda(\arg)$ in~$\Lambda_{\zeta}+\Lambda_u(\gm)$. We get the following shape. \[ \begin{array}{cc|cc} & & r_2(K) & n-r_2(K)-1 \\ & & \Lambda_{\arg} & \Lambda(\arg) \\ \hline r_1+r_2 & \log_\sigma & \R & \R \\ r_2-r_2(K) & \arg' & \R & \R \\ r_2(K) & \arg_{N\tau} & \Q & 0 \end{array} \] \item We insert~$v_0$ as before. \[ \begin{array}{cc|ccc} & & r_2(K) & n-r_2(K)-1 & 1 \\ & & \Lambda_{\arg} & \Lambda(\arg) & v_0 \\ \hline r_1+r_2 & \log_\sigma & \R & \R & \Z \\ r_2-r_2(K) & \arg' & \R & \R & 0 \\ r_2(K) & \arg_{N\tau} & \Q & 0 & 0 \end{array} \] Note that the block corresponding to columns~$\Lambda(\arg)$ and~$v_0$ and rows~$\log_\sigma$ and~$\arg'$ is square and invertible. \item Now we compute, as before, the dual basis of~$\Lambda^\vee$ by taking the inverse matrix. On the archimedean block, the inverse of the matrix is a priori of the following shape. \[ \begin{array}{cc|ccc} & & r_1+r_2 & r_2-r_2(K) & r_2(K) \\ & & \varphi_{\sigma} & k_\sigma' & k_{N\tau} \\ \hline r_2(K) & \text{a.a.} & 0 & 0 & \Q \\ n-r_2(K)-1 & & \R & \R & \R \\ 1 & v_0^\vee & \R & \R & \R \end{array} \] \item We delete~$v_0^\vee$ and change coordinates again to recover the usual parameters~$k_\sigma$. As in Step 5 above, the red blocks are a priori real but they must actually be integers. \[ \begin{array}{cc|cc} & & r_1+r_2 & r_2 \\ & & \varphi_{\sigma} & k_\sigma \\ \hline r_2(K) & \text{a.a.} & 0 & \rr\Z \\ n-r_2(K)-1 & & \R & \rr\Z \end{array} \] In the end, we obtain the following shape for the matrix of characters. \[ \begin{array}{cc|cccc} & & n_s & n_c & r_1+r_2 & r_2 \\ & & \chi(\gp) & \chi_\gm(g_i) & \varphi_\sigma & k_\sigma \\ \hline n_s & \widehat{\Cl_F} & \Q & 0 & 0 & 0 \\ n_c & \widehat{\Cl(\gm)} & \Q & \Q & 0 & 0 \\ r_2(K) & \bigl(\widehat{C}_\gm\bigr)^{\mathrm{a.a.}} & \R & \Q & 0 & \Z \\ n-r_2(K)-1 & \widehat{C}_\gm^1 & \R & \Q & \R & \Z \end{array} \] This matrix is accessible as \texttt{gcharinit(bnf,mod)[1]} in our implementation in Pari/GP 2.15~\cite{parigp:gchar}. As explained in section~\ref{sec:almostalg}, we can recover the group of algebraic Hecke characters from~$\bigl(\widehat{C}_\gm\bigr)^{\mathrm{a.a.}}$. \end{enumerate}
\section{Introduction} The factual consistency problem in abstractive summarization is a major challenge that limits the application of the summaries generated by state-of-the-art models in practice. A number of works \citep{cao2018faithful, maynez2020faithfulness, deutsch2021understanding} have shown that even the best abstractive summarization models still suffer from many factual inconsistencies. Thus, determining the factual consistency between a summary and its document is critical to addressing this challenge. Researchers used an n-gram overlap-based approach to assess the quality of the summaries generally before the factual consistency problem in abstractive summarization was raised. This approach assigns equal weights to all n-grams, making it insensitive to factual inconsistency errors. In recent years, researchers have proposed some abstractive summarization evaluation metrics for factual consistency, which can be classified mainly into two categories: natural language inference (NLI) based metrics \citep{falke2019ranking,kryscinski2019evaluating,laban2021summac} and QA-based metrics \citep{wang2020asking,durmus2020feqa,scialom2021questeval}. NLI-based metrics determine whether the summary is entailed by the document, and most of the metrics calculate the entailment score based on the out-of-the-box NLI models. On the other hand, QA-based metrics divide the evaluation of factual consistency into several functional modules, including: (1) Extracting factual factors in the summary as answers. (2) Generating corresponding questions based on the summary and answers through the question generation (QG) module. (3) Generating corresponding answers based on the document and questions through the QA module. (4) The final score is computed based on the similarity between the answers from the summary and the document. In our work, we focus more on QA-based metrics because they are comparable to NLI-based metrics in correlation with human judgments and are more interpretable. However, QA-based metrics are computationally expensive \citep{koto2020ffci}, for example, they tend to take longer to compute than other types of metrics. Furthermore, QA-based metrics are calculated in several consequent but independent modules, while independent training of models in each one can result in accumulated errors. For example, the QA module fails to generate answers to roughly 14$\%$ of the questions that can be answered \citep{durmus2020feqa}, and questions generated by the QG module need to be carefully filtered. Inspired by \citet{vasilyev2020fill}, we put forward a new idea to incorporate the cloze task \citep{taylor1953cloze}, in which a model is challenged to reconstruct obscured spans of text, into factual consistency evaluation in order to address the weaknesses of QA-based metrics. We propose ClozE (\textbf{Cloz}e-based Factual Consistency \textbf{E}valuation), which is a fast, simple, and efficient factual consistency evaluation metric with the same interpretability as QA-based evaluation. Our contributions can be summarized as follows: (1) We introduce the cloze task to solve the time-consuming problem of QA-based metrics. The questions are defined as text spans of factual factors that are replaced with \verb|[MASK]|, and the cloze results represent the answers. (2) Through experiments on human-annotated datasets, we show that ClozE can achieve a comparable correlation with human judgments as QA-based metrics with a 96$\%$ reduction in time consumption, alleviating the huge time overhead problem. We also find that the accuracy of answers generated by the cloze-based method is higher than that of the QA-based method. (3) We define $k$ as the number of factual factors in a summary that are replaced with \verb|[MASK]| at the same time. With this approach, ClozE can process multiple factual factors in parallel to further improve the speed of evaluation, alleviating the one-question-one-answer mode from QA-based metrics. (4) We demonstrate that we can improve ClozE by improving the performance of the cloze model only, alleviating the accumulated error problem of QA-based metrics. (5) Our code, along with the relevant models, will be released upon the paper acceptance. \begin{figure*} \includegraphics[width=\textwidth]{ClozE1.png} \cprotect\caption{We show the overall framework of ClozE. We first extract all factual factors $f_s$ according to the summary and replace $f_s$ with \verb|[MASK]| identifiers at the token-level in the summary (shaded part of the Summary in the figure). By inputting the masked summary into the cloze model together with the document, we can later obtain the factual factors $f_D$ corresponding to the document at the position previously replaced with \verb|[MASK]|. We use the equation given in Eq.\ref{equation:2} to calculate the final ClozE score.} \label{figure:1} \end{figure*} \section{Related Work} \paragraph{Non-factual metrics} N-gram overlap-based metrics were generally used for summarization before the concept of factual consistency was proposed. ROUGE \citep{lin2004rouge} is currently the most widely used summary metric, which gives evaluation scores by calculating the precision and recall of n-grams between the candidate summary and the reference one. Other similar evaluation metrics include BLEU \citep{papineni2002bleu} and METEOR \citep{banerjee2005meteor}. Recent work has applied pre-trained models to evaluate summaries. BERTScore \citep{zhang2019bertscore} gives scores by calculating the similarity between a candidate summary and reference summaries with Bert \citep{devlin2018bert}, which considers more semantics than n-gram overlap-based metrics. BLANC \citep{vasilyev2020fill} suggests that a good summary should help the model to understand the document better. It randomly masks several tokens in the document, then computes scores by calculating the extent of the summary helping the recovery of these tokens. However, the n-gram overlap-based metrics, BERTScore, and BLANC are not sensitive to factual consistency. Therefore, there is an urgent requirement for more in-depth research on summary quality evaluation metrics for factual consistency. \paragraph{NLI-based metrics} NLI-based metrics are easy to implement, but they are difficult to interpret and easily influenced by data. \citet{falke2019ranking} used the idea of NLI to score candidate summaries for factual consistency. However, due to the discrepancy between the training data of the NLI model they used the news data such as CNN/DM \citep{hermann2015teaching} and the model did not work well under the data shifting. By replacing factual factors such as key entities for data augmentation, \citet{kryscinski2019evaluating} trained an NLI model with Bert and obtained a high correlation with human judgments. \citet{laban2021summac} focused on the problem of the granularity mismatch of the input between the NLI dataset (sentence-level) and the factual consistency detection (document-level). They separately divided a document and a summary into multiple blocks, then applied the NLI model to calculate the blocks for an entailment matrix. Afterwards, scores of multiple blocks were integrated by a max-mean operator or a single learned convolution layer. \paragraph{QA-based metrics} QA-based factual consistency metrics have become a hot research topic in recent years due to their strong interpretability. \citet{scialom2019answers} proposed that QA-based metrics are favorable compared to ROUGE and do not require a golden summary. They masked the reference document with entities to generate questions and got the answers through the QA model SummaQA. Both QAGS\citep{wang2020asking} and FEQA\citep{durmus2020feqa} are QA-based metrics which have similar processes. Questions are first generated based on the factual factors in the summary and the answers are obtained by asking the document. A factual consistency score is then computed by comparing the factual factors with the answers, which essentially calculates the precision of the factual factors contained in the candidate summary compared to the document. Based on this, QuestEval \citep{scialom2021questeval} introduces the concept of recall. It means that questions are generated from the document while the answers are generated from the summary. It combines precision and recall to obtain higher relevance on the human-annotated dataset. \paragraph{Factual Consistency Benchmark} Assessing the validity of factual consistency metrics is also a challenging task. In recent years, more work has given relevant fact consistency annotated datasets as well as meta-evaluation methods.\citet{wang2020asking,fabbri2021summeval} separately proposed a crowdsourced annotated dataset on the factual consistency, as a way to evaluate the correlation of factual consistency metrics to human judgments. \citet{laban2021summac} fused previous works and standardize their datasets. Meanwhile, the Pearson correlation coefficient is commonly used to evaluate the correlation between the above metrics and human judgments. In contrast, \citet{gabriel2020go, pagnoni2021understanding} proposed the meta-evaluation of factual consistency with more refined criteria for the performance evaluation of factual consistency metrics. \section{Methods} \subsection{ClozE} The problem of QA-based factual consistency metrics is mainly caused by the independence of each module. Multi-module collaboration can alleviate data shifting to a certain extent, but it also introduces accumulated errors and long runtime, causing inconvenience in practical applications. In our work, we argue that the two modules, QG and QA, can be merged into a cloze module, thus simplifying the overall process. We transform a question into a summary text with $k$ factual factors masked off and the answer is generated by the cloze model. In this case, since questions can be obtained directly without the QG module, we can omit the QG module and substitute the QA module with a cloze model. The overall framework of the model is shown in Figure \ref{figure:1}, and we also present a formula similar to the one proposed by \citet{wang2020asking}. Given the document $X$, the summary $Y$ and the masked summary $Y^{'}$, each of which consists of a series of tokens, we can obtain $P(A|X,Y^{'})$ and $P(A|Y)$, which respectively represent the answers generated by the cloze model and the factual factors in the summary $Y$. Therefore, the factual consistency score can be computed by the following formula. \begin{equation} {E_{A\sim{}P(A|Y)}[D(P(A|X,Y^{'}),P(A|Y))]} \end{equation} where $D(*,*^{'})$ denotes a function that measures the distribution of both $*$ and $*^{'}$. \subsection{Factual Factors} In the work of \citet{pagnoni2021understanding}, factual errors shaped as named entities and noun phrases account for the majority of all factual errors, while both are more in line with the task of cloze in our given scheme. As a result, we define named entities and noun phrases as factual factors in our approach. \subsection{Cloze Model} \label{sec:clozemodel} Cloze models occupy the key position in our work. In recent years, there are few new models dedicated to the cloze task, and most of the cloze tasks have been modeled in a masked language model (MLM) as a pre-training task called masked language modeling, like Bert. Since most of the pre-trained models are MLM-like models, we use them as the skeleton of our work. \begin{figure*} \includegraphics[width=\textwidth]{cloze_model.png} \caption{Two kinds of cloze models are used for the ClozE. The first one is Roberta (a), where we concatenate the document and the masked summary as the input of the model. The second one is Bart (b), where we take the document as the Encoder input and the masked summary as the Decoder input.} \label{figure:2} \end{figure*} For fairness considerations, we conduct experiments using two types of basic pre-trained models, Roberta \citep{liu2019roberta} and Bart \citep{lewis2019bart}, as shown in Figure \ref{figure:2}. The approach using Roberta is a better match to our cloze tune because the pre-training task of Roberta is performed by masking off part of the tokens and expecting the model to fill them in completely. Our task solved with Roberta is a kind of prompt tune \citep{liu2021pre}, where we concatenate the document and the masked summary together by feeding them into the model, expecting the model output to be a complete text. We also use the Bart model because of the model training and prediction runtimes. In our task, we actually do not require the model to regenerate the part of the document, so this part can be combined with the masked summary by cross-attention mechanism\footnote{It only computes the attention scores between the decoder hidden states and the encoder outputs in the decoding stage.} instead of self-attention mechanism \citep{vaswani2017attention}. \subsection{The ClozE Score} \label{sec:k} In line with the approach adopted in the QA-based metrics in recent years, we use token-level F1 as the quality for the comparison of factual factors. Because F1 focuses on whether a token appears in both two sequences, it is not sensitive to errors such as misalignment and missing tokens. This characteristic can help to mitigate the errors caused by the performance of the cloze model to some extent. For a summary, we extract $N$ factual factors, which we split into $\lceil N/k \rceil$ groups, where $k$ is the number of factual factors for a single masking. Therefore, a summary will need to be calculated $\lceil N/k \rceil$ times by the cloze model, and the final ClozE score is computed using the following equations: \begin{equation}\label{equation:2} Score=\frac{\sum_{i=1}^{\lceil N/k \rceil} \sum_{j} F1(G_{ij},S_{ij})}{N} \end{equation} where $F1(*,*^{'})$ denotes the function which computes the $F1$ score between the two symbols in the tuple. $G_{ij}$ and $S_{ij}$ respectively denote the factual factor in the summary and generated with the cloze model. \subsection{Granularity} Most of the factual consistency metrics calculate the factual consistency score with the sentence-level units. Out of preciseness, we also take the summary level into account and conduct experiments with both two levels. \subsection{Confidence} \label{sec:ab} We take into account the confidence mentioned in the work of \citet{scialom2019answers} and \citet{qasemi2022evaluating}. We propose a simple and effective way to calculate the confidence by Eq.\ref{equation:6}, which is the average prediction probability of the tokens contained by the masked factual factors. \begin{equation}\label{equation:6} Confidence =\frac{1}{|T_{f}|} \sum_{t\in{T_{f}}}p(t) \end{equation} where $t$ denotes a token in $T_{f}$ while $T_{f}$ denotes all the tokens contained in factual factor $f$. In addition, we introduce two thresholds $\alpha$ and $\beta$. When the confidence is less than $\alpha$ and the current ClozE score is less than $\beta$, the ClozE score will be set to 0. This trick is designed to make ClozE more robust by ignoring some of the score increases due to incorrectly filled blanks. \section{Experiments} \subsection{Cloze Task Dataset} Since the input of our cloze model is a document and its summary, it is a good choice to use the summarization dataset to train the cloze model. And we believe that the golden summaries in the summarization dataset have high factual consistency. Due to this, we adopt the summarization dataset CNN/DM as the dataset for our cloze task. The CNN/DM dataset is often used for summarization and machine reading comprehension (MRC) tasks. It contains news articles from CNN and Daily Mail and their corresponding summaries. Each summary contains multiple human-written sentences. We use their training set as the training set for our cloze task and their test set to evaluate the performance of our cloze model. \subsection{Baseline Metrics} Since there has been a lot of previous work\citep{wang2020asking,scialom2021questeval,fabbri2021summeval,laban2021summac} that has demonstrated the inability of model-free metrics to effectively measure factual consistency, we only consider model-based metrics as our baselines. We use BERTScore and BLANC-help to verify the higher sensitivity of the proposed method for factual consistency. We do not perform speed tests on the above metrics because they do not address the factual consistency issue. In addition, we use QAGS, FEQA, SummaQA and QuestEval as baseline metrics which evaluate factual consistency based on QA. We verify through experiments that our method performs faster than QA-based metrics without sacrificing correlation. The baselines above have released codes and models which ensure that we can obtain more realistic results and the time consumption of the evaluation. However, due to some problems with the official QAGS code, we opted for the factsumm\footnote{\url{https://github.com/Huffon/factsumm}} implementation for QAGS. \subsection{Factual Evaluation Benchmark} Following \citet{fabbri2021qafacteval}, we use six human-annotated datasets to evaluate factual consistency metrics with Pearson correlation coefficient. The summaries used for evaluation are generated by a variety of different models on CNN/DM and XSum \citep{narayan2018don}, respectively. These datasets are XSumFaith (XSF) \citep{maynez2020faithfulness}, SummEval (SE)\citep{fabbri2021summeval}, FRANK\citep{pagnoni2021understanding} and QAGS\citep{wang2020asking}. We partition FRANK and QAGS into FRANK-CNN/DM (FCD), FRANK-XSum (FXS), QAGS-CNN/DM (QCD) and QAGS-XSum (QXS), resulting in a total of six test datasets. In addition, as suggested in \citet{vasilyev2020fill}, human scores are error-prone and being correlated with human scores should not be considered as a sufficient and unique validation, but rather as an independent confirmation of the reasonableness of the metrics. Therefore, we use GO FIGURE \citep{gabriel2020go}, which has developed a systematic criterion for factual consistency metrics, as another benchmark to evaluate our work from a different aspect. We provide a detailed description of these benchmarks in the Appendix \ref{appendix:A}. \subsection{Experimental Details} We use SpaCy \footnote{\url{https://spacy.io/api}} to extract named entities and noun phrases. We first adopted \verb|en_core_web_sm|, the model used in previous QA-based metrics work, to extract factual factors. After that, we also adopted the \verb|en_core_web_trf| model with higher accuracy to extract factual factors. By using SpaCy, we obtained too many noun phrases, and some of them have overlapping parts with named entities. Therefore, we take named entities as the main part and remove those noun phrases containing overlapping parts, to get a set of factual factors that do not interfere with each other. For the cloze model, we use transformers library \citep{wolf2019huggingface} to build and employ Roberta-base and Bart-base pre-trained models. Cross entropy loss with Adam \citep{kingma2014adam} optimizer is used, with a batch size of 96, a learning rate of 1e-4 and a warming up step of 8000. We trained and tested our model on two NVIDIA GeForce RTX 3090 GPUs for 2-3 days. During the experiments, we set its parameters $k = 1$ (\S \ref{sec:k}) and $\alpha=\beta=0.5$ (\S \ref{sec:ab}). \subsection{Results and Analysis} \renewcommand\arraystretch{1.1} \begin{table*}\small \centering \begin{tabular}{clccccccc} \hline \textbf{Type} & \textbf{Metric} &\textbf{XSF} &\textbf{SE} &\textbf{FCD} &\textbf{FXS} &\textbf{QCD} &\textbf{QXS} &\textbf{Sec./Sum}\\ \hline \multirow{2}{*}{NF} & BERTScore & 20.00 & 24.19 & 41.69 & 19.26 & 57.19 & 1.83 & \multirow{2}{*}{/} \\ & BLANC-help & 10.94 & 17.08 & 23.68 & 12.22 & 18.50 & 4.01 &\\ \hline \multirow{4}{*}{QA} & SummaQA & 14.82 & 14.69 & 16.14 & 6.19 & 28.28 & 9.90 & 2.24 \\ & FEQA & 29.44 & 43.71 & 52.50 & 14.96 & 55.81 & 31.72 & 3.00 \\ & QAGS(factsumm impl.) & 11.90 & 20.32 & 26.06 & 10.64 & 22.65 & 22.22 & 2.20 \\ & QuestEval & \textbf{46.38} & 37.75 & 52.66 & \textbf{30.05} & 53.39 & 27.81 & 3.20 \\ \hline \multirow{4}{*}{ClozE-R} & \textbf{Base} & 16.45 & 44.29 & 49.70 & 21.33 & 65.76 & 27.79 & 0.13 \\ & \verb| +sentence-level| & 16.45 & 47.17 & \textbf{57.27} & 21.27 & 65.20 & 27.79 & 0.11 \\ & \verb| +en_core_web_trf| & 18.66 & 47.09 & 55.38 & 23.10 & \textbf{66.12} & \textbf{32.36} & 0.23 \\ & \verb| +confidence| & 19.22 & \textbf{48.01} & 55.12 & 23.54 & 65.59 & 29.37 & 0.23 \\\hline \multirow{4}{*}{ClozE-B} & \textbf{Base} & 20.05 & 38.17 & 45.21 & 19.31 & 63.39 & 20.56 & 0.09 \\ & \verb| +sentence-level| & 20.08 & 35.33 & 42.12 & 19.27 & 61.07 & 20.56 & \textbf{0.08} \\ & \verb| +en_core_web_trf| & 20.44 & 36.82 & 43.26 & 20.40 & 61.68 & 19.42 & 0.19 \\ & \verb| +confidence| & 20.44 & 36.47 & 42.12 & 20.89 & 61.01 & 21.99 & 0.19 \\ \hline \end{tabular} \cprotect\caption{Pearson correlation coefficients of each metric relative to human judgments and the time spent on the evaluation. We use QAGS-CNN/DM to measure the time consumption on the same device. And we apply \textbf{Sec./Sum} to describe the time consumption, which means the number of seconds it takes to evaluate a summary. The table shows the results of the ablation study in the Section ClozE-R and ClozE-B, where \textbf{Base} denotes \verb|en_core_web_sm+summary-level| setting.} \label{tab:1} \end{table*} \subsubsection{Pearson Benchmark} We show the Pearson correlation coefficients between human-annotated factual consistency scores and various metrics in Table \ref{tab:1}. For all the datasets, there is a significant difference (with p<0.01), thus these correlation scores are sufficiently plausible. We begin with a comparison to non-factual (NF) metrics in Section NF. Obviously, QA-based metrics and ClozE perform better than Non-factual metrics on the vast majority of datasets. It shows that the factual consistency between the summaries and corresponding documents can be effectively evaluated by comparing named entities as well as noun phrases. Comparing Sections QA and ClozE (both ClozE-R and ClozE-B) \footnote{ClozE-R and ClozE-B respectively indicate that the cloze models ClozE used are Roberta and Bart.}, we observe that the results obtained by ClozE show comparable correlations with those obtained by QA-based metrics on all datasets, and ClozE metrics even achieve the best results on most datasets. However, ClozE-B does not perform very well compared to ClozE-R, and we believe the reason is that the Bart decoder uses a causal mask mechanism. This mechanism makes the model unable to perceive the following information of the summary text, which leads to the inability to fill in the blank correctly. \begin{table*}\small \renewcommand\arraystretch{1.1} \centering \scalebox{0.85}{ \begin{tabular}{l|cc|cccc|cc} \hline & \textbf{BLANC-help} &\textbf{BERTScore} &\textbf{SummaQA} &\textbf{FEQA} &\textbf{QAGS} &\textbf{QuestEval} &\textbf{ClozE-R} &\textbf{ClozE-B}\\ \hline Upper Bound & 7.60 & 84.36 & 10.87 & 37.56 & 50.44 & 34.63 & 70.10 & 48.90\\ Level 1 & 7.29/7.50 & 84.13/84.20 & 9.58/10.63 & 33.35/36.64 & 43.66/47.67 & 31.92/32.31 & 64.80/69.28 & 45.58/48.44\\ Level 2 & 7.03/7.43 & 83.94/84.04 & 8.53/10.38 & 28.46/36.13 & 39.35/45.91 & 30.41/30.67 & 61.00/69.05 & 43.14/47.97\\ Level 3 & 6.72/7.38 & 83.77/83.90 & 7.54/10.26 & 25.12/35.63 & 34.58/44.54 & 28.45/29.21 & 57.16/68.40 & 40.38/47.60\\ Lower Bound & -0.67 & 78.16 & 0.12 & 0.58 & 1.46 & 0.68 & 18.77 & 7.38\\ \hline Correlation & -1.00/-0.99 & -1.00 & -1.00/-0.98 & -0.99/-1.00 & -0.99/-0.99 & -1.00/-1.00 & -1.00/-0.96 & -1.00/-1.00\\ p-value & 0.03*/0.08 & 0.01**/0.02* & 0.01*/0.13 & 0.07/<0.01** & 0.02*/0.04* & 0.04*/0.02* & <0.01**/0.17 & 0.02*/0.04*\\ \hline \end{tabular}} \caption{Results of various metrics under the GO FIGURE benchmark on CNN/DM. Upper and Lower Bound denote the scores given by the metrics under golden summaries and random texts respectively. Level * denotes the scores given by the metrics under error level *. Correlation denotes the correlation between the metrics and error level. In each cell (*/*), entity factual errors are on the left and non-entity factual errors are on the right.} \label{tab:2} \end{table*} \begin{table*}\small \renewcommand\arraystretch{1.1} \centering \scalebox{0.85}{ \begin{tabular}{l|cc|cccc|cc} \hline & \textbf{BLANC-help} &\textbf{BERTScore} &\textbf{SummaQA} &\textbf{FEQA} &\textbf{QAGS} &\textbf{QuestEval} &\textbf{ClozE-R} &\textbf{ClozE-B}\\ \hline Upper Bound & 5.99 & 83.76 & 4.48 & 27.87 & 22.19 & 19.95 & 65.00 & 44.13\\ Level 1 & 5.73/5.98 & 83.53/83.56 & 3.80/4.31 & 23.20/26.94 & 17.89/20.86 & 18.14/17.47 & 57.94/64.43 & 45.58/48.44\\ Level 2 & 5.46/5.99 & 83.36/83.38 & 3.40/4.22 & 20.05/26.55 & 16.96/21.31 & 16.78/16.01 & 51.63/63.97 & 43.14/47.97\\ Level 3 & 5.30/5.97 & 83.21/83.26 & 3.13/4.14 & 15.81/26.06 & 14.68/20.37 & 14.84/14.44 & 47.55/63.09 & 40.38/47.60\\ Lower Bound & 0.51 & 80.08 & 0.26 & 1.18 & 2.86 & 0.23 & 35.95 & 10.70\\ \hline Correlation & -0.99/-0.61 & -1.00 & -0.99/-1.00 & -1.00 & -0.97/-0.52 & -0.99/-1.00 & -0.99/-0.98 & -1.00/-1.00\\ p-value & 0.09/0.59 & 0.02*/0.06 & 0.07/0.03* & 0.05*/0.04* & 0.15/0.65 & 0.06/0.01* & 0.07/0.11 & 0.02*/0.04*\\ \hline \end{tabular}} \caption{Results of various metrics under the GO FIGURE benchmark on XSum. The symbolic meaning is the same as that in Table \ref{tab:2}.} \label{tab:3} \end{table*} \subsubsection{GO FIGURE Benchmark} We present the results for each baseline under GO FIGURE benchmark in Table \ref{tab:2} and Table \ref{tab:3}. ClozE scores are negatively correlated with factual error levels both on CNN/DM and XSum, and credible enough with the small p-values, indicating that ClozE is sensitive to both entity and non-entity factual errors. In addition, we discover an interesting outcome. The "Upper Bound" in GO FIGURE represents the summary text without factual errors, which in practice is the golden summary. Therefore, the factual factors extracted from "Upper Bound" can be considered to be free of factual errors. This means that for factual-factor-comparison-based metrics like QA-based metrics and ClozE, the score they give to "Upper Bound" is the accuracy of the factual factors they generate. We find that the QA-based metrics score lower than ClozE at "Upper Bound". The QAGS with the highest score in QA-based metrics is even lower than the ClozE-R by 20 points. This means that ClozE has a higher accuracy of answers (or factual factors) generation and its factual consistency scores are more credible. \subsubsection{Time Consumption} In terms of evaluation speed, our method has an extremely significant improvement over the QA-based metrics. Our approach reduces the time consumption by nearly 96$\%$ on average. This exciting result shows that ClozE can improve evaluation speed significantly while maintaining performance. This great improvement is mainly due to : (1) we use a smaller model compared to the models in most of QA-based metrics, and (2) most importantly, we discarded the most time-consuming QG module, which greatly reduces the runtimes for evaluation . We also observe that ClozE-R takes nearly twice the evaluation time of ClozE-B, whose reason is mentioned in \S \ref{sec:clozemodel}. \subsubsection{Ablation Study} In Table \ref{tab:1}, we show the main ablation experiment results, and in Table \ref{tab:5} in Appendix \ref{appendix:B}, we present the full ablation experimental results. \paragraph{Granularity} In terms of granularity, there is not much difference between summary-level and sentence-level. We believe that the main reason for this is that the candidate summary sentences in the dataset are not very related to each other. Therefore, neither the single-sentence input nor the whole candidate summary input affects the accuracy of the sentence-level cloze. \paragraph{Factual Factors Extractor} We used two factual factors extractors, \verb|en_core_web_sm| (\verb|SM|) and \verb|en_core_web_trf| (\verb|TRF|) respectively. \verb|SM| has less time spent and, relatively, it extracts a much lower number and accuracy of factual factors than \verb|TRF|. Due to this, we can observe that the time spent on the results with \verb|SM| is much less than that with \verb|TRF|, but the correlation is also basically lower than that with \verb|TRF|. \paragraph{Confidence} We also conducted experiments on the Confidence proposed in \S \ref{sec:ab}. Because it is represented simply by the generation probabilities of factual factors, it has no impact on the computational speed of ClozE. Despite its simple design, it is also a certain effect enhancement for ClozE. It can help ClozE discard some uncertain cloze results to improve the accuracy of evaluating factual consistency. \section{Discussion} In this section, we analyze and verify some of the characteristics of ClozE that we mentioned above. \paragraph{The Effect of \bm{$k$}} Apart from the reason for the two-stage evaluation, the speed of QA-based metrics is also limited by the fact that they can only generate and answer one question at a time. Our ClozE can mask $k$ factual factors at once, which is equivalent to simultaneously generating and answering $k$ questions. We present the performance and speed of ClozE with different $k$ in Figure \ref{figure:3} and more results on different datasets in Figure \ref{figure:5} in Appendix \ref{appendix:B}. We use summary-level granularity for a larger range of $k$ and greedily mask the $k$ consecutive factual factors together one by one. We observe that the time (in seconds) taken by ClozE decreases linearly as the number $k$ increases. The performance of the model is the highest when $k=1$ and it decreases slowly when $k>1$, reflected by the Pearson correlation coefficient. The reason is that there may be causal relationships between factual factors, and when we replace them with \verb|[MASK]| at the same time, the cloze model will have a degradation of performance due to the lack of information. \begin{figure} \includegraphics[width=220pt, height=160pt]{QAGS-CNNDM.png} \caption{The trend of ClozE evaluation speed and correlation with human judgments given different $k$ settings on QAGS-CNN/DM.} \label{figure:3} \end{figure} \begin{figure} \includegraphics[width=220pt, height=160pt]{f1_trend.png} \caption{The trend of cloze accuracy (F1 Score) and correlation with human judgments (Pearson Correlation Coefficient) on different datasets.} \label{figure:4} \end{figure} \paragraph{The Effect of Cloze Model} The performance of QA-based metrics depends on both QG and QA modules, which leads to errors accumulating between modules and complicates the study of how to improve the QA-based metrics. One of the motivations of ClozE is to solve this problem. Because the performance of cloze depends on the structure of the model as well as the degree of training, we test both Roberta-base and Bart-base model and their checkpoints at different training steps. We present the results in Figure \ref{figure:4}. We observe a clear upward trend in most of the datasets. Although there is a slight decrease in the XSF and FXS datasets, the decrease is not significant and we consider it to be within the range of acceptable fluctuations. Based on the overall trends, we can assume that the performance of our ClozE can be improved when we have a better cloze model. In other words, we only need to consider the performance of the cloze model, which brings great convenience in further improving factual consistency metrics. \section{Conclusion} In this paper, we propose ClozE -- a cloze-based factual consistency evaluation metric. It retains the interpretability and sensitivity to factual consistency of the QA-based metrics while providing extremely fast evaluation with similar or even higher performance. We believe that a faster, high-performance factual consistency metric can greatly promote the research of factual consistency in abstractive summarization. Moreover, recent work \citep{wang2022effectively} suggests that pre-trained models may focus more on neighboring and co-occurrence words than on reliable knowledge-related words when doing cloze. Thus, we’ll further study the pre-trained models employed in the cloze model in the future. \section*{Limitations} Although we have experimentally demonstrated that ClozE has more advantages than QA-based metrics, it still has some limitations. In Table \ref{tab:4} (See Appendix \ref{appendix:B}), we show three special test samples on QAGS-CNN/DM datasets, which provides several outputs of ClozE, and we use them to make a quality analysis for the proposed method. In sample 1, ClozE fills in the same factual factors when the masked ones are correct, which is a common phenomenon throughout ClozE and one of the reasons for its high performance. We can also note that ClozE replaces the incorrect factual factor \verb|"The president"| with the correct one \verb|"brady"|. This is a delightful surprise, indicating that ClozE may be able to correct the wrong factual factors. But unfortunately, ClozE is not always able to accomplish this task perfectly. As shown in samples 2 and 3, ClozE may replace a wrong factual factor with another wrong factor occasionally. We study this situation in detail and find three possible reasons. As shown in Table \ref{tab:4}, the first reason is the imperfect performance of the cloze model in ClozE. The second reason is that when a factual factor in the summary is incorrect, the length of the blanks is limited by this factual factor, thus causing the cloze model to fill in an incorrect result because of the length mismatch. For example, for Cloze Result 1 in sample 3, the masked factual factor is \verb|"Nicola sturgeon"|, whose length of the tokenized result by RobertaTokenizer is 5 ([31988, 3019, 1690, 710, 20989]\footnote{These numeric sequences are the results of tokenization by RobertaTokenizer.}). The corresponding correct factual factor is \verb|"cameron"|, with the length of 2 ([34174, 261]). However, the cloze model has to fill in all the 5 blanks, whose result is [ 119, 34174, 261, 261, 29] representing \verb|“m cameronons”|. While for Cloze Result 3 in sample 2, the masked factual factor \verb|"The school"|([20, 334]) is also unable to be replaced by the correct factual factor \verb|"kopila"| ([449, 1517, 4882]) because of the insufficient length. The third reason is that ClozE cannot deal with the situation where there is no correct factual factor to fill in. For example, Cloze Result 2 in sample 2 with an incorrect factual factor can never be corrected by simply replacing it because the context around is also wrong. However, the above issues do not seem to lead to poor performance in factual consistency evaluation. As shown in Eq.\ref{equation:2}, the ClozE score is calculated by comparing the factual factors in the summary with those filled in by the cloze model. This means that even if a factual factor in the summary is wrong, we can still obtain a consistent ClozE score regardless of whether it fills in the correct factual factor or another wrong one. Nevertheless, this issue can still be a challenge to the application of ClozE, which may lead it to not be credible enough. In summary, we find that cloze accuracy and the length limitation of factual factors are key performance bottlenecks of ClozE, and they also affect the scalability of ClozE on other tasks, for example, correcting the factual errors using QA \citep{dong2020multi} can also be performed by ClozE, which only requires redefining factual factors for the task. These two issues are the main problems identified so far for ClozE, and our subsequent work will mainly revolve around them. \input{custom.bbl}
\section{Introduction} \label{sec:int} Since the turn of the millennium, an increasing amount of data obtained by several collaborations (Belle, BaBar, LHCb, BESII) has produced many exotic hadrons which appear to be inconsistent with the predictions of the conventional quark model \cite{Godfrey:1985xj,Capstick:1986ter}. The discovery at LHCb \cite{LHCb:2015yax,LHCb:2019kea} of four excited nucleon resonances $( P_c(4312)$, $P_c(4380)$, $P_c(4440)$ and $P_c(4457))$, seen on the invariant mass distribution of $J/\Psi\, p$ pairs from the decay $\Lambda_b \to J/\Psi\ p\ K^-$ , has been considered as the first clear evidence of the existence of pentaquark baryons, as a $c\bar{c}$ pair is necessary to explain their high mass. In a later experiment \cite{LHCb:2020jpq}, the $J/\Psi\, \Lambda$ spectrum, obtained from the decay $\Xi^-_b \to J/\Psi\ \Lambda\ K^-$, also provided evidence for a pentaquark, this time with one unit of strangeness content, the $P_{cs}(4459)$, which was also compatible with a two-peaked interpretation. More recently, an analysis of the $B^- \to J/\Psi \ \Lambda\ {\bar p}$ decay points at the existence of another narrow hidden-charm pentaquark with strangeness, the $P_{cs}(4338)$ \cite{Penta4338}. Among the various theoretical interpretations on the nature of these pentaquarks, the possibility that they could be structured as meson-baryon molecules was already predicted in \cite{Hofmann:2005sw,Wu:2010jy,Wu:2010vk}, prior to their discovery, and has gained interest ever since due to their proximity to various charmed meson-baryon thresholds (see \cite{Karliner:2022erb,Dong:2021bvy} and references therein). Many of these studies assume a t-channel vector meson exchange interaction between mesons and baryons, which is unitarized in coupled-channels. However, a hidden charm pentaquark with double strangeness was not found in \cite{Wu:2010vk,Wu:2010jy}, which is possibly the reason why its possible existence has hardly been discussed in the literature. A recent study \cite{Wang:2020bjt}, based on a light meson exchange potential, finds candidates for doubly-strange hidden charm pentaquarks, in the form of $\Xi^\prime_c D^*_s$ or $\Xi^*_c D^*_s$ molecules, at energies slightly above 4.5 GeV, albeit employing regularization cutoff values larger than 2 GeV, which deviates considerably from the expected value of 1 GeV representing a typical hadronic scale. In this work, we revisit the procedure of the unitarized coupled-channel hidden gauge formalism, which has been a very successful approach in explaining other exotic hadrons in the charm and hidden charm sectors (see \cite{Guo:2017jvc} and references therein). By relaxing some of the approximations carried out in \cite{Wu:2010vk,Wu:2010jy} and still employing realistic regularization parameters, we demonstrate in this work that the model is able to generate strangeness $S=-2$ pentaquarks, hence contributing to complement the family of its $S=0$ and $S=-1$ partners that have been obtained within the same formalism and that have found experimental confirmation. \section{Formalism} \label{sec:formalism} The model employed in this work relies on a meson-baryon interaction in S-wave, which is built up from the t-channel diagram of Fig.~\ref{Fig:treediagr}, where the mesons are depicted by dashed lines and the baryons by solid lines. The external mesons in the diagram represent the ground states of either pseudoscalar ($J ^P(M)=0^-$)- or vector ($J ^P(M)=1^-$)-type, while the baryons are the lowest-energy ones with $J^P(B)=1/2^+$, all of them composed out of $u,d,s,c$ quarks and, in the case of mesons, their corresponding antiquarks. The indices $i,j$ label the different meson-baryon channels with the same spin-parity ($J^P$), isospin and flavor quantum numbers that can be connected by the exchange of a vector meson $V^*$. \begin{figure}[h!] \centering \includegraphics[scale=0.40]{fig1.pdf} \caption{Leading order tree level diagram contributing to the meson-baryon interaction. Baryons and mesons are depicted by solid and dashed lines, respectively.} \label{Fig:treediagr} \end{figure} The $VPP$ ($VVV$) and $VBB$ vertices in the diagram are described by effective Lagrangians which are obtained using the local hidden gauge formalism \cite{Bando:1984ej,Bando:1987br} and assuming SU(4) symmetry: \begin{eqnarray}\label{eq:vertices} \mathcal{L}_{VPP}&=&ig\langle\left[\partial_\mu\phi, \phi\right] V^\mu\rangle \ ,\nonumber \\ \mathcal{L}_{VBB}&=&\frac{g}{2}\sum_{i,j,k,l=1}^4\bar{B}_{ijk}\gamma^\mu\left(V_{\mu,l}^{k}B^{ijl}+2V_{\mu,l}^{j}B^{ilk}\right)\, \\ \mathcal{L}_{VVV}&=&ig\langle {\left[V^\mu,\partial_\nu V_\mu\right] V^\nu}\rangle \nonumber \end{eqnarray} where $\phi$ and $V_\mu$ represent the 16-plet of pseudoscalar and vector fields, respectively, $\langle~\rangle$ denotes the trace in $SU(4)$ flavour space, and $g=m_V/2f$ is the universal coupling constant, related to the pion decay constant $(f=93~{\rm MeV})$ via a characteristic mass of the light uncharmed vector meson from the nonet $(m_V)$. More details of the formalism can be found in Ref.~\cite{Montana:2017kjw}. Using the $VPP$ and $VBB$ Lagrangians of Eq.~(\ref{eq:vertices}) one can obtain the interaction of pseudoscalar mesons with baryons, referred to as $PB$ interaction from now on. In the limit $t\ll m_V$, where $t$ and $m_V$ are, respectively, the four-momentum and mass of the exchanged meson, the t-channel diagram of Fig.~\ref{Fig:treediagr} reduces to a contact term and, making the low momentum expansion until $\mathcal{O}(p^2/M^2)$, its S-wave expression reads: \begin{equation}\label{eq:Vij} V_{ij}(\sqrt{s})=-C_{ij}\frac{1}{4f^2}\left(2\sqrt{s}-M_i-M_j\right) N_i N_j, \end{equation} where $N_i$ and $N_j$ are normalization factors, $N_i=\sqrt{(E_i+M_i)/2M_i}$, and $M_i$ ($E_i$), $M_j$ ($E_j$) are the mass (energy) of the baryon in the incoming and outgoing channels, respectively. The coefficients $C_{ij}$ contain the $SU(4)$ Clebsh-Gordan factors encoded in the Lagrangians of Eq.~(\ref{eq:vertices}), as well as the ratio between $m_V^2$ and the mass squared of the vector meson exchanged which, in the $SU(4)$ limit, is also $m_V^2$. However, the transitions studied here involve the exchange of vector mesons with quite different masses and this is taken into account as follows. All the masses of the light vector mesons, composed out of $u,d,s$ quarks and their corresponding antiquarks, are assumed to be the same and equal to $m_V$. The mass of mesons with one charm or anticharm quark is assumed to be roughly twice that of the uncharmed ones, hence the coefficients tied to their exchange will carry a factor $\kappa_c=(m_V/m_V^c)^2\simeq 1/4$. Finally, the mass of the $J/\Psi$ meson is taken to be three times that of the light ones, so that the terms induced by its exchange carry a factor $\kappa_{cc}\simeq 1/9$ in this case. In the present work we focus on the isospin $I=1/2$ and strangeness $S=-2$ sector of the pentaquark with double strangeness, which can be realized by nine possible combinations of a pseudoscalar meson and a baryon, namely $\pi\Xi(1456)$, $\bar{K}\Lambda(1611)$, $\bar{K}\Sigma(1689)$, $\eta\Xi(1866)$, $\eta'\Xi(2276)$, $\eta_c\Xi(4302)$, $\bar{D}_s\Xi_c(4437)$, $\bar{D}_s\Xi_c^\prime(4545)$, and $\bar{D}\Omega(4565)$, where the values in parenthesis indicate their thresholds in MeV. As can be seen, the mass of the four channels with hidden charm quarks is more than $2~{\rm GeV}$ larger than that of the other channels. We can then expect these two energy regions to behave independently and the corresponding channels to have small effects on each other. Hence, in the present work we consider only the four heavy channels. The corresponding values of the $C_{ij}$ coefficients are shown in Table \ref{Tab:CijPB}. \begin{table}[h!] \begin{center} \begin{tabular}{c|ccccc} \hline\\ [-0.30cm] & $\eta_c\Xi$ & $\bar{D}_s\Xi_c$ & $\bar{D}_s\Xi_c^\prime$ & $\bar{D}\Omega_c$\\ \hline \\ [-0.2cm] $\eta_c\Xi$ & $0$ & $\sqrt{\frac{3}{2}}\kappa_c$ & $\frac{1}{\sqrt{2}}\kappa_c$ & $-\kappa_c$\\ $\bar{D}_s\Xi_c$ & & $-1+\kappa_{cc}$ & $0$ & $0$\\ $\bar{D}_s\Xi_c^\prime$ & & & $-1+\kappa_{cc}$ & $-\sqrt{2}$\\ $\bar{D}\Omega_c$ & & & & $\kappa_{cc}$ \\ \end{tabular} \end{center} \caption{$C_{ij}$ coefficients of the $PB$ the interaction in the $(I,S)=(1/2,-2)$ sector.} \label{Tab:CijPB} \end{table} Similarly, using the $VVV$ and $VBB$ Lagrangians of Eq.~(\ref{eq:vertices}) one can obtain the interaction of vector mesons with baryons, referred to as the $VB$ interaction from now on. Neglecting the momentum of the external vector mesons versus their mass, their polarization vectors become essentially spatial and the resulting $VB$ interaction kernel is then identical to that for the interaction of pseudoscalar mesons with baryons, Eq.~(\ref{eq:Vij}), but multiplied by the scalar product $\Vec{\epsilon}_i\cdot\Vec{\epsilon}_j$. In the $VB$ interaction case, the allowed channels are $\rho\Xi(2089)$, $\bar{K}^*\Lambda(2010)$, $\bar{K}^*\Sigma(2087)$, $\omega\Xi(2101)$, $\phi\Xi(2338)$, $J/\Psi\,\Xi(4415)$, $\bar{D}^*_s\Xi_c(4581)$, $\bar{D}^*_s\Xi_c^\prime(4689)$, and $\bar{D}^*\Omega(4706)$, where again we can separate the channels in two energy regions. Focusing on the heavy channels, the matrix of $C_{ij}$ coefficients can be obtained directly from that in Table~\ref{Tab:CijPB} with the following replacements in the labeling: $\eta_c \to J/\Psi$, $\bar{D}\rightarrow\bar{D}^\ast$, $\bar{D}_s\rightarrow\bar{D}_s^\ast$. The sought resonances are dynamically generated as poles of a properly unitarized scattering amplitude $T_{ij}$. We employ the Bethe-Salpeter equation in coupled channels, which implements a re-summation of meson-baryon loops, denoted by $G_l$, to infinite order: \begin{eqnarray}\label{eq:Tij1} T_{ij}&=&V_{ij}+V_{il}G_lV_{lj}+V_{il}G_lV_{lk}G_kV_{kj}+...\nonumber \\ &=& V_{ij}+V_{il}G_lT_{lj} \ . \end{eqnarray} Note that, in the case of the $VB$ amplitude, the sum over the polarization of the internal vector meson gives \begin{equation} \sum_{pol}\epsilon_i\epsilon_j=\delta_{ij}+\frac{q_iq_j}{M_V^2} \ , \end{equation} but, consistently with our model, the $q^2/M_V^2$ term is neglected and this permits factorizing a factor $\Vec{\epsilon}_i\Vec{\epsilon}_j$ out from all terms in the Bethe-Salpeter equation. By adopting the commonly employed approximation of factorizing the $V$ and $T$ on-shell amplitudes out of the intermediate integrals, the above equation reduces to a simple algebraic one, \begin{equation}\label{eq:Tij2} T=(1-VG)^{-1}V \ , \end{equation} where $G$ is a diagonal matrix containing the meson-baryon loop functions given by \begin{equation}\label{eq:Gl} G_l(P)=i\int\frac{d^4q}{(2\pi)^4}\frac{2 M_l}{(P-q)^2-M_l^2+i\epsilon}\frac{1}{q^2-m_l^2+i\epsilon} \ , \end{equation} $M_l$ and $m_l$ denoting the mass of the baryon and meson in the loop, respectively, $P=p+k=(\sqrt{s},0)$ being the total four-momentum in the c.m. frame, and $q$ the internal meson four-momentum. The loop function diverges logarithmically and needs to be regularized. We employ the {\it cutoff method} that implies restricting the momentum integrals up to a value $\Lambda$, which should be related to the dynamical scale that has been integrated out in our model, like the mass of the lighter vector mesons being exchanged in the t-channel diagram. Taking these considerations into account, we choose $\Lambda=800$ MeV. The resonances are generated as poles of the scattering amplitude $T_{ij}$, analytically continued to the so-called \textit{second Riemann sheet} of the complex energy plane. Around the pole position, the scattering amplitude can be approximated with the expression \begin{equation} T_{ij}\simeq\frac{g_ig_j}{\sqrt{s}-M_R+i\Gamma_R/2}, \end{equation} from which one can obtain the couplings $g_i$ of the resonance to the various meson-baryon channels. A measure of the amount of a given meson-baryon component in the resonance is given by the compositeness, defined as: \begin{equation} \chi_i=\left| g_i^2 \left ( \frac{\partial G_i(\sqrt{s})}{\partial \sqrt{s}} \right )_{\sqrt{s}=M_R-i\Gamma_R/2} \right| \end{equation} \section{Results and Discussion} \label{sec:res} We start this section by presenting our results for the $PB$ sector. Following our model, we obtain a dynamically generated hidden charm double-strange baryon resonance at $4493$ MeV with a width of $74$ MeV. As can be seen from the detailed information given in Table~\ref{tab:PBHigh}, this resonance couples strongly to the $\bar{D}\Omega_c$ and $\bar{D}_s\Xi_c^\prime$ channels and is dominantly composed by $\bar{D}\Omega_c$ states. Note that being generated by the S-wave interaction of a $0^-$ pseudoscalar meson with a $1/2^+$ baryon in the $(I,S)=(1/2,-2)$ sector, this resonance is a $\Xi$-like state, $\Xi(4493)$, with $J^\pi=1/2^-$. \begin{table}[hbt!] \begin{center} \begin{tabular}{ccccc} \hline\\ \multicolumn{5}{l}{$0^- \oplus 1/2^+$ $PB$ interaction in the $(I,S)=(1/2,-2)$ sector}\\[2mm] \hline\\ $\Xi(4493)$ & & \!\!\!\!\!\!\! {$M_R=4493.35$\ MeV} & \multicolumn{2}{c}{~~ $\Gamma_R=73.67$\ MeV}\\ \hline & & \multicolumn{2}{c}{} & \\ [-3mm] & ${\rm thr.}$ (MeV) & $g_i$ & $|g_i|$ & $ \chi_i$ \\ $\eta_c \Xi$ & 4302 & $-1.60+{\rm i\,} 0.34$ &\ 1.63 & 0.220\\ $\bar{D}_s \Xi_c$ & 4437 & $-0.17+{\rm i\,}0.27$ &\ 0.32 & 0.019\\ $\bar{D}_s \Xi_c^\prime$ & 4545 & $ -2.41+{\rm i\,}0.58$ &\ 2.48 & 0.398\\ $\bar{D}\Omega_c$ & 4564 & $ 3.59-{\rm i\,}0.77$ &\ 3.67 & 0.711\\ \hline \end{tabular} \end{center} \caption{Energy, width, couplings to meson-baryon states, and compositeness of the $PB$ molecular $\Xi(4493)$ state.} \label{tab:PBHigh} \end{table} From the results in Table \ref{tab:PBHigh}, we observe that the $\Xi(4493)$ appears below the thresholds of the $\bar{D}\Omega_c$ and $\bar{D}_s\Xi_c^\prime$ channels, which participate strongly in its generation, and it can only decay into the two lightest ones. It is clear, however, that the most probable decay process will be $\Xi(4493)\to \eta_c\Xi$, as the coupling to this lowest energy channel is almost an order of magnitude larger than that to $\bar{D}_s\Xi_c$, together with the fact that the available phase space is also much larger. Thus, in order to qualitatively simulate the shape of a future invariant mass spectrum looking for this hidden charm $\Xi$ resonance, we plot in Fig. \ref{fig:etacXi} the functions $ \mid\vec{q}_{1}\mid \left|T_{i1}\right|^2 $ ($i=1,4$) versus the $\eta_c\Xi$ center-of-mass energy, where $T_{i1}$ is the scattering amplitude for the $i\to\eta_c\Xi$ transition and $\vec{q}_{1}\equiv \vec{q}_{\eta_c}$ is the $\eta_c$ momentum in the center-of-mass frame, which acts as a phase space modulator. Possible processes to search for this resonance could be the decays $\Xi_b \to \Xi\ \eta_c\ \phi$ and $\Omega_b \to \Xi\ \eta_c \ {\bar K}$ , from which one can build the invariant mass spectrum of $\eta_c\ \Xi$ pairs. \begin{figure}[h!] \centering \includegraphics[scale=0.47]{Cut-off800_PB.png} \caption{Dependence of $\mid\vec{q}_{1}\mid\left|T_{i1}\right|^2 $ on the $\eta_c\Xi$ center-of-mass energy for different $PB$ channels. The vertical dotted lines represent the channel threshold locations.} \label{fig:etacXi} \end{figure} It is very interesting to compare our results with those of the other works using similar models. First of all, we note that a dynamically generated state, strongly coupled to the $\bar{D}\Omega_c$ and $\bar{D}_s\Xi_c^\prime$ channels, is also found in Ref. \cite{Hofmann:2005sw}, but at a much smaller energy, $M_R\simeq 3800$~MeV. Such a substantial difference has to do with the rather different methods and parameters of the regularization scheme employed. While we use the {\it cutoff method} with $\Lambda=800$~MeV, the authors of Ref. \cite{Hofmann:2005sw} regularize the loop function imposing the requirement $G_l(\mu)=0$, at $\mu$ given by $\mu=\sqrt{m_{\rm th}^2+M_{\rm th}^2}$, being $m_{\rm th}$ and $M_{\rm th}$ the masses of the meson and baryon, respectively, of the lightest possible channel. According to Ref. \cite{Hofmann:2005sw}, $\pi\, \Xi$ is taken as the lightest meson-baryon state in the $(I,S)=(1/2,-2)$ sector, although this channel, as well as the other four light channels, play a negligible role in the generation of the discussed resonance. Enforcing the regularization requirement of Ref. \cite{Hofmann:2005sw} would imply, in our model, the use of a cutoff value of $\Lambda\simeq 2800~{\rm MeV}$, which is rather unreasonable in our opinion. \begin{figure}[h!] \centering \includegraphics[scale=0.47]{Cut-off800_PB_gam.png} \caption{Dependence of $\mid \vec{q}_{\eta_c}\mid |T_{\eta_c\Xi \to \bar{D}\Omega_c}|^2$ on the $\eta_c\Xi$ center-of-mass energy, for various values of the coupling coefficient $C_{43}'=\gamma\, C_{43}$. The vertical dotted lines represent the channel threshold locations.} \label{fig:cutoffPBgam} \end{figure} We next compare our results with those of Ref. \cite{Wu:2010vk}, where the loop function is calculated in a way similar to ours, but the resonance strongly coupled to the $\bar{D}\Omega_c$ and $\bar{D}_s\Xi_c^\prime$ states is not generated. The main fundamental difference with respect to our work is that the contribution of the meson-exchange diagrams mediated by $J/\Psi$ are neglected in Ref. \cite{Wu:2010vk}, which is equivalent to setting $\kappa_{cc}=0$, leading to a value $C_{44}=0$ in the matrix of coefficients displayed in Table~\ref{Tab:CijPB}. Consequently, as the remaining diagonal coefficients in the Table produce a repulsive interaction [ see Eq.~(\ref{eq:Vij})], the model of Ref. \cite{Wu:2010vk} is incapable of obtaining a pole in the $(I,S)=(1/2,-2)$ sector. We note that ignoring the small value of $\kappa_{cc}$ in front of the other contributions of the $C_{ij}$ coefficients is usually a sufficiently good approximation. In fact, the mild attractive character of $C_{44}=\kappa_{cc}=1/9$ would not be sufficient to produce a $\bar{D}\Omega_c$ bound state in an uncoupled channels calculation, as we have numerically checked. However, in this particular sector, one finds a sizable non-diagonal coefficient, $C_{43}=-\sqrt{2}$, which, via coupled channels, adds enough attraction to make the dynamical generation of the new molecular state possible. We are thus observing a very interesting phenomenon, uniquely related to the coupled channel dynamics, which enhances the mild attraction of the $\bar{D}\Omega_c$ interaction to produce a bound state. This is analogous to what happens to the deuteron, which appears as a bound state of the coupled-channel $^3S_1-^3D_1$ nucleon-nucleon interaction, but would disappear in an uncoupled calculation \cite{MACHLEIDT19871}. To validate the connection of the found resonance with the coupled-channel dynamics, we have redefined the $C_{43}$ coefficient as $C_{43}'=\gamma C_{43}$ and performed calculations for different values of $\gamma$ between 0 and 1. The results, presented Fig.~\ref{fig:cutoffPBgam}, clearly show the dramatic effect of the coupled channels, requiring the coupling coefficient to have a minimum strength for the resonance to appear. \begin{figure}[h!] \centering \includegraphics[scale=0.5]{SU4.png} \caption{Region in the complex energy plane where the mole\-cular $\Xi$ pentaquark can be found, assuming up to 30\% of $SU(4)$ breaking in the heavy-meson mediated transitions and cutoff values in the range $(750-950)$ MeV. The coloured symbols indicate the pole position of the resonance for different cutoff values and $3\times 3 =9$ different $SU(4)$-breaking parameters, corresponding to the possible combinations of the values $(0.7, 1.0, 1.3)\kappa_c$ and $(0.7, 1.0, 1.3)\kappa_{cc}$. The upper dots are obtained with $1.3\kappa_c$ and the lower ones with $0.7\kappa_c$. The dependence on the variation of $\kappa_{cc}$ is mild and is reflected in the separation within each 3-symbol group. The black lines are merely to guide the eye and join the results obtained with different cutoff values for the combinations with $1.3\kappa_c, 0.7\kappa_{cc}$ (upper line), $\kappa_c,\kappa_{cc}$ (middle line) and $0.7\kappa_c, 1.3\kappa_{cc}$ (lower line). } \label{fig:SU4} \end{figure} Our approach is based on $SU(4)$ symmetry, which is violated in nature, since the mass of the charm quark is much larger compared to that of the three lighter quarks. The model already incorporates $SU(4)$ symmetry violation to some extent, since the physical masses of the mesons and baryons are used in the interaction kernel and in the loop function. However, we would like to analyze how the generated resonance is affected when we introduce up to an additional 30\% of $SU(4)$ symmetry violation in the coupling vertices of the transitions mediated by the exchange of heavy mesons. This is implemented in practice by multiplying $\kappa_c$ and $\kappa_{cc}$ by a factor varying in the range $(0.7 - 1.3)$. We also investigate the sensitivity of the pole position to the cutoff parameter $\Lambda$, which we vary from $750$ MeV until $950$ MeV. The results of all these calculations form a gray area in Fig. \ref{fig:SU4}, which represents the region in the complex energy plane where the resonance can be found, assuming up to 30\% of $SU(4)$ breaking in the heavy-meson mediated transitions and cutoff values in the range $(750-950)$~MeV. It is seen that modifications of the cutoff produce sizable variations in the mass of the resonance but a moderate effect on its width. In contrast, a modification of $\kappa_c$ produces important variations in the width of the resonance, while the mass is less affected, except for the larger cutoff and $kappa_c$ values. This is easily understood from inspecting the coefficients of Table~\ref{Tab:CijPB}, where one sees that the size of the parameter $\kappa_c$ is directly affecting the couplings of the heavier channels to the lighter one, $\eta_c\Xi$, to which the resonance decays. The overall conclusion is that, although the mass and the width depend on the model parameters, the appearance of a pole is a robust outcome in all these calculations, giving support to our claim of the probable existence of a $(I,S)=(1/2,-2)$ molecular-type pentaquark. \begin{table}[hbt!] \begin{center} \begin{tabular}{ccccc} \hline\\ \multicolumn{5}{l}{$1^- \oplus 1/2^+$ $VB$ interaction in the $(I,S)=(1/2,-2)$ sector}\\[2mm] \hline\\ $\Xi(4633)$ & & \!\!\!\!\!\!\! {$M_R=4633.38$\ MeV} & \multicolumn{2}{c}{~~ $\Gamma_R=79.58$\ MeV} \\ \hline & & \multicolumn{2}{c}{} & \\ [-3mm] & ${\rm thr.}$ (MeV) & $g$ & $|g_i|$ & $ \chi_i$ \\ $J/\psi\,\Xi$ & 4415 & $-1.62+{\rm i\,}0.38$ & 1.66 & 0.252\\ $\bar{D}_s^*\Xi_c$ & 4581 & $-0.143+{\rm i\,}0.32$ & 0.34 & 0.022\\ $\bar{D}_s^*\Xi_c^\prime$ & 4689 & $-2.49+{\rm i\,}0.67$ & 2.58 & 0.406\\ $\bar{D}^*\Omega_c$ & 4706 & $3.67+{\rm i\,}0.89$ & 3.78 & 0.740\\ \hline \end{tabular} \end{center} \caption{Energy, width, couplings to meson-baryon states, and compositeness of the $VB$ molecular $\Xi(4633)$ state.} \label{tab:VBHigh} \end{table} We next discuss the results obtained in the $VB$ sector. Proceeding in a similar way as for the $PB$ sector and also using a regularizing cutoff value of $\Lambda=800~{\rm MeV}$, we obtain a dynamically generated state at $4633$ MeV with a width of around $80$ MeV, strongly coupled to the $\bar{D}^*\Omega_c$ and $\bar{D}_s^*\Xi_c^\prime$ channels, dominantly composed by $\bar{D}^*\Omega_c$ states, and decaying mostly to $J/\Psi\, \Xi$ pairs. The detailed values of the pole position, couplings and compositeness can be seen in Table \ref{tab:VBHigh}. Note that this $\Xi(4633)$ state is degenerate in spin since, having been obtained from the interaction in S-wave of $J^P=1^-$ vector mesons with $J^P=1/2^+$ baryons, it can have either $J^P=1/2^-$ or $J^P=3/2^-$. In Fig.~\ref{fig:cutoffVB} we represent the shape of the $J/\Psi\, \Xi$ invariant mass spectrum that could be observed experimentally, assuming the $\Xi(4633)$ to be initiated by any of its meson-baryon components, a fact that will depend on the mechanism producing this resonance. Similarly to the $PB$ resonance discussed before, the $\Xi(4633)$ pentaquark could be seen as a peak in the invariant mass spectrum of $J/\Psi\, \Xi$ pairs produced in the decays $\Xi_b \to \Xi\ J/\Psi\ \phi$ and $\Omega_b \to \Xi\ J/\Psi \ {\bar K}$. \begin{figure}[h!] \centering \includegraphics[scale=0.47]{Cut-off800_VB.png} \caption{Dependence of $\mid\vec{q}_{1}\mid\left|T_{i1}\right|^2 $ on the $J/\Psi\,\Xi$ center-of-mass energy for different $VB$ channels. The vertical dotted lines represent the channel threshold locations.} \label{fig:cutoffVB} \end{figure} \section{Conclusions} \label{sec:conclusions} Stimulated by the recent discoveries by the LHCb collaboration of hidden charm pentaquark states with strangeness $S=0$ and $S=-1$, some of which could be associated to the predicted meson-baryon molecular states found in unitary models based on vector-meson exchange interactions, we have revisited these models to study the possible existence of pentaquarks with strangeness $S=-2$. Employing realistic regularization parameters, we predict double strangeness pentaquarks of molecular nature. The first one, $\Xi(4493)$, is a $J^P=1/2^-$ resonance generated from the interaction of pseudoscalar mesons with baryons, which couples most strongly to the $\bar{D}\Omega_c$ and $\bar{D}_s\Xi_c^\prime$ channels and can be most likely observed via its decay to $\eta_c \Xi$ states, for instance in decay processes of bottomed baryons, such as $\Xi_b \to \Xi\ \eta_c\ \phi$ and $\Omega_b \to \Xi\ \eta_c\ {\bar K}$. The other one, $\Xi(4633)$, is a spin-degenerate resonance which can have $J^P=1/2^-$ or $J^P= 3/2^-$ and is obtained from the interaction of vector mesons with baryons. It couples dominantly to the $\bar{D}^*\Omega_c$ and $\bar{D}_s^*\Xi_c^\prime$ channels and it should be looked for in invariant mass spectra of $J/\Psi\, \Xi$ pairs which could be produced in the decays $\Xi_b \to \Xi\ J/\Psi\ \phi$ and $\Omega_b \to \Xi\ J/\Psi\ {\bar K}$. These molecular-type pentaquarks are dynamically generated in a very specific and unique way, via a strong non-diagonal attraction between the two heaviest meson-baryon channels. This effect was overlooked before because the very mild attraction in the diagonal interaction of the heaviest meson-baryon state was neglected, hence effectively preventing the coupled-channel mechanism to take effect. We have therefore demonstrated the ability of vector meson exchange models to produce $S=-2$ pentaquark states having a molecular nature. This should stimulate experiments looking for these type of pentaquarks, the discovery of which would enrich the family of their already observed $S=0$ and $S=-1$ pentaquark partners. \section{Aknowledgements} V.K.M. and A.R. acknowledge support from the Ministerio de Ciencia e Innovaci\'on of Spain through the “Unit of Excellence María de Maeztu 2020-2023” award to the Institute of Cosmos Sciences (CEX2019-000918-M) and under~the project PID2020-118758GB-I00. Support from the EU STRONG-2020 project under the program H2020-INFRAIA-2018-1, grant agreement no.\ 824093, is also acknowledged.
\section{Introduction} Air transport is a sector of prime importance in today's rapidly changing world. Paraphrasing the words of Bill Gates, the airplane was the first human tool to break down the walls imposed by distance, uniting people, languages, and cultures, creating the first world wide web. This idea is confirmed by the evidence that, since the birth of the first airline in the world in 1919 (KLM), this industry has experienced constant growth and evolution. Nowadays aviation contributes about 4\% to the world GDP. In other words, if aviation were a country, it would occupy the seventeenth position in the world ranking for GDP \cite{ATAG.2020}. A milestone in the sector's evolution was the Airline Deregulation Act of 1978, which pushed towards a marked privatization process of the airports that formerly were almost entirely managed by public companies \cite{bailey1983deregulation}. Before deregulation, airlines were not free to choose policies on fares (suggested by governments), nor to freely decide on routes and business models. This constituted an insurmountable barrier to access for potential new entrants to the market and the skies were crimped by aviation giants whose slots and related fares were not arising from a free and competitive market. The goal of the deregulation act was precisely to remove these mechanisms and set in motion the competition in the market. The airlines were now free to manage their fare policies and this led to a sudden reduction of the prices, inducing a double effect: the entry of new carriers into the market and the privatization of the airports, which until then had a role limited to provide a “core benefit” \cite{jarach2001evolution}. The advent of private interests in airport administrations opened the gates of competition phenomena and a renewed interest in profits and efficiency. Today, the airport network of a country is considered a strategic asset for governments. Moreover, airports are the main engine of the tourist sector and several studies have shown their significant contribution to the economic development of the regions that host them \cite{ATAG.2008}. The economic boost is due to the airport activities, which manifest themselves by reducing unemployment, increasing income per capita, enhancing productivity, favoring greater investment and trade as well as greater social and cultural development \cite{maughan2001}; \cite{gibbons2019}; \cite{graham2008}. Moreover, the performances of airports are a topic of interest for a vast array of stakeholders, including airlines, governments, passengers, and the residents of the served areas \cite{graham2008}; \cite{barrospey}. Airlines are strongly interested in airport benchmarking, because it can suggest to managers which airports to invest in, according to a decision-making process based on profit maximization \cite{barros2008airports}. It has been estimated that, without considering the revenues of the tourism sector as a whole, airports alone are able to contribute in a range between 1.4\% and 2.5\% to the growth of regional GDP \cite{ACI.2004}. For these reasons, airport efficiency is a topic of high interest in the scientific and mangerial community. Another topic of growing importance is sustainability, intended as the societal goal to reduce human impact on the environment. In particular, the attention to transition management (i.e., the set of processes through which certain aspects of society change significantly over a short time horizon) to push sustainable growth is increasing sharply \cite{gossling2012}. The humanity's awareness of climate change has grown in recent decades, leading governments around the world to demonstrate a renewed commitment to stemming the problem of Earth pollution (the Glasgow 2021 climate conference is a clear sign of this). The main knot lies in the fact that, although tourism gives a strong impulse to the development of the territory, this happens at the cost of a strong environmental impact. This is especially true for areas that experience a highly concentrated tourist phenomenon over a short period of time (i.e. coastal tourism in Southern Europe). The major problems are related to the excessive exploitation of land resources, consumption of water resources, coastal pollution, increased waste production, and air pollution \cite{Weaver2012};\cite{Weaver2013}. Furthermore, in the air transport sector (which is undisputed leader in terms of the volume of tourists transported every year), the mentioned environmental concerns must be added to those related to aircraft movements. Noise, waste, carbon dioxide emissions, and other polluting gases released by aircraft engines into the atmosphere contribute significantly to pollution and the greenhouse effect. In addition, most of the waste generated onboard aircraft must be handled by airports \cite{graham2008}. In fact, the aviation sector accounted for 2\% of global CO2 emissions already in 2014, with an increase of 80\% compared to 1980 and it is estimated that these are expected to increase by 45\% by 2035 (European Airline Safety Association) \cite{EASA.2016}. Airports significantly contribute to the pollution of host regions; therefore, airports’ management cannot ignore the ecological transition if it does not want to undermine future growth \cite{upham2003}. At the local level, on the one hand, the authorities must promote sustainable policies by encouraging companies to adopt strategies aimed at sustainability and the continuous improvement to protect the environment. On the other hand, companies can adopt voluntary certification measures, which ensure higher quality standards than those set by law. (i.e., ISO 9001, ISO 14001, ISO 50001, SA 8000). In the airport sector, Airport Carbon Accreditation (ACA) is currently the only globally institutionally recognized certification for reducing the carbon footprint. This measure was launched in 2008 by Airport Council International (ACI), through 6 certification steps: "Mapping", "Reduction", "Optimization", "Neutrality", "Transformation" and "Transition". A fundamental prerequisite for accessing this program is the accomplishment, by an accredited institution, of compliance with ISO14064 (Greenhouse Gas Accounting). By reaching the latest level of accreditation (Transition), the airport proves to be in line with the 2015 Paris Agreement, that is, to actively contribute to limiting the global average temperature rise to 1.5 ° C and no more than 2 ° C compared to pre-industrial levels. Several works have been proposed to evaluate the performances of the airports \cite{barros2007}. However, few have been interested in the environmental performances \cite{dimitriou2014}, while the relationship between efficiency and environmental sustainability is still an unexplored topic. The aim of this work is to study the relationship between the performance in terms of efficiency of airports and the investments towards the adoption of more sustainable practices. To achieve this goal, a two-step analysis was conducted on a dataset of Italian airports: first, estimated the efficiency frontier through the Data Envelopment Analysis (DEA) approach. Subsequently, through a Tobit regression model, we investigated whether a relationship between efficiency and environmental sustainability exists. This was possible through the creation of a proxy variable that could assess which airports are further ahead in investments aimed at sustainability. The paper is structured as follows. Section 2 offers a concise review of the literature. Afterward, the methods used for the analysis are presented in Section 3. Section 4 proposes a discussion of the main findings and Section 5 concludes the work. \section{Literature Review} Efficiency is an important topic in various research streams, especially in economics and management \cite{Chu2010}. Firms' efficiency, as well as the efficiency of the production process, are concepts widely studied in the transport sector (e.g., \cite{Bell1995}), the agro-food sector, the large-scale retail trade (e.g., \cite{athanassopoulos1995ratio}), telecommunications (e.g., \cite{collier1993data}), the banking sector (e.g., \cite{barr1994benchmarking}). An important divergence in the literature on benchmarking can be traced back to the choice of empirical models used for the study. In fact, there is a stream focused on the use of parametric models, such as the stochastic frontier analysis (e.g., \cite{Scotti2012}; \cite{Abrate2010}), where it is necessary to establish a priori a functional form for the relationship between input, output, and inefficiency. Notwithstanding, another research flow is involved in the adoption of non-parametric models for the study of the frontier, such as Data Envelopment Analysis (DEA) modeling (e.g., \cite{gillen1997}; \cite{barros2007}; \cite{Gitto2012}; \cite{Adler20132}). DEA is a method that arises from the seminal work of Debreu (1951) and Farrell (1957), who were the first to try to measure the efficiency of a sample of production units, the so-called decision-making units (\(DMU_s\)). This method, through a linear programming procedure, provides an efficiency score for each DMU with a limited number of necessary assumptions. It is based on an optimization function that defines weights to be attributed to the combination of inputs and outputs of each DMU such as to maximize the outputs (setting the level of inputs) or minimize the inputs satisfying at least a given level of output (hereinafter output-oriented and input-oriented DEA models). Furthermore, the DEA modeling framework can be divided according to the assumptions on the returns to scale. The model assuming constant returns to scale was developed by Charnes et al. (1978), while Banker et al. (1984) added an assumption about the concavity of the frontier, allowing for variable returns to scale. The DEA has been widely employed in the investigation of airport efficiency since the seminal work of Gillen and Lall (1997). Most of this literature, it has been devoted to the study of the phenomenon through the use of the radial DEA (which assumes proportionality in the reduction of inputs or in the increase of output), although researchers are split among those who have assumed constant returns to scale (e.g., \cite{Sarkis2004}; \cite{Fung2008}), and those assuming variable returns to scale (e.g., \cite{Adler2001}; \cite{martin2006benchmarking}; \cite{barros2007}). A relevant issue in applying DEA models concerns the size of \(DMU_s\) and their comparability. In the literature has been shown that, when the \(DMU_s\) have significantly different dimensions, the model with variable returns to scale could be more suitable since it does not penalize the smaller \(DMU_s\), by underestimating their performances. This also applies to DEA applications in the airport field \cite{liebert2013survey}. Some researchers, for example, Pels et al. (2003), Adler and Berechman (2001), studied the efficiency of airports through an input-oriented DEA (DEA-I), arguing that the main output, passenger traffic, was a phenomenon beyond managerial control, and therefore a difficult to maneuver lever. Others, such as Gillen and Lall (1997), Martìn and Romàn (2006), Carlucci et al. (2018), have adopted an output-oriented DEA (DEA-O), assuming that most of the equipment for airport operation has the nature of fixed assets, therefore beyond the control of management (at least in the short run). In the DEA-I models, the goal is to reduce the quantities of inputs as much as possible while maintaining at least the current output levels. In the DEA-O models, the goal is to maximize the output levels while keeping the inputs constant and in any case at most below the current input consumption. Other authors have employed non-radial DEA (which relaxes the assumption that inputs or outputs change proportionally), through which it is possible to reach a hybrid measure of efficiency. In models such as the Slack Based Measure of efficiency (SBM) and Additive models, slacks are directly incorporated into the efficiency estimation process. For example, in the SBM model, a DMU will be considered efficient if and only if it has zero input excess and zero output shortfall. Over time, a number of extensions to classical models have been proposed to consider several potential problems, such as, among others, the optimal number of \(DMU_s\) \cite{bazargan2003size}; \cite{cooper2007data}; \cite{lam2009operational}, the desirable number of inputs \cite{Adler2013}, the sampling frontier \cite{simar1998sensitivity} and the change in efficiency over time \cite{gillen1997}. In the literature about the air transport sector, DEA models have been used in a two-step analysis. In the first step, the DEA is used as a tool to estimate the efficiency frontier, while in the second step regression models are used to explain the efficiency itself. An example of this is the work of Gillen and Lall (1997), who explained the efficiency of terminals and the airside with many different variables. Moreover, Sergi et al. (2020) highlighted a positive impact of the number of transits and public ownership on efficiency. The work of Carlucci et al (2018), suggests that the size, the presence of low-cost carriers, and cargo traffic, affect airports' efficiency. The intrinsic advantage of this research approach lies in the fact that the variables employed in the second step were not used to estimate the efficiency in the first one (DEA). In this way, it is possible to further discriminate the phenomena that influence the performances of the airports. Concerning the variables to be included in the models, several evidences have been highlighted in literature, such as for example the ownership of the airports \cite{oum2008ownership}, their sizes \cite{Carlucci2018}, the internationality of airport traffic \cite{chow2009efficiencies} the location of the airports \cite{yoshida2004japanese} and their belonging to a group \cite{Adler2013}. However, the relationship between airport performance and environmental sustainability seems to remain particularly unexplored. An important and complete contribution to the definition of the state of the art of airport sustainability is offered by Greer et al. (2020). The authors, in addition to offering a comprehensive review of the literature, highlight the most critical areas of environmental impacts in an airport and define the short-term management levers of action to reduce pollution. Moreover, Greer et al. (2020) recognize that although interest in the topic is growing, the need for more investigation remains high. \section{Data and Methods} The dataset used in the present study reports information on almost all Italian airports (30 units) in 2019. The sample covers over 99\% of all passengers transiting through Italian airports in the year, so it reports information very close to that of the real population. The data were collected merging various sources: economic and financial information from the AIDA platform, data on passengers, movements of aircraft and goods from the Italian Statistical Institute (ISTAT) archives; data on the runways, internal equipment, and size from the National Air Transport Authority (ENAC); and, finally, some variables have been constructed by the authors, as explained in the following. Table 1 shows the data for the sample in 2019. The variable EMPLOYEES contains the total number of employees, CHINDESKS reports the number of check-in desks available in the terminal, RUNWAYMT the runway meters, PRODCOSTS the total production costs (thousands / EUR), TOTPAX (\%), GOODS (\%), TOTPLANES (\%), contain information on the total number of airports' passengers, goods and airplanes managed as percentage of the total in Italy in the year 2019, TOTREVENUES indicates revenues totals (thousands / EUR) for the year studied, and SURFACE describes the total surface of the airport (\(m^2\)). It is important to note that, 6 out of 30 \(DMU_s\) (denoted with * in the table) collect the information for several distinct airports, as the firms are part of a group. We decided to consider these airports as a whole because the initiatives taken by the management of a corporate group affect the management of all the airports in the group. The information about the movements of aircraft, goods, and passengers transported are reported in terms of \% of the Italian total to makes it easier to compare the \(DMU_s\) with each other. It can immediately be seen that more than 85\% of the total goods handled in Italian airports are to be attributed to the airports of Bergamo (BGY), Milan (MXP-LIN), and Rome (CIA-FCO). At the same time, these 6 airports handle over 50\% of all Italian passenger traffic. \begin{table}[h] \resizebox{\columnwidth}{!}{% \centering \begin{tabular}{llllllllllll} \hline & AIRPORTS & IATA CODE & EMPLOYEES & CHINDESKS & RUNWAYMT & PRODCOSTS & TOTPAX (\%) & GOODS (\%) & TOTPLANES (\%) & TOTREVENUES & SURFACE \\ \hline 1 & Alghero-Fertilia & AHO & 206 & 17 & 3000 & 16831.127 & 0.72 & 0.0001 & 0.6987 & 18469.917 & 17000 \\ 2 & Ancona-Falconara & AOI & 81 & 12 & 2991 & 14504.889 & 0.2504 & 0.6582 & 0.3991 & 7305.324 & 15450 \\ 3 & * Bari-Brindisi-Foggia-Taranto & BRI-BDS-FOG-TAR & 334 & 46 & 10408 & 97032.699 & 4.3116 & 1.0228 & 3.97 & 105012.485 & 49800 \\ 4 & Bergamo-Orio Al Serio & BGY & 229 & 45 & 3024 & 120833.675 & 7.1958 & 11.286 & 6.3018 & 141991.349 & 35000 \\ 5 & Bologna-Borgo Panigale & BLQ & 519 & 74 & 2880 & 89300 & 4.9173 & 3.6062 & 5.0179 & 119180 & 44000 \\ 6 & Bolzano & BZO & 25 & 3 & 1275 & 5410.697 & 0.0006 & 0 & 0.0027 & 4331.885 & 800 \\ 7 & Cagliari-Elmas & CAG & 152 & 42 & 2805 & 49607.435 & 2.4845 & 0.4035 & 2.3831 & 54512.496 & 41290 \\ 8 & Catania-Fontanarossa & CTA & 164 & 46 & 2438 & 69424.486 & 5.3022 & 0.5473 & 5.03 & 88966.239 & 43110 \\ 9 & Cuneo-Levaldigi & CUF & 25 & 6 & 2104 & 3774.196 & 0.0467 & 0 & 0.0425 & 3034.098 & 4350 \\ 10 & * Firenze-Pisa & FLR-PSA & 336 & 56 & 4752 & 78678 & 4.2795 & 1.2043 & 4.5903 & 99416 & 56550 \\ 11 & Genova-Sestri & GOA & 203 & 11 & 3065 & 31435.988 & 0.8001 & 0.0136 & 1.0279 & 33104.356 & 12550 \\ 12 & * LameziaTerme-ReggioCalabria-Crotone & SUF-REG-CRV & 123 & 33 & 6396 & 27281.702 & 1.8378 & 0.1194 & 1.7813 & 29632.95 & 25650 \\ 13 & * Milano-Linate-Malpensa & LIN-MXP & 2731 & 293 & 10282 & 568600 & 18.3179 & 53.6279 & 20.5384 & 736699 & 364765 \\ 14 & Napoli-Capodichino & NAP & 509 & 55 & 2640 & 110375.234 & 5.6315 & 0.9419 & 5.3884 & 150788.081 & 30700 \\ 15 & Olbia-Costa Smeralda & OLB & 273 & 36 & 2446 & 34824.882 & 1.5237 & 0.0086 & 1.5346 & 55099.748 & 43800 \\ 16 & Palermo-Punta Raisi & PMO & 266 & 28 & 3326 & 70545.618 & 3.6678 & 0.1108 & 3.5852 & 78751.919 & 35400 \\ 17 & Parma & PMF & 33 & 9 & 2300 & 5159.244 & 0.0376 & 0 & 0.0355 & 1908.23 & 3700 \\ 18 & Perugia & PEG & 36 & 2 & 2199 & 5004.722 & 0.1134 & 0 & 0.1026 & 4853.245 & 1150 \\ 19 & Pescara & PSR & 38 & 8 & 2430 & 9113.769 & 0.3635 & 0.0253 & 0.3482 & 9163.377 & 11150 \\ 20 & Rimini-Miramare & RMI & 20 & 7 & 2995 & 6379.335 & 0.205 & 0.0004 & 0.1768 & 7541.669 & 15500 \\ 21 & * Roma-Ciampino-Fiumicino & CIA-FCO & 1401 & 461 & 16909 & 703507 & 25.5993 & 20.1545 & 23.7787 & 1109272 & 339150 \\ 22 & Torino-Caselle & TRN & 233 & 38 & 3300 & 53765.124 & 2.0616 & 0.0193 & 2.381 & 67133.138 & 51150 \\ 23 & Trapani-Birgi & TPS & 74 & 15 & 2690 & 8873.848 & 0.2113 & 0.0011 & 0.3097 & 4628.598 & 14700 \\ 24 & Treviso-Sant'Angelo & TSF & 165 & 16 & 2459 & 27540.456 & 1.688 & 0 & 1.3079 & 29301.408 & 11500 \\ 25 & Trieste-Ronchi dei Legionari & TRS & 108 & 12 & 3000 & 13982.967 & 0.4053 & 0.0064 & 0.5843 & 17185.147 & 23565 \\ 26 & Venezia-Tessera & VIC & 470 & 60 & 6080 & 126366 & 5.999 & 4.9311 & 6.1286 & 202848 & 53000 \\ 27 & * Verona-Brescia & VRN-VBS & 129 & 48 & 6058 & 41847.787 & 1.8842 & 1.3095 & 2.2578 & 46947.79 & 29000 \\ 28 & Lampedusa & LMP & 44 & 4 & 1800 & 4818.552 & 0.1434 & 0.0017 & 0.2883 & 4204.858 & 1300 \\ 29 & Elba & EBA & 10 & 4 & 1095 & 1082.177 & 0.001 & 0 & 0.0082 & 1117.699 & 475 \\ 30 & Grosseto & GRS & 5 & 2 & 3007 & 760.192 & 0.0001 & 0 & 0.0004 & 788.357 & 1400 \\ \hline \hline \end{tabular}% } \caption{Data about Italian airports. Units denoted with * are the result of corporate groups.} \end{table} Table 2 shows the summary statistics of the only variables considered in the paper. \begin{table}[ht] \resizebox{\columnwidth}{!}{% \centering \begin{tabular}{llllllll} \hline & Min & 1st Q & Median & Mean & 3rd Q & Max & St.Dev\\ \hline \\ EMPLOYEES & 5.0 & 39.5 & 158.0 & 298.1 & 271.2 & 2731.0 & 531.9 \\ CHINDESKS & 2.0 & 8.2 & 22.5 & 49.6 & 46.0 & 461.0 & 94.0 \\ RUNWAYMT & 1095.0 & 2440.0 & 2993.0 & 4005.1 & 3319.5 & 16909.0 & 3302.0 \\ PRODCOSTS & 760.2 & 7003.0 & 29488.2 & 79888.7 & 76644.9 & 703507.0 & 156987.7 \\ TOTPAX & 247.0 & 397486.5 & 3089526.0 & 6413016.2 & 8279738.5 & 49250548.0 & 10740580.8 \\ GOODS & 0.0 & 1.8 & 235.5 & 35158.9 & 10574.8 & 565649.0 & 109396.3 \\ TOTPLANES & 6.0 & 4271.8 & 20673.0 & 48484.8 & 64512.2 & 345872.0 & 80419.2 \\ TOTREVENUES & 788.4 & 5466.3 & 31368.7 & 107773.0 & 96803.6 & 1109272.0 & 233009.9 \\ \\ \hline \end{tabular}% } \caption{Summary statistics of the variables about Italian airports.} \end{table} \subsection{DEA model} As a first step, in order to estimate the performances of airports in the economics of production, we implemented a DEA model. We use both the variable returns to scale input-oriented model BCC-I \cite{charnes1978measuring}, and the constant returns to scale input-oriented model, CCR-I \cite{Banker1984} with 4 inputs (EMPLOYEES, CHINDESKS, RUNWAYMT, PRODCOSTS) and 4 outputs (TOTPAX, GOODS, TOTPLANES and TOTREVENUES). To ensure the discriminatory power of the DEA in this analysis, we followed the criteria suggested in the literature on the relationship between the number of \(DMU_s\), and inputs and outputs (e.g., \cite{cooper2007data}). Our model respects both the \(N_ {DMU_s} \geq 3 \times (inputs + outputs)\) rule, and the \(N_ {DMU_s} \geq (inputs \times outputs)\) rule. The main advantage of studying efficiency through DEA models is that it is not required to define a-priori the weights to be attributed to the inputs and outputs, or even a functional form. Formally, in the DEA analysis it is assumed that there are \(n\) \(DMU_s\) that must be evaluated and sorted in increasing order (from the worst to the best or vice versa), based on the best combination of efficiency between \(m\) inputs and \(s\) outputs. Thus, the \(j_{th}\) production unit will consume \(x_{ij}\) input units \(i\) (\(i\) = 1 to \(m\)) and produce \(y_{oj}\) output (\(o\) = 1 to \(s\)). In practice, there will be two vectors for the DMU \(j\) \((X_j, Y_j)\) which respectively denote the vectors containing the observations relating to the inputs and outputs for the production unit \(j\). Subsequently, the DEA method compares the \(DMU_s\) to identify a set of possible linear dominant or non-dominant combinations for the \(n\) \(DMU_s\). The production unit \(j\) will be input-dominated, if there is at least a linear combination of production units for which an input can be reduced, leaving the level of the other inputs and outputs unchanged. Similarly, the DMU \(j\) will be output-dominated, if there is at least a linear combination of production units for which the output is greater, leaving the level of used inputs and other outputs unchanged. This is the main distinction between the Input-oriented and Output-oriented models. As mentioned, for a long time, researchers have been uncertain about the best approach to adopt in airport benchmarking studies. For this work, we considered it appropriate to adopt the Input-oriented model, since, following the approach of Pels et al. (2003), we assume that the main outputs of the airport system are more difficult to control than the inputs for management, all other conditions being equal (e.g., it would be easier, albeit expensive, to phase out part of the check-in desks or to hire new staff, rather than increasing the number of passengers carried). \\ Furthermore, the wide variability (in terms of company size) within the sample suggests that returns to scale may play a role in the efficiency of \(DMU_s\). In this regard, the assumption behind constant returns to scale is particularly appropriate when all \(DMU_s\) are running at the best scale. In this case, the mathematical form of the problem is: \\ Constant returns to scale (CCR-I): \begin{equation} \label{eq1} \begin{split} &\min \theta_{\theta,\lambda}, \\ & s.t. : \\ &{\theta {x_j}} - {X\lambda} \geq 0 , \\ &{Y \lambda \geq y_j}, \\ &\lambda \geq 0 \end{split} \end{equation} where \(\theta\) is a scalar that estimates the radial contraction of all inputs, \(\lambda\) is a non-negative vector of weights determined by the optimization process, and \(x_j\) and \(y_j\) are the input and output quantities of \(DMU_j\), namely the airport under consideration. \((X)\) and \((Y)\) represent the input and output matrices respectively. On the contrary, when the \(DMU_s\) are not working at their best, the use of CCR-I specifications may result in technical efficiency measures confounded by scale efficiencies. In this case, the BCC-I model can solve the problem, adding the constraint [\(\sum\lambda = 1\)]. In this model, the production frontiers are spanned by the convex hull of the existing \(DMU_s\). Moreover, the frontiers have piecewise linear and concave characteristics. In addition, a comparison between the means and the standard deviations reported in Table 2 shows that the latter are significantly greater than the former. This suggests that the sample sizes are substantially non-homogeneous and hence supports the hypothesis that the DEA BCC-I model is appropriate for the Italian airport sector. Furthermore, some variables can take a null value (e.g., an airport may not manage cargo at all). This underlines the need to relax the assumption of semi-positivity of the CCR-I model, in favor of the model with variable returns. However, in order to understand how much of the overall efficiency (calculated by the CCR-I model) is due to purely technical/managerial efficiency and how much is due to scale efficiency (SE), we also implemented the input-oriented model both with constant and variable returns. \subsection{Tobit regression} As previously mentioned, through these two DEA methods it is not possible to evaluate non-radial (non-equiproportional) contractions (expansions) of inputs (outputs), meaning that the models do not admit that an input (output) can be further reduced (increased) if one or more of the others have reached their minimum (maximum) level of contraction (expansion). Once the efficiency frontier has been estimated, the analysis progressed with a second step in which we performed a Tobit regression \cite{tobin1958estimation} as an attempt to evaluate the relationship between efficiency and environmental sustainability. The Tobit regression model, or censored regression, is an useful tool for estimating a linear relationship when the dependent variable is simultaneously censored on the left or on the right. In practice, Tobin's model modifies the likelihood function in order to take into account the non-equiprobability in sampling for each observation depending on whether the latent dependent variable has fallen above or below the threshold determined by the censorship. The general formulation of Tobin's model (1958) is \begin{equation} \label{eq1} \begin{split} & y^*_i = \beta'x_i + \epsilon_i \\ & y_i = y^* {if} 0 \leq y^* \leq 1\\ & y_i = 0, if y^*\leq 0 \\ & y_i = 1, if y^*\geq 1\\ & where\\ & i = 1,...,N \end{split} \end{equation} In the case of efficiency studies, this model specification is quite common since the scores are usually between 0 and 1. The coefficients estimated by DEA for CCR-I and BCC-I are right-censored at value 1. Indeed, all the airports estimated to be efficient by the model report a score of 1. Through this method it was possible to measure the impact of environmental sustainability policies on the efficiency of Italian airports estimated through the DEA. \section{Results} \subsection{Evaluation of airports performances} The first step of the analysis evaluated the efficiency performance of the \(DMU_s\), in order to identify the best practice. The scores of overall technical efficiency (OTE), pure technical efficiency (PTE), scale efficiency (SE), and the returns to scale (RTS) resulting from the application of the DEA are shown in Table 3. The range of possible values for OTE, PTE and SE scores lies between 0 and 1. Values closer to 1 indicate greater efficiency, while values closer to 0 indicate that the DMU is far from the efficient frontier. As for the scale efficiency, in general, it can be said that, if an airport reports SE results close to 1 (that is high scale efficieny), it should set measures to improve overall efficiency. Conversely, when the score \(PTE > SE \), managers should consider the option of expanding the scale. \begin{table}[ht] \centering \begin{tabular}{llcccc} \hline N. & Airports & $OTE_{crs}$ & $PTE_{vrs}$ & SE & RTS \\ \hline 1 & Bergamo-Orio Al Serio & 1.00 & 1.00 & 1.00 & Constant \\ 2 & Catania-Fontanarossa & 1.00 & 1.00 & 1.00 & Constant \\ 3 & Milano-Linate-Malpensa & 1.00 & 1.00 & 1.00 & Constant \\ 4 & Napoli-Capodichino & 1.00 & 1.00 & 1.00 & Constant \\ 5 & Roma-Ciampino-Fiumicino & 1.00 & 1.00 & 1.00 & Constant \\ 6 & Venezia-Tessera & 1.00 & 1.00 & 1.00 & Constant \\ 7 & Bologna-Borgo Panigale & 0.99 & 1.00 & 0.99 & Increasing \\ 8 & Lampedusa & 0.83 & 1.00 & 0.83 & Increasing \\ 9 & Perugia & 0.72 & 1.00 & 0.72 & Increasing \\ 10 & Grosseto & 0.65 & 1.00 & 0.65 & Increasing \\ 11 & Elba & 0.64 & 1.00 & 0.64 & Increasing \\ 12 & Bolzano & 0.50 & 1.00 & 0.50 & Increasing \\ 13 & Olbia-Costa Smeralda & 0.99 & 0.99 & 0.99 & Increasing \\ 14 & Palermo-Punta Raisi & 0.94 & 0.96 & 0.99 & Increasing \\ 15 & Genova-Sestri & 0.89 & 0.94 & 0.95 & Increasing \\ 16 & Treviso-Sant'Angelo & 0.86 & 0.93 & 0.92 & Increasing \\ 17 & LameziaTerme-ReggioCalabria-Crotone & 0.90 & 0.92 & 0.98 & Increasing \\ 18 & Firenze-Pisa & 0.91 & 0.91 & 1.00 & Increasing \\ 19 & Verona-Brescia & 0.86 & 0.86 & 0.99 & Increasing \\ 20 & Trieste-Ronchi dei Legionari & 0.79 & 0.82 & 0.96 & Increasing \\ 21 & Torino-Caselle & 0.82 & 0.82 & 0.99 & Increasing \\ 22 & Rimini-Miramare & 0.74 & 0.82 & 0.90 & Increasing \\ 23 & Cagliari-Elmas & 0.78 & 0.78 & 0.99 & Increasing \\ 24 & Bari-Brindisi-Foggia-Taranto & 0.78 & 0.78 & 0.99 & Increasing \\ 25 & Alghero-Fertilia & 0.74 & 0.76 & 0.97 & Increasing \\ 26 & Pescara & 0.68 & 0.76 & 0.89 & Increasing \\ 27 & Cuneo-Levaldigi & 0.50 & 0.66 & 0.75 & Increasing \\ 28 & Trapani-Birgi & 0.48 & 0.58 & 0.83 & Increasing \\ 29 & Ancona-Falconara & 0.52 & 0.57 & 0.90 & Increasing \\ 30 & Parma & 0.23 & 0.48 & 0.48 & Increasing \\ \hline \end{tabular} \caption{Application of DEA CCR-I and BCC-I to Italian airports; this table reports the estimated overall efficiency under constant returns (\(OTE_{crs}\)), the pure technical efficiency under variable returns (\(PTE_{vrs}\)), the scale efficiency (SE) and the estimated returns to scale (RTS).} \end{table} For our models, 6 out of 30 airports are considered globally efficient (OTE = 1), while 12 out of 30 reach the purely technical efficiency frontier (PTE). The average efficiency of Italian airports is relatively high. Indeed, the average efficiency exceeds 79\% considering the OTE and is even higher for the PTE (87.9\%). Following these results, we can see how Italian airports are well managed on average. By comparing the scores arising from the 2 models, we can discriminate between the relative inefficiency of the \(DMU_s\) due to the management of operations (PTE) and the inefficiency due to its scale (SE). This implies that for the Alghero-Fertilia airport, for example, most of its overall inefficiency is linked to problems in operations (PTE = 0.7622), rather than to size (0.9678). In other words, Alghero airport managers should first focus on a better allocation of inputs and outputs, before considering the hypothesis of expanding the operational scale. On the other hand, considering for example the Bolzano airport, purely technical efficiency, although high, is not sufficient to guarantee a satisfactory level of overall efficiency (OTE = 0.4988). In this case, the management should consider intervening on the production scale (e.g., increasing the size), before changing the allocation of inputs and outputs. As said before, the fifth column of Table 3 shows the returns to scale estimated by the model for Italian airports. 6 out of 30 airports exhibit constant returns to scale and are efficient, suggesting that they are in their optimal production condition. However, the remaining \(DMU_s\) operate under increasing returns, indicating that many airports could experience a more than proportional increase in performance from the increase in their production size. After having estimated the efficiency frontier for Italian airports, the analysis followed with the application of regression on the scores of the \(DMU_s\). \subsection{Impact of environmental sustainability} In order to investigate the relationship between performance and environmental sustainability, we constructed a variable able to capture the commitment toward the ecological transition shown by the management. This variable (hereinafter SUSTAINABILITY), was constructed through an accurate investigation of airports' public disclosure (e.g., investments and actions introduced in an attempt to reduce the environmental impact of the airport), and thanks to discussions with some managers working in the air transport sector. Table 4 shows the summary statistics of variables considered in the regression model. \begin{table}[ht] \centering \begin{tabular}{lcccccc} \hline Variables & Min & 1st Q & Median & Mean & 3rd Q & Max \\ \hline \\ Independent \\ \\ CRS efficiencies & 0.23 & 0.69 & 0.82 & 0.79 & 0.98 & 1.00 \\ VRS efficiencies & 0.48 & 0.79 & 0.93 & 0.88 & 1.00 & 1.00 \\ \\ Dependent \\ \\ Sustainability & 0.00 & 0.00 & 1.00 & 1.73 & 3.00 & 7.00 \\ EBITDA margin & -1.63 & 0.12 & 0.23 & 0.11 & 0.34 & 0.57 \\ Low-cost carrier passengers (\%) & 0.00 & 0.41 & 0.61 & 0.58 & 0.73 & 0.99 \\ Ownership (1 = Private) & 0.00 & 0.00 & 0.00 & 0.43 & 1.00 & 1.00 \\ Belongs to group & 0.00 & 0.00 & 0.00 & 0.20 & 0.00 & 1.00 \\ Log pax area (\(m^2\)) & 5.65 & 8.62 & 9.32 & 9.05 & 9.96 & 11.96 \\ \hline \end{tabular} \caption{Summary statistics of the variables employed for the regression analysis.} \end{table} Exploiting the 6 ACA certification steps, the variable SUSTAINABILITY was designed to assume values between 0 and 7. Level 0 includes all airports that do not currently exhibit any commitment towards sustainability that is higher than the duties established by Italian law. Level 1 includes all the companies that have publicly declared (through the website) a real commitment (e.g., reclamation investments in the area surrounding the airport, efficient water management, installation of solar panels), but which have not been admitted to in the ACA program. Scores from 2 to 7 are attributed to all companies that adhere to the ACA program (2 = "Mapping", 3 = "Reduction", 4 = "Optimization", 5 = "Neutrality", 6 = "Transformation" and 7 = "Transition"). In addition, we include some predictors widely employed in previous works in the literature, to ensure consistency in the model estimates. The EBITDA margin is an index widely adopted by managers to evaluate company performance which is valid also for the airport sector \cite{graham2008}. We expect that the higher the profitability, the higher the efficiency. LOWCOST reports the share (\%) of passengers transported to the airport by low-cost airlines. Several researchers have evaluated the effects of the presence of low-cost carriers on airport performance: some of them report evidence that suggests an efficiency and performance improvement related to a low-cost network (e.g., \cite{Bottasso2012}; \cite{Cavaignac2017}; \cite{Carlucci2018}), some others found a negative relationship between the advent of low-cost carriers and airport performance (e.g., \cite{Choo2013}). The effects of the ownership structure have been extensively studied, especially to assess the impacts of deregulation on the air transport industry. In general, private-owned airports might be expected to naturally be more inclined to higher efficiency levels. Some findings, however, seem to suggest the opposite (e.g., \cite{sergi2020evaluation}; \cite{Barros2008}; \cite{Adler2013}). In this paper, the ownership structure is described by the OWNERSHIP variable (0 = mostly public-owned; 1 = mostly private-owned). As mentioned before, some \(DMU_s\) were merged to be part of the same corporate group. Therefore, we decided to check for this factor, attributing 1 to the merged \(DMU_s\) and 0 to the individual airports in the GROUP variable. Membership of a group has been investigated in the literature. For example, Adler et al. (2013) found that, on average, airports belonging to a group performed worse than independent ones. Finally, the impact of the size of the airport on its efficiency has also been extensively studied in the literature. In general, many studies have highlighted that larger airports, on average, outperform smaller ones (\cite{gillen1997}; \cite{Pels2003}; \cite{CotoMilln2014}; \cite{Carlucci2018}), while others have shown the opposite results or no association among efficiency and size \cite{bazargan2003size}; \cite{abbott2002total}. As a proxy of the airport dimensions, we computed the LOGAREAPAX variable, which is the logarithm of the area (in square meters) dedicated to passengers' hosting. Table 5 shows the results of the regression analysis on the CCR-I and BCC-I scores for Italian airports in 2019. Regression was implemented by adopting White's robust standard errors to overcome problems related to heteroskedasticity. \begin{table}[!htbp] \centering \label{} \begin{tabular}{lcc}{\extracolsep{5pt}} \\[-1.8ex]\hline \hline \\[-1.8ex] Independent Variables & \multicolumn{2}{c}{\textit{Dependent variable:}} \\ \cline{2-3} \\[-1.8ex] & \multicolumn{1}{c}{OTE (CCR-I)} & \multicolumn{1}{c}{PTE (BCC-I)} \\ \\[-1.8ex] & \multicolumn{1}{c}{(1)} & \multicolumn{1}{c}{(2)}\\ \hline \\[-1.8ex] SUSTAINABILITY & $0.034^{**}$ & $0.059^{***}$ \\ & (0.015) & (0.019) \\ \\ EBITDA & $0.268^{***}$ & $0.245^{***}$ \\ & (0.033) & (0.039) \\ \\ LCC & 0.027 & -0.157 \\ & (0.076) & (0.100) \\ \\ OWNERSHIP & 0.027 & -0.018 \\ & (0.040) & (0.044) \\ \\ GROUP & 0.006 & 0.037 \\ & (0.052) & (0.061) \\ \\ LOGAREAPAX & $0.040^{**}$ & $-0.086^{***}$ \\ & (0.019) & (0.031) \\ \\ Constant & $0.331^{**}$ & $1.668^{***}$ \\ & (0.154) & (0.258) \\ & \\ \hline \\[-1.8ex] Observations & \multicolumn{1}{c}{30} & \multicolumn{1}{c}{30} \\ Log Likelihood & \multicolumn{1}{c}{18.710} & \multicolumn{1}{c}{9.025} \\ Wald Test (df = 6) & \multicolumn{1}{c}{216.000$^{***}$} & \multicolumn{1}{c}{120.200$^{***}$} \\ Pseudo-$R^2$ & \multicolumn{1}{c}{0.779} & \multicolumn{1}{c}{0.668}\\ \hline \hline \\[-1.8ex] \textit{Note:} & \multicolumn{2}{r}{$^{*}$p$<$0.1; $^{**}$p$<$0.05; $^{***}$p$<$0.01} \\ \end{tabular} \caption{Regression results on CCR-I and BCC-I efficiency scores} \end{table} Table 5 reports the marginal effects of each regressor on the efficiency of Italian airports. The management's adoption of policies aimed at environmental sustainability has a positive impact on the performance of the airport. Further, the coefficient shows a positive sign, and the likelihood ratio test (LT) confirms the significance of the estimate, rejecting the null hypothesis that the SUSTAINABILITY effect on the efficiency scores is equal to 0. This is an important result and, to our knowledge, the first in identifying a clear impact of sustainable choices on airport performance. If we consider an airport's admission to the ACA program as a proxy to define the commitment of the management to pay substantial attention to the ecological transition, our results should convince the most skeptical stakeholders that environmental sustainability is not only synonymous with "green-washing" or "higher costs". Both DEA models adopted for the study are input-oriented, that is, designed to minimize inputs by satisfying at least a given level of output. The positive effect of an airport's admission to the ACA program could suggest that the improved efficiency is linked to an internal efficiency process (e.g., mapping excess \(CO_2\) emissions). If we consider the impact of sustainability on purely technical efficiency (BCC-I), the effect seems to be amplified, confirming an improvement in purely operational management. At the same time, this work revealed important findings, albeit already explored in the literature. The EBITDA margin has a positive, statistically significant coefficient and with a considerable magnitude. This implies that the Italian airports, which transform a notable part of the sales volume into profits, are more efficient. The EBITDA margin levels can therefore be considered as an accurate, albeit synthetic and non-exhaustive measure or proxy of the performance in the airport industry. In addition, for the variable LCC (percentage of passenger traffic managed by low-cost), the model reports a positive coefficient for efficiency under the assumption of constant returns, while it is negative when assuming variable returns. This could suggest that slots dedicated to low-cost carriers contribute to boosting overall efficiency but reduce purely technical efficiency. Although our analysis does not reveal a statistical significance for this variable, this information can help airport managers to pay attention to the management of these carriers. Low-cost airlines can contribute in increasing performances and growth (scale), thanks to the network opportunities they offer, but their permanence and preponderance on traffic could undermine the operational efficiency of the airport, leading to ambiguous effects on net efficiency. The GROUP variable is also not significant, suggesting that independent airports or airports belonging to a group have, on average, similar performances. The same could be said for OWNERSHIP. Our results suggest that there is no evidence from data that private owned airports outperform public ones or vice-versa. Finally, the last control variable considered is the logarithm of the passenger area (LOGAREAPAX). The coefficient is significant but with the opposite sign considering the overall efficiency (which seems to benefit from more spaces dedicated to passengers), and purely technical efficiency. This may suggest that space management is crucial for the airport. It is well known that an increasingly consistent source of airport profits is linked to non-aeronautical activities (e.g., shops, food \& beverage). Increasing the available space can lead to the installation of more sale points and attractions for the passengers, and this can lead an airport to an overall efficiency resulting from the generated higher revenues. However, more space can also lead to potential threats in the operational management of resources. \section{Conclusions} The present work constitutes an attempt to understand the relationship between airports efficiency and environmental sustainability. Specifically, the effect of airports joining programs aimed at reducing environmental impacts on overall efficiency and pure technical efficiency has been deepened through a DEA model and a Tobit regression analysis. Our results suggest that there is a statistically significant positive association between Italian airport efficiency and environmental sustainability. In fact, according to our model, airport efficiency increases as management's commitment to sustainable policies grows. In particular, we assessed sustainability by discriminating between airports that do not show any declared commitment to ecological transition practices exceeding the obligations imposed by national law, and airports that adhere to the ACA program. This constitutes an important result, as it demonstrates that the time is now ripe for managers to include environmental performance improvement policies in their strategic choices, particularly in the airport sector. Airports' managers, as well as regulatory bodies and policymakers, can take advantage of this result which suggests a relationship between sustainable investments and performance in terms of efficiency, including economical and financial efficiency. Furthermore, our study shows that financial performances also benefit from energy efficiency and green commitment. In addition to this, other considerations also emerge which are useful both to the managers working in this sector and to the legislator with a view to progress for the years to come. As the presence of partnerships with LCC increases, the complexity of management increases. However, although the network enhancement induced by the LCC supports an increase in overall efficiency, managers must pay particular attention to operational efficiency, which seems to be negatively correlated with the presence of these vectors. Moreover, the capital structure and membership of a group do not appear to significantly affect the efficiency of the airports. Finally, as the space available for passengers increases, the efficiency of the airport also increases. However, the management of spaces also deserves particular attention, as in order to contribute positively to increasing overall efficiency, management must demonstrate that it allocates spaces and resources wisely. \bibliographystyle{apalike}
\section*{ACKNOWLEDGMENT} \bibliographystyle{bibliography/IEEEtran} \section*{APPENDIX} The reward function consists of two main terms: $r_v$ and $r_{\omega}$. These terms make the policy learn to follow the given velocity command, both linear and angular. The remaining values are regularization terms, which improve the overall quality of the motion. \input{tables/reward_func} \input{tables/ppo} \section{CONCLUSION} We present a novel approach to the design optimization problem by introducing an adaptive \ac{RL}-based locomotion controller during the optimization process. The locomotion policy is conditioned on the design parameters such that it can act as an optimal policy for each design instance. We use Meta Reinforcement Learning to enable the fast adaptation of the policy to a specific design during design optimization. The pretrained meta-policy is used for design optimization alongside a genetic algorithm and any user-defined optimization metric. In principle, our framework can be applied to any design problem since both the controller (meta-policy) and the design optimizer (genetic algorithm) are model-free. We would like to highlight the flexibility of our approach in considering the robot's operating environment during the design process, which can be limited in the conventional optimization-based approach, where we need analytic dynamics models. We applied our framework to optimize leg link lengths of two quadrupedal robots. Our results show that with \ac{Meta-RL}, we can obtain a policy that achieves close-to-optimal locomotion control of the robot within a range of design specifications with only few adaptation steps. Furthermore, in contrast to model-based methods, the policy can deal with unanticipated changes in the environment. This results in designs optimized in a more versatile sense, not overfitted to specific motions and environments. Our case studies show that a considerable improvement can be obtained compared to a hand-crafted design (nominal design). Additionally, we conducted a qualitative comparison with an existing framework (Vitruvio) and showed that our approach results in lower-cost designs that are consistent with existing literature. One of the limitations of our framework is the cost functions used for the design optimization. Although being standard metrics in the design optimization literature, these cost functions could not capture the actual dynamics of the system. E.g., the power consumption of the physical system consists of not only the joule heating or mechanical energy, but also other factors like transmission losses that are not reflected in our cost functions. Furthermore, the ratio of different sources is unclear. Thus, further research in realistic cost functions is required, but this wasn't part of the scope of this project. Future work should seek to build prototypes of optimized designs and validate them on the physical system. The addition of more design parameters, both discrete and continuous, is also a possible work direction in order to evaluate how \ac{Meta-RL} behaves with a wider parameter space. \section{INTRODUCTION} \label{sec:introduction} \IEEEPARstart{D}{esigning} a robot is an arduous task, since there are many parameters that affect its final performance. In the case of legged robots, these design parameters can include limb lengths, drive-train parameters such as gear ratio, and control parameters such as gait parameters and duration~\cite{chadwick2020Vitruvio}. The wide range of continuous and discrete design parameters results in a combinatorial problem with often unclear correlations between the design parameters and the resulting robot behavior. Unfortunately, literature on the design principles of the legged robot is very sparse. In order to make design decisions, designers often rely on approximations, simulations, or bio-inspired solutions~\cite{MITCheetah2012}. Some examples of quadrupedal robots designed in this conventional paradigm are Mini Cheetah \cite{katz2019mini}, HyQ \cite{Semini2011HyQ}, or ANYmal \cite{Hutter2017ANYmal}. Some mention that the range of motion and inertia are considered in leg design~\cite{katz2019mini} or certain performance goals~\cite{Semini2011HyQ} are examined, but often it is unclear how the final values are determined. For a more quantitative approach to robot design, computational optimization methods have been introduced to search for an optimal design~\cite{papalambros_wilde_2000}. In this paradigm, designing a robot is formulated as a bilevel optimization problem. Optimizing the design parameters is the outer optimization problem, and determining optimal control parameters for each design instance is the inner problem. Usually, the inner loop entails multiple sub-objectives, and is generally not differentiable with respect to the design parameters. \begin{figure} \centering \includegraphics[width=\columnwidth]{images/DesignsMosaic.pdf} \caption{Optimal designs for different situations.} \label{fig:intro} \end{figure} Existing works can be broadly separated into two categories: Gradient-based and gradient-free methods. Gradient-based approaches try to define a differentiable relationship between the control performance (the result of the inner loop) and the design parameters. In Ha et al.~\cite{Ha2017JointOptimization}, the relationship between motion parameters and design parameters is defined via the implicit function theorem such that the gradient computation is feasible. De Vincenti et al.~\cite{devincenti2021control} directly differentiated inverse dynamics-based whole body controllers to optimize the leg design of a quadrupedal robot. Dinev et al.~\cite{dinev2021co} also employed gradient-based optimization to optimize the base and leg shape of a quadrupedal robot. Gradient-free methods are better suited for non-convex problems. Starting from the computer graphics community~\cite{Sims1994Evolve}, this paradigm has extended its scope to mechanical design optimization. In~\cite{digumarti2014concurrent}, joint optimization of design and control parameters is performed to maximize the linear speed of a quadrupedal robot using \ac{CMA-ES}~\cite{hansen2001completely}. It was also employed by Ha et al.~\cite{Ha2016TaskBasedDO} to optimize a 2D model of a legged robot. Chadwick et al.~\cite{chadwick2020Vitruvio} introduced a framework for obtaining optimal leg designs for walking robots using a genetic algorithm. All the aforementioned works have one common building block: they rely on model-based control approaches. The model-based control methods are generalizable and intuitive, but they have several limitations for complex systems like legged robots. Firstly, they often rely on simplified models to reduce complexity. For example, the trajectory optimization method used in \cite{chadwick2020Vitruvio} relies on centroidal dynamics and ignores limb masses. Thus, the design parameters are optimized under the significant dynamics mismatch and the resulting controller cannot be used on the physical system. Secondly, the resulting motions rely on handcrafted primitives and are restricted to predetermined tasks and trajectories, e.g., predefined gait patterns or base trajectory~\cite{chadwick2020Vitruvio, dinev2021co, devincenti2021control}. Lastly, since the motion parameters and simplified dynamics models are often developed/tuned for a certain instance by hand, it is hard to claim that the optimized motion is truly optimal for each design. An alternative control method that has recently gained a lot of attention for robot control is Model-Free \ac{RL}~\cite{sutton2018reinforcement}. The field of legged locomotion has been especially active, and has shown very promising results. Lee et al.~\cite{Lee2020Challenging} demonstrated that it is possible to learn a control policy for blind quadrupedal locomotion over challenging, natural environments, and Miki et al.~\cite{miki2022learning} extended this to also leverage exteroceptive perception of the environment, resulting in an increase in robustness and speed. These last contributions validated the viability of the \ac{RL} in this context. \ac{RL} can be an ideal solution to solve the inner optimization problem of the design optimization since we can obtain a control policy without model simplification and heuristics. However, \ac{RL} has been barely used in the design optimization literature, with examples in simpler 2D scenarios~\cite{Ha2018designrl}, or multi-object airfoil optimization for better aerodynamic performance~\cite{Hui2021RLAeroDesign}. We extend the work carried out by Won and Lee~\cite{Won2019MorphCon}, where they handle changes in body size and proportions of virtual characters. A single controller is trained to control characters with different dimensions on the run, without re-training. This method suggests that it is possible to obtain a control policy capable of managing a range of designs. Although a good starting point, a naive multi-task \ac{RL}, where a policy is trained with randomly sampled tasks, often results in a policy that performs "generally well" in the task space and cannot reach the performance of a specialized policy for a certain task~\cite{parisotto2015actor}. Using a "generally performant" controller won't suffice for the design optimization because each design parameter needs to be evaluated with the best performance. Hence, we want to train a policy that achieves the performance of a specialized policy with the least amount of fine-tuning effort. Meta-learning~\cite{schmidhuber1987evolutionary} has proven to be a promising direction to allow quick adaptation of a neural network model to a certain task by leveraging information from other similar tasks~\cite{Finn2017MAML},~\cite{gupta2018meta}. This is done by training a single model in a range of different tasks, shaping the model parameter space in a way that favors few-shot adaptation to newly encountered tasks during test time. Finn et al.~\cite{Finn2017MAML} demonstrated that a \ac{Meta-RL} training enables a fast-adapting control policy. Based on these insights, we present a framework for design optimization that evaluates each design parameter using a fast-adapting \ac{Meta-RL} policy. We demonstrate its application to the optimization of quadrupedal robots. Fig.~\ref{fig:intro} shows designs optimized for different objective-environment pairs. Our main contributions are: \begin{itemize} \item A design optimization framework using a robust, adaptive neural network controller. \item A \ac{Meta-RL} approach to obtain a locomotion control policy that can be easily fine-tuned for different robot designs. \item Experimental results in simulation demonstrating the influence of different design objectives and operating environments on the robot's design. \end{itemize} \section{METHOD} \label{sec:method} Our approach aims to exploit the robustness and versatility of \ac{RL}-based control methods to obtain a locomotion policy that is not constrained to a specific motion and environment. This allows us to perform design optimization based on data obtained from a wide variety of motions, resulting in an optimized design not constrained to a specific situation. Fig.~\ref{fig:overview} shows an overview of our approach. Our method consists of two different phases: First, we use \ac{Meta-RL} to train a policy with randomly sampled design parameters and terrains. We used the \ac{RL} environment by Lee et al.~\cite{Lee2020Challenging} with terrain curriculum. Secondly, the trained policy is used to evaluate different designs and find a design that maximizes a design objective. Importantly, since the policy training and the design optimization are separated, the trained meta-policy can be reused for different design optimization tasks. In this section, we describe our \ac{Meta-RL} approach to train an adaptive locomotion policy and the implementation of our design optimization framework. \subsection{Markov Decision Process} \label{sec:method:rlenv} We model the locomotion control problem as a \ac{MDP}. \ac{MDP} is a mathematical framework for formulating a discrete-time decision-making process which is commonly used in \ac{RL}. An \ac{MDP} is defined by a tuple of state space $\mathcal{S}$, action space $\mathcal{A}$, the transition probability density $\mathcal{P}(s_{t+1}|s_t,a_t)$, and a reward function $\mathcal{R}(s_t,a_t, s_{t+1}): \mathcal{S}\times\mathcal{A}\times\mathcal{S}\to\mathbb{R}$. Every timestep, the learning agent receives a state $s_t \in \mathcal{S}$ from the environment and takes an action $a_t \in \mathcal{A}$ depending on its policy $\pi_{\theta}(a_t|s_t)$, receiving a reward value $r_t$. The objective of \ac{RL} is to obtain an optimal policy $\pi_{*}$ that maximizes the cumulative discounted rewards $\mathbb{E}[\sum_{t=j}^{\infty}\gamma^t r_t]$ throughout interactions with its environment in an iterative fashion, where $\gamma$ is known as the discount factor. We define the \ac{MDP} akin to the "teacher policy training" from \cite{Lee2020Challenging} and \cite{miki2022learning}. $s_t$ is composed of the velocity command, linear and angular body velocity, joint states, frequency and phase of the gait pattern generators for each foot (the policy learns to modulate periodic leg phases), and the two last actions taken by the policy. Since our design optimization is conducted in simulation, we also make use of the privileged observations consisting of contact states from the different parts of the robot, and terrain height information around each foot.Additionally, our observation vector includes the design parameters, as in \cite{Won2019MorphCon}. Our reward function consists of velocity tracking rewards for the command $\langle v_x^{\text{target}}, v_y^{\text{target}}, \omega_z^{\text{target}} \rangle$ like in \cite{miki2022learning}, which denotes linear velocity in $x$, $y$ direction and angular velocity along $z$-axis in base frame. We also favor stability of the base by penalizing velocities orthogonal to the command. We encourage stepping by rewarding the number of feet not in contact with the ground, and penalize collisions with the rest of the parts of the robot. To encourage smooth motion, we penalize differences both in outputs and velocity between time steps. Finally, we also penalize joint torques to increase efficiency and prevent damage. A complete definition of the reward function is provided in Table \ref{table:reward} in the appendix. The policy $\pi_{\theta}(a_t|s_t)$ is modeled as a Gaussian policy, i.e., $a_t \sim \mathcal{N}(m_\theta(s_t), \sigma_\theta)$ using a \ac{MLP} for $m_\theta(\cdot)$ and a state-independent $\sigma_\theta$. We use \ac{PPO} \cite{ppo} for policy optimization. \subsection{Fast Adaptation with Meta-learning} \label{sec:method:meta} The \ac{MAML}~\cite{Finn2017MAML} approach is used to train our meta-policies. \footnote{We followed the author's implementation: github.com/cbfinn/maml} In this framework, we define a distribution of tasks $p(\mathcal{T})$ that we want the policy to be able to adapt to. $p(\mathcal{T})$ is a uniform distribution over the design parameters in our setup. Algorithm \ref{algo:meta-training} describes the training process. Each policy update involves training the policy for $M$ different tasks sampled separately from $p(\mathcal{T})$ (Lines 4-9), gathering samples with fine-tuned policies $\pi_{\theta_i'}$ for each ($\mathcal{T}_i$), and updating the policy using the aggregated data (Line 10). This approach enables fast fine-tuning to a task from $p(\mathcal{T})$ with a small amount of data possible during test time. \subsection{Design Optimization} The goal of the design optimization is obtaining a set of design parameters that maximizes a given fitness function $f(\mathcal{T}) \in \mathbb{R}$. Due to the non-differentiable way we evaluate each design parameter, our design optimizer should be a gradient-free algorithm. We use \ac{CMA-ES}~\cite{hansen2001completely} for the optimization, which has been widely used in the design optimization literature as stated in section \ref{sec:introduction}. The fitness function is the Monte-Carlo estimation of a performance metric $\mathcal{C}(s_t):\mathcal{S}\to\mathbb{R}$, i.e., \begin{equation*} f(\mathcal{T}) = \mathbb{E}_{s_t \sim \xi ( \pi_{\theta_\mathcal{T}} ) } [ - \mathcal{C}(s_t)] \end{equation*} , where $\xi({\pi(\mathcal{T})})$ denotes trajectories generated by a policy $\pi_\mathcal{T}$ fine-tuned for $\mathcal{T} \sim p(\mathcal{T})$. We will define $\mathcal{C}$ in the next section. For every $\mathcal{T}$, we perform an adaptation of our meta-policy in the optimization loop, in order to achieve optimal performance for each design. The inclusion of these adaptation steps is described in Algorithm \ref{algo:optimization}. \begin{algorithm}[t] \label{algo:meta-training} \SetAlgoLined \SetKwInOut{Input}{Input} \Input{Parametrized policy $\pi_{\theta}$, Distribution over tasks $p(\mathcal{T})$, Number of policy updates $N$, Meta-batch size $M$, length of collected rollouts $K$. Step-size hyperparameters $\alpha, \beta$} Initialize $\theta$\; \For{N policy updates}{ Sample batch of $M$ design parameter tuples $\mathcal{T}_i \sim p(\mathcal{T})$\; \ForEach{$\mathcal{T}_i$}{ Sample policy rollouts of length K $\mathcal{D} = \{(s_1,a_1,r_1,s_2, \dots, s_K) \}$\; Compute adapted parameters for current task:\\ $\theta_i^{\prime} = \theta - \alpha \nabla_{\theta}\mathcal{L}_{\mathcal{T}_i}(\pi_{\theta})$\; Sample new trajectories $\mathcal{D}^{\prime}_i$ using adapted policy $\pi_{\theta^{\prime}_i}$ in $\mathcal{T}_i$\; } Update $\theta \leftarrow \theta - \beta \nabla_{\theta}\sum_{\mathcal{T_i}}\mathcal{L}_{\mathcal{T}_i}(\pi_{\theta^{\prime}_i})$, using the collected $\mathcal{D}^{\prime}_i$\; } \caption{Policy meta-training with MAML} \end{algorithm} \begin{algorithm}[t] \label{algo:optimization} \SetAlgoLined \SetKwInOut{Input}{Input} \SetKwData{NumGradUpdates}{num\_grad\_updates} \Input{Trained meta-policy $\pi_{\theta_0}$, Number of generations G, Initial design population $\mathcal{P}_{0}$, step-size hyperparameter $\alpha$, number of gradient updates $U$, lenght of collected rollouts $T$.} \For{k in [1...G]}{ \ForEach{$p_i \in \mathcal{P}_{k}$}{ Set current design to $p_i$\; Set policy parameters to initial value: $\theta \leftarrow \theta_0$\; \For{U gradient updates}{ Sample policy rollouts of length T $\mathcal{D} = \{(s_1,a_1,r_1,s_2, \dots, s_T) \}$\; Perform adaptation step:\\ $\theta \leftarrow \theta - \alpha \nabla_{\theta}\mathcal{L}_{p_i}(\pi_{\theta})$\; } Compute fitness score for $p_i$ and store it\; } Update $\mathcal{P}$ using the computed scores. } \caption{Design optimization with meta-policy} \end{algorithm} \section{EXPERIMENTAL RESULTS} \label{sec:results} In this section, we first validate the effectiveness of our \ac{Meta-RL} approach and then present the outcomes of the design optimization under different objectives and environments. The policy behavior and the optimized designs in motion can be seen in the supplementary video. \subsection{Experimental Setup}\label{setup} \subsubsection{Design Parameters} As shown in Fig.~\ref{fig:overview}, Our goal is to optimize the design of a robot's legs. A base design comes from a robot currently being developed, which consists of ANYmal C \cite{anybotics_2021} main body with longer legs. The nominal length is \unit[350]{mm} for both thigh and shank links, on the basis of simplified considerations similar to those mentioned in \cite{MITCheetah2012}. This value is a starting point for the optimization algorithm and does not have to be accurate. The parametrization of the design consists of $l_t, l_s \in [0.6, 1.4]$, which are scale factors for the nominal link lengths. For example, the shank length is $l_s \times \unit[350]{mm}$. $\langle l_t, l_s \rangle$ defines a task $\mathcal{T}$. We adapt the link masses by applying the same scale factor, since a cylinder's mass scales linearly with its length. Other parameters have also been considered, such as the gear ratio of the actuators, the geometry of the linkage transmission, the attachment point of the legs to the base, and the orientation of the first actuator. We decided to restrict the optimization to the link lengths for the more in-depth experiments, to make the results more understandable and to compare with previous works. In section \ref{sec:results:gear}, we will extend the parameter space to include the gear ratios of the actuators. \subsubsection{Design Optimization Objectives} We perform the design optimization as described in Algorithm \ref{algo:optimization} using different cost functions ($\mathcal{C}(\mathcal{T}) : \mathcal{T} \to \mathbb{R}$) to verify our framework. We define three optimization objectives to be minimized: \begin{itemize} \item Velocity tracking: \begin{equation*} \mathcal{C}_v = \sum_{t\in[0, T]} ((e_v)_t^2 + (e_\omega)_t^2 ), \end{equation*} \item Weighted joint torque: \begin{equation*} \mathcal{C}_{\tau} =\sum_{t\in[0, T]} w_t \left( \sum_{i\in\{1,.. 12\}} (\tau_i)_{t}^2 \right ) \end{equation*} \item Weighted joint positive mechanical power: \begin{equation*} \mathcal{C}_{p} = \sum_{t\in[0, T]} w_t \left( \sum_{i\in\{1,.. 12\}} \max((\dot{\phi}_i \tau_i)_{t}, 0.0) \right ) \end{equation*} \end{itemize} , where $ e_v = \lVert v_{x,y}^{\text{target}} - v_{x,y} \rVert_2 $, $e_\omega = \lVert \omega_z^{\text{target}} - \omega_{z} \rVert_2$, and $w_t = \exp( 1.5 ((e_v)_t^2 +(e_\omega)_t^2))$. $\tau$ and $\dot{\phi}$ denote joint torque and velocity, respectively. We clip $w_t$ to a maximum value of 100 for stability of the optimization process. When defining the optimality of a robot design, there is an important trade-off to consider: performance versus efficiency. Strong and versatile robots usually consume more power or require higher joint torques. With the weighting factor $w_t$, we account for this trade-off. When the tracking error ($e_v, e_\omega$) is large, $w_t$ grows exponentially. This weighting leads to a Pareto optimum between minimizing the selected metric, while still maintaining a good performance level. The trade-off is often not considered in existing model-based approaches like \cite{chadwick2020Vitruvio} since they rely on pre-defined kinematic trajectories. They are inherently bound by the motion generator that does not consider different designs. On the other hand, we can explicitly optimize for the trade-off since our framework can generate optimal motions for any design instances from $p(\mathcal{T})$. \subsubsection{Implementation Details} The training environments are implemented using Raisim \cite{raisim} simulator. In addition, a simplified model for the velocity and torque limits of the real actuator is included in the simulation. All the policies are trained for $N$=2000 epochs using the same hyperparameters for \ac{PPO}, which are detailed in Table \ref{table:ppo} in the appendix. Each epoch runs 1000 training environments with random velocity commands and terrain parameters. The design optimization is implemented using PyCMA~\cite{hansen2019pycma} library. The design optimization is performed for $G$=30 generations, with a population of 35 different designs. For each member of the population, the meta-policy is adapted using $U$=5 \ac{PPO} updates with rollouts of length $T$=50. Then, 250 transitions are collected with the adapted policy to compute the fitness score for \ac{CMA-ES}. The adaptation and score computations for each member of the population are done with data from 300 parallel simulated environments, each of them with a randomly sampled command and differently generated terrains. The design optimization takes about 1.4 hours of wall clock time using a desktop machine (CPU: AMD Ryzen 7 4800h, GPU: Nvidia GeForce GTX 1650Ti, 16 GB Memory) without parallelization of the evaluation for each member of the population in the CMA-ES algorithm. \subsection{Effect of Meta-learning on the Policy Adaptation} \label{sec:results:meta} We validate our \ac{Meta-RL} approach for training design-conditioned policies. We compare a policy trained as described in Algorithm~\ref{algo:meta-training} (\textbf{meta-policy}) against a naive policy trained over uniformly sampled design parameters (\textbf{naive-policy}). Fig. \ref{fig:meta}-(a) shows a comparison of the average reward obtained by the two policies across different parameters. The rewards are computed from 3000 rollouts of 500 time steps each. The meta-policy consistently outperforms the naive multi-task policy in all cases. We further verify the performance of our meta-policy by comparing it against a set of policies trained for specific designs (\textbf{specialized policy}). The result is given in Fig. \ref{fig:meta}-(b). After the adaptation steps, the meta-policy reaches rewards comparable to the specialized policies, achieving close-to-optimal capabilities. Based on this analysis, we use our meta-policy for the following design optimization experiments. For each evaluated design instance, we fine-tune our meta-policy. \subsection{Design Optimization Using Different Objectives} \label{sec:results:optimization-overview} We conduct design optimization comparing three scenarios: (1) Performance-only, (2) Reducing joint torques, and (3) Reducing power consumption. $\mathcal{C}_v$, $\mathcal{C}_{\tau}$, and $\mathcal{C}_p$ are used, respectively. The result is shown in Table~\ref{table:results}, Table~\ref{table:improvement}, and Fig. \ref{fig:optimal_flat}. On flat terrain (Table~\ref{table:results}-Flat), the result for (1) is similar to the nominal design, which is designed by an engineer, with a slight increase in the thigh length (\unit[2]{\%}), so no major improvement is obtained. The torque-minimized design ($\mathcal{C}_\tau$) opts for the minimal possible leg length, thereby reducing the moment arm and total mass and inertia. This results in a drastic improvement of \unit[43.5]{\%} in the optimization score compared to the nominal design (Table~\ref{table:improvement}-Flat). \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{images/MetaLearning_short.pdf} \caption{(\textbf{a}) Evaluation of average reward obtained by our meta-policy against a parametrized policy trained by randomizing the design parameters. (\textbf{b}) Evaluation of average reward obtained by our meta-policy against policies trained specifically for given designs.} \label{fig:meta} \end{figure} \input{tables/results_overview} \input{tables/improvements} \begin{figure} \centering \includegraphics[width=\columnwidth]{images/OptimalDesigns.pdf} \caption{Optimal designs for different objectives on flat terrain.} \label{fig:optimal_flat} \end{figure} The positive mechanical power ($\mathcal{C}_p$) minimization results in a design with similar legs, and with a higher thigh/shank proportion (1.05:0.94). This design aims to find a balance between reducing leg lengths to reduce the joint torque as in the previous case, but also avoiding high joint speed to limit power consumption. In addition, the longer thigh seeks for higher end-effector velocities with smaller joint speed. With this, we can get a \unit[4.3]{\%} reduction in weighted mechanical power consumption compared to the nominal design (Table~\ref{table:improvement}-Flat). \subsection{Optimal designs for rough terrains} We evaluate how different terrains affect the optimal leg design. We use parameterized terrains presented by~\cite{Lee2020Challenging}. Two types of terrains are simulated: hilly terrain and discrete steps. The former entails smooth transitions between slopes and flat terrains, and the latter simulates discrete height changes and foot-trapping while walking. The terrain parameters are randomized during training as well as friction coefficients for each foot. Examples of the terrains are shown in Fig. \ref{fig:terrains}. We modulate the difficulty level by changing the roughness, frequency, and amplitude of the hills in the first case, and modifying the step width and height in the second case. We investigate how the design changes when optimized for diverse terrains with increasing difficulty levels. The optimization results are given in Table \ref{table:results} and Table~\ref{table:improvement}. The general trend is that with increasing terrain roughness, the design tends to have longer legs that allow the robot to overcome obstacles in the terrain with ease. For maximizing tracking performance ($\mathcal{C}_v$), the designs maintain the slight increase in thigh/shank ratio as in flat terrain, although augmenting the overall leg length as the terrain gets harder. This increment in limb longitude translates into a better command tracking performance as complexity levels rise, with improvements of \unit[25-27]{\%} in the extreme cases. \begin{figure} \centering \includegraphics[width=\columnwidth]{images/TerrainLevels.pdf} \caption{Examples of rough terrains with different difficulty levels used for the optimization.} \label{fig:terrains} \end{figure} The results for torque and mechanical power minimization continue this trend. In addition, in these cases we clearly see the importance of $w_t$, which trades-off command tracking performance. For torque minimization, the design optimizer always seeks to reduce the link lengths as much as possible while still maintaining enough workspace to locomote through the hills and steps present in the environment. Similar behavior can be seen in the power minimization case, where the higher thigh scale ratio is preserved while increasing the leg length in the most extreme cases. \subsection{Comparison with a Model-based Baseline} We validate our framework by comparing with a previous work: \textit{Vitruvio}~\cite{chadwick2020Vitruvio}. Vitruvio evaluates each design instance using a trajectory optimization method~\cite{winkler18} in the design optimization loop. \cite{chadwick2020Vitruvio} presented leg link optimization of the ANYmal-B robot~\cite{Hutter2017ANYmal} on flat terrain with fixed forward directional command (section III-B in \cite{chadwick2020Vitruvio}). We solve the same design optimization task using our framework, and compare the resulting designs with respect to the design objectives defined by \cite{chadwick2020Vitruvio}. \subsubsection{Experimental setup} We optimize the link lengths of the ANYmal-B robot for the task of forward locomotion on flat terrain. The robot is commanded to walk at \unit[0.36]{m/s} in $x$ direction. Vitruvio introduced three different metrics to minimize: Joint torque minimization, mechanical power minimization, and \ac{MCOT} minimization. The two first metrics are the same introduced in section \ref{sec:results}-A, but without the weighting factor $w_t$. \ac{MCOT} is defined as follows: \begin{equation*} MCOT = \frac{\mathcal{P}_{mech}}{mg\lvert v \rvert} \end{equation*} In contrast to \cite{chadwick2020Vitruvio}. where the optimization is performed for each leg independently, we treat the system as a whole, so the \ac{MCOT} is computed using the total mass and mechanical power of the robot. Additionally, we used neural network dynamics model of \textit{ANYdrive} actuator to enhance the simulation fidelity~\cite{Hwangbo2019RL}, such that the data used for the optimization is more realistic. Note that Vitruvio cannot take into account such a complex actuation dynamics. Our policy can be deployed on the robot while Vitruvio's motion requires additional regularization and a whole body controller~\cite{winkler18}. \subsubsection{Results} we build $12 \times 12$ cost maps over the design space for the objectives presented above (Figure \ref{fig:anymalBmaps}). The value at each cell is the average value of 500 episodes in 500 different environments for each design instance. \begin{figure*} \centering \includegraphics[width=0.85\textwidth]{images/anymalBheatmaps.pdf} \caption{Cost maps of ANYmal-B for different metrics. Yellow stars represent optimal designs found with our framework, and blue dots are optimal designs reported in Vitruvio \cite{chadwick2020Vitruvio}.} \label{fig:anymalBmaps} \end{figure*} As it can be seen in Fig. \ref{fig:anymalBmaps}, optimal designs by Vitruvio (blue dots) tend to have a big difference between thigh and shank lengths, and do not reside in the low-cost area of the cost map according to our simulation (dark area). In contrast, our designs (stars) do fall in these areas and present more moderate differences between thigh and shank scales. The mismatch can come from different reasons, such as the modelling simplifications (centroidal dynamics, lack of actuator model, optimizing each leg independently) or the difference in the capability of the control methods. One important source is the kinematic restriction imposed by the pre-computed motion trajectory. Vitruvio relies on a predefined trajectory generated by trajectory optimization~\cite{winkler18}, and rejects designs that cannot fit in (e.g., too long or too short legs). In addition, our result is consistent with the results reported by Ha et al.~\cite{Ha2016TaskBasedDO} where it is shown by controlled experiments that the optimal design for torque minimization of two-link legs for quadrupedal robots falls within a shank/thigh ratio between 1.0 and 1.5. Results from other frameworks~\cite{dinev2021co, devincenti2021control} also follow this trend. \subsection{Higher dimensional experiment} \label{sec:results:gear} To verify the effectiveness of our approach in a higher dimensional example, we also include the gear ratios for both the hip and the knee actuators as design parameters. This results in a 4D design space; 2 for leg lengths, 1 for knee gear ratio, and 1 for hip gear ratio. The nominal values for these parameters are 5.6 and 8.0 for the hip and knee gears, respectively. We run the design optimization for flat terrain and rough terrains. The result is shown in Table \ref{table:results_gear}. The optimized designs have higher hip gear ratio and lower knee gear, which results in stronger hips and faster knees. \input{tables/results_gear.tex} The two additional optimized design parameters result in higher improvements in our considered optimization objectives compared to the 2D cases. \subsection{Computational Benefit} Having a policy that adapts fast and performs nearly optimally for each design instance enables us to run the design optimization without training specialized policies for different designs. In our setup (see~\ref{setup}), Each specialized policy takes about 12 hours of wall clock time to train, while training a meta-policy takes approximately 72 hours until convergence. The design optimization runs for 30 generations, with 35 different designs per generation. This means that each generation would require about 420~h if the policy training is done in series. On the other hand, the design optimization including policy adaptation using our meta-policy takes only about 1.4~h.
\section{Introduction} Multiplications by integer constants arise in many numerical algorithms and applications. In particular, algorithms that target embedded systems often involve Fixed-Point (FxP) numbers which can be assimilated to integers. These algorithms range from dot-product evaluation for deep neural networks to more complex algorithms such as digital filters. In order to save hardware resources, the knowledge on the constants to multiply with can be used in dedicated multiplierless architectures, instead of costly generic multipliers~\cite{WiatrJamro_Constantcoefficientmultiplication_2000}. The shift-and-add approach is the privileged method to reduce hardware cost, it consists in replacing multiplications by additions/subtractions and bit-shifts, which are multiplications of the data by a power of two that can be hardwired for a negligible cost. For example, multiplying an integer variable $x$ by the constant $7$ can be rewritten as $7x = 2^3x - x$, reducing the cost to a single bit-shift by three positions to the left and a subtraction, instead of a multiplication. Given a set of target constants to multiply with, finding the implementation with the lowest cost is called the Multiple Constant Multiplication (MCM\xspace) problem. Typical way to tackle the problem is to find shift-and-add implementations represented using \emph{adder graphs}, as in \figurename{}~\ref{fig:compareonebit}, that describe the multiplierless solutions with the \emph{minimum number of adders}. In the following, this problem will be referred to as the MCM-Adders\xspace. The main objective of this work is to first improve the existing approaches for the MCM-Adders\xspace problem, then push towards finer-grained hardware cost metrics counting number of \textit{one-bit adders} (the MCM-Bits\xspace problem), and finally, use truncations in internal data paths to considerably save resources (the tMCM\xspace problem). It is straightforward to obtain a first shift-and-add solution from the binary representation of the constant. A greedy algorithm based on the Canonical Signed Digit (CSD) representation permits to reduce the number of adders \cite{Booth_SignedBinaryMultiplication_1951, Bernstein_Multiplicationintegerconstants_1986}. Many heuristics enhance the results obtained with the CSD method~\cite{DempsterMacleod_Constantintegermultiplication_1994, PotkonjakSrivastavaChandrakasan_Multipleconstantmultiplications_1996, Lefevre_MultiplicationIntegerConstant_2001, VoronenkoPueschel_Multiplierlessmultipleconstant_2007, ThongNicolici_Combinedoptimalheuristic_2010}, but heuristics do not provide any guarantee on the solution quality. Optimal approaches for the MCM-Adders\xspace can be roughly divided into two categories: (i) first approaches based on hypergraphs \cite{Gustafsson_Towardsoptimalmultiple_2008} and Integer Linear Programming (ILP) model~\cite{Kumm_MultipleConstantMultiplication_2016_book}, which can be solved by generic solvers; (ii) dedicated optimal algorithms based on branch and bound technique proposed and further developed by Aksoy et al.~\cite{AksoyGuenesFlores_Searchalgorithmsmultiple_2010}. In this work, we improve and extend the results of the first category of approaches, since ILP-based modeling offers a better versatility for extensions than dedicated algorithms, and permits to rely on the efficiency of generic solvers. The state-of-the-art ILP-based model for the MCM-Adders\xspace was proposed by Kumm in~\cite{Kumm_OptimalConstantMultiplication_2018}. This method finds optimal solutions in terms of the number of adders in reasonable time, and has been adapted to SAT/SMT solvers \cite{DerivingOptimalMultiplication_2020} for single constant multiplication. However, we found an error in the model which makes it miss some optimal solutions. In this work, we use~\cite{Kumm_OptimalConstantMultiplication_2018} as basis, correct the modeling error for the MCM-Adders\xspace problem and build upon it to solve other flavors of the MCM. In particular, the number of cascaded adders, called the \emph{adder depth} (AD), directly impacts the delay of the circuit, and is hence desired to be bounded. We first encode the AD count in our ILP model, and secondly propose, for the first time, a new bi-objective formulation called MCM$_{\AD}$\xspace, which minimizes the number of adders and the AD \textit{simultaneously}. \begin{figure} \centering \begin{subfigure}{0.37\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/4951high.eps} \caption{$AD = 3$}\pgfkeysvalueof{/tikz/dsp/label}}{fig:4951high} \end{subfigure} \hspace{0.08\linewidth} \begin{subfigure}{0.37\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/4951low.eps} \caption{$AD = 2$}\pgfkeysvalueof{/tikz/dsp/label}}{fig:4951low} \end{subfigure} \caption{Different adder graph topologies computing the same outputs: $49x$ and $51x$}\pgfkeysvalueof{/tikz/dsp/label}}{fig:compareonebit} \end{figure} One of the main contributions of this paper is solving the MCM for a low-level hardware metric based on counting the one-bit adders, when the word length of the input $x$ is known \emph{a priori}. Assume adder graphs in \figurename~\ref{fig:compareonebit} taking a 3-bit input $x$. While both require only three adders, the solution in \figurename~\ref{fig:4951high} requires 22 one-bit adders and the other in \figurename~\ref{fig:4951low} uses only 9. While classical bit-level optimization approaches are iterative and require synthesis and simulations \cite{DempsterMacleod_Constantintegermultiplication_1994, JohanssonGustafssonWanhammar_BitLevelOptimization_2007}, solving the MCM with a fine-grained cost model is done only once. By one-bit adders, we gather both half and full adders as logic elements having roughly the same cost. This low-level metric has been discussed for decades, see \cite{DempsterMacleod_Constantintegermultiplication_1994} in which a heuristic for fixing the topology was presented. To our knowledge, we propose the first optimal approach solving the MCM\xspace problem targeting the one-bit adders (the MCM-Bits\xspace problem). We further extend MCM-Bits\xspace model to solve the Truncated MCM (tMCM\xspace) problem. Indeed, the output results of the computations do not necessarily need to be full-precision and in practice are often rounded post-MCM. Focusing on a low-level metric allows to add intermediate truncations \cite{GuoDeBrunnerJohansson_TruncatedMCMusing_2010, DinechinFilipKummForget_TableBasedversus_2019, GarciaVolkovaKumm_TruncatedMultipleConstant_2022} that will save resources and not waste area and time to compute bits that will have no impact on the rounded result. At the same time, our goal is to respect a user-given absolute error on the result. Some previous works address the tMCM\xspace but applied to a \emph{fixed} adder-graph and either do not give a guarantee on the output error, \emph{e.\,g.}\xspace{}, the heuristic-based approach \cite{GuoDeBrunnerJohansson_TruncatedMCMusing_2010}, or overestimate and sometimes wrongly-compute the output error, \emph{e.\,g.}\xspace{}, ILP-based \cite{DinechinFilipKummForget_TableBasedversus_2019}. However, as demonstrated in \figurename~\ref{fig:4951trunc}, some adder graph topologies are better suited for truncations than others. Hence, solving directly for tMCM\xspace and delegating the design exploration to an ILP solver, is a better approach. In this paper, we extend our preliminary work \cite{GarciaVolkovaKumm_TruncatedMultipleConstant_2022} for combining, for the first time, adder graph optimization with internal truncations. In particular, we tighten the error bounds and treat several corner cases, compared to \cite{GarciaVolkovaKumm_TruncatedMultipleConstant_2022}. With this paper, we aim at providing a tool that democratizes access to MCM\xspace at minimal hardware cost. We mix the optimization techniques to model the problem, have an in-depth look at the hardware addition to provide fine-grain cost metrics and provide a sound error-analysis to give numerical guarantees on the computed output. The main ideas of our approach are presented in Section~\ref{sec:birdview} and in the next sections we go through the details of the ILP models. In Section~\ref{sec:expe}, we demonstrate the efficiency of our approach providing optimization results and obtained hardware comparisons. \section{Bird view}\pgfkeysvalueof{/tikz/dsp/label}}{sec:birdview} Our approach is based on ILP modeling, which consists in stating objectives and constraints as \emph{linear} equations involving integer and binary variables. We chose to limit our possibilities to linear equations because it allows using efficient and robust solving approaches embedded in commercial or open-source solvers such as CPLEX, Gurobi, GLPK, etc. Our end goal is to provide a tool which, given the target constants to multiply with, the choice of a cost function and several associated parameters, builds the corresponding ILP model. Solving the model with your favorite solver results in an adder graph description, which can be passed to the fixed- and floating-point core generator FloPoCo~\cite{DinechinPasca_DesigningCustomArithmetic_2011} to generate the VHDL code implementing the MCM circuit. From the modeling point of view, we search for an adder graph that computes the product of the input $x$ by given target constants. In this work, we center the model of an adder graph around the adders and their associated integer values, called \emph{fundamentals}. The rules of construction of an adder graph are simple: \begin{itemize} \item for every target constant, there exists one fundamental equal to its value; \item every fundamental is a sum of its signed and potentially shifted left and right inputs, which can be other fundamentals or the input $x$; \item every used fundamental can be traced back to the input $x$, meaning that the adder graph topology holds. \end{itemize} The search-space for the fundamentals is deduced from the target constants: a tight upper bound on the number of fundamentals can be deduced using heuristics~\cite{VoronenkoPueschel_Multiplierlessmultipleconstant_2007, KummZipfFaustChang_Pipelinedaddergraph_2012}; and the maximum value fundamentals can take is often restricted in practice by the word length of the largest coefficient. To solve the MCM-Adders\xspace problem correctly, we encode the above rules as linear constraints. As a result of resolution, we obtain a sequence of fundamentals, \emph{e.\,g.}\xspace{}, for \figurename~\ref{fig:4951high} this sequence is $\left\{1, 7, 49, 51\right\}$. On top of that, for the MCM-Bits\xspace and tMCM\xspace problems, each adder has an associated one-bit adder cost which must be correctly computed depending on the values of the inputs. Furthermore, for the tMCM\xspace problem, for each adder we associate potential truncations for its left and right operands which permit to reduce the adder cost. However, as each truncation induces an error, the model of error propagation should be incorporated as a set of constraints and the output errors is bounded by a user-given parameter. The challenge is to consider all possible cases and not overestimate the one-bit adders cost and errors. The main challenges are to translate these objective functions and constraints into \emph{linear} equations over integer/binary variables. In the following, we give details for that process. \section{Optimal Multiple Constant Multiplication Counting Adders}\pgfkeysvalueof{/tikz/dsp/label}}{sec:mcm} \subsection{The base model for MCM\xspace}\pgfkeysvalueof{/tikz/dsp/label}}{sec:mcmmodel} \begin{figure} \centering \begin{subfigure}{0.45\linewidth} \centering \input{figures/mcmadder.tex} \caption{Adder in adder graph}\pgfkeysvalueof{/tikz/dsp/label}}{fig:mcmadder} \end{subfigure}\hfill \begin{subfigure}{0.45\linewidth} \centering \input{figures/newmcmadder.tex} \vspace{-1.2em} \caption{Adder in MCM modeling}\pgfkeysvalueof{/tikz/dsp/label}}{fig:newmcmadder} \end{subfigure} \caption{Classic (left) and proposed (right) adder models}\pgfkeysvalueof{/tikz/dsp/label}}{fig:addermodels} \end{figure} The main challenge behind this model is to be able to formally state the constraints fixing the adder graph topology with linear equations. For conciseness, we also extensively use the so-called indicator constraints, which are supported by most modern MILP solvers, and have the form of: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:indicatorcst} a x \leq b \quad \text{ if } y = 1, \end{equation} where $a$ and $b$ are constants, $x$ is an integer variable and $y$ is a binary variable. These indicator constraints can be used as is, or linearized using big M constraints which transform \eqref{eq:indicatorcst} into \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:bigmcst} a x \leq b + M \times \left(1-y\right), \end{equation} where $M$ is a constant large enough such that if $y=0$ then \eqref{eq:bigmcst} is similar to $ax\leq \infty$. Note that indicator constraints, when passed as is, to common MILP solvers, might slow the solving process. On the other hand, big M constraints are typically faster but could lead to numerical instabilities and should be used carefully when the value of $M$ is order of magnitudes higher than $ax$ \cite{KlotzNewman_Practicalguidelinessolving_2013, BelottiBonamiFischettiLodiMonaciNogalesGomezSalvagnin_handlingindicatorconstraints_2016}. To fix the adder-graph topology with linear constraints, we first define a few sets of variables encoding adder information. Integer variables $c_a$ correspond to the fundamentals for each adder and $c_{a,i}$, $\forall i \in \left\{l,r\right\}$, are the left and right inputs of the adder $a$. To simplify, the adder graph input is handled as the zeroth adder and its associated fundamental is one: $c_0 = 1$. Variables encoding shifts and signs are $s_{a,i}$ and $\phi_{a,i}$, respectively. \figurename~\ref{fig:mcmadder} represents an adder and these variables which are linked together through the relation \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:adderrel} c_a = \left(-1\right)^{\phi_{a,l}}2^{s_{a,l}}c_{a,l}+\left(-1\right)^{\phi_{a,r}}2^{s_{a,r}}c_{a,r}. \end{equation} It has been proven \cite{DempsterMacleod_Constantintegermultiplication_1994} that we can limit the adder graph to odd fundamentals only, limiting the relevant shifts. Thus, it is possible to simplify the modeling by considering only positive left shifts, as illustrated by \figurename~\ref{fig:newmcmadder}, and let \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:newadderrel} c_a = 2^{-s_a}\left(\left(-1\right)^{\phi_{a,l}}2^{s_{a,l}}c_{a,l}+\left(-1\right)^{\phi_{a,r}}c_{a,r}\right), \end{equation} where the shifts, $s_a$ and $s_{a,l}$, take values ensuring that $c_a$ is odd. Previous work \cite{Kumm_OptimalConstantMultiplication_2018}, did consider positive left shift only or identical negative shifts, which is equivalent to our $s_a$. However, in their linearized model, integrity constraints conflicted with negative shifts dropping the latter when solving. Nevertheless, negative shifts are absolutely necessary to find optimal solution in some cases, \emph{e.\,g.}\xspace{}, for the target constants $C=\left\{7, 19, 31\right\}$ where $19 = 2^{-1}\left(7+31\right)$. \input{tables/mcmvars.tex} Equation~\eqref{eq:newadderrel} is nonlinear, thus multiple intermediate variables are necessary to compute $c_a$ using linear constraints only. For instance, in order to linearize \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:linearizeshifts} c^{\text{\normalfont sh}}_{a,l} = 2^{s_{a,l}} c_{a,l}, \end{equation} which involves a power of two and a product, a set of binary variables $\sigma_{a,s}$ is required with $s$ taking values ranging from $0$, meaning no shift, to an upper bound on the possible shift $S_{\max}$. These variables are used in \eqref{cst:model1_valueshifted} where a constant, $2^0, 2^1, 2^2$, etc., is multiplied with a variable removing the power of two and product of variables issues. Variable $\sigma_{a,s}$ serves as an indicator of the shift $s$ being used for adder $a$, $\forall s \in \intent{0}{S_{\max}}$, and only one shift is selected for each adder. All the required intermediate variables are presented in \tablename~\ref{tab:mcm_data_var}. These variables are used to produce the following linear model describing the adder graph topology and the link between fundamentals and target constants $C_j$:\par\nobreak \input{models/mcm.tex} In details, constraint~\eqref{cst:model1_addervaluesum} states that the value of an adder before a potential negative shift is equal to the sum of its shifted and signed inputs. Constraints~\eqref{cst:model1_addervalue}, \eqref{cst:model1_negshift} and \eqref{cst:model1_odd} apply the negative shift to variables $c_a$ and ensure that the computed fundamental is odd. It can be noticed that a potential negative shift after $c_a^{\text{\normalfont nsh}}$ only makes sense if the sum of the inputs is even, which can only happen if no left shift is applied to the left input: constraint~\eqref{cst:model1_onlynegshiftifnopos} specifically states this in order to speed up the solving process. The link between an adder and its inputs is enforced by constraints~\eqref{cst:model1_previousforcevalue} and \eqref{cst:model1_onlyoneinput}. Constraints~\eqref{cst:model1_valueshifted} and \eqref{cst:model1_onlyoneshift} permit to apply the shift to the left input of an adder while constraints \eqref{cst:model1_signneg} and \eqref{cst:model1_signpos} apply the sign. Finally, every target constant $C_j$ is computed once and only once thanks to constraints \eqref{cst:model1_endingconstantforcevalue} and \eqref{cst:model1_eachconstanthasanadder}. These constraints are sufficient to define a model for the following decision problem: is there an adder graph with $\overline{N_A}$ adders where all the target constants $C_j$ are computed as fundamentals? Either the model is ``infeasible'', meaning that no adder graph exists for computing the target constants with just $\overline{N_A}$ adders, or ``optimal'' returning values $c_a$, that encode fundamentals, and corresponding shifts and signs that permit to produce a valid adder graph as in \figurename~\ref{fig:compareonebit}. To tackle MCM\xspace as minimization problem, which is desirable in order to use the full potential of MILP solvers, $\overline{N_A}$ can be fixed to a known upper bound, obtained using a heuristic solution~\cite{VoronenkoPueschel_Multiplierlessmultipleconstant_2007, KummZipfFaustChang_Pipelinedaddergraph_2012} or a greedy algorithm~\cite{Bernstein_Multiplicationintegerconstants_1986}, and then the objective function is to minimize the number of \emph{effectively used} adders. A binary variable, $u_a \in \left\{0, 1\right\}$, $\forall a \in \intent{1}{\overline{N_A}}$, permits to deactivate an adder if not used: $c_a = 0 \text{ if } u_a = 0$. Then, adding to the model the objective function \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:mcmobjective} \min \sum u_a, \end{equation} permits to solve the MCM problem as a minimization problem. \subsection{Bounding and/or Minimizing Adder Depth}\pgfkeysvalueof{/tikz/dsp/label}}{sec:mcmbmcm} The latency of the circuit is directly related to the number of cascaded adders or adder depth (AD). It is often preferable to have a bound on the AD to ensure a bound on the latency, or at least to have the minimal AD possible as a second objective, while simultaneously minimizing the number of adders. Works \cite{Gustafsson_Towardsoptimalmultiple_2008,Kumm_MultipleConstantMultiplication_2016_book} that rely on the search space enumeration solve the MCM\xspace problem with an AD bound up to $3$ or $4$ in best case. In this section we propose a new simple way to propagate the AD and to optionally bound it by a user-given constant $\overline{\mathit{ad}}$ and/or to minimize it as a second objective. In order to track the AD, we introduce the variable $\mathit{ad}_{\max}$, and two sets of integer variables: $\mathit{ad}_a$ and $\mathit{ad}_{a,i}$, $\forall a \in \intent{1}{\overline{N_A}}$, $i \in \left\{l,r\right\}$, representing the AD of the adder $a$ and the AD of its left and right inputs, respectively. Naturally, the adder depth of the input is set at zero, $\mathit{ad}_{0} = 0$, and the AD propagation and the bound are handled by the following constraints: \begin{align} & \mathit{ad}_a = \max\left(\mathit{ad}_{a,l} + 1, \mathit{ad}_{a,r} + 1\right), && \forall a \in \intent{1}{\overline{N_A}}, \pgfkeysvalueof{/tikz/dsp/label}}{eq:adderdepthpropagation} \\ & \mathit{ad}_{a,i} = \mathit{ad}_k \quad \text{ if } c_{a,i,k} = 1, && \forall a \in \intent{1}{\overline{N_A}}, i \in \left\{l, r\right\}, \nonumber\\ &&& \forall k \in \intent{0}{a-1}, \pgfkeysvalueof{/tikz/dsp/label}}{eq:adpropagation} \\ & \mathit{ad}_{\max} \geq \mathit{ad}_a, && \forall a \in \intent{1}{\overline{N_A}}, \pgfkeysvalueof{/tikz/dsp/label}}{eq:adderdepthvalue} \\ & \mathit{ad}_{\max} \leq \overline{\mathit{ad}}. \pgfkeysvalueof{/tikz/dsp/label}}{eq:adderdepthbound} && \end{align} Note that the $\max$ in \eqref{eq:adderdepthpropagation} can be linearized adding a set of binary variables to the model. Constraint \eqref{eq:adderdepthvalue} ensures that the integer variable $\mathit{ad}_{\max}$ will be equal or greater than actual adder depth. With \eqref{eq:adderdepthbound}, we guarantee that the adder depth is bounded by $\overline{\mathit{ad}}$. In contrast to existing approaches \cite{Gustafsson_Towardsoptimalmultiple_2008} and \cite{Kumm_MultipleConstantMultiplication_2016_book}, this encoding of AD is performed automatically by the solver, and does not require precomputations or a large number of variables and constraints. We further extend our ILP model towards the bi-objective problem MCM$_{\AD}$\xspace in order to optimize for both adder count and AD. The variable $\mathit{ad}_{\max}$, which encodes the AD of the adder graph, is used to replace the objective function \eqref{eq:mcmobjective} by \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:mcmadobjective} \min \sum_{a=1}^{\overline{N_A}}{\left(\overline{N_A} u_a\right)} + \mathit{ad}_{\max}. \end{equation} This new objective function is a weighted sum that enforces a lexicographic optimization with the number of adders as first objective and the AD as second. Indeed, reducing the number of adders is unconditionally stronger than increasing the AD because $\overline{N_A} \geq \mathit{ad}_{\max}$. Solving MCM$_{\AD}$\xspace permits to select from the set of solutions with minimal number of adders those which yield the smallest delay in a hardware implementation. For example, in \figurename~\ref{fig:compareonebit}, we propose two optimal solutions in terms of the number of adders, $N_A = 3$, for the target constants $\left\{49,51\right\}$, but different adder depths: $\text{\normalfont AD} = 3$ in \figurename~\ref{fig:4951high} and $\text{\normalfont AD} = 2$ in \figurename~\ref{fig:4951low}. Solving MCM$_{\AD}$\xspace would directly find the adder graph with the lowest adder depth among the optimal ones in terms of number of adders. This problem can be difficult for the solver, thus, in order to speed up the solving process, we provide redundant constraints that should help to reduce the search space. Gustafsson~\cite{Gustafsson_LowerBoundsConstant_2007} proposed some lower bounds on the AD for the target constants which we can use in the following way: \begin{align} & \mathit{ad}_a \geq o_{a,j} \times \underline{\mathit{ad}}_j && \forall a \in \intent{1}{\overline{N_A}}, j \in \intent{1}{N_O}, & \pgfkeysvalueof{/tikz/dsp/label}}{eq:adderdepthoutputbound} \end{align} where $\underline{\mathit{ad}}_j$ is the lower bound on the adder depth of the target constant indexed by $j$. For our $\left\{49,51\right\}$ target set, the first constant $49$ has a minimal adder depth $\underline{\mathit{ad}}_1 = 2$, hence the constraint becomes: \begin{align} & \mathit{ad}_a \geq 2 o_{a,1}, && \forall a \in \intent{1}{\overline{N_A}}, \end{align} enforcing the adder $a$ to have an AD of at least $2$ before considering it as a potential output for the first target constant~$49$. In Section~\ref{sec:expe}, we will show the advantages of MCM$_{\AD}$\xspace over the classic single-objective MCM-Adders\xspace. Optimal solutions are obtained in reasonable time when solving either problems, and solving MCM$_{\AD}$\xspace provides better solutions. For that reason, we will also consider the AD minimization as second objective when tackling MCM-Bits\xspace and tMCM\xspace. Similarly to bounding and/or minimizing the adder depth, the \emph{Glitch Path Count} (GPC) metric could be targeted in order to control the power consumption~\cite{DemirsoyDempsterKale_Poweranalysismultiplier_2002}. In~\cite{Kumm_OptimalConstantMultiplication_2018}, Kumm showed how to include such metric into an ILP model and this can be adopted for our solution. \section{Optimal Multiple Constant Multiplication Counting One-Bit Adders}\pgfkeysvalueof{/tikz/dsp/label}}{sec:mcm1b} Minimizing the number of adders and the AD leads to efficient hardware but can also be used in software. In many cases, optimizing {w.\,r.\,t.}\xspace{} these metrics is the best we can provide and they already lead to a significant cost reduction. However, when specifically targeting hardware, \emph{e.\,g.}\xspace{}, Application-Specific Integrated Circuits (ASICs) or Field Programmable Gate Arrays (FPGAs), and when the word length of the input is \emph{a priori} known, it is possible to optimize using a finer-grain metric: the number of one-bit adders. Indeed, two optimal adder graphs, {w.\,r.\,t.}\xspace{} the number of adders, can have a significantly different number of one-bit adders. This is illustrated by \figurename~\ref{fig:compareonebit}: for a 3-bit input $x$, solution in \figurename~\ref{fig:4951high} requires $22$ one-bit adders, while the one in \figurename~\ref{fig:4951low} needs only $9$ one-bit adders. These large differences motivate the choice to specifically target the one-bit adder metric. To solve the MCM-Bits\xspace problem, we enhance our MCM$_{\AD}$\xspace model. In addition to the constraints fixing the adder graph topology and keeping track of the adder depth, we need to be able to count the number of one-bit adders. This additional need comes with two main difficulties: first, we have to be able to propagate the data word length which directly impacts the number of one-bit adders required for a given adder; second, counting the number of one-bit adders requires to consider many cases, as presented in \cite{JohanssonGustafssonWanhammar_BitLevelOptimization_2007}, \emph{e.\,g.}\xspace{}, the cost in terms of one-bit adders differs between two adders because of shifts and subtractions. The former problem of word length propagation can be decomposed into tracking the Most Significant Bit (MSB) and Least Significant Bit (LSB) positions. Integer additions and subtractions impact the MSB but do not change the LSB, hence without loss of generality we can consider that the LSB is always equal to zero. Given an upper bound on the input, $\overline{x}$, it is possible to compute the required MSB after any adder: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:msbcomputebase} \text{\normalfont msb}_a = \left\lceil\log_2\left(\overline{x} c_a\right)\right\rceil \end{equation} where $c_a$ is the adder fundamental. Incorporating this nonlinear constraint into our ILP model requires a few adjustments. First, the rounding can be removed by relaxing the equality. Second, exponentiation of both sides to remove the $\log_2$ leads~to \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:msbcompute} 2^{\text{\normalfont msb}_a} \geq \overline{x} c_a. \end{equation} The expression $2^{\text{\normalfont msb}_a}$ can be linearized similarly to shifts with the challenge of the wider range of possible values for $\text{\normalfont msb}_a$. This permits to propagate the data word length, which is, in the worst case, equal to the number of one-bit adders, $B_a$: \begin{equation} B_a \leq \text{\normalfont msb}_a + 1. \end{equation} However, multiple corner cases permit to save one-bit adders. \begin{figure} \centering \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitaddersshift.eps} \caption{Some output bits are computed without one-bit adders thanks to shifts.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddershift} \end{subfigure} \hspace{0.08\linewidth} \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitadderscarryshift.eps} \caption{In some cases, the MSB can be computed by the carry of the last one-bit adder.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddercarryshift} \end{subfigure} \medskip \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitaddersubtract.eps} \caption{For subtraction, shifts do not always permit to save one-bit adders.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddersubtract} \end{subfigure} \hspace{0.08\linewidth} \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitaddersnone.eps} \caption{When shifts are large enough, no one bit adders are required.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddernone} \end{subfigure} \caption{Counting one-bit adders}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddersimplecases} \end{figure} As illustrated in \figurename{}~\ref{fig:onebitaddershift}, shifts can lead to output bits computed without one-bit adders. Yet, one should note that it is not always the case with subtractions, see \figurename{}~\ref{fig:onebitaddersubtract}. The MSB computation is either done by a dedicated one-bit adder, as represented in \figurename{}~\ref{fig:onebitaddershift}, or obtained from the carry of the last one-bit adder, as in \figurename{}~\ref{fig:onebitaddercarryshift}. This can be deduced from the MSB positions which depend on the fundamental values, see \eqref{eq:msbcomputebase}, allowing for the gain of a one-bit adder. One-bit adders might even not be necessary at all, as illustrated in \figurename{}~\ref{fig:onebitaddernone}. To wrap up, counting the number of one-bit adders, $\text{\normalfont B}_a$, consists in computing the word length and deducting the gains $g_a$ and $\psi_a$, \begin{equation} \text{\normalfont B}_a = \text{\normalfont msb}_a + 1 - g_a - \psi_a, \end{equation} where $\psi_a$ is equal to one if the MSB is computed by the carry of the last one-bit adder. The gain $g_a$ is dependent on the signs, shifts and MSBs and can be summarized as follows: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:gainob} g_a = \left\{\begin{array}{ll} \text{\normalfont msb}_a & \text{if } s_{a,l} > \text{\normalfont msb}_{a,r} \\ s_{a,l} & \text{if } \Phi_{a,r} = 0 \\ 0 & \text{otherwise} \end{array}\right., \end{equation} formalizing cases illustrated in \figurename~\ref{fig:onebitaddershift}, \ref{fig:onebitaddersubtract} and \ref{fig:onebitaddernone}. To include the computation of $\text{\normalfont B}_a$ and $g_a$ in an ILP model, we add several binary variables to handle each condition. As each adder $a$ has an associated cost $B_a$, it is straightforward to formulate the objective as: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:obobjfun} \min \sum_{a=1}^{\overline{N_A}}{\overline{N_A}\text{\normalfont B}_a} + \mathit{ad}_{\max}, \end{equation} where $\overline{N_A}$ is the number of adders the adder graph can use. This solves the bi-objective problem minimizing the number of one-bit adders first and the adder depth second. For a given instance, we make the following conjecture: if a solution of that instance requires $N_A$ adders, then the optimal solution in terms of number of one-bit adders also requires at most $N_A$ adders. As a consequence, we will use a bound on $\overline{N_A}$ and assume we do not exclude optimal solutions with respect to one-bit adders. In Section~\ref{sec:expe}, our benchmarks show that solving MCM-Bits\xspace, on average, reduces the number of LUTs by $7.59\%$ compared to our MCM-Adders\xspace. \section{Truncated Multiple Constant Multiplication}\pgfkeysvalueof{/tikz/dsp/label}}{sec:tmcm1b} \begin{figure} \centering \includegraphics[width=0.75\linewidth]{figures/4951trunc.eps} \caption{Computing $49x$ and $51x$ via the fundamental $17$ leads to only $4$ one-bit adders for a 3-bit input/output. }\pgfkeysvalueof{/tikz/dsp/label}}{fig:4951trunc} \end{figure} Arithmetic operation usually increase the size of the data paths but the full-precision result is often not required. For instance, consider recursive digital filters, in which the result of MCM is typically rounded to some internal word length at each iteration. In these cases, hardware designers can often provide an absolute error bound, $\overline{\varepsilon}$, that the computed products should respect. In order to avoid wasting resources to compute the bits that will not impact the rounded result, we propose to introduce truncations inside the adder graphs. \figurename~\ref{fig:onebitaddertruncate} illustrates a case when truncating a bit in one of the adder's operands saves a one-bit adder. Of course, a truncation can generate an error that should be bounded and propagated, and the truncated adder graph should respect the bound $\overline{\varepsilon}$. Incorporating truncations the complexity of the problem, however it has been shown that it can significantly reduce the final hardware cost \cite{GuoDeBrunnerJohansson_TruncatedMCMusing_2010, DinechinFilipKummForget_TableBasedversus_2019}. In contrast to previous works, which focus on truncations of a \textit{fixed} adder graph, we postulate that truncations should guide the topology, potentially leading to a different adder graph than the one obtained solving the MCM-Bits\xspace problem. Consider for instance the multiplication by $49$ and $51$ in \figurename~\ref{fig:compareonebit}, where the adder graph \figurename~\ref{fig:4951low} is the MCM-Bits\xspace solution. Applying the truncations, s.t. only 3 output bits are faithful, yields a design requiring at least 5 one-bit adders. However, there exists another adder graph topology, shown in~\figurename~\ref{fig:4951trunc}, that requires only 4 one-bit adders and is hence better suited for a target truncated result. In this Section we outline the ILP model permitting to solve the tMCM\xspace as \textit{one} optimization problem, covering the whole design space. In Section~\ref{sec:expe}, our experiments demonstrate that when the goal is to keep only half of the output bits, our tMCM\xspace solutions reduce the number of LUTs by $28.87\%$ compared to our new MCM-Bits\xspace, and by $35.93\%$ compared to the state of the art MCM-Adders\xspace, on average. \begin{figure} \centering \begin{subfigure}{0.43\linewidth} \centering \input{figures/mcmaddertrunc.tex} \vspace{-1em} \caption{Model of an adder in presence of errors $\varepsilon$ and truncations $t$.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:ilpmodelerrortruncate} \end{subfigure} \hspace{0.08\linewidth} \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitadderstrunc.eps} \caption{Some output bits are computed without one-bit adders thanks to shifts and truncations.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddertruncate} \end{subfigure} \medskip \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitadderstruncfree1.eps} \caption{Truncations might induce zeros in the output.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddertruncatefreefirst} \end{subfigure} \hspace{0.08\linewidth} \begin{subfigure}{0.43\linewidth} \centering \includegraphics[width=1.0\linewidth]{figures/onebitadderstruncfree2.eps} \caption{Zeros can be truncated without increasing the error.}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitaddertruncatefreesecond} \end{subfigure} \caption{Counting one-bit adders and propagating errors in presence of truncations}\pgfkeysvalueof{/tikz/dsp/label}}{fig:onebitadderstrunc} \end{figure} \subsection{Modeling truncations and error propagation} Truncations permit to gain one-bit adders and should be incorporated into a model in order to benefit from this possibility. To do so, we add integer variables, $t_{a,i}$, encoding the position of the truncated bits from the left and right inputs of adder $a$. Then, we update \eqref{eq:gainob} in order to include the truncations in the one-bit adders gain count: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:gainobtrunc} g_a = \left\{\begin{array}{ll} \text{\normalfont msb}_a & \text{if } s_{a,l} > \text{\normalfont msb}_{a,r}, \\ \max\left(t_{a,l}, s_{a,l}, t_{a,r}\right) & \text{if } s_{a,l} \geq 0 \land \Phi_{a,l} = \Phi_{a,r}, \\ \max\left(t_{a,l}, s_{a,l}\right) & \text{if } s_{a,l} \geq 0 \land \Phi_{a,l} = 1, \\ t_{a,r} & \text{if } s_{a,l} \geq 0 \land \Phi_{a,r} = 1, \\ 0 & \text{otherwise.} \end{array}\right. \end{equation} Typically, this gain is maximized in order to decrease the number of one-bit adders in the adder graph. Obviously, truncations should be constrained by the error they induce. These errors must be propagated and respect a user-given bound for each output. Previous works \cite{DinechinFilipKummForget_TableBasedversus_2019, GarciaVolkovaKumm_TruncatedMultipleConstant_2022} underestimate the truncation-induced errors resulting in an output error exceeding the bound $\overline{\varepsilon}$. This underestimation was partly mitigated by an overestimation of the propagation of errors that we discuss~here. Classically, in computer arithmetic we consider the following model to link the exact quantities and errors: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:classicerrorformula} \widetilde{y} = y + \Delta, \quad \text{where } \left|\Delta\right| \leq \varepsilon, \end{equation} where $\widetilde{y}$ is the actually computed quantity, $y$ is the exact quantity, and $\varepsilon$ is a bound on the error. This fits well for symmetric errors, which is the case when rounding to nearest, but overestimates nonsymmetric truncation-induced errors. We propose to track errors using two positive bounds, $\varepsilon^{\inf}$ and $\varepsilon^{\sup}$, the former for the negative deviation from the exact quantity and the latter for the positive deviation. That way, it is possible to closely link the computed quantity with the exact quantity: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:newerrorformula} y - \varepsilon^{\inf} \leq \widetilde{y} \leq y + \varepsilon^{\sup}. \end{equation} This equation holds for positive quantities and the following error-analysis assume that all the quantities are positives. Minor sign adjustments of $\varepsilon$'s and reversing inequality relations are necessary to extend our analysis to negative quantities. In order to correctly propagate the errors, we start by investigating the evolution of errors when applying unary operators used in truncated adder graphs. These unary operators are the shift, the negation and the truncation. First, applying a shift $s$ to an inexact quantity $\widetilde{y}$ is straightforward and as it increases both error bounds: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:shifterrorformula} 2^s y - 2^s \varepsilon^{\inf} \leq \widetilde{2^s y} \leq 2^s y + 2^s \varepsilon^{\sup}. \end{equation} Second, the negation applied on an inexact quantity $\widetilde{y}$ does not increase the overall error but swaps the deviations from the exact quantity $y$ like so: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:negerrorformula} - y - \varepsilon^{\sup} \leq -\widetilde{y} \leq - y + \varepsilon^{\inf}. \end{equation} Finally, when applied to a quantity $\widetilde{y}$, truncation up to the $t$-th bit, $\diamond_t\left(\cdot\right)$, removes information. This can increase the negative deviation $\varepsilon^{\inf}$ but not the positive deviation $\varepsilon^{\sup}$, thus the error bounds increase asymmetrically: \begin{equation} y - \varepsilon^{\inf} - \varepsilon_t \leq \diamond_t\!\left(\widetilde{y}\right) \leq y + \varepsilon^{\sup} + 0, \end{equation} where $\varepsilon_t$ is bounded by the quantity it removes from $\widetilde{y}$: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:truncerrorbound} \varepsilon_t \leq 2^{t} - 1. \end{equation} The bound is reached when all truncated bits are $1$'s. However, truncations could induce bits equal to $0$ in the data path, as illustrated in \figurename~\ref{fig:onebitaddertruncatefreefirst}, and keeping track of these trailing $0$'s, denoted $z$, allows for tighter bound on the truncation errors: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:truncerrorboundzeros} \varepsilon_t \leq \max\left(2^t - 2^z, 0\right). \end{equation} To be able to use this bound, we add an integer variable $z_a$, for each adder $a$, that keeps track of the number of trailing $0$'s induced by truncations or propagated from the inputs. In some cases where truncated bits are all zeros, as in \figurename~\ref{fig:onebitaddertruncatefreesecond}, we can even have error-free truncations. And with our approach, the ILP solver will automatically privilege those. Finally, we need to propagate errors through adders which, for two inexact inputs, $\widetilde{y_1}$ and $\widetilde{y_2}$, adds error bounds together: \begin{align} y_1 + y_2 - \varepsilon^{\inf}_{y_2} - \varepsilon^{\inf}_{y_2} \leq \widetilde{y_1}+\widetilde{y_2} \leq y_1 + y_2 + \varepsilon^{\sup}_{y_1} + \varepsilon^{\sup}_{y_2} \end{align} For each operand, we defined a dedicated propagation rule. Our end goal is to bring them all and to bind them in a single error propagation rule. For each adder, $a$, we define variables for error bounds $\left(\varepsilon^{\inf}_a, \varepsilon^{\sup}_a\right)$ which need to be bounded by the user-given acceptable output error $\overline{\varepsilon}$: \begin{equation} \left|\varepsilon^{\inf}_a\right| \leq \overline{\varepsilon} \quad \text{ and } \quad \left|\varepsilon^{\sup}_a\right| \leq \overline{\varepsilon}. \end{equation} Together with left and right truncations $t_{a,i}$, we propagate $\left(\varepsilon^{\inf}_{a,i}, \varepsilon^{\sup}_{a,i}\right)$, and \figurename~\ref{fig:ilpmodelerrortruncate} sums up the interconnections between these variables. The propagation rule for each adder $a$ is as follows: \begin{align} & \varepsilon^{\inf}_a = \left\{\hspace{-2mm}\begin{array}{ll} \left(2^{s_{a,l}}\varepsilon^{\inf}_{a,l} + \varepsilon_{t_{a,l}}\right) + \left(\varepsilon^{\inf}_{a,r} + \varepsilon_{t_{a,r}}\right), & \hspace{-3mm} \text{if } \Phi_{a,l} = \Phi_{a,r}, \\ \left(2^{s_{a,l}}\varepsilon^{\inf}_{a,l} + \varepsilon_{t_{a,l}}\right) + \left(\varepsilon^{\sup}_{a,r} + \varepsilon_{t_{a,r}}\right), & \hspace{-3mm} \text{if } \Phi_{a,r} = 1, \\ \left(2^{s_{a,l}}\varepsilon^{\sup}_{a,l} + \varepsilon_{t_{a,l}}\right) + \left(\varepsilon^{\inf}_{a,r} + \varepsilon_{t_{a,r}}\right), & \hspace{-3mm} \text{if } \Phi_{a,l} = 1, \end{array}\right. \\ & \varepsilon^{\sup}_a = \left\{\hspace{-2mm}\begin{array}{ll} 2^{s_{a,l}}\varepsilon^{\sup}_{a,l} + \varepsilon^{\sup}_{a,r}, & \text{if } \Phi_{a,l} = \Phi_{a,r}, \\ 2^{s_{a,l}}\varepsilon^{\sup}_{a,l} + \varepsilon^{\inf}_{a,r}, & \text{if } \Phi_{a,r} = 1, \\ 2^{s_{a,l}}\varepsilon^{\inf}_{a,l} + \varepsilon^{\sup}_{a,r}, & \text{if } \Phi_{a,l} = 1. \end{array}\right. \end{align} Finally, the propagated errors can force the result of the adder to the next binade {w.\,r.\,t.}\xspace{} the one deduced by \eqref{eq:msbcompute}. To prevent the risk of overflow, we adjust the MSB taking the error into account: \begin{equation}\pgfkeysvalueof{/tikz/dsp/label}}{eq:msbcomputeerror} 2^{\text{\normalfont msb}_a} \geq \overline{x} c_a + \left|\varepsilon^{\sup}_a\right|, \end{equation} where $\overline{x}$ is an upper bound on the maximum of the absolute values of lower and upper bounds of $x$. The solver will chose itself if it is more interesting to increase the MSB in order to gain more from truncations or not. We do not give the full mathematical model in this paper but it is available alongside the open-source implementation. \section{Experiments}\pgfkeysvalueof{/tikz/dsp/label}}{sec:expe} We have implemented the ILP model-generation as an open-source tool called \texttt{jMCM}\footnote{Available on git: \url{https://github.com/remi-garcia/jMCM}}. We used the modeling language JuMP \cite{DunningHuchetteLubin_JuMPModelingLanguage_2017} to implement the model generator, which can then use any generic MILP solver supported by JuMP as backend. We chose the Gurobi 9.5.1 \cite{GurobiOptimizerReference_2020} solver executed with 4 threads on an Intel\textregistered{} Core\texttrademark{} i9-11950H CPU at 2.60GHz and a time limit of 30~minutes. We also fully automate a tool-chain with FloPoCo~\cite{DinechinPasca_DesigningCustomArithmetic_2011}, a state-of-the-art hardware code generator for arithmetic operators, to produce VHDL which we then synthesized for FPGA using Vivado v2018.2 for the xc7v585tffg1761-3 Kintex 7 device. In this section, we will compare the impact of our models on different metrics, especially hardware metrics that are targeted only indirectly. With these experiments, we want to confirm that minimizing the adder depth does positively impact the final hardware delay or that a focus on one-bit adders permits to reduce the hardware cost. The research questions we answer in this section are summarized into four main questions: \begin{itemize}[leftmargin=31pt] \item[(RQ1)] Does taking the adder depth into account lead to better hardware? \item[(RQ2)] Do adder graphs with less one-bit adders permit cost reduction in the final hardware? \item[(RQ3)] What is the impact of intermediate truncations? \item[(RQ4)] How increasing error bound can decrease the synthesized hardware costs? \end{itemize} To answer these questions, we solve all our models on benchmarks from image processing ($11$~instances) that have already been used to compare MCM\xspace algorithms~\cite{Kumm_MultipleConstantMultiplication_2016_book,KummFanghaenelMoellerZipfMeyerBaese_FIRfilteroptimization_2013}. We extend our tests on the whole FIRsuite project ($75$~instances)~\cite{FIRsuiteWeb}, which is a collection of digital filter designs and is a direct application of the MCM problem. We solved multiple flavors of the MCM\xspace problem, four to be precise, producing hundreds of adder graphs. Using FloPoCo and Vivado, we synthesized all these adder graphs and extracted the number of LUTs, the delay and power (we present the sum of the logic, dynamic and signal powers). For conciseness, detailed results in \tablename~\ref{tab:allresults} are shown only for the image processing benchmark, while the statistics are discussed over the full set of $86$ benchmarks. The detailed report is available on git and results are reproducible in an automated way. \subsection{Optimization settings and timings} One of the advantages of ILP-based approach is that a ``good'' candidate solution is available after the first several second of resolution, even if optimality over a huge design space is too difficult to prove by a generic solver. And in most cases that we observed, the solver either proves the optimality within first 10 seconds, or timeouts. To be precise, for the metrics based on number of adders, we could prove optimality for two thirds of benchmarks, and for models targeting one-bit adders it decreases to only a third of proven optimal results. With the ILP modeling for MCM, the complexity of the problem is not necessarily in the number of target coefficients, as we could quickly solve large instances and struggle with smaller ones, but in the coefficients themselves. One limitation is, however, data representation in the ILP solvers and potential numerical instabilities that can arise. In our benchmarks, we detected that starting from $12$ bits, optimality could not be proven, but good candidate solutions were found for coefficients up to $19$ bits. Since solving the MCM-Adders\xspace problem permits to quickly obtain adder graphs with a low number of adders, we use it as a warm-start for the MCM-Bits\xspace or tMCM\xspace in order to speed up the resolution of complex models. And for any model, we give a bound on the number of adders by either using the RPAG library \cite{KummZipfFaustChang_Pipelinedaddergraph_2012}, if available, or the CSD greedy algorithm \cite{Bernstein_Multiplicationintegerconstants_1986}. In many cases the MCM circuits are used in an iterative way, hence the output result is truncated to some intermediate format and then re-injected in the circuit, so that the input/output word lengths are the same. For the image-processing benchmarks an 8-bit input/output word length is a reasonable choice, hence we limited the error to a single unit of least precision (ulp) of the output precision. When taking the error of last rounding into account, we obtain that the error bound for internal truncations is actually half an ulp. \input{experiments/gainbarplot.tex} \subsection{RQ1: the impact of simultaneous adder count and adder depth minimization} We start by analyzing the first improvement to the corrected MCM-Adders\xspace model, which is the simultaneous minimization of AD, as a secondary objective to the adder count. In $13$ out of $86$ benchmarks we exhibited a decrease of the AD by 1 and up to 4 stages, for the same minimal number of adders. Solving the MCM-Adders\xspace led to many adder graphs with AD greater than $4$ and up to $6$, while MCM$_{\min\AD}$\xspace shows that for every instance of our benchmarks there exists an adder graph with AD $\leq 4$. The running times were similar to our MCM-Adders\xspace, though some solutions were not proven optimal anymore. Minimizing the AD is an empirical approach to lower the delay of resulting hardware, its area and power. In \figurename~\ref{fig:averageandmaxgain} we exhibit, with the red bars, the reductions in each metric compared to the corrected state-of-the-art MCM-Adders\xspace. Over the $13$ instances impacted by the simultaneous AD minimization, the average improvements are small, around $1\%$ but can go up to roughly $20\%$ for all metrics. We conclude that while MCM-Adders\xspace is already doing a good job w.r.t. the adder depth, it can be quite beneficial to automatically search the design space of adder graphs with minimal number of adders for the ones with least AD. We also investigate the correlation between adder depth and the delay. We computed the correlation between different metrics and the hardware cost for all our benchmarks, each implemented in four flavors (MCM-Adders\xspace, MCM$_{\min\AD}$\xspace, MCM-Bits\xspace, tMCM\xspace). As illustrated in \tablename~\ref{tab:correlation}, the correlation between the delay and the AD is $r=0.3481$. We find this quite interesting, since in previous works \cite{Kumm_OptimalConstantMultiplication_2018, Kumm_MultipleConstantMultiplication_2016_book} bounding the adder depth to some low value was motivated by supposedly lower delay, which is refuted by our analysis. Indeed, as we observed, bounding the adder depth to a value lower than optimal, \emph{i.\,e.}\xspace{}, obtained with our MCM$_{\min\AD}$\xspace, always leads to a larger number of adders that have much bigger correlation with delay: $r=0.9549$. As a result, we do not further investigate artificially bounding the AD but, by default, incorporate the AD minimization as a second objective in MCM-Bits\xspace and tMCM\xspace. \input{experiments/correlationtable.tex} \subsection{RQ2: hardware impact of the one-bit adder metric } \input{experiments/allresults.tex} The detailed hardware results in \tablename~\ref{tab:allresults} demonstrate that minimizing the one-bit adders always reduces the number of LUTs, though in rare cases the results coincide with the MCM-Adders\xspace solution, \emph{e.\,g.}\xspace{}, for \texttt{U.3-1}. As illustrated by \figurename~\ref{fig:averageandmaxgain}, we reduced the number of LUTs by $7.59\%$ on average, and $19.1\%$ at most for the full benchmark set. As illustrated in \tablename~\ref{tab:allresults}, minimizing the one-bit adders can sometimes lead to a larger adder count, as in the case \texttt{LP15}, while significantly improving all hardware metrics. Also, in some cases, even if minimizing the AD is a default secondary objective, the optimal one-bit adder solutions require more stages. To compare the impact of the one-bit adder metric vs. the adder count, we analyzed the correlation between each of them and the actual hardware cost. \tablename~\ref{tab:correlation} clearly demonstrates that the one-bit adders are most certainly in a linear relationship with the LUT count, with a correlation factor $r=0.9967$, which is stronger than $r=0.9602$ for the number of adders. This does not mean that minimizing the number of one-bit adders will surely minimize the number of LUTs, yet it is reasonable to expect it. The one-bit adder correlation factors for the delay and power are $0.9129$ and $0.9659$, respectively, which indicates a less strong relationship, which is also worse than for the number of adders. This analysis also confirms the detailed results in \tablename~\ref{tab:allresults}, where sporadic increase in delay and power for seemingly better MCM-Bits\xspace solutions can be observed. In general, the increase is small and could be neglected but is probably due to a different glitch path count, which can also be modeled and used to guide the adder topology~\cite{Kumm_OptimalConstantMultiplication_2018}. With the above, we can conclude that using the one-bit adder metric is more beneficial for the LUT count, regardless of occasional increase in the adder depth and number of adders. \subsection{RQ3 and RQ4: advantages of truncated adder graphs} In~\cite{GarciaVolkovaKumm_TruncatedMultipleConstant_2022} we provide a preliminary analysis and comparison with the state-of-the-art models and our tMCM\xspace by counting the number of one-bit-adders. On the same set of benchmarks, we deduced that the number of one-bit adders, was on average reduced by $25.31\%$ compared to MCM-Bits\xspace problem. In this work we go further and synthesize all adder graphs for hardware. \tablename~\ref{tab:allresults} confirms that tMCM\xspace provides major hardware cost reductions: for $8$-bit inputs/outputs, the number of LUTs is decreased by $21.55\%$, the delay by $5.15\%$ and the power by $18.68\%$. These results are also expected due to the strong correlation factor between the LUT count and the number of one-bit adders, which are minimized in tMCM\xspace. Similarly to the case of MCM-Bits\xspace, truncated adder graphs in some cases require more adders, which is natural, since there are many different corner cases that permit to reduce the one-bit adder count with a drawback of larger number of fundamentals. Interestingly, in presence of truncations the adder depth might be, on the contrary, smaller than for the MCM-Bits\xspace solutions, significantly improving power. Of course, this significant performance improvement requires the embedded system designers to be able to provide an \emph{a priori} error bound for the outputs. However, we do not find it unreasonable, since analyzing the finite-precision behavior of the implemented system is expected for resource-constrained applications. Generic static analysis tools can be used to compute such bounds, such as~\cite{Daisy, Fluctuat}, or they can be manually deduced for specific applications, such as has been done for digital filters~\cite{VolkovaIstoanDeDinechinHilaire_TowardsHardwareIIR_2019}. In the above discussion we fixed the accuracy of the MCM outputs by setting the output word length to $8$ bits, which is reasonable for an image-processing benchmark. In general, as the coefficients have different magnitudes, this meant that for some instances $8$-bit output contained the exact result, and for some only a fraction of it. In order to present a fair general comparison, we now vary the error bound for each instance and first remove a quarter, and then a half of the \textit{exact} output word length. For example, if the full-precision result requires $16$ bits, we solve tMCM\xspace to faithfully round to $12$ bits and then to $8$ bits. In cases when the coefficient magnitude is close to that of the input, keeping half of the result bits is quite reasonable, as it basically corresponds to maintaining the same input/output size. This experiment also permits us to see how varying the error bound impacts the hardware cost and might help to find the sweet spot between accuracy and resources. On average, reducing the output word length by $25\%$ results in $6.2\%$ one-bit adders reduction, compared to full precision. Leaving only $50\%$ of the output bits permits to significanly change the topology of the adder graphs (as illustrated by the adder depth and adder count change in) and obtain, on average, the reduction of $28.87\%$ in terms of one-bit adder count. This significant improvement is also reflected in the actual hardware metrics, as illustrated in \figurename~\ref{fig:averageandmaxgain}, reaching in some cases a $61\%$ reduction in LUTs. \section{Conclusion} Many approaches exist for solving the MCM\xspace problem but they mostly rely on solving the MCM-Adders\xspace problem, \emph{i.\,e.}\xspace{}, with a high-level metric. In this work we propose a low-level metric based on counting the number of one-bit adders, and tackle the MCM\xspace problem in different flavors: from minimization of the adder depth as a secondary objective, to adding intermediate truncations whilst computing a faithfully rounded output. With this work, the non-trivial MCM\xspace design-space exploration for embedded system designers is automated and delegated to powerful ILP solvers, liberating the designers to study high-level questions, such as definition of the input/output word lengths for their application. With the ILP-based approach, we showed that extending the MCM-Adders\xspace problem does not require too much effort, when the cost/constraint modeling is done, which opens an easy way for more extensions such as the glitch path count. Moreover, our MCM model can be incorporated into the design of more complex algorithms that use MCM, such as digital filters~\cite{FIRopt}. We kept our focus on FPGA design but most of this work directly applies to ASICs. As a perspective, refining the one-bit adder metric into half-adders and full-adders could further improve the results for ASICs. Overall, we proposed a tool with options allowing for tackling the MCM\xspace problem with respect to many end-user needs. Given enough time and numerical robustness of the MILP solver, the solving process permits to find optimal solutions and prove optimality with an exhaustive search, or propose candidate solutions if a timeout is fixed. \bibliographystyle{IEEEtran}
\section{Introduction} In a recent article~\cite{Duteil2021}, Pouradier Duteil and Salvarani introduced a kinetic equation to describe a large population of agents that interact by mean of random encounters and wealth exchange. Transcient pairs are formed with probability $\eta$, then if both of the agents are rich enough (in a sense to be clarified below), they play a game of rock-paper-scissors, and based on the result possibly exchange money. If the outcome of the game is a draw, then the transcient pair is unmade without change in the players' wealth. Otherwise, the winner receives a fixed quantity $h>0$ from the other player. The payoff matrix of player 1 for this zero-sum rock-paper-scissors game is given by \[ \begin{blockarray}{ccccc} & & R & P & S \\ \begin{block}{cc(ccc)} R & & 0 & h & -h \\ P & & -h & 0 & h \\ S & & h & -h & 0 \\ \end{block} \end{blockarray} \] Standard results from game theory state that the optimal strategy is in this case a mixed strategy and a Nash equilibrium, that is selecting at random and uniformly one of the three moves \cite{Hofbauer1998}. \\ The population of players, structured in wealth, is described by a distribution function $u=u(t,y)$ defined on $\mathbb{R}_+^2$. Given a subset $A\subset\mathbb{R}_+$, the integral \[ \int_A u(t,y)\d y \] represents the number of individuals whose wealth belongs to $A$. Denoting $u^\mathrm{in}$ the initial wealth distribution, this model reads \begin{equation} \left\{\begin{array}{l} \displaystyle\partial_t u(t,y) = \frac{\eta}{3}\int_h^\infty u(t,y')\d y' \left[u(t,y-h)\mathds 1_{[2h,\infty)}(y) + u(t,y+h)\mathds 1_{[0,\infty)}(y) -2u(t,y)\mathds 1_{[h,\infty)}(y)\right]\label{eq:pde} \vspace{4mm}\\ u(0,y) = u^\mathrm{in}(y), \qquad \forall\, y\geq 0. \end{array}\right. \end{equation} The intensity of the exchange between players is proportional to the integral \[\displaystyle \int_h^\infty u(t,y')\d y'\] which makes this equation non linear. This term comes from the rule that forbids debts, implying that players involved in a transcient pair only play the game if they own at least $h$. \\ The authors of the aforementionned article provided (among other results) wellposedness of this equation in a $\mathrm{L}^1$ setting as well as its behavior as $h$ vanishes under the diffusive scalling $t\leftarrow t/h^2$. The large time asymptotics when $h$ remains fixed was yet to be investigated: so is the purpose of the present paper. Our goal is to provide a precise asymptotic behavior to this equation, drawing inspiration from the methodology developped in~\cite{Gabriel2022} for a critical case of the growth-fragentation equation. In this article, the authors worked in a measure framework and adopted a combination of semigroup and duality approach. They obtained both an uniform exponential decay using the results from~\cite{Hairer2011} and a formula for the invariant probability measure, that was explicit in term of direct and adjoint eigenvector of the growth-fragmentation equation (see~\cite{DG} for a rich survey as well as very general assumptions ensuring the existence of such functions for this equation). This equation is non local yet linear, unlike the one studied in the present article which is both non local and non linear. Such feature can arguably be considered as the hallmark of the lost of exponential relaxation toward a stationary solution, that is indeed verified in the present case, see Theorem~\ref{thm:main} below. Taking advantage of the particular expression of Equation~\eqref{eq:pde}, an appropriate time rescaling enables to use results from the recent paper~\cite{Canizo2021} from Ca\~nizo and Mischler. \\ The remaining of the paper is organized as follows. In the next section, we introduce the framework that is required to solve Equation~\eqref{eq:pde} in the sense of measures and state our main result. Our methodoloy relies on a duality approach, so Section~\ref{sec:dual} is devoted to the study of the adjoint equation. In Section~\ref{sec:measure}, we build on previous results to construct a measure solution to Equation~\eqref{eq:pde}. Section~\ref{sec:asympt} contains a precise description of the asymptotic behavior of the solution. These results are illustrated by numerical simulations in Setion~\ref{sec:num}. Finally in Section~\ref{sec:con}, we propose some possible continuations of this paper. \section{Preliminaries and the main result} We start by recalling briefly the notions from measure theory that we need to establish our results. For a more complete introduction on this field, we refer the reader to~\cite{Rudin1998} in which the focus is on the total variation norm, and the recent book~\cite{Duell2021} for a rich exposition on measure solutions to PDEs, in particular using the topology of the \textit{flat norm} or \textit{dual bounded Lipschitz norm}. \\ We endow $\mathbb{R}_+ = [0,+\infty)$ with its standard topology and the associated Borel $\sigma-$algebra $\mathfrak{B}(\mathbb{R}_+)$. Throughout the paper, we shall consider discrete subsets of $\mathbb{R}_+$ and unions of such sets, so for a subset $\Omega \subset \mathbb{R}_+$, we denote by $\mathcal{M}(\Omega)$ the space of real-valued Radon measures with Hahn-Jordan decomposition $\mu = \mu_+ - \mu_-$ on $\Omega$ such that \[ \|\mu\| := \int_\Omega \d |\mu| < \infty \] where $|\mu| = \mu_+ + \mu_-$ is the total variation measure of $\mu$. To obtain the desired asymptotic results, we shall work in spaces of weighted measures. For a measurable (weight) function $V : \Omega \to [1, \infty)$, we denote by $\mathcal{M}_V(\Omega)$ the subspace of finite signed measures $\mu$ on $\Omega$ such that \[ \|\mu\|_V = \int_\Omega V\d |\mu| < \infty, \] and simply $\|\cdot\|$ whenever $V\equiv 1$. \\ Now we denote $\mathcal{B}_V(\Omega)$ the space of Borel functions $f : \Omega \to \mathbb{R}_+$ such that \[\|f\|_{\mathcal{B}_V(\Omega)} := \sup_{y\in\Omega}\frac{|f(y)|}{V(y)} < \infty.\] If a function $f\in\mathcal{B}_V(\Omega)$ is also continuous, we denote $f\in\mathcal{C}_V(\Omega)$. In the case $V \equiv 1$, we simply write $\|\cdot\|_\infty$ for this norm, and more generally omit the index $V$. For every $\mu\in\mathcal{M}_V(\Omega)$, one can define a linear form on $\mathcal{B}_V(\Omega)$ through the duality bracket \[ f \mapsto \langle \mu,f\rangle := \int_\Omega f \d\mu. \] With a slight abuse of notation, for a measurable set $A$, we will write $\mu(A)$ instead of $\langle \mu,\mathds{1}_A\rangle$. The norm $\|\cdot\|_V$ can be expressed as \[ \|\mu\|_{V} = \sup_{\|f\|_{\mathcal{B}_V(\Omega)} \leq 1} \langle \mu,f\rangle. \] \\ Now we define a weaker norm on the space of measures. First, for a function $f$ continuous on $\Omega$, we define \[|f|_{Lip} := \sup_{y\neq z}\frac{|f(y) - f(z)|}{|y-z|}.\] Then we can define the Lipschitz bounded norm \[\|f\|_{BL(V)} := \|f\|_{\mathcal{B}_V(\Omega)} + |f|_{Lip}.\] The dual bounded Lipschitz norm is thus defined as \[\|\mu\|_{BL^*(V)} := \sup \left\{\int_\Omega f\d \mu : f\in\mathcal{C}(\Omega),\, \|f\|_{BL(V)}\leq 1\right\}\] with $\mathcal{C}(\Omega)$ denoting the set of continuous functions on $\Omega$. Since the supremum is taken on a smaller set, it is clear that for any measure $\mu$, one has $\|\mu\|_{BL^*(V)} \leq \|\mu\|_{V}$. In particular, one has $\|\delta_y - \delta_z\| = 2$ if $y\neq z$ but $\|\delta_y - \delta_z\|_{BL^*(1)} = \min(1,|y-z|)$, so $(\mathcal{M}(\Omega),\|\cdot\|_{BL^*})$ enjoys better topological properties that $(\mathcal{M}(\Omega),\|\cdot\|_{TV})$. \\ It remains to define a notion of measure solutions to Equation\eqref{eq:pde}. We choose an equation of the "mild" type, in the sense that it relies on an integration in time. Let us give our motivation for this choice. Assume that $u(t,y) \in \mathcal{C}^1(\mathbb{R}_+; \mathrm{L}^1(\mathbb{R}_+))$ satisfies~\eqref{eq:pde} in the classical sense. Integrating this equation multiplied by $f\in\mathcal{B}(\mathbb{R}_+)$, we obtain \begin{align*} \int_0^\infty f(y)u(t,y)&\d y = \int_0^\infty f(y)u^{\mathrm{in}}(y)\d y \\ +& \int_0^t \int_0^\infty \frac{\eta}{3}\left(\int_h^\infty u(z,s)\d z\right)\left[f(y+h) + f(y-h) - 2f(y)\right]\mathds{1}_{[h,\infty)}(y)u(s,y)\d y\, \d s. \end{align*} In order to state the equivalent of this equation for a general signed measure, we define the operator $\mathcal A$ on $\mathcal{B}(\mathbb{R}_+)$ by \[ \mathcal A f : y\mapsto \left[f(y+h) + f(y-h) - 2f(y)\right]\mathds{1}_{[h,\infty)}(y). \] \begin{defi}\label{def:sol} A family $(\mu_t)_{t\geq 0}\subset \mathcal{M}(\mathbb{R}_+)$ with initial condition $\mu^{\mathrm{in}}$ is called a measure solution to Equation~\eqref{eq:pde} if for all $f\in\mathcal{B}(\mathbb{R}_+)$ one has \begin{equation}\label{eq:meas_const} \langle\mu_t, f\rangle = \langle\mu^{\mathrm{in}}, f\rangle + \int_0^t \left\langle\mu_s, \frac{\eta}{3}\mu_s([h,\infty))\mathcal A f\right\rangle\d s. \end{equation} \end{defi} We introduce now another slight abuse of notation. For a measurable set $A\subset \mathbb{R}_+$ and a positive real number $a$, we denote \[A + a := \left\{y\in \mathbb{R}_+ : \exists x\in A,\, y = x + a\right\}.\] Finally, we are ready to state the main result of this paper, which is about the wellposedness of Equation~\eqref{eq:pde} in the measure setting, as well as the asymptotic bahaviour of the solution, when the exchange parameter $h$ remains fixed. \begin{theorem}\label{thm:main} For any initial condition $\mu^{\mathrm{in}} \in \mathcal{M}(\mathbb{R}_+)$, there exists a unique measure solution $(\mu_t)_{t\geq 0}$ to Equation~\eqref{eq:pde} in the sense of Definition~\ref{def:sol}, a projection operator $\mathcal{P}_h$ defined on $\mathcal{M}(\mathbb{R}_+)$ and constants $C,\lambda > 0$ independant of $\eta$ and $\mu^{\mathrm{in}}([h,\infty))$ such that \begin{equation}\label{decay} \forall t\geq 0, \qquad\left\|\mu_t - \mu^{\mathrm{in}} \mathcal{P}_h\right\| \leq \frac{C}{\left(1+\frac{\eta\mu^{\mathrm{in}}([h,\infty))}{3}t\right)^\lambda}\left\|\mu^{\mathrm{in}} - \mu^{\mathrm{in}} \mathcal{P}_h\right\|. \end{equation} The constants $C$ and $\lambda$ can be computed explicitely, and the measure $\mu^{\mathrm{in}} \mathcal{P}_h$ is given explicitely in terms of the initial condition $\mu^{\mathrm{in}}$ and the exchange parameter $h$: \begin{itemize} \item $\mathrm{supp \,} \mu^{\mathrm{in}} \mathcal{P}_h \subset [0,h)$ \item for all measurable set $A\subset [0,h)$ \[\mu^{\mathrm{in}} \mathcal{P}_h(A) = \sum_{k=0}^\infty \mu^{\mathrm{in}}\left(A + kh\right).\] \end{itemize} \end{theorem} \begin{remark} A particular feature of Equation~\eqref{eq:pde} is the conservation of the population and total wealth. Indeed, a formal integration against the measures $\d y$ and $y \d y$ over $[0, \infty)$ leads to the balance laws \[\frac{\d}{\d t}\int_0^\infty u(t,y)\d y = \frac{\d}{\d t}\int_0^\infty yu(t,y)\d y = 0.\] In the language of measures, this translates by $\mu_t(\mathbb{R}_+) = \mu^{\mathrm{in}}(\mathbb{R}_+)$ and $\langle \mu_t,Id\rangle = \langle \mu^{\mathrm{in}},Id\rangle$ with $Id$ the identity function, provided $\mu^{\mathrm{in}}$ as a finite first moment. If $(\mu_t)_{t\geq 0}$ is a measure solution, then the first equality is satisfied by definition, since $\mathds{1}_{\mathbb{R}_+}$ lies in $\mathcal{B}(\mathbb{R}_+)$. If in addition $\langle \mu^{\mathrm{in}},Id\rangle$ is finite, one can define the formula~\eqref{eq:meas_const} on test functions $f\in\mathcal{B}_{1+Id}(\mathbb{R}_+)$, \textit{i.e.} functions that are Borel and satisfy \[ \sup_{y\in\Omega} \frac{|f(y)|}{1+y} < \infty. \] The function $Id$ lies in this set and satisfies $\mathcal A f = 0$. Thus the equality $\langle \mu_t,Id\rangle = \langle \mu^{\mathrm{in}},Id\rangle$ is satisfied, meaning that the total wealth is conserved at any finite time $t$. \end{remark} Now, we make a statement about the behavior of the `asymptotic in time' measure $\mu^{\mathrm{in}}\mathcal{P}_h$ when $h$ vanishes. \begin{theorem} Denoting $\mathcal{P}_0$ the linear operator acting on measures defined by $\mu \mathcal{P} := \mu(\mathbb{R}_+)\delta_0$, one has \[\normiii{\mathcal{P}_h - \mathcal{P}_0}_{BL^*} \leq h\] with $\normiii{\cdot}_{BL^*}$ the operator norm on $(\mathcal{M}(\mathbb{R}_+),\|\cdot\|_{BL^*})$ defined by \[\normiii{\mathcal{P}}_{BL^*} := \sup_{\|\mu\|_{BL^*} \leq 1} \frac{\|\mu\mathcal{P}\|_{BL^*}}{\|\mu\|_{BL^*}}.\] \end{theorem} \section{Dual equation and right semigroup\label{sec:dual}} This section is devoted to the study of the wellposedness of a family of equations that are related to the adjoint equation. Assume $(\mu_t)_{t\geq 0}$ is the unique solution to~\eqref{eq:meas_const}. Then, the (backward) adjoint equation is given by \begin{align}\label{eq:adj_const} \frac{\p}{\p t} f(t,s,y) & = \frac{\eta}{3}\mu_t([h,\infty))\mathcal A f(t,s,y)\nonumber\\ & = \frac{\eta}{3}\mu_t([h,\infty))\left[f(t,s,y+h) + f(t,s,y-h) - 2f(t,s,y)\right]\mathds{1}_{[h,\infty)}(y), \end{align} with $(t,s,y)\in \mathbb{R}_+^3$ and $s\leq t$, supplemented with the terminal condition $f(t,t,y) = f_0(y)$. The second argument $s$ is included to account for the inhomogeneity in the time evolution, since the solution of~\eqref{eq:adj_const} depends on the values of $t\mapsto \mu_t([h,\infty))$. Due to the indicator function $\mathds{1}_{[h,\infty)}$, a solution $f$ to Equation~\eqref{eq:adj_const} satisfies $f(t,s,y) = f_0(y)$ for all $y\in [0,h)$ and $0\leq s \leq t$. On the interval $[h,\infty)$, we solve a \text{mild} version of this equation, that is obviously more complicated than on $[0,h)$. All in all, we search for a function $f$ that satisfies \begin{align}\label{eq:mild} f(t,s,y) =& f_0(y)\mathrm e^{-\frac{2\eta}{3}\mathds{1}_{[h,\infty)}(y)\int_s^t \mu_\sigma([h,\infty)) \d \sigma}\nonumber\\ &\qquad + \frac{\eta}{3}\mathds{1}_{[h,\infty)}(y) \int_s^t \mu_\sigma([h,\infty)) \mathrm e^{-\frac{2\eta}{3}\int_\sigma^t \mu_\tau([h,\infty)) \d \tau}[f(\sigma,s,y + h) + f(\sigma,s,y - h)]\d \sigma \end{align} for all $y>0$. In this form, this equation depends on the solution $(\mu_t)_{t\geq 0}$ of the direct problem, so we introduce related equations by replacing $\mu_\bullet([h,\infty))$ by a generic non negative and continuous $b$ function. The equation we study is then \begin{align}\label{eq:mild_const} f(t,s,y) =& f_0(y)\mathrm e^{-\frac{2\eta}{3}\mathds{1}_{[h,\infty)}(y)\int_s^t b(\sigma) \d \sigma}\nonumber\\ &\qquad + \frac{\eta}{3}\mathds{1}_{[h,\infty)}(y) \int_s^t b(\sigma) \mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau) \d \tau}[f(\sigma,s,y + h) + f(\sigma,s,y - h)]\d \sigma. \end{align} In this section, we will solve Equation~\eqref{eq:mild_const} for a fixed function $b$. The wellposedness of this problem, as well as useful properties, are collected in the next proposition. First, we introduce some notations. For $\tilde{\Omega} \subset \mathbb{R}_+^2$ and $\Omega \subset \mathbb{R}_+$, we denote $\mathcal{C}\left(\tilde{\Omega},\mathcal{B}(\Omega)\right)$ the set of functions $f$ that are defined and continuous on $\tilde{\Omega}$ such that for all $(t,s)\in \tilde{\Omega}$, the function $f(t,s,\cdot)$ lies in $\mathcal{B}(\Omega)$. Similarly, we define a subset of the previous one, denoted $\mathcal{C}^1\left(\tilde{\Omega},\mathcal{B}(\Omega)\right)$ made of the functions such that $\partial_t f$ and $\partial_s f$ lie in $\mathcal{C}\left(\tilde{\Omega},\mathcal{B}(\Omega)\right)$. For $x\in[0,h)$ we define% \[\mathfrak{C}_x := \left\{x+kh, k\in\mathbb{N}\right\}.\] Since players can only gain or loose $h$ after each game, they shall remain in the same `class of wealth' at all time, depending on their initial wealth only. Such classes are precisely these sets $\mathfrak{C}_x$ for $x\in[0,h)$. Since any $f\in \mathcal{B}(\mathbb{R}_+)$ can be written as \[ f = \sum_{x\in [0,h)} f_{|\mathfrak{C}_x} \] it is enough to prove properties on $\mathcal{B}(\Omega\times \mathfrak{C}_x)$, which we do for the next result. \begin{prop}\label{prop:adj} For all $f_0 \in \mathcal{B}(\mathfrak{C}_x)$ and function $b$ continuous, positive and non increasing, there exists a unique solution $f_b$ to Equation~\eqref{eq:mild_const} in $\mathcal{C}(\mathbb{R}_+^2,\mathcal{B}(\mathfrak{C}_x)) \cap \mathcal{C}^1([0,T]^2,\mathcal{B}(\mathfrak{C}_x))$ for any $T>0$. Additionall \begin{itemize} \item[] \qquad for all $(t,s)\in \mathbb{R}_+^2$ and $x\in[0,h)$, $\|f_b(t,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)} \leq \|f_0\|_{\mathcal{B}(\mathfrak{C}_x)}$; \item[] \qquad if $f_0 \geq 0$ then for all $t \geq s\geq 0$, $f_b(t,s,\cdot)\geq 0$; \item[] \qquad if $f_0 = \mathds{1}_{\mathfrak{C}_x}$, then $f_b(t,s,\cdot) = \mathds{1}_{\mathfrak{C}_x}$ for all $(t,s)\in \mathbb{R}_+^2$, \item[] \qquad if $b$ is non increasing, then for all $(t,s)\in \mathbb{R}_+^2$ and $x\in[0,h)$,\\ $\|f_b(t,s,\cdot)\|_{\mathcal{C}^1_x} \leq \left(\|f_0\|_{\mathcal{B}(\mathfrak{C}_x)} + 2b(0)\|\mathcal A f_0\|_{\mathcal{B}(\mathfrak{C}_x)}\right)$ and $f_b$ lies in $\mathcal{C}^1(\mathbb{R}_+^2,\mathcal{B}(\mathfrak{C}_x))$, with \\ \[ \|f\|_{\mathcal{C}^1_x} := \|f\|_{\mathcal{B}(\mathfrak{C}_x)} + \|\partial_t f\|_{\mathcal{B}(\mathfrak{C}_x)} + \|\partial_s f\|_{\mathcal{B}(\mathfrak{C}_x)}. \] \end{itemize} \end{prop} \begin{proof} Fix $b \in \mathcal{C}(\mathbb{R}_+)$ with the aforementionned properties and $T >0$. Let $\Gamma$ be the operator defined on $\mathcal{B}([0,T]^2\times\mathfrak{C}_x)$ \begin{align*} \Gamma f(t,s,y) =& f_0(y)\mathrm e^{-\frac{2\eta}{3}\mathds{1}_{[h,\infty)}(y)\int_s^t b(\sigma) \d \sigma}\\ &\qquad + \frac{\eta}{3}\mathds{1}_{[h,\infty)}(y)\int_s^t b(\sigma) \mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau) \d \tau}[f(\sigma,s,y + h) + f(\sigma,s,y - h)]\d \sigma, \end{align*} with $(t,s,y) \in [0,T]^2\times \mathfrak{C}_x$, $T>0$ and $f_0\in \mathcal{B}(\mathfrak{C}_x)$. Considere functions \[f,g\in \left\{\varphi\in\mathcal{B}([0,T]^2\times\mathfrak{C}_x),\, \forall s\in [0,T],\, \varphi(s,s,\cdot) = f_0\right\}.\] We easily show that \[\sup_{(t,s)\in [0,T]^2}\|\Gamma f(t,s,\cdot) - \Gamma g(t,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)} \leq \frac{2\eta}{3}\|b\|_\infty T\sup_{(t,s)\in [0,T]^2}\|f(t,s,\cdot)-g(t,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)}\] so for $T<\frac{3\|b\|_\infty}{2\eta}$, the operator $\Gamma$ is a contraction and thus has a single fixed point on $[0,T]$. To prove the claim on the boundedness of the solution, we prove that the closed ball of radius $\|f_0\|_{\mathcal{B}(\mathfrak{C}_x)}$ is invariant under $\Gamma$. One has $\Gamma f(t,s,x) = f_0(x)$, so \[ \sup_{(t,s)\in [0,T]^2}\left|\Gamma f(t,s,x)\right| \leq \|f_0\|_{\mathcal{B}(\mathfrak{C}_x)}. \] Now for $y>x$, we compute \[ \left|\Gamma f(t,s,y)\right| \leq \|f_0\|_{\mathcal{B}(\mathfrak{C}_x)}\mathrm e^{-\frac{2\eta}{3}\int_s^t b(s) \d s} + \frac{2\eta}{3}\int_s^t b(\sigma)\mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau) \d \tau}\|f(\sigma,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)}\d\sigma \] so \[\sup_{(t,s)\in [0,T]^2}\|f(t,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)} \leq \|f_0\|_{\mathcal{B}(\mathfrak{C}_x)} \qquad \Longrightarrow \qquad \sup_{(t,s)\in [0,T]^2}\|\Gamma f(t,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)} \leq \|f_0\|_{\mathcal{B}(\mathfrak{C}_x)},\] thus the claim is proved. As a consequence, one can iterate the fixed point procedure on time intervals of length $T$ \textit{ad nauseam}, to finally obtain a unique global solution defined on $\mathbb{R}^3_+$. \\ If $f_0$ is nonnegative, the operator $\Gamma$ preserves the closed cone of Borel functions defined on $\{(t,s,y)\in \mathbb{R}^2_+\times\mathfrak{C}_x, s\leq t\}$, so the fixed point $f_b$ satisfies $f_b(t,s,\cdot)\geq 0$ for all $t\geq s \geq 0$. In addition, if $f_0 = \mathds{1}_{\mathfrak{C}_x}$, we easily obtain by computations that $\mathds{1}_{\mathfrak{C}_x}$ is the fixed point. \\ Then, we prove that the time derivative of the aforementioned solution $f$ lies in $\mathcal{C}^1([0,T]^2,\mathcal{B}(\mathfrak{C}_x))$ for any $T>0$. Let $f,g\in\left\{\varphi\in\mathcal{C}^1([0,T]^2,\mathcal{B}(\mathfrak{C}_x)),\, \forall s\in [0,T],\, \varphi(s,s,\cdot) = f_0\right\}$. This set is $\Gamma-$invariant if $f_0$ lies in $\mathcal{B}(\mathfrak{C}_x)$. For $t,s\geq0$ and $y \geq h$ we compute the derivative in the first variable and obtain after integrating by parts \begin{align} \partial_t \Gamma f(t,s,y)& = b(t)\mathcal A f_0(y)\mathds{1}_{[h,\infty)}(y)\mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma) \d \sigma} \nonumber\\ & \quad + \frac{\eta}{3}b(t)\mathds{1}_{[h,\infty)}(y)\int_s^t \mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma) \d \sigma} \left[\partial_t f(\sigma,s,y+h) + \partial_t f(\sigma,s,y-h) \right]\d \sigma.\label{eq:ptG} \end{align} The derivation with respect to the second variable provides \begin{align*} \partial_s \Gamma f(t,s,y) &= -b(s)\mathcal A f_0(y)\mathds{1}_{[h,\infty)}(y)\mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma) \d \sigma} \\ & \qquad + \frac{\eta}{3}\mathds{1}_{[h,\infty)}(y)\int_s^t b(\sigma) \mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma) \d \sigma} \left[\partial_s f(\sigma,s,y+h) + \partial_s f(\sigma,s,y-h) \right]\d \sigma. \end{align*} Finally, we obtain \[ \sup_{(t,s)\in [0,T]^2}\|\Gamma f(t,s,\cdot) - \Gamma g(t,s,\cdot)\|_{\mathcal{C}^1} \leq \frac{2\eta}{3}\|b\|_\infty T\sup_{(t,s)\in [0,T]^2}\|f(t,s,\cdot)-g(t,s,\cdot)\|_{\mathcal{C}^1} \] so $\Gamma$ is also a contraction in $\mathcal{C}^1\left([0,T]^2;\mathcal{B}(\mathfrak{C}_x)\right)$ provided $T < \frac{3\|b\|_\infty}{2\eta}$. Iterating this result, we obtain that the solution is continuously differentiable in the two first variables on $[0,T]$ for any $T>0$. \\ In the case the function $b$ is non increasing, we can bound $b(t)$ in~\eqref{eq:ptG} from above by $b(\sigma)$ inside the integral for all $\sigma\in [s,t]$ and obtain, taking the supremum norm \[ |\partial_t \Gamma f(t,s,y)| \leq b(t)\|\mathcal A f_0\|_{\mathcal{B}(\mathfrak{C}_x)}\mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma) \d \sigma} + \frac{2\eta}{3}\int_s^t b(\sigma)\mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau) \d \tau}\|\partial_t f(\sigma,s,\cdot)\|_{\mathcal{B}(\mathfrak{C}_x)}\d\sigma \] and a similar formula holds for the derivative in the variable $s$. Then we obtain \begin{align*} &\left|\Gamma f(t,s,y)\right| + \left|\partial_t\Gamma f(t,s,y)\right| + \left|\partial_s\Gamma f(t,s,y)\right|\\ \leq & \left(\|f_0\|_{\mathcal{B}(\mathfrak{C}_x)} + (b(t) + b(s))\|\mathcal A f_0\|_{\mathcal{B}(\mathfrak{C}_x)}\right)\mathrm e^{-\frac{2\eta}{3}\int_s^t b(s) \d s} + \frac{2\eta}{3}\int_s^t b(\sigma)\mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau) \d \tau}\|f(\sigma,s,\cdot)\|_{\mathcal{C}^1}\d\sigma \end{align*} so \begin{align*} & \sup_{(t,s)\in [0,T]^2}\|f(t,s,\cdot)\|_{\mathcal{C}^1} \leq \left(\|f_0\|_{\mathcal{B}(\mathfrak{C}_x)} + 2b(0)\|\mathcal A f_0\|_{\mathcal{B}(\mathfrak{C}_x)}\right) \\ & \qquad \Longrightarrow \qquad \sup_{(t,s)\in [0,T]^2}\|\Gamma f(t,s,\cdot)\|_{\mathcal{C}^1} \leq \left(\|f_0\|_{\mathcal{B}(\mathfrak{C}_x)} + 2b(0)\|\mathcal A f_0\|_{\mathcal{B}(\mathfrak{C}_x)}\right) \end{align*} and we conclude as before. \end{proof} We now express the solution constructed in the previous proposition as a semigroup acting on an initial distribution. To this extent, we define $M_{s,t}^{(b)}f_0(y) = f_b(s,t,y)$ for all $(s,t,y)\in [0,T]^2 \times \mathbb{R}_+$ and $T>0$, where $f_b$ is the unique fixed point of $\Gamma$ with initial condition $f_0$ and associated to function $b$. \begin{coro}\label{coro:semigroup} For any continuous function $b : \mathbb{R}_+ \mapsto \mathbb{R}$ bounded in supremum norm and $f\in\mathcal{B}(\mathbb{R}_+)$, the function $(s,t,x)\mapsto M_{s,t}^{(b)} f(x)$ lies in $\mathcal{C}\left(\mathbb{R}_+;\mathcal{B}(\mathbb{R}_+)\right)\cap\mathcal{C}^1\left([0,T]^2;\mathcal{B}(\mathbb{R}_+)\right)$ for all $T>0$. The family $\left(M_{s,t}^{(b)}\right)_{0\leq s\leq t}$ is a nonhomogeneous semigroup, \textit{i.e.} satisfies \[ \forall t\geq \tau\geq s\geq0,\qquad M_{s,s}^{(b)} f = f, \quad \text{and} \quad M_{s,t}^{(b)} f = M_{\tau,t}^{(b)}M_{s,\tau}^{(b)} f. \] In addition, it satisfies \[ \forall t\geq s\geq 0, \qquad \partial_t M_{s,t}f = b(t)\mathcal A M_{s,t}^{(b)}f = b(t)M_{s,t}^{(b)}\mathcal A f \quad \text{and} \quad \partial_s M_{s,t}^{(b)}f = - b(s)\mathcal A M_{s,t}^{(b)}f. \] It is a positive and conservative contraction on ${\mathfrak{C}_x}$ for all $x\in[0,h)$, i.e for all $t\geq s\geq 0$, \begin{itemize} \item[] \qquad $f\geq0 \Rightarrow M_{s,t}^{(b)} f \geq0$, \item[] \qquad $M_{s,t}^{(b)} \mathds{1}_{\mathfrak{C}_x} = \mathds{1}_{\mathfrak{C}_x}$, \item[] \qquad $\left\|M_{s,t}^{(b)}f\right\|_{\mathcal{B}(\mathfrak{C}_x)} \leq \|f\|_{\mathcal{B}(\mathfrak{C}_x)}$. \end{itemize} \end{coro} \begin{proof} To prove the semigroup property $M_{s,t}^{(b)} = M_{s,\tau}^{(b)} M_{\tau,t}^{(b)}$, we first prove the commutation properties. They are trivially true on $[0,h)$, and thus we focus on the interval $[h,\infty)$. For $f\in\mathfrak{B}(\mathbb{R}_+)$, we compute the derivative in $t$ of $(s,t,y) \mapsto M_{s,t}^{(b)}f(y)$ \[ \partial_t M_{s,t}^{(b)}f(y) = -\frac{2\eta}{3}b(t)M_{s,t}^{(b)}f(y) + \frac{\eta}{3}b(t)\left[M_{s,t}^{(b)}f(y+h) + M_{s,t}^{(b)}f(y-h)\right] = b(t)\mathcal A M_{s,t}^{(b)}f(y). \] The derivative in $s$ of $M_{s,t}f$ satisfies Equation~\eqref{eq:mild_const} on $[s,T)$ for all $s\in[0,T)$ with initial condition $-b(s)\mathcal A f$, and thus \[ \partial_s M_{s,t}f = -b(s)\mathcal A M_{s,t}f. \] Now we prove the desired commutation for an initial condition of the form $\mathds{1}_{\{x + kh\}}$ with $x\in[0,h)$ and $k\in\mathbb{N}$, and the result for a general initial distribution is deduced from the linearity and continuity of these operators. For $k\geq 2$, one has \begin{align*} \mathcal A\mathds{1}_{\{x + kh\}}(y) &= \mathds{1}_{\{x + kh\}}(y+h) + \mathds{1}_{\{x + kh\}}(y-h) - 2\mathds{1}_{\{x + kh\}}(y) \\ &= \mathds{1}_{\{x + (k-1)h\}}(y) + \mathds{1}_{\{x + (k+1)h\}}(y) - 2\mathds{1}_{\{x + kh\}}(y), \end{align*} so we compute \begin{align*} &M_{s,t}^{(b)}\mathcal A\mathds{1}_{\{x + kh\}}(y) = M_{s,t}^{(b)}\mathds{1}_{\{x + (k-1)h\}}(y) + M_{s,t}^{(b)}\mathds{1}_{\{x + (k+1)h\}}(y) - 2M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y)\\ &\mathcal A M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y) = M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y+h)+M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y-h) - 2M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y) \end{align*} and so it is enough to show that \[ M_{s,t}^{(b)}\mathds{1}_{\{x + (k-1)h\}}(y) + M_{s,t}^{(b)}\mathds{1}_{\{x + (k+1)h\}}(y) = M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y+h)+M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y-h). \] To do so, we define $u(s,t,y) = M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y+h)+M_{s,t}^{(b)}\mathds{1}_{\{x + kh\}}(y-h)$, and this function satisfies \begin{align*} u(s,t,y) &= \left(\mathds{1}_{\{x + kh\}}(y+h) + \mathds{1}_{\{x + kh\}}(y-h)\right)\mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma)\d \sigma} \\ & \qquad +\frac{\eta}{3}\int_s^t b(\sigma)\mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau)\d \tau}\left[M_{s,\sigma}\mathds{1}_{\{x + kh\}}(y+2h) + 2\mathds{1}_{\{x + kh\}}(y) + \mathds{1}_{\{x + kh\}}(y-2h)\right]\d \sigma \\ & = \left(\mathds{1}_{\{x + (k-1)h\}} + \mathds{1}_{\{x + (k+1)h\}}\right)(y)\mathrm e^{-\frac{2\eta}{3}\int_s^t b(\sigma)\d \sigma}\\ &\qquad + \frac{\eta}{3}\int_s^t b(\sigma)\mathrm e^{-\frac{2\eta}{3}\int_\sigma^t b(\tau)\d \tau}[u(s,\sigma,y+h) + u(s,\sigma,y-h)]\d \sigma \end{align*} so $u$ is the fixed point of $\Gamma$ with initial condition $\mathds{1}_{\{x + (k-1)h\}} + \mathds{1}_{\{x + (k+1)h\}}$, so the claimed is proved for $k\geq2$. The case $k=1$ can be proved in a similar fashion, and the case $k = 0$ is trivial. Now to prove the semigroup property, we define $g(\tau) = M_{s,\tau}^{(b)} M_{\tau,t}^{(b)} f$ for $\tau\in[s,t]$ and prove that it is actually constant. Using the properties already proved, we can compute its derivative and obtain \[g'(\tau) = b(\tau)\left(\mathcal A M_{s,\tau} - M_{s,\tau}\mathcal A\right)M_{\tau,t}f = 0.\] The positivity, contraction and conservation properties follow immediately from Proposition~\ref{prop:adj}. \end{proof} \section{Wellposedness\label{sec:measure}} In this section, we take advantage of the duality approach from section~\ref{sec:dual} to prove the wellposedness of Equation~\eqref{eq:meas_const}. We provide the measure solution by constructing a left action semigroup on $\mathcal{M}(\Omega)$ for $\Omega \subset \mathbb{R}_+$, and thus heavily rely on the results of Section~\ref{sec:dual}. For $0\leq s\leq t$, a positive measure $\mu$ on $\Omega$ and any Borel set $A\subset \Omega$, we define \[ \mu M_{s,t}^{(b)}(A) := \int_\Omega M_{s,t}^{(b)}\mathds 1_A \d \mu \] and will show that this construction provides the unique measure solution of Equation~\eqref{eq:pde} in the sense of Definition~\ref{def:sol}. First, we show that this defines a positive measure. \begin{lem} Let $b$ be a continuous function, bounded in supremum norm. For all positive measure $\mu$ on $\mathbb{R}_+$ and $t\geq s\geq 0$, the set function $\mu M_{s,t}^{(b)}$ lies in $\mathcal{M}(\mathbb{R}_+)$. Additionnaly, for any $f\in\mathcal{B}(\Omega)$, one has \begin{equation}\label{identity} \langle\mu M_{s,t}^{(b)},f\rangle = \langle\mu,M_{s,t}^{(b)}f\rangle. \end{equation} \end{lem} A detailed proof for a similar result is given in~\cite{Gabriel2022} for weigthed measures and can be adapted to the present case. Yet we provide the main elements of the proof. \begin{proof} From~\eqref{eq:mild_const}, the properties of the semigroup $M_{s,t}^{(b)}$ and the monotone convergence theorem, we can easily show that for all increasing sequences $(f_n)_{n\in\mathbb{N}}\subset \mathcal{B}(\mathbb{R}_+)$ that converge pointwise to $f\in\mathcal{B}(\mathbb{R}_+)$, one has for all $x\geq 0$ and $t\geq 0$ \[ \lim_{n\to\infty}M_{s,t}f_n(x) = M_{s,t}f(x). \] This ensures that if $(A_n)_{n\in \mathbb{N}}$ is a countable sequence of disjoint Borel sets in $\Omega$, one has \[\mu M_{s,t}\left(\bigsqcup_{k=0}^\infty A_k\right)=\sum_{k=0}^\infty \mu M_{s,t}(A_k)\] for all $\mu \in \mathcal{M}_+(\Omega)$. The remaining two axioms for a positive measure come from the positivity of the semigroup and the uniqueness of the solution of Equation~\eqref{eq:mild_const}. By definition of $\mu M_{s,t}^{(b)}$, the identity $(\mu M_{s,t}^{(b)})f = \mu(M_{s,t}^{(b)}f)$ is clearly true for any simple function $f$. Since any nonnegative measurable function is the increasing pointwise limit of simple functions, it is also valid in $[0,\infty]$ for any nonnegative $f\in \mathcal{B}(\Omega)$. Decomposing $f\in \mathcal{B}(\Omega)$ as $f = f_+ - f_-$, the linearity of the semigroup ensures that the equality $(\mu M_{s,t}^{(b)})f = \mu(M_{s,t}^{(b)}f)$ is true for all $f\in\mathcal{B}(\Omega)$. \end{proof} For $t\geq s\geq 0$ we extend the definition of $\mu \mapsto \left(\mu M_{s,t}^{(b)}\right)_{t\geq s\geq0}$ to $\mathcal{M}(\mathbb{R}_+)$ by setting \[ \mu M_{s,t}^{(b)} := \mu_+ M_{s,t}^{(b)} - \mu_- M_{s,t}^{(b)}, \] and this extension clearly preserves the identity $\langle\mu M_{s,t}^{(b)},f\rangle = \langle\mu,M_{s,t}^{(b)}f\rangle$. \begin{prop} For any continuous function $b : \mathbb{R}_+ \mapsto \mathbb{R}$ bounded in supremum norm and $f\in\mathcal{B}(\mathbb{R}_+)$, there exists at least a family of Radon measures $(\mu_t^{(b)})_{t\geq 0}$ with initial condition $\mu$ satisfying \[ \mu_t^{(b)} f = \mu f + \int_0^t \langle\mu_s^{(b)}, \left(b(s)\mathcal A f\right)\rangle\d s. \] \end{prop} \begin{proof} For $f\in\mathcal{B}(\mathbb{R}_+)$ and $t\geq 0$, we write \[ M_{0,t}^{(b)}f = f + \int_0^t \partial_\sigma M_{0,s}^{(b)} f \d s = f + \int_0^t b(\sigma)M_{0,s}^{(b)}\mathcal A f \d \sigma. \] Integrating against $\mu$, interverting integrals, using~\eqref{identity} and taking the obtained identity at $s=0$, we obtain \[ \langle\mu M_{0,t}^{(b)},f\rangle = \langle \mu,f\rangle + \int_0^t \langle \mu M_{0,s}^{(b)},b(s)\mathcal A f\rangle \d s. \] so the family $t\mapsto \mu M_{0,t}^{(b)}$ satisfies the desired relation. \end{proof} \begin{theorem} There exists a unique solution $(\mu_t)_{t\geq0}$ to Equation~\eqref{eq:pde} in the sense of Definition~\ref{def:sol}. Additionally, denoting $\mu^{\mathrm{in}}$ the initial measure, one has \begin{itemize} \item[] $\|(\mu)\|_{[0,T]} \leq \|\mu^{\mathrm{in}}\|$, \item[] $\mu^{\mathrm{in}} \geq 0 \qquad \Rightarrow \qquad \forall t\geq 0,\, \mu_t \geq 0$. \end{itemize} \end{theorem} \begin{proof} We work in the space $\mathcal{C}([0,T];\mathcal{M}(\mathbb{R}_+))$, which is a Banach space when endowed with the norm \[ \|(\mu)\|_{[0,T]} := \sup_{t\in[0,T]} \|\mu_t\|. \] Let $\Pi : \mathcal{C}([0,T];\mathcal{M}(\mathbb{R}_+)) \to \mathcal{C}([0,T];\mathcal{M}(\mathbb{R}_+))$ defined by \[ \Pi : (\mu) \mapsto (\mu^{\mathrm{in}} M_{0,t}^{(\mu_\bullet([h,\infty)))})_{t\geq 0} \] with $\mu^{\mathrm{in}}$ the initial condition in Equation~\eqref{eq:meas_const}. We will show that this operator is a contraction. First, simple computations using Corollary~\ref{coro:semigroup} lead to \[ \|\left(\Pi(\mu)\right)\|_{[0,T]} \leq \|\mu^{\mathrm{in}}\|, \] so the operator $\Pi$ stabilizes the ball of radius $\|\mu^{\mathrm{in}}\|_{TV}$, and a fixed point would lie in this ball. In addition, it is enough to work with families of measures lying in this ball. Let $(\mu^1)$ and $(\mu^2)$ be such families. For $f\in \mathcal{B}(\mathbb{R}_+)$ and $t\geq 0$, the following inequality holds \[ \left|\left(\Pi(\mu^1)_t - \Pi(\mu^2)_t\right)f\right| \leq \|\mu^{\mathrm{in}}\| \left| \left(M_{0,t}^{(\mu^1_\bullet([h,\infty)))} - M_{0,t}^{(\mu^2_\bullet([h,\infty)))}\right)f \right|. \] We compute \begin{align*} &\left| \left(M_{0,t}^{(\mu^1_\bullet([h,\infty)))} - M_{0,t}^{(\mu^2_\bullet([h,\infty)))}\right)f \right| \leq \|f\|_\infty\left|\left(\mathrm e^{-\frac{2\eta}{3}\int_0^t \mu^1_s([h,\infty))\d s} - \mathrm e^{-\frac{2\eta}{3}\int_0^t \mu^2_s([h,\infty))(s)\d s}\right)\right| \\ & \qquad + \frac{2\eta}{3}\|f\|_\infty\left(\int_0^t \left|(\mu^1_s - \mu^2_s)([h,\infty))\right|\mathrm e^{-\frac{2\eta}{3}\int_s^t \mu^1_\sigma([h,\infty))\d \sigma}\d s \right.\\ &\qquad \qquad + \left.\int_0^t\left|\mu^2_s([h,\infty))\left(\mathrm e^{-\frac{2\eta}{3}\int_s^t \mu^1_\sigma([h,\infty))\d \sigma} - \mathrm e^{-\frac{2\eta}{3}\int_s^t \mu^2_\sigma([h,\infty))\d \sigma}\right)\right|\d s\right)\\ & \leq \frac{2\eta}{3}\|f\|_\infty \mathrm e^{\frac{2\eta}{3}\|\mu^{\mathrm{in}}\| T}\left(2 + \frac{2\eta}{3}\|\mu^{\mathrm{in}}\| \frac{T}{2}\right)T \|(\mu^1) - (\mu^2)\|_{[0,T]} \end{align*} from which we deduce \[ \|\left(\Pi(\mu^1)\right) - \left(\Pi(\mu^2)\right)\|_{[0,T]} \leq \frac{2\eta}{3} \mathrm e^{\frac{2\eta}{3}\|\mu^{\mathrm{in}}\| T}\left(2 + \frac{\eta}{3}\|\mu^{\mathrm{in}}\| T\right)T \|(\mu^1) - (\mu^2)\|_{[0,T]} \] so $\Pi$ is a contraction on $\mathcal{C}([0,T];\mathcal{M}(\mathbb{R}_+))$ for a final time $T$ small enough Due to the stabilization of the ball of radius $\|\mu^{\mathrm{in}}\|$, one can iterate the fixed point on $[T,2T]$, $[2T,3T]$... changing the initial condition each time. Finally, we obtain a unique fixed point of $\Pi$, globally defined, denoted $(\mu_t)_{t\geq 0}$. This fixed point satisfies, for all $f\in\mathcal{B}(\mathbb{R}_+)$, \begin{align*} \langle\mu_t,f\rangle = \langle \mu^{\mathrm{in}},M_{0,t}^{(\mu_\bullet([h,\infty)))}f\rangle &= \langle \mu^{\mathrm{in}},f + \int_0^t \mu_s([h,\infty))M_{0,s}^{(\mu_\bullet([h,\infty)))}\frac{\eta}{3}\mathcal A f\d s\rangle\\ &= \langle \mu^{\mathrm{in}},f\rangle + \int_0^t \langle \mu^{\mathrm{in}} M_{0,s}^{(\mu_\bullet([h,\infty)))},\mu_s([h,\infty))\frac{\eta}{3}\mathcal A f\rangle\d s \end{align*} and hence is a measure solution in the sense of Definition~\ref{def:sol}. From now on, we simply denote $\mu_t = \mu^{\mathrm{in}} M_{0,t}$. To prove the uniqueness of the solution, let $(\nu)$ be another measure solution with initial condition $\mu^{\mathrm{in}}$, thus satisfying \[ \langle\nu_t, f\rangle = \langle\mu^{\mathrm{in}}, f\rangle + \int_0^t \langle\nu_s, \nu_s([h,\infty))\frac{\eta}{3}\left(\mathcal A f\right)\d s\rangle. \] Now we compute \begin{align*} |(\mu_t - \nu_t)f| &\leq \int_0^t \left|\langle\mu_s - \nu_s,\mu_s([h,\infty))\frac{\eta}{3}\left(\mathcal A f\right)\rangle\right|\d s + \int_0^t \left| \langle\nu_s,\left(\mu_s([h,\infty)) - \nu_s([h,\infty))\right)\frac{\eta}{3}\mathcal A f\rangle\right|\d s \\ & \leq \frac{4\eta}{3}\|\mu^{\mathrm{in}}\|\|f\|_\infty\int_0^t \|\mu_s - \nu_s\|\d s \end{align*} and we conclude using Grönwall's lemma. Finally, to prove that for a nonnegative initial measure $\mu$, the measure solution at time $t$ is also nonnegative, we write, for $f\geq 0$ \[\langle\mu M_{s,t},f\rangle = \langle\mu,M_{s,t} f\rangle \geq 0\] by positivity of $M_{s,t}$ on $\mathcal{B}(\mathbb{R}_+)$. \end{proof} \section{Asymptotic behaviors\label{sec:asympt}} In the first subsection, we use a time rescaling to reduce the study of the asymptotic behavior of the nonlinear problem to one of a linear equation. In the second subsection, we study how the limit obtained, that depends heavily on $h$, behaves when this parameter vanishes. \subsection{Large time asymptotics} In this section, we only consider non negative initial measures such that $\mu^{\mathrm{in}}([h,\infty)) > 0$, otherwise for all $t\geq 0$, one has \[\|\mu_t - \mu^{\mathrm{in}} \mathcal{P}_h\| = 0\]and the inequality~\eqref{decay} is automatically statisfied. Let us recall that $(\mu_t)_{t\geq 0}$ denotes the unique measure solution to Equation~\eqref{eq:pde}. There exists a unique solution to Equation~\eqref{eq:mild} with $b = \mu_\bullet([h,\infty))$, simply denoted $f$. In order to obtain the asymptotic behavior in time of the measure solution, we introduce a rescaling in time of the (mild) dual equation, that is linear. Denote \[ \tilde{f}(t,y) := f(\psi(t),0,y) \] with $\psi$ so that $\psi(0) = 0$ and $\tilde{f}$ is solution of \begin{equation}\label{eq:fonda} \frac{\p}{\p t} \tilde{f}(t,y) = \left[\tilde{f}(t,y+h) + \tilde{f}(t,y-h) - 2\tilde{f}(t,y)\right]\mathds{1}_{[h,\infty)}(y), \end{equation} \textit{i.e.} $\psi$ satisfies \[ \psi'(t)\frac{\eta}{3}\mu_{\psi(t)}([h,\infty)) = 1. \] Denoting \[ \theta(t) = \frac{\eta}{3}\int_0^t \mu_s([h,\infty))\d s \] one has \[ \frac{\d}{\d t}\theta(\psi(t)) = 1. \] Since we take $\mu^{\mathrm{in}}$ non negative, by virtue of Lemma~\ref{prop:adj} and Corollary~\ref{coro:semigroup}, $\theta$ is increasing, and thus invertible. Taking $\psi = \theta^{-1}$ provides the desired rescaling. \\ Proposition~\ref{prop:adj} with $b(s) = \frac{3}{\eta}$ for all $s\geq 0$ ensures that there exists a unique solution to~\eqref{eq:fonda}. Denoting $f_0$ the initial condition, this solution can be expressed by mean of a (homoeneous in time) semigroup $(N_t)_{t\geq 0}$, \textit{i.e.} $\tilde{f}(t,\cdot) = N_t f_0$. Due to te rescaling relation, one has $M_{0,t}^{(\mu_\bullet([h,\infty))}f_0 = N_{\theta(t)}f_0$, thus one can deduce the asymptotic behavior of $(\mu_t)_{t\geq 0} = \left(\mu M_{0,t}\right)_{t\geq 0}$ from that of $(\mu N_t)_{t\geq 0}$. Taking advantage of its time homogeneity, one can apply Harris-type results, extracted from~\cite{Canizo2021}. To that extent, let us introduce some vocabulary. \\ A \textit{stochastic operator} is a linear operator $N : \mathcal{M}(\Omega) \to \mathcal{M}(\Omega)$ that preserves mass and positivity. A \textit{stochastic semigroup} on $\mathcal{M}(\Omega)$ is a family $(N_t)_{t\in[0,\infty)}$ of stochastic operators $N_t : \mathcal{M}(\Omega) \to \mathcal{M}(\Omega)$ such that $N_0 = Id$ and $N_t N_s = N_{t+s}$ for all $s,t \geq 0$. Finally, $(N_t)_{t\in[0,\infty)}$ is a \textit{stochastic semigroup} on $\mathcal{M}_V(\Omega)$ if it is a stochastic semigroup on $\mathcal{M}(\Omega)$ and satisfies a growth estimate \begin{equation}\label{stoch-semigrp} \|\mu N_t\|_V \leq C_V\mathrm e^{\omega_V t}\|\mu\|_V \end{equation} for all $\mu\in\mathcal{M}_V(\Omega)$ and all $t \geq 0$, and for some constants $C_V \geq 1, \omega_V \geq 0$. We may now state the theorem that we shall use to obtain the asymptotic behavior of the semigroup $(N_t)_{t\in[0,\infty)}$. \begin{theorem}[5.2 from \cite{Canizo2021}]\label{thm:Harris} Let $V : \Omega \to [1, \infty)$ be a measurable (weight) function and let $(N_t)_{t\geq 0}$ be a stochastic semigroup on $\mathcal{M}_V(\Omega)$. Assume that \begin{enumerate} \item the semigroup $(N_t)_{t\geq 0}$ satisfies the semigroup Lyapunov condition: there exists constants $\sigma, b > 0$ such that for all $t \geq 0$ and all $\mu \in \mathcal{M}_V(\Omega)$ \[\|\mu N_t\|_V \leq \mathrm e^{-\sigma t}\|\mu\|_V + \frac{b}{\sigma}(1-\mathrm e^{-\sigma t})\|\mu\|;\] \item for some $T > 0$, $N_T$ satisfies the local coupling condition: there exists $0 < \gamma_H < 1$ and $A > 0$ with $b/A < \sigma$ such that \[ \left(y,z\in \Omega, V(y) + V(z) \leq A\right) \Longrightarrow \|(\delta_y-\delta_z)N_T\|_{TV} \leq 2 \gamma_H. \] \end{enumerate} Then the semigroup has an invariant probability measure $\mu^* \in \mathcal{M}_V(\Omega)$ which is unique within measures of $\mathcal{M}_V(\Omega)$ with total mass $1$, and there exist $\lambda,C>0$ such that \[\|\mu N_t\|_V \leq C\mathrm e^{-\lambda t}\|\mu\|_V\] for all $\mu\in \mathcal{M}_V(\Omega)$ such that $\mu(\Omega) = 0$. \end{theorem} Now we obtain an exponential decay for $(N_t)_{t\geq 0}$ acting on meausures defined on a given class of wealth $\mathfrak{C}_x$. \begin{prop}\label{prop:decay_mu_class} Fix $x\in[0,h)$ and define the weight function $V$ on $\mathfrak{C}_x$ by $V(y) = 2 - \mathrm e^{-\alpha(x)y}$ with $\alpha(x) = \frac{2\log 2}{2x+h}$. Consider the action of $(N_t)_{t\geq 0}$ to $\mathcal{M}_V(\mathfrak{C}_x)$ and $\mathcal{B}_V(\mathfrak{C}_x)$. Then there exists $\lambda,C>0$ independant of $x$ and a unique invariant probability measure $\mu^*_x$ such that \[ \|\mu N_t - \mu^*_x\|_V \leq C\mathrm e^{-\lambda t} \|\mu - \mu^*_x\|_V. \] \end{prop} \begin{proof} First note for all $y\geq h$, one has $V(y-h) + V(y+h) \leq 2V(y)$. Since $1\leq V(y) \leq 2$, we readily obtain that $(N_t)_{t\geq 0}$ is well-defined on $\mathcal{M}_V(\mathfrak{C}_x)$. In addition, we compute for $y\geq h$ \begin{align*} N_tV(y) &= V(y)\mathrm e^{-2t} + \int_0^t \mathrm e^{-2(t-s)}\left[V(y+h)\frac{N_s V(y+h)}{V(y+h)} + V(y-h)\frac{N_s V(y-h)}{V(y-h)}\right]\d s \\ &\leq V(y)\mathrm e^{-2t}\left[1+\int_0^t 2\mathrm e^{2s}\|N_s V\|_V\d s\right] \end{align*} and deduce from it and Gronwall's Lemma that for all $t\geq 0$, one has $\|N_t V\|_V \leq 1$. It is then straightforward to obtain that $(N_t)_{t\geq0}$ is a stochastic semigroup on $\mathcal{M}_V(\mathfrak{C}_x)$ with $C_V = 1$ and $\omega_V = 0$. Now we prove that it satisfies a Lyapunov condition. Let $\mu\in\mathcal{M}_V(\mathfrak{C}_x)$ and $f\in\mathcal{B}_V(\mathfrak{C}_x)$. For any $\sigma > 0$, we easily obtain that $\mathcal A V + \sigma V \leq 2\sigma$, so $\mathcal A(V-2) \leq -\sigma(V-2)$ and by positivity of the semigroup $\partial_t N_t(V-2) \leq -\sigma N_t(V-2)$, so in turn $N_t(V-2) \leq \mathrm e^{-\sigma t}(V-2)$ using Gronwall's Lemma. This inequality provides \[N_t V \leq \mathrm e^{-\sigma t}V + 2(1-\mathrm e^{-\sigma t})\] that leads to the Lyapunov condition \[ \|\mu N_t\|_V \leq \mathrm e^{-\sigma t}\|\mu\|_V + 2(1-\mathrm e^{-\sigma t})\|\mu\|. \] We now turn to the local coupling condition. We can set $A = 3$ and consider the set of elements $y,z$ of $\mathfrak{C}_x$ such that $V(y) + V(z) \leq 3$. Let us explain how we chose this particular weight function, and to that extent temporarily consider a general $V(y) = 2 - \mathrm e^{-\alpha y}$ defined on $\mathfrak{C}_x$. We rewrite $y = x+k_1 h$ and $z = x + k_2 h$, and without loss of generality take $k_1 \leq k_2$. The previous condition is thus equivalent to $\mathrm e^{-\alpha k_1 h} + \mathrm e^{-\alpha k_2 h} \geq \mathrm e^{\alpha x}$. Now we tune $\alpha$ so that the aformentionned set only contains the pairs $(x,x)$ and $(x,x+h)$, corresponding to the conditions \[2\geq \mathrm e^{\alpha x}, \qquad 1 + \mathrm e^{-\alpha h} \geq \mathrm e^{\alpha x} \qquad \text{and} \qquad 2\mathrm e^{-\alpha h} < \mathrm e^{\alpha x}.\] When $x>0$, the first and third conditions lead to $\frac{\log 2}{x+h} < \alpha \leq \frac{\log 2}{x}$. Taking $\alpha$ as the harmonic mean of these two bounds, \textit{i.e.} \[\alpha(x) = \frac{2\log 2}{2x + h},\] fulfills these conditions, as well as the second one. In the case $x=0$, only the third is not automatically fulfilled, and it is equivalent to \[ \alpha > \frac{\log 2}{h} \] so the previous values also works. In this setting, in order to obtain the desired inequality, it is enough to study the total variation norm of $(\delta_x - \delta_{x+h})N_t = \delta_x - \delta_{x+h}N_t$. Let $f\in \mathcal{B}(\mathfrak{C}_x)$. One has \[ N_t f(x+h) = \frac{1-\mathrm e^{-2t}}{2}f(x) + f(x+h)\mathrm e^{-2t} + \int_0^t \mathrm e^{-2(t-s)}N_sf(x+2h)\d s \] so \[\|(\delta_x - \delta_{x+h})N_t\| \leq 2\frac{1+\mathrm e^{-2t}}{2}\] which gives a local coupling condition. To conclude, we note that the constants $\lambda$ and $C$ are explicitely given in term of the constants that appear in the two hypoteses of Theorem~\ref{thm:Harris}. In our case $\sigma$ is any positive real number, $b = 2\sigma$ and $A = 3$ so are independant of $x$. \end{proof} We now prove a dual version of the exponential decay of $(N_t)_{t\geq 0}$, seen as an operator acting on $\mathcal{B}_V(\mathfrak{C}_x)$ and identify the limit. \begin{prop Fix $x\in[0,h)$ and define the weight function $V$ on $\mathfrak{C}_x$ by $V(y) = 2 - \mathrm e^{-\alpha(x)y}$ with $\alpha(x) = \frac{2\log 2}{2x + h}$. Then there exists $\lambda,C>0$ such that \[ \|N_t f - f(x)\mathds 1_{\mathfrak{C}_x}\|_{\mathcal{B}_V(\mathfrak{C}_x)} \leq C\mathrm e^{-\lambda t} \|f - f(x)\mathds 1_{\mathfrak{C}_x}\|_{\mathcal{B}_V(\mathfrak{C}_x)} \] for all $f\in\mathcal{B}_V(\mathfrak{C}_x)$. \end{prop} \begin{proof} Let $k\in\mathbb{N}$. One has $\mathcal A\mathds{1}_{\{x\}}(x+kh) = \mathds{1}_{\{x+h\}}(x+kh)$, so for all $t\geq 0$ and $k\geq 1$, $\partial_t N_t\mathds{1}_{\{x\}}(x+kh) = N_t\mathds{1}_{\{x+h\}}(x+kh) \geq 0$. Since $N_t\mathds{1}_{\mathfrak{C}_x} = \mathds{1}_{\mathfrak{C}_x}$, the positivity of $N_t$ implies that $N_t\mathds{1}_{\{x\}}(x+kh)$ converges to $l_k \leq 1$ for all $k\in\mathbb{N}$. In particular, $l_0=1$, and the limit function satisfies \[0 \equiv \mathcal A\left(\sum_{k=0}^\infty l_k \mathds{1}_{\{x+kh\}}\right) = \sum_{k=0}^\infty l_k \mathcal A\mathds{1}_{\{x+kh\}} = \sum_{k=1}^\infty \left(l_{k+1} + l_{k-1} - 2l_k\right)\mathds{1}_{\{x+kh\}},\] so $l_k = 1$ for all $k\in\mathbb{N}$, and finally $N_t\mathds{1}_{\{x\}} \longrightarrow \mathds{1}_{\mathfrak{C}_x}$ as $t\to \infty$ for any starting time $s\geq0$. Now for any $f\geq 0$ such that $f(x+kh) \leq 1$ for all $k\in\mathbb{N}$, one has the inequalities \[\mathds 1_{\{x\}} \leq f \leq \mathds 1_{\mathfrak{C}_x},\] and since $N_t$ is a positive and conservative operator on $\mathfrak{B}(\mathfrak{C}_x)$ for all $t\geq À$, we obtain that for any such $f$, $N_tf$ converges pointwise toward $\mathds 1_{\mathfrak{C}_x}$. By linearity, for any nonnegative $f$ such that $f(x+kh) \leq f(x)$ for all $k\in\mathbb{N}$, the function $N_t f$ converges pointwise toward $f(x)\mathds 1_{\mathfrak{C}_x}$. Finally, for any $f\in\mathcal{B}_V(\mathfrak{C}_x)$, we modify the usual decomposition to obtain \[f = f_+ - f_- = (f_+ + \|f\|_{\mathcal{B}_V(\mathfrak{C}_x)} \mathds 1_{\{x\}}) - (f_- + \|f\|_{\mathcal{B}_V(\mathfrak{C}_x)} \mathds 1_{\{x\}}),\] and deduce that $N_t f$ converges pointwise toward $(f_+(x) + \|f\|_\infty)\mathds 1_{\mathfrak{C}_x} - (f_-(x) + \|f\|_\infty)\mathds 1_{\mathfrak{C}_x}$, that is $f(x)\mathds 1_{\mathfrak{C}_x}$. \\ Now taking the dual version of the inequality from Proposition~\ref{prop:decay_mu_class} applied on $\mu - \mu^*_x$ with $\mu(\mathfrak{C}_x)=1$ provides \[\|N_t f - \langle \mu^*_x,f \rangle\|_{\mathcal{B}_V(\mathfrak{C}_x)} \leq C\mathrm e^{-\lambda t} \|f - \langle \mu^*_x,f \rangle\|_{\mathcal{B}_V(\mathfrak{C}_x)}\] and it remains to identify the invariant measure. From this inequality and the pointwise convergence, we obtain that $\langle \mu^*_x,f \rangle = f(x)$ for all $f\in\mathcal{B}_V(\mathfrak{C}_x)$, \textit{i.e.} $\mu^*_x = \delta_x$. \end{proof} Of note, the idea to decompose a function $f$ as such on $\mathfrak{C}_x$ is inspired by the framework developped in~\cite{Mukhamedov2022} and previous related articles, in a first attempt to apply those results to the present problem. \\ We are now ready to provide a result on exponential decay for the semigroup $(N_t)_{t\geq 0}$ acting on $\mathcal{M}(\mathfrak{C}_x)$. \begin{prop}\label{prop:decay_mu_N} Let $V(y) = 2 - \mathrm e^{-\tilde{\alpha}(y)y}$ with $\tilde{\alpha}(y) := \frac{2\log 2}{2 mod(y,h) + h}$. Then there exists constants $\lambda,C>0$ and a projector operator $\mathcal{P}_h$ acting on $\mathcal{M}_V(\mathbb{R}_+)$ such that \ \|\mu N_t - \mu\mathcal{P}_h\|_V \leq C\mathrm e^{-\lambda t} \|\mu - \mu\mathcal{P}_h\|_V \] for all $\mu\in\mathcal{M}_V(\mathbb{R}_+)$ with $\mathcal{P}_h$ as stated in Theorem~\ref{thm:main}. \end{prop} \begin{proof} We define the projection operator $\mathcal{P}_h$ by \[ \mathcal{P}_h:\left\{\begin{array}{l} \mathcal{B}(\mathbb{R}_+) \to \mathcal{B}(\mathbb{R}_+) \vspace{4mm}\\ f \mapsto \sum_{x\in [0,h)}f(x)\mathds{1}_{\mathfrak{C}_x} \end{array}\right. \] Using the fact that any $f\in\mathcal{B}_V(\mathbb{R}_+)$ can be written as \[f = \sum_{x\in[0,h)} f_{|\mathfrak{C}_x},\] we compute \begin{align*} \|N_t f - \mathcal{P}_hf\|_{\mathcal{B}_V(\mathbb{R}_+)} &= \sup_{x\in [0,h)} \|N_t f_{|\mathfrak{C}_x} - \mathcal{P}_hf_{|\mathfrak{C}_x}\|_{\mathcal{B}_V(\mathfrak{C}_x)}\\ &\leq \sup_{x\in [0,h)} C\mathrm e^{-\lambda t}\|f_{|\mathfrak{C}_x} - \mathcal{P}_hf_{|\mathfrak{C}_x}\|_{\mathcal{B}_V(\mathfrak{C}_x)}\\ &\leq C\mathrm e^{-\lambda t}\|f - \mathcal{P}_hf\|_{\mathcal{B}_V(\mathbb{R}_+)}. \end{align*} The decay in weighted total variation norm is proved by taking the dual estimate of this last inequality. It remains to make explicit the action of $\mathcal{P}_h$ on measures. It is clear that on the space of function, it repeats the pattern of $f$ on $[0,h)$ on each interval $[kh,(k+1)h)$. The Riesz representation theorem states that for every measure $\mu\in \mathcal{M}(\mathbb{R}_+)$, one can define a measure denoted $\mu\mathcal{P}_h$ such that for all $f\in\mathcal{B}(\mathbb{R}_+)$ one has $\langle \mu\mathcal{P}_h,f\rangle = \langle \mu,\mathcal{P}_h f\rangle$. Now for any measurable set $A\subset[h,\infty)$, the definition of the operator $\mathcal{P}_h$ provides \[(\mu\mathcal{P}_h)(A) = \langle \mu, \mathcal{P}_h(\mathds 1_A)\rangle = 0\] so $\mathrm{supp \,} \mu\mathcal{P}_h \subset [0,h)$ for any measure $\mu$. In contrast, for a measurable set $A\in[0,h)$, let us first recall that we denote \[ A + kh = \left\{y\in\mathbb{R}_+\,:\, \exists x\in A,\, y = x + kh\right\}. \] Then one has \[\mu\mathcal{P}_h(A) = \left\langle \mu,\sum_{x\in[0,h)} \mathds 1_A(x)\mathds{1}_{\mathfrak{C}_x} \right\rangle = \left\langle \mu,\sum_{x\in A} \mathds{1}_{\mathfrak{C}_x} \right\rangle = \left\langle \mu,\sum_{k=0}^\infty \mathds 1_{A+kh} \right\rangle = \sum_{k=0}^\infty \mu\left(A + kh\right)\] and the claim on $\mathcal{P}_h$ is proved. \end{proof} We are now ready to prove the main result of this paper. \begin{proof}[Proof of Theorem~\ref{thm:main}] Since $\mu_t = \mu M_{0,t} = \mu N_{\theta(t)}$, Proposition~\ref{prop:decay_mu_N} states that \[\|\mu_t - \mu^{\mathrm{in}} \mathcal{P}_h\|_V \leq C\mathrm e^{-\lambda \theta(t)}\|\mu^{\mathrm{in}} - \mu^{\mathrm{in}} \mathcal{P}_h\|_V.\] Using the estimate \[ \mu_t([h,\infty)) \geq \frac{\mu^{\mathrm{in}}([h,\infty))}{1+\frac{\mu^{\mathrm{in}}([h,\infty))\eta}{3}t}, \] provided in~\cite[Proposition 3]{Duteil2021}, we obtain that \[\theta(t) \geq \log\left(1+\frac{\eta \mu^{\mathrm{in}}([h,\infty))}{3}t\right)\] and then easily reach the claimed statement. \end{proof} We shall now give the limit $\mu \mathcal{P}_h$ on some examples. Any measure having a density of the forme $\mathds{1}_{[kh,(k+1)h)}$ with respect to the Lebesgue measure on $\mathbb{R}_+$ has the same limit in large time $\mathds{1}_{[0,h)}$. Now let considere $\alpha >0$ and an exponential distribution $\mu$ with parameter $\alpha$, namely a measure with density $f(y) = \alpha\mathrm e^{-\alpha y}$ with respect to the Lesbesgue measure. Then for $0\leq a < b < h$, we compute \begin{align*} \mu \mathcal{P}_h([a,b)) &= \sum_{k=0}^\infty \int_{a + kh}^{b+kh} \lambda \mathrm e^{-\alpha y}\d y \\ & = \sum_{k=0}^\infty \left(\mathrm e^{-\alpha(a+kh)} - \mathrm e^{-\alpha(b+kh)}\right)\\ & = \frac{\mathrm e^{-\alpha a} - \mathrm e^{-\alpha b}}{1 - \mathrm e^{-\alpha h} \end{align*} and thus for all $f\in\mathcal{B}(\mathbb{R}_+)$, one has \[\langle\mu\mathcal{P}_h,f\rangle = \frac{\mu\left(f_{|[0,h)}\right)}{\mu([0,h))},\] that is to say that $\mu\mathcal{P}_h$ is an exponential distribution truncated on $[0,h)$. \begin{remark} It is worth noticing that we cannot expect a convergence in the space $\mathcal{M}_{1+Id}(\mathbb{R}_+)$. Indeed, considere the space of Borel functions on $\mathbb{R}_+$ that satisfy \[ \sup_{y\in\mathbb{R}_+} \frac{|f(y)|}{1+y} < \infty. \] Computing formally the total wealth at the limit in time $\langle\mu\mathcal{P}_h,Id\rangle$ for a nonnegative measure $\mu\in \mathcal{M}_{1+Id}(\mathbb{R}_+)$, we obtain \[\langle\mu,\mathcal{P}_h Id\rangle = \sum_{k=0}^\infty \int_{kh}^{(k+1)h}(y-kh)\d \mu(y) = \langle\mu,Id\rangle - h\sum_{k=0}^\infty k\mu([kh,(k+1)h))\] so if $\mu([h,\infty)) > 0$, the total wealth in large time is strictly smaller than the total wealth at any finite time. This loss of wealth forbids a convergence in the space of measure with weight $1+Id$. However, we can provide an interpretation to this equality. The term \[h\sum_{k=0}^\infty k\mu([kh,(k+1)h))\] corresponds to the wealth lost by players who reach an absorbing state (\textit{i.e.} wealth smaller than $h$) and is kept by the infinitely small proportion of the population who are infinitely rich. \end{remark} \subsection{Behavior of the asymptotic measure when the exchange parameter $h$ vanishes} In~\cite{Duteil2021}, the authors studied the behavior as $h$ vanishes of Equation~\eqref{eq:pde} under the diffusive scaling. Here, we give a short result on what happens when $h$ vanishes, once the limit in large time is taken. \begin{prop} Denoting $\mathcal{P}_0$ the function defined on $M(\mathbb{R}_+)$ by $\mu\mathcal{P}_0 = \mu(\mathbb{R}_+)\delta_0$, one has \[ \normiii{\mathcal{P}_h - \mathcal{P}_0}_{BL^*} \leq h. \] \end{prop} \begin{proof} Let $f\in\mathcal{C}^1(\mathbb{R}_+)$ with $\|f\|_{BL(V)}\leq 1$. The function $y\mapsto \mathcal{P}_hf(y) - f(0)$ is $h-$periodic so \[\left|\mathcal{P}_hf - \mathcal{P}_0f\right|\leq \|f\|_{BL(V)}|x-0|\leq h.\] We deduce that for $\mu\in BL^*(V)$ one has $\|\mu\mathcal{P}_h - \mu\mathcal{P}_0\|_{BL^*(V)} \leq h\|\mu\|_{BL^*(V)}$ and the proof is easily completed from here. \end{proof} Of note, the rate $h$ is not optimal. Indeed, continuating our previous examples, we obtain for $\d \mu(x) = \alpha\mathrm e^{-\alpha x}\d x$ that \[ \|\mu\mathcal{P}_h - \mu\mathcal{P}_0\|_{BL^*(V)} \leq \frac{\alpha}{1-\mathrm e^{-\alpha h}}\frac{h^2}{2} \sim_{h\to 0} \frac{h}{2}, \] which is independant of the parameter $\lambda$. For $\d \mu(x) = \mathds 1_{[0,h)}$, we obtain a quadratic decay \[ \|\mu\mathcal{P}_h - \mu\mathcal{P}_0\|_{BL^*(V)} \leq \frac{h^2}{2}. \] \section{Numerical illustrations\label{sec:num}} In this section, we take advantage of the cases in which the limit is easily written to study the rate of convergence. In all our examples, we take $h=0.5$. We used a first order finite differences schemeto discretize the PDE, and the Simpson quadrature method to compute $\mu_t([h,\infty))$ at each step. The particular form of Equation~\eqref{eq:pde} enables to increase the time step as $\mu_t([h,\infty))$ vanishes in time. The weight function is depicted on Figure~\ref{fig:weight}. \begin{figure} \centering \includegraphics[width=\textwidth]{weight.png} \caption{\label{fig:weight}The discontinuous weight function $V$. The dots represent the points on which $V$ is left continuous only, \textit{i.e.} the multiples of $h$.} \end{figure} \subsection{Parameters $\lambda$ and $C$} Following the lines of~\cite{Canizo2021}, we give exact values for the parameters $\lambda$ and $C$. In this paper, the authors obtain an exponential decay for a semigroup $(N_t)_{t\geq 0}$ by applying Harris' theorem to the operator $N_T$, \textit{i.e.} at a certain time $T>0$. The constants are then given by \[ C(T) := \frac{C_V \mathrm e^{\omega_V T}}{\gamma}\frac{1+\beta}{\beta}, \qquad \lambda(T) := -\frac{\log \gamma}{T} >0, \] with $C_V$ and $\omega_V$ from~\eqref{stoch-semigrp} and $\beta$ and $\lambda$ obtained as follows. First, $\beta$ is the unique positive root of \[ K\beta^2 + \left(\gamma_H - \gamma_L - K\left(1-\frac{1}{A}\right)\right)\beta + \gamma_H - 1 = 0, \] with $\gamma_L$ and $K$ given by the Lyapunov condition and $A$ and $\gamma_H$ by the local coupling condition. In turn, we can obtain \[ \gamma = \max \left\{\gamma_H + \beta K, 1 - \frac{\beta}{1 + \beta}(1 - \gamma_L - K/A)\right\} \] and then can compute the coefficients $C$ and $\lambda$. \\ In our case, recall first that we have $C_V = 1$ and $\omega_V = 0$. The other constants are \begin{itemize} \item[] $\gamma_L(T) = \mathrm e^{-\sigma T}$ \item[] $K(T) = 2(1 - \mathrm e^{-\sigma T})$ \item[] $\gamma_H(T) = \frac{1 + \mathrm e^{-2 T}}{2}$ \item[] $A = 3$ \end{itemize} with $\sigma > 0$ and $T>0$ to be fixed. The choice $\sigma=2$ makes the computations dramatically easier, and leads to \[ \beta = \frac{\sqrt{265} - 11}{24} \simeq 0.21995, \qquad \gamma(T) = 1 - B\left(1-\mathrm e^{-2T}\right) \] with $B:=\frac{\beta}{3(1+\beta)}$ and finally \[ \lambda(T) = -\frac{\log \left(1 - B\left(1-\mathrm e^{-2T}\right)\right)}{T}. \] We easily see that the function $\gamma$ is decreasing, and fortunately so is $\lambda$. To see it, we first compute its derivative \[ \lambda'(T) = \frac{1}{T^2}\left[\frac{2BT\mathrm e^{-2T}}{1 - B\left(1-\mathrm e^{-2T}\right)} + \log \left(1 - B\left(1-\mathrm e^{-2T}\right)\right)\right] \] so $\lambda'(T) \leq 0$ is equivalent to \[ \frac{2BT\mathrm e^{-2T}}{1 - B\left(1-\mathrm e^{-2T}\right)} \leq -\log \left(1 - B\left(1-\mathrm e^{-2T}\right)\right). \] Since $-\log(1-X) \geq X$ for any $X\leq 1$, it is enough to prove that \[ \frac{2BT\mathrm e^{-2T}}{1 - B\left(1-\mathrm e^{-2T}\right)} \leq B\left(1-\mathrm e^{-2T}\right), \] which is equivalent to \[ g_1(T) := (1+2T)(1-\mathrm e^{-2T}) - B(1-\mathrm e^{-2T})^2 - 2T \geq 0. \] One can show that $g_1'(T) \geq 0$ is equivalent to $T \geq B(1-\mathrm e^{-2T})$. Now we set $g_2(T) := T - B(1-\mathrm e^{-2T})$. On the one hand, one has $g_1(0) = g_2(0) = 0$, and on the other \[ g_2'(T) \geq 0\, \Longleftrightarrow\, T \geq \frac{\log 2B}{2} \] which is true. Thus, $g_2(T) \geq 0$ for all $T\geq 0$, and in turn $g_1(T) \geq 0$ for all $T\geq 0$, so finally $T\mapsto \lambda(T)$ is decreasing. \\ \textit{In fine}, one can take the infimum on $T$ for $C(T)$ and the supremum for $\lambda(T)$ to obtain \[ C := \frac{1+\beta}{\beta} = \frac{\sqrt{265} + 13}{\sqrt{265} - 11} \simeq 5.5465, \qquad \lambda := \frac{2}{3C} \simeq 0.1202. \] \subsection{Square functions} The first and simpler case is square functions. We considere three cases with the same asymptotic measure, in order to compare their decay to this measure. More precisely, we take initial (probability) measures with density respectively \begin{enumerate} \item $\frac{1}{h}\mathds 1_{[h,2h)} = 2\mathds 1_{[0.5,1)}$ \item $\frac{1}{h}\mathds 1_{[4h,5h)} = 2\mathds 1_{[2,2.5)}$ \item $\frac{1}{h}\mathds 1_{[8h,9h)} = 2\mathds 1_{[4.5,5)}$ \end{enumerate} with respect to the Lebesgue measure. In each case, one has $\mu^{\mathrm{in}}([h,\infty)) = 1$, so the decay rate in the right hand side of~\eqref{decay} is equal. The very small difference that can be seen between the lines on Figure~\ref{fig:subgeom_decay_cren} is explained by the sligth difference in $\|\mu - \mu\mathcal{P}_h\|_V$ coming from the fact that the weight function $V$ is not constant. \begin{figure} \centering \includegraphics[width=\textwidth]{subgeometric_decay_creneaux.png} \caption{\label{fig:subgeom_decay_cren}Loglog plot of the decay of the terms in both sides of~\eqref{decay} for square functions as initial distributions. The simulations were stopped when the quantity $\|\mu_t - \mu \mathcal{P}_h\|_V$ reached $5\%$ of its initial value. Stars: weighted norm of the difference between $\mu_t$ and $\mu\mathcal{P}_h$. Lines: decay rate times the initial difference in weighted norm. Blue: $\mu^{\mathrm{in}} = 2\mathds 1_{[0.5,1)}$. Red: $\mu^{\mathrm{in}} = 2\mathds 1_{[2,2.5)}$. Yellow: $\mu^{\mathrm{in}} = 2\mathds 1_{[4.5,5)}$.} \end{figure} \subsection{Exponential probability distribution} The next case is exponential probability distribution, namely initial measures with density with respect to the Lebesgue measure of the form $x\mapsto \alpha \mathrm e^{-\alpha x}$. We will take $\alpha = 0.25$, $1$ and $4$. One has $\mu^{\mathrm{in}}([h,\infty)) = 1 - \mathrm e^{-\alpha h}$, and thus unlike the previous case of square functions we considere, this quantity depends on the initial measure. This fact is illustrated on Figure~\ref{fig:subgeom_decay_exp} on which the lines are distinct (to be compared to the ones on Figure~\ref{fig:subgeom_decay_cren}). \begin{figure} \centering \includegraphics[width=\textwidth]{subgeometric_decay_exponentielles.png} \caption{\label{fig:subgeom_decay_exp}Loglog plot of the decay of the terms in both sides of~\eqref{decay} for exponential initial distributions. The simulations were stopped when the quantity $\|\mu_t - \mu \mathcal{P}_h\|_V$ reached $5\%$ of its initial value. Stars: weighted norm of the difference between $\mu_t$ and $\mu\mathcal{P}_h$. Lines: decay rate times the initial difference in weighted norm. Blue: $\alpha = 4$. Red: $\alpha = 1$. Yellow: $\alpha = 0.25$.} \end{figure} \section{Conclusion and further works\label{sec:con}} In this work, we investigated the wellposedness and long-time behavior of a mean-field model proposed in~\cite{Duteil2021}. It describes a large population of players that meet, make transcient pairs and then possibly exchange money, depending on the result of a rock-paper-scissors game in which both players select their strategies uniformly at random. The resulting equation is a non local integrodifferential equation that is non linear and solved in a measure setting by mean of duality, after solving the adjoint equation and express its solution as a semigroup acting on an initial condition is the space of functions. Taking advantage of this duality approach, we could provide a precise description of the asymptotic behavior of the solution, that has a subgeometric decay rate with coefficients explicitely computed. \\ A possible continuation of this paper would be to obtain optimal constants for the decay rate. Indeed, the choice $\sigma=2$ cancelled most of the dependance in $T$ in the coefficients appearing in the computations of the constants $C$ and $\lambda$. Figures~\ref{fig:subgeom_decay_cren} and~\ref{fig:subgeom_decay_exp} suggest that there is room for improvement. Other approaches to improve these constants could be finding a better lower bound for $\mu_t([h,\infty))$ or improving the constants in the local coupling condition. \\ One might also go further in the transposition in the measure setting of the results from~\cite{Duteil2021}. Indeed, it seems unclear at the moment how the diffusive scalling introduced in the aforementionned article would interact with the definition of measure solution we adopted in the present paper. In addition, the asymptotic behavior of the resulting equation would enable to know if the diagram depicted on Figure~\ref{fig:diag} is `commutative'. Such theoretical work con benefit from its numerical counterpart. Indeed, providing an asymptotic preserving scheme (in $h$) that is also able to capture the dynamics in large time would be alone an interesting challenge, ans in turn give clues about the expected theoretical behavior to expect. \begin{figure} \begin{center} \begin{tikzcd} (\mu_t)_{t\geq0} \arrow["t\to \infty"]{r} \arrow["diffusive\, scaling \;"',dotted]{d}{h\to 0}\& \mu_0 \mathcal{P}_h \arrow["h\to 0"']{d}{} \\ ? \arrow["t\to \infty", dotted]{r} \& \mu_0 (\mathbb{R}_+) \delta_0 \end{tikzcd} \end{center} \caption{\label{fig:diag}(Commutative?) Diagram of the involved asymptotic behaviors. The top and right arrows are the subject of the present paper in the measure setting, while the left arrow was studied in~\cite{Duteil2021} in a $\mathrm{L}^1$ setting.} \end{figure} \\ Another way to pursue this work might be to propose and study variants on the present model. First, one might obviously change the rules to exchange money once the transcient pairs are formed. The classical \textit{matching pennies} game for instance would almost not modify the equation, leading to a mere change of a $3$ into a $2$ in the decay rate. A more interesting situation would result from such a zero-sum game in which the optimal strategy is not a uniform mixed strategy. One may also change the meeting and pair-making rules, for example imposing that a player can only initiate a game with another player that has a similar wealth, in the spirit of bounded confidence in opinion formation models~\cite{Deffuant2000,Pinasco2017}. \\ The `concentration' effect in large time was already noted in~\cite{Duteil2021}. An interesting goal might be to add an extra term in the PDE in order to avoid it. This could be done by mean of a transport term, that might be negative for the wealthiest players (\textit{i.e.} taxes) and positive for the poorest (\textit{i.e..} social welfare). Such modification in the model would appeal for a dramatic change in the proofs, since we crucially used the fact that players remain in the same 'class of wealth' at any time. It seems likely that the asymptotic measure would be supported on a set larger than $[0,h)$. Particular choices of the `taxes and welfare parameters' might possibly lead to a dynamical equilibrium, in the spirit of~\cite{BDG,Gabriel2022}. \\ Finally, a classical yet necessary complementary work would be to derive the mean-field equation from an agent based model. We might expect from such a model a dynamic similar to the one happeing in gambler's ruin type situation, except in this case a single player would own most of the money. This feature does not occure in the mean-field equation, and it would be interesting to understand where precisely it becomes impossible as the number of agents goes to infinity. \section*{Acknowledgments} The author is very grateful to Nastassia Pouradier Duteil for fruitful discussions on this problem and critical reading of the first manuscript. \printbibliography \end{document}
\section{Introduction} Observing the Brownian motion of colloidal probe particles can be used to investigate complex fluids, soft materials or biological tissues \cite{larson_structure_1999,squires2010fluid,puertas_microrheology_2014,furst_microrheology_2017}. The technique of 'microrheology' provides insight into local material properties and thus extends macrorheological investigations. Recently, such investigations tracking colloidal probe particles were performed in model complex fluids, where the macroscopic rheological response is rather well characterized. An example are wormlike micellar solutions, for which local flow curves, i.e.~nonlinear force-velocity relations~\cite{gomez-solano_probing_2014,jain2021two}, particle oscillations during shearing~\cite{Berner2018,jain2021two,jayaraman_oscillations_2003,handzy_oscillatory_2004} and transient particle motion \cite{Gomez-Solano2015-qu,Ginot2022recoil} were investigated. The existence of a number of different relaxation channels for the probe motion was recorded, which could be considered an intrinsic property of the system of viscoelastic fluid plus immersed colloidal particle. In contrast, in dense colloidal suspensions \cite{wilson_microrheology_2011,harrer_force-induced_2012,gazuz_active_2009,Squires2005}, a delocalization transition at finite forcing strength was discovered \cite{senbil_observation_2019}. At a critical force, the probe decouples from the surroundings and its motion records very atypical bath particle fluctuations. The friction force experienced by an individual Brownian particle and the velocity by which it moves relative to a Newtonian solvent are related by a friction coefficient $\gamma$. Alternatively, the velocity the particle attains when subject to a force can be written in terms of a mobility $\mu$. For the mentioned case of Newtonian solvent, mobility and friction coefficients are each other's inverses and are also connected to the diffusion coefficient via temperature in the famous Stokes-Einstein-Sutherland relation $D_0=k_{B}T \mu=\frac{k_{B}T}{\gamma}$; here $k_B$ is Boltzmann's constant \cite{Dhont}. In viscoelastic fluids, where memory matters, it is well known that both coefficients generalize to time-dependent (retarded) kernels whose time-dependence encodes the temporal correlations of the fluid \cite{hansen2013theory,gotze2009complex}. Rearrangements of the fluid take longer with e.g.~increasing concentration and thus forces at earlier times still influence the velocity at the present time. A similar memory of motion at earlier times also affects the friction force at present. Regarding the Einstein relation, the kernels are then in general no longer related~\cite{Squires2005, saito_complementary_2017}, not even at zero frequency, i.e., large times. For example, the friction memory kernel may depend on the confinement of a probe particle~\cite{daldrop_external_2017,Kowalik2019,muller_properties_2020,basu_dynamics_2022}. There is so far no complete understanding how the time-dependencies of mobility and friction kernels are related. Recent microrheology experiments of colloidal probes in worm-like micellar solutions indicated that recoil spectra could provide crucial insights \cite{Gomez-Solano2015-qu,Ginot2022recoil}. It is known that such micellar solutions in the semi-dilute regime are well described by a Maxwell model with a single timescale \cite{Rehage1988,Spenley1993,Berret1997,cates1990statics}; at higher concentrations more complex relaxation behavior can occur~\cite{Jeon_2013,baiesi2021}. The Maxwell model captures the memory on macroscopic scales such as macrorheological measurements. Moreover, previous works could systematically fit the equilibrium Brownian motion, for example the mean squared displacement, of immersed colloids to Maxwell's model with a single relaxation time \cite{Ginot2022recoil,Gomez-Solano2015-qu,Ginot2022,van_zanten_brownian_2000,lu_probe_2002,vandergucht2003}. Yet, 'recoil' measurements, which test the back-motion of the colloidal probe when released after it was moved with optical tweezers, recorded a very different temporal evolution. Most notably, the recoil dynamics exhibit at least two timescales, with the faster one being much shorter than Maxwell's macroscopic relaxation time~\cite{Gomez-Solano2015-qu}. Experiments of partial loading and partial relaxation (close to equilibrium) showed the same two timescales, which generates the question how recoil and equilibrium mean squared displacement are related. In the present work, we build on these findings and study equilibrium mean squared displacements of a probe and its recoils after weak drivings. Applying concepts from linear response theory enables us to determine the relation between the two experiments. We will find that one (the equilibrium mean squared displacement) is dominated by the retarded friction kernel, whose integral grows strongly with density, while the other (recoils) provides direct access to the mobility kernel. Analysing two theoretical models, this explains the differing behaviors recorded in either experiments. The manuscript is organized as follows: we start with the derivation of a linear response relation between recoil and MSD in section~\ref{chap:LinearResponse}. In section~\ref{chap:ExperimentalSetup} we introduce the experimental system and in section~\ref{chap:ExperimentalComparison} compare experimental MSD and experimental recoil, i.e.~test the linear response relation. The analysis of two theoretical models, a linear two-bath particle model and mode coupling theory, is presented in section~\ref{chap:ViscoelasticModels}. In section~\ref{chap:Discussion} we discuss the relation between these two models and explain the observed concentration-dependence of recoil and MSD. \section{Linear response relation between recoil and MSD}\label{chap:LinearResponse} \begin{figure} \centering \includegraphics{figures/Fig1.pdf} \caption{Left: Sketch of transient recoil experiment (gray line) after a colloidal probe particle in a complex fluid was perturbed with force $F$ (red line), applied e.g. with optical tweezers (inset), for a time $t_\text{sh}$. Right: Equilibrium mean squared displacement (MSD) of a colloidal particle in a wormlike micellar solution (CPyCl/NaSal \SI{7}{\milli \Molar}, open blue symbols). The two experiments are related via a linear response relation. } \label{fig:F1} \end{figure} In this work we theoretically and experimentally study the motion of a colloidal probe particle in a viscoelastic fluid, namely a wormlike micellar solution, keeping in mind that the theoretical analysis is valid for other viscoelastic fluids, such as dense colloidal suspensions, as well. Specifically, we are interested in the experimental setups depicted in Fig.~\ref{fig:F1}. Its left panel shows so called recoils, where the particle is dragged by a force for a certain amount of time, and is then released at time $t=0$. Due to the deformed microstructure and accumulated strain in the viscoelastic fluid, after releasing, the particle performs a backward motion opposite to the direction of the forced motion. We define the (positive) recoil $\delta x(t)$ as \begin{align} \delta x(t) \equiv - \left[ \av{x(t)} - \av{x(0)} \right], \label{eq:recoil_definition} \end{align} with $\langle\dots\rangle$ denoting averaged quantities. The right hand side of Fig.~\ref{fig:F1} shows the mean squared displacement $\delta x^2 (t) \equiv \av{[x(t)-x(0)]^2}_\text{eq}$~\cite{hansen2013theory}, obtained in absence of any driving. Here, we derive a relation between these quantities. This derivation is explicit, based on a microscopic system of identical spherical particles, obeying overdamped dynamics~\cite{Dhont}. However, the final equation, Eq.~\eqref{eq:RecoilMSDF}, encodes the general form of the fluctuation-dissipation-theorem (FDT)~\cite{hansen2013theory}, and is thus valid in more general settings. One of the particles is considered as probe particle. The free diffusion coefficient is $D_0=k_B T/\gamma$ and the particles interact via forces $\mathbf{F}_i = - \mathbf{\partial}_i V$ where quantities without index, such as $\mathbf{F} = - \mathbf{\partial} V$, refer to the probe particle, and $\mathbf{\partial}$ is a spatial gradient. Perturbing the probe with a small time-dependent force $\mathbf{F}_\text{ex}(t)$, leads to the Smoluchowski operator \cite{Dhont} \begin{equation} \Omega(t) = \Omega_\text{eq} + \frac{D_0}{k_{B}T}\mathbf{F}_\text{ex}(t) \cdot (-\mathbf{\partial})\;. \end{equation} The solution for the probability density is split in a similar fashion \begin{equation} \Psi(t) = \Psi_\text{eq} + \delta\Psi(t)\;, \end{equation} where $\Psi_\text{eq} \propto \exp(-V/k_{B}T)$ and $\delta \Psi$ arises from $\mathbf{F}_\text{ex}$. This results in the linearized Smoluchowski equation for the deviation of the probability distribution \begin{equation} \partial_t \delta\Psi(t) = \Omega_\text{eq} \delta\Psi(t) - \frac{D_0}{k_{B}T}\mathbf{F}_\text{ex}(t)\cdot\mathbf{\partial}\Psi_\text{eq} + \mathcal{O}(F_\text{ex}^2)\;. \end{equation} The solution is (with $\beta = 1/k_{B}T$) \begin{equation} \delta\Psi(t) = - \frac{\beta}{\gamma} \int_{-\infty}^t dt' \mathbf{F}_\text{ex}(t') \cdot e^{(t-t')\Omega_\text{eq}} \mathbf{F} \Psi_\text{eq}\;. \end{equation} Using this to calculate the linear response of an observable $A$ to the external force we obtain a form, which may be familiar from the fluctuation dissipation theorem, \begin{equation} \av{A(t)}^{\text{lr}} = \av{A}_\text{eq} - \frac{\beta}{\gamma} \int_{-\infty}^t dt' \mathbf{F}_\text{ex}(t') \cdot \av{ \mathbf{F} e^{(t-t')\Omega_\text{eq}^\dagger} A}_\text{eq}. \end{equation} In this isotropic system, we assume, without loss of generality, the external force to point in $x$-direction. We are interested in the displacement of the particle $\av{x(t)}^{\text{lr}}$, linear in applied force. For symmetry reasons, only its $x$ component is finite. Taking its time derivative results in the application of the Hermitian conjugate $\Omega^\dagger$ of the Smoluchowski operator on the variable $x$. We obtain \begin{align} \partial_t \av{x(t)}^{\text{lr}} = \gamma^{-1} F_\text{ex}(t) - \int_{-\infty}^t dt' \gamma^{-1} F_\text{ex}(t')M(t-t'), \label{eq:MobilityKernelEq} \end{align} where \begin{equation} M(t-t') = D_0 \av{\beta F_x e^{(t-t')\Omega_\text{eq}^\dagger} \beta F_x}_\text{eq}\label{eq:M} \end{equation} is the \emph{mobility-kernel}, the correlation of interaction force felt by the probe particle, evaluated in equilibrium. The desired connection to the equilibrium mean squared displacement (MSD) starts from~ \cite{NAGELE1996215, hansen2013theory} \begin{equation} \partial_t \delta x^2(t) = 2D_0 - 2D_0\int_0^t ds' M(s'). \label{eq:MMSD} \end{equation} Comparing Eq.~\eqref{eq:MMSD} with \eqref{eq:MobilityKernelEq} lets us conclude \begin{equation} \av{x(t)}^\text{lr} = \frac{1}{2k_{B}T} \int_{-\infty}^t dt' \partial_t\delta x^2(t-t') F_\text{ex}(t') \label{eq:LinearResponse} \end{equation} which can be checked by reinserting. This result is the central linear response relation generalizing Einstein's relation between friction and diffusion coefficients to arbitrary time dependencies of the mean drift and the quiescent mean squared diffusion. Upon inserting this into the definition of a recoil, Eq.~\eqref{eq:recoil_definition}, we obtain for the recoil in linear response \begin{equation} \begin{split} \delta x(t) &= \frac{1}{2 k_B T} \int_{-\infty}^0 dt' F_\text{ex}(t') \partial_{t'} \left[\delta x^2(t-t')-\delta x^2(-t') \right] \\ \quad &- \frac{1}{2 k_B T} \int_{0}^{t}dt' F_\text{ex}(t') \partial_t \delta x^2(t-t') . \end{split} \label{eq:RecoilMSDF(t)} \end{equation} In the case of a time independent force acting from $t=-t_\text{sh}$ to $t=0$, as used in our experiments, the recoil simplifies to ($t>0$) \begin{align} \delta x(t) = \frac{ F_\text{ex}}{2 k_B T} \left[ \delta x^2(t) + \delta x^2(t_\text{sh}) - \delta x^2(t+t_\text{sh}) \right]. \end{align} For ergodic fluids, where the MSD is diffusive for large correlation times, we define the long-time diffusion coefficient $D_\infty$ as \begin{align} \lim_{t\to \infty} \frac{d}{dt} \delta x^2(t) =: 2 D_\infty . \end{align} With this, the recoil takes an even simpler relation in the limit of long shear times, $t_\text{sh}\to\infty$ (corresponding to the limit where the probe attained its stationary drift velocity before release), \begin{align} \delta x(t) = \frac{F_\text{ex}}{2 k_B T} \left[ \delta x^2(t) - 2 D_\infty t \right]. \label{eq:RecoilMSDF} \end{align} Eq.~\eqref{eq:RecoilMSDF} shows a relation between recoil and MSD, and interestingly it is the MSD minus its long time asymptote that appears. Eq.~\eqref{eq:RecoilMSDF} also already hints that recoil experiments, probing an interesting non-equilibrium aspect of the system, may give important insights into the equilibrium dynamics as well. \section{Test in micellar solutions}\label{chap:MicellarTest} Having established a relation between MSD and the recoil, we aim to apply it to experimental data obtained in wormlike micellar solutions. We note right away that our experiments use optical tweezers, and are not performed by controlling the driving force, so that the requirements for Eq.~\eqref{eq:RecoilMSDF} to be valid are not strictly given. \subsection{Experimental setup}\label{chap:ExperimentalSetup} In the experiments we analyzed viscoelastic equimolar cetylpyridinium chloride monohydrate (CPyCl) and sodium salicylate (NaSal) solutions with concentrations ranging from $\SI{5}{\milli \Molar}$ to $\SI{9}{\milli \Molar}$ (recoil measurements are limited to $\SI{7}{\milli \Molar}$), which are contained in a $\SI{100}{\micro \m}$ thick sealed sample cell. The cell was kept at a constant temperature of $\SI{25}{\celsius}$, leading to the formation of an entangled network of giant worm-like micelles~\cite{cates1990statics}. To probe the fluid's microrheology, we suspended a small amount of silica probe particles with diameters $\SI{2.73}{\micro \m}$ in the solution. For the measurement of recoils the colloidal probe is trapped in an optical tweezer, built of a Gaussian laser ($\lambda = \SI{1064}{\nano \m}$) and a high magnification microscope objective ($100\times$, $\mathrm{NA} = \SI{1.45}{}$). Using relatively large trapping strengths (see Table~\ref{tab:ExpParam} in Appendix~\ref{chap:ExperimentalParameters}), the probe is positioned in the center of the trap and we can apply a constant-velocity perturbation via a relative motion between the probe/trap and the fluid. This is achieved by a computer controlled piezo-driven stage that translates the sample cell with constant velocity $v$ and that is synchronized with the laser intensity. The time of translation or shear time $t_\text{sh}$ is chosen sufficiently long, such that the probe reached a non-equilibrium steady state before release. To avoid interactions with the sample walls, the trap was located at least $\SI{30}{\micro \m}$ away from any surface. We extract the probe's trajectory by video microscopy with a frame rate of $\SI{100}{\Hz}$, which, using a custom Matlab algorithm~\cite{crocker1996methods} yields an accuracy of $\pm \SI{6}{\nano \m}$ of the particle position. For further details regarding the experimental recoil setup, we refer to the recent work of Ginot~\textit{et.~al}~\cite{Ginot2022recoil} and its Supplementary Material. To test the linear response relation, Eq.~\eqref{eq:RecoilMSDF}, we also measured the mean squared displacement of freely diffusing colloidal particles suspended in the micellar solution, and at the surface of the sample cell. The 2-dimensional trajectories $\mathbf{r}(t) = (x(t),y(t))^T$ of the colloidal particles were extracted using video microscopy and above mentioned Matlab algorithm. Due to the system's isotropy, we calculated the (one-dimensional) MSD, after subtracting drift from the trajectories, and by averaging over both dimensions, \begin{align} \delta x^2(t) \equiv \frac{1}{2} \av{\left|\mathbf{r}(t_0+t)-\mathbf{r}(t_0)\right|^2}_{t_0}. \label{eq:2DMSDExp} \end{align} Finally, we run an ensemble average over several particles ($\sim 20$) for better statistics. We checked that presence of the glass surface has negligible influence on the reported MSD, by comparing with bulk measurements. \subsection{Comparison of experimental MSD and experimental recoil via Eq.~\eqref{eq:RecoilMSDF}}\label{chap:ExperimentalComparison} \begin{figure} \centering \includegraphics[]{figures/Fig2.pdf} \caption{ (a) Experimental mean squared displacements (open symbols) measured in wormlike micellar solutions with concentrations of 5 (blue), 6 (orange) and $\SI{7}{\milli \Molar}$ (green). The colored dotted lines highlight the long-time diffusion $2 D_\infty t$. (b) Experimental test of Eq.~\eqref{eq:RecoilMSDVNESS}: experimental mean recoils averaged over different shear velocities in the linear regime (left-hand side of Eq.~\eqref{eq:RecoilMSDVNESS}, open symbols) nicely match recoil curves calculated from the MSDs in (a), i.e.~right-hand side of Eq.~\eqref{eq:RecoilMSDVNESS} (solid lines). Note that the $x$-axes in (a) and (b) have different scaling as recoils saturate quickly and the measurement was limited to a time interval of $\SI{9}{\s}$. } \label{fig:TestRecoilRelation} \end{figure} In Fig.~\ref{fig:TestRecoilRelation}(a) we show experimental MSDs for concentrations of 5, 6 and $\SI{7}{\milli \Molar}$, together with asymptotic fits of the long-time diffusion, $\lim_{t\to \infty}\delta x^2(t) = 2 D_\infty t$ (dotted lines). Clearly, with increasing concentration the sub-diffusive plateau at intermediate times becomes strongly pronounced, while the long-time diffusion coefficient is reduced by almost two orders of magnitude from 5 to $\SI{7}{\milli \Molar}$. In contrast, at very short timescales all curves nearly collapse, as we expect the colloidal probe to diffuse with a short-time diffusion coefficient that is almost independent of micellar density \cite{Dhont}. Before comparing experimental MSDs and recoils we come back to the above note, and to the fact that the linear response relation, Eq.~\eqref{eq:RecoilMSDF}, describes recoils after a constant-force perturbation. In contrast, the optical trapping strength of our experimental recoil system is very high, such that the probe particle almost completely follows the shear velocity $v$ of the trap. This perturbation by constant velocity, however, is generally not equivalent to a constant-force perturbation~\cite{Squires2005}. Specifically, for our viscoelastic systems the friction memory kernel reveals a trap stiffness dependence~\cite{muller_properties_2020}, meaning that the weak (constant-force) and strong (constant-velocity) trap limits are generally not comparable. This is why we restrict this comparison to the three lowest micellar densities of our studies, as the mentioned differences between driving modes are expected to be the more pronounced the higher the density. We thus employ the Einstein relation $v= \frac{D_\infty}{k_{B}T} F_\text{ex}$ to replace the external force in Eq.~\eqref{eq:RecoilMSDF} with the stationary velocity $v$, resulting in \begin{equation} \frac{\delta x(t)}{v} = \frac{\delta x^2(t) - 2 D_\infty t}{2 D_\infty}. \label{eq:RecoilMSDVNESS} \end{equation} The resulting test of Eq.~\eqref{eq:RecoilMSDVNESS} is shown in Fig.~\ref{fig:TestRecoilRelation}(b). Open symbols show experimental recoils normalized by shear velocity $v$. For better statistics, these curves are averages of several recoils measured at different shear velocities $v$, within the linear regime where $\av{x(t)}\propto v$. The solid lines in Fig.~\ref{fig:TestRecoilRelation}(b) show the result of applying Eq.~\eqref{eq:RecoilMSDVNESS} to the experimental MSDs shown in Fig.~\ref{fig:TestRecoilRelation}(a). Clearly, for all concentrations, recoils and the result of applying Eq.~\eqref{eq:RecoilMSDVNESS} to experimental MSDs agree reasonably well, thereby confirming Eq.~\eqref{eq:RecoilMSDVNESS}. Deviations at very short times $t \lesssim \SI{0.1}{\s}$ are related to an imperfect trigger of the beginning of recoils. This corroborates that recoil and MSD are directly related in linear response. They are characterized by the same set of timescales and corresponding relative amplitudes. Notably compared to the strong {\it qualitative} density dependence of the MSD, one can hardly differentiate recoils at different concentrations. The recoils shown in Fig.~\ref{fig:TestRecoilRelation}(b) can almost be brought on top of each other by an overall factor, i.e., the recoil curves hardly change qualitatively with density. We will discuss this observation in detail in the next sections. \section{Analysis in models of viscoelastic fluids} \label{chap:ViscoelasticModels} In this section, we discuss two theoretical models that yield good fits of experimental MSDs and recoils at increasing concentrations up to $\SI{9}{\milli \Molar}$. These models have complementary benefits. We start with a linear two-bath particle model which has been previously proposed for a quantitative understanding of recoils~\cite{Ginot2022recoil}. It is very generic and can be analyzed in complete analytical detail~\cite{doerries2021correlation}. We then turn to mode coupling theory (MCT) of monodisperse hard spheres. It is based on a microscopic starting point, and extends to the nonlinear regime. Its most detailed predictions concern the glass transition which lies beyond the experimental regime; this discussion thus is relegated to an Appendix. \subsection{Two-bath particle model}\label{chap:2BP} The experimental recoils in Fig.~\ref{fig:TestRecoilRelation}(b) reveal several relaxation processes (the curves allow to distinguish at least two). Indeed, previous work reported double-exponential behavior with two distinct timescales~\cite{Gomez-Solano2015-qu,Ginot2022recoil}. As our experiments concern the linear regime, where recoil amplitudes are linear in shear velocity $v$, the simplest model that generates the observed behavior is a linear two-bath particle model, as sketched in the inset of Fig.~\ref{fig:2BP}(a). It consists of a probe particle with friction coefficient $\gamma$ that is coupled to two bath particles with friction coefficients $\gamma_s$ and $\gamma_l$ via harmonic springs of stiffness $\kappa_s$ and $\kappa_l$, respectively. This microscopic model can be rationalized as an extension of the Maxwell model, the latter describing a single timescale of macroscopic processes. While the Maxwell model is known to describe the equilibrium properties of wormlike micellar systems very well~\cite{Spenley1993,Rehage1988,Berret1997,cates1990statics}, the situation is different when a probe particle is sheared through the fluid. Then the probe couples to the fluid, thereby apparently inducing a second timescale, which is modeled via a second bath particle. We proceed with a brief introduction of the main findings of Ginot \textit{et. al}~\cite{Ginot2022recoil}. The dynamics of the probe (recall that probe variables carry no subscript) and two bath particles is described via a set of overdamped Langevin equations ($i=s,l$) \begin{align} \begin{split} \gamma \dot{x}(t) &= F_\text{trap}(t) - \sum_{i} \kappa_i \left[x(t)-x_i(t)\right]+\xi(t), \end{split} \label{eq:Langevin_tracer} \\ \gamma_i \dot{x}_i(t) &= \kappa_i \left[ x(t) - x_i(t) \right] + \xi_i(t), \label{eq:Langevin_bath} \end{align} where the probe particle experiences a trapping force $F_\text{trap}(t)=-\kappa(t) \left[ x(t) - x_0(t)\right]$ due to the optical potential of stiffness $\kappa(t)$ and position $x_0(t) = \int^t dt' v(t')$~\cite{Ginot2022recoil}. $\xi$ and $\xi_i$ denote independent Gaussian white noises, i.e. for $(\xi_i,\xi_j)\in \{\xi,\xi_s,\xi_l\}$~\cite{Ginot2022recoil} \begin{equation} \langle \xi_i(t)\rangle = 0, \quad \langle \xi_i(t) \xi_j(t') \rangle = \delta_{ij} 2 k_\mathrm{B}T \gamma_i \delta(t-t'). \label{eq:Langevin_noise} \end{equation} Because the noise strength is set by a unique temperature $T$, the model encodes the fluctuation dissipation theorem. Characterizing the probe's trapping, there exist two extreme cases: $\kappa \to \infty$ and $\kappa = 0$, which are characterized by different sets of eigenmodes in the two-bath particle model \cite{Ginot2022recoil}. If $\kappa \to \infty$, the probe is pinned by the trap, and its motion is deterministic. The two bath particles are then de-coupled in the stochastic sense. Each bath particle interacts with the deterministic probe. The interaction between probe and bath particles is then termed \textit{nonreciprocal}, as the probe's motion is not altered by the forces between probe and bath particles. In this case the respective nonreciprocal timescales $\tilde\tau_{s,l}$ equal the individual relaxation times of the bath particles, i.e.~$\tilde\tau_i = \gamma_i/\kappa_i$ for $i=s,l$~\cite{Ginot2022recoil}. In the other limit, for $\kappa=0$, the probe couples the two bath particles and force balance applies. The probe's motion is altered by the forces from bath particles, and the interaction is termed \textit{reciprocal}. The relaxation timescales contain all couplings and read ($\zeta_i=(\gamma+\gamma_i)/\tilde\tau_i$) \begin{align} \tau_{s,l}^{-1} =\frac{1}{2 \gamma }\left[\sum_i\zeta_i \pm \sqrt{(\sum_i\zeta_i)^2+4(\kappa_s\kappa_l-\zeta_s\zeta_l)}\right],\label{tauSLAnalytic} \end{align} where the positive sign corresponds to the shorter timescale $\tau_s$ and the negative sign to the longer timescale $\tau_l$~\cite{Ginot2022recoil}. Naturally, both recoil and MSD are measured when the optical trap is off ($\kappa = 0$). Thus, they are expected to be characterized by the reciprocal timescales $\tau_{s,l}$. Indeed, this is confirmed by the analytical expressions for the recoil $\delta x(t)$ and the MSD $\delta x^2(t)$, \begin{align} \delta x(t) &= A_\mathrm{tot}-A_s e^{-\frac{t}{\tau_\text{s}}}-A_l e^{-\frac{t}{\tau_\text{l}}} \quad \text{and} \label{RecoilTheo} \\ \delta x^2 (t) &= 2D_\infty t + A_\mathrm{tot}'-A_s'e^{-\frac{t}{\tau_s}} - A_l' e^{- \frac{t}{\tau_l}}, \label{eq:MSD} \end{align} where $D_\infty = \frac{k_B T}{\gamma + \gamma_s+\gamma_l}$~\cite{Ginot2022recoil}. The amplitudes in Eq.~\eqref{RecoilTheo}, $A_{s,l,\mathrm{tot}}$, depend on shear time $t_\text{sh}$ (see Appendix~\ref{chap:RecoilAmplitudes2BP} for full expressions). In the limit of infinite shear time ($t_\text{sh} \to \infty$), i.e.~starting from a nonequilibrium steady state, the recoil amplitudes approach a constant value and we find the following relation between amplitudes appearing in recoil and those of MSD, \begin{align} A'_{s,l,\mathrm{tot}}&=\lim_{t_\text{sh}\to\infty}\frac{2 D_\infty A_{s,l,\mathrm{tot}}}{v}.\label{eq:equal} \end{align} Here, $v$ denotes the (constant) velocity with which the probe is sheared. Moreover, the recoil amplitudes $A_{s,l,\mathrm{tot}}$ are linear in $v$ due to the linearity of the two-bath particle model. Inserting the model's (linear) force-velocity relation $F_\text{ex} = v \left(\gamma + \gamma_s+\gamma_l \right) = v \frac{k_B T}{D_\infty}$, we confirm the linear response relation~\eqref{eq:RecoilMSDF} between recoil and MSD within the 2-BP model. Indeed, for this model with {\it linear} couplings, a number of simplifications occur: The recoil, for $t_\text{sh}\to\infty$, is independent of $\kappa$, i.e., recoils after force driving and velocity driving are identical. This is why Eq.~\eqref{eq:RecoilMSDF} applies in any driving mode. \begin{figure} \centering \includegraphics[]{figures/Fig3.pdf} \caption{Mean squared displacement and recoils within a linear two-bath particle (2-BP) model and from experiments. (a) Inset: Sketch of the linear two-bath particle model. A probe particle with friction coefficient $\gamma$ is coupled via harmonic springs of stiffness $\kappa_s$ and $\kappa_l$ to two bath particles with friction coefficients $\kappa_s$ and $\kappa_l$, respectively. Main graph: Experimental MSDs (colored open symbols) for concentrations between $\SI{5}{\milli \Molar}$ (blue) and $\SI{9}{\milli \Molar}$ (purple) together with linear two-bath particle models (lines, see Tab.~\ref{tab:MSD2BPFit} for model parameters). (b) Experimental recoils (colored open symbols) for concentrations ranging from $\SI{5}{\milli \Molar}$ (blue) to $\SI{7}{\milli \Molar}$ (green) together with respective 2-BP models. The red and purple line correspond to 2-BP recoils matching experimental MSDs at 8 and $\SI{9}{\milli \Molar}$ in (a). Note that the time axes are scaled differently in both plots.} \label{fig:2BP} \end{figure} With the analytical expressions at hand, experimental data can be fitted. This is done for concentrations ranging from $\SI{5}{\milli \Molar}$ to $\SI{9}{\milli \Molar}$. For each density, a single set of parameters is obtained fitting recoil and MSD, see Tab.~\ref{tab:MSD2BPFit} in Appendix~\ref{chap:ModelParameters}, while parameters naturally depend on micellar density. The resulting MSD and recoil curves are shown in Figs.~\ref{fig:2BP}(a) and (b) as open symbols (experiments) and solid lines (2-BP model) and show remarkable agreement. Note that for high concentrations of 8 and $\SI{9}{\milli \Molar}$, only experimental data of MSDs are shown (and fitted), and no data for recoils are presented. The reason is that these high densities pose several difficulties; The resulting high viscosities require large trap stiffness, and large laser powers may lead to local heating. Also, very small shear velocities are required to stay in the linear regime. Last, Eq.~\eqref{eq:RecoilMSDF} fails when applied to velocity controlled driving, for the reasons given above. Fitting MSDs is still insightful as it allows to see how the obtained timescales vary with density. Also, we still applied Eq.~\eqref{eq:RecoilMSDVNESS} for these cases to be able to formally obtain the curves (red and purple lines) in Fig.~\ref{fig:2BP}(b). As an interesting remark when comparing Eqs.~\eqref{RecoilTheo} and \eqref{eq:MSD}, and using Eq.~\eqref{eq:equal}, it becomes notable that the MSD provides one additional fitting constraint compared to recoil, through the long-time diffusion coefficient $D_\infty$. Indeed, fitting recoils alone leaves one parameter of the model undetermined, e.g., the probe's friction $\gamma$. This has a physical reason: In reciprocal motion, only relative forces and relative motion is important, i.e., the center of mass motion of the three particles is not detected. In long-time diffusion this center of mass motion is however detected, and thus one more constraint is provided by the MSD. \begin{figure} \centering \includegraphics{figures/Fig4.pdf} \caption{(a) Timescales $\tau_{s,l}$ (open circles) and $\tilde\tau_{s,l}$ (solid squares) obtained from fitting experimental MSDs and recoils to two-bath particle models for various concentrations $c$. Additionally, we show the experimental short- and long-time inverse diffusion coefficients $1/D_{0,\infty}$ (half-filled triangles; see fits in Fig.~\ref{fig:TestRecoilRelation}(a). For a qualitative comparison they are given in arbitrary units and rescaled to match $\tilde\tau_{s,l}$ at $c = \SI{5}{\milli \Molar}$. (b) Corresponding recoil amplitudes $A_{s,l,\mathrm{tot}}$ normalized by shear velocity $v$.} \label{fig:TimeScales_RecoilAmplitudes} \end{figure} With the established agreement between experiment and model we proceed with an analysis of the model's timescales and amplitudes under variation of micellar concentration. In Fig.~\ref{fig:TimeScales_RecoilAmplitudes}(a) we show reciprocal (open circles) and nonreciprocal (solid squares) timescales, $\tau_{s,l}$ and $\tilde\tau_{s,l}$, as a function of concentration $c$. Notably, the behavior of reciprocal and nonreciprocal timescales differs qualitatively. While the reciprocal timescales remain almost constant or even slightly decrease upon increasing concentration, the larger nonreciprocal timescale $\tilde\tau_l$ increases by one order of magnitude. Hence, depending on whether the probe is confined or free, the relaxation times either increase with density or remain almost constant. This behavior has an intuitive reason, partly similar to the discussion of fitting constraints above; If the probe is strongly trapped or pinned (nonreciprocal case), the bath particles relax towards the probe. As their friction coefficients strongly increase with concentration (see Tab.~\ref{tab:MSD2BPFit}), the relaxation slows down. In contrast, in the reciprocal case of a free probe, probe and bath particles relax towards each other. This relative motion remains fast, as the probe's friction coefficient does not strongly grow. This interpretation carries over to the real experimental situation: When trapping the particle at a fixed position, the surrounding fluid needs to relax accordingly. This process is expected to be slower than the case when the probe particle can move freely, thereby possibly finding a faster path to equilibrium. How does the observed strong increase of the timescale $\tilde\tau_l$ compare to the significant reduction of the long-time diffusion coefficient $D_\infty$ observed in Fig.~\ref{fig:TestRecoilRelation}(a)? Fig.~\ref{fig:TimeScales_RecoilAmplitudes} also shows $1/D_\infty$, in arbitrary units, to map $\tilde\tau_{s,l}$ at $c=\SI{5}{\milli \Molar}$. This yields an additional timescale, i.e., the time the probe needs to diffuse a certain distance (e.g. its diameter). This timescale grows even stronger than the relaxation timescale of the nonreciprocal case, approximately another order of magnitude compared to $\tilde\tau_l$! This is due to the fact that in $\tilde\tau_l$, both, the friction coefficient as well as the coupling strength, increase with concentration (see Tab.~\ref{tab:MSD2BPFit}), while $D_\infty$ is only anti-proportional to the zero-shear friction, i.e.~the sum of friction coefficients. Hence, $D_\infty$ exhibits a greater sensitivity with respect to changes in concentration. This interesting observation will be picked up again when discussing friction and mobility kernels below. The also shown behavior of $1/D_0$ reveals (again) that the short time dynamics stays almost constant upon variations in concentration. Finally, in Fig.~\ref{fig:TimeScales_RecoilAmplitudes}(b) we show the recoil amplitudes $A_{s,l,\mathrm{tot}}$, compare Eq.~\eqref{RecoilTheo} and Appendix~\ref{chap:RecoilAmplitudes2BP}. In contrast to recoil timescales, the amplitude $A_\mathrm{tot}$ increases by more than one order of magnitude for the density range shown, when normalized by shear velocity. This is partly due to the fact that, at fixed driving velocity, the driving force increases with density. \subsection{Mode Coupling Theory (MCT)}\label{chap:MCT} Before specifying the second model provided by MCT, we address the relation between driving at given force to driving at given velocity. In our experiments, the probe is not perturbed by force (basis of Eq.~\eqref{eq:RecoilMSDF}), but trapped by an optical tweezer that moves with constant velocity $v$, and we are looking for the way of replacing the force factor in Eq.~(\ref{eq:RecoilMSDF}) by this velocity. While a rigorous relation requires to map the dynamics including fluctuations, we proceed with an approximation that maps the average variables in the stationary state. As noted below Eq.~\eqref{eq:equal}, this is expected to become exact for systems with linear interactions, as fluctuations and averages then decouple. Mathematically, the mapping is achieved by introducing an irreducible operator in the Hermitian conjugate of the Smoluchowski operator $\Omega^\dagger$ \cite{CichockiHess,Gazuz2013}. Thereby, equation~(\ref{eq:MobilityKernelEq}) can be transformed into \begin{equation} \gamma^{-1} F_\text{ex}(t) = v(t) + \int_{-\infty}^t dt' m(t-t')v(t')\;, \label{eq:FrictionKernelEq} \end{equation} where the equilibrium \emph{friction-kernel} $m$ is related to the mobility-kernel $M$ via a Volterra relation~\cite{tricomi_integral_1985} \begin{align} \hat{M}(s) = \frac{\hat{m}(s)}{1+\hat{m}(s)}. \label{eq:Volterra} \end{align} $\hat{h}(s) = \int_0^\infty dt \, h(t) e^{-st}$ denotes the Laplace transform. By definition, the friction-kernel contains irreducible dynamics and in the present case can not be reduced to a Green-Kubo form accessible to e.g.~simulation. Inserting the force that leads to a stationary average probe velocity $v$ in Eq.~\eqref{eq:FrictionKernelEq} into the linear response equation (\ref{eq:LinearResponse}) and considering the limit $t_\text{sh}\to\infty$ leads to the recoil \begin{equation} \frac{\delta x(t)}{v} = \frac{\delta x^2(t) - 2 D_\infty t}{2 D_\infty}\;. \tag{\ref{eq:RecoilMSDVNESS}} \end{equation} This is the relation explicitly tested by experiments in Fig.~\ref{fig:TestRecoilRelation} which will be analyzed by MCT in the following. As announced, as a second theoretical approach to the linear response of dragged colloidal probes, we consider the MCT~\cite{gotze2009complex} of monodisperse hard spheres (see sketch in Inset of Fig.~\ref{fig:MatchedMCT}(a)). In MCT it is well established that the mean squared displacement fulfills the equation of motion \cite{fuchs1998asymptotic} (projected to one dimension) \begin{equation} \delta x^2(t) + \int_0^t m(t-t') \delta x^2(t') dt' = 2 D_0 t \label{eq:MSD_m} \end{equation} with the friction-kernel $m(t)$ of Eq.~\eqref{eq:FrictionKernelEq} reappearing. In mode coupling approximation it is given as a functional of the probe and bath density correlators. The retardation of the friction kernel expresses that the friction the probe experiences is affected by the motion of the probe itself at earlier times and by the dynamics of the surroundings again at earlier times. Viscoelasticity is incorporated by the friction to develop longer-lasting memory with increasing concentration of the glass-forming solution. The system of coupled integro-differential equations resulting in MCT is solved by a preexisting MCT-solver \cite{Voigtmann2011} on a grid of 200 equidistant wavevectors $0.1,...,39.9$ using a decimation scheme with initial time step $10^{-8}$ and 128 steps per window \cite{Fuchs1991}. For the specified packing fraction the structure factor needed for $m(t)$ is chosen to be given by the Percus-Yevick approximation \cite{hansen2013theory}. The numerical MSDs from MCT are dimensionless of the form ${\delta x^2}^* (t^*)$ and can be shaped to a real MSD by $\delta x^2(t)=d^2 {\delta x^2}^* (t/\tau_B)$, where $d$ is the hard sphere diameter and $\tau_B = d^2/D_0$ denotes the Brownian time, which is the typical time a particle needs to diffuse its own diameter $d$~\cite{senbil_observation_2019}. Applying the recoil formula to such a curve gives ($2D_\infty^* \equiv \lim_{t\to\infty} \partial_{t^*} {\delta x^2}^* $) \begin{equation} \frac{\delta x(t)}{v} = \frac{{\delta x^2}^*(t^*)- 2D_\infty^* t^*}{2D_\infty^*} \tau_B = X^*(t^*;\phi) \tau_B\label{eq:resc}. \end{equation} This means that plotting $\frac{\delta x(t)}{v\tau_B}$ versus $t^*=t/\tau_B$ yields the function $X^*$, which for Brownian hard spheres only depends on the chosen packing fraction. The $D_\infty^*$ is obtained from a linear fit to the numerical curves in the last window of the decimation grid. \begin{figure} \centering \includegraphics{figures/Fig5.pdf} \caption{Mean squared displacement and recoils within MCT and from experiments. (a) Inset: Sketch of a system of monodisperse hard spheres of diameter $d$ that interact via interaction forces $\bf{F}$. The gray particle is considered as probe particle and perturbed with an external force $\mathbf{F}_\mathrm{ex}$. Main graph: Experimental MSDs (open symbols) fitted with MCT MSD's (lines) for different packing fractions $\phi$. The respective packing fractions $\phi$ are shown in (b) and were chosen such that MCT recoils (solid lines) match existing experimental recoils (open symbols, see also Fig.~\ref{fig:TestRecoilRelation}(b)). Note that the windows of time are different in the two plots as $\tau_B \approx \SI{50}{\s}$.} \label{fig:MatchedMCT} \end{figure} To match this theory to our experiments for a given micellar concentration, we start by determining the ratio $D_\infty/D_0$, which uniquely yields the corresponding hard sphere packing fraction $\phi$. We then fit the resulting MCT curves for recoils to experimental data, which determines the Brownian timescale $\tau_B$ such that the scaled recoil lies on $X^*(t^*)$ defined in Eq.~\eqref{eq:resc}. Results are shown in Fig.~\ref{fig:MatchedMCT}(b). After this it is still possible to adjust the particle diameter to match the MSD. As already observed below Eq.~\eqref{eq:equal}, fitting the recoil does not determine all parameters of the model. This analysis shows that it is possible to find parameters of a hard sphere system that describe the probe in the wormlike micellar solution including the recoil formula with good agreement. For the concentrations $\SI{8}{\milli \Molar}$ and $\SI{9}{\milli \Molar}$, where no recoil was measured directly, the fit parameters $d^2$ and $\tau_B$ are both chosen to match just the MSD. The MSDs obtained by this procedure compared with the experimental MSDs are seen in Fig. \ref{fig:MatchedMCT}(a) while the fitting parameters are given in Tab.~\ref{tab:MSDMCTFit} in Appendix~\ref{chap:ModelParameters}. What other behavior of recoils can we extract? Fig.~\ref{fig:ShortScaling} shows theoretical recoil curves for a wide range of packing fractions and up to very large values of $t^*= t/\tau_B$. They are re-scaled such that their linear short-time behavior overlaps, which is achieved by division by $(D_0-D_\infty)/D_\infty$. It can be seen that in the region $t^*\alt 10^{-1}$, identified as the region of our experimental measurements, the recoils have a very similar shape, especially for higher densities. This confirms our observation, that the timescales used in the two bath particle model hardly depend on density. At even larger times, the curves in Fig.~\ref{fig:ShortScaling} show an additional relaxation step, which moves to later and later times with increasing packing fraction. It can be analysed close to the glass transition of hard spheres for even higher packing fractions, presented in Appendix~\ref{chap:AlphaScaling}. For reference, the inset of Fig.~\ref{fig:ShortScaling} shows the retarded friction kernel. It exhibits a power-law long time tail with exponent $-5/2$ \cite{Mandal2019} which, however, is outside the experimental window where the recoils were determined. \begin{figure} \centering \includegraphics[]{figures/Fig6.pdf} \caption{Recoils calculated from MCT MSD's via Eq.~\eqref{eq:RecoilMSDVNESS} and rescaled with respect to their short-time behavior. The first two packing fractions describe experimental measurements at $\SI{5}{\milli \Molar}$ and $\SI{7}{\milli \Molar}$ (up to $\sim 10^{-1}\tau_B$), respectively. For higher packing fractions, the systems approaches the glass transition. Inset: Corresponding friction-kernels $m(t)$ with long-time tails $\sim t^{-5/2}$~\cite{Mandal2019}.} \label{fig:ShortScaling} \end{figure} \section{Discussion}\label{chap:Discussion} The observations on the relation between recoils and MSD can be formalized using memory kernels and thereby allow to draw a connection between the two theoretical models and to reveal universal aspects. Linear response theory relates recoil to the mobility-kernel $M$. Integrating Eq.~\eqref{eq:MobilityKernelEq} yields \begin{align} \delta x(t) = \gamma^{-1} \int_0^t dt' \int_{-\infty}^{t'} ds' F_\mathrm{ex}(s') [\delta(t'-s')-M(t'-s')].\label{eq:recoil} \end{align} The mobility kernel measures the relaxation of forces, see Eq.~\eqref{eq:M}, with the probe particle moving (diffusing) freely: This is apparent in the derivation of Eq.~\eqref{eq:M}. From our experiments, the corresponding timescales vary only weakly with density; we argued that the force free moving particle can relax fast. In the bath-particle model, this corresponds to the reciprocal case, and the mobility kernel $M$ contains the reciprocal timescales $\tau_{s,l}$, explicitly, \begin{align} M(t) = \frac{\gamma}{v (\gamma + \gamma_s+\gamma_l)} \left(\frac{1}{\tau_s^2} A_se^{-\frac{t}{\tau_s}}+\frac{1}{\tau_l^2} A_le^{-\frac{t}{\tau_l}} \right). \end{align} The friction kernel $m$ in Eq.~\eqref{eq:Volterra}, is, as stated there, in general not given via a fluctuation function. As also noted above, for systems with linear interactions, simplifications occur \cite{muller_properties_2020}, due to decoupling of averages and fluctuations. In this case, Eq.~\eqref{eq:FrictionKernelEq} is not only a mathematical, but also a physical inversion. Using FDT for perturbations by a velocity \cite{hansen2013theory}, \begin{align} \langle F(t) \rangle = - \beta \int_0^t dt' \langle F(t')F(0)\rangle_\text{eq} v(t'). \end{align} This can be used to identify the friction-kernel $m$ as \begin{align} m(t) &= \beta \gamma^{-1} \av{F(t) F(0)}_\text{eq} - 2 \delta(t) \label{eq:mForceCorrelation}. \end{align} In contrast to Eq.~\eqref{eq:MobilityKernelEq}, the appearing force correlator is now measured with the probe particle {\it fixed} at a given position. This little detail changes the scenario from reciprocal to nonreciprocal, and the nonreciprocal timescales appear. Specifically, in the bath particle model, (see Appendix~\ref{chap:mIn2BP}), \begin{align} m(t) = \frac{\kappa_s}{\gamma} \exp(-t/\tilde\tau_s) + \frac{\kappa_l}{\gamma} \exp(-t/\tilde\tau_l).\label{eq:ml} \end{align} The analysis of Eq.~\eqref{eq:Volterra} extends beyond the regime of linear interactions, where Eq.~\eqref{eq:ml} is not valid, but this discussion still provides useful intuition. With this in mind, we can now obtain insights via the Volterra relation between the two kernels, Eq.~\eqref{eq:Volterra}. With increasing concentration, the friction kernel at vanishing frequency, $s=0$, viz.~$m(s=0)$ grows, which is a famous prediction of MCT. This can be directly seen from the following relation, which follows from Eq.~\eqref{eq:MSD_m}, \begin{align} D_\infty = \frac{D_0}{1+ \hat{m}(s=0)}.\label{eq:Dm} \end{align} Notably, in the bath particle model, as seen in Fig.~\ref{fig:TimeScales_RecoilAmplitudes}(a), the inverse long-time diffusion coefficient grows faster than the timescale $\tilde\tau_l$. Indeed, it is also the amplitude of $m$ that grows with increasing density. In contrast, Eq.~\eqref{eq:Volterra} shows that, if $m(s=0)$ grows, the mobility kernel $M(s=0)$ remains on order unity, hence does not grow with density. This is in agreement with the observation that the reciprocal timescales $\tau_{s,l}$ remain on the same order of magnitude. This confirms the trends in Fig.~\ref{fig:TimeScales_RecoilAmplitudes}, and can also be seen in the expression for the reciprocal timescales $\tau_{s,l}$ (Eq.~\eqref{tauSLAnalytic}) which remains finite even in the limits $\tilde\tau_{s,l} \to \infty$. Within MCT, increasing the concentration is modeled by an increase in the packing fraction. The "master recoil" in Fig.~\ref{fig:ShortScaling} then confirms the fast characteristics of the mobility kernel $M$; the formula is given in Eq.~\eqref{eq:recoil}. For comparison, we also show the corresponding friction-kernels $m(t)$ in the inset of Fig.~\ref{fig:ShortScaling}. Clearly, $m(t)$ slows down with increasing packing fraction. As was already observed in Ref.~\onlinecite{Mandal2019} the kernel enters a regime of algebraic decay with a power of $-\frac{5}{2}$. For the lowest density shown this starts at about $t=\tau_B$ and thus after the corresponding duration of the recoil measurements. \section{Conclusion}\label{chap:Conclusions} Based on the Einstein relation generalized to the time-dependent linear response relation between the average position of a driven probe particle and its mean squared displacements in equilibrium, Eq.~\eqref{eq:LinearResponse}, we analyzed the response kernels of a viscoelastic system for a number of experimental densities. We investigated mean squared displacements (MSD) of colloidal probes in equilibrium, as well as recoils, when a driven probe reversed its motion and recovered parts of its displacement after the driving is turned off; the latter study was confined to the regime of small driving where linear response applies. Theoretical analysis used a generic Langevin description where a small number of bath particles is coupled to the probe to model different relaxation channels, and the mode coupling theory (MCT) of structural dynamics in hard sphere solutions. Both descriptions showed that the slowing down of the long time diffusion with increasing bath concentration is related to the friction kernel $m(t)$ that encodes the increasing viscoelastic memory in the surrounding bath (Eq.~\eqref{eq:Dm}). Its $s=0$ mode grows, as is often modelled by an ansatz following Maxwell $m(t)= f^{\rm MW}\,e^{-t/\tau^{\rm MW}}$, where, with Eq.~\eqref{eq:Dm}, the long-time diffusion, $D_\infty^{-1}\sim f^{\rm MW} \tau^{\rm MW}$. Our theoretical models recover this interpretation of $D_\infty$, yet provide convincing evidence that a single-relaxation time ansatz following Maxwell is insufficient to understand the motion of a colloidal probe in a viscoelastic fluid. While this is visible in the MSD through the increasing window of sub-diffusive motion between short, $\lim_{t \to 0}\delta x^2 (t) = 2 D_0 t$, and long time behaviors $\lim_{t \to \infty}\delta x^2 (t) = 2 D_\infty t$, the mentioned timescales are however partly overshadowed by the long time diffusion process. This slow process is also difficult to measure in experiments, because of stability issues such as spatial drift or unsteady temperatures. This is in striking difference to recoils that are much simpler to measure. The recoil curves clearly show distinct timescales, which are determined by a mobility kernel $M(t)$. $M(t)$ is related to the friction kernel $m(t)$ (see Eq.~\eqref{eq:Volterra} in Laplace space) and is characterized by a different set of timescales, where one of them is far smaller than $\tau^{\rm MW}$. Recoil spectra measure the elastic response that, once its amplitude has developed in a viscoelastic fluid, exhibits a rather small temporal variation with concentration. While, theoretically, all discussed kernels and observables are related, via Eqs.~\eqref{eq:RecoilMSDF} and \eqref{eq:Volterra}, this analysis of recoils and MSD in the same system revealed that measuring recoils provides several benefits: It allows access to the mobility kernel $M$ via Eq.~\eqref{eq:recoil}. This is easier than determining $M$ from MSD data via Eq.~\eqref{eq:MMSD}, as the latter requires accurate determination of long-time diffusion. The recoil also displays nontrivial timescales and relaxation channels, which in MSD can be hidden. Future work can address effects of nonlinearity, both in the driving speed, as well as in interactions. \begin{acknowledgments} This project was funded by the Deutsche Forschungsgemeinschaft (DFG), Grant No. SFB 1432 - Projects C05 and C06. F.G. acknowledges support by the Alexander von Humboldt foundation. The authors declare no competing interest. \end{acknowledgments}
\section{Introduction} Liquid crystal polymer networks (LCNs) are materials that combine elastomeric polymer networks with mesogens (compounds that display liquid crystal properties). The long rod-like molecules of liquid crystals are \emph{densely} crosslinked with the elastomeric polymer network. This contrasts with liquid crystal elastomers (LCEs), whose crosslinks are less dense. The orientation of the liquid crystal (LC) molecules can be represented by a director. The orientation of the director influences deformation of materials when actuated. Common modes of actuation are heating \cite{aharoni2018universal, ware2015voxelated} and light \cite{camacho2004fast,mcconney2013topography}. LCNs are one of many possible materials that enable spontaneous mechanical motion under a stimulus. This has been referred to as ``the material is the machine'' \cite{bhattacharya2005material}. Due to this feature, engineers create soft robots using LCNs/LCEs materials, such as thermo-responsive micro-robots with autonomous locomotion in unstructured environments \cite{zhao2022twisting}, soft materials that ``swim'' away from light \cite{camacho2004fast}, and LCN actuators that can lift an object tens of times its weight \cite{ware2015voxelated}. They offer abundant application prospects, for instance in the design of biomedical devices \cite{li2006artificial,hebert1997dynamics}. Since the deformation of LCNs depend on the orientation of the nematic director, the director can be blueprinted or programmed so that the materials achieve desired shapes \cite{aharoni2018universal, white2015programmable, modes2011blueprinting, warner2020topographic}. Some methods to program the orientation of the liquid crystals include mechanical alignment \cite{camacho2004fast}, photoalignment \cite{ware2015voxelated}, and additive manufacturing \cite{kotikian20183d}, which is a subset of 4D printing \cite{kuang2019advances}. Even if the director is constant throughout the material, interesting shapes may occur due to nonuniform actuation. An example of nonuniform actuation from light is the LCE swimmer in \cite{camacho2004fast}. Two reviews of experimental work on LCEs/LCNs can be found in \cite{white2015programmable, mccracken2020materials}. For 3D bodies, one of the most accepted elastic energies for modeling the interaction of the material deformation with the LCs is known as the {\it trace formula} \cite{bladon1994deformation, warner2007liquid,warner2003thermal}, although other types of elastic energies have been proposed \cite{desimone2009elastic}. Depending on the density of crosslinks, the director field may be either totally free \cite{cesana2015effective, desimone2002macroscopic} or subject to a Frank elasticity term \cite{barchiesi2015frank, luo2012numerical, plucinsky2018actuation, bartels2022nonlinear}. This kind of blueprinted configuration describes the situation where the LCs are unconstrained or constrained only on a low-level by rubbery polymers. On the other hand, the LCs may also be frozen into the material via direct algebraic constraint \cite{ozenda2020blend, cirak2014computational} or a physically justified penalization \cite{plucinsky2018actuation,verwey1997compositional}. Although the LCs may be described by the Frank energy, a key modeling difference between LCE/LCNs and nematic LCs is that the former are constrained by the rubber. It is known that higher degree defects are unstable \cite{brezis1986harmonic} for the one constant Frank model of nematic LCs. However in LCNs, higher degree defects do not split apart due to the constraining nature of the polymer network. We refer to \cite{mcconney2013topography} for blueprinted defects with degrees up to order $10$ in LCNs. The scaling of thickness in models of thin $3D$ elastic bodies dictates 2D models of LCNs/LCEs. If the energy is scaled linearly with the thickness, the resulting model is a membrane model: the energy is a function of the first fundamental form of the deformed surface and encodes stretching. Works that studied membrane models include \cite{cesana2015effective, ozenda2020blend, conti2018adaptive}. For LCNs, the first fundamental form of zero stretching energy states satisfy a pointwise metric condition. Extensive work dedicated to examining configurations that satisfy this metric condition include \cite{modes2011gaussian, mostajeran2015curvature, plucinsky2018patterning, plucinsky2016programming, plucinsky2017deformations, modes2011blueprinting, warner2018nematic, aharoni2014geometry, mostajeran2016encoding}. For a review of these techniques, we refer to \cite{warner2020topographic}. The second common scaling is a cubic scaling in the thickness, and results in a plate model driven by bending. The metric condition giving zero stretching energy becomes a constraint in the bending model. Some existing bending models include theory derived via formal asymptotics \cite{ozenda2020blend}, a von Karman plate model derived in \cite{mihai2020plate} using asymptotics, a rigorous Gamma convergence theory for a model of bilayer materials composed of LCEs and a classical isotropic elastic plate \cite{bartels2022nonlinear}, or a plate model where the LC dramatically changes its orientation through the thickness \cite{agostiniani2020rigorous}. Moreover, reduced $1D$ models for LCNs/LCEs have been explored as well; we refer to \cite{bartels2022rods} for a rod model and to \cite{agostiniani2017shape, singh2022ribbon} for ribbon models. Computation of LCEs/LCNs have received some attention. Publications include computations of various membrane models \cite{plucinsky2017deformations}, a membrane model with regularization \cite{cirak2014computational}, a bending model of LCE bilayer structure \cite{bartels2022nonlinear}, a relevant 2D model for LCEs \cite{luo2012numerical}, 3D models \cite{conti2002soft,chung2017finite}, and LCE rods \cite{bartels2022rods}. Literature involving numerical analysis is limited, to the best of our knowledge. Paper \cite{luo2012numerical} proves well-posedness of a mixed method for a 2D model with Frank-Oseen regularization. Our companion paper \cite{bouck2022NA} provides a numerical analysis of the finite element method (FEM) described in this article. This paper also derives the LCN model and properties of solutions via formal asymptotics and presents numerous simulations of practical interest. We refer to Section \ref{sec:contributions} for a list of our main contributions and outline. \subsection{3D elastic energy: Neo-classical energy} We are concerned with thin films of LCNs, and mathematically slender materials are usually modeled as $3D$ hyper-elastic bodies $\mathcal{B}:=\Omega\times(-t/2,t/2)$, with $\Omega\subset \mathbb{R}^2$ being a bounded Lipschitz domain and $t>0$ being a small thickness parameter. We denote by $\mathbf{u}:\mathcal{B}\to\mathbb{R}^3$ the 3D deformation of the LCNs material. The neo-classical energy density for incompressible nematic elastomers/networks has been proposed by Bladon, Warner and Terentjev in \cite{bladon1994deformation, warner2007liquid,warner2003thermal} and reads \begin{equation}\label{eq:neo-classical} W_{3D}(\mathbf{x},\mathbf{F}):= \tr \big(\mathbf{F}^T\mathbf{L}_{\mathbf{n}}^{-1}\mathbf{F}\mathbf{L}_{\mathbf{m}} \big) - 3, \end{equation} where $\mathbf{x}:=(\mathbf{x}',x_3):=(x_1,x_2,x_3)\in\mathcal{B}$ is the space variable and $\mathbf{F}:=\nabla\mathbf{u}\in\mathbb{R}^{3\times3}$ is the deformation gradient. We define by $\mathbf{m}:\mathcal{B}\to \mathbb{S}^2$ the \textit{blueprinted} nematic director field on the reference configuration. The director field $\mathbf{n}:\mathcal{B}\to\mathbb{S}^2$ is the director field on the deformed configuration, to be defined below, whereas \begin{equation}\label{eq:def-Lm} L_{\mathbf{m}}:=(s_0+1)^{-1/3}(I} % {\normalfont{\Romanbar{1}}_3+s_0\mathbf{m}\otimes\mathbf{m}) \end{equation} is the reference step length tensor, and \begin{equation}\label{eq:def-Ln} L_{\mathbf{n}}:=(s+1)^{-1/3}(I} % {\normalfont{\Romanbar{1}}_3+s\mathbf{n}\otimes\mathbf{n}) \end{equation} is the current step length tensor. These step length tensors measure the anisotropy contributed by nematogenic molecular units to nematic elastomers/networks, which are isotropic solids with a fluid-like anisotropic ordering. Moreover, $s_0,s\in L^\infty(\Omega)$ are nematic order parameters that refer to the \emph{reference} configuration and \emph{deformed} configuration respectively. They are typically constant and depend on temperature, but may vary in $\Omega$ if the liquid crystal polymers are actuated non-uniformly by a light source. These parameters have a physical range \[ -1 < s_0,s \le C < \infty. \] We emphasize that the energy density $W_{3D}(\mathbf{x},\mathbf{F})$ defined in \eqref{eq:neo-classical} depends explicitly on coordinates $\mathbf{x}$, due to the dependence of $\mathbf{m},\mathbf{n},s,s_0$ on $\mathbf{x}$. The energy can be rewritten as the neo-Hookean energy density: \begin{equation}\label{eq:neo-hookian} W_{3D}(\mathbf{x},\mathbf{F})= \big|\mathbf{L}_{\mathbf{n}}^{-1/2}\mathbf{F}\mathbf{L}_{\mathbf{m}}^{1/2}\big|^2- 3. \end{equation} In the case where $s=s_0=0$, the step length tensors become $L_{\mathbf{m}} = L_{\mathbf{n}} = I} % {\normalfont{\Romanbar{1}}_3$, the identity matrix $I} % {\normalfont{\Romanbar{1}}_3\in\R^{3\times3}$, and the formula \eqref{eq:neo-hookian} reduces to the classical neo-Hookean energy density for rubber-like materials $W_{3D}(\mathbf{F}) = |\mathbf{F}|^2- 3$. Moreover, the material is assumed to be incompressible, i.e, \begin{equation}\label{eq:incompressible} \det \mathbf{F} =1. \end{equation} The 3D energy density $W_{3D}$ is {\it non-degenerate}, namely \begin{equation}\label{eq:nondegeneracy} W_{3D}(\mathbf{x}, \mathbf{F})\geq \mathrm{dist} \big(\mathbf{L}_{\mathbf{n}}^{-1/2}\mathbf{F}\mathbf{L}_{\mathbf{m}}^{1/2},SO(3) \big)^2\ge0 \end{equation} for all $\mathbf{F}\in \mathbb{R}^{3\times3}$ such that $\det \mathbf{F} = 1$. We refer to \cite[Appendix A]{plucinsky2018actuation} and \cite{bouck2022NA} for a proof of this fundamental property. Recall that the density of crosslinks between the mesogens and polymer network differentiate LCNs (also called liquid crystal glasses) and liquid crystals elastomers (LCEs): the former has moderate to dense crosslinks, while in the latter the density of crosslinks is low \cite{white2015programmable}. In this paper, we focus on LCNs and leave a numerical study of LCEs for future research. Mathematically, the strong coupling in LCNs is reflected in terms of director fields via a {\it kinematic constraint} \cite{ozenda2020blend}: \begin{equation}\label{eq:kinematic-cons} \mathbf{n}:=\frac{\mathbf{F}\mathbf{m}}{|\mathbf{F}\mathbf{m}|}. \end{equation} This implies that, in contrast to LCEs \cite{warner2007liquid,bartels2022nonlinear}, $\mathbf{n}$ is \emph{not} a free variable for models of LCNs; in fact it is also called frozen director \cite{cirak2014computational}. For LCEs the energy density may be minimized over $\mathbf{n}$ first and next over $\mathbf{F}$, like in \cite{cesana2015effective, conti2002soft}, or a Frank elastic energy for $\mathbf{n}$ may be introduced (c.f.\ \cite{barchiesi2015frank,bartels2022nonlinear,luo2012numerical}). Moreover, we note that a director field description may not be the only choice for modeling LC components. One can also formulate a model with $Q$-tensor descriptions like in \cite{calderer2015landau}. Using the energy density \eqref{eq:neo-classical}, or equivalently \eqref{eq:neo-hookian}, the 3D elastic energy is given by \begin{equation}\label{eq:3D-energy} E_{3D}[\mathbf{u}]=\int_{\Omega}\int_{-t/2}^{t/2}W_{3D}(\mathbf{x},\nabla\mathbf{u}) \, d\mathbf{x}'dx_3, \end{equation} where $\mathbf{x}'\in\Omega$, $x_3\in(-t/2,t/2)$, and $ \det \nabla\mathbf{u} = 1$. \subsection{Model reduction} We assume the $3D$ director field $\mathbf{m}:\mathcal{B}\to \mathbb{S}^2$ is planar and it depends only on $\mathbf{x}'$, and therefore, with a slightly abuse of notations, we define $\mathbf{m}:\Omega\to \mathbb{S}^1$ to be the $2D$ \emph{blueprinted} director field. We denote by $\mathbf{y}:\Omega\to \mathbb{R}^3$ the 3D deformation of the 2D midplane $\Omega$. The $2D$ membrane model is the following minimization problem: find $\mathbf{y}^{\ast}\in H^1(\Omega; \mathbb{R}^3)$ that solves \begin{equation}\label{eq:stretching-energy} \mathbf{y}^{\ast}\in\argmin_{\mathbf{y}\in H^1(\Omega; \mathbb{R}^3)}E_{str}[\mathbf{y}],\quad E_{str}[\mathbf{y}]:=\int_\Omega W_{str}(\mathbf{x}',\nabla\mathbf{y})d\mathbf{x}', \end{equation} where $W_{str}$ is a stretching energy density that is only a function of $\mathbf{x}'\in\Omega$ and the first fundamental form $\normalfont{\Romanbar{1}}[\mathbf{y}] = \nabla\mathbf{y}^T\nabla\mathbf{y}$. It is defined as \begin{equation}\label{eq:stretching-energy-density} W_{str}(\mathbf{x}',\nabla\mathbf{y}) := \lambda \left[\frac{1}{J[\mathbf{y}]}+\frac{1}{s+1}\left(\text{tr}(\normalfont{\Romanbar{1}}[\mathbf{y}]) + s_0 C_\mathbf{m}[\mathbf{y}] + s \frac{J[\mathbf{y}]}{C_\mathbf{m}[\mathbf{y}]}\right)\right] - 3, \end{equation} where the {\it actuation parameter} $\lambda :\Omega\to \R^+$ is given and well-defined by \begin{equation}\label{eq:lambda} \lambda = \lambda_{s,s_0} := \sqrt[3]{\frac{s+1}{s_0+1}}, \end{equation} because $s,s_0>-1$. If the material is heated, then $\lambda <1$, whereas if it is cooled, then $\lambda >1$. Moreover, $J[\mathbf{y}] ,C_\mathbf{m}[\mathbf{y}]$ are among the following abbreviations: \begin{equation}\label{eq:shortenings} J[\mathbf{y}] = \det \normalfont{\Romanbar{1}}[\mathbf{y}], \quad C_\mathbf{m}[\mathbf{y}] = \mathbf{m} \cdot \normalfont{\Romanbar{1}}[\mathbf{y}]\mathbf{m},\quad C_{\mathbf{m}_\perp}[\mathbf{y}] = \mathbf{m}_\perp \cdot \normalfont{\Romanbar{1}}[\mathbf{y}]\mathbf{m}_\perp. \end{equation} We employ a similar notation when the second argument of $W_{str}$ is $\mathbf{F}\in\R^{3\times 2}$ \begin{equation}\label{eq:shortenings-F} \begin{aligned} \normalfont{\Romanbar{1}}(\mathbf{F}) := \mathbf{F}^T\mathbf{F},& \quad J(\mathbf{F}) := \det \normalfont{\Romanbar{1}}(\mathbf{F}),\\ C_\mathbf{m}(\mathbf{F}) := \mathbf{m} \cdot\normalfont{\Romanbar{1}}(\mathbf{F})\mathbf{m},& \quad C_{\mathbf{m}_\perp}(\mathbf{F}) := \mathbf{m}_\perp \cdot \normalfont{\Romanbar{1}}(\mathbf{F})\mathbf{m}_\perp. \end{aligned} \end{equation} We also define the first order variational derivative of $\normalfont{\Romanbar{1}}[\mathbf{y}]$ along $\mathbf{v}$ as \begin{align}\label{eq:shortenings-linear-I} K[\mathbf{y},\mathbf{v}] := \delta \normalfont{\Romanbar{1}}[\mathbf{y}](\mathbf{v})=\nabla\mathbf{y}^T\nabla\mathbf{v}+\nabla\mathbf{v}^T\nabla\mathbf{y}, \end{align} for later use. We emphasize that since $s,s_0,\mathbf{m}$ depends on $\mathbf{x}'\in\Omega$ then $W_{str}$ also has an explicit dependence on $\mathbf{x}'$. We note that \eqref{eq:stretching-energy-density} is consistent with the stretching energy in \cite{ozenda2020blend} after additionally assuming an inextensibility constraint $J[\mathbf{y}] = 1$ and up to the multiplicative parameter $\lambda$ and the constant $-3$. The energy density \eqref{eq:stretching-energy-density} lacks quasi-convexity, the correct notion of convexity for a vector-valued problem. This is responsible for the main difficulties to prove convergence of our discretization as well as to design efficient iterative solvers for the discrete minimization problem. We discuss convergence of discrete minimizers in \cite{bouck2022NA}, and present an iterative scheme in Section \ref{sec:newton-scheme}. Throughout this work, we do not impose any boundary condition so that the material under consideration has \emph{free boundaries}. If necessary, one can take Dirichlet boundary conditions into account with a simple modification on the method. An important property of the stretching energy is that $W_{str}(\mathbf{x}',\nabla\mathbf{y})=0$ if and only if $\normalfont{\Romanbar{1}}[\mathbf{y}]=g$ pointwise, where $g\in\R^{2\times2}$ is the {\it target metric} \begin{equation}\label{eq:target-metric} g = \lambda^2\mathbf{m}\otimes \mathbf{m} +\lambda^{-1}\mathbf{m}_\perp\otimes \mathbf{m}_\perp; \end{equation} we show this property in Section \ref{sec:target-metric}. In the physics literature, maps $\mathbf{y}$ that satisfy the metric constraint $\normalfont{\Romanbar{1}}[\mathbf{y}]=g$ are known as spontaneous distortions \cite{warner2007liquid, modes2011gaussian}. The physics community has developed techniques to find such deformations in \emph{special situations}. Some examples are radially symmetric director fields \cite{warner2018nematic}, cylindrical shapes \cite{aharoni2014geometry}, and nonisometric origami \cite{modes2011blueprinting, plucinsky2018actuation, plucinsky2018patterning, plucinsky2016programming}. We refer to \cite{warner2020topographic} for a review of the techniques to predict shapes based on the metric. The purpose of this work is to provide a different approach via energy minimization and approximation. Rather than constructing $\mathbf{y}$ analytically such that $\normalfont{\Romanbar{1}}[\mathbf{y}] = g$, we numerically approximate minimizers to the stretching energy, which suits more general situations. \subsection{Discretizations} In this work, we propose a FEM discretization to \eqref{eq:stretching-energy}. We consider the space $\V_h$ of continuous piecewise linear finite elements over a shape regular mesh $\Th$, and approximate the deformation $\mathbf{y}$ by $\mathbf{y}_h\in\V_h$. To define a discrete energy, we replace $\mathbf{y}$ in \eqref{eq:stretching-energy} by $\mathbf{y}_h$ and then add a \emph{regularization} term \begin{equation}\label{eq:regularization} R_h[\mathbf{y}_h]:=c_rh^2\sum_{e\in\mathcal{E}_h}\frac{1}{h}\int_e \big|\jump{\nabla \mathbf{y}_h}\big|^2 \end{equation} to handle the lack of convexity of $E$. This regularization term is a scaled $L^2$ norm of jumps $\jump{\nabla \mathbf{y}_h}$ across all the interior edges $e\in\mathcal{E}_h$ of $\Th$, and provides a numerical selection mechanism to remove oscillations from equilibrium configurations; see Section \ref{sec:eff-reg}. We prove convergence of discrete minimizers in our accompanying paper \cite{bouck2022NA}. Moreover, we design a nonlinear gradient flow scheme with an embedded Newton sub-iteration, to solve the discrete minimization problem. \subsection{Our contributions and outline}\label{sec:contributions} We summarize our main contributions in this work as follows. \begin{itemize} \item \textbf{Asymptotic derivation of the $2D$ membrane model.} Motivated by \cite{ozenda2020blend}, we derive the $2D$ membrane model from $3D$ rubber elasticity via an asymptotic analysis. Inspired by \cite{cirak2014computational}, we also connect $W_{str}$ and $W_{3D}$ with the notion of minimal energy extension. This is the content of Sections \ref{sec:asymptotics} and \ref{sec:minimal-extension}. Moreover, we show that global minimizers of \eqref{eq:stretching-energy} satisfy the target metric \eqref{eq:target-metric} in Section \ref{sec:target-metric}.\looseness=-1 \smallskip \item \textbf{Asymptotic profiles of defects.} In Section \ref{sec:special-solution}, we present a new formal construction of solutions for rotationally symmetric blueprinted director fields $\mathbf{m}$ with a defect of degree $n>1$. Our technique hinges on the ideas of lifted surfaces (inspired by \cite{plucinsky2018actuation}), composition of defects and Taylor expansion. \smallskip \item \textbf{A new finite element discretization and iterative solver.} In Section \ref{sec:method}, we devise our finite element discretization of \eqref{eq:stretching-energy} that includes the regularization term \eqref{eq:regularization}, as well as a nonlinear gradient flow scheme together with a Newton sub-iteration to solve the resulting discrete nonconvex minimization problem. We prove that our scheme is an energy descent method. We also show well-posedness and convergence of the Newton sub-iteration provided the pseudo time step $\tau$ is moderately small relative to the meshsize $h$ and the previous iterate satisfies a suitable but plausible regularity assumption; proofs are given in the Appendix \ref{appendix:gf-ex-pf}. \smallskip \item \textbf{Numerical simulations.} In Section \ref{sec:simulations}, we present numerous simulations of practical interest. They illustrate the effectiveness of our method and features of this membrane model. In fact, they document that the algorithm and model can capture intriguing physical phenomena such as origami-like structures and deformations due to defects with varying degree. Our simulations also reveal the roles of parameters $s,s_0$ in the model, and the effect of regularization. \end{itemize} \section{Membrane model of liquid crystals polymer networks} In this section, we introduce a formal asymptotic derivation of a membrane model of LCNs, discuss properties of the model related to its global minimizers, and present a technique for formal construction of solution profiles with defects. \subsection{Derivation of stretching energy from asymptotics}\label{sec:asymptotics} This section is dedicated to deriving a 2D stretching or membrane energy from \eqref{eq:3D-energy} via formal asymptotics as the thickness $t$ goes to zero. In particular, we shall derive the formal limit $\lim_{t\to0}\frac{1}{t}E_{3D}[\mathbf{u}]$. This procedure will follow closely the derivation of \cite{ozenda2020blend}, but we will relax the simplifying assumption $\det \normalfont{\Romanbar{1}}[\mathbf{y}] = 1$ made in \cite{ozenda2020blend}. We also contrast the asymptotic method presented here with the more analytical method presented in \cite{cirak2014computational}. The connection between the two will be explored in Section \ref{sec:minimal-extension}. \subsubsection{Kirchhoff-Love assumption and overview of strategy}\label{sec:asymptotic-1} We assume that the 3D deformation $\mathbf{u}: \mathcal{B}:=\Omega \times (-t/2,t/2)\to \mathbb{R}^3$ takes the form \begin{equation}\label{eq:kirchhhoff-love-assumption} \mathbf{u}(\mathbf{x}',x_3) = \mathbf{y}(\mathbf{x}') +\phi(\mathbf{x}',x_3) \, \boldsymbol{\nu}(\mathbf{x}') \end{equation} where $\mathbf{y}:\Omega\to \mathbb{R}^3$ is the reduced deformation and $\boldsymbol{\nu}:\Omega\to \mathbb{R}^3$ is the normal to the deformed midplane $\mathbf{y}(\Omega)$. We posit that $\phi$ takes the form: \begin{equation}\label{eq:phi-expansion} \phi(\mathbf{x}',x_3) = \alpha(\mathbf{x}')x_3 + \mathcal{O}(x_3^2), \end{equation} which is a modified {\it Kirchhoff-Love assumption}. The higher order terms would be useful for deriving the bending energy, but we do not need them for the stretching energy. Note that $\alpha$ is undetermined for the moment. Later, $\alpha$ will be chosen so that $\mathbf{u}$ is incompressible in an asymptotic sense, i.e.\ $\det\nabla\mathbf{u}(\mathbf{x}',x_3) = 1 +\mathcal{O}(x_3)$. The goal of asymptotics is to write the energy $W_{3D}(\mathbf{x},\nabla \mathbf{u})$ given in \eqref{eq:neo-classical} for the deformation $\mathbf{u}$ in terms of powers of $t$ and the reduced stretching energy $W_{str}(\mathbf{x}',\nabla'\mathbf{y})$ \begin{equation}\label{eq:expansion} \int_{-t/2}^{t/2}\int_\Omega W_{3D}(\mathbf{x},\nabla \mathbf{u}) \, d\mathbf{x}' dx_3 = t \int_\Omega W_{str}(\mathbf{x}',\nabla'\mathbf{y}) \, d\mathbf{x}' + \mathcal{O}(t^3), \end{equation} where $\nabla':=(\partial_1,\partial_2)$ denotes the gradient with respect to $\mathbf{x}'$. The stretching energy $W_{str}$ in \eqref{eq:expansion} gives the leading order effects of the energy as the body thickness $t$ vanishes in the sense that formally \[ \lim_{t\to0}\frac{1}{t} \int_{-t/2}^{t/2}\int_\Omega {W}_{3D} (\mathbf{x},\nabla \mathbf{u}) \, d\mathbf{x}' dx_3 = \int_\Omega W_{str}(\mathbf{x}',\nabla'\mathbf{y}) \, d\mathbf{x}'. \] The third order term in \eqref{eq:expansion} corresponds to the bending energy $W_{ben}$ and is not the focus of the current work. Combined with the modified Kirchhoff-Love assumption \eqref{eq:kirchhhoff-love-assumption}, the process to derive the stretching energy is as follows: \begin{enumerate} \item Write the Cauchy tensor $\mathbf{C} = \mathbf{F}^T\mathbf{F}$ in terms of leading order terms. \item Write $W_{3D}$ in terms of $\mathbf{C}$ and powers of $x_3$. \item Collect $\mathcal{O}(1)$ terms of $W_{3D}$ which contribute to the stretching energy. \item Determine $\alpha$ so that $\mathbf{u}$ satisfies incompressibility in an asymptotic sense. \end{enumerate} \subsubsection{Cauchy tensor} Substituting \eqref{eq:kirchhhoff-love-assumption} into $\mathbf{C}:=\nabla\mathbf{u}^T\nabla\mathbf{u}$ yields \begin{equation} \mathbf{C} = \nabla \mathbf{u}^T\nabla \mathbf{u} = \begin{bmatrix}\mathbf{C}_\phi & \mathbf{C}_{1\times 2}^T\\ \mathbf{C}_{1\times 2} & \mathbf{C}_{1\times 1}\end{bmatrix}, \end{equation} where \begin{align} \mathbf{C}_\phi &= \nabla'\mathbf{y}^T\nabla'\mathbf{y} + \phi (\nabla'{\boldsymbol{\nu}}^T\nabla'\mathbf{y}+ \nabla'\mathbf{y}^T\nabla'{\boldsymbol{\nu}})+ \phi^2 \nabla'{\boldsymbol{\nu}}^T\nabla'{\boldsymbol{\nu}} +\nabla'\phi\otimes \nabla'\phi\\ \mathbf{C}_{1\times 2} &= (\boldsymbol{\nu}\otimes \nabla' \phi)^T\partial_3 \phi \boldsymbol{\nu} = \partial_3\phi \nabla' \phi\\ \mathbf{C}_{1\times 1} &= (\partial_3 \phi)^2. \end{align} Here, we have used the facts that $\nabla'\mathbf{y}^T\boldsymbol{\nu}=0$, $\nabla'{\boldsymbol{\nu}}^T\boldsymbol{\nu}=0$ and $|\boldsymbol{\nu}|=1$. Since $\nabla'\phi(\mathbf{x}',x_3) = \nabla'\alpha x_3+ \mathcal{O}(x_3^2)$ and $\partial_3 \phi(\mathbf{x}',x_3) = \alpha +\mathcal{O}(x_3)$, we have $C_{1\times2}~=~\mathcal{O}(x_3)$, and hence we may drop $C_{1\times2}$ as higher order terms. Also ignoring any terms higher than constant order, we have \begin{equation*} \mathbf{C}_\phi = \normalfont{\Romanbar{1}}[\mathbf{y}] +\mathcal{O}(x_3), \end{equation*} where $\normalfont{\Romanbar{1}}[\mathbf{y}]=\nabla'\mathbf{y}^T\nabla'\mathbf{y}$ is the first fundamental form of $\mathbf{y}$. Since \begin{equation*} \big(\partial_3\phi(\mathbf{x}',x_3) \big)^2 = \alpha(\mathbf{x}')^2 +\mathcal{O}(x_3), \end{equation*} we find \begin{equation}\label{eq:C-asymp} \mathbf{C} = \begin{bmatrix}\normalfont{\Romanbar{1}}[\mathbf{y}] & 0\\ 0 & \alpha(\mathbf{x}')^2\end{bmatrix} +\mathcal{O}(x_3). \end{equation} \subsubsection{Expanding $W_{3D}$} Recall that we assume that the $3D$ blueprinted director field ${\bf m}$ {\it lies in the plane} i.e. \begin{equation}\label{eq:m-in-plane} {\bf m}(\mathbf{x}) = ({\bf \widetilde{m}}(\mathbf{x}'), 0 )^T. \end{equation} First, substituting the kinematic constraint \eqref{eq:kinematic-cons} into \eqref{eq:neo-classical} with $\mathbf{F}=\nabla\mathbf{u}$, we obtain \begin{equation}\label{eq:3D-energy-intermediate} W_{3D}(\mathbf{x}',\nabla\mathbf{u})=\lambda\Big(\tr \, \mathbf{C}+\frac{s_0}{s+1}\mathbf{m}\cdot \mathbf{C}\mathbf{m}-\frac{s}{s+1}\frac{\mathbf{m}\cdot \mathbf{C}^2\mathbf{m}}{\mathbf{m}\cdot \mathbf{C}\mathbf{m}}\Big)-3, \end{equation} where $\lambda$ is defined in \eqref{eq:lambda}, and we notice that from now on $W_{3D}$ depends on $\mathbf{x}'$ instead of $\mathbf{x}$, due to the assumption \eqref{eq:m-in-plane}. Then plugging the asymptotic form \eqref{eq:C-asymp} of $\mathbf{C}$ into \eqref{eq:3D-energy-intermediate} and using \eqref{eq:m-in-plane}, the energy density $W_{3D}(\mathbf{x}',\nabla\mathbf{u})$ becomes \begin{equation*} \begin{aligned} W_{3D} &(\mathbf{x}',\nabla\mathbf{u}) \\ & = \lambda\left[\text{tr} \,\normalfont{\Romanbar{1}}[\mathbf{y}] +\alpha(\mathbf{x}')^2+ \frac{s_0}{s+1} {\bf \widetilde{m}}\cdot \normalfont{\Romanbar{1}}[\mathbf{y}]{\bf \widetilde{m}} - \frac{s}{s+1} \frac{{\bf \widetilde{m}}\cdot \normalfont{\Romanbar{1}}[\mathbf{y}]^2{\bf \widetilde{m}}}{{\bf \widetilde{m}}\cdot \normalfont{\Romanbar{1}}[\mathbf{y}]{\bf \widetilde{m}}}\right]-3 +\mathcal{O}(x_3). \end{aligned} \end{equation*} Since $\normalfont{\Romanbar{1}}[\mathbf{y}]$ is a $2\times 2$ matrix, the Caley-Hamilton Theorem gives $$\normalfont{\Romanbar{1}}[\mathbf{y}]^2 = \big(\text{tr} \, \normalfont{\Romanbar{1}}[\mathbf{y}]\big) \, \normalfont{\Romanbar{1}}[\mathbf{y}] - \text{det}\, \normalfont{\Romanbar{1}}[\mathbf{y}] \, I_2,$$ so that the energy now reads \begin{equation*} \begin{aligned} W_{3D} & (\mathbf{x}',\nabla\mathbf{u}) \\ & = \lambda\left[\alpha(\mathbf{x}')^2+\frac{1}{s+1}\left(\text{tr} \,\normalfont{\Romanbar{1}}[\mathbf{y}] + s_0 {\bf \widetilde{m}}\cdot \normalfont{\Romanbar{1}}[\mathbf{y}]{\bf \widetilde{m}} + s \frac{\text{det} \normalfont{\Romanbar{1}}[\mathbf{y}]}{{\bf \widetilde{m}}\cdot \normalfont{\Romanbar{1}}[\mathbf{y}]{\bf \widetilde{m}}}\right)\right] - 3 +\mathcal{O}(x_3). \end{aligned} \end{equation*} We now have all the constant order terms of $W_{3D}(\mathbf{x}',\nabla\mathbf{u})$. The only remaining task is to determine $\alpha(\mathbf{x}')$. We do this next. \subsubsection{Incompressibility}\label{sec:asymptotic-4} Since we would like $\mathbf{u}$ to satisfy incompressibility $\det \nabla\mathbf{u} = 1 + \mathcal{O}(x_3)$, we impose $\text{det} \, \mathbf{C} = 1+ \mathcal{O}(x_3)$. By \eqref{eq:C-asymp}, we see that \begin{equation} \text{det} \,\mathbf{C} = \text{det} \,\normalfont{\Romanbar{1}}[\mathbf{y}] \,\alpha(\mathbf{x}')^2 + \mathcal{O}(x_3), \end{equation} whence \begin{equation} \alpha(\mathbf{x}') = \frac{1}{\sqrt{\text{det} \, \normalfont{\Romanbar{1}}[\mathbf{y}] }} \end{equation} gives us the desired equality $\text{det} \,\mathbf{C} = 1+ \mathcal{O}(x_3)$. This further implies \begin{equation}\label{eq:gradu-grady} \nabla \mathbf{u} = [\nabla\mathbf{y}, (\det \, \normalfont{\Romanbar{1}}[\mathbf{y}])^{-1/2} \boldsymbol{\nu}] + \mathcal{O}(x_3). \end{equation} \subsubsection{Stretching energy} For convenience of presentation, from now on we slightly abuse notation and drop the prime for $\nabla'$ and tilde for $\widetilde\mathbf{m}$. Therefore, we will denote \begin{equation}\label{eq:m-tildem} \mathbf{m} = \widetilde\mathbf{m}\in\R^2, \quad \mathbf{m} = (\widetilde\mathbf{m},0)^T \in \R^3 \end{equation} depending on whether we regard $\mathbf{m}$ as a vector in $\R^2$ or $\R^3$. We conclude that, with the steps built in Sections \ref{sec:asymptotic-1}-\ref{sec:asymptotic-4}, we finally derive the stretching energy in \eqref{eq:stretching-energy-density}. \subsection{Minimal energy extension.}\label{sec:minimal-extension} In this section we show that the stretching energy density \eqref{eq:stretching-energy-density} is the minimal energy extension of the 3D energy \eqref{eq:neo-classical}. The proof is similar to that of \cite[Lemma 5.3]{cesana2015effective} and is related to how \cite{cirak2014computational} derives the model. \begin{prop}[minimal energy extension]\label{prop:minimal-energy-extension} Let $\mathbf{F}\in \mathbb{R}^{3\times2}$ have rank 2. We have the following equality between $W_{str}$ defined in \eqref{eq:stretching-energy-density} and $W_{3D}$ given in \eqref{eq:neo-classical} \begin{equation} W_{str}(\mathbf{x}',\mathbf{F}) = \inf_{\mathbf{b}\in \mathbb{R}^3:\det [\mathbf{F},\;\mathbf{b}] = 1} W_{3D}(\mathbf{x}',[\mathbf{F},\;\mathbf{b}]) \, . \end{equation} Moreover, the unique minimizer $\mathbf{b}$ is \begin{equation} \frac{\mathbf{F}_1\times\mathbf{F}_2}{|\mathbf{F}_1\times\mathbf{F}_2|^2} =: \mathrm{argmin}_{\mathbf{b}\in \mathbb{R}^3:\det [\mathbf{F},\;\mathbf{b}] = 1} W_{3D}(\mathbf{x}',[\mathbf{F},\;\mathbf{b}]), \end{equation} where $\mathbf{F}_1,\mathbf{F}_2$ are columns of $\mathbf{F}$. \end{prop} \begin{proof} The incompressibility constraint reads $\det [\mathbf{F}, \mathbf{b}] = \mathbf{b}^T(\mathbf{F}_1\times \mathbf{F}_2) = 1$. Using \eqref{eq:3D-energy-intermediate} and \eqref{eq:m-tildem} to determine $W_{3D}(\mathbf{x}',[\mathbf{F}, \mathbf{b}])$ for $\mathbf{b}\in \mathbb{R}^3$ yields \[ W_{3D}(\mathbf{x}',[\mathbf{F},\mathbf{b}]) = \lambda\Big(\tr \,\normalfont{\Romanbar{1}}(\mathbf{F}) +|\mathbf{b}|^2 +\frac{s_0}{s+1}C_\mathbf{m}(\mathbf{F}) - \frac{s}{s+1}\frac{|\normalfont{\Romanbar{1}}(\mathbf{F})\mathbf{m}|^2 +(\mathbf{b}\cdot \mathbf{F}{\mathbf{m}})^2}{C_\mathbf{m}(\mathbf{F})}\Big)-3. \] If we append the term $\mu\big(\mathbf{b}^T(\mathbf{F}_1\times \mathbf{F}_2) - 1\big)$ to $W_{3D}(\mathbf{x}',[\mathbf{F},\mathbf{b}])$, with Lagrange multiplier $\mu$, we see that $\mathbf{b}$ and $\mu$ solve the following saddle point system \[ \begin{pmatrix} 2\lambda \Big(I_3 -\frac{s}{(s+1)C_\mathbf{m}(\mathbf{F})}\mathbf{F}{\mathbf{m}}\otimes \mathbf{F}{\mathbf{m}}\Big) & \mathbf{F}_1\times \mathbf{F}_2 \\ (\mathbf{F}_1\times\mathbf{F}_2)^T & 0 \end{pmatrix} \begin{pmatrix} \mathbf{b} \\ \mu\end{pmatrix} = \begin{pmatrix} 0 \\ 1 \end{pmatrix} \, , \] whose unique solution is $\mathbf{b} = (\mathbf{F}_1\times\mathbf{F}_2)/|\mathbf{F}_1\times\mathbf{F}_2|^2$ and $\mu = -\frac{2\lambda}{|\mathbf{F}_1\times\mathbf{F}_2|^2}$. Note that the uniqueness of $\mathbf{b}$ follows from the invertibility of the upper-left $3\times3$ block matrix, which follows from the fact that $\frac{s}{s+1}<1$. Since $|\mathbf{F}_1\times\mathbf{F}_2|^2 = \det \normalfont{\Romanbar{1}} (\mathbf{F}) = J(\mathbf{F})$, substituting the minimizing $\mathbf{b}$ into the 3D energy yields \begin{equation}\label{eq:3D-pre-cayley} W_{3D} \big(\mathbf{x}',[\mathbf{F},\mathbf{b}] \big) = \lambda\Big(\tr \, \normalfont{\Romanbar{1}}(\mathbf{F}) +\frac{1}{J(\mathbf{F})} +\frac{s_0}{s+1}C_\mathbf{m}(\mathbf{F}) - \frac{s}{s+1}\frac{|\normalfont{\Romanbar{1}}(\mathbf{F}){\mathbf{m}}|^2}{C_\mathbf{m}(\mathbf{F})}\Big)-3. \end{equation} Applying the Cayley Hamilton Theorem for a $2\times2$ matrix $\mathbf{A}$, namely $\mathbf{A}^2 - \tr(\mathbf{A})\mathbf{A} + (\det\mathbf{A})I} % {\normalfont{\Romanbar{1}}_2 = \mathbf{0}$, to the last term inside bracket on the RHS of \eqref{eq:3D-pre-cayley} yields \begin{equation}\label{eq:cayley} \frac{|\normalfont{\Romanbar{1}}(\mathbf{F}){\mathbf{m}}|^2}{C_\mathbf{m}(\mathbf{F})} = \frac{\mathbf{m}\cdot\normalfont{\Romanbar{1}}(\mathbf{F})^2\mathbf{m}}{C_\mathbf{m}(\mathbf{F})} = \tr \,\normalfont{\Romanbar{1}}(\mathbf{F}) -\frac{J(\mathbf{F})}{C_\mathbf{m}(\mathbf{F})}. \end{equation} We then insert \eqref{eq:cayley} into the RHS of \eqref{eq:3D-pre-cayley} to obtain \begin{equation*} W_{3D}\big(\mathbf{x}',[\mathbf{F},\mathbf{b}]\big)= \lambda\Big(\frac{1}{J(\mathbf{F})}+\frac{1}{s+1}\Big[\tr \,\normalfont{\Romanbar{1}}(\mathbf{F}) + s_0C_\mathbf{m}(\mathbf{F}) + s \frac{J(\mathbf{F})}{C_\mathbf{m}(\mathbf{F})}\Big]\Big)-3= W_{str}(\mathbf{x}',\mathbf{F}), \end{equation*} which is the desired equality. \end{proof} \begin{remark}[asymptotics vs minimal energy extension]\label{rem:minimal-energy-and-asymptotics} \rm If $\mathbf{F} = \nabla\mathbf{y}$, then the minimizing $\mathbf{b}$ in Proposition \ref{prop:minimal-energy-extension} is \begin{equation*} \mathbf{b} = \frac{\boldsymbol{\nu}}{\sqrt{\det I[\mathbf{y}]}}. \end{equation*} This corroborates that the asymptotic expression \eqref{eq:gradu-grady} gives the correct extension. However, this formula for $\mathbf{b}$ relies on the fact that $\mathbf{m}$ is planar; see \eqref{eq:m-tildem}. If $\mathbf{m}$ were not planar, then the formula for $\mathbf{b}$ would be more complicated. We refer to \cite{plucinsky2018actuation}. \end{remark} The next corollary is an easy consequence of Proposition \ref{prop:minimal-energy-extension} and \eqref{eq:nondegeneracy}. \begin{cor}[nondegeneracy]\label{cor:stretching-nondegeneracy} The stretching energy $W_{str}(\mathbf{F})$ satisfies \begin{equation} W_{str}\big(\mathbf{x}',\mathbf{F}\big)\geq \mathrm{dist}\big(\mathbf{L}_{\mathbf{n}}^{-1/2}[\mathbf{F}, \; \mathbf{b}]\mathbf{L}_{\mathbf{m}}^{1/2},SO(3)\big)^2\geq 0 \end{equation} for all $\mathbf{F}\in \mathbb{R}^{3\times2}$ such that $\mathrm{rank}(\mathbf{F})=2$ and $\mathbf{b} = \frac{\mathbf{F}_1\times\mathbf{F}_2}{|\mathbf{F}_1\times\mathbf{F}_2|^2}$. \end{cor} \subsection{Global minimizers and target metrics.}\label{sec:target-metric} In this section, we characterize global minimizers of \eqref{eq:stretching-energy}. We show that minimizing the stretching energy density $W_{str}$ is equivalent to satisfying the target metric constraint pointwise. We point to \cite[Appendix A]{plucinsky2018actuation} for a similar result, but for a related 3 dimensional model. \begin{prop}[target metric]\label{prop:target-metric} The stretching energy density $W_{str}(\mathbf{x}',\mathbf{F}) = 0$ vanishes at $\mathbf{F}\in\R^{3\times2}$ if and only if $\normalfont{\Romanbar{1}}(\mathbf{F}) = g$ where $g\in\mathbb{R}^{2\times2}$ is given by \begin{equation}\label{eq:target-metric} g = \lambda^2 {\mathbf{m}}\otimes{\mathbf{m}} +\lambda^{-1}{\mathbf{m}}_\perp\otimes{\mathbf{m}}_\perp, \end{equation} $\lambda$ is defined in \eqref{eq:lambda} and $\mathbf{m}_\perp:\Omega\to\mathbb{S}^1$ is perpendicular to $\mathbf{m}$. \end{prop} \begin{proof} First suppose that $\normalfont{\Romanbar{1}}(\mathbf{F}) = g$. Inserting \eqref{eq:target-metric} into \eqref{eq:stretching-energy-density} gives \begin{align*} W_{str}(\mathbf{x}',\mathbf{F}) &= \lambda\left(\frac{1}{\det g} +\frac{1}{s+1}\left(\tr g +s_0{\mathbf{m}}\cdot g{\mathbf{m}} +s\frac{\det g}{{\mathbf{m}}\cdot g{\mathbf{m}}}\right)\right) - 3\\ &= \lambda\left(\lambda^{-1} +\frac{1}{s+1}\left(\lambda^2+\lambda^{-1} +s_0\lambda^2 +s\lambda^{-1}\right)\right) - 3\\ &= \lambda\left(\lambda^{-1} +\frac{1}{s+1}\left((s_0+1)\lambda^2+(s+1)\lambda^{-1} \right)\right) - 3\\ &= \lambda\left(2\lambda^{-1} +\frac{s_0+1}{s+1}\lambda^2\right) - 3. \end{align*} Note that $\frac{s_0+1}{s+1} = \lambda^{-3}$, whence \begin{align*} W_{str}(\mathbf{x}',\mathbf{F}) & = \lambda\left(2\lambda^{-1} +\lambda^{-3}\lambda^2\right) - 3=0. \end{align*} Now suppose that $W_{str}(\mathbf{x}',\mathbf{F})=0$. Corollary \ref{cor:stretching-nondegeneracy} (nondegeneracy) guarantees \begin{equation*} 0 = W_{str}(\mathbf{x}',\mathbf{F}) \geq \mathrm{dist}(\mathbf{L}_\mathbf{n}^{-1/2}[\mathbf{F},\; \mathbf{b}]\mathbf{L}_\mathbf{m}^{1/2},SO(3))^2\geq0, \end{equation*} for $\mathbf{b} = \frac{\mathbf{F}_1\times \mathbf{F}_2}{|\mathbf{F}_1\times \mathbf{F}_2|^2}$. This implies there is a rotation $\mathbf{R}\in SO(3)$ such that \begin{equation*} \mathbf{L}_\mathbf{n}^{-1/2}[\mathbf{F},\; \mathbf{b}]\mathbf{L}_\mathbf{m}^{1/2} = \mathbf{R}. \end{equation*} Multiplying both sides by $\mathbf{R}^T$ yields \begin{equation*} \mathbf{L}_\mathbf{m}^{1/2}[\mathbf{F},\; \mathbf{b}]^T \mathbf{L}_\mathbf{n}^{-1}[\mathbf{F},\; \mathbf{b}]\mathbf{L}_\mathbf{m}^{1/2} =I} % {\normalfont{\Romanbar{1}}_3. \end{equation*} We shall now perform some algebraic operations to determine what $\normalfont{\Romanbar{1}}(\mathbf{F})=\mathbf{F}^T\mathbf{F}$ should satisfy. First, multiplying on the left and right by $\mathbf{L}_\mathbf{m}^{-1/2}$ gives \begin{equation*} [\mathbf{F},\; \mathbf{b}]^T \mathbf{L}_\mathbf{n}^{-1}[\mathbf{F},\; \mathbf{b}] =\mathbf{L}_\mathbf{m}^{-1}. \end{equation*} The definitions \eqref{eq:def-Lm} and \eqref{eq:def-Ln} of $\mathbf{L}_\mathbf{m}$ and $\mathbf{L}_\mathbf{n}$, with $\mathbf{m}\in\R^3$ given by \eqref{eq:m-tildem}, imply \[ \mathbf{L}_\mathbf{m}^{-1} = (s_0+1)^{1/3}\Big(I} % {\normalfont{\Romanbar{1}}_3 - \frac{s_0}{s_0+1} \mathbf{m}\otimes\mathbf{m}\Big), \quad \mathbf{L}_\mathbf{n}^{-1} = (s+1)^{1/3}\Big(I} % {\normalfont{\Romanbar{1}}_3 - \frac{s}{s+1} \mathbf{n}\otimes\mathbf{n}\Big), \] and combined with the kinematic constraint $\mathbf{n} = \frac{\mathbf{F}\mathbf{m}}{|\mathbf{F}\mathbf{m}|}$, this further yields \begin{equation}\label{eq:lhs-fprime-eq} \begin{aligned} \mathbf{L}_{\mathbf{m}}^{-1} = [\mathbf{F},\; \mathbf{b}]^T \mathbf{L}_\mathbf{n}^{-1}[\mathbf{F},\; \mathbf{b}] &= (s+1)^{1/3}\begin{pmatrix}\normalfont{\Romanbar{1}}(\mathbf{F}) & 0\\ 0 & \frac{1}{J(\mathbf{F})} \end{pmatrix} \\ &- \frac{s}{(s+1)^{2/3}C_\mathbf{m}(\mathbf{F})} \begin{pmatrix} \normalfont{\Romanbar{1}}(\mathbf{F}){\mathbf{m}}\otimes \normalfont{\Romanbar{1}}(\mathbf{F}){\mathbf{m}} & 0 \\ 0 &0 \end{pmatrix}. \end{aligned} \end{equation} We express $\normalfont{\Romanbar{1}}(\mathbf{F})$ in terms of the orthonormal basis ${\mathbf{m}},{\mathbf{m}}_\perp\in\R^2$ and scalars $a_1,a_2,a_3$ \begin{equation*} \normalfont{\Romanbar{1}}(\mathbf{F})=a_1{\mathbf{m}}\otimes{\mathbf{m}} +a_2{\mathbf{m}}_\perp\otimes{\mathbf{m}}_\perp+ a_3({\mathbf{m}}_\perp\otimes{\mathbf{m}}+{\mathbf{m}}\otimes{\mathbf{m}}_\perp). \end{equation*} We also extend $\mathbf{m}$ to $\R^3$, according to \eqref{eq:m-tildem}, and represent $\mathbf{L}_{\mathbf{m}}^{-1}$ on the orthonormal basis $(\mathbf{m},0)^T, (\mathbf{m}_\perp,0)^T,\mathbf{e}_3$ of $\R^3$. We next compare the upper-left $2\times2$ blocks of the matrix representations of the left and right-hand sides of \eqref{eq:lhs-fprime-eq} to obtain \begin{equation*} \begin{pmatrix} (s_0+1)^{-2/3} & 0 \\ 0 &(s_0+1)^{1/3}\end{pmatrix} = (s+1)^{1/3}\begin{pmatrix}a_1 & a_3 \\ a_3 &a_2\end{pmatrix} - \frac{s}{(s+1)^{2/3}} \begin{pmatrix} a_1 & a_3 \\ a_3 &a_3^2/a_1\end{pmatrix}. \end{equation*} By matching entries, $a_3$ must vanish and $(s+1)^{1/3}a_2 = (s_0+1)^{1/3}$, which entails that $a_2 = \left(\frac{s_0+1}{s+1}\right)^{1/3} = \lambda^{-1}$. Finally, \[ (s_0+1)^{-2/3} = \big((s+1)^{1/3}-s(s+1)^{-2/3}\big)a_1 = (s+1)^{-2/3}a_1, \] whence $a_1 = \left(\frac{s+1}{s_0+1}\right)^{2/3} = \lambda^2$. Therefore, we get \begin{equation*} \normalfont{\Romanbar{1}}(\mathbf{F})=\lambda^2{\mathbf{m}}\otimes{\mathbf{m}} +\lambda^{-1}{\mathbf{m}}_\perp\otimes{\mathbf{m}}_\perp = g, \end{equation*} which is the desired expression of $\normalfont{\Romanbar{1}}(\mathbf{F})$. \end{proof} A direct consequence of the characterization of the target metric is that $H^1$ isometric immersions of $g$ are minimizers to the stretching energy. \begin{cor}[immersions of $g$ are minimizers with vanishing energy]\label{cor:minimizers} A deformation $\mathbf{y}\in H^1(\Omega;\mathbb{R}^3)$ satisfies \begin{equation}\label{eq:metric-cons} \normalfont{\Romanbar{1}}[\mathbf{y}]=g\text{ a.e. in }\Omega, \end{equation} i.e., $\mathbf{y}$ is an \emph{isometric immersion} of the metric $g$ defined in \eqref{eq:target-metric}, if and only if $\mathbf{y}$ is a global minimizer to \eqref{eq:stretching-energy} with $E_{str}[\mathbf{y}]=0$. \end{cor} Therefore, the solvability of \eqref{eq:stretching-energy} is related to the long standing open problem in differential geometry of existence of isometric immersions in $\mathbb{R}^3$ for a general metric $g:\Omega\to\mathbb{R}^{2\times2}$. Smooth isometric immersions in $\mathbb{R}^3$ are known to exist for certain metrics with positive or negative curvatures, while there are also examples of metrics that have no $C^2$ isometric immersions; we refer to the book \cite{han2006isometric} for discussions and further references. Corollary \ref{cor:minimizers} requires the minimal regularity $\mathbf{y}\in H^1(\Omega;\mathbb{R}^3)$, but we further assume the existence of an $H^2$ isometric immersion to prove convergence of our FEM with regularization \eqref{eq:regularization} in \cite{bouck2022NA}. The existence of either $H^1$ or $H^2$ isometric immersions seems to be an open question, to the best of our knowledge. Finally, it is conceivable that $g$ is not immersible and yet there is a global minimizer $\mathbf{y}$ of \eqref{eq:stretching-energy} with $E_{str}[\mathbf{y}]>0$; this justifies the requirement $E_{str}[\mathbf{y}]=0$ in Corollary \ref{cor:minimizers}. We explore this matter computationally in Section \ref{sec:incompatible-s}. \section{Asymptotic profiles of defects}\label{sec:special-solution} We now construct asymptotic profiles for blueprinted director fields $\mathbf{m}$ with defects of several degrees. We are not aware of studies of shapes beyond the Gauss curvature obtained in \cite{modes2011blueprinting} for higher degree defects. Our approximate solutions provide insight on the complicated shapes that can be programmed upon actuation. We reproduce these profiles computationally later in Section \ref{sec:dir_defect}. \subsection{Lifted surfaces}\label{sec:lifted-surface} Lifted surfaces for LCNs/LCEs are originally introduced in \cite{plucinsky2018actuation}. We adapt the idea to the reduced model \eqref{eq:stretching-energy} in this subsection. To this end, we consider the following parameterization of lifted surfaces \begin{equation}\label{eq:lifted-surface-1} \mathbf{y}^{l}(\mathbf{x}') = \big(\alpha \mathbf{x}',\phi(\alpha\mathbf{x}') \big)^T \quad \forall\mathbf{x}'\in\Omega, \end{equation} where $\alpha\in\mathbb{R}$ will be determined later. Here, $\phi:\alpha\Omega\to \mathbb{R}$ represents the graph of the lifted surfaces. Our goal is to match the metric $g$ in \eqref{eq:target-metric} with $\normalfont{\Romanbar{1}}[\mathbf{y}^l]$, i.e, \begin{equation}\label{eq:metric-lifted-1} \normalfont{\Romanbar{1}}[\mathbf{y}^l] = g = \lambda^2\mathbf{m}\otimes\mathbf{m}+ \lambda^{-1}\mathbf{m}_{\perp}\otimes\mathbf{m}_{\perp} = (\lambda^2 - \lambda^{-1})\mathbf{m}\otimes\mathbf{m}+\lambda^{-1}I} % {\normalfont{\Romanbar{1}}_2. \end{equation} Since \eqref{eq:lifted-surface-1} yields \begin{equation}\label{eq:metric-lifted-2} \normalfont{\Romanbar{1}}[\mathbf{y}^l] = \alpha^2\nabla\phi(\alpha\mathbf{x}')\otimes \nabla\phi(\alpha\mathbf{x}') +\alpha^2I} % {\normalfont{\Romanbar{1}}_2, \end{equation} \eqref{eq:metric-lifted-1} is valid if $\phi$ satisfies $|\nabla\phi|=\sqrt{\lambda^3-1}$ a.e. in $\Omega$, and $\alpha=\lambda^{-1/2}$, with the properties that $\lambda>1$ and $\lambda$ is \emph{constant} over $\Omega$. Substituting them into \eqref{eq:lifted-surface-1} gives \begin{equation}\label{eq:lifted-surface-2} \mathbf{y}^{l}(\mathbf{x}') = \Big(\vx_\lambda',\phi(\vx_\lambda')\Big)^T, \quad \vx_\lambda':=\lambda^{-1/2}\mathbf{x}'. \end{equation} Since this deformation is an isometric immersion of the metric \eqref{eq:target-metric}, it is also an equilibrium configuration provided $\mathbf{m}(\mathbf{x}')=\pm (\lambda^3-1)^{-1/2}\nabla\phi(\vx_\lambda')$ according to Corollary \ref{cor:minimizers}. We observe that the discussion so far has restricted $\lambda>1$, which means the LCN is being cooled. If $\lambda<1$ and $\phi$ satisfies $\pm\sqrt{\lambda^{-3} - 1}\nabla \phi (\lambda \mathbf{x}') = \mathbf{m}_\perp(\mathbf{x}')$, then a lifted surface of the form \begin{equation}\label{eq:lifted-surface-heat} \mathbf{y}^{l}(\mathbf{x}') = \Big(\lambda \mathbf{x}',\phi(\lambda \mathbf{x}')\Big)^T, \end{equation} satisfies $\normalfont{\Romanbar{1}}[\mathbf{y}^{l}] = g$. Since a lifted surface may be constructed for $\lambda<1$ in a similar fashion as for $\lambda>1$, we restrict the remaining discussion of this section to $\lambda>1$. However, we note that the computations in Section \ref{sec:dir_defect} typically set $\lambda<1$. \subsection{Surfaces for defects of degree $1$ and $1/2$}\label{sec:metric-1-defects} To set the stage, we first go over known lifted surfaces that arise from degree 1 and degree 1/2 defects. These solutions will match the metric $g$ exactly, and will help us later in constructing approximate solutions for higher order defects in Sections \ref{sec:metric-two-defects} and \ref{sec:metric-3half-defects}. A director field $\mathbf{m}_1$ with a defect of degree $1$ reads \begin{equation}\label{eq:degree1} \mathbf{m}_1(\mathbf{x}') = \frac{\mathbf{x}'}{|\mathbf{x}'|}. \end{equation} If $\mathbf{R}_1$ is a rotation of $\pm\pi/2$, the corresponding exact solution $\mathbf{y}_1$ for $\mathbf{R}_1\mathbf{m}_1$ reads \begin{equation}\label{eq:cone} \mathbf{y}_1(\mathbf{x}') = \Big(\vx_\lambda', \phi_1(\vx_\lambda')\Big)^T \end{equation} where \begin{equation}\label{eq:cone-phi} \phi_1(\mathbf{x}') = \sqrt{\lambda^3-1}\;(1 - |\mathbf{x}'|); \end{equation} $\mathbf{y}_1$ is a {\it cone} with vertex at the origin as long as $\lambda>1$ \cite{modes2011gaussian}. If $\lambda<1$, then the cone solution in \eqref{eq:cone-phi} is no longer well defined. In fact, the director field $\mathbf{m}_1$ in \eqref{eq:degree1} will produce what is known as an {\it anticone} configuration \cite{modes2011gaussian}. The solution for a degree 1 defect will be a cone or anti-cone depending on the angle $\alpha_r$ between $\mathbf{m}_1$ and $\mathbf{x}'$ as well as $\lambda$ \cite{mostajeran2016encoding}. See Fig.~\ref{fig:cone-anticone} for the cone and anti-cone shapes computed by our algorithm. \begin{figure}[htbp] \includegraphics[width=.7\textwidth]{pics/cone-anticone} \caption{Computed solution with the blueprinted director field $\mathbf{m}_1$ that has degree $1$ defect, $\lambda<1$ and $\alpha_r=0\text{ (right)},\pi/2\text{ (left)}$. We refer to Section \ref{sec:dir_defect} for details of these numerical simulations.} \label{fig:cone-anticone} \end{figure} Next, we introduce a solution induced by a director field with a degree $1/2$ defect, which will help us construct an approximate solution for a degree $3/2$ defect in Section \ref{sec:metric-3half-defects}. Motivated by \cite{modes2011blueprinting}, we consider the director field \begin{equation}\label{eq:degree-1half} \mathbf{m}_{1/2}(\mathbf{x}') = \begin{cases} \text{sign}(x_2)\mathbf{e}_2, & x_1\geq 0 \\ \frac{\mathbf{x}'}{|\mathbf{x}'|}, & x_1<0 \, , \end{cases} \end{equation} and note that $\mathbf{m}_\perp\otimes\mathbf{m}_\perp$ is the typical line field for a defect of degree $1/2$ at the origin. Since $\mathbf{m}_{1/2}(\mathbf{x}') = \mathbf{m}_1(\mathbf{x}')$ when $x_1<0$, we expect a cone configuration forming in the left half-plane. For $\lambda>1$, an exact solution is given by the lifted surface configuration \begin{equation}\label{eq:soln-degree-1half} \mathbf{y}_{1/2}(\mathbf{x}') = \Big(\vx_\lambda', \phi_{1/2}(\vx_\lambda') \Big)^T, \end{equation} where \begin{equation}\label{eq:lifted-degree-1half} \phi_{1/2}(\mathbf{x}') = \begin{cases} \sqrt{\lambda^3-1}\; (1 - |x_2|),& x_1\geq 0 \\ \sqrt{\lambda^3-1}\; (1 - |\mathbf{x}'|), & x_1<0 \end{cases}. \end{equation} This entails stretching in the direction $\mathbf{m}_{1/2}$ and shrinking in the perpendicular direction $\mathbf{m}_{1/2}^\perp$, which in turn explains the shape of $\mathbf{y}_{1/2}$ in Fig.~\ref{fig:deg-half} for $x_1>0$. We see that when $x_1<0$, the map $\mathbf{y}_{1/2}$ coincides with the cone in \eqref{eq:cone}. We plot $\mathbf{m}_{1/2}$ (left), $\mathbf{y}_{1/2}$ (middle) and our computed solution (right) in Fig.\ref{fig:deg-half}. \begin{figure}[htbp] \includegraphics[width=0.95\textwidth]{pics/deg-0p5-BC} \caption{Director field $\mathbf{m}_{1/2}$ from \eqref{eq:degree-1half} (left), lifted surface $\mathbf{y}_{1/2}$ from \eqref{eq:soln-degree-1half}-\eqref{eq:lifted-degree-1half} for $\lambda =2^{1/3}$ (middle), and computed solution in a unit disc domain with $\mathbf{m}=\mathbf{m}_{1/2}$ and a Dirichlet boundary condition that is compatible with \eqref{eq:soln-degree-1half}-\eqref{eq:lifted-degree-1half} (right). Note that the gradient of $\phi_{1/2}$ is parallel to $\mathbf{m}_{1/2}$ whereas $\mathbf{m}_{1/2}^\perp$ is the typical director field for a $1/2$ defect.} \label{fig:deg-half} \end{figure} \subsection{Higher degree defects: main idea and idealized construction }\label{sec:higher-degree-idea} We now consider rotationally symmetric blueprinted director fields $\mathbf{m}_n$ with defects of integer degree $n>1$. Such director fields are given in polar coordinates by \begin{equation}\label{eq:m_rot_sym_1} \mathbf{m}_{n}(r,\theta) = \big(\cos(n\theta),\sin(n\theta) \big). \end{equation} We observe that the line field $\mathbf{m}_n\otimes\mathbf{m}_n$ in \eqref{eq:metric-lifted-1} exhibits a discontinuity at the origin. We denote by $g_n$ the metric generated by $\mathbf{m}_{n}$ and arbitrary $\lambda$ via \eqref{eq:target-metric}. Ideally, the goal is to build on the solution \eqref{eq:cone} for $n=1$ and composition of defects to obtain a solution $\mathbf{y}_n$ with degree $n$ defect. The main idea is as follows. We exploit the relation to the complex-valued function $f_n(z) = e^{in\arg(z)}$ to write \[ \mathbf{m}_n({\bf x}') = p^{-1} \big(f_n(p(\mathbf{x}'))\big), \] where $z=|z| e^{i\arg(z)}$ for any $z\in\mathbb{C}$ and $p:\mathbb{R}^2\to \mathbb{C}$ is the map $p(\mathbf{x}') = x_1+i x_2$. From this perspective, we can write a director field with degree $n$ defect as the multiplication or composition of two director fields with degree $1$ and $n-1$ defects \[ e^{in\text{arg}(z)} = e^{i\text{arg}(z)}e^{i(n-1)\text{arg}(z)}. \] If $\mathbf{m}_1:=(\mu_1,\mu_2)$ and $\mathbf{m}_{n-1} := (\xi_1,\xi_2)$, then $\mu_1 + i \mu_2 = e^{i\arg(p(\mathbf{m}_1))}$ and $\xi_1 + i \xi_2 = e^{i\arg(p(\mathbf{m}_{n-1}))}$ imply \[ e^{i \arg(p(\mathbf{m}_n))} = (\mu_1 + i \mu_2) (\xi_1 + i \xi_2) = (\mu_1\xi_1-\mu_2\xi_2) + i (\mu_1\xi_2 + \mu_2\xi_1). \] Applying $p^{-1}$ to both sides yields \begin{equation}\label{eq:recursion} \mathbf{m}_n = \begin{pmatrix} \mu_1 & -\mu_2 \\ \mu_2 & \mu_1\end{pmatrix} \begin{pmatrix} \xi_1 \\ \xi_2\end{pmatrix} = \mathbf{R}_1\mathbf{m}_{n-1}, \end{equation} where $\mathbf{R}_1:= \big( \mathbf{m}_{1},\mathbf{m}_{1}^\perp\big)$ is a rotation matrix that depends on $\mathbf{x}'$. In view of \eqref{eq:metric-lifted-1} we may write the metric $g_n$ at $\mathbf{x}'$ as \begin{align}\label{eq:defect-comp} g_n = (\lambda^2-\lambda^{-1})\mathbf{R}_1 \big(\mathbf{m}_{n-1}\otimes \mathbf{m}_{n-1}\big)\mathbf{R}_1^T + \lambda^{-1}I} % {\normalfont{\Romanbar{1}}_2. \end{align} Assuming $\lambda>1$, we compare \eqref{eq:defect-comp} with the metric that arises from function composition of two defects of degree $1$ and $n-1$. With $\vx_\lambda'=\lambda^{-1/2}\mathbf{x}'$ already defined in \eqref{eq:lifted-surface-2}, we consider the following modified lifted surface \begin{equation}\label{eq:lifted-surface-deg2} \mathbf{y}_n(\mathbf{x}') := \Big(\vx_\lambda', \phi_n \big(\mathbf{v}(\vx_\lambda')\big)\Big)^T. \end{equation} Compared to either \eqref{eq:cone} or \eqref{eq:soln-degree-1half} of Section \ref{sec:lifted-surface}, we now compose $\phi_n$ with an unknown function $\mathbf{v}:\lambda^{-1/2}\Omega\to\lambda^{-1/2}\Omega$. We then apply the chain rule to determine \begin{align}\label{eq:func-comp} &\normalfont{\Romanbar{1}}[\mathbf{y}_n(\mathbf{x}')] = \lambda^{-1}I} % {\normalfont{\Romanbar{1}}_2 +\lambda^{-1}\nabla \mathbf{v}(\vx_\lambda')^T \big(\nabla\phi_n(\mathbf{v}(\vx_\lambda'))\otimes\nabla\phi_n(\mathbf{v}(\vx_\lambda'))\big)\nabla \mathbf{v}(\vx_\lambda'). \end{align} To match \eqref{eq:defect-comp} an ideal construction would be to find $\phi_n$ and $\mathbf{v}$ so that $\nabla\phi_n(\mathbf{v}(\vx_\lambda')) = \sqrt{\lambda^3-1}\;\mathbf{m}_{n-1}(\mathbf{x}')$ and $\nabla \mathbf{v}(\vx_\lambda') = \mathbf{R}_1(\mathbf{x}')^T$. We will find $\phi_n$ in terms of $\phi_{n-1}$, but before we do so we need to argue with $\mathbf{v}$. An ideal $\mathbf{v}$ should have a gradient whose rows are $\mathbf{m}_1$ and $\mathbf{m}_1^\perp$. Since $\mathbf{m}_1$ points radially outward and $\mathbf{m}_1^\perp$ is tangent to concentric circles, the choice of $\mathbf{v}$ in polar coordinates should be $\mathbf{v}(r,\theta) = (v_1(r), v_2(\theta))$ in order for the rows of $\nabla\mathbf{v}$ to be parallel to $\mathbf{m}_1$ and $\mathbf{m}_1^\perp$. One such choice of $\mathbf{v}$ is \begin{equation}\label{eq:def-v-polar} \mathbf{v}(r,\theta) = \begin{pmatrix} a\log r \\ a \, \theta \end{pmatrix} \end{equation} for $a>0$, whose gradient in Euclidean coordinates is formally \begin{equation}\label{eq:grad-v} \nabla \mathbf{v}(\mathbf{x}') = \frac{a}{|\mathbf{x}'|}\mathbf{R}_1(\mathbf{x}')^T. \end{equation} The choice of $v_1(r) = a\log r$ is so that the scaling of $\frac{1}{r}$ matches the gradient of $v_2(\theta) = a\theta$. Here, $\nabla \mathbf{v}$ matches $\mathbf{R}_1(\mathbf{x})^T$ up to the scaling $\frac{a}{|\mathbf{x}'|}$, and we nearly recover the ideal $\mathbf{v}$. Finding a vector field $\mathbf{v}$ whose gradient equals a space-dependent rotation $\mathbf{R}_1(\mathbf{x}')^T$ is questionable. In fact, in order for $\curl\big(\psi(r)\mathbf{m}_1^\perp(\mathbf{x})\big) = 0$ and potentially have an antiderivative, the only choice of $\psi$ is $\psi(r) = \frac{a}{r}$. Therefore, $\psi(|\mathbf{x}'|) = \frac{a}{|\mathbf{x}'|}$ is the only scaling for which one may hope to find an antiderivative of $\psi(|\mathbf{x}'|)\mathbf{R}_1(\mathbf{x}')^T$. The choice of $\phi_n$ is designed to compensate for this scaling. If \begin{equation}\label{eq:def-phi-n} \phi_n(\mathbf{x}') := \frac{\sqrt{\lambda^3-1}}{n \, a^{n-1}} \, |\mathbf{x}'|^n \quad\Rightarrow\quad \nabla\phi_n(\mathbf{x}') = \frac{|\mathbf{x}'|}{a} \nabla\phi_{n-1}(\mathbf{x}'), \end{equation} which is consistent with \eqref{eq:cone-phi} for $n=1$. Combining the inductive hypothesis \[ \nabla\phi_{n-1}\big(\mathbf{v}(\vx_\lambda')\big) = \sqrt{\lambda^3-1} \, \mathbf{m}_{n-1}(\mathbf{x}'), \] with the recursion relation \eqref{eq:def-phi-n} yields \begin{align*} \nabla\big[\phi_n\big(\mathbf{v}(\vx_\lambda')\big)\big] &= \nabla \mathbf{v}(\vx_\lambda')^T \nabla \phi_n\big(\mathbf{v}(\vx_\lambda')\big) = \frac{|\mathbf{v}(\vx_\lambda')|}{|\vx_\lambda'|} \mathbf{R}_1(\vx_\lambda') \nabla\phi_{n-1}\big(\mathbf{v}(\vx_\lambda')\big) \\ & = \frac{|\mathbf{v}(\vx_\lambda')|}{|\vx_\lambda'|} \sqrt{\lambda^3-1} \mathbf{R}_1(\mathbf{x}') \mathbf{m}_{n-1}(\mathbf{x}') = \frac{|\mathbf{v}(\vx_\lambda')|}{|\vx_\lambda'|} \sqrt{\lambda^3-1} \, \mathbf{m}_n(\mathbf{x}'). \end{align*} This shows that we need $|\mathbf{v}(\mathbf{x}')|=|\mathbf{x}'|$ to close the argument, which may not be possible unless $\mathbf{v}(\mathbf{x}')=\mathbf{R}(\mathbf{x}')^T\mathbf{x}'$ with $\mathbf{R}(\mathbf{x}')$ a rotation. This in turn would not lead to \eqref{eq:grad-v}. Finally, the cone solution for $n=1$ satisfies $\nabla\phi_1(\vx_\lambda') = \pm\sqrt{\lambda^3-1}\;\mathbf{m}_1(\mathbf{x}')$, whereas the ideal construction requires $\nabla\phi_1\big(\mathbf{v}(\vx_\lambda')\big) = \pm\sqrt{\lambda^3-1}\;\mathbf{m}_1(\mathbf{x}')$. The sign does not matter because $g_1$ is invariant under $\mathbf{m}_1\mapsto -\mathbf{m}_1$, but there is a mismatch in the argument of $\nabla\phi_1$ since $\mathbf{v}(\vx_\lambda')$ may not be equal to $\vx_\lambda'$ everywhere. We next discuss how to circumvent these obstructions to the idealized construction via approximation. \subsection{Formal approximation of idealized construction}\label{sec:formal-approximation} We now build an approximate deformation $\mathbf{y}_n$ such that $\normalfont{\Romanbar{1}}[\mathbf{y}_n] \approx g_n$. To this end, we modify $\mathbf{v}$ from \eqref{eq:def-v-polar}, so that $\mathbf{v}(\vx_\lambda') \approx \vx_\lambda'$ near the point $\mathbf{x}^* = (a,0)^T$ for $a>0$; this avoids a singularity at $\bf 0$. To guarantee that $\mathbf{v}(\mathbf{x}^*)=\mathbf{x}^*$ and $\nabla\mathbf{v}(\mathbf{x}^*)=I_2$, we choose \begin{equation}\label{eq:def-v} \mathbf{v}(\mathbf{x}') = \begin{pmatrix}\frac{a}{2}\text{log}(x_1^2+x_2^2)+C_a \\ a\,\text{arctan}(x_2/x_1)\end{pmatrix}, \end{equation} where $C_a = a~ -~ a\log(a).$ Hence, $\mathbf{v}$ satisfies \eqref{eq:grad-v} and the formal Taylor expansion \begin{align*} \mathbf{v}(\mathbf{x}') = \mathbf{x}^*+ (\mathbf{x}'-\mathbf{x}^*)+ \mathcal{O}\big(|\mathbf{x}'-\mathbf{x}^*|^2\big) = \mathbf{x}'+\mathcal{O}\big(|\mathbf{x}'-\mathbf{x}^*|^2\big), \end{align*} or equivalently the following expression in the rescaled coordinates $\vx_\lambda'$ \begin{equation}\label{eq:v-taylor-scaled} \mathbf{v}(\vx_\lambda') = \vx_\lambda'+\mathcal{O}\big(|\mathbf{x}'-\mathbf{x}^*|^2\big), \end{equation} because $\lambda=\mathcal{O}(1)$. Using \eqref{eq:v-taylor-scaled}, we approximately satisfy the three crucial requirements \begin{align*} |\mathbf{v}(\vx_\lambda')|^2 &= |\vx_\lambda'|^2 +\mathcal O(|\mathbf{x}'-\mathbf{x}^*|^2), \\ \mathbf{m}_1(\mathbf{v}(\vx_\lambda')) &= \mathbf{m}_1(\vx_\lambda')+\mathcal O(|\mathbf{x}'-\mathbf{x}^*|^2), \\ \nabla\big[\phi_n\big(\mathbf{v}(\vx_\lambda')\big)\big] &= \sqrt{\lambda^3-1} \, \mathbf{m}_n(\mathbf{x}') + \mathcal O(|\mathbf{x}'-\mathbf{x}^*|^2). \end{align*} Inserting these formal approximations into \eqref{eq:func-comp} yields a map $\mathbf{y}_n$ defined by \eqref{eq:lifted-surface-deg2} for $n\ge2$ that approximately satisfies the metric constraint in a vicinity of $\mathbf{x}^*$ \begin{equation}\label{eq:approx-metric-g2} \normalfont{\Romanbar{1}}[\mathbf{y}_n(\mathbf{x}')] = g_n(\mathbf{x}')+\mathcal O(|\mathbf{x}'-\mathbf{x}^*|^2). \end{equation} \subsection{Approximate surfaces for defects of degree two}\label{sec:metric-two-defects} We now specialize the above construction for $n=2$. In view of \eqref{eq:def-phi-n}, we realize that \[ \phi_2(\mathbf{x}') := \frac{\sqrt{\lambda^3-1}}{2a}|\mathbf{x}'|^2 \quad\Rightarrow\quad \nabla \phi_2(\mathbf{x}') = \frac{\sqrt{\lambda^3-1}}{a}\mathbf{x}' = \frac{\sqrt{\lambda^3-1}}{a}|\mathbf{x}'|\mathbf{m}_1(\mathbf{x}'), \] Hence, \eqref{eq:lifted-surface-deg2} gives an approximate map $\mathbf{y}_2$ with \begin{equation*} \phi_2\big(\mathbf{v}(\mathbf{x}')\big) = \frac{\sqrt{\lambda^3-1}}{2a}\left(\left(\frac{a}{2}\log\big(x_1^2+x_2^2\big)+a - a\log a\right)^2 + a^2\text{arctan}^2\Big(\frac{x_2}{x_1}\Big)\right), \end{equation*} for $x_1>0$ and any $a>0$ not be too large so that $\mathbf{y}_2$ captures the correct defect configuration. We display $\phi\circ \mathbf{v}$ for $a=.75,\lambda = 1.1$ in Fig.~\ref{fig:deg2-taylor}, reflected for $x_1<1$ to account for symmetry, along with the computed solution from Section \ref{sec:dir_defect}. \begin{figure}[htbp] \includegraphics[width=.45\textwidth]{pics/deg2_taylor.png} \includegraphics[width=.4\textwidth]{pics/defect2} \caption{Approximate lifted surface for degree 2 defect (left) and computed solution with the director field $\mathbf{m}_2$ in Section \ref{sec:dir_defect} (right). Our derivation requires $x_1>0$, but the solution should be symmetric across the $x_2x_3$ plane, which is why we plot a reflected solution for $x_1<0$. We recover two bumps, consistent with the simulation but at the cost of a singularity at the origin.} \label{fig:deg2-taylor} \end{figure} \subsection{Approximate surface for degree 3/2 defect}\label{sec:metric-3half-defects} We now apply the above approach of composing defects, but for a defect of degree $3/2$. We intend to explain the intriguing ``bird beak" shape observed in our computations displayed in Figures \ref{fig:deg-3half-bird-beak} and \ref{fig:comparison_1}. We first observe that the explicit expressions \eqref{eq:soln-degree-1half} and \eqref{eq:lifted-degree-1half} for a defect of degree $1/2$ do not quite conform with \eqref{eq:m_rot_sym_1} for $n=1/2$, except in the vicinity of the origin. Motivated by the recursion relation \eqref{eq:recursion}, we still write the degree $3/2$ director field as \begin{equation}\label{eq:degree-3half} \mathbf{m}_{3/2}(\mathbf{x}') = \mathbf{R}_1(\mathbf{x}')\mathbf{m}_{1/2}(\mathbf{x}'), \end{equation} with $\mathbf{m}_{1/2}$ given in \eqref{eq:degree-1half}. We now construct an approximate map $\mathbf{y}_{3/2}$ such that \begin{equation*} \normalfont{\Romanbar{1}}[\mathbf{y}_{3/2}(\mathbf{x}')] \approx g_{3/2}(\mathbf{x}') = (\lambda^2-\lambda^{-1})\mathbf{m}_{3/2}(\mathbf{x}')\otimes \mathbf{m}_{3/2}(\mathbf{x}') +\lambda^{-1}I} % {\normalfont{\Romanbar{1}}_2,\end{equation*} according to \eqref{eq:defect-comp} for $\lambda>1$. The deformation $\mathbf{y}_{3/2}$ satisfies in turn \eqref{eq:lifted-surface-deg2}, namely \begin{equation}\label{eq:y3half} \mathbf{y}_{3/2}(\mathbf{x}')= \big(\vx_\lambda',\phi_{3/2}(\mathbf{v}(\vx_\lambda')) \big)^T \end{equation} with $\phi_{3/2}$ related to $\phi_{1/2}$ via \eqref{eq:def-phi-n}. Since we are interested in an approximation for $x_1>0$ to capture the ``bird beak" structure, we deduce from \eqref{eq:lifted-degree-1half} \[ \nabla \phi_{3/2}(\mathbf{x}') = \frac{|\mathbf{x}'|}{a} \nabla\phi_{1/2}(\mathbf{x}') \quad\Rightarrow\quad \nabla \phi_{3/2}(\mathbf{x}') = \sqrt{\lambda^3-1} \, \frac{|\mathbf{x}'|}{a} \, \text{sign}(x_2) \,\mathbf{e}_2. \] Unfortunately, this ideal relation is incompatible because $\curl\big( \frac{|\vx_\lambda'|}{a}\text{sign}(x_2)\mathbf{e}_2\big)\neq0$ and we need to amend the construction of $\phi_{3/2}$ by approximation. To this end, we define for $x_1>0$ the following modification of $\phi_{3/2}$ \begin{equation}\label{eq:phi-3half-2} \phi_{3/2}(\mathbf{x}') = \sqrt{\lambda^3-1}\Big(1 - \frac{1}{a}\int_{0}^{|x_2|}\sqrt{s^2+x_1^2}\; ds\Big), \end{equation} whose gradient is \begin{equation*} \nabla\phi_{3/2}(\mathbf{x}') = -\sqrt{\lambda^3-1}\frac{|\mathbf{x}'|}{a}\text{sign}(x_2) \mathbf{e}_2 -\sqrt{\lambda^3-1}\frac{1}{a}\left(\int_0^{|\mathbf{x}_2|} \frac{x_1}{\sqrt{s^2+x_1^2}}\; ds\right)\mathbf{e}_1. \end{equation*} Exploiting that the integrand in the second term is bounded by $1$ yields \begin{equation*} \nabla\phi_{3/2}(\mathbf{x}) = -\sqrt{\lambda^3-1}\,\frac{|\mathbf{x}|}{a}\,\text{sign}(x_2) \, \mathbf{e}_2 -\frac{\sqrt{\lambda^3-1}}{a}\mathcal{O}(|x_2|). \end{equation*} To approximate the first fundamental form $\normalfont{\Romanbar{1}}[\mathbf{y}_{3/2}]$, we recall \eqref{eq:func-comp} and compute \begin{equation*}\label{eq:nabla-phi-nabla-v-1half} \nabla\mathbf{v}(\mathbf{x}_{\lambda}')^T\nabla\phi(\mathbf{v}(\mathbf{x}_{\lambda}')) = \sqrt{\lambda^3-1}\mathbf{R}_1(\mathbf{x}_{\lambda}')\frac{|\mathbf{v}(\mathbf{x}_{\lambda}')|}{|\mathbf{x}_{\lambda}'|}\text{sign}(\mathbf{v}(\mathbf{x}_{\lambda}')_2) \mathbf{e}_2+ \mathcal{O}(|\mathbf{v}(\mathbf{x}_{\lambda}')_2|), \end{equation*} where $\mathbf{v}(\mathbf{x}_{\lambda}')_2=a \arctan(x_2/x_1)$ denotes the second component of $\mathbf{v}(\mathbf{x}_{\lambda}')$ written in \eqref{eq:def-v}. We thus deduce $\text{sign}(\mathbf{v}(\vx_\lambda')_2) = \text{sign}(x_2)$ for $x_1>0$ and, employing that $\mathbf{m}_{1/2}(\mathbf{x}) = \text{sign}(x_2)\,\mathbf{e}_2$ for $x_1>1$ along with \eqref{eq:degree-3half}, we arrive at \begin{equation*} \nabla\mathbf{v}(\mathbf{x}_{\lambda}')^T\nabla\phi(\mathbf{v}(\mathbf{x}_{\lambda}')) = \sqrt{\lambda^3-1} \, \mathbf{m}_{3/2}(\mathbf{x}')+ \mathcal{O}(|x_2|)+\mathcal{O}(|\mathbf{x}' - \mathbf{x}^*|^2), \end{equation*} because $\arctan(x_2/x_1)=\mathcal{O}(|x_2|)$ for $x_1$ away from $0$. The expression \eqref{eq:y3half} for $\mathbf{y}_{3/2}$ with $\phi_{3/2}$ defined in \eqref{eq:phi-3half-2} gives an approximate shape profile that satisfies \begin{equation*} \normalfont{\Romanbar{1}}[\mathbf{y}_{3/2}(\mathbf{x}')] = g_{3/2}(\mathbf{x}') + \mathcal O(|x_2|) + \mathcal O(|\mathbf{x} - \mathbf{x}^*|^2). \end{equation*} The contour plot of the corresponding lifted surface $\phi_{3/2}\big(\mathbf{v}(\vx_\lambda')\big)$ is displayed in Fig.~\ref{fig:deg-3half-bird-beak} (left) for $a = .75$. We note that the profile has a similar bird beak shape to the computational result reported in Fig.~\ref{fig:deg-3half-bird-beak} (right) and Fig.~\ref{fig:comparison_1}. For the $x_1<0$, $\mathbf{m}_{1/2}(\mathbf{x}') = \mathbf{m}_1(\mathbf{x}')$, and one can apply the arguments in Section \ref{sec:metric-two-defects} to get the asymptotic profile for $x_1<0$. \begin{figure}[htbp] \includegraphics[width=.4\textwidth]{pics/deg3half_bird_beak} \includegraphics[width=.33\textwidth]{pics/defect1p5_2.png} \caption{Contour plot of approximate lifted surface for degree 3/2 defect for $a = .75$ and $x_1>0$ (left) and computational result for a degree 3/2 defect obtained in Section \ref{sec:dir_defect}. The profile matches the computed ``bird beak" shape. To see this, notice that contour lines pinch off as $x_1\to0$. As a result, the lifted surface gets steeper near the origin. This helps explains the ``bird beak" shape.} \label{fig:deg-3half-bird-beak} \end{figure} The compositional method explains why we should expect the intriguing ``bird beak". We now provide a heuristic explanation. If $a$ is fixed but $x_1$ is small, we drop $x_1$ in the integrand of \eqref{eq:phi-3half-2}, and $\phi_{3/2}(\mathbf{x}')$ behaves like $\tilde{\phi}_{3/2}(\mathbf{x}') := \sqrt{\lambda^3-1}\big(1 - \frac{1}{2a}|x_2|^2\big)$. We see that level sets of this function are straight lines $|x_2| =$ constant that increase as $|x_2|$ decreases to $0$, very much like level sets of $\phi_{1/2}(\mathbf{x}')$ in \eqref{eq:lifted-degree-1half} for $x_1>0$. On the other hand, the lifted surface $\phi_{3/2}(\mathbf{v}(\vx_\lambda'))$ from \eqref{eq:y3half} behaves like \begin{equation}\label{eq:tilde-phi} \tilde{\phi}_{3/2}(\mathbf{v}(\vx_\lambda')) = \sqrt{\lambda^3-1}\Big(1 - \frac{a}{2} \, \arctan \Big(\frac{|x_2|}{x_1}\Big)^2\Big) , \end{equation} whose level sets are radial lines $\frac{|x_2|}{x_1} = $ constant that increase as $\frac{|x_2|}{x_1}$ decreases to $0$. Therefore, the lifted surface $\tilde\phi_{3/2}(\mathbf{v}(\vx_\lambda'))$ pinches off at the origin in the sense that it develops a discontinuity. In Section \ref{sec:higher-degree-idea} we advocated that a defect of degree $3/2$ could be viewed as a composition of degree $1/2$ and $1$ defects. The effect of the degree $1$ defect on \eqref{eq:soln-degree-1half} is to twist or compress the horizontal level sets of $\phi_{1/2}(\mathbf{v}(\vx_\lambda'))$ into radial level sets of $\tilde\phi_{3/2}(\mathbf{v}(\vx_\lambda'))$. This is due to the action of the vector-valued map $\mathbf{v}$ and boils down to the replacement of $|x_2|$ in \eqref{eq:lifted-degree-1half} by $\frac{a}{2} \, \arctan \big( \frac{|x_2|}{x_1}\big)^2$ in \eqref{eq:tilde-phi}. \section{Finite element method with regularization}\label{sec:method} In this section, we introduce a finite element discretization to \eqref{eq:stretching-energy} and an iterative scheme to solve the consequent nonlinear discrete problem. \subsection{Discretization} We consider a shape-regular family $\{ \Th \}$ of simplicial meshes of $\Omega$ parametrized by the mesh size $h = \max_{T \in \Th} h_T$, where $h_T = \diam(T)$. We denote by $\mathcal{N}_h$ the set of vertices of $\Th$, and by $\E_h$ the set of interior edges of $\Th$. For any $T \in \Th$, we denote by $\mathcal{P}_1(T)$ the space of first-degree polynomials on $T$ and by $\mathcal{N}_h(T)$ the set of vertices of $T$. We consider the space of $\Th$-piecewise affine and globally continuous functions \begin{equation*} \V_h := \left\{\mathbf{v}_h \in C^0(\overline{\Omega};\mathbb{R}^3): \mathbf{v}_h \vert_T \in[\mathcal{P}_1(T)]^3 \text{ for all } T \in\Th \right\}, \end{equation*} and note that $\V_h\subset H^1(\Omega;\R^3)$. We write $\V_h^{\ast}$ to designate the dual space of $\V_h$ and denote by $I_h$ the nodal Lagrange interpolation operator $I_h: C^0(\overline{\Omega};\R^3) \to\V_h$. We now introduce the jump operators. To this end, let $\mathbf{n}_e$ be a unit normal to $e\in\Eh$ (the orientation is chosen arbitrarily but is fixed once for all). Given a scalar piecewise polynomial function $v_h$ over $\Th$ and $e \in \E_h$, we set \begin{equation} \label{def:jump-avrg} \restriction{\jump{v_h}}{e} := v_h^{-}-v_h^+, \end{equation} where $v_h^{\pm}(\mathbf{x}'):=\lim_{s\rightarrow 0^+}v_h(\mathbf{x}'\pm s\mathbf{n}_e)$ for $\mathbf{x}' \in e$; jumps of vector-valued and tensor-valued functions are computed component-wise. Note that for $\mathbf{v}_h\in\V_h$, we have $\restriction{\jump{\mathbf{v}_h}}{e}=0$ for any $e\in\Eh$, while $\restriction{\jump{\nabla\mathbf{v}_h}}{e} \ne 0$ in general. We propose the discrete energy $E_h:\V_h\to \mathbb{R}$ to be \begin{equation}\label{eq:discrete-str} E_h[\mathbf{y}_h] = E_{str}[\mathbf{y}_h] + R_h[\mathbf{y}_h], \end{equation} where the first term is the stretching energy defined in \eqref{eq:stretching-energy} and \eqref{eq:stretching-energy-density}, while $ R_h$ is a regularization term defined in \eqref{eq:regularization} and recall now \begin{equation}\label{eq:E-reg} R_h[\mathbf{y}_h] := \sum_{e\in\E_h}\int_{e} c_r h_e \jump{\nabla\mathbf{y}_h}^2, \end{equation} where $c_r:\E_h\to\mathbb{R}$ is a non-negative regularization parameter that may vanish on some edges to allow for folding. This is a crucial computational feature of the discrete counterpart of \eqref{eq:stretching-energy}, which reads \begin{equation}\label{eq:minimization-pb-discrete} \mathbf{y}^{\ast}_h\in\argmin_{\mathbf{y}_h\in\V_h}E_h[\mathbf{y}_h]. \end{equation} \subsection{Regularization}\label{sec:regularization} This section is dedicated to a discussion of the regularization term $R_h$. We add $R_h$ to deal with the non-convexity of the stretching energy density $W_{str}$ given in \eqref{eq:stretching-energy-density}. We refer to our accompanying paper \cite{bouck2022NA} for a detailed discussion of the lack-of-convexity and other possible strategies to treat it. We also prove in \cite{bouck2022NA} convergence of discrete minimizers of \eqref{eq:minimization-pb-discrete}. We first point out that, in the discontinuous Galerkin (DG) contexts (for instance \cite{cockburn2012discontinuous,bonito2021numerical}), a discrete $H^2$ semi-norm is defined as \begin{equation}\label{eq:discrete-H2} |\mathbf{y}_h|_{H^2_h(\Omega)}^2:=\|D^2_h\mathbf{y}_h\|_{L^2(\Omega)}^2+\sum_{e\in\E_h}h_e^{-1}\|\jump{\nabla\mathbf{y}_h}\|_{L^2(e)}^2+\sum_{e\in\E_h}h_e^{-3}\|\jump{\mathbf{y}_h}\|_{L^2(e)}^2, \end{equation} where $D^2_h$ denotes a piecewise Hessian on every element. Substituting continuous piecewise affine $\mathbf{y}_h\in\V_h$ into \eqref{eq:discrete-H2}, we can see that only the second term remains while other terms vanish. This motivates our choice \eqref{eq:E-reg} for the regularization term \eqref{eq:E-reg}, which in fact further satisfies $R_h[\mathbf{y}_h] \approx h^2 |\mathbf{y}_h|^2_{H^2_h(\Omega)}$ provided $c_r$ is uniformly positive and $\Th$ is quasi-uniform. We note that $|\mathbf{y}_h|^2_{H^2_h(\Omega)}$ scales oscillations of the elementwise constant $\nabla\mathbf{y}_h$ between adjacent elements of $\Th$ for $\mathbf{y}_h\in\V_h$ and, consequently, can be viewed as a discrete approximation of the \emph{Hessian} of $\mathbf{y}_h$. We emphasize that a full model of LCNs is a blending of stretching energy and bending energy, which comes from higher order terms in the thickness $t$ in the expansion \eqref{eq:expansion} \cite{warner2007liquid,plucinsky2018actuation,ozenda2020blend,bartels2022nonlinear}. This leads to a bending energy that incorporates the second fundamental form $\II[\mathbf{y}]$, and thus to a nonlinear combination of second order derivatives of the deformations $\mathbf{y}$. Ideally, one is able to express this energy in terms of the Hessian of $\mathbf{y}$ \cite{bartels2015numerical,bartels2017bilayer,bonito2021dg,bonito2021numerical}. In the context of piecewise affine deformations $\mathbf{y}_h\in\V_h$, second order derivative information is contained in $|\mathbf{y}_h|_{H^2_h(\Omega)}$ and so in $R_h[\mathbf{y}_h]$. Therefore, for $c_r$ uniformly positive and $\Th$ quasi-uniform, one can compare $R_h[\mathbf{y}_h] \approx h^2 |\mathbf{y}_h|^2_{H^2_h(\Omega)}$ with the scaled bending energy $t^2E_{ben}[\mathbf{y}]:=t^2\|D^2\mathbf{y}\|^2_{L^2(\Omega)}$, and realize that the meshsize parameter $h$ plays a similar role to the thickness parameter $t$ in the expansion of $\frac{1}{t}E_{3D}$ using \eqref{eq:expansion} \cite{warner2007liquid,plucinsky2018actuation,ozenda2020blend,bartels2022nonlinear}. Moreover, allowing $c_r$ to vanish over a polygonal $\Gamma$ made of edges of $\E_h$ mimics discretely a material amenable to folding across $\Gamma$ \cite{bartels2022modeling,bartels2022error}. We prove convergence of minimizers of \eqref{eq:minimization-pb-discrete} with folding in our companion paper \cite{bouck2022NA}. The statement reads as follows. \begin{thm}[convergence of discrete minimizers]\label{T:convergence} Let $\Omega\backslash\Gamma = \cup_{i=1}^I\Omega_i$ be a decomposition of $\Omega$ into disjoint subdomains $\Omega_i$ due to the creases $\Gamma$. Let the target metric $g$ in \eqref{eq:target-metric} admit an isometric immersion $\mathbf{y}\in W^{1,\infty}(\Omega;\mathbb{R}^3)$, i.e. $\normalfont{\Romanbar{1}}[\mathbf{y}] = g$ a.e. in $\Omega$, that satisfies $\mathbf{y}|_{\Omega_i}\in H^2(\Omega_i;\mathbb{R}^3)\cap C^1(\overline{\Omega}_i;\mathbb{R}^3)$ for all $i=1,\ldots,I$. Then there is a constant $\Lambda>0$ such that discrete minimizers $\mathbf{y}_h^*$ of \eqref{eq:minimization-pb-discrete} satisfy the energy scaling \begin{equation}\label{eq:energy-scaling} E_h[\mathbf{y}_h^*] \le \Lambda h^2. \end{equation} In addition, if a minimizer $\mathbf{y}_h^*$ satisfies \eqref{eq:energy-scaling} and $\overline{\mathbf{y}}_h^* := |\Omega|^{-1} \int_\omega\mathbf{y}_h^*$ is its meanvalue, then there exists a subsequence (not relabeled) such that $\mathbf{y}_h^* - \overline{\mathbf{y}}_h^* \to \mathbf{y}^*$ converges strongly in $H^1(\Omega;\R^3)$ to a function $\mathbf{y}^* \in W^{1,\infty}(\Omega;\mathbb{R}^3) \cap H^2(\Omega\backslash\Gamma;\mathbb{R}^3)$ that satisfies $E_{str,\Gamma}[\mathbf{y}^*]=\int_{\Omega\backslash\Gamma} W_{str}(\mathbf{x}',\nabla \mathbf{y}^*) d\mathbf{x}' = 0$ and $\normalfont{\Romanbar{1}}[\mathbf{y}^*]=g$ a.e. in $\Omega$. \end{thm} We regard \eqref{eq:E-reg} as a discrete regularization mechanism rather than a discrete form of the bending energy $E_{ben}[\mathbf{y}]$ , even though such a simplified form of $E_{ben}[\mathbf{y}]$ has been considered widely in the literature; we refer for instance \cite{cirak2014computational,plucinsky2018actuation}. The true bending energy \cite{warner2007liquid,plucinsky2018actuation,ozenda2020blend} involves $\II[\mathbf{y}]$ and its reduction to $D^2\mathbf{y}$ is a matter of current research. We leave this topic for a future study. Moreover, we view \eqref{eq:E-reg} as a mechanism for equilibria selection. In the absence of regularization, i.e. $c_r=0$ in \eqref{eq:E-reg}, minimizers $\mathbf{y}_h^*\in\V_h$ of \eqref{eq:minimization-pb-discrete} can exhibit extra bumps and wrinkling which have negligible influence on the stretching energy. This is a manifestation of lack of convexity of $W_{str}$, and thus of uniqueness, and leads to the formation of micro-structure \cite{bartels2015numerical}. This topic is well studied in the theory and computation of nonlinear elasticity, but it is not the focus of this paper. We invoke \eqref{eq:E-reg} to suppress numerical oscillations in Section~\ref{sec:eff-reg} as well as to allow for folding in the development of compatible origami-structures in Section \ref{sec:origami} and incompatible origami-structures in Section \ref{sec:incompatible-s}. The latter lead to weak limits $y^*\in H^1(\Omega;\R^3)$ with $E_{str}[\mathbf{y}^*]>0$, so they are not minimizers of the stretching energy $E_{str}$. \subsection{Iterative solver}\label{sec:newton-scheme} We design a nonlinear discrete gradient flow to find a solution to \eqref{eq:minimization-pb-discrete} in this subsection. Due to the stretching energy being non-quadratic and non-convex, we end up with a nonlinear non-convex discrete problem to solve. \subsubsection{Nonlinear gradient flow.} Implicit gradient flows are robust methods to find stationary points of energy functionals $E$ regardless of their convexity, and have the advantage of built-in energy stability; they belong to the class of energy descent methods. Consider the auxiliary evolution equation $\partial_tA[\mathbf{y}] + \delta E[\mathbf{y}]=0$, where $A$ is a symmetric elliptic operator, $\delta E[\mathbf{y}]$ stands for the first variation of $E$, and $t$ is a pseudo-time. The backward Euler discretization reads: given $\mathbf{y}^n$ solve for $\mathbf{y}^{n+1}$ \begin{equation*} \frac{1}{\tau}\big(A\mathbf{y}^{n+1}- A\mathbf{y}^n \big) + \delta E[\mathbf{y}^{n+1}]=0, \end{equation*} where $\tau$ is the time-step discretization parameter. The weak formulation of this semi-discrete equation is equivalent to minimizing the augmented functional \begin{equation}\label{eq:penalization} L^n[\mathbf{y}] := \frac{1}{2\tau}\|\mathbf{y}-\mathbf{y}^n\|_A^2 + E[\mathbf{y}] \end{equation} where $\|\cdot\|_A$ is the norm associated with the operator $A$, i.e. $\|\mathbf{y}\|_A^2 := \langle A\mathbf{y},\mathbf{y}\rangle$. This can be reinterpreted as finding a minimizer of $E$ constrained to be closed to $\mathbf{y}^n$; so the first term in \eqref{eq:penalization} penalizes the deviation of $\mathbf{y}$ from $\mathbf{y}^n$ in the $A$-norm. Since the stretching energy $E_{str}$ from \eqref{eq:stretching-energy} and \eqref{eq:stretching-energy-density} is formulated in $H^1(\Omega;\R^3)$, we choose $A=I-\Delta$ and the corresponding norm to be the $H^1(\Omega)$-norm. This choice has the property of making $L^n$ convex in $H^1(\Omega;\R^3)$ provided $\mathbf{y}^n$ is sufficiently smooth. With this in mind, we devise a discrete counterpart of \eqref{eq:penalization} to find stationary points of $E_h$ in \eqref{eq:discrete-str} and, under some additional assumptions on the current iterate $\mathbf{y}_h^n\in\V_h$ to be discussed below, solve \eqref{eq:E-reg}. We thus minimize \begin{align}\label{eq:gf-energy} L^n_h[\mathbf{y}_h] :=\frac{1}{2\tau}\|\mathbf{y}_h-\mathbf{y}^n_h\|^2_{H^1(\Omega)}+E_h[\mathbf{y}_h], \end{align} whose Euler-Lagrange equation results from computing the first order variation of $L^n_h[\mathbf{y}_h]$ in the direction $\mathbf{v}_h$ \begin{equation}\label{eq:gf-onestep} \delta L^n_h[\mathbf{y}_h](\mathbf{v}_h)=\frac{1}{\tau}(\mathbf{y}_h,\mathbf{v}_h)_{H^1(\Omega)}+\delta E_h[\mathbf{y}_h](\mathbf{v}_h)-F^n_h(\mathbf{v}_h)=0 \quad\forall \, \mathbf{v}_h\in\V_h, \end{equation} where $F^n_h\in\V_h^{\ast}$ is defined as \begin{align*} F^n_h(\mathbf{v}_h):=\frac{1}{\tau}(\mathbf{y}_h^n,\mathbf{v}_h)_{H^1(\Omega)}, \end{align*} and \begin{align*} \delta E_h[\mathbf{y}_h](\mathbf{v}_h) =\delta E_{str}[\mathbf{y}_h](\mathbf{v}_h)+\delta R_h[\mathbf{y}_h](\mathbf{v}_h). \end{align*} A direct but tedious computation shown in Appendix \ref{appendix:gf-ex-pf} gives an explicit expression for $\delta E_{str}[\mathbf{y}_h](\mathbf{v}_h)$, which turns out to depend \emph{nonlinearly} on $\mathbf{y}_h$. Therefore, \eqref{eq:gf-onestep} is a nonlinear discrete equation for $\mathbf{y}_h\in\V_h$. We now state the energy stability of \eqref{eq:gf-energy} provided \eqref{eq:gf-onestep} is solved exactly. This is a natural property for \emph{implicit} gradient flows. \begin{thm}[energy stability]\label{thm:energy-stability-sum} Given $\mathbf{y}^n_h\in\V_h$ for any $n\ge0$, suppose $\mathbf{y}^{n+1}_h\in\V_h$ minimizes $L^n_h[\mathbf{y}_h]$ defined in \eqref{eq:gf-energy}. Then $E_h[\mathbf{y}_h^{n+1}]\le E_h[\mathbf{y}_h^{n}]$, and the inequality is strict if $\mathbf{y}^{n+1}_h\ne\mathbf{y}^{n}_h$. Moreover, for any $N\ge1$, \begin{equation}\label{eq:energy-stability-sum} E_h[\mathbf{y}^{N}_h]+\frac{1}{2\tau}\sum_{n=0}^{N-1}\|\mathbf{y}^{n+1}_h-\mathbf{y}^n_h\|^2_{H^1(\Omega)}\le E_h[\mathbf{y}^{0}_h]. \end{equation} \end{thm} \begin{proof} Since $\mathbf{y}^{n+1}_h$ minimizes $L^n_h$, we have $L^n_h[\mathbf{y}^{n+1}_h]\le L^n_h[\mathbf{y}^{n}_h]$, whence \begin{equation*} \frac{1}{2\tau}\|\mathbf{y}^{n+1}_h-\mathbf{y}^n_h\|^2_{H^1(\Omega)}+E_h[\mathbf{y}^{n+1}_h]=L^n_h[\mathbf{y}^{n+1}_h]\le L^n_h[\mathbf{y}^{h}_h]=E_h[\mathbf{y}^{n}_h]. \end{equation*} This proves monotonicity of $E_h[\mathbf{y}^{n}_h]$ and, adding over $n=1:N-1$, yields \eqref{eq:energy-stability-sum}. \end{proof} Moreover, given a tolerance $\textrm{tol}_1>0$, we stop the nonlinear gradient flow when \begin{equation*} \frac{1}{\tau} \big|E_h[\mathbf{y}_h^{N}]-E_h[\mathbf{y}_h^{N-1}]\big|~<~ \textrm{tol}_1 \end{equation*} is satisfied for some $N>0$. The function $\mathbf{y}_h^{N}\in\V_h$ is the desired output. We next discuss how we solve the nonlinear equation \eqref{eq:gf-onestep}. \subsubsection{Newton sub-iteration.} We solve each step $n$ of the iterative scheme \eqref{eq:gf-onestep} by a Newton-type sub-iteration. In fact, we let $\mathbf{y}_h^{n,0}:=\mathbf{y}_h^{n}$ and assume $\mathbf{y}_h^{n,k}\in\V_h$ is given. We then solve for the increment $\delta\mathbf{y}_h^{n,k}\in\V_h$ by \begin{equation}\label{eq:Newton-step} \delta^2 L^n_h[\mathbf{y}^{n,k}_h](\delta\mathbf{y}_h^{n,k},\mathbf{v}_h)=-\delta L^n_h[\mathbf{y}^{n,k}_h](\mathbf{v}_h) \quad\forall\,\mathbf{v}_h\in\V_h, \end{equation} and update $\mathbf{y}^{n,k+1}_h:=\mathbf{y}^{n,k}_h+\delta\mathbf{y}_h^{n,k}$. Equation \eqref{eq:Newton-step} is \emph{linear} in the unknown $\delta\mathbf{y}^{n,k}_h$ because $\mathbf{y}^{n,k}_k$ is known. Moreover, given a tolerance $\textrm{tol}_2$, we stop \eqref{eq:Newton-step} when \begin{equation*} \big|\delta L^n_h[\mathbf{y}_h^{n,M}](\delta\mathbf{y}_h^{n,M})\big|^{1/2}\le \textrm{tol}_2, \end{equation*} for some integer $M>0$ and set $\mathbf{y}^{n+1}_h:=\mathbf{y}^{n,M}_h$. The expression of $\delta^2 L^n_h[\mathbf{y}_h](\mathbf{v}_h,\mathbf{w}_h)$ for $\mathbf{y}_h,\mathbf{v}_h,\mathbf{w}_h\in\V_h$ is tedious to compute but is given in Appendix \ref{appendix:gf-ex-pf}. The next natural question is whether the Newton equation \eqref{eq:Newton-step} is well-posed in each sub-step $n$ and $\mathbf{y}^{n,k}_h$ converges to a minimizer of \eqref{eq:gf-energy} as $k\to\infty$ in a neighborhood of the previous iterate $\mathbf{y}^n_h$, provided $\tau$ is sufficiently small. Heuristically, the lack of convexity of the stretching energy works against the well-posedness and convergence of the Newton sub-iteration, but the flow metric $\tau^{-1}(\cdot,\cdot)_{H^1(\Omega)}$ in \eqref{eq:gf-onestep} is chosen to dominate $\delta E_h[\mathbf{y}^n_h]$ when $\tau$ is small enough. We now discuss properties of the proposed Newton sub-iteration \eqref{eq:Newton-step}. We first state the following ellipticity of $\delta^2 L^n_h[\mathbf{y}_h](\cdot,\cdot)$ but prove it in Appendix \ref{appendix:gf-ex-pf}. \begin{thm}[ellipticity]\label{thm:coercivity} Given $\mathbf{y}_h\in\V_h$, let the piecewise constant eigenvalues $\lambda_1[\mathbf{y}_h] \leq \lambda_2[\mathbf{y}_h]$ of $\normalfont{\Romanbar{1}}[\mathbf{y}_h]$ over $\Th$ satisfy \begin{equation}\label{eq:cond-yh} 0<c_1 \le \lambda_1[\mathbf{y}_h] \leq \lambda_2[\mathbf{y}_h] \le c_2 \quad\forall\, T\in\Th, \end{equation} with $c_1,c_2$ independent of $h$ and $T$. Then for $\tau$ small enough, there exists a constant $c>0$ independent of $h$ such that \begin{equation}\label{eq:coer-deltaG} \delta^2 L^n_h[\mathbf{y}_h](\mathbf{v}_h,\mathbf{v}_h)\ge c\|\mathbf{v}_h\|_{H^1(\Omega)}^2\quad\forall\,\mathbf{v}_h\in\V_h. \end{equation} \end{thm} We next state a Lipschitz property of $\delta^2 L^n_h$ but postpone its proof to Appendix \ref{appendix:gf-ex-pf}. \looseness=-1 \begin{thm}[Lipschitz property]\label{thm:lip-deltaG} Let $\mathbf{y}_h,\widetilde\mathbf{y}_h\in\V_h$ be given and both satisfy \eqref{eq:cond-yh}. Then, there exists a constant $M$ independent of $h$ such that \begin{equation}\label{eq:lip-deltaG} \big|\delta^2 L^n_h[\mathbf{y}_h]-\delta^2 L^n_h[\widetilde\mathbf{y}_h]\big|(\mathbf{v}_h,\mathbf{w}_h) \le \frac{M}{h}\|\mathbf{y}_h-\widetilde\mathbf{y}_h\|_{H^1(\Omega)}\|\mathbf{v}_h\|_{H^1(\Omega)}\|\mathbf{w}_h\|_{H^1(\Omega)}, \end{equation} for any $\mathbf{v}_h,\mathbf{w}_h\in\V_h$. \end{thm} With Theorems \ref{thm:coercivity} (ellipticity) and \ref{thm:lip-deltaG} (Lipschitz property) at hand, we state an error estimate for each Newton sub-iteration \eqref{eq:Newton-step} and refer to Appendix \ref{appendix:gf-ex-pf} for its proof. \begin{cor}[quadratic estimate]\label{cor:Newton-conv-one} If $\mathbf{y}^{n,k}_h$ satisfy \eqref{eq:cond-yh} for any $n\ge0$ and $k\ge0$, then \eqref{eq:Newton-step} is well-posed and $\delta\mathbf{y}^{n,k}_h$ is the unique solution. Moreover, if $\mathbf{y}^{n,k+1}_h:=\mathbf{y}^{n,k}_h+\delta\mathbf{y}^{n,k}_h$, then \begin{equation}\label{eq:quadratic-conv} \|\mathbf{y}_h^{n,k+1}-\mathbf{y}_h^{n,\ast}\|_{H^1(\Omega)}\le\frac{M}{2ch}\|\mathbf{y}_h^{n,k}-\mathbf{y}_h^{n,\ast}\|_{H^1(\Omega)}^2, \end{equation} where $c,M$ are the constants appearing in \eqref{eq:coer-deltaG} and \eqref{eq:lip-deltaG} and $\mathbf{y}_h^{n,\ast}$ is a local minimizer of $L^n_h$. \end{cor} Together with a further condition on the initialization $\mathbf{y}_h^{n,0}$, the estimate \eqref{eq:quadratic-conv} guarantees the convergence of Newton sub-iterations. \begin{remark}[quadratic convergence] \rm If $\mathbf{y}_h^{n,0}$ satisfies \begin{equation}\label{eq:sub-initial} \|\mathbf{y}_h^{n,0}-\mathbf{y}_h^{n,\ast}\|_{H^1(\Omega)} \le \frac{ch}{M}, \end{equation} then for $k\ge0$ an induction argument combined with \eqref{eq:quadratic-conv} yields \begin{equation}\label{eq:error-monotone} \|\mathbf{y}_h^{n,k+1}-\mathbf{y}_h^{n,\ast}\|_{H^1(\Omega)}\le \frac12 \|\mathbf{y}_h^{n,k}-\mathbf{y}_h^{n,\ast}\|_{H^1(\Omega)} < \frac{ch}{M}. \end{equation} This implies that the Newton sub-iterations $\mathbf{y}^{n,k}_h$ remain within an $H^1$-ball of radius $\frac{ch}{M}$ centered at $\mathbf{y}^{n,\ast}_h$ and converge to $\mathbf{y}^{n,\ast}_h$; in view of \eqref{eq:quadratic-conv} this convergence is quadratic. It remains to check whether the initialization condition \eqref{eq:sub-initial} is realistic. Assume that $E_h[\mathbf{y}^0_h]\le\alpha$ for a constant $\alpha>0$ and recall that $\mathbf{y}_h^{n,0}=\mathbf{y}_h^n$ to deduce \begin{equation*} \frac{1}{2\tau}\|\mathbf{y}_h^{n,\ast}-\mathbf{y}_h^n\|^2_{H^1(\Omega)}\le L^n_h[\mathbf{y}^{n,\ast}_h]\le L^n_h[\mathbf{y}^n_h]=E_h[\mathbf{y}^n_h]\le E_h[\mathbf{y}^0_h]\le\alpha. \end{equation*} Consequently, if $\tau\le\frac{c^2h^2}{2M^2\alpha}$ then \eqref{eq:sub-initial} is valid. However, quantitative numerical experiments in our accompanying paper \cite{bouck2022NA} reveal that the largest admissible value of $\tau$ is independent of $h$. This is strikingly better than our theoretical prediction. \end{remark} \begin{remark}[assumption \eqref{eq:cond-yh}]\label{rmk:assumption} \rm We now argue heuristically that the crucial assumption \eqref{eq:cond-yh} is realistic in practice for each iterate $\mathbf{y}^{n,k}_h$ and $n,k\ge0$. Suppose that $\normalfont{\Romanbar{1}}[\mathbf{y}^{n,k}_h]$ is close to $g$ pointwise in the sense that \begin{equation}\label{eq:metric-close} \Vert \normalfont{\Romanbar{1}}[\mathbf{y}^{n,k}_h] - g\Vert_{L^\infty(\Omega)}\leq \varepsilon, \end{equation} for some $\varepsilon>0$. We recall that the eigenvalues of $g$ are $\lambda^2,\lambda^{-1}$ with $\lambda>0$ defined in \eqref{eq:lambda}. Then the eigenvalues of $\normalfont{\Romanbar{1}}[\mathbf{y}^{n,k}_h]$, denoted by $\lambda_1[\mathbf{y}^{n,k}_h]\leq \lambda_2[\mathbf{y}^{n,k}_h]$, satisfy \begin{equation*} c_1=\min\{\lambda^2,\lambda^{-1}\}-c\varepsilon \leq \lambda_1[\mathbf{y}^{n,k}_h]\leq \lambda_2[\mathbf{y}^{n,k}_h]\leq \max\{\lambda^2,\lambda^{-1}\}+c\varepsilon=c_2, \end{equation*} with some constant $c>0$. This turns out to be \eqref{eq:cond-yh} for $\mathbf{y}^{n,k}_h$ provided $\varepsilon$ is sufficiently small so that the constants $c_1,c_2>0$. Computations in Section \ref{sec:monoton-decrease} show conclusively that $\|\normalfont{\Romanbar{1}}[\mathbf{y}_h^n] - g\|_{L^\infty(\Omega)}$ decreases monotonically as $n$ increases when $\mathbf{m}$ is smooth. They also indicate that $\|\normalfont{\Romanbar{1}}[\mathbf{y}_h^n] - g\|_{L^1(\Omega)}$ decreases monotonically regardless of the regularity of $\mathbf{m}$. This gives computational support for \eqref{eq:metric-close} and all iterates $\mathbf{y}^{n,k}_h$ provided $\normalfont{\Romanbar{1}}[\mathbf{y}_h^0]$ is close to the target metric $g$ in the max-norm. \end{remark} We conclude this section by summarizing the proposed strategy in Algorithm \ref{algo:GF_euler}. \RestyleAlgo{boxruled} \begin{algorithm}[htbp] \SetAlgoLined Given a pseudo time-step $\tau>0$ and target tolerances $\textrm{tol}_1$ and $\textrm{tol}_2$\; Choose initial guess $\mathbf{y}_h^0\in\V_h$\; \While{$\tau^{-1}\big|E_h[\mathbf{y}_h^{n+1}]-E_h[\mathbf{y}_h^{n}]\big|>\textrm{tol}_1$}{ \textbf{Set} $\mathbf{y}^{n,0}_h=\mathbf{y}_h^n$, $k=0$\; \While{$\big|\delta L^{n}_h[\mathbf{y}_h^{n,k}](\delta\mathbf{y}_h^{n,k})\big|^{1/2}> \textrm{tol}_2$}{ \textbf{Solve} \eqref{eq:Newton-step} for $\delta\mathbf{y}_h^{n,k}$\; \textbf{Update} $\mathbf{y}^{n,k+1}_h=\mathbf{y}^{n,k}_h+\delta\mathbf{y}_h^{n,k}$, $k=k+1$\; } \textbf{Update} $\mathbf{y}^{n+1}_h:=\mathbf{y}_h^{n,k}$, where $k$ is the index of last sub-iterate. } \caption{(nonlinear gradient flow scheme)} \label{algo:GF_euler} \end{algorithm} \section{Computing shapes: the effect of defects and creases}\label{sec:simulations} We have implemented Algorithm~\ref{algo:GF_euler} using the multiphysics finite element software Netgen/NGSolve \cite{schoberl2017netgen}, and the visualization relies on ParaView~\cite{Ahrens2005}. We refer to our accompanying paper \cite{bouck2022NA} for numerical experiments that show quantitative properties of Algorithm~\ref{algo:GF_euler} and document the convergence of the proposed method. In this section, we focus on the ability of our discrete reduced model \eqref{eq:minimization-pb-discrete} to capture quite appealing and practical physical phenomena related to shape formation. In some experiments we measure the deviation of $\normalfont{\Romanbar{1}}[\mathbf{y}^{\infty}_h]$ from the target metric $g$ for the final iterate $\mathbf{y}^{\infty}_h$ as an indicator of error between an approximate solution and an exact global minimizer to \eqref{eq:stretching-energy}. We quantify this deviation via \begin{equation}\label{eq:metric-deviation} e_h^p[\mathbf{y}^{\infty}_h]~:=~\| \normalfont{\Romanbar{1}}(\mathbf{y}^{\infty}_h)~-~g\|_{L^p(\Omega)}, \end{equation} for $p=1,\infty$. Since global minimizers to \eqref{eq:stretching-energy} are characterized by the metric constraint \eqref{eq:metric-cons} of Corollary \ref{cor:minimizers} (immersions of $g$ are minimizers with vanishing energy), a small metric deviation \eqref{eq:metric-deviation} implies that the approximate solution $\mathbf{y}^N_h$ is close to an exact global minimizer. \subsection{Rotationally symmetric director fields and defects}\label{sec:dir_defect} Consider $\Omega~\subset~\mathbb{R}^2$ be the unit disc. Motivated by \cite{modes2011gaussian,white2015programmable,mcconney2013topography,chung2017finite}, we let the blueprinted director field $\mathbf{m}$ be a rotation of \eqref{eq:m_rot_sym_1} by an angle $\alpha$ \begin{equation}\label{eq:m_rot_sym_2} \mathbf{m}(r,\theta) = \big(\cos(n(\theta+\alpha)),\sin(n(\theta+\alpha))\big); \end{equation} recall that $n$ is the defect degree and that $\mathbf{m}$ is discontinuous at the origin. We run Algorithm~\ref{algo:GF_euler} with several values of $\alpha$ and $n$ and display the output in Fig.~\ref{fig:comparison_1}. To illustrate the effectiveness of Algorithm~\ref{algo:GF_euler} to capture physical phenomena, we also compare the computed shapes with experimental and expected configurations in \cite{modes2011gaussian,white2015programmable} and find striking similarities. We use physical and numerical parameters \[ s=0.1, ~ s_0=1; \quad \textrm{tol}_1=10^{-6}, ~ \textrm{tol}_2=10^{-10}, ~ \tau=0.1, ~ h=1/32, ~ c_r=1, \] let $\mathbf{x}=(x_1,x_2)\in\Omega$, and initialize Algorithm~\ref{algo:GF_euler} with $\mathbf{y}_h^0=I_h\mathbf{y}^0$, where \begin{equation}\label{eq:initialization} \mathbf{y}^0(\mathbf{x})~=~ \big(\mathbf{x},0.05(1-|\mathbf{x}|^2) \big) \end{equation} is a small perturbation of a flat disc (i.e. $\mathbf{y}(\Omega)=\Omega$). \begin{figure}[htbp] \includegraphics[width=13.cm]{pics/comparison_1_newnew} \caption{\emph{Director fields with point defects of degree $n$}. First row displays $n=2,3/2,-1$ and $\alpha=0$ (from left to right). Each panel shows experimental and expected configurations from \cite{mcconney2013topography} as well as two views of the computed solution. Second row depicts experimental pictures from \cite{de2012engineering} and our simulations of the cone structure $n=1, \alpha=\frac{\pi}{2}$ (left) and anti-cone structure $n=1, \alpha=0$ (right). The numerical model reproduces experimental observations well.} \label{fig:comparison_1} \end{figure} \subsection{Compatible nonisometric origami}\label{sec:origami} Origami are ancient structures made of folding thin sheets. They have recently attracted growing interest in the area of materials science for its practical value in the design of medical devices, deployable space structures and robotics \cite{zhao2022twisting}. In this section we explore whether our discrete model \eqref{eq:minimization-pb-discrete} with regularization is able to capture such structures. Motivated by \cite{plucinsky2016programming,plucinsky2018actuation,plucinsky2018patterning}, we embark on a computational study of nonisometric origami formed by LCNs. Unlike isometric origami shapes, that arise from pure folding and bending mechanisms, nonisometric origami result from satisfying the metric constraint \eqref{eq:metric-cons}, i.e. $\normalfont{\Romanbar{1}}[\mathbf{y}]=g$, or equivalently minimizing the stretching energy $E_{str}$ of \eqref{eq:stretching-energy}; nonisometric origami thus exhibit stretching and shearing. In each origami experiment below, we split the domain $\Omega$ into several subdomains by ``folding lines'' or ``creases'' $\gamma_i$ for $i=1,\ldots,N_{\gamma}$, and denote the set of them by $\Gamma$. We consider fitted meshes to $\Gamma$, i.e., $\Gamma\subset \bigcup_{e\in \mathcal{E}_h}e$; see \cite{bouck2022NA} for nonfitted meshes. \medskip {\it Compatibility}: We assume the blueprinted director field $\mathbf{m}$ to be constant in each subdomain. We say the set-up of nonisometric origami is \emph{compatible} if \begin{itemize} \item $\mathbf{m}$ satisfies the compatibility condition proposed in \cite[formula (6.3)]{plucinsky2018actuation}, namely \[ |\mathbf{m}_{\gamma_i^+}\cdot\mathbf{t}_{\gamma_i}|=|\mathbf{m}_{\gamma_i^-}\cdot\mathbf{t}_{\gamma_i}|, \] for any $i=1,\ldots,N_{\gamma}$, where $\mathbf{t}_{\gamma_i}$ represents a unit tangent vector to $\gamma_i$ and $\mathbf{m}_{\gamma_i^\pm}$ denote $\mathbf{m}$ restricted to the two subdomains that share $\gamma_i$; \item The actuation parameters $s,s_0$, and thus the parameter $\lambda$ defined in \eqref{eq:lambda}, are continuous across $\gamma_i$ for $i=1,\ldots,N_{\gamma}$. \end{itemize} The compatibility condition means that the tangential component of the line field $\mathbf{m}\otimes\mathbf{m}$ and parameter $\lambda$ are continuous across $\gamma_i$. Therefore, since any equilibrium configuration satisfies the metric constraint \eqref{eq:metric-cons} with metric $g$ defined in \eqref{eq:target-metric}, such configuration sustains \emph{compatible} stretching on both sides of a folding line $\gamma_i$. Moreover, we exploit the fact that the regularization parameter $c_r$ may depend on the edge $e$ to incorporate the creases $\Gamma$ in the discrete energy $E_h$ in \eqref{eq:discrete-str}. We thus take regularization parameter $c_r=0$ along the folding lines $\Gamma$ and $c_r=100$ in the rest of domain, i.e., we rewrite \eqref{eq:E-reg} as \begin{equation}\label{eq:reg+folding} R_h[\mathbf{y}_h] = c_{r}h\sum_{e\in\E_h\setminus\Gamma}\int_{e}\jump{\nabla\mathbf{y}_h}^2. \end{equation} In fact, the zero regularization (no jumps of gradient) models a weakened (or damaged) material on creases \cite{bartels2022modeling}, and mathematically this allows for the formation of kinks. On the other hand, the large regularization in the subdomains serves as a mechanism to force small bending energy on minimizers of the discrete stretching energy $E_h$. Consequently, equilibrium configurations prefer flat surfaces and folds to meet the target metric \eqref{eq:metric-cons}. \subsubsection{Folding table.}\label{sec:table} The set-up of blueprinted director field $\mathbf{m}$, creases $\Gamma$ and subdomains of $\Omega=[0,1]\times[0,2]$ are displayed in Fig.\ref{fig:pyramid_comb} (left). We choose parameters \[ s=0.1, ~ s_0=1; ~ h=1/64, ~ \tau=0.5, ~ \textrm{tol}_1=10^{-6}, ~ \textrm{tol}_2=10^{-10}. \] \textit{Case 1.} We use the initialization $\mathbf{y}_h^0=I_h\mathbf{y}^0$ with \begin{equation}\label{eq:initialization_pyramid_comb} \mathbf{y}^0(x_1,x_2)~=~\big(x_1,x_2,0.8x_1(1-x_1)x_2(2-x_2)\big). \end{equation} \noindent \textit{Case 2.} We use the initialization $\mathbf{y}_h^0=I_h\mathbf{y}^0$ with \begin{equation}\label{eq:initialization_pyramid_1} \mathbf{y}^0(x_1,x_2)~=~\big(x_1,x_2,0.8x_1(1-x_1)x_2(1-x_2)\big). \end{equation} Results for both cases are presented in Fig.\ref{fig:pyramid_comb}. We get final configurations consistent with the predicted and experimental shapes in \cite[Figure 5.2]{plucinsky2017deformations}. The two distinct final states correspond to different initial configurations. However, final energies are $E_h[\mathbf{y}_h^\infty]=8.27 \times 10^{-6}, 5.97 \times 10^{-6} $ and the metric deviations are $e_h^1[\mathbf{y}^{\infty}_h]=4.5\times10^{-3},3.7\times10^{-3}$ for the two cases. Consequently, this provides yet another example of non-unique minimizers due to the non-convex nature of the discrete model \eqref{eq:minimization-pb-discrete}; see \cite{bouck2022NA} for further analytical and computational discussions. \begin{figure}[htbp] \includegraphics[width=11.cm]{pics/pyramid_comb} \vskip-0.3cm \caption{{\it Folding table}: Setting for origami in Subsection \ref{sec:table} (left). Final configurations for \textit{Case 1} (middle) and \textit{Case 2} (right).} \label{fig:pyramid_comb} \end{figure} \subsubsection{Folding cube.}\label{sec:cube} We now consider the design in \cite{plucinsky2016programming} whose folded shape is an origami cube. The set-up is given in Fig.\ref{fig:origami_cube} (left), where the domain $\Omega$ is a rhombus with vertices $(0,1),(0,2),(\sqrt{3},0),(\sqrt{3},1)$. We take a \emph{graded mesh} such that $h=1/128$ near the creases and $h=1/32$ everywhere else. We choose the parameters \[ s=-1/3, ~ s_0=1; ~ \tau=0.1, ~ \textrm{tol}_1=10^{-8}, ~ \textrm{tol}_2=10^{-10}, \] and use the initialization $\mathbf{y}_h^0=I_h\mathbf{y}^0$ with \begin{equation}\label{eq:initialization_cube} \mathbf{y}^0(x_1,x_2)~=~\Big(x_1,x_2,0.8x_1(x_1-\sqrt{3})\big(x_2+\frac{\sqrt{3}}{3}x_1-1\big)\big(x_2+\frac{\sqrt{3}}{3}x_1-2\big)\Big). \end{equation} The evolution of our nonlinear gradient flow is displayed in Fig.\ref{fig:origami_cube} (right). We reach the desired cube equilibrium configuration with final energy $E_h[\mathbf{y}_h^\infty]=7.34 \times 10^{-8}$ and metric defect $e_h^1[\mathbf{y}^{\infty}_h]=3.6\times10^{-4}$. \begin{figure}[htbp] \includegraphics[width=4.5cm]{pics/cube_dir} \includegraphics[width=8.cm]{pics/cube_evo} \caption{{\it Folding cube}: Rhombus $\Omega$, creases $\Gamma$ and director field $\mathbf{m}_{\perp}$ (left). Gradient flow iterates $\mathbf{y}_h^0,\mathbf{y}_h^{110},\mathbf{y}_h^{310},\mathbf{y}_h^{1010}$ and final configuration $\mathbf{y}_h^{1287}$ displayed clockwise.} \label{fig:origami_cube} \end{figure} The choice $s=-1/3$ and $s_0=1$ is crucial for the shape to form a perfect cube. This can be justified in the spirit of \cite{modes2011blueprinting} as follows. We expect that rhombi subdomains in Fig.~\ref{fig:origami_cube} to deform into faces of the cube, which are squares; this is depicted in Fig. \ref{fig:rhombus1}. We assume that the diagonals of undeformed rhombi are parallel to $\mathbf{m}_{\perp},\mathbf{m}$ and denote their lengths by $L_1,L_2$. If $s<s_0$ then $\lambda=\big(\frac{s+1}{s_0+1}\big)^{1/3}<1$ according to \eqref{eq:lambda}, whence the expression \eqref{eq:target-metric} of the metric $g$ reveals that the material stretches in the direction $\mathbf{m}_{\perp}$ and shrinks along $\mathbf{m}$ with ratios $1/\sqrt{\lambda},\lambda$. If $\ell_1,\ell_2$ stand for the diagonals of the deformed square, then they satisfy $\ell_1 = (1/\sqrt{\lambda})L_1$ and $\ell_2=\lambda L_2$ as well as $\ell_1=\ell_2$. Consequently, we see that $\lambda^{-3/2}=L_2/L_1=\sqrt{3}$ and, choosing $s_0=1$, that $s=-1/3$ as asserted. \begin{figure}[htbp] \includegraphics[width=4cm]{pics/rhombus1} \vskip-0.5cm \caption{{\it Folding cube}: rhombus with diagonals $L_1,L_2$ deforms into a square with diagonals $\ell_1=\ell_2$ to match the target metric and thus minimize the stretching energy.} \label{fig:rhombus1} \end{figure} \subsubsection{Curved creases}\label{sec:curved_creases} The creases are arcs in this example motivated by \cite{kilian2017string}. The set-up in Fig.~\ref{fig:curved_creases} (left) shows that the domain $\Omega$ is a square and the creases $\Gamma$ are curved solid lines. We use a \emph{graded} mesh such that $h=1/128$ near the arcs and $h=1/32$ everywhere else. We choose the parameters \[ s=0.1, ~ s_0=1; ~ \tau=0.5, ~ \textrm{tol}_1=10^{-6}, ~ \textrm{tol}_2=10^{-10}, \] and use the initialization \eqref{eq:initialization_pyramid_1}. The equilibrium shape is displayed in Fig.~\ref{fig:curved_creases}, which is like a tent. This examples shows the ability of our discrete model \eqref{eq:minimization-pb-discrete} to deal with curved creases. \begin{figure}[htbp] \includegraphics[width=7.5cm]{pics/curved_tent} \caption{{\it Curved creases}: Square domain $\Omega$, curved creases $\Gamma$ (solid lines), and director field $\mathbf{m}$ (left). The dashed lines are lines of discontinuity of $\mathbf{m}$ rather than creases. Two views of final tent equilibrium configuration (right).} \label{fig:curved_creases} \end{figure} \subsection{Incompatible nonisometric origami}\label{sec:incompatible-s} In this section, we allow the physical quantities $\mathbf{m},s,s_0$ to \emph{violate} the compatibility condition in Section \ref{sec:origami}, namely to be discontinuous across creases $\Gamma$. This entails a discontinuity of $g$ and requires the material to sustain \emph{incompatible} stretching on both sides of the creases. In light of Corollary \ref{cor:minimizers} (immersions of $g$ are minimizers with vanishing energy) and the discussion after it, the existence of an $H^1$ isometric immersion $\mathbf{y}$ of such a discontinuous $g$ is questionable, and we would hypothesize that there is no deformation $\mathbf{y}\in H^1(\Omega;\R^3)$ such that $\normalfont{\Romanbar{1}}[\mathbf{y}]=g$ and correspondingly $E_{str,\Gamma}[\mathbf{y}]=0$, due to the incompatible stretching. Computational evidence given below shows that the discrete energy $E_h[\mathbf{y}_h]$ and metric defect $e_h^1[\mathbf{y}]$ decrease with meshsize to a positive value and the discrete solution $\mathbf{y}_h$ converges, at least weakly, in view of \cite[Proposition 2.3 (coercivity)]{bouck2022NA}. We present two simulations and discuss the structure of this limit. To this end, we again consider the modified regularization \eqref{eq:reg+folding} with $c_r=0$ along the folding lines and $c_r=100$ in the rest of the domain. \subsubsection{Lifted square origami.}\label{sec:lifted-sq} Let $\Omega:=[0,1]^2$ be the unit square and the creases and subdomains be as depicted in Fig.~\ref{fig:set-up-lifted-sq} (left). The latter are concentric squares with vertices connected by folding lines. We take $s=s_0=1$ in the inner square (ideally no deformation) and $s=0.1,s_0=1$ in the annulus between the two squares so that $\lambda<1$ in this region. This implies shrinking along the direction of the director field $\mathbf{m}$, hence parallel to the sides, and stretching in the orthogonal direction $\mathbf{m}_\perp$. \begin{figure}[h!] \begin{tikzpicture}[scale=1.5] \draw (1,-1) -- (1,1) -- (-1,1) -- (-1,-1) -- (1,-1); \draw (.5,-.5) -- (.5,.5) -- (-.5,.5) -- (-.5,-.5) -- (.5,-.5); \draw (-1,-1) -- (-.5,-.5); \draw (-1,1) -- (-.5,.5); \draw (1,1) -- (.5,.5); \draw (1,-1) -- (.5,-.5); \draw [-to](.75,-.25) -- (.75,.25); \draw [-to](.25,.75) -- (-.25,.75); \draw [-to](-.75,.25) -- (-.75,-.25); \draw [-to](-.25,-.75) -- (.25,-.75); \node at (0,0) {$\lambda=1$}; \end{tikzpicture} \includegraphics[width=8cm]{pics/lifted_sq} \caption{{\it Lifted square origami}: Lines indicate creases and arrows indicate the blueprinted director field $\mathbf{m}$ in regions where $\lambda<1$ (left). The inner square has $\lambda=1$ (no internal deformation). Two views of equilibrium configuration show that buckling takes place to accommodate the lack of data compatibility.} \label{fig:set-up-lifted-sq} \end{figure} We use the initialization \eqref{eq:initialization_pyramid_1} and choose the parameters to be \[ h=1/64, ~ \tau=0.1, ~ \textrm{tol}_1=10^{-6}, ~ \textrm{tol}_2=10^{-10}. \] We plot two views of the final configuration on the middle and right of Fig.~\ref{fig:set-up-lifted-sq}. We see that the inner region has no internally-induced deformation but shrinks and lifts up out of plane to accommodate itself to the change in the outer region. \begin{figure}[htbp] \begin{minipage}{.4\textwidth} \begin{tabular}{|c|c|c|} \hline h & $ E_h[\mathbf{y}^{\infty}_h] $ & $e_h^1[\mathbf{y}^{\infty}_h]$ \\ \hline\hline 1/32 & 0.0277 & 0.177 \\ \hline 1/64 & 0.0127 & 0.103 \\ \hline 1/128 & 0.00751 & 0.0754 \\ \hline 1/256 & 0.00525 & 0.0626 \\ \hline \end{tabular} \end{minipage} \begin{minipage}{.5\textwidth} \begin{center} \includegraphics[width=7.5cm,height=2.0cm]{pics/lifted_square_compare.png} \end{center} \end{minipage} \hfill \vspace{0.3cm} \caption{{\it Lifted square origami}: The table shows a monotone decrease of discrete energy $E_h[\mathbf{y}^{\infty}_h]$ and metric defect $e_h^1[\mathbf{y}^{\infty}_h]$ in terms of $h$, which stabilizes to a positive value. Side views of the deformations for $h=1/128$ (middle) and $h=1/64$ (right). The buckling is more pronounced for smaller $h$.} \label{fig:conv_h} \end{figure} To explore the asymptotic behavior of $\mathbf{y}_h^\infty$ as $h\to0$ we run a series of experiments reported in Fig.~\ref{fig:conv_h}. We see that the energy $E_h[\mathbf{y}_h^\infty]$ is $\mathcal{O}(10^{-2})$ and decreases but not quadratically; in fact, it seems that it stabilizes to a positive value. Recall that the quadratic scaling $E_h[\mathbf{y}_h]\le \Lambda h^2$ of \eqref{eq:energy-scaling} in Theorem \ref{T:convergence} (convergence of discrete minimizers) leads to strong convergence in $H^1(\Omega;\R^3)$ to a piecewise $H^2$-limit $\mathbf{y}^*$ such that $E_{str,\Gamma}[\mathbf{y}^*]=0$ and $\normalfont{\Romanbar{1}}[\mathbf{y}^*]=g$. This reveals that $g$ may not admit an isometric immersion, at least not with the regularity stated in Theorem \ref{T:convergence}. This in turn contrasts with the compatible origami shapes in Section \ref{sec:origami} for which the final energies are $\mathcal{O}(10^{-5})$ and $\mathcal{O}(10^{-7})$, making it likely that $E_{str,\Gamma}[\mathbf{y}^*]=0$. Fig.~\ref{fig:conv_h} also shows that buckling is more pronounced for smaller regularization, which happens for smaller $h=1/128$. Finally, we view $R_h[\mathbf{y}_h]$ as a numerical mechanism that selects some equilibrium configurations in the limit $h\to0$. This process is related to the quasiconvex envelope of $E_{str}$, which is not known for $E_{str}$ given by \eqref{eq:stretching-energy} and \eqref{eq:stretching-energy-density} and is hard to find. We refer to \cite[Section 2.2.2]{bouck2022NA} for a discussion of quasiconvexity. \subsubsection{Lifted M-origami}\label{sec:lifted-M} We explain now how to exploit the idea in Subsection \ref{sec:lifted-sq} as a building block to design lifted configurations of any polygonal shapes. In fact, for any polygonal subdomain $P\subset\Omega:=[0,1]^2$ with $\textrm{dist}(P,\partial \Omega)>0$, we can always construct a dilation $P'$ of $P$ so that it is ``concentric'' with $P$ and $P\subset P'$ with $\textrm{dist}(P',\partial \Omega)>0$. Then we further connect corresponding vertices of $P$ and $P'$ with folding lines, and also let all the sides of $\partial P$ and $\partial P'$ be creases. We finally take $\mathbf{m}$ parallel to the sides of $\partial P$ and $\lambda<1$ in $P'\setminus P$, while $\lambda=1$ in $P$ and $\Omega\setminus P'$. The discontinuity of $\lambda$ across creases implies again $E_{str}[\mathbf{y}]>0$ for all $\mathbf{y}\in H^1(\Omega;\R^3)$. \begin{figure}[h!] \begin{tikzpicture}[scale=2.6] \draw (.7,1) -- (.5,1) -- (0,.05) -- (-.5,1) -- (-.7,1) -- (-.7,-.4)--(-.5,-.4)--(-.5,.6)--(0,-.3) -- (.5,.6) -- (.5,-.4) -- (.7,-.4) -- (.7,1); \draw (.8,1.1)-- (.45,1.1) -- (0,.2)-- (-.45,1.1)--(-.8, 1.1)--(-.8, -.5)--(-.425,-.5)--(-.425,.25) -- (0,-.5)--(.425,.25)-- (.425,-.5)--(.8,-.5)--(.8, 1.1); \draw (.7,1) --(.8,1.1); \draw (.5,1)--(.45,1.1); \draw (0,.05) -- (0,.2); \draw (-.5,1)--(-.45,1.1); \draw (-.7,1) -- (-.8, 1.1); \draw (-.7,-.4) -- (-.8, -.5); \draw (-.7,-.4) -- (-.8, -.5); \draw (-.5,-.4) -- (-.425,-.5); \draw (-.5,.6) -- (-.425,.25); \draw (0,-.3) -- (0,-.5); \draw (.5,.6) -- (.425,.25); \draw (.5,-.4) -- (.425,-.5); \draw (.7,-.4) -- (.8,-.5); \node at (.54,.75) {$\lambda = 1$}; \node at (1,.75) {$\lambda=1$}; \draw [-to] (.46,.1) -- (.46,-.1) ; \draw [-to] (-.46, -.1) -- (-.46,.1) ; \draw [-to](.16,-.1) -- (.28,.1); \draw [-to](-.28,.1) -- (-.16, -.1); \draw [-to] (.25,.6) -- (.13,.37) ; \draw [-to] (-.13,.37) --(-.25,.6) ; \draw [-to](.75,.15) -- (.75,.35); \draw [-to](-.75,.35) -- (-.75,.15); \draw [-to](.65,1.05) -- (.55,1.05); \draw [-to](.55,-.45) -- (.65,-.45); \draw [-to](-.55,1.05) -- (-.65,1.05); \draw [-to](-.65,-.45) -- (-.55,-.45); \end{tikzpicture} \caption{{\it Lifted M-origami}: Lines indicate creases and arrows indicate the blueprinted director field $\mathbf{m}$ in regions where $\lambda<1$, whereas $\lambda=1$ within and outside the M.} \label{fig:set-up-lifted-M} \end{figure} We apply this procedure to an M-shaped subdomain. The set-up is shown in Fig.~\ref{fig:set-up-lifted-M} and all the parameters are the same as in Subsection \ref{sec:lifted-sq}. In particular $s=0.1$ inside the M-annulus region while $s=1$ in the rest of domain. We use a graded mesh of size $h=1/256$ near the creases and otherwise $h=1/32$. We display the computed solution in Fig.~\ref{fig:lifted-M}, which is the desired lifted M-shape. We stress that the background and solid M are not completely flat due to the same buckling effect already discussed in Section \ref{sec:lifted-sq}. However, this effect is not so pronounced because the shrinking layer is thin relative to the rest of the M and background. We emphasize that the current procedure is different from the construction of lifted surfaces in Section \ref{sec:lifted-surface}. The latter requires $|\nabla\phi|=\sqrt{\lambda^3-1}$ a.e. in $\Omega$, which makes it harder to implement; recall the discussion after \eqref{eq:metric-lifted-2}. \begin{figure}[htbp] \includegraphics[width=12cm]{pics/lifted_M} \vskip-0.7cm \caption{{\it Lifted M-origami}: Two views of final equilibrium configuration. Color on the right picture represents the value of $y_3$ and shows that the solid M and background are not completely flat.} \label{fig:lifted-M} \end{figure} \subsection{Actuation parameters $s$ and $s_0$} Parameters $s$ and $s_0$ encode the effect of environment actuation, such as light and heat, and determine the magnitude of stretches or shrinks in the directions $\mathbf{m}_{\perp}$ or $\mathbf{m}$ for equilibrium configurations. Therefore, when $s$ is close to $s_0$ we can only expect a minor deformation; on the other hand, the material deforms significantly if $s$ is far away from $s_0$. In this Subsection, we explore the role of $s$ and $s_0$ by our discrete model \eqref{eq:minimization-pb-discrete}. \subsubsection{Pyramids with different $s$.}\label{sec:pyramid-s} We consider the set-up of Fig.\ref{fig:pyramid_dir}: the domain is the square $\Omega=[0,1]^2$, its diagonals are the creases $\Gamma$, and the blueprinted director field $\mathbf{m}$ is parallel to the sides of $\Omega$. We choose the parameters \[ s_0=1; ~ h=1/64, \tau = 1, ~ \textrm{tol}_1=10^{-6}, ~ \textrm{tol}_2=10^{-10}, \] regularization constants $c_r=0$ along the creases and $c_r=100$ everywhere else, and initialization \eqref{eq:initialization_pyramid_1}. We take $s=0.9,0.5,0.1,-0.3$ and compare the results. \begin{figure}[htbp] \includegraphics[width=2.8cm]{pics/pyramid_dir_simple} \caption{Set-up for experiments in Subsection \ref{sec:pyramid-s}. Square domain $\Omega$ with solid diagonals representing the creases and arrows parallel to the sides indicating the piecewise constant blueprinted director field $\mathbf{m}$.} \label{fig:pyramid_dir} \end{figure} \begin{figure}[htbp] \begin{tikzpicture} \pgfplotstableread{data/angle.dat}{\one} \begin{axis} [ width = 0.3\textwidth, height=3.5cm, title={Comparison}, xlabel={$s$}, xmin = -0.3, xmax = 0.9, ymin = 0.7, ymax = 1, ] \addplot[blue,thick,densely dashed] table[x=s, y=base]{\one}; \addplot[red,thick,densely dotted] table[x=s, y=lambda]{\one}; \end{axis} \end{tikzpicture} \includegraphics[width=6.5cm]{pics/pyramid_comparison} \caption{{\it Pyramids with varying actuation parameter $s$}: Comparison between computed length (blue dashed) and theoretical value $\lambda=(\frac{s+1}{s_0+1})^{\frac13}$ (pink dots) of the pyramids base for several values of $s$ (left). Computed pyramid solutions for values $s=-0.3,0.1,0.5,0.9$ approaching $s_0=1$ (right).} \label{fig:pyramid-comparison} \end{figure} With arguments similar to those in Subsection \ref{sec:cube} related to Fig.~\ref{fig:rhombus1}, one can easily see that the length of each side of the pyramid base should be $\lambda=(\frac{s+1}{s_0+1})^{\frac13}$. In Fig.~\ref{fig:pyramid-comparison}, we compare this theoretical value with computations of such lengths for different values of $s$, and display the final equilibrium configurations for $s=-0.3,0.1,0.5,0.9$. We observe that the pyramid height decreases to $0$ as $s$ increases toward $s_0=1$, and thus $\lambda\to1$ (no deformation). \subsubsection{Pyramids with space varying $s$.} All preceding simulations assume $s$ constant in space. We now consider the effect of varying $s$ in space, while keeping all other parameters in Subsection \ref{sec:pyramid-s} unchanged. This corresponds, for instance, to the situation that light stimulus is applied non-uniformly to the material. We take \begin{equation}\label{eq:s_vary} s=1-14.4x_1(1-x_1)x_2(1-x_2). \end{equation} \begin{figure}[htbp] \includegraphics[width=7.5cm]{pics/pyramid_curved} \caption{{\it Pyramid with space varying $s$}: The resulting pyramid for $s$ given in \eqref{eq:s_vary} has curved faces, creases and sides.} \label{fig:pyramid_curved} \end{figure} The computed solution, displayed in Fig.\ref{fig:pyramid_curved}, consists of a pyramid with curved faces, creases and sides. For the flat pyramids of Fig \ref{fig:pyramid-comparison}, following \cite{modes2011blueprinting}, we can predict the opening angle $\phi$ of the pyramid to satisfy $\sin \phi = \sqrt{\frac{s+1}{s_0+1}}$. The opening angle is formed by two line segments: the vertical line from the vertex of the pyramid to the center of the base and the line segment from the vertex to the midpoint of the side of the base. Since $s_0=1$ and $s$ decreases monotonically towards the center of the base from $s=1$ on the base boundary, we realize that $\phi$ should decrease as well. This is consistent with our computed solution. \subsubsection{Four cones.}\label{sec:four_cone} In this case, we take $\Omega:=[-0.5,0.5]^2$ and parameters \[ s_0=1; ~ h=1/64, ~\tau=0.1, ~\textrm{tol}_2=10^{-10}, ~ \textrm{tol}_1=10^{-6}. \] We choose the parameters $s=0.1$ and $c_r=1$ inside the four circles with radius $0.2$ and centers $(\pm 0.25,\pm 0.25)$, and $s=1$ and $c_r=100$ everywhere else in the domain. We set the blueprinted director field as in \eqref{eq:m_rot_sym_2}, with $n=1$ and $\alpha=\pi/2$ \begin{equation}\label{eq:m_four_cone} \mathbf{m}(x_1,x_2) = \big(\cos(\theta_i+\pi/2),\sin(\theta_i+\pi/2) \big) \end{equation} where $\theta_i:=\theta_i(x_1,x_2)$ for $i=1:4$ is the angle between the positive $x_1$-axis and the line connecting $(x_1,x_2)$ with $(0.25,0.25),(-0.25,0.25),(-0.25,-0.25),(0.25,-0.25)$ in each quadrant, respectively. For instance, \begin{equation}\label{eq:theta1} \theta_1(x_1,x_2) := \begin{cases} \arctan(\frac{x_2-0.25}{x_1-0.25}) & x_1>0.25 \\ \arctan(\frac{x_2-0.25}{x_1-0.25})+\pi & x_1\le0.25. \end{cases} \end{equation} Moreover, we initialize the discrete gradient flow with $\mathbf{y}_h^0=I_h\mathbf{y}^0$ and \begin{equation}\label{eq:initialization_four_cone} \mathbf{y}^0(x_1,x_2)~=~\big(x_1,x_2,0.8(x_1-0.5)(x_1+0.5)(x_2-0.5)(x_2+0.5)\big). \end{equation} \begin{figure}[htbp] \includegraphics[width=8.5cm]{pics/four_cone} \caption{{\it Four cones}: Equilibrium shape showing four rotationally symmetric cones with vertices at $(\pm0.5,\pm0.5)$ and curved lateral surfaces. The parameter $s$ and metric $g$ are discontinuous across the boundaries of four circles of radius $0.2$ centered at the vertices.} \label{fig:four_cone} \end{figure} The equilibrium shape is displayed in Fig.~\ref{fig:four_cone}, and consists of four cones with vertices at the four prescribed points $(\pm 0.25,\pm 0.25)$. Locally around each vertex, the shape is a rotationally symmetric cone as in Subsection \ref{sec:dir_defect} with $n=1$ and $\alpha=\pi/2$, but the lateral surface flattens out as it meets the background substrate. This is due to the incompatibility created by the discontinuous parameter $s$ and metric $g$ cross the boundary of the four circles. This configuration is similar to the experimental one in \cite{ware2015voxelated}. \subsection{Wrinklings and regularizations}\label{sec:eff-reg} We now elaborate on the role of regularization term $R_h$ defined in \eqref{eq:E-reg} in the formation of equilibrium configurations. \subsubsection{Degree $-1$ defect}\label{sec:deg-1} First, we consider a blueprinted director field $\mathbf{m}$ with a defect of degree $n=-1$ rotated by an angle $\alpha=0$ as described in \eqref{eq:m_rot_sym_2} of Section \ref{sec:dir_defect}. Fig.~\ref{fig:n_neg1_reg} compares two simulations with Algorithm~\ref{algo:GF_euler} and regularization parameter $c_{r}=0$ (left) and $c_{r}=1$ (right). We observe the formation of wrinklings (or micro-structure) at the mesh scale $h$ in final configurations produced when $c_r=0$ and a smooth shape for $c_r=1$. We conclude that the regularization term $R_h$ can effectively remove such oscillations. \begin{figure}[htbp] \includegraphics[width=6.cm]{pics/deg_n1_2} \includegraphics[width=6.cm]{pics/deg_n1} \caption{{\it Degree $-1$ defect}: Final configurations with $c_{r}=0$ (left) and $c_{r}~=~1$ (right) for a director field $\mathbf{m}$ with degree $n=-1$ and $\alpha=0$ in \eqref{eq:m_rot_sym_2}. The regularization term removes oscillations.} \label{fig:n_neg1_reg} \end{figure} \subsubsection{Incompatible square origami}\label{sec:deg-1} We repeat the simulations of Section \ref{sec:lifted-sq} with the same parameters except for $c_r=1$ away from creases $\Gamma$ (top) and $c_r=0$ (bottom) of Fig.~\ref{fig:set-up-lifted-sq-2}. We learned in Section \ref{sec:lifted-sq} that this setting gives rise to {\it buckling} but, comparing with Fig.~\ref{fig:set-up-lifted-sq} when $c_r=100$ in $\Omega\setminus\Gamma$, we now realize that a smaller regularization parameter leads to a more significant buckling. Moreover, the regularization $R_h$ with $c_r=1$ removes wrinklings observed for $c_r=0$. An illuminating discussion follows about $e^1_h[\mathbf{y}_h^{\infty}]$ and $E_h[\mathbf{y}_h^{\infty}]$. We obtain \[ c_r=100, ~ 1, ~0 \Rightarrow e^1_h[\mathbf{y}_h^{\infty}]\approx0.1,~ 0.035,~ 0.01;~ E_h[\mathbf{y}_h^{\infty}]\approx0.012,~ 0.0026,~ 8.9\times10^{-4}. \] Does this mean that the final configuration of Fig.~\ref{fig:set-up-lifted-sq-2} for $c_r=0$ is closer to a true global minimizer of the stretching energy $E_{str,\Gamma}$ than the others? To elucidate this question, we conduct a mesh analysis for $c_r=0$ and $c_r=100$ and report it in Fig.~\ref{fig:conv-plot}. We see that $E_h[\mathbf{y}^{\infty}_h]$ and $e^1_h[\mathbf{y}^{\infty}_h]$ converge linearly to $0$ for $c_r=0$, whereas these quantities seem to decrease to a positive value for $c_r=100$. In contrast, for the compatible pyramid origami of \cite[Example 2.2]{bouck2022NA}, displayed in Fig.~\ref{fig:pyramid_seq}, $E_h[\mathbf{y}^{\infty}_h]$ and $e^1_h[\mathbf{y}^{\infty}_h]$ can reach the value $10^{-14}$ by simply reducing the stopping tolerance $\textrm{tol}_1$, even for a very coarse meshsize $h=1/16$. The reason is that an exact solution $\mathbf{y}^*$ for the compatible pyramid origami is \emph{piecewise affine} over $\Th$, because $\Th$ matches the creases, so that $\mathbf{y}^*\in\V_h$. We resort to Corollary \ref{cor:minimizers} (isometric immersions are minimizers with vanishing energy) and Theorem \ref{T:convergence} (convergence of discrete minimizers) to infer that there exists a piecewise $H^2$ isometric immersion for the compatible pyramid origami but not for the incompatible square origami. \begin{figure}[h!] \includegraphics[width=9.5cm]{pics/lifted_sq2} \caption{{\it Incompatible square origami}: Two views of the final configurations with regularization parameter $c_r=1$ (top) and $c_r=0$ (bottom) away from the creases. Wrinkling occurs for $c_r=0$.} \label{fig:set-up-lifted-sq-2} \end{figure} \begin{figure}[htbp] \begin{tikzpicture} \begin{loglogaxis} [ xlabel=$h$, ylabel style={rotate=-90}, ylabel= error, legend style= { at={(1,1)}, anchor=north west, draw=none, fill=none }, legend cell align=left, grid=major, clip=false ] \addplot table { 0.0625 0.003603567477519 0.03125 0.0017673855764793 0.015625 0.0008503789417116 0.0078125 0.0004176815129413 }; \addplot table { 0.0625 0.026497203554123952 0.03125 0.014030970187147239 0.015625 0.007334757493664354 0.0078125 0.004118493379375017 }; \addplot table { 0.0625 0.0552274431581785 0.03125 0.02771083973198 0.015625 0.0127580259996365 0.0078125 0.007512863802709 0.00390625 0.005252560359285 }; \addplot table { 0.0625 0.26884374461862065 0.03125 0.17722350443019652 0.015625 0.1028071227341088 0.0078125 0.07536237696350444 0.00390625 0.06260919317419017 }; \logLogSlopeTriangle{0.9}{0.2}{0.2}{1}{black}; \legend { $E_h[\mathbf{y}^{\infty}_h]$ for $c_r=0$, $e^1_h[\mathbf{y}^{\infty}_h]$ for $c_r=0$, $E_h[\mathbf{y}^{\infty}_h]$ for $c_r=100$, $e^1_h[\mathbf{y}^{\infty}_h]$ for $c_r=100$ } \end{loglogaxis} \end{tikzpicture} \caption{{\it Incompatible square origami}: Plots of $E_h[\mathbf{y}^{\infty}_h]$ and $e^1_h[\mathbf{y}^{\infty}_h]$ with several meshsizes $h$ and regularization parameters $c_r=0,100$. For $c_r=0$ we observe that $E_h[\mathbf{y}^{\infty}_h]$ and $e^1_h[\mathbf{y}^{\infty}_h]$ are both $\mathcal{O}(h)$, whereas for $c_r=100$ they stabilize to a positive value as $h$ decreases. } \label{fig:conv-plot} \end{figure} We further wonder about the limit of $\mathbf{y}_h^\infty$ as $h\to0$ for $c_r=0$. Although coercivity of the energy $E_h[\mathbf{y}^{\infty}_h]=E_{str}[\mathbf{y}^\infty_h]$ implies that $\{\mathbf{y}_h^\infty\}_{h}$ have a weakly convergent subsequence in $H^1(\Omega;\R^3)$, and we do observe computationally that $E_{str}[\mathbf{y}^{\infty}_h] \to 0$, the weak limit $\mathbf{y}$ might not have zero stretching energy due to the lack of quasi-convexity of $E_{str}$. To illustrate this point we consider again the explicit example of compatible folding pyramids of \cite[Example 2.2 and Section 5.1]{bouck2022NA} with vanishing stretching energy. The sequence $\{\mathbf{y}^*_i\}_{i=1}^{\infty}$ consists of flat pyramids folding across dyadic concentric creases $\Gamma_i$ at distance $2^{-i}$ from each other and matched by the mesh $\Th$. The first three discrete solutions $\mathbf{y}^*_{i,h}$ computed by our method are displayed in Fig.~\ref{fig:pyramid_seq} and satisfy $\mathbf{y}^*_{i,h}=\mathbf{y}^*_i\in\V_h$ for $i=1,2,3$. The sequence $\{\mathbf{y}^*_i\}_{i=1}^\infty$ converges weakly in $H^1(\Omega;\R^3)$ to $\mathbf{y}^*(\mathbf{x}') = (\lambda \mathbf{x}',0)^T$ as $i\to\infty$, but the limit satisfies $E_{str}[\mathbf{y}^*]>0$. This lack of weak lower semicontinuity of $E_{str}$ in $H^1$ is related to the lack of quasiconvexity of $E_{str}$; we refer to \cite[Section 2.2]{bouck2022NA} for details. We can now create a sequence of discrete minimizers $\mathbf{y}_h\in\V_h$ that converge weakly to $\mathbf{y}^*(\mathbf{x}') = (\lambda \mathbf{x}',0)^T$ as $h\to 0$: (a) let $\Th$ be a uniform dyadic partition of $\Omega$ made of right triangles with cartesian edges of size $h=2^{-i}$ for $i\in\mathbb{N}$; (b) let $i(h)=\log_2(1/h)$ and $\mathbf{y}_{i(h)}^*$ be a folding pyramid with creases $\Gamma_{i(h)}$; (c) take $\mathbf{y}_h:=\mathbf{y}^*_{i(h)}\in\V_h$ and note that $E_h[\mathbf{y}_h]=0$. We expect a similar behavior for the incompatible square origami, except that we are not able to characterize the weak limit. Computing the quasiconvex envelope, a key step in this regard, is still open for this problem. \begin{figure}[htbp] \includegraphics[width=10.5cm]{pics/pyramid_seq} \caption{{\it Compatible pyramid origami}: Equilibrium shapes of flat pyramids that fold across dyadic creases as in \cite[Section 5.1]{bouck2022NA}. The first and second rows display two views of the same configuration. These explicit deformations converge weakly in $H^1$ to a non-global minimizer.} \label{fig:pyramid_seq} \end{figure} We now justify heuristically the shape of $\mathbf{y}$ in Figs.~\ref{fig:set-up-lifted-sq} and \ref{fig:set-up-lifted-sq-2}. We observe that any side of the inner square has to shrink by a factor $\lambda<1$ due to the annulus but remain constant due to the inner square. This incompatible deformation can be realized by developing wrinkles in the inner square with increasing frequency towards the sides so that the length is maintained but accommodated in a shorter interval; a similar mechanism consisting of rapid oscillations towards the domain boundary is studied in \cite{kohn1994surface} for a simplified model. Any approximation of this deformation within the finite element space $\V_h$ introduces the mesh scale $h$ and the effect of regularization $R_h[\mathbf{y}_h]$. The former suppresses infinite wrinkling while the latter prevents the formation of wrinkles at any scale and favors piecewise smooth deformations. Since discrete solutions do not allow infinite oscillations near creases, buckling out of plane is then a natural phenomenon to occur to accommodate incompatible stretching. Figs.~\ref{fig:set-up-lifted-sq} and \ref{fig:set-up-lifted-sq-2} depict the final configuration and show that the faces and creases are not flat but curved, although all the creases are straight lines in the undeformed configuration. We may conclude that the regularization \eqref{eq:E-reg} serves as a mechanism to select minimizers of stretching energy for \emph{compatible} origami, while a competition between stretching and bending energies determines the final shape for \emph{incompatible} origami. \subsection{Metric errors in the flow}\label{sec:monoton-decrease} We take $\Omega=[-0.5,0.5]^2$ and parameters \[ s=0.1, ~s_0=1; ~ h=1/64, ~ \tau=0.48, ~ c_r=1, ~ \textrm{tol}_1=10^{-6}, ~\textrm{tol}_2=10^{-10}. \] Analogously to \eqref{eq:initialization_pyramid_comb} and \eqref{eq:initialization_pyramid_1}, we initialize the discrete gradient flow with a perturbation of the flat square $\mathbf{y}_h^0=I_h\mathbf{y}^0$ where \begin{equation}\label{eq:initialization_simple_metric} \mathbf{y}^0(x_1,x_2)~=~\big(x_1,x_2,0.8(x_1-0.5)(x_1+0.5)(x_2-0.5)(x_2+0.5)\big). \end{equation} \emph{Case 1: Smooth $\mathbf{m}$.} We choose the smooth blueprinted director field \begin{equation}\label{eq:cont_dir_1} {\mathbf{m}}(x_1,x_2) := (x_1+1,x_2+1)/\sqrt{(x_1+1)^2+(x_2+1)^2}. \end{equation} \emph{Case 2: Rough $\mathbf{m}$.} We consider a defect of degree $n=3/2$ and $\alpha=0$ in \eqref{eq:m_rot_sym_2}. Fig.~\ref{fig:plot_flow} contains plots of the metric errors and energies in the discrete gradient flow for both cases. We observe that the energy $E_h[\mathbf{y}_h^n]$ always decays monotonically as expected from Theorem \ref{thm:energy-stability-sum} (energy stability). The metric defect $e_h^1[\mathbf{y}^n_h]$ also converges monotonically as $n$ increases in both cases. In contrast, the error $e_h^{\infty}[\mathbf{y}^n_h]$ decreases monotonically in Case 1 (smooth $\mathbf{m}$) but not in Case 2 (rough $\mathbf{m}$). The latter is due to the discontinuity of $\mathbf{m}$ at the origin, hence of the target metric $g$, but occurs only at the beginning of the flow. The error $e_h^{\infty}[\mathbf{y}^n_h]$ stabilizes asymptotically but is much larger than $e_h^1[\mathbf{y}^n_h]$. This behavior is consistent with the discontinuity of $g$ but against assumption \eqref{eq:metric-close} of Remark \ref{rmk:assumption}, in the sense that satisfying \eqref{eq:metric-close} for $\mathbf{y}^0_h$ might not be enough to guarantee \eqref{eq:metric-close} for all iterates $\mathbf{y}_h^{n,k}$. Nonetheless, we emphasize again that our Newton sub-iterations always work properly in practice with a simple and straightforward choice of $\tau$ rather insensitive to $h$. \begin{figure}[htbp] \includegraphics[width=6cm]{pics/plot_flow_conti_m} \includegraphics[width=6cm]{pics/plot_flow_defect} \caption{Plots of metric errors of $e_h^1[\mathbf{y}^n_h]$ (blue curve), $e_h^{\infty}[\mathbf{y}^n_h]$ (red curve) and energy $E_h[\mathbf{y}_h^n]$ (black curve) of the gradient flow for $n\ge0$. Case 1: $\mathbf{m}$ smooth (left) and Case 2: $\mathbf{m}$ rough (right).} \label{fig:plot_flow} \end{figure} \section{Conclusions} This paper deals with a membrane model of nematic liquid crystal polymer networks (LCNs). The two main threads in this paper are asymptotics and computation. Our main contributions as are follows. \begin{itemize} \item {\it Modeling}: We use formal asymptotics, in the spirit of \cite{ozenda2020blend}, to derive a reduced model of LCNs involving the nonconvex stretching energy \eqref{eq:stretching-energy}. We prove crucial properties of the model such as the characterization of zero energy states in terms of deformations that satisfy a metric constraint. \item {\it Asymptotic profiles}: The propose a methodology to find shape profiles corresponding to blueprinted director fields $\mathbf{m}$ with high degree point defects upon composition of defects of degree $n=1$ and $1/2$. We utilize formal asymptotics to explore shapes for defects of degree $n=2$ and $n=3/2$. \item {\it Discretization}: We propose a finite element method for the stretching energy consisting of continuous piecewise affine functions over a shape regular 2d mesh made of triangles. We augment the discrete stretching energy with a regularization term involving a discrete $H^2$-norm. The latter acts as a selection mechanism to prevent oscillations of the solution. \item {\it Nonlinear solver}: We employ an implicit gradient flow to minimize the discrete energy, and a Newton method to solve each sub-problem. We present a convergence theory for the Newton method based on the coercivity induced by the flow metric and reasonable assumptions on the current iterate. The pseudo time step is not very sensitive to the meshsize and can be taken rather large in practice. \item {\it Computations}: We present numerous computations highlighting many features of the discrete membrane model. Simulations included shapes coming from LCNs with point defects, nonisometric compatible and incompatible origami, and shapes with spatially varying actuation parameters. We explore computationally the role of regularization and document the decay of the discrete energy and metric defect along the discrete gradient flow. \end{itemize} In the companion paper \cite{bouck2022NA} we prove additional properties of the model, such as the lack of rank-one convexity. We also show in \cite{bouck2022NA} convergence of the finite element solution under a realistic regularity assumption that allows for creases and leads to a quadratic scaling of the discrete energy; see Theorem \ref{T:convergence} for details. \section*{Acknowledgements}\label{sec:acknowledgements} Lucas Bouck was supported by the NSF grant DGE-1840340. Ricardo H. Nochetto and Shuo Yang were partially supported by NSF grant DMS-1908267.
\section{Introduction}\label{SectionIntro} We are interested in continuous paths through the space $M_n$ of $n$-by-$n$ complex matrices and the variations in eigenvalues along these paths. To this end, a \emph{matrix path} will refer to a continuous function $\mathcal{C} : [0,1] \to M_n$, where we use $\mathcal{C}_\alpha$ to represent its value at $\alpha \in [0,1]$. Unless otherwise stated, we assume $A=\mathcal{C}_0$ and $B=\mathcal{C}_1$. As proven in Theorem 2.5.2 of \cite{PertTheoryKato}, for such a path $\mathcal{C}$ through $M_n$, there exists a continuous parameterization of the eigenvalues along this path. That is, there are $n$ continuous functions $\gamma_1, ..., \gamma_n : [0,1] \to \mathbb{C}$ such that $\Sigma(\mathcal{C}_\alpha) = \{\gamma_1(\alpha), ..., \gamma_n(\alpha)\}$ for all $\alpha \in [0,1]$, where we use $\Sigma(A)$ to denote the size-$n$ multiset spectrum of a matrix $A \in M_n$. It can be the case that the parameterization $\gamma_1, ..., \gamma_n$ is not unique (e.g.\ if two distinct paths $\gamma_i, \gamma_j$ intersect at some point but differ on either side of that point). This case is of particular interest, since small perturbations of the matrix path $\mathcal{C}$ often ``break apart" intersecting paths, thereby removing these points of intersection. We analyze perturbations of this type with the aim of showing that any parameterization of the perturbed spectrum is close to some parameterization $\gamma_1, ..., \gamma_n$ of the initial spectrum $\Sigma(\mathcal{C}_\alpha)$, and further that there is no ``canonical" parameterization of $\Sigma(\mathcal{C}_\alpha)$. Of special interest is the convex case, in which the matrix path in consideration is given by $(1-\alpha)A + \alpha B$ for $A, B \in M_n$. This matrix path has many notable applications to quantum physics (see e.g.\ \cite{Physics1}, \cite{Physics2}), motivating some of our discussion of this subject. We begin with the following definitions that guide our analysis. \begin{Def} Given a matrix path $\mathcal{C}$, choose $n$ continuous functions $\gamma_1, ..., \gamma_n : [0, 1] \to \mathbb{C}$, possibly not all distinct, such that the multiset equality \begin{align} \Sigma(\mathcal{C}_\alpha) = \{\gamma_1(\alpha), ..., \gamma_n(\alpha)\} \label{EigenPSDef} \end{align} holds for all $\alpha \in [0,1]$. The multiset $\{\gamma_1, ..., \gamma_n\}$ of paths is called a \emph{$\mathcal{C}$-eigenpath set}, and each element is a \emph{$\mathcal{C}$-eigenpath}. \end{Def} \begin{Def} Given a $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$, we may define a bijection $p : \Sigma(A) \to \Sigma(B)$ by $\gamma_j(0) \mapsto \gamma_j(1)$ for $j=1,...,n$. We call a bijection induced by these paths a \emph{$\mathcal{C}$-eigenpairing} of the eigenvalues of $A$ and $B$. If there is exactly one $\mathcal{C}$-eigenpairing, we say that it is \emph{unambiguous}. \end{Def} \begin{Rmk} Notice that if $A$ (or $B$) has a repeated eigenvalue $\lambda$, then there cannot be an unambiguous eigenpairing due to the distinction we make between the first and second occurrences of $\lambda$ in the multiset $\Sigma(A)$. \end{Rmk} \begin{Def} The \emph{$\mathcal{C}$-eigenregion}, denoted by $E_\mathcal{C}$, is the set of all eigenvalues realized by the matrices $\mathcal{C}_\alpha$, each adorned with the parameter $\alpha \in [0,1]$ of the corresponding matrix. That is, we may write \begin{align} E_\mathcal{C} = \bigcup_{\alpha \in [0, 1]} \{(\lambda, \alpha) \mid \lambda \in \sigma(\mathcal{C}_\alpha)\} \end{align} so $E_\mathcal{C} \subseteq \mathbb{C} \times [0, 1]$ with the relative topology inherited from the standard product topology. \end{Def} \begin{Def} We say that the point $(\lambda, \alpha) \in E_\mathcal{C}$ is an \emph{ambiguity} if $\lambda$ is a repeated eigenvalue of $C_{\alpha}$. If $\mult(\lambda, \alpha)$ denotes the multiplicity of $\lambda$ in $\Sigma(\mathcal{C}_\alpha)$, we say that an ambiguity $(\lambda_0, \alpha_0) \in E_\mathcal{C}$ is \emph{singular} if for all open neighborhoods $\mathcal{O} \subseteq E_\mathcal{C}$ of $(\lambda_0, \alpha_0)$, there is a $(\lambda, \alpha) \in \mathcal{O}$ such that $\mult(\lambda, \alpha) < \mult(\lambda_0, \alpha_0)$. Otherwise we say it is \emph{nonsingular}. \end{Def} \begin{Def} We write $C_\alpha = (1-\alpha)A + \alpha B$ to denote the convex path from $A$ to $B$. Further, we will often use the prefix \emph{convex} (e.g.\ convex eigenpath set, convex eigenregion, etc.) when referring to objects induced by this matrix path. \end{Def} The overall structure of this paper will be as follows: In sections \ref{SectionBasicFacts} and \ref{SectionInvariants}, we present our basic results on eigenpaths, eigenpairings, and ambiguities. Many of these results will motivate definitions and aid us with later proofs. Section \ref{SectionAnalytic} contains a brief analysis of some crucial ideas from analytic perturbation theory that will later be applied to prove a theorem on non-analytic matrix paths (Theorem \ref{RippingThm}). The next four sections will be dedicated to proving the four theorems below. Theorems \ref{ClosePathsThm} and \ref{RippingThm} characterize achievable eigenpath sets for matrix paths that are norm-close to a given matrix path $\mathcal{C}$. In particular, we see that eigenpaths are rather well-behaved under small perturbations of $\mathcal{C}$. These first two results are especially practical when dealing with matrix paths that exhibit undesirable behavior at infinitely many points or intervals, as evidenced by the application of Theorem \ref{ClosePathsThm} to our proof of Theorem \ref{ConvexReductionThm}. In these theorems, as well as in the rest of this paper, we use the generalized matrix norm $\|A\| = \max_{i,j} |a_{i,j}|$. Recall that this norm is equivalent to all other (generalized) matrix norms; our choice is purely for convenience. \begin{restatable}{Thm}{ClosePathsThm}\label{ClosePathsThm} Let $\varepsilon > 0$ and let $\mathcal{C}$ be a matrix path. Then there is a $\delta > 0$ such that for any matrix path $\mathcal{C}'$ with $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$ and any $\mathcal{C}'$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$, there is a $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$ satisfying $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$. \end{restatable} \begin{restatable}{Thm}{RippingThm}\label{RippingThm} Let $\varepsilon > 0$ and let $\mathcal{C}$ be a matrix path with $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$. Then there is a matrix path $\mathcal{C}'$ admitting a unique $\mathcal{C}'$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$ such that $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \varepsilon$ and $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$ and $j=1,...,n$. \end{restatable} Theorem $\ref{ConvexReductionThm}$ gives a condition under which we can expect eigenpairings of a particular type of matrix path to coincide with convex eigenpairings. Here we write $f \lor g$ to denote the least upper bound (i.e.\ pointwise maximum) of the functions $f,g : [0,1] \to \mathbb{R}$. This reduction is particularly useful in view of Theorem \ref{2x2Theorem}, which completely determines the convex eigenpairings in the $2$-by-$2$ case. \begin{restatable}{Thm}{ConvexReductionThm}\label{ConvexReductionThm} Let $f$ and $g$ be continuous functions $[0,1] \to \mathbb{R}$ satisfying $f(0) = g(1) = 1$ and $f(1) = g(0) = 0$ so that $\mathcal{C}_\alpha = f(\alpha)A+g(\alpha)B$ is a matrix path from $A$ to $B$. If $(f \lor g)(\alpha) \geq 0$ for all $\alpha \in [0,1]$, then any convex eigenpairing $p$ is also a $\mathcal{C}$-eigenpairing. \end{restatable} \begin{restatable}{Thm}{2x2Theorem}\label{2x2Theorem} Suppose that $A \in M_2$ has distinct eigenvalues $\lambda_1, \lambda_2$, and further that $B \in M_2$ has distinct eigenvalues $\mu_1,\mu_2$. Then the convex eigenpairings of $A$ and $B$ are determined entirely by the proximity of their eigenvectors and the quantity $\frac{\mu_1-\mu_2}{\lambda_1-\lambda_2}$. \end{restatable} In the final section, we give analogs of Theorems 1-3 for paths of polynomials and their corresponding paths of roots. \section{Some Basic Facts}\label{SectionBasicFacts} First we give some motivation to the definition of an ambiguity. \begin{Prop}\label{AmbiguityProp} The following are equivalent: \begin{enumerate} \item There is an unambiguous $\mathcal{C}$-eigenpairing. \item $\mathcal{C}_\alpha$ has $n$ distinct eigenvalues for all $\alpha \in [0, 1]$. \item $E_\mathcal{C}$ contains no ambiguities. \item $E_\mathcal{C}$ consists of $n$ connected components. \end{enumerate} \end{Prop} \begin{proof} We will first show that (a)$\implies$(b). Suppose that (b) does not hold, so some $\mathcal{C}_\alpha$ has fewer than $n$ distinct eigenvalues. Notice that if $\alpha = 0$, then we may trivially find multiple pairings by switching which ``copy" of the repeated eigenvalue $\lambda \in \Sigma(A)$ we map to which value in $\Sigma(B)$. The same is true if $\alpha = 1$. We may therefore assume that both $A$ and $B$ have $n$ distinct eigenvalues. Then we may find two associated paths, say $\gamma_1$ and $\gamma_2$, such that $\gamma_1(\alpha) = \gamma_2(\alpha)$. We may replace these paths with $\gamma_1'$ and $\gamma_2'$ such that $\gamma_1'(t) = \gamma_1(t)$ for $t \leq \alpha$ and $\gamma_1'(t) = \gamma_2(t)$ for $t \geq \alpha$, and the opposite for $\gamma_2'$. This new collection of paths induces a new pairing mapping $\gamma_1(0) \mapsto \gamma_2(1)$ and $\gamma_2(0) \mapsto \gamma_1(1)$. Therefore there are multiple pairings in this case, so indeed (a)$\implies$(b). By definition of ambiguities, we also have the implication (b)$\implies$(c). Now suppose that (d) holds, so the $j$th connected component may be described by a continuous path $\gamma_j$. Then the collection $\gamma_1, ..., \gamma_n$ of paths induces a single pairing $p$. Since this is the only choice of paths, we conclude that (d)$\implies$(a). We are now reduced to showing that (c)$\implies$(d). Suppose that (d) does not hold, so there are some paths, say $\gamma_1$ and $\gamma_2$, that intersect at the same $\alpha$. Then $\mathcal{C}_\alpha$ has a repeated eigenvalue of $\gamma_1(\alpha) = \gamma_2(\alpha)$, so we are finished. \end{proof} We will now demonstrate that the singular ambiguities of $E_\mathcal{C}$ are compact, a fact that will be useful in Lemma \ref{FiniteCoverLem} and that proves a property (Corollary \ref{NSACor}) about points in $E_\mathcal{C}$ that are not singular ambiguities. We begin with compactness of $E_\mathcal{C}$ itself: \begin{Lemma}\label{CompactERLem} The eigenregion $E_\mathcal{C}$ is a compact subset of $\mathbb{C} \times [0,1]$. \end{Lemma} \begin{proof} Let $\{\gamma_1, ..., \gamma_n\}$, so $E_\mathcal{C}$ is the union of the graphs of the $\gamma_j$. Since the $\gamma_j$ are continuous functions into the Hausdorff space $\mathbb{C}$, it follows that each graph is closed. Finally, since the domains of the $\gamma_j$ are compact, we find that each graph is bounded. Therefore $E_\mathcal{C}$ is compact, as desired. \end{proof} \begin{Lemma}\label{CompactSALem} The singular ambiguities of $E_\mathcal{C}$ form a compact subset of $E_\mathcal{C}$. \end{Lemma} \begin{proof} Let $Z$ be the set of singular ambiguities in $E_\mathcal{C}$. By Lemma \ref{CompactERLem}, it suffices to show that $Z$ is closed. Suppose we have a sequence $\{(\lambda_k, \alpha_k)\}$ of elements of $Z$ that converges to some point $(\lambda, \alpha) \in \mathbb{C} \times [0,1]$. Let $m$ be the maximum integer such that $m=\mult(\lambda_k, \alpha_k)$ for infinitely many $k$. Then there must be a subset $\{\gamma_1, ..., \gamma_m\}$ of a $\mathcal{C}$-eigenpath set that all intersect at infinitely many of these points. In particular, we may find a subsequence (which we also label $\{(\lambda_k, \alpha_k)\}$) satisfying $\gamma_j(\alpha_k) = \lambda_k$ for $k \in \mathbb{N}$ and $j=1,...,m$. Then by continuity of the $\gamma_j$, we also obtain $\gamma_j(\alpha) = \lambda$. Now consider an open neighborhood $\mathcal{O}$ of $(\lambda, \alpha)$. By our assumption on $m$, we know there is a $(\lambda_k, \alpha_k) \in \mathcal{O}$ such that $\mult(\lambda_k, \alpha_k) = m$. Since $\mathcal{O}$ is an open neighborhood of the singular ambiguity $(\lambda_k, \alpha_k)$, there must be some other point in $\mathcal{O}$ with multiplicity less than $m$. Therefore $(\lambda, \alpha)$ is a singular ambiguity, so we are finished. \end{proof} \begin{Cor}\label{NSACor} Suppose that $(\lambda_0, \alpha_0) \in E_\mathcal{C}$ is not a singular ambiguity. Then there is an open neighborhood $\mathcal{O} \subseteq E_\mathcal{C}$ of $(\lambda_0, \alpha_0)$ that contains no singular ambiguities. \end{Cor} \begin{proof} If not, then there would be a sequence of singular ambiguities converging to $(\lambda_0, \alpha_0)$, in which case it too would be a singular ambiguity. \end{proof} The following proposition provides useful information about how we may construct a $\mathcal{C}$-eigenpath set. In particular, we may simply choose one eigenpath at a time until property \eqref{EigenPSDef} is satisfied. Additionally, it confirms that any continuous function $\gamma : [0,1] \to \mathbb{C}$ such that $\gamma(\alpha) \in \Sigma(\mathcal{C}_\alpha)$ for all $\alpha \in [0,1]$ is indeed a $\mathcal{C}$-eigenpath. \begin{Prop}\label{PathExtProp} For $k \leq n$, suppose there are $k$ continuous functions $\gamma_1, ..., \gamma_k : [0,1] \to \mathbb{C}$ such that \begin{align} \Sigma(\mathcal{C}_\alpha) \supseteq \{\gamma_1(\alpha), ..., \gamma_k(\alpha)\} \label{PEigenPSDef} \end{align} as a multiset for all $\alpha \in [0,1]$. Then there are continuous functions $\gamma_{k+1}, ..., \gamma_n : [0,1] \to \mathbb{C}$ such that $\{\gamma_1, ..., \gamma_n\}$ is a $\mathcal{C}$-eigenpath set. \end{Prop} \begin{proof} By induction, it suffices to show for $k<n$ that there is a path $\gamma_{k+1}$ that preserves property \eqref{PEigenPSDef} when it is added to the union. Suppose towards a contradiction that such a choice of $\gamma_{k+1}$ were not possible, so any such choice of a function $\gamma_{k+1}$ must be discontinuous. Since there are only finitely many paths in the set $\{\gamma_1, ..., \gamma_k\}$, we know that $\gamma_{k+1}$ may be chosen so that it is discontinuous at finitely many points. Let $\alpha_0 > 0$ be the least point at which $\gamma_{k+1}$ must be discontinuous, and suppose that $m$ of the paths $\gamma_j$ for $j=1, ..., k$ satisfy $\gamma_j(\alpha_0) = \lim_{\alpha \uparrow \alpha_0} \gamma_{k+1}(\alpha)$. Then any choice $\gamma_1',...\gamma_n'$ of $\mathcal{C}$-eigenpaths must have $m+1$ that approach $\lim_{\alpha \uparrow \alpha_0} \gamma_{k+1}(\alpha)$ from the left at $\alpha_0$ and only $m$ that approach it from the right at $\alpha_0$. Therefore there can be no $\mathcal{C}$-eigenpath set, a contradiction. \end{proof} By using the initial set $\{\gamma_1, ..., \gamma_k\}$ to determine a partial function $p : \Sigma(A) \to \Sigma(B)$ given by $p(\gamma_j(0)) = \gamma_j(1)$ for $j=1,...,k$, we can then use the extension from the previous lemma to extend $p$ to an $\mathcal{C}$-eigenpairing: \begin{Cor}\label{PairingExtCor} Suppose that $p$ is a partial bijection $\Sigma(A) \to \Sigma(B)$ induced by the continuous functions $\gamma_1, ..., \gamma_k$ satisfying \eqref{PEigenPSDef}. Then there is a $\mathcal{C}$-eigenpairing that extends $p$. \end{Cor} \section{Invariants}\label{SectionInvariants} There are several key invariants in the problem of finding the $\mathcal{C}$-eigenregion and $\mathcal{C}$-eigenpairings of $A$ and $B$. To simplify the proofs of our main results, we will first analyze these invariants. The first few results in this section allow us to modify the matrix path $\mathcal{C}_\alpha$ in a consistent way and expect similar eigenpairings to occur. \begin{Lemma}[Uniform Similarity] Let $S \in M_n$ be nonsingular, and let $\mathcal{C}^S$ be the matrix path given by $\alpha \mapsto S \mathcal{C}_\alpha S^{-1}$. Then $E_{\mathcal{C}^S} = E_\mathcal{C}$. \end{Lemma} \begin{proof} Similar matrices share the same spectrum, so the spectra at each $\alpha$ coincide. \end{proof} Since the eigenregions in the above proposition are identical, the $\mathcal{C}$-eigenpairings coincide with the $\mathcal{C}^S$-eigenpairings. In the following lemma, we will see that the same is essentially true, with the caveat that each point must be scaled and shifted by some $a,b \in \mathbb{C}$. \begin{Lemma}[Uniform Scaling and Shifting]\label{ScaleShiftInvLem} Let $a,b \in \mathbb{C}$, and let $a\mathcal{C}+bI$ be the matrix path given by $\alpha \mapsto a\mathcal{C}_\alpha + bI$. Then $$E_{a\mathcal{C}+bI} = \big\{ (a\lambda+b, \alpha) \mid (\lambda, \alpha) \in E_\mathcal{C} \big\}$$ \end{Lemma} \begin{proof} Each eigenvalue of $a\mathcal{C}_\alpha+bI$ is $a\lambda+b$ for some $\lambda \in \Sigma(\mathcal{C}_\alpha)$. \end{proof} In the convex case with matrix path $C_\alpha = (1-\alpha)A + \alpha B$, this lemma admits a slight generalization: \begin{Lemma}[Convex Scaling and Shifting]\label{PosScalLem} Let $c > 0$ and $d \in \mathbb{C}$, and denote by $C'$ the convex matrix path from $A$ to $cB+dI$. Then $$E_{C'} = \Big\{ \big((1-\alpha + \alpha c)\lambda + \beta(\alpha) d, \alpha \big) \mid (\lambda, \beta(\alpha)) \in E_C \Big\}$$ where $\beta : [0, 1] \to [0, 1]$ is the strictly increasing smooth bijection $\alpha \mapsto \frac{\alpha c}{1-\alpha + \alpha c}$. \end{Lemma} \begin{proof} Note that \begin{align*} \sigma\big((1-\alpha)A + \alpha cB\big) &= (1-\alpha + \alpha c) \sigma \left( \frac{1-\alpha}{1-\alpha + \alpha c}A + \frac{\alpha c}{1-\alpha + \alpha c} B \right) \\ &= (1-\alpha + \alpha c) \sigma( C_{\beta(\alpha)}) \end{align*} and \begin{align*} \sigma\big((1-\alpha)A + \alpha(B+dI)\big) = \sigma(C_\alpha + \alpha d I), \end{align*} so composing these two operations yields the result. \end{proof} \begin{Rmk} In particular, if $p$ is a convex eigenpairing of $A$ and $B$, then the map $\lambda \mapsto c p(\lambda) + d$ is a convex eigenpairing of $A$ and $cB+dI$. We remark that multiplying one matrix by a negative or non-real scalar without also scaling the other does not preserve pairings in a predictable way. For a concrete realization of this phenomenon, see section \ref{Section2x2} and note that scaling just one matrix by an element of $\mathbb{C} \backslash \mathbb{R}^+$ will change the crucial quantity $\arg(\frac{\mu}{\lambda})$. \end{Rmk} Moreover, we may modify the scope of our path by inverting it, truncating it, or extending it as follows. In remainder of this section, we will assume that $p$ is a $\mathcal{C}$-eigenpairing. \begin{Lemma}[Inversion]\label{InvertibilityLem} Denote by $\mathcal{C}^R$ the path $\mathcal{C}$ with reversed orientation, so $\mathcal{C}^R$ is a matrix path from $B$ to $A$. Then the inverse map $p^{-1}$ is a $\mathcal{C}^R$-eigenpairing of $B$ and $A$. \end{Lemma} \begin{proof} By reversing the orientations of the eigenpaths $\gamma_j$ that induce the eigenpairing $p : \Sigma(A) \to \Sigma(B)$, we obtain paths that induce the eigenpairing $p^{-1} : \Sigma(B) \to \Sigma(A)$. \end{proof} \begin{Lemma}[Truncation] Let $0\leq\alpha<\beta\leq1$, and suppose that $\{\gamma_1, ..., \gamma_n\}$ is a $\mathcal{C}$-eigenpath set. Denote by $\gamma_j'$ the restriction of the path $\gamma_j$ to $[\alpha, \beta]$, so each $\gamma_j'$ is a continuous function $[\alpha, \beta] \to \mathbb{C}$. If $\mathcal{C}'$ is the restriction of $\mathcal{C}$ to $[\alpha, \beta]$, then $\{\gamma_1', ..., \gamma_n'\}$ is a $\mathcal{C}'$-eigenpath set. \end{Lemma} \begin{proof} The paths $\gamma_j'$ satisfy the same property \eqref{EigenPSDef} that characterizes eigenpath sets. \end{proof} Since truncation of matrix paths truncates eigenpaths correspondingly, we may abuse notation and say that $\{\gamma_1', ..., \gamma_n'\}$ is a $\mathcal{C}$-eigenpath set from $\mathcal{C}_\alpha$ to $\mathcal{C}_\beta$ when we actually mean that it is an eigenpath set for the truncation of $\mathcal{C}$ to $[\alpha, \beta]$. Similarly, we may refer to a $\mathcal{C}$-eigenpairing and the $\mathcal{C}$-eigenregion of $\mathcal{C}_\alpha$ and $\mathcal{C}_\beta$. \begin{Lemma}[Concatenation]\label{Concatenation} Suppose that $p$ is a $\mathcal{C}$-eigenpairing for $A$ and $A'$, and further that $p'$ is a $\mathcal{C}'$-eigenpairing for $A'$ and $A''$. Define $\mathcal{C}''$ as the concatenation of the paths $\mathcal{C}$ and $\mathcal{C}'$. Then the composition $p' \circ p$ is a $\mathcal{C}''$-eigenpairing for $A$ and $A''$. \end{Lemma} \begin{proof} Let $\{\gamma_1, ..., \gamma_n\}$ be a $\mathcal{C}$-eigenpath set corresponding to $p$ and $\{\gamma_1', ..., \gamma_n'\}$ a $\mathcal{C}'$-eigenpath set corresponding to $p'$. Re-index these paths so that $\gamma_j(1) = \gamma_j'(0)$. Define $\gamma_j''$ as the concatenation of the paths $\gamma_j$ and $\gamma_j'$. Then $\{\gamma_1'', ..., \gamma_n''\}$ is a $\mathcal{C}''$-eigenpath set that induces the pairing $p' \circ p$, finishing our proof. \end{proof} \begin{Cor}\label{AllBijectionsCor} If $\mathcal{C}_{\alpha_0} = cI$ for some $\alpha_0 \in [0,1]$ and $c \in \mathbb{C}$, then every bijection $\Sigma(A) \to \Sigma(B)$ is a $\mathcal{C}$-eigenpairing. \end{Cor} \begin{proof} Apply the previous proposition, using $A' = cI$ and $A''=B$. \end{proof} \begin{Lemma}[Combination]\label{Combination} For $j=1,...,m$ let $\mathcal{C}^{(j)} : [0,1] \to M_{n_j}$ be continuous, and suppose that $\mathcal{C}_\alpha$ is block upper (or lower) triangular with blocks $\mathcal{C}^{(1)}_\alpha, ..., \mathcal{C}^{(m)}_\alpha$. Then $E_\mathcal{C} = \bigcup_{j=1}^m E_{\mathcal{C}^{(j)}}$, and so any collection $\{p_j\}_{j=1}^m$ such that $p_j$ is a $\mathcal{C}^{(j)}$-eigenpairing induces a $\mathcal{C}$-eigenpairing $p$ given by $\lambda \mapsto p_j(\lambda)$ when $\lambda \in \Sigma(\mathcal{C}^{(j)})$. \end{Lemma} \begin{proof} The characteristic polynomial of $\mathcal{C}_\alpha$ is the product of those of the $\mathcal{C}^{(j)}_\alpha$, so the $\mathcal{C}$-eigenregion is the union of the $\mathcal{C}^{(j)}$-eigenregions. It follows that if $\{\gamma_{j,1}, ..., \gamma_{j, n_j}\}$ is a $\mathcal{C}^{(j)}$-eigenpath set that induces the eigenpairing $p_j$, then the set $\{\gamma_{j, i} \mid 1 \leq j \leq m, 1 \leq i \leq n_j\}$ is a $\mathcal{C}$-eigenpath set for $A$ and $B$. Furthermore, this eigenpath set induces the $\mathcal{C}$-eigenpairing $p$. \end{proof} \begin{Rmk} The converse of the above lemma does not hold in the sense that not all $\mathcal{C}$-eigenpairings directly result from $\mathcal{C}^{(j)}$-eigenpairings. In particular, this event will occur if some $E_{\mathcal{C}^{(i)}}$ and $E_{\mathcal{C}^{(j)}}$ have nonempty intersection for $i \neq j$. \end{Rmk} \section{Analytic Matrix Paths}\label{SectionAnalytic} In this section we enforce the condition that the entries of $\mathcal{C}_\alpha$ be analytic in $\alpha$. This case has been treated rather thoroughly in \cite{PertTheoryKato} (wherein singular ambiguities are called ``exceptional points") and \cite{PertTheoryBaum}, so we will simply present some main results through the lens of eigenpairings. Principally, we aim to show that $\mathcal{C}$-eigenpaths are analytic except at finitely many singular ambiguities, and that a $\mathcal{C}$-eigenpath set may be chosen so that any two eigenpaths either coincide entirely or intersect at just finitely many points. Though interesting in their own right, these results mainly serve to aid with our later proof of Theorem \ref{RippingThm}. We will first cite some intermediate lemmas, noting that the characteristic polynomial of $\mathcal{C}_\alpha$ is analytic on $[0,1]$ and therefore holomorphic on a domain in $\mathbb{C}$ containing $[0,1]$. \begin{Lemma}\label{AnalyticityInts} Denote by $\mathcal{H}$ the space $\mathbb{C}$-valued functions of $\alpha$ that are holomorphic on a domain containing the real interval $[0,1]$. \begin{enumerate} \item Let $\chi(\alpha,t) \in \mathcal{H}[t]$ be a monic polynomial in the variable $t$ whose coefficients are holomorphic functions of $\alpha$. Then there exists a unique decomposition \begin{align*} \chi = \prod_{j=1}^r q_j^{m_j} \end{align*} of $\chi$ into monic irreducible factors $q_1, ..., q_r \in \mathcal{H}[t]$. (\cite{PertTheoryBaum}, Corollary 3.2.1.1) \item Let $q \in \mathcal{H}[t]$ be monic and irreducible. Then the points $\alpha$ at which $q$ has a multiple root are isolated. (\cite{PertTheoryBaum}, Corollary 3.2.2.2) \item Let $q_1, q_2 \in \mathcal{H}[t]$ be relatively prime. Then the points $\alpha$ at which $q_1$ and $q_2$ have a common root are isolated. (\cite{PertTheoryBaum}, Theorem A3.1.1) \item The simple roots of a polynomial are smooth functions of its coefficients. (\cite{SimpleSmooth}) \end{enumerate} \end{Lemma} \begin{Prop}\label{AnalyticityThm} Every $\mathcal{C}$-eigenpath set is piecewise-smooth, and the only points at which an eigenpath might not be smooth are the singular ambiguities in $E$. \end{Prop} \begin{proof} Using Lemma \ref{AnalyticityInts}(a), decompose the characteristic polynomial of $\mathcal{C}_\alpha$ as $\chi = \prod_{j=1}^r q_j^{m_j}$. Suppose that $(\lambda_0, \alpha_0) \in E_\mathcal{C}$ is not a singular ambiguity. Then by Corollary \ref{NSACor}, there is an open neighborhood $\mathcal{O} \subseteq E$ of $(\lambda_0, \alpha_0)$ on which points have constant multiplicity $m = \mult(\lambda_0, \alpha_0)$. Suppose without loss of generality that $U$ is connected, so $U = \{(\gamma(\alpha), \alpha) \mid \alpha_1 < \alpha < \alpha_2\}$ for some $\alpha_1 < \alpha_0 < \alpha_2$ and continuous function $\gamma : (\alpha_1, \alpha_2) \to \mathbb{C}$. Since $(\lambda_0, \alpha_0)$ was arbitrary, it suffices to show that $\gamma$ is smooth at $\alpha_0$. We know by Lemma \ref{AnalyticityInts}(b) that there is some $j$ such that $q_j(\alpha, \gamma(\alpha)) = 0$ for $\alpha_1 < \alpha < \alpha_2$, and that $q_j$ has no multiple roots in this region. Then by (c) we know that $\gamma$ is smooth in the coefficients of $q_j$. Since these coefficients are smooth in $\alpha$ by (d), it follows that $\gamma$ is in fact smooth at $\alpha_0$, as desired. \end{proof} \begin{Lemma}\label{PathMultiplicityLem} There is a $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$ such that for any $i \neq j$, either $\gamma_i = \gamma_j$ on $[0,1]$ or $\gamma_i$ and $\gamma_j$ agree at finitely many points. \end{Lemma} \begin{proof} Again decompose the characteristic polynomial $\chi(\alpha,t)$ of $\mathcal{C}_\alpha$ as $\chi = \prod_{j=1}^r q_j^{m_j}$. Notice that the root set of $\chi$ is the union of the root sets of these irreducible factors. In particular, the eigenregion is $\{(\lambda, \alpha) \mid \alpha \in [0,1], \; \chi_0(\alpha, \lambda) = 0\}$ for $\chi_0 = \prod_{j=1}^r q_j$. By parts (b) and (c) of Lemma \ref{AnalyticityInts}, the points $\alpha$ at which $\chi_0$ has a multiple root are isolated. Since $\alpha \in [0,1]$, there are in fact finitely many such points. We may therefore find a set $\{\gamma_1, ..., \gamma_s\}$ of paths such that each $q_j$ has a root set $\{\gamma_{j_1}(\alpha), ..., \gamma_{j_{n_j}}(\alpha) \mid \alpha \in [0,1]\}$, the $\gamma_i$ intersect at only finitely many points, and the sets $\{\gamma_{j_1}, ..., \gamma_{j_{n_j}}\}$ partition $\{\gamma_1, ..., \gamma_s\}$. Then the multiset of paths wherein each $\gamma_{j_i}$ occurs $m_j$ times is a $\mathcal{C}$-eigenpath set, so we are finished. \end{proof} \begin{Cor}\label{SingularAmbiguityBound} There are finitely many singular ambiguities in $E_\mathcal{C}$. \end{Cor} \begin{proof} The singular ambiguities occur precisely at the (finitely many) points of intersection as in Lemma \ref{PathMultiplicityLem}. \end{proof} \section{Proof of Theorem 1} Recall Theorem \ref{ClosePathsThm}, which states that sufficiently small perturbations of a matrix path $\mathcal{C}$ induce small perturbations of eigenpaths, regardless of the ambiguities in $E_\mathcal{C}$. Our strategy for proving this result will be as follows: First, we construct a sufficiently well-behaved finite open cover of the singular ambiguities of $E_\mathcal{C}$. We then find $\delta>0$ based on certain numerical properties of this cover. Finally, the conditions for a ``well-behaved" open cover will allow us to construct the desired $\mathcal{C}$-eigenpath set. The following definitions and technical lemmas serve to break up this proof into smaller components, some of which will also be used in our proof of Theorem \ref{RippingThm}. \begin{Def} The \emph{diameter} of $X \subseteq E_\mathcal{C}$ is $\sup \{ |\lambda_1 - \lambda_2| \mid (\lambda_1, \alpha), (\lambda_2, \alpha) \in X \}$. \end{Def} \begin{Def} We say that a $\mathcal{C}$-eigenpath $\gamma$ \emph{passes through} a subset $X \subseteq E_\mathcal{C}$ if there is an $\alpha \in [0,1]$ such that $(\gamma(\alpha), \alpha) \in X$. \end{Def} \begin{Lemma}\label{SeparationLem} Let $(\lambda_0, \alpha_0) \in E_\mathcal{C}$ be a singular ambiguity and $\varepsilon > 0$. Then there is a connected open neighborhood $\mathcal{O} \subseteq E_\mathcal{C}$ of $(\lambda_0, \alpha_0)$ with closure $\overline{\mathcal{O} }$ such that \begin{enumerate} \item The diameter of $\mathcal{O} $ is less than $\varepsilon$. \item For any $\mathcal{C}$-eigenpath $\gamma$ that passes through $\overline{\mathcal{O} }$, we have $\gamma(\alpha_0) = \lambda_0$. \item The boundary $\partial \mathcal{O} $ of $\mathcal{O} $ contains finitely many points, none of which are singular ambiguities. \end{enumerate} \end{Lemma} \begin{proof} Fix some $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$, and find the minimum distance $d>0$ from $\lambda_0$ to $\gamma_j(\alpha_0)$ for $\gamma_j$ such that $\gamma_j(\alpha_0) \neq \lambda_0$. By continuity of the $\gamma_j$, we know there is an open interval $U' \subseteq [0,1]$ containing $\alpha$ such that $|\gamma_j(\alpha) - \gamma_j(\alpha_0)| < \frac{d}{2}, \frac{\varepsilon}{2}$ for all $\alpha \in U'$ and $j=1,...,n$. Now let $\mathcal{O} ' = \{(\gamma_j(\alpha), \alpha) \mid \alpha \in U', \; \gamma_j(\alpha_0) = \lambda_0\}$. None of the paths that hit $\lambda_0$ at $\alpha_0$ will intersect any other path at any point in $U'$, and every eigenvalue $\lambda$ such that some $(\lambda, \alpha)$ lies in $\mathcal{O} '$ is less than $\frac{\varepsilon}{2}$ away from $\lambda_0$. Therefore the open set $\mathcal{O} '$ satisfies properties (a) and (b). Now for each boundary point $(\lambda, \alpha) \in \partial \mathcal{O} '$ that is a singular ambiguity, find a connected open neighborhood $V_{\lambda, \alpha}$ of $(\lambda, \alpha)$ whose closure does not contain $(\lambda_0, \alpha_0)$. By definition of singular ambiguities, we may arrange for the boundary of $V_{\lambda, \alpha}$ to contain no singular ambiguities. Define $\mathcal{O} = \mathcal{O} ' \backslash \overline{V}$ where $\overline{V}$ is the closure of the union of the $V_{\lambda, \alpha}$. Now $\mathcal{O} $ satisfies property (c) and inherits the remaining properties from $\mathcal{O} '$. \end{proof} \begin{Def} If $\mathcal{O} $ is the set obtained from the previous lemma, we say that the \emph{center} of $\mathcal{O} $ is $(\lambda_0, \alpha_0)$. \end{Def} \begin{Lemma}\label{FiniteCoverLem} Let $\varepsilon > 0$. Then there is an open cover $\mathcal{O} _1, ..., \mathcal{O} _r$ of the singular ambiguities of $E_\mathcal{C}$ such that each $\mathcal{O} _k$ is connected and satisfies the following: \begin{enumerate} \item The diameter of $\mathcal{O} _k$ is less than $\varepsilon$. \item There is a singular ambiguity $(\lambda_k, \alpha_k) \in \mathcal{O} _k$ such that any $\mathcal{C}$-eigenpath $\gamma$ passing through $\overline{\mathcal{O} _k}$ satisfies $\gamma(\alpha_k) = \lambda_k$. \item The boundary $\partial \mathcal{O} _k$ of $\mathcal{O} _k$ contains finitely many points, none of which are singular ambiguities. \end{enumerate} \end{Lemma} \begin{proof} Let $(\lambda_0, \alpha_0) \in E_\mathcal{C}$ be a singular ambiguity, so by Lemma \ref{SeparationLem} we may find a connected open neighborhood $\mathcal{O} _{\lambda_0, \alpha_0}$ of $(\lambda_0, \alpha_0)$ satisfying properties (a) through (c). Repeating this process for each singular ambiguity, the resulting open sets cover the set of all singular ambiguities. Then by Lemma \ref{CompactSALem}, there is a finite subcover $\mathcal{O} _1,...,\mathcal{O} _r$. \end{proof} \begin{Lemma}\label{EigenvalueDeltaLem} Let $\varepsilon>0$ and let $\mathcal{C}$ be a matrix path. Then there is a $\delta > 0$ such that for any matrix path $\mathcal{C}'$ with $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\|<\delta$ for all $\alpha \in [0,1]$, there are orderings $\lambda_{\alpha,1},...,\lambda_{\alpha,n}$ and $\lambda_{\alpha,1}',...,\lambda_{\alpha,n}'$ of the eigenvalues of each $\mathcal{C}_\alpha$ and $\mathcal{C}_\alpha'$ such that $|\lambda_{\alpha,j}-\lambda_{\alpha,j}'|$ for $\alpha \in [0,1]$ and $j=1,...,n$. \end{Lemma} \begin{proof} Since the uniform norm $\|\cdot\|$ is equivalent to other generalized matrix norms, it suffices to prove this lemma for the Frobenius norm $\|\cdot\|_2$ given by $\|(a_{i,j})\|_2 = \sum_{i,j} |a_{i,j}|^{1/2}$. Let $m = \max\{\|\mathcal{C}_\alpha\|_2 \mid \alpha \in [0,1]\}$ and $\delta = \min \left\{ 2m, \frac{\varepsilon^n}{2^{4n-3}m^{n-1}} \right\}$. Let $\mathcal{C}'$ be a matrix path $[0,1] \to M_n$ such that $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\|_2 < \delta$ for all $\alpha \in [0,1]$. For $j=1,...,n$ denote by $\lambda_{\alpha, j}$ and $\lambda_{\alpha, j}'$ the eigenvalues of $\mathcal{C}_\alpha$ and $\mathcal{C}_\alpha'$, respectively. Then by the bound in \cite{Bounds}, we may reorder these eigenvalues so that \begin{align*} |\lambda_{\alpha, j} - \lambda_{\alpha, j}'| \leq 4 \times 2^{-1/n} \left(\|C_{\alpha}\|_2 + \|C_{\alpha}'\|_2 \} \right)^{1-1/n} \| C_{\alpha} - C_{\alpha}' \|_2^{1/n}, \end{align*} and so \begin{align*} |\lambda_{\alpha, j} - \lambda_{\alpha, j}'|^n &< \frac{4^n}{2} \left( 2m + \delta \right)^{n-1} \delta \\ &\leq 2^{2n-1} (4m)^{n-1} \delta \\ &\leq 2^{4n-3} m^{n-1} \times \frac{\varepsilon^n}{2^{4n-3} m^{n-1}} \\ &= \varepsilon^n, \end{align*} giving us the bound \begin{align*} |\lambda_{\alpha, j} - \lambda_{\alpha, j}'| < \varepsilon \end{align*} for all $\alpha \in [0,1]$ and $j=1,...,n$. \end{proof} We now have the machinery necessary to prove Theorem \ref{ClosePathsThm}. \begin{proof} Let $\mathcal{O} _1, ..., \mathcal{O} _r$ be the open cover of Lemma \ref{FiniteCoverLem} such that each $\mathcal{O} _k$ has diameter less than $\frac{\varepsilon}{2}$. Define $F = E_\mathcal{C} \backslash \left( \bigcup_{k=1}^r \mathcal{O} _k \right)$, so $F$ consists of closed connected components such that $\mult(\lambda, \alpha)$ is constant for all $(\lambda, \alpha)$ in the component. Since the $\mathcal{O} _k$ have finite boundaries that contain no singular ambiguities, we know that the boundary of $F$ shares this property. Hence $F$ consists of finitely many such connected components $F_1,...,F_s$. For each pair $i,j$ with $1 \leq i < j \leq s$, define $\varepsilon_{i,j} = \inf\{|\lambda_i-\lambda_j| \mid (\lambda_i, \alpha) \in F_i, \; (\lambda_j, \alpha) \in F_j\}$. Then $\varepsilon_{i,j} > 0$, so we set $\varepsilon_0 = \min_{i,j} \varepsilon_{i,j}$. Since each $\partial \mathcal{O} _k$ contains no singular ambiguities, there is some $\delta_k > 0$ such that $|\lambda - \lambda'| > \delta_k$ for all $\lambda, \lambda'$ such that $(\lambda, \alpha) \in \mathcal{O} _k$ and $(\lambda', \alpha) \in E_\mathcal{C} \backslash \mathcal{O} _k$. Let $\varepsilon_0' = \min\{\delta_1, ..., \delta_r\}$, and define $\varepsilon_* = \frac{1}{2} \min\{\varepsilon_0, \varepsilon_0', \varepsilon\}$. Now by Lemma \ref{EigenvalueDeltaLem} there is a $\delta > 0$ such that any matrix path $\mathcal{C}_\alpha'$ that is $\delta$-close to $\mathcal{C}_\alpha$ has eigenvalues that are $\varepsilon_*$-close to those of $\mathcal{C}_\alpha$. Let $\mathcal{C}'$ be such a path, and for $j=1,...,n$ denote by $\lambda_{\alpha, j}$ and $\lambda_{\alpha, j}'$ the eigenvalues of $\mathcal{C}_\alpha$ and $\mathcal{C}_\alpha'$, respectively. Then we have $|\lambda_{\alpha, j} - \lambda_{\alpha, j}'| < \varepsilon_*$ for all $j=1,...,n$ and $\alpha \in [0,1]$. Take $\gamma_j'(\alpha) = \lambda_{\alpha, j}'$ to be continuous, so $\{\gamma_1', ..., \gamma_n'\}$ is a $\mathcal{C}'$-eigenpath set. We will now find a ``matching" $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$ by defining each $\gamma_j$ piecewise. Define each $\gamma_j(0)$ such that $|\gamma_j(0) - \gamma_j'(0)| < \varepsilon_*$ for $j=1,...,n$. Since $\varepsilon_* \leq \frac{1}{2}\varepsilon_0, \frac{1}{2}\varepsilon_0'$, we may continue to define each path $\gamma_j$ in such a way that $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon_*$ until some $\gamma_j$ passes through some $\mathcal{O} _k$. Then, since the diameter of each $\mathcal{O} _k$ is less than $\frac{\varepsilon}{2}$ and since $\varepsilon_* \leq \frac{\varepsilon}{2}$, we have $|\gamma_i(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for any $\gamma_i, \gamma_j$ passing through $\mathcal{O} _k$. It follows that we may define every path $\gamma_j$ to satisfy $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \leq \alpha_k$ where $(\lambda_k, \alpha_k)$ is the first center that $\gamma_j$ must hit. Since all paths that pass through a certain $\mathcal{O} _k$ must hit its center by property (b) of Lemma \ref{FiniteCoverLem}, this $\alpha_k$ is well-defined for each $\gamma_j$. Now order $\alpha_1, ..., \alpha_r$ such that $\alpha_1 \leq ... \leq \alpha_r$. We will proceed by induction. Suppose that each $\gamma_j$ is defined up to one of the points $\alpha_1, ..., \alpha_r$, and all are defined up to at least $\alpha_{k-1}$. Further, suppose that if some $\gamma_j$ is defined up to some $\alpha_\ell$, then $\gamma_j$ hits the center $(\lambda_\ell, \alpha_\ell)$, and no other path that may hit this center is defined past $\alpha_\ell$. Let $\gamma_1, ..., \gamma_t$ be the paths that hit the center $(\lambda_{k-1}, \alpha_{k-1})$. Since $\varepsilon_* \leq \frac{\varepsilon_0}{2}, \frac{\varepsilon_0'}{2}$, we may use similar reasoning as in the above paragraph to define these paths from $\alpha_{k-1}$ to the next center they hit (or to 1) in such a way that $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha$ up to the next center hit by $\gamma_j$. Then all conditions in the inductive hypothesis still hold, but all paths are now defined up to at least $\alpha_k$. It follows that we may continue to define these paths up to $\alpha=1$, finishing our proof. \end{proof} \begin{Cor}\label{CommonPairingCor} There is a $\delta > 0$ such that for all continuous paths $\mathcal{C}'$ from $A$ to $B$ satisfying $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$, any $\mathcal{C}'$-eigenpairing $p : \Sigma(A) \to \Sigma(B)$ is also a $\mathcal{C}$-eigenpairing. \end{Cor} \begin{proof} If either $A$ or $B$ has just one distinct eigenvalue, then the claim is trivial. Otherwise let $\varepsilon_A$ be the minimum distance between distinct eigenvalues of $A$, and similarly define $\varepsilon_B$. Now define $\varepsilon = \min\{\varepsilon_A, \varepsilon_B\}$, and obtain the $\delta$ of Theorem \ref{ClosePathsThm}. Then for any continuous path $\mathcal{C}'$ from $A$ to $B$ satisfying $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$, we may find for any $\mathcal{C}'$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$ a $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$ such that $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$ and $j=1,...,n$. It follows that $\gamma_j(0) = \gamma_j'(0)$ and $\gamma_j(1) = \gamma_j'(1)$ for each $j$, so these path sets induce the same pairing. \end{proof} \section{Proof of Theorem 2} In the previous section, we saw that small perturbations of the matrix path $\mathcal{C}$ yield small perturbations of the corresponding eigenpaths. Dual to this notion is whether there exists an arbitrarily small perturbation of $\mathcal{C}$ that admits no ambiguities and whose unique eigenpath set approximates a given $\mathcal{C}$-eigenpath set. This section is dedicated to proving the validity of this statement, which indicates that there is no canonical choice of $\mathcal{C}$-eigenpath set without imposing supplementary conditions. To complete this proof, we will first approximate $\mathcal{C}$ by a polynomial matrix path $\mathcal{P}$ that coincides with $\mathcal{C}$ at certain important points (namely, the center singular ambiguities of the cover from Lemma \ref{FiniteCoverLem}). This approximation will be such that any $\mathcal{C}$-eigenpath set can be approximated by a $\mathcal{P}$-eigenpath set. Then it will suffice to prove the theorem in the case that $\mathcal{C}$ is a polynomial matrix path with no nonsingular ambiguities. For this case, we will provide a construction that allows us to ``rip apart" the singular ambiguities into non-intersecting eigenpaths. \begin{Lemma}\label{WeierstrassLem} Let $\varepsilon > 0$ and let $\mathcal{C}$ be a matrix path. Further, let $\alpha_1, ..., \alpha_r \in [0,1]$. Then there is a matrix path $\mathcal{P}$ such that \begin{enumerate} \item the entries of $\mathcal{P}_\alpha$ are complex polynomials in $\alpha$. \item for $k=1,...,r$, we have $\mathcal{P}_{\alpha_k} = \mathcal{C}_{\alpha_k}$. \item for $\alpha \in [0,1]$, we have $\|\mathcal{P}_\alpha - \mathcal{C}_\alpha\| < \varepsilon$. \item all ambiguities in $E_\mathcal{P}$ are singular. \end{enumerate} \end{Lemma} \begin{proof} Let $\alpha_0 \in [0,1] \backslash\{\alpha_1, ..., \alpha_r\}$. Since the set $M_n'$ of matrices with no repeated eigenvalues in dense in $M_n$, we may find $A \in M_n'$ such that $\|A-\mathcal{C}_{\alpha_0}\| < \frac{\varepsilon}{2}$. Now define the matrix path $\mathcal{C}'$ to coincide with $\mathcal{C}$ except on a small neighborhood of $\alpha_0$, where it deviates by less than $\frac{\varepsilon}{2}$ to hit $A$. We then use the Weierstrass approximation theorem to give a uniform $\frac{\varepsilon}{2}$-approximation of each entry of $\mathcal{C}_\alpha'$ while fixing the values at $\alpha_0, \alpha_1, ..., \alpha_r$. These approximations form a polynomial matrix path $\mathcal{P}$ satisfying (a), (b), and (c). Since $\mathcal{P}_{\alpha_0}$ has $n$ distinct eigenvalues, property (d) also follows by Lemma \ref{PathMultiplicityLem}. \end{proof} \begin{Lemma}\label{ConvexApproxLem} Let $\varepsilon > 0$, and let $A, B \in M_n$ with $C_\alpha = (1-\alpha)A + \alpha B$ the convex path between them. If $A$ and $B$ have distinct eigenvalues, then there is a matrix path $\mathcal{C}$ from $A$ to $B$ such that $E_\mathcal{C}$ contains no ambiguities and $\|\mathcal{C}_\alpha - C_\alpha\| < \varepsilon$ for all $\alpha \in [0,1]$. \end{Lemma} \begin{proof} Let $d$ be the discriminant of the characteristic polynomial of $C_\alpha$, so $d$ is a polynomial in $\alpha$. Then $C_\alpha$ has a repeated eigenvalue if and only if $d(\alpha) = 0$, which occurs at finitely points $\alpha \in \mathbb{C}$. Define $\mathcal{C}_\alpha$ by traversing the convex path $C_\alpha$, except taking $\varepsilon$-small detours around any roots $\alpha \in [0,1]$ of $d$. Then each $\mathcal{C}_\alpha$ has distinct eigenvalues, so we are finished. \end{proof} \begin{Lemma}\label{DiagonalPairingLem} Let $D \in M_n$ be diagonal with distinct diagonal entries $\lambda_1, ..., \lambda_n$, including some $\lambda_i \neq \lambda_j$. Then there is a matrix path $\mathcal{C}$ from $D$ to itself such that $E_\mathcal{C}$ has no ambiguities, the unambiguous $\mathcal{C}$-eigenpairing swaps $\lambda_i$ and $\lambda_j$ but fixes the rest of the eigenvalues, and $\|\mathcal{C}_\alpha - D\| < |\lambda_i - \lambda_j|$ for all $\alpha \in [0,1]$. \end{Lemma} \begin{proof} By employing a change of basis, we may assume without loss of generality that $i=1$ and $j=2$. Now for $\alpha \in [0, \frac{1}{2}]$ let $\mathcal{S}_\alpha$ be the direct sum of the rotation matrix $$\begin{bmatrix} \cos \pi \alpha & -\sin \pi \alpha \\ \sin \pi \alpha & \cos \pi \alpha \end{bmatrix}$$ with the identity matrix of size $(n-2)$-by-$(n-2)$. Then for $\alpha \in [0, \frac{1}{2}]$ let $\mathcal{C}_\alpha = \mathcal{S}_\alpha D \mathcal{S}_\alpha^{-1}$, so $\mathcal{C}_0 = D$ and $\mathcal{C}_\frac{1}{2}$ is $D$ but with $\lambda_1$ and $\lambda_2$ swapped. Since the spectrum of $\mathcal{C}_\alpha$ remains constant on this path, it follows that there are no ambiguities for $\alpha \in [0, \frac{1}{2}]$. Further, the unambiguous $\mathcal{C}$-eigenpairing of $\mathcal{C}_0$ and $\mathcal{C}_\frac{1}{2}$ is the identity map $\lambda_k \mapsto \lambda_k$. We note that $\mathcal{C}_\alpha$ is the direct sum of $$\frac{1}{2}\begin{bmatrix} \lambda_1 + \lambda_2 + (\lambda_1-\lambda_2)\cos 2\pi \alpha & (\lambda_1 - \lambda_2)\sin 2\pi \alpha \\ (\lambda_1 - \lambda_2)\sin 2\pi \alpha & \lambda_1 + \lambda_2 + (\lambda_2-\lambda_1)\cos 2\pi \alpha \end{bmatrix}$$ with the blocks $[\lambda_3], ..., [\lambda_n]$. Thus, we see that no entry of $\mathcal{C}_\alpha$ differs by more than $|\lambda_1-\lambda_2|$ from the corresponding entry in $D$ on $[0, \frac{1}{2}]$. Now since there are finitely many other eigenvalues $\lambda_3, ..., \lambda_n$, we may find paths $[\frac{1}{2}, 1] \to \mathbb{C}$ from $\lambda_1$ to $\lambda_2$ and $\lambda_2$ to $\lambda_1$ that disagree everywhere on $[\frac{1}{2}, 1]$ and never hit any $\lambda_3, ..., \lambda_n$. Further, we may assume that the images of each path is contained within the disk of radius $\frac{|\lambda_1-\lambda_2|}{2}$ centered on $\frac{\lambda_1+\lambda_2}{2}$. Define $\mathcal{C}_\alpha$ on $[\frac{1}{2}, 1]$ as a diagonal matrix whose first two entries are precisely these paths, so then $\mathcal{C}_1 = D$. Then the desired swap of $\lambda_1$ and $\lambda_2$ is the unambiguous $\mathcal{C}$-eigenpairing of $D$ and itself, and we have $\|\mathcal{C}_\alpha - D\| < |\lambda_1 - \lambda_2|$ for all $\alpha \in [0,1]$. \end{proof} \begin{Lemma}\label{PolynomialRippingLem} Let $\varepsilon > 0$ and let $\mathcal{P}$ be a polynomial matrix path such that all ambiguities in $E_\mathcal{P}$ are singular. Further, let $\{\gamma_1, ..., \gamma_n\}$ be a $\mathcal{P}$-eigenpath set. Then there is a matrix path $\mathcal{C}$ admitting a unique $\mathcal{C}$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$ such that $\|\mathcal{P}_\alpha - \mathcal{C}_\alpha\| < \varepsilon$ and $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$ and $j=1,...,n$. \end{Lemma} \begin{proof} Since the supremum norm $\|\cdot\|$ is equivalent to the basis-invariant Frobenius norm $\|\cdot\|_2$, it suffices to prove this lemma for the Frobenius norm. Enumerate the points $\alpha_1 < ... < \alpha_r$ at which singular ambiguities occur in $E_\mathcal{P}$, and find a collection of disjoint open intervals $U_1', ..., U_r' \subseteq [0,1]$ such that $\alpha_k \in U_k'$ for $k=1,...,r$. For each $k$, there is an open subinterval $U_k \subseteq U_k'$ that still contains $\alpha_k$ and such that $\|\mathcal{P}_\alpha - \mathcal{P}_{\alpha_k}\|_2 < \frac{\varepsilon}{2}$ and $|\gamma_j(\alpha) - \gamma_j(\alpha_k)| < \frac{\varepsilon}{2}$ for all $\alpha \in U_k$ and $j=1,...,r$. Since we may re-parameterize $\mathcal{P}_\alpha$ by extending the domain $[0,1]$ to a slightly larger real interval without significantly changing the entries at any given point, we may assume without loss of generality that $\alpha_1 > 0$ and $\alpha_r < 1$. With this assumption, we may further assume that each $U_k = (\alpha_k^-, \alpha_k^+)$ for some $\alpha_k^-, \alpha_k^+$ satisfying $0 < \alpha_k^- < \alpha_k < \alpha_k^+ < 1$. We now define $\mathcal{C}$ as follows: Set $\mathcal{C}_\alpha = \mathcal{P}_\alpha$ outside $\bigcup_k U_k$. For $\alpha \in U_k$, beginning with $k=1$, we use the following procedure to define $\mathcal{C}_\alpha$. Since $\mathcal{P}_{\alpha_1^-}$ has $n$ distinct eigenvalues, we may choose a basis of $\mathbb{C}^n$ such that $\mathcal{P}_{\alpha_1^-} = D$ is diagonal. That is, we have \begin{align*} D = \begin{bmatrix} \gamma_1(\alpha_1^-) & & \\ & \ddots & \\ & & \gamma_n(\alpha_1^-) \end{bmatrix}. \end{align*} Now set $\mathcal{C}_{\alpha_1} = D$, and use Lemma \ref{ConvexApproxLem} to define $\mathcal{C}_\alpha$ on $(\alpha_1, \alpha_1^+)$ as $\frac{\varepsilon}{2}$-close to the convex path $C$ from $D$ to $\mathcal{P}_{\alpha_1^+}$, but without any ambiguities. Then there is some unique $\mathcal{C}$-eigenpairing $p$ from $\mathcal{C}_{\alpha_1}$ to $\mathcal{C}_{\alpha_1^+}$, so there must be a permutation $\tau$ of the eigenvalues of $D$ such that $p \circ \tau$ is the desired $\mathcal{C}$-eigenpairing $\gamma_j(\alpha_1^-) \mapsto \gamma_j(\alpha_1^+)$ of $\mathcal{C}_{\alpha_1^-}$ and $\mathcal{C}_{\alpha_1^+}$. Then $\tau$ is a product of transpositions involving $\frac{\varepsilon}{2}$-close eigenvalues, so we may apply Lemma \ref{DiagonalPairingLem} once for each transposition to construct a path from $D$ to itself. In particular, this path achieves the desired unambiguous eigenpairing $\tau$ and never deviates by more than $\frac{\varepsilon}{2}$ from $D$. For $\alpha \in (\alpha_1^-, \alpha_1)$, we have \begin{align*} \|\mathcal{C}_\alpha - \mathcal{P}_\alpha\|_2 &= \|\mathcal{C}_\alpha - D + D- \mathcal{P}_\alpha\|_2 \\ &\leq \|\mathcal{C}_\alpha - D\|_2 + \|D- \mathcal{P}_\alpha\|_2 \\ &< \frac{\varepsilon}{2} + \frac{\varepsilon}{2} \\ &= \varepsilon. \end{align*} and for $\alpha \in (\alpha_1, \alpha_1^+)$ we have \begin{align*} \|\mathcal{C}_\alpha - \mathcal{P}_\alpha\|_2 &= \|\mathcal{C}_\alpha - C_\alpha + C_\alpha- \mathcal{P}_\alpha\|_2 \\ &\leq \|\mathcal{C}_\alpha - C_\alpha\|_2 + \|C_\alpha- \mathcal{P}_\alpha\|_2 \\ &< \frac{\varepsilon}{2} + \frac{\varepsilon}{2} \\ &= \varepsilon. \end{align*} We may then repeat this process for $k=2,...,r$, finishing our proof. \end{proof} We now give our proof of Theorem \ref{RippingThm}. \begin{proof} Let $\mathcal{O} _1, ..., \mathcal{O} _r$ be the open cover of the singular ambiguities determined by Lemma \ref{FiniteCoverLem}, each with diameter less than $\varepsilon$ and center $(\lambda_k, \alpha_k)$. We then obtain $\varepsilon_* = \frac{1}{2}\min\{\varepsilon_0, \varepsilon_0', \frac{\varepsilon}{2}\}$ similarly as in Theorem \ref{ClosePathsThm}, so by Lemma \ref{EigenvalueDeltaLem} there is a $\delta>0$ such that a $\delta$-perturbation of the matrix path $\mathcal{C}$ induces at most an $\varepsilon_*$-perturbation of the eigenvalues at any point. Assume without loss of generality that $\delta < \frac{\varepsilon}{2}$. Then by Lemma \ref{WeierstrassLem}, we may find a polynomial matrix path $\mathcal{P}$ that agrees with $\mathcal{C}$ on $\alpha_1, ..., \alpha_r$, admits only singular ambiguities, and $\delta$-approximates $\mathcal{C}$. Now consider the matrix path homotopy given by $H_{\alpha, \beta} = (1-\beta) \mathcal{C}_\alpha + \beta \mathcal{P}_\alpha$. As we shift $\beta$ from 0 to 1, the $\mathcal{C}$-eigenregion continuously deforms into the $\mathcal{P}$-eigenregion, each point shifting by no more than $\varepsilon_*$. By our construction of $\varepsilon_*$, the shifts of the $\mathcal{O} _1, ..., \mathcal{O} _r$ are well-defined in the following sense: for any fixed $\mathcal{O} _k$ and $\alpha_0 \in [0,1]$, let $\Lambda_{k, \alpha_0} = \{\lambda \in \mathbb{C} \mid (\lambda, \alpha_0) \in \mathcal{O} _k\}$ be a multiset wherein each point $\lambda$ occurs $\mult(\lambda, \alpha_0)$ times. Then for any continuous parameterizations of the points $\lambda \in \Lambda$ under the shift by the homotopy, the total shifted multiset $\Lambda$ is the same as it would be for any other parameterization. Similarly, the shifts of the connected components $F_1, ..., F_s$ of $E_\mathcal{C} \backslash \{\bigcup_{k=1}^r \mathcal{O} _k\}$ are also well-defined in the same sense. Note that each $\gamma_j$ is determined (up to variation by the maximum diameter $\frac{\varepsilon}{4}$ of the $\mathcal{O} _k$) entirely by which of the $\mathcal{O} _k$ (for $k=1,...,r$) and $F_\ell$ (for $\ell=1,...,s$) it passes through. Since the shifts of these objects under the homotopy $H_{\alpha, \beta}$ are well-defined, we may find a $\mathcal{P}$-eigenpath set $\{\eta_1, ..., \eta_n\}$ such that each $\eta_j$ passes through the same (shifted versions of) $\mathcal{O} _1, ..., \mathcal{O} _r, F_1, ..., F_s$ as does $\gamma_j$. Then $|\eta_j(\alpha) - \gamma_j(\alpha)| < \varepsilon_* \leq \frac{\varepsilon}{4}$ when $\alpha$ is such that these paths are passing through a component of the form $F_\ell$. Since the diameter of each $\mathcal{O} _k$ is at most $\frac{\varepsilon}{4}$, we have $|\eta_j(\alpha) - \gamma_j(\alpha)| < \varepsilon_* + \frac{\varepsilon}{4} \leq \frac{\varepsilon}{2}$ when $\alpha$ is such that these paths are passing through a component of the form $\mathcal{O} _k$. Thus $|\eta_j(\alpha) - \gamma_j(\alpha)| < \frac{\varepsilon}{2}$ and $\|\mathcal{C}_\alpha - \mathcal{P}_\alpha\| < \frac{\varepsilon}{2}$ for all $\alpha \in [0,1]$. We may now apply Lemma \ref{PolynomialRippingLem} to find an $\frac{\varepsilon}{2}$-approximation $\mathcal{C}'$ to $\mathcal{P}$ that admits no ambiguities and whose unique $\mathcal{C}'$-eigenpath set $\{\gamma_1',...,\gamma_n'\}$ satisfies $|\eta_j(\alpha) - \gamma_j'(\alpha)| < \frac{\varepsilon}{2}$. Then $\mathcal{C}'$ is an $\varepsilon$-approximation of $\mathcal{C}$, and each $\gamma_j'$ is an $\varepsilon$-approximation of $\gamma_j$, so we are finished. \end{proof} \begin{Cor} Along with the hypotheses of Theorem \ref{RippingThm}, suppose that $\mathcal{C}_0$ and $\mathcal{C}_1$ have $n$ distinct eigenvalues. Then the ambiguity-free approximation $\mathcal{C}'$ may be chosen so that $\mathcal{C}'_0 = \mathcal{C}_0$ and $\mathcal{C}'_1 = \mathcal{C}_1$. If only one (say $\mathcal{C}_0$) has $n$ distinct eigenvalues, then the approximation may still be chosen so that $\mathcal{C}_0' = \mathcal{C}_0$. \end{Cor} \begin{proof} Use Lemma \ref{WeierstrassLem} to approximate $\mathcal{C}$ with a polynomial path $\mathcal{P}$ that also agrees with $\mathcal{C}$ at $\alpha=0,1$. Then by our construction of $\mathcal{C}'$ in Lemma \ref{PolynomialRippingLem}, we see that $\mathcal{C}'$ agrees with $\mathcal{P}$ (and so also with $\mathcal{C}$) at $\alpha=0,1$. Note that this procedure still works if we want only $\mathcal{C}'_0 = \mathcal{C}_0$ or $\mathcal{C}'_1 = \mathcal{C}_1$. \end{proof} \section{Proof of Theorem 3} In this section we shift our focus from eigenpaths to eigenpairings. As will be seen in section \ref{Section2x2}, low-dimensional convex eigenpairings are relatively easy to determine. Here we prove Theorem 3, which allows us to predict eigenpairings for a slightly more general class of matrix paths. We begin by proving the simple case wherein $f$ and $g$ are everywhere nonnegative, and then use a technical lemma along with Theorem \ref{ClosePathsThm} to reduce the problem to the aforementioned simple case. We will again denote the convex eigenpath by $C_\alpha = (1-\alpha)A + \alpha B$. \begin{Lemma}\label{ConeLem} Let $\mathcal{C}_\alpha = f(\alpha)A+g(\alpha)B$ be a path from $A$ to $B$ for continuous $f,g : [0,1] \to \mathbb{R}$. If $f(\alpha), g(\alpha) \geq 0$ for all $\alpha \in [0,1]$, then any convex eigenpairing $p$ is also a $\mathcal{C}$-eigenpairing. \end{Lemma} \begin{proof} We know that each $\mathcal{C}_\alpha$ is equal to $c_\alpha C_{\beta(\alpha)}$ for some $c_\alpha \geq 0$ and convex combination $C_{\beta(\alpha)}$. Further, we may view $c_\alpha$ and $\beta(\alpha)$ as continuous functions of $\alpha$. We then obtain \begin{align*} E_\mathcal{C} &= \{(\lambda, \alpha) \mid \alpha \in [0,1], \; \lambda \in \sigma(\mathcal{C}_\alpha)\} \\ &= \{(c_\alpha \lambda, \alpha) \mid \alpha \in [0,1], \; \lambda \in \sigma(C_{\beta(\alpha)})\}. \end{align*} If $\{\gamma_1, ..., \gamma_n\}$ is a convex eigenpath set that induces the convex eigenpairing $p$, then the continuous functions $\gamma_j'$ given by $\gamma_j'(\alpha) = c_\alpha \gamma_j(\beta(\alpha))$ form a $\mathcal{C}$-eigenpath set. Note that $\gamma_j'(0) = \gamma_j(0)$ and $\gamma_j'(1) = \gamma_j(1)$, so $p$ is a $\mathcal{C}$-eigenpairing as well. \end{proof} \begin{Lemma}\label{ArcLem} Let $\mathcal{C}_\alpha = f(\alpha)A+g(\alpha)B$ be a path from $g(0)B$ to $g(1)B$ for continuous $f,g : [0,1] \to \mathbb{R}$. If $f(\alpha), g(\alpha) \geq 0$ for all $\alpha \in [0,1]$, then the bijection $\Sigma(g(0)B) \to \Sigma(g(1)B)$ given by $\lambda \mapsto \frac{g(1)}{g(0)} \lambda$ is a $\mathcal{C}$-eigenpairing. \end{Lemma} \begin{proof} If $f$ and $g$ simultaneously vanish at some point in $[0,1]$, then we are finished by Lemma \ref{AllBijectionsCor}. Otherwise choose $\alpha_0 \in [0,1]$ such that $g(\alpha_0) = 0$, or if no such zero exists choose $\alpha_0$ that maximizes $\frac{f(\alpha_0)}{g(\alpha_0)}$. Now let $p$ be a convex eigenpairing of $B$ and $C_{\alpha_0}$. Notice that for every $\alpha \in [0, 1]$, we know that $\mathcal{C}_\alpha$ is a positive $\mathbb{R}$-linear combination of $B$ and $C_{\alpha_0}$. Then by Lemmas \ref{PosScalLem} and \ref{ConeLem}, we find that a suitably scaled version of $p$ is a $\mathcal{C}$-eigenpairing of $g(0)B$ and $C_{\alpha_0}$, and similarly that a scaled version of $p^{-1}$ is a $\mathcal{C}$-eigenpairing of $C_{\alpha_0}$ and $g(1)B$. Then by composing these maps via Lemma \ref{Concatenation}, we obtain the desired result. \end{proof} We may now complete the proof of Theorem \ref{ConvexReductionThm}. \begin{proof} Let $\{\gamma_1, ..., \gamma_n\}$ be a convex eigenpath set corresponding to a convex eigenpairing $p$. First observe that if there is some $\alpha_0 \in [0,1]$ such that $f(\alpha_0) = 0 = g(\alpha_0)$, then $\mathcal{C}_{\alpha_0} = 0$ and so every bijection is a $\mathcal{C}$-eigenpairing by Lemma \ref{AllBijectionsCor}. Henceforth we will assume there is no such $\alpha_0$. By Corollary \ref{CommonPairingCor}, there is a $\delta>0$ such that for all continuous paths $\mathcal{C}_\alpha'$ from $A$ to $B$ satisfying $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$, any $\mathcal{C}'$-eigenpairing $p : \Sigma(A) \to \Sigma(B)$ is also a $\mathcal{C}$-eigenpairing. Let $U$ be the union of all intervals $(\alpha_1, \alpha_2) \subset [0,1]$ on which $f$ is negative and such that $f(\alpha_1) = 0 = f(\alpha_2)$ and $f(\alpha) > -\frac{\delta}{\|A\|}$ for all $\alpha \in (\alpha_1, \alpha_2)$. Similarly, let $V$ be the union of all intervals $(\alpha_1, \alpha_2) \subset [0,1]$ on which $g$ is negative and such that $g(\alpha_1) = 0 = g(\alpha_2)$ and $g(\alpha) > -\frac{\delta}{\|B\|}$ for all $\alpha \in (\alpha_1, \alpha_2)$. If we define $f'=f$ on $[0,1]\backslash U$ and $f'=0$ on $U$ and similarly $g'=g$ on $[0,1]\backslash V$ and $g'=0$ on $V$, then the resulting path $\mathcal{C}'_\alpha = f'(\alpha)A + g'(\alpha)B$ satisfies $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$. It therefore suffices to show that any convex eigenpairing $p$ is also a $\mathcal{C}'$-eigenpairing. Let $(\alpha_1, \alpha_2) \subset [0,1]$ be an interval on which $f'$ is negative and such that $f'(\alpha_1) = 0 = f'(\alpha_2)$. Then $g'(\alpha) \geq 0$ for all $\alpha \in (\alpha_1, \alpha_2)$, so by Lemma \ref{ArcLem} we know that a scaled version of the identity map is a $\mathcal{C}'$-eigenpairing between $g'(\alpha_1)B$ and $g'(\alpha_2)B$. This bijection would be the only $\mathcal{C}'$-eigenpairing if we redefined $f'$ to be identically zero and $g'$ to be the straight line between $g'(\alpha_1)B$ and $g'(\alpha_2)B$ on $(\alpha_1, \alpha_2)$, so we may assume without loss of generality that $f'$ is nonzero on this interval. By our construction of $\mathcal{C}'$, we know there are finitely many such intervals on which $f'$ is negative. We may therefore repeat this process for all these intervals, so in fact we may assume that $f'(\alpha) \geq 0$ for all $\alpha \in [0,1]$. By an identical argument, we may assume that $g'(\alpha) \geq 0$ as well. Thus, the theorem follows by Lemma \ref{ConeLem}. \end{proof} \section{The $2$-by-$2$ Case of Convex Eigenpairings}\label{Section2x2} Before we investigate the $2$-by-$2$ case, we will first prove a few results that apply to the general convex case. First, we determine under what conditions there exist \emph{straight line} convex eigenpaths, i.e.\ paths that are degree-one polynomials in $\alpha$. \begin{Lemma}\label{SameEvecsLem} If $\lambda \in \sigma(A)$ and $\mu \in \sigma(B)$ share an eigenvector $v \in \mathbb{C}^n$, then the straight line given by $\gamma(\alpha) = (1-\alpha)\lambda + \alpha \mu$ is a convex eigenpath. \end{Lemma} \begin{proof} We have $C_\alpha v = ((1-\alpha)\lambda + \alpha \mu)v$, so $\gamma$ is indeed an eigenpath. \end{proof} \begin{Lemma}\label{TraceCondition} Let $\{\gamma_1, ..., \gamma_n\}$ be an eigenpath set. Then the pointwise sum $\gamma = \sum_{j=1}^n \gamma_j$ is a straight line. \end{Lemma} \begin{proof} Notice that $\gamma(\alpha) = \Tr(C_\alpha) = (1-\alpha)\Tr(A) + \alpha \Tr(B)$, so $\gamma$ is indeed a straight line. \end{proof} \begin{Rmk} In view of Lemma \ref{Combination}, we see that if $A$ and $B$ share some $k$ linearly independent eigenvectors, then we may reduce the convex eigenpairing problem to the $(n-k)$-by-$(n-k)$ case by simply using a basis in which $A$ and $B$ are block upper triangular. In particular, there will be $k$ blocks of size $1$-by-$1$, each of which corresponds to a shared eigenvector. The remaining $(n-k)$-by-$(n-k)$ block may then be treated separately. \end{Rmk} We now proceed to our analysis of the $2$-by-$2$ case: Suppose that $A$ and $B$ are $2$-by-$2$ complex matrices with $\Sigma(A) = \{\lambda_1, \lambda_2\}$ and $\Sigma(B) = \{\mu_1, \mu_2\}$. Notice that the possible eigenpairings are $\lambda_j \mapsto \mu_j$ (denoted by $p$) and $\lambda_j \mapsto \mu_{3-j}$ (denoted by $q$). In the remainder of this section, we will analyze the conditions under which each of these eigenpairings may occur. If either has an eigenvalue of algebraic multiplicity 2, then both $p$ and $q$ are convex eigenpairings of $A$ and $B$. We may therefore restrict our attention to the case in which $\lambda_1 \neq \lambda_2$ and $\mu_1 \neq \mu_2$. By uniform similarity invariance, it follows that we may reduce to the case in which $A$ is diagonal, so its eigenvectors are $\binom{1}{0}$ and $\binom{0}{1}$. Further, we will assume that the eigenvectors of $B$ are $\binom{v_1}{1}$ and $\binom{v_2}{1}$, corresponding to $\mu_1$ and $\mu_2$, respectively. Later we will address the remaining (trivial) case in which $B$ has an eigenvector of the form $\binom{v}{0}$. To simplify notation later in this section, we will write $\lambda = \lambda_1-\lambda_2$ and $\mu = \mu_1-\mu_2$. Since pairings are invariant under shifts by the identity matrix (Lemma \ref{PosScalLem}), we note that these quantities have a natural invariance property. We therefore obtain \begin{align*} A &= \begin{pmatrix} \lambda_1 & 0 \\ 0 & \lambda_2 \end{pmatrix} \\ B &= \begin{pmatrix} v_1 & v_2 \\ 1 & 1 \end{pmatrix} \begin{pmatrix} \mu_1 & 0 \\ 0 & \mu_2 \end{pmatrix} \begin{pmatrix} v_1 & v_2 \\ 1 & 1 \end{pmatrix}^{-1} \\ &= \begin{pmatrix} \frac{\mu_1v_1}{v_1-v_2} - \frac{\mu_2v_2}{v_1-v_2} & -\frac{\mu v_1 v_2}{v_1-v_2} \\ \frac{\mu}{v_1-v_2} & \frac{\mu_2v_1}{v_1-v_2} -\frac{\mu_1v_2}{v_1-v_2} \end{pmatrix} \\ C_\alpha &= \begin{pmatrix} (1-\alpha)\lambda_1 + \alpha \left( \frac{\mu_1v_1}{v_1-v_2} - \frac{\mu_2v_2}{v_1-v_2} \right) & -\frac{\alpha\mu v_1 v_2}{v_1-v_2} \\ \frac{\alpha\mu}{v_1-v_2} & (1-\alpha)\lambda_2 + \alpha \left( \frac{\mu_2v_1}{v_1-v_2} -\frac{\mu_1v_2}{v_1-v_2} \right) \end{pmatrix}. \end{align*} The characteristic polynomial of $C_\alpha$ then has roots \begin{align*} \frac{(1-\alpha)(\lambda_1+\lambda_2) + \alpha(\mu_1+\mu_2) \pm \sqrt{(1-\alpha)^2\lambda^2 + \alpha^2\mu^2 + 2\left(\frac{v_1+v_2}{v_1-v_2} \right)(1-\alpha)\alpha \lambda \mu}}{2}, \end{align*} so a repeated root occurs precisely when the discriminant $\gamma : [0, 1] \to \mathbb{C}$ given by \begin{align*} \gamma(\alpha) = (1-\alpha)^2\lambda^2 + \alpha^2\mu^2 + 2\left(\frac{v_1+v_2}{v_1-v_2} \right)(1-\alpha)\alpha \lambda \mu \end{align*} equals 0 for some $\alpha \in (0,1)$, which is true if and only if \begin{align} \frac{\mu}{\lambda} = \left(\frac{\alpha-1}{\alpha}\right) \left( \frac{v_1+v_2 \pm 2\sqrt{v_1v_2}}{v_1-v_2} \right) \label{JCond} \end{align} for that value of $\alpha$. \begin{Rmk}\label{SqrtPaths} If the $\gamma(\alpha) \neq 0$ for all $\alpha \in [0,1]$, then by Proposition \ref{AmbiguityProp} there is an unambiguous eigenpairing. Further, there are two distinct continuous ``square root paths" $\eta_1, \eta_2 : [0,1] \to \mathbb{C}$ such that $\eta_1(\alpha)^2 = \gamma(\alpha) = \eta_2(\alpha)^2$ for all $\alpha \in [0,1]$. These paths connect either $\lambda$ to $\mu$ and $-\lambda$ to $-\mu$ or $\lambda$ to $-\mu$ and $-\lambda$ to $\mu$. If one of these paths (say $\eta_1$) connects $\lambda$ to $\mu$, then one of the eigenpaths that induces the unambiguous eigenpairing is $\gamma_1(\alpha) = \frac{(1-\alpha)(\lambda_1+\lambda_2) + \alpha(\mu_1+\mu_2) + \eta_1(\alpha)}{2}$, so $\gamma_1$ is a path from $\lambda_1$ to $\mu_1$. In this case, it follows that $p$ is the unambiguous eigenpairing. Similarly, if one of the square root paths connects $\lambda$ to $-\mu$, then $q$ is the unambiguous eigenpairing. If we fix values of $v_1$ and $v_2$ but allow $\frac{\mu}{\lambda}$ to vary, we therefore see that the eigenpaths may swap only when $\gamma$ hits the origin. That is, if $\gamma$ does not hit the origin at some point in a continuous perturbation of $\frac{\mu}{\lambda}$, then the endpoints of the square root paths $\eta_1$ and $\eta_2$ remain the same. \end{Rmk} \begin{Lemma}\label{OriginOrNoLem} Suppose $\frac{\mu}{\lambda} \in \mathbb{R}$, so there is a ray $R$ emanating from the origin that contains $\mu^2$ and $\lambda^2$. Denote by $-R$ the ``opposite ray," the one emanating from the origin that contains $-\mu^2$ and $-\lambda^2$. If the discriminant $\gamma : [0,1] \to \mathbb{C}$ has no roots, then $\gamma$ never hits any point in $-R$. \end{Lemma} \begin{proof} Let $L = R \cup -R$ be the line containing 0, $\mu^2,$ and $\lambda^2$. Notice that $\lambda \mu \in L$, so $\gamma(\alpha)$ is a $\mathbb{C}$-linear combinations of $\lambda^2, \mu^2,$ and $\lambda \mu$. If $\frac{v_1+v_2}{v_1-v_2} \in \mathbb{R}$, then this combination is $\mathbb{R}$-linear, so the image of $\gamma$ lies in $L$. In this case, since $\gamma$ has no roots, we know that $\gamma$ can never cross the origin and hit $-R$. Otherwise $\frac{v_1+v_2}{v_1-v_2} \notin \mathbb{R}$, in which case the image of $\gamma$ lies in $L$ only for $\alpha=0,1$. Therefore $\gamma$ does not hit $-R$ in this case either. \end{proof} \begin{Lemma}\label{RealRatioLem} Suppose $\frac{\mu}{\lambda} \in \mathbb{R}$. \begin{enumerate} \item If $\frac{\mu}{\lambda} > 0$, then $p$ is an eigenpairing. \item If $\frac{\mu}{\lambda} < 0$, then $q$ is an eigenpairing. \end{enumerate} \end{Lemma} \begin{proof} If $\gamma$ has any roots, then both $p$ and $q$ are eigenpairings and we are finished. Otherwise $\gamma$ has no roots, so we may apply Lemma \ref{OriginOrNoLem} to find that $\gamma$ never hits $-R$. Thus, when finding the square root paths of Remark \ref{SqrtPaths}, we may use the branch cut along the ray $-R$. First suppose $\frac{\mu}{\lambda} > 0$. Then $\mu$ and $\lambda$ both lie on the same ray emanating from 0, meaning so too do $\mu^2$ and $\lambda^2$. Then each square root path must start and end on the same ray, so one such path traverses from $\lambda$ to $\mu$. By our reasoning in Remark \ref{SqrtPaths}, it follows that $p$ is an eigenpairing. Case (b) is identical. \end{proof} In the next several paragraphs, we will assume that arguments of complex numbers lie in $(-\pi, \pi]$. Denote by $\theta$ and $\theta'$ the arguments of $\left(\frac{\alpha-1}{\alpha}\right) \left( \frac{v_1+v_2 \pm 2\sqrt{v_1v_2}}{v_1-v_2} \right)$, where $\theta' \leq \theta$. Notice that this quantity equals 0 (and thus has no argument) only when $v_1=v_2=0$, which would imply that the two distinct eigenvalues of $B$ share an eigenvector. \begin{Lemma}\label{2x2SymmetryLem} Either $\theta' = -\theta$ or $\theta = \pi = \theta'$. \end{Lemma} \begin{proof} We have \begin{align*} \left( \frac{v_1+v_2 + 2\sqrt{v_1v_2}}{v_1-v_2} \right)\left( \frac{v_1+v_2 - 2\sqrt{v_1v_2}}{v_1-v_2} \right) &= \frac{(v_1+v_2)^2 - 4v_1v_2}{(v_1-v_2)^2} \\ &= \frac{(v_1-v_2)^2}{(v_1-v_2)^2} \\ &= 1, \end{align*} so the lemma holds. \end{proof} \begin{usethmcounterof}{2x2Theorem} Define $\mu, \lambda,$ and $\theta$ as above. \begin{enumerate} \item If $|\arg(\frac{\mu}{\lambda})| = \theta$, then both $p$ and $q$ are eigenpairings. \item If $|\arg(\frac{\mu}{\lambda})| < \theta$, then only $p$ is an eigenpairing. \item If $|\arg(\frac{\mu}{\lambda})| > \theta$, then only $q$ is an eigenpairing. \end{enumerate} \end{usethmcounterof} \begin{proof} Notice that condition (a) is equivalent to equation \eqref{JCond} from before, so (a) indeed holds. Now fix some value of $\theta$, and consider the change in the discriminant path $\gamma$ as we continuously shift $\arg(\frac{\mu}{\lambda})$ from $-\pi$ to $\pi$. If $\theta=0$, then $\gamma$ hits the origin only when $\arg(\frac{\mu}{\lambda}) = 0$, so by our reasoning in Remark \ref{SqrtPaths} it follows that the endpoints of the square root paths may swap at most once through a rotation of $\frac{\mu}{\lambda}$ by $2\pi$. However, a full rotation by $2\pi$ is equivalent to no rotation at all, so in fact the endpoints cannot swap. We know by Lemma \ref{RealRatioLem} that $q$ is an eigenpairing at $\arg(\frac{\mu}{\lambda}) = \pi$ as well, so it is therefore always an eigenpairing in the case that $\theta=0$. It follows by an identical argument that $p$ is always an eigenpairing when $\theta = \pi$. Otherwise $0 < \theta < \pi$, so the endpoints of the square root paths may swap when $\arg(\frac{\mu}{\lambda}) = \pm \theta$. Again by Lemma \ref{RealRatioLem} we obtain that $q$ is an eigenpairing at $\arg(\frac{\mu}{\lambda}) = \pi$ and $p$ is an eigenpairing at $\arg(\frac{\mu}{\lambda}) = 0$, so in fact the endpoints must swap at $\pm \theta$. Since they cannot swap anywhere else, we are finished. \end{proof} \begin{Rmk} We remark that if $v_1$ has very large magnitude and $v_2$ is very small, then the quantity $\left(\frac{\alpha-1}{\alpha}\right) \left( \frac{v_1+v_2 \pm 2\sqrt{v_1v_2}}{v_1-v_2} \right)$ will be close to the negative real axis, so $\theta$ will be close to $\pi$. In this case, event (b) in the above theorem is likely to occur, so the map $p$ given by $\lambda_j \mapsto \mu_j$ is the most likely eigenpairing. Conversely, if $v_2$ is large and $v_1$ small, then $q$ is the most likely eigenpairing. In this sense, we see that when an eigenvector of $A$ is close to an eigenvector of $B$, their corresponding eigenvalues are likely to pair. In particular, if $\binom{1}{0}$ lies in the $\mu_1$-eigenspace of $B$, then $p$ is an eigenpairing due to Lemma \ref{SameEvecsLem}. Further, by Lemma \ref{TraceCondition} we may take the associated eigenpath set to be a pair of straight lines. In this case, $q$ is also an eigenpairing if and only if there is some $\alpha \in (0,1)$ such that $(1-\alpha) \lambda_1 + \alpha \mu_1 = (1-\alpha) \lambda_2 + \alpha \mu_2$, or equivalently $\frac{\mu}{\lambda} < 0$. Similarly, if $\binom{1}{0}$ lies in the $\mu_2$-eigenspace of $B$, then $q$ is always an eigenpairing, and $p$ is also an eigenpairing if and only if $\frac{\mu}{\lambda} > 0$. \end{Rmk} \section{The Polynomial Analogs of Theorems 1-3} A natural extension of the ideas considered so far is the variation in the roots of a complex polynomial of degree $n$ that varies continuously with a real parameter $\alpha$. In order to state the analogs of Theorems 1-3, we first provide some analogous definitions. We again use $\Sigma(Q)$ to denote the size-$n$ multiset of roots of the polynomial $Q$, where $Q \in \mathbb{C}[t]$ has degree $n$. Additionally, we write $\|Q\| = \max_j |a_j|$ when $Q = \sum_{j=0}^n a_j t^j$. \begin{Def} A \emph{polynomial path} is a continuous function $[0,1] \to \mathbb{C}_n[t]$, where $\mathbb{C}_n[t]$ denotes the set of univariate complex monic polynomials of degree $n$. In this section, we will assume that $\mathcal{P}_\alpha$ is a polynomial path with $\mathcal{P}_0 = Q$ and $\mathcal{P}_1 = R$. The $\emph{convex}$ polynomial path from $Q$ to $R$ is given by $P_\alpha = (1-\alpha)Q + \alpha R$. \end{Def} \begin{Def} As before, the polynomial path $\mathcal{P}_\alpha$ determines a \emph{$\mathcal{P}$-root-region} \begin{align*} E_\mathcal{P} = \bigcup_{\alpha \in [0,1]} \{(\zeta, \alpha) \mid \mathcal{P}_\alpha(\zeta) = 0\} \end{align*} and corresponding \emph{$\mathcal{P}$-root-path sets} $\{\gamma_1, ..., \gamma_n\}$ such that \begin{align*} \Sigma(\mathcal{P}_\alpha) = \{\gamma_1(\alpha), ..., \gamma_n(\alpha)\} \end{align*} for all $\alpha \in [0,1]$. Such a $\mathcal{P}$-root-path set determines a \emph{$\mathcal{P}$-root-pairing} $\gamma_j(0) \mapsto \gamma_j(1)$. \end{Def} \begin{Def} The \emph{companion matrix path} of $\mathcal{P}_\alpha = t^n + \sum_{j=0}^{n-1} a_j(\alpha) t^j$ is the matrix path \begin{align*} \mathcal{C}_\alpha = \begin{bmatrix} 0 & & & & -a_0(\alpha) \\ 1 & 0 & & & -a_1(\alpha) \\ & 1 & \ddots & & \vdots \\ & & \ddots & 0 & -a_{n-2}(\alpha) \\ 0 & & & 1 & -a_{n-1}(\alpha) \end{bmatrix}, \end{align*} so the characteristic polynomial of each $\mathcal{C}_\alpha$ is $\mathcal{P}_\alpha$ (see \cite{MAnalysis}). This observation yields the following lemma. \end{Def} \begin{Lemma} Let $\mathcal{C}$ be the companion matrix path of $\mathcal{P}$. Then $E_\mathcal{C} = E_\mathcal{P}$, and $\{\gamma_1, ..., \gamma_n\}$ is a $\mathcal{C}$-eigenpath set if and only if it is a $\mathcal{P}$-root-path set. \end{Lemma} We now state and prove the polynomial analogs of Theorems 1, 2, and 3. \begin{Thm}[Analog of Theorem \ref{ClosePathsThm}] Let $\varepsilon > 0$ and let $\mathcal{P}$ be a polynomial path. Then there is a $\delta > 0$ such that for any polynomial path $\mathcal{P}'$ with $\|\mathcal{P}_\alpha - \mathcal{P}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$ and any $\mathcal{P}'$-root-path set $\{\gamma_1', ..., \gamma_n'\}$, there is a $\mathcal{P}$-root-path set $\{\gamma_1, ..., \gamma_n\}$ satisfying $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$. \end{Thm} \begin{proof} Let $\mathcal{C}$ be the companion matrix path of $\mathcal{P}$. Using Theorem 1, we obtain $\delta>0$ such that for any matrix path $\mathcal{C}'$ with $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ for all $\alpha \in [0,1]$ and any $\mathcal{C}'$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$, there is a $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$ satisfying $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$. Let $\mathcal{P}'$ be a polynomial path satisfying $\|\mathcal{P}_\alpha - \mathcal{P}_\alpha'\| < \delta$, and let $\{\gamma_1', ..., \gamma_n'\}$ be a $\mathcal{P}'$-root-path set. Then if $\mathcal{C}'$ is the companion matrix path of $\mathcal{P}'$, we have $\|\mathcal{C}_\alpha - \mathcal{C}_\alpha'\| < \delta$ and a $\mathcal{C}'$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$. Thus we may find a $\mathcal{C}$-eigenpath set $\{\gamma_1, ..., \gamma_n\}$, such that $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$. Since $\{\gamma_1, ..., \gamma_n\}$ is also a $\mathcal{P}$-root-path set, we are finished. \end{proof} \begin{Thm}[Analog of Theorem \ref{RippingThm}] Let $\varepsilon > 0$ and let $\mathcal{P}$ be a polynomial path with $\mathcal{P}$-root-path set $\{\gamma_1, ..., \gamma_n\}$. Then there is a polynomial path $\mathcal{P}'$ admitting a unique $\mathcal{P}'$-root-path set $\{\gamma_1', ..., \gamma_n'\}$ such that $\|\mathcal{P}_\alpha - \mathcal{P}_\alpha'\| < \varepsilon$ and $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for all $\alpha \in [0,1]$ and $j=1,...,n$. \end{Thm} \begin{proof} Let $\mathcal{C}$ be the companion matrix path of $\mathcal{P}$. By Theorem \ref{RippingThm}, we know for any $\varepsilon' > 0$ there is a matrix path $\mathcal{C}'$ admitting a unique $\mathcal{C}'$-eigenpath set $\{\gamma_1', ..., \gamma_n'\}$ such that $\|\mathcal{C}_\alpha - \mathcal{C}'_\alpha\| < \varepsilon'$ and $|\gamma_j(\alpha) - \gamma_j'(\alpha)| < \varepsilon$ for $\alpha \in [0,1]$ and $j=1,...,n$. Since the characteristic polynomial of a matrix varies continuously with its entries, we may take $\varepsilon'$ to be small enough so that the characteristic polynomial $\mathcal{P}_\alpha'$ of $\mathcal{C}_\alpha'$ satisfies $\|\mathcal{P}_\alpha - \mathcal{P}_\alpha'\| < \varepsilon$. \end{proof} \begin{Thm}[Analog of Theorem \ref{ConvexReductionThm}] Let $f$ and $g$ be continuous functions $[0,1] \to \mathbb{R}$ satisfying $f(0) = g(1) = 1$ and $f(1) = g(0) = 0$ so that $\mathcal{P}_\alpha = f(\alpha)Q+g(\alpha)R$ is a polynomial path from $Q$ to $R$. If $(f \lor g)(\alpha) \geq 0$ for all $\alpha \in [0,1]$, then any convex root-pairing $p$ is also a $\mathcal{P}$-root-pairing. \end{Thm} \begin{proof} Let $\mathcal{C}$ be the companion matrix path of $\mathcal{P}$, so $\mathcal{C}_\alpha = f(\alpha) A + g(\alpha) B$ where $A$ and $B$ are the companion matrices of $Q$ and $R$, respectively. Further, the matrix path $C_\alpha = (1-\alpha)A + \alpha B$ is the companion matrix path of $P_\alpha = (1-\alpha)A + \alpha B$. By Theorem \ref{ConvexReductionThm}, any convex eigenpairing $p$ of $A$ and $B$ is also a $\mathcal{C}$-eigenpairing. Since $E_C = E_P$ and $E_\mathcal{C} = E_\mathcal{P}$, it follows that the convex eigenpairings are exactly the convex root-pairings, and similarly that the $\mathcal{C}$-eigenpairings are exactly the $\mathcal{P}$-root-pairings. Thus, our result holds. \end{proof} \pagebreak \bibliographystyle{apa}
\section{Introduction} Multiple-input multiple-output (MIMO) technology has shown its ability in obtaining rich diversity and multiplexing gains. With recent development of MIMO, the trend of deploying more antennas comes with a number of challenges. One of the major challenges is to acquire accurate high-dimensional MIMO channel state information (CSI) at the transmitter, especially in frequency division duplex (FDD) systems. An increasing number of antennas results in a high-dimensional channel matrix, which makes it difficult for the transmitter to obtain accurate CSI through a feedback channel of limited bandwidth. Conventional codebook based methods quantize the channel matrix into a sequence of bits which represents the index of a codeword \cite{AoD}. Considering that the complexity of the codebook based methods grows exponentially with the number of quantization bits, it can be prohibitively difficult for large MIMO channels. Compressed sensing (CS) based methods, e.g., TVAL3 \cite{Tval3}, can be used for solving this difficulty through feature extraction and dimension compression. However, when the compression ratio is extremely high, the performance of these CS based methods degrades severely \cite{CsiNet}. Recently, neural network (NN) based methods, inspired from CS based methods, showed appealing performance for MIMO CSI compression \cite{CsiNet, CsiNetLSTM1, CsiNetLSTM2}. Previously, encoder-decoder schemes were proposed in \cite{encoder_decoder1,encoder_decoder2} to learn the behaviors of a transmitter in wireless communication systems. This idea of an encoder-decoder network was then utilized to learn the MIMO CSI compression \cite{CsiNet, CsiNetLSTM1, CsiNetLSTM2}. In particular, the encoder network compressed the channel matrix into a low dimensional vector while the decoder network was responsible for recovering the channel matrix directly from the compressed vector. Usually the decoder was designed with a more complex structure than the encoder because the base station (BS) generally has stronger computing ability than user equipment (UE). The NN based method in \cite{CsiNet}, namely CsiNet, assumed that the decoder achieves a compressed CSI vector of continuous values. Then in \cite{CsiNetLSTM1,CsiNetLSTM2}, the CsiNet was enhanced by utilizing a long-short time memory (LSTM) network \cite{LSTM} to further exploit temporal channel correlations. In a digital communication system with limited bandwidth, however, it is still impossible to transmit a vector of continuous values even though it is highly compressed. In most applications, CSI quantization is necessary and inevitable for implementational tractability. In this work, we consider the CSI compression as well as quantization through a bit-level optimized NN. The main contributions of this work are summarized as follows: \begin{itemize} \item We propose a bit-level optimized design of NNs by considering the effects of quantization distortion. This design can be easily assembled in existing CSI networks with a few additional modifications. \item We develop a joint convolutional residual network (JC-ResNet) to extract channel features for CSI compression. The proposed JC-ResNet is much more efficient than common convolution operations in existing NNs \end{itemize} \section{CSI Quantization and Feedback} \begin{figure*}[thbp] \centerline{\includegraphics[width=17cm,height=3.2cm]{Lu_WCL2019-0768_fig1.eps}} \caption{Architecture of a bit-level optimized network.} \label{quant_net} \end{figure*} We consider an orthogonal frequency division multiplexing (OFDM) system where the BS is equipped with $N_t$ antennas and the UE has a single antenna. Assume that the signal obtained at the $n$-th subcarrier is \begin{equation}\label{eq:ReveivedSignal} y_n={{\bf{h}}^H_n}{{\bf{v}}_n}x_n+n_n, \end{equation} where ${\bf{h}}_n \in {\mathbb{C}}^{N_t \times 1} , {{\bf{v}}_n} \in {\mathbb{C}}^{N_t \times 1}, x_n \in {\mathbb{C}}$, and $n_n \in {\mathbb{C}}$ respectively represent the channel response, precoding vector, transmitting signal, and additive noise at the $n$-th subcarrier. The precoding vector ${\bf{v}}_n$ is designed according to CSI feedback. We stack the channel vector and denote ${\bf{H}}=\left[{\bf{h}}_1 {\bf{h}}_2 ... {\bf{h}}_{N_c}\right]^H \in {\mathbb{C}}^{N_c \times N_t}$, where $N_c$ is the number of subcarriers of the OFDM system. In this paper, we propose an encoder-decoder network to conduct CSI compression/uncompression procedures for feedback. Assuming that ${\bf{H}}$ is known at the UE, a general representation of the CSI quantization and feedback process can be written as: \begin{equation}\label{eq:quant_feedback} {\hat{\bf{H}}} = f_d({\mathcal{D}}({\mathcal{Q}}(f_e({\bf{H}})))), \end{equation} where $\hat{\bf{H}}$ denotes the recovered CSI at the BS, $f_e(\cdot)$ represents the preprocessing and encoding before quantization, ${\mathcal{Q}}(\cdot)$ is the quantization operator, ${\mathcal{D}}(\cdot)$ conducts the corresponding dequantization, and $f_d(\cdot)$ represents the decoding and postprocessing function after dequantization, e.g., an inverse operation of $f_e(\cdot)$. \begin{figure}[t!] \centerline{\includegraphics[width=7.9cm,height=4.2cm]{Lu_WCL2019-0768_fig2.eps}} \caption{Pseudo graphics of preprocessed channel before network processing.} \label{channel} \end{figure} A diagram of our proposed NN structure is depicted in Fig.~\ref{quant_net}. In the proposed scheme, $f_e(\cdot)$ includes the steps as depicted in Fig. \ref{channel}. First, the raw channel matrix $\bf{H}$ acquired at the UE is transformed into the angular-delay domain through a 2D Fourier transformation. Letting ${\bf{H}}^{(a)} \in {\mathbb{C}}^{N_c \times N_t} $ be the transformed channel matrix in the angular-delay domain, we have \begin{equation} {\bf{H}}^{(a)} = {\bf{F}}_a{\bf{H}}{\bf{F}}_b^H, \end{equation} where ${\bf{F}}_a \in {\mathbb{C}}^{N_c \times N_c}$ and ${\bf{F}}_b \in {\mathbb{C}}^{N_t \times N_t}$ are Fourier matrices. Considering that the maximum multipath delay is limited in practice, it implies that the entries at large delay positions are all zeros \cite{CsiNet}. Therefore, without loss of generality, we can focus on a submatrix of ${\bf{H}}^{(a)}$, i.e., keeping the first ${\tilde{N}}_c$ rows with nonzero entries at the delay domain, and get a cropped channel matrix ${\bf{H}}^{(a)}_{c} \in {\mathbb{C}}^{{\tilde{N}}_c \times N_t}$. If some inignorably small negative delays exist, a reshuffling of ${\bf{H}}^{(a)}$ can be added in this scheme before the cropping. Note that this additional operation of reshuffling only generates a different version of network input, we do not need any other further changes for the proposed NN. Note that for convenience of the processing in the NN, we then split ${\bf{H}}^{(a)}_{c}$ into two parts, i.e., real and imaginary parts, and stack the two parts at the third dimension. Then, all the entries of the processed channel matrix are normalized to (0, 1). We denote it by ${\bf{H}}^{(a)}_{cp} \in {\mathbb{R}}^{{\tilde{N}}_c \times N_t \times 2}$ and its corresponding complex version by ${\bf{H}}^{(a)}_{cc} \in {\mathbb{C}}^{{\tilde{N}}_c \times N_t}$. We stress that the operation of CSI scaling does not need to be de-scaled at the recovery side because the directional information of channel is (typically) sufficient for beamforming design at the transmitter side. Before channel quantization in the NN, our encoder network generates the compressed CSI feature vector from ${\bf{H}}^{(a)}_{cp}$. ${\mathcal{Q}}(\cdot)$ rounds the entries of the compressed CSI feature vector generated by the encoder network into their nearest integers. Since the rounded numbers can be expressed by a binary sequence, this binary bit flow is the quantization output which can be directly fed back to the BS. At the other side, ${\mathcal{D}}(\cdot)$ conducts the inverse operation of ${\mathcal{Q}}(\cdot)$. The decoder network recovers an estimation of channel matrix ${\bf{H}}^{(a)}_{cp}$. Then we can get $\hat{\bf{H}}$, which is the estimation of the raw channel matrix ${\bf{H}}$ from ${\bf{H}}^{(a)}_{cp}$ through an inverse transformation of the preprocessing done in $f_e(\cdot)$. These two steps make up $f_d(\cdot)$ \section{Proposed Scheme} In this section, we describe the proposed network architecture and then elaborate the computation process of the JC-ResNet in detail. \subsection{Network Architecture} Encoder and decoder networks using deep NN are utilized for CSI quantization and recovery. The input of the encoder network is a cropped and normalized channel matrix in the angle-delay domain, i.e., ${\bf{H}}^{(a)}_{cp}$. The existing encoder-decoder design works at the condition that the number of the quantization bits of the compressed vector needs to be so large that the quantized CSI vector does not have much distortion, because the compression is designed without considering quantization. In order to optimize the CSI compression jointly with quantization, we propose the bit-level encoder-decoder architecture in Fig. \ref{quant_net}. The encoder network encompasses the newly designed JC-ResNet. It better exploits the features of the channel matrix, and the output of this JC-ResNet includes abstract sparse features. A nonlinear ``$elu$'' activation layer and a batch normalization layer are appended to the JC-ResNet. Specifically, the ``$elu$'' function is defined as follows: \begin{equation} elu(x) = \left\{ \begin{array}{lr} x, & x>0 \\ e^x - 1, & x\le0. \end{array} \right. \end{equation} Then, the output features are reshaped to a 1D tensor for further processing. The 1D feature tensor is compressed by a fully connected network (FCN), which is expected to help discard much redundant information and produce dense features. Following the FCN layer, a ``$tanh$'' activation layer is added to map the output entries within $(-1,1)$. To optimize the performance, a quantization distortion metric is considered for network training. Specifically, the low-dimensional features are quantized by a $B$-bit quantizer. The quantization computation takes the following form: \begin{equation}\label{eq:quant} y = {\text{round}}{(2^{B-1} \times x)}/2^{B-1}, \end{equation} where $B$ denotes the number of quantization bits for each entry of the compressed CSI vector, ${x}$ denotes the entries of the compressed CSI vector after the FCN, and ${\text{round}}(\cdot)$ is the rounding function. In (5), $x$ is firstly zoomed to $(-2^{B-1},2^{B-1})$ and then is rounded to its nearest integer. In order to accomplish the quantization with $B$ bits, we alternatively use $-2^{B-1}+1$ to represent the quantization of the values whose nearest integer is $-2^{B-1}$. Finally, the output is reverted to $(-1,1)$ by dividing by $2^{B-1}$. In this way, each entry of the compressed CSI vector has a corresponding $B$-bit expression. The most challenging issue is that the gradient of the quantization operation is always zero except for some specific points, which is fatal to network training. According to \cite{image_compress}, the quantization operation in the network can be seen as a transparent module, which means that the gradients after the quantization are back propagated through it in a lossless fashion. In other words, we can alternatively set the quantization gradients to 1 everywhere. The binary bit flows generated by the encoder network at the UE are fed back to the BS through an uplink feedback channel. The dequantizer module in the decoder network conducts the inverse operation of the quantizer and it generates a 1D compressed tensor. The tensor will be sent to an FCN to restore its original dimension and transform the feature into a sparse representation. Then it is reshaped to a 3D tensor which has the same dimension as the processed channel matrix. After the reshape operation, two JC-ResNets are linked in series to restore the original channel information. Finally, a ``$sigmoid$'' activation layer is used to generate the entries of the recovered channel matrix within $(0, 1)$. Note that we choose respectively one and two JC-ResNets added to the encoder network and the decoder network for the sake of compromising performance and computational complexity. \subsection{Joint Convolutional Residual Net} By connecting a shortcut from the input directly to the output, we construct the JC-ResNet in Fig. \ref{quant_net} as a typical residual network (ResNet) \cite{Resnet} architecture. Since we commonly use the chain rule to solve the gradient in deep NNs, the gradients returned for shallow network layers are the product of the gradients of backward layers. Considering the gradients are usually less than 1, it leads to the product gradients of the shallow network layers becoming so small that it can be ineffective for network parameter updating. Therefore, the specific shortcut connection, which shapes the ResNet, can alleviate the issue of gradient dispersion which guarantees better performance. \begin{figure}[t!] \centerline{\includegraphics[width=6.0cm,height=2.9cm]{Lu_WCL2019-0768_fig3.eps}} \caption{Architecture of a JC block with size $m \times m\times k \times n$.} \label{joint_conv} \end{figure} The setting of the sizes of the convolution kernels is referred to ``RefineNet'' in \cite{CsiNet}. From our experience, the convolution kernel sizes have to grow larger through steps to catch more features. However, to use the residual architecture, the last convolution kernel must have the same output size of the residual block as the input size. Therefore, the sizes of kernels first grow and then decrease. More specifically, in our JC-ResNet, we use 3 joint convolutions (JC), in which the sizes of convolution kernels are $3\times 3 \times 2 \times 8$, $3 \times 3 \times 8 \times 16$ and $3 \times 3 \times 16 \times 2$, respectively. A JC block with size of $m \times m \times k \times n$ is given in Fig.~\ref{joint_conv}. It includes convolution layers whose kernel sizes directly relate to the JC block. These convolution kernels are actually 4D tensors. Taking the convolution kernel with size $m \times m \times k \times n$ in Fig. \ref{joint_conv} for instance, the first two dimensions $m \times m$ denote the receptive field size, $k$ denotes the depth of the input tensor, and $n$ denotes the depth of the output tensor. Considering the fact that the signal path arriving at the receiver at the same time is usually similar in angle and the signal path reached at the same angle is also similar in time delay, the correlation between the horizontal or vertical entries usually is greater than that between the diagonal entries in a real channel sample. Therefore, we propose to use cascaded horizontal or vertical convolutions to catch the horizontal and vertical correlations in steps. In addition, if we use different convolutions in parallel, these convolutions will extract features from different ways. The network will benefit from a ``wide'' structure since it can automatically choose the most effective combination of different features through the learned parameters \cite{Xception}. Specifically, the input of the joint convolution is spread into 3 flows. The first flow has 2 different convolution operations with the sizes of $1 \times m \times k \times n$ and $m \times 1 \times k \times n$, respectively. Each convolution operation is added an ``$elu$'' activation layer. The second flow also has 2 different convolution operations, but with the sizes of $m \times 1 \times k \times n$ and $1 \times m \times k \times n$, respectively. The third flow is a traditional $m \times m$ convolution operation. The first and the second flow are not equal operations owing to the nonlinear activation layers after the convolution operations. The features extracted by the 3 flows then concatenate together at the last dimension and thus the last depth of the concatenated feature tensor becomes $3n$. Finally, we use a $1 \times 1 \times 3n \times n$ convolution operation, which can not only down-sample the tensor but also make weighted combinations of different features through the channel dimension for a more effective feature expression. \section{Experiments} We test our model under the COST2100 indoor channel \cite{COST2100}. The training, validation and testing sets have 100,000, 30,000 and 20,000 samples, respectively. All the experiments are conducted on a NVIDIA GTX1080 Ti GPU. In the simulation, we set $N_t=32, N_c=1024$ and ${\tilde{N}}_c=32$. Thus the channel matrix sent to the encoder matrix is ${\bf{H}}^{(a)}_{cp} \in {\mathbb{R}}^{32 \times 32 \times 2}$ and its corresponding complex format ${\bf{H}}^{(a)}_{cc}$, belongs to ${\mathbb{C}}^{32 \times 32}$. The mean squared error (MSE) of the preprocessed channels is chosen as the optimized object during network training: \begin{equation}\label{eq:mse} \text{MSE}=\frac{1}{K}\sum_{n=k}^{K-1+k}\sum_{i=1}^{32}\sum_{j=1}^{32}|H_n(i,j) - {\hat{H}}_n(i,j)|^2, \end{equation} where $H_n$ is one sample of ${\bf{H}}^{(a)}_{cc}$, $H_n(i,j)$ denotes the entry of the $n$-th sample at position $(i,j)$, ${\hat{H}}_n(i,j)$ denotes the entry of the $n$-th recovered sample at position $(i,j)$, $K$ denotes the training batch size, $k$ denotes the index of the first sample in the batch, and $|\cdot|$ takes the absolute value. The Adam optimizer is used to implement the gradient descent optimization. In order to prevent the explosion of the gradient, we use the gradient clipping measures and the clipping threshold is set to 0.05. Learning rate is set to 0.001. The batch size is set to 200. Another important hyper parameter is the number of quantization bits $B$ for each entry in the compressed feature vector. In the simulation, we set $B$ as 4. All the hyper-parameters are determined with the help of the validation set. For comparison, we also present the results of CsiNet \cite{CsiNet} and a CS based method TVAL3 \cite{Tval3}. CsiNet-Q($L$) denotes the CsiNet version which is trained without considering the quantization. For testing CsiNet-Q($L$), each entry of the compressed CSI vector is quantized to $L$ bits. In the simulation, we find that the performance of CsiNet decreases slightly after CSI quantization if $L$ is selected from $\left\{6, 7, 8\right\}$. In addition, we test QCsiNet which only incorporates the operation of quantization in CsiNet and $B$ is set to 4 for fair comparison. The total number of feedback bits is set to 192 for each channel sample in Fig. 5(b). \begin{figure}[t!] \centerline{\includegraphics[width=6.3cm,height=2.0cm]{Lu_WCL2019-0768_fig4.eps}} \caption{Parameter size of the networks.} \label{complexity} \end{figure} \begin{figure}[t!] \centerline{\includegraphics[width=6.3cm,height=2.2cm]{Lu_WCL2019-0768_fig5.eps}} \caption{(a) NMSE performance in indoor scenario (b) BER performance in indoor scenario.} \label{nmse_ber} \end{figure} Fig. \ref{complexity} gives the size of parameters of CsiNet, QCsiNet and the proposed NN. From this figure, we conclude that the size of parameters of CsiNet-Q($6$) is about $2/3$ that of ours and QCsiNet has almost the same size of parameters as the proposed method. Since we quantize each entry of the codeword by 4 bits, the output dimension of the FCN at the encoder is 1.5 times of CsiNet-Q($6$) under the same number of total quantization bits. Therefore, the total parameters is about 1.5 times since it is dominated by the FCNs. As for the computing time, CsiNet-Q($6$), QCsiNet and the proposed NN respectively cost about $0.1$ ms, $0.2$ ms and $0.2$ ms. Fig. \ref{nmse_ber}(a) compares the normalized mean squared error (NMSE) of our proposed method, CsiNet-Q($6$), CsiNet-Q($7$), CsiNet-Q($8$), QCsiNet and TVAL3. The NMSE is defined as: $\text{NMSE} = 1 / {N_{\text{test}}} \cdot \sum_{k=1}^{N_{\text{test}}} {{||H_k - {\hat{{H}}}_k||^2}} / {{{||{{H}}_k}||^2}},$ where $N_{\text{test}}$ is the number of channel samples in the testing set, $H_k$ denotes the $k$-th channel sample in the testing set, ${\hat{{H}}}_k$ denotes the $k$-th recovered channel sample and $||\cdot||$ denotes the Frobenius norm. The total number of quantization bits is calculated by the compressed vector dimension multiplied by the number of the quantization bits. The NMSE performance of TVAL3 in Fig. \ref{nmse_ber}(a) is not satisfactory because 200 bits are far from sufficient for TVAL3 to perform well. Fig. \ref{nmse_ber}(b) compares the bit error rate (BER) of these methods. We use the QPSK modulation, the precoding vector is a maximum-rate-transmission (MRT) beamformer designed by using the recovered CSI. From Fig. \ref{nmse_ber}, QCsiNet achieves a significant gain over the benchmark method, and the design of JC-ResNet further improves the performance by comparing the proposed method with QCsiNet in terms of both NMSE and BER. \section{Conclusion} In this paper, we have proposed a more efficient JC-RestNet for CSI feature extraction and recovery. Moreover, we have also provided a method to integrate a quantization operation into the NN, therefore we can optimize the CSI quantization and feedback network at a bit level. Simulation results have shown that the proposed methods can enhance the performance significantly.
\section{Introduction} \subsection{The Power of Hybrid Quantum Computation} Our work is inspired by the following conjecture in quantum computing folklore. Variants of this conjecture have been considered by Jozsa~\cite{Jozsa06} and Aaronson~\cite{Aaronson05, Aaronson11, Aaronson14}. \begin{conjecture}[Folklore] \label{conj:folklore} Any polynomial-time quantum computation can be simulated by a polynomial-size classical computation interleaved with polylogarithmic-depth quantum computation. \end{conjecture} Intriguingly, this conjecture is known to hold for some of the most influential quantum algorithms. For example, Cleve and Watrous~\cite{CleveW00} showed that Shor's algorithm for \textsc{Factoring} can be implemented using log-depth polynomial-size quantum circuits with polynomial-time classical pre- and post-processing. Indeed, one might be able to use a similar methodology to parallelize many quantum algorithms that rely on the quantum Fourier transform. Similarly, most oracle separations that show a quantum speedup seem to be consistent with Conjecture~\ref{conj:folklore}. The prototypical problems that exhibit an exponential quantum speedup---\textsc{Simon's problem}~\cite{Simon97} and \textsc{Forrelation}~\cite{Aaronson10, AaronsonA18}---can both be solved using \emph{constant-depth} quantum circuits with oracle access, and polynomial-time classical pre- and post-processing. Thus, while they constitute oracle separations between $\cclass{P}$ and $\cclass{BQP}$, they do not, on their own, suggest an oracle separation between $\cclass{BQP}$ and the sort of class that Conjecture~\ref{conj:folklore} considers. All of this could be taken as an indication that the class described in Conjecture~\ref{conj:folklore} is very powerful. There are at least two seemingly incomparable interpretations of the model of computation considered in Conjecture~\ref{conj:folklore}. One was proposed by Jozsa~\cite{Jozsa06}, and could be described in shorthand as version of $\cclass{BQNC}^\cclass{BPP}$. Another, $\cclass{BPP}^\cclass{BQNC}$, was considered by Aaronson~\cite{Aaronson05, Aaronson11, Aaronson14}, who conjectured an oracle separation between this class and $\cclass{BQP}$. In our work we will define the first class under the name $\cclass{JC}$ and the second class under the name $\cclass{HQC}$ in order to avoid confusion about the oracle access model for these classes, and because of other technicalities. These complexity classes may be considered hardware-motivated mathematical models in the sense that they endeavor to capture the computational problems which can be solved by a quantum device of limited depth (due either to limited coherence time, or some other restriction) when combined, in one of two reasonable ways, with classical side-processing of arbitrary polynomial depth. Note that, in order to disprove either interpretation of Conjecture~\ref{conj:folklore}, one would necessarily need to separate $\cclass{P}$ from $\cclass{BQP}$ as a prerequisite, and such a statement may be very difficult to prove as an unconditional mathematical fact. For example, it would require separating $\cclass{P}$ from $\cclass{PSPACE}$. In this work we will prove a separation between $\cclass{BQP}$ and both of $\{\cclass{JC}, \cclass{HQC}\}$ relative to the Welded Tree oracle. At the end, we also remark on the possibility of extending this result to a separation based on a cryptographic assumption. \subsection{Results and Organization} In this subsection we will give more detailed (yet still informal) statements of our results, and provide pointers to the sections of this paper which state and prove each result formally. Section \ref{sec:preliminaries} of this paper covers preliminaries which are essential to formalizing our results, including the definitions of complexity classes $\cclass{JC}$ and $\cclass{HQC}$ referred to in the abstract, as well as a discussion of the oracle-access model for these classes, and background on the Welded Tree Problem. \subsubsection{Hybrid Quantum Computation with Few Tiers} \label{sec:hybr-quant-comp} Section \ref{sec:few-tiers} of this paper is a warm-up meant to build intuition for the techniques used in our main results. In Section \ref{sec:few-tiers} we show how our techniques can easily prove that a limited class of Hybrid Quantum Circuits, those with ``Few Tiers'', cannot be used to solve the Welded Tree Problem with high probability. The result can be summed up in the following theorem. \begin{theorem}[Informal]\label{thm:few-tier-informal} No quantum algorithm with oracle access to the Welded Tree oracle, and using only $O(\cclass{polylog}(n))$-depth quantum circuits, alternated with polynomial time classical computations at most $\sqrt{n}$ times, can solve the Welded Tree Oracle problem with probability higher than $2^{-\Omega(n)}$. \end{theorem} \paragraph{Proof Overview.} Our analysis for Theorem~\ref{thm:few-tier-informal}, and for the main theorems in this paper as well, works by exhibiting a classical simulation algorithm for the hybrid quantum oracle algorithm in question. Our classical simulation produces an exponentially close approximation of the output of the original hybrid quantum algorithm for this oracle problem, and yet it uses only sub-exponentially many classical oracle queries to do so. It then follows by the known classical lower bound for the Welded Tree Problem, due to Childs et al.~\cite{ChildsCDFGS03} (see Theorem \ref{thm:class-lower-bound}), that the hybrid quantum algorithm cannot possibly be solving the Welded Tree Problem with better than (sub-)exponentially small probability. Our classical simulation algorithm makes use of the fact that, in the Welded Tree Problem, the $2n$-bit labels of valid vertices of the welded tree are randomly chosen from among the exponentially larger set of all $2n$-bit strings. See Subsection \ref{subsec:weldedtree} for more details on the definition the Welded Tree Problem. Therefore, while a quantum algorithm can query the welded tree oracle in superposition for information about every $2n$-bit string, it is intuitive that all but an exponentially small fraction of the mass of that quantum query will be supported on either invalid $2n$-bit strings, or on valid $2n$-bit strings which correspond to vertices that are adjacent to previously known vertices in the welded tree graph. If this were not so it would imply a classical query algorithm which can non-trivially guess a valid-but-unknown vertex label using sub-exponentially many queries, and that contradicts known results of \cite{ChildsCDFGS03}. Therefore, a classical query algorithm can produce a classical description of a quantum state which is exponentially close to the true output of a quantum oracle query in exponential time and using sub-exponentially many classical oracle queries. This is done simply by assuming that the oracle returns $\texttt{INVALID}$ on any input in the superposition which is not a previously encountered valid vertex label. Moreover, since the number of valid vertex labels in the first $\sqrt{n}$ levels of the welded tree is sub-exponential, this classical simulation can be performed for $\sqrt{n}$-depth relativized quantum circuits using only sub-exponentially many classical queries. See Section \ref{sec:few-tiers} for a rigorous discussion. \subsubsection{Jozsa's Conjecture} In Section \ref{sec:relat-jozs-conj} of this paper we observe that the techniques of Section \ref{sec:few-tiers} can be augmented to handle a class of circuits considered by Jozsa. \begin{quote} ``\textbf{Conjecture:} Any polynomial time quantum algorithm can be implemented with only $O(\log n)$ quantum layers interspersed with polynomial time classical computations.'' Richard Jozsa~\cite[Section 8]{Jozsa06} \end{quote} Our result is summarized in the following statement, which is formalized and proven as Theorem \ref{thm:jozsa-formal} in this paper. \begin{theorem}[Informal] \label{thm:jozsa-informal} No quantum algorithm with oracle access to the Welded Tree oracle, and using only $O(\cclass{polylog}(n))$ quantum layers of polynomial width, interspersed with polynomial time classical computations, can solve the Welded Tree Problem with probability higher than $2^{-\Omega(n)}$. \end{theorem} Since the Welded Tree Problem can be solved in $\cclass{BQP}$, as shown in \cite{ChildsCDFGS03}, our theorem implies an oracle separation between $\cclass{BQP}$ and the class that Jozsa describes. That class will be defined precisely under the name $\cclass{JC}$ in Section \ref{sec:preliminaries}. \paragraph{Proof Overview.} The principal difference between a Jozsa circuit and a hybrid quantum circuit is the way interleaving works. A Jozsa circuit is a polylogarithmic depth quantum circuit with polynomial size classical circuits embedded in it. Moreover, the input to the embedded classical circuits is a classical bitstring, produced by measuring a subset of the output of the previous quantum layer in the classical basis. (See Section~\ref{sec:jozsas-class} for a formal definition.) Observe that the classical circuits can be decoupled from this interleaving. Therefore we can repurpose the analysis from Subsubsection~\ref{sec:hybr-quant-comp}. \subsubsection{Full Hybrid Quantum Computation} In Section \ref{sec:hqc} of this paper we extend the analysis from Section \ref{sec:few-tiers} to handle Hybrid Quantum Circuits with any polynomial number of tiers. Doing so requires introducing a new concept which we refer to as an ``Information Bottleneck'', together with new techniques to formalize the use of this concept. Our main result, which is summarized in the statement below, is formalized and proven as Theorem \ref{thm:mainthm-formal} in this paper. \begin{theorem}[Informal]\label{thm:mainthm-informal} No quantum algorithm with oracle access to the Welded Tree oracle, and using only $O(\cclass{polylog}(n))$-depth quantum circuits, alternated with polynomial time classical computations, polynomially many times, can solve the Welded Tree Oracle problem with probability higher than $2^{-\Omega(n)}$. \end{theorem} Theorem \ref{thm:mainthm-informal} implies Aaronson's conjecture that there exists an oracle $\mathcal{O}$, namely, the Welded Tree oracle, such that $\cclass{BQP}^{\mathcal{O}} \neq (\cclass{BPP}^\cclass{BQNC})^{\mathcal{O}}$ \cite{Aaronson05, Aaronson11, Aaronson14}. \paragraph{Proof Overview.} Let us begin by explaining why the proof of Theorem \ref{thm:mainthm-informal} seems to require a new idea from that of Theorem \ref{thm:few-tier-informal}. The reason that the classical simulation Algorithm \ref{alg:classicalsim1} in Section \ref{sec:few-tiers} is sufficient to prove Theorem \ref{thm:adaptive-query-lower-bound} is that the set of known vertices, $V_{\text{known}}$, constructed by Algorithm \ref{alg:classicalsim1}, grows only by a multiple of $n$ for each quantum tier encountered. This means that, when simulating a circuit with only $\sqrt{n}$ quantum tiers, the set $V_{\text{known}}$ only has subexponential size by the end of Algorithm \ref{alg:classicalsim1} and the Algorithm is, therefore, still subject to the classical lower bound Theorem~\ref{thm:class-lower-bound}. However, this, while encouraging, is not sufficient to prove our new Theorem \ref{thm:mainthm-formal}, because $\cclass{HQC}$ allows circuits in which the number of tiers is some arbitrary polynomial $\cclass{poly}(n)$ in the input size $n$. So, the set $V_{\text{known}}$ constructed by Algorithm \ref{alg:classicalsim1} could grow to exponential size when attempting to simulate an arbitrary circuit in $\cclass{HQC}$, and this would not meet the prerequisites for applying Theorem \ref{thm:class-lower-bound}. To prove Theorem \ref{thm:mainthm-formal} we employ a new idea which we will refer to informally as the ``Information Bottleneck''. The intuition is that, while a circuit in $\cclass{HQC}$ may have $\cclass{poly}(n)$ tiers, its width is also bounded by some polynomial $g(n)$. Therefore, while Algorithm \ref{alg:classicalsim1} tracks a set $V_{\text{known}}$ of known vertices that grows exponentially large as it increases through $\cclass{poly}(n)$ tiers, it seems intuitive that after the end of each quantum tier, only $g(n)$ (or, say, $\cclass{poly}(n,g(n))$ at the most) of those known vertices should ``actually matter'' to the $\cclass{HQC}$ circuit being simulated. This is because the width of the circuit bounds the amount of classical information that can be passed from one tier of the circuit to the next. Note that the information passed between tiers is necessarily a classical bit string by definition. In Section \ref{sec:hqc} will make this intuition more formal and use it to prove an oracle separation between $\cclass{HQC}$ and $\cclass{BQP}$. \subsection{Concurrent Work} Independent and concurrent to our work Chia, Chung, and Lai \cite{Chia19} also investigated Conjecture~\ref{conj:folklore} in its multiple manifestations, and proved that the conjecture is false relative to an oracle. In particular their work also proves the oracle separation conjectured by Aaronson \cite{Aaronson05, Aaronson11, Aaronson14}, and gives an oracle separation against Jozsa's conjecture. To do this they use a different oracle problem, of their own construction, and so their analysis is very different from ours. This provides a thought-provoking alternative approach to studying computations which require large quantum depth. The starting point for the oracle construction of \cite{Chia19} is \textsc{Simon's problem}~\cite{Simon97}, but since that problem can be solved with just $O(1)$ quantum depth, the authors of \cite{Chia19} construct a \emph{lifted} version of Simon's problem by using ideas from cryptography to augment the problem in such a way that it requires higher quantum depth. In particular, they use techniques of \emph{pointer chasing} and \emph{domain hiding} to construct a variant of Simon's problem in which the valid domain of the candidate Simon function is hidden in an exponentially larger set of strings. The intuition is that only a high-depth computation could continue pointer chasing for long enough to identify a valid element of the domain with high probability. Furthermore, since one requires a uniform superposition over valid domain elements in order to implement Simon's algorithm, one intuitively needs high \emph{quantum} depth to solve their oracle problem. Interleaving classical computation and low-depth quantum computation is not sufficient because the required superposition over valid domain elements cannot be obtained in such a model. Considerable technical work is required to formalize this argument, see \cite{Chia19}. Chia, Chung, and Lai~\cite{Chia19} also go a step further, showing that their oracle problem separates computations with quantum depth $d$ from those with quantum depth $2d+1$. This represents a sharpening of the separation between hybrid quantum circuits and $\cclass{BQP}$. We have not carefully considered whether there is a modification of the Welded Tree Problem which obtains a similar separation. As for further alternative interpretations of Conjecture \ref{conj:folklore} which have not yet been considered, we believe that the techniques in both works extend to establish an oracle separation between the natural hierarchy of hybrid models, $\cclass{BPP}^{\cclass{BQNC}^{\cclass{BPP}^{\cdots}}}$ and $\cclass{BQP}$ \cite{Chia19b}. \section{Definitions, Background, and Notation}\label{sec:preliminaries} \subsection{Hybrid Quantum Computation} In order to make our investigation of Conjecture~\ref{conj:folklore} more precise, in this subsection we define a hierarchy of complexity classes based on hybrid quantum computation. We begin by setting notation, followed by a definition of the hierarchy, and ending with a formal statement of Conjecture~\ref{conj:folklore}. \subsubsection{Quantum Circuits}\label{sec:quantum-circuits} For an introduction to uniform circuit families, quantum circuits, and the complexity classes not defined here see Watrous~\cite{Watrous09}. The results in this paper are not sensitive to a choice of (reasonable, universal) gate set. Nevertheless, for concreteness, we assume that our classical circuits are composed of \emph{Toffoli} gates, and that our quantum circuits are composed of \emph{Hadamard}, \emph{Toffoli}, and \emph{Phase} gates. In addition, these circuits may contain \emph{query gates} (discussed in Section~\ref{sec:oracl-quant-world}), \emph{auxiliary qubit gates} (which take no input and produce a qubit in the $\ket{0}$ state), and \emph{garbage gates} (which take an input and produce no output.) For an introduction to quantum circuits, see Watrous~\cite{Watrous11}. We assume, for simplicity and without loss of generality, that our quantum circuits have the following form: we receive an $n$-bit input, which is then padded with $p(n)$ qubits in the $\ket{0}$ state for some fixed polynomial $p$, we apply a unitary---the \emph{unitary purification} of this circuit---to these $n+p(n)$ qubits, and measure the first qubit in the computational basis and consider that to be the output. In cases where we expect an $s$-bit output, we measure the first $s$ qubits (and if $s$ is greater than the number of output qubits, we pad zeros to the end of the output.) \begin{definition} Define a \emph{$(m,s)$-classical layer} to be an $m$-input, $s$-output, depth-$1$ classical circuit. \end{definition} \begin{definition} Define a \emph{$(m,s)$-quantum layer} to be an $m$-input, $s$-output, depth-$1$ quantum circuit. \end{definition} \begin{definition} We say that two consecutive circuits are \emph{compatible} if the number of outputs of the first circuit is greater than or equal to the number of inputs of the second circuit. It is assumed that the extra outputs of the first circuit are traced out. \end{definition} \begin{definition} Define a \emph{$(m,s,d)$-classical tier} to be an $m$-input, $s$-output, depth-$d$ classical circuit. In other words, a $(m,s,d)$-classical tier consists of $d$ compatible classical layers composed with each other. \end{definition} \begin{definition} Define an \emph{$(m,s,d)$-quantum tier} to be an $m$-input $s$-output depth-$d$ quantum circuit followed by a measurement in the computational basis. In other words, a $(m,s,d)$-quantum tier consists of $d$ compatible quantum layers composed with each other, followed by a measurement in the computational basis. \end{definition} \begin{definition} \label{def:hybridcircuit} Define a \emph{$(n,\eta,c,q,g)$-hybrid-quantum circuit} $H$ to be a composition of $\eta$ circuits \begin{equation} C_1 \circ C_2 \circ \cdots \circ C_\eta \end{equation} such that the following hold. \begin{enumerate} \item $C_1$ is an $(n, g, c)$-classical tier. \item $C_\eta$ has at least one output. \item For odd $i > 1$, $C_i$ is an $(g, g, c)$-classical tier. \item For even $i$, $C_i$ is an $(g, g, q)$-quantum tier. \item $g(n)$ is the width of $H$. \end{enumerate} We define the output of this circuit to be the first bit of the output of $C_\eta$. \end{definition} \begin{figure}[H] \centering \begin{tikzpicture}[scale=0.30, turn/.style={draw, minimum height=14mm, minimum width=8mm, fill = black, text=white}, qtier/.style={draw, minimum height=34mm, minimum width=15mm, fill = lightgray, text=black}, ctier/.style={draw, minimum height=34mm, minimum width=25mm, fill = darkgray, text=white}, >=latex] \foreach \y in {-5,-4.5,...,-1} { \draw (-4,\y) -- (36,\y); } \foreach \y in {1,1.5,...,5} { \draw (-4,\y) -- (36,\y); } \draw (-4,3) node[left] {$\ket{x}$} -- (32,3); \draw (-4,-3) node[left] {$\ket{0}^{\otimes (g-n)}$} -- (32,-3); \node (Q0) at (0,0) [qtier] {$C_1$}; \node (Q1) at (16,0) [qtier] {$C_3$}; \node (Q2) at (32,0) [qtier] {$C_5$}; \node (C0) at (8,0) [ctier] {$C_2$}; \node (C0) at (24,0) [ctier] {$C_4$}; \end{tikzpicture} \caption{An illustration of an $(n,5,c,q,g)$-hybrid-quantum circuit. The light boxes represent quantum circuits and the dark boxes represent classical circuits.} \label{fig:hybrid-quantum-circuit} \end{figure} \subsubsection{A Hierarchy of Hybrid Quantum Circuits} Informally, $\cclass{HQC}^i$ is the class of problems solvable by polynomial-size classical circuits with embedded $O(\log^i(n))$-depth quantum circuits, and $\cclass{HQC}$ is the class problems solvable by polynomial-size classical circuits with embedded $\cclass{polylog}(n)$-depth quantum circuits. This notation is analogous to $\cclass{NC}^i$ and $\cclass{NC}$, see Cook~\cite{Cook85}. \begin{definition} $\cclass{HQC}^i$ is the class of promise problems solvable by a uniform family of $(n,\cclass{poly}(n),\cclass{poly}(n),O(\log^i(n)), \cclass{poly}(n))$-hybrid-quantum circuits with probability of error bounded by $1/3$. \end{definition} \begin{definition} $\cclass{HQC}$ is the union of $\cclass{HQC}^i$ over all nonnegative $i$; in symbols, \begin{equation} \cclass{HQC} = \bigcup_{i \geq 0} \cclass{HQC}^i. \end{equation} \end{definition} \begin{remark}\label{rem:hqc-and-bpp-bqnc} Observe that $\cclass{HQC}$ contains $\cclass{BPP}^\cclass{BQNC}$ as we can restrict all the embedded quantum circuits in $\cclass{HQC}$ to output just one bit. \end{remark} \subsubsection{Jozsa's Class}\label{sec:jozsas-class} \begin{definition} \label{def:jozsacircuit} Define a \emph{$(n,\eta,c,q,g)$-jozsa-quantum circuit} $J$ to be a composition of $\eta$ circuits \begin{equation} Q_1 \circ ((\Pi \circ C_1) \otimes \mathbb{I}) \circ Q_2 \circ \cdots \circ Q_\eta \circ ((\Pi \circ C_\eta) \otimes \mathbb{I}) \end{equation} such that the following hold. \begin{enumerate} \item $\Pi$ is a classical basis measurement on $g(n)/2$ qubits. \item $Q_1$ is an $(n, g(n), q)$-quantum tier. \item For all $i$, $C_i$ is an $(g(n)/2, g(n)/2, c)$-classical tier. \item For all $i>1$, $Q_i$ is an $(g(n), g(n), q)$-quantum tier. \item $g(n)$ is the width of $J$. \end{enumerate} \end{definition} \begin{definition}\label{def:jci} $\cclass{JC}^i$ is the class of promise problems solvable by a uniform family of $(n, \cclass{poly}(n), \cclass{poly}(n), O(\log^i(n)), \cclass{poly}(n))$-jozsa-quantum circuits with probability of error bounded by $1/3$. \end{definition} \begin{definition}\label{def:jcunion} $\cclass{JC}$ is the union of $\cclass{JC}^i$ over all nonnegative $i$; in symbols, \begin{equation} \cclass{JC} = \bigcup_{i \geq 0} \cclass{JC}^i. \end{equation} \end{definition} Define the registers \texttt{R1} and \texttt{R2} as shown in Figure~\ref{fig:jozsa-registers}. \begin{figure}[H] \centering \begin{tikzpicture}[scale=0.30, turn/.style={draw, minimum height=14mm, minimum width=8mm, fill = black, text=white}, qlayer/.style={draw, minimum height=34mm, minimum width=8mm, fill = lightgray, text=black}, measure/.style={draw, minimum height=14mm, minimum width=4mm, fill = black, text=white}, ctier/.style={draw, minimum height=14mm, minimum width=15mm, fill = darkgray, text=white}, >=latex] \foreach \y in {-5,-4.5,...,-1} { \draw (-4,\y) -- (28,\y); } \foreach \y in {1,1.5,...,5} { \draw (-4,\y) -- (28,\y); } \draw (-4,3) node[left] {\texttt{R1}} -- (28,3); \draw (-4,-3) node[left] {\texttt{R2}} -- (28,-3); \node (Q1) at (0,0) [qlayer] {$Q_1$}; \node (Q2) at (14,0) [qlayer] {$Q_2$}; \node (M1) at (4,3) [measure] {$\Pi_C$}; \node (M2) at (18,3) [measure] {$\Pi_C$}; \node (C1) at (9,3) [ctier] {$C_1$}; \node (C2) at (23,3) [ctier] {$C_2$}; \end{tikzpicture} \caption{% An illustration of an $(n,2,q,c)$-jozsa-quantum circuit. The light boxes represent quantum circuits, the black boxes represent classical basis measurements, and the dark boxes represent classical circuits. The width of the circuit $g(n)$ is split into two registers \texttt{R1} and \texttt{R2} of equal size.% } \label{fig:jozsa-registers} \end{figure} \subsubsection{Conjecture~\ref{conj:folklore}, More Formally} With these definitions in place, we can state Conjecture~\ref{conj:folklore} as follows. \begin{conjecture}\label{conj:folklore-formal} It holds that $\cclass{HQC} = \cclass{BQP}$. \end{conjecture} \subsection{Relativized Conjecture~\ref{conj:folklore-formal}} In this subsection, we review oracles and state a relativized version of Conjecture~\ref{conj:folklore-formal}. \subsubsection{Oracles in the Quantum World}\label{sec:oracl-quant-world} For an introduction to oracles in the quantum circuit model, see Section III.4 in \cite{Watrous09}. We recap some definitions for setting notation. For us, an \emph{oracle} $A$ is a collection $\{A_n: n \in \ensuremath{\mathbb{N}}\}$ of functions \begin{equation} A_n: \{0,1\}^n \to \{0,1\}^n, \end{equation} to which queries can be made at unit cost. We define \begin{equation} A(x) \coloneqq A_{\abs{x}}(x) \end{equation} where $\abs{x}$ denotes the length of $x$. We use the term \emph{black box} to refer to the restriction of an oracle to inputs of a fixed length. We represent \emph{oracle queries} by an infinite family \begin{equation} \{K_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of gates, one for each \emph{query length}. Each gate $K_n$ is a unitary gate acting on $n+1$ qubits, defined on the computational basis as \begin{equation} K_n \ket{x}\ket{a} \mapsto \ket{x}\ket{a \oplus A(x)} \end{equation} where $x \in \{0,1\}^n$, $a \in \{1,0\}^n$, and $A$ is the oracle under consideration. \paragraph{Multiple-bit queries versus single-bit queries.} As mentioned at the end of Section III.4 in \cite{Watrous09}, one can use the \emph{Bernstein–Vazirani algorithm}~\cite{BernsteinV97} to simulate multiple-bit queries with single-bit queries (after adapting the definition of $A_n$ appropriately.) Moreover, this can be performed without any non-constant depth-overhead, so our model (after slight modifications) is equivalent to the traditional single-bit query model. \subsubsection{Relativized Hybrid Quantum Computation} A \emph{relativized circuit} is one that may include query gates, and we say that a circuit \emph{queries} a certain oracle $A$ if the outputs to its queries are consistent with the oracle $A$. A circuit may be consistent with many oracles; for example, a circuit that makes no queries is consistent with every oracle. Later on, we will show that if the queries of a circuit are consistent with a certain oracle, then it has a very low probability of success. We define $\cclass{HQC}^A$ and $\cclass{JC}^A$ by replacing the classical and quantum tiers with relativized classical and quantum tiers respectively. Put differently, we modify the gate set for the classical and quantum tiers to include query gates to $A$---the classical tiers make classical queries while the quantum tiers make quantum queries. \subsubsection{Relativized Conjecture~\ref{conj:folklore-formal}} Relativized Conjecture~\ref{conj:folklore-formal} states that Conjecture~\ref{conj:folklore-formal} is true relative to all oracles. \begin{conjecture} \label{conj:folklore-rel} For all oracles $A$, it holds that $\cclass{HQC}^A = \cclass{BQP}^A$. \end{conjecture} Aaronson~\cite{Aaronson11, Aaronson14} conjectured that a weak version of Conjecture~\ref{conj:folklore-rel} is false. \begin{conjecture}[Aaronson~\cite{Aaronson11, Aaronson14}] There exists an oracle $A$ such that $\cclass{BQP}^A \not\subseteq (\cclass{BPP}^\cclass{BQNC})^A$. \end{conjecture} \subsection{The Welded Tree Problem}\label{subsec:weldedtree} In this subsection, we review the \emph{Welded Tree Problem} of Childs et al.~\cite{ChildsCDFGS03}. We introduce the class of graphs we will consider, show how to turn them into black-boxes, and finally define the black-box problem we will consider. \subsubsection{Welded Trees} \begin{figure}[h] \centering \begin{tikzpicture}[scale=1] \GraphInit[vstyle=Hasse] \Vertex[x=0,y=0]{A} \node[left, xshift=-2mm] at (A){\textsc{entrance}{}}; \Vertex[x=1,y=1]{B1} \Vertex[x=1,y=-1]{B2} \Vertex[x=2,y=1.5]{C1} \Vertex[x=2,y=0.5]{C2} \Vertex[x=2,y=-0.5]{C3} \Vertex[x=2,y=-1.5]{C4} \Vertex[x=3,y=1]{D1} \Vertex[x=3,y=-1]{D2} \Vertex[x=4,y=0]{E} \node[right, xshift=2mm] at (E){\textsc{exit}{}}; \Edges(A,B1,C1,D1,E) \Edges(A,B1,C2,D1,E) \Edges(A,B2,C3,D2,E) \Edges(A,B2,C4,D2,E) \end{tikzpicture} \caption{An illustration of a $3$-welded tree.} \label{fig:welded-tree} \end{figure} \begin{definition} A \emph{$n$-welded tree} is a combination of two balanced binary trees $L$ and $R$ of height $n$, with the $2^n$ leaves of $L$ identified with the $2^n$ leaves of $R$ in a way such that $R$ is a mirror image of $L$. For an illustration see Figure~\ref{fig:welded-tree}. The leftmost vertex is termed \textsc{entrance}{} and the rightmost vertex is termed \textsc{exit}{}. \end{definition} When $n$ is immediate from context, we will omit the $n$ and refer to the tree as a \emph{welded tree}. \subsubsection{Random Welded Trees} \begin{figure}[h] \centering \begin{tikzpicture}[scale=1] \GraphInit[vstyle=Hasse] \Vertex[x=0,y=0]{A} \node[left, xshift=-2mm] at (A){\textsc{entrance}{}}; \Vertex[x=1,y=1]{B1} \Vertex[x=1,y=-1]{B2} \Vertex[x=2,y=1.5]{C1} \Vertex[x=2,y=0.5]{C2} \Vertex[x=2,y=-0.5]{C3} \Vertex[x=2,y=-1.5]{C4} \Vertex[x=3,y=1.5]{nC1} \Vertex[x=3,y=0.5]{nC2} \Vertex[x=3,y=-0.5]{nC3} \Vertex[x=3,y=-1.5]{nC4} \Vertex[x=4,y=1]{D1} \Vertex[x=4,y=-1]{D2} \Vertex[x=5,y=0]{E} \node[right, xshift=2mm] at (E){\textsc{exit}{}}; \Edges(A,B1,C1,nC4,D2,E) \Edges(A,B1,C2,nC1,D1,E) \Edges(A,B2,C3,nC3,D2,E) \Edges(A,B2,C4,nC2,D1,E) \Edges(nC4, C3) \Edges(nC3, C2) \Edges(nC1, C4) \Edges(nC2, C1) \end{tikzpicture} \caption{An illustration of a random $3$-welded tree $T_3$.} \label{fig:random-welded-tree} \end{figure} \begin{definition} A \emph{random $n$-welded tree} $T_n$ is a combination of two balanced binary trees $L$ and $R$ of height $n$ by connecting the leaves via a random cycle of edges which alternates between the leaves of $L$ and the leaves of $R$. For an illustration, see Figure~\ref{fig:random-welded-tree}. As with $n$-welded trees, we term the leftmost vertex \textsc{entrance}{} the rightmost vertex \textsc{exit}{}. Notice that the \textsc{entrance}{} and \textsc{exit}{} vertices are distinguished as they are the only vertices with degree $2$. \end{definition} \subsubsection{Graphs with Black-Box Access} In this paper, welded tree graphs are objects which our algorithm will only have access to via a black-box which it can query about the neighbors of a given vertex. To stay consistent with \cite{ChildsCDFGS03} we are also going to assume that the graphs are edge-coloured. For this problem, we can pick an $9$-edge coloring that does not make the problem easier (ie preserves the output probability in expectation over colourings). Following Childs et al.~\cite{ChildsCDFGS03}, we pick a colouring as follows. Arbitrarily label the vertices in odd columns with colors $\{1,2,3\}$ and arbitrarily label the vertices in even columns with colors $\{A,B,C\}$. Then there is an induced edge coloring as follows: an edge joining an $X$-coloured vertex to a $Y$-coloured vertex has color $XY$. For example, an edge joining a $1$-coloured vertex and an $A$-coloured vertex has color $1A$. \begin{definition} A \emph{$(n, \Xi)$-black-box graph} $G$ is a $\Xi$-edge coloured graph with $O(n)$ vertices whose vertices are uniquely encoded by bit strings of length $2n$. We say that a $2n$-bit string is \emph{valid} with respect to $G$ if it is the label of a vertex in $G$. \end{definition} Notice that a graph may have many different corresponding black-box graphs. Moreover, since the graph only has $O(2^n)$ vertices, $n+O(1)$ bits are enough to give every vertex a unique label. But we chose $2n$-bit labels so that there are exponentially more labels than there are vertices. Later on, this fact is used to argue that it is hard for an adversary to guess a valid label. In this paper, we will only consider a restricted class of black-box graphs, ones corresponding to random $n$-welded trees with some additional structure. \begin{definition} A \emph{random $n$-welded black-box tree} $T$ is a $(n,9)$-black-box graph with the following additional structure. \begin{enumerate} \item $T$ is a random $n$-welded tree. \item The \textsc{entrance}{} vertex has the label $0 \cdots 0$. \item The label $1 \cdots 1$ is not used for a valid vertex. We will henceforth refer to this string by the name $\texttt{INVALID}$. \end{enumerate} \end{definition} We now define how to query a black-box. \begin{definition} A \emph{query} $K_T$ to a random $n$-welded black-box tree $T$ black-box tree is defined as \begin{equation} K_T(x, c) \coloneqq \begin{cases} \text{$c$-neighbour of $x$}, & \text{$x$ is a valid vertex with a $c$-neighbour}\\ \texttt{INVALID}, & \text{otherwise} \end{cases} \end{equation} where $x \in \{0,1\}^{2n}$, $c$-neighbour of $x$ (the vertex joined to $x$ by an edge with color $c$) is a $2n$-bit string, and $\texttt{INVALID}{} \coloneqq 1 \cdots 1$. We define this as a unitary as \begin{equation}\label{eq:oracleregister} K_T \ket{x} \ket{c} \ket*{0^{2n}} \mapsto \ket{x} \ket{c} \ket{y} \end{equation} where $x \in \{0,1\}^{2n}$, $c \in \{1,\dots,9\}$, and $y \in \{0,1\}^{2n}$ is the label of the $c$-neighbour of $x$. \end{definition} \begin{remark} The quantum algorithm in Childs et al.~\cite{ChildsCDFGS03} does not make any queries with a superposition over the colours' register, so we can assume that we have $9$ unitaries---one for each colour---representing a query. \end{remark} \begin{definition}[querying a welded black-box tree] \label{def:query-black-box-tree} We say that a relativized circuit $C$ queries a random $n$-welded black-box tree $T$, denoted by $C(T)$, if all its queries $K_n$ can be replaced by queries $K_T$ to $T$. This is generalized to families \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded black-box trees, where $T_n$ is a random $n$-welded black-box tree, by induction. \end{definition} \begin{definition}[querying a welded tree]\label{def:query-tree} Let $T$ be a random $n$-welded tree, and let $C(T')$ be a relativized circuit that queries a random $n$-welded black-box tree $T'$ corresponding to $T$. We define \begin{equation}\label{eq:output-prob} \Pr[C(T)] \coloneqq \dsPr_{T'}[\text{$C(T')$ returns the label of }\textsc{exit}], \end{equation} where the probability is over all random $n$-welded black-box trees $T'$ corresponding to $T$. Put differently, the probability is over all $2n$-bit labellings of the graph $T$. With this notation in place, we can say, \emph{a circuit $C(T)$ queries a random $n$-welded tree $T$} and it is understood that we take the output probability over all random $n$-welded black-box trees $T'$ corresponding to $T$. \end{definition} \begin{lemma}[Lemma 4 in Childs et al.~\cite{ChildsCDFGS03}] \label{lem:discovery-probability} The probability that an algorithm, which makes at most $h$ queries to a random $n$-welded tree, can discover the label of a vertex that was not the result of a query is at most \begin{equation} h \frac{2^{n+2} - 2}{2^{2n}}. \end{equation} \end{lemma} \begin{proof} Since we are gluing two height-$n$ binary trees each of which has $2 \cdot 2^n$ vertices, there are $4 \cdot 2^n = 2^{n+2}$ valid labels. We know the location of the \textsc{entrance}{} label and the label $\texttt{INVALID} = 1 \cdots 1$ is not used, so the number of unknown labels is $2^{n+2} - 2$. Since the valid labels are uniformly distributed over the space of $2n$-bit strings, we get the desired result. \end{proof} \subsubsection{The Welded Tree Problem} Given a family \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded black-box trees, where $T_n$ is a random $n$-welded black-box tree, we define the welded tree problem relative to $T$ as follows. \begin{table}[H] \centering $\textsc{Welded Tree Problem}(T)$\\[2mm] \begin{tabular}{rl} Input: & $0^n$ for some $n \in \ensuremath{\mathbb{N}}$.\\[1mm] Output: & The label of the \textsc{exit}{} vertex in $T_n$. \end{tabular} \end{table} \paragraph{Search versus Decision} Since the classes we want to prove lower bounds against ($\cclass{HQC}^i$ and $\cclass{JC}^i$) are closed under repeating an algorithm $O(n)$ times in parallel, the above mentioned search variant is equivalent to the following decision variant of this problem. \begin{table}[H] \centering $\textsc{Decision Welded Tree Problem}(T)$\\[2mm] \begin{tabular}{rl} Input: & $0^n$ for some $n \in \ensuremath{\mathbb{N}}$ and $i \in \{1,\dots,n\}$.\\[1mm] Output: & $i$th bit of the label of the \textsc{exit}{} vertex in $T_n$. \end{tabular} \end{table} So, in the remainder of the paper, we restrict our attention to the search variant. \paragraph{Query Length Equals Input Length} We assume that given an $n$-bit string as input, a quantum algorithm only queries $T_n$ and not $T_m$ for any $m \neq n$. This is without loss of generality---the idea is to replace a circuit $Q$ with an new circuit $R$ in which all queries to $T_m$ for $m \neq n$ are hardcoded to $\texttt{INVALID}$. From the description of our problem, it is immediate that the success probability of $Q$ is no greater than $R$. \subsubsection{Quantum Algorithm for the Welded Tree Problem} Childs et al.~\cite{ChildsCDFGS03} gave an efficient quantum algorithm for the \textsc{Welded Tree Problem} using quantum walks. \begin{theorem}[Childs et al.~\cite{ChildsCDFGS03}] Given a family \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded black-box trees, where $T_n$ is a random $n$-welded black-box tree, There is a quantum algorithm for the $\textsc{Welded Tree Problem}(T)$ which takes $\cclass{poly}(n)$ time and outputs the correct answer (the label of the \textsc{exit}{} vertex) with probability greater than $2/3$. Succinctly, $\textsc{Welded Tree Problem}(T) \in \cclass{BQP}^T$. \end{theorem} \subsubsection{Classical Lower Bound for the Welded Tree Problem} Childs et al.~\cite{ChildsCDFGS03} also gave the first classical lower bound for the \textsc{Welded Tree Problem}, which we use as a key tool in our proof. To be precise, we will use the following version of the lower bound, due Fenner and Zhang~\cite{FennerZ03}, who gave an improved analysis. \begin{theorem}[Childs et al.~\cite{ChildsCDFGS03} and Fenner and Zhang~\cite{FennerZ03}] \label{thm:class-lower-bound} Given a family \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded black-box trees, where $T_n$ is a random $n$-welded black-box tree. For sufficiently large $n$, any classical algorithm for the $\textsc{Welded Tree Problem}(T)$ that makes at most $2^{n/3}$ queries outputs the correct answer (the label of the \textsc{exit}{} vertex) with probability at most $O(n2^{-n/3})$. \end{theorem} \subsection{Some Definitions and Assisting Results} \subsubsection{Distances Between States} \begin{definition} Given two quantum states \begin{equation} \ket{\psi} \coloneqq \sum_x \alpha_x\ket{x} \quad\text{and}\quad \ket{\varphi} \coloneqq \sum_x \beta_x\ket{x}, \end{equation} define the \emph{1-norm distance} between them as \begin{equation} \tnorm{\ket{\psi} - \ket{\varphi}} \coloneqq \sum_x\abs{\alpha_x - \beta_x}. \end{equation} \end{definition} \begin{definition} Given two probability distributions $P$ and $Q$, define the \emph{1-norm distance} between them as \begin{equation} \tnorm{P - Q} \coloneqq \sum_x \abs{P(x) - Q(x)}. \end{equation} \end{definition} \subsubsection{Intermediate Quantum States} We are going to define a set of quantum states corresponding to the cross-section of quantum tiers querying a $1$-random $n$-welded tree. \begin{definition}[state at depth $\ell$]\label{def:psi-t} Let $Q(T)$ be a $(m,m,d)$-quantum tier, with input state $\ket{\psi_0}$, and querying a random $n$-welded tree $T$. We define the state at depth $\ell$, denoted by $\ket{\psi_\ell}$, to be the state produced by the first $\ell$ consecutive layers of $Q(T)$ acting on $\ket{\psi_0}$. \end{definition} \section{The Case of Few Tiers}\label{sec:few-tiers} In this section, we will give a query lower bound for $(n, \eta, 4^d, d, \cclass{poly}(n))$-hybrid quantum circuits solving the welded tree problem. But our lower bound leads to a separation against $\cclass{BQP}$ only when $d \in \cclass{polylog}(n)$ and $\eta < \sqrt{n}$. In other words, this only allows us to separate ``$\cclass{FewTierHQC}$'' ($\cclass{HQC}$ where the hybrid quantum circuits are restricted to have at most $\sqrt{n}$ tiers) from $\cclass{BQP}$. Our proof has two parts. First, we show that any $(n, \eta, 4^d, d, g)$-hybrid quantum circuit can be simulated by a classical algorithm that makes at most $4^{\eta(d+1)} (g \cdot d)$ oracle queries. Second, we combine this result with the classical lower bound for the welded tree problem (Theorem~\ref{thm:class-lower-bound}) to obtain the query lower bound. The first part of the proof is formalized in the following Theorem which is the technical heart of our proof. \begin{theorem}\label{thm:classical-sim} Let $C(T)$ be an $(n, \eta, 4^d, d, g(n))$-hybrid-quantum circuit that queries a random $n$-welded tree $T$. Then there exists a classical algorithm $\mathcal{A}(T)$ making \begin{equation} 4^{\eta(d+1)} (g(n) \cdot d) \end{equation} queries (and running in $\cclass{exp}(n)$ time) such that the output probabilities of $C(T)$ and $\mathcal{A}(T)$ differ in $1$-norm error by \begin{equation} 4^{(\eta+2)(d+2)} (g(n))^2 \cdot \frac{2^{n+2}-2}{2^{2n}}, \end{equation} where the output probabilities of $C(T)$ and $\mathcal{A}(T)$ are defined over all possible labellings of the tree $T$. \end{theorem} Using Theorem~\ref{thm:classical-sim} we can prove the following adaptive quantum query lower bound via an appeal to the classical query lower bound for the \textsc{Welded Tree Problem} (Theorem~\ref{thm:class-lower-bound}). \begin{theorem} \label{thm:adaptive-query-lower-bound} Let $T$ be a random $n$-welded black-box tree, and let $C(T)$ be a $(n,\eta,4^d,d,g(n))$-hybrid-quantum circuit that queries a random $n$-welded tree $T$, such that \begin{equation} 2(\eta + 2) (d + 2) + 2\log g(n) + 2 < n/2. \end{equation} Then, for sufficiently large $n$, $C(T)$ finds the $\textsc{exit}$ with probability at most \begin{equation} O(n2^{-n/3}). \end{equation} \end{theorem} \begin{proof} Using Theorem~\ref{thm:classical-sim} we can replace $C(T)$ with the corresponding classical algorithm $\mathcal{A}(T)$ that makes at most \begin{equation} 4^{\eta (d+1)} (g(n) \cdot d) \leq 2^{2\eta (d+1) + 2\log g(n)} \end{equation} queries with at most \begin{align} 4^{(\eta+2)(d+2)} (g(n))^2 \cdot \frac{2^{n+2}-2}{2^{2n}} &\leq \frac{2^{2(\eta+2) (d+2) + 2\log g(n) + n + 2}}{2^{2n}}\\ &\leq \frac{2^{n/2 + n}}{2^{2n}}\\ &\leq \frac{1}{2^{n/2}}\\ &= O(2^{-n/2}). \end{align} loss in acceptance probability. Also, by assumption, we have \begin{equation} 2^{2\eta (d+1) + 2\log g(n)} < 2^{n/2}. \end{equation} Therefore by application of the classical lower bound (Theorem~\ref{thm:class-lower-bound}), it follows that, for sufficiently large $n$, the algorithm succeeds---that is, finds the \textsc{exit}{}---with probability at most \begin{equation} O(n2^{-n/3}) + O(2^{-n/2}) = O(n2^{-n/3}), \end{equation} as desired. \end{proof} \begin{theorem}[Formal version of Theorem~\ref{thm:few-tier-informal}] \label{thm:few-tier-formal} Given a family \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded trees, where $T_n$ is a random $n$-welded tree. For all but finitely many choices of $n$, no $\cclass{FewTierHQC}$ algorithm succeeds in deciding the $\textsc{Welded Tree Problem}(T)$ with probability higher than $O(n2^{-n/3})$ (where the output probability is taken over all labellings as defined in Definition~\ref{def:query-tree}.) \end{theorem} \begin{proof} Suppose that \begin{equation} \H(T) = \{H_n : n \in \ensuremath{\mathbb{N}} \}, \end{equation} is a $\cclass{FewTierHQC}$ algorithm. Then, by definition, $\H(T)$ is a $\cclass{FewTierHQC}^i$ algorithm for some $i$. More precisely, $\H(T)$ is a polynomial-time uniform family of $(n, \eta(n), 4^{d(n)}, d(n), g(n))$-hybrid-quantum circuits, for some functions $\eta(n) < \sqrt{n}$, $g(n) \in \cclass{poly}(n)$, and $d(n) \in O(\log^i(n))$, querying $T$. By the assumption that $\H(T)$ is a polynomial-time uniform family, it follows that for all but finitely many choices of $H_n$, the parameters $\eta(n)$, $d(n)$, and $g(n)$ satisfy the relation \begin{equation} 2(\eta(n) + 2) (d(n) + 2) + 2\log g(n) + 2 < n/2. \end{equation} Thus by Theorem~\ref{thm:adaptive-query-lower-bound} we get that for all but finitely many choices of $n$, $H_n$ succeeds with probability at most $O(n2^{-n/3})$. Therefore it follows that with probability $1$, $\H(T)$ fails to decide $\textsc{Welded Tree Problem}(T)$. \end{proof} The remainder of this section is devoted to a proof of Theorem~\ref{thm:classical-sim}. \begin{definition} Given a $(n,\eta,4^d,d,g)$-hybrid-quantum circuit $C(T)$, for $\zeta \leq \eta$, let $C_\zeta(T)$ be the $\zeta$th tier of $C(T)$ (whether that tier be quantum or classical); for $\zeta \leq \eta$, let $C^\zeta(T)$ be the hybrid-quantum circuit corresponding to the first $\zeta$ tiers of $C(T)$. \end{definition} \subsection{Outline of Proof of Theorem~\ref{thm:classical-sim}} Given an $(n,\eta,4^d,d,g)$-hybrid-quantum circuit $C(T)$ we define a simulation algorithm $\mathcal{A}(T)$ below. First, we will need to recall a few definitions. Let $Q(T)$ be a quantum tier in $C(T)$. For a particular input bitstring $x$ to $Q(T)$, recall that $\ket{\psi_\ell}$ denotes the state at depth $\ell \leq d$ of $Q(T)$ as in Definition~\ref{def:psi-t}. We wish to prove that, for every such input $x$, the output distribution of $\mathcal{A}(T)$ is close to the output distribution of $C(T)$ in trace distance. Therefore, we fix an arbitrary input $x$ at this point and will suppress the appearance of $x$ in our notation for the remainder of the proof. While it may be impossible to compute a classical description of $\ket*{\psi_{d}}$ using only polynomially many \emph{classical} queries to $T$, the intuition behind our classical simulation $\mathcal{A}(T)$ of $C(T)$ will instead be, at each depth $\ell \leq d$, to maintain a classical description of a different quantum state $\ket{\phi_\ell}$ which will be a close approximation of the state $\ket{\psi_\ell}$ in trace distance. The state $\ket{\phi_\ell}$ will be defined inductively by the algorithm $\mathcal{A}(T)$ beginning with the initial condition $\ket{\phi_0} \coloneqq \ket{\psi_0} \coloneqq \ket{x}$ and proceeding with the simple update rule that $\mathcal{A}(T)$ faithfully classically simulates (with exponential time, but just a polynomial number of classical queries) everything that $Q(T)$ does in layer $\ell$, except for the points at which $Q(T)$ queries the black-box $T$ at an input bitstring which is not among the "previously known vertices" (defined later), in which case $\mathcal{A}(T)$ refrains from querying $T$ and simply assumes (without justification) that the output of that query will be $\texttt{INVALID}$. As we will see below, this strategy allows $\mathcal{A}(T)$ to maintain a close approximation $\ket{\phi_\ell}$ of $\ket{\psi_\ell}$ while only making a polynomial number of \emph{classical} queries to $T$. \subsection{The Low-Tier Simulator} \begin{algorithm}[h] \tcc{Simulates $C^i(T)$ by composing the individual simulations of each of the first $i$ tiers of $C(T)$.} \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized circuit $C(T)$ and blackbox $T$} \Output{Simulated output of $C^i(T)$, in register $\mathtt{OUT}$; set $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$} \tcc{initialization} $V_{\text{known}} \gets \text{empty dictionary}$\; Query the $\textsc{entrance}{}$ vertex to get output $S$\; Set $V_{\text{known}}(\textsc{entrance}{}) \gets S$\;\label{line:abuse-of-notation} $x \gets 0^n$\; \tcc{main loop} \For{each $j \in \{0,\dots,i\}$}{ \uIf{$C_j$ is a quantum tier} { $x,V_{\text{known}} \gets \textrm{QuantumTierSimulator}(C_j, x, V_{\text{known}}, T$) }\uElse{ $x,V_{\text{known}} \gets \textrm{ClassicalTierSimulator}(C_j, x, V_{\text{known}}, T$) } } \Return $x, V_{\text{known}}$ \caption{$i$th-level ClassicalSimulationWrapper: $\mathcal{A}^i$} \label{alg:classicalsim1} \end{algorithm} \begin{definition} A \emph{dictionary} data structure is a set of key-value pairs indexed by keys. In other words, a dictionary $D$ has the form \begin{equation} D = \{(x_1,y_1), (x_1,y_1), \dots\}. \end{equation} We could also look at the dictionary as a mapping \begin{equation} D(x_i) \coloneqq y_i, \end{equation} for each $i$. \end{definition} \begin{definition}[$V_{\text{known}}$] The dictionary $V_{\text{known}}$ has keys $x_i$, which are $2$-tuples $(v,c) \in \{0,1\}^n \times \{1,...,9\}$. We store in $V_{\text{known}}(v,c)$ the vertex label of the $c$-neighbour of $v$. By default, the value in $V_{\text{known}}(v,c)$ is $\texttt{INVALID}$.\footnote{One could implement this data structure is in a succinct way using a \emph{hash map} and an \texttt{if}-statement---check if the passed-in index $(v,c)$ is in the key-set of the hash map; if in the hash map, output the corresponding value; otherwise, output \texttt{INVALID}{}.} Sometimes, abusing notation, we set $V_{\text{known}}(v)$ to the output of querying a vertex $v$ (like in Line~\ref{line:abuse-of-notation} of Algorithm~\ref{alg:classicalsim1}), by this we mean that we query $(v,c)$ for each $c$ to get the label of the $c$-neighbour of $v$ (which can be $\texttt{INVALID}$) and then set $V_{\text{known}}(v,c)$ to be that label. \end{definition} \begin{definition} Let $\mathcal{A}^i(T)\vert_{\mathtt{OUT}}$ denote a modification of the algorithm $\mathcal{A}^i(T)$ which only outputs the value in the $\mathtt{OUT}$ register. In other words, $\mathcal{A}^i(T)\vert_{\mathtt{OUT}}$ returns only $x$, rather than $(x, V_{\text{known}})$. \end{definition} Before giving the tier simulation subroutines, we need the following definition. \begin{definition} Let $L$ be a classical or quantum layer in a relativized circuit $Q(T)$. We can divide $L$ into two disjoint layers, one called $L^{T}$ which applies all of the black-box query gates in $L$ in parallel, and one called $L^{G}$, which applies every other gate in $L$ in parallel. Moreover, one can split $L$ into $L^T$ and $L^G$ in linear time. \end{definition} \subsection{Pseudocode for the Few-Tier Simulator} \label{subsec:pseudocode-for-few-tier-algorithm} The pseudocode for the low-tier simulator in given in Algorithms~\ref{alg:SimulateOracle}, \ref{alg:QuantumLayerSimulator}, \ref{alg:QuantumTierSimulator}, and \ref{alg:ClassicalTierSimulator}. The analysis of the algorithm and the proof of Theorem~\ref{thm:few-tier-formal} have been relegated to Section~\ref{sec:analysis-of-few-tier-simulator}. \begin{algorithm}[h] \tcc{Simulates a black-box query by making black-box queries to vertices in $V_{\text{known}}$ and assuming that the output to queries made to vertices not in $V_{\text{known}}$ is $\texttt{INVALID}$.} \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Dictionary $V_{\text{known}}$ of known vertices, blackbox $T$, and quantum layer $L^T$ solely composed of query gates} \Output{Array $S(z)$ of bitstrings and dictionary $V_{\text{known}}$ of currently known vertices} Initialize $V_{\text{known}}^{temp} \gets V_{\text{known}}$\; \For{each bitstring $z$ which has length equal to the input register of $L^T$} { Initialize $z_{temp} \gets z$\; \For{each query gate $K$ in $L^T$} { Let $z_K$ be the substring of $z$ which lies in the input register of $K$\; Let $z_{K,x}, z_{K,c}, z_{K,y}$ be the three disjoint substrings of $z_K$ corresponding to the $x$-register, $c$-register, and $y$-register (respectively) of the input to gate $K$, as defined in Equation \eqref{eq:oracleregister}\; \uIf{$V_{\text{known}}(z_{K,x}, z_{K,c})$ exists}{ Compute $z_{out} \coloneqq K(z)$ without any queries to $T$, by starting with $z_{temp}$, and replacing the substring $z_{K,y}$ in $z$ with the substring $V_{\text{known}}(z_{K,x},z_{K,c})$\; Set $z_{temp} \gets z_{out}$\; } \uElseIf{$z_{K,x} == V_{\text{known}}(\alpha, \beta)$ for some $\alpha, \beta$}{ Then, use one classical query to $T$ to set $V_{\text{known}}^{temp}(z_{K,x},z_{K,c}) \gets T(z_{K,x},z_{K,c})$\; Compute $z_{out} \coloneqq K(z)$ by starting with $z_{temp}$, and replacing the substring $z_{K,y}$ in $z$ with the substring $V_{\text{known}}^{temp}(z_{K,x}, z_{K,c})$\; Set $z_{temp} \gets z_{out}$\; } \Else{ Compute $z_{out} \coloneqq K(z)$ without any queries to $T$, by starting with $z_{temp}$, and replacing the substring $z_{K,y}$ in $z$ with the substring $\texttt{INVALID}$\; Set $z_{temp} \gets z_{out}$\; } } Set $S(z) \gets z_{temp}$\; } Set $V_{\text{known}} \gets V_{\text{known}}^{temp}$\; \Return $S, V_{\text{known}}$ \caption{SimulateOracle} \label{alg:SimulateOracle} \end{algorithm} \begin{algorithm}[h] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Quantum layer $L$, input quantum state $\ket{\psi}$, dictionary $V_{\text{known}}$ of known vertices, and blackbox $T$.} \Output{Simulated output of $L$ on input $\ket{\psi}$ and dictionary $V_{\text{known}}$ of currently known vertices.} Split $L$ into a query layer $L^T$ and a non-query layer $L^G$\; Compute $\ket{\phi} \gets L^G\ket{\psi}$ (in exponential time) without any queries\label{algline:phi}\; Expand $\ket{\phi}$ in the classical basis as $\ket{\phi} = \sum_z c_z \ket{z}$\; Compute $S, V_{\text{known}}' \gets \textrm{SimulateOracle}(V_{\text{known}}, T, L^T)$% \label{algline:vknown-prime}\; Define $\ket{\psi'} \gets \sum_z c_z \ket{S(z)}$\label{algline:psi-prime}\; \tcc{Note that $\ket{S(z)}$ is a bitstring for all $z$, by definition of $\textrm{SimulateOracle}$.} \Return $\ket{\psi'}, V_{\text{known}}'$ \caption{QuantumLayerSimulator} \label{alg:QuantumLayerSimulator} \end{algorithm} \begin{algorithm}[h] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized circuit $Q(T)$, input $x$, dictionary $V_{\text{known}}$ of known vertices, and blackbox $T$} \Output{Simulated output of $Q(T)$ on input $x$, in register $\mathtt{OUT}$, and dictionary $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$} Initialize $\ket{\psi_0} \gets \ket{x}$\; Initialize $V_{\text{known}}^0 \gets V_{\text{known}}$\; Let $d$ be the number of layers in $Q(T)$\; Let $L_i$ be the $i$th layer in $Q(T)$\; \For{each $i \in \{1, \dots, d \}$} { $\ket{\psi_i}, V_{\text{known}}^i \gets \textrm{QuantumLayerSimulator}(L_i, \ket{\psi_{i-1}}, V_{\text{known}}^{i-1}, T)$ \label{algline:quantumlayersimulator-output}\; } Set $V_{\text{known}} \gets V_{\text{known}}^d$\; Let $x$ be the output of a classical basis measurement on $\ket{\psi_d}$\; \Return $x, V_{\text{known}}$ \caption{QuantumTierSimulator} \label{alg:QuantumTierSimulator} \end{algorithm} \begin{algorithm}[h] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized circuit $C(T)$, input $x$, set $V_{\text{known}}$ of known vertices, and blackbox $T$} \Output{Simulated output of $C(T)$ on input $x$, in register $\mathtt{OUT}$, and set $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$} Initialize $w_0 \gets x$\; Let $\eta$ be the number of layers in $C(T)$\; Let $L_i$ be the $i$th layer in $C(T)$\; \For{each $i \in \{1, \dots, \eta \}$} { Factorize $L_i$ into a query layer $L^T_i$ and a non-query layer $L^G_i$\; Compute $u_i \gets L_i^Gw_{i-1}$ without any queries\; Compute $w_i, V_{\text{known}} \gets \textrm{SimulateOracle}(u_i, V_{\text{known}}, T, L^T)$\; } \Return $w_\eta, V_{\text{known}}$ \caption{ClassicalTierSimulator} \label{alg:ClassicalTierSimulator} \end{algorithm} \section{Relativized Jozsa's Conjecture}\label{sec:relat-jozs-conj} In this section, we will give a query lower bound for $(n, 2d, c(n), d, g(n))$-jozsa quantum circuits solving the welded tree problem. The organization of the proof is similar to the previous section. First, we show that any $(n, 2d, c(n), d, g)$-jozsa quantum circuit can be simulated by a classical algorithm that makes at most $4^d + c(n)g(n)$ oracle queries. Second, we combine this result with the classical lower bound for the welded tree problem (Theorem~\ref{thm:class-lower-bound}) to obtain the query lower bound. The first part of the proof is formalized in the following Theorem which is the technical heart of our proof. \begin{theorem}\label{thm:jozsa-classical-sim} Let $C(T)$ be an $(n, 2d, c(n), d, g(n))$-jozsa-quantum circuit that queries a random $n$-welded tree $T$. Then there exists a classical algorithm $\mathcal{A}(T)$ making at most \begin{equation} 4^d + c(n) g(n) \end{equation} queries (and running in $\cclass{exp}(n)$ time) such that the output probabilities of $C(T)$ and $\mathcal{A}(T)$ differ in $1$-norm error by \begin{equation} 8 c(n) g(n) \cdot 4^{d+1} \cdot \frac{2^{n+2}-2}{2^{2n}}. \end{equation} where the output probabilities of $C(T)$ and $\mathcal{A}(T)$ are defined over all labellings of the tree $T$. \end{theorem} Using Theorem~\ref{thm:jozsa-classical-sim} we can prove the following adaptive quantum query lower bound via an appeal to the classical query lower bound for the \textsc{Welded Tree Problem} (Theorem~\ref{thm:class-lower-bound}). \begin{theorem} \label{thm:jozsa-main} Let $T$ be a random $n$-welded black-box tree, and let $C(T)$ be a $(n, 2d, c(n), d, g(n))$-jozsa-quantum circuit that queries a $1$-random $n$-welded tree $T$, such that \begin{equation} 2\eta d + \log c(n) + \log g(n) + 7 < n/3. \end{equation} Then, for sufficiently large $n$, $C(T)$ finds the $\textsc{exit}$ with probability at most \begin{equation} O(n2^{-n/3}). \end{equation} \end{theorem} \begin{proof} Using Theorem~\ref{thm:jozsa-classical-sim} we can replace $C(T')$ with the corresponding classical algorithm $\mathcal{A}(T')$ that makes $2^{2\eta d}$ queries with at most \begin{align} 8 c(n) g(n) \cdot 4^{d+1} \cdot \frac{2^{n+2}-2}{2^{2n}} &\leq \frac{2^{3 + \log c(n) + \log g(n) + 2(d + 1) + n + 2}}{2^{2n}}\\ &\leq \frac{2^{2d + \log c(n) + \log g(n) + 7 + n}}{2^{2n}}\\ &\leq \frac{2^{n/2 + n}}{2^{2n}}\\ &\leq \frac{1}{2^{n/2}}\\ &= O(2^{-n/2}). \end{align} loss in acceptance probability. Also, by assumption, we have \begin{equation} 2^{2\eta d} c(n)g(n) < 2^{n/3}. \end{equation} Therefore, by application of the classical lower bound (Theorem~\ref{thm:class-lower-bound}), it follows that, for sufficiently large $n$, the algorithm succeeds---that is, finds the \textsc{exit}{}---with probability at most \begin{equation} O(n2^{-n/3}) + O(2^{-n/2}) = O(n2^{-n/3}), \end{equation} as desired. \end{proof} \begin{theorem}[Formal version of Theorem \ref{thm:jozsa-informal}] \label{thm:jozsa-formal} Given a family \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded trees, where $T_n$ is a $1$-random $n$-welded tree. For all but finitely many choices of $n$, no $\cclass{JC}$ algorithm succeeds in deciding the $\textsc{Welded Tree Problem}(T)$ with probability higher than $O(n2^{-n/3})$ (where the output probability is taken over all labellings as defined in Definition~\ref{def:query-tree}.) \end{theorem} \begin{proof} Suppose that \begin{equation} \mathcal{J}(T) = \{J_n : n \in \ensuremath{\mathbb{N}} \}, \end{equation} is a $\cclass{JC}$ algorithm. Then, by definition, $\mathcal{J}(T)$ is a $\cclass{JC}^i$ algorithm for some $i$. More precisely, $\mathcal{J}(T)$ is a polynomial-time uniform family of $(n, 2d, c(n), d \coloneqq \log^i(n), g(n))$-jozsa-quantum circuits, for some polynomials $c(n), g(n)$, querying $T$. By the assumption that $\mathcal{J}(T)$ is a polynomial-time uniform family, it follows that for all but finitely many choices of $J_n$, the parameters $c(n)$, $d \coloneqq \log^i(n)$, and $g(n)$ satisfy the relation \begin{equation} 2d + \log c(n) + \log g(n) + 7 < n/3. \end{equation} This, by Theorem~\ref{thm:jozsa-main}, implies that for all but finitely many choices of $n$, $J_n$ succeeds with probability at most $O(n2^{-n/3})$. Therefore it follows that with probability $1$, $\mathcal{J}(T)$ fails to decide $\textsc{Welded Tree Problem}(T)$. \end{proof} \subsection{Pseudocode for The Jozsa Simulator} The pseudocode for the Jozsa simulator in given in Algorithms~\ref{alg:JozsaClassicalSimulationWrapper} and \ref{alg:QuantumLayerSimulator} which make use of algorithms defined in the previous section. The analysis of the algorithm and the proof of Theorem~\ref{thm:jozsa-classical-sim} have been relegated to Section~\ref{sec:analysis-of-jozsa-simulator}. \begin{algorithm}[h] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized circuit $C(T)$ and blackbox $T$} \Output{Simulated output of $C^i(T)$, in register $\mathtt{OUT}$; set $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$} \tcc{initialization} $V_{\text{known}} \gets \text{empty dictionary}$\; Query the $\textsc{entrance}{}$ vertex to get output $S$\; Set $V_{\text{known}}(\textsc{entrance}{}) \gets S$\; $\ket{\psi_0} \gets 0^n$\; \Return $\textrm{JozsaQuantumTierSimulator}(C_i, \ket{\psi_{i-1}}, V_{\text{known}}^{i-1}, T)$\; \caption{JozsaClassicalSimulationWrapper} \label{alg:JozsaClassicalSimulationWrapper} \end{algorithm} \begin{algorithm}[h] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized circuit $Q(T)$, input $x$, dictionary $V_{\text{known}}$ of known vertices, and blackbox $T$} \Output{Simulated output of $Q(T)$ on input $x$, in register $\mathtt{OUT}$, and dictionary $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$} Initialize $\ket{\psi_0} \gets \ket{x}$\; Initialize $V_{\text{known}}^0 \gets V_{\text{known}}$\; Let $d$ be the number of quantum layers in $Q(T)$\; Let $L_\ell$ be the $\ell$th layer in $Q(T)$\; \For{each $i \in \{1, \dots, \zeta \}$} { \If{$L_i$ is a quantum layer}{ $\ket{\psi_i}, V_{\text{known}}^i \gets \textrm{QuantumLayerSimulator}(L_i, \ket{\psi_{i-1}}, V_{\text{known}}^{i-1}, T)$\; } \Else{ Compute $x$ by measuring the register \texttt{R1} in the classical basis\; Compute $x, V_{\text{known}}^i \gets \textrm{ClassicalTierSimulator}(L_i,x,V_{\text{known}}^{i-1}, T)$\; $\ket{\psi_i} \gets \ket{x}\ket{\psi_{i-1}^{\texttt{R2}}}$ where $\ket{\psi_{i-1}^{\texttt{R2}}}$ is the quantum state on register \texttt{R2}\; } } Set $V_{\text{known}} \gets V_{\text{known}}^{2d}$\; Let $x$ be the output of a classical basis measurement on $\ket{\psi_{\eta}}$\; \Return $x, V_{\text{known}}$ \caption{JozsaQuantumTierSimulator} \label{alg:JozsaQuantumTierSimulator} \end{algorithm} \section{The Information Bottleneck, and the Case of Polynomial Tiers.} \label{sec:hqc} In this section we will introduce a proof technique, which we refer to as the ``Information Bottleneck'', which allows us to extend the results of the previous sections to our main result about $\cclass{HQC}$. \begin{theorem}[Formal Version of Theorem~\ref{thm:mainthm-informal}] \label{thm:mainthm-formal} Given a family \begin{equation} T \coloneqq \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of random welded trees, where $T_n$ is a random $n$-welded tree. For all but finitely many choices of $n$, no $\cclass{HQC}$ algorithm succeeds in deciding the $\textsc{Welded Tree Problem}(T)$ with probability higher than $O(2^{-\Omega(n)})$ (where the output probability is taken over all labellings as defined in Definition~\ref{def:query-tree}.) \end{theorem} We begin by noting that, in the setting of $\cclass{poly}(n)$ tiers, we can assume, without loss of generality, that every tier is a quantum tier because a classical tier of polynomial depth can always be implemented as the composition of polynomially many quantum tiers of logarithmic depth. Recall that the reason that this does not necessarily contain all of $\cclass{BQP}$ is that there is a required measurement of all qubits, in the computational basis, at the end of each tier. For simplicity of notation we will take this interpretation for the remainder of this section. So, we will use the following modification of Definition \ref{def:hybridcircuit}, which we can use, without loss of generality, in this setting of $\cclass{poly}(n)$ tiers. \begin{definition}\label{def:wlog-hybrid-quantum-circuit} Define a \emph{$(n,\eta,q,g)$-hybrid-quantum circuit} to be a composition of $\eta$ circuits \begin{equation} C_1 \circ C_2 \circ \cdots \circ C_\eta \end{equation} such that the following hold. \begin{enumerate} \item $C_1$ is an $(n, g, q)$-quantum tier. \item $C_\eta$ has at least one output. \item For $i > 1$, $C_i$ is an $(g, g, q)$-quantum tier. \end{enumerate} \end{definition} The first step in proving the oracle separation is to augment our previous algorithm for classically simulating a relativized $\cclass{HQC}$ circuit by adding a subroutine called $\textrm{Bottleneck}$ which limits the growth of the set $V_{\text{known}}$ to be polynomial in the number of tiers rather than exponential. The challenge is to do this while also preserving the properties of $V_{\text{known}}$ required for the rest of the algorithm to work. As we will see in the analysis of this algorithm in Section~\ref{sec:analysis-of-bottleneck-simulator}, the key property of $V_{\text{known}}$ that we wish to preserve is the property that, at any point in our simulation algorithm, it is impossible to guess a valid label outside of $V_{\text{known}}$ with better than exponentially small ($2^{-n/100}$) success probability. \subsection{The Bottleneck Algorithm} In this Subsection, we will discuss the algorithm and provide pseudocode for the simulator. The analysis of the algorithm and the proof of Theorem~\ref{thm:mainthm-formal} have been moved to Section~\ref{sec:analysis-of-bottleneck-simulator}. Given a \emph{$(n,\eta, q(n), g(n))$-hybrid-quantum circuit} $C(\cdot)$ where $\eta = \cclass{poly}(n)$, $q(n) = \cclass{polylog}(n)$, and $g(n) = \cclass{poly}(n)$, the outer loop for our new algorithm for simulating $C(T)$ is given in Algorithm~\ref{alg:bottleneck-classicalsim}. \begin{algorithm}[h] \tcc{Simulates $C^i(T)$ by composing the individual simulations of each of the first $i$ tiers of $C(T)$.} \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized circuit $C(T)$ and blackbox $T$} \Output{Simulated output of $C^i(T)$, in register $\mathtt{OUT}$; set $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$} \tcc{base case} \If{$i == 0$}{ Initialize $V_{\text{known}} \gets \text{empty dictionary}$\; Query the $\textsc{entrance}{}$ vertex to get output $S$\; Set $V_{\text{known}}(\textsc{entrance}{}) \gets S$\; Initialize $V_{\text{known}}^{\textit{hist}} \gets V_{\text{known}}$\; $x \gets 0^n$\; \Return $x, V_{\text{known}}, V_{\text{known}}^{hist}$ } \tcc{inductive case} $y, V_{\text{knowninit}}, V_{\text{known}}^{hist} \gets \mathcal{M}^{i-1}(C(T), T)$\; $x,V_{\text{knownfinal}}, V_{\text{known}}^{hist} \gets \textrm{BottleneckQuantumTierSimulator}(C_i, i-1,y, V_{\text{knowninit}}, V_{\text{known}}^{hist}, T$)\; $V_{\text{known}} \gets V_{\text{knownfinal}}$\; \Return $x, V_{\text{known}}, V_{\text{known}}^{hist}$ \caption{$i$th-level ClassicalSimulationWrapper with Bottleneck: $\mathcal{M}^i$} \label{alg:bottleneck-classicalsim} \end{algorithm} The first thing to notice about the new simulation algorithm $\mathcal{M}^i$ is that it now tracks two different sets of ``known vertices'', one called $V_{\text{known}}$, and another called $V_{\text{known}}^{\textit{hist}}$. At any point in this new algorithm $V_{\text{known}}^{\textit{hist}}$ will contain the label and neighbors of every vertex ever queried in the course of the algorithm up to that point. This will serve as an important reference throughout the proof. The set $V_{\text{known}}$, on the other hand, will be modified by $\mathcal{M}^i$, after each simulated tier, to contain just the vertex labels which could be guessed to be valid with probability higher than $2^{-n/100}$ given the output of that tier (plus a select few other labels for technical reasons). Then, when algorithm $\mathcal{M}^i$ begins to simulate each quantum layer, it only treats the vertex labels in $V_{\text{known}}$ as known, rather than all of the labels in the larger set $V_{\text{known}}^{\textit{hist}}$. This modification drastically decreases the amount of ``branching'' that $\mathcal{M}^i$ does while simulating a quantum tier, and this is what allows us to keep the size of $V_{\text{known}}$ (and $V_{\text{known}}^{\textit{hist}}$) from growing too large during the course of $\mathcal{M}^i$. But, the process of updating the new $V_{\text{known}}$ is delicate, and is carried out by the subroutine $\textrm{Bottleneck}$ (Algorithm~\ref{alg:Bottleneck}), which is itself a subroutine of the subroutine $\textrm{BottleneckQuantumTierSimulator}$ (Algorithm~\ref{alg:BottleneckQuantumTierSimulator}) in $\mathcal{M}^i$. \begin{algorithm}[h] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Relativized tier $Q(T)$, number $j$ of the current tier, input $x$, dictionary $V_{\text{known}}$ of currently known vertices, dictionary $V_{\text{known}}^{hist}$ of all vertices ever encountered, and blackbox $T$} \Output{Simulated output of $Q(T)$ on input $x$, in register $\mathtt{OUT}$, dictionary $V_{\text{known}}$ of currently known vertices, in register $\mathtt{VKNOWN}$, and dictionary $V_{\text{known}}^{\textit{hist}}$ of every vertex ever queried, in register $\mathtt{VHKNOWN}$.} Initialize $\ket{\psi_0} \gets \ket{x}$\; Initialize $V_{\text{known}}^0 \gets \textrm{Bottleneck}(j-1, x, V_{\text{known}}^{\textit{hist}}, \{\})$\; \tcc{Here $\{\}$ represents the empty dictionary} Let $d$ be the number of layers in $Q(T)$\; Let $L_\ell$ be the $\ell$th layer in $Q(T)$\; \For{each $\ell \in \{1, \dots, d \}$} { $\ket{\psi_\ell}, V_{\text{known}}^{\text{$\ell$-temp}} \gets \textrm{QuantumLayerSimulator}(L_\ell, \psi_{\ell-1}, V_{\text{known}}^{\ell-1},T)$% \label{algline:newvknown-i}\; Update $V_{\text{known}}^{hist} \gets \textrm{Merge}(V_{\text{known}}^{hist}, V_{\text{known}}^{\ell\text{-temp}})$\; \tcc{Here $\textrm{Merge}$ performs a standard concatenation of two dictionaries.} $V_{\text{known}}^{\ell} \gets \textrm{Bottleneck}(j-1, x, V_{\text{known}}^{hist}, V_{\text{known}}^{\ell\text{-temp}})$\; } Set $V_{\text{known}} \gets V_{\text{known}}^d$\; Update $V_{\text{known}}^{hist} \gets \textrm{Merge}(V_{\text{known}}^{hist}, V_{\text{known}})$\; Let $x$ be the output of a classical basis measurement on $\ket{\psi_d}$\; \Return $x, V_{\text{known}}, V_{\text{known}}^{hist}$ \caption{BottleneckQuantumTierSimulator} \label{alg:BottleneckQuantumTierSimulator} \end{algorithm} One similarity between the two simulators $\mathcal{A}^i$ and $\mathcal{M}^i$ is that the only randomness used in either of them (or in all of $\mathcal{M}^i$) is when they sample from the computational basis elements $\ket{z}$ of a quantum state $\ket{\psi} = \sum_{z}c_z \ket{z}$ according to the probability distribution given by $|c_z|^2$. Since the number of bits in $\ket{z}$ is at most $g(n)$, this process can be done with $ng(n)$ random bits, approximately, but to exponentially good precision in $n$. For conciseness, in our analysis we will ignore this exponentially small error in sampling as it can easily be included in our union bounds, we will simply assume that the sampling is perfect. This step can easily be justified by standard techniques. Since this sampling process is only done once per quantum layer, of which there are only $q(n)$ per quantum tier, it follows that only $n\eta q(n)g(n)$ random bits are required for the entire algorithm $\mathcal{M}^\eta$. For concreteness in the rest of the argument we name this seed randomness $r$ ($\abs{r} \leq n\eta q(n)g(n)$), and we consider $\mathcal{M}^{i}$ to be a deterministic algorithm which is a function of $r$. Note that $\mathcal{M}^i$ only actually uses the first $n\eta g(n)\cdot i$ bits of $r$, which we will denote by $r_{\leq i}$. When necessary we will use the notation $\mathcal{M}^i_{r_{\leq i}}$ to highlight this, although we will omit the $r_{\leq i}$ when it is not relevant. The key subroutine in $\textrm{BottleneckQuantumTierSimulator}$ is called $\textrm{Bottleneck}$. Unlike every other subroutine discussed so far, $\textrm{Bottleneck}$ is able to safely reduce the size of the estimated size of the effective set of explored vertices $V_{\text{known}}$ by leveraging the ``Information Bottleneck" principle to show that some vertex labels in $V_{\text{known}}$ are not, in fact, well correlated with the output of the current quantum tier. Since the labels of those vertices cannot be guessed given the status of the $\cclass{HQC}$ circuit at this tier (except with exponentially small probability) they can be safely removed from $V_{\text{known}}$. \begin{definition} For $a \in \{1,2,3\}$ we will let $\mathcal{M}^i(C(T), T)[a]$ denote the $a^{th}$ element of the tuple $x, V_{\text{known}}, V_{\text{known}}^{\textit{hist}}$ output by $\mathcal{M}^i(C(T), T)$. \end{definition} \begin{definition}\label{def:TVsr} For any $n$, dictionary $V$, and bitstring $s \in \{0,1\}^{g(n)}$, let \begin{equation} \begin{split} \mathcal{T}_{V, s,r_{\leq i}}^i \coloneqq \{ &\text{random $n$-welded black-box trees P such that}\\ &s = \mathcal{M}^i_{r_{\leq i}}(C(P), P)[1]\\ &\text{and P is consistent with $V$} \}. \end{split} \end{equation} When we say $P$ is consistent with $V$, we mean that the black-box tree $P$ and the dictionary $V$ agree on all the labels, colors, and adjacencies specified by $V$. Note that $\mathcal{T}_{V, s,r_{\leq i}}^i$ is a well defined set because $\mathcal{M}^i_{r_{\leq i}}(C(P), P)[1]$ is a deterministic function of $P$ (for the fixed random seed $r$). Let \begin{equation} \begin{split} \mathcal{T}_{V} \coloneqq \{\text{random $n$-welded black-box trees $P$}\phantom{\}.}\\ \text{such that $P$ is consistent with $V$}\}. \end{split} \end{equation} Further, let $\mathcal{T} = \cup_s \mathcal{T}_{\{\}, s, r}$ denote the set of all random $n$-welded black-box trees $P$. Note that every blackbox P is consistent with the empty dictionary $V = \{\}$, so $ \cup_s \mathcal{T}_{\{\}, s, r} = \mathcal{T}$. \end{definition} \begin{definition} For a set of random $n$-welded black-box trees $\mathcal{G}$ we let \begin{equation} \mathbb{P}_{P \in \mathcal{G}} \bigl[ \text{$b$ is a valid label in $P$} \bigr] \end{equation} denote the probability that $b$ is a valid label in $P$ when $P$ is selected uniformly at random from the set $\mathcal{G}$. \end{definition} \begin{algorithm}[H] \SetKwInOut{Input}{Input}\SetKwInOut{Output}{Output} \Input{Index $i$ of current quantum tier, bit string $x$, dictionaries $V_{\text{known}}^{\textit{current}}\subseteq V_{\text{known}}^{\textit{hist}}$ of initially known and finally known vertices respectively} \Output{Dictionary $V_{\text{known}}$ of ``effectively known'' vertices, satisfying $V_{\text{known}}^{\textit{current}}\subseteq V_{\text{known}} \subseteq V_{\text{known}}^{\textit{hist}}$} \If{ $\abs{\mathcal{T}_{V_{\text{known}}^{\textit{current}},x,r_{\leq i}}^i} < 2^{-n(g(n)+\abs{r})} \abs{\mathcal{T}_{V_{\text{known}}^{\textit{current}}}}$ \label{algline:haltifsmall1} }{ $\texttt{ABORT}$ and guess a random label for the $\textsc{exit}$ vertex of the entire welded tree problem on $T$\label{algline:haltifsmall2}\; } Initialize $V_{\text{known}} \gets V_{\text{known}}^{\textit{current}}$\; Our goal is to build $V_{\text{known}}$ into a set satisfying $V_{\text{known}}^{\textit{current}}\subseteq V_{\text{known}} \subseteq V_{\text{known}}^{\textit{hist}}$, and\; \[ \begin{split} \forall b \in \{0,1\}^{2n} \text{ such that $b$ does not appear in }V_{\text{known}}:\\ \mathbb{P}_{P \in \mathcal{T}_{V_{\text{known}}, x, r_{\leq i}}^i} \left [b \text{ is a valid label in P} \right ] \leq 2^{-n/100} \end{split} \]\label{eq:badguess2} \tcc{Note that one can compute the set $\mathcal{T}_{V_{\text{known}}, x, r_{\leq i}}^i$ in doubly exponential time without using any queries to $T$ (in fact that set has nothing to do with $T$). We can then compute the LHS of Equation in line~\ref{eq:badguess2} using the same resources. With this ability we can use the following greedy algorithm to add labels to $V_{\text{known}}$:} \While{Equation in line~\ref{eq:badguess2} \text{ is not true }}{ Compute an arbitrary $b'$ violating Equation in line~\ref{eq:badguess2} (This can be done in doubly exponential time)\; \If{$b'$ does not appear in $V_{\text{known}}^{\textit{hist}}$ \label{algline:guessabort1}}{ $\texttt{ABORT}$ and guess a random label for the $\textsc{exit}$ vertex of the entire welded tree problem on $T$\label{algline:guessabort2}\; } If $b'$ does appear in $V_{\text{known}}^{\textit{hist}}$, then add $b'$ and its children, and edge colors in $V_{\text{known}}^{\textit{hist}}$ to the dictionary $V_{\text{known}}$, and continue\; } \tcc{After the above while loop terminates we conclude the subroutine with the following clean-up step.} Let $V_{\text{known}}^{\text{complete}} \subseteq V_{\text{known}}^{\textit{hist}}$ be the minimum size subtree (rooted at $\textsc{entrance}$) of $V_{\text{known}}^{\textit{hist}}$ which contains $V_{\text{known}}$.\; \tcc{Since $V_{\text{known}} \subseteq V_{\text{known}}^{\textit{hist}}$ and $V_{\text{known}}^{\textit{hist}}$ is a tree rooted at $\textsc{entrance}$ we can compute $V_{\text{known}}^{\text{complete}}$ without any queries to $T$, only look-ups to $V_{\text{known}}^{\textit{hist}}$. We will see in the analysis that this does not adversely increase the size of $V_{\text{known}}$.} $V_{\text{known}} \gets V_{\text{known}}^{\text{complete}}$\label{algline:extendtotree}\; \Return $V_{\text{known}}$ \caption{Bottleneck} \label{alg:Bottleneck} \end{algorithm} \section{Open Problems} We wonder if the black-boxes used in our proof can be constructed based on cryptographic assumptions. \begin{problem} Assuming post-quantum classical indistinguishability obfuscation, is it possible to construct an explicit family \begin{equation} \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of Welded Tree black boxes such that they separate $\cclass{BQP}$ from $\cclass{HQC}$? \end{problem} Further, we wonder if it is possible to quantum-secure-VBB obfuscate these black boxes. \begin{problem} Is it possible to construct an explicit family \begin{equation} \{T_n : n \in \ensuremath{\mathbb{N}}\} \end{equation} of Welded Tree black boxes that can be quantum-secure-VBB obfuscated, such that they separate $\cclass{BQP}$ from $\cclass{HQC}$? \end{problem} \subsection*{Acknowledgements} We thank Richard Cleve, Aram Harrow, John Watrous, and Umesh Vazirani for helpful comments and discussions. MC was supported at the IQC by Canada's NSERC and the Canadian Institute for Advanced Research (CIFAR), and through funding provided to IQC by the Government of Canada and the Province of Ontario. This work was completed at the IQC/University of Waterloo.
\section{Introduction} \label{sec:intro} In various science and engineering fields, one often encounters the problem of reconstructing a signal from phaseless measurements, known as the phase retrieval (PR) problem. Specific applications of PR include X-ray crystallography \cite{miao1999extending}, molecular imaging \cite{shechtman2015phase}, biological imaging \cite{stefik1978inferring} and astronomy \cite{fienup1987phase}. Mathematically, PR is to solve a system of quadratic equations of the form: \begin{equation}\label{eq:pr_problem} b_i=\abs{\innerprod{\ensuremath{\bm{a}}_i,\ensuremath{\bm{x}} }},\quad i=1,\cdots,m, \end{equation} where $\ensuremath{\bm{x}}\in\mathbb{R}^n/\mathbb C^n$ is the unknown signal to be found, the measurements $\ensuremath{\bm{b}} := [b_i]_{1\leq i\leq m}\in \mathbb{R}^m$, and $\ensuremath{\bm{a}}_i\in\ensuremath{\mathbb{R}}^n/\ensuremath{\mathbb{C}}^n$ denotes the measuring vector, forming the $m\times n$ measuring matrix $\bm A := [\ensuremath{\bm{a}}_i]_{1\leq i\leq m}$. Because $e^{j\theta}\ensuremath{\bm{x}}$ with $j:=\sqrt{-1}$ also satisfies \eqref{eq:pr_problem} for all $\theta\in\ensuremath{\mathbb{R}} $, the uniqueness of the phase retrieval problem is defined up to a global phase. $\ensuremath{\bm{A}}$ usually corresponds to the discrete Fourier transform in optics. To consider more general cases, recent works focus more on the generic measurements. The most widely studied generic measuring model is the Gaussian model, i.e. $\ensuremath{\bm{a}}_i$ sampled from independently and identically distributed (i.i.d.) $\mathcal{N}(0,\bm I_n)$ for the real Gaussian model, or $\mathcal{CN}(0,\bm I_n) = \mathcal{N}(0,\bm I_n/2)+ j\mathcal{N}(0,\bm I_n/2)$ for the complex Gaussian model. Under this setting, it has been proved that $m$ should be at least $4n-4$ in complex case or $2n-1$ in real case to ensure uniqueness of solution $\ensuremath{\bm{x}}$. In this sense, $m=2n-1$ and $m=4n-4$ can be regarded as the information-theoretical limits in the real case and the complex case respectively for a PR problem to be uniquely solvable. Although PR has a simple form and wide applications across many fields, solving it meets tremendous difficulties both theoretically and numerically since it has been proved to be NP-hard in general situations \cite{ben2001lectures_s}. \subsection{Prior art} The mainstream classical methods to solve PR are error-reduction algorithms including the Gerchberg-Saxton, hybrid input and output methods, based on constantly alternated projections. However, fundamental mathematical questions about the convergence of these methods still remained unsolved. Recently, a convex formulation of PR was found in \cite{phaselift2015} relying on the so-called matrix-lifting technique, and several methods abbreviated as PhaseLift \cite{phaselift2015,candes2014plift}, PhaseCut \cite{waldspurger2015phase} and CoRK \cite{huang2016phase} were proposed based on this. Many solid guarantees about perfect recovery and convergence have been established for this convex approach, but its large computational complexity makes it unpractical when the signal dimension is large. Another convex formulation was proposed in \cite{goldstein2018phasemax} via PhaseMax, which solved a linear program in the natural parameter space. However, PhaseMax is markedly uncompetitive with other state-of-the-art methods in terms of the empirical recovery rate. More attention was paid to non-convex formulations directly instead of convex relaxation in recent years. Relevant works include Alternating Minimization (AltMin) \cite{netrapalli2013phase}, Wirtinger Flow (WF) \cite{candes2015phase}, Amplitude Flow method (AF) \cite{zhang2016reshaped} and their variants \cite{wang2017taf,raf2018,twf2016outlier}. Specifically, WF is a gradient descent method based on minimizing the following intensity-based loss function: \begin{equation}\label{eq:wfloss} \ell_{\text{WF}}(\ensuremath{\bm{z}}):= \frac{1}{2m}\sum_{i=1}^{m} (|\innerprod{\ensuremath{\bm{a}}_i,\ensuremath{\bm{z}}}|^2-b_i^2)^2 \end{equation} WF with spectral initialization method can recover the original perfectly from $\mathcal{O}(n\log n)$ measurements. Its two variants truncated WF (TWF) and reweighted WF reduce this number to $\mathcal{O}(n)$. Zhang found that better performance can be obtained by minimizing the following amplitude-based loss function: \begin{equation}\label{eq:afloss} \ell_{\text{AF}}(\ensuremath{\bm{z}}):= \frac{1}{2m}\sum_{i=1}^{m} (|\innerprod{\ensuremath{\bm{a}}_i,\ensuremath{\bm{z}}}|-b_i)^2, \end{equation} and this method is known as reshaped WF (RWF). RWF is shown to achieve perfect recovery from $\mathcal{O}(n)$ measurements, which is better than the original WF. RWF is also known as AF since it minimizes the amplitude-based loss function. To further improve the performance of AF, Wang proposed two variants, truncated AF (TAF) and reweighted AF (RAF) which respectively adopt truncating and reweighting operation during gradient researching. In terms of convergence speed and rate of recovery, TAF and RAF exhibit a superior performance over the state-of-the-art methods. However, TAF requires a carefully selected parameter for truncation procedure up the gradient function. The reweighting procedure in RAF also requires designing several parameters to obtain a desired performance. The non-smooth absolute value term in \eqref{eq:afloss} can deteriorate the numerical performance of AF. To tackle this, Pinilla proposed a smoothing conjugate gradient method (PR-SCG) \cite{pinilla2018phase} that adjusts the loss function slightly to make the loss function smooth. PR-SCG is a direct application of smoothing projected gradient method \cite{zhang2009smoothing} in the PR problem. The critical technique of PR-SCG is replacing $\abs{x}$ with a smooth function $\sqrt{\abs{x}^2+\epsilon}$. Then the loss function of PR-SCG becomes: \begin{equation}\label{eq:scgloss} \ell_{\text{PR-SCG}}(\ensuremath{\bm{z}}):= \frac{1}{2m}\sum_{i=1}^{m}\kh{ (\abs{\innerprod{\ensuremath{\bm{a}}_i,\ensuremath{\bm{z}}}}^2 +\epsilon)^{\frac12} -b_i} ^2. \end{equation} Obviously, the optimization problem in PR-SCG is not equivalent to the original problem. A well-selected $\epsilon$ and a diminishing rule for $\epsilon$ is needed to ensure that the adjusted loss function \eqref{eq:scgloss} converge to the original AF loss function \eqref{eq:afloss}. With enough measurements, the state-of-the-art methods empirically achieve perfect recovery using $\mathcal{O}(n)$ measurements under random Gaussian settings. However, all these methods require at least the information-limit number of measurements to ensure this. How to further improve the rate of recovery under the information limit remains to be exploited. \subsection{This work} We construct a novel loss function, which is a natural smooth version of the original amplitude-base loss function. And SAF is proposed based on minimizing such novel heuristic by the gradient descent method with a delicate initialization. This method is simple to implement as it does not need extra operations upon the gradient or loss function as many other state-of-the-art methods do. Theoretical analysis shows that SAF will converge to the global optimum geometrically given $m=\mathcal{O}(n)$ measurements. Numerical simulations show that our SAF approach performs better than the original AF and other state-of-the-art methods in respect with the sampling complexity and time cost. The remainder of ths paper is organized as follows. In Section \ref{sec:method}, we propose the SAF algorithm. Section \ref{sec:theo} gives the theoretical analysis of the proposed method. In section \ref{sec:numr}, various experiments are implemented to compare SAF with other gradient descent solvers. As regards notation used in this paper, the bold capital lowercase letters, e.g. $\ensuremath{\bm{x}},\ensuremath{\bm{z}}$ denote represent vectors. The bold capital uppercase letters such as $\ensuremath{\bm{A}}$ represent matrices. $\ensuremath{\bm{x}}'$ denotes the conjugate transpose of $\ensuremath{\bm{x}}$. $\innerprod{\ensuremath{\bm{x}},\bm y}$ denotes the inner product of vector $\ensuremath{\bm{x}},\bm y$ calculated by $\innerprod{\ensuremath{\bm{x}},\bm y} = \ensuremath{\bm{x}}'\bm y.$ \norm{\ensuremath{\bm{x}}} is the Euclidean norm. The cardinality of the set $\mathcal{I}$ is denoted by $\abs{\mathcal{I}}$. The distance between two vectors up to a global phase is defined as $ \dist{\ensuremath{\bm{x}}_1,\ensuremath{\bm{x}}_2}:= \min_{\theta\in \mathbb{R}} \norm{e^{j\theta}\ensuremath{\bm{x}}_1 -\ensuremath{\bm{x}}_2 }. $ \section{Smooth amplitude flow method} \label{sec:method} The intuition and the principles of SAF will be presented in detail in thsi section. For concreteness, only the real Gaussian model is analyzed. However, with the aid of Wirtinger derivative SAF can be easily applied to the complex model directly. \subsection{The smooth amplitude-based loss function} Similar to PR-SCG, we bring in the smooth function \begin{equation}\label{eq:smoothfunc} g_{k,\epsilon}(x)=\sqrt[k]{\abs{x}^k+\epsilon^k}, \end{equation} where $k\geq2,\epsilon>0$. Since only replacing $\abs{\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}}$ with $g_{k,\epsilon}(\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}})$ in the original loss function \eqref{eq:afloss} will lead to a loss function with different global optimum, we consider replacing the $b_i$ in \eqref{eq:afloss} with $g_{k,\epsilon}(b_i)$ symmetrically. In addition, we set $\epsilon$ to be the proportional to $b_i$. As a result, we obtain the following globally smooth loss function: \begin{equation}\label{eq:safloss} \ell_{\text{SAF}}(\ensuremath{\bm{z}}):= \frac{1}{2m}\sum_{i=1}^{m}\ell_i(\ensuremath{\bm{z}}),\quad \ell_i(\ensuremath{\bm{z}})= \kh{g_{k, \gamma b_i}(\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}) - g_{k,\gamma b_i}(b_i) } ^2, \end{equation} where $k\geq 2,\gamma>0$ are preselected parameters. The utilization of the smooth function \eqref{eq:smoothfunc} makes the original amplitude-based loss function \eqref{eq:afloss} smooth. Therefore, our method is called the smooth amplitude flow method, abbreviated as SAF. When $\gamma=0$, $\ell_{\text{SAF}}(\ensuremath{\bm{z}})$ degenerates to the original non-smooth loss function \eqref{eq:afloss}. Obviously, the original AF loss function and the SAF loss function \eqref{eq:safloss} have the same global minimizers that satisfy $\abs{\innerprod{\ensuremath{\bm{a}}_i,z}} = b_i$, for $i=1,\cdots,m$. The gradient of the loss function \eqref{eq:safloss} is \begin{equation}\label{eq:safgrad} \nabla \ell_{\text{SAF}}(\ensuremath{\bm{z}}) = \frac{1}{m}\sum_{i=1}^{m} \kh{g_{k, \gamma b_i}(\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}) - g_{k,\gamma b_i}(b_i) } (|\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}|^k+\gamma^kb_i^k)^{\frac 1k-1}\abs{\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}}^{k-2}\ensuremath{\bm{a}}_i\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}. \end{equation} It is hard to analytically determine the best setting of parameters $k$ and $\gamma$. Therefore we simply take $k=4$ and $\gamma=1$ based on extensive numerical experiments. An earlier work proposed a similar loss function method in view of adding perturbation \cite{gao2019solving}. However, our method is proposed from the view of utilizing a smooth alternative of $\abs{x}$ and is more generalized. Besides \eqref{eq:smoothfunc}, SAF can also adopt other smooth alternative of $\abs{x}$ such as the well-known log-cosh function \cite{choo2018symmetries}. SAF can be seen as a natural improved version of the original AF method. According to \cite{zhang2016reshaped}, amplitude-based loss function \eqref{eq:afloss} can be regarded as a direct application of traditional least squares method to phase retrieval, and shows to be better than WF \eqref{eq:wfloss}. However, jumps of gradient $\nabla\ell_i(\ensuremath{\bm{z}})$ exist in the vicinity of the line $\dkh{\ensuremath{\bm{z}}:\ensuremath{\bm{a}}_i'\ensuremath{\bm{z}}=0}$, which may unstabilize the gradient descent algorithm, especially when the measurement number is around the information-theoretical limit. To tackle this, AF's variants TAF and RAF modifies the gradient function, and have achieved better empirical performance. The idea of this paper is similar, but we demonstrate that directly adjusting the loss function with a smooth function \eqref{eq:smoothfunc} can also be feasible. \begin{figure}[hbt] \centering \subfloat[AF]{ \includegraphics[width=0.33\linewidth]{af_convg_plot-eps-converted-to.pdf} \label{fig:af loss} } \subfloat[PR-SCG]{ \includegraphics [width=0.33\linewidth]{scg_convg_plot-eps-converted-to.pdf} \label{fig:scg loss} } \subfloat[SAF]{ \includegraphics [width=0.33\linewidth]{saf_convg_plot-eps-converted-to.pdf} \label{fig:saf loss} } \caption{Contour plot of loss functions. SAF has no local minimum while AF has another 2 spurious minima marked with crosses.} \label{fig:intuition SAF better} \end{figure} Fig. \ref{fig:intuition SAF better} presents a two-dimensional real-valued PR example to demonstrate the difference between the loss functions of AF and SAF. The original solution is $\ensuremath{\bm{x}}=(\frac{\sqrt2}{2},\frac{\sqrt2}{2})'$, and the measuring vectors are $\ensuremath{\bm{a}}_i=(\sin\theta_i,\cos\theta_i)'$, where $\theta_i=\frac{i\pi}{5},i=0,\cdots,4$. It can be seen that two global minima marked with circles are surrounded by dense contours for AF and SAF as shown in Fig. \ref{fig:af loss} and Fig. \ref{fig:saf loss}. However, there are two extra local minima marked with crosses for AF as shown in Fig. \ref{fig:af loss}. Furthermore, the contours of AF are not smooth or regular which can cause difficulties for some gradient-descending solvers, while SAF is infinitely differentiable which makes high order optimization methods applicable. Fig. \ref{fig:scg loss} presents the contours of PR-SCG loss function with $\epsilon=0.3$ in \eqref{eq:scgloss}. The global optimal points is marked with `$*$' and obviously deviate from the true solution of PR. Therefore, an iteratively shrinking rule for $\epsilon$ is necessary for PR-SCG to ensure the convergency to the original solution. In contrast, the loss function of SAF has same global minima with \eqref{eq:afloss}. Besides, current results only demonstrate that PR-SCG converges to some Clark stationary point, but the convergency to the global minima has not been established yet. \subsection{Algorithm} Since the loss function \eqref{eq:safloss} is non-convex, an elaborate initialization is needed to obtain a good initial estimate for global convergence. Because the initialization method is not the focus of this paper, we simply choose the weighted maximal correlation initialization method proposed by Wang \cite{raf2018}. This method first calculates $\eta = \sqrt{\sum_{i=1}^{m} b_i^2/m}$ as the estimate of $\norm{\ensuremath{\bm{x}}}$. Then the direction of $\ensuremath{\bm{x}}$ is estimate by the leading eigenvector $\tilde{\ensuremath{\bm{z}}}$ of the matrix $\bm M := \sum_{i\in \mathcal{I}} \sqrt{b_i}\ensuremath{\bm{a}}_i\ensuremath{\bm{a}}_i' / \norm{\ensuremath{\bm{a}}_i}^2$, where $\mathcal{I}$ is the set of indices corresponding to the largest values of $b_i/\norm{\ensuremath{\bm{a}}_i}$. Proposition 1 in \cite{raf2018} tells that the estimate ${\ensuremath{\bm{z}}_0} = \eta\tilde{z}/\norm{\tilde{z}}$ satisfying \begin{equation}\label{eq:initial estimate} \dist{\ensuremath{\bm{z}}_0,{\ensuremath{\bm{x}}}} \leq \frac{1}{20} \norm{\ensuremath{\bm{x}}}, \end{equation} with probability at least $1-C\exp(-c_1m)$, if $m\geq c\abs{\mathcal{I}} \geq c_2n$ for some constants $c_0,c_1,c_2,C$ and sufficiently large $n$. We use the gradient descent method to search for the global minimizer from the above initializer; that is \begin{equation}\label{eq:grad search} \ensuremath{\bm{z}}_{t+1}= \ensuremath{\bm{z}}_t - \mu_t \nabla \ell(\ensuremath{\bm{z}}_t), \end{equation} where $\mu_t$ is the learning rate. In the next section we show that a proper fixed $\mu_t$ suffices to ensure the global convergence under a good initialization. To obtain a faster convergence rate, we use the backtracking strategy to determine $\mu_t$ in numerical experiments. The details of SAF is presented in Algorithm \ref{alg:saf}. \renewcommand{\algorithmicrequire}{\textbf{Input:}} \renewcommand{\algorithmicensure}{\textbf{Output:}} \begin{algorithm} \caption{SAF: Smooth Amplitude Flow Method} \begin{algorithmic}[1] % \Require $\dkh{\ensuremath{\bm{a}}_i}_{i=1}^m,\dkh{b_i}_{i=1}^m$; maximum number of iterations $T$; step length ${\mu}$; backtracking parameters $\alpha,\beta$ and $s_{\max}$; truncation parameter $I$. \State \textbf{Construct} $\mathcal{I}$ which includes indices corresponding to the $I$ largest entries among $\dkh{b_i}_{i=1}^m$. \State \textbf{Initialize} $\ensuremath{\bm{z}}_0:= \sqrt{\frac1m\sum_{i=1}^{m} b_i^2}\,\tilde{\ensuremath{\bm{z}}}$, where $\tilde{\ensuremath{\bm{z}}}$ is the normalized leading eigenvector of $$\bm M:= \sum_{i\in\mathcal{I}} \sqrt{b_i}\frac{\ensuremath{\bm{a}}_i\ensuremath{\bm{a}}_i'}{\norm{\ensuremath{\bm{a}}_i}^2}$$ \For{$t = 0: T-1$} \State Compute gradient $\bm g_t = \nabla_{\text{SAF}}\ell(\ensuremath{\bm{z}}_t)$ according to \eqref{eq:safgrad} \State $s = 0$ \While{$\ell_{\text{SAF}}\kh{\ensuremath{\bm{z}}_t-\beta^s \mu \bm g_t}> \ell_{\text{SAF}}(\ensuremath{\bm{z}}_t) -\alpha \beta^s \mu \norm{\bm g_t}^2$ and $s < s_{\max}$ } \State $s=s+1$ \Comment{backtracking} \EndWhile \State $\mu_t = \mu\beta^s$ \State $\ensuremath{\bm{z}}_{t+1} = \ensuremath{\bm{z}}_t - \mu_t\bm g_t$ \EndFor \Ensure $\ensuremath{\bm{z}}_T$ \end{algorithmic} \label{alg:saf} \end{algorithm} \section{Theoretical guarantees for global convergence} \label{sec:theo} This section establishes the global convergence of Algorithm \ref{alg:saf} for the real Gaussian model. This proof can also be extended to the complex Gaussian naturally using the Wirtinger gradient. For simplicity, we write $\ell_{\text{SAF}}(\ensuremath{\bm{z}})$ simply as $\ell(\ensuremath{\bm{z}})$ in the following text. The geometric convergence of SAF is characterized by the following theorem. \begin{thm}\label{thm:grad converg} Consider the problem of finding arbitrary $\ensuremath{\bm{x}}\in\ensuremath{\mathbb{R}}^n$ from the phaseless measurements \eqref{eq:pr_problem} with real Gaussian measurement vectors. If $m\geq c_0 n $ and we adopt a fixed learning rate $\mu\leq \tilde{\mu}$, then with probability at least $1-C\exp(-c_1m)$, the SAF estimates $\ensuremath{\bm{z}}_t$ in Algorithm \ref{alg:saf} obey the geometric convergence: \begin{equation}\label{eq:geo conv} \dist{\ensuremath{\bm{z}}_t,\ensuremath{\bm{x}}} \leq \frac1{20}(1-\nu)^t \norm{\ensuremath{\bm{x}}}, \quad t=0,1,\cdots \end{equation} where $c_0,c_1,C>0$, $0<\nu<1$ and $\tilde{\mu}$ are some certain constants. \end{thm} Combining Theorem \ref{thm:grad converg} and the error of initialization \eqref{eq:initial estimate}, SAF can recover the original signal given $\mathcal{O}(n)$ measurements. Moreover, starting from an elaborate initial estimate, $\mathcal{O}(\log{1/\epsilon})$ iterations suffice to give a solution with RMSE error less than $\epsilon.$ Combined with the per-iteration complexity $\mathcal{O}(mn)$ we conclude that SAF solves PR in time $\mathcal{O}(mn\log\frac1\epsilon)$, which is proportional to the time required by the processor to read the entire data $\dkh{\ensuremath{\bm{A}};\ensuremath{\bm{b}}}$. The proof of Theorem \ref{thm:grad converg} hinges on proving the \textit{local regularity condition} $\operatorname{RC}(\mu,\lambda,c)$, i.e. \begin{equation}\label{eq:reg cond} \innerprod{\nabla \ell(\ensuremath{\bm{z}}),\bm h}\geq \frac{\mu}{2}\norm{\nabla \ell(\ensuremath{\bm{z}})}^2 + \frac\lambda 2 \norm{\bm \ensuremath{\bm{h}}}^2 \end{equation} for all $\ensuremath{\bm{z}}$ such that $\norm{\ensuremath{\bm{h}}}=\norm{\ensuremath{\bm{z}}-\ensuremath{\bm{x}}}\leq \epsilon\norm{\ensuremath{\bm{x}}}$ for some constant $0<\epsilon<1.$ As shown in \cite{chen2015solving}, the ball $\dkh{\ensuremath{\bm{z}}:\norm{\ensuremath{\bm{z}}-\ensuremath{\bm{x}}}\leq \epsilon\norm{\ensuremath{\bm{x}}}}$ can be seen as a basin of attraction towards the global optimum; once the initialization lands into this neighborhood, geometric convergence can be guaranteed, i.e., \begin{equation}\label{eq:geo converg} \dist{\ensuremath{\bm{z}}+\mu\nabla\ell(\ensuremath{\bm{z}}),\ensuremath{\bm{x}}}^2\leq (1-\mu\lambda)\dist{\ensuremath{\bm{z}},\ensuremath{\bm{x}}}^2. \end{equation} Evidently, Theorem \ref{thm:grad converg} holds asthmatically once the $\text{RC}(\mu,\lambda,\epsilon)$ is proved. Lemma \ref{lem:nabla l leq} and Lemma \ref{lem:nablal h geq} in \ref{sec:loc convg proof} respectively demonstrate that \begin{equation}\label{eq:nabla l leq} \norm{\nabla \ell(\ensuremath{\bm{z}})}\leq \kh{1+\delta}\norm{\ensuremath{\bm{h}}}, \end{equation} and \begin{equation}\label{eq:nablal h geq} \innerprod{\nabla\ell(\ensuremath{\bm{z}}),\ensuremath{\bm{h}}}\geq (0.07-\epsilon)\norm{\ensuremath{\bm{h}}}^2, \end{equation} hold with probability at least $1-C\exp(-c_1m)$ given $m\geq c_0n$. Using the above two bounds we can reach the regularity condition if $\mu$ and $\lambda$ satisfy \begin{equation}\label{eq:mu lambda} 0.07-\epsilon\geq \frac{\mu}{2}(1+\delta)^2+\frac\lambda2, \end{equation} which indicates an upper bound $\mu\leq 2\times 0.07 = 0.14$, which suggests the range of the step size. In practice, the step size $\mu$ can be significantly larger while still ensuring the global convergence, since several bound results in our proof can be further tighten with more delicate techniques. \section{Numerical results} \label{sec:numr} This section presents several numerical experiments to verify our theoretical analysis. We also compare SAF with other state-of-the-art gradient descent methods including WF, RWF, TAF and RAF in terms of the empirical rate of recovery and the convergence rate. All the experiments were conducted with Matlab 2016a on a personal laptop with {Intel} Core i7 6820HQ. Not only the real-valued Gaussian model, but also the complex-valued Gaussian model and the CDP model are tested. In following experiments, the learning rate $\mu=4$ and $7$ for the real model and the complex model respectively, $\alpha=0.4$, $\beta = 0.2$, truncation parameter $I=\lfloor\frac {3m}{13}\rfloor $ in the initialization stage and $s_{\max}=2$ for the backtracking parameters. The maximum iteration number $T$ is set as 5000. We define the normalized mean-square error $\text{NMSE}:= \operatorname{dist}^2(\ensuremath{\bm{z}},\ensuremath{\bm{x}})/\norm{\ensuremath{\bm{x}}}^2$ for numerical comparison. To avoid the influence of initialization methods, all tested algorithms are seeded with the same maximal correlation methods. For readers to reproduce the numerical tests conveniently, the Matlab codes are available at \url{https://github.com/qiluo10/smooth-amplitude-flow}. \subsection{Comparison of empirical success rate} We compare SAF with other state-of-the-art gradient methods for the noiseless Gaussian model under varying $m/n$ in terms of empirical success rate. Each success rate are calculated over 100 independent trials and a trial is declared successful if NMSE of the returned result is smaller than $10^{-5}$. The results are depicted in Fig. \ref{fig:cmp}. It is shown that less number of measurements suffice for SAF to recover the true signal $\ensuremath{\bm{x}}$ in comparison with AF method and its variants in real case. In the complex case, SAF is second only to PC-SCG by a narrow gap. It should be pointed out that the convergence to global optimum has not been established for PR-SCG. Particularly, Fig. \ref{fig:cmp} illustrates that SAF achieves a high success rate of over 95\% when $m/n\geq1.8$ and a perfect recovery when $m/n\geq1.9$ in the real case. In the complex case, both SAF and PR-SCG achieve a recovery rate larger than $95\%$ when $m/n\geq2.8$ and a $100\%$ recovery when $m/n\geq3$. It is noteworthy that SAF is the only method that achieves a $100\%$ with a sampling complexity lower than the information-theoretical limit in both the real and complex cases. Moreover, it is enlightening that SAF simply minimizing a novel loss function can outperform other existing algorithms with complicated operations upon the gradient or loss function. \begin{figure}[hbt] \centering \subfloat[Noiseless real-valued model with $\ensuremath{\bm{x}}$ and $\ensuremath{\bm{a}}_i$ independently sampled from $\mathcal{N}(0,\bm I_n)$ ]{ \includegraphics[width=0.45\linewidth]{cmp_real-eps-converted-to.pdf} \label{fig:real_cmp} } \ \subfloat[Noiseless complex-valued model with $\ensuremath{\bm{x}}$ and $\ensuremath{\bm{a}}_i$ independently sampled from $ \mathcal{N}(0,\frac12\bm I_n)$+$j\mathcal{N}(0,\frac12\bm I_n)$.]{ \includegraphics[width=0.45\linewidth]{cmp_cplx-eps-converted-to.pdf} \label{fig:cplx_cmp} } \caption{Empirical rate of success versus $\frac mn$ with $n=1000$. } \label{fig:cmp} \end{figure} \subsection{Computational cost} We compare the convergence rate and the time cost of SAF with other gradient descent methods, under information-theoretic limits $m=2n$ and $m=4n$ for the real and complex cases respectively. To accelerate convergence for SAF, a larger step $\mu=6$ and 10 separately for the real and complex case, while stilling achieving a $100\%$ success rate in this experiment. Table \ref{tab:convg speed} presents the number of iterations and time cost before achieving a NMSE of $10^{-14}$ for each algorithm, averaged over 100 successful trials. The optimal value is shown in bold and the second-best result is underlined in each column. It can be observed that SAF is the second best algorithm in terms of convergence, next only to the conjugate gradient method PR-SCG. SAF ranks first and second in terms of the time cost in complex and real cases separately. \begin{table}[hbt] \caption{Comparison of computational costs.} \centering \begin{tabular}{ccccc} \hline \textbf{Algorithms} & \multicolumn{2}{l}{\textbf{Real Case} ($m/n=2$)} & \multicolumn{2}{l}{\textbf{Complex Case} ($m/n=4$)} \\ \hline & \multicolumn{1}{l}{Iterations} & \multicolumn{1}{l}{Time (s)} & \multicolumn{1}{l}{Iterations} & \multicolumn{1}{c}{Time (s)} \\ \cline{2-5} TWF & - & - & 1273.68 & 14.20 \\ RWF & - & - & 859.72 & {9.86} \\ TAF & 745.51 & \textbf{0.97} & 752.74 & \underline{9.01} \\ RAF & 1865.22 & 2.39 & 1206.10 & 13.64 \\ PR-SCG & \textbf{138.28} & 1.29 & \textbf{132.90} & {9.44} \\ SAF & \underline{294.25} & \underline{1.08}& \underline{306.39} & \textbf{7.43} \\ \hline \end{tabular} \label{tab:convg speed} \end{table} \subsection{Robustness to noise} To show the robustness of SAF against additive noise, Fig.. \ref{fig:rmse} illustrates the NMSE as a function of the signal-to-noise ratio (SNR) under different $ m/n$. The data under the Gaussian model was generated as $b_i=(\abs{\innerprod{\ensuremath{\bm{a}}_i,\ensuremath{\bm{x}}}}^2+\eta_i)^{1/2}$, with $\eta_i$ independently {sampled} from $\mathcal{N}(0,\sigma^2)$, where $\sigma^2$ is set to achieved certain $\text{SNR}= 10\log_{10 }(\norm{\bm A\ensuremath{\bm{x}}}^2/m\sigma^2)$. For all choices of $m$, the NMSE scale decrease proportionally to the SNR, which demonstrates the stability of SAF. It is noteworthy that SAF performs robustly even under information-theoretic limit for both the real and complex Gaussian models, which has not been observed for other algorithms to the best of our knowledge. \begin{figure}[hbt] \centering \subfloat[Real case]{ \includegraphics[width=0.45\linewidth]{nmse_real-eps-converted-to.pdf} \label{fig:real_rmse} } \ \subfloat[Complex case]{ \includegraphics[width=0.45\linewidth]{nmse_cmplx-eps-converted-to.pdf} \label{fig:cplx_rmse} } \caption{NMSE vs SNR for SAF under the noise Gaussian model with $n=1000$.} \label{fig:rmse} \end{figure} \subsection{Image reconstructions} To demonstrate the feasibility and scalability of SAF in phase retreival of real images, we compare SAF with other state-of-the-arts on recovering the Lena image from masked Fourier intensity measurements. This image is gray-scale that can be represented by a matrix $\bm X\in\mathbb{R}^{256\times256}$. Denoting $\ensuremath{\bm{x}}\in\mathbb{R}^n$ be a vectorization of $\bm X$, the CDP model with $K$ masks is \begin{equation}\label{eq:cdpmodel} \bm b^{(k)} = |\bm{FD}^{(k)}\ensuremath{\bm{x}}|, \quad k=1,\cdots,K, \end{equation} where $\bm F$ represents the discrete Fourier transform matrix, and the diagonal matrix $\bm{D}^{(k)}$ is the mask, with diagonal entries sampled uniformly at random from $\dkh{1,-1,j,-j}$. When using more than 4 masks, SAF and other exiting methods like RAF, PR-SCG with the maximum correlation initializer can recover the original image successfully. Is it possible to adopt an ever smaller $K$? Fig. \ref{fig:cdp} gives a recovered result of SAF after 200 gradient iterations in CDP model with 3 masks. Then we compare SAF with other algorithms in terms of the recovery rate. All algorithms are seeded with the reweighted maximal correlation initialization and output results. The comparison of success rate is shown in Table \ref{tab:cdp cmp}. It is noteworthy that all presented algorithm SAF enjoys the highest success rate and can recover the image nearly perfectly. \begin{figure}[hbt] \centering \subfloat[Ground truth]{ \includegraphics[height=0.25\linewidth]{lena_original.png} \label{fig:original_imag} } \subfloat[Initialization ]{ \includegraphics[height=0.25\linewidth]{ini.png} \label{fig:ini_imag} } \subfloat[Recovered result]{ \includegraphics[height=0.25\linewidth]{lena_saf.png} \label{fig:saf_imag} } \caption{Recovered result by SAF after 200 gradient iterations from the initialization. The RMSE of initialization is 1.04 and the final RMSE is $1.04\times 10^{-3}$.} \label{fig:cdp} \end{figure} \begin{table}[] \caption{Comparisons of the success rate among algorithms on Lena image ($K$=3)} \centering \begin{tabular}{lcccccc} \hline Algorithms & SAF & RAF & PR-SCG & TAF & RWF & TWF \\ \hline Success Rate & \textbf{0.95} & 0.84 & 0.70 & 0.51 & 0.52 & 0 \\ \hline \end{tabular} \label{tab:cdp cmp} \end{table} \section{Conclusion} This paper put forward SAF to solve the phase retrieval problem based on a novel smooth amplitude-based loss function. This loss function utilizes a smooth function to get rid of the non-smoothness of the original amplitude-based loss function. We prove the global geometric convergence of SAF with an elaborate initialization. Our SAF approach is conceptually simple and can be easily implemented since it does not need extra truncating or reweighing operations upon the gradient function as many other state-of-the-art solvers do. Substantial numerical tests were conducted and illustrated that our new loss function enjoys advantages in sampling complexity and computational efficiency. SAF also has potential to be extended to other scenarios, e.g. recovering signals the sparsity or nonnegativity constraint. We preliminarily analyze the reason behind the dramatic improvement brought by such a new loss function. It will be of great interest to deeply investigate theoretical advantages of our SAF approach when measuring times is lower than the information-theoretic limit. \section*{Acknowledgments} This work was supported in part by National Natural Science foundation (China): 61571008. The authors would like to thank Samuel Pinilla for kindly sharing the codes and helpful discussion about PR-SCG. \bibliographystyle{unsrt}
\section*{Introduction} Photodetection has been making consistent progress with rapidly developing optical quantum technology~\cite{Hadfield:2009aa,ChristineSilberhorn2007,Wang2017,Ramilli:10, Superconducting_multiplexing_nanowire, TES_2}. Not only do detectors provide us with deeper insights on the quantum behaviour of light by allowing us to perform precise measurements, they also are an integral part of quantum technology such as quantum computing, quantum enhanced metrology, and quantum communication~\cite{Knill2001, OBrien:2007aa, RevModPhys.79.135, Lloyd1999, clauser_bells_1978,Aspect1982}. For every quantum detecto , one can associate a set of measurement operators $\{M_k\}$ called as Positive Operator Value Measures (POVMs). When such a device measures a quantum state $\rho$, the probability of observing an outcome `$k$' is \begin{equation}\label{eq:povm} p(k)_\rho=\mathrm{Tr}[\rho M_k]. \end{equation} Since probabilities are non-negative and sum to one, POVM elements are positive semi-definite and satisfy the completeness property $\sum_{k=0}^{K-1} M_k = \mathbb{1}$. This implies that a set of POVM elements completely describes the measurement device. Therefore, in order to characterize a detector, we have to determine its POVM set. In order to identify the POVM elements of a detector, one can invert Eq.~\eqref{eq:povm} which is known as Quantum Detector Tomography (QDT)~\cite{Lundeen2009NP,ChristineSilberhorn2007}. In optical QDT, light prepared in a set of known tomographically complete states a.k.a probes is incident on the detector to be characterized. The probabilities of different measurement outcomes is then used to characterize the detector. One such possible set of probes is composed of coherent states $\{|\alpha\rangle \langle \alpha|\}$. With a coherent state $|\alpha\rangle$ as the probe, the probability of outcome $k$ is given as \begin{equation} p(k)_{|\alpha\rangle} = \text{Tr}[|\alpha\rangle \langle \alpha | M_k ] = \pi Q_{M_k}(\alpha ), \label{eq:2} \end{equation} where $Q_{M_k}(\alpha)$ is the Husimi $Q$ quasi-probability distribution corresponding to the detector POVM element $M_k$. Therefore, one can simply reconstruct the $Q$ functions for POVM elements directly from the measurement statistics. Since $Q_{M_k}(\alpha )$ has complete information about the POVM element $M_k$, ideally it could be used to predict the measurement outcomes for an arbitrary quantum state as follows: consider a quantum state $\rho$ represented in Glauber–Sudarshan $P$ representation as \begin{equation} \rho = \int P_\rho(\alpha) |\alpha\rangle \langle \alpha| d^2 \alpha, \end{equation} where $d^2\alpha := d\text{Re}(\alpha)d\text{Im}(\alpha)$. The probability of outcome $k$ can then be obtained using the Born rule as \begin{equation} p(k)_\rho = \text{Tr}[\rho M_k ] = \pi\int P_\rho(\alpha)Q_{M_k}(\alpha ) d^2 \alpha. \label{eq:3} \end{equation}Therefore, by using the $Q$ representation for detector POVM elements and $P$ representation for the input quantum state, one can, in principle determine the outcome probabilities corresponding to detector outcomes. But this approach suffers from an inherent shortcoming due to the divergent nature of $P$ functions for nonclassical states of the optical field~\cite{Cahill1969}. In addition, as discussed in~\cite{Lundeen2009NP}, experimental errors and statistical noise during the experiments may distort $Q$ functions resulting in nonphysical POVM elements. In order to alleviate this shortcoming, it is beneficial to determine the POVM elements in some basis, for instance photon-number, from the measurement statistics. Several techniques have been proposed and demonstrated to reconstruct the POVM elements in the photon-number basis~\cite{Lundeen2009NP, Grandi_2017, Brida2012, Piacentini:15,Humphreys_2015,Zhang_2012}. One can further represent the POVMs using Wigner quasiprobability distribution functions as discussed in Section~\ref{sec:1}. Wigner functions, originally introduced by Eugene Wigner in 1932, provide a useful method to visualize quantum states in phase space~\cite{Wigner,gerry_knight_2004}. The Wigner function corresponding to a quantum state of light has been experimentally obtained using the balanced homodyne method as well as photon number resolving measurements~\cite{Lvovsky2001, Morin2012, Banaszek1999a, Bondani2010,Sridhar2014a, Nehra2019}. It is insightful to note that there exists a symmetry between quantum states and measurement operators. We can see this from Eq.~\eqref{eq:povm} wherein, due to the cyclicity of trace, the roles of the state and the operator can be swapped. This is the underlying relation which we exploit in order to identify the Wigner functions of the measurement operators (POVM elements). By obtaining the Wigner functions of the detector, any experimental probability can be found in terms of the Wigner functions of the state as well as of the detector, which are well-behaved unlike $P$ functions. Thus, Eq.~\eqref{eq:3} can be written as \begin{equation} p(k)_\rho = \text{Tr}[\rho M_k] = \int W_\rho(\alpha)W_{M_k}(\alpha ) d^2 \alpha, \end{equation} where $W_\rho(\alpha)$ and $W_{M_k}(\alpha )$ are the Wigner functions of quantum state $\rho$ and POVM element $M_k$ respectively. In this work, we propose an alternative method for QDT by directly reconstructing the Wigner quasiprobability functions corresponding to detector POVM elements: it alleviates the need of finding the POVMs in the photon-number basis. Apart from the fundamental interest in obtaining Wigner functions of a detector, our scheme is particularly beneficial to study the decoherence of a quantum detector by observing the behaviour of the POVM Wigner functions in certain regions of the phase space~\cite{PhysRevLett.107.050504}. This paper is organized as follows. In section~\ref{sec:1}, we detail the method for characterizing photodetectors using displaced thermal mixtures. In section ~\ref{sec:2}, we then apply this method to photon-number-resolving detectors. Section ~\ref{sec:3} discusses the resources required for characterizing a phase-insensitive detector. We discuss the number of phase space points where Wigner function should be experimentally measured in order to have a good confidence in reconstruction. In section~\ref{sec:4}, we use convex optimization techniques to make our reconstruction robust to noise. Finally, we note our conclusions in section~\ref{sec:5}. \section{Method}\label{sec:1} We use the well known result that the Wigner function operator can be represented in Fock space as \begin{equation} \hat{W}(\alpha)=\frac{2}{\pi}\sum_{n=0}^\infty (-1)^n \hat{D}(\alpha)|n\rangle\langle n|\hat{D}^\dagger(\alpha), \end{equation} where $\hat{D}(\alpha) = \exp({ \alpha\hat{a}^\dagger - \alpha^*\hat{a}})$ is the displacement operator with $\alpha \in \mathbb{C}$~\cite{Royer1977}. For a detector, our aim is to characterize the Wigner functions corresponding to its POVM elements. Since POVMs are self-adjoint positive semi-definite operators, one can write the Wigner function of a POVM element $M_k$ as \begin{equation} W_{M_k}(\alpha)=\frac{2}{\pi}\sum_{n=0}^\infty (-1)^n \mathrm{Tr}\left[M_k\hat{D}(\alpha)|n\rangle\langle n|\hat{D}^\dagger(\alpha)\right],\label{eq:sum} \end{equation} where, for simplicity, we define \begin{equation} P_{M_k}^{(n)}(\alpha) := \mathrm{Tr}\left[M_k\hat{D}(\alpha)|n\rangle\langle n|\hat{D}^\dagger(\alpha)\right]. \label{Eq:P} \end{equation} Although the sum in Eq.~\eqref{eq:sum} has infinite terms but in practice one can truncate it to `$n_0$' as further terms don't significantly contribute to the sum. Thus, we have \begin{align} W_{M_k}(\alpha) &\approx \frac{2}{\pi}\sum_{n = 0 }^{n_0}(-1)^n P_{M_k}^{(n)}(\alpha). \label{eq:sum1} \end{align} From Eq.~\eqref{eq:sum1} we can see that finding the Wigner function corresponding to `$M_k$' amounts to finding out all these summands. In this paper, we will restrict ourselves to phase-insensitive detectors for simplicity. Such detectors have the Wigner functions of their POVM elements rotationally symmetric around the origin, and hence can be characterized on the real line alone. However, we note that this scheme is applicable to phase-sensitive detectors also; and for such detectors, we have to choose $\alpha$ in the complex plane. \begin{figure}[!hbt] \includegraphics[width=0.5\textwidth]{Setup_1.png} \caption{Schematic of the experimental setup.} \label{fig:setup} \end{figure} \subsection{Proposed experimental setup} Fig.~\ref{fig:setup} shows a schematic for our proposed experiment. A laser beam is split into two beams at the first beamsplitter. One beam is used to generate thermal mixtures. Thermal mixtures can be generated by randomzing the phase and amplitude of the laser beam (coherent state). To achieve that, we use a Variable Neutral Density Filter (VNDF) along with a Rotating Ground-Glass Disk (RGGD). These allow us to generate thermal mixtures with a variable mean photon-number~\cite{Thermalstate}. The other beam is used as a Local Oscillator (LO) for phase space displacements. For displacements, we interfere thermal mixtures with the LO at a highly unbalanced beamsplitter denoted as Displacement beamsplitter (DBS) in the experiment schematic. A local oscillator modulator (LOMD) is used for varying the displacements, which are required to probe of the Wigner function over the whole phase space. In order to do this, we consider $(n_0 +1)$ distinct thermal mixtures given as \begin{equation} \rho^{(j)}=\sum_{n=0}^\infty p_n^{(j)}|n\rangle\langle n| \end{equation} where $j$ = $0,\hdots,n_0$ labels the thermal states, and $p_n^{(j)} = \frac{\Bar{n}^n_j}{(1+\Bar{n}_j)^{n+1}}$ is the Bose-Einstein photon-number distribution of a thermal mixture $\rho^{(j)}$ with mean photon-number $\Bar{n}_j$. We then displace these thermal mixtures by amplitude $\alpha$ which is, in general, a complex number. Then, the probability of obtaining `$k$' outcome with the displaced thermal input as input is give by \begin{equation} Q_k^{(j)}(\alpha) \approx \sum_{n=0}^{n_0} p_n^{(j)} P_{M_k}^{(n)}(\alpha), \label{eq:Q} \end{equation} where we choose the thermal state such that the contribution to the RHS from the omitted terms is negligible. This is possible because the thermal state has an exponentially decreasing photon number distribution. In matrix form, we can write Eq.~\eqref{eq:Q} as \begin{equation} \begin{pmatrix} Q_k^{(0)}(\alpha) \\ Q_k^{(1)}(\alpha) \\ \vdots\\ Q_k^{(n_0)}(\alpha) \end{pmatrix}=\begin{pmatrix} p_0^{(0)} & p_1^{(0)} & \hdots & p_{n_0}^{(0)} \\ p_0^{(1)} & p_1^{(1)} & \hdots & p_{n_0}^{(1)} \\ \vdots\\ p_0^{(n_0)} & p_1^{(n_0)} & \hdots & p_{n_0}^{(n_0)} \end{pmatrix} \begin{pmatrix} P_{M_k}^{(0)}(\alpha) \\ P_{M_k}^{(1)}(\alpha) \\ \vdots \\ P_{M_k}^{(n_0)}(\alpha) \end{pmatrix}. \label{eq:matrix} \end{equation} We can further write Eq.~\eqref{eq:matrix} compactly as \begin{equation} \bf{Q = P\Pi^\alpha _{M_k}}, \label{eq:Qcompact} \end{equation} where $\bf{Q}$ and $\bf{\Pi^\alpha_{M_k}}$ are vectors of length $(n_0+1)$, and $\bf{P}$ is the probability distribution square matrix of dimension $(n_0+1)\times(n_0+1)$. Thus by solving Eq.~\eqref{eq:Qcompact}, we can determine $\bf{\Pi^\alpha_{M_k}}$, which allows us to calculate the summation in Eq.~\eqref {eq:sum}. To solve for $\bf{\Pi^\alpha_{M_k}}$, one needs to solve the following convex quadratic optimization problem: \begin{align} \text{Minimize}\enspace&\{\bf{||Q - P\Pi^\alpha _{M_k}||_2}\}, \nonumber\\ \begin{split} \text{Subject to}&\enspace\bigg\{ 1{\bf{\geq\Pi^\alpha _{M_k}}}\geq 0, \enspace\\ &-1\leq\sum_{n=0}^{n_0}(-1)^n P^{(n)}_{M_k}(\alpha)\leq1\bigg\}, \label{eq:const} \end{split} \end{align} where $||.||$ is the $l_2$ norm defined as $||V||_2 = \big(\sum_{i}|V_{i}|^2\big)^{1/2}$ for a vector $V$. The optimization constraints in Eq.~\eqref{eq:const} can be understood as follows. First, the $n^{th}$ element $P^{(n)}_{M_k}(\alpha)$ of {$\bf{\Pi^\alpha _{M_k}}$} is essentially the probability of getting $k$-click if a displaced $n$-photon Fock state is incident to the detector. Therefore, we have $1\geq P^{(n)}_{M_k}(\alpha)\geq 0$. Second, Wigner functions are well- defined and bounded between $[-2/\pi, 2/\pi]$ for a POVM element corresponding to a phase-insensitive detector. This is because the POVM element in such a case is a statistical mixture of projectors. In this case we can use the second constraint in Eq.~\eqref{eq:const}. Thus solving this optimization allows us to determine the Wigner function at a given phase space point $\alpha$. Further, we can repeat the process with different displacement amplitudes to reconstruct the Wigner function over the entire phase space. In practice, the Wigner functions of various detectors are localized around the origin and vanishes to zero for large $\alpha$, so it is unnecessary to displace the thermal states with arbitrarily large $\alpha$. In the following section we numerically simulate this method for a phase-insensitive detector. We hasten to add that this method is applicable to any type of detector. \section{Modelling a Photon-number-resolving detector}\label{sec:2} \begin{figure*}[hbt!] \centerline{\includegraphics[width=\textwidth]{povm_pnr.pdf}} \caption{Wigner functions for POVM elements corresponding to zero-, one- and two-photon detection events. Red curves are theoretically expected Wigner functions and blue ones the reconstructed one using the proposed method. In the top row, A, B, and C are for a perfect PNR detector; and in the bottom row D, E, and F are for a PNR detector with detection efficiency $\eta = 0.90$}. \label{fig:povm_pnr} \end{figure*} In this section, we reconstruct the Wigner functions of a perfect and an imperfect photon-number-resolving (PNR) detector. In general, a POVM element corresponding to `$k$' outcome can be written in the photon-number basis as \begin{equation} M_k = \sum_{m,n=0}^{\infty}\langle m|M_k|n\rangle|m\rangle\langle n|, \label{eq:genPOVM} \end{equation} where $\langle m|M_k|n\rangle$ are the matrix elements of the POVM operator. One can further simplify Eq.~\eqref{eq:genPOVM} for a PNR detector with no dark counts as \begin{align}\label{eq:povm_pnr} M_k = \sum_{m=k}^{m_0}\langle m|M_k|m\rangle|m\rangle\langle m|. \end{align} Note that Eq.~\eqref{eq:povm_pnr} differs from Eq.~\eqref{eq:genPOVM} in three ways. First, the POVM is diagonal with entries $\langle m|M_k|m\rangle$, which are essentially the probabilities of detecting `$k$' photons given `$m$' photons are incident to the detector. Thus for a detector with detection efficiency $\eta$, we have \begin{equation} p(k|m) = \langle m|M_k|m\rangle= {m\choose k}\eta^k(1-\eta)^{m-k}. \label{eq:prob_pnr} \end{equation} Second, we have truncated the sum to `$m_0$' such that it exceeds the photon-number at which saturates the detector. Third, the sum is starting from `$k$' because with no dark counts noise, one would expect `$k$' clicks only if there are $m\geq k$ photons are incident on the detector. Eq.~\eqref{eq:povm_pnr} and Eq.~\eqref{eq:prob_pnr} can be interpreted as follows: The POVM elements of a perfect PNR detector are projectors $\Pi _m = |m\rangle \langle m|$. However, for an imperfect detector, its efficiency $\eta < 1$. If $m$ photons impinge on such a detector, due to its non-unity detection efficiency, $k<m$ photons results in a detection event contributing a factor of $\eta^k$ to the probability of the event; while $(m-k)$ photons remain undetected contributing a factor of $(1-\eta)^{m-k}$ to the probability of the event. Thus, such POVMs are statistical mixtures of projective measurements. In numerical simulations, we considered equidistant 51 displacement amplitudes in $\alpha \in [-3.6, 3.6]$, which allowed us to probe the Wigner function uniformly over the entire region of phase space where the Wigner function is non-vanishing. We used 50 equally spaced thermal states of mean photon-number in $\bar{n}\in[0,4]$. For all of our simulations in open source Python module QuTip~\cite{Johansson2013QuTiP2A}, we generally limited the dimension of the Hilbert space to 50, and the sum in Eq.~\eqref{eq:povm_pnr} was truncated with $m_0 = 50$ at which point $P(k|m_0)$ was of the order of $10^{-10}$ for $\eta = 0.90$. In Fig.~\ref{fig:povm_pnr}, we plot the Wigner functions of one, two, and three photon detections for a perfect detector and an imperfect detector with imperfections as modelled in Eq.~\eqref{eq:povm_pnr}. From Fig.~\ref{fig:povm_pnr}, we notice that the extrema of the Wigner functions of imperfect detectors are closer to the origin than those of perfect detectors. This is due to the contribution of higher order projectors in the Wigner functions of imperfect detectors. In particular for the imperfect single-photon detection event, we see a reduced negativity in the Wigner function around the origin. This is due to the contribution of the Wigner function of the two-photon detection event which is strongly positive around origin. Similar arguments can be made for the the reduced positivity of the Wigner function for zero- and two-photon detection event POVMs. In our reconstruction, we have uniformly sampled the phase space. A natural question that now arises is whether the number of points that needs to be probed in the phase space can be reduced. We investigate this question in the following section. \begin{figure*}% \centering {{\includegraphics[width=0.48\textwidth]{Phase_1_1.pdf} }}% {{\includegraphics[width=0.48\textwidth]{Phase_1_1_90.pdf} }}% \caption{Left : Wigner function corresponding to a perfect single-photon detection POVM determined by naive summation up to 15 terms of Eq.~\eqref{eq:sum} (Red), and using an Gaussian modulated quadratic fit near the origin (Blue). Black points represent the phase space points where the Wigner function was probed by the proposed method here. The latter approximates well the actual Wigner function. Right : Wigner function corresponding to an imperfect single-photon detection POVM with $\eta = 0.90$. } \label{fig:polynomial_reconstruction} \end{figure*} \section{characterizing phase-insensitive detectors with polynomial resources}\label{sec:3} Although the method outline earlier is general, it had substantial resource requirements as we had to uniformly sample over the phase space. However, this requirement can be drastically reduced if we have the prior knowledge that the detector is phase-insensitive, i.e. the representations of its POVM elements are diagonal in the Fock basis. Note that the phase sensitivity of a detector can easily be checked by varying the phase of the LO while keeping the amplitude fixed. In this case, unlike a PNR detector, a phase sensitive detector outputs different measurement statistics for different phases and fixed amplitudes of the LO. We recall that the Wigner functions of Fock states are Gaussian modulated Laguerre polynomials~\cite{Leonhardt1997}. This allows us to write the Wigner function the POVM elememt `$M_k$' of a PNR detector as \begin{equation} W_{M_k}(\alpha) = \frac{2e^{-2|\alpha|^2}}{\pi}\sum_{m=0}^{m_0} (-1)^m p(k|m) \ {\mathcal{L}}_m(4|\alpha|^2), \label{eq:insensitive} \end{equation} where ${\mathcal{L}}_m(x)$ represents the Laguerre polynomial of $m^{th}$ degree in $|\alpha|^2$. As the Wigner function is a function of $|\alpha|^2$, it is symmetric around the origin, and can be fully characterized on the real line. Since the Wigner function is a Gaussian modulated polynomial, the problem of reconstructing it is reduced to finding out a polynomial of degree $2m_0$ in $\alpha$ which requires us to find the Wigner function only at $2m_0 +1$ points. As an example, we considered the POVM element corresponding to a single-photon detection event for both perfect and imperfect PNR detectors. In Fig.~\ref{fig:polynomial_reconstruction}, the red curves show the POVM determined by the naive summation up to 15 terms of Eq.~\eqref{eq:sum}; and the blue curves the reconstructed Wigner functions with black points being the phase space coordinates where the Wigner function was probed. We see that one needs to probe the Wigner function only at three points for a perfect detector because the Laguerre polynomial ${\mathcal{L}}_{m=1}(4|\alpha|^2)$ is quadratic in $\alpha$, and therefore can be fully characterized using three distinct points. Likewise, the Wigner function for an imperfect single-photon POVM can be reconstructed using only 11 distinct points (black points in Fig.~\ref{fig:polynomial_reconstruction}) if we truncate the sum in Eq.~\eqref{eq:povm_pnr} at $m_0 = 5$ where $p(k|m)$ is of the order of $10^{-6}$. In this case, we will have to reconstruct an Gaussian modulated polynomials of degree 10 because the last term in the Eq.~\eqref{eq:povm_pnr} would be a projector, $|5\rangle \langle 5|$ with Wigner function given by Gaussian modulation of ${\mathcal{L}}_{m=5}(4|\alpha|^2)$. Note that finding the Gaussian modulated polynomial also works for a general detector given by Eq.~\eqref{eq:genPOVM}. However, instead of reconstructing the Wigner function on the real line, we will have to reconstruct \textcolor{blue}{it} in the complex plane for which appropriate polynomial interpolation schemes have to be used \cite{Gasca2000}. \section{Robustness against experimental noise}\label{sec:4} In this section, we discuss the robustness of this method against experimental noise. In general, inverting Eq.~\eqref{eq:Qcompact} is ill-conditioned as seen by the large ratio of the largest and smallest singular values of the matrix $\bf{P}$. This makes the reconstructed POVM elements extremely sensitive to small fluctuations in the measurement statistics, and can lead to nonphysical POVMs. However, the effects of ill-conditioning can be remarkably suppressed by adding a regularization to the optimization problem. Several types of regularization techniques are discussed in detail in \cite{Lundeen2009NP}, and for this work we use Tikhonov regularization~\cite{Tik63}. Using this technique, inverting Eq.~\eqref{eq:Qcompact} can be mathematically formulated as the following optimization problem: \begin{align} \text{Minimize}\enspace&\{{||\bf{Q - P\Pi^\alpha _{M_k}}||_2 +\gamma||\bf{\Pi^\alpha _{M_k}||_2}}\}, \nonumber\\ \begin{split} \text{Subject to}&\enspace\bigg\{ 1\geq{\bf{\Pi^\alpha _{M_k}}}\geq 0, \enspace\\ &-1\leq\sum_{n=0}^{n_0}(-1)^n P^{(n)}_{M_k}(\alpha)\leq1\bigg\}, \end{split} \end{align} where $\gamma$ is the regularization parameter. Solving this problem translates to a convex quadratic optimization which can be efficiently solved using a semi-definite problem solver, for instance, the Python package CVXOPT. \begin{figure*}[!hbt] \centering \includegraphics[width =0.9\textwidth]{Robust_POVMs_final.PNG} \caption{Blue: Reconstructed Wigner functions using regularization for zero-,one- and two-photon detection event of a detector with $\eta = 1$. Red curves are theoretically expected Wigner functions. Gray areas are error $(1\sigma)$ obtained using $N = 40$ iterations. Bottom right: Dashed-diamond curve illustrates the robustness of the reconstruction against regularization parameter $\gamma$ and black solid line is without regularization, i.e, $\gamma =0$.} \label{fig:robustpovm} \end{figure*} In order to simulate the presence of noise in our reconstruction, we introduce noise in the LO's amplitude $|\alpha|$. We model this noise as a Gaussian distribution of mean zero and standard deviation $\sigma = 1\%|\alpha|^2$. This is the typical noise level present in currently available stabilized lasers. Therefore, the displacement amplitudes are $(\alpha_1+\delta d_1, \alpha_2+\delta d_2 \dots , \alpha_{max} +\delta d_{max})$, where each $\delta d_i$ is a random variable sampled from the Gaussian distribution. To further reduce the effects of the fluctuations, we average the Wigner functions obtained over $N = 40$ iterations of the optimization. As a result, we get \begin{equation} \overline{W}_{{M_k}}(\alpha) = \frac{\sum_{j = 1}^{N} W^{j}_{{M_k}}(\alpha+\delta{\alpha}_j)}{N}. \end{equation} Having obtained $\overline{W}_{{M_k}}(\alpha)$, we then we utilize robust nonlinear regression methods to further suppress the fluctuations. We recall that for a phase insensitive detector, the POVMs are Gaussian modulated polynomials of degree $2m_0$ in $\alpha$, where $m_0$ is the saturation limit given in Eq.~\eqref{eq:insensitive}. Therefore, once we have experimentally probed the Wigner function at $2m_0 + 1 $ distinct points of the phase space, we could simply fit a Gaussian modulated polynomial of degree $2m_0$ in $\alpha$ to reconstruct the Wigner function over the entire phase space. Keeping that in mind, we set an optimization problem as: \begin{align*} &\text{Minimize:}\\ &\left\{\frac{1}{2}\sum_{i=1}^{}L\left[\left(e^{-2|\alpha_i|^2}\text{Poly}(2m_0,\alpha_i) - \overline{W}_{{M_k}}(\alpha_i)\right)^2\right]\right\}, \end{align*} where $L$ is defined as \begin{equation} L(y) = 2(\sqrt{1+y} - 1), \end{equation} and $\text{Poly}(2m_0,\alpha_i)$ is a polynomial of degree $2m_0$. Note that this approach of finding the Gaussian modulated polynomial has an advantage of not being biased unlike the simple least-square fitting method which tends to significantly bias in order to avoid high residuals in the data \cite{Robust_convex}. We further evaluate the quality of reconstruction method by using the relative error defined with $l_2$ norm as: \begin{equation} \triangle : = \frac{||W^{theory}_{M_k}(\alpha) - W^{reconstruted}_{M_k}(\alpha)||_2}{||W^{theory}_{M_k}(\alpha)||_2} \label{eq:FOM} \end{equation} \begin{comment} \begin{align} Q = PM_k\\ M_k = P^{-1}Q \end{align} Now, let's say there is some noise in the experiment which changes $Q$ to $Q^*$, so we get \begin{align} M_k' = P^{-1}Q^*\\ M_k' - M_k = P^{-1}\delta Q, \end{align} where $\delta Q = Q^* - Q$. As a result, noise gets amplified by $P^{-1}$, not good at all. Need to employ some convex optimization tools, but what are the constraints then? Some thoughts on that: \begin{itemize} \item{Constraint 1: $P^{(n)}_{M_k}(\alpha)$ in Eq.\ref{eq:Q} can be interpreted as the probability of getting $k$-click if the inputs to the detector is displaced n-photon Fock state, thus $P^{(n)}_{M_k}(\alpha)\geq 0$.} \item{Constraint 2: As a result, $\sum_{k=0}^{K-1}P^{(n)}_{M_k}(\alpha) = 1.$} \\ \item{Constraint 3: $-1\leq \sum_{n=0}^{n = no} (-1)^n P^{(n)}_{M_k}(\alpha)\leq 1 $} \end{itemize} Effectively, we will have to solve the same convex optimization problem as in the \cite{Lundeen2009NP}. \end{comment} The result of our reconstruction is shown in Fig.~\ref{fig:robustpovm}. Since the fluctuations grow with increasing local oscillator amplitude, the reconstruction of the Wigner function around the origin of phase space is the least disturbed, but with higher displacements the fluctuations grow stronger as seen in Fig.~\ref{fig:robustpovm}. Therefore, it may be beneficial to probe the Wigner function around the origin densely, and sparsely at the higher displacements, in particular $|\alpha|>1$. Note that probing near the origin doesn't undermine the quality of reconstruction as long as we probe the Wigner function at $2m_0+1$ distinct points because we need only $2m_0 + 1$ distinct points to reconstruct a polynomial of degree $2m_0$ as seen in Fig.~\ref{fig:polynomial_reconstruction}. In fact, we can further exploit the rotational symmetry of the POVMs corresponding to phase insensitive detector, which means the Wigner function at $\alpha$ has the same value at $-\alpha$. This allows us to only probe the Wigner function at $m_0+1$ distinct points to fully characterize a quantum detector that saturates at the photon-number $m_0$. However, in this work we numerically probe the phase space at equidistant displacement amplitudes. We now investigate how sensitive our reconstruction is to the choice of $\gamma$. To evaluate that, we calculate the relative error defined in Eq.~\eqref{eq:FOM} for several values of $\gamma \in$ $[10^{-4}, 0.012]$. The result is illustrated on the bottom right in Fig.~\ref{fig:robustpovm} for the POVM element corresponding to $n=1$ and $\eta = 0.90$. We can clearly see that even if we vary $\gamma$ by an order of magnitude (from $10^{-3}$ to $10^{-2}$), the relative error only changes by less than one percent. This shows that there is sufficient freedom in the choice of $\gamma$.\\ \section{Conclusions}\label{sec:5} We have developed a method for characterizing photodetectors by experimentally obtaining the Wigner functions corresponding to the POVMs describing the detector measurements. The proposed experimental scheme is simple and easily accessible, in particular, for phase insensitive detector. Augmented with convex quadratic optimization and robust nonlinear fitting techniques, we demonstrated its robustness to the experimental fluctuations. Future work on this method may involve an account for mode mismatch between the local oscillator and the optical mode of thermal mixtures. This direction of research is motivated by the fact that unlike in the balanced homodyne technique, mode mismatch cannot simply be treated as losses in this method. \section*{Acknowledgements} KVJ acknowledges the support from Louisiana State University System Board of Regents via an Economic Development Assistantship. RN was supported by NSF grant PHY-1708023. The authors are grateful to Prof. Olivier Pfister and Carlos Andres Gonzalez Arciniegas for the feedback on the manuscript. RN is indebted to Prof. Jonathan P. Dowling for financially supporting the visit to LSU. The authors thank Miller Eaton, Austin P. Lund, Arshdeep Sekhon, and Vikesh Siddhu for helpful discussions.\\ The authors contributed equally to this work. \bibliographystyle{apsrev4-1}
\section{Introduction} Recent years, deep convolutional neural network has been widely used in the tasks of object localization and detection \cite{sermanet2014overfeat, girshick2014rich, girshick2015fast, liu2016ssd, redmon2016you,Xue2018DIOD,Huang2017Semi} through leveraging the vast number of accurate bounding box annotation datasets, such as ILSVRC dataset, which costs a lot of money and manpower. In contrast, weakly supervised learning tries to apply an relatively cheaper and more convenient way by only using image-level supervision \cite{oquab2015object,pinheiro2015image,li2018tell,wei2016hcp,cinbis2017weakly}. Currently, Weakly Supervised Object Localization (WSOL) has drawn increasing attention since it can infer object locations in one given image using only the image-level labels without laborious bounding box annotations for training. \begin{figure}[!t] \centering \includegraphics[width=0.95\linewidth]{intro.jpg} \caption{The localization maps generated by our method (baseline and fusion) and state-of-the-art (Grad-CAM++). We adapt a discriminative region discovery to generate the localization map in single layer as the baseline, which is then fused with others to obtain more accurate and integral result. Our method is able to localize more complete regions of multiple instances including small objects.} \label{fig:1} \end{figure} Zhou \emph{et al.} \cite{zhou2015object} demonstrated that one same network can implement both scene recognition and object localization in a single forward-pass, without having been taught the knowledge of targets. Following \cite{zhou2015object}, some pioneering works \cite{zhou2016learning,zhang2018top,selvaraju2017grad,chattopadhay2018grad,cao2015look,chen2019saliency} have been explored to generate class-discriminative localization maps from pre-trained convolutional classification networks. Zhou \emph{et al.} \cite{zhou2016learning} revisited existing classification networks and proposed Class Activation Maps (CAM) method to locate the regions of interest with only image-level supervision. CAM replaced the top fully connected layer by global average pooling layer to keep the object positions and discovered the spatial distribution of discriminative regions for different classes. However, this method only located a small part of target objects. Meanwhile, it modified the structure of original classification network and had to trade off the model complexity and performance. Selvaraju \emph{et al.} \cite{selvaraju2017grad} introduced a gradient-based way of feature map combination (Grad-CAM) to highlight the discriminative regions, which did not require any modification of the original classification network architecture. But Grad-CAM was unable to localize multiple instances of the same class. Even for those images containing only one single object, Grad-CAM often failed to localize its entire region. In order to overcome above problem, Chattopadhyay \emph{et al.} \cite{chattopadhay2018grad} introduced pixel-wise weighting of the output gradients with respect to a particular spatial position in the final feature map (named as Grad-CAM++). Different from Grad-CAM and Grad-CAM++ built on existing classification network without extra modification, other researchers devised different networks or structures~\cite{singh2017hide,wei2017object,zhang2018adversarial,zhang2018self} to solve the mentioned problems above. Nevertheless, all these methods inherently ignore the small object with weak response, even no response, in the last convolutional layer estimated by classification network, which cannot be explored by a global average pooling. As pointed out in \cite{singh2018analysis}, large scale variation across object instances, and especially, the challenge of detecting or localizing very small objects stands out as one of the factors influencing the final performance. Moreover, most of existing WSOL methods localize objects from smaller activation maps of the last convolutional layer from classification network, which ignore other meaningful and important information from larger activation maps of different layers. In this paper, we expect to mine complete regions of multiple objects especially small ones in a simple yet effective way by discovering multi-scale activation maps based on existing classification network without extra modification (as shown in Figure \ref{fig:1}). From the visualization of the activation map of hidden layers of the VGG network pre-trained on ILSVRC 2016 \cite{saleh2016built,bertasius2015deepedge}, we observe the spatial information in the last convolutional layer only focuses on the most discriminative parts of large objects, while other convolutional layers indicate the complementary context of integral objects especially small objects in the form of edges and spatial information~\cite{liu2018receptive}. More importantly, we find that the activation map often exists multiple local maxima especially when multiple similar objects appear at the same time, representing different degrees of response to activated neuron. Inspired by the above observations, we take advantage of the gradient weight information estimated from multi-scale activation maps to measure the importance of each neuron supporting the prediction by classification network. In detail, we propose a multi-scale discriminative region discovery method to explore the object location information. In order to obtain more integral discriminative regions that spread over the activation map, we apply a discriminative region discovery strategy to find all the local maxima of gradient weights computed by taking partial derivative of particular class score to the activation map. We reformulate the weights of activation maps by taking an average of all the local maxima found in gradient weight maps, and compute a weighted sum of the activation maps in single convolutional layer to obtain corresponding localization maps. Moreover, we fuse the multi-scale localization maps generated from different convolutional layers to produce the final result. Our method is able to deal with the localization problem of incomplete target region with multiple instances of different sizes in the input image by extracting multiple discriminative features from different activation maps. The key contributions of this paper are summarized as following: \vspace{-0.1cm} \begin{itemize} \item We present a weakly supervised object localization method focusing on the localization of complete regions of multiple objects even the small area with weak response rather than the most discriminative ones, which is effective to localize multiple objects in one scenario, especially the small ones. \item We propose a discriminative region discovery strategy to find the multiple local maxima in gradient weight map and use the new weighted activation maps to locate the regions of interest. Furthermore, activation maps with different scales are fused together to further improve the localization performance. This strategy can be built on any existing classification network without extra modification. \item The proposed method achieves the new state-of-the-art with the error rate of Top-1 48.92\% on ILSVRC 2016 dataset with only image-level labels, and the localization accuracy of 0.43 on PASCAL VOC 2012 dataset with multi-label image-level labels, which are based on the classification VGGnet. \end{itemize} \begin{figure*}[!t] \centering \includegraphics[width=0.9\linewidth]{framework.jpg} \caption{The overview of our multi-scale discriminative region discovery method for weakly-supervised object localization. Based on existing classification network, such as VGGnet, we firstly compute the gradient weight maps by taking partial derivative of particular class score to the activation maps. Then a discriminative region discovery strategy is applied to generate corresponding localization maps from different convolutional layers (conv4 and conv5). Finally, multi-scale localization maps are fused into more integral one to locate multiple objects of various sizes. } \label{fig:2} \end{figure*} \section{Related Work} {\bfseries{Weakly supervised object localization}}.Weakly supervised object localization tries to infer the locations of region of interest in a given image with only image-level supervision. Compared to fully-supervised counterparts \cite{sermanet2014overfeat,girshick2015fast,zhao2018volcano,Wang2017Instance,Li2016Weakly}, WSOL can save huge labor. Zhou \emph{et al.} \cite{zhou2016learning} generated class activation maps by aggregating top-most feature maps using global average pooling layer to keep the object spatial positions. Zhang \emph{et al.} \cite{zhang2018top} proposed an excitation back propagation strategy to generate contrastive attention maps. Selvaraju\emph{et al.} \cite{selvaraju2017grad} put forward a new way of feature map combination to highlight discriminative regions using the gradient signal without any extra modification of the network architecture. Zeiler and Fergus \emph{et al.} \cite{zeiler2014visualizing} localized various objects in an image by systematically occluding different portions of the input image with a grey square, and dropping the probability of the correct class significantly when the corresponding object is occluded. Singh \emph{et al.} \cite{singh2017hide} presented a random way of hiding patches in a training image to force the network to seek other relevant parts of one integral object with the most discriminative part. Wei \emph{et al.} \cite{wei2017object} introduced one more efficient adversarial erasing approach for localizing more complete object regions progressively. Zhang \emph{et al.} \cite{zhang2018adversarial} applied successfully an adversarial learning strategy which use parallel-classifiers to leverage complementary object regions by erasing its discovered regions from feature maps. While existing methods are promising, these methods still have several drawbacks. First, the multiple-instance localization of the objects with the same category is not solved very well. Second, it is very difficult to localize objects with different sizes accurately only depending on the feature maps obtained from the last conventional layer, which usually contains very weak responses for these objects. {\bfseries Multi-instance localization.} A number of studies formulate the weakly supervised object localization task as a multiple instance learning (MIL) problem \cite{shen2018weakly}. Song \emph{et al.} \cite{song2014learning} developed a framework for learning to localize objects with a smoothed SVM. Cinbis \emph{et al.} \cite{gokberk2014multi} proposed a multi-fold multiple instance learning method which prevents the training process from prematurely locking onto erroneous object locations. Wang \emph{et al.} \cite{wang2015relaxed} come up with a relaxed multiple-instance algorithm to translate multi-instance learning into a convex optimization problem. Oquab \emph{et al.} \cite{oquab2015object} proposed a weakly supervised classification network to predict the location of objects in images. Bency \emph{et al.} \cite{bency2016weakly} proposed a beam searching based approach to detect and localize multiple objects in images. Although continuous efforts have been made to alleviate the challenges of multi-instance location, there is still one obvious problem in the existing studies. If there are multiple objects of the same kind in an image, the localization algorithms tend to treat them as the same one, particularly for small objects. {\bfseries Small object detection.} In recent years, many approaches~\cite{hariharan2015hypercolumns,he2017mask,lin2017feature,lin2017focal,long2015fully} devoted to promoting the detection accuracy of small object detection. These effective methods aimed to rebuild the spatial resolution of feature maps by utilizing up-convolutions~\cite{long2015fully,noh2015learning}. \cite{hariharan2015hypercolumns,he2017mask,lin2017feature} further built a bottom-up and top-down structures to strengthen the features through skip connections. Inspired by these supervised learning methods, we try to involve more activation maps from different convolutional layers to realize better object localization with only image-level labels. Our work is similar to that proposed by Chattopadhyay \cite{chattopadhay2018grad}. However, their method failed to accurately localize the objects if image contained multiple occurrences of objects with various sizes and classes. In addition, since the feature maps obtained from the last convolutional layer often contain very weak response for small objects, these targets can not be located very well in this way. To deal with these issues which are very common in the real world, in this paper, we present an intuitive multi-scale discriminative region learning method to address the problem of multiple objects localization of the same kind in an image, especially for small objects. \section{ Multi-scale Discriminative Region Discovery} The main purpose of our proposed method is to solve the localization problem of multiple objects with the same category or the small objects in images given only image-level labels. To handle above complex situations, a multi-scale discriminative region discovery method is explored (shown in Figure \ref{fig:2}). In this section, we will describe the details of the proposed method. \subsection{Preparatory knowledge} \label{prepa} Our work in this paper is mainly inspired by a series of novel algorithms, namely CAM~\cite{zhou2016learning}, Grad-CAM~\cite{selvaraju2017grad} and Grad-CAM++~\cite{chattopadhay2018grad}. They are based on the fundamental assumption that the final score ${Y^c}$ for a particular class $c$ can be represented as a linear combination of its global average pooled last convolutional layer feature maps ${A^k}$. \begin{equation} {Y^c} = \sum\limits_k {w_k^c} \cdot \sum\limits_i {\sum\limits_j {A_{ij}^k} } \end{equation} Each spatial location $(i,j)$ in the class-specific localization map ${L_{ij}}^c$ is then calculated as: \begin{equation} L_{ij}^c = \sum\limits_k {w_k^c} \cdot A_{ij}^k \end{equation} $L_{ij}^c$ highly demonstrates the importance of certain spatial location $\left( {i,j} \right)$ for a particular class $c$, thus it can be used as an efficient visual expression of some class predicted by the classification network. Grad-CAM uses the gradient information flowing into the last convolutional layer of the CNN to understand the importance of each neuron for a decision. It makes the weights $w_k^c$ to be independent of the positions $\left( {i,j} \right)$ of a particular activation map ${A^k}$ by taking a global average pool of the partial derivatives: \begin{equation} w_k^c = \frac{1}{Z}\sum\limits_i {\sum\limits_j {\frac{{\partial {Y^c}}}{{\partial A_{ij}^k}}} } \end{equation} where $Z$ is the total number of pixels in the activation map, and the final ${Y^c}$ is a differentiable function of the activation maps ${A^k}$. Nevertheless, the unweighted average of partial derivatives leads to the incompleteness of the localization, and the localization map can not cover the entire object, but only bits and parts of it. Grad-CAM++ works around above issue by reformulate the weight $w_k^c$ as: \begin{equation} w_k^c = \sum\limits_i {\sum\limits_j {\alpha _{ij}^{kc} \cdot relu\left( {\frac{{\partial {Y^c}}}{{\partial A_{ij}^k}}} \right)} } \end{equation} where $relu$ is the Rectified Linear Unit activation function. $\alpha _{ij}^{kc}$ is the gradient weights for a particular class $c$ and activation map $A_{ij}^k$, which is computed by another higher-order derivatives\cite{chattopadhay2018grad}. Unfortunately, Grad-CAM++ still fails to handle the images containing multiple objects with the same category especially the small object. This is a vital issue as multiple occurrences of objects or small ones in an image is very general in the real scenario. \subsection{Overview of proposed method} There will be significant differences among the appearances of objects when looking at them from different perspectives in real world. It means these multiple occurrences of objects will have diverse effects on the classification prediction results especially when they appear in different sizes. For that case, we identify that multiple local maximum exist in activation maps especially when some similar objects appear at the same time, representing different degrees of response to activated neuron since these objects have similar characteristics in some way. In another aspect, the response of small object is weaker compared with the large ones but still stronger than that of local background, the global average of gradient weight will weaken the local maximum response of small objects while enhancing that of most discriminative regions. The basic ideas of the importance of local maximum for the proposed approach are inherent in the understanding of deep convolutional networks. The overall purpose of our approach is to extract more complete regional context from activation maps to enrich the localization map representation. Figure \ref{fig:2} illustrates the architecture of our method, which uses the gradient weight information from different convolutional layers of neural network as input. First, we take a discriminative region discovery strategy in single convolutional layer to find multiple different local maximum of selected gradient weight maps. These local maximum information are averaged to weight the activation maps, which is different from previous method. These multi-scale localization maps generated by the weighted sum of activation maps contains complementary meaningful information, the smaller one highlights more complete region of large target object, the larger one highlights more details of target objects especially small object. Then localization maps from different layers are fused together to mine more instances even the small ones. \subsection{Discriminative Region discovery} \begin{algorithm}[t] \caption{Multi-scale discriminative Region Discovery} \label{algorithm:1} \LinesNumbered \KwIn{ Gradient weight map $G^{kc}$ $\left( {\alpha _{ij}^{kc} \in {G^{kc}}} \right)$ of the activation map $A^{k}$ for class $c$.} initialize an empty array $l\_m\_arr$ \\ initialize a maximum filter $Max\_Filter$ with $W \times W$ size \\ set the stride of the sliding window to $N$ \\ \While { $G_{ij}^{kc}$ is not traversed} { \eIf{ $G_{ij}^{kc}$ equals to $Max\_Filter(G_{ij}^{kc})$ and $G_{ij}^{kc}$ $>$ 0} { push back $G_{ij}^{kc}$ into $l\_m\_arr$ } { sliding the window with stride of $N$ } } $w_k^c \leftarrow average\left( {l\_m\_arr} \right)$ \\ obtain localization map in single layer $L_{{\rm{conv}}}^c \leftarrow \sum\limits_k {w_k^c \cdot {A^k}}$ \\ fuse multi-scale localization maps ${L^c} \leftarrow L_{conv4}^c + L_{conv5}^c$ \KwOut{Localization map ${L^c}$ for class $c$.} \end{algorithm} Given an image as the input of one classification network, which can predict classification scores correctly with a single forward-pass, we compute the gradient maps by the back-propagation method mentioned in Section \ref{prepa}. The gradient maps of input image using the class score derivative is the magnitude of the derivative which indicates the influence of each pixel on classification results. We further compute the weight of gradients by higher-order derivatives to obtain the gradient weight maps $G^{kc}$, which will be utilized to measure the importance of each neuron for supporting the network prediction. Different local maximum are observed when multiple occurrences of objects with various sizes appear in single image. In this situation, a local maximum at location $\left( {i,j} \right)$ for a gradient weight map ${A^k}$ indicates that increasing intensity of pixel $\left( {i,j} \right)$ will have strong discriminative power to the specific filter. These multiple different local maximum indicate other discriminative regions including small object with weak response that are complement to complete feature representation. In order to mine complete regions of target object spreading over the activation map, all local maximum of each gradient weight map are searched, then the weights of activation maps of the convolutional layer are reformulated (as shown in Algorithm ~\ref{algorithm:1}). In detail, we firstly use $3 \times 3$ window with a stride of 1 to determine whether this pixel is a local maximum, in detail, the values that are equal or greater than all of their 8 surrounding locations as the local maximum, otherwise this value will not be counted. Our method can search all local maximum response spreading over activation maps of different scales in each convolutional layers. This means the number of the local maximum we searched is not fixed according to the different size of sliding window. The usage of local maximum will capture the importance of activation map without losing the small objects and marginal parts of objects with weak response. In our approach, the flexible parameters of sliding window provide possibilities to achieve better performance in computing weights of activation maps. In particular, our strategy of calculating weights is more effective to explore multiple local maximums response instead of most strong response in single activation map. We use the discriminative region discovery strategy to generate the localization map in the last convolutional layer as the baseline of our method. \subsection{Multi-scale localization map fusion} Through the visualization of the activation map from hidden layers of the pre-trained VGGnet on ImageNet, the results show the first two convolutional layers mainly extract image edges. As moving deeper in the network, the convolutional layers extract higher-level semantic features. The third convolutional layer is observed to fire up on prototypical shapes of objects. In particular, the fourth convolutional layer indicates the complementary context of integral objects especially small objects in the form of edges and spatial information, while the spatial information in the fifth convolutional layer only focuses on the most discriminative parts of large objects. During our experiments, the results of fusing the localization maps generated by the last three convolutional layers indeed remained noisy, which caused inaccurate localization. We found that the fusion of the localization maps generated by the last two convolutional layers are able to achieve the best results. Thus we take full advantage of those two layers to produce more complete region of target object. After the localization maps are generated by estimating the sum of the weight of activation maps at each layer, we further upsample the localization map generated at fifth layer into the same size as the fourth one, then fuse these two localization maps by a simple element wise sum to produce the final localization map. We adapt the multi-scale localization maps of the last two convolutional layers fusion as the fusion version of our method. \section{Experiments} \subsection{Experiment setup} \textbf{Datasets and evaluation metric} We validate the proposed method on three important public datasets: ILSVRC 2016 \cite{krizhevsky2012imagenet}, CUB-200-2011~\cite{wah2011caltech} and Pascal VOC 2012~\cite{everingham2010pascal}, which are all annotated with image-level labels. ILSVRC 2016 contains 1.2 million images of 1,000 categories for training and 50,000 images for the validation. CUB-200-2011 has 11,788 images in total of 200 categories with 5,994 images for training and 5,794 images for testing. The localization metric suggested by \cite{russakovsky2015imagenet} is leveraged for comparison, which calculates the percentage of the images whose bounding boxes have over 50\% IoU with the ground-truth. PASCAL VOC 2012 contains 5,717 images of 20 categories for training. Each image in it has bounding box annotations, and is also multi-label. We use the metric proposed in \cite{everingham2010pascal} to evaluate our approach. This metric defines an Intersection over Union (IoU) $Loc_I^c\left( \delta \right)$, for a particular class $c$, threshold value $\delta$ and input image $I$, which calculates a ratio between the number of non-zero pixels lie inside of bounding box and the sum of non-zero pixels lie outside of bounding box and the area of bounding box. \footnotetext[1]{These methods are implemented by ourselves on this dataset.} \textbf{Implementation details} We evaluate the proposed method on the basis of VGGnet \cite{simonyan2014very}. As for ILSVRC and CUB-200-2011 dataset, our classification model is off-the-shelf VGG-16 model from Caffe Model Zoo. We upsample the final localization map into the same size as original input image and scale its values between 0 and 1, which are then fed into threshold segmentation algorithm to generate bounding box at the input image.While as for PASCAL VOC dataset, our classification model is fine-tuned on VOC 2012 based on pre-trained VGG-16 model from the Caffe Model Zoo. We train this network on NVIDIA GeForce GTX 1080 Ti GPU with 11GB memory. Particularly, since its ground-truth including multiple object of various sizes and classes, we measure the localization ability of the proposed method using explanation maps generated by the point-wise multiplication of weighted sum of activation maps and original input image. $\partial $= 0.25 is used as the threshold value. We change pixel value higher than 0.25 to 1.0 in the weighted sum of activation maps. The accuracy value of $Loc^{c}_{I}$ is computed by taking average of $Loc^{c}_{I}$ per label per image. \subsection{Quantitative comparisons with the state-of-the-arts} We adapt the multi-scale region discovery method to generate the localization map in the last convolutional layer as the baseline, and further fuse the localization maps generated from multi-scale layers as the fusion version. Table \ref{tab:1} illustrates the localization error on the ILSVRC 2016 validation set. Our baseline method achieves 49.81\% and 37.70\% of Top-1 and Top-5 localization error respectively. The localization errors are further reduced to Top-1 48.65\% and Top-5 34.20\% through fusing the localization maps generated from different-level convolutional layers, and the localization performance is improved by 2.75\% and 5.8\% compared to SPG. We illustrate the results on CUB-200-2011 in Table \ref{tab:2}. Our method achieves 54.86\% and 43.60\% of Top-1 and Top-5 localization error, which are competitive results compared to other state-of-the-arts. In fact, the CUB-200-2011 dataset is a well-designed benchmark for fine-grained object recognition, and a certain amount of annotations are labeled only for the most discriminative region, while the main purpose of our method focuses on discovering multiple objects of various sizes more completely. For the multi-label dataset PASCAL VOC 2012, it also achieves the remarkable performance. Table \ref{tab:3} shows that our method achieves the highest localization accuracy of 0.43 among all those methods. The reason why our method is able to achieve the best results on ILSVRC and Pascal VOC datasets, is that they contain plenty of scenarios where multiple targets of different sizes or small targets exist, the proposed method can explore these cases efficiently. \begin{table}[!t] \begin{center} \setlength{\tabcolsep}{5mm}{ \begin{tabular}{l|c|c} \hline \toprule Methods & top-1 error & top-5 error \\ \hline Backprop \cite{simonyan2013deep} & 61.12 & 51.46 \\ c-MWP \cite{zhang2018top} & 70.92 & 63.04 \\ CAM \cite{zhou2016learning} & 57.20 & 45.14 \\ Grad-CAM \cite{selvaraju2017grad} & 56.51 & 46.41 \\ Grad-CAM++ \cite{chattopadhay2018grad} & 52.76 & 40.22 \\ HaS \cite{singh2017hide} & 54.53 & - \\ AcoL \cite{zhang2018adversarial} & 54.17 & 40.57 \\ SPG \cite{zhang2018self} & 51.40 & 40.00 \\ \hline Ours(baseline) & 49.81 & 37.70 \\ \hline Ours(fusion) & 48.65 & 34.20 \\ \bottomrule \end{tabular}} \end{center} \caption{Localization error on ILSVRC validation set.}\label{tab:1} \end{table} \begin{table}[!t] \begin{center} \setlength{\tabcolsep}{5mm}{ \begin{tabular}[h]{l|c|c} \toprule Methods & top-1 error & top-5 error \\ \hline CAM\footnotemark[1] \cite{zhou2016learning} & 62.58 & 58.18 \\ Grad-CAM\footnotemark[1] \cite{selvaraju2017grad} & 61.38 & 55.64 \\ Grad-CAM++\footnotemark[1] \cite{chattopadhay2018grad} & 60.62 & 49.12 \\ AcoL \cite{zhang2018adversarial} & 54.08 & 43.49 \\ SPG \cite{zhang2018self} & 53.36 & 40.62 \\ \hline Ours(baseline) & 55.39 & 45.61 \\ \hline Ours(fusion) & 54.86 & 43.60 \\ \bottomrule \end{tabular}} \end{center} \caption{Localization error on CUB-200-2011 test set. }\label{tab:2} \end{table} \begin{table}[!t] \begin{center} \setlength{\tabcolsep}{8mm}{ \begin{tabular}[h]{l|c} \toprule Methods & $Loc_I^c\ $ \\ \hline Grad-CAM \cite{selvaraju2017grad} & 0.28 \\ Grad-CAM++ \cite{chattopadhay2018grad} & 0.38 \\ \hline Ours(baseline) & 0.39 \\ \hline Ours(fusion) & 0.43 \\ \bottomrule \end{tabular}} \end{center} \caption{Localization accuracy on PASCAL VOC 2012 set.}\label{tab:3} \end{table} \subsection{Ablation study} In the proposed method, the weights of activation maps are computed via discriminative region discovery strategy. We identify the weights by taking average of the local maximum searched in gradient weight maps, the number of local maximum in each activation map is not fixed. In order to inspect its influence on localization, we discovery the effect of the number of local maximum by testing different size of sliding window to generate various weights of the activation maps from the convolutional layer. The activation maps obtained from the last conventional layer contain very weak response for small objects, as shown in Figure \ref{fig:6}, the smaller sliding window can capture the local maximum produced by small area objects, the larger sliding window will loss them. Our baseline method obtain the best performance in Top-1 error with 49.81\% when the size of sliding window is $3 \times 3$, and the error rates clime up when the sliding window become bigger. This means more local maximum response are searched, the more representation of localization map are explored, our discriminative region discovery strategy is effective to not only smaller activation maps in high-level convolutional layer but also bigger activation maps in fourth convolutional layer.As shown in Table \ref{tab:4}, we can conclude: \begin{table}[!t] \begin{center} \setlength{\tabcolsep}{5mm}{ \begin{tabular}[h]{c|c|c|c} \toprule layer & size & top-1 error & top-5 error \\ \hline \multirow{2}{*}{Conv5} & 3 & 49.81 & 37.70 \\ \cline{2-4} & 5 & 52.65 & 39.02 \\ \hline \multirow{2}{*}{Conv4} & 3 & 66.74 & 56.74 \\ \cline{2-4} & 5 & 66.83 & 57.24 \\ \bottomrule \end{tabular}} \end{center} \caption{Localization error with different size of sliding window on ILSVRC 2016.}\label{tab:4} \end{table} \begin{table}[!t] \begin{center} \scalebox{0.9}{ \begin{tabular}[h]{c|c|c|c|c} \toprule \multirow{2}{*}{Fusion Layer}&\multicolumn{2}{c|}{ILSVRC 2016}&\multicolumn{2}{c}{CUB-200-2011}\\ \cline{2-5} & top-1 error & top-5 error &top-1 error &top-5 error \\ \hline Conv5 & 49.81 & 37.70 & 55.39 & 45.61 \\ \hline Conv5+Conv4 & 48.65 & 34.20 & 54.86 & 43.60 \\ \hline Conv5+Conv4+Conv3 & 60.97 & 47.23 & 63.84 & 55.22 \\ \bottomrule \end{tabular}} \end{center} \caption{Localization error with the fusion of multi-scale localization maps.}\label{tab:5} \end{table} \begin{table}[!t] \begin{center} \setlength{\tabcolsep}{5mm}{ \begin{tabular}[h]{c|c|c} \toprule threshold & top 1-error & top 5-error \\ \hline 0.0 & 57.20 & 48.67 \\ \hline 0.1 & 55.39 & 45.61 \\ \bottomrule \end{tabular}} \end{center} \caption{Localization error with different thresholds on CUB-200-2011.}\label{tab:6} \end{table} \begin{figure}[!t] \centering \includegraphics[scale=0.9]{size.jpg} \caption{Localization maps generated by different size of sliding window.} \label{fig:6} \end{figure} \begin{figure}[!t] \centering \includegraphics[scale=0.9]{threshold.jpg} \caption{ Localization maps generated by different thresholds of local maximum searching.} \label{fig:7} \end{figure} \begin{enumerate} \item The proposed discriminative regions discovery strategy successfully works in computing weights of activation maps, which outperforms the way of global average. \item The smaller sliding window can improve the performance of the weight calculation method of activation maps. The bigger sliding window will miss some small objects and object edge with weak response. \end{enumerate} \begin{figure*}[!t] \centering \includegraphics[width=0.8\linewidth]{ILSVRC.jpg} \caption{Localization maps of sample images from ILSVRC generated by Grad-CAM++ and our method. Our method can locate more complete regions for multiple objects of different sizes.} \label{fig:3} \end{figure*} \begin{figure*}[!t] \centering \includegraphics[width=0.8\linewidth]{CUB.jpg} \caption{Localization maps of sample images from CUB-200-2011 generated by Grad-CAM++ and our method. Our method can highlight not only the discriminative beak but also colorful body of birds.} \label{fig:4} \end{figure*} \begin{figure*}[!t] \centering \includegraphics[width=0.9\linewidth]{VOC.jpg} \caption{Explanation maps of sample images from PASCAL VOC 2012 generated by Grad-CAM++ and our method. Our method can explore more and accurate target objects in the images. The green bounding box is the ground truth annotations for the images.} \label{fig:5} \end{figure*} In fact, the fourth convolutional layer actually indicates the location of complete objects, where smaller object features usually present in the form of edges and outlines. Thus we fuse multi-scale localization maps from different convolutional layers to generate the final one. Table \ref{tab:5} give the comparison of localization error among different convolutional layers on ILSVRC 2016 and CUB-200-2011. The fusion version of our method achieves the higher localization accuracy, which indicates we can mine more complete target region when we apply multiple discriminative region discovery strategy in multi-scale layers. CUB-200-2011 contains 200 categories of similar appearance birds, a large number of its ground-truth locate the most discriminative regions because it is originally designed for fine-grained classification. According to the data distribution, the gradient weight values of the background are 0, and all of them are less than 0.5, thus we set the threshold $\partial $ to 0.1 to capture the most discriminative object regions to obtain better IoU with ground-truth. We take the local maximum whose value is larger than the threshold 0.1 as the final candidate while the searching is implemented in gradient weight maps.Table \ref{tab:6} illustrates our baseline method achieves 55.39\% of Top-1 localization error when we raise the threshold value, which make no compromise on localization error compared to state-of-the-art. Figure \ref{fig:7} shows the visualization results of different thresholds and we can observe the localization map highlights more complete region including the discriminative beak and colorful body of the bird. Moreover, we take a parallel sliding window to search all the local maximum responses in gradient weight maps, thus no additional computational overhead will be introduced. \subsection{Object localization qualitative results} Figure \ref{fig:3} shows the localization map of our method and Grad-CAM++. Our localization maps can highlight larger and complete regions of target to generate more precise bounding boxes. For example, in the second , fourth and sixth rows Grad-CAM++ only find a few instances, whereas our method can locate every instance of the same animal. In the first, third and fifth row, our method cover more complete regions of the target objects. Figure \ref{fig:4} displays the localization maps generated by Grad-CAM++ and our approach on CUB-200-2011. Our method successfully locate the complete region such as the discriminative beak and colorful body of the birds. For example, in the first, second and sixth row, our method highlight more complete body than Grad-CAM++. Figure \ref{fig:5} shows the explanation map of the proposed method and Grad-CAM++. The explanation maps generated by our method outperform localization property with more complete target objects in single image. For example, in the first and fifth row, our method highlights more complete regions of sheep and cattle. In the second row, our method discovers more body parts of human instead of only head. Similarly, in the third, fourth and fifth row, every instance of boat, bird and bicycle are explored, while Grad-CAM++ can only find several instances. We observe the multi-scale discriminative region discovery strategy is successful in discovering the local maximum of gradient weight maps. The weights of activation map via our approach is more effective, which helps obtain the complete region of multiple objects especially the small objects. The localization maps generated by the fourth convolutional layer and the last layer can finally be fused into a robust one, on which the multiple object of different sizes are located better. \section{Conclusion} In this paper, we propose a multi-scale discriminative region discovery method for weakly supervised object localization. The proposed method can locate more complete regions of multiple objects in a given image, addressing the problem that the activation maps from the last convolutional layer only contains very weak response for smaller objects. Our proposed method are validated on three important public datasets. The experiments show our discriminative region discovery strategy successfully works on multi-scale convolutional layers by reformulating the weights of activation maps, which greatly improves the completeness of localization representation of multiple objects and outperforms other start-of-the-art localization method based on VGGnet. Although the proposed method is simple and effective, the localization accuracy still depends on the performance of backbone classification network. It is promising that our method can achieve better result if deeper and better classification network is used, such as the novel ResNet-101. For different networks, more attention should be paid for the choice of different scales of activation maps. Our work can be regarded as a positive attempt. In future work, we will explore the possibility of extending our methods on other weakly supervised tasks of semantic segmentation and object detection \ifCLASSOPTIONcaptionsoff \newpage \fi \newpage \bibliographystyle{IEEEtran}
\section{Introduction} Our view of the structure and formation of the Galactic bulge has changed dramatically over the past decade. Earlier, the prevailing view was that the bulge is a spheroid in a disk, formed in an early, rapid, dissipative collapse \citep[e.g.][]{immeli:04}, naturally resulting from, for instance, major mergers converting disks to classical bulges \citep[e.g.][]{shen:15}. However, with new findings and data accumulating, what we call the bulge is today predominately considered to be mainly the inner structures of the Galactic bar seen edge-on \citep[e.g.][]{portail:17}. The details of its structure and timescales for its formation is, however, not clear \citep[e.g.][]{barbuy:18}. Metallicity distributions and abundance-ratio trends with metallicity provide important means to determine the evolution of stellar populations, also in the bulge. Trends of different element groups formed in different nucleosynthetic channels provide strong complementary constraints. Also, comparisons of trends between different stellar populations, e.g. the local thick disk, can constrain the history of the bulge. Whether or not there is an actual difference in abundance trends with metallicity between the bulge and the local thick disk is not clear \citep{MCwilliam16,barbuy:18,zasowski:19,lomaeva:19}. Some elements such as Sc, V, Cr, Co, Ni and Cu show differences in some investigations, whereas others show great similarities. New abundance studies minimising systematic uncertainties are clearly needed. An important nucleosynthetic channel that has not yet been thoroughly investigated in the bulge is that of the heavy elements, namely the neutron-capture elements. These can be divided into two groups: the slow (s)- and rapid (r)-process elements, depending on the timescales between the subsequent $\beta$-decay and that of the interacting neutron flux \citep{burbidge1957}. The neutron flux in the s-process is such that the time scale of interaction is \textit{slower} than the subsequent $\beta$-decay, making the elements created in this process to trace the valley of stability, whilst it is the other way around for the r-process, resulting in creation of heavier elements. As a point of reference, the s-process therefore produces the lighter elements after iron (A $\geq$ 60), whereas the r-process is the dominating production process for the heaviest elements. Nonetheless, it is important to keep in mind that the production of heavier elements is a combination of the two processes and a ``s- or r-process element'' simply refers to an element having a dominating contribution from one of the processes. The neutron densities required for the s- and the r-process are $\leq 10^{7}-10^{15}$ cm$^{-3}$ \citep{busso1999,karakaslattanzio:2014} and somewhere between $10^{24} - 10^{28}$ cm$^{-3}$ \citep{kratz2007}, respectively, putting some constraints on the astrophysical sites where they can occur. The s-process can in turn be divided into three sub-processes: the \textit{weak}, \textit{main} and \textit{strong} s-process, taking place in massive stars (weak) and asymptotic giant branch (AGB) stars (main, strong). Furthermore, the s-process \emph{elements} can be divided into the light, heavy and very heavy s-process elements, the naming originating from their atomic masses of A = 90, 138 and 208 (around Zr, La and Pb, respectively). A build-up is created at these stable nuclei (N = 50, 82 and 126, also known as magic numbers) due to isotopes with low neutron cross sections, creating bottlenecks in the production of heavier elements and in turn, peaks of stable isotopes. Thus, the naming first- second- and third-peak s-process is often used too for the light, heavy and very heavy s-process elements. In this work, light and heavy s-process elements produced in the main s-process will be analysed (Zr, La, Ce). The main s-process takes place in the interior of low- and intermediate-mass AGB stars \citep{herwig:05,karakaslattanzio:2014} with the neutrons originating from the reactions ${}^{13}\text{C}(\alpha, n)^{16}\text{O}$ and ${}^{22}\text{Ne}(\alpha, n)^{25}\text{Mg}$. The second reaction takes place at higher temperatures in AGB stars with initial mass of $>4$ M$_{\odot}$. The process takes place in the so-called ${}^{13}\text{C}$-pocket in-between the hydrogen and helium burning shells during the third dredge-up \citep[TDU;][]{2017ApJ...835...97B}. Since AGB stars have an onset delay on cosmic scales, a non-negligible fraction of the s-process-dominated elements is likely to originate from the r-process at early times. Furthermore, the light s-process elements (first-peak s-process) can have a possible production from the weak s-process, taking place in helium core burning and in the subsequent convective carbon burning shell phase, in massive stars \citep{couch:1974}. However, previous observations can not, to a full extent, explain the abundance of the light s-process elements at early times and other possibilities of their origin have therefore been proposed \citep[e.g. LEPP;][]{travaglio2004,cristallo:15}. The production site(s) for r-process elements is yet to be constrained, but the proposed sites are various neutron-rich (violent) events, such as core collapse supernovae (CC SNe), collapsars and the mergers of heavy bodies in binaries, like neutron star mergers \citep{sneden:2000,THIELEMANN2011346,2017ARNPS..67..253T}. The electromagnetic counterpart to the observed neutron merger GW170817 \citep{gw170817} indeed showed r-process elements. Research is still ongoing to determine whether or not neutron star mergers is the only, or even the dominating, source of r-process elements \citep[e.g.][]{2018SSRv..214...62T,cote:2018,siegel2019,kajino:2019}. In order to put constraints on the neutron capture yields, it is important to have reliable observational abundances to compare with the models. In the review paper on the chemical evolution of the bulge by \cite{MCwilliam16}, the necessity of having properly measured abundances for the disk in order to have a reference sample for bulge measurements is stressed, which is provided in this work. Regarding the determination of neutron-capture elements in bulge stars, such analyses have been made previously by \citet{johnsonetal2012}, \citet{vanderswaelmen}, and \citet{duong:19}. \citet{johnsonetal2012} studied stars in Plaut's field ($b = -8^{\circ}$) observed with the Hydra multifiber spectrograph at the Blanco 4m telescope, determining the abundances of Zr, La, Nd and Eu. Their [La/Fe] trend versus metallicity of the stars in the bulge field is clearly different from that of the thick disk. They thus conclude that the metal-poor bulge, or the inner disk, is likely chemically different from that of the thick disk. \citet{vanderswaelmen} studied Ba, La, Ce, Nd, and Eu in 56 Galactic bulge giants, observed with FLAMES/UVES at the VLT, finding that the s-process elements Ba, La, Ce, Nd, have decreasing [Ba,La,Ce,Nd/Fe] abundances with increasing metallicity, separating them from the flatter thick disk trends. Additionally, in the work by \citet{duong:19}, Zr, La, Ce, Nd, and Eu is measured for a large bulge sample at latitudes of $b = -10^{\circ}$, $-7.5^{\circ}$ and $-5^{\circ}$, observed with the HERMES spectrograph on the Anglo-Australian Telescope. They find indications of the bulge having a higher star formation rate than that of the disk. \citet{johnsonetal2012} and \citet{vanderswaelmen} compare their bulge abundances with previously determined disk abundances, mainly from dwarf stars, which might obstruct the interpretation of the comparative abundances due to the risk of systematic uncertainties between analyses of dwarf and giant stars\footnote{\citet{duong:19} do, to a large extent as possible, use the same atomic data and analysis method in their work as their comparison sample, GALAH \citep{buder:18}, to minimise systematic offsets.}. Previous works by \citet{melendez:2008} and \citet{gibs:II} stressed the importance of comparing stars within the same evolutionary stage. Furthermore, in investigations of atomic diffusion and mixing in stars \citep{korn:07,lind:08,nordlander:2012,gruyters:2016,souto:2019,liu:2019}, it has been shown that dwarf stars might have systematically lower elemental abundances compared to evolved stars, suggesting that abundances measured from dwarf stars are too low. The magnitude of this depletion is measurable and should, in general, be considered for the relevant elements in order to properly probe the Galactic composition and its evolution based on dwarf stars. In this paper, we study the four neutron-capture elements Zr, La, Ce, and Eu, determined from optical spectra of giants observed with FLAMES/UVES for the bulge sample. We compare the obtained abundance-ratio trends with that of the local disk, obtained from a comparison sample of similarly analysed giants (observed with FIES at high resolution in the same wavelength range). Section 2 describe the bulge and disk samples. The same methodology for determining the stellar parameters and abundances (a carefully chosen set of spectral lines) ensures a minimisation of the systematic uncertainties in the comparison of the two samples, following the same methodology as the previous papers in this series; \citet{Jonsson2017a,Jonsson2017b,lomaeva:19}, see Sect. \ref{sect: analysis}. We present the results in Sect. \ref{sect: results} and discuss these in Sect. \ref{sect: discussion}. \section{Observations} \label{sect: observations} \begin{figure*} \centering \includegraphics[width=\hsize]{bulge_fields.pdf} \caption{Map of the Galactic bulge showing the five analysed fields (SW, B3, BW, B6, and BL). The bulge samples from \cite{johnsonetal2012}, \cite{vanderswaelmen} and \citet{duong:19} are also marked in the figure. The dust extinction towards the bulge is taken from \citet{gonzalez:11,gonzalez2012} scaled to optical extinction \citep{cardelli}. The scale saturates at A$_{\text{V}} = 2$, which is the upper limit in the figure. The COBE/DIRBE contours of the Galactic bulge, in black, are from \citet{weiland:94}.} \label{fig: bulge fields} \end{figure*} \subsection{Bulge sample} Since large amounts of dust lies in the line-of-sight toward the Galactic centre, resulting in a high optical extinction, observing bulge stars can be challenging at optical wavelengths. Our ambition was to include fields as close to the centre of the bulge as possible, whilst keeping to regions where the extinction is manageable. The Galactic bulge sample consists of 45 giants (see Table \ref{tab:basicdata_bulge}). The spectra were obtained using the spectrometer FLAMES/UVES mounted on the VLT, Chile, observed in May-August 2003-2004. 27 of these spectra were also analysed in \citet{vanderswaelmen}. In addition to these, 18 spectra from the Sagittarius Window, ($l,b)=(1.29^\circ,-2.65^\circ$), lying closer to the Galactic plane in a region with relatively low extinction, is added to the sample analysed here. These were observed in August 2011 (ESO programme 085.B-0552(A)). In total, five bulge fields are included in the bulge sample: SW (the Sagittarius Window), BW (Baade's Window), BL (the Blanco field), B3 and B6\footnote{The naming of the fields follows the convention seen in \citet{lecureur:07}}. The fields can be seen in Fig. \ref{fig: bulge fields}, overlaid on an optical extinction map, together with the fields analysed in \citet{johnsonetal2012} and \citet{duong:19}. From Fig. \ref{fig: bulge fields} one can see that the SW field lies in a region of relatively low extinction and closer to the Galactic plane then the other fields. The FLAMES/UVES instrument allows for simultaneous observation of up to seven stars. Depending on the extinction, and local conditions, each setting in our observations required an integration time of somewhere between 5–12 hours. The achieved signal-to-noise ratios (S/N) of the recorded bulge spectra are between 10-80. The resolving power of the spectra is R $\sim$ 47 000 and the usable wavelength coverage is limited to the range 5800 and 6800 Å. The distances to our bulge stars are estimated to range between 4-12 kpc from the Solar System \citep{bailer-jones:2018}, placing the stars within the Galactic regions classified as the bulge by \cite{wegg:2015}. Although it should be noted that distance estimation can be rather troublesome and Gaia DR2 \citep{gaiacollab:2016,gaiacollab:2018} reports a parallax uncertainty higher than 20 \% for a majority of our bulge stars. \subsection{Disk sample} The disk sample consists of 291 giants stars, a majority of these placed within 2 kpc from the Solar System (see Table \ref{tab:basicdata_sn}). The bulk of the sample is observed at the Nordic Optical Telescope (NOT), La Palma, using the FIbre-fed Echelle Spectrograph (FIES; \citet{telting:2014}), under the programme 51-018 (150 stars) in May–June 2015 and 53-002 (63 stars) in June 2016. 41 spectra were taken from the stellar sample in \citet{thygesen:2012}, also observed using the FIES at the NOT. An additional 18 spectra were downloaded from the FIES archive. Lastly, 19 spectra were taken from the PolarBase data base \citep{petit:2014} where NARVAL and ESPaDOnS have been used (mounted on Telescope Bernard Lyot and Canada-France-Hawaii Telescope, respectively). FIES and PolarBase have similar resolving powers of R $\sim 67 000$ and R $\sim 65 000$, respectively. All three spectrometers cover wide regions in the optical domain, but in order to maximise the coherency in this work, the wavelength region used is restricted to that of the the bulge spectra; 5800-6800 Å. The resulting S/N of the FIES spectra are around 80-120 per data point in the reduced spectrum. Similar values can be found for the PolarBase spectra whereas the \citet{thygesen:2012} spectra have a lower S/N of about 30–50. Details about how the S/N was calculated can be found in \citet{Jonsson2017a}. The reduction of the FIES spectra was preformed using the standard FIES pipeline and the \citet{thygesen:2012} and PolarBase data was already reduced. A crude normalisation of all spectra was done initially with the IRAF task {\tt continuum}. Later in the analysis, the continuum is re-normalised more carefully by a manual placement of continuum regions and subsequently fitting a straight line to these, allowing a higher precision of the abundance determination (more on this in Sect. \ref{section: abundance determination}). Telluric lines have not been removed from the spectra, instead, a telluric spectrum from the Arcturus atlas \citep{2000IAUJD...1E..26H} has been plotted over the appropriately-shifted observed spectra and affected regions have been avoided on a star-by-star basis. \section{Analysis} \label{sect: analysis} The analysis of the spectra and the determination of the stellar abundances follows the same methodology as described in the previous papers in this series; \citet{Jonsson2017a,Jonsson2017b} and \citet{lomaeva:19}. This section describes the general methodology as well as the specifics relevant for this work. \subsection{General methodology} To determine the stellar abundances synthetic spectra are modelled using the tool Spectroscopy Made Easy \citep[SME, ][]{sme,SME2017}. For a given set of stellar parameters (T$_\mathrm{eff}$, $\log g$, [Fe/H], and microturbulence, $\xi_\mathrm{micro}$), SME interpolates in a grid of pre-calculated model atmospheres and calculates a synthetic spectrum of a region of choice. By defining line and continuum masks over spectral regions of interest, SME can simultaneously fit, using $\chi^2$-minimisation \citep{marquardt1963algorithm}, both stellar photospheric parameters and/or stellar abundances. Figure \ref{fig: spectrum bulge high S/N} shows the line definitions and continuum placements for the bulge star B6-F1 and the spectral lines used in the analysis. \begin{figure} \centering \includegraphics[width=\hsize]{bulge_highSN.pdf} \caption{The observed spectrum (black) of the bulge star B6-F1 (S/N = 54). The lines for abundance determination of Zr (three lines), La, Ce and Eu (one line each) are marked out as the orange regions. The yellow regions are the manually placed continuum and the red spectrum is the synthetic one. The segments within which the synthetic spectrum is modelled are marked as the white wavelength regions between the blue vertical lines in each panel. The four horizontal lines above each spectrum indicates the lines' sensitivity in the stellar parameters T$_{\text{eff}}$, $\log g$, [Fe/H] and $\xi_{\text{micro}}$, respectively, where green is more sensitive than blue.} \label{fig: spectrum bulge high S/N}% \end{figure} The stellar parameters of the stars analysed are determined as described in Sect. \ref{section: stellar params} below. Metallicity-scaled solar abundances \citep{solar:sme} are assumed in SME, except for the $\alpha$-elements that have already been determined in \citet{Jonsson2017b}. SME uses a grid of MARCS models\footnote{Available at \url{marcs.astro.uu.se}} \citep{marcs:08} that adopts spherical symmetry for $\log g < 3.5$, which is the case for a majority of our stars, otherwise plane parallel. Some non-local thermodynamic equilibrium (NLTE) effect has been reported for the elements analysed here: Zr is shown by \citet{2010AstL...36..664V} to be weakly dependent on temperature; and \citet{2000A&A...364..249M} find that they need small NLTE corrections of the order of +0.03 dex for Eu in their analysis of cool dwarfs. Nonetheless, the analysis in this work is done under the assumption of LTE. \subsection{Stellar parameters} \label{section: stellar params} The stellar parameters used are determined in \citet{Jonsson2017a,Jonsson2017b} (where a more detailed description can be found) by fitting synthetic spectra for unsaturated and unblended Fe I and Fe II lines, Ca I lines and $\log g$ sensitive Ca I line wings, while T$_{\text{eff}}$, $\log g$, [Fe/H], $\xi_\mathrm{micro}$, and [Ca/Fe] were set as free parameters in SME. Fe I has NLTE corrections adopted from \citet{lind2012:nlte}. The reported uncertainties for these parameters in \citet{Jonsson2017a,Jonsson2017b} for a typical disk star of S/N $\sim 100$ are T$_{\text{eff}}$ $\pm$50 K, $\log g$ $\pm$ 0.15 dex, [Fe/H] $\pm$ 0.05 dex and $\pm$0.1 km/s for $\xi_\mathrm{micro}$. For a typical bulge star, the S/N is significantly lower (median of 38), and hence the uncertainties greater; T$_{\text{eff}} \pm 100$ K, $\log g \pm 0.30$~dex, [Fe/H] $\pm 0.10$~dex and $\xi_{\text{micro}} \pm$ 0.2 km\,s$^{-1}$. These values are later used in the uncertainties estimations, see Sect. \ref{section:uncertainties}. \subsection{Abundance determination} \label{section: abundance determination} The atomic line data used for the abundance determination are collected from the \textit{Gaia}-ESO line list version 6 (\citealt{heiter15}, Heiter et al., in prep.). From here we get wavelengths, excitation energies and transition probabilities (as well as broadening parameters, when existing). The transition probabilities for the elements investigated here, Zr, La, Ce, and Eu, come from \cite{BGHL}, \cite{LBS}, \cite{LSCI}, and \cite{LWHS}, respectively. All available lines for these elements in the given wavelength region (5800-6800 Å) were investigated individually in order to exclude lines that could not be modelled properly (due to blends, bad atomic data or other systematics). As for Zr, where three separate lines were suitable for abundance determination, the lines were ultimately fitted simultaneously. Finally, the determined SME abundances were, in the post-process, re-normalised to the most up-to-date solar values provided by \citet{grevesse:2015}. The final set of lines used for abundance determination is presented in Table \ref{table: final line list}. Apart from the atomic lines, we include the molecules C$_2$ \citep{2013JQSRT.124...11B} and CN \citep{2014ApJS..214...26S} in the synthesis. \begin{table} \centering \caption{\label{table: final line list}Atomic lines used in the analysis. The elements and ionisation stages are given in Col. 1, the transition wavelengths in Col. 2, and the $\log(gf)$ values are listed in Col. 3. The excitation energies of the transitions lower level are given in Col. 4. The $\log(gf)$ data included in the Gaia-ESO line lists comes from \cite{BGHL} (Zr), \cite{LBS} (La), \cite{LSCI} (Ce) and \cite{LWHS} (Eu).} \centering \centerline{ \begin{tabular}{l c c c} Element & Wavelength [Å] & $\log(gf)$ & $\chi_{\text{ exc}}^{\text{ low}}$ [eV]\\ \hline \hline Zr I & 6127.440 & -1.06 & 0.15 \\ Zr I & 6134.550 & -1.28 & 0.00 \\ Zr I & 6140.460 & -1.41 & 0.51\\ \hline La II & 6390.457 & -2.01 & 0.32 \\ La II & 6390.469 & -2.08 & 0.32 \\ La II & 6390.486 & -1.90 & 0.32 \\ La II & 6390.501 & -2.08 & 0.32 \\ \hline Ce II & 6043.373 & -0.48 & 1.21 \\ \hline Eu II & 6645.057 & -0.84 & 1.38 \\ Eu II & 6645.060 & -0.78 & 1.38 \\ Eu II & 6645.068 & -2.13 & 1.38 \\ Eu II & 6645.074 & -0.84 & 1.38 \\ Eu II & 6645.083 & -0.91 & 1.38 \\ Eu II & 6645.086 & -0.90 & 1.38 \\ Eu II & 6645.098 & -0.60 & 1.38 \\ Eu II & 6645.101 & -0.95 & 1.38 \\ Eu II & 6645.121 & -1.01 & 1.38 \\ Eu II & 6645.137 & -1.09 & 1.38 \\ Eu II & 6645.149 & -1.19 & 1.38 \\ \end{tabular}} \end{table} \begin{table*} \centering \caption{Isotope information of the elements. Col. 2 gives the baryon number of the stable isotopes that contribute to at least 1 \% to the solar system abundance. Col. 3 gives the corresponding relative isotopic abundances of the stable isotopes as measured in the Sun, with references in the last column.} \label{table: isotopic information table} \begin{tabular}{l|l|l|l} Element(Z) & Baryon number & Relative abundance & Reference \\ \hline \hline Zr(40) & 90:91:92:94:96 & 51:11:17:17:3 & \cite{1983IJMSI..50..219N}\\ La(57) & 139 & 100 & \cite{2005IJMSp.244...91D}\\ Ce(58) & 140:142 & 88:11 & \cite{1995IJMSI.142..125C}\\ Eu(63) & 151:153 & 48:52 & \cite{1994IJMSI.139...95C}\\ \end{tabular} \end{table*} For La and Eu hyperfine splitting (hfs) had to be taken into account. By not taking hfs into account there is a risk of overestimating the measured abundance \citep{2000ApJ...537L..57P,thorsbro:18}. Additionally, isotopic shift (IS) has to be considered for Zr, Ce and Eu. The shift is caused by the isotopes having shifted energy levels, resulting in radiative transitions with shifted wavelengths. IS is included by manually identifying the set of transitions for each isotope in the line list and scaling the $\log(gf)$ to the relative solar isotopic abundances, see Table \ref{table: isotopic information table}. \subsection{Population separation} \label{section: population sep} The classification of the stellar populations in the disk (thin/thick) can be done in several ways, by kinematics, age, geometry and chemistry. Even so, the separation of these two components is somewhat debated and the transition between them might be a gradient rather than a clear separation. The results by \citet{hayden:15} show that the scale length of the thin disk extends further out than that of the thick disk. The thick disk has been shown to be enriched in $\alpha$-elements, compared to that of the thin disk, in addition to thick disk stars having higher total velocities whilst slower rotational velocities \citep{bensby:14}. In \citet{lomaeva:19} the separation into the two populations is computed for our disk sample, using a combination of stellar metallicity, abundances ([Ti/Fe] as determined in \citet{Jonsson2017b}) and kinematics. The radial velocities from Table \ref{tab:basicdata_sn}, proper motions from Gaia DR2 \citet{gaiacollab:2016,gaiacollab:2018} and distances from \citet{mcmillan:2018distances} are used to calculate the total velocities\footnote{$V_{\text{tot}}^2 = U^2 + V^2 + W^2$}. In total, kinematic data were available for 268 stars in the disk sample. The clustering method \texttt{Gaussian Mixture Model} (GMM), obtained from the \texttt{scikit-learn} module for Python \citep{pedregosa2011scikit}, is used to cluster the disk data into the two components. The reader is referred to \citet{lomaeva:19} for more details. \begin{figure*} \centering \includegraphics[width=\hsize]{scatter_all.pdf} \caption{The abundance ratio trends with metallicity, [X/Fe] against [Fe/H], for the thin- (blue) and thick-disk (yellow) stars as well as the bulge stars (red). Since not all abundances were possible to determine in all spectra, the number of stars in each sample is included in the legend. Filled dark red indicate bulge stars with a S/N above 20, whereas the hollow red circles indicate a S/N equal to or less than 20. Some of the disk stars could not be classified as thick or thin disk stars; these are marked as grey dots. The typical uncertainty for the disk and the bulge sample, as described in Sect. \ref{section:uncertainties}, is marked in the lower right corner of every plot.} \label{fig: disk comparative}% \end{figure*} \section{Results} \label{sect: results} Our derived abundance ratios, [X/Fe], for Zr, La, Ce, and Eu, are plotted against [Fe/H] in Fig. \ref{fig: disk comparative}. The population separation is applied to the disk sample and the number of stars in each population for which we could determine the abundance in question is noted in every panel. The bulge sample is plotted on top of the disk trends, differentiating between spectra of higher or lower S/N-ratio of 20. The typical uncertainty is noted in the plots, where the estimation of these is described in Sect. \ref{section:uncertainties}. \subsection{Uncertainties} \label{section:uncertainties} Systematic errors generally originate from incorrectly determined stellar parameters, model atmosphere assumptions, continuum placement and atomic data. This makes these errors hard to estimate. To get a sense of the systematic uncertainties, one can compare to reference stars. In \citet{Jonsson2017a} they compare the determined stellar parameters to those of three overlapping Gaia benchmark stars determined in \citet{jofre:2015} and find that these are within the uncertainties of the Gaia benchmark parameters. All spectra are analysed using the same line and continuum masks as well as the same atomic data, minimising possible random uncertainties. Therefore, the random uncertainties are to primarily be found in the (random) uncertainties of the stellar parameters. An approach to estimate the random uncertainties due to changes in the stellar parameters, is to analyse a typical spectrum several times using parameters that all vary within given distributions. The same method for estimating the uncertainties was used in \citet{lomaeva:19}. Hence, using the FIES spectrum of the standard star Arcturus\footnote{The giant star Arcturus (also known as $\alpha$-Boo or HIP69673) has been analysed extensively due to its brightness, being the fourth brightest in the night sky, and is suitable as a reference of a typical giant star.}, uncertainties were added to its initial stellar parameters, meaning that the stellar parameters were changed simultaneously, for a set of 500 runs with modified stellar parameters. A Gaussian distribution is used to generate the uncertainties, using the reported stellar parameter uncertainties as standard deviation (see Sect. \ref{section: stellar params}). In the uncertainty estimation of the bulge abundances, we have not degraded the FIES Arcturus spectrum (with a resolution of 67000) to match that of the bulge spectra (R of 47000), but separate tests have shown this slightly lower resolution to have a negligible effect on the determined abundance. The abundance uncertainties coming from the uncertainties in the stellar parameters are then calculated as \begin{equation} \label{eq: uncertanty equation} \sigma A_{\text{parameters}} = \sqrt{|\delta A_{T_{\text{eff}}}|^2 + |\delta A_{\log g}|^2 + |\delta A_{\text{[Fe/H]}}|^2 + |\delta A_{v_{\text{micro}}}|^2}, \end{equation} where, for non-symmetrical abundance changes, the mean value is used in the squared sums. The resulting uncertainties can be seen in Table \ref{table: uncertanties}. \begin{table} \centering \caption{The estimated typical uncertainties for the disk and bulge sample using a generated set of stellar parameters for the giant star $\alpha$-Boo.} \label{table: uncertanties} \begin{tabular}{c|c c c c} $\sigma A_{\text{parameters}}$ & Zr & La & Ce & Eu \\ \hline \hline disk [dex] & 0.09 & 0.06 & 0.07 & 0.06 \\ bulge [dex] & 0.23 & 0.15 & 0.16 & 0.15 \\ \end{tabular} \end{table} \section{Discussion} \label{sect: discussion} In this section we elaborate on the results. First, we compare separately our abundance trends for the disks and bulge with previous literature studies in Sect. \ref{section: comp to previous}. Second, and this is the core of this investigation, in Sect. \ref{section: disk and bulge comp} we consider a more in-depth comparative analysis between our abundances for the bulge and disks populations, both determined in the same way. This is done to minimise the systematic uncertainties as much as possible. We then proceed in considering and discussing comparative abundance ratios such as [Eu/Mg], [Eu/La] and [second-peak s/first-peak s], also in Sect. \ref{section: disk and bulge comp} as well as \ref{section: first second s process peak}. To highlight features of the trend-plots, the running mean of the samples are calculated and plotted (with a $1 \sigma$ scatter). The number of data points in the running window are set to roughly 15 \% of the sample sizes (thin disk, thick disk, bulge). As a result, the running mean (and scatter) does not cover the whole trend range. For the bulge sample, only data points with S/N $> 20$ are included in the running mean. From here and henceforth, the running mean-trend is the one referred to when describing [X/Fe] or [X/Y] ratios (except for Sect. \ref{sect: discussion disk sample}). \subsection{Comparison with selected literature trends} \label{section: comp to previous} \subsubsection{Disk sample} \label{sect: discussion disk sample} \begin{figure*} \centering \includegraphics[width=\hsize]{scatter_BB16.pdf} \caption{The determined disk abundances in this work (teal) compared with the determined abundances from \cite{battistinibensby:16} (grey). The typical uncertainty for both data sets are indicated in the lower right corner of every plot, where the uncertainties are taken from Table 6 in \citet{battistinibensby:16}.} \label{fig: disk BB16}% \end{figure*} \begin{figure*} \centering \includegraphics[width=\hsize]{scatter_m13DM17ambre2.pdf} \caption{The determined disk abundances in this work (teal) compared with selected literature trends: \citet{Mishenina2013} (pink), \citet{DM17} (black) and \citet{Ambre18} (orange). The typical uncertainty, when available, are indicated in the lower right corner of every plot, where the uncertainties from in \citet{Mishenina2013} and \citet{DM17} (their Table 3 and Table 4, respectively) are for a low T$_{\text{eff}}$ star.} \label{fig: disk m13 DM17}% \end{figure*} In Fig. \ref{fig: disk BB16} we compare our determined disk abundances with those determined for dwarf stars in the disk by \citet{battistinibensby:16}. In general, the trends are similar for all elements, as well as the scatter in the determined abundance. The abundances of [La,Ce,Eu/Fe] seem to be systematically higher than those of \cite{battistinibensby:16} whereas the [Zr/Fe]-abundances seem a bit lower. The typical abundance uncertainties for \cite{battistinibensby:16} are 0.12, 0.11, 0.12 and 0.08 dex for Zr, La, Ce and Eu, respectively (their Table 6), which is somewhat higher than ours (see Table \ref{table: uncertanties}). The possible shifts in the abundances could be due to systematic differences in dwarf and giant stars or in differing atomic data such as using different lines in the abundance determination. Indeed, there is no overlap in the atomic lines used in these two data sets, except for the La line at 6390 Å, although \citet{battistinibensby:16} uses three additional lines for the La abundance determination. Zr is a first-peak s-process element whereas La and Ce are second-peak s-process elements. [Zr,La/Fe] have somewhat decreasing abundances with increasing metallicities, with a flattening of abundances for [Fe/H] above $\sim -0.4$. The [Ce/Fe] trend is flatter than [Zr/Fe] and [La/Fe], explained by the higher s-process contribution in the Ce production (66 \%, 76 \% and 84 \% s-process contribution for Zr, La and Ce, respectively \citep{bisterzo:2014}). The scatter for the [La/Fe] abundances is higher, $\sim 0.5$ dex, over the metallicity range [-0.2, 0], compared to the rest of the metallicity domain with $\sim 0.3$ dex. It indicates AGB stars producing the bulk of s-elements through the main s-process. The increase in scatter can most likely be explained by the mass range of AGB stars, which 1) enables stars to produce s-process elements at different metallicities (times) as well as 2) different amounts of production of the first-/second-peak s-process for different mass AGB stars (see Sect. \ref{section: first second s process peak}). The increasing abundances when [Fe/H] is below -0.5 for the s-process elements Zr and La point at a production by the r-process at early times (see [Eu/Fe]). In addition to \citet{battistinibensby:16}, our work compares with the abundances reported in \citet{Mishenina2013} (Zr, La, Ce, Eu) and \citet{DM17} (Zr, Ce, Eu), on dwarf stars in the local disk, see Fig. \ref{fig: disk m13 DM17}. The typical uncertainties from \citet{Mishenina2013} and \citet{DM17} are chosen from their estimates of low T$_{\text{eff}}$ stars, their table 3 and table 4, respectively. For Eu, the trend decreases with increasing metallicities throughout our metallicity range, except for a plateau around [Fe/H] $< -0.6$. Eu has a reported r-process contribution of 94 \% \citep{bisterzo:2014} and the observed trend indicates that the r-process has a continuous enrichment in the Galaxy, similar to that of the $\alpha$-elements. Our Eu abundances compare well with those of \citet{Ambre18}, including some subgiant and giant stars in their sample, see Fig. \ref{fig: disk m13 DM17}. We note that our measurements, \cite{battistinibensby:16} and \cite{Ambre18} show slightly, on average, supersolar [Eu/Fe] abundances at solar metallicities, which is not seen in either \citet{Mishenina2013} nor \cite{DM17}. Of all the trends, ours is most systematically high not passing through the solar value at any metallicities. \subsubsection{Bulge sample} \begin{figure*} \centering \includegraphics[width=\hsize]{RM_comp_bulge.pdf} \caption{The running mean for the bulge abundances determined in this work (red solid line) compared with the calculated running mean based on the abundances in \citet{johnsonetal2012} (pink solid line),\cite{vanderswaelmen} (blue solid line) and \cite{duong:19} (beige solid line), with a 1$\sigma$ scatter (shaded regions, same colours as solid lines).} \label{fig: Running mean bulge comparative}% \end{figure*} In Fig. \ref{fig: Running mean bulge comparative} we compare our bulge trend with those observed in \citet{johnsonetal2012}, \citet{vanderswaelmen} and \citet{duong:19}. As for \citet{vanderswaelmen}, 27 of the stars/spectra overlap with their work and the same spectral lines are used for the abundance determination. Nonetheless, we observe different trends as well as measure Zr in these stars. \textbf{Zirconium:} In general, our [Zr/Fe] trend with metallicity is flat, with an increase at lower metallicities [Fe/H] $< -0.5$. It should be noted that the running mean is rather poorly defined at the edges and the feature is based primarily on the two most metal-poor stars in Fig. \ref{fig: disk comparative}. Our trend agrees well with that of \citet{johnsonetal2012} within our overlapping metallicity ranges, whereas \citet{duong:19} has overall decreasing abundances with increasing metallicities. Above [Fe/H] $\sim$ 0.1, our [Zr/Fe] is solar while \citet{johnsonetal2012} and \citet{duong:19} have subsolar [Zr/Fe], ours pointing at a higher s-process contribution in the production of Zr. \textbf{Lanthanum:} \citet{johnsonetal2012} reports a dip in [La/Fe] abundance around [Fe/H] $\sim -0.4$ which is not observed in either of the other studies, including ours. Both \citet{johnsonetal2012} and \citet{vanderswaelmen} produce decreasing [La/Fe] abundances with increasing metallicities, whilst both ours and \citet{duong:19} exhibit only a very small decrease of [La/Fe] with increasing [Fe/H]. In general our [La/Fe] abundances are higher than the other studies, which possibly could point at a higher s-process production in the bulge, compared to previous work. However, we note that our bulge abundances are expected to, similarly as the disk abundances, suffer from a systematic offset in the determined [La/Fe] abundance ratios, preventing us from making a firm claim. \textbf{Cerium:} Our [Ce/Fe] trend is flat throughout our metallicity range. \citet{duong:19} also find a flat trend at solar scaled values, but with a slight step-wise increase at [Fe/H] $\sim -0.3$, thereafter following our trend. \citet{vanderswaelmen} find a different [Ce/Fe] trend with decreasing [Ce/Fe] values with increasing metallicities. \textbf{Europium:} All the published [Eu/Fe] bulge trends and ours decrease with increasing metallicity, although with slightly different slopes and different offsets. The \citet{johnsonetal2012} study ranges to the lowest metallicities of all the samples. The trend of \citet{duong:19} and ours trace each other closely with super-solar abundances at all metallicities. The \citet{johnsonetal2012} and \citet{vanderswaelmen} trends follow each other well, in their overlapping metallicity region, with subsolar abundances above solar metallicities. There is an observable `knee' in the trend around [Fe/H] $\sim -0.4$, seen in all four works. Similarly as [La/Fe], our [Eu/Fe] abundances are higher than previous works, although due to the possible systematic offsets we cannot draw any firm conclusions from this. However, since the main purpose of this work is to make a differential analysis between the disk and bulge abundances in this work, the possible systematic offset in our analysis is of less importance. \subsection{Disk and bulge comparison of the current study} \label{section: disk and bulge comp} \begin{figure*}[ht!] \centering \includegraphics[width=\hsize]{RM_diskbulge.pdf} \caption{The running mean for the bulge (red solid line) compared with running mean of the thick disk (yellow solid line) and thin disk (blue solid line), with a 1$\sigma$ scatter (shaded regions, same colours as solid lines).} \label{fig: Running mean bulge + disk}% \end{figure*} In this section we compare our abundance-ratio trends, i.e. [X/Fe], for the bulge, the thin, and thick disks as a function of the metallicity for the s-process elements Zr, La, and Ce, and the r-process element Eu. In Fig. \ref{fig: Running mean bulge + disk} we directly compare the bulge population trends with those of the thin and the thick disk populations, determined in the same way in the present study. The bulge and the disks have very similarly shaped s-process element trends (Zr, La, Ce). The bulge trend of [La/Fe] have a slightly higher overall trend, especially at subsolar metallicities were [La/Fe] is $\sim 0.1$ dex higher than for the disk. We note that this is the opposite to findings in \citet{duong:19}. The metallicities of the bulge sample extends to slightly higher metallicities, pointing at a higher star formation rate of the bulge. Additionally, \citet{matteucci_ryde:19} shows that implementing a Salpeter like initial mass function (IMF), which favours massive stars compared to typical IMFs for the disk, better reproduce bulge abundances. For [Eu/Fe], the thick disk is enhanced as compared with the thin disk, reminding us of an $\alpha$-element. The decreasing trend for metallicities larger than [Fe/H] $\gtrsim -0.4$ is a result of iron production by SN Ia after a time delay of roughly 100 Myr - 1 Gyr \citep{matteucci:1990,ballero:07}. The bulge traces the thick disk in the [Eu/Fe] abundance, pointing at the bulge having similar star formation rate as that of the thick disk. A plateau, or a knee, can be seen around metallicities of $\sim -0.4$ for both the thick disk and the bulge. A knee at higher metallicities than in the solar vicinity was already predicted for the bulge by \citet{matteucci:1990} and in general for systems with higher star formation rate than in the solar vicinity. \begin{figure} \centering \includegraphics[width=\hsize]{eumg.pdf} \caption{[Eu/Mg] abundances against [Fe/H] as running mean with a 1$\sigma$ scatter for the thin disk (blue), thick disk (yellow) and bulge (red).} \label{fig: [Eu/Mg]}% \end{figure} In Fig. \ref{fig: [Eu/Mg]} we compare Eu with the well-determined $\alpha$-element magnesium (Mg) \citep[from][]{Jonsson2017b}, by plotting [Eu/Mg], for the same stars. The resulting, mostly flat, trend of all populations is already expected from the [Eu/Fe] trend, pointing at Eu having a contribution from progenitors of similar timescales as that of progenitors producing Mg (i.e. SNe II). It has indeed been shown by \cite{travaglio1999} that SNe II progenitors with masses of 8-10 M$_{\odot}$ best reproduce the r-process enrichment in the Galaxy, and \citet{cescutti:06} showed that to reproduce the ratio of typical s-process elements, such as [Ba/Fe], at low metallicities, a r-process production of these elements in stars with masses ranging from 8 to 30 M$_{\odot}$ should be assumed. Nonetheless, the origin of r-elements is, as mentioned earlier, still debated \citep[see e.g.][]{sneden:2000,THIELEMANN2011346,cote:2018,siegel2019,kajino:2019}. \begin{figure} \centering \includegraphics[width=\hsize]{laeu.pdf} \caption{[La/Eu] abundances against [Fe/H] as running mean with a 1$\sigma$ scatter for the thin disk (blue), thick disk (yellow) and bulge (red). A pure r-process line is plotted, calculated using the values presented in \citet{bisterzo:2014}} \label{fig: [La/Eu]}% \end{figure} A way to disentangle the s- and r-process contribution throughout the evolution of the Galaxy is to compare an s-process dominated element with that of an r-process dominated one. We thus compare La, with an s-process contribution of 76~\%, to that of Eu with an r-process contribution of 94 \% \citep{bisterzo:2014}, plotted as [La/Eu] in Fig. \ref{fig: [La/Eu]}. A pure r-process line is added, using the values from \citep{bisterzo:2014}. The value of the pure r-process line is calculated by subtracting the predicted s-process abundance from the Solar System total values, i.e by treating the r-process as a residual \citep{bisterzo:2014}. The trends in Fig. \ref{fig: [La/Eu]} show that the r-process dominates more and more the production of neutron-capture elements when the metallicity decreases, reaching [La/Eu] $= -0.25$ for the bulge and [La/Eu] $= -0.4$ for the thick disk at [Fe/H] $\sim -0.5$. With regard to the large scatter at supersolar metallicities, we refrain any further interpretations of the bulge abundances at these metallicities. At around [Fe/H] $\sim -0.6$ the [La/Eu] thick disk trend levels off or even increases with lower metallicities. Whether this is significant or not is yet to be answered and observations of more stars in this metallicity range are needed. The in general higher [La/Eu] abundances of the bulge compared with those of the thick disk point at the bulge having either less r-process production (in turn, possibly a different amount of SNe II), or a higher s-process contribution (as seen previously in the [La/Fe]-trend) than that of the thick disk. \subsection{First- and second-peak s-process elements} \label{section: first second s process peak} \begin{figure} \centering \includegraphics[width=\hsize]{hsls3.pdf} \caption{\label{fig: first second sprocess peak} The abundances ratio of the second-peak s-process elements (La, Ce) and the first-peak s-process element (Zr) against [Fe/H] as running mean with a 1$\sigma$ scatter for the thin disk (blue), thick disk (yellow) and bulge (red).} \end{figure} In Fig. \ref{fig: first second sprocess peak}, the running mean of the ratio of the second-peak s-process elements (a mean of La and Ce) and the first-peak s-process element Zr are plotted against metallicity. The trend, elaborated on in the last paragraph of this section, can be explained by considering the stellar yields from \cite{2016ApJ...825...26K}, where low-mass AGB stars have a higher relative production of second-peak elements compared to the production of first-peak element. The neutrons in the s-process come from two neutron sources, the ${}^{13}\text{C}(\alpha, n)^{16}$O- and the ${}^{22}\text{Ne}(\alpha, n)^{25}$Mg-reaction. The ${}^{13}$C source has a lower neutron density of roughly 10$^7$ neutrons/cm$^{3}$, whereas the neutron density for the ${}^{22}$Ne source is around 10$^{15}$ neutrons/cm$^{3}$. However, due to the longer timescales of the ${}^{13}$C reaction ($\sim 10^3$ years compared to $\sim 10$ years), the time integrated neutron flux for this neutron source is much higher than for the ${}^{22}$Ne source. Due to this, the ${}^{13}$C reaction builds up the heavier s-process elements, such as the second- (and third-)peak elements, whilst the ${}^{22}$Ne reaction is limited to producing the first-peak s-process elements \citep{karakaslattanzio:2014}. Furthermore, \cite{2017ApJ...835...97B} elaborate on the importance of the size of the ${}^{13}$C-pocket in the s-process production. The ${}^{22}\text{Ne}$ reaction takes place only in initially more massive (AGB) stars of $>4$ M$_{\odot}$, due to the higher temperatures of these stars \citep{karakaslattanzio:2014}. This shrinks the ${}^{13}$C-pocket, resulting in a smaller quantity of s-elements to be expected, \textit{especially} the heavier ones. In short: heavier AGB stars produce relatively fewer second-peak elements compared to low-mass AGB stars, and the latter have a longer time delay. Another aspect to keep in mind is that at lower metallicities, the number of neutrons to the number of available ${}^{56}$Fe-seeds is higher, compared to higher metallicities, which enables the build-up of second-peak elements \citep{busso1999}. In Fig. \ref{fig: first second sprocess peak} we first see an increasing trend in the thick disk for increasing metallicities, which turns over for solar metallicities and higher. Below solar metallicities (and above [Fe/H] $\sim -0.5$), all trends show an enrichment of second-peak as compared to first-peak elements. This is therefore explained by the low-mass AGB stars which has not yet enriched the interstellar medium (ISM) at the time of the formation of the older thick disk stars, resulting in relatively low [(La+Ce)/Zr] abundances at early times. At solar metallicities, the disk populations does not show any clear differences. As for the bulge, it follows the trend of the thick disk more closely than that of the thin disk, at subsolar metallicities. At supersolar metallicities, the first-peak elements seem to increase in the bulge, possibly explained by a contribution of metal-rich AGB stars, producing a higher amount of first-peak elements \citep{2016ApJ...825...26K}. \section{Conclusions} In this work we have determined abundances of the neutron-capture elements Zr, La, Ce and Eu in 45 bulge giants and 291 local disk giants. The determination has been done using high-resolution spectra obtained with FLAMES/UVES (bulge sample) or either FIES or PolarBase (disk sample) and the analysis code SME. All spectra are evaluated over the wavelength region 5800 - 6800 Å and the careful, manual, definition of the continuum surrounding the spectral lines of interest in the spectra have been crucial in order to get high-precision abundances. Synthetic spectra allows the modelling and handling of blends in the spectra, as well as accounting for hyperfine splitting (in the cases of La, Eu). Isotopic shifts has also been taken into account by manually scaling the $\log(gf)$-values of the identified transitions in the line list (for the isotopes of Zr, Ce, Eu). The stellar mass and metallicity are factors that contribute to, and affect, the s- and r-process production. Due to this, the enrichment of the ISM and the abundance of neutron-capture elements vary with time in the Galaxy, making them suitable probes for the Galactic chemical evolution. Our [Zr,La,Ce/Fe] bulge trends are in general flatter than those reported by previous studies, many of which are decreasing with higher metallicities. Such decreasing trends would suggest a higher r-process contribution to these elements in the bulge, while our flatter trends that have the same general shapes as our thick disk trends suggest more similar r/s-proportions in the creation of the neutron capture elements in the bulge and disks. The [La/Fe] bulge trend is $\sim 0.1$ dex higher compared with the disk, possibly indicating a higher s-process contribution in the bulge, compared with that of the disk. For [Eu/Fe] we see a decreasing trend with increasing metallicities for both the disk and the bulge, with a plateau at around [Fe/H] $\sim -0.4$. This is very similar to the typical $\alpha$-element trend, and plotting [Eu/Mg] confirms this, pointing at the r-process having similar production rate as that of Mg (coming from SNe II). For [La/Eu] we find that towards low metallicities, the abundances lay closer to the pure r-process line (reaching [La/Eu] $-0.4$ (disk) and $-0.25$ (bulge) at [Fe/H] $\sim -0.5$), indicating that the r-process was the dominating neutron-capture process at early times, both in the disk and the bulge. The results also point at either a) a different amount of massive stars or b) different contribution of the s-process, in the local thick disk and the bulge, where the [La/Eu] abundances seem to be systematically higher in the bulge than that of the thick disk. Since we compare abundances determined with the same method, for stars in the same evolutionary stage, the difference between the disk and the bulge in [La/Fe] could likely be real. When plotting the ratio of the second- and first-peak s-process elements, [(La+Ce)/Zr], against metallicity we see that the bulge and the thick disk trends follow each other closely. We also show that, according to theoretical predictions by \citet{karakaslattanzio:2014}, low-mass AGB stars are needed to explain the enhancement of second-peak s-process abundances compared to first-peak s-process abundances. To conclude, in general, our findings for Zr, Ce, Eu, point at the bulge having similar chemical evolution as that of the local thick disk, with similar star formation rate. On the other hand, our La trends for the bulge and the thick disk are offset by about 0.1: systematic effects could not be identified in our homogeneous analysis of the bulge and disk samples and further investigation is still required. Our results for the s-process elements differ substantially from previous works, where we find flatter trends. More bulge data would be needed to decrease the scatter and put further constraints on the bulge abundances. Additionally it would be useful to adopt the abundances to Galactic Chemical Evolution models to put further constraints on the evolution of the Galaxy and its components. \begin{acknowledgements} We would like to thank the referee, Mathieu Van der Swaelmen, for very insightful comments and suggestions that helped to improve this paper in many ways. This research has been partly supported by the Lars Hierta Memorial Foundation, and the Royal Physiographic Society in Lund through Stiftelsen Walter Gyllenbergs fond and M{\"a}rta och Erik Holmbergs donation. H.J. acknowledges support from the Crafoord Foundation, Stiftelsen Olle Engkvist Byggm{\"a}stare, and Ruth och Nils-Erik Stenb{\"a}cks stiftelse. This work has made use of data from the European Space Agency (ESA) mission {\it Gaia} (\url{https://www.cosmos.esa.int/gaia}), processed by the {\it Gaia} Data Processing and Analysis Consortium (DPAC, \url{https://www.cosmos.esa.int/web/gaia/dpac/consortium}). Funding for the DPAC has been provided by national institutions, in particular the institutions participating in the {\it Gaia} Multilateral Agreement. This publication made use of the SIMBAD database, operated at CDS, Strasbourg, France; NASA's Astrophysics Data System; and the VALD database, operated at Uppsala University, the Institute of Astronomy RAS in Moscow, and the University of Vienna. \end{acknowledgements} \bibliographystyle{aa}
\section{Introduction} The Elsevier cas-sc class is based on the standard article class and supports almost all of the functionality of that class. In addition, it features commands and options to format the \begin{itemize} \item document style \item baselineskip \item front matter \item keywords and MSC codes \item theorems, definitions and proofs \item lables of enumerations \item citation style and labeling. \end{itemize} This class depends on the following packages for its proper functioning: \begin{enumerate} \itemsep=0pt \item {natbib.sty} for citation processing; \item {geometry.sty} for margin settings; \item {fleqn.clo} for left aligned equations; \item {graphicx.sty} for graphics inclusion; \item {hyperref.sty} optional packages if hyperlinking is required in the document; \end{enumerate} All the above packages are part of any standard \LaTeX{} installation. Therefore, the users need not be bothered about downloading any extra packages. \section{Installation} The package is available at author resources page at Elsevier (\url{http://www.elsevier.com/locate/latex}). The class may be moved or copied to a place, usually, \verb+$TEXMF/tex/latex/elsevier/+, or a folder which will be read by \LaTeX{} during document compilation. The \TeX{} file database needs updation after moving/copying class file. Usually, we use commands like \verb+mktexlsr+ or \verb+texhash+ depending upon the distribution and operating system. \section{Front matter} The author names and affiliations could be formatted in two ways: \begin{enumerate}[(1)] \item Group the authors per affiliation. \item Use footnotes to indicate the affiliations. \end{enumerate} See the front matter of this document for examples. You are recommended to conform your choice to the journal you are submitting to. \section{Bibliography styles} There are various bibliography styles available. You can select the style of your choice in the preamble of this document. These styles are Elsevier styles based on standard styles like Harvard and Vancouver. Please use Bib\TeX\ to generate your bibliography and include DOIs whenever available. Here are two sample references: See \citet{Fortunato2010}. Also refer \citet{Fortunato2010,NewmanGirvan2004}. More citations are here \citep{Fortunato2010,Vehlowetal2013}. \section{Floats} {Figures} may be included using the command, \verb+\includegraphics+ in combination with or without its several options to further control graphic. \verb+\includegraphics+ is provided by {graphic[s,x].sty} which is part of any standard \LaTeX{} distribution. {graphicx.sty} is loaded by default. \LaTeX{} accepts figures in the postscript format while pdf\LaTeX{} accepts {*.pdf}, {*.mps} (metapost), {*.jpg} and {*.png} formats. pdf\LaTeX{} does not accept graphic files in the postscript format. \begin{figure} \centering \includegraphics[scale=.75]{figs/Fig1.pdf} \caption{The evanescent light - $1S$ quadrupole coupling ($g_{1,l}$) scaled to the bulk exciton-photon coupling ($g_{1,2}$). The size parameter $kr_{0}$ is denoted as $x$ and the \PMS is placed directly on the cuprous oxide sample ($\delta r=0$, See also Table \protect\ref{tbl1}).} \label{FIG:1} \end{figure} The \verb+table+ environment is handy for marking up tabular material. If users want to use {multirow.sty}, {array.sty}, etc., to fine control/enhance the tables, they are welcome to load any package of their choice and {cas-sc.cls} will work in combination with all loaded packages. \begin{table}[width=.9\linewidth,cols=4,pos=h] \caption{This is a test caption. This is a test caption. This is a test caption. This is a test caption.}\label{tbl1} \begin{tabular*}{\tblwidth}{@{} LLLL@{} } \toprule Col 1 & Col 2 & Col 3 & Col4\\ \midrule 12345 & 12345 & 123 & 12345 \\ 12345 & 12345 & 123 & 12345 \\ 12345 & 12345 & 123 & 12345 \\ 12345 & 12345 & 123 & 12345 \\ 12345 & 12345 & 123 & 12345 \\ \bottomrule \end{tabular*} \end{table} \section[Theorem and ...]{Theorem and theorem like environments} {cas-sc.cls} provides a few shortcuts to format theorems and theorem-like environments with ease. In all commands the options that are used with the \verb+\newtheorem+ command will work exactly in the same manner. {cas-sc.cls} provides three commands to format theorem or theorem-like environments: \begin{verbatim} \newtheorem{theorem}{Theorem} \newtheorem{lemma}[theorem]{Lemma} \newdefinition{rmk}{Remark} \newproof{pf}{Proof} \newproof{pot}{Proof of Theorem \ref{thm2}} \end{verbatim} The \verb+\newtheorem+ command formats a theorem in \LaTeX's default style with italicized font, bold font for theorem heading and theorem number at the right hand side of the theorem heading. It also optionally accepts an argument which will be printed as an extra heading in parentheses. \begin{verbatim} \begin{theorem} For system (8), consensus can be achieved with $\|T_{\omega z}$ ... \begin{eqnarray}\label{10} .... \end{eqnarray} \end{theorem} \end{verbatim} \newtheorem{theorem}{Theorem} \begin{theorem} For system (8), consensus can be achieved with $\|T_{\omega z}$ ... \begin{eqnarray}\label{10} .... \end{eqnarray} \end{theorem} The \verb+\newdefinition+ command is the same in all respects as its \verb+\newtheorem+ counterpart except that the font shape is roman instead of italic. Both \verb+\newdefinition+ and \verb+\newtheorem+ commands automatically define counters for the environments defined. The \verb+\newproof+ command defines proof environments with upright font shape. No counters are defined. \section[Enumerated ...]{Enumerated and Itemized Lists} {cas-sc.cls} provides an extended list processing macros which makes the usage a bit more user friendly than the default \LaTeX{} list macros. With an optional argument to the \verb+\begin{enumerate}+ command, you can change the list counter type and its attributes. \begin{verbatim} \begin{enumerate}[1.] \item The enumerate environment starts with an optional argument `1.', so that the item counter will be suffixed by a period. \item You can use `a)' for alphabetical counter and '(i)' for roman counter. \begin{enumerate}[a)] \item Another level of list with alphabetical counter. \item One more item before we start another. \item One more item before we start another. \item One more item before we start another. \item One more item before we start another. \end{verbatim} Further, the enhanced list environment allows one to prefix a string like `step' to all the item numbers. \begin{verbatim} \begin{enumerate}[Step 1.] \item This is the first step of the example list. \item Obviously this is the second step. \item The final step to wind up this example. \end{enumerate} \end{verbatim} \section{Cross-references} In electronic publications, articles may be internally hyperlinked. Hyperlinks are generated from proper cross-references in the article. For example, the words \textcolor{black!80}{Fig.~1} will never be more than simple text, whereas the proper cross-reference \verb+\ref{tiger}+ may be turned into a hyperlink to the figure itself: \textcolor{blue}{Fig.~1}. In the same way, the words \textcolor{blue}{Ref.~[1]} will fail to turn into a hyperlink; the proper cross-reference is \verb+\cite{Knuth96}+. Cross-referencing is possible in \LaTeX{} for sections, subsections, formulae, figures, tables, and literature references. \section{Bibliography} Two bibliographic style files (\verb+*.bst+) are provided --- {model1-num-names.bst} and {model2-names.bst} --- the first one can be used for the numbered scheme. This can also be used for the numbered with new options of {natbib.sty}. The second one is for the author year scheme. When you use model2-names.bst, the citation commands will be like \verb+\citep+, \verb+\citet+, \verb+\citealt+ etc. However when you use model1-num-names.bst, you may use only \verb+\cite+ command. \verb+thebibliography+ environment. Each reference is a \verb+\bibitem+ and each \verb+\bibitem+ is identified by a label, by which it can be cited in the text: \noindent In connection with cross-referencing and possible future hyperlinking it is not a good idea to collect more that one literature item in one \verb+\bibitem+. The so-called Harvard or author-year style of referencing is enabled by the \LaTeX{} package {natbib}. With this package the literature can be cited as follows: \begin{enumerate}[\textbullet] \item Parenthetical: \verb+\citep{WB96}+ produces (Wettig \& Brown, 1996). \item Textual: \verb+\citet{ESG96}+ produces Elson et al. (1996). \item An affix and part of a reference: \verb+\citep[e.g.][Ch. 2]{Gea97}+ produces (e.g. Governato et al., 1997, Ch. 2). \end{enumerate} In the numbered scheme of citation, \verb+\cite{<label>}+ is used, since \verb+\citep+ or \verb+\citet+ has no relevance in the numbered scheme. {natbib} package is loaded by {cas-sc} with \verb+numbers+ as default option. You can change this to author-year or harvard scheme by adding option \verb+authoryear+ in the class loading command. If you want to use more options of the {natbib} package, you can do so with the \verb+\biboptions+ command. For details of various options of the {natbib} package, please take a look at the {natbib} documentation, which is part of any standard \LaTeX{} installation. \section{Introduction} Our study of this subject was originally motivated by the work done over the last century in investigating $DS_n$, the subset of the complex plane consisting of every complex number that is an eigenvalue of some $n$-by-$n$ doubly stochastic matrix. This problem is part of a larger class of problems related to the Nonnegative Inverse Eigenvalue Problem, which asks which multisets of $n$ complex numbers are achievable as the spectrum of some matrix in $M_n(\mathbb R)$ with nonnegative entries. The analogous problem for row stochastic matrices was solved in 1951 \cite{Karpelevich}. In \cite{PerfectMirsky}, Perfect and Mirsky proved some properties of $DS_n$, including that $DS_n = \bigcup_{k \leq n} \Pi_k$ for $n \leq 3$, where $\Pi_k$ denotes the convex hull of the $k$th roots of unity. More recently, it was shown in \cite{DS4} that $DS_4 = \bigcup_{k \leq 4} \Pi_k$. However, there is an example of a doubly stochastic matrix in \cite{MR} that shows that $DS_5$ contains some points that do not belong to $\bigcup_{k \leq 5}\Pi_k$. Thus, a precise description of $DS_n$ remains elusive for $n \geq 5$. Birkhoff's theorem \cite{Birkhoff} states that the set of doubly stochastic matrices of size $n$ is precisely the convex hull of the permutation matrices of size $n$---a specific representation of the symmetric group $S_n$. Here, we study the region analogous to $DS_n$ for different matrix groups---given a matrix group $G$ we consider its \textit{hull spectrum} $\HS(G)$, which is the subset of the complex plane consisting of points achieved as eigenvalues of matrices in the convex hull of $G$. Moreover, for an abstract group $\mathcal{G}$ we study the hull spectra $\HS(\rho(\mathcal{G}))$ for representations $\rho$ of $\mathcal{G}$. We show that hull spectra of finite matrix groups share many of the nice properties that $DS_n$ possesses. Namely, they are contained in the unit disc, star-shaped from any $\eta \in [0,1]$ for nontrivial groups, and bounded above and below by some natural regions related to the group. These properties are notable, since the hull spectrum of a finite set of matrices $S \subset M_n(\mathbb C)$ is not generally well-behaved. For instance, it is not difficult to construct sets $S$ for which $\HS(S)$ achieves values of larger magnitude than the spectral radii of matrices in $S$, or for which $\HS(S)$ is not connected, let alone star-shaped. In studying the hull spectra of specific classes of groups, we first classify the hull spectra of (possibly infinite) abelian matrix groups. Applying these results to cyclic subgroups of a general matrix group $G$, we attain lower bounds on the hull spectrum of $G$. We show that for some classes of groups, the lower bound is always attained, so the hull spectra are in fact unions of certain polygons $\Pi_k$. However, we note that there are groups that have hull spectra with exceptional regions outside of these polygons. Finally, we apply our results to $DS_n$, and thus prove properties of $DS_n$ without using the theory of nonnegative matrices or specific facts about doubly-stochastic matrices, which have been used in the past to study $DS_n$. We thus find that the concept of the hull spectra of a matrix group is useful in the study of $DS_n$, and is also an interesting concept in its own right with much nice structure to explore. \section{Preliminaries and Basic Properties} \begin{definition} Let $S \subseteq M_n(\mathbb C)$ be a set of $n$-by-$n$ complex matrices. The \emph{convex hull} of $S$, denoted $\Co(S)$, is the set of all convex combinations of elements of $S$. The \emph{hull spectrum} of $S$, denoted $\HS(S)$, is the set of all complex numbers that occur as eigenvalues of some matrix in $\Co(S)$. In most cases, we will consider the hull spectrum $\HS(G)$ of a matrix group $G \subseteq GL_n(\mathbb C)$. \end{definition} Given an abstract group $\mathcal{G}$, the hull spectra of different $\mathcal{G}$-representations may vary significantly. For instance, the trivial representation has hull spectrum $\{1\}$. Since a non-faithful representation may be viewed as a representation of a particular quotient group, we primarily consider the hull spectra of faithful representations. This restriction allows us to give tighter bounds (on hull spectra) that better characterize the group. \begin{definition} Given an abstract group $\mathcal{G}$, its \emph{faithful hull spectra} are the hull spectra $\HS(\rho(\mathcal{G}))$ for faithful $\mathcal{G}$-representations $\rho$ (if they exist), in which we write $\rho(\mathcal{G})$ to denote the image of $\mathcal{G}$ under $\rho$. \end{definition} We now present some relatively straightforward lemmas that will aid us in later proofs. \begin{lemma}\label{SubgroupLemma} If $H$ is a matrix subgroup of $G$, then $\HS(H) \subseteq \HS(G)$. \end{lemma} \begin{proof} We have $\Co(H) \subseteq \Co(G)$, so $\HS(H) \subseteq \HS(G)$. \end{proof} \begin{lemma}\label{IsomorphicRepresentationLemma} Let $\mathcal{G}$ be a group, and let $\rho_1, \rho_2$ be isomorphic $\mathcal{G}$-representations. Then $\HS(\rho_1(\mathcal{G})) = \HS(\rho_2(\mathcal{G}))$. \end{lemma} \begin{proof} Denote by $n$ the degree of $\rho_1$ and $\rho_2$. Since $\rho_1$ and $\rho_2$ are isomorphic, there is $S \in GL_n(\mathbb C)$ such that $\rho_1(g) = S\rho_2(g) S^{-1}$ for all $g \in \mathcal{G}$. Then all convex combinations in $\Co(\rho_1(\mathcal{G}))$ are similar to the corresponding convex combinations in $\Co(\rho_2(\mathcal{G}))$ by $S$, so their eigenvalues coincide. \end{proof} \begin{lemma}\label{IrrepLemma} Let $\mathcal{G}$ be a finite group and $\rho : \mathcal{G} \to GL(V)$ a finite-dimensional $\mathcal{G}$-representation with irreducible direct sum decomposition $\rho = \bigoplus_{i=1}^m \rho_i$. Then $\HS(\rho(\mathcal{G})) = \bigcup_{i=1}^m \HS(\rho_i(\mathcal{G}))$. \end{lemma} \begin{proof} Since $\rho = \bigoplus_{i=1}^m \rho_i$, we may choose a basis of $V$ such that each element of $\rho(\mathcal{G})$ is block upper triangular with blocks $\rho_i(\mathcal{G})$ along the diagonal. Then the spectrum of any element of $\Co(\rho(\mathcal{G}))$ is the union of the spectra of the corresponding elements of $\Co(\rho_i(\mathcal{G}))$ for $i=1,...,m$. \end{proof} For a matrix group $G$, the geometry of $\HS(G)$ is now considered. In particular, we discuss the set of \emph{star points} of $\HS(G)$, or points $\lambda \in \HS(G)$ such that for any $\lambda' \in \HS(G)$, all points on the line segment between $\lambda$ and $\lambda'$ lie in $\HS(G)$. In this case, we say that $\HS(G)$ is \emph{star-shaped} from $\lambda$. \begin{lemma}\label{StarConvexLemma} Let $S \subseteq M_n$, and suppose $\Co(S)$ contains $\eta I$ for some $\eta \in \mathbb C$. Then $\HS(S)$ is star-shaped from $\eta$. In particular, for a matrix group $G$, $\HS(G)$ is star-shaped from 1. \end{lemma} \begin{proof} Let $\lambda$ be an eigenvalue of the convex combination $C \in \Co(S)$. Since $\eta I \in \Co(S)$, we have $(1-\alpha)C + \alpha \eta I \in \Co(S)$ and hence the eigenvalue $(1-\alpha)\lambda + \alpha \eta$ is in $\HS(S)$ for any $\alpha \in [0,1]$. Thus, the whole line segment between $\eta$ and $\lambda$ is contained in $\HS(S)$ Any matrix group $G$ contains the identity, and hence is star-shaped from $1$. \end{proof} \begin{lemma}\label{ContainsZeroLemma} Let $\rho : \mathcal{G} \to GL(V)$ be a nontrivial irreducible representation of the finite group $\mathcal{G}$. Then the zero matrix belongs to $\Co(\rho(G))$. In particular, $\HS(\rho(\mathcal{G}))$ is star-shaped from $0$. \end{lemma} \begin{proof} Notice that the group average $A = \frac{1}{\abs{\mathcal{G}}} \sum_{g \in \mathcal{G}} \rho(g)$ is an idempotent element of $\Co(\rho(\mathcal{G}))$. Using the well-known result (see for instance \cite{Serre}) that the sum of character values of a nontrivial irreducible representation satisfies $\sum_{g \in \mathcal{G}} \chi(g) = 0$, we find that $\Tr(A) = 0$. Since $A$ is idempotent, it follows that $A = 0 \in \Co(\rho(\mathcal{G}))$, as desired. Applying Lemma \ref{StarConvexLemma} shows that $\HS(\rho(\mathcal{G}))$ is star-shaped from $0$. \end{proof} \begin{corollary}\label{StarCorollary} Let $G$ be a nontrivial finite matrix group. Then $\HS(G)$ is star-shaped from every point in $[0,1]$. \end{corollary} \begin{proof} View $G$ as a matrix group representation of some abstract group $\mathcal{G}$. Since $G$ is nontrivial, the representation contains some nontrivial summands. Each of these summands has a hull spectrum that is star-shaped from both $0$ and $1$, so $\HS(G)$ is also star-shaped from $0$ and $1$. Since the set of star points of a subset of a vector space is convex, the corollary is proven. \end{proof} Another important geometric consideration is the relationship of $\HS(G)$ with the unit circle $S_1$ and the closed unit disc $D$. See \cite{MatrixAnalysis} for necessary results on matrix norms. \begin{lemma}\label{UnitBallLemma} Let $S \subseteq M_n$ be a collection of matrices, and suppose there is a matrix norm $\|\cdot\|$ such that $\|A\| \leq 1$ for all $A \in S$. Then $\HS(S)$ is contained in the closed unit disc $D$. In particular, we have $\HS(G) \subseteq D$ for any finite matrix group $G$. \end{lemma} \begin{proof} This is clear by convexity of norms and the fact that matrix norms bound the spectral radius. For any convex combination of group elements $\sum_k \alpha_k A_k \in \Co(S)$, it holds that \[ r \left(\sum_k \alpha_k A_k \right) \leq \norm{\sum_k \alpha_k A_k} \leq \sum_k \alpha_k \norm{A_k} = 1 \] \noindent in which $r(A)$ is the spectral radius of $A$. If $G$ is a finite matrix group, we know as a basic result of representation theory that there is a change of basis such that each element of $G$ is unitary. By Lemma \ref{IsomorphicRepresentationLemma}, this change of basis does not affect the hull spectrum. Since the spectral norm of a unitary matrix is $1$, the claim follows. \end{proof} It is important that the condition of the previous lemma hold for finite matrix groups $G$. Consider the following matrices and note that the condition does not hold for $S_x$: \[S_x = \Big\{\begin{bmatrix}1 & 2x \\ 0 & 1 \end{bmatrix}, \begin{bmatrix}1 & 0 \\ 2x & 1 \end{bmatrix}\Big\}, \qquad B_x = \begin{bmatrix}1 & x\\ x & 1 \end{bmatrix} \in \Co(S_x) \] Since $B_x \in \Co(S_x)$, letting $x \to \infty$, we see that the $\HS(S_x)$ contain eigenvalues of arbitrarily high magnitude while each matrix in $S_x$ has only $1$ as its sole unique eigenvalue. Now we present a result restricting the multisets of eigenvalues achievable by $C \in \Co(G)$ for a finite matrix group $G$. \begin{proposition}\label{ExtremalEigenvalues} For $G$ a finite matrix group, a matrix $C \in \Co(G)$ has all eigenvalues on the unit circle if and only if $C$ is an element of $G$. \end{proposition} \begin{proof} Since $G$ is a finite matrix group, we can assume $A_i \in G$ are all unitary. Let $C = \sum_{i=1}^k \alpha_i A_i$ where $\alpha_i > 0$ and $\sum_i \alpha_i = 1$ be an element of $\Co(G)$, and suppose that $C$ has all eigenvalues on the unit circle. Then $1 = \abs{\det(C)} = \sigma_1 \cdots \sigma_n$ where $\sigma_i$ are the singular values of $C$. Due to the convexity of the spectral norm and the fact that $C$ is a convex combination of unitary matrices, which all have spectral norm $1$, we know that the largest singular value satisfies $\sigma_1 \leq 1$, so in fact all singular values of $C$ are $1$. This implies that $C$ is unitary. Then $A_1^* C$ is also unitary and of the form \[A_1^*C = \alpha_1 I + \alpha_2 A_1^* A_2 \ldots + \alpha_k A_1^* A_k\] The eigenvalues of $A_1^*C$ are of the form $\alpha_1 + \mu_i$, where $\mu_i$ is an eigenvalue of $\sum_{i=2}^k \alpha_i A_1^* A_i$. Each $\mu_i$ has magnitude at most $\sum_{i=2}^k \alpha_i$, as we can again apply convexity of the spectral norm since the $A_1^* A_i$ are unitary. Moreover, since $A_1^*C$ is unitary, all of its eigenvalues have magnitude $1$. This forces the eigenvalues of $A_1^*C$ to all be $1$, since this is the case of equality in the triangle inequality $1 = \abs{\alpha_1 + \mu_i} \leq \alpha_1 + \sum_{i=2}^n \alpha_i = 1$. Thus, $A_1^*C = I$ and thus $C = A_1$. \end{proof} \section{Abelian Groups}\label{AbelianSection} We begin by considering groups of $1$-by-$1$ matrices i.e. groups of complex numbers. As we will see in Theorem \ref{AbelianTheorem}, the hull spectrum problem for any abelian group of matrices may be reduced to the $1$-by-$1$ case. For a subset $S \subseteq GL_n(\mathbb C)$, denote by $\langle S \rangle$ the matrix group generated by $S$. Let $S_1$ and $B_1$ denote the unit circle and open unit disc of the complex plane respectively. Moreover, let $B_\alpha' = B_1 \cup \{e^{2\pi i \alpha n} : n \in \mathbb Z\}$, and let $\mathbb R^+$ (resp.\ $\mathbb R^-$) be the strictly positive (resp.\ negative) real numbers. \begin{lemma} Let $\lambda \in \mathbb C \backslash \{0\}$. Then \begin{enumerate} \item if $\lambda$ is a primitive $n$th root of unity, then $\HS(\langle \lambda \rangle) = \Pi_n$. \item if $\lambda = e^{2\pi i \alpha}$ is not a root of unity, then $\HS(\langle \lambda \rangle) = B_\alpha'$. \item if $\lambda \in \mathbb R^+ \backslash\{1\}$, then $\HS(\langle \lambda \rangle) = \mathbb R^+$. \item if $\lambda \in \mathbb R^- \backslash\{-1\}$, then $\HS(\langle \lambda \rangle) = \mathbb R$. \item if $\lambda \notin S_1 \cup \mathbb R$, then $\HS(\langle \lambda \rangle) = \mathbb C$. \end{enumerate} \end{lemma} \begin{proof} We address each case individually. Note that (1) and (2) correspond to the case in which $\lambda \in S_1$, and that (3) and (4) correspond to the case in which $\lambda \in \mathbb R \backslash S_1$. It follows that each nonzero complex number satisfies exactly one of these conditions. \begin{enumerate} \item If $\lambda$ is a primitive $n$th root of unity, then $\HS(\langle \lambda \rangle) = \HS(G)$ where $G$ is the group of $n$th roots of unity. The convex combinations of these are precisely the polygon $\Pi_n$. \item If $\lambda = e^{2\pi i \alpha}$, then $\HS(\langle \lambda \rangle) = \HS(G)$ where $G = \{e^{2\pi i \alpha n} \mid n \in \mathbb Z\}$. Since $\lambda$ is not a root of unity, this group is a countable dense subset of $S_1$. Thus, we find that $\HS(\langle \lambda \rangle)$ is the union of this countable dense subset together with the open unit ball, which is precisely $B_\alpha'$. \item If $\lambda$ is a positive real number not equal to 1, then powers of lambda can attain arbitrarily small and arbitrarily large positive real numbers. Thus, the set of convex combinations of these powers is precisely $\mathbb R^+$. \item Similarly as above, if $\lambda$ is a negative real number not equal to $-1$, we may find powers of $\lambda$ which are arbitrarily large negative and positive real numbers. It therefore follows that $\HS(\langle \lambda \rangle) = \mathbb R$ in this case. \item Otherwise, $\lambda$ is a complex number that does not lie on the unit circle and is not real. In this case, there are powers of $\lambda$ with arbitrarily large modulus. Since $\lambda$ is not real, these powers are not all contained in the same half-plane. Thus, their convex hull contains all complex numbers. \end{enumerate} \end{proof} \begin{definition} We say that $\lambda \in \mathbb C$ is \emph{of type 1} if it satisfies hypothesis 1 of the above lemma (i.e. if it is an integral root of unity). Similarly, we may classify any other nonzero complex number as type 1, 2, 3, 4, or 5 depending on which hypothesis it satisfies. \end{definition} \begin{lemma} Let $G$ be a subgroup of the nonzero complex numbers, and let $\Lambda \subseteq G$ be any generating set of the group. Then \begin{enumerate} \item if $\Lambda$ contains an element of type 5, then $\HS(G) = \mathbb C$. \item if $\Lambda$ contains a non-real element of type 1 or 2 and an element of type 3 or 4, then $\HS(G) = \mathbb C$. \item if $\Lambda \subseteq S_1$, then $\HS(G)$ is a union of some $\Pi_n$'s with some $B_\alpha'$'s. \item if $\Lambda \subseteq \mathbb R^+$ but $\Lambda \not \subseteq S_1$, then $\HS(G) = \mathbb R^+$ \item if $\Lambda \subseteq \mathbb R$ but $\Lambda \not \subseteq S_1$ and $\Lambda \not \subseteq \mathbb R^+$, then $\HS(G) = \mathbb R$ \end{enumerate} \end{lemma} \begin{proof} We again address each case individually. Notice that if $\Lambda$ does not satisfy hypothesis 1 or 2, then $\Lambda$ is contained in either $S_1$ or $\mathbb R$. The three remaining hypotheses therefore handle each remaining case, so any collection $\Lambda$ of nonzero complex numbers satisfies exactly one of these conditions. \begin{enumerate} \item This case is trivial by Lemma \ref{SubgroupLemma}. \item Let $\lambda \in \Lambda$ be non-real and of type 1 or 2, and let $\lambda' \in \Lambda$ be of type 2 or 3. Then $\lambda \lambda' \in G$ is a non-real and has modulus not equal to 1, so we are again finished by Lemma \ref{SubgroupLemma}. \item Notice that if $\Lambda \subseteq S_1$ then $G \subseteq S_1$ as well. If $\Lambda$ is finite and all elements of $\Lambda$ are of type 1, then let $n$ be the least common multiple of all $k \in \mathbb N$ such that $\Lambda$ contains a primitive $k$th root of unity. Then $G$ is precisely the $n$th roots of unity, so $\HS(G) = \Pi_n$ in this case. Otherwise $\Lambda$ is either infinite or contains an element of type 2, so $G$ is a dense subset of $S_1$. Thus $B_1 \subseteq \HS(G)$, so in fact $B_1 \cup G = \HS(G)$. It follows that $\HS(G) = \bigcup_{\lambda \in G} \HS(\langle \lambda \rangle)$, finishing our proof in this case. \item By Lemma \ref{SubgroupLemma} we know that $\mathbb R^+ \subseteq \HS(G)$. Further, we have $G \subseteq \mathbb R^+$ and $\HS(\mathbb R^+) = \mathbb R^+$, so the other direction also holds. \item We use the same reasoning as in (4). \end{enumerate} This completes the proof. \end{proof} With these lemmas in mind, we now have a full solution to the abelian group case as follows: \begin{theorem}\label{AbelianTheorem} Let $G$ be an abelian matrix group, and consider a generating set $\{A_i\}$ for $G$. let $\lambda_{i,1}, ..., \lambda_{i,n}$ be the eigenvalues of $A_i$ for each $i$. Then \begin{align*} \HS(G) = \bigcup_{j=1}^n \HS(\langle \{\lambda_{i,j}\}_i \rangle) \end{align*} In particular, $\HS(G)$ is a union of five types of sets: $\mathbb C, \mathbb R, \mathbb R^+, \Pi_k, $ and $B_\alpha '$ \end{theorem} \begin{proof} Since $G$ is a commuting family of matrices, we may choose a basis of $\mathbb C^n$ wherein each $A_i^k \in G$ (for $k \in \mathbb Z$) is upper-triangular (see e.g.\ \cite{MatrixAnalysis}). Let $\lambda_{i,1}^k, ..., \lambda_{i,n}^k$ be the diagonal elements of each $A_i^k$. Then the eigenvalues of $\sum_{i,k} \alpha_{i,k} A_i^k$ are $\sum_{i,k} \alpha_k \lambda_{i,j}^k$ for $j=1,...,n$. It follows that the hull spectrum $\HS(G)$ is determined entirely by the eigenvalues (ordered according to the chosen basis) of the generators $A_i$. \end{proof} \begin{corollary} For a finite abelian matrix group $G$, we have \[\HS(G) = \bigcup_{k \in \mc{K}} \Pi_k\] where $\mc{K}$ is the set of all $k \in \mathbb N$ such that some element $A \in G$ has a primitive $k$th root of unity as an eigenvalue. \end{corollary} We conclude this section with a brief analysis of faithful hull spectra of abstract finite abelian groups. \begin{proposition}\label{CyclicProp} Let $\mathcal{G} = \langle g \rangle$ be a cyclic group of finite order $n$. Then the faithful hull spectra of $\mathcal{G}$ are of the form \[\bigcup_{j \in J} \Pi_j\] for any collection $J$ of positive integers whose least common multiple is $n$. \end{proposition} \begin{proof} Note that the irreducible representations of $\mathcal{G}$ are given by $\rho_k(g) = g^k$ for $k=0,1,...,n-1$, and $\HS(\rho_k(\mathcal{G})) = \Pi_{n/d}$ where $d=\gcd(n,k)$. Since a faithful representation of $\mathcal{G}$ is a direct sum of some $\rho_k$ such that the $k$ have greatest common factor 1, it follows that the $n/d$ must have least common multiple $n$. Since any configuration of $\rho_k$ such that the $n/d$ have least common multiple $n$ is faithful, we are finished. \end{proof} \section{Bounds on the Hull Spectra of General Finite Groups} Now, we consider $\HS(G)$ for general finite matrix groups $G$. A simple lower bound from our previous results is given by the following lemma. \begin{lemma}\label{LowerBound} For a finite matrix group $G$, we have $\bigcup_{k \in \mc{K}} \Pi_k \subseteq \HS(G)$, in which $\mc{K}$ is the set of all $k \in \mathbb N$ such that some element $A \in G$ has a primitive $k$th root of unity as an eigenvalue. In particular, we have $\Pi_p \subseteq \HS(G)$ when $p$ is a prime that divides the order of $G$. \end{lemma} \begin{proof} For any $A \in G$ with a primitive $k$th root of unity as an eigenvalue, we know by Theorem \ref{AbelianTheorem} that $\Pi_k \subseteq \HS(\langle A \rangle) \subseteq \HS(G)$. \end{proof} \begin{definition} In view of Lemmas \ref{IsomorphicRepresentationLemma} and \ref{IrrepLemma}, we see that for a finite group $\mathcal{G}$, the hull spectrum of a $\mathcal{G}$-representation is entirely determined by which irreducible summands are present in its direct sum decomposition into irreducibles. Recall the \emph{left regular representation} of $\mathcal{G}$, given by $\rho_{\text{reg}} : \mathcal{G} \to GL(V_{\text{reg}})$ where $V_{\text{reg}}$ is the vector space of all functions $\mathcal{G} \to \mathbb C$ and $(\rho_{\text{reg}}(g)f)(g') = f(g^{-1}g')$ for $f \in V_{\text{reg}}$ and $g,g' \in \mathcal{G}$. It is a basic fact in representation theory (see e.g.\ \cite{Lang}) that the regular representation contains every irreducible as a summand, so $\HS(\rho_{\text{reg}}(\mathcal{G}))$ is an upper bound on the hull spectrum of any $\mathcal{G}$-representation. We will refer to $\HS(\rho_{\text{reg}}(\mathcal{G}))$ as the \emph{maximal hull spectrum} of $\mathcal{G}$. Note that in view of Proposition \ref{CyclicProp}, the maximal hull spectrum of the cyclic group of order $n$ is $\Pi_n$. \end{definition} \begin{lemma}\label{LowerBoundRegularRep} For a finite group $\mathcal{G}$, we have $\bigcup_{k \in \mc{K}} \Pi_k \subseteq \HS(\rho_{\text{reg}}(\mathcal{G}))$, in which $\mc{K}$ is the set of all $k \in \mathbb N$ such that some element $g \in \mathcal{G}$ has order $k$. \end{lemma} \begin{proof} Suppose $g \in \mathcal{G}$ has order $k$. By Lemma \ref{LowerBound}, it suffices to show that $\rho_{\text{reg}}(g)$ has a primitive $k$th root of unity as an eigenvalue. Observe that each element of $\mathcal{G}$ has an orbit of size $k$ under the action by $g$. Define $f \in V_{\text{reg}}$ by mapping an arbitrary element of each orbit to $1$, and then subsequently mapping each other element to a $k$th root of unity so that $\rho_{\text{reg}}(g)f = e^{2\pi i/k} f$. Then $e^{2\pi i/k}$ is an eigenvalue of $\rho_{\text{reg}}(g)$, so we are finished. \end{proof} We know from Theorem \ref{AbelianTheorem} that finite abelian groups have hull spectra that are exactly unions of some polygons $\Pi_k$. In particular, the lower bounds given in Lemmas \ref{LowerBound} and \ref{LowerBoundRegularRep} are actually tight for finite abelian groups. We will later show that the lower bound is tight for certain other finite groups as well. However, the inclusions given by these lemmas are not tight in other cases (such as $\mathcal{G} = S_5$ and many alternating groups $A_n$). Interestingly, they are known to be tight for $S_n$ with $n \leq 4$ and may be tight for many $S_n$ with $n > 5$. For these reasons, it will also be useful to determine some upper bounds on the hull spectra of groups. To obtain an upper bound on $\HS(G)$ for a matrix group $G$, we use properties of the field of values of a matrix. For a matrix $A \in M_n$, the \textit{field of values} of $A$ is defined as \[F(A) = \{x^* A x \mid x \in \mathbb C^n, x^* x = 1\} \] We make use of several fundamental properties of the field of values, as can be found in \cite{Topics}. For sets $X$ and $Y$ we denote their sum $X+Y = \{x + y \mid x \in X,\; y \in Y\}$. \begin{lemma}\label{FieldOfValuesLemma} For matrices $A, B \in M_n$, \begin{itemize} \item $\sigma(A) \subseteq F(A)$ \item $F(A+B) \subseteq F(A) + F(B)$ \item $F(\alpha A) = \alpha F(A)$ for $\alpha \in \mathbb C$ \item If $A$ is normal, then $F(A) = \Co(\sigma(A))$ \end{itemize} \end{lemma} These properties immediately give an upper bound on $\HS(G)$. \begin{lemma}\label{UpperBoundLemma} For any finite matrix group $G$, \[\HS(G) \subseteq \Co\left(\; \bigcup_{A \in G} \Co\big(\sigma(A)\big)\right)\] \end{lemma} \begin{proof} We can assume all matrices in $G$ are unitary and thus also normal. Due to Lemma \ref{FieldOfValuesLemma}, for $\alpha_k \geq 0$ with $\sum_k \alpha_k = 1$, we have \begin{align*} \sigma \left( \sum_k \alpha_k A_k \right) & \subseteq F \left( \sum_k \alpha_k A_k \right) \\ & \subseteq \sum_k F(\alpha_k A_k) \\ & = \sum_k \alpha_k F(A_k) \\ & = \sum_k \alpha_k \Co \big( \sigma(A_k) \big) \\ & \subseteq \Co \left( \bigcup_k \Co \big( \sigma(A_k) \big) \right), \end{align*} so the claim holds. \end{proof} Together with the previously-derived lower bound on $\HS(G)$, this upper bound yields the following results: \begin{corollary}\label{TotalBoundsCorollary} For a finite matrix group $G$, we have \[ \bigcup_{k \in \mc{K}} \Pi_k \subseteq \HS(G) \subseteq \Co \left( \bigcup_{k \in \mc{K}} \Pi_k \right) \] in which $\mc{K}$ is the set of $k$ such that some $A \in G$ has a primitive $k$th root of unity as an eigenvalue. \end{corollary} \begin{corollary}\label{TotalRegRepBoundsCorollary} For a finite group $\mathcal{G}$, we have \[ \bigcup_{k \in \mc{K}} \Pi_k \subseteq \HS(\rho_{\text{reg}}(\mathcal{G})) \subseteq \Co \left( \bigcup_{k \in \mc{K}} \Pi_k \right) \] in which $\mc{K}$ is the set of $k$ such that some $g \in \mathcal{G}$ has order $k$. \end{corollary} Recall the doubly stochastic matrix \[C_t = \begin{bmatrix} 0 & 0 & 0 & 1 & 0 \\ 0 & 0 & t & 0 & 1-t \\ 0 & t & 1-t & 0 & 0 \\ 0 & 1-t & 0 & 0 & t \\ 1 & 0 & 0 & 0 & 0 \end{bmatrix},\] which for $t=\frac{1}{2}$ serves as the example in \cite{MR} that shows that $DS_5 \neq \bigcup_{k \leq 5} \Pi_k$. We remark that the eigenvalues realized by $C_t$ for any $t \in [0,1]$ all lie within $\bigcup_{k \leq 6} \Pi_k$, the lower bound given in Corollary \ref{TotalRegRepBoundsCorollary} (since $S_5$ has elements of orders $1$ through $6$). As we have seen in section \ref{AbelianSection}, $\HS(\rho_{\text{reg}}(\mathcal{G}))$ achieves the lower bound when $\mathcal{G}$ is abelian. The following two sections prove that this is also the case for the dihedral groups and the quaternion group. However, in Section \ref{sec:7} we present an example in $A_4$ for which the lower bound in Corollary \ref{TotalRegRepBoundsCorollary} is not achieved. \section{Dihedral Groups} In this section we consider the dihedral group \[D_{2n} = \langle r,s \mid r^n = s^2 = (sr)^2 = 1 \rangle\] of symmetries of the $n$-gon. The following two observations will classify the irreducible representations of $D_{2n}$ (see \cite{DihedralIrreps}) so that we may analyze the resulting hull spectra. \begin{observation}\label{DihedralOddObservation} We note that if $n$ is odd, there are $\frac{n+3}{2}$ irreducible representations of $D_{2n}$. Two of these representations are one-dimensional, so their images are abelian groups of complex numbers. In particular, the only two groups realized are the trivial group $\{1\}$ and $\mathbb Z/2\mathbb Z = \{-1, 1\}$. The remaining $\frac{n-1}{2}$ irreducibles are of the form $\rho_k : D_{2n} \to GL(\mathbb C^2)$ in which \begin{align*} \rho_k(r) = \begin{bmatrix} \cos k\theta_n & -\sin k\theta_n \\ \sin k\theta_n & \cos k\theta_n \end{bmatrix} \quad \quad \quad \rho_k(s) = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix} \end{align*} for $\theta_n = \frac{2\pi}{n}$ and $k=1,...,\frac{n-1}{2}$. \end{observation} \begin{observation}\label{DihedralEvenObservation} If $n$ is even, there are $\frac{n+6}{2}$ irreducible representations of $D_{2m}$, four of which are one-dimensional with images $\{1\}$ or $\{-1, 1\}$. As above, the rest are of the form $\rho_k : D_{2n} \to GL_2(\mathbb C)$ in which \begin{align*} \rho_k(r) = \begin{bmatrix} \cos k\theta_n & -\sin k\theta_n \\ \sin k\theta_n & \cos k\theta_n \end{bmatrix} \quad \quad \quad \rho_k(s) = \begin{bmatrix} 0 & 1 \\ 1 & 0 \end{bmatrix} \end{align*} for $\theta_n = \frac{2\pi}{n}$ and $k=1,...,\frac{n-2}{2}$. \end{observation} \begin{theorem}\label{DihedralIrrepTheorem} With $\rho_k$ defined as above, \[\HS(\rho_k(D_{2n})) = \Pi_a \cup \Pi_2\] for $a = \frac{n}{\gcd(n,k)}$. \end{theorem} \begin{proof} Since $\rho_k(D_{2n}) = \rho_{\frac{k}{\gcd(n,k)}}(D_{2a})$, we may reduce to the case in which $n=a$ and $k = \frac{k}{\gcd(n,k)}$, so $k$ is prime to $n$. Under this assumption, we see that the elements of $\rho_k(D_{2n})$ are exactly the same as those in $\rho_1(D_{2n})$. Thus, we may assume without loss of generality that $k=1$. We now set $G = \rho_1(D_{2n})$ and aim to prove $\HS(G) = \Pi_n \cup \Pi_2$. The inclusion $\HS(G) \supseteq \Pi_n \cup \Pi_2$ is trivial by Lemma \ref{SubgroupLemma}, as $\HS(\langle r \rangle) = \Pi_n$ and $\HS(\langle s \rangle) = \Pi_2$. We now claim that the spectrum of every element of $\Co(G)$ is contained within $\Pi_n \cup \Pi_2$. Let $C \in \Co(G)$, so it is of the following form: \begin{align*} C & = \alpha_0 I + \alpha_1 r + \ldots + \alpha_{n-1} r^{n-1} + \beta_0 s + \beta_1 rs + \ldots + \beta_{n-1}r^{n-1}s\\ & = \begin{bmatrix} \sum_{k=0}^{n-1} \left( \alpha_k \cos(k\theta_n) - \beta_k \sin(k \theta_n) \right) & \beta_0 + \sum_{k=0}^{n-1} \left( -\alpha_k \sin(k \theta_n) + \beta_k \cos(k \theta_n) \right) \\ \beta_0 + \sum_{k=0}^{n-1} \left( \alpha_k \sin(k \theta_n) + \beta_k \cos(k \theta_n) \right) & \sum_{k=0}^{n-1} \left( \alpha_k \cos(k \theta_n) + \beta_k \sin(k \theta_n) \right) \end{bmatrix} \end{align*} where $\alpha_k \geq 0$, $\beta_k \geq 0$, $\sum_k ( \alpha_k + \beta_k ) = 1$ and $\theta_n = \frac{2\pi}{n}$. Note that by Lemma \ref{UnitBallLemma}, we know that $\HS(G) \subseteq \ol{B}_1$. Then if $C$ has real eigenvalues, it follows that $\sigma(C) \subseteq \Pi_2$. Otherwise $C$ has non-real eigenvalues $\lambda, \ol{\lambda}$ for some $\lambda \in \mathbb C \backslash \mathbb R$. Then we see that \begin{align*} \mrm{Re}(\lambda) = \frac{1}{2}\Tr(C) & = \sum_{k=0}^{n-1}\alpha_k\cos(k \theta_n) \end{align*} Let $B = \frac{1}{2i}(C - C^*)$. It is well-known (see \cite{BoundsForEigenvalues}) that $\lambda_{min}(B) \leq \mrm{Im}(\lambda) \leq \lambda_{max}(B)$. Also, \[B = \begin{bmatrix} 0 & \frac{-1}{i}\sum_{k=0}^{n-1} \alpha_k \sin(k \theta_n)\\ \frac{1}{i}\sum_{k=0}^{n-1} \alpha_k \sin(k \theta_n) & 0 \end{bmatrix}\] has eigenvalues $\pm \sum_{k=0}^{n-1} \alpha_k \sin(k \theta_n)$. Thus, the eigenvalues of $C$ have real part $\sum_{k}\alpha_k \cos(k \theta_n)$ for $\alpha_k \geq 0$ and $\sum_k \alpha_k \leq 1$, and they have imaginary part of magnitude at most $\sum_k \alpha_k \sin(k \theta_n)$. Since each $\cos(k\theta_n) \pm i \sin (k\theta_n)$ lies in $\Pi_n$, we see that $\lambda$ is a convex combination of points in $\Pi_n$, scaled by the constant $\sum_k \alpha_k \in [0,1]$ and with imaginary part also scaled by some constant in $[0,1]$. Hence $\lambda, \ol{\lambda} \in \Pi_n$, so that the proof is complete. \end{proof} \begin{corollary}\label{DihedralFaithfulCorollary} The faithful hull spectra of $D_{2n}$ are given by \[\Pi_2 \cup \bigcup_{j \in J} \Pi_j\] for any collection $J$ of positive integers whose least common multiple is $n$. The maximal hull spectrum is then \[\Pi_2 \cup \Pi_n\] \end{corollary} \begin{proof} By Lemma \ref{LowerBound}, we know that any faithful hull spectrum of $D_{2n}$ contains $\Pi_2 \cup \bigcup_{p} \Pi_p$ where $p$ ranges over the prime factors of $n$. In fact, this hull spectrum is realizable by taking the direct sum over representations $\rho_k$ such that $n/\gcd(n,k)$ is an odd prime. Now observe that whenever $m>2$ divides $n$, the hull spectrum $\Pi_m \cup \Pi_2$ is realizable by $\rho_{n/m}$. Since we may consider the direct sum of as many irreducible representations as we want, and since no other hull spectrum is realizable by any irreducible representation, our result follows. \end{proof} \section{The Quaternion Group} We now shift our attention to the quaternion group \[ Q_8 = \langle r,s \mid r^4=1,\; s^2=r^2,\; s^{-1}rs = r^{-1} \rangle. \] Note that every element of $Q_8$ can be written as $r^k s^j$ for $k=0,1,2,3$ and $j=0,1$. Following the place of the previous section, we will first examine the irreducible representations of $Q_8$ (see \cite{DicyclicIrreps}). \begin{observation}\label{DicyclicEvenObservation} Notice that $D_4 = Q_8/Z$ where $Z=\{1,r^2\}$ is the center of $Q_8$, so many $Q_8$-representations factor through $D_4 = \mathbb Z/2\mathbb Z \times \mathbb Z/2\mathbb Z$. In particular, there are four such irreducibles, each of degree 1 (since $D_4$ is abelian). These irreducibles all have image contained in $\{-1, 1\}$ and map $r^2=s^2$ to 1. The remaining irreducible is $\rho : Q_8 \to GL_2(\mathbb C)$ given by \begin{align*} \rho(r) = \begin{bmatrix} i & 0 \\ 0 & -i \end{bmatrix} \quad \quad \quad \rho(s) = \begin{bmatrix} 0 & -1 \\ 1 & 0 \end{bmatrix} \end{align*} \end{observation} \begin{theorem} With $\rho$ defined as above, we have \[\HS(\rho(Q_8)) = \Pi_4\] \end{theorem} \begin{proof} Here, we write $r$ to refer to the matrix $\rho(r)$ and $s$ to refer to $\rho(s)$. As before, the inclusion $\HS(\rho(Q_8)) \supseteq \Pi_4$ is trivial by Lemma \ref{SubgroupLemma}, since $\HS(\langle r \rangle) = \Pi_4$. Now let $C \in \Co(G)$, so we may write \begin{align*} C &= \sum_{k=0}^3 \alpha_j r^k + \sum_{k=0}^3 \beta_j r^ks \\ &= \begin{bmatrix} \sum_{k=0}^3 \alpha_k i^k & -\sum_{k=0}^3 \beta_k i^k \\ \sum_{k=0}^3 \beta_k (-i)^k & \sum_{k=0}^3 \alpha_k (-i)^k \end{bmatrix} \end{align*} for some $\alpha_j, \beta_j \geq 0$ satisfying $\sum_j (\alpha_j + \beta_j) = 1$. Then with $\alpha_j' = \alpha_j-\alpha_{j+2}$ and $\beta_j' = \beta_j-\beta_{j+2}$, we get \begin{align*} C &= \begin{bmatrix} \alpha_0' + \alpha_1' i & -\beta_0' - \beta_1' i \\ \beta_0' - \beta_1' i & \alpha_0' - \alpha_1' i \end{bmatrix}, \end{align*} so the eigenvalues of $C$ are $\alpha_0' \pm i \sqrt{(\alpha_1')^2 + (\beta_0')^2 + (\beta_1')^2}$. Thus, the imaginary part of each eigenvalue $\lambda$ has magnitude at most $|\alpha_1'| + |\beta_0'| + |\beta_1'|$, and the real part has magnitude $|\alpha_0|$. Then \begin{align*} |\text{Re}\; \lambda| + |\text{Im}\; \lambda| &\leq |\alpha_0| + |\alpha_0'| + |\beta_0'| + |\beta_1'| \\ &\leq \sum_{k=0}^3 (\alpha_j + \beta_j) \\ &= 1, \end{align*} so indeed $\lambda \in \Pi_4$, as desired. \end{proof} \begin{corollary} The only faithful hull spectrum (and maximal hull spectrum) of $Q_8$ is $\Pi_4$. \end{corollary} \begin{proof} Recall that $r^2=s^2$ belongs to the kernel of each degree-1 representation of $Q_8$, so any faithful representation must contain a copy of $\rho$. Thus, the corollary follows by the preceding theorem. \end{proof} \section{Doubly Stochastic Matrices and the Symmetric Group} \label{sec:7} Work thus far in trying to understand $DS_n$ has been matricial. The permutation matrix representation of $S_n$ is a direct sum of the trivial representation and the standard representation. Thus, by Lemma \ref{IrrepLemma}, $DS_n$ is also the set of all eigenvalues achievable by convex combinations of matrices in the standard representation of $S_n$, which is of dimension $n-1$. Here, we note some known facts about $DS_n$ that may be proven via the group structure of $S_n$, perhaps more easily than using other proof methods. This analysis shows that some of the theory used to investigate $DS_n$ (such as the Perron-Frobenius theory of nonnegative matrices and assorted facts about doubly-stochastic matrices) may not be necessary for deducing information about the region. \begin{proposition}\label{DS_nProps} For $n \geq 2$, the region $DS_n$: \begin{enumerate} \item Is star-shaped from any point in $[0,1]$ \item Contains the polygons $\Pi_k$ for $k \leq n$ \item Is contained in the convex hull of the polygons $\Pi_k$ for $k \leq n$ and thus within the unit disc. \end{enumerate} Moreover, for any doubly stochastic matrix $A \in M_n$ whose eigenvalues all lie on the unit circle, $A$ is a permutation matrix. \end{proposition} \begin{proof} Property (1) follows from Corollary \ref{StarCorollary}, and (2) and (3) both follow from Corollary \ref{TotalBoundsCorollary}. The last component is due to Proposition \ref{ExtremalEigenvalues}. \end{proof} Moreover, we can apply our results on the dihedral group to provide a new proof of the form of $DS_3$. \begin{proposition} $DS_3 = \Pi_2 \cup \Pi_3$ \end{proposition} \begin{proof} Since $S_3 \cong D_6$ and since the permutation matrix representation of $S_3$ is faithful, Corollary \ref{DihedralFaithfulCorollary} proves the result. \end{proof} The upper bound on $DS_n$ given by the field of values bound in Proposition \ref{DS_nProps} does not add information because of the work of Karpelevich in \cite{Karpelevich}. The region $K_n$ of eigenvalues achieved by row stochastic matrices is an outer estimate of $DS_n$, and is in fact strictly smaller than the field of values bound for $n \geq 3$. The boundary of $K_n$ consists of concave arcs between adjacent roots of unity, and these arcs lie within the line segments between adjacent roots of unity given by the field of values bound. Again, we note that although all finite abelian groups, dihedral groups, the quaternion group, and the standard representation of $S_n$ for $n \leq 4$ have hull spectra corresponding to the polygon lower bound of Lemma \ref{LowerBound}, the standard representation of $S_5$ does not. This phenomenon makes the question of determining $DS_n$ all the more compelling. Here, we note that the standard representation of the alternating group $A_n$ also does not in general agree with the lower bound of Lemma \ref{LowerBound}. First, we note the form of the lower bound: \begin{lemma} The hull spectrum of the standard representation $\rho$ of $A_n$ contains $\Pi_k$ for all odd $k \leq n$ and all even $k \leq n-2$. \end{lemma} \begin{proof} For all odd $k \leq n$, $A_n$ contains any k-cycle. For even $k \leq n-2$, $A_n$ contains the product of any k-cycle with a disjoint 2-cycle. \end{proof} Now it may be seen through direct computation that $\HS(\rho(A_n))$ is not contained within the polygon lower bound for some small $n > 3$. For example, the standard representation $\rho$ of $A_4$ has its hull spectrum bounded below by $\Pi_2 \cup \Pi_3$. Consider the convex combinations of the even permutation matrices corresponding to the permutations $(123)$ and $(12)(34)$: \[C_t = (1-t) \begin{bmatrix} 0 & 1 & 0 & 0\\ 0 & 0 & 1 & 0\\ 1 & 0 & 0 & 0\\ 0 & 0 & 0 & 1\\ \end{bmatrix} + t \begin{bmatrix} 0 & 1 & 0 & 0\\ 1 & 0 & 0 & 0\\ 0 & 0 & 0 & 1\\ 0 & 0 & 1 & 0\\ \end{bmatrix}\] Note that $C_t$ has a degree-$4$ characteristic polynomial that can be factored into $(x-1)q(x)$ for a degree $3$ polynomial $q(x) \in \mathbb R[x]$, so its roots can be determined with standard techniques. For $t\in [.4,.9]$ (this range is not tight), $C_t$ has a non-real eigenvalue $\lambda$ with $\mrm{Re}\; \lambda < -.5$, which means that it is to the left of $\Pi_3$ and does not belong to $\Pi_2$. Thus, there is a large portion of the hull spectrum of $\rho(A_4)$ that lies outside of the polygon lower bounds. \section*{Declaration of competing interest} None. \section*{Acknowledgements} We would like to thank Jamison Barsotti for bringing our attention to several useful resources that we were unaware of. We also wish to thank the anonymous referee for carefully reading our work and suggesting changes that have improved this paper. This work was supported by the National Science Foundation grant DMS \#1757603. \bibliographystyle{ieeetr}
\section{Introduction and notation.} The well known problem launched decades ago by Dorothy Maharam \cite{maharam} of whether a Boolean algebra admits a strictly positive, additive set functions defined thereon -- the so called Maharam problem -- has motivated a long lasting stream of mathematical research, see \cite{jech} for a comprehensive review. In much of this literature the focus has been on complete (or $\sigma$ complete) Boolean algebras and countably additive set functions. One of the first papers on this topic was that of Kelley \cite{kelley} and it was also one of the few treating the case of finitely additive set functions. His approach in terms of intersection numbers is still one of the few results characterizing the situation of a finitely additive, strictly positive set function. Another one was obtained much later by Jech et al \cite{balcar_jech_pazak}. In this paper we present a very simple proof of this important result based on the minimax theorem. Another simple proof was obtained in recent years by Aversa and Bhaskara Rao \cite{aversa_rao} using linear programming (see other references quoted therein). We also develop a number of implications that justify interest for the method proposed here. In this paper terms such as measure or probability will always refer to finitely additive set functions. \section {Kelley's Theorem.} Let $\A$ be an algebra of subsets of some non empty set $\Omega$ and $\A_+=\A\setminus\{\emp\}$. $\Prob(\A)$ designates the family of (finitely additive) probabilities defined on $\A$ and, for each $m\in\Prob(\A)$, let $m(f)$ indicate the integral of $f$ with respect to $m$ -- if well defined. $m\in\Prob(\A)$ is strictly positive if $m(A)>0$ for all $A\in\A_+$. For given $\Bor\subset\A_+$ write the set of finite sequences from $\Bor$ as $\Seq[0]\Bor$. With each $\beta\in\Seq[0]\Bor \footnote{ The elements of $\beta\in\Seq[0]\Bor$ need of course not be distinct. } we can associate the following function on $\Omega$: \begin{equation} s(\beta) = \frac{1}{\abs\beta}\sum_{B\in\beta}\set B \end{equation} where $\abs\beta$ designs the length of the sequence $\beta$. Kelley \cite{kelley} defined the intersection number of $\Bor$ as \begin{equation} \label{I} I(\Bor) = \inf_{\beta\in\Seq[0]\Bor} \sup_\omega s(\beta)(\omega) \end{equation} Clearly, $0\le I(\Bor)\le1$; if $\Bor$ contains an infinite, disjoint collection of sets then necessarily $I(\Bor)=0$. If $\Bor\subset\A_+$, we introduce the family $\Sim(\Bor)$ of convex combinations of indicators of sets in $\Bor$. Clearly, $\{s(\beta):\beta\in\Seq[0]\Bor\}\subset\Sim(\Bor)$. The closure of a set $A$ of real valued functions on $\Omega$ with respect to the topology of uniform distance will be denoted by $\cl[u]A$. \begin{theorem}[Kelley, 59] \label{th kelley} An algebra $\A$ of sets admits a strictly positive, finitely additive probability measure if and only if $\A$ may be written in the form \begin{equation} \label{kelley} \A = \{\emp\} \cup \bigcup_n\Bor_n \qtext{with} I(\Bor_n)>0 \qtext{for} n=1,2,\ldots. \end{equation} \end{theorem} \begin{proof} Necessity is obvious -- if $m\in\Prob(\A)$ is strictly positive, take $\Bor_n=\{B\in\A:m(B)>1/n\}$. As for sufficiency, since each $f\in\Sim(\Bor)$ with values in $\Q$ belongs to $\{s(\beta):\beta\in\Seq[0]\Bor\}$, then $ \Sim(\Bor) = \cl[u]{\big\{s(\beta):\beta\in\Seq[0]\Bor\big\}} $. Moreover, each $f\in\Sim(\Bor)$ has finite range and every $A\in\A_+$ admits some $m\in\Prob(\A)$ with $m(A)=1$. Then, we deduce from \cite[Corollary 3.3]{sion} \begin{align} \label{sion} I(\Bor) &= \inf_{\beta\in\Seq[0]\Sim}\sup_\omega s(\beta)(\omega) = \inf_{f\in\Sim(\Bor)}\sup_\omega f(\omega) = \inf_{f\in\Sim(\Bor)}\sup_{m\in\Prob(\A)}m(f) = \sup_{m\in\Prob(\A)}\inf_{f\in\Sim(\Bor)}m(f). \end{align} Under \eqref{kelley} each $n\in\N$ admits $m_n\in\Prob(\A)$ satisfying $\inf_{B\in\Bor_n}m_n(B) > I(\Bor_n)/2$. Then, $\sum_n2^{-n}m_n\in\Prob(\A)$ is strictly positive. \end{proof} Since each $\Bor$ with $I(\Bor)>0$ can contain at most finitely many, pairwise disjoint sets, it follows from \eqref{kelley} that a family of pairwise disjoint sets in $\A_+$ must be countable. This is the well known CC ({\it countable chain}) necessary condition formulated by Maharam and long conjectured to be sufficient until Gaifman \cite{gaifman} counterexample of a Boolean algebra possessing the CC property but lacking a strictly positive measure. Aversa and Bhaskara Rao \cite{aversa_rao} make use of Tychonoff Theorem to prove Kelley's Theorem. This is also important in our proof, although indirectly, via Sion's lemma. \section{Some Related Results} The relative advantage of our proof, apart from simplicity, is the great ease of generalization. Denote by $\La(\A)$ the vector space spanned by the indicators of sets in $\A$ and for each $\rho:\La\to\R_+$, let \begin{equation} \label{N rho} \Neg(\rho) = \{A\in\A:\rho(\set A)=0\}. \end{equation} A set function $m\in ba(\A)_+$ such that $\Neg(m)\subset\Neg(\rho)$ is said to be strictly $\rho$-positive. If $\rho(\set A)\ge m(A)$ for all $A\in\A$ then $m$ is said to be $\rho$-dominated. \begin{theorem} \label{th kelley pi} Let $\pi$ be a monotone, sublinear functional on $\La(\A)$. There exists a $\pi$ dominated and strictly $\pi$ positive $m\in ba(\A)_+$ if and only if $\A$ may be written in the form \begin{equation} \label{kelley pi} \A = \Neg(\pi) \cup\bigcup_n\Bor_n \qtext{with} I_\pi(\Bor_n) \equiv \inf_{\beta\in\Seq[0]\Bor}\pi\big(s(\beta)\big) > 0 \qquad n=1,2,\ldots \end{equation} Moreover, the set function $m$ may be chosen to be a probability if and only if $\pi(1)\ge1\ge-\pi(-1)$. \end{theorem} \begin{proof} The proof of Theorem \ref{th kelley} remains true after replacing $I$ with $I_\pi$ provided we can show that \begin{equation} \label{attain} \pi(f) = \sup_{m\in ba(\A,\pi)_+}\int fdm \qquad f\in\La(\A) \end{equation} and that set \begin{equation} ba(\A,\pi)_+ = \Big\{m\in ba(\A)_+: \pi(h)\ge\int hdm\text{ for all }h\in\La(\A)\Big\} \end{equation} is convex and weak$^*$ compact. Both claims are, however, obvious: the former follows from Hahn Banach Theorem and the representation of linear functionals on $\La(\A)$ (see \cite[Chapter 3]{rao} and ultimately \cite{horn_tarski}); the latter from Tychonoff Theorem. If $m(\Omega)=1$ then necessarily $\pi(1)\ge1\ge-\pi(-1)$; conversely, if $\pi(1)\ge1\ge-\pi(-1)$ then, by well known arguments, the functional on $\La(\A)$ defined by letting $\hat\pi(f) = \inf_{a\in\R}\pi(a+f)-a$ is monotone, sublinear and additive with respect to constants so that $\hat\pi(1)=1=-\hat\pi(-1)$. Clearly, $\pi\ge\hat\pi$. If $\hat m\in ba(\A)_+$ is $\hat\pi$-dominated it is then a probability. \end{proof} As in Theorem \ref{th kelley}, the decomposition \eqref{kelley pi}, although necessary and sufficient, is not very handy to use. An easier condition is obtained by imposing a constraint on the degree of non linearity of $\pi$. \begin{lemma} \label{lemma kelley pi} Let $\pi$ be a monotone, sublinear functional on $\La(\A)$ satisfying the property \begin{equation} \label{m} \mathfrak m(\pi) \equiv \sup \frac{\sum_{i=1}^Na_i\pi(f_i)-\pi\big(\sum_{i=1}^Na_if_i\big)} {\pi\big(\sum_{i=1}^Na_if_i\big)} < \infty \end{equation} the supremum being over all convex combinations of elements of $\La(\A)_+$ such that $\pi\big(\sum_{i=1}^Na_if_i\big) > 0$. Then there exists a strictly $\pi$-positive $m\in ba(\A)_+$ which is $\pi$-dominated. \end{lemma} \begin{proof} Let $\{A_1,\ldots,A_N\}\in\Seq[0]{\Bor_n}$ with $\Bor_n = \{A\in\A:\pi(\set A)>1/n\}$. Then, $ \pi\Big(\frac1N\sum_{i=1}^N\set{A_i}\Big) \ge \frac1N\pi(\set{A_1}) >0 $ and, by the assumption, \begin{align*} \pi\Big(\frac1N\sum_{i=1}^N\set{A_i}\Big) \ge \frac{1}{1+\mathfrak m(\pi)}\frac1N\sum_{i=1}^N\pi(\set{A_i}) \ge \frac{1/n}{1+\mathfrak m(\pi)}. \end{align*} Thus, the decomposition \eqref{kelley pi} holds. \end{proof} Considering the role played in \eqref{kelley pi} by the collection $\Neg(\pi)$, one may invert the perspective adopted in Theorem \ref{th kelley pi} and raise the question whether a pre assigned family of sets $\Neg\subset\A$ coincides with the collection of null sets of some $m\in\Prob(\A)$, i.e. with the set $\Neg(m)=\{A\in\A:m(A)=0\}$. Define $\Prob(\A,\Neg) = \{m\in\Prob(\A):\Neg\subset\Neg(m)\}$. We can modify definition \eqref{I} into the following: \begin{equation} \label{IN} I_\Neg(\Bor) = \inf_{\beta\in\Seq[0]\Bor} \inf_{N\in\Neg} \sup_{\omega\in N^c}s(\beta)(\omega) \qquad \Bor\subset\A_+. \end{equation} The proof of the following Corollary may be given in terms of quotient algebras, as clearly remarked by Gaifman \cite[p. 61]{gaifman}, but ours is much simple \footnote{ A different proof of the following Corollary appears in \cite[Corollary 5]{Projection_2019}. }. An ideal of sets is of course a collection closed with respect to union and to subsets. \begin{corollary} \label{cor kelley} Let $\Neg\subset\A$. Then, $\Neg=\Neg(m)$ for some $m\in\Prob(\A)$ if and only if $\Neg$ is a proper ideal (of sets) and if $\A$ admits the representation \begin{equation} \label{kelley N} \A = \Neg\cup\bigcup_n\Bor_n \qtext{with} I_\Neg(\Bor_n)>0 \qtext{for} n=1,2,\ldots. \end{equation} \end{corollary} \begin{proof} The functional defined on $\La(\A)$ by letting $\pi_\Neg(f) = \inf_{N\in\Neg}\sup_{\omega\in N^c}f(\omega)$ is monotone and positively homogeneous by definition and subadditive because $\Neg$ is an ideal. Moreover, given that $\Neg$ is proper, $\pi_\Neg(1)\ge1\ge-\pi_\Neg(-1)$. The claim follows from Theorem \ref{th kelley pi}. \end{proof} If $\pi$ is as in Theorem \ref{th kelley pi} and $\pi(1)>0$, then $\Neg(\pi)$ is a proper ideal and Corollary \ref{cor kelley} may be used to determine the existence of a strictly $\pi$ positive probability, not necessarily $\pi$-dominated. Fix $\Meas\subset\Prob(\A)$. By choosing $\Neg=\bigcap_{m\in\Meas}\Neg(m)$, Corollary \ref{cor kelley} provides an answer to the question of whether a given subfamily of $\Prob(\A)$ is weakly dominated. The notion of weak domination appears in \cite[p. 159]{rao} under the name of weak absolute continuity. The corresponding question of whether a given set $\Meas$ is dominated -- i.e. each $m\in\Meas$ is absolutely continuous with respect to a fixed $m_0$ -- has recently been characterized in \cite{JMAA_2019}. On examining the proof of Theorem \ref{th kelley pi}, the only properties of $\Prob(\A,\Neg)$ that are used are convexity, weak$^*$ compactness and \eqref{attain} which translates into \begin{equation} \label{norming} m(f) = \inf_{N\in\Neg}\sup_{\omega\in N^c}f(\omega). \end{equation} In case $\Neg$ is the ideal of null sets of a given family $\Meas\subset\Prob(\A)$ these same properties are also true of the set \begin{equation} \Meas^* = \cco[*] {\{m_A:m\in\Meas,\ A\in\A,\ m(A)>0\}} \end{equation} where $m_A\in\Prob(\A)$ is defined as the restrictio \footnote{ That is $m_A(B)=m(A\cap B)/m(A)$ for each $B\in\A$. } of $m$ to $A$ and $\cco[*]{}$ denotes the weak$^*$-closed convex hull. Thus the probability that weakly dominates $\Meas$, if it exists, can be taken to be an element of $\Meas^*$. This remark delivers a version of a well known result of Halmos and Savage \cite[Lemma 7]{halmos_savage}: \begin{corollary}[Halmos and Savage, 49] \label{cor hs} If $\Meas\subset\Prob(\A)$ is weakly dominated it then admits a weakly dominating subset which is countable. \end{corollary} \section{A.s. Rankings} Following the intuitions of de Finetti \cite{definetti}, probability should be deduced endogenously from some decision problem. In this final section we investigate whether an {\it a priori} given partial order $\ge_*$ define \footnote{ The symbol $\ge$ will be be reserved for pointwise order. } for all real-valued functions defined on $\Omega$ admits the representation as a probabilistic ranking such as \begin{equation} \label{rep} f\ge_*g \qqtext{if and only if} f\ge g \quad m \text{ almost surely} \end{equation} for some reference probability $m$. Given our interest for finite additivity, justified by the preceding results the exact meaning of the expression {\it almost surely} requires some care. We shall use the expression $f\ge g$, $m$-a.s. as short for the condition \begin{equation} \label{a.s.} \inf_{t>0}m(f-g<-t)=0. \end{equation} When the partial order $\ge_*$ satisfies \eqref{rep} in the above defined sense, we shall say that $\ge_*$ admits a probabilistic representation, or, if $m$ is known, that $\ge_*$ is represented by $m$. We observe that if $\ge_*$ indeed admits a probabilistic representation then it will surely satisfy, among other properties, the following ones: \begin{enumerate}[(i).] \item\label{1>0} $0\not>_*1$; \item\label{bounded} $f\ge_*0$ and $a>0$ imply $f\wedge a\ge_*0$; \item\label{deterministic} $f\ge0$ implies $f\ge_*0$; \item\label{convex} if $f\ge_*g$ then $bf+h\ge_*bg+h$ for all $b,h:\Omega\to\R$ with $b$ positive and bounded; \item\label{robust} if $f+\varepsilon\ge_*0$ for all $\varepsilon>0$ then $f\ge_*0$. \end{enumerate} If $\ge_*$ is a given partial order, denote by $[f]_*$ the corresponding equivalence class of $f$ and write $\Neg_*=\{A\subset\Omega:0\ge_*A\}$. \begin{theorem} \label{th kelley order} A partial order $\ge_*$ defined on $\R^\Omega$ has a probabilistic representation if and only if (a) it satisfies \iref{1>0}--\iref{robust} and (b) the following decomposition holds: \begin{equation} \label{kelley *} 2^\Omega = \Neg_*\cup\bigcup_{n\in\N}\Bor_n \qtext{where} I_*(\Bor_n) \equiv \inf_{f\in\Seq[0]{\Bor_n}}\inf_{g\in[f]_*}\sup_{\omega}g(\omega)>0 \quad n\in\N. \end{equation} \end{theorem} \begin{proof} Assume \tiref a. By \iref{deterministic} and \iref{convex} if $f\ge_*0$ and $t>0$ we have $ 0\ge_* -f\sset{f<-t} \ge_* t\sset{f<-t} $ and so $\{f<-t\}\in\Neg_*$. Then, $g\in[f]_*$ and $\eta>0$ imply $N_{\eta,g}\equiv\{\abs{f-g}>\eta\} \in \Neg_*$ while $N\in\Neg_*$ implies $f\set{N^c}\in[f]_*$. Choose $h\in[f]_*$ and, since $\Neg_*$ is $\cup$-closed, $N_{\eta,h} \subset N \in \Neg_*$. We get \begin{align} \label{eq} \inf_{g\in[f]_*}\sup_{\omega}g(\omega) \le \sup_{\omega\in N^c}f(\omega) \le \eta + \sup_{\omega}h(\omega). \end{align} In other words, \tiref a implies that $I_* = I_{\Neg_*} $ (see \eqref{IN}) and, by \iref{1>0} and \iref{convex}, that $\Neg_*$ is a proper ideal. Therefore, under \tiref a and \tiref b Corollary \ref{cor kelley} guarantees that $\Neg_*=\Neg(m)$ for some $m\in\Prob(2^\Omega)$: $m$ represents $\ge_*$. In fact, $f\ge_*0$ implies $\sup_{t>0}m(f<-t)=0$ while $\{f<-t\}\in\Neg_*$ leads first to $(f\vee-c)\sset{f<-t}\ge_*0$ for all $c>0$ (by \iref{convex}), then to $f\sset{f<-t}\ge_*0$ (by \iref{bounded}), hence to $ f+\varepsilon \ge_* (f+\varepsilon)\sset{f\ge-\varepsilon} \ge_* 0 $ for all $\varepsilon>0$ and, eventually, to $f\ge_*0$, (by \iref{robust}). On the other hand, if $\ge_*$ is the ranking induced by some $m\in\Prob(2^\Omega)$, then $\Neg_*=\Neg(m)$, \tiref a holds and therefore $I_*=I_{\Neg(m)}$. Let $\Bor_n=\{A\subset\Omega:m(A)>1/n\}$ and $f\in\Seq[0]{\Bor_n}$. \begin{align*} 1/n \le m(f) = \inf_{N\in\Neg_*}m(\sset{N^c}f) \le \inf_{N\in\Neg_*}\sup_{\omega\in N^c}f(\omega) = I_{\Neg_*}(\Bor_n) = I_*(\Bor_n) \end{align*} so that \tiref b holds as well. \end{proof} This last result has a subjective probability interpretation: a decision maker following a choice criterion that satisfies the above conditions \tiref a and \tiref b may be said to take his decisions on a probabilistic basis. This means that in principle a probability may be deduced from his behaviour. We highlight that condition \tiref a would be enough to imply that $\Neg_*$ is a proper ideal -- and therefore that $\Neg_*\subset\Neg(m)$ for some $m\in\Prob(2^\Omega)$ -- but this would not be enough to guarantee that such $m$ is unique (and thus inferable from his decisions). Uniqueness indeed requires that \eqref{kelley *} is satisfied, although this appears as a rather difficult condition to establish in practical problems. \bibliographystyle{acm}
\section{Acknowledgements} \label{sec:ack} We thank Nirbhay Modhe and Viraj Prabhu for the PyTorch implementation~\cite{modhe_github18} of~\citet{visdial_rl} that we built on, and Jiasen Lu for helpful discussions. The Georgia Tech effort is supported in part by NSF, AFRL, DARPA, ONR YIPs, ARO PECASE. AD is supported in part by fellowships from Facebook, Adobe, and Snap Inc. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the US Government, or any sponsor. \section{Appendix} \subsection{Qualitative Output} The dialog generated by self-talk between different SL model variants is provided in Table.~\ref{table:sl} and different RL model variants is provided in Table.~\ref{table:rl}. We observe the variants with Diverse-\textsc{Q-bot}\xspace tend to generate more diverse, image relevant and fluent dialog. \subsection{Experiments with Diverse-\textsc{A-bot}\xspace} We also ran experiments where we used the repetition penalty (Eqn. (1) in the main paper) during SL pre-training of \textsc{A-bot}\xspace. In Tables~\ref{tab:visdial_res_supp} and~\ref{tab:div_rel_res_supp} we report results on the \textsc{A-bot}\xspace retrieval metrics~\cite{visdial} and the diversity metrics respectively. In Fig.~\ref{fig:guesswhich_supp}, we provide the performance of various \textsc{Q-bot}\xspace variants paired with this Diverse-\textsc{A-bot}\xspace on the image-guessing task. We note that retrieval metrics for Diverse-\textsc{A-bot}\xspace are better than vanilla SL: \textsc{A-bot}\xspace. Therefore, this repetition penalty does help significantly during supervised pre-training. However, finetuning the Diverse-\textsc{A-bot}\xspace via RL does not lead to significant improvements. We note that for the diversity metrics on \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog, self-talk with Diverse-\textsc{A-bot}\xspace does not change the diversity metrics significantly. We observe the same trend in image-guessing performance as well.\\ \subsection{Model Architecture details} We use a Hierarchical Recurrent Encoder (HRE) for representing dialog context. In this encoder the image representation is concatenated with every question word when fed to the LSTM. We then encode each QA-pair in the dialog history with another LSTM with shared weights. The image-question representation, computed for every round from $1$ through $t$, is concatenated with history representation from the previous round. This gives us a set of $t$ question-history vectors for t rounds. These vectors are fed as input to a dialog-level LSTM, whose output state at $t$ is used to decode the response to $Q_t$. \ref{fig:hre} shows the model architecture of the HRE. \\ All LSTMs are 2-layered with $512$-dim hidden states. We learn $300$-dim embeddings for words and images. These word embeddings are shared across question, history, and decoder LSTMs. \begin{figure} \centering \includegraphics[width=\columnwidth]{figures/guesswhich_appendix.png} \caption{Performance on the image-guessing task. Percentile rank (higher is better) of the true image (shown to A-BOT) as retrieved using fc7 image feature predictions from Q-BOT.} \label{fig:guesswhich_supp} \end{figure} \begin{figure*} \includegraphics[scale=0.3]{figures/models_v4.pdf} \caption{Model architecture diagram borrowed from \cite{visdial_rl} with permission.} \label{fig:hre} \end{figure*} \begin{table*}[ht!] \resizebox{\textwidth}{!}{ \begin{tabular}{@{}lccccccccccccc@{}} & \multicolumn{6}{c}{v$1.0$ val} & & \multicolumn{6}{c}{v$1.0$ test-std} \\[0.01in] \cline{2-7} \cline{9-14} \\ & NDCG $\uparrow$ & MRR $\uparrow$ & R@$1$ $\uparrow$ & R@$5$ $\uparrow$ & R@$10$ $\uparrow$ & Mean Rank $\downarrow$ && NDCG $\uparrow$ & MRR $\uparrow$ & R@$1$ $\uparrow$ & R@$5$ $\uparrow$ & R@$10$ $\uparrow$ & Mean Rank $\downarrow$ \\[0.05in] \toprule Baseline: \citet{visdial_rl} & $53.76$ & $46.35$ & $36.22$ & $56.15$& $62.41$& $19.34$ && $51.60$ & $45.67$ & $35.05$ & $56.30$ & $63.25$ & $19.15$ \\ \cdashline{1-14} Diverse SL \textsc{A-bot}\xspace & $53.82$ & $46.55$ & $36.46$ & $56.16$ & $62.68$ & $19.34$ && $51.77$ & $45.98$ & $35.58$ & $56.33$ & $63.08$ & $18.97$\\ Diverse RL \textsc{A-bot}\xspace (Finetuned with Diverse-\textsc{A-bot}\xspace) & $53.94$ & $46.67$ & $36.54$ & $56.34$ & $62.99$ & $19.24$ && $51.80$ & $45.70$ & $34.85$ & $56.33$ & $63.90$ & $18.88$ \\ \bottomrule \end{tabular} } \vspace{5pt} \caption{\textsc{A-bot}\xspace performance on the VisDial v$1.0$ dataset~\cite{visdial}. Arrow indicates direction of better performance.} \label{tab:visdial_res_supp} \end{table*} \begin{table*}[t!] \resizebox{\textwidth}{!}{ \begin{tabular}{@{}lccccccccc@{}} & \multicolumn{7}{c}{Diversity} && \multicolumn{1}{c}{Relevance} \\[0.01in] \cline{2-8} \cline{10-10} \\ & \# Novel questions $\uparrow$ & \# Unique questions $\uparrow$ & Mutual overlap $\downarrow$ & Ent-$1$ $\uparrow$ & Ent-$2$ $\uparrow$ & Dist-$1$ $\uparrow$ & Dist-$2$ $\uparrow$ && Negative log likelihood $\downarrow$ \\[0.05in] \toprule Baseline: \citet{visdial_rl} & $71$ & $6.70$ $\pm$ $0.07$ & $0.58$ $\pm$ $0.01$ & $2.72$ $\pm$ $0.01$ & $3.03$ $\pm$ $0.02$ &$0.35$ $\pm$ $0.0$ & $0.43$ $\pm$ $0.0$ && $9.94$ \\ \cdashline{1-10} SL: \textsc{Q-bot}\xspace $+$ Diverse-\textsc{A-bot}\xspace & $53$ & $6.58$ $\pm$ $0.07$ & $0.60$ $\pm$ $0.01$ & $2.71$ $\pm$ $0.01$ & $3.00$ $\pm$ $0.01$ & $0.34$ $\pm$ $0.0$ & $0.42$ $\pm$ $0.0$ && $10.05$ \\ SL: Diverse-\textsc{Q-bot}\xspace $+$ Diverse-\textsc{A-bot}\xspace & $136$ & $7.42$ $\pm$ $0.07$ & $0.50$ $\pm$ $0.01$ & $2.81$ $\pm$ $0.01$ & $3.18$ $\pm$ $0.01$ & $0.38$ $\pm$ $0.0$ & $0.48$ $\pm$ $0.0$ && $10.10$ \\ RL: Diverse-\textsc{Q-bot}\xspace $+$ Diverse-\textsc{A-bot}\xspace & $288$ & $7.87$ $\pm$ $0.06$ & $0.46$ $\pm$ $0.01$ & $2.86$ $\pm$ $0.01$ & $3.24$ $\pm$ $0.01$ & $0.39$ $\pm$ $0.0$ & $0.51$ $\pm$ $0.0$ && $10.32$ \\ \bottomrule \end{tabular} } \vspace{5pt} \caption{\textsc{Q-bot}\xspace diversity and relevance on v1.0 val. $\uparrow$ indicates higher is better. $\downarrow$ indicates lower is better.} \label{tab:div_rel_res_supp} \end{table*} \begin{table*}[p] \vspace{-5pt} \renewcommand*{\arraystretch}{0.8} \setlength{\tabcolsep}{8px} \begin{center}\hspace{-5.5pt} \resizebox{2.10\columnwidth}{!}{ \begin{tabular}{ p{2.85cm} p{4cm} p{5.3cm} p{6.5cm} } \toprule {\small Image + Caption} & {\small GT dialog~\cite{visdial}} & {\small \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog} & {\small Diverse-\textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog} \\ \cmidrule(r){1-1}\cmidrule(lr){2-2}\cmidrule(l){3-3}\cmidrule(l){4-4} \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/carrots.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize a cutting board with carrots next to a cell phone.}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.71in} \vspace{-57pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what color is the cutting board? \hfill blue \item how big is it \hfill about the size of a regular laptop screen \item how many carrots are there ? \hfill 4 \item are they the orange kind ? \hfill 2 are orange , 2 are white \item what kind of cell phone is it ? \hfill a samsung \item can you see any text on the screen ? \hfill a recipe for UNK UNK soup \item do you see the room ? \hfill just the counter \item are there people ? \hfill not visible \item what color is the counter ? \hfill white \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-44pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill no \item how many people do you see ? \hfill no people \item is this a close up ? \hfill no \item is this a close up ? \hfill zebra is \item is this a close up ? \hfill no \item is this a close up ? \hfill no \item is this a close up ? \hfill no \item is this a close up ?\hfill no \item is this a close up ? \hfill no \item is this a close up ?\hfill no \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill 1 picture is in color \item is the photo close up ? \hfill black and white \item is the photo in color ? \hfill no it 's black and white \item is it a close up ? \hfill no it 's a close up of the cake \item can you tell what brand it is ? \hfill no i ca n't see the brand \item can you tell if it 's a male or female ? \hfill no i ca n't tell \item can you tell if it 's a male or female ? \hfill no i ca n't tell \item is this in a kitchen ? \hfill nope it 's in a home \item are there any utensils ? \hfill no \item are there any utensils ? \hfill nope \end{compactenum}} \end{minipage}} \\[-2pt] \midrule\iftrue \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/cows_green.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize many brown and black cows standing in the grass}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.6in} \vspace{-44pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the field large ? \hfill yes \item is the grass green or brown ? \hfill green \item can you see a barn ? \hfill no \item can you see a fence ? \hfill no \item can you see a water supply ? \hfill yes \item can you see any people ? \hfill no \item can you see trees ? \hfill yes \item can you see mountains in the background ? \hfill no \item is the grass tall or short ? \hfill short \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-33pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what color are the cows ? \hfill they are brown and white \item how many cows are there ? \hfill 4 \item what color are the cows ? \hfill they are brown and white \item can you see the sky ? \hfill it is not visible \item do you see any trees ? \hfill i do not see any trees \item can you see the sky ? \hfill green sky \item are there any clouds ? \hfill the sky is not visible \item how many cows are there ? \hfill 2 \item what color are the cows ? \hfill the cows are brown and white \item what color are the cows ? \hfill they are brown \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.6in} \vspace{-38pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item do you see any people ? \hfill 1 \item do you see a fence ? \hfill a small 1 \item how many cows are there ? \hfill 5 \item what color are the cows ? \hfill black and white \item can you see the sky ? \hfill some \item can you see the sky ? \hfill nope \item are there any other animals ? \hfill not that i can see \item can you see the sky ? \hfill not at all \item are there any trees ? \hfill in the background \item can you see the sky ? \hfill not at all \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \fi \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/elephants.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize many elephants standing in an enclosure near a building}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-50pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what type of building ? \hfill may be part of a zoo \item how many elephants ? \hfill about 4 \item is it sunny ? \hfill clear day , yes \item any trees ? \hfill yes \item what color is the building ? \hfill dark grey \item are there other animals ? \hfill no \item are there any people ? \hfill yes \item what are they wearing ? \hfill shorts and shirts \item how many ? \hfill 3 \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many elephants are there ? \hfill ca n't tell \item what color are the elephants ? \hfill ca n't tell \item how many elephants are there ? \hfill ca n't tell \item what color is the fence ? \hfill i ca n't tell \item can you see the sky ? \hfill i ca n't see the sky \item are there any trees ? \hfill just a few \item does this look like a zoo ? \hfill 1 of them is \item are there any people ? \hfill nothing in the picture \item how many elephants are there ? \hfill just 1 \item can you see the sky ? \hfill just a little \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-47pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many elephants are there ? \hfill 1 \item any people ? \hfill ca n't see any \item male or female ? \hfill not sure \item what is the elephant doing ? \hfill just standing there \item male or female ? \hfill there are 2 males and 1 female \item can you see the sky ? \hfill 1 of it \item what color is the building ? \hfill just a black and white picture \item do you see any trees ? \hfill there are trees in the background \item are there any other animals ? \hfill red and white \item do you see any trees ? \hfill i see some in the background \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/bathroom.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize a reflection of the tub is in the bathroom mirror along with the sink , you can see all the room}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-50pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill yes \item is there humans in the photo ? \hfill no \item is there any animals in the photo ? \hfill no \item what color are the walls ? \hfill tan \item what color is the sink ? \hfill white \item is there any towels ? \hfill no \item is there any pictures on the wall ? \hfill no \item what color is the tub ? \hfill white \item can you see the floor ? \hfill no \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2.1in} \vspace{-50pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill 5 of them are \item are there any people ? \hfill it 's a close up so i ca n't see any people \item what color is the sink ? \hfill about the same color as the toilet \item do you see a mirror ? \hfill no \item what color is the sink ? \hfill yes it is white \item what color is the sink ? \hfill yes it is white \item what shape is the mirror ? \hfill yes , it 's a rectangle \item are there any towels ? \hfill he 's on a towel rack \item are there any towels ? \hfill i do n't see any towels \item are there any towels ? \hfill i do n't see any towels \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-47pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill no \item is there any people ? \hfill 5 \item what color walls ? \hfill i ca n't see the walls \item is there a mirror ? \hfill yes \item is there a mirror ? \hfill yes \item is there a mirror ? \hfill yes \item are the walls seen ? \hfill no \item what color are the walls ? \hfill no walls \item what is the floor made of ? \hfill yes \item what color is the floor ? \hfill i ca n't see the floor \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/cows.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize a bunch of cows that are in a grassy field}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-38pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item about how many cows ? \hfill over a dozen \item are there any calves ? \hfill no \item are they eating ? \hfill yes \item is it sunny ? \hfill no \item is there a fence around them ? \hfill no \item do you see any buildings ? \hfill no \item mountains in the background ? \hfill no \item is there snow on the ground ? \hfill no \item any trees ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-33pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill yes \item is there any people ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-34pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many cows are there ? \hfill about 10 \item what color are the cows ? \hfill black and white \item how many cows are there ? \hfill about 10 \item what color are the cows ? \hfill black and white \item what is the weather like ? \hfill sunny \item are there any trees ? \hfill no \item are there any people ? \hfill no \item are there any trees ? \hfill no \item are there any buildings ? \hfill no \item are there any trees ? \hfill yes \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[width=2cm,height=2cm]{figures/kitchen.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize the kitchen is UNK with dark wood cabinets and a nearby staircase}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.53in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what color are the kitchen walls ? \hfill white \item is there a window present ? \hfill yes \item are there pictures paintings hanging up ? \hfill no \item is the stove visible ? \hfill yes \item what color is the stove ? \hfill black and silver \item are there any people visible ? \hfill no \item what color is the nearby staircase ? \hfill dark brown \item is the staircase carpeted ? \hfill no \item are the handrails of the staircase visible ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-43pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill yes \item is there any people ? \hfill no \item is there a stove ? \hfill no \item are there any windows ? \hfill no \item can you see the floor ? \hfill no \item can you see the floor ? \hfill no \item can you see the floor ? \hfill yes \item can you see the floor ? \hfill yes \item can you see the floor ? \hfill yes \item are the walls visible ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the kitchen clean ? \hfill brown \item is the kitchen clean ? \hfill it 's cluttered \item are there any windows ? \hfill yes \item is it daytime ? \hfill yes \item are there any people ? \hfill yes \item are the appliances stainless steel ? \hfill i ca n't tell \item are the people in the kitchen ? \hfill yes \item is the kitchen clean ? \hfill yes \item are the people male or female ? \hfill yes \item is the kitchen clean ? \hfill yes \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[height=2.3cm,width=2.7cm]{figures/black_white_kitchen.jpg}}\newline\vspace{-12pt} \begin{minipage}{12cm}{\scriptsize black and white photo of men working in a kitchen}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.6in} \vspace{-55pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many men ? \hfill 3 \item how big is the kitchen ? \hfill small industrial \item what is the age range ? \hfill teens to 40s \item is the kitchen belong in a house or a restaurant ? \hfill restaurant \item what are they doing in the kitchen ? \hfill cooking and mixing food \item what kind of floor in the kitchen ? \hfill i ca n't tell \item is there any decorations in the kitchen ? \hfill no \item is the kitchen look clean ? \hfill no \item does the men seem to be UNK ? \hfill they seem UNK \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-61pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item can you see the fridge ? \hfill the side of it \item what color is it ? \hfill the photo is black and white \item can you see the sink ? \hfill 1 of it \item can you see the sink ? \hfill just a tiny bit of it \item can you see the sink ? \hfill 0 \item can you see the sink ? \hfill does n't look like it \item can you see the sink ? \hfill 0 \item can you see the sink ? \hfill 4 of them \item can you see the fridge ? \hfill UNK \item can you see the fridge ? \hfill not real \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-55pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many men are there ? \hfill looks like 2 men and 1 woman \item how old do they look ? \hfill it 's hard to tell , but they look like they are in their 20s \item how old do they look ? \hfill looks to be in their 30 's \item are they wearing aprons ? \hfill just 1 of them is wearing hat \item are they wearing hats ? \hfill it is hard to tell , but i think so \item can you see the stove ? \hfill not at all \item are there any pots on the stove ? \hfill not that i can see \item does the kitchen look clean ? \hfill black and white photo but i think it 's clean \item can you see any windows ? \hfill no \item do you see any windows ? \hfill ca n't see any windows \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[height=2.6cm,width=2.7cm]{figures/plate_food.jpg}}\newline\vspace{-12pt} \begin{minipage}{11cm}{\scriptsize a half-eaten chicken breast is next to an UNK piece of bread and a small serving of green beans and carrots}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-63pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item who is eating ? \hfill is the drink in the cup soda \item what is the food on ? \hfill bread and vegetable \item is it in a plate ? \hfill what kind of sauces are there in the back \item i am asking the questions here ? \hfill yes you are \item what is the food on ? \hfill bread , vegetables , chicken and drink \item are they on a table ? \hfill yes they are \item any people ? \hfill there are n't any people in sight \item what color is the table ? \hfill it is dark gray \item any cutlery ? \hfill yes there is a butter knife in the plate \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-67pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill it is \item is the photo close up ? \hfill no \item is the photo in color ? \hfill it is \item do you see any other people ? \hfill it 's a close up of the man 's hand , so i ca n't tell \item how old is the man ? \hfill maybe in his 30s \item is he wearing glasses ? \hfill i ca n't see his face \item what color is his shirt ? \hfill not sure , the photo is in black and white \item does he have facial hair ? \hfill no \item does he wear glasses ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-75pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item are there any people in the photo ? \hfill yes \item is the photo in color ? \hfill it is \item is it a professional photo ? \hfill i do n't think so \item how many people ? \hfill 0 \item is there a tablecloth on the table ? \hfill yes \item what color is the tablecloth ? \hfill white \item are there any utensils visible ? \hfill no \item what color is the plate ? \hfill it 's white \item are there any utensils visible ? \hfill no \item are there any utensils visible ? \hfill no \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \end{tabular}}\\[5pt] \caption{Selected examples of dialog on v$1.0$ VisDial test split for different SL variants. We observe that variant involving Diverse-\textsc{Q-bot}\xspace generates more diverse, image relevant and fluent dialog.} \label{table:sl} \end{center} \end{table*} \begin{table*}[p] \vspace{-40pt} \renewcommand*{\arraystretch}{0.8} \setlength{\tabcolsep}{8px} \begin{center}\hspace{-5.5pt} \resizebox{2.10\columnwidth}{!}{ \begin{tabular}{ p{2.85cm} p{4cm} p{5.3cm} p{6.5cm} } \toprule {\small Image + Caption} & {\small GT dialog~ \cite{visdial}} & {\small \cite{visdial_rl} dialog} & {\small RL: Diverse-\textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog} \\ \cmidrule(r){1-1}\cmidrule(lr){2-2}\cmidrule(l){3-3}\cmidrule(l){4-4} \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/carrots.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize a cutting board with carrots next to a cell phone.}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.71in} \vspace{-55pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what color is the cutting board? \hfill blue \item how big is it \hfill about the size of a regular laptop screen \item how many carrots are there ? \hfill 4 \item are they the orange kind ? \hfill 2 are orange , 2 are white \item what kind of cell phone is it ? \hfill a samsung \item can you see any text on the screen ? \hfill a recipe for UNK UNK soup \item do you see the room ? \hfill just the counter \item are there people ? \hfill not visible \item what color is the counter ? \hfill white \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-44pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill no \item is the photo close up ? \hfill no \item how many people ? \hfill cows \item is this a close up ? \hfill 2 of them are \item what are they wearing ? \hfill no shirt and jeans \item what are they wearing ? \hfill no shirt and jeans \item do you see other people ? \hfill sunny 1 in the background \item what color are the scissors ? \hfill no handle \item is this in a kitchen ? \hfill yes \item do you see the counter ? \hfill no \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill black and white \item is there any people ? \hfill 1 hand \item is this indoors or outdoors ? \hfill no idea \item is the person male or female ? \hfill up close , i ca n't tell \item can you tell what kind of sandwich it is ? \hfill no \item is there a knife ? \hfill no \item is there a cutting board ? \hfill yes \item are the carrots cut up ? \hfill daytime \item is the scene well lit ? \hfill no \item are the carrots raw or cooked ? \hfill short \end{compactenum}} \end{minipage}} \\[-2pt] \midrule\iftrue \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/cows_green.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize many brown and black cows standing in the grass}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.6in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the field large ? \hfill yes \item is the grass green or brown ? \hfill green \item can you see a barn ? \hfill no \item can you see a fence ? \hfill no \item can you see a water supply ? \hfill yes \item can you see any people ? \hfill no \item can you see trees ? \hfill yes \item can you see mountains in the background ? \hfill no \item is the grass tall or short ? \hfill short \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-35pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item can you see any people ? \hfill nope \item can you see the sky ? \hfill a little bit \item are there any clouds ? \hfill i ca n't see the sky \item are there any other animals ? \hfill not that i can see \item do you see any trees ? \hfill lots of trees \item how many cows are there ? \hfill ca n't tell , they are far away \item do you see any buildings ? \hfill i do not \item can you see the sky ? \hfill ca n't see the sky \item do you see any clouds ? \hfill ca n't see the sky \item can you see the sky ? \hfill ca n't see the sky \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.6in} \vspace{-38pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item are the cows all the same color ? \hfill they are different shades of brown \item do any of the cows have horns ? \hfill it does n't look like it \item do you see a fence ? \hfill there is no fence \item how many cows are there ? \hfill 4 \item can you see the sky ? \hfill 1 of it \item what color is the grass ? \hfill the grass is green \item can you see the sky ? \hfill it is not visible \item does it appear to be sunny ? \hfill not really \item can you see the sky ? \hfill not at all \item can you see the ground ? \hfill a little bit \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \fi \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/elephants.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize many elephants standing in an enclosure near a building}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-50pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what type of building ? \hfill may be part of a zoo \item how many elephants ? \hfill about 4 \item is it sunny ? \hfill clear day , yes \item any trees ? \hfill yes \item what color is the building ? \hfill dark grey \item are there other animals ? \hfill no \item are there any people ? \hfill yes \item what are they wearing ? \hfill shorts and shirts \item how many ? \hfill 3 \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item do you see people ? \hfill 2 \item how many elephants ? \hfill not sure \item does the elephant have tusks ? \hfill not that i can see \item does the elephant have tusks ? \hfill in the distance , yes \item does the elephant have tusks ? \hfill not that i can see \item any other animals ? \hfill not that i can see \item does the elephant have tusks ? \hfill not that i can see \item does the elephant have tusks ? \hfill not that i can see \item does the elephant have tusks ? \hfill not that i can see \item can you see the sky ? \hfill 1 of it \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-48pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item can you see any people ? \hfill yes \item what are the elephants doing ? \hfill just standing around \item how many people are there ? \hfill a lot , too many to count \item does this look like a zoo ? \hfill not really \item how many elephants are there ? \hfill in the distance there are many \item does this look like a parade ? \hfill a little bit \item does this look like a circus ? \hfill nope \item can you see any signs ? \hfill there is a sign on the street \item does it look like it is in the usa ? \hfill i do n't think so \item can you see the sky ? \hfill i can \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/bathroom.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize a reflection of the tub is in the bathroom mirror along with the sink , you can see all the room}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-50pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill yes \item is there humans in the photo ? \hfill no \item is there any animals in the photo ? \hfill no \item what color are the walls ? \hfill tan \item what color is the sink ? \hfill white \item is there any towels ? \hfill no \item is there any pictures on the wall ? \hfill no \item what color is the tub ? \hfill white \item can you see the floor ? \hfill no \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how big is the bathroom ? \hfill ca n't see the whole room \item how big is the mirror ? \hfill i can only see a small part of it \item what color is the sink ? \hfill there is no sink \item what color is the sink ? \hfill black \item what color is the sink ? \hfill yes \item what color are the walls ? \hfill he is white \item is there a mirror ? \hfill yes \item are there any people ? \hfill he is alone \item are there any animals ? \hfill white cat \item what color is the sink ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-49pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how big is the bathroom ? \hfill it 's pretty big \item is it clean ? \hfill maybe \item how big is the mirror ? \hfill i can only see a small part of it \item what color is the wall ? \hfill maybe white \item is there a shower curtain ? \hfill there is no shower curtain \item is there a mirror ? \hfill yes \item what shape is the mirror ? \hfill yes , it 's a rectangle \item what color is the wall ? \hfill i ca n't see the wall \item are there any people ? \hfill he 's the only 1 \item is there a window ? \hfill i do n't see 1 \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[width=2.7cm]{figures/cows.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize a bunch of cows that are in a grassy field}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-40pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item about how many cows ? \hfill over a dozen \item are there any calves ? \hfill no \item are they eating ? \hfill yes \item is it sunny ? \hfill no \item is there a fence around them ? \hfill no \item do you see any buildings ? \hfill no \item mountains in the background ? \hfill no \item is there snow on the ground ? \hfill no \item any trees ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-33pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is the photo in color ? \hfill yes \item is there any people ? \hfill no \item how many cows ? \hfill black and white cows \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \item is there a fence ? \hfill no \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-33pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many cows are there ? \hfill about 10 \item what color are the cows ? \hfill black and white \item are any of them babies ? \hfill no \item how many cows are there ? \hfill about 10 \item are there any people in the photo ? \hfill no \item are there any other animals in the photo ? \hfill no \item are there any buildings in the photo ? \hfill no \item are there any trees ? \hfill yes \item is there a fence ? \hfill no \item is it sunny out ? \hfill yes \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[width=2cm,height=2cm]{figures/kitchen.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize the kitchen is UNK with dark wood cabinets and a nearby staircase}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.53in} \vspace{-46pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what color are the kitchen walls ? \hfill white \item is there a window present ? \hfill yes \item are there pictures paintings hanging up ? \hfill no \item is the stove visible ? \hfill yes \item what color is the stove ? \hfill black and silver \item are there any people visible ? \hfill no \item what color is the nearby staircase ? \hfill dark brown \item is the staircase carpeted ? \hfill no \item are the handrails of the staircase visible ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-43pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item is this in color ? \hfill no \item do you see any people ? \hfill no \item do you see a stove ? \hfill standing \item are there any windows ? \hfill white windows \item can you see the floor ? \hfill metal floor \item can you see the floor ? \hfill brown tile \item can you see the floor ? \hfill yes \item is it tiled ? \hfill no \item do you see a window ? \hfill short window \item are there curtains on the window ? \hfill yes \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-45pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item what color are the appliances ? \hfill black and white \item is there a window ? \hfill yes \item is there a sink ? \hfill yes \item can you see a refrigerator ? \hfill yes \item are there any people ? \hfill yes \item is it daytime ? \hfill nope \item is it sunny out ? \hfill just a little \item is there a window ? \hfill brown \item can you see the floor ? \hfill no \item do you see a stove ? \hfill no \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[height=2.3cm,width=2.7cm]{figures/black_white_kitchen.jpg}}\newline\vspace{-12pt} \begin{minipage}{10cm}{\scriptsize black and white photo of men working in a kitchen}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.6in} \vspace{-57pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item how many men ? \hfill 3 \item how big is the kitchen ? \hfill small industrial \item what is the age range ? \hfill teens to 40s \item is the kitchen belong in a house or a restaurant ? \hfill restaurant \item what are they doing in the kitchen ? \hfill cooking and mixing food \item what kind of floor in the kitchen ? \hfill i ca n't tell \item is there any decorations in the kitchen ? \hfill no \item is the kitchen look clean ? \hfill no \item does the men seem to be UNK ? \hfill they seem UNK \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2.2in} \vspace{-65pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item can you see the fridge ? \hfill yep \item can you see the fridge ? \hfill kind of \item does it have a freezer on it ? \hfill nope \item how many men are there ? \hfill ca n't tell \item how old do they look ? \hfill it 's hard to tell , but i 'd say in their 30 's \item what color are the walls ? \hfill it 's a black and white photo so i ca n't tell \item how old are the men ? \hfill i ca n't see their faces , i do n't know \item does the kitchen look clean ? \hfill 0 \item how old do the men look ? \hfill i ca n't see their faces , i do n't know \item are they wearing aprons ? \hfill a few are \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-55pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item can you tell what kind of food they are ? \hfill i can not tell what kind of food it is \item does the kitchen look clean ? \hfill fairly clean \item do you see any windows ? \hfill partially in the background \item do you see any curtains ? \hfill maybe 1 in the background \item is it day or night ? \hfill ca n't tell \item are the men old or young ? \hfill ca n't see their faces \item are they wearing hats ? \hfill just 1 \item are they wearing glasses ? \hfill it looks like they are \item are they smiling ? \hfill i ca n't see their faces \item are they smiling ? \hfill i ca n't see their faces \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \raisebox{0pt}{\includegraphics[height=2.6cm,width=2.7cm]{figures/plate_food.jpg}}\newline\vspace{-12pt} \begin{minipage}{11cm}{\scriptsize a half-eaten chicken breast is next to an UNK piece of bread and a small serving of green beans and carrots}\end{minipage} & \resizebox{4cm}{!}{ \begin{minipage}{1.5in} \vspace{-63pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item who is eating ? \hfill is the drink in the cup soda \item what is the food on ? \hfill bread and vegetable \item is it in a plate ? \hfill what kind of sauces are there in the back \item i am asking the questions here ? \hfill yes you are \item what is the food on ? \hfill bread , vegetables , chicken and drink \item are they on a table ? \hfill yes they are \item any people ? \hfill there are n't any people in sight \item what color is the table ? \hfill it is dark gray \item any cutlery ? \hfill yes there is a butter knife in the plate \end{compactenum}} \end{minipage}} & \resizebox{5.3cm}{!}{ \begin{minipage}{2in} \vspace{-78pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item are there any people ? \hfill i see part of a person 's hand \item what color is the plate ? \hfill black and white \item are there any utensils ? \hfill no \item are there any utensils ? \hfill no \item are there any utensils ? \hfill silver spoon \item are there any utensils ? \hfill beige spoon \item are there any utensils ? \hfill i see a fork \item are there any utensils ? \hfill yes a fork and a knife \item are there any napkins ? \hfill 0 that i can see \item are there any napkins ? \hfill it 's a close up so i ca n't tell \end{compactenum}} \end{minipage}} & \resizebox{6.5cm}{!}{ \begin{minipage}{2.5in} \vspace{-60pt} {\tiny \begin{compactenum}[\hspace{-5pt}] \item are there any people in the picture ? \hfill yes \item are they inside or outside ? \hfill outside \item what gender are the people ? \hfill i ca n't tell \item what are the people doing ? \hfill 1 is looking at the camera , the other is looking at the camera \item can you tell if they are male or female ? \hfill i ca n't tell \item can you tell if the person is male or female ? \hfill i ca n't see their face , i do n't know \item can you tell if they are male or female ? \hfill i ca n't tell \item can you tell what kind of sandwich it is ? \hfill it has some meat on it , but i ca n't tell what it is \item is it on a plate ? \hfill no \item what color is the handle of the knife ? \hfill silver \end{compactenum}} \end{minipage}} \\[-2pt] \midrule \end{tabular}}\\[5pt] \caption{Selected examples of dialog on v$1.0$ VisDial test split for different RL variants. We observe that variant involving Diverse-\textsc{Q-bot}\xspace generates more diverse, image relevant and fluent dialog.} \label{table:rl} \end{center} \end{table*} \section{Preliminaries} \label{sec:prelim} We operate in the same setting as~\citet{visdial_rl} -- an image-guessing task between a questioner (\textsc{Q-bot}\xspace) and an answerer (\textsc{A-bot}\xspace) -- where \textsc{Q-bot}\xspace has to guess the image \textsc{A-bot}\xspace has access to by asking questions in multi-round dialog. We adopt the same training paradigm\footnote{\href{https://github.com/batra-mlp-lab/visdial-rl}{{\tt github.com/batra-mlp-lab/visdial-rl}}} consisting of 1) a supervised pre-training stage where \textsc{Q-bot}\xspace and \textsc{A-bot}\xspace are trained with Maximum Likelihood Estimation objectives on the VisDial dataset~\cite{visdial}, and 2) a self-talk RL finetuning stage where \textsc{Q-bot}\xspace and \textsc{A-bot}\xspace interact with each other and the agents are rewarded for each successive exchange based on incremental improvements in guessing the unseen image. We learn parameterized policies $\pi_{\theta_Q}(q_t|s_{t-1}^Q)$ and $\pi_{\theta_A}(a_t|s_t^A)$ for \textsc{Q-bot}\xspace and \textsc{A-bot}\xspace respectively which decide what tokens to utter (\textit{actions}: question $q_t$ and answer $a_t$ at every dialog round $t$) conditioned on the context available to the agent (\textit{state} representations: $s_{t-1}^Q,s_t^A$). \textsc{Q-bot}\xspace additionally makes an image feature prediction $\hat y_{t}$ at every dialog round (treated as a deterministic \textit{action} with a continuous action space), and the reward is $r_t = ||y^{gt} - \hat y_{t-1}||_2^2 - ||y^{gt} - \hat y_{t}||_2^2$, \ie change in distance to the true representation $y^{gt}$ before and after a dialog round. We use REINFORCE~\cite{williams1992simple} to update agent parameters,~\ie \textsc{Q-bot}\xspace and \textsc{A-bot}\xspace are respectively updated with $\mathbb{E}_{\pi_Q, \pi_A}[r_t \nabla_{\theta_Q} \log \pi_Q(q_t|s_{t-1}^Q)]$ and $\mathbb{E}_{\pi_Q, \pi_A}[r_t \nabla_{\theta_A} \log \pi_A(a_t|s_t^A)]$ as gradients. Our transition from supervised to RL is gradual -- we supervise for $N$ rounds and have policy-gradient updates for the remaining $10-N$, starting from $N=9$ till $N=4$, one round at a time. After reaching $N=4$, repeating this procedure from $N=9$ led to further (marginal) improvements. Both \textsc{Q-bot}\xspace and \textsc{A-bot}\xspace are modeled as Hierarchical Recurrent Encoder-Decoder architectures~\cite{serban_acl16}. \textsc{Q-bot}\xspace's fc$7$~\cite{simonyan_iclr15} feature prediction of the unseen image ($\hat y$) is conditioned on the dialog history so far ($s_{t-1}^Q$) via a regression head\footnote{Please refer to appendix for architecture details.}. \begin{table*}[t!] \resizebox{\textwidth}{!}{ \begin{tabular}{@{}lccccccccc@{}} & \multicolumn{7}{c}{Diversity} && \multicolumn{1}{c}{Relevance} \\[0.01in] \cline{2-8} \cline{10-10} \\ & \# Novel questions $\uparrow$ & \# Unique questions $\uparrow$ & Mutual overlap $\downarrow$ & Ent-$1$ $\uparrow$ & Ent-$2$ $\uparrow$ & Dist-$1$ $\uparrow$ & Dist-$2$ $\uparrow$ && Negative log likelihood $\downarrow$ \\[0.05in] \toprule Baseline: \citet{visdial_rl} & $71$ & $6.70$ {\scriptsize $\pm$ $0.07$} & $0.58$ {\scriptsize $\pm$ $0.01$} & $2.72$ {\scriptsize $\pm$ $0.01$} & $3.03$ {\scriptsize $\pm$ $0.02$} &$0.35$ {\scriptsize $\pm$ $0.0$} & $0.43$ {\scriptsize $\pm$ $0.0$} && $\mathbf{9.94}$ \\ \cdashline{1-10} SL: \textsc{Q-bot}\xspace $+$ \textsc{A-bot}\xspace & $ 51 $ & $ 6.57 $ {\scriptsize $\pm$ $0.07$} & $ 0.60 $ {\scriptsize $\pm$ $0.01$} & $ 2.70 $ {\scriptsize $\pm$ $0.01$} & $3.00$ {\scriptsize $\pm$ $0.02$} & $0.34 $ {\scriptsize $\pm$ $0.0$} & $0.42 $ {\scriptsize $\pm$ $0.0$} && $ 10.05 $ \\ SL: Diverse-\textsc{Q-bot}\xspace $+$ \textsc{A-bot}\xspace & $146$ & $7.45$ {\scriptsize $\pm$ $0.07$} & $0.51$ {\scriptsize $\pm$ $0.01$} & $2.82$ {\scriptsize $\pm$ $0.01$} & $3.18$ {\scriptsize $\pm$ $0.01$} & $0.38$ {\scriptsize $\pm$ $0.0$} & $0.48$ {\scriptsize $\pm$ $0.0$} && $10.10$ \\ RL: Diverse-\textsc{Q-bot}\xspace $+$ \textsc{A-bot}\xspace & $\mathbf{449}$ & $\mathbf{8.19}$ {\scriptsize $\pm$ $0.06$} & $\mathbf{0.41}$ {\scriptsize $\pm$ $0.01$} & $\mathbf{2.90}$ {\scriptsize $\pm$ $0.01$} & $\mathbf{3.31}$ {\scriptsize $\pm$ $0.01$} & $\mathbf{0.40}$ {\scriptsize $\pm$ $0.0$} & $\mathbf{0.53}$ {\scriptsize $\pm$ $0.0$} && $10.80$ \\ \bottomrule \end{tabular} } \vspace{5pt} \caption{\textsc{Q-bot}\xspace diversity and relevance on v1.0 val. $\uparrow$ indicates higher is better. $\downarrow$ indicates lower is better.} \label{tab:div_rel_res} \vspace{-10pt} \end{table*} \begin{table*}[ht!] \resizebox{\textwidth}{!}{ \begin{tabular}{@{}lccccccccccccc@{}} & \multicolumn{6}{c}{v$1.0$ val} & & \multicolumn{6}{c}{v$1.0$ test-std} \\[0.01in] \cline{2-7} \cline{9-14} \\ & NDCG $\uparrow$ & MRR $\uparrow$ & R@$1$ $\uparrow$ & R@$5$ $\uparrow$ & R@$10$ $\uparrow$ & Mean Rank $\downarrow$ && NDCG $\uparrow$ & MRR $\uparrow$ & R@$1$ $\uparrow$ & R@$5$ $\uparrow$ & R@$10$ $\uparrow$ & Mean Rank $\downarrow$ \\[0.05in] \toprule Baseline: \citet{visdial_rl} & $53.76$ & $46.35$ & $36.22$ & $56.15$& $62.41$& $19.34$ && $51.60$ & $45.67$ & $35.05$ & $56.30$ & $63.25$ & $19.15$ \\ \cdashline{1-14} SL: \textsc{A-bot}\xspace & $53.10$ & $46.21$ & $36.11$ & $55.82$ & $62.22$ & $19.58$ && $51.18$ & $45.43$ & $34.88$ & $55.65$ & $63.20$ & $19.16$\\ RL: \textsc{A-bot}\xspace (finetuned with Diverse-\textsc{Q-bot}\xspace) & $53.91$ & $46.46$ & $36.31$ & $56.26$ & $62.53$ & $19.35$ && $51.67$ & $45.64$ & $34.85$ & $56.55$ & $63.43$ & $18.96$ \\ \bottomrule \end{tabular} } \vspace{5pt} \caption{\textsc{A-bot}\xspace performance on VisDial v$1.0$~\cite{visdial}. $\uparrow$ indicates higher is better. $\downarrow$ indicates lower is better.} \label{tab:visdial_res} \vspace{-10pt} \end{table*} \begin{figure*}[t!] \begin{minipage}[b]{0.26\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.9\textwidth]{figures/consistency.png} \vspace{5pt} \caption{{\scriptsize Consistency $\uparrow$}} \label{fig:consistency} \end{subfigure} \end{minipage}\hfill \begin{minipage}[b]{0.12\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.9\textwidth]{figures/fluency.png} \vspace{5pt} \caption{{\scriptsize Fluency $\uparrow$}} \label{fig:fluency} \end{subfigure} \end{minipage}\hfill \begin{minipage}[b]{0.12\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.9\textwidth]{figures/detail.png} \vspace{5pt} \caption{{\scriptsize Detail $\uparrow$}} \label{fig:detail} \end{subfigure} \end{minipage}\hfill \begin{minipage}[b]{0.12\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.9\textwidth]{figures/top-1.png} \vspace{5pt} \caption{{\scriptsize Top-$1$ Acc. $\uparrow$}} \label{fig:top-1} \end{subfigure} \end{minipage}\hfill \begin{minipage}[b]{0.33\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.9\textwidth]{figures/guesswhich.png} \vspace{5pt} \caption{{\scriptsize \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace image-guessing task performance}} \label{fig:guesswhich} \end{subfigure} \end{minipage}\hfill \vspace{5pt} \caption{(\textbf{a-d}): Human evaluation of \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog over $50$ images and $200$ human subjects for each model variant. (\textbf{e}): Percentile rank (higher is better) of the true image (shown to \textsc{A-bot}\xspace) as retrieved using fc7 feature predictions from \textsc{Q-bot}\xspace.} \label{fig:human_study} \vspace{-10pt} \end{figure*} \section{Smooth-L1 Penalty on Question Repetition} \label{sec:diversity} Our goal is to encourage \textsc{Q-bot}\xspace to ask a diverse set of questions so that when \textsc{A-bot}\xspace is exposed to the same during RL finetuning, it is better able to explore its state space\footnote{\textsc{A-bot}\xspace's state-space is characterized by a representation of the question, image, and the dialog history so far.}. Furthermore, asking diverse questions allows \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace exchanges across rounds to be more informative of the image, thus more useful for the image-guessing task. We observe that agents trained using the paradigm proposed by~\citet{visdial_rl} suffer from repetition of \textit{context} across multiple rounds of dialog -- similar dialog state embeddings across multiple rounds leading to repeated utterances and similar predicted image representations, which consequently further increases similarity in state embeddings.~\figref{fig:similar_embeddings} shows increasing $\cos(s_{t-1}^Q, s_{t}^Q)$ across dialog rounds for~\citet{visdial_rl}. To encourage \textsc{Q-bot}\xspace to ask diverse questions, we propose a simple auxiliary loss that penalizes similar dialog state embeddings. Specifically, given \textsc{Q-bot}\xspace states -- $s_{t-1}^Q,s_t^Q$ -- in addition to maximizing likelihood of question (during supervised pre-training), or image-guessing reward (during self-talk RL finetuning), we maximize a smooth-L1 penalty on $\Delta_t = \texttt{abs}(\left\lVert s_{t-1}^Q \right\rVert_2 - \left\lVert s_t^Q \right\rVert_2)$, \begin{equation} f(\Delta_t) = \begin{cases} 0.5 \Delta_t^2 & \text{if $\Delta_t < 0.1$} \\ 0.1(\Delta_t - 0.05) & \text{otherwise} \end{cases} \label{eqn:diversity} \end{equation} resulting in $\sum_{t=2}^{N} f(\Delta_t)$ as an additional term in the overall objective ($N =$ no. of dialog rounds). Note that in order to maximize this penalty, \textsc{Q-bot}\xspace has to push $s_{t-1}^Q$ and $s_{t}^Q$ further apart, which can only happen if $s_{t-1}^Q$ is updated using a question-answer pair that is different from the previous exchange, thus overall forcing \textsc{Q-bot}\xspace to ask different questions in successive dialog rounds. Similar diversity objectives have also been explored in~\citet{li_emnlp16} as reward heuristics. Before arriving at~\eqnref{eqn:diversity}, and following~\figref{fig:similar_embeddings}, we also experimented with directly minimizing cosine similarity, $\cos(s_{t-1}^Q, s_{t}^Q)$. This led to the network learning large biases to flip the direction of successive $s_{t-1}^Q$ vectors (without affecting norms), leading to question repetitions in alternating rounds. \section{Conclusions \& Future Work} We devised an auxiliary objective for training generative Visual Dialog agents with RL, that incentivizes \textsc{Q-bot}\xspace to ask diverse questions. This reduces repetitions in \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog during RL self-talk, and in turn enables \textsc{A-bot}\xspace to be exposed to a larger state space. Through extensive evaluations, we demonstrate that our \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace pair has significantly more diverse dialog while still being image-relevant, better downstream task performance, and higher consistency, fluency, and level of detail than baselines. Our code is publicly available: \href{https://github.com/vmurahari3/visdial-diversity}{{\tt github.com/vmurahari3/visdial-diversity}}. We hope this serves as a robust base for furthering progress on training visual dialog agents with RL for other grounded language games, adapting to learn to talk about novel visual domains, \etc. \section{Experiments} \label{sec:experiments} \textbf{Baselines and ablations}. To understand the effect of the proposed penalty, we compare our full approach -- `{\tt RL: Diverse-\textsc{Q-bot}\xspace + \textsc{A-bot}\xspace}' -- with the baseline setup in~\citet{visdial_rl}, as well as several ablations -- 1) `{\tt SL: \textsc{Q-bot}\xspace + \textsc{A-bot}\xspace}': supervised agents (\ie trained on VisDial data under MLE, no RL, no smooth-L1 penalty). Comparing to this quantifies how much our penalty + RL helps. 2) `{\tt SL: Diverse-\textsc{Q-bot}\xspace + \textsc{A-bot}\xspace}': supervised agents where \textsc{Q-bot}\xspace is trained with the smooth-L1 penalty. This quantifies gains from RL. \textbf{Automatic Metrics.} To evaluate \textsc{Q-bot}\xspace's \textit{diversity} (Table~\ref{tab:div_rel_res}), we generate \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialogs (with beam size = 5) for $10$ rounds on VisDial v$1.0$ val and compute 1) Novel Questions: the number of new questions (via string matching) in the generated dialog not seen during training, 2) Unique Questions: no. of unique questions per dialog instance (so $\leq10$), 3) Dist-n and Ent-n~\cite{zhang_nips18,li_naacl16}: the number and entropy of unique n-grams in the generated questions normalized by the total number of tokens, and 4) Mutual Overlap~\cite{deshpande2019fast}: BLEU-4 overlap of every question in the generated $10$-round dialog with the other $9$ questions, followed by averaging these $10$ numbers. To measure \textsc{Q-bot}\xspace's \textit{relevance}, we report the negative log-likelihood under the model of human questions from VisDial. We evaluate \textsc{A-bot}\xspace's answers to human questions from the VisDial dataset on the retrieval metrics introduced by~\citet{visdial} (Table~\ref{tab:visdial_res}). Finally, we also evaluate performance of the \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace pair at image-guessing (\figref{fig:guesswhich}), which is the downstream task they are trained with RL for. \textbf{Human Studies}. To evaluate how human-understandable \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialogs are, we conducted a study where we showed humans these dialogs (from our agents as well as baselines), along with a pool of $16$ images from the VisDial v$1.0$ test-std split -- consisting of the unseen image, $5$ nearest neighbors (in fc$7$ space), and $10$ random images -- and asked humans to pick their top-5 guesses for the unseen image. Our hypothesis was that if questions are more diverse, the dialog will be more image-informative, and so humans should be able to better guess which image was being talked about. We report top-$1$ accuracy of true image in human guesses. We also asked humans to rate \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog on consistency, fluency, and level of detail on a $5$-point Likert scale. \section{Implementation Details} We used beam search with a beam size of 5 during self-talk between all \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace variants. NDCG scores on the v1.0 val split and the total SL loss (on the same split) were used to select the best SL \textsc{A-bot}\xspace and \textsc{Q-bot}\xspace checkpoints respectively. We used a dropout rate of $0.5$ for all SL-pretraining experiments and no dropout for RL-finetuning. We used Adam~\cite{kingma_iclr15} with a learning rate of $10^{-3}$ decayed by ${\sim}0.25$ every epoch, upto a minimum of $5\times10^{-5}$. The objective for training Diverse-\textsc{Q-bot}\xspace was a sum of the smooth-L1 penalty (introduced in \secref{sec:diversity}), cross entropy loss, and L2 loss between the regression head output and the fc7~\cite{simonyan_iclr15} embedding of the image. We observed that coefficients in the range of $1e^{-3}$ to $1e^{-5}$ worked best for the smooth-L1 penalty. We also observed that training for a large number of epochs ($\sim$80) with the above mentioned range of coefficient values led to the best results. \section{Introduction} \label{sec:intro} \begin{figure*}[t!] \begin{minipage}[b]{0.7\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.98\textwidth]{figures/teaser.png} \vspace{5pt} \caption{{\scriptsize \textbf{Left}. Prior work on training generative Visual Dialog models with RL on an image-guessing task between \textsc{Q-bot}\xspace and \textsc{A-bot}\xspace~\cite{visdial_rl} leads to repetitive dialog. \textbf{Right}. We devise an auxiliary objective that incentivizes \textsc{Q-bot}\xspace to ask diverse questions, thus reducing repetitions and enabling \textsc{A-bot}\xspace to be exposed to more varied questions during RL, overall leading to better dialog, as measured by automatic metrics and human studies. }} \label{fig:teaser} \end{subfigure} \end{minipage}\hfill \begin{minipage}[b]{0.27\textwidth} \begin{subfigure}{\textwidth} \centering \includegraphics[width=0.95\textwidth]{figures/similarity_rounds_plot.png} \vspace{21pt} \caption{{\scriptsize Cosine similarity of successive dialog state embeddings within \textsc{Q-bot}\xspace. Prior work~\cite{visdial_rl} has high similarity. Our approach explicitly minimizes this similarity leading to more diverse dialog.}} \label{fig:similar_embeddings} \end{subfigure} \end{minipage}\hfill \vspace{5pt} \caption{} \vspace{-10pt} \end{figure*} Our goal is to build agents that can \emph{see} and \emph{talk} \ie agents that can perceive the visual world and communicate this understanding in natural language conversations in English. To this end, \citet{visdial,vries_cvpr17} proposed the task of Visual Dialog -- given an image, dialog history consisting of a sequence of question-answer pairs, and a follow-up question about the image, predict a free-form natural language answer to the question -- along with a dataset and evaluation metrics\footnote{\href{https://visualdialog.org}{\tt{visualdialog.org}}, \href{https://guesswhat.ai}{\tt{guesswhat.ai}}}. Posing Visual Dialog as a supervised learning problem is unnatural. This is because at every round of dialog, the agent's answer prediction is thrown away and it gets access to ground-truth dialog history, thus disabling it from steering conversations during training. This leads to compounding errors over long-range sequences at test time, a problem also common in training recurrent neural networks for language modeling~\cite{bengio_nips15,ross_aistats11,ranzato_iclr16}. To overcome this, \citet{visdial_rl} devised a goal-driven approach for training Visual Dialog agents with deep reinforcement learning. This is formulated as a game between two agents -- \textsc{Q-bot}\xspace (that asks questions) and \textsc{A-bot}\xspace (that answers questions). \textsc{Q-bot}\xspace is shown a one-line description of an unseen image that \textsc{A-bot}\xspace has access to and \textsc{Q-bot}\xspace is allowed to ask questions (in natural language) to \textsc{A-bot}\xspace for a fixed number of rounds and simultaneously make predictions of the unseen image. Both agents are rewarded for \textsc{Q-bot}\xspace's image-guessing performance and trained with REINFORCE~\cite{williams1992simple} to optimize this reward. Thus, there is incentive for \textsc{Q-bot}\xspace to ask questions informative of the hidden image, and for \textsc{A-bot}\xspace to provide meaningful answers. While this reinforcement learning approach leads to improved performance on the image-guessing task than supervised learned agents, it has a few shortcomings -- 1) image-guessing performance degrades after a few rounds of dialog (\figref{fig:guesswhich}), and 2) these improvements over supervised learning do not translate to an improved \textsc{A-bot}\xspace, \ie responses from this Visual Dialog agent are not necessarily better (on automatic metrics or human judgements), just that the \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace pair is sufficiently in sync to do well at image-guessing. We begin by understanding why this is the case, and find that \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog during `self-talk' often tends to be repetitive \ie the same question-answer pairs get repeated across rounds (\figref{fig:teaser} left). Since repeated interactions convey no additional information, image-guessing performance saturates, and even starts to degrade as the agent forgets useful context from the past. These repetitions are due to high similarity in \textsc{Q-bot}\xspace's context vectors of successive rounds driving question generation (\figref{fig:similar_embeddings}). To address this, we devise a smooth-L1 penalty that penalizes similarity in successive state vectors (\secref{sec:diversity}). This incentivizes \textsc{Q-bot}\xspace to ask diverse questions, thus reducing repetitions and in turn enabling \textsc{A-bot}\xspace to explore a larger part of the state space during RL~\ie be exposed to more visual concepts to talk about, and varied questions to answer (\secref{sec:results}). Note that a trivial failure mode with this penalty is for \textsc{Q-bot}\xspace to start generating diverse but totally image-irrelevant questions, which are not useful for the image-guessing task. A good balance between diversity and image-relevance in \textsc{Q-bot}\xspace's questions is necessary to improve at this task. We extensively evaluate each component of our approach against prior work and baselines: \begin{itemize}[leftmargin=*] \item \textsc{Q-bot}\xspace on diversity and image-relevance of generated questions during \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace self-talk. We find that diverse-\textsc{Q-bot}\xspace asks \emph{more novel questions} while still being image-relevant. \item \textsc{Q-bot}\xspace-\textsc{A-bot}\xspace self-talk on consistency, fluency, level of detail, and human-interpretability, through automatic metrics and human studies. We find that diverse-\textsc{Q-bot}\xspace-\textsc{A-bot}\xspace dialog after RL is \emph{more consistent, fluent, and detailed}. \item \textsc{A-bot}\xspace on precision and recall of generated answers on the VisDial dataset~\cite{visdial} ~\ie quality of answers to human questions. Training diverse-\textsc{Q-bot}\xspace $+$ \textsc{A-bot}\xspace with RL does not lead to a drop in accuracy on VisDial. \end{itemize} \section{Related Work} \label{sec:related} Our work is related to prior work in visual dialog~\cite{visdial,vries_cvpr17} and modeling diversity in text-only dialog~\cite{zhang_nips18,li_naacl16,li_emnlp16}. Closest to our setting is work on using conditional variational autoencoders for self-talk in visual dialog~\cite{massiceti_cvpr18}, where diversity is not explicitly modeled but is measured via metrics specific to the proposed architecture. Adding constraints to generate a diverse set of natural language dialog responses have previously been explored in~\citet{zhang_nips18} via adversarial information maximization, in~\citet{gao_arxiv19} by jointly modeling diversity and relevance in a shared latent space, and in~\citet{li_naacl16} using a maximum mutual information criterion. In contrast, we are interested in diversity at the level of the entire dialog (instead of a single round) -- reducing repetitions in QA pairs across multiple rounds. Our repetition penalty is partly inspired by the `Information Flow' constraint in~\citet{li_emnlp16}. As detailed in~\secref{sec:prelim}, we experimented with similar forms of the penalty and eventually settled on smooth-L1. To the best of our knowledge, we are the first to explicitly model diversity as a constraint in visual dialog. \section{Results} \label{sec:results} \begin{itemize}[leftmargin=*] \item \textbf{\textsc{Q-bot}\xspace's diversity} (Table~\ref{tab:div_rel_res}): The question-repetition penalty consistently increases diversity (in both SL and RL) over the baseline! {\tt RL: Diverse-\textsc{Q-bot}\xspace} asks \char`\~$1.5$ more unique questions on average than~\citet{visdial_rl} ($6.70\rightarrow8.19$) for every $10$-round dialog, \char`\~6.3x more novel questions ($71\rightarrow449$), and a higher fraction and entropy of unique generated n-grams, while still staying comparably relevant (NLL). \item \textbf{\textsc{A-bot}\xspace on VisDial} (Table.~\ref{tab:visdial_res}): {\tt RL: \textsc{A-bot}\xspace} outperforms {\tt SL: \textsc{A-bot}\xspace}, but does not statistically improve over the baseline on answering human questions from VisDial\footnote{This is consistent with trends in~\citet{visdial_rl}.} (on v$1.0$ val \& test-std). \item \textbf{Image-guessing task} (\figref{fig:guesswhich}): {\tt Diverse-\textsc{Q-bot}\xspace + \textsc{A-bot}\xspace} (SL and RL) significantly outperform the baseline on percentile rank of ground-truth image as retrieved using \textsc{Q-bot}\xspace's fc$7$ prediction. Thus, the question-repetition penalty leads to a more informative communication protocol. \item \textbf{Human studies} (\figref{fig:human_study}): Humans judged {\tt RL: Diverse-\textsc{Q-bot}\xspace + \textsc{A-bot}\xspace} dialog significantly more consistent (fewer conflicting exchanges), fluent (fewer grammatical errors), and detailed (more image-informative) over the baseline and supervised learning. This is an important result. Performance on GuessWhich, together with these dialog quality judgements from humans show that agents trained with our approach develop a more effective communication protocol for the downstream image-guessing task, while still not deviating off English, which is a common pitfall when training dialog agents with RL~\cite{kottur_emnlp17,lewis_emnlp17}. \end{itemize} Note that since our penalty (Eqn.~\ref{eqn:diversity}) is structured to avoid repetition across successive rounds, one possible failure mode is that \textsc{Q-bot}\xspace learns to ask the same question every alternate dialog round (at $t$ and $t+2$). Empirically, we find that this happens ${\sim}15\%$ of times ($2490$ times out of ${\sim}16.5$k question pairs) on v1.0 val for RL: Diverse \textsc{Q-bot}\xspace + \textsc{A-bot}\xspace compared to ${\sim}22\%$ for SL: \textsc{Q-bot}\xspace + \textsc{A-bot}\xspace. This observation, combined with the fact that Diverse-\textsc{Q-bot}\xspace asks $\sim$1.6 more unique questions relative to SL: \textsc{Q-bot}\xspace across 10 rounds suggests that simply incentivizing diversity in successive rounds works well empirically. We hypothesize that this is because repeating questions every other round or other such strategies to game our repetition penalty is fairly specific behavior that is likely hard for models to learn given the large space of questions \textsc{Q-bot}\xspace could potentially ask.
\section{Introduction} \label{sec:Introduction} Dirac and Weyl semimetals are condensed matter materials, whose low-energy electron quasiparticles are described by the relativistic-like Dirac and Weyl equations, respectively (for recent reviews on Dirac and Weyl semimetals, see Refs.~\cite{Yan-Felser:2017-Rev,Hasan-Huang:rev-2017,Armitage-Vishwanath:2017-Rev}). One of the hallmark properties of their quasiparticles is the linear energy dispersion relation in the vicinity of the band-touching points known as the Dirac points and Weyl nodes, respectively. The electron states in Weyl semimetals are topologically nontrivial, which is reflected in the fact that the Weyl nodes are monopoles of the Berry flux in momentum space~\cite{Berry:1984} with the topological charge directly related to the Weyl node chirality. As was shown by Nielsen and Ninomiya~\cite{Nielsen-Ninomiya-1,Nielsen-Ninomiya-2}, simple continuity arguments imply that Weyl nodes can exist only in pairs of opposite chiralities. Since the lines of the Berry curvature cannot exit the topological semimetal or simply terminate at its surface, special topologically protected surface Fermi arc states connecting the projections of the bulk Weyl nodes onto the surface should necessarily exist. These states were theoretically predicted in Ref.~\cite{Savrasov:2011} and, as shown in Ref.~\cite{Haldane:2014}, provide a unique means to equilibrate the chemical potential in otherwise disconnected Weyl nodes of opposite chiralities. Experimentally, the Fermi arcs were directly observed with the help of the angle-resolved photoemission spectroscopy ~\cite{Xu-Hasan:2015,Xu-Hasan-TaP:2015,Lv-Ding-TaAs:2015,Lv-Ding-TaAs:2015b,Yang-Chen-TaAs:2015,Xu-Shi-TaP:2015,Xu-Hasan-NbAs:2015,Liu-Felser:2015,Xu-Hasan-TaAs:2016,Belopolski-Hasan:2016} as well as through the quasiparticle interference patterns~\cite{Gyenis-Bernevig:2016,Batabyal-Felser:2016,Inoue-Bernevig:2016,Zheng-Hasan:2016}. The experimental observation of the Fermi arcs is reviewed in Refs.~\cite{Hasan-Huang:rev-2017,Zheng-Hasan:rev-2018}. The Fermi arcs appear when the surface is parallel to the chiral shift $\mathbf{b}$, which is the vector that separates the Weyl nodes of opposite chiralities in momentum space. In such a case, the Weyl nodes are projected onto the different points in the surface Brillouin zone. Although the Fermi arcs are topologically protected, their shape depends on the boundary conditions~\cite{Hosur:2012,Sun-Yan:2015,Xu-Sun-Co3Sn2S2:2018,Morali-Beidenkopf-Co3Sn2S2:2019,Yang-Chen-NbAs:2019}. Therefore, it is interesting what happens with the Fermi arc states if the surface is still parallel to the chiral shift but is, however, curved. A cylindric wire whose axis is directed along the chiral shift is one of the simplest geometries to study this question. Since the Dirac point is composed of Weyl nodes of opposite chirality and is usually topologically trivial, one would not expect any Fermi arcs in 3D Dirac semimetals. However, as was demonstrated numerically~\cite{Wang:2012,Wang:2013}, the 3D Dirac semimetals $A_3$Bi ($A$=Na, K, Rb) and Cd$_3$As$_2$ possess nontrivial surface Fermi arcs. Later, these surface states were also found experimentally in Na$_3$Bi~\cite{Xu-Hasan-Na3Bi:2015}. Two of us showed~\cite{Gorbar-Sukhachov:2015-Z2} that the underlying physical reason for the existence of the surface Fermi arcs in Dirac semimetals is connected with a discrete up-down parity symmetry of the low-energy effective Hamiltonian. As a result, all electron states are split into two separate sectors, each describing a Weyl semimetal with a pair of Weyl nodes and broken time-reversal ($\mathcal{T}$) symmetry. The time-reversal symmetry is preserved in the complete theory because it interchanges states from the two different sectors. Therefore, the corresponding Dirac semimetal can be identified as a $\mathbb{Z}_2$ Weyl semimetal. The surface Fermi arc states in a semi-infinite slab of $\mathbb{Z}_2$ Weyl semimetals $A_3$Bi ($A$=Na, K, Rb) were studied in Ref.~\cite{Gorbar-Sukhachov:2015-Z2-FA} by employing a continuum low-energy effective model and also were investigated in slab geometries in Refs.~\cite{Potter:2014,Gorbar:2014qta,Molina:2017,Molina:2018}. In addition to the surface states, the nontrivial $\mathbb{Z}_2$ topology is manifested too in the motion of electron wavepackets in these materials~\cite{Gorbar:2018ynb}. The transport properties of Weyl semimetal nanowires have been already studied by using the scattering matrix approach and numerical methods in Refs.~\cite{Baireuther-Beenakker:2016,Igarashi:2017,Kaladzhyan-Bardarson:2019}. Remarkably, it was shown that the contribution of the Fermi arc states to the electric current induced by a slowly varying magnetic field can be significant and even comparable to that of the bulk states regardless of the system size~\cite{Baireuther-Beenakker:2016}. In fact, the corresponding contribution resembles the current of the chiral magnetic effect~\cite{Fukushima:2008,Chang-Yang:2015,Burkov:rev-2015} and equals $-e^2/(4\pi^2\hbar^2c) \mu_5 B$, where $-e$ is the electron charge, $\mu_5$ is the chiral chemical potential, and $B$ is a magnetic field. Such a counterintuitive behavior is explained by the fact that the small number of surface states is compensated by their increased sensitivity to magnetic field. A similar conclusion about large contribution of the surface states was also phenomenologically reached in Ref.~\cite{Breitkreiz-Brouwer:2019} in the case of weak surface-bulk scattering. Recently, it was explicitly demonstrated~\cite{Kaladzhyan-Bardarson:2019} that the existence of the surface and bulk states allows for two transport regimes. In the surface regime, the current is carried by the Fermi arc surface states with conductance increasing in steps as a function of the electric chemical potential $\mu$ when it lies in the bulk confinement gap due to the finite size of a sample. For highly doped samples, another bulk-surface transport regime takes place where the conductance $G$ is dominated by the bulk states and is quadratic in the electric chemical potential. The latter dependence is caused by the fact that the group velocity of quasiparticles is constant unlike the case of usual metals where $G \sim \mu^{3/2}$. The interplay of magnetic field and surface states in the magnetotransport of Weyl semimetals was also investigated in Refs.~\cite{Ominato:2016,Wang:2017-QHE,Kaladzhyan-Bardarson:2019}. Among other interesting effects, the presence of the Fermi arcs allows for the closed surface-bulk orbits when a magnetic field is perpendicular to a slab of Weyl semimetal~\cite{Potter:2014,Zhang-Vishwanath:2016}. These orbits were experimentally identified via the quantum oscillations measurements in Ref.~\cite{Moll:2016}. The transport evidence of the Fermi arc surface states in Dirac semimetal Cd$_3$As$_2$ nanowires was also demonstrated via the Aharonov--Bohm oscillations in Ref.~\cite{Wang-Liao:2016}. By using the concept of the surface-bulk orbits, the authors of Ref.~\cite{Baum:2015} investigated a nonlocal transport in a Weyl semimetal slab. In such a case, perturbation on, e.g., a top surface of Weyl semimetal produces a signal on the other surface. Because of the topological nature of the Fermi arcs and their effectively 1D character with a linear energy dispersion, one would naively expect that the surface transport should be nondissipative. However, as was shown in Ref.~\cite{Gorbar-Sukhachov:2016}, this is generically not the case and, in fact, the Fermi arc transport is dissipative. Indeed, since the gapless bulk states in Weyl semimetals coexist with the Fermi arc states, the latter are not fully decoupled from the bulk and there is a scattering into the bulk states in addition to possible scattering into other surface Fermi arc states. This is in contrast to the case of topological insulators, in which bulk states are gapped and an effective Hamiltonian for the surface states can be reliably formulated. In topological semimetals, the electron scattering from the surface into the bulk and vice versa leads to a dephasing of the Fermi arc quasiparticles and, consequently, dissipation. The dissolution of Fermi arcs in the presence of a strong disorder was also confirmed numerically in Refs.~\cite{Slager:2017,Wilson:2018}. The main goal of this paper is to investigate the interplay of the finite size effects and the Fermi arc states in Dirac semimetals paying a special attention to the electric charge and current density profiles. The structure of the surface states, their energy dispersion, and wave functions are also rigorously investigated. Among the key results of this paper is the spatial profile of the DC conductivity in cylindrical nanowires, which, to the best of our knowledge, was not investigated before. We believe that our study is important in a rapidly developing field of nanoelectronics involving Dirac and Weyl materials. For example, the use of Dirac semimetal Cd$_3$As$_2$ nanowires in creating controllable p-n junctions was recently demonstrated in Ref.~\cite{Bayogan-Jung:2019}. The paper is organized as follows. The model of a Dirac or Weyl semimetal nanowire is defined in Sec.~\ref{sec:model}. The wave functions and the energy spectrum are discussed in the same section. Sec.~\ref{sec:Distribution-cc} is devoted to the electric charge and current density distributions inside nanowires. The DC response is investigated in Sec.~\ref{sec:Kubo}. The results are discussed and summarized in Sec.~\ref{sec:Summary}. Technical details related to the derivation of wave functions inside and outside the wire as well as the corresponding boundary conditions are presented in Appendices~\ref{sec:app-wave-functions} and \ref{sec:app-BC}, respectively. Conductivities for wires with different radiuses are presented in Appendix~\ref{sec:app-sigma-few-R}. A few useful formulas and relations are presented in Appendix~\ref{sec:app-Kubo-formulas}. In addition, we set the Planck and Boltzmann constants to unity, $\hbar=1$ and $k_{\rm B}=1$. \section{Model, wave functions, and energy spectrum} \label{sec:model} In this section, the key details of Dirac and Weyl semimetal nanowires including the Hamiltonian, wave functions, and energy spectrum are discussed. \subsection{Hamiltonian and boundary conditions} \label{sec:model-H-BC} Let us begin with the low-energy Hamiltonian of the electron states in the Dirac semimetals $A_3\mbox{Bi}$ ($A$=Na, K, Rb)~\cite{Wang:2012} (which is also valid for one of the crystalline phases of Cd$_3$As$_2$~\cite{Wang:2013}). Its explicit form reads as \begin{equation} \label{model-H-Dirac} H_{4\times4} = H_{2\times 2}^{+}\oplus H_{2\times 2}^{-}, \end{equation} where the upper block is given by \begin{equation} \label{model-H-Dirac-up} H_{2\times2}^{+}=(C_0+C_1k_z^2)\mathds{1}_2 +\left( \begin{array}{cc} \gamma\left(k_z^2-m\right) & v\left(k_x+ik_y\right) \\ v\left(k_x-ik_y\right) & -\gamma\left(k_z^2-m\right) \\ \end{array} \right) \end{equation} and the lower block $H_{2\times2}^{-}$ is obtained by replacing $k_x\to-k_x$ in $H_{2\times2}^{+}$. Note that, for simplicity, we omitted terms $O(k_x^2)$ and $O(k_y^2)$. It is important to note that $m$ is positive in the Dirac and Weyl semimetals because, otherwise, there is no band-touching and a trivial insulator is realized (see the energy spectrum below and the discussion at the end of this subsection). Since the upper and lower blocks of Hamiltonian (\ref{model-H-Dirac}) do not mix in the model at hand, it is easy to find that each of them has the following two-band energy spectrum: \begin{eqnarray} \label{model-H-Dirac-spectrum} \epsilon_{\mathbf{k}} = (C_0+C_1k_z^2) \pm \sqrt{\gamma^2(m-k_z^2)^2 +v^2(k_x^2+k_y^2)}. \end{eqnarray} The bands touch at $\mathbf{k}_0^{\pm} =\left(0,0,\pm \sqrt{m}\right)$, which define the positions of the Dirac points (for the $4\times4$ model) or Weyl nodes (for each of the $2\times2$ blocks). It is important to note that the upper block describes a $\cal{T}$ symmetry broken Weyl semimetal with the Weyl nodes of left- and right-handed chiralities located at $\mathbf{k}_0^{-}$ and $\mathbf{k}_0^{+}$, respectively. Since the lower block is obtained by replacing $k_x\to-k_x$, the chiralities of its Weyl nodes are reversed compared to those of the upper block. Therefore, the two copies of Weyl semimetals overlap and form a Dirac semimetal. The standard relativistic-like Hamiltonian can be straightforwardly obtained by expanding in the vicinity of the $\mathbf{k}_0^{\pm}$ points (see, e.g., Ref.~\cite{Gorbar-Sukhachov:2015-Z2-FA}). By fitting the \emph{ab initio} numerical data for Na$_3$Bi with the effective Hamiltonian (\ref{model-H-Dirac}), the following values of model parameters were obtained in Ref.~\cite{Wang:2012}: \begin{equation} C_0 = -0.06382~\mbox{eV}, \quad C_1 = 8.7536~\mbox{eV\,\AA}^2, \quad m=0.008162~\mbox{\AA}^{-2}, \quad \gamma=10.6424~\mbox{eV\,\AA}^2, \quad v=2.4598~\mbox{eV\,\AA}. \label{model-parameters} \end{equation} We plot the bulk energy spectrum in the left and right panels of Fig.~\ref{fig:model-spectrum-bulk} for $C_0=C_1=0$ as well as $C_0$ and $C_1$ defined in Eq.~(\ref{model-parameters}), respectively. It is clear that the term with $C_0$ and $C_1$ breaks the particle-hole symmetry and plays the role of momentum-dependent electric chemical potential. In what follows, however, we will primarily concentrate on the case $C_0=C_1=0$. We checked that, while these terms do affect the transport properties, they do not lead to any qualitatively new effects. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.45\textwidth]{Fig1a.eps}\hfill \includegraphics[width=0.45\textwidth]{Fig1b.eps} \end{center} \caption{The bulk energy spectrum (\ref{model-H-Dirac-spectrum}) of the $2\times 2$ model for $C_0=C_1=0$ (left panel) as well as $C_0$ and $C_1$ defined in Eq.~(\ref{model-parameters}) (right panel). } \label{fig:model-spectrum-bulk} \end{figure*} Since the main goal of our study is to consider the interplay of the finite-size effects and the Fermi arc surface states, we employ a simple model of a cylindrical wire of radius $R$, which allows for an analytical solution. The axis of the cylinder is parallel to the chiral shift, i.e., is directed along the $z$ axis. Furthermore, it is appropriate to use the cylindrical coordinates $\mathbf{r}=\left\{r\cos{\varphi}, r\sin{\varphi}, z\right\}$ in which the upper block of the Dirac Hamiltonian takes the following form in the mixed coordinate-momentum representation: \begin{equation} \label{model-cylinder-H-Dirac-up} H_{2\times2}^{+} =\left(C_0+C_1k_z^2\right)\mathds{1}_2 + \left( \begin{array}{cc} \gamma(k_z^2-m) & -ive^{i\varphi}\left(\frac{\partial}{\partial r}+\frac{i}{r}\frac{\partial}{\partial \varphi}\right) \\ -ive^{-i\varphi}\left(\frac{\partial}{\partial r}-\frac{i}{r}\frac{\partial}{\partial \varphi}\right) & -\gamma(k_z^2-m) \\ \end{array} \right). \end{equation} The lower block can be obtained by performing the complex conjugation in Hamiltonian~(\ref{model-cylinder-H-Dirac-up}), i.e., $H_{2\times2}^{-}=\left(H_{2\times2}^{+}\right)^{*}$. The space outside the cylinder is vacuum or any trivial insulator that is modeled by the same Hamiltonian (\ref{model-H-Dirac}) albeit with $m\to -\tilde{m}$. As is easy to check by using the bulk spectrum (\ref{model-H-Dirac-spectrum}), this replacement opens the energy gap. For simplicity, the energy gap $\tilde{m}$ outside the wire will be set to infinity. \subsection{Wave functions and energy spectrum} \label{sec:model-H-wf} In this subsection, we determine the wave functions inside the wire as well as the energy spectrum. Since the operator of the total angular momentum $\hat{J}_z= -i\partial_{\varphi} \mathds{1}_2 - \sigma_z/2$ commutes with Hamiltonian (\ref{model-cylinder-H-Dirac-up}), we seek wave functions of Hamiltonian (\ref{model-cylinder-H-Dirac-up}) inside the wire ($r<R$) in the form of eigenstates with angular momentum $n-1/2$, i.e., \begin{equation} \label{model-cylinder-psi-Dirac-up-r<R} \psi^{+}= \left( \begin{array}{c} \rho_-(r) \, e^{in\varphi} \\ \rho_+(r) \, e^{i(n-1)\varphi} \\ \end{array} \right). \end{equation} The wave functions for the lower block are $\psi^{-}=\left(\psi^{+}\right)^{*}$. By solving the eigenvalue problem $H^{+}_{2\times 2}\psi^{+}=\epsilon\psi^{+}$, we find (for the details of the derivation, see Appendix~\ref{sec:app-wave-functions}) \begin{equation} \label{model-cylinder-psi-sp} \psi_{+}^{+} =A_{+}(\tilde{\epsilon}) \left( \begin{array}{c} J_n\left(\frac{r}{r_0}\right) e^{in\varphi} \\ -i F(\tilde{\epsilon}) J_{n-1}\left(\frac{r}{r_0}\right) e^{i(n-1)\varphi} \\ \end{array} \right) \end{equation} for $s_{\epsilon}>0$ and \begin{equation} \label{model-cylinder-psi-sm} \psi_{-}^{+} =A_{-}(\tilde{\epsilon}) \left( \begin{array}{c} I_n\left(\frac{r}{r_0}\right) e^{in\varphi} \\ -i F(\tilde{\epsilon}) I_{n-1}\left(\frac{r}{r_0}\right) e^{i(n-1)\varphi} \\ \end{array} \right) \end{equation} for $s_{\epsilon}<0$. Here $J_n(x)$ and $I_n(x)$ are the Bessel and modified Bessel functions of the first kind, respectively, and we used the following shorthand notations: \begin{eqnarray} \label{model-cylinder-teps-def} \tilde{\epsilon} &=& \epsilon-C_0-C_1k_z^2,\\ \label{model-cylinder-r0-def} r_0 &=& \frac{v}{\sqrt{\left|\tilde{\epsilon}^2-\gamma^2(k_z^2-m)^2\right|}},\\ \label{model-cylinder-F-def} F(\tilde{\epsilon}) &=& \frac{\sqrt{\left|\tilde{\epsilon}^{2}-\gamma^2(k_z^2-m)^2\right|}}{\tilde{\epsilon}+\gamma(k_z^2-m)},\\ \label{model-cylinder-spes-def} s_{\epsilon} &=& \mbox{sgn}{\left[\tilde{\epsilon}^{2}-\gamma^2\left(k_z^2-m\right)^2\right]}. \end{eqnarray} The normalization constants are \begin{eqnarray} \label{model-cylinder-A-plus} A_{+}(\tilde{\epsilon}) &=& \frac{1}{\sqrt{2\pi\left[\mathcal{J}(n,r_0)+F^{2}(\tilde{\epsilon}) \mathcal{J}(n-1,r_0)\right]}},\\ \label{model-cylinder-A-minus} A_{-}(\tilde{\epsilon}) &=& \frac{1}{\sqrt{2\pi\left[\mathcal{I}(n,r_0) +F^{2}(\tilde{\epsilon}) \mathcal{I}(n-1,r_0)\right]}}, \end{eqnarray} where \begin{equation} \label{model-cylinder-Jnr0-def} \mathcal{J}(n,r_0)=\int_0^R r dr\,J_n^2\left(\frac{x}{r_0}\right) = \frac{R^2}{2}\left[J_n^2\left(\frac{R}{r_0}\right)+J_{n+1}^2\left(\frac{R}{r_0}\right)\right] -nRr_0J_n\left(\frac{R}{r_0}\right)J_{n+1}\left(\frac{R}{r_0}\right), \end{equation} \begin{equation} \label{model-cylinder-Inr0-def} \mathcal{I}(n,r_0)=\int_0^R r dr\,I_n^2\left(\frac{x}{r_0}\right) = \frac{R^2}{2}\left[I_n^2\left(\frac{R}{r_0}\right)-I_{n+1}^2\left(\frac{R}{r_0}\right)\right] -nRr_0I_n\left(\frac{R}{r_0}\right)I_{n+1}\left(\frac{R}{r_0}\right). \end{equation} In order to find energy levels, the wave function~(\ref{model-cylinder-psi-sp}) (or (\ref{model-cylinder-psi-sm}) for $s_{\epsilon}<0$) should be matched with the corresponding solution outside the cylinder. As was discussed before, the latter is obtained by replacing $m\to -\tilde{m}$ and then setting $\tilde{m}\to\infty$. The matching at the surface $r=R$ is considered in Appendix~\ref{sec:app-BC} and leads to the following boundary condition: \begin{equation} \label{model-cylinder-BC} \rho_-(R)+i\rho_+(R)=0, \end{equation} which is valid for both upper and lower block solutions. Let us find now the energy spectrum. By using the boundary condition (\ref{model-cylinder-BC}), we obtain the following characteristic equation: \begin{eqnarray} \label{spectrum-char-eq} s_{\epsilon}>0: &\quad& J_n\left(\frac{R}{r_0}\right) + F(\tilde{\epsilon})J_{n-1}\left(\frac{R}{r_0}\right)=0,\\ \label{spectrum-char-eq-1} s_{\epsilon}<0: &\quad& I_n\left(\frac{R}{r_0}\right) + F(\tilde{\epsilon}) I_{n-1}\left(\frac{R}{r_0}\right)=0. \end{eqnarray} In general, these equations should be solved numerically. We present the corresponding results for $C_0=C_1=0$ in the left and right panels of Fig.~\ref{fig:spectrum-2x2-large-R} for $n=0$ and $|n|<9$. If the electric chemical potential is fixed, then the sum over $n$ is naturally truncated because states with higher $n$ have larger energies. Note also that in order to model realistic wires of Dirac and Weyl semimetals, we set $R=10\,v/(\gamma m)$, where $v/(\gamma m)\approx2.8319~\mbox{nm}$. As was demonstrated in Refs.~\cite{Li-Yu-Cd3As2:2015,Wang-Liao:2016,Bayogan-Jung:2019}, the wires of such a radius can be synthesized, e.g., via the chemical vapour deposition method. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.45\textwidth]{Fig2a.eps}\hfill \includegraphics[width=0.45\textwidth]{Fig2b.eps} \end{center} \caption{The energy levels as a function of $k_z$ for the upper block at $R=10\,v/(\gamma m)$ and $C_0=C_1=0$ determined by Eqs.~(\ref{spectrum-char-eq}) and (\ref{spectrum-char-eq-1}). While the left panel corresponds to $n=0$, the right one shows the results for $|n|<9$. } \label{fig:spectrum-2x2-large-R} \end{figure*} Our results reveal that there are two types of states: (i) modes with almost flat parabolic-like profiles, which correspond to the surface Fermi arc states (see the red solid lines in Fig.~\ref{fig:spectrum-2x2-large-R}), and (ii) modes with local extrema at $k_z =\pm \sqrt{m}$, which are the bulk states (see the blue dashed lines in Fig.~\ref{fig:spectrum-2x2-large-R}). With the growth of the wire radius the separation between the energy levels decreases until the Fermi arc levels merge and form a standard planar surface that connects separated bulk Fermi surfaces. The gap between the bulk states also reduces and vanishes at $R\to\infty$. As was emphasized in Ref.~\cite{Kaladzhyan-Bardarson:2019}, while the Fermi arc and bulk states always coexist in large crystals, the finite-size effects make it possible to separate their contributions. However, these effects themselves are not enough to probe the separate contributions of the surface and bulk modes. The other important ingredient is the position of the Fermi energy, which should be sufficiently low to intersect only the Fermi arc states but not the bulk states. \section{Electric charge and current distributions} \label{sec:Distribution-cc} In this section, we consider the electric charge and current distributions inside nanowires of Dirac and Weyl semimetals. In our study, we will pay a special attention to the separate contributions of the bulk and surface modes. \subsection{Charge density} \label{sec:Distribution-charge} Let us start with the electric charge density. The principal quantity of interest is the probability density of each mode. Recall that since the wave functions of the lower and upper blocks are related by complex conjugation, the probability densities coincide for both blocks. In particular, they read as \begin{eqnarray} \label{Distribution-charge-psi-abs-plus-def} \left|\psi^{\pm}_{+,n,k_z}(r)\right|^2 = |A_{+}|^2\left[\left|J_n\left(\frac{r}{r_0}\right)\right|^2 + \left|F(\tilde{\epsilon})\right|^2 \left|J_{n-1}\left(\frac{r}{r_0}\right)\right|^2 \right] \end{eqnarray} for $s_{\epsilon}>0$ and \begin{eqnarray} \label{Distribution-charge-psi-abs-minus-def} \left|\psi^{\pm}_{-,n,k_z}(r)\right|^2 = |A_{-}|^2\left[\left|I_n\left(\frac{r}{r_0}\right)\right|^2 + \left|F(\tilde{\epsilon})\right|^2 \left|I_{n-1}\left(\frac{r}{r_0}\right)\right|^2 \right] \end{eqnarray} for $s_{\epsilon}<0$. The electric charge density is defined through the sum of probability densities of eigenfunctions weighted with the equilibrium electron distribution function $f^{\rm eq}(\epsilon)$ \begin{eqnarray} \label{Distribution-charge-rho-def} \rho^{\pm}(r)= -e\sum_{n=-\infty}^{\infty}\int\frac{dk_z}{2\pi} f^{\rm eq}(\epsilon)\left|\psi^{\pm}_{s_{\epsilon},n,k_z}(r)\right|^2, \end{eqnarray} where $-e$ is the charge of the electron and we use the standard Fermi--Dirac distribution function for the electron states ($\epsilon>0$) $f^{\rm eq}(\epsilon)=1/\left[1+e^{(\epsilon-\mu)/T}\right] \stackrel{T\to0}{=} \theta\left(\mu-\epsilon\right)$ and $f^{\rm eq}(\epsilon)=1-1/\left[1+e^{(\epsilon-\mu)/T}\right] \stackrel{T\to0}{=} 1-\theta\left(\mu-\epsilon\right)$ for the hole states ($\epsilon<0$). In the latter case one also needs to change $-e\to e$. In addition, here $T$ is temperature in the energy units. At vanishing temperature, only the energy levels in the finite interval determined by the electric chemical potential $\mu$ contribute to the electric charge. It is clear that nonzero temperature will broaden this interval but should not lead to any new qualitative effects at least for sufficiently small temperature. The electric charge density defined by the $n=0$ mode for a Weyl semimetal nanowire of radius $R=10\,v/(\gamma m)$ is presented in the left panel of Fig.~\ref{fig:2x2-charge-R=10} at sufficiently large electric chemical potential $\mu=0.6\,\gamma m$. The color code of the lines is the same as in the left panel of Fig.~\ref{fig:spectrum-2x2-large-R}. As one can see, due to the Fermi arc states, the electric charge density is primarily accumulated at the surface (red solid line). The bulk states are also filled (black solid line) and the corresponding charge density is localized primarily near the center of the wire. However, their contribution is not dominant compared to the surface states. The total charge density obtained by summing over $|n|<9$ is given in the right panel of Fig.~\ref{fig:2x2-charge-R=10}. As expected, for a small electric chemical potential, only the surface-localized Fermi arc modes contribute to the electric charge density. On the other hand, for large $\mu$, the contribution of the bulk states become noticeable, albeit still smaller than the surface one. Due to the equal contribution of both blocks, the charge density in a Dirac semimetal wire is doubled, i.e., $\rho(r)=\rho^{+}(r)+\rho^{-}(r)=2\rho^{+}(r)$. Note that this is not true when either time-reversal ${\cal T}$ or parity-inversion ${\cal P}$ symmetry is broken and an asymmetry between the $\mathbb{Z}_2$ copies of Weyl semimetals is present. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.45\textwidth]{Fig3a.eps}\hfill \includegraphics[width=0.45\textwidth]{Fig3b.eps} \end{center} \caption{The electric charge density given in Eq.~(\ref{Distribution-charge-rho-def}) inside a Weyl semimetal nanowire as a function of the radial coordinate $r$ at $n=0$ and $\mu=0.6\,\gamma m$ (left panel) and summed over $|n|<9$ at a few values of $\mu$ (right panel). The color code of the lines in the left panel is the same as in the left panel of Fig.~\ref{fig:spectrum-2x2-large-R}. In both panels, we set $R=10\,v/(\gamma m)$ and used $\rho_0 = -e\gamma^2 m^{5/2}/v^2$.} \label{fig:2x2-charge-R=10} \end{figure*} \subsection{Electric current distribution} \label{sec:Distribution-current} In this subsection, we consider the distribution of the electric current in nanowires of Dirac and Weyl semimetals. In the absence of external fields, the current operator equals $\hat{\mathbf{j}} = -e\partial_{\mathbf{k}} H$. Then we find \begin{eqnarray} \label{Distribution-current-j-r-def} \hat{j}_{r} &=& -ev\left[\cos{\varphi} \,\mathds{\tau}_z\otimes\sigma_x - \sin{\varphi} \,\mathds{1}_2\otimes\sigma_y\right],\\ \label{Distribution-current-j-phi-def} \hat{j}_{\varphi} &=& -ev\left[-\sin{\varphi} \,\mathds{\tau}_z\otimes\sigma_x - \cos{\varphi} \,\mathds{1}_2\otimes\sigma_y\right],\\ \label{Distribution-current-j-z-def} \hat{j}_z &=& -2ek_z\left[C_1 \,\mathds{1}_4 + \gamma \,\mathds{1}_2\otimes\sigma_z\right]. \end{eqnarray} Here $\hat{j}_{r}$ and $\hat{j}_{\varphi}$ are the radial and azimuthal components of the electric current operator, respectively and $\hat{j}_z$ is the longitudinal current operator in the direction of the cylinder axis. By using definitions (\ref{Distribution-current-j-r-def}) and (\ref{Distribution-current-j-phi-def}), we find the following expectation values at $s_{\epsilon}>0$: \begin{eqnarray} \label{Distribution-current-j-r-calc} \left[\psi_{+,n,k_z}^{\pm}(r)\right]^{\dag} \hat{j}_{r} \psi_{+,n,k_z}^{\pm}(r) &=& 0,\\ \label{Distribution-current-j-phi-calc} \left[\psi_{+,n,k_z}^{\pm}(r)\right]^{\dag} \hat{j}_{\varphi} \psi_{+,n,k_z}^{\pm}(r) &=& \mp 2ev|A_{+}|^2 F(\tilde{\epsilon}) J_{n-1}\left(\frac{r}{r_0}\right) J_{n}\left(\frac{r}{r_0}\right),\\ \label{Distribution-current-j-z-calc} \left[\psi_{+,n,k_z}^{\pm}(r)\right]^{\dag} \hat{j}_{z} \psi_{+,n,k_z}^{\pm}(r) &=& -2ek_z|A_{+}|^2 \left[\left(C_1+\gamma\right) \left|J_n\left(\frac{r}{r_0}\right)\right|^2 +\left(C_1-\gamma\right) \left|F(\tilde{\epsilon})\right|^2 \left|J_{n-1}\left(\frac{r}{r_0}\right)\right|^2\right]. \end{eqnarray} For $s_{\epsilon}<0$, one needs to replace $\psi_{+,n,k_z}\to \psi_{-,n,k_z}$, $A_{+}\to A_{-}$, and $J_n\left(r/r_0\right)\to I_n\left(r/r_0\right)$ in Eqs.~(\ref{Distribution-current-j-r-calc}), (\ref{Distribution-current-j-z-calc}), and (\ref{Distribution-current-j-phi-calc}). Explicit expressions for the coefficients $|A_{\pm}|^2$ are given in Eqs.~(\ref{model-cylinder-A-plus}) and (\ref{model-cylinder-A-minus}). As expected, the radial component of the electric current expectation value vanishes everywhere in the wire. As to the expectation value of the azimuthal component of the current, it has opposite signs for the upper and lower blocks. This means that the total electric current density in the equilibrium state is zero as it should be in Dirac semimetals where the ${\cal T}$ symmetry is preserved. Similarly to the electric charge density (\ref{Distribution-charge-rho-def}), the electric current density is defined as \begin{eqnarray} \label{Distribution-current-j-def} \mathbf{j}^{\pm}(r)= -e\sum_{n=-\infty}^{\infty}\int\frac{dk_z}{2\pi} f^{\rm eq}(\epsilon)\left[\psi_{n,k_z}^{\pm}(r)\right]^{\dag} \hat{\mathbf{j}} \psi_{n,k_z}^{\pm}(r). \end{eqnarray} Since the energy spectrum is symmetric with respect to the replacement $k_z\to-k_z$, the longitudinal component of the electrical current density $j_z(r)$ vanishes after integrating over momentum. The only nontrivial component of the electric current density is the azimuthal one, i.e., $j_{\varphi}(r)$. Its dependence on $r$ for the upper block (i.e., for a $\mathcal{T}$ symmetry broken Weyl semimetal) and $R=10\,v/(\gamma m)$ is shown in Fig.~\ref{fig:2x2-j-phi-integrated-R=10}. As one can see from the left panel, the main contribution to $j_{\varphi}(r)$ comes from the Fermi arc states (red solid line). The bulk states also contribute when $\mu$ is sufficiently large. The corresponding contribution oscillates inside the wire and is smaller than that of the Fermi arcs. The total current obtained after the summation over $|n|\leq9$ is shown in the right panel of Fig.~\ref{fig:2x2-j-phi-integrated-R=10}. As one can see, the surface contribution dominates even at sufficiently high electric chemical potential $\mu=0.6\,\gamma m$. As we mentioned above, $j_{\varphi}(r)$ for the lower block in Hamiltonian (\ref{model-H-Dirac}) has the opposite sign compared to the azimuthal component of the electric current for the upper block. Therefore, as expected from the symmetry arguments, there is no magnetization current in Dirac semimetal nanowires. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.45\textwidth]{Fig4a.eps}\hfill \includegraphics[width=0.45\textwidth]{Fig4b.eps} \end{center} \caption{ The azimuthal component of the electric current density given in Eq.~(\ref{Distribution-current-j-def}) inside the wire as a function of $r$ for $n=0$ and $\mu=0.6\,\gamma m$ (left panel) and summed over $|n|\leq9$ at a few values of $\mu$ (right panel). Only the upper block in Hamiltonian (\ref{model-H-Dirac}) is considered. The color code of the lines in the left panel is the same as in the left panel of Fig.~\ref{fig:spectrum-2x2-large-R}. In both panels, we set $R=10\,v/(\gamma m)$ and used $j_0 = -e\gamma^2 m^{3/2}/v$.} \label{fig:2x2-j-phi-integrated-R=10} \end{figure*} \section{DC conductivity} \label{sec:Kubo} In this section the DC conductivity in nanowires of Dirac and Weyl semimetals is investigated in the Kubo linear response approach. While the DC response in nanowires was already investigated in Ref.~\cite{Baireuther-Beenakker:2016,Igarashi:2017,Kaladzhyan-Bardarson:2019}, the spatial profiles of the conductivity were not rigorously analyzed to the best of our knowledge. \subsection{Kubo linear response approach} \label{sec:Kubo-general} The Kubo linear response theory is a standard method to determine the transport properties of various materials (see, e.g., Ref.~\cite{Bruus:2004-book,Mahan:book-2013}). In this approach, the DC conductivity tensor is defined through the imaginary part of the retarded current-current correlation function in the limit $\Omega \to 0$ (recall that the imaginary part of the conductivity is zero at $\Omega\to0$) \begin{equation} \sigma_{ij}(r, \varphi) = \lim_{\Omega \to 0} \frac{\mbox{Im}\, \Pi_{ij}(\Omega+i0, q_z=0; r, \varphi)}{\Omega}. \label{Kubo-sigma} \end{equation} The paramagnetic part of $\Pi_{ij}$ is given by \begin{equation} \Pi_{ij}(\Omega, q_z; r, \varphi) = T \sum_{p=-\infty}^{\infty} \int \frac{dk_z}{2\pi} \int_0^{2\pi} d\varphi^{\prime} \int_0^{R} r^{\prime}dr^{\prime} \mbox{tr} \left[ \hat{j}_{i} G(i\omega_{p}, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) \hat{j}_{j} G(i\omega_{p}-\Omega, k_z-q_z; r^{\prime}, r, \varphi^{\prime}, \varphi)\right], \label{Kubo-Pi-ij-def} \end{equation} where $\omega_{p} =(2p+1)\pi T$ is the fermionic Matsubara frequency, $p$ is an integer, and the components of the current operator are defined in Eqs.~(\ref{Distribution-current-j-r-def}), (\ref{Distribution-current-j-phi-def}), and (\ref{Distribution-current-j-z-def}). Note that the diamagnetic part of the retarded current-current correlation function, which originates from the quadratic dispersion along the $z$ axis, is irrelevant for the DC conductivity because it contributes to the imaginary part of $\sigma_{ij}$. The retarded Green's function in the mixed coordinate-momentum representation is defined as \begin{eqnarray} \label{Kubo-G-def} G(\omega, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) = i \sum_{n=-\infty}^{\infty} \sum_{l} \frac{\psi_{n,l}(r, \varphi) \psi_{n,l}^{\dag}(r^{\prime}, \varphi^{\prime}) }{\omega +\mu -\epsilon_{n,l}+i0}, \end{eqnarray} where $n$ runs over all orbital angular momenta, $l$ denotes energy branches, and, for simplicity, we do not show the explicit dependence of $\epsilon_{n,l}$ on $k_z$, i.e., $\epsilon_{n,l}\equiv \epsilon_{n,l}(k_z)$. The explicit form of the retarded Green's function for the upper block and $s_{\epsilon}>0$ reads as \begin{eqnarray} \label{Kubo-G-exp} G(\omega, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) = i \sum_{n=-\infty}^{\infty} \sum_{l} \frac{|A_{+}(\tilde{\epsilon}_{n,l})|^2}{\omega +\mu -\epsilon_{n,l}+i0}\, \hat{M}. \end{eqnarray} Here \begin{eqnarray} \label{Kubo-A-matrix} \hat{M} = \left( \begin{array}{cc} J_n\left(\frac{r}{r_0}\right) J_n\left(\frac{r^{\prime}}{r_0}\right) e^{in(\varphi-\varphi^{\prime})} & i J_n\left(\frac{r}{r_0}\right) J_{n-1}\left(\frac{r^{\prime}}{r_0}\right) F\left(\tilde{\epsilon}_{n,l}\right) e^{in(\varphi-\varphi^{\prime}) +i\varphi^{\prime}} \\ -i J_{n-1}\left(\frac{r}{r_0}\right) J_{n}\left(\frac{r^{\prime}}{r_0}\right) F\left(\tilde{\epsilon}_{n,l}\right) e^{-in(\varphi-\varphi^{\prime}) -i\varphi} & J_{n-1}\left(\frac{r}{r_0}\right) J_{n-1}\left(\frac{r^{\prime}}{r_0}\right) \left|F\left(\tilde{\epsilon}_{n,l}\right)\right|^2 e^{-i(n-1)(\varphi-\varphi^{\prime})} \\ \end{array} \right). \end{eqnarray} Furthermore, $F\left(\tilde{\epsilon}_{n,l}\right)$ and $|A_{+}|^2$ are given in Eqs.~(\ref{model-cylinder-F-def}) and (\ref{model-cylinder-A-plus}), respectively. For $s_{\epsilon}<0$, one needs to replace the Bessel function $J_n(x)$ with the modified Bessel function $I_n(x)$ and $|A_{+}|^2\to |A_{-}|^2$ in Eq.~(\ref{Kubo-G-exp}). Defining the spectral function $A(\omega, k_z, r, r^{\prime}, \varphi, \varphi^{\prime})$ as \begin{eqnarray} \label{Kubo-A-def} A(\omega, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) = \frac{1}{2\pi} \left[ G_{\mu=0}(\omega+i 0, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) -G_{\mu=0}(\omega-i 0, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) \right], \end{eqnarray} one can re-express Green's function in the following equivalent form: \begin{equation} \label{Kubo-A-G} G(\Omega, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) = i\int_{-\infty}^{\infty} d\omega \frac{A (\omega, k_z; r, r^{\prime}, \varphi, \varphi^{\prime})}{\Omega+\mu-\omega}. \end{equation} The explicit expression of the spectral function for the upper block and $s_{\epsilon}>0$ is readily obtained from Eq.~(\ref{Kubo-G-exp}) by replacing $i/\left[\omega +\mu -\epsilon_{n,l}+i0\right]$ with $\delta\left(\omega -\epsilon_{n,l}\right)$. By using the spectral function representation (\ref{Kubo-A-def}), it is straightforward to obtain \begin{eqnarray} \label{Kubo-Pi-ij} \Pi_{ij}(\Omega, q_z; r, r^{\prime}, \varphi, \varphi^{\prime}) &=& - \int\int d\omega d \omega^{\prime} \frac{f^{\rm eq}(\omega)-f^{\rm eq}(\omega^{\prime})}{\omega -\omega^{\prime}-\Omega-i0} \nonumber\\ &\times&\int \frac{dk_z}{2\pi} \int_0^{2\pi} d\varphi^{\prime} \int_0^{R} r^{\prime}dr^{\prime} \mbox{tr} \left[ \hat{j}_{i} A(\omega, k_z; r, r^{\prime}, \varphi, \varphi^{\prime}) \hat{j}_{j} A(\omega^{\prime}, k_z-q_z; r^{\prime}, r, \varphi^{\prime}, \varphi)\right]. \end{eqnarray} The calculation of the longitudinal conductivity is rather simple because the trace in Eq.~(\ref{Kubo-Pi-ij}) is real. Then, by using the identity \begin{equation} \frac{1}{\omega -\omega^\prime-\Omega \mp i 0} = \mbox{p.v.}\frac{1}{\omega -\omega^\prime-\Omega} \pm i \pi \delta\left(\omega -\omega^\prime-\Omega\right), \label{Kubo-P-value} \end{equation} where p.v. stands for the principal value, as well as Eqs.~(\ref{Kubo-sigma}) and (\ref{Kubo-Pi-ij}), we straightforwardly derive the following longitudinal DC conductivity \begin{eqnarray} \label{Kubo-sigma-zz-DC} \sigma_{zz}(r, \varphi) &=& \int d\omega \frac{4\pi e^2}{4T\cosh^2{\left(\frac{\omega-\mu}{2T}\right)}} \int \frac{dk_z}{2\pi} \int_0^{2\pi} d\varphi^{\prime} \int_0^{R} r^{\prime}dr^{\prime} \sum_{n} \sum_{l,l^{\prime}} k_z^2 \left|A_{s_{\epsilon}}(\tilde{\epsilon}_{n,l})\right|^2 \left|A_{s_{\epsilon^{\prime}}}(\tilde{\epsilon}_{n,l^{\prime}})\right|^2 \delta_{\Gamma}\left(\omega - \epsilon_{n,l}\right) \nonumber\\ &\times& \delta_{\Gamma}\left(\omega- \epsilon_{n,l^{\prime}}\right) \left\{M_{11}M_{11}^{\prime} \left(\gamma+C_1\right)^2 +M_{22}M_{22}^{\prime}\left(\gamma-C_1\right)^2 +\left(C_1^2-\gamma^2\right) \left[M_{12}M_{21}^{\prime} +M_{21}M_{12}^{\prime}\right] \right\} \nonumber\\ &\stackrel{T\to0}{=}& 4\pi e^2 \int \frac{dk_z}{2\pi} \int_0^{2\pi} d\varphi^{\prime} \int_0^{R} r^{\prime}dr^{\prime} \sum_{n} \sum_{l,l^{\prime}} k_z^2 \left|A_{s_{\epsilon}}(\tilde{\epsilon}_{n,l})\right|^2 \left|A_{s_{\epsilon^{\prime}}}(\tilde{\epsilon}_{n,l^{\prime}})\right|^2 \delta_{\Gamma}\left(\mu - \epsilon_{n,l}\right) \delta_{\Gamma}\left(\mu- \epsilon_{n,l^{\prime}}\right) \nonumber\\ &\times& \left\{M_{11}M_{11}^{\prime} \left(\gamma+C_1\right)^2 +M_{22}M_{22}^{\prime}\left(\gamma-C_1\right)^2 +\left(C_1^2-\gamma^2\right) \left[M_{12}M_{21}^{\prime} +M_{21}M_{12}^{\prime}\right] \right\}, \end{eqnarray} where we expanded to linear order in $\Omega$ and took the limit $\Omega\to0$. Here $M_{ij}$ denotes the $ij$ component of the spectral function matrix given in Eq.~(\ref{Kubo-A-matrix}) for the upper block and $s_{\epsilon}>0$. In the case of $M_{ij}^{\prime}$, one should replace $r_0\to r_0^{\prime}$ and $l\to l^{\prime}$, as well as $r\leftrightarrow r^{\prime}$ and $\varphi\leftrightarrow \varphi^{\prime}$. For the lower block, the spectral function matrix is $\hat{M}^*$. It is important to include the effects of disorder in the study of the real part of the longitudinal conductivity. This can be done phenomenologically through the replacement \begin{equation} \label{Kubo-delta-Gamma} \delta\left(\mu - \epsilon_{n,l}\right) \to \delta_{\Gamma}\left(\mu - \epsilon_{n,l}\right) = \frac{1}{\pi}\frac{\Gamma(\mu,k_z)}{\left(\mu - \epsilon_{n,l}\right)^2+\left[\Gamma(\mu,k_z)\right]^2}. \end{equation} In view of the Fermi arc dissipation due to transitions from the surface into the bulk~\cite{Gorbar-Sukhachov:2016}, we introduced a quasiparticle width for the surface states in addition to the bulk ones. The quasiparticle width of the Fermi arc states increases as the electric chemical potential and frequency grow because the phase space for the surface-bulk transitions rises as the area of the Fermi surface increases. By following Ref.~\cite{Gorbar-Sukhachov:2016}, we assume that $\Gamma(\mu,k_z)\approx\Gamma(\mu)=\Gamma_0 |\mu|/(\gamma m)$, where $\Gamma_0$ is a numerical constant. Furthermore, even without transitions to the bulk states (which is the case for small $\mu$ and $R$), the dissipative nature of the Fermi arcs can be explained by the fact that the finite size effects allow for a small but finite dispersion of their energy levels. This also signifies that the conventional point of view stating that the Fermi arcs are 1D nondissipative states should be considered carefully in real finite-size materials. The integral over the azimuthal angle $\varphi^{\prime}$ can be straightforwardly performed. In particular, it is easy to show that the terms $\propto M_{12}M_{21}^{\prime}$ and $\propto M_{21}M_{12}^{\prime}$, i.e., the third term in the curly brackets in Eq.~(\ref{Kubo-sigma-zz-DC}), vanish after the integration over $\varphi^{\prime}$. As expected, the resulting longitudinal conductivity becomes independent of $\varphi$. The integral over $r^{\prime}$ can be performed by using the corresponding formulas in Appendix~\ref{sec:app-Kubo-formulas}. Since the resulting expressions are cumbersome, we do not present them here. Finally, let us briefly discuss the conductivity in Dirac semimetal nanowires. In such a case one should necessarily take into account the contribution from the lower block. Since the wave functions for the lower block are complex conjugated wave functions of the upper block, the corresponding contribution to the DC conductivity is the same as for the upper block. Therefore, the DC conductivity for Dirac semimetal nanowires is given by expression (\ref{Kubo-sigma-zz-DC}) with the additional factor $2$. It is worth noting that if there are terms that break the $\mathcal{P}$ and $\mathcal{T}$ symmetries, e.g., $\tilde{\mu}\sigma_z\otimes\mathds{1}_2$ and $\gamma m_1 \sigma_z\otimes\sigma_z$, then the effective electric chemical potentials and Weyl node separations in the upper and lower blocks become different. This will result in a nonvanishing magnetization current density $j_{\varphi}$ as well as nonequal contributions to the conductivity of the upper and lower blocks. \subsection{Results} \label{sec:Kubo-results} In this subsection, we discuss the results for the DC conductivity. We concentrate primarily on the contribution from the upper block, which describes a $\mathcal{T}$ symmetry broken Weyl semimetal with two Weyl nodes. The conductivity of a Dirac semimetal nanowire in the model at hand will be simply doubled (see the corresponding discussion at the end of the previous subsection). To start with, let us consider the separate contributions from the surface and bulk states to the DC conductivity. The corresponding spatial profiles are shown in Figs.~\ref{fig:Kubo-sigma-2x2-up-DC-separate}(a) and \ref{fig:Kubo-sigma-2x2-up-DC-separate}(b), respectively, for several values of $\mu$. Note that we integrated over $\varphi$ in both panels that gives the additional factor $2\pi$. As expected, the contribution to the electric conductivity from the Fermi arcs significantly rises at the surface and has a nonmonotonic dependence on the electric chemical potential $\mu$. On the other hand, the bulk states allow for the electric conductivity that is large near the center of the wire with a sharp decrease at the surface. The corresponding contribution to $\sigma$ always rises with $\mu$. At small $\mu$, i.e., $\mu=0.1\,\gamma m$ and $\mu=0.3\,\gamma m$, only the Fermi arcs are filled among the states with positive energy. Therefore, the rise of the total conductivity presented in Fig.~\ref{fig:Kubo-sigma-2x2-up-DC-separate}(c) near the surface is very pronounced. For larger $\mu$, i.e., $\mu=0.4\,\gamma m$ and $\mu=0.5\,\gamma m$, the bulk states also provide noticeable contribution to the transport. Moreover, since the phase space for the electron scattering increases with $\mu$, the relative contribution of the surface conductivity determined mainly by the Fermi arcs becomes suppressed compared to the contribution due to the bulk states. It is worth noting, however, that the quantitative analysis of the relative contributions from the surface and bulk localized states requires a more precise treatment of disorder. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.32\textwidth]{Fig5a.eps}\hfill \includegraphics[width=0.32\textwidth]{Fig5b.eps}\hfill \includegraphics[width=0.32\textwidth]{Fig5c.eps} \end{center} \caption{ The longitudinal DC conductivity $\sigma$ integrated over the azimuthal angle $\varphi$ as a function of $r$ for several values of the electric chemical potential $\mu$. Panels (a) and (b) describe the contributions of the Fermi arc and bulk states, respectively. The total conductivity is presented in panel (c). The conductivity is normalized on $\sigma_0=e^2\gamma^2m^{3/2}/v^2$ in all panels. Only the upper block (\ref{model-H-Dirac-up}) of the $4\times4$ Dirac Hamiltonian is considered, therefore, the results are valid for a $\mathcal{T}$ symmetry broken Weyl semimetal. In addition, we set $R=10\,v/(\gamma m)$, $\Gamma_0=0.2$, $T\to0$, and $C_0=C_1=0$. } \label{fig:Kubo-sigma-2x2-up-DC-separate} \end{figure*} In order to understand better a nontrivial interplay of the surface and bulk states in the transport properties of the Dirac and Weyl semimetals nanowires, we compare the corresponding contributions for $\mu=0.5\,\gamma m$ in the left panel of Fig.~\ref{fig:Kubo-sigma-2x2-up-DC}. It is noticeable that the qualitatively different profiles of the surface and bulk conductivity contributions lead to the nonmonotonic dependence of $\sigma$ on $r$ when the electric chemical potential is sufficiently high and both surface and bulk states are populated. Indeed, the sharp increase of the total conductivity at the surface is followed by a well-pronounced minimum. Deeper in the bulk, the conductivity rises again. If observed, such a nontrivial profile might be a definite transport signature of the Fermi arcs surface states in nanowires of Weyl and certain Dirac semimetals. The dependence of the DC conductivity on the electric chemical potential $\mu$ at a few values of the radial coordinate $r$ is shown in the right panel of Fig.~\ref{fig:Kubo-sigma-2x2-up-DC}. One can clearly see that the longitudinal conductivity has a few peaks as a function of $\mu$. We traced back the origin of these peaks to the Fermi arcs. Indeed, as follows from the right panel of Fig.~\ref{fig:spectrum-2x2-large-R}, the position of the peaks coincide with the energy of the Fermi arc states. Furthermore, the height of the peaks significantly increases at the surface, which also supports their relation to the Fermi arcs. In addition, it is noticeable that the surface conductivity generically tends to decrease with the electric chemical potential. This is related to the fact that the surface-bulk transition rate grows with $\mu$ leading to higher Fermi arc dissipation. On the other hand, the bulk conductivity rises with the Fermi level despite the increase of the quasiparticle width. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.45\textwidth]{Fig6a.eps}\hfill \includegraphics[width=0.45\textwidth]{Fig6b.eps} \end{center} \caption{ Left panel: The contributions to the longitudinal DC conductivity integrated over the azimuthal angle $\varphi$ from the surface (red dashed line) and bulk (blue dotted line) states as a function of $r$ for $\mu=0.5\,\gamma m$. Black solid line corresponds to the total conductivity. Right panel: The total longitudinal DC conductivity $\sigma$ integrated over the azimuthal angle $\varphi$ aa a function of $\mu$ for several values of the coordinate $r$. The conductivity is normalized on $\sigma_0=e^2\gamma^2m^{3/2}/v^2$ in both panels. Only the upper block (\ref{model-H-Dirac-up}) of the $4\times4$ Dirac Hamiltonian is considered, therefore, the results are valid for a $\mathcal{T}$ symmetry broken Weyl semimetal. In both panels, we set $R=10\,v/(\gamma m)$, $\Gamma_0=0.2$, $T\to0$, and $C_0=C_1=0$. } \label{fig:Kubo-sigma-2x2-up-DC} \end{figure*} Finally, we suggest a few ways to experimentally verify the proposed effects. Clearly, the most direct means to investigate the nontrivial spatial profile of the conductivity is to measure the current density distribution at the ends of the wire. In theory, this can be performed by attaching several small contacts and measuring the corresponding currents. Such an approach, however, might be difficult to realize in practice for thin wires. Further, the nontrivial contribution of the Fermi arcs in nanowires can be probed via the dependence on the electric chemical potential (see the right panel in Fig.~\ref{fig:Kubo-sigma-2x2-up-DC}). Unlike the bulk-dominated regime, where the conductivity gradually increases with $\mu$, the Fermi arc contributions allow for peaks in the conductivity. The corresponding dependence could be in principle studied by doping the wire and/or investigating different samples with the same radius. Another way to probe the interplay of the surface and bulk states in the DC transport is to investigate the scaling of the conductance $G$ in nanowires with their radius. The conductance is defined as \begin{eqnarray} \label{Kubo-results-Conductance} G = \int_0^{2\pi}d\varphi \int_0^{R}r\,dr\, \sigma(r, \varphi) = 2\pi \int_0^{R}r\,dr\, \sigma(r). \end{eqnarray} The contribution to the DC conductance from the surface and bulks states as well as the total conductance are shown in Fig.~\ref{fig:Kubo-Conductance-2x2-up-DC-all}. As one can see, the Fermi arc contribution (red dashed line) to the conductance scales approximately as a perimeter of the wire, i.e., linearly with radius $G\sim R$. Such a behavior is indeed expected for the surface-localized contribution where $G\sim R \sigma(R)$. On the other hand, the bulk contribution shown by the blue dotted line demonstrates a quadratic dependence on the radius $R$. This is indeed expected for bulk conductors with almost unform conductivity where conductance is determined by the cross-section $G\sim R^2 \sigma(0)$. Therefore, we suggest to use a relatively thick wire of Weyl or Dirac semimetal with $R\sim100~\mbox{nm}$ and change its radius via, e.g., the focused ion beam method. It should be possible, also, to use natural crystals of different radius. For example, the Dirac semimetal Cd$_3$As$_2$ could be routinely crystalized in a wire-like form~\cite{Li-Yu-Cd3As2:2015,Wang-Liao:2016,Bayogan-Jung:2019}. In this case, however, one should be careful because the position of the Fermi level might depend on the sample too. Either way, similarly to the experimental studies performed in Ref.~\cite{Gooth-Gotsmann:2018}, it should be possible to investigate the scaling of the conductance with the radius $R$. \begin{figure*}[!ht] \begin{center} \includegraphics[width=0.45\textwidth]{Fig7.eps} \end{center} \caption{ The contributions to the longitudinal DC conductance $G$ defined in Eq.~(\ref{Kubo-results-Conductance}) as functions of the wire radius $R$ for $\mu=0.5\,\gamma m$. Red dashed and blue dotted lines correspond to the Fermi arc and bulk contributions, respectively. The total conductance is denoted by a solid black line. Only the upper block (\ref{model-H-Dirac-up}) of the $4\times4$ Dirac Hamiltonian is considered, therefore, the results are valid for a $\mathcal{T}$ symmetry broken Weyl semimetal. In addition, we set $G_0=\pi e^2/\sqrt{m}$, $\Gamma_0=0.2$, $T\to0$, and $C_0=C_1=0$. } \label{fig:Kubo-Conductance-2x2-up-DC-all} \end{figure*} \section{Summary} \label{sec:Summary} In this study, we investigated the DC transport properties of nanowires of Dirac and Weyl semimetals paying special attention to the interplay of the surface and bulk modes. In order to distinguish the corresponding contributions, we determined the wave functions and calculated the profiles of the charge and current densities. In addition, by using the Kubo linear response theory, the local DC conductivity was analyzed. For cylindrical nanowires where the vector $\mathbf{b}$, which defines the Weyl nodes separation direction, is parallel to the axis of the wire, the wave functions and the characteristic equation for the energy spectrum were found analytically and agree with those in the literature. As expected, the energy spectrum of the Fermi arc states becomes discrete due to the effects of spatial confinement. In contrast to a semi-infinite slab with flat Fermi arc bands, the energy levels obtain a weak quadratic dispersion with respect to the momentum along the cylinder axis. This dispersion becomes particularly noticeable near the bulk nodes. Therefore, strictly speaking, the Fermi arcs become dissipative in real finite-size materials even if the electron scattering to the bulk is ignored. We found that the electric charge distribution in nanowires is nonuniform. Due to the Fermi arc states, a significant amount of charge is located at the surface. The contribution of the bulk states increases with the growth of the electric chemical potential and becomes dominant for a sufficiently large value of the latter. As to the magnetization current in Weyl semimetal nanowires, we found that it does not vanish in an equilibrium state when the external fields are absent. Only the azimuthal component of this current is nontrivial, however. Like the electric charge density, the magnetization current is primarily connected with the surface states and monotonically decreases into the bulk. On the other hand, the bulk contribution oscillates and diminishes away from the center of nanowires. The direction of the azimuthal component of the magnetization current is determined by the chiral shift. Indeed, we checked explicitly that this current runs in the opposite directions for the two copies of Weyl semimetal that constitute the Dirac semimetal at hand. Therefore, since the time-reversal symmetry is preserved in Dirac semimetals, the total magnetization current vanishes. By using the Kubo linear response theory, we calculated the longitudinal conductivity for the DC response. The DC conductivity $\sigma$ has a nontrivial profile, which strongly depends on the electric chemical potential. By explicitly separating the surface and bulk contributions, we showed that if the Fermi level intersects only energies of the surface states, then the conductivity is high at the surface and monotonously diminishes in the bulk. The contribution of the bulk states grows with the Fermi energy producing a noticeable increase of the conductivity inside nanowires and decreasing the relative surface contribution. In part, this is related to the increase of the surface-bulk scattering. For sufficiently large electric chemical potential, the spatial profile of $\sigma$ is nonmonotonic where a sharp rise of the conductivity at the surface is followed by a local minimum. Due to the contribution of the bulk states, the conductivity rises again deep in the bulk. We found also that the surface conductivity shows well-pronounced peaks when the electric chemical potential intersects the Fermi arc energy levels. The surface origin of these peaks also follows from the fact that their amplitude significantly grows from the center of nanowires to their surface. If experimentally probed, the nontrivial distribution of the electric conductivity will be a definite signature of the interplay of the surface and the bulk states in Weyl and Dirac semimetals nanowires. In addition, the bulk- and surface-dominated regimes could be distinguished via the conductance measurements. In the former case, the conductance scales as the square of the wire radius $R$. However, it changes to the linear dependence when the Fermi arcs dominates the transport. Finally, let us discuss the key limitations of this study. We treated disorder phenomenologically by introducing a finite quasiparticle width for both surface and bulk states. The rigorous investigation of the disorder scattering in nanowires is a very interesting problem that deserves an in-depth investigation, which is, however, beyond the scope of this study. In general, the irregularities of the wire shape, which are present in real samples, should be also taken into account. We believe, however, that they will not change the main qualitative conclusions of this study. In addition, we leave the investigation of the effects of various $\mathcal{T}$ and $\mathcal{P}$ symmetry breaking terms on the nanowire transport for future research. \begin{acknowledgments} We are grateful to I.~A.~Shovkovy, J.~H.~Bardarson, and V.~Kaladzhyan for useful discussions. P.O.S. was supported by the VILLUM FONDEN via the Centre of Excellence for Dirac Materials (Grant No.~11744), the European Research Council under the European Unions Seventh Framework Program Synergy HERO, and the Knut and Alice Wallenberg Foundation KAW 2018.0104. M.V.R. acknowledges funding by the Deutsche Forschungsgemeinschaft (DFG) under Germany's Excellence Strategy - EXC-2123/1. The work of E.V.G. was supported partially by the Ukrainian State Foundation for Fundamental Research. \end{acknowledgments}
\section{} \subsection{} \subsubsection{} \section{Introduction} Hydrocephalus is a rather broad term, which describes a range of pathologies characterized by an excessive buildup of the cerebrospinal fluid (CSF) in the CSF circulatory pathway of the brain \cite{rekate2008definition}. The clinical picture is determined by the type and stage of hydrocephalus. The specific signs, such as an increased head circumference, the fontanelle bulging, the dilated skull veins and the developmental delay, as compared to their contemporaries, are typical for the infants and are most often associated with a congenital hydrocephalus. In the children aged 2 and over, the teenager and adult patients, the clinical signs are variable and non-specific. Normal pressure hydrocephalus diagnosed in the elderly patients (aged over 65) presents in a classic triad of symptoms described by S. Hakim and R. D. Adams in 1965, which include gait disturbance, urinary incontinence and cognitive impairment \cite{adams1965symptomatic}. The above listed circumstances preclude making the diagnosis of hydrocephalus based on the clinical picture only. The aggregated data on the occurrence of hydrocephalus syndrome are available from the single cohort studies. Shyamal C. Bir et al. indicate that the incidence of hydrocephalus in adults is as low as 17 case per 100,000 per year, which is significantly lower, than that in children (82 cases in 100,000 newborns) \cite{bir2016epidemiology}. The infant hydrocephalus is one of the most common pathologies in the pediatric neurosurgery with its incidence varying from 68 cases per 100,000 newborns in the North America up to 145 and 316 cases per 100,000 newborns in the countries of Africa and Latin America, respectively \cite{dewan2018global}. Usually, the epidemiological data on the individual nosological forms are available in the literature. Thus, the normal pressure hydrocephalus (NPH) occurs in 10-22 cases out of 100,000 subjects aged over 50 \cite{martin2015epidemiology,klassen2011normal}. According to the data from different authors, NPH is observed in 6-10\% of patients with dementia. The secondary hydrocephalus, which in up to 62\% of cases accompanies different brain neoplasms, may be due to a direct block of CSF flow (obstructive), as well as due to the CSF overproduction in response to the change of its chemical content, which occurs alongside with tumor progression. In posterior cranial fossa tumors of children, its occurrence ranges from 70\% to 90\% \cite{lam2015management,dorner2007posterior,prasad2017clinicopathological}. In adult vestibular schwannomas, the occurrence of secondary hydrocephalus varies between 3,7\% and 42\% \cite{prabhuraj2017hydrocephalus}. In adult brainstem gliomas, the headache most often resulting from hydrocephalus, is the most frequent early symptom \cite{hu2016brainstem}. Therefore, the hydrocephalus can be either an independent disease, which is sometimes difficult to diagnose, or a concomitant symptom of a number of pathologies, therefore representing and urgent issue in the present-day clinical practice. Even in case of ”evident” symptoms, the diagnosis of hydrocephalus is made by MRI and CT neuroimaging approaches. With the use of those methods, it is possible to discriminate between the internal, external and mixed forms of hydrocephalus. The information about the range of diagnostic criteria used to identify hydrocephalus using the MRI images has been published. The identification and analysis of those criteria require a considerable time and effort of qualified specialists in diagnostic imaging. Performing screening tomography studies will enable one to spot out the cases of deviations in the parameters of brain ventricular system, which, in turn, will offer an opportunity to suspect and diagnose the hydrocephalus at early stages and with minor clinical symptoms. Innovative technological approaches able to differentiate normal structure from the pathologies will be required in order to perform such studies, while also reducing the efforts of the overworked radiology specialists. Machine learning is currently actively used in the different practical fields and the areas of science. Machine learning is defined as a set of methods able to automatically detect the useful data patterns and to use the discovered patterns subsequently to make predictions for the new data sets or to take the decisions under uncertainty \cite{murphy2012machine}. Since, a considerable progress in computer vision has been achieved in 2012 due to deep learning (an area of machine learning), the deep neural networks and, particularly, the convolutional neural networks has become the main toll for the solving image detection, segmentation and classification problems \cite{krizhevsky2012imagenet}. Deep neural networks are especially useful for the analysis of extremely large data sets and, in most cases, neural networks quality improved with increased size of the data. The applicability of these methods to the medical diagnostic procedures are currently under active investigation. The recently published research papers on the application of deep learning to different imaging diagnostic problems demonstrate promising results in detection, segmentation and classification tasks \cite{rakhlin2019breast,shvets2018angiodysplasia,rakhlin2018deep,cicero2017training,cheng2016computer}. Despite the demonstrated perfect results, the machine learning methods have particular limitations. A significant impediment to an active spread of this technology in medical diagnostics is its dependence from the availability of large sets of high-quality prepared data, as well as the complexity of deep neural network interpretation. However, the problem of small data sets may be partially solved by the use of transfer learning technique \cite{yosinski2014transferable}. The concept behind it is involves an initial learning of a convolutional neural network using a large data set, which is not associated with the specific task (for example, a set of several millions of regular ImageNet photos can be used for such learning) \cite{russakovsky2015imagenet}. Further, this network is fine tuned to a specific problem, such as the tumor classification on medical images. The aim of this study was to evaluate deep learning applicability to the diagnostics of hydrocephalus with the use of MRI images. Employing the transfer learning technique, we demonstrate promising results in training of deep neural nets with small data sets. \section{Materials and methods} Here, we describe the most important steps of the performed research, namely: \begin{itemize} \item Problem statement in terms of machine learning; \item Methods of data collection, annotation, preprocessing and separation; \item Specific features of model training and the characteristics of software and hardware used. \end{itemize} \subsection{Problem statement.} Making the diagnosis of hydrocephalus using MRI images represents a problem of binary classification. In this particular case, we split the MRI scans into two groups, the first one contains the images possessing the typical signs of hydrocephalus (classified as the pathology), while the second group represents the images without such specific signs (and classified as the normal structure). In the solution of such problems by machine learning, the supervised machine learning approaches are used most frequently. Such methods involve the available annotation, which presents the information about the class to which a particular image belongs. The classifier training involves multiple passes of the training dataset through the machine learning algorithm, following which the model quality is tested on a set-aside dataset. In an ideal case, this process should yield a model capable of generalization, i.e., the one able to correctly classify the images, which has not been used in training. In our study, we are, thus, solving the problem of binary classification of the MRI images using the supervised machine learning method. \subsection{Data collection, annotation and preprocessing.} Data were collected retrospectively in a single medical center by the specialist in diagnostic imaging with a special training in MRI diagnostics and a 5-year work experience. As much as 200 DICOM series of MRI brain images were selected. MRI scanning was performed with Toshiba instrument (1.5 Tesla), the series selected for the analysis were represented by T2-weighed images. Further, the axial sections at the levels of lateral and the third ventricles were extracted from the stacks by a specialist, converted to JPEG format and used for further experiments. The images were split into two groups: the normal group containing 100 image series of intact structures and the pathology (hydrocephalus) group holding 100 image series of the pathologic structures. Since, from the clinical point of view, an internal hydrocephalus represents a more significant condition, as it poses a potential risk to the patient’s life, the images classified as the pathologies had all satisfied the MRI criteria for the internal hydrocephalus. The inclusion MRI criteria were as follows: ventriculomegaly (Evans index $>$ 0.3), enlargement of the third ventricle ($>$ 6 mm) and lateral ventricles ($>$ 18mm). Of note, the MRI images of children patients or those with a concomitant brain pathology were excluded. Epidemiological characteristics of two cohorts were as follows: the normal group included 79 females and 21males, mean age - 33.8+-, while the pathology group included 64 females and 36 males, mean age 66.3+-. All MRI imaging procedures have been performed over the period from November, 2016 to December, 2018. Importantly, the image selection for the study was a two-staged process. Originally, a group of subjects presenting with signs of hydrocephalus, as concluded by a physician, was formed. Further a specialist in diagnostic imaging investigated each series of that group, and the images selected into “the pathology” group were only those that demonstrated the above MRI criteria for hydrocephalus. By doing so, we achieved a high quality of dataset formation. For the training and evaluation of generalization capability of a model, the sample is traditionally divided into training, validation, and testing sets. Such a division offers an opportunity to train a model using training dataset, control model quality and fine-tune different settings for model improvement using validation dataset, and, finally, assess the model quality at the end of experiments using testing dataset containing only the images, which have never been used for model training or fine-tuning. However, sometimes such division cannot be fulfilled, for instance, due to a small size of training dataset. In such a case, the method of cross-validation is employed \cite{kohavi1995study}. In essence, the method is based on a random split of an entire sample into several groups, upon which training is consistently performed using every group except one, which will serve as a test set group. Then, the training step is repeated with another group set aside and not used for training. One can, thus, obtain a number of predictions equal to the number of groups, while the overall prediction of the model will be calculated as the mean or median of all group predictions. In our study, we used J-K-fold cross-validation \cite{moss2018using}. This method is completely relevant to the above description, however, instead of a single split into K groups, J random iterations of such split is used. Presumably, this approach can improve the stability of prediction of an ensemble of models. We, thus, expect to improve the accuracy, sensitivity, and specificity of the method. Noteworthy, medians and confidence intervals were calculated with the use of bootstrap statistical methods. \subsection{Data preprocessing.} At the final step preceding the model training, a random augmentation of images was performed. For the training set, the following augmentations were applied with a probability p = 0.75: image rotation within 10o angle, random crop combined with zoom (up to 105\%), lightning and contrast change in the range of 10\%. Only central crop was applied to validation and testing sets. The images were adjusted to the same size (256x256 pixels) and normalized to the mean value and the standard deviation of ImageNet dataset. \subsection{Model training.} Considering the successful application of transfer learning methodology to different areas of computer vision, as applied to regular and, sometimes, medical images, we use this methodology in our work. We used the ResNet34 architecture model from the Fastai framework pre-trained models \cite{fastai}. This architecture model proposed by He et al. can be used for learning of the very deep neural networks with less parameters, while avoiding the risk of gradient vanishing. A more detailed technical description of the model can be found in He et al \cite{he2016deep}. The model was initiated according to the standard parameters of Fastai software library, and training was performed for the neural network classifier (“head”) only, while the neural network “backbone” parameters were frozen. In the classifier, the dropout layers with probabilities of 0.5 (for the last layer) and 0.25 (for the previous layers) were used in addition to the fully connected layers. We used the Categorical cross entropy loss function and Adam optimizer with learning rate parameters of 0.001. The model training was performed according to a one cycle policy implemented in the library \cite{smith2018disciplined}. Since we used the cross-validation method in our work, the training process itself is worth noting. j-k cross-validation with j and k parameters of 5 was performed. Thus, the training process had 5 iterations with different random seed and splits into 5 folds each. Insofar as we used the early stopping method and the choice of best model by the minimum value of the validation loss function for the statistics calculations, the use of validation dataset for the quality metrics calculation was not possible for the sake of preventing information leaks from this dataset. In order to solve this problem, the data were split into 3 parts in each section. Training part was used for learning, the validation part was intended for early stopping and the choice of best model by the minimum validation loss value, while testing part was used for the calculation of model quality metrics. Further, the general quality and confidence intervals were calculated from 25 obtained results using bootstrapping method. In addition to model quality, the model interpretability is significant. We, therefore, investigate, which specific part of the image is most important for the model learning. We use the Gradient-weighted Class Activation Mapping (Grad-CAM) method to this end \cite{selvaraju2017grad}. In general, this method uses the activation maps of the last convolution layer to visualize the areas responsible for the decision making about the class prediction and weighs them with the help of the predicted class gradients. The server equipped with Intel Core I7-7740X, 4.30GHz processor, two GeForce GTX 1080 video cards with 8 GB video memory and 32 GB RAM running on Linux (Ubuntu 16.04.5 LTS) operating system. Python 3.7 programming language and Pytorch 1.0 and Fastai v1.0.39 frameworks were used for experiments. \section{Results} The median, 2.5 percentile and 97.5 percentile values of the system’s accuracy, sensitivity and specificity calculated with the use of bootstrapping method were 97.5\% (96.4 - 98.2), 96.3\% (94.8 - 97.7) and 98.1\% (96.2 - 99.1), respectively. Noteworthy, we, practically, were not in search of the best hyperparameters for neural network, but rather used the early stopping method and the choice of best model by the minimum value of the validation loss function, as well as the minimum set of image augmentations used to obtain a more diversified dataset. An important feature is that the model predicts the class probabilities, not the class values (normal or pathological). Keeping in mind that the medical diagnosis making requires better sensitivity in some cases, while better specificity in the others, and considering the probability predictions, one will have an opportunity for a more delicate fine-tuning of the threshold used for class prediction, and, thus, the classifier can be fine-tuned for a specific diagnostic task. Furthermore, we used Grad-CAM method for the model result interpretation in our work. Figure \ref{fig:figure_1} is demonstrating that the most important information used by the model is contained in the images of the brain liquor system. \begin{figure} \centering \includegraphics[width=8.5cm]{figure_1.png} \caption{Deep neural network interpretation with (a) activations maps on the left, and (b) Grad-CAM on the right.} \label{fig:figure_1} \end{figure} \section{Conclusion} In our work, we collected a dataset of brain MRI images of the patients with or without the hydrocephalus. These data were collected and annotated by the medical specialists, which ensures the high annotation quality. Considering the small dataset size, our research was aiming to study the transfer learning capacity to solve the problem of MRI image classification into the normal and pathology groups. In our work, we used the convolution neural network of ResNet34 architecture, which was pre-learned using the ImageNet dataset images. After the fine-tuning of this neural network with the use of brain MRI image dataset, we obtained promising results. The following indicators of the quality of model predictions was achieved, as 97.5\% (96.4 - 98.2) for the accuracy, 96.3\% (94.8 - 97.7) for the sensitivity, and 98.1\% (96.2 - 99.1) for the specificity. In this work, we first demonstrated the capacity of transfer learning method to make a diagnosis of the hydrocephalus syndrome using the brain MRI images. In this case, the high quality of a model is achieved while using a rather limited training dataset. \section{Discussion} Speaking about the technical part of our work, a number of limitations are worth paying attention. First, the small size of the image dataset collected in a single clinic precludes us from confidently extrapolating the achieved results to the overall population. However, the transfer learning technology and the cross-validation method enable us to make some preliminary conclusions. The opinions about the large-scale screening neuroimaging studies of the brain are contradictory. The authors indicate that the economic benefits are doubtful, while the number of incidental findings (IF) of conditions needing medical treatment in the course of such screening brain studies in healthy subjects are rather low \cite{komotar2008brain}. Of note, the amount of such incidental findings has shown an increase over the decade. In their research published in 2007, Meike W. Vernooij et al.reported the frequency of such findings in a cohort of 2000 healthy subjects aged 45,7 to 96,7 to be ~7.2\% \cite{vernooij2007incidental}. In 2017, Anna Brugulat-Serrat et al. reported that such conditions were found in 27\% among 575 healthy volunteers aged 45 to 75 \cite{brugulat2017incidental}. This fact is likely due to the use of MRI scanner with different magnet field strength, 1.5 Tesla in the first research and 3.0 Tesla in the second one. Despite an increased number of incidental findings, the number of subjects, who need treatment, remains rather low (0,1-0,3\%). However, the MRI imaging was performed to the volunteers, who did not report any health complaints, in these studies. We suggest to perform such screening tomography studies in the cohorts of patients with non-specific complaints, which can mask the particular pathologies of the brain involving the development of hydrocephalus. Since such studies produce large massive of data, which require a mandatory interpretation by the experts, these approaches have not become widespread, as yet. The practical introduction of machine learning algorithms capable of recognizing different pathological patterns (and detecting the deviations from the normal structures) with little human assistance. We were focused on the detection of internal hydrocephalus, when using our dataset. As it was mentioned in the introduction, the hydrocephalus is a rather widespread pathology in the neurological and neurosurgical practice, which can be either a separate disease or to be of a secondary origin. In our opinion, the approaches to an early verification of hydrocephalus in the patients with non-specific health complaints are urgent in all age groups. In pediatric practice, this is relevant to the cases of brain tumors, since the latter are typically located along the midline. Also, the plasticity of the brain and its capacity to a long-term compensation are much higher in children, than in adults, which accounts for the delayed clinical symptoms, as compared to the degree of pathological brain changes revealed by neurovisualization methods. In the middle-aged patients, the MRI screening will help reveal different size deviations of ventricular system of both tumor and non-tumor origin. In the elderly population, they will help detecting those subjects, who represent a potential risk group for the development of normotensive hydrocephalus. The method of screening MRI studies supplemented with the machine learning approaches will help reduce the labor burden to the radiologists and increase the availability of MRI diagnostics for brain pathologies. \section{Ethical approval} All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee (approved by research ethic committee of “Ya. L. Tsivian Novosibirsk Research Institute of Traumatology and Orthopaedics” reference number 28/19 dated June 21, 2019) and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards. \addtolength{\textheight}{-4cm} \bibliographystyle{IEEEtran}
\section{Introduction} \label{sec:1} Sprays are complex flows consisting of dispersed particles in underlying gas, for instances, spray in the air, fuel-droplets suspended in the cylinder in the combustion process of engines, pollutants floating in the air or water. The evolution of such particle-fluid system can be described in various ways according to the corresponding physical situation and the modeling assumptions. In this paper, we consider the case where the relaxation through inter-particle collisions and the drag of the surrounding fluid compete, which is described by the BGK model coupled with the inhomogeneous Navier-Stokes equations through drag forces: \begin{gather}\begin{gathered} \label{main} \partial_t f + v \cdot \nabla_x f + \nabla_v \cdot((u-v) f) = \rho_f(\mathcal M(f)-f), \\ \partial_t \rho + \nabla_x \cdot (\rho u) = 0,\\ \partial_t (\rho u) + \nabla_x \cdot (\rho u \otimes u) + \nabla_x p - \mu \Delta_x u = -\int_{\mathbb R^3}(u-v)f \,dv, \\ \nabla_x \cdot u = 0, \end{gathered}\end{gather} subject to initial data: \begin{align}\begin{aligned}\label{ini_main} (f(x,v,0),\rho(x,0), u(x,0)) =:(f_0(x,v),\rho_0(x), u_0(x)), \quad (x,v) \in \mathbb T^3 \times \mathbb R^3. \end{aligned}\end{align} Here, $f = f(x,v,t)$ denotes the number density function of the immersed particles on the phase space of position $x \in \mathbb T^3$ and velocity $v \in \mathbb R^3$ at time $t > 0$ , and $\rho = \rho(x,t)$ and $u = u(x,t)$ are the local density and bulk velocity of the fluid, respectively. For simplicity, we assume that the viscosity coefficient $\mu = 1$ throughout the paper. The local Maxwellian $\mathcal M(f)$ is defined by \[ \mathcal M(f)(x,v,t) = \frac{\rho_f(x,t)}{\sqrt{(2\pi T_f(x,t))^3}} \exp \left(-\frac{|v-U_f(x,t)|^2}{2T_f(x,t)} \right), \] where the macroscopic fields of local particle density $\rho_f$, local particle velocity $U_f$, and local particle temperature $T_f$ are given by \begin{align*} \rho_f(x,t) &:= \int_{\mathbb R^3}f(x,v,t)\,dv,\\ \rho_f(x,t)U_f(x,t) &:= \int_{\mathbb R^3}vf(x,v,t)\,dv, \quad \mbox{and} \\ 3\rho_f(x,t)T_f(x,t) &:= \int_{\mathbb R^3}|v-U_f(x,t)|^2 f(x,v,t)\,dv. \end{align*} An explicit computation gives the following cancellation property: \[ \int_{\mathbb R^3}(\mathcal M(f) - f)\begin{pmatrix} 1\\v\\|v|^2 \end{pmatrix}dv = 0, \] Particle-fluid models have received immense attention recently since the situation of particles drafting in fluid arises very often in nature or engineering, and the coupling of kinetic equations and fluid equations addresses various interesting mathematical problems and modeling issues. We can roughly divide the literature on the mathematical theory of such kinetic-fluid model into two categories according to whether the collisional interactions between the immersed particles are taken into account or not. In the absence of collisional interactions, Vlasov or Vlasov-Fokker-Planck type equations coupled with various fluid equations are investigated. For the existence of the weak solutions of such collisionless particle-fluid models, we refer to \cite{BDGM, CCK, CK, Ha, MV, WY}. Results on the strong solutions can be found in \cite{CDM, CKL}. Particle-kinetic models involving local-alignment phenomena between the immersed particles can be found in \cite{BCHK,BCHK14, CL}. We now turn to literature including particle-particle collisions. In \cite{BDM,YY} the existence of weak solutions for Vlasov-Navier-Stokes equations with a linear particle operator that explains the break-up of droplets is considered. In \cite{M}, Mathiaud obtained the existence of local-in-time classical solution for the Navier-Stokes-Boltzmann equation when the initial data is a small perturbation of a global Maxwellian. In \cite{CY}, the authors obtained the existence of global-in-time existence of weak solutions under the condition of finite mass, energy and entropy. In \cite{Choi16, Choi17}, large-time behavior of solutions and finite-time blow-up phenomena of particle-fluid systems are considered. A brief review on the BGK model is also in order. The BGK models \cite{BGK} have been very popularly employed in physics and engineering as a satisfactory relaxational approximation of the Boltzmann equation which suffers severely from high computational cost. The existence theory for the BGK model is first established by Perthame \cite{Pe} in which the weak solution is obtained under the condition of finite mass momentum and energy. For the initial data with appropriate decay in the velocity space, a unique existence is established in \cite{PP93}. These results are adapted and extended, for example, to $L^p$ problem \cite{ZH}, gases under the influence of external forces or mean-fields \cite{Zhang}, gas mixture problem in which the gas consists of more one type of gas molecules \cite{KP}, ellipsoidally generalized BGK model introduced to better calibrate fluid coefficients \cite{Yun2}, and polyatomic molecules formed by bonds of more than one atom \cite{PY,Yun21}. The existence of classical solution near equilibrium and their asymptotic equilibrization can be found in \cite{Yun1, Yun3}. For the studies on the stationary problems for the BGK model, see \cite{BY,Ukai-BGK}. BGK model is also fruitfully employed in the derivation of various macroscopic or hydrodynamic models \cite{V,DMOS,LT,Mellet,MMM,SR,SR1,SR2}. The literature on the numerical applications of the BGK model are immense, we refer to \cite{CP,DP,FJ,M,PP07,RSY,XH} and references therein for interested readers. To the best knowledge of the authors, the only result on the existence of classical solutions for particle-kinetic models involving collisional interactions between immersed particle is established in \cite{M} (for weak solutions, see \cite{CY}), in which Mathiaud considers a local-in-time existence for a fluid-kinetic model constructed from the coupling of the Navier-Stokes equation with the Boltzmann equation near a global Maxwellian under the assumption that the high order energy functional is sufficiently small. In \cite{M}, however, the exchange between the length of the life span and the size of the initial data does not occur. That is, no matter how small an initial perturbation we take in the energy norm, the life span of the solution cannot be extended over a certain fixed time. In this paper, we show that such restriction can be removed, at least for the case of the BGK type relaxation operator. We also mention that the global-in-time existence of strong solution for the relaxation operator with nontrivial collision frequency remains open even for the non-coupled classical BGK model. To precisely state our main result, we first define the notion of a strong solution. \begin{definition} \label{def} For a given time $T \in (0,\infty)$, we say that $(f,\rho,u)$ is a strong solution to system \eqref{main}-\eqref{ini_main} if it satisfies the system in the sense of distributions with the following regularity: \begin{eqnarray} \label{reg} &&(i)~ f \in \mathcal C([0,T];W_q^{1,\infty}(\mathbb T^3 \times \mathbb R^3)) \mbox{ with }q>5, \cr &&(ii)~ \rho \in \mathcal C([0,T];H^3(\mathbb T^3)), \cr &&(iii)~ u \in \mathcal C([0,T];H^2(\mathbb T^3)) \cap L^2(0,T;H^3(\mathbb T^3)). \end{eqnarray} \end{definition} Our main results read as follows (see Notation below the statement of the theorem for the definitions of function spaces): \begin{theorem} \label{thm_main} Fix $T \in (0,\infty)$. Then, there exists $\varepsilon>0$, which depends only on $T$, such that for any initial data $(f_0,\rho_0,u_0)$ satisfying the following conditions: \begin{eqnarray*} && (i)~\inf_{x \in \mathbb T^3} \rho_0(x) > 0, \quad \rho_0 \in H^3(\mathbb T^3), \cr && (ii)~\sum_{|\nu|\leq 1} ess\sup_{x,v}(1+|v|)^q |\nabla^\nu f_0(x,v)| + \|u_0\|_{H^2(\mathbb T^3)} < \varepsilon, \quad \mbox{and}\cr && (iii)~f_0 > \varepsilon_1(1+|v|)^{-(q+3+a)}, \quad \mbox{for some} \quad\varepsilon_1 >0 \mbox{ and }a>0, \end{eqnarray*} the system \eqref{main}-\eqref{ini_main} admits the unique strong solution $(f, \rho, u)$. \end{theorem} \begin{remark} The initial positivity condition (iii) is necessary to guarantee the positivity of macroscopic field $\rho_{f}$, see Lemma \ref{lem_macro_bdd}. \end{remark} \noindent {\bf Notation.} Throughout the paper, $\nabla^k$ denotes any partial derivative $\partial^\alpha$ with multi-index $\alpha$, $|\alpha|=k$. We often omit $x$-dependence of differential operators for simplicity of notation. We denote by C a generic, not necessarily identical, positive constant. The relation $A \lesssim B$ denotes the inequality $A \leq CB$ for such a generic constant. Below we introduce the norms and function spaces to be used in the paper. \begin{quote} $\bullet$ For functions $f(x, v), g(x)$, $\|f\|_{L^p}$ and $ \|g\|_{L^p}$ denote the usual $L^p(\mathbb T^3 \times \mathbb R^3)$-norm and $L^p(\mathbb T^3)$-norm, respectively.\\ $\bullet$ We use the following weighted norms for $f(x,v)$: \begin{align*} &\|f\|_{q} := \|f\|_{L^\infty_q} := ess\sup_{x,v}(1+|v|)^q f(x,v) ,\quad \|f\|_{W_q^{1,\infty}} := \sum_{|\nu| \leq 1}\| \nabla^\nu f\|_q. \end{align*} $L_q^\infty(\mathbb T^3 \times \mathbb R^3)$ and $ W_q^{1,\infty}(\mathbb T^3 \times \mathbb R^3)$ naturally denote the spaces of functions with finite corresponding norms. \\ $\bullet$ $H^s(\mathbb T^3)$ denotes the $s$-th order $L^2(\mathbb T^3)$ Sobolev space. \end{quote} The rest of the paper is organized as follows. In Section \ref{sec:2}, we introduce several lemmas regarding boundedness properties of the macroscopic fields $(\rho_f, U_f, T_f)$ and the local Maxwellian $\mathcal M(f)$, which will be heavily used throughout the paper. In Section \ref{sec:3}, a sequence of approximation systems to \eqref{main}-\eqref{ini_main} is constructed. In Section \ref{sec:4}, we prove that the sequence of solutions constructed in Section \ref{sec:3} is indeed a Cauchy sequence and the limit is the solution of the system \eqref{main} in the sense of Definition \ref{def}. \section{Preliminaries} \label{sec:2} We present a series of lemmas that will be crucially used throughout the paper. \begin{lemma} \cite{PP93} \label{lem_temp} There exists a positive constant $C_q$, which depends only on $q$, satisfying \begin{itemize} \item[(i)] $\rho_f \leq C_q \|f\|_q T_f^{3/2} \quad (q>3~\mbox{or}~q=0)$, \item[(ii)] $\rho_f(T_f + |U_f|^2)^{(q-3)/2} \leq C_q \|f\|_q \quad (q>5~\mbox{or}~q=0)$, \item[(iii)] $\rho_f|U_f|^{q+3}((T_f+|U_f|^2)T_f)^{-3/2} \leq C_q \|f\|_q. \quad (q>1~\mbox{or}~q=0)$, \end{itemize} for almost everywhere $x \in \mathbb T^3$. \end{lemma} We now show that the $\|\cdot\|_q$-norm of a generalized local Maxwellian $\mathcal M_\gamma(f)$ with $\gamma > 0$ can be controlled by that of $f$. Although the proof is essentially given in \cite{PP93}, we provide it here for the completeness of our present work. \begin{lemma} \label{lem_M_bdd} Suppose $\|f\|_q < \infty$ for $q>5$, and let $\gamma >0$ be given. Then there exists a positive constant $C_{q,\gamma}$, which depends only on $q$ and $\gamma$, such that \[ \|\mathcal M_\gamma(f)\|_q \leq C_{q,\gamma} \|f\|_q, \quad (q>5~\mbox{or}~q=0), \] where \[ \mathcal M_\gamma(f) := \frac{\rho_f}{\sqrt{(2\pi T_f)^3}}\exp\left(-\gamma\frac{|v-U_f|^2}{2T_f}\right). \] In particular, if $\gamma=1$, then $\mathcal{M}_1(f) = \mathcal{M}(f)$ and \[ \| \mathcal M(f)\|_q \leq C_q \|f\|_q, \quad (q>5~\mbox{or}~q=0). \] \end{lemma} \begin{proof} We provide the estimates on $\mathcal M_\gamma(f)$ and $|v|^q \mathcal M_\gamma(f)$, seperately. \\ \noindent $\bullet$ (Estimate of $\mathcal M_\gamma(f)$): It follows from Lemma \ref{lem_temp} (i) that \begin{align*} \mathcal M_\gamma(f) \leq \frac{\rho_f}{\sqrt{(2\pi T_f)^3}} \leq C_q \|f\|_q. \end{align*} \noindent $\bullet$ (Estimate of $|v|^q \mathcal M_\gamma(f)$): We first estimate \begin{align*} |v|^q \mathcal M_\gamma(f) \leq C_q \left(|U_f|^q + |v-U_f|^q \right) \mathcal M_\gamma(f) =: \mathcal I_1 + \mathcal I_2, \end{align*} where $\mathcal I_1$ can be bounded as \begin{align*} \mathcal I_1 = C_q |U_f|^q \frac{\rho_f}{\sqrt{(2\pi T_f)^3}}\exp\left(-\gamma\frac{|v-U_f|^2}{2T_f}\right) \leq C_q \frac{|U_f|^q \rho_f}{T_f^{3/2}}. \end{align*} We now estimate $\mathcal I_1$ by considering two cases: $|U_f| > T_f^{1/2}$ and $|U_f| \leq T_f^{1/2}$. If $|U_f| > T_f^{1/2}$, we have \begin{align*} \mathcal I_1 \leq C_q \frac{|U_f|^{q+3} \rho_f}{|U_f|^3 T_f^{3/2}} \leq C_q \frac{|U_f|^{q+3} \rho_f}{(T_f+|U_f|^2)^{3/2}T_f^{3/2}} \leq C_q \|f\|_q, \end{align*} where we used Lemma \ref{lem_temp} (iii) for the last inequality. On the other hand, if $|U_f| \leq T_f^{1/2}$, we use Lemma \ref{lem_temp} (ii) to get \begin{align*} \mathcal I_1 \leq C_q \frac{|U_f|^q \rho_f}{T_f^{3/2}} \leq C_q \rho_f T_f^{\frac{q-3}{2}} \leq C_q \rho_f (T_f + |U_f|^2)^{\frac{q-3}{2}} \leq C_q\|f\|_q, \end{align*} due to $q > 5$. For $\mathcal I_2$, we get \begin{align*} \mathcal I_2 &= C_q |v-U_f|^q \frac{\rho_f}{\sqrt{(2\pi T_f)^3}}\exp\left(-\gamma\frac{|v-U_f|^2}{2T_f}\right) \\ &= C_q \rho_f T_f^{(q-3)/2} \left( \left(\frac{|v-U_f|^2}{2T_f}\right)^{q/2}\exp\left(-\gamma\frac{|v-U_f|^2}{2T_f}\right)\right) \\ &\leq C_{q,\gamma} \rho_f T_f^{(q-3)/2} \leq C_{q,\gamma} \rho_f (T_f + |U_f|^2)^{(q-3)/2} \leq C_{q,\gamma} \|f\|_q. \end{align*} Here, we employed the fact $x^{q/2}e^{-\gamma x} \lesssim 1$ for all $x \geq 0$ and Lemma \ref{lem_temp} (ii). Finally, the estimates above yield that \[ \|\mathcal M_\gamma(f)\|_q \leq ess\sup_{x,v}\left((1+|v|)^q\mathcal M_\gamma(f)(x,v)\right) \leq C_{q,\gamma} \|f\|_q. \] \end{proof} \begin{lemma} \cite{Yun2} \label{lem_lip} Assume $f,g$ satisfy ($h$ denotes either $f$ or $g$) \begin{itemize} \item[(i)] $\|h\|_q < C_1$, \item[(ii)] $\rho_h + |U_h| + |T_h| < C_2$, \item[(iii)] $\rho_h, T_h > C_3$, \end{itemize} for some constants $C_i > 0, i=1,2,3$. Then, we have \[ \| \mathcal M(f) - \mathcal M(g)\|_q \leq C\|f-g\|_q, \] where $C>0$ depends only on $C_i (i=1,2,3)$. \end{lemma} \begin{lemma} \label{lem_macro} Suppose $\|f\|_{q} < \infty$ for $q>5$, and $\rho_f,U_f$, and $T_f$ satisfy \[ \rho_f + |U_f| + T_f <c_1 \quad \mbox{and} \quad \rho_f,T_f > c_2, \] for some positive constants $c_1$ and $c_2$. Then we have \[ \|\nabla_{x,v}\mathcal M(f)\|_q \leq C(\| \nabla_x f\|_q +1)\|f\|_q, \] where $C$ is a positive constant depending on $c_1$ and $c_2$. \end{lemma} \begin{proof} \noindent We first provide derivatives of the local Maxwellian $\mathcal M(f)$ with respect to the macroscopic fields: \[ \frac{\partial \mathcal M (f)}{\partial \rho_f} = \frac{1}{\rho_f}\mathcal M(f), \quad \frac{\partial \mathcal M(f)}{\partial U_f} = \frac{v-U_f}{T_f}\mathcal M(f), \quad \mbox{and} \quad \frac{\partial \mathcal M(f)}{\partial T_f} = \left(-\frac{3}{2T_f} + \frac{|v-U_f|^2}{2T_f^2} \right)\mathcal M(f). \] We then give the estimates for $\| \cdot \|_q$-norm of each term above. We easily find \begin{equation} \label{A-3} \Big\| \frac{\partial \mathcal M(f)}{\partial \rho_f} \Big\|_q \lesssim \| \mathcal M(f)\|_q \lesssim \|f\|_q. \end{equation} For the second one, note that \begin{align*} \begin{aligned} \left| \frac{v-U_f}{T_f} \right|\mathcal M(f) &= \sqrt{2}(2\pi)^{-\frac 32}\frac{\rho_f}{T_f^2} \left| \frac{v-U_f}{\sqrt{2T_f}} \right| \exp\left(-\frac{|v-U_f|^2}{2T_f} \right) \lesssim \frac{\rho_f}{T_f^{3/2}} \exp\left(-\frac{|v-U_f|^2}{4T_f} \right). \end{aligned} \end{align*} Here, we used the following simple inequality \begin{equation} \label{simple-1} xe^{-x^2} \lesssim e^{-x^2/2} \quad \mbox{for all} \quad x \geq 0. \end{equation} Then, we use Lemma \ref{lem_M_bdd} to find \begin{equation} \label{A-2} \left\| \frac{v-U_f}{T_f}\mathcal M(f)\right\|_q \lesssim \left\|\frac{\rho_f}{T_f^{3/2}}\exp\left(-\frac{|v-U_f|^2}{4T_f} \right) \right\|_q \lesssim \|f\|_q. \end{equation} In order to estimate the third one, we use the following inequality similar to \eqref{simple-1}: \begin{equation*} xe^{-x} \lesssim e^{-x/2} \quad \mbox{for all} \quad x \geq 0. \end{equation*} This yields \begin{align*} \frac{|v-U_f|^2}{2T_f^2} \mathcal M(f) \lesssim \frac{\rho_f}{T_f^{3/2}} \exp\left(-\frac{|v-U_f|^2}{4T_f} \right), \end{align*} and subsequently, this with Lemma \ref{lem_M_bdd} gives \[ \left\| \frac{|v-U_f|^2}{2T_f^2}\mathcal M(f) \right\|_q \lesssim \|f\|_q. \] Thus we have \begin{align} \label{A-4} \left\| \frac{\partial \mathcal M(f)}{\partial T_f} \right\|_q \leq \left\| \frac{3}{2T_f} \mathcal M(f) \right\|_q + \left\| \frac{|v-U_f|^2}{2T_f^2}\mathcal M(f) \right\|_q \lesssim \|f\|_q. \end{align} The first order derivatives of the macroscopic fields are given by \begin{align*} \nabla_x \rho_f &= \int_{\mathbb R^3} \nabla_x f \,dv, \\ \nabla_x U_f &= \nabla_x \left( \frac{1}{\rho_f} \int_{\mathbb R^3}vf \,dv \right) = -\frac{U_f}{\rho_f}\nabla_x \rho_f + \frac{1}{\rho_f} \int_{\mathbb R^3}v \nabla_x f \,dv, \\ \nabla_x T_f &= \frac{1}{3} \nabla_x \left(\frac{1}{\rho_f} \int_{\mathbb R^3} |v-U_f|^2 f\,dv \right) \\ &= \frac{1}{3}\left(-\frac{\nabla_x \rho_f}{\rho_f^2} \int_{\mathbb R^3}|v-U|^2 f \,dv - \frac{1}{\rho_f}\int_{\mathbb R^3}2(v-U_f)f \nabla_x U_f \,dv + \frac{1}{\rho_f}\int_{\mathbb R^3}|v-U_f|^2 \nabla_x f \,dv \right). \end{align*} Then we easily get \begin{align} \label{A-4-1} |\nabla_x \rho_f | \leq \int_{\mathbb R^3} | \nabla_x f|\,dv = \int_{\mathbb R^3} |\nabla_x f|(1+|v|)^q (1+|v|)^{-q}\,dv \lesssim \| \nabla_x f\|_q, \end{align} due to $q > 5$. Similarly, we also find \begin{equation*} | \nabla_x U_f| \lesssim \| \nabla_x f \|_q \quad \mbox{and} \quad |\nabla_x T_f| \lesssim \| \nabla_x f\|_q. \end{equation*} This together with \eqref{A-2}, \eqref{A-3}, and \eqref{A-4} gives \begin{align*} \|\nabla_{x,v}\mathcal M(f)\|_q &\leq \left\| \frac{\partial \mathcal M(f)}{\partial \rho_f}\right\|_q \|\nabla_x \rho_f\|_{L^\infty} + \left\|\frac{\partial \mathcal M(f)}{\partial U_f}\right\|_q \| \nabla_x U_f\|_{L^\infty} \cr &\quad + \left\|\frac{\partial \mathcal M(f)}{\partial T_f}\right\|_q\|\nabla_x T_f\|_{L^\infty} + \left\|\frac{|v-U_f|}{T_f}\mathcal M(f) \right\|_q \\ &\lesssim (\| \nabla_x f\|_q +1) \|f\|_q. \end{align*} \end{proof} \section{Global existence and uniqueness of approximation system} \label{sec:3} We construct the sequence of approximation solutions to linearized systems of \eqref{main}. We consider following linearized NS-BGK system: \begin{gather}\begin{gathered} \label{app_main} \partial_t f^{n+1} + v \cdot \nabla_x f^{n+1} + \nabla_v \cdot ((u^n-v)f^{n+1}) = \rho_{f^n}(\mathcal M(f^n) - f^{n+1}),\\ \partial_t \rho^{n+1} + u^n \cdot \nabla_x \rho^{n+1} = 0, \\ \rho^{n+1} \partial_t u^{n+1} + \rho^{n+1}u^n \cdot \nabla_x u^{n+1} - \Delta_x u ^{n+1} + \nabla_x p^{n+1} = -\int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv, \\ \nabla_x \cdot u^{n+1} = 0, \end{gathered}\end{gather} with the initial data and the first iteration step: \begin{align} \label{init_app} \begin{aligned} (f^{n+1}(x,v,0),\rho^{n+1}(x,0),u^{n+1}(x,0)) &= (f_0(x,v),\rho_0(x),u_0(x)) \quad \mbox{and} \cr (f^0(x,v,t),\rho^0(x,t),u^0(x,t)) &= (f_0(x,v),\rho_0(x),u_0(x)) \end{aligned} \end{align} for $n \geq 0$ and $(x,v,t) \in \mathbb T^3 \times \mathbb R^3 \times (0,T)$. We now consider the backward characteristic $Z^n(s):=(X^n(s),V^n(s)) := (X^n(s;t,x,v),V^n(s;t,x,v))$, $s,t \in [0,T]$ given by \begin{align} \label{back} \begin{aligned} \frac{d}{ds}X^{n+1}(s) &= V^{n+1}(s),\\ \frac{d}{ds}V^{n+1}(s) &= u^n(X^{n+1}(s),s) - V^{n+1}(s), \end{aligned} \end{align} subject to the terminal data: \[ Z^{n+1}(t) = (x,v) =:z. \] We now provide the existence result for the approximation system \eqref{app_main}-\eqref{init_app}. \begin{proposition} \label{prop} Let $T \in (0,\infty)$ be an arbitrary fixed number. Suppose that the initial data $(f_0,\rho_0,u_0)$ satisfy the assumptions of Theorem \ref{thm_main}. Choose $\varepsilon$ to satisfy $\varepsilon^{1-\beta}C_T<1$, where $C_T$ is given in the end of the proof. Then, if $f^n$ and $u^{n}$ satisfy the following conditions: \begin{equation} \begin{aligned} \label{n_condition} &\sum_{|\nu|\leq 1}\|\nabla^\nu f^{n}\|_q < \varepsilon^\beta \quad \mbox{and}\\ &\|\partial_t u^n\|_{\mathcal C([0,T];L^2)} + \|\partial_t u^n\|_{L^2(0,T;H^1)} + \|u^n\|_{\mathcal C([0,T];H^2)} + \|u^n\|_{L^2(0,T;H^3)} < \varepsilon^\alpha, \end{aligned} \end{equation} then there exists a unique solution $(f^{n+1},\rho^{n+1},u^{n+1})$ such that \begin{align*} \begin{aligned} & \sum_{|\nu|\leq 1}\|\nabla^\nu f^{n+1}\|_q < \varepsilon^\beta, \quad \rho \in \mathcal C([0,T];H^3(\mathbb T^3)), \quad \rho(x,t) \geq \delta > 0, \quad \forall (x,t) \in \mathbb T^3 \times [0,T], \quad \mbox{and}\\ & \|\partial_t u^{n+1}\|_{\mathcal C([0,T];L^2)} + \|\partial_t u^{n+1}\|_{L^2(0,T;H^1)} + \|u^{n+1}\|_{\mathcal C([0,T];H^2)} + \|u^{n+1}\|_{L^2(0,T;H^3)} < \varepsilon^\alpha, \end{aligned} \end{align*} where $\delta = \inf_{x \in \mathbb T^3}\rho_0(x)$ is a positive constant and $\alpha,\beta$ are constants such that $0 < \alpha < \beta < 1$. \end{proposition} We first note that the existence and uniqueness of the momentum equations in \eqref{app_main}, which is linear parabolic system, are well-known thanks to the semigroup theory, see \cite{Ka} for instance. We prove Proposition \ref{prop} through the following lemmas. The next lemma gives the existence of positive lower bound and the regularity of the fluid density. Since the proof is similar to that of \cite[Lemma 2.2]{CK}, we omit it here. \begin{lemma} \label{lem_rho} Suppose that the initial data $\rho_0$ and $u^n$ satisfy the assumptions in Theorem \ref{thm_main} and \eqref{n_condition}. Then, there exists a unique solution $\rho^{n+1}$ to $\eqref{app_main}$ such that \begin{itemize} \item[(i)] $\inf_{\mathbb T^3 \times [0,T]}\rho^{n+1} \geq \delta$ for some $\delta >0$, \item[(ii)] $\sup_{0 \leq t \leq T}\|\rho^{n+1}(\cdot,t) \|_{H^3} \leq C\| \rho_0 \|_{H^3}$, \end{itemize} where $C>0$ is independent of $n$. \end{lemma} Next, we present the growth estimate in velocity for the characteristic flow \eqref{back}. \begin{lemma} (Estimate of characteristic flow) \label{lem_flow} Suppose that $u^n$ satisfy \eqref{n_condition}. Then, there exists a constant $C$ depending on $T$ such that \begin{eqnarray*} |V^{n+1}(s)| \leq C(1+|v|), \quad 0 \leq s \leq T. \end{eqnarray*} \end{lemma} \begin{proof} We rewrite \eqref{back} as \begin{align} & X^{n+1}(s) = x - \int_s^t V^{n+1}(\tau)\,d\tau,\notag\\ & V^{n+1}(s) = ve^{t-s} - \int_s^t u^n(X^{n+1}(\tau),\tau)e^{ \tau-s }\,d\tau. \label{B-1-2} \end{align} Note that $u^n$ can be estimated as $ \| u^n\|_{L^\infty} \leq C\|u^n \|_{H^2} < \varepsilon^\alpha,$ where $C>0$ is independent of $n$. Then we easily find from \eqref{B-1-2} that \[ |V^{n+1}(s)| \leq C(1+|v|), \] where $C$ depends on $T$, but independent of $n$. \end{proof} The next lemma asserts that the macroscopic fields of kinetic equation have the uniform boundedness property. \begin{lemma}(Boundedness of macroscopic fields) \label{lem_macro_bdd} Suppose that the initial data satisfy the assumptions of Theorem \ref{thm_main} and $f^k (1 \leq k \leq n)$ satisfies \begin{equation*} \begin{aligned} &\sum_{|\nu|\leq 1}\|\nabla^\nu f^{k}\|_q < \varepsilon^\beta \quad \mbox{for some} \quad \beta \in (0,1). \end{aligned} \end{equation*} Then, we have \begin{itemize} \item[(i)] $\rho_{f^n}, T_{f^n} > C_1,$ \item[(ii)] $\rho_{f^n} + |U_{f^n}| + T_{f^n} < C_2,$ \end{itemize} for some generic positive constants $C_1$ and $C_2$. \end{lemma} \begin{proof} Along the backward characteristic defined in \eqref{back}, we find \begin{align*}\begin{aligned} &\frac{d}{ds}f^{n+1}(Z^{n+1}(s),s) \\ &\quad= \partial_s f^{n+1}(Z^{n+1}(s),s) + V^{n+1}(s) \cdot \nabla_x f^{n+1}(Z^{n+1}(s),s) \cr &\qquad + (u^n(X^{n+1}(s),s)-V^{n+1}(s))\cdot \nabla_v f^{n+1}(Z^{n+1}(s),s) \\ &\quad = \rho_{f^n}(X^{n+1}(s),s)\mathcal M(f^n)(Z^{n+1}(s),s) + (3-\rho_{f^n}(X^{n+1}(s),s))f^{n+1}(Z^{n+1}(s),s). \end{aligned}\end{align*} We integrate both sides with respect to time to get \begin{align}\begin{aligned} \label{f_back} f^{n+1}(z,t) &= e^{\int_0^t(3-\rho_{f^n}(X^{n+1}(s),s))\, ds}f_0(Z^{n+1}(0)) \\ &\quad+ \int_0^t e^{\int_s^t(3-\rho_{f^n}(X^{n+1}(\tau),\tau))\, d\tau}\rho_{f^n}(X^{n+1}(s),s) \mathcal M(f^n)(Z^{n+1}(s),s)\,ds. \end{aligned}\end{align} First, it is easy to see that \[ \rho_{f^k} \leq \int_{\mathbb R^3} |f^k|(1+|v|)^{q}(1+|v|)^{-q}\,dv \leq C \|f^k\|_q < C\varepsilon^\beta, \quad 1 \leq k \leq n. \] We also have \begin{align}\label{est_low} \begin{aligned} \rho_{f^n} &= \int_{\mathbb R^3} f^n \,dv \cr &\geq \int_{\mathbb R^3} e^{\int_0^t (3 - \rho_{f^{n-1}}(X^{n}(s),s))ds}f_0(Z^n(0)) \,dv \\ & \geq e^{(3-C\varepsilon^\beta)t} \int_{\mathbb R^3}f_0(Z^n(0))\,dv\\ &\geq e^{(3-C\varepsilon^\beta)t} \varepsilon_1 \int_{\mathbb R^3}(1+|V^n(0)|)^{-(q+3+a)}dv \\ &\geq \varepsilon_1 \int_{\mathbb R^3}(1+C(1+|v|))^{{-(q+3+a)}}dv\\ &= C >0, \end{aligned} \end{align} where Lemma \ref{lem_flow} and the assumption on the initial data $f_0$ are used. For the estimate of $U_{f^n}$, we use the lower bound estimate for $\rho_{f^n}$ above to get \begin{align*} |U_{f^n}| &\leq \frac{1}{C_{T}} \int_{\mathbb R^3}vf^n \,dv \leq \frac{1}{C_{T}} \int_{\mathbb R^3}f^n (1+|v|)^{q} (1+|v|)^{1-q}\,dv \leq C_{T}\|f^n\|_q < C_{T}\varepsilon^\beta. \end{align*} The upper bound estimate of $T_{f^n}$ can be achieved in a similar way using the estimates above and the lower bound directly follows from Lemma \ref{lem_temp} (i) with \eqref{est_low}. \end{proof} In what follows, we show the uniform-in-$n$ boundedness of $f^n$. \begin{lemma} (Uniform-in-$n$ boundedness of $f^n$) \label{lem_kinet} Suppose that the initial data $(f_0,\rho_0,u_0)$ satisfies the assumptions of Theorem \ref{thm_main} and $u^n$ satisfies \eqref{n_condition}. Then, there exists a unique solution $f^{n+1}$ to system \eqref{app_main} such that \begin{equation*} \sum_{|\nu|\leq 1}\|\nabla^\nu f^{n+1}\|_q < \varepsilon^\beta \quad \mbox{for some} \quad \beta \in (0,1). \end{equation*} \end{lemma} \begin{proof} \noindent $\bullet$ (Preparatory estimates): Using the upper bound of $\|u^n\|_{L^\infty}$, we obtain from \eqref{B-1-2} that \[ |V^{n+1}(t)| \geq C_1|v| - C_2, \quad 0 < C_1 < 1, \] for all $0 \leq t \leq T$. It readily gives \begin{align} \label{B-3} 1 + C_2 + |V^{n+1}(t)| \geq 1+C_1|v| \geq C_1(1+|v|), \end{align} for all $0 \leq t \leq T$. We use the estimate above to find $$\begin{aligned} f_0(Z^{n+1}(0)) &= f_0(Z^{n+1}(0))(1 + C_2 + |V^{n+1}(0)|)^q (1 + C_2 + |V^{n+1}(0)|)^{-q} \\ &\leq C f_0(Z^{n+1}(0))(C_2^q + (1+|V^{n+1}(0)|)^q )(1 + C_2 + |V^{n+1}(0)|)^{-q}\cr &\leq C\|f_0\|_q(1 + C_2 + |V^{n+1}(0)|)^{-q}. \end{aligned}$$ This together with \eqref{B-3} gives \begin{align*} \begin{aligned} |f_0(Z^{n+1}(0))| \leq C\|f_0\|_{q} (1+|v|)^{-q}, \end{aligned} \end{align*} Similarly, we find \begin{align} \label{B-7} \begin{aligned} & |f^{n+1}(Z^{n+1}(s),s)| \leq C \|f^{n+1}(\cdot,\cdot,s)\|_q (1+|v|)^{-q},\\ & |\nabla_{x,v}f^{n+1}(Z^{n+1}(s),s)| \leq C \| \nabla_{x,v}f^{n+1}(\cdot,\cdot,s)\|_q (1+|v|)^{-q},\\ &| \nabla_x f_0(Z^{n+1}(0))| \leq C \| \nabla_x f_0\|_q (1+|v|)^{-q},\\ &| \nabla_v f_0(Z^{n+1}(0))| \leq C \| \nabla_v f_0\|_q (1+|v|)^{-q},\\ &|\mathcal M(f^n)(Z^{n+1}(s),s)| \leq C\|\mathcal M(f^n)\|_q (1+|v|)^{-q},\\ & | \nabla_{x,v} \mathcal M(f^n)(Z^{n+1}(s),s)| \leq C \| \nabla_{x,v}\mathcal M(f^n)\|_q (1+|v|)^{-q}.\\ \end{aligned} \end{align} \noindent $\bullet$ (Zeroth order estimate): In view of the boundedness of $\rho^{n+1}$ and $\rho_{f^n}$, we get from \eqref{f_back} and the estimates above combined with Lemma \ref{lem_M_bdd} that \begin{align*} |f^{n+1}(z,t)| &\leq C |f_0(Z^{n+1}(0))| + C\varepsilon^{\beta}\int_0^t |\mathcal M(f^n)(Z^{n+1}(s),s)|\,ds \\ &\leq C \|f_0\|_{q} (1+|v|)^{-q}+ C \varepsilon^{\beta}\int_0^t \| \mathcal M(f^n)\|_q\,ds \cdot (1+|v|)^{-q} \\ &\leq C \|f_0\|_{q} (1+|v|)^{-q}+ C \varepsilon^{\beta}\int_0^t \|f^n\|_q \,ds \cdot (1+|v|)^{-q}. \end{align*} This readily gives \begin{equation} \label{C-2} \sup_{0 \leq t \leq T}\|f^n(\cdot,\cdot,t)\|_q \leq Ce^{C\varepsilon^{\beta}} \|f_0\|_{q}, \end{equation} for some $C>0$ independent of $n$. \vspace{0.2cm} \noindent $\bullet$ (First order estimate): For $j=1,2,3$, we take a partial derivative $\partial_{x_j}$ to the following equation: \begin{equation} \label{C-3} \nabla_v \cdot ((u^n-v)f^{n+1}) = (u^n-v) \cdot \nabla_v f^{n+1} - 3f^{n+1}, \end{equation} then we have \begin{equation*} \partial_{x_j}(\nabla_v \cdot ((u^n-v)f^{n+1})) = \partial_{x_j}u^n\cdot \nabla_v f^{n+1} + (u^n-v)\cdot \nabla_v \partial_{x_j}f^{n+1} -3\partial_{x_j}f^{n+1}. \end{equation*} We now take the differential operator $\partial_{x_j}$ to the kinetic equation in \eqref{app_main} and use the estimate above to find \begin{align*} \begin{aligned} &\partial_t \partial_{x_j}f^{n+1} + v \cdot \nabla_x \partial_{x_j}f^{n+1} + (u^n-v) \cdot \nabla_v \partial_{x_j}f^{n+1}\\ &\qquad = (\mathcal M(f^n)-f^{n+1}) \partial_{x_j}\rho_{f^n} + \rho_{f^n}(\partial_{x_j}\mathcal M(f^n) - \partial_{x_j}f^{n+1}) + 3\partial_{x_j}f^{n+1} - \partial_{x_j}u^n \cdot \nabla_v f^{n+1}. \end{aligned} \end{align*} Then along the characteristic curve $Z^{n+1}(s)$ given in \eqref{back}, we have \begin{align*} \frac{d}{dt}\partial_{x_j}f^{n+1}(Z^{n+1}(t),t) &= (3-\rho_{f^n})\partial_{x_j}f^{n+1} + \partial_{x_j}\rho_{f^n}(\mathcal M(f^n)-f^{n+1}) + \rho_{f^n}\partial_{x_j}\mathcal M(f^n) - \partial_{x_j}u^n \cdot \nabla_v f^{n+1}. \end{align*} Here and the estimate below, for simplicity we omit the dependence of terms in the right hand sides on $Z^{n+1}(t)$. Then we easily find \begin{align*} \begin{aligned} &\partial_{x_j}f^{n+1}(Z^{n+1}(t),t) \\ &\quad = \partial_{x_j}f_0(Z^{n+1}(0))e^{\int_0^t (3-\rho_{f^n})(X^{n+1}(s),s)\,ds}\\ &\qquad + \int_0^t \left( \partial_{x_j}\rho_{f^n}(\mathcal M(f^n)-f^{n+1}) + \rho_{f^n}\partial_{x_j}\mathcal M(f^n) - \partial_{x_j}u^n \cdot \nabla_v f^{n+1}\right)(Z^{n+1}(s),s) e^{\int_s^t (3-\rho_{f^n})(X^{n+1}(\tau),\tau)\,d\tau}\,ds, \end{aligned} \end{align*} which readily gives \begin{align*} \begin{aligned} |\nabla_x f^{n+1}(z,t)| &\leq C| \partial_{x_j}f_0(Z^{n+1}(0))| \cr &\quad + C\int_0^t \left| \left(\partial_{x_j}\rho_{f^n}(\mathcal M(f^n)-f^{n+1}) + \rho_{f^n}\partial_{x_j}\mathcal M(f^n) - \partial_{x_j}u^n \cdot \nabla_v f^{n+1}\right)(Z^{n+1}(s),s)\right| ds. \end{aligned} \end{align*} The terms on the right hand side can be estimated as follows. The estimate of the first term is provided in \eqref{B-7}. We estimate the integrand terms as follows. Using \eqref{A-4-1} and \eqref{B-7}, we have \begin{equation*} \left| \partial_{x_j}\rho_{f^n}(\mathcal M(f^n)-f^{n+1}) \right| \leq C\|\nabla_x f^n\|_q (\| \mathcal M(f^n)\|_q + \|f^{n+1}\|_q)(1+|v|)^{-q}. \end{equation*} Similarly, \begin{align*} \left| \rho_{f^n} \partial_{x_j}\mathcal M(f^n)\right| \leq C\varepsilon^{\beta}\| \nabla_{x,v}\mathcal M(f^n)\|_q(1+|v|)^{-q}, \quad \left| \partial_{x_j}u^n \cdot \nabla_v f^{n+1}\right| \leq C \| \nabla_v f^{n+1}\|_q (1+|v|)^{-q}. \end{align*} Thus, we find \begin{align} \label{B-10} \begin{aligned} \| \nabla_x f^{n+1}(z,t)\|_q &\leq C\| \nabla_x f_0\|_q + C\int_0^t \left( \|\mathcal M(f^n)\|_q + \|f^{n+1}\|_q + \| \nabla_{x,v}\mathcal M(f^n)\|_q + \| \nabla_v f^{n+1}\|_q \right)ds \\ &\leq C\| \nabla_x f_0\|_q + C\int_0^t \left(\|f^n\|_q + \|f^{n+1}\|_q + \| \nabla_v f^{n+1}\|_q \right)ds \\ &\leq C_T(\|f_0\|_q + \| \nabla_x f_0\|_q) + C\int_0^t \| \nabla_v f^{n+1}\|_q \,ds. \end{aligned} \end{align} Here, Lemmas \ref{lem_M_bdd} and \ref{lem_macro} together with \eqref{C-2} are used. We now perform the estimates for $\| \nabla_v f^{n+1}\|_q $ in much the same way as for $\| \nabla_x f^{n+1}\|_q$. We take $\partial_{v_j}, j=1,2,3$ to \eqref{C-3} to have \begin{equation*} \begin{aligned} &\partial_{v_j}(\nabla_v \cdot ((u^n-v)f^{n+1})) = -4\partial_{v_j}f^{n+1} + (u^n-v)\cdot \nabla_v \partial_{v_j}f^{n+1}. \end{aligned} \end{equation*} Then, taking $\partial_{v_j}$ to the kinetic equation in \eqref{app_main} yields \begin{align*} \partial_t \partial_{v_j}f^{n+1} + v \cdot \nabla_x \partial_{v_j}f^{n+1} + (u^n-v) \cdot \nabla_v \partial_{v_j}f^{n+1} =\rho_{f^n}(\partial_{v_j} \mathcal M(f^n) - \partial_{v_j}f^{n+1})-\partial_{x_j} f^{n+1}+ 4\partial_{v_j}f^{n+1}. \end{align*} Along the characteristic flow \eqref{back}, it can be rewritten as \begin{align*} \frac{d}{dt}\partial_{v_j}f^{n+1}(Z^{n+1}(t),t) = (4-\rho_{f^n}) \partial_{v_j}f^{n+1} + \rho_{f^n}\partial_{v_j}\mathcal M(f^n) - \partial_{x_j}f^{n+1}, \end{align*} and this readily gives \begin{align*} &\partial_{v_j} f^{n+1}(Z^{n+1}(t),t) \\ &\quad = \partial_{v_j}f_0(Z^{n+1}(0))e^{\int_0^t (4-\rho_{f^n})(X^{n+1}(s),s) \,ds} \\ &\qquad + \int_0^t (\rho_{f^n} \partial_{v_j}\mathcal M(f^n) - \partial_{x_j}f^{n+1})(Z^{n+1}(s),s)e^{\int_s^t (4-\rho_{f^n})(X^{n+1}(\tau),\tau)\,d\tau}ds. \end{align*} We use the estimate similar to above to have \begin{align*} |\nabla_v f^{n+1}(z,t)| & \leq C| \nabla_v f_0(Z^{n+1}(0))| + C\int_0^t (|\nabla_v \mathcal M(f^n)| + |\nabla_x f^{n+1}|)\,ds\\ &\leq C \| \nabla_v f_0\|_q (1+|v|)^{-q} + C \int_0^t \left( \|f^n\|_q + \| \nabla_x f^{n+1}\|_q\right) \cdot (1+|v|)^{-q}\,ds, \end{align*} which easily gives \begin{equation} \label{B-11} \| \nabla_v f^{n+1}(z,t)\|_q \leq C_T ( \|f_0\|_q + \| \nabla_v f_0\|_q) + C\int_0^t \|\nabla_x f^{n+1}\|_q \,ds. \end{equation} Combining \eqref{B-10} and \eqref{B-11} asserts \[ \| \nabla_{x,v}f^{n+1}(\cdot,\cdot,t)\|_q \leq C_T(\|f_0\|_q + \|\nabla_{x,v}f_0\|_q) + C\int_0^t \| \nabla_{x,v} f^{n+1}\|_q\,ds, \] and Gr\"onwall's lemma yields \begin{align}\label{B-12} \begin{aligned} \| \nabla_{x,v} f^{n+1}(\cdot,\cdot,t)\|_q & \leq C_T(\|f_0\|_q + \|\nabla_{x,v}f_0\|_q). \end{aligned} \end{align} Finally, we conclude from \eqref{C-2} and \eqref{B-12} that \[ \sum_{|\nu|\leq 1}\|\nabla^\nu f^{n+1}\|_q \leq C(\| f_0\|_q + \| \nabla_{x,v}f_0\|_q) \leq C_T\varepsilon < \varepsilon^\beta, \] where we used our assumption on $\varepsilon$: $C_T \varepsilon^{1-\beta}<1$. \end{proof} The next lemma show the the uniform-in-$n$ boundedness of the velocity $u^n$. Since the proof is similar to that of \cite{CK}, we postpone it to Appendix \ref{App}. \begin{lemma} \label{lem_fluid} (Uniform-in-$n$ boundedness of $u^n$) Suppose that the initial data $(f_0,\rho_0,u_0)$ and $u^n$ satisfy the assumptions in Theorem \ref{thm_main} and \eqref{n_condition}, respectively. Then, there exists a unique solution $u^{n+1}$ to system \eqref{app_main} such that \begin{equation*} \|\partial_t u^{n+1}\|_{\mathcal C([0,T];L^2)} + \|\partial_t u^{n+1}\|_{L^2(0,T;H^1)} + \|u^{n+1}\|_{\mathcal C([0,T];H^2)} + \|u^{n+1}\|_{L^2(0,T;H^3)} < \varepsilon^\alpha. \end{equation*} \end{lemma} \section{Proof of Theorem \ref{thm_main}} \label{sec:4} \setcounter{equation}{0} In this section, we first prove that the approximation sequence $(f^n,\rho^n,u^n)$ is a Cauchy sequence. Subsequently, we show that the corresponding limit $(f,\rho,u)$ is the solution to the system \eqref{main}, and moreover it has the desired regularity \eqref{reg}. \subsection{Construction of Cauchy sequence} \begin{lemma} \label{lem_cauchy1} Let $(f^{n},\rho^n,u^n)$ be the solution to system \eqref{app_main}. Then, the following estimate holds: \begin{align} \label{cauchy-1} \begin{aligned} &\|(f^{n+1}-f^n)(t)\|^2_{q} \leq C \int_0^t \|(f^n-f^{n-1})(s)\|^2_{q}\,ds + C\int_0^t \|(u^n-u^{n-1})(s)\|^2_{H^2}\,ds, \end{aligned} \end{align} where $C>0$ is independent of $n$. \end{lemma} \begin{proof} \noindent {\bf (Step 1: estimate of $f^{n+1}-f^n$):} We consider the forward characteristic $\Bar Z^n(t):=(\Bar X^n(t),\Bar V^n(t)) := (\Bar X^n(t;0,x,v),\Bar V^n(t;0,x,v))$ given by \begin{align} \label{forward} \begin{aligned} &\frac{d}{dt}\Bar X^{n+1}(t) = \Bar V^{n+1}(t),\\ &\frac{d}{dt}\Bar V^{n+1}(t) = u^n(\Bar X^{n+1}(t),t) - \Bar V^{n+1}(t), \end{aligned} \end{align} subject to the initial data \[ \Bar Z^{n+1}(0) = (x,v) = z. \] A computation similar to that for the backward characteristic shows that $f^{n+1}$ can be formulated as follows. $$\begin{aligned} f^{n+1}(\bar Z^{n+1}(t),t)& = e^{\int_0^t (3-\rho_{f^n}(\bar X^{n+1}(s),s))\,ds}f_0(z) \\ &\quad + \int_0^t e^{\int_s^t (3-\rho_{f^n}(\bar X^{n+1}(\tau),\tau))\,d\tau}\rho_{f^n}(\bar X^{n+1}(s),s)\mathcal M(f^n)(\bar Z^{n+1}(s),s)\,ds. \end{aligned}$$ Then, we have \begin{align*} &f^{n+1}(\Bar Z^{n+1}(t),t)-f^n(\Bar Z^{n+1}(t),t) \\ &\qquad = f^n(\Bar Z^n(t),t)-f^n(\Bar Z^{n+1}(t),t) + f^{n+1}(\bar Z^{n+1}(t),t) - f^n(\bar Z^n(t),t)\\ &\qquad = f^n(\Bar Z^n(t),t)-f^n(\Bar Z^{n+1}(t),t) \\ &\qquad \quad + \left(e^{\int_0^t (3-\rho_{f^n}(\bar X^{n+1}(s),s))\,ds}-e^{\int_0^t (3-\rho_{f^{n-1}}(\bar X^{n}(s),s))\,ds} \right)f_0(x,v) \\ &\qquad \quad+ \int_0^t \bigg(e^{\int_s^t (3-\rho_{f^n}(\bar X^{n+1}(\tau),\tau))\,d\tau}\rho_{f^n}(\bar X^{n+1}(s),s)\mathcal M(f^n)(\bar Z^{n+1}(s),s) \\ &\hspace{3cm} - e^{\int_s^t (3-\rho_{f^{n-1}}(\bar X^{n}(\tau),\tau))\,d\tau}\rho_{f^{n-1}}(\bar X^{n}(s),s)\mathcal M(f^{n-1})(\bar Z^{n}(s),s)\bigg)\,ds \\ &\quad =: \mathcal I_1 + \mathcal I_2 + \mathcal I_3, \end{align*} where we denote by $\mathcal I_3$ the integral term. \newline \noindent $\bullet$ (Estimate of $\mathcal I_1$): We easily estimate \begin{align} \label{E-0} \mathcal I_1 \leq \| \nabla_{x,v}f^n\|_{q} |\Bar Z^{n+1}(t)-\Bar Z^n(t)| (1+|v|)^{-q} \leq C |\Bar Z^{n+1}(t)-\Bar Z^n(t)|(1+|v|)^{-q}. \end{align} \noindent $\bullet$ (Estimate of $\mathcal I_2$): Note that we have the uniform-in-$n$ bounds of $\rho^n$ and $\rho_{f^n}$ thanks to Lemmas \ref{lem_rho} and \ref{lem_macro_bdd}. Then, the mean value theorem yields \begin{align*} \begin{aligned} &\left| e^{\int_0^t (3-\rho_{f^n}(\bar X^{n+1}(s),s))\,ds}-e^{\int_0^t (3-\rho_{f^{n-1}}(\bar X^{n}(s),s))\,ds} \right|\\ &\quad \leq \exp\left(\max\Big\{ \int_0^t (3-\rho_{f^n}(\bar X^{n+1}(s),s))\,ds, \int_0^t (3-\rho_{f^{n-1}}(\bar X^{n}(s),s))\,ds \Big\} \right) \\ &\hspace{3cm} \times \left| \int_0^t \rho_{f^n}(\bar X^{n+1}(s),s) - \rho_{f^{n-1}}(X^n(s),s)\,ds \right| \\ &\quad \leq C\int_0^t \left| \rho_{f^n}(\bar X^{n+1}(s),s)-\rho_{f^{n-1}}(\bar X^n(s),s) \right|ds. \end{aligned} \end{align*} Note that \begin{align} \begin{aligned} \label{E-1} &\int_0^t \left| \rho_{f^n}(\bar X^{n+1}(s),s)-\rho_{f^{n-1}}(\bar X^n(s),s) \right|ds \\ &\qquad \leq \int_0^t \left|\rho_{f^n}(\bar X^{n+1}(s),s)-\rho_{f^{n-1}}(\bar X^{n+1}(s),s)\right| + \left|\rho_{f^{n-1}}(\bar X^{n+1}(s),s)-\rho_{f^{n-1}}(\bar X^n(s),s)\right|ds \\ &\qquad \leq \int_0^t \|(f^n-f^{n-1})(s)\|_q + \|\nabla \rho_{f^{n-1}}\|_{L^\infty}\left|\bar X^{n+1}(s)-\bar X^n(s)\right|ds \\ &\qquad \leq C \int_0^t \|(f^n-f^{n-1})(s)\|_q + \left|\bar X^{n+1}(s)-\bar X^n(s)\right|ds . \end{aligned} \end{align} Thus, we find \begin{align} \label{E-2} \begin{aligned} \mathcal I_2 \leq C \|f_0\|_{q} \int_0^t \left(\|(f^n-f^{n-1})(s)\|_q + \left|(\bar X^{n+1}-\bar X^n)(s)\right| \right)ds \cdot (1+|v|)^{-q}. \end{aligned} \end{align} \noindent $\bullet$ (Estimate of $\mathcal I_3$): For notational simplicity, we set $$\begin{aligned} &\mathcal A_n:= e^{-\int_s^t \rho_{f^{n-1}}(\bar X^n(\tau),\tau)\,d\tau}, \quad \mathcal B_n := \rho_{f^{n-1}}(\bar X^n(s),s), \quad \mbox{and} \quad \mathcal C_n := \mathcal M(f^{n-1})(\bar Z^n(s),s). \end{aligned}$$ Then, we have \begin{align*} \mathcal I_3 &= \int_0^t \left(\mathcal A_{n+1}\mathcal B_{n+1}\mathcal C_{n+1} - \mathcal A_{n}\mathcal B_{n}\mathcal C_{n}\right)ds \\ &\leq \int_0^t | \mathcal A_{n+1}\mathcal B_{n+1}||\mathcal C_{n+1} - \mathcal C_n| + |\mathcal A_{n+1} \mathcal C_{n}| | \mathcal B_{n+1} - \mathcal B_n| + |\mathcal B_{n}\mathcal C_{n}||\mathcal A_{n+1}-\mathcal A_n| \,ds. \end{align*} We give the estimates of $\mathcal C_{n+1} - \mathcal C_n$, $\mathcal B_{n+1} - \mathcal B_n$, and $\mathcal A_{n+1} - \mathcal A_n$, respectively. \begin{align*} \begin{aligned} &|\mathcal C_{n+1}-\mathcal C_n| \\ &\quad \leq | \mathcal M(f^n)(\bar Z^{n+1}(s),s)-\mathcal M(f^n)(\bar Z^n(s),s)| + |\mathcal M(f^n)(\bar Z^n(s),s) - \mathcal M(f^{n-1})(\bar Z^n(s),s)| \\ &\quad \leq |\nabla_{x,v} \mathcal M(f^n) (\theta \Bar Z^{n+1}(s) + (1-\theta)\Bar Z^n(s),s) \cdot (\Bar Z^{n+1}(s)-\Bar Z^n(s))| \\ &\qquad + |\mathcal M(f^n)(\bar Z^n(s),s) - \mathcal M(f^{n-1})(\bar Z^n(s),s)| \\ &\quad \leq C |\Bar Z^{n+1}(s)-\Bar Z^n(s)| (1+|v|)^{-q} + |\mathcal M(f^n)(\bar Z^n(s),s) - \mathcal M(f^{n-1})(\bar Z^n(s),s)| \\ &\quad \leq C( |\Bar Z^{n+1}(s)-\Bar Z^n(s)| + \| (f^n-f^{n-1})(s)\|_q ) (1+|v|)^{-q}, \end{aligned} \end{align*} for some $\theta \in [0,1]$. Here, we used Lemmas \ref{lem_lip} and \ref{lem_macro}. We can also get the estimates for $\mathcal A_{n+1} - \mathcal A_n$ and $\mathcal B_{n+1} - \mathcal B_n$ in the same way as \eqref{E-1}. \begin{align*} &|\mathcal A_{n+1} - \mathcal A_n| \leq C \int_s^t \|(f^n-f^{n-1})(\tau)\|_q + |\bar X^{n+1}(\tau)-\bar X^n(\tau)| \,d\tau ,\\ &|\mathcal B_{n+1} - \mathcal B_n| \leq C \|(f^n-f^{n-1})(s)\|_q + |\bar X^{n+1}(s)-\bar X^n(s)|. \end{align*} Thus, in view of Lemmas \ref{lem_rho}, \ref{lem_macro_bdd}, and the fact that $| \mathcal C_n | \leq C \|f^{n-1}\|_{q} (1+|v|)^{-q}$, which is by Lemma \ref{lem_M_bdd}, we find that \begin{align} \label{E-3} \begin{aligned} \mathcal I_3 \leq C_T \int_0^t \left( \|(f^n-f^{n-1}(s)\|_q+ \left|\bar Z^{n+1}(s) - \bar Z^n(s)\right| \right)ds \cdot (1+|v|)^{-q}. \end{aligned} \end{align} We sum up \eqref{E-0}, \eqref{E-2}, and \eqref{E-3} to get \begin{align}\begin{aligned} \label{E-4} |(f^{n+1}-f^n)(t)|(1+|v|)^q &\leq C_T \left|(\bar Z^{n+1}-\bar Z^n)(s)\right| \\ &\quad + C_T \int_0^t \left( \|(f^n-f^{n-1})(s)\|_q+\left|( \bar Z^{n+1} - \bar Z^n)(s)\right|\right)ds. \end{aligned}\end{align} \noindent {\bf (Step 2: estimate of $\Bar Z^{n+1}-\Bar Z^n$):} We can easily get from \eqref{forward} that \begin{equation} \label{E-5} |(\Bar X^{n+1}-\Bar X^n)(t)| \leq \int_0^t \left|(\Bar V^{n+1} - \Bar V^n)(s)\right|ds \end{equation} and \[ \Bar V^{n+1}(t) = ve^{-t} + \int_0^t u^n(\bar X^{n+1}(s),s)e^{-(t-s)}\,ds. \] Then we have \begin{align*} \begin{aligned} &|\Bar V^{n+1}(t)-\Bar V^n(t)| \leq \int_0^t \left| u^n(\Bar X^{n+1}(s),s) - u^{n-1}(\Bar X^n(s),s)\right| e^{-(t-s)}\,ds. \end{aligned} \end{align*} Using the mean value theorem, we have \begin{align*} \left| u^n(\Bar X^{n+1}(s),s) - u^{n-1}(\Bar X^n(s),s)\right| &\leq |u^n(\Bar X^{n+1}(s),s)-u^n(\Bar X^n(s),s)| + |u^n(\Bar X^n(s),s)-u^{n-1}(\Bar X^n(s),s)| \\ &\leq \|\nabla u^n\|_{L^\infty} |\bar X^{n+1}(s)-\bar X^n(s)| + \|(u^n-u^{n-1})(s)\|_{L^\infty} \\ &\leq \|\nabla u^n\|_{L^\infty} |\bar X^{n+1}(s)-\bar X^n(s)| + C\|(u^n-u^{n-1})(s)\|_{H^2}, \end{align*} which gives \begin{align*} |(\bar V^{n+1}-\bar V^n)(t)| \leq \int_0^t \|\nabla u^n\|_{L^\infty}\left|(\bar X^{n+1}-\bar X^n)(s)\right|ds + C\int_0^t\| (u^n-u^{n-1})(s)\|_{H^2} \, ds. \end{align*} This together with \eqref{E-5} gives \begin{equation*} \left| (\bar Z^{n+1} - \bar Z^n)(t) \right| \leq C \int_0^t \| (u^n-u^{n-1})(s)\|_{H^2}\,ds+ \int_0^t (1 + \|\nabla u^n\|_{L^\infty})\left| (\bar Z^{n+1} - \bar Z^n)(s) \right| ds. \end{equation*} We then use Gr\"onwall's lemma to have \[ \|(\Bar Z^{n+1}-\Bar Z^n)(t)\|_{L^\infty} \leq C\int_0^t \| (u^n-u^{n-1})(s)\|_{H^2}\,ds, \] where $C>0$ is independent of $n$. Finally, by combining the above with \eqref{E-4}, we conclude the desired result. \end{proof} \begin{lemma} \label{lem_cauchy2} Let $(f^{n},\rho^{n},u^n)$ be the solution to system \eqref{app_main}. Then we have the following estimate: \begin{equation} \label{cauchy-2} \|(\rho^{n+1}-\rho^n)(t)\|^2_{H^2} \leq C_T \int_0^t \|(u^n-u^{n-1})(s)\|^2_{H^2}\,ds. \end{equation} \end{lemma} \begin{proof} We obtain from the continuity equation in \eqref{app_main} that \[ \partial_t(\rho^{n+1}-\rho^n) = - u^n \cdot \nabla(\rho^{n+1}-\rho^n) - (u^n-u^{n-1}) \cdot \nabla \rho^n. \] \noindent $\bullet$ (Zeroth order estimate): A straightforward computation gives \begin{align} \begin{aligned} \label{E-6} &\frac 12 \frac{d}{dt}\| \rho^{n+1}-\rho^n\|^2_{L^2} \\ &\quad = -\int_{\mathbb T^3} (\rho^{n+1}-\rho^n) u^n \cdot \nabla(\rho^{n+1}-\rho^n)\,dx- \int_{\mathbb T^3} (\rho^{n+1}-\rho^n) (u^n-u^{n-1})\cdot \nabla \rho^n \,dx \\ &\quad \leq \|u^n\|_{L^\infty} \| \nabla(\rho^{n+1}-\rho^n)\|_{L^2} \| \rho^{n+1}-\rho^n\|_{L^2} + \| u^n-u^{n-1}\|_{L^6} \| \nabla \rho^n\|_{L^3} \| \rho^{n+1}-\rho^n\|_{L^2} \\ &\quad \leq C\left(\|\rho^{n+1}-\rho^n\|_{H^1}^2 + \| u^n-u^{n-1} \|_{H^1}^2 \right), \end{aligned} \end{align} where we used the Sobolev embedding $H^1(\mathbb T^3) \subseteq L^6(\mathbb T^3)$ and the Young's inequality for the last inequality. \newline \noindent $\bullet$ (First order estimate): For $j=1,2,3$, we use H\"older's inequality to have \begin{align} \label{E-7} \begin{aligned} &\frac 12 \frac{d}{dt} \| \partial_{x_j}(\rho^{n+1}-\rho^n)\|^2_{L^2} \\ &\quad = -\int_{\mathbb T^3}\left( \partial_{x_j} u^n \cdot \nabla(\rho^{n+1}-\rho^n) + u^n \cdot \nabla \partial_{x_j}(\rho^{n+1}-\rho^n)\right)\partial_{x_j}(\rho^{n+1}-\rho^n)\,dx \\ &\qquad - \int_{\mathbb T^3} \left( \partial_{x_j}(u^n-u^{n-1})\cdot \nabla \rho^n - (u^n-u^{n-1})\cdot \nabla \partial_{x_j} \rho^n \right) \partial_{x_j}(\rho^{n+1}-\rho^n)\,dx \\ &\quad \leq C\| \partial_{x_j} u^n\|_{L^\infty} \| \nabla(\rho^{n+1}-\rho^n)\|_{L^2}^2 + \| \nabla u^n\|_{L^\infty} \| \partial_{x_j}(\rho^{n+1}-\rho^n)\|_{L^2}^2 \\ &\qquad + \left( \| \partial_{x_j}(u^n-u^{n-1})\|_{L^2} \| \nabla \rho^n\|_{L^\infty} + \|u^n- u^{n-1}\|_{L^6} \| \nabla \partial_{x_j} \rho^n\|_{L^3} \right) \| \partial_{x_j}(\rho^{n+1}-\rho^n)\|_{L^2}\\ &\quad \leq C\left( \| \rho^{n+1}-\rho^n\|^2_{H^1} + \| u^n- u^{n-1} \|^2_{H^1}\right). \end{aligned} \end{align} \noindent $\bullet$ (Second order estimate): Similarly, for $i,j=1,2,3$, we obtain \begin{align} \label{E-8} \begin{aligned} &\frac{1}{2}\frac{d}{dt}\|\partial_{x_i}\partial_{x_j}(\rho^{n+1}-\rho^n)\|_{L^2}^2 \\ &\quad = - \int_{\mathbb T^3}\partial_{x_i}\partial_{x_j}(\rho^{n+1}-\rho^n)(\partial_{x_i}\partial_{x_j} u^n \cdot(\rho^{n+1}-\rho^n) +\partial_{x_j} u^n \cdot \nabla \partial_{x_i}(\rho^{n+1}-\rho^n))\,dx \\ &\qquad- \int_{\mathbb T^3}\partial_{x_i}\partial_{x_j}(\rho^{n+1}-\rho^n)(\partial_{x_i} u^n \cdot \nabla \partial_{x_j}(\rho^{n+1}-\rho^n) + u^n \cdot \nabla \partial_{x_i}\partial_{x_j}(\rho^{n+1}-\rho^n))\,dx\\ &\qquad- \int_{\mathbb T^3} \partial_{x_i}\partial_{x_j}(\rho^{n+1}-\rho^n)(\partial_{x_i}\partial_{x_j}(u^n-u^{n-1})\cdot \nabla \rho^n + \partial_{x_j}(u^n-u^{n-1})\cdot \nabla \partial_{x_i} \rho^n)\,dx\\ &\qquad- \int_{\mathbb T^3}\partial_{x_i}\partial_{x_j}(\rho^{n+1}-\rho^n)(\partial_{x_i}(u^n-u^{n-1})\cdot \nabla \partial_{x_j} \rho^n + (u^n-u^{n-1})\cdot \nabla \partial_{x_i}\partial_{x_j} \rho^n)\,dx \\ &\quad \leq C(\|\rho^{n+1}-\rho^n\|_{H^2}^2 + \|u^n-u^{n-1}\|_{H^2}^2). \end{aligned} \end{align} Then, the conclusion follows from the summation of \eqref{E-6}, \eqref{E-7}, and \eqref{E-8}. \end{proof} \begin{lemma} \label{lem_cauchy3} Let $(f^{n},\rho^{n},u^n)$ be the solution to system \eqref{app_main}. Then we have the following estimate: \begin{align}\begin{aligned} \label{cauchy-3} &\|(u^{n+1}-u^n)(t)\|_{L^2}^2 + \int_0^t \int_{\mathbb T^3} \| \nabla (u^{n+1}-u^n)(s) \|_{L^2}^2 \,dxds \\ \quad & \leq C_T \int_0^t \|(u^n-u^{n-1})(s)\|^2_{H^1} + \|(\rho^{n+1}-\rho^n)(s)\|^2_{H^2} + \|(f^{n+1}-f^n)(s)\|^2_{q}\,ds. \end{aligned}\end{align} \end{lemma} \begin{proof} We first use $\eqref{app_main}_3$ to find \begin{align} \label{E-9} \begin{aligned} &\rho^n \partial_t(u^{n+1} - u^n) \\ &\quad = -\rho^n u^{n-1} \cdot \nabla(u^{n+1}-u^n) + \Delta(u^{n+1}-u^n) - \nabla(p^{n+1}-p^n) - (\rho^{n+1}-\rho^n) \partial_t u^{n+1} \\ &\qquad - (\rho^{n+1}-\rho^n)u^n \cdot \nabla u^{n+1} - \rho^n(u^n- u^{n-1})\cdot \nabla u^{n+1} - (\rho^{n+1}-\rho^n) \int_{\mathbb R^3}(u^n-v)f^{n+1}dv \\ &\qquad -\rho^n \int_{\mathbb R^3}(u^n-u^{n-1})f^{n+1}dv - \rho^n \int_{\mathbb R^3}(u^n-v)(f^{n+1}-f^n)\,dv. \end{aligned} \end{align} Then, we have \begin{align*} &\frac 12 \frac{d}{dt} \int_{\mathbb T^3} \rho^n |u^{n+1}-u^n|^2 \,dx \\ &\quad= \frac 12 \int_{\mathbb T^3} \partial_t \rho^n | u^{n+1}-u^n|^2\,dx + \int_{\mathbb T^3} \rho^n(u^{n+1}-u^n) \cdot \partial_t(u^{n+1}-u^n)\,dx\\ &\quad = \frac 12 \int_{\mathbb T^3} \partial_t \rho^n | u^{n+1}-u^n|^2\,dx + \int_{\mathbb T^3}(u^{n+1}-u^n) \cdot \bigg( -\rho^n u^{n-1} \cdot \nabla(u^{n+1}-u^n) \\ &\qquad + \Delta(u^{n+1}-u^n) - \nabla(p^{n+1}-p^n) - (\rho^{n+1}-\rho^n)\partial_t u^{n+1} - (\rho^{n+1}-\rho^n)u^n \cdot \nabla u^{n+1} \\ &\qquad + \rho^n(u^n-u^{n-1}) \cdot \nabla u^{n+1} - (\rho^{n+1}-\rho^n) \int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv - \rho^n \int_{\mathbb R^3}(u^n-u^{n-1})f^{n+1}\,dv \\ &\qquad - \rho^n \int_{\mathbb R^3} (u^n-v)(f^{n+1}-f^n)\,dv \bigg) \,dx \\ &\quad =: \sum_{i=1}^{10} \mathcal J_i. \end{align*} The estimates of each term $\mathcal J_i, i=1,\cdots,10$ are given as follows. \begin{align*} & \mathcal J_1 = -\frac 12 \int_{\mathbb T^3} (u^{n-1} \cdot \nabla \rho^n)|u^{n+1}-u^n|^2\,dx \lesssim \| u^{n+1}-u^n\|_{L^2}^2,\\ & \mathcal J_2 \lesssim \| u^{n+1}-u^n\|_{L^2} \| \nabla(u^{n+1}-u^n)\|_{L^2} \lesssim \| u^{n+1}-u^n\|_{L^2}^2 + \| \nabla(u^{n+1}-u^n)\|_{L^2}^2, \\ & \mathcal J_3 = - \| \nabla(u^{n+1}-u^n)\|_{L^2}^2, \qquad \mathcal J_4 = 0, \\ & \mathcal J_5 \leq \|u^{n+1}-u^n\|_{L^2} \| \partial_t u^{n+1}\|_{L^2 }\| \rho^{n+1} - \rho^n \|_{L^\infty} \lesssim \|u^{n+1}-u^n\|_{L^2}^2+ \| \rho^{n+1} - \rho^n \|_{H^2}^2,\\ & \mathcal J_6 \leq \|u^n\|_{L^6}\| \nabla u^{n+1}\|_{L^6}\| \rho^{n+1}-\rho^n\|_{L^6} \|u^{n+1}-u^n\|_{L^2} \lesssim \|\rho^{n+1}-\rho^n\|_{H^1}^2 + \|u^{n+1}-u^n\|_{L^2}^2,\\ & \mathcal J_7 \leq \| \rho^n\|_{L^\infty} \| u^{n+1}-u^n\|_{L^6} \| u^n-u^{n-1}\|_{L^2} \| \nabla u^{n+1}\|_{L^3} \lesssim \|\nabla(u^{n+1}-u^n)\|_{L^2}^2+ \|u^n-u^{n-1}\|_{L^2}^2,\\ & \mathcal J_8 \leq \|u^{n+1}-u^n\|_{L^2} \| \rho^{n+1}-\rho^n\|_{L^6} \left\| \int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv \right\|_{L^3} \lesssim \| u^{n+1}-u^n\|_{L^2}^2 + \| \rho^{n+1}-\rho^n\|_{H^1}^2. \end{align*} Here, the last term was estimated as follows: \begin{align*} \left\| \int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv \right\|_{L^3} &\lesssim \left\| \int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv \right\|_{L^\infty} \\ &\leq \left\| \int_{\mathbb R^3} u^n f^{n+1}\,dv\right\|_{L^\infty} + \left\|\int_{\mathbb R^3} vf^{n+1}\,dv \right\|_{L^\infty} \\ &\leq \|u^n\|_{L^\infty}\|f^{n+1}\|_q + \|f^{n+1}\|_q \leq C. \end{align*} Similarly, $\mathcal J_9$ and $\mathcal J_{10}$ can be estimated as follows. \begin{align*} \mathcal J_9 &\leq \| \rho^n\|_{L^\infty} \|u^{n+1}-u^n\|_{L^2}\|u^n- u^{n-1}\|_{L^6} \left\|\int_{\mathbb R^3}f^{n+1}\,dv \right\|_{L^3} \\ & \lesssim \|u^{n+1}-u^n\|_{L^2}^2 + \|u^n-u^{n-1}\|_{H^1}^2, \end{align*} \begin{align*} \mathcal J_{10} &\leq \| \rho^n\|_{L^\infty} \| u^{n+1}-u^n\|_{L^2} \left\| \int_{\mathbb R^3}(u^n-v)(f^{n+1}-f^n)\,dv \right\|_{L^2} \\ & \leq \| \rho^n\|_{L^\infty} \| u^{n+1}-u^n\|_{L^2} ( \|u^n\|_{L^\infty}+1)\|f^{n+1}-f^n\|_q \\ &\lesssim \|u^{n+1}-u^n\|_{L^2}^2 + \| f^{n+1}-f^n\|_q^2. \end{align*} We sum up the estimates above and integrate from 0 to $t$ to get \begin{align*} &\int_{\mathbb T^3}\rho^n |u^{n+1}-u^n|^2\,dx +\int_0^t \| \nabla(u^{n+1}-u^n)(s)\|_{L^2}^2\,ds \\ &\qquad \leq C_T \int_0^t \|(u^n-u^{n-1})(s)\|^2_{H^1} + \|(\rho^{n+1}-\rho^n)(s)\|^2_{H^2} + \|(f^{n+1}-f^n)(s)\|^2_{q}\,ds. \end{align*} Finally, the conclusion follows in view of Lemma \ref{lem_rho}. \end{proof} \begin{lemma} \label{lem_cauchy4} Let $(f^{n},\rho^{n},u^n)$ be the solution to system \eqref{app_main}. Then we have the following estimate: \begin{align} \label{cauchy-4} \begin{aligned} &\|\nabla(u^{n+1}-u^n)(t)\|^2_{L^2} + \int_0^t \|\partial_s(u^{n+1}-u^n)(s)\|^2_{L^2}\,ds \\ &\quad \leq C_T \int_0^t \|(\rho^{n+1}-\rho^n)(s)\|^2_{H^2} + \|(u^n-u^{n-1})(s)\|^2_{H^1} + \|(f^{n+1}-f^n)(s)\|^2_{q}\,ds. \end{aligned} \end{align} \end{lemma} \begin{proof} We take an inner product of both sides of \eqref{E-9} with $\partial_t(u^{n+1}-u^n)$ and integrate it over $\mathbb T^3$ to find \begin{align*} &\int_{\mathbb T^3} \rho^n |\partial_t(u^{n+1}-u^n)|^2\,dx + \frac{1}{2}\frac{d}{dt}\int_{\mathbb T^3}| \nabla (u^{n+1}-u^n)|^2\,dx \\ &\quad = -\int_{\mathbb T^3} \partial_t(u^{n+1}-u^n) \cdot \bigg(\rho^n u^{n-1}\cdot \nabla(u^{n+1}-u^n) + (\rho^{n+1}-\rho^n) \partial_t u^{n+1} \\ &\qquad + (\rho^{n+1}-\rho^n)u^n \cdot \nabla u^{n+1} + \rho^n(u^n - u^{n-1})\cdot \nabla u^{n+1} + (\rho^{n+1}-\rho^n) \int_{\mathbb R^3} (u^n-v)f^{n+1}\,dv \\ &\qquad + \rho^n \int_{\mathbb R^3}(u^n-u^{n-1}) f^{n+1}\,dv + \rho^n \int_{\mathbb R^3}(u^n-v)(f^{n+1}-f^n) \,dv \bigg)\,dx \\ &\quad =: \sum_{i=1}^7 \mathcal K_i. \end{align*} We can derive the estimates similar to those in Lemma \ref{lem_cauchy3}. \begin{align*} \mathcal K_1 &\leq \| \rho^n\|_{L^\infty} \|u^{n-1}\|_{L^\infty} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \| \nabla(u^{n+1}-u^n)\|_{L^2}\\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \| \nabla(u^{n+1}-u^n)\|_{L^2}^2,\\ \mathcal K_2 &\leq \| \rho^{n+1}-\rho^n\|_{L^\infty} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \| \partial_t u^{n+1}\|_{L^2} \\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \| \rho^{n+1}-\rho^n\|_{H^2}^2,\\ \mathcal K_3 &\leq \| \rho^{n+1}-\rho^n\|_{L^6} \|u^n\|_{L^\infty} \| \nabla u^{n+1}\|_{L^3} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \| \rho^{n+1}-\rho^n\|_{H^1}^2,\\ \mathcal K_4 &\leq \| \rho^n\|_{L^\infty} \|u^n-u^{n-1}\|_{L^6} \| \nabla u^{n+1}\|_{L^3} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \|u^n-u^{n-1}\|_{H^1}^2,\\ \mathcal K_5 &\leq \|\rho^{n+1}-\rho^n\|_{L^6} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \left\| \int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv \right\|_{L^3} \\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \| \rho^{n+1}-\rho^n\|_{H^1}^2,\\ \mathcal K_6 &\leq \| \rho^n\|_{L^\infty} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \|u^n-u^{n-1}\|_{L^6}\left\| \int_{\mathbb R^3}f^{n+1}\,dv \right\|_{L^3} \\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \|u^n-u^{n-1}\|_{H^1}^2, \\ \mathcal K_7 &\leq \| \rho^n\|_{L^\infty} \| \partial_t(u^{n+1}-u^n)\|_{L^2} \left\| \int_{\mathbb R^3}(u^n-v)(f^{n+1}-f^n)\,dv \right\|_{L^2}\\ &\lesssim \| \partial_t(u^{n+1}-u^n)\|_{L^2}^2 + \|f^{n+1}-f^n\|_q^2. \end{align*} So, we have \begin{align*} &\int_{\mathbb T^3} \rho^n |\partial_t(u^{n+1}-u^n)|^2 \,dx + \frac{1}{2}\frac{d}{dt}\int_{\mathbb T^3}| \nabla (u^{n+1}-u^n)|^2 \,dx \\ &\qquad \lesssim \|\rho^{n+1}-\rho^n\|^2_{H^2} + \|u^n-u^{n-1}\|^2_{H^1} + \|f^{n+1}-f^n\|^2_{q}. \end{align*} Finally, we take an integration from 0 to $t$ and use Lemma \ref{lem_rho} to obtain the desired result. \end{proof} \begin{lemma} \label{lem_cauchy5} Let $(f^{n},\rho^{n},u^n)$ be the solution to system \eqref{app_main}. Then we have the following estimate: \begin{align} \begin{aligned} \label{cauchy-5} &\| \nabla^2(u^{n+1}-u^n)\|^2_{L^2} + \| \nabla(p^{n+1}-p^n)\|^2_{L^2} \\ & \quad \leq C( \|\rho^{n+1}-\rho^n\|^2_{H^2} + \|\partial_t(u^{n+1}-u^n)\|^2_{L^2} + \| \nabla(u^n-u^{n-1})\|^2_{L^2} )\\ &\qquad + \| \nabla(u^{n+1}-u^n)\|^2_{L^2} + \|f^{n+1}-f^n\|^2_{q}). \end{aligned} \end{align} \end{lemma} \begin{proof} We obtain from \eqref{C-5-0} and \eqref{C-5} that \begin{align*} & \| \nabla^2(u^{n+1}-u^n)\|_{L^2}^2 + \| \nabla(p^{n+1}-p^n)\|_{L^2}^2 \\ &\quad \lesssim \|(\rho^{n+1}-\rho^n)\partial_t u^{n+1}\|_{L^2}^2 + \| \rho^n \partial_t (u^{n+1}-u^n)\|_{L^2}^2 + \|(\rho^{n+1}-\rho^n) u^n \cdot \nabla u^{n+1}\|_{L^2}^2 \\ &\qquad + \| \rho^n(u^n-u^{n-1})\cdot \nabla u^{n+1}\|_{L^2}^2 + \| \rho^n u^{n-1} \cdot \nabla(u^{n+1}-u^n)\|_{L^2}^2 \\ &\qquad + \left\|(\rho^{n+1}-\rho^n) \int_{\mathbb R^3}(u^n-v)f^{n+1}\,dv \right\|_{L^2}^2 + \left\| \rho^n \int_{\mathbb R^3}(u^n-u^{n-1})f^{n+1}\,dv \right\|_{L^2}^2 \\ &\qquad + \left\| \rho^n \int_{\mathbb R^3}(u^n-v)(f^{n+1}-f^n)\,dv \right\|_{L^2}^2\\ &\quad =: \sum_{i=1}^8 \mathcal L_i. \end{align*} The estimates for $\mathcal L_i$ can be done in the way similar to Lemma \ref{cauchy-3} and we omit the details. \begin{align*} &\mathcal L_1, \,\mathcal L_3, \,\mathcal L_6 \lesssim \|\rho^{n+1}-\rho^n\|_{H^2}^2, \quad \mathcal L_2 \lesssim \|\partial_t(u^{n+1}-u^n)\|_{L^2}^2, \\ &\mathcal L_4, \, \mathcal L_7 \lesssim \| \nabla (u^n-u^{n-1})\|_{L^2}^2, \quad \mathcal L_5 \lesssim \| \nabla(u^n-u^{n-1})\|_{L^2}^2,\quad \mathcal L_8 \lesssim \|f^{n+1}-f^n\|_q^2 \end{align*} \end{proof} \subsection{Proof of Theorem \ref{thm_main}} We are now ready to prove the existence and uniqueness of solution to \eqref{main}. \newline \noindent $\bullet$ (Existence): We sum up \eqref{cauchy-1}, \eqref{cauchy-3}, and \eqref{cauchy-4} using \eqref{cauchy-2} to derive \begin{align} \begin{aligned} \label{D-1} &\|f^{n+1}-f^n\|_{q}^2 + \|u^{n+1}-u^n\|^2_{H^1} + \int_0^t \| \nabla(u^{n+1}-u^n)(s)\|^2_{L^2} + \|\partial_s(u^{n+1}-u^n)(s)\|^2_{L^2}\,ds \\ &\quad \leq C \int_0^t \|(u^n-u^{n-1})(s)\|^2_{H^1} + \|(f^n-f^{n-1})(s)\|^2_{q}\,ds + C \int_0^t \int_0^s \|(u^n-u^{n-1})(\tau)\|^2_{H^2}\,d\tau ds. \end{aligned} \end{align} We integrate both sides of \eqref{cauchy-5} from 0 to $t$ and use \eqref{cauchy-2} again to have \begin{align} \begin{aligned} \label{D-2} &\int_0^t \| \nabla^2(u^{n+1}-u^n)(s)\|^2_{L^2} \cr &\quad \leq C\int_0^t \|(u^n-u^{n-1})(s)\|^2_{H^1}\,ds + \|\nabla(u^{n+1}-u^n)(s)\|^2_{L^2}\,ds \\ & \qquad + C\int_0^t \|(\partial_s(u^{n+1}-u^n)(s)\|^2_{L^2} \,ds + C\int_0^t \int_0^s \|(u^n-u^{n-1})(\tau)\|^2_{H^2} \,d\tau ds. \end{aligned} \end{align} Combining \eqref{D-1} and \eqref{D-2} yields $$\begin{aligned} &\|f^{n+1}-f^n\|_{q}^2 + \|u^{n+1}-u^n\|^2_{H^1} + \int_0^t \| \nabla(u^{n+1}-u^n)(s)\|^2_{H^1}\,ds \\ &\quad \leq C \int_0^t \left(\|(f^{n+1}-f^n)(s)\|_{q}^2 + \| (u^n-u^{n-1})(s)\|^2_{H^1}\right)ds +C\int_0^t \left( \int_0^s \| \nabla(u^n-u^{n-1})(\tau)\|^2_{H^1}\,d\tau \right)\,ds. \end{aligned}$$ Using the induction argument, we have \begin{align*} &\|f^{n+1}-f^n\|^2_{\mathcal C([0,T];L_q^\infty)} + \|u^{n+1}-u^n\|_{\mathcal C([0,T];H^1)}^2 + \| \nabla(u^{n+1}-u^n)\|_{L^2(0,T;H^1)}^2 \\ & \qquad \leq \frac{C(T)^{n+1}}{n!}, \end{align*} which yields that there exist the limit function $(f,\rho,u)$ such that $$\begin{aligned} &f^n \to f \quad \mbox{in}~\mathcal C([0,T];L^\infty_{q}(\mathbb T^3 \times \mathbb R^3)), \quad \rho^n \to \rho \quad \mbox{in}~ \mathcal C([0,T];H^2(\mathbb T^3)) \\ &u^n \to u \quad \mbox{in}~\mathcal C([0,T];H^1(\mathbb T^3)) \cap L^2([0,T];H^2(\mathbb T^3)). \end{aligned}$$ On the other hand, in view of uniform-in-$n$ boundedness(Lemmas \ref{lem_kinet} and \ref{lem_fluid}), Banach-Alaoglu theorem yields that there exists a subsequence $(f^{n_k},\rho^{n_k},u^{n_k})$ and its weak limit $(\widetilde f, \widetilde \rho, \widetilde u)$ such that $$\begin{aligned} &f^{n_k }\rightharpoonup \widetilde f \quad \mbox{weakly}-\ast \quad \mbox{in}~\mathcal C([0,T];W^{1,\infty}_{q}(\mathbb T^3 \times \mathbb R^3)), \\ & \rho^{n_k} \rightharpoonup \widetilde \rho \quad \mbox{in}~\mathcal C([0,T];H^3(\mathbb T^3)),\quad \mbox{and} \\ &u^{n_k} \rightharpoonup \widetilde u \quad \mbox{in}~\mathcal C([0,T];H^2(\mathbb T^3)) \cap L^2(0,T;H^3(\mathbb T^3)). \end{aligned}$$ Then, we have \begin{align*} &f \equiv \widetilde f \quad \mbox{in}~\mathcal C([0,T];L^\infty_{q}(\mathbb T^3 \times \mathbb R^3)), \quad \rho \equiv \widetilde \rho \quad \mbox{in}~ \mathcal C([0,T];H^2(\mathbb T^3)),\quad \mbox{and} \\ &u \equiv \widetilde u \quad \mbox{in}~\mathcal C([0,T];H^1(\mathbb T^3)) \cap L^2([0,T];H^2(\mathbb T^3)), \end{align*} which is due to the uniqueness of weak limit. We now claim that indeed \begin{align*} &f \equiv \widetilde f \quad \mbox{in}~\mathcal C([0,T];W_q^{1,\infty}(\mathbb T^3 \times \mathbb R^3)), \quad \rho \equiv \widetilde \rho \quad \mbox{in}~ \mathcal C([0,T];H^3(\mathbb T^3)),\quad \mbox{and} \\ &u \equiv \widetilde u \quad \mbox{in}~\mathcal C([0,T];H^2(\mathbb T^3)) \cap L^2([0,T];H^3(\mathbb T^3)). \end{align*} To this end, \begin{align*} \left| \int_{\mathbb T^3 \times \mathbb R^3}\partial(f-\widetilde f)\phi \,dxdv\right| &= \left|\int_{\mathbb T^3 \times \mathbb R^3}(f-\widetilde f)\partial \phi \, dxdv \right| \\ &\leq \|f-\widetilde f\|_{\mathcal C(0,T;L^\infty)}\left| \int_{\mathbb T^3 \times \mathbb R^3}|\partial \phi|\,dxdv \right| = 0, \end{align*} for $\forall \phi \in \mathcal C_c^\infty(\mathbb T^3 \times \mathbb R^3)$. Thus, we have $\partial f = \partial \widetilde f$ a.e. in $\mathbb T^3 \times \mathbb R^3$ and the first assertion holds. Similarly, \begin{align*} \left| \int_{\mathbb T^3}\nabla^2 (u-\widetilde u)\phi \, dx\right| &= \left|\int_{\mathbb T^3}\nabla(u-\widetilde u)\nabla \phi \,dx\right| \\ &\leq \| \nabla(u-\widetilde u)\|_{\mathcal C(0,T;L^2)} \|\nabla \phi\|_{L^2} = 0, \quad \forall \phi \in \mathcal C_c(\mathbb T^3), \end{align*} which implies $u \equiv \widetilde u ~ \mbox{in}~\mathcal C([0,T];H^2(\mathbb T^3))$. Moreover, it gives \begin{align*} \left|\int_0^T \int_{\mathbb T^3}\nabla^3(u-\widetilde u)\phi\,dxds \right| &= \left|\int_0^T \int_{\mathbb T^3}\nabla^2(u-\widetilde u)\nabla \phi \,dxds\right| \\ &\leq \left|\int_0^T \| \nabla^2(u-\widetilde u)\|_{L^2} \|\nabla \phi\|_{L^2}\, ds \right| = 0, \end{align*} which yields $\nabla^3 u = \nabla^3 \widetilde u$, a.e. in $\mathbb T^3 \times [0,T]$ and the third assertion holds. The second assertion can be proved in the same way, and we omit the proof. It now remains to prove the strong convergence of local Maxwellian $\mathcal M(f^n) \to \mathcal M(f)$ as $n \to \infty$, and it suffices to show the strong convergence of the macroscopic fields $(\rho_{f^n},U_{f^n},T_{f^n}) \to (\rho_f,U_f,T_f)$. First, note that \begin{align*} |\rho_{f^n}-\rho_f| \leq \int_{\mathbb R^3}|f^n-f|\,dv \lesssim \|f^n-f\|_q \to 0 \quad \mbox{as}~n \to \infty. \end{align*} Using this convergence and Lemma \ref{lem_macro_bdd}, we have \begin{align*} |U_{f^n}-U_f| &= \left| \frac{1}{\rho_{f^n}}\int_{\mathbb R^3}vf^n\,dv - \frac{1}{\rho_{f}}\int_{\mathbb R^3}vf \,dv \right| \\ &\leq \frac{1}{\rho_{f^n}} \left| \int_{\mathbb R^3}v(f^n-f)\,dv \right| + \left| \frac{1}{\rho_{f^n}}-\frac{1}{\rho_f} \right| \left| \int_{\mathbb R^3}vf\,dv \right| \\ &\lesssim \|f^n-f\|_q + |\rho_{f^n}-\rho_f| \to 0 \quad \mbox{as}~n \to \infty. \end{align*} In the similar way, we get $$\begin{aligned} &|T_{f^n}-T_f| \\ &\quad \leq \left| \frac{1}{3\rho_{f^n}} - \frac{1}{3\rho_f} \right| \int_{\mathbb R^3}|v-U_{f^n}|^2 f^n dv + \frac{1}{3\rho_f}\left|\int_{\mathbb R^3}|v-U_{f^n}|^2 f^n dv - \int_{\mathbb R^3} |v-U_f|^2 f dv \right| \\ &\quad \lesssim |\rho_{f^n}-\rho_f| + \int_{\mathbb R^3}|v-U_{f^n}|^2 |f^n-f|\,dv + \int_{\mathbb R^3}\left| |v-U_{f^n}|^2 - |v-U_f|^2 \right| f \,dv \\ &\quad \lesssim |\rho_{f^n}-\rho_f| + \int_{\mathbb R^3}(1+|v|)^2 |f^n-f|\,dv + |U_{f^n} - U_f| \int_{\mathbb R^3} (1+ |v|)f\,dv \\ &\quad \lesssim |\rho_{f^n}-\rho_f| + \|f^n-f\|_q + |U_{f^n}-U_f| \to 0 \quad \mbox{as}~n \to \infty. \end{aligned}$$ \noindent $\bullet$ (Uniqueness): Let $(f_1,\rho_1,u_1)$ and $(f_2,\rho_2,u_2)$ be the solutions to system \eqref{main}-\eqref{ini_main} with the same initial data $(f_0,\rho_0,u_0)$. Using the argument similar to that in a series of Lemmas in this section, we can prove that the functional $\Delta(t) := \|f_1-f_2\|_{q}^2 + \|\rho_1-\rho_2\|_{H^2}^2 + \|u_1-u_2\|_{H^1}^2$ satisfies the following Gr\"onwall's inequality: \[ \Delta(t) \lesssim \int_0^t \Delta(s)\,ds, \quad \Delta(0) = 0, \] which readily gives that \begin{align*} &f_1 \equiv f_2 \quad \mbox{in}~\mathcal C([0,T];L_q^\infty(\mathbb T^3 \times \mathbb R^3)), \quad \rho_1 \equiv \rho_2 \quad \mbox{in}~\mathcal C([0,T];H^2(\mathbb T^3)), \quad \mbox{and}\\ &u_1 \equiv u_2 \quad \mbox{in}~\mathcal C([0,T];H^1(\mathbb T^3)) \cap L^2([0,T];H^2(\mathbb T^3)). \end{align*} The same result for the higher regularity can be shown in the exactly same way as in the existence part.
\section{\label{sec:intro}Introduction} Transition metal oxides (TMOs) host interesting structural and electronic transitions as well as the emergent phenomenon of high-temperature superconductivity\cite{Kivelson2003,Dagotto2001,Keimer2015,Tranquada2008}. In addition, these materials host charge, spin and orbital orders which are coupled to the lattice and are believed to compete with superconductivity in interesting ways\cite{Hucker2011}. Many of these TMOs exhibit charge density wave (CDW) phases, characterized by periodic modulation of conduction electrons, which suppress/co-exist with superconductivity\cite{Comin2016,Tranquada1995,Li2007}. The prototypical example of a high-temperature superconductors with competing CDW order is La$_{1.875}$Ba$_{0.125}$CuO$_{4}$~(LBCO). The occurrence of CDW order is closely tied to the lattice symmetry. LBCO has a high temperature tetragonal (HTT) crystal structure at room temperature, switching upon cooling to a low-temperature-orthorhombic~(LTO) structure with a transition temperature of about 240~K, then followed by a low-temperature-tetragonal~(LTT) phase with a transition temperature of 54~K. The HTT phase is characterized by untilted CuO$_{6}$ octahedra; in LTO they are tilted along the Cu-Cu bond direction, and in the LTT phase they are tilted along the Cu-O bond direction \cite{Hucker2011,Bozin2015,Axe1989,Achkar2016}. Like in other second-order phase transitions\cite{Goldstone1962}, the HTT-LTO structural transition is mediated by a soft phonon mode\cite{Birgeneau1987}. This structural phase transition has been studied with different X-ray/neutron scattering \cite{Hucker2011,Bozin2015,Fabbris2013} and transmission electron microscopy techniques\cite{Zhu1994,Horibe1997,Horibe2000}. These structural phase transitions can be modeled by solving the Ginzburg-Landau (GL) free-energy functional by considering a symmetry-invariant combination of order parameters\cite{Axe1989,Landau1937}. Derived physical properties such as the orthorhombic strain tensor and the coupling with a local order parameter can be extracted after minimizing the GL free-energy\cite{Ting1993}. Long range CDW order occurs only in the LTT phase of LBCO\cite{Fujita2004,Hucker2011,Wilkins2011,Miao2017,Miao2019}. Soft X-ray coherent scattering experiments have shown that the CDW phase is quite static\cite{Chen2016}, and the CDW pinning landscape is inherited from a domain wall structure of the LTO phase\cite{Chen2019}. Recently, a speckle correlation analysis on (012)$_{\textrm{LTO}}$ diffraction peak showed, the diffraction patterns changed whenever the sample heated above the HTT-LTO transition temperature, indicating the LTO domains are not spatially pinned in space\cite{Robinson2019}. Characterizing the LTO domains in three dimensions, is therefore relevant in understanding the physics behind the pinning phenomenon. In this regard, Bragg coherent diffraction imaging (BCDI) is an ideal probe technique to look at samples of micron-size scale, giving a real-space image of the domain texture in these materials. In a far-field limit, the diffraction pattern collected from a finite crystal is related to the Fourier transform of the electron density. It is difficult to recover the image of electron density since we lost the phase information. However, in BCDI technique the inverse phase problem can be retrieved given a diffraction pattern is oversampled with respect to the spatial Nyquist-Shannon sampling frequency\cite{Shannon1949} and with suitable phase retrieval algorithms\cite{Fienup1978,Gerchberg1972}. When a nanocrystal is illuminated with coherent X-rays with a coherence volume larger than the sample, then the diffraction pattern contains interference from all its regions appearing as fringes surrounding the Bragg peak in three dimensions\cite{Miao1999,Robinson2001,Vartanyants2001}. The simplest fringes are those which arise from interference between opposing facets on the crystal shape. Then diffraction patterns are collected with small rotations of the crystal, which comprises a complete three-dimension map of reciprocal space around the Bragg reflection. Then with appropriate choice of iterative algorithms the complete three-dimensional data can be inverted to give the electron density of the crystal\cite{Robinson2009} In this paper, we present 3D renderings of LTO domains within an LBCO single crystal sample, obtained using the BCDI technique\cite{Robinson2009,Robinson2016,Pfeifer2006}. Inverted images show the formation of domains as we cool down the sample below the HTT-LTO phase transition temperature. A slice through the rendered inverted images shows the internal structure of LTO domains and the domain walls formed along the [110]$_{\textrm{HTT}}$ as a stack. In addition, from reconstructed images, we estimate the LTO domain size to be between 200-400~nm at 228~K, which is consistent with TEM results\cite{Horibe2000}. \section{\label{sec:Experiments}Experimental methods} A high-quality single crystal of LBCO was prepared by the floating zone method\cite{Gu1993}. To obtain the micron size crystal needed for the BCDI study, the large LBCO crystal was oriented crystallographically using a Laue diffractometer. Then a 1.6$\times$1.6$\times$1.6$\mu$m$^{3}$ cube sample was cut out from the pre-oriented crystal via the in-situ lift-out method utilizing the Omniprobe manipulation system and Field Electron and Ion (FEI) Helios 600 dual-beam focused-ion-beam (FIB) (See Fig.~\ref{fig:Fig1})\cite{Hofmann2017}. The size of the cube was chosen to be less than the extinction depth of 9 keV X-rays in LBCO to minimize dynamical diffraction effects\cite{Hu2018,Civita2018,Shabalin2017}. Then the sample was welded with Pt onto a silicon wafer. This procedure was carried out at the Center for Functional Nanomaterials (CFN) at Brookhaven National Laboratory (BNL). In addition to the Pt-wielding, a solution of 2$~\%$ Tetraethyl-orthosilicate (TEOS) in ethanol was drop-casted on the LBCO cube and then annealed for about 5 hours at about 700 K in an oxygen atmosphere to avoid loss of oxygen during the annealing process. This method has been used for small metal nanocrystals, and has proved an important step to keep the nanocrystals fixed during transportation and measurements\cite{Monteforte2016}. Then the sample was mounted on a custom modified Linkam stage for BCDI measurements where the flow of liquid nitrogen can be controlled precisely by the T96 controller to set a specific target temperature and program linear cooling ramps up to 373 K/min. The complete cooling system has a controller, a pump, the Linkam stage, and a liquid nitrogen holder Dewar. The system allows cooling down to about 173 K, and low cooling rates give less icing and reduce noise and vibration. \begin{figure}[ht!] \includegraphics[trim={2.cm 0 0 0},clip,scale=0.7]{Figure1.png} \caption{\label{fig:Fig1}(a) Scanning Electron Microscopy (SEM) image of the 1.6x1.6x1.6$\mu$m$^{3}$ cube-shaped LBCO sample which was cut-out of a pre-oriented single crystal using the FIB milling process. The arrows indicate the direction of the incoming and diffracted X-ray beam. (b) Isosurface rendering of the reconstructed image obtained after phase retrieval.(C) Picture of the Linkam stage during the BCDI experiment.} \end{figure} Bragg coherent diffraction data were collected at the 34-ID-C beamline of the Advanced Photon Source (APS). For the coherent diffraction experiments, a monochromatic and Coherent X-ray beam size of 30(vertical)$\times$40(horizontal) $\mu$m$^{2}$ illuminated the LBCO cube sample. The X-ray beam size was chosen mainly because the 1.6 $\mu$m$^{3}$ cube sample is larger than the focused X-ray beam at 34-ID-C. Since the sample was pre-aligned, the precise crystal alignment was quickly determined. Then Coherent X-ray Diffraction (CXD) patterns from the (103)$_{\textrm{HTT}}$ and (114)$_{\textrm{HTT}}$ Bragg peaks were acquired using a Timepix detector mounted at 2m away from the sample. The full sensor of the detector has 512$\times$512 pixels with a pixel size of 55 $\mu$m. Diffraction data were collected at each step while rocking the sample in increments of 0.0025$^{\circ}$ around the Bragg peak. Before feeding the CXD data to an iterative phasing algorithm developed in Matlab\cite{Robinson2009,Pfeifer2006,Robinson2001,Robinson2008}, both whitefield correction and hot pixel removal were applied for each diffraction pattern. For the phasing, a combination of error-reduction (ER) and Hybrid-input-output (HIO) algorithms\cite{Gerchberg1972,Fienup1982} have been used alternately, with the iteration starting and ending with ER. The well-defined shapes/edges of the sample help to render the diffraction patterns invertible, which also allows us to use a fixed box-shaped support to assist the phasing algorithms. This is an essential experimental advancement because the soft edges of even the best-focused X-ray beams are currently thought to be insufficiently sharp to use as support constraints\cite{Fienup1978,Fienup1987}. Moreover, when the particle size is larger than both the longitudinal and transverse coherence length, the reconstructed images tend to have artifacts such as non-uniform amplitude distribution, with fewer facets and missing parts\cite{Leake2009}. In our case, this was mitigated by turning on the Partial Coherence Correction (PCC) in the iterative phasing algorithm at iteration ten and then turned off at about one-third way through the total iteration numbers\cite{Clark2012,Vartanyants2001,Search2001}. \section{\label{sec:BCDIresults}Bragg Coherent Diffraction Imaging Results} Our CXD results from the (103)$_{\textrm{HTT}}$ and (114)$_{\textrm{HTT}}$ structural Bragg peaks show similar behavior. As shown in Fig.~\ref{fig:Fig2}, both diffraction peaks are split on the detector, which is an indication of LTO twin-domain formation as reported from previous X-ray \cite{Axe1989} and electron diffraction measurements\cite{Zhu1994,Horibe1997,Chen1991,Chen1993,Chen1999}. Plots of the coherent diffraction patterns collected near the (103)$_{\textrm{HTT}}$ and (114)$_{\textrm{HTT}}$ Bragg reflections from the same sample are shown in Fig.~\ref{fig:Fig2}(a-d) and (e-h) respectively. Initially, both (103)$_{\textrm{HTT}}$ and (114)$_{\textrm{HTT}}$ diffraction peaks broaden as the sample temperature decreases. Then both the (103)$_{\textrm{HTT}}$ and (114)$_{\textrm{HTT}}$ diffraction peaks become split when the temperature falls below 240(5)~K. At all temperatures, both diffraction peaks are strongly speckled on the detector because of the high coherence of the beam and stability of the 34-ID-C setup. The diffraction peak splitting temperature is consistent with the HTT-LTO transition temperature, reported from previous X-ray and neutron measurements\cite{Hucker2011,Bozin2015,Axe1989}. \begin{figure}[ht!] \includegraphics[trim={1.8cm 1cm 0.5cm 0.8cm},clip,scale=0.7]{Figure2.png} \caption{\label{fig:Fig2}(a)-(f) Logarithmic-scale plots of (a)-(d) the (103)$_{\textrm{HTT}}$ Bragg peak and (e)-(f) the (114)$_{\textrm{HTT}}$ Bragg peak of the LBCO sample measured at different temperatures. The scale bar shown is 40 pixels corresponding to 1$\times$10$^{-1}$nm$^{-1}$. Both the $\delta$q$_{x}$ and $\delta$q$_{y}$ are mutually perpendicular reciprocal space vectors coplanar to the CCD surface and calculated as (2$\pi$/$\lambda$)(p/D), where $\lambda$=1.3776$\AA$ is the wavelength, p=55 $\mu$m is detector pixel size and D=2 m is sample-to-detector distance.} \end{figure} Moreover, three-dimensional (3D) diffraction data were collected from both Bragg reflections at several temperatures spanning the HTT to LTO phase transition. From the white-field and flat-field corrected images two regions of interest, ROI1 and ROI2 were integrated over the Bragg peak and far away for the background subtraction, respectively, and difference plotted as rocking curves, shown in Fig.~\ref{fig:Fig3}(a) and (b). Similar to what we observed in the 2D diffraction data, the rocking curves also show peak splitting. The (103)$_{\textrm{HTT}}$ peak split into multiple peaks on the detector as the sample temperature decreases continuously, whereas the (114)$_{\textrm{HTT}}$ peak has a tiny peak in the left side the rocking curve in the HTT phase, indicating inhomogeneity possibly introduced during ion-milling of the sample. As a result, both the peak splitting analysis and reconstruction will focus on the (103)$_{\textrm{HTT}}$ Bragg peak data. To calculate the total peak splitting displacement $\Delta q$ for the (103)$_{\textrm{HTT}}$ peak; first, we recorded the difference in pixel position $\Delta p_{\textrm{x}}$ and $\Delta p_{\textrm{y}}$ on the detector and the frame number $\Delta p_{\textrm{z}}$ for all temperatures. We convert the difference in pixels and frame number to $\textrm{\AA}^{-1}$ as $\Delta q_x = (2 \pi / \lambda)(p/D) \Delta p_x$, $\Delta q_y = (2 \pi / \lambda)(p/D) \Delta p_y$, and $\Delta q_z = Q \Delta \theta \Delta p_z$, where $\lambda$ is the X-ray wavelength, $Q$ is the momentum transfer, $p$ is the pixel size, $D$ is the detector distance and $\Delta \theta$ is the step size of the rocking scan. Finally, the three dimensional peak splitting shown in Fig.~\ref{fig:Fig3}(c) is calculated as $\Delta$q = $\sqrt{(\Delta q_{x}^2 + \Delta q_{y}^2 + \Delta q_{z}^2)}$. Figure~\ref{fig:Fig3}(c) shows that the peak splitting disappears at the expected HTT-LTO transition temperature indicating the formation of (113)$_{\textrm{LTO}}$ rotated twins domains. Moreover, the splitting onset temperature determined from the rocking curves shown in Figs.~\ref{fig:Fig3}(a) \& (b) differs slightly between the (103)$_{\textrm{HTT}}$ peak at 234 K and (114)$_{\textrm{HTT}}$ at 235 K, which we attribute to a finite uncertainty in the measurement such as temperature off-set between the sample and temperature recorded by Linkam cooling stage sensor. \begin{figure}[h!] \includegraphics[trim={4cm 1.3cm 0.6cm 0.6cm},clip,scale=1]{Figure3.png} \caption{\label{fig:Fig3}(a) and (b) rocking curves of (103)$_{\textrm{HTT}}$ and (114)$_{\textrm{HTT}}$ integrated, background subtracted Bragg peaks as a function of temperature crossing the HTT to LTO phase transition. (c) Total (103) diffraction peak splitting in three dimensions.} \end{figure} We interpret the peak splitting as due to \textit{a/b} twinning in the orthorhombic phase of LBCO and can use BCDI to obtain images of the pattern of domains in three dimensions. In order to visualize the evolution of LTO domain formation close to the transition temperature, we inverted the 3D coherent diffraction patterns using iterative phasing. The reconstruction results in Fig.~\ref{fig:Fig4} show a clear difference between the LTO and HTT phases reconstructed from the 228~K and 258~K temperature data. To understand better the internal structure of the phases, we take a slice cut through the reconstructed image in [100] plane. At 258~K the slice shows a ''single'' domain whereas at 228~K, it shows the presence of several domains with sizes in the range of 150-350~nm. There is a phase ramp between the domains which has a size of 20-50~nm. These domain and domain-wall sizes are close to those reported in electron microscopy studies\cite{Zhu1994,Horibe2000,Li2003,Chen1991}. To make a comparison with TEM dark-field results we take a slice along the [001] plane of 228 K data and the result is shown in Fig.\ref{fig:FigS2} of supplementary material. Similar layer like domains are observed, which are elongated in one direction. The domain and domain-wall sizes obtained from our reconstruction results are in the same order of magnitude with TEM results. Furthermore, we present the 235 K data in a similar fashion (see Fig.\ref{fig:FigS1} of supplementary material); the data shows the domain size is larger than the 228 K data and domains are stacked in a similar way. To look at the amplitude and phase variation inside the reconstructed images of HTT and LTO phases, a line-profiles through [001] slices are shown in \ref{fig:FigS3} and \ref{fig:FigS4}. \begin{figure}[ht!] \includegraphics[trim={4.cm 0.95cm 1.5cm 0.9cm},clip,scale=0.9]{Figure4} \caption{\label{fig:Fig4} Three-dimensional (3D) isosurface rendering plotted at about 10\% of the small LBCO single-crystal reconstructed from three-dimensional diffraction patterns using the phase retrieval algorithm. The slice in [100] plane indicated in as I, II, and III. (b)-(d) and (e)-(g) are slices at different positions of the crystal showing a map of the image phase (projection of the lattice displacement) and amplitude (electron density) for HTT phase respectively. Similarly, (h)-(j) and (k)-(m) are slices at different positions of the crystal showing a map of the image phase (projection of the lattice displacement) and amplitude (electron density) for LTO phase respectively.} \end{figure} Because the crystal is isolated at the center of the diffractometer, samples prepared through FIB gives us an opportunity of measuring multiple peaks from the same crystal, without any contaminating signals from neighboring crystals. This in the future has a potential application for quantum materials where one can image a single FIB crystal using both structural and electronic order peaks and overlay reconstructed real-space images. However, the ion milling process can also introduce undesired damage, amorphization layer, and strain on the surface of the sample, or can affect the chemical composition. Typically, the damage of the FIB'ed sample is 20 to 30~nm for 30~keV Ga ions, and 5~kev ions would have three times less effect\cite{Kato2004}. Also, how far the Ga ions penetrate the sample depends on both the energy of ions and the angle of polishing (normal incidence versus glancing incidence)\cite{Hofmann2018}. For gold nanocrystals, Ga ions can go up to 50~nm at 30~keV and normal incidence and decreases a factor of five at 5~keV and glancing incidence \cite{Hofmann2018}. Although we used 5~keV ion beam for final polishing of the present sample to minimize the damage, amorphization layer and strain, some of the strains and non-sharp edges could be partly due to the beam milling process. BCDI reconstructed images allow us to count domains in three dimensions\cite{AHRENS2005}. Figure ~\ref{fig:Fig5} shows that the number of domains increases dramatically when the sample temperature is below the HTT-LTO transition temperature. An early Ginzburg-Landau (GL) study of the HTT-LTO transition has derived the critical behavior of the orthorhombicity (strain) near the LTO transition temperature with the critical exponent $\beta=$0.33\cite{Birgeneau1987}. The identical critical behavior of the number of domains, N$_{\textrm{LTO}}$, is observed here, indicating a linear relation between N$_{\textrm{LTO}}$ and $\phi^{2}$ \cite{Birgeneau1987}. This effect can be understood by adding the lowest symmetry allowed coupling term N$_{\textrm{LTO}}$ ($\Delta\phi^{2}$), that arises from the formation of domain walls, in the GL free energy\cite{Muller1971,Chaikin1995}. \begin{figure}[ht!] \includegraphics[trim={0.5cm 0.5cm 0.5cm 0.5cm},clip,scale=0.35]{Figure5.png} \caption{\label{fig:Fig5} Temperature evolution of lattice orthorhombicity strain ($\eta$) calculated as $\frac{2(a-b)}{(a+b)}$, the lattice parameters are derived from Rietveld refinements\cite{Bozin2015}(green circles). Temperature evolution of scaled number of domains is extracted from BCDI reconstruction and counting by visualizing in Paraview (red squares). We also plotted $\alpha$(T$_{c}$-T)$^{2\beta}$ function with T$_{c}$=238~K, $\alpha$=1.75$\times$10$^{-4}$ and $\beta$=0.33 as a blue dashed line which is guide to the eye.} \end{figure} \subsection{\label{subsec:DomainIndexing}Domain Indexing by Fourier Filtering} The complex pattern of domains seen in the low-temperature orthorhombic phase is believed to be due to twinning between regions of opposite orientation of their $a$ and $b$ axes\cite{Bratkovsky1996}. The diffraction peak splitting at low temperatures arises for the same reason. With BCDI, we have the unique opportunity to assign which domain in the image arises from which peak in the diffraction pattern. This is undertaken in Figs.~\ref{fig:Fig6} and \ref{fig:Fig7} to test the idea. The final 3D image of the domains at the lowest temperature, measured at the $(103)_{\textrm{HTT}}$ diffraction peak was Fourier transformed back to reciprocal space to regenerate the split diffraction peak, but retaining all the phase information. A region of $21\times21\times25$ voxels was set to zero around the first diffraction peak and it was inverse Fourier transformed to give an image with all the domains contributing to that peak suppressed. This was repeated for the second Bragg peak by setting $13\times13\times13$ voxels to zero.The results are shown in Fig.~\ref{fig:Fig6} in the raw coordinate system of the discrete Fourier transform of the data voxels, ($x$, $y$) detector pixels and $z$ steps on the rocking curve. The (x,y,z) directions are roughly aligned with the Cartesian (x,y,z) coordinate system used in Fig 4. The z-slices shown in Fig 6, show cross-sections of the sample roughly perpendicular to the X-ray beam direction. The image amplitude is presented on the same color scale of 0 to 1.6$\times10^{4}$ in the first three columns for a selection of $z$ slices whereas the difference between Suppress P1 and Suppress P2 is shown in a scale of -5.2$\times10^{4}$ to 5.2$\times10^{4}$. It can be seen that different parts of the initial domain image (left) become reduced in amplitude in the two derived images of Suppress P1 and Suppress P2. \begin{figure}[ht!] \includegraphics[trim={5.4cm 0.7cm 4.cm 0.6cm},clip,scale=1.6]{Figure6.png} \caption{\label{fig:Fig6}Fourier filtering on the reconstructed image measured at 228~K of the different slices along the third dimension. Suppress P1 is obtained by Fourier filtering of $21\times21\times25$ voxels around the smaller peak by setting it to zero for reconstruction. Suppress P2 are obtained by Fourier filtering of $13\times13\times13$ voxels around the larger peak by setting to zero for reconstruction.} \end{figure} To visualize the domain identities more clearly, a color image was generated in the same physical "laboratory" Cartesian coordinate frame already used to present the images in Fig.~\ref{fig:Fig4}. Here, $z$ runs along the beam, $x$ is horizontal, transverse to the beam, and $y$ is vertical. In Fig.~\ref{fig:Fig7} an isosurface af the crystal and three slices through the 3D image are shown corresponding to the views of Fig.~\ref{fig:Fig4} (k,l,m). The domains are colored red or blue according to whether their amplitude is higher with the first or second peak suppressed. There is a clear pattern in these images where domains are color-coded according to the diffraction peak to which they contribute most. It appears that one end of the crystal mostly contributes to the "blue" peak and the other end to the "red" peak. In between, there is some alternation of domain identities, as expected from the microtwinning concept \cite{Bratkovsky1996}. This result strongly supports the picture of twinning underlying to formation of domains in the LBCO tetragonal to orthorhombic phase transition. \begin{figure}[ht!] \includegraphics[trim={1.9cm 0.8cm 1cm 1.cm},clip,scale=0.7]{Figure7.png} \caption{\label{fig:Fig7} Isosurface rendering plotted at 10\% of reconstructed images for the 228~K data shown after indexed domains. The I, II, and III are sliced across the reconstructed image to show the internal structure of domains.} \end{figure} \section{\label{sec:Conclusion}Conclusion and outlook} Coherent X-ray diffraction technique allows us to track the evolution of structural domains by monitoring a shared Bragg diffraction pattern on a 2D detector. The transition temperature deduced agrees with previously published X-ray studies\cite{Bozin2015,Hucker2011}. Moreover, the speckle pattern in reciprocal space is a unique finger-print of how domains are staggered in the sample (real-space) and both $(103)_{\textrm{HTT}}$ and $(114)_{\textrm{HTT}}$ diffraction patterns split into multiple peaks indicating the formation of twin domains. This agrees with recent speckle correlation analysis results on (012)$_{\textrm{LTO}}$ diffraction peak\cite{Robinson2019}. In BCDI technique, the phase information lost during the measurement is retrieved with the computational technique with properly oversampled diffraction patterns; one can iteratively reconstruct the phase. For weak phasing objects such as metal nanoparticles\cite{Robinson2009,Pfeifer2006,Newton2010}, battery materials\cite{Singer2018,Ulvestad2015}, and oxides\cite{Robinson1999}, the retrieved real-space images give internal strain information in addition to electron density, which is not accessible with any other technique\cite{Miao2015}. However, imaging structural texture of strongly correlated materials presents a challenge to the technique and obtaining a unique solution is very challenging. To circumvent this issue, we implement a fixed-box support constraint in the iterative phasing algorithm which allowed us to invert the reciprocal diffraction patterns to real-space images and gave a reproducible result. The reconstructed real-space images of domains we observe are LTO twin domains which are very common for this type of sample. Neighboring domains show a phase shift, and the phase difference between the two nearby domains gives the relative displacement of twin domain walls. The observation of LTO domains agrees with previous "microstructures" (domains) of La$_{2-x}$Sr$_{x}$CuO$_{4}$\cite{Horibe1997, Horibe2000} and LTO La$_{2-x}$Ba$_{x}$CuO$_{4}$\cite{Zhu1994} obtained with dark field transmission electron microscopy. As shown in Fig.~\ref{fig:Fig5}, the number of domains follows a similar path as the degree of orthorhombicity (orthorhombic strain) derived from powder diffraction data\cite{Bozin2015}, which is related to the order parameter\cite{Chaikin1995}. This can be understood by adding a new domain-wall associated energy term in the GL free-energy equation. \begin{acknowledgments} We want to thank Miao Hu, Daniel Mazzone, and Emil Bozin for their insight on the experimental results. We also would like to thank Ross Harder, Wonsuk Cha and Evan Maxey for their support during the beamtime and for their help setting up the Linkam cooling stage for experiments at 34-ID-C. TAA would like to thank Felix Hofmann for his comments on the experimental results and insights on focused ion-beam milling processes. X-ray experiments are supported by the U.S. Department of Energy, Office of Science, Basic Energy Sciences, Materials Science and Engineering Division, under Contract No. DE-SC0012704(BNL) and DE-AC02-06CH11357(ANL). The focused-ion beam sample preparation used the resources of Center for Functional Nanomaterials, which is a U.S. DOE Office of Science Facility, at BNL under Contract No. DE-SC0012704. The experiments were carried out at the Advanced Photon Source(APS) beamline 34-ID-C, and the APS was supported by the U. S. Department of Energy, Office of Science, Office of Basic Energy Sciences, under Contract No. DE-AC02-06CH11357. The beamline 34-ID-C was built with U.S. National Science Foundation grant DMR-9724294. \end{acknowledgments}
\section{Introduction} Phylogenetic networks generalize phylogenetic trees introducing reticulation vertices, which have two parents, and represent ancestral species resulting from the transfer of genetic material between coexisting species, through biological processes such as lateral gene transfer, hybridization or recombination. More precisely, binary phylogenetic networks are usually defined as rooted directed acyclic graphs with exactly one root, tree vertices having one parent and 2 children, reticulation vertices having 2 parents and one child and labeled leaves. The leaves are bijectively labeled by a set of taxa, which correspond to currently living species. As for trees, phylogenetic networks can be rooted or unrooted. Ideally, phylogenetic networks should be rooted, the root representing the common ancestor of all taxa labeling the leaves. But several methods which reconstruct phylogenetic networks, such as combinatorial~\cite{HMSW2018,IerselMoulton2018}, distance-based~\cite{BDM2012,WTM2014} or parsimony-based methods~\cite{PosadaCrandall2001,LabarreVerwer2014}, do not produce inherently rooted networks, but provide unrooted networks where tree vertices and reticulation vertices cannot be distinguished. An important parameter that allows to measure the complexity of a phylogenetic networks is its level. Phylogenetic trees are actually phylogenetic networks of level $0$, and the level of a network $N$ measures ``how far from a tree'' $N$ is. The problem of enumerating (rooted or unrooted) trees is a very classical one in enumerative combinatorics. Solving this problem actually led to general methods for enumerating other tree-like structures, where generating functions play a key role. We will review some of these methods in Section~\ref{sec:GF}. These methods have successfully been used by Semple and Steel~\cite{SempleSteel2006} to enumerate two families of phylogenetic networks, namely unicyclic networks and unrooted level-$1$ networks (also called \emph{galled trees}). Their results include an equation defining implicitly the generating function for unrooted level-$1$ networks (refined according to two parameters), which yields a closed formula for the number of unrooted level-$1$ networks with $n$ (labeled) leaves, $k$ cycles, and a total of $m$ edges (also called arcs) across all the cycles. An upper bound on the number of unlabeled galled trees is also provided in~\cite{CHT2018}. Other counting results have been more recently obtained on other families of phylogenetic networks, for example on so-called normal and tree-child networks~\cite{MSW2015,FGM2018} and on galled networks~\cite{GRZ2018}. In this paper, we extend the results of Semple and Steel in several ways. First, about unrooted level-$1$ networks, we provide an asymptotic estimate of the number of such networks with $n$ (labeled) leaves. We also prove that the two parameters considered by Semple and Steel are asymptotically normally distributed. Second, we consider rooted level-$1$ networks, whose enumeration does not seem to have been considered so far in the literature. For these networks, we provide a closed formula counting them by number of leaves, together with an asymptotic estimate, and a closed formula for their enumeration refined by two parameters (the number of cycles and number of edges across all the cycles). Moreover, we show that these two parameters are asymptotically normally distributed. Finally, we consider both unrooted and rooted level-$2$ networks. Similarly, we provide in each case exact and asymptotic formulas for their enumeration, and prove asymptotic normality for some parameters of interest, namely: the number of bridgeless components of strictly positive level, and the number of edges across them. These parameters are a generalization for level-$k$ ($k>2$) of those considered by Semple and Steel for level-1, in the sense that they quantify how different from a tree these phylogenetic networks are. The results of this paper rely heavily on analytic combinatorics~\cite{FlajoletSedgewick2008}. This framework can also be used to derive uniform random generators (for example with the recursive method~\cite{FlajoletEtAl1994} or with a Boltzmann sampler~\cite{DuchonEtAl2004}) directly from the specifications of the classes of phylogenetic networks given below. This could be useful for applications in bioinformatics, especially to generate simulated data in order to evaluate the speed or the quality of the output of algorithms dealing with phylogenetic networks. Table~\ref{tab:overview} provides an overview of our results, and of where they can be found in the paper. \begin{table}[ht] \centering \begin{tabular}{|l|l|l|l|l|} \hline Type of network & Unrooted, & Rooted, & Unrooted, & Rooted, \\ & level-$1$ & level-$1$ & level-$2$ & level-$2$ \\ \hline Letter $\mathcal{X}$ denoting the class & $\mathcal{G}$ (\textbf{g}alled) & $\mathcal{R}$ (\textbf{r}ooted) & $\mathcal{U}$ (\textbf{u}nrooted) & $\mathcal{L}$ (\textbf{l}ast) \\ \hline Eq. for the EGF $X(z)$ & Thm.~\ref{thm:GF_Unrooted_1} \hfill $(*)$& Thm.~\ref{thm:GF_Rooted_1}& Thm.~\ref{thm:GF_Unrooted_2}&Thm.~\ref{thm:GF_rooted_level2} \\ \hline Exact formula for $x_n$ & Thm.~\ref{thm:GF_Unrooted_1} \hfill $(*)$& Prop.~\ref{prop:enum_Rooted_1}& Prop~\ref{eq:exact_unrooted2} & Prop.~\ref{exactrooted2}\\ \hline Asymptotic estimate of $x_n$ & Prop.~\ref{prop:asym_Unrooted_1}& Prop.~\ref{prop:asym_Rooted_1}& Prop.~\ref{prop:asym_Unrooted_2}& Prop.~\ref{asy_rooted2} \\ \hline Eq. for the multivariate EGF & Eq.~\eqref{eq:unrooted1multivariate} \hfill $(*)$& Eq.~\eqref{eq:rooted1multivariate}& Eq.~\eqref{eq:multi_unrooted2} & Eq.~\eqref{eq:multi_rooted2}\\ \hline Asymptotic normality & Prop.~\ref{prop:normaldistribunrooted1} & Prop.~\ref{prop:normaldistribrooted2}& Prop.~\ref{prop:normaldistribunrooted2} & Prop.~\ref{asymultirooted2}\\ \hline \end{tabular} \smallskip \caption{Overview of our main results. EGF means exponential generating function. The results marked with $(*)$ also appear in the work of Semple and Steel~\cite{SempleSteel2006}. In addition, refined enumeration formulas for unrooted and rooted level-1 networks are provided in \cite[Thm. 4]{SempleSteel2006} and Prop.~\ref{prop:refinedEnumerationRooted1} respectively. (Although the proof method applies to obtain such formulas for level-2 as well, the computations would however be rather intricate, and the interest \emph{a priori} of the formulas so obtained questionable, hence our choice not to do it.) \label{tab:overview}} \end{table} For the reader's convenience, we also include in this introduction the beginnings of the enumeration sequences of the four types of networks we consider, as well as their asymptotic behavior -- see Table~\ref{TableNumbers}. We have added these sequences to the OEIS~\cite{OEIS}, and we also include in Table~\ref{TableNumbers} their OEIS reference. We also provide in the supplementary material the code in the DOT language, as well as a visualization with GraphViz, of the 15 unrooted level-1 networks on 4 leaves, the 3 rooted level-1 networks on 2 leaves, the 6 unrooted level-2 networks on 3 leaves and the 18 rooted level-2 networks on 2 leaves. \begin{table}[ht] \centering \begin{tabular}{c||c|c|c|c} $n$ & $g_{n-1}$ & $r_n$ & $u_{n-1}$ & $\ell_n$ \\ \hline 1 & 0 & 1 & 0 & 1\\ 2 & 1 & 3 & 1 & 18\\ 3 & 2 & 36 & 6 & 1 143\\ 4 & 15 & 723 & 135 & 120 078 \\ 5 & 192 & 20 280 & 5 052 & 17 643 570 \\ 6 & 3 450 & 730 755 &264 270 & 3 332 111 850\\ \hline as $n \to \infty$ & $c_1 \approx 0.20748$ & $c_1 \approx 0.1339$ & $c_1 \approx 0.07695$ & $c_1 \approx 0.02931$\\ $x_n \sim c_1 c_2^n n^{n-1}$ with & $c_2 \approx 1.89004$ & $c_2 \approx 2.943$ & $c_2 \approx 5.4925$ & $c_2 \approx 15.4333$\\ \hline OEIS reference & A328121 & A328122 & A333005 & A333006 \\ \end{tabular} \smallskip \caption{The numbers of rooted and unrooted level-1 or level-2 networks on $n$ leaves. \label{TableNumbers}} \end{table} \medskip The remainder of the article is organized as follows. First, Section~\ref{sec:phylo_intro} recalls definitions and properties of phylogenetic networks that are important for our purpose. Next, Section~\ref{sec:GF} reviews some methods of enumerative and analytic combinatorics which we will apply to solve the enumeration of our networks in the following sections. Precisely, Sections~\ref{sec:unrooted1} and~\ref{sec:rooted1} deal with level-$1$ networks, unrooted and rooted, while Sections~\ref{sec:unrooted2} and~\ref{sec:rooted2} focus on level-$2$ networks. \section{Some properties of phylogenetic networks}\label{sec:phylo_intro} \subsection{Rooted binary phylogenetic networks} In graph theory, a \textit{cut arc} or \textit{bridge} of a directed graph $G$ is an arc whose deletion disconnects $G$. A \textit{bridgeless component} of a graph is a maximal induced subgraph of $G$ without cut arcs. We define a \textit{binary rooted phylogenetic network} $N$ on a set $X$ of leaf labels, for $|X|\geq 2$ as a directed acyclic graph having: \begin{enumerate} \item exactly one \textit{root}, that is an in-degree-0 out-degree-2 vertex; \item \textit{leaves}, that is in-degree-1 out-degree-0 vertices which are bijectively labeled by elements of $X$; \item \textit{tree vertices}, that is in-degree-1 out-degree-2 vertices; \item \textit{reticulation vertices}, that is in-degree-2 out-degree-1 vertices; \\ and such that \item for each bridgeless component $B$ of $N$, there exist at least two cut arcs of $N$ whose tail\footnote{The \emph{tail} of an arc is by definition its starting point. Its arrival point is called \emph{head}.} belongs to $B$ and whose head does not belong to $B$. \end{enumerate} A binary rooted phylogenetic network $N$ on a singleton ${x}$ is a single vertex labeled by $x$. As illustrated in Fig.~\ref{fig:rooted-unrooted}, a binary rooted phylogenetic network $N$ is said to be \textit{level-$k$} (or called a \textit{level-$k$ network} for short) if the number of reticulation vertices contained in any bridgeless component of $N$ is less than or equal to $k$. In a level-1 network $N$, each bridgeless component $B$ having at least two vertices consists of the union of two directed paths, which start and end at the same vertices, called \emph{source} and \emph{sink} respectively. The source is actually either the root of $N$, or the head of a cut arc of $N$, and the sink is the unique reticulation vertex of $B$. Such bridgeless components are called \emph{cycles}. Note that variations on the definition of rooted binary phylogenetic networks are around in the literature, and a few comments on our choice of definition are in order. Like in most publications about phylogenetic networks, our definition of binary rooted phylogenetic networks does not allow multiple arcs. As our goal is to study a model of binary phylogenetic networks that could be counted if their number of leaves and level are fixed, condition (5) is necessary to ensure that there are finitely many phylogenetic networks with a given number of leaves and level. Note that this restriction has already appeared in the literature under the name ``networks with no redundant biconnected components''~\cite{IerselMoulton2014} or ``with no redundant blobs''~\cite{GIKPS2016}. Indeed, without it, such networks have an unbounded number of vertices: this can be seen by replacing any cut arc of the network by a sequence of networks isomorphic to the one in Fig.~\ref{rootedlevel2}($2a$), which has only one incoming cut-arc and one outgoing cut-arc. Similarly in some algorithmic-oriented papers about phylogenetic networks, bridgeless components with three vertices and two outgoing arcs are forbidden because the information needed to distinguish those components from simple tree vertices also connected with two outgoing arcs is not available in the input data. In the perspective of counting those objects we do not impose this restriction. But it could easily be added to our combinatorial descriptions and formulas below, to be taken into account if needed. \subsection{Unrooted binary phylogenetic networks} Now, we extend the latter definition to unrooted phylogenetic networks. A \textit{cut-edge} or \textit{bridge} of an undirected graph $G$ is an edge whose removal disconnects the graph. A \textit{bridgeless component} of a graph $G$ is a maximal induced subgraph of $G$ without cut-edges. An \textit{unrooted binary phylogenetic network} $N$ on a set $X$ of at least 2 leaf labels is a loopless (undirected) graph whose vertices have either degree $3$ (\textit{internal vertices}) or degree $1$ (\textit{leaves}), such that its set $L(N)$ of leaves is bijectively labeled by $X$ and such that for each bridgeless component $B$ of $N$ having strictly more than one vertex, the set of cut-edges incident with some vertex of $B$ has size at least 3. An unrooted binary phylogenetic network $N$ on a singleton ${x}$ is a single vertex labeled by $x$. An unrooted binary phylogenetic tree is an unrooted binary phylogenetic network with no bridgeless component containing strictly more that one vertex. An unrooted binary phylogenetic network is said to be \textit{level-$k$} (or called an \textit{unrooted level-$k$ network} for short) if an unrooted binary phylogenetic tree can be obtained by first removing at most $k$ edges per bridgeless component, and then, for each degree-2 vertex, contracting the edge between this vertex and one of its neighbours. We denote by \emph{cycles} the bridgeless components of unrooted level-1 networks having strictly more than one vertex. (Indeed, they are just cycles -- of size at least $3$ -- in the graph-theoretical sense.) Note that given a rooted level-$k$ network $N$ on $n$ leaves, we can obtain an unrooted binary phylogenetic network $N'$ on $n+1$ leaves with the following \emph{unrooting procedure}: add a vertex adjacent to the root of $N$, labeled with an extra leaf label (usually denoted $\#$), and ignore all arc directions. Theorem~1 of~\cite{GBP2012} implies in addition that the network $N'$ so obtained is an unrooted level-$k$ network. This unrooting procedure which consists of building an unrooted level-$k$ network from a rooted level-$k$ network, illustrated in Fig.~\ref{fig:rooted-unrooted}, can be reversed (see Lemma 4.13 of~\cite{JJEIS2018}), although not in a unique fashion. Indeed, given an unrooted level-$k$ network $N'$ on $n+1$ leaves, it is possible to choose any leaf and delete it, making its neighbour become the root $\rho$ of a rooted level-$k$ network $N$ obtained by: \begin{enumerate} \item placing the bridgeless component $B$ containing $\rho$ at the top; \item orienting downwards all the cut-edges incident with vertices of $B$; \item choosing the tail $t$ of one of these cut arcs as the sink of $B$; \item computing an $\rho$-$t$ numbering~\cite{LEC1967} on the vertices of $B$ if there are more than one, that is labeling vertices of $B$ with integers from 1 to the number $n_B$ of vertices of $B$, such that the labels of $\rho$ and $t$ are respectively 1 and $n_B$ and such that any vertex of $B$ except $\rho$ and $t$ is adjacent both to a vertex with a lower label and a vertex with a higher label; \item orienting each edge of $B$ by choosing its vertex with the lower label as the tail; \\ and \item moving downwards into the network, recursively applying this procedure on all other bridgeless components. \end{enumerate} This correspondence is not one-to-one because of the choices of the leaf which is deleted, and most importantly because of the choices of sinks in step 3 above. \begin{figure}[h] \begin{center} \begin{tabular}{ccc} \begin{tikzpicture} \begin{scope}[scale=0.3] \draw (-1,12) node {$\rho$}; \draw (0,12) node [inner sep=1pt,circle,fill,draw] (root) {}; \draw (2,10) node [inner sep=1pt,circle,fill,draw] (a) {}; \draw (0,8) node [inner sep=1pt,circle,fill,draw] (b) {}; \draw (-2,6) node [inner sep=1pt,circle,fill,draw] (c) {}; \draw (-4,4) node [inner sep=1pt,circle,fill,draw] (d) {}; \draw (4,8) node [inner sep=1pt,circle,fill,draw] (e) {}; \draw (2,6) node [inner sep=1pt,circle,fill,draw] (f) {}; \draw (2,4) node [inner sep=1pt,circle,fill,draw] (g) {}; \draw (4,2) node [inner sep=1pt,circle,fill,draw] (h) {}; \draw (6,6) node [inner sep=1pt,circle,fill,draw] (i) {}; \draw (6,4) node [inner sep=1pt,circle,fill,draw] (j) {}; \draw (-6,2) node [inner sep=1pt,circle,fill,draw] (l1) {}; \draw (-4,2) node [inner sep=1pt,circle,fill,draw] (l2) {}; \draw (-2,4) node [inner sep=1pt,circle,fill,draw] (l3) {}; \draw (0,4) node [inner sep=1pt,circle,fill,draw] (l4) {}; \draw (4,0) node [inner sep=1pt,circle,fill,draw] (l5) {}; \draw (6,2) node [inner sep=1pt,circle,fill,draw] (l6) {}; \draw (-6,1) node {$l_1$}; \draw (-4,1) node {$l_2$}; \draw (-2,3) node {$l_3$}; \draw (0,3) node {$l_4$}; \draw (3,0) node {$l_5$}; \draw (6,1) node {$l_6$}; \draw (root) -- (a); \draw (a) -- (b); \draw (root) -- (b); \draw (b) -- (c); \draw (c) -- (l3); \draw (c) -- (d); \draw (d) -- (l1); \draw (d) -- (l2); \draw (a) -- (e); \draw (e) -- (f); \draw (f) -- (l4); \draw (f) -- (g); \draw (g) -- (h); \draw (h) -- (l5); \draw (e) -- (i); \draw (i) -- (g); \draw (i) -- (j); \draw (j) -- (l6); \draw (j) -- (h); \end{scope} \end{tikzpicture} & ~~~~ & \begin{tikzpicture} \begin{scope}[scale=0.3] \draw (-6,9) node {$\#$}; \draw (-6,8) node [inner sep=1pt,circle,fill,draw] (lroot) {}; \draw (-4,9) node {$\rho$}; \draw (-4,8) node [inner sep=1pt,circle,fill,draw] (root) {}; \draw (-2,8) node [inner sep=1pt,circle,fill,draw] (a) {}; \draw (-4,6) node [inner sep=1pt,circle,fill,draw] (b) {}; \draw (-4,4) node [inner sep=1pt,circle,fill,draw] (c) {}; \draw (-4,2) node [inner sep=1pt,circle,fill,draw] (d) {}; \draw (0,8) node [inner sep=1pt,circle,fill,draw] (e) {}; \draw (0,6) node [inner sep=1pt,circle,fill,draw] (f) {}; \draw (2,6) node [inner sep=1pt,circle,fill,draw] (g) {}; \draw (4,6) node [inner sep=1pt,circle,fill,draw] (h) {}; \draw (2,8) node [inner sep=1pt,circle,fill,draw] (i) {}; \draw (4,8) node [inner sep=1pt,circle,fill,draw] (j) {}; \draw (-6,2) node [inner sep=1pt,circle,fill,draw] (l1) {}; \draw (-4,0) node [inner sep=1pt,circle,fill,draw] (l2) {}; \draw (-2,4) node [inner sep=1pt,circle,fill,draw] (l3) {}; \draw (0,4) node [inner sep=1pt,circle,fill,draw] (l4) {}; \draw (6,6) node [inner sep=1pt,circle,fill,draw] (l5) {}; \draw (6,8) node [inner sep=1pt,circle,fill,draw] (l6) {}; \draw (-6,1) node {$l_1$}; \draw (-3,0) node {$l_2$}; \draw (-2,3) node {$l_3$}; \draw (0,3) node {$l_4$}; \draw (7,6) node {$l_5$}; \draw (7,8) node {$l_6$}; \draw (root) -- (lroot); \draw (root) -- (a); \draw (a) -- (b); \draw (root) -- (b); \draw (b) -- (c); \draw (c) -- (l3); \draw (c) -- (d); \draw (d) -- (l1); \draw (d) -- (l2); \draw (a) -- (e); \draw (e) -- (f); \draw (f) -- (l4); \draw (f) -- (g); \draw (g) -- (h); \draw (h) -- (l5); \draw (e) -- (i); \draw (i) -- (g); \draw (i) -- (j); \draw (j) -- (l6); \draw (j) -- (h); \end{scope} \end{tikzpicture} \\ $N$ & ~ & $N'$ \end{tabular} \end{center} \caption[]{ A rooted level-2 network $N$ (where all arcs are directed downwards) and the unrooted level-2 network $N'$ obtained by applying the unrooting procedure on $N$.\label{fig:rooted-unrooted}} \end{figure} \subsection{Decomposition of rooted and unrooted level-$k$ networks} For any bridgeless component $B$ with $k_B\leq k$ reticulation vertices of a rooted level-$k$ network $N$, the directed multi-graph obtained by removing all outgoing arcs, and then contracting each arc from an in-degree-1 out-degree-1 vertex to its child, is called a \emph{level-$k_B$ generator}~\cite{IKKSHB2009,GBP2009}. For each $k>0$, there exists a finite list of \emph{level-$k$ generators} which can be built from level-($k-1$) generators~\cite{GBP2009}. Therefore, depending on the level $k_\rho$ of the bridgeless component $B_\rho$ of $N$ containing its root $\rho$, $N$ can be decomposed in the following way. It is either: \begin{itemize} \item a single leaf if $k_\rho=0$ and $\rho$ has out-degree 0; \item a root $\rho$ being the parent of the root $\rho_1$ of a rooted level-$k$ network $N_1$ and of the root $\rho_2$ of a rooted level-$k$ network $N_2$ with disjoint sets of leaf labels, if $k_\rho=0$ and $\rho$ has out-degree $2$; \item a level-$k_\rho$ generator $G_\rho$ containing the root, with $0 < k_\rho \leq k$, whose arcs are subdivided to create new in-degree-1 out-degree-1 vertices, to which we add a set of cut arcs, whose tails are the out-degree-0 vertices of $G_\rho$ and the newly created in-degree-1 out-degree-1 vertices, and whose heads are roots of rooted level-$k$ networks with disjoint sets of leaf labels. \end{itemize} Similarly, for any bridgeless component $B$ of an unrooted level-$k$ network $N$, the multi-graph obtained by first removing all cut-edges incident with any vertex of $B$, then, for each degree-2 vertex, contracting the edge between this vertex and one of its neighbours, is called an \emph{unrooted level-$k_B$ generator}~\cite{GBP2012,HMW2016}. An unrooted level-$k_B$ generator can also be defined as a single vertex for $k_B=0$, as two vertices linked by a multiple edge for $k_B=1$, and as a 3-regular bridgeless multi-graph with $2k_B-2$ vertices for $k_B>1$ (Lemma 6 of~\cite{HMW2016}). Therefore, by considering a leaf $l_{\#}$ of any unrooted level-$k$ network $N$ and the bridgeless component $B$ containing the vertex adjacent to this leaf, depending on the level $k_B$ of $B$, $N$ can be decomposed in the following way. \begin{itemize} \item If $k_B=0$ and $B$ consists of a single vertex of degree $1$ in $N$, then $N$ is just the leaf $l_{\#}$ adjacent to another leaf. \item If $k_B=0$ and $B$ is not a single vertex of degree $1$ in $N$, then the leaf $l_{\#}$ is adjacent to a vertex $v$ of degree $3$ in $N$, such that the other two edges incident to $v$ are cut-edges. $N$ is described by the edge between $l_{\#}$ and $v$, plus the two other edges incident with $v$, which are in turn identified with edges of two unrooted level-$k$ networks $N_1$ and $N_2$ with disjoint sets of leaf labels (not containing $\#$) in such a way that $v$ is identified with a leaf $l_{\#1}$ (resp. $l_{\#2}$) of $N_1$ (resp. $N_2$), removing the leaf labels of $l_{\#1}$ and $l_{\#2}$ during this identification. \item Otherwise $0<k_B\leq k$. In this case, $N$ is described by taking a level-$k_{B}$ generator whose edges are subdivided to insert vertices, and then performing identification of these inserted vertices (in a same flavor as in the previous case). Specifically, one of these inserted vertices is identified with the neighbour of $l_{\#}$ in $N$, and all others are identified with leaves of unrooted level-$k$ networks with disjoint sets of leaf labels (not containing $\#$). Again, each leaf that is identified with another vertex looses its label during this identification. \end{itemize} These decompositions of rooted and unrooted level-$k$ networks will be the key to our counting results below. \section{Generating functions: some basics tools and techniques} \label{sec:GF} This section summarizes some of the basics on combinatorial classes and their generating functions that we will use in our work. Our presentation follows closely \cite{FlajoletSedgewick2008} (although with much less details), and the reader interested to know more on the topic is referred to \cite[mainly Chapters I.5, II.1, II.5, VI.3, VII.3, VII.4]{FlajoletSedgewick2008}. The reader familiar with the classical tools of analytic combinatorics may safely skip this section. \subsection{(Univariate) generating functions and counting} Generally speaking, a \emph{combinatorial class} $\mathcal{C}$ is a set of discrete objects, equipped with a notion of size, such that for every integer $n$ there is a finite number of objects of size $n$ in $\mathcal{C}$. We denote by $\mathcal{C}_n$ the set of objects of size $n$ in $\mathcal{C}$, and by $c_n$ the cardinality of $\mathcal{C}_n$. Specifically in this paper, each combinatorial class we consider is a family of level-$k$ phylogenetic networks, and the size of such a network is its number of leaves. Objects of size $n$ in $\mathcal{C}$ can be seen as an arrangement (following some rules to be made precise) of $n$ atoms, which are objects of size $1$. In our context, these atoms are the leaves of the networks, representing the current species, or \emph{taxa}. When the atoms constituting an object are distinguishable among themselves, the considered combinatorial objects are said to be \emph{labeled}\footnote{Although it is also very classical, the case of \emph{unlabeled} objects (with their corresponding \emph{ordinary} generating functions) will not be useful in our work, and is therefore omitted from our presentation.}. Because leaves of level-$k$ networks correspond to taxa, our networks are indeed labeled combinatorial objects. Without loss of generality (\emph{i.e.}, up to relabeling), atoms in a labeled object of size $n$ are simply labeled by integers from $1$ to $n$, and we will take this convention in our work. To a (labeled) combinatorial class $\mathcal{C}$, we can associate its \emph{exponential} \emph{generating function} $C(z) = \sum_{n\geq 0} c_n \frac{z^n}{n!}$, which is a formal power series in $z$ encapsulating the entire enumeration of $\mathcal{C}$. A \emph{specification} for a combinatorial class is an unambiguous description of the objects in the class using simpler classes and possibly the class itself. For instance, consider labeled rooted ordered binary trees, and define their size to be the number of their leaves. Such a tree is unambiguously described as being either a leaf or composed of a root to which a left and a right subtree are attached, which are themselves labeled rooted ordered binary trees, with a \emph{consistent relabeling} of their atoms. By this, we mean the following: considering two trees whose atoms are labeled by $\{1, \dots, k\}$ and $\{1, \dots, k'\}$, we can build a tree using the first (resp. second) as left (resp. right) subtree; the atoms of this tree are labeled by $\{1, \dots, k+k'\}$, and need to be such that the relative order between the labels in the left (resp. right) subtree is preserved (and they may be in any such way). This specification for labeled rooted ordered binary trees can be formally written as follows: $\mathcal{B} = \bullet$ \ $ \uplus $ \ {\begin{tikzpicture}[level distance=15mm,baseline=-10pt] \begin{scope}[scale=0.4] \tikzstyle{level 1}=[sibling distance=15mm] \node[inner sep=0pt]{$\circ$} child {node[inner sep=0pt]{$\mathcal{B}$}} child {node[inner sep=0pt]{$\mathcal{B}$}} ; \end{scope} \end{tikzpicture}}, where $\bullet$ represents a leaf (contributing $1$ to the size of the object) and $\circ$ represents an internal node (which contributes $0$ to the size). Specifications describing (labeled) combinatorial classes can be translated into equations satisfied by the corresponding (exponential) generating functions. The precise statement that we refer to is \cite[Theorem II.1]{FlajoletSedgewick2008}. The following proposition summarizes the simplest cases of this translation, which we will often use later in this paper. \begin{proposition}[Dictionary] Let $\mathcal{A}$ and $\mathcal{B}$ be two labeled combinatorial classes. Denote by $A(z)$ and $B(z)$ their respective exponential generating functions. Then the generating function of the class which is the disjoint union of $\mathcal{A}$ and $\mathcal{B}$ (resp. the Cartesian product of $\mathcal{A}$ and $\mathcal{B}$) is $A(z) +B(z)$ (resp. $A(z)\cdot B(z)$). In addition, if $\mathcal{A}$ contains no object of size $0$, the class which consists of sequences of objects of $\mathcal{A}$ (\emph{i.e.}, $m$-tuples of objects of $\mathcal{A}$, for any $m \geq 0$) has generating function $\frac{1}{1-A(z)}$. \label{dictionary} \end{proposition} On the previous example of binary trees, it follows from the above proposition that the corresponding generating function satisfies $B(z) = z+ B(z)^2$. The next step is to have access to the enumeration sequence $(c_n)$ of a class $\mathcal{C}$ from an equation satisfied by the generating function $C(z)$ of $\mathcal{C}$. A possible way, especially in the case of tree-like objects, is to appeal to the \emph{Lagrange inversion formula} (\cite[Theorem A.2]{FlajoletSedgewick2008}). To state it, we introduce the notation $[z^n] C(z)$ to denote the $n$-th coefficient of the series $C(z)$; that is to say, writing $C(z) = \sum_{n\geq 0} \frac{c_n}{n!} z^n$, we have $[z^n] C(z) =\frac{c_n}{n!}$, or equivalently $c_n = n! \cdot [z^n] C(z)$. The Lagrange inversion formula is as follows. \begin{proposition}[Lagrange inversion formula] Assume that a generating function $C$ satisfies an equation of the form $C(z) = z \phi(C(z))$ for $\phi(z) = \sum_{n\geq 0} \phi_n z^n$ a formal power series such that $\phi_0 \neq 0$. Then, we have: $$ [z^n] C(z) = \frac{1}{n} [z^{n-1}] \phi(z)^n\textrm{.} $$ \end{proposition} Even though defined as formal power series, it is often useful to consider that generating functions are analytic functions of the complex variable $z$, in a small disk of convergence around the origin of the complex plane. This sometimes allows to find a closed form for the generating function in its disk of convergence, but not always. Even in this least favorable case, it enables to inherit fundamental results from complex analysis, which can be used for the purpose of enumerating combinatorial objects. In particular, we have in this tool box the \emph{Singular Inversion Theorem} (Theorem VI.6 of~\cite{FlajoletSedgewick2008}), which allows to derive asymptotic estimates of the coefficients of generating functions. \begin{theorem}[Singular Inversion Theorem] Let $C(z)$ be a generating function such that $C(0)=0$, satisfying the equation $C(z) = z \phi(C(z))$ for $\phi(z) = \sum_{n\geq 0} \phi_n z^n$ a power series such that $\phi_0 \neq 0$, all $\phi_n$ are non-negative real numbers, and $\phi(z) \neq \phi_0 + \phi_1 z$. Denote by $R$ the radius of convergence of $\phi$ at $0$. Assume that $\phi$ is analytic at $0$ (so that $R>0$), that the \emph{characteristic equation} $\phi(z) - z \phi'(z) = 0$ has a solution $\tau \in (0,R)$ (that is necessarily unique), and that $\phi$ is aperiodic\footnote{Aperiodicity is needed only for the third item below. The definition of aperiodicity is omitted from this paper, and can be found in~\cite[Definition IV.5]{FlajoletSedgewick2008}. A sufficient condition for a power series to be aperiodic (which applies to all examples considered in this paper), is to have $\phi_n >0$ for all $n$.\label{footnote:aperiodic}}. Then the followings hold: \begin{itemize} \item $\rho = \frac{\tau}{\phi(\tau)}$ is the radius of convergence of $C$ at $0$; \item near $\rho$, $C(z) \sim \tau - \sqrt{\frac{2\phi(\tau)}{\phi''(\tau)}} \sqrt{1-\frac{z}{\rho}}$; \item when $n$ grows, $[z^n] C(z) \sim \sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} \frac{\rho^{-n}}{\sqrt{\pi n^3}}$. \end{itemize} \label{thm:singular_inversion} \end{theorem} \subsection{Multivariate generating functions and estimating parameters} Until now, our generating functions had only a single variable, $z$, recording the size of the objects we were counting. We now consider \emph{multivariate} generating functions, where additional variables ($x$, $y$, \dots) record the value of other parameters of our objects. In our cases, we will consider at most two such parameters, which are numbers of certain ``substructures'' occurring in our objects. Namely, denoting $c_{n,k,m}$ the number of objects of size $n$ in the combinatorial class $\mathcal{C}$ such that the first parameter has value $k$ and the second has value $m$, the multivariate exponential generating function we consider is $C(z,x,y) = \sum_{n,k,m} \tfrac{c_{n,k,m}}{n!} z^nx^ky^m$. To continue our earlier example of binary trees, we could consider one additional parameter, which is the number of internal nodes. (Of course,we are aware that the number of internal nodes is always the number of leaves -- \emph{i.e.}, the size -- minus one; but we keep this example just to illustrate definitions and tools available.) The coefficient of $z^nx^k$ in the generating function $B(z,x)$ is then the number of binary trees with $n$ leaves and $k$ internal nodes, divided by $n!$. The ``dictionary'' translating combinatorial specifications to equations satisfied by the generating function extends to multivariate series, and our earlier specification $\mathcal{B} = \bullet$ \ $ \uplus $ \ {\begin{tikzpicture}[level distance=15mm,baseline=-10pt] \begin{scope}[scale=0.4] \tikzstyle{level 1}=[sibling distance=15mm] \node[inner sep=0pt]{$\circ$} child {node[inner sep=0pt]{$\mathcal{B}$}} child {node[inner sep=0pt]{$\mathcal{B}$}} ; \end{scope} \end{tikzpicture}} gives $B(z,x) = z + x B(z,x)^2$. Here again, the Lagrange inversion formula may be used to derive a closed formula for the coefficients $c_{n,k,m}$. Indeed, assuming that our multivariate exponential generating function $C(z,x,y)$ satisfies an equation of the form $C(z,x,y) = z \phi(C(z),x,y)$ for $\phi(z,x,y) = \sum_{n\geq 0} \phi_n(x,y) z^n$ a formal power series such that $\phi_0 \neq 0$, then we have: $$ \tfrac{c_{n,k,m}}{n!} = [z^nx^ky^m] C(z,x,y) = \frac{1}{n} [z^{n-1}x^ky^m] \phi(z,x,y)^n\textrm{.} $$ Moreover, under some hypotheses, the following theorem (see \cite[Theorem 2.23]{Paperback}) allows to prove that the considered parameters are asymptotically normally distributed. The notation used in the statement of this theorem is as follows: if $F$ is a function of several variables, including $v$, $F_v$ denotes the partial derivative of $F$ with respect to $v$; as usual, $\mathbb{E}$ and $\mathbb{V}ar$ respectively denote expectation and variance; $\mathcal{N}(0,1)$ is the standard normal distribution; and $\xrightarrow{d}$ denotes convergence in distribution. \begin{theorem}\label{Drmota} Assume that $ C(z, x) $ is a power series that is the (necessarily unique and analytic) solution of the functional equation $ C = F (C,z, x) $, where $ F (C,z, x) $ satisfies the following assumptions: $F(C,z,x)$ is analytic in $C$, $z$ and $x$ around $0$, $F(C,0,x)=0$, $F(0,z,x) \neq 0$, and all coefficients $[z^n C^m] F(C,z,1)$ are real and non-negative. Assume in addition that the region of convergence of $F(C,z,x)$ is large enough for having non-negative solutions $z=z_0$ and $C=C_0$ of the system of equations \begin{align*} C&=F (C, z, 1) \\ 1&=F_{C} (C, z, 1) \end{align*} with $F_z(C_0,z_0,1) \neq 0$ and $F_{CC}(C_0,z_0,1) \neq 0$. Then, if $X_n$ is a sequence of random variables such that \[ \mathbb{E} x^{X_n}= \dfrac{[z^n]C(z,x)}{[z^n]C(z,1)}, \] then $X_n$ is asymptotically normally distributed. More precisely, setting\\ \qquad\qquad $ \mu =\dfrac{F_x}{z_{0} F_z} $ {\fontsize{8}{10}\selectfont \begin{align*} \sigma^{2}& = \mu +\mu^{2}+\dfrac{1}{z_{0}F_{z}^{3}F_{CC}} \Big( F_{z}^{2}(F_{CC}F_{xx}-F_{Cx}^{2})-2F_{z}F_{x}(F_{CC}F_{zx}-F_{Cz}F_{Cx})+F_{x}^{2}(F_{CC}F_{zz}-F_{Cz}^{2}) \Big) \end{align*} } where all partial derivatives are evaluated at the point $ (C_0 , z_0 , 1) $, we have \[ \mathbb{E} {X_n}= \mu n+ O(1) \;\;\;\;\;\; and \;\;\;\;\;\;\;\;\;\mathbb{V}ar{X_n}=\sigma^{2} n+O(1) \] and if $ \sigma^{2} > 0 $ then \[ \dfrac{X_{n}-\mathbb{E} {X_n}}{\sqrt{\mathbb{V}ar{X_n}}}\xrightarrow{d} \mathcal{N}(0,1). \] \end{theorem} \subsection{Implementation and note about computations} Some of the computations used to obtain the results of this paper were programmed in Maple. A companion Maple document is available from the authors webpage\footnote{at \url{http://user.math.uzh.ch/bouvel/publications/BouvelGambetteMansouri_Version2_WithoutMultipleEdges.mw}}. We also point out to the interested reader that a first version of this article was considering a variant of the model of level-$k$ phylogenetic networks, where multiple (\emph{i.e.} parallel) edges are allowed. The counting results for this alternate model of course differ (starting from level $2$), and can be found in~\cite{ArxivV2}, again with an associated Maple document\footnote{available at \url{http://user.math.uzh.ch/bouvel/publications/BouvelGambetteMansouri_Version1_WithMultipleEdges.mw}}. Similarly, these files can easily be used to adapt the computations in case other restrictions are imposed on the structure of level-1 or level-2 phylogenetic networks, for example if \emph{tiny cycles}, defined in~\cite{HIMSW2017} as bridgeless components with exactly three vertices, are not allowed. \section{Counting unrooted level-1 networks}\label{sec:unrooted1} \subsection{Generating function and exact enumeration formula} Unrooted level-1 networks (also called unrooted galled trees) have been enumerated in~\cite{SempleSteel2006}. The enumeration does not only consider the number of leaves of the galled trees, but is refined according to two parameters: the number of cycles (\emph{i.e.}, level-1 generators) and the total number of edges which are part of a cycle (that we will call \emph{inner edges}). We only reproduce in Theorem~\ref{thm:GF_Unrooted_1} a simplified version of the results of~\cite{SempleSteel2006}, taking into account the number of leaves only. \begin{theorem} For any $n\geq 0$, let $g_n$ denote the number of unrooted level-1 networks with $(n+1)$ leaves, and denote by $G(z) = \sum_{n\geq 0} g_n \frac{z^n}{n!}$ the corresponding generating function. Then $G$ satisfies the following equation: $$ G(z) = z + \frac{1}{2} G(z)^2 + \frac{1}{2} \frac{G(z)^2}{1-G(z)} \textrm{,} $$ or equivalently $$ G(z) = z\phi(G(z)) \textrm{ with } \phi(z) = \frac{1}{1-\frac{1}{2}z(1+\frac{1}{1-z})} \textrm{.} $$ Moreover, for any $n\geq 0$, let $g_n$ denote the number of unrooted level-1 networks with $(n+1)$ leaves. We have: \begin{equation} g_n = \frac{(2n-2)!}{2^{n-1}(n-1)!} + \sum_{1 \leq i \leq k \leq n-1} \frac{(n+i-1)! (n+k-i-2)!}{k! (k-1)! (i-k)! (n-i-1)!}2^{-i} \textrm{.}\label{eq:enum_Unrooted_1} \end{equation} \label{thm:GF_Unrooted_1} \end{theorem} Notice that even if the formulas seem different, Eq.~\eqref{eq:enum_Unrooted_1} can be recovered from Theorem~4 of~\cite{SempleSteel2006} by summing over $k$ and $m$ and performing the change of variable $m = n-i+3k-1$. The first values of $g_n$ have been included in Table~\ref{TableNumbers}. \begin{proof} We recall the main steps of the proofs of Theorem~\ref{thm:GF_Unrooted_1} given in~\cite{SempleSteel2006}. To prepare the ground for future proofs, we emphasize their embedding in the context we presented in Section~\ref{sec:GF}. \smallskip Since counting rooted objects is far easier that counting unrooted objects, we establish a bijective correspondence between unrooted level-1 networks, and a rooted version of these networks, that we call \emph{pointed} level-1 networks. Pointed level-1 networks on a set of taxa $X$ are simply unrooted level-1 networks on the set of taxa $X \uplus \{\#\}$, where we declare that the leaf labeled by $\{\#\}$ is the ``root'' of the network. This provides a bijection between unrooted level-1 networks on the set of taxa $X \uplus \{\#\}$ and pointed level-1 networks on $X$, that have a root labeled by $\{\#\}$. Therefore, there are as many unrooted level-1 networks on the set of taxa $X \uplus \{\#\}$ as pointed level-1 networks on $X$ rooted in a leaf labeled by $\# \notin X$. Hence $g_n$ is the number of pointed level-1 networks with $n$ leaves in addition to the root. In a pointed level-1 network $N$ (with at least two leaves), we consider the other extremity of the edge to which the root belongs. This vertex may belong to a cycle or not. In the latter case, $N$ is simply described as an unordered pair of two pointed level-1 networks. In the former case, it is described as a non-oriented sequence of at least two pointed level-1 networks. Taking into account the trivial pointed level-1 network with one leaf, a specification for the pointed level-1 networks is therefore the one shown in Fig.~\ref{fig:Galled}, where an arrow labeled by \emph{sym} indicates that there is a symmetry w.r.t. the vertical axis to take into account, and the dashed edge corresponds to an edge or a path with internal vertices that are incident with cut-edges, themselves identified with edges of other pointed level-1 networks, the vertex lying on the cycle being identified with a leaf of corresponding network. \begin{figure}[ht] \begin{center} \begin{tabular}{cccc} \begin{tikzpicture}[baseline=(top.base)] \begin{scope}[scale=0.3] \draw (-6,4.5) node [] (ppointed) {\#}; \draw (-3cm,2.7cm) node[inner sep=1.5pt,circle] (5) {$\biguplus$}; \draw (-6cm,2.5cm) node[inner sep=1pt,circle,fill,draw] (top) {}; \draw (-8cm,2.9cm) node[inner sep=1.5pt,circle] (8) {$=$}; \draw (-9cm,2.8cm) node[inner sep=1.5pt,circle] (9) {${\mathcal G}$}; \draw (ppointed) -- (top); \draw (0,4.5) node [] (ppointed2) {\#}; \draw (0,2.5) node [circle, inner sep=1,fill,draw] (top2) {}; \draw (-1cm,0cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (1cm,0cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-1cm,-1cm) node[inner sep=1.5pt,circle] (4) {${\mathcal G}$}; \draw (1cm,-1cm) node[inner sep=1.5pt,circle] (4) {${\mathcal G}$}; \draw (0cm,-3cm) node[inner sep=1.5pt,circle] (5) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (top2)--(2); \draw (top2)--(3); \draw (ppointed2) -- (top2); \end{scope} \end{tikzpicture} & $\biguplus$ & \begin{tikzpicture}[baseline=(top.base)] \begin{scope}[scale=0.3] \draw (2,4.5) node [] (pointed) {\#}; \draw (2,2.5) node [circle, inner sep=1,fill,draw] (top) {}; \draw (0,1) node [circle, inner sep=1,fill,draw] (left) {}; \draw (4,1) node [circle, inner sep=1,fill,draw] (right) {}; \draw (5,-1) node {$\mathcal{G}$}; \draw (-1,0) node [circle, inner sep=1,fill,draw] (bleft) {}; \draw (-1,-1) node {$\mathcal{G}$}; \draw (5,0) node [circle, inner sep=1,fill,draw] (bright) {}; \draw (pointed) -- (top); \draw (top) .. controls(0.5,2) .. (left); \draw (top) .. controls(3.5,2) .. (right); \draw [black,dashed] (right) to[out=-80,in=-80] (left); \draw (right) -- (bright); \draw (left) -- (bleft); \draw (2cm,-3cm) node[inner sep=1.5pt,circle] (16) {$\tiny{\overleftrightarrow{{sym}}}$}; \end{scope} \end{tikzpicture} \end{tabular} \end{center} \caption{The combinatorial specification for unrooted level-1 networks (a.k.a. galled trees). \label{fig:Galled}} \end{figure} Thanks to the ``dictionary'', the generating function therefore satisfies $G(z) = z + \frac{1}{2} G(z)^2 + \frac{1}{2} \frac{G(z)^2}{1-G(z)}$ as claimed by Theorem~\ref{thm:GF_Unrooted_1}. The second statement about $G(z)$ in Theorem~\ref{thm:GF_Unrooted_1} is obtained by simple algebraic manipulations. \smallskip From $G(z) = z\phi(G(z))$, where $\phi(z) = \frac{1}{1-\frac{1}{2}z(1+\frac{1}{1-z})}$, we can apply Lagrange inversion to find $g_n$. Indeed, $g_n = n! [z^n] G(z) = (n-1)! [z^{n-1}] \phi(z)^n$. Recall the following development of $(1-z)^{-n}$, for any $n\geq 1$, which will be used here and several times later on: \begin{equation} \left( \frac{1}{1-z} \right)^n = \sum_{i \geq 0} {{n+i-1} \choose {i}} z^i \textrm{.} \label{eq:classical_expansion} \end{equation} Applying this identity twice and the binomial theorem, we get that \begin{align*} \phi(z)^n = & \sum_{i \geq 0} {{n+i-1} \choose {i}} \left( \frac{1}{2}z\left(1+\frac{1}{1-z}\right)\right)^i \\ = & \sum_{i \geq 0} {{n+i-1} \choose {i}} \left( 1+ \sum_{k=1}^i \sum_{p\geq 0} {{i} \choose {k}} {{k+p-1} \choose {p}} z^p \right) \frac{1}{2^i} z^i \\ = & \sum_{i \geq 0} {{n+i-1} \choose {i}} \frac{z^i}{2^i} + \sum_{i \geq 0} \sum_{k=1}^i \sum_{p\geq 0} {{n+i-1} \choose {i}} {{i} \choose {k}} {{k+p-1} \choose {p}} \frac{z^{i+p}}{2^i} \textrm{.} \end{align*} It follows that \begin{align*} [z^{n-1}] \phi(z)^n = & {{2n-2} \choose {n-1}} \frac{1}{2^{n-1}} + \sum_{i = 0}^{n-1} \sum_{k=1}^i \frac{1}{2^i} {{n+i-1} \choose {i}} {{i} \choose {k}} {{n+k-i-2} \choose {n-i-1}} \\ \textrm{ and } g_n = & \frac{(2n-2)!}{2^{n-1}(n-1)!} + \sum_{1 \leq k \leq i \leq n-1} \frac{(n+i-1)! (n+k-i-2)!}{k! (k-1)! (i-k)! (n-i-1)!}2^{-i} \textrm{.} \end{align*} \end{proof} \subsection{Asymptotic evaluation} From Theorem~\ref{thm:GF_Unrooted_1}, we can furthermore derive an asymptotic evaluation of the number $g_n$ of unrooted level-1 networks on $(n+1)$ leaves, using Theorem~\ref{thm:singular_inversion}. \begin{proposition} The number $g_n$ of unrooted level-1 networks on $(n+1)$ leaves is asymptotically equivalent to $c_1 \cdot c_2^n \cdot n^{n-1}$ for constants $c_1$ and $c_2$ such that $c_1 \approx 0.20748$ and $c_2 \approx 1.89004$. \label{prop:asym_Unrooted_1} \end{proposition} \begin{proof} Recall that $G(z)$ satisfies $G(z) = z\phi(G(z))$, where $\phi(z) = \frac{1}{1-\frac{1}{2}z(1+\frac{1}{1-z})}$. Equivalently, this can be rewritten as $\phi(z) = \frac{2-2z}{z^2 -4z+2}$. So, $\phi(z)$ is a rational fraction, whose pole with smallest absolute value is $2-\sqrt{2} \approx 0.5858$. As such, $\phi(z)$ is analytic at $0$, with radius of convergence $R=2-\sqrt{2}$. Moreover, owing to footnote~\ref{footnote:aperiodic}, $\phi(z)$ is aperiodic. Finally, the characteristic equation $\phi(z)-z\phi'(z)=0$ can be numerically solved (see companion Maple worksheet), showing that it admits a unique solution in the disk of convergence of $\phi$, namely $\tau \approx 0.34270$. Therefore, the hypotheses of Theorem~\ref{thm:singular_inversion} are all satisfied, and denoting $\rho = \frac{\tau}{\phi(\tau)} \approx 0.19464$, Theorem~\ref{thm:singular_inversion} gives: $$[z^n]G(z) \sim \sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} \frac{\rho^{-n}}{\sqrt{\pi n^3}}\textrm{.} $$ Using the Stirling estimate of the factorial $n! \sim \left(\frac{n}{e}\right)^n \sqrt{2\pi n}$, we get: $$g_n \sim \left(\frac{n}{e}\right)^n \sqrt{2 \pi n} \sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} \frac{\rho^{-n}}{\sqrt{\pi n^3}} \sim \frac{n^{n-1}}{(e\rho)^n}\sqrt{\frac{\phi(\tau)}{\phi''(\tau)}}\textrm{.} $$ Replacing $\tau$ and $\rho$ by their numerical approximations, we obtain the announced result. \end{proof} \subsection{Refined enumeration and asymptotic distribution of parameters} From the specification of pointed level-$1$ networks seen in the proof of Theorem~\ref{thm:GF_Unrooted_1}, it follows easily, as done in~\cite{SempleSteel2006}, that the multivariate generating function $G(z,x,y) = \sum_{n,k,m}\tfrac{g_{n,k,m}}{n!}z^n x^k y^m $, where $g_{n,k,m}$ is the number of unrooted level-$1$ networks with $n+1$ leaves, $k$ cycles, and $m$ inner edges, satisfies \begin{equation} G(z,x,y) = z + \frac12 G(z,x,y)^2 + \frac12 x y^3 \frac{G(z,x,y)^2}{1-y G(z,x,y)}. \label{eq:unrooted1multivariate} \end{equation} This equation can be rewritten as $G(z,x,y) = z \phi(G(z,x,y),x,y)$ where $\phi$ is defined by $\phi(z,x,y) = \tfrac{1}{1-\frac12 z \left(1+ \frac{xy^3}{1-yz}\right)}$. As done in~\cite{SempleSteel2006}, we can apply the Lagrange inversion formula to obtain an explicit expression for $g_{n,k,m}$ -- see \cite[Thm. 4]{SempleSteel2006}. Using Theorem~\ref{Drmota}, the above equation may also be used to prove that the parameters ``number of cycles'' and ``number of inner edges'' are both asymptotically normally distributed. \begin{proposition} Let $X_n$ (resp. $Y_n$) be the random variable counting the number of cycles (resp. inner edges) in unrooted level-$1$ networks with $n+1$ leaves. Both $X_n$ and $Y_n$ are asymptotically normally distributed, and more precisely, we have \[ \mathbb{E} {X_n}= \mu_X n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{X_n}=\sigma_X^{2} n+O(1) \;\;\;\; and \;\;\;\;\; \dfrac{X_{n}-\mathbb{E} {X_n}}{\sqrt{\mathbb{V}ar{X_n}}}\xrightarrow{d} \mathcal{N}(0,1), \] \[ \mathbb{E} {Y_n}= \mu_Y n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{Y_n}=\sigma_Y^{2} n+O(1) \;\;\;\; and \;\;\;\;\; \dfrac{Y_{n}-\mathbb{E} {Y_n}}{\sqrt{\mathbb{V}ar{Y_n}}}\xrightarrow{d} \mathcal{N}(0,1), \] where $\mu_X \approx 0.46 $, $\sigma_X^2 \approx 0.18 $, $\mu_Y \approx 1.61 $ and $\sigma_Y^2 \approx 1.44 $. \label{prop:normaldistribunrooted1} \end{proposition} \begin{proof} Consider first $X_n$. Defining $G(z,x) := G(z,x,1)$, it holds that $$ \mathbb{E} x^{X_n}= \dfrac{[z^n]G(z,x)}{[z^n]G(z,1)}. $$ It follows from the equation for $G(z,x,y)$ that $G(z,x) = F(G(z,x),z,x)$, where $F$ is defined by $F(G,z,x) = z \frac{1}{1-\frac{1}{2}G\left(1+\frac{x}{1-G}\right)}$. Being rational, we see immediately that $F(G,z,x)$ is analytic in $G$, $z$ and $x$ around $0$. Moreover, performing the substitution $z=0$ (resp. $G=0$) gives $F(G,0,x) = 0$ (resp. $F(0,z,x) = z$, which is not identically $0$). Finally, it is readily checked that $F$ satisfies $[z^nG^m]F(G,z,1) \geq 0$ for all $n,m$ (noting for instance that $F$ is obtained using several times the quasi-inverse operator $A \mapsto \frac{1}{1-A}$, which has a combinatorial counterpart, as seen in Proposition~\ref{dictionary}). In addition, we can determine numerically that the system \begin{align*} G=&F(G,z,1) \\ 1=&F_G(G,z,1) \end{align*} admits a solution $(G_0,z_0)$ such that $G_0 \approx 0.3427$ and $z_0 \approx 0.1946$, which satisfies the hypothesis of Theorem~\ref{Drmota} (see the companion Maple worksheet to determine the solution and to check it satisfies the required hypotheses). The result then follows from Theorem~\ref{Drmota}, and the numerical estimates of $\mu_X$ and $\sigma_X^2$ are obtained plugging the numerical estimates for $G_0$ and $z_0$ into the explicit formulas given by Theorem~\ref{Drmota} (see again companion Maple worksheet for details). The proof for $Y_n$ follows the exact same steps, considering this time $G(z,y) := G(z,1,y)$ instead, and adjusting the definition of $F$ accordingly. As expected, the solution $(G_0,z_0)$ of the associated system is the same as above. \end{proof} \begin{remark} \label{rk:usingThm} In the above proof of Proposition~\ref{prop:asym_Unrooted_1} (resp. Proposition~\ref{prop:normaldistribunrooted1}), we have provided some details on how Theorem~\ref{thm:singular_inversion} (resp. Theorem~\ref{Drmota}) was used and on how its hypotheses were checked. This is omitted in later proofs using Theorem~\ref{thm:singular_inversion} (see Propositions~\ref{prop:asym_Rooted_1}, \ref{prop:asym_Unrooted_2} and \ref{asy_rooted2}) or Theorem~\ref{Drmota} (see Propositions~\ref{prop:normaldistribunrooted1}, \ref{prop:normaldistribrooted2} and \ref{prop:normaldistribunrooted2}), since they work following the exact same steps. Note also that all numerical resolutions of equations are done in the companion Maple worksheet. \end{remark} \section{Counting rooted level-1 networks}\label{sec:rooted1} \subsection{Combinatorial specification and generating function} As for unrooted level-1 networks, we start by a combinatorial specification that describes rooted level-1 networks (also called rooted galled trees). Because every cycle in a rooted level-1 network not only has a tree vertex above all other vertices of the cycle, but also a reticulation vertex which is below all other vertices of the cycle, notice that these objects are different from the pointed level-1 networks that we considered in the proof of Theorem~\ref{thm:GF_Unrooted_1}. Recall that each cycle of a level-1 network has strictly more than one outgoing arc (otherwise there would be an infinite number of level-1 networks on $n$ taxa). Let us denote by $\mathcal{R}$ the set of rooted level-1 networks. The size of a network of $\mathcal{R}$ is the number of its leaves. Distinguishing on the level (0 or 1) of the bridgeless component containing its root, a network of $\mathcal{R}$ is described in exactly one of the following ways. It may be: \begin{itemize} \item a single leaf (case $0a$); \item a binary root vertex with two children that are roots of networks of $\mathcal{R}$, whose left-to-right order is irrelevant (case $0b$); \item a cycle containing the root with at least two outgoing cut arcs leading to networks of $\mathcal{R}$. This last possibility splits into two subcases, since the reticulation vertex of the cycle may be a child of the root: \begin{itemize} \item a cycle whose reticulation vertex is attached to a network of $\mathcal{R}$, is a child of the root and is the lowest vertex of a path coming from the root, where a sequence of at least one network of $\mathcal{R}$ is attached (case $1a$); \item a cycle whose reticulation vertex is attached to a network of $\mathcal{R}$, and such that a sequence of at least one network of $\mathcal{R}$ is attached to each path of this cycle, the left-to-right order of these two paths being irrelevant (case $1b$). \end{itemize} \end{itemize} The specification for $\mathcal{R}$ is therefore the one given in Fig.~\ref{rootedlevel1}. \begin{figure}[h] \begin{center} \begin{tikzpicture}[ scale=0.7, level/.style={thick}, virtual/.style={thick,densely dashed}, trans/.style={thick,<->,shorten >=2pt,shorten <=2pt,>=stealth}, classical/.style={thin,double,<->,shorten >=4pt,shorten <=4pt,>=stealth} ] \draw (-4cm,0cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-4.5cm,-1cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (-3.5cm,-1cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-4.5cm,-1.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal R}$}; \draw (-3.5cm,-1.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal R}$}; \draw (-4cm,-2cm) node[inner sep=1.5pt,circle] (5) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (1)--(2); \draw (1)--(3); \draw (-2cm,0cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-2cm,-1.5cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (-2cm,-2cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-2cm,-2.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal R}$}; \draw [line width=2pt,blue,->] (1) to[out=0,in=45] (2); \draw [black,-] (1) to[out=180,in=180] (2); \draw (2)--(3); \draw (0cm,0cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (0cm,-1.5cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (0cm,-2cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (0cm,-2.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal R}$}; \draw [line width=2pt,blue,->] (1) to[out=0,in=45] (2); \draw [line width=2pt,red,->] (1) to[out=180,in=135] (2); \draw (0cm,-.8cm) node[inner sep=1.5pt,circle] (5) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (2)--(3); \draw (-1cm,-.5cm) node[inner sep=1.5pt,circle] (4) {$\biguplus$}; \draw (-3cm,-.5cm) node[inner sep=1.5pt,circle] (5) {$\biguplus$}; \draw (-5cm,-.5cm) node[inner sep=1.5pt,circle] (6) {$\biguplus$}; \draw (-6cm,-.5cm) node[inner sep=1.5pt,circle] (7) {$\bullet$}; \draw (-8cm,-.5cm) node[inner sep=1.5pt,circle] (8) {$=$}; \draw (-9cm,-.5cm) node[inner sep=1.5pt,circle] (9) {${\mathcal R}$}; \draw (-8cm,.5cm) node[inner sep=1.5pt,circle] (7) {Cases:}; \draw (-6cm,.5cm) node[inner sep=1.5pt,circle] (7) {$0a$}; \draw (-4cm,.5cm) node[inner sep=1.5pt,circle] (7) {$0b$}; \draw (-2cm,.5cm) node[inner sep=1.5pt,circle] (7) {$1a$}; \draw (0cm,.5cm) node[inner sep=1.5pt,circle] (7) {$1b$}; \end{tikzpicture} \end{center} \caption{The combinatorial specification for rooted level-1 networks. (In this picture, all arcs are directed downwards, the thick arcs each represent a directed path which contains at least one internal vertex incident with a cut arc.)} \label{rootedlevel1} \end{figure} Denoting $r_n$ the number of rooted level-1 networks on $n$ leaves, and $R(z)=\sum_{n \geq 0} r_n\frac{z^n}{n!}$ the associated exponential generating function, we deduce from the specification that $$R=z+\frac{1}{2}R^2+\frac{R^2}{1-R}+\frac{R}{2}\left(\frac{R}{1-R}\right)^2\textrm{.}$$ Unlike for the other generating functions considered in this paper, the above equation for $R$ allows to find a closed formula for $R$. Indeed, the above equation has four solutions that can be made explicit with the help of a solver. We can further notice that evaluating the generating function $R(z)$ at $z=0$, we must obtain $R(0) = r_0 = 0$. Among the four candidate solutions for $R$, we therefore select the only one which has value 0 for $z=0$ and obtain an explicit form for $R(z)$, given in Theorem~\ref{thm:GF_Rooted_1}. \begin{theorem}\label{thm:GF_Rooted_1} The exponential generating function $R(z)$ of rooted level-1 networks is expressed as $$R(z)=-\frac{\sqrt 2 \sqrt{-4(\sqrt{1-8z} - 2)z + 9 \sqrt{1-8z} - 1} }{4(1-8z)^{\frac{1}{4}}} - \frac{1}{4} \sqrt{1-8z} + \frac{5}{4}$$ within its disk of convergence of radius $\frac{1}{8}$. \end{theorem} \subsection{Exact enumeration formula} The first terms of the sequence $(r_0,r_1, r_2, \ldots)$ can be read on the Taylor expansion of $R(z)$, and have been collected in Table~\ref{TableNumbers}: $$R(z) = z + 3 \frac{z^2}{2!} + 36 \frac{z^3}{3!} + 723 \frac{z^4}{4!} + 20280 \frac{z^5}{5!} + o(z^{5}) \textrm{.}$$ More generally, we have: \begin{proposition} For any $n \geq 1$, the number $r_n$ of rooted level-1 networks with $n$ leaves is given by $$\frac{(2n-2)!}{2^{n-1}(n-1)!} + \sum_{1 \leq k \leq i \leq n-1 \atop 0 \leq p\leq k} \frac{(n+i-1)! (n+k-i-2)! \quad 2^{p-i}}{(i-k)!(k-p)!p!(n-1-i-k+p)!(2k-p-1)!}\textrm{.} $$ \label{prop:enum_Rooted_1} \end{proposition} \begin{proof} To obtain a generic formula for $r_n$, we apply the Lagrange inversion formula, rewriting $R(z)$ as $R(z)=z \phi(R(z))\textrm{ where }\phi (z) = \frac{1}{1-\frac{1}{2}z-\frac{z}{1-z}-\frac{1}{2}\left(\frac{z}{1-z}\right)^2}\textrm{.}$ Using twice the usual development of $(1-z)^{-n}$ (for $n \geq 1$) which we recalled in Eq.~\eqref{eq:classical_expansion} and twice the binomial theorem, we obtain that \begin{align*} \phi(z)^n = &\sum_{i \geq 0} {{n+i-1} \choose {i}} \frac{z^i}{2^i} \\ + & \sum_{i \geq 0} \sum_{k=1}^i \sum_{p=0}^k \sum_{j \geq 0} {{n+i-1} \choose {i}} {{i} \choose {k}} {{k} \choose {p}} {{2k-p+j-1} \choose {j}} \frac{z^{i+k-p+j}}{2^{i-p}}\textrm{,} \end{align*} and we deduce that \begin{align*} r_n & = n! [z^n] R(z) = n! \frac{1}{n} [z^{n-1}] \phi(z)^n = (n-1)! [z^{n-1}] \phi(z)^n \\ & = \frac{(2n-2)!}{2^{n-1}(n-1)!} \\ & + \sum_{1 \leq k \leq i \leq n-1 \atop 0 \leq p\leq k} \frac{(n+i-1)! (n+k-i-2)!}{(i-k)!(k-p)!p!(n-1-i-k+p)!(2k-p-1)!} 2^{p-i} \end{align*} as announced. \end{proof} \subsection{Asymptotic evaluation} The equation for $R(z)$ also enables us to derive an asymptotic estimate of $r_n$. \begin{proposition} The number $r_n$ of rooted level-1 networks on $n$ leaves is asymptotically equivalent to $c_1 \cdot c_2^n \cdot n^{n-1}$ for $c_1 = \frac{\sqrt{34}(\sqrt{17}-1)}{136} \approx 0.1339$ and $c_2 = \frac{8}{e} \approx 2.943$. \label{prop:asym_Rooted_1} \end{proposition} \begin{proof} Recall that $R(z)=z \phi(R(z))\textrm{ where }\phi (z) = \frac{1}{1-\frac{1}{2}z-\frac{z}{1-z}-\frac{1}{2}\left(\frac{z}{1-z}\right)^2}$ so that we can apply the Singular Inversion Theorem. Unlike in the case of unrooted level-1 networks, the solution $\tau$ of the characteristic equation $\phi(z)-z\phi'(z)=0$ to be considered has a nice explicit expression here, and we have $\tau =\frac{5- \sqrt{17}}{4}$. We obtain $\rho = \frac{\tau}{\phi(\tau)} = \frac{1}{8}$ and $\sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} = \frac{\sqrt{17} (\sqrt{17}-1)}{136}$. Consequently, from Theorem~\ref{thm:singular_inversion} we have: $$ [z^n] R(z) \sim \frac{\sqrt{17} (\sqrt{17}-1)}{136} \frac{8^n}{\sqrt{\pi n^3}}\textrm{.} $$ Since $r_n = n! [z^n] R(z)$, using the Stirling estimate of the factorial, we finally get: $$ r_n \sim \frac{\sqrt{34}(\sqrt{17}-1)}{136} \left(\frac{8}{e}\right)^n n^{n-1}\textrm{.} \hfill $$ \end{proof} Notice that with the explicit expression of the generating function $R(z)$ in Theorem~\ref{thm:GF_Rooted_1}, another way of proving Proposition~\ref{prop:asym_Rooted_1} would have been to use the Transfer Theorem (Corollary VI.1 of~\cite{FlajoletSedgewick2008}). We do not enter the details of this other method here, but we can check that it gives the same result. \subsection{Refined enumeration formula} As in the work of Semple and Steel~\cite{SempleSteel2006}, we can refine the enumeration of rooted level-1 networks according to two additional parameters, which are typical of the ``level-1'' nature of our networks: their number of cycles and their total number of arcs among cycles. To do so, let us introduce the multivariate generating function $R(z,x,y) = \sum \frac{r(n,k,m)}{n!} z^n x^k y^m$, where $r(n,k,m)$ is the number of rooted level-1 networks with $n$ leaves, $k$ cycles and $m$ inner arcs (i.e. the total number of arcs inside those $k$ cycles is $m$). The specification for $\mathcal{R}$ translates into the following equation for $R= R(z,x,y)$: \begin{equation} R=z+\frac{1}{2}R^2+x\frac{R^2y^3}{1-yR}+xR\frac{1}{2}\left(\frac{Ry^2}{1-yR}\right)^2\textrm{.} \label{eq:rooted1multivariate} \end{equation} The equation can be rewritten as follows: $$R=z \phi(R,x,y)\textrm{ where }\phi (z,x,y) = \frac{1}{1-\frac{1}{2}z-x\frac{zy^3}{1-yz}-\frac{1}{2}xy^4\left(\frac{z}{1-yz}\right)^2}\textrm{.}$$ Applying the Lagrange inversion formula again, we have $$\frac{r(n,k,m)}{n!} = [z^n x^k y^m] R(z,x,y) = \frac{1}{n}[z^{n-1} x^k y^m] \phi(z,x,y)^n,$$ and by the exact same steps of computation as in the proof of Proposition~\ref{prop:enum_Rooted_1}, we get: \begin{proposition} The number $r(n,k,m)$ of level-1 networks with $n$ leaves, $k$ cycles and $m$ inner arcs (with $k\geq 1$ and $m\geq 1$) is $$ r(n,k,m) = \sum_{p=0}^k \frac{(2n+3k-m-2)! (m-2k-1)! 2^{p+m+1-n-3k}}{(n+2k-m-1)! p! (k-p)! (m-4k+p)! (2k-p-1)!} \textrm{.} $$ \label{prop:refinedEnumerationRooted1} \end{proposition} Notice that from $r_n = r(n,0,0) + \sum_{k=1}^{n-1} \sum_{m=3k}^{n+2k-1} r(n,k,m)$ and the above theorem, we can recover Proposition~\ref{prop:enum_Rooted_1} by the change of variable $m=n+3k-i-1$. \subsection{Asymptotic distribution of parameters} As we have seen with Proposition~\ref{prop:normaldistribunrooted1}, the equation for the refined generating function does not only give access to the explicit formula of Proposition~\ref{prop:refinedEnumerationRooted1} above, but also allows to prove that the two parameters of interest are each asymptotically normally distributed. \begin{proposition}\label{prop:normaldistribrooted2} Let $X_n$ (resp. $Y_n$) be the random variable counting the number of cycles (resp. inner arcs) in rooted level-$1$ networks with $n$ leaves. Both $X_n$ and $Y_n$ are asymptotically normally distributed, and more precisely, we have \[ \mathbb{E} {X_n}= \mu_X n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{X_n}=\sigma_X^{2} n+O(1) \;\;\;\; and \;\;\;\;\; \dfrac{X_{n}-\mathbb{E} {X_n}}{\sqrt{\mathbb{V}ar{X_n}}}\xrightarrow{d} \mathcal{N}(0,1), \] \[ \mathbb{E} {Y_n}= \mu_Y n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{Y_n}=\sigma_Y^{2} n+O(1) \;\;\;\; and \;\;\;\;\; \dfrac{Y_{n}-\mathbb{E} {Y_n}}{\sqrt{\mathbb{V}ar{Y_n}}}\xrightarrow{d} \mathcal{N}(0,1), \] where $\mu_X \approx 0.56 $, $\sigma_X^2 \approx 0.18 $, $\mu_Y \approx 1.93 $ and $\sigma_Y^2 \approx 1.24 $. \end{proposition} \begin{proof} Recall that, defining $\phi (z,x,y) = \frac{1}{1-\frac{1}{2}z-x\frac{zy^3}{1-yz}-\frac{1}{2}xy^4\left(\frac{z}{1-yz}\right)^2}$, $R(z,x,y)$ satisfies $R=z \phi(R,x,y)$. We focus first on $X_n$, setting $y=1$, and we consider $R(z,x) := R(z,x,1)$. It holds that $$ \mathbb{E} x^{X_n}= \dfrac{[z^n]R(z,x)}{[z^n]R(z,1)}. $$ Defining the function $F$ by $F(R,z,x) = z\phi(R,x,1)$, it also holds that $R(z,x) = F(R(z,x),z,x)$. It is readily checked that $F$ satisfies all hypotheses of Theorem~\ref{Drmota}. Moreover, the system \begin{align*} R=&F(R,z,1) \\ 1=&F_R(R,z,1) \end{align*} admits a solution $(R_0,z_0)$ with $z_0= 1/8$ and $R_0 \approx 0.2192$, which satisfies the hypothesis of Theorem~\ref{Drmota}. The result and numerical estimates of $\mu_X$ and $\sigma_X^2$ then follow from Theorem~\ref{Drmota}. For $Y_n$ instead of $X_n$, the proof works in the exact same way, considering this time $R(z,y) := R(z,1,y)$ instead, and adjusting the definition of $F$ accordingly. As in the proof of Proposition~\ref{prop:normaldistribunrooted1}, we find the same solution $(R_0,z_0)$ of the associated system, as it should be. \end{proof} \section{Counting unrooted level-2 networks} \label{sec:unrooted2} \subsection{Combinatorial specification} First of all, let us recall that any bridgeless component in an unrooted level-2 network contains at least three vertices incident with a cut-edge (since otherwise there would be an infinite number of such networks with a given number of leaves). As in the case of level-1 unrooted networks, we consider \emph{pointed} level-2 networks, that are unrooted level-2 networks equipped with a fictitious root, which is a new leaf labeled by the special taxa $\#$. This provides a bijection between unrooted level-2 networks on the set of taxa $X \uplus \{\#\}$ and pointed level-2 networks on $X$. Therefore, there are as many unrooted level-2 networks of the set of taxa $X \uplus \{\#\}$ as pointed level-2 networks on $X$ rooted in a leaf labeled by $\# \notin X$. Notice that pointed level-2 networks do not correspond to classical rooted level-2 networks. Indeed, every bridgeless component in a pointed level-2 network has a distinguished vertex which could be considered as the equivalent of a root, but no reticulation vertices, whereas it has both in the usual definition of rooted level-2 networks. Let us denote by $\mathcal{U}$ the set of such pointed level-2 networks, the size of a network of $\mathcal{U}$ being the number of its leaves different from the root. Let $u_n$ be the number of networks of size $n$ in $\mathcal{U}$. The above argument shows that $u_n$ counts the number of unrooted level-2 networks on $(n+1)$ leaves. We introduce $U(z)=\sum_{n \geq 0} u_n\frac{z^n}{n!}$ the associated exponential generating function. To obtain a combinatorial specification for $\mathcal{U}$, and hence an equation satisfied by $U(z)$, we describe the possible shapes of a network $N$ of $\mathcal{U}$, depending on the level (0, 1 or 2) of the bridgeless component that contains the neighbouring vertex of the fictitious root. Let $v$ be the neighbor of the fictitious root. Then we have the following cases to consider, depending on the level of the bridgeless component that contains $v$. \begin{itemize} \item The first case is that $v$ is a leaf. \item If $v$ does not belong to a cycle nor to a bridgeless component of level 2, then $N$ is described as an unordered pair of two pointed level-2 networks. \item If $v$ belongs to a cycle but not to a bridgeless component of level 2, then $N$ is described as an unoriented sequence of at least two pointed level-2 networks. \\ (These first three cases are the same as in Section~\ref{sec:rooted1}.) \item The last possibility is that $v$ belongs to a bridgeless component of level 2. The underlying level-2 generator, $G$, is necessarily of the shape \begin{tikzpicture}[baseline=(top.base)] \begin{scope}[scale=0.3] \draw (2,4.5) node [] (pointed) {\#}; \draw (2,2.5) node [circle, inner sep=1,fill,draw] (top) {}; \draw (0,1) node [circle, inner sep=1,fill,draw] (left) {}; \draw (4,1) node [circle, inner sep=1,fill,draw] (right) {}; \draw (pointed) -- (top); \draw (top) .. controls(0.5,2) .. (left); \draw (top) .. controls(3.5,2) .. (right); \draw (right) .. controls(3,-1) .. (left); \draw (left) .. controls(1,-1) .. (right); \end{scope} \end{tikzpicture}. \noindent In this case, we distinguish many cases in Section~\ref{appendix-unrooted-l2} of the Appendix, depending on whether each edge of the level-2 generator contains exactly one vertex incident with a cut-edge, several or none. \end{itemize} \subsection{Generating function} The specification is directly translated into the following equation for the generating function $U$ (see the Appendix for details): \begin{align*}\label{eq:unrooted2multivariate} {U}&=z+ \frac{{U}^2}{2}+\frac{{U}^2}{2(1- {U})} +\frac{{U}^2}{2(1- {U})} +\frac{3}{2}{U}^2 +\frac{5{U}^3}{2(1- {U})} +\frac{5{U}^4}{4(1- {U})^2} +{U}^3 +\frac{3{U}^4}{1-{U}} \\ & +\frac{3{U}^5}{(1- {U})^2} +\frac{{U}^6}{(1- {U})^3} +\frac{{U}^4}{4} +\frac{{U}^5}{1- {U}} +\frac{3{U}^6}{2(1- {U})^2} +\frac{{U}^7}{(1- {U})^3} +\frac{{U}^8}{4(1- {U})^4}. \end{align*} This equation for the generating function allows to derive the first coefficients of the series expansion of $U(z)$, namely: \[ {U}(z)=z+3z^2+\frac{45}{2}z^3+\frac{421}{2}z^4+\frac{8809}{4}z^5+\cdots. \] The corresponding first values of $u_n$ have been included in Table~\ref{TableNumbers}. (Recall indeed that $U(z)=\sum_{n \geq 0} u_n\frac{z^n}{n!}$ and that $u_n$ is the number of unrooted level-2 networks on $(n+1)$ leaves). The above equation for $U(z)$ can also be rewritten as follows: \begin{theorem} The generating function $U(z)$ satisfies: $$U(z)=z \phi(U(z))\textrm{ where }\phi (z) = \frac{1}{1-\frac{3z^5-16z^4+32z^3-30z^2+12z}{4(1-z)^4}}\textrm{.}$$ \label{thm:GF_Unrooted_2} \end{theorem} \begin{proof} This is simply obtained from the above equation for $U$ by algebraic manipulations. \end{proof} \subsection{Exact enumeration formula} To obtain a closed form for $u_n$, we start from the equation for $U$ given in Theorem~\ref{thm:GF_Unrooted_2}. By the Lagrange inversion formula we obtain that: $$u_n = n! [z^n]U(z) = \frac{n!}{n}[z^{n-1}] \phi^n(z) = (n-1)! [z^{n-1}] \phi^n(z),$$ so, to compute the first values of $u_n$, we can compute the Taylor expansions of $\phi^n(z)$ and get the values in Table~\ref{TableNumbers}. As for the case of level-1 networks, we may also deduce with routine algebra an explicit formula for $u_n$. This formula being however rather involved, we provide it only in Appendix. \subsection{Asymptotic evaluation} From Theorem~\ref{thm:GF_Unrooted_2}, we can furthermore derive an asymptotic evaluation of the number $u_n$ of unrooted level-2 networks on $(n+1)$ leaves, using Theorem~\ref{thm:singular_inversion}. \begin{proposition} The number $u_n$ of unrooted level-2 networks on $(n+1)$ leaves is asymptotically equivalent to $c_1 \cdot c_2^n \cdot n^{n-1}$ for constants $c_1$ and $c_2$ such that $c_1 \approx 0.07695$ and $c_2 \approx 5.4925$. \label{prop:asym_Unrooted_2} \end{proposition} \begin{proof} Denoting by $\tau \approx 0.12117$ the unique solution of the characteristic equation $\phi(z)-z\phi'(z)=0$ in the disk of convergence of $\phi$, and $\rho = \frac{\tau}{\phi(\tau)} \approx 0.06698$, we have: $$[z^n]U(z) \sim \sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} \frac{\rho^{-n}}{\sqrt{\pi n^3}}\textrm{.} $$ Using the Stirling estimate of the factorial, we get: $$u_n \sim \left(\frac{n}{e}\right)^n \sqrt{2 \pi n} \sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} \frac{\rho^{-n}}{\sqrt{\pi n^3}} \sim \frac{n^{n-1}}{(e\rho)^n}\sqrt{\frac{\phi(\tau)}{\phi''(\tau)}}\textrm{.} $$ Replacing $\tau$ and $\rho$ by their numerical approximations, we get the announced result. \end{proof} \subsection{Refined enumeration formula and asymptotic distribution of parameters} Consider the refined generating function $ {U}(z,x,y)$ for unrooted level-2 networks, where the variable $z$ counts the size as before, the variable $x$ counts the number of bridgeless components of level 1 or 2 (or equivalently, the number of level-1 or level-2 generators in the decomposition of these networks), and the variable $y$ counts the number of inner edges, defined as the total number of edges across all level-1 and level-2 bridgeless components. The specification provided in the Appendix can be refined for these statistics, yielding the following equation for $ U := {U}(z,x,y)$: \begin{align} {U}=z&+\frac{{U}^2}{2}+\frac{xy^3{U}^2}{2(1-y {U})}+\frac{xy^6{U}^2}{2(1-y {U})}+\frac{3}{2}xy^6 {U}^2+\frac{5xy^7{U}^3}{2(1-y {U})}+\frac{5xy^8{U}^4}{4(1-y {U})^2} \nonumber \\ &+xy^7{U}^3+\frac{3xy^{8}{U}^4}{1-y {U}}+\frac{3xy^{9}{U}^5}{(1-y {U})^2}+\frac{xy^{10}{U}^6}{(1-y {U})^3}+\frac{xy^8{U}^4}{4}+\frac{xy^{9}{U}^5}{1-y {U}} \nonumber\\ &+\frac{3xy^{10}{U}^6}{2(1-y {U})^2}+\frac{xy^{11}{U}^7}{(1-y {U})^3}+\frac{xy^{12}{U}^8}{4(1-y {U})^4}. \label{eq:multi_unrooted2 \end{align} From the above equation, and similarly to Proposition~\ref{prop:refinedEnumerationRooted1}, it would be possible (although computations and result are not reported in this paper) to derive an explicit formula for the number of unrooted level-2 networks with $n$ leaves, $k$ bridgeless components of level 1 or 2, and $m$ edges across them. Furthermore, some information on the asymptotic behavior of these parameters can be obtained from Eq.~\eqref{eq:multi_unrooted2}. \begin{proposition} Let $X_n$ (resp. $Y_n$) be the random variable counting the number of level-1 or level-2 bridgeless components (resp. the number of edges across them) in unrooted level-$2$ networks with $n+1$ leaves. Both $X_n$ and $Y_n$ are asymptotically normally distributed, and more precisely, we have \[ \mathbb{E} {X_n}= \mu_X n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{X_n}=\sigma_X^{2} n+O(1) \;\;\;\; and \;\;\;\;\; \dfrac{X_{n}-\mathbb{E} {X_n}}{\sqrt{\mathbb{V}ar{X_n}}}\xrightarrow{d} \mathcal{N}(0,1), \] \[ \mathbb{E} {Y_n}= \mu_Y n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{Y_n}=\sigma_Y^{2} n+O(1) \;\;\;\; and \;\;\;\;\; \dfrac{Y_{n}-\mathbb{E} {Y_n}}{\sqrt{\mathbb{V}ar{Y_n}}}\xrightarrow{d} \mathcal{N}(0,1), \] where $\mu_X \approx 0.69944 $, $\sigma_X^2 \approx 0.16919 $, $\mu_Y \approx 4.01349 $ and $\sigma_Y^2 \approx 4.68675 $. \label{prop:normaldistribunrooted2} \end{proposition} \begin{proof} Consider first $X_n$. Defining $U(z,x) := U(z,x,1)$, it holds that $$ \mathbb{E} x^{X_n}= \dfrac{[z^n]U(z,x)}{[z^n]U(z,1)}. $$ It follows from the equation for $U(z,x,y)$ that $U(z,x) = F(U(z,x),z,x)= z \frac{1}{1-A(U(z,x),z,x)}$ with \begin{align*} A(U,z,x) =& \frac{{U}}{2}+\frac{x{U}}{2(1-{U})}+\frac{x{U}}{2(1-{U})}+\frac{3x {U}}{2}+\frac{5x{U}^2}{2(1- {U})}+\frac{5x{U}^3}{4(1- {U})^2}+x{U}^2\\ &+\frac{3x{U}^3}{1-{U}}+\frac{3x{U}^4}{(1-{U})^2}+\frac{x{U}^5}{(1-{U})^3}+\frac{x{U}^3}{4}+\frac{x{U}^4}{1-{U}}+\frac{3x{U}^5}{2(1-{U})^2}\\ &+\frac{x{U}^6}{(1-{U})^3}+\frac{x{U}^7}{4(1- {U})^4}. \end{align*} It is readily checked that $F$ satisfies all hypotheses of Theorem~\ref{Drmota}. The system \begin{align*} U=&F(U,z,1) \\ 1=&F_U(U,z,1) \end{align*} admits a solution $(U_0,z_0)$ such that $U_0 \approx 0.1212$ and $z_0 \approx 0.06698$, which satisfies the hypothesis of Theorem~\ref{Drmota}. The result then follows from Theorem~\ref{Drmota}, and the numerical estimates of $\mu_X$ and $\sigma_X^2$ are obtained plugging the numerical estimates for $U_0$ and $z_0$ into the explicit formulas given by Theorem~\ref{Drmota}. The proof for $Y_n$ follows the exact same steps, considering this time $U(z,y) := U(z,1,y)$ instead, and adjusting the definition of $F$ accordingly. Again, as expected, the solution $(U_0,z_0)$ of the associated system is the same as above. \end{proof} \section{Counting rooted level-2 networks}\label{sec:rooted2} \subsection{Combinatorial specification and generating function} To derive a specification for rooted level-2 networks, we distinguish cases depending on the level ($0$, $1$ or $2$) of the generator to which the root belongs. The cases corresponding to levels $0$ and $1$ will be the same as in Section~\ref{sec:rooted1}. When the root of a rooted level-2 network belongs to a level-$2$ generator, we have to remember that these generators have one vertex which is above all their other vertices (which is the root of the network) and not just one but two reticulation vertices. As for rooted level-1 networks, it is important to keep in mind that any bridgeless component of level $2$ in a rooted level-2 network has at least two outgoing cut arcs (since otherwise there would be an infinite number of such networks with a given number of leaves). We denote by $\mathcal{L}$ the set of rooted level-2 networks, where the size corresponds to the number of leaves. And we denote by $L(z)$ the corresponding exponential generating function. Distinguishing on the level (0, 1 or 2) of the bridgeless component containing the root, we can see that any network $N$ of $\mathcal{L}$ satisfies exactly one of the following (see Fig.~\ref{rootedlevel2}). \begin{itemize} \item $N$ is just a leaf. This contributes $z$ to the generating function (case $0a$). \item The root of $N$ belongs to a bridgeless component of level 0, that is to say it is a binary root vertex. Its children are themselves networks of $\mathcal{L}$ whose left-to-right order is irrelevant. This contributes $\frac{L^2}{2}$ to the generating function (case $0b$). \item The root of $N$ belongs to a bridgeless component of level 1. This case splits into two subcases, just as in Section~\ref{sec:rooted1}. \begin{itemize} \item Either $N$ consists of a cycle whose reticulation vertex is attached to a network of $\mathcal{L}$, is a child of the root and is the lowest vertex of a path from the root where a sequence of at least one network of $\mathcal{L}$ is attached. This contributes $\frac{L^2}{1-L}$ to the generating function (case $1a$). \item Or $N$ consists of a cycle whose reticulation vertex is attached to a network of $\mathcal{L}$, and a sequence of at least one network of $\mathcal{L}$ is attached to each path of this cycle (case $1b$). This contributes $\frac{L}{2}\left(\frac{L}{1-L}\right)^2$. \end{itemize} \item The root of $N$ belongs to a bridgeless component of level 2. The level-2 generators are displayed in Fig.~\ref{rootedlevel2}, cases $2a$ to $2d$. From these generators, the networks whose root belong to a bridgeless component of level 2 are obtained attaching networks of $\mathcal{L}$ to their reticulation vertex or vertices with out-degree 0, and possibly replacing their arcs with sequences of at least one network of $\mathcal{L}$. Note that in cases $2b$ and $2d$, depending on our choices for such arcs, we may have to cope with horizontal and vertical symmetry. We study these cases in order, and find their contribution to the generating function $L(z)$. \end{itemize} \begin{figure}[h] \begin{center} \begin{tikzpicture}[ scale=0.7, level/.style={thick}, virtual/.style={thick,densely dashed}, trans/.style={thick,<->,shorten >=2pt,shorten <=2pt,>=stealth}, classical/.style={thin,double,<->,shorten >=4pt,shorten <=4pt,>=stealth} ] \draw (-4cm,0cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-4.5cm,-1cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (-3.5cm,-1cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-4.5cm,-1.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal L}$}; \draw (-3.5cm,-1.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal L}$}; \draw (-4cm,-2cm) node[inner sep=1.5pt,circle] (5) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (1)--(2); \draw (1)--(3); \draw (-2cm,0cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-2cm,-1.5cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (-2cm,-2cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-2cm,-2.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal L}$}; \draw [blue,->] (1) to[out=0,in=0] (2); \draw [black,-] (1) to[out=180,in=180] (2); \draw (2)--(3); \draw (0cm,0cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (0cm,-1.5cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (0cm,-2cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (0cm,-2.5cm) node[inner sep=1.5pt,circle] (4) {${\mathcal L}$}; \draw [blue,->] (1) to[out=0,in=0] (2); \draw [red,->] (1) to[out=180,in=180] (2); \draw (0cm,-.8cm) node[inner sep=1.5pt,circle] (5) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (2)--(3); \draw (-6.5cm,-3.5cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-5.8cm,-4cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (-7cm,-4.5cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-6.5cm,-5cm) node[circle,inner sep=1,fill,draw] (4) {}; \draw (-6.5cm,-5.5cm) node[circle,inner sep=1,fill,draw] (5) {}; \draw (-6.5cm,-6cm) node[inner sep=1.5pt,circle] (6) {${\mathcal L}$}; \draw (1)--(2);\draw (1)--(3);\draw (2)--(3);\draw (2)--(4);\draw (3)--(4);\draw (4)--(5); \draw (-3cm,-3.5cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-4cm,-4cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (-4cm,-5cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-3cm,-5.5cm) node[circle,inner sep=1,fill,draw] (4) {}; \draw (-3cm,-6.2cm) node[circle,inner sep=1,fill,draw] (5) {}; \draw (-3cm,-6.7cm) node[inner sep=1.5pt,circle] (6) {${\mathcal L}$}; \draw (1)--(2);\draw (1)--(4);\draw (3)--(4);\draw (4)--(5); \draw [black,-] (2) to[out=0,in=0] (3); \draw [black,-] (2) to[out=180,in=180] (3); \draw (-4.6cm,-4.6cm) node[inner sep=1.5pt,circle] (7) {$e$}; \draw (-3.3cm,-4.5cm) node[inner sep=1.5pt,circle] (8) {$e^\prime$}; \draw (-4cm,-5.5cm) node[inner sep=1.5pt,circle] (9) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (-.5cm,-3.5cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (-1cm,-4cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (.2cm,-5cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (-.5cm,-4.5cm) node[circle,inner sep=1,fill,draw] (4) {}; \draw (-1cm,-5cm) node[circle,inner sep=1,fill,draw] (5) {}; \draw (-1cm,-5.5cm) node[circle,inner sep=1,fill,draw] (6) {}; \draw (.2cm,-5.5cm) node[circle,inner sep=1,fill,draw] (7) {}; \draw (-1cm,-6cm) node[inner sep=1.5pt,circle] (8) {${\mathcal L}$}; \draw (.2cm,-6cm) node[inner sep=1.5pt,circle] (9) {${\mathcal L}$}; \draw (1)--(2);\draw (1)--(3);\draw (2)--(4);\draw (2)--(5);\draw (4)--(3);\draw (4)--(5);\draw (3)--(7);\draw (5)--(6); \draw (2cm,-3.5cm) node[circle,inner sep=1,fill,draw] (1) {}; \draw (1cm,-4cm) node[circle,inner sep=1,fill,draw] (2) {}; \draw (3cm,-4cm) node[circle,inner sep=1,fill,draw] (3) {}; \draw (2cm,-4.5cm) node[circle,inner sep=1,fill,draw] (4) {}; \draw (2cm,-6.5cm) node[circle,inner sep=1,fill,draw] (5) {}; \draw (2cm,-5.2cm) node[circle,inner sep=1,fill,draw] (6) {}; \draw (2cm,-5.7cm) node[inner sep=1.5pt,circle] (8) {${\mathcal L}$}; \draw (2cm,-7.5cm) node[circle,inner sep=1,fill,draw] (7) {}; \draw (2cm,-8cm) node[inner sep=1.5pt,circle] (9) {${\mathcal L}$}; \draw (1)--(2);\draw (1)--(3);\draw (2)--(4);\draw (3)--(4);\draw (4)--(6);\draw (2)--(5);\draw (3)--(5);\draw (5)--(7); \draw (1.3cm,-3.6cm) node[inner sep=1.5pt,circle] (10) {$e_{1}$}; \draw (2.7cm,-3.6cm) node[inner sep=1.5pt,circle] (11) {$e_{1}^\prime$}; \draw (1.6cm,-4.6cm) node[inner sep=1.5pt,circle] (12) {$e_{2}$}; \draw (2.4cm,-4.6cm) node[inner sep=1.5pt,circle] (13) {$e_{2}^\prime$}; \draw (1.3cm,-5.5cm) node[inner sep=1.5pt,circle] (14) {$e_{3}$}; \draw (2.7cm,-5.5cm) node[inner sep=1.5pt,circle] (15) {$e_{3}^\prime$}; \draw (2cm,-4.1cm) node[inner sep=1.5pt,circle] (16) {$\tiny{\overleftrightarrow{{sym}}}$}; \draw (2.5cm,-4.2cm) node[inner sep=1.5pt,circle] (17) {}; \draw (2.2cm,-6cm) node[inner sep=1.5pt,circle] (18) {}; \draw (3.6cm,-5.5cm) node[inner sep=1.5pt,circle] (19) {$ \tiny{sym} $}; \draw [black,<->] (17) to[out=-20,in=-20] (18); \draw (.5cm,-4cm) node[inner sep=1.5pt,circle] (1) {$\biguplus$}; \draw (-2cm,-4cm) node[inner sep=1.5pt,circle] (1) {$\biguplus$}; \draw (-5cm,-4cm) node[inner sep=1.5pt,circle] (2) {$\biguplus$}; \draw (-8cm,-4cm) node[inner sep=1.5pt,circle] (3) {$\biguplus$}; \draw (-1cm,-.5cm) node[inner sep=1.5pt,circle] (4) {$\biguplus$}; \draw (-3cm,-.5cm) node[inner sep=1.5pt,circle] (5) {$\biguplus$}; \draw (-5cm,-.5cm) node[inner sep=1.5pt,circle] (6) {$\biguplus$}; \draw (-6cm,-.5cm) node[inner sep=1.5pt,circle] (7) {$\bullet$}; \draw (-8cm,-.5cm) node[inner sep=1.5pt,circle] (8) {$=$}; \draw (-9cm,-.5cm) node[inner sep=1.5pt,circle] (9) {${\mathcal L}$}; \draw (-6cm,.5cm) node[inner sep=1.5pt,circle] (7) {$0a$}; \draw (-4cm,.5cm) node[inner sep=1.5pt,circle] (7) {$0b$}; \draw (-2cm,.5cm) node[inner sep=1.5pt,circle] (7) {$1a$}; \draw (0cm,.5cm) node[inner sep=1.5pt,circle] (7) {$1b$}; \draw (-6.5cm,-7cm) node[inner sep=1.5pt,circle] (7) {$2a$}; \draw (-3.5cm,-7cm) node[inner sep=1.5pt,circle] (7) {$2b$}; \draw (-.5cm,-7cm) node[inner sep=1.5pt,circle] (7) {$2c$}; \draw (1.5,-7cm) node[inner sep=1.5pt,circle] (7) {$2d$}; \end{tikzpicture} \end{center} \caption{The specification of the class $\mathcal L$.} \label{rootedlevel2} \end{figure} \begin{itemize}[leftmargin=2cm] \item[--] We first deal with the case where the level-2 generator to which the root belongs is of type $2a$. This generator has $5$ internal arcs, all distinguished from each other by the structure of the generator. A network of $\mathcal{L}$ is attached to its reticulation vertex of out-degree 0. Moreover, recalling that each bridgeless component must be have at least two outgoing cut arcs, at least one of the five internal arcs of the generator must carry a non-empty sequence of networks of $\mathcal{L}$. Therefore, the contribution of case $2a$ to the generating function of $\mathcal{L}$ is \[ {L}\cdot \sum_{i=1}^5 \binom{5}{i} \left(\dfrac{{L}}{1-{L}}\right)^i. \] \item[--] In the case where the level-2 generator to which the root belongs is of type $2b$, we similarly have $5$ internal arcs in the generator, at least one of which must be replaced by a non-empty sequence of networks of $\mathcal{L}$. However, the two arcs $e$ and $e^\prime$ are not distinguishable. The contribution to the generating function is therefore more subtle to analyze, and we perform this detailed analysis in the Section~\ref{appendix-rooted-l2} of the Appendix. The overall contribution of case $2b$ to the generating function of $\mathcal{L}$ is then shown to be {\fontsize{8}{10}\selectfont \begin{align*} {L} \frac{{L}}{1-{L}} +\frac{7}{2} {L} \left(\dfrac{{L}}{1-{L}}\right)^2 +\frac{9}{2} {L} \left(\dfrac{{L}}{1-{L}}\right)^3 + \frac52 {L} \left(\dfrac{{L}}{1-{L}}\right)^4 +\frac{1}{2} {L} \left(\dfrac{{L}}{1-{L}}\right)^5. \end{align*} } \item[--] We now consider the case where the level-2 generator to which the root belongs is of type $2c$. This generator has $6$ internal arcs, all distinguished from each other by the structure of the generator. Moreover, two networks of $\mathcal{L}$ are attached to its reticulation vertices, so that the condition that each bridgeless component must be have at least two outgoing cut arcs is already satisfied. Therefore, all $6$ internal arcs of the generator carry possibly empty sequences of networks of $\mathcal{L}$. As a consequence, the contribution of case $2c$ to the generating function of $\mathcal{L}$ is $${L}^2 \left(\dfrac{1}{1-{L}}\right)^6. $$ \item[--] Similarly, when the root belongs to a level-2 generator of type $2d$, the $6$ arcs of the generator carry possibly empty sequences of networks of $\mathcal{L}$. However, this generator enjoys both a horizontal symmetry (mapping $e_i$ to $e_i^\prime$ for $i=1,2,3$) and a vertical symmetry (exchanging the indices $2$ and $3$ and the corresponding pending networks of $\mathcal{L}$). In case all arcs carry empty sequences, the horizontal symmetry is actually the identity, so that only the vertical symmetry applies, yielding a factor $\tfrac{1}{2}$. Otherwise, both the horizontal and the vertical symmetry need to be taken into account, yielding a factor $\tfrac{1}{4}$. The total contribution of case $2d$ to the generating function of $\mathcal{L}$ is therefore \[ \frac{1}{2}L^2 + \dfrac{1}{4} {L}^2\cdot \sum_{i=1}^6 \binom{6}{i} \left(\dfrac{{L}}{1-{L}}\right)^i . \] \end{itemize} Following this case analysis we obtain an equation characterizing the generating function of $ \mathcal{L} $. \begin{theorem}\label{thm:GF_rooted_level2} The exponential generating function $L(z)$ of rooted level-2 networks counted by number of leaves satisfies \begin{align*} {L}=z&+{L}^2+\frac{7{L}^2}{1-{L}}+\frac{3{L}^3}{2(1-{L})} + \frac{14{L}^3}{(1-{L})^2}+\frac{15{L}^4}{4(1-{L})^2} + \frac{29{L}^4}{2(1-{L})^3}+\frac{5{L}^5}{(1-{L})^3}\\ &+\frac{15{L}^5}{2(1-{L})^4}+\frac{15{L}^6}{4(1-{L})^4}+\frac{3{L}^6}{2(1-{L})^5} +\frac{3{L}^7}{2(1-{L})^5} +\frac{{L}^2}{(1-{L})^6}+\frac{{L}^8}{4(1-{L})^6}, \end{align*} or equivalently \[ {L}(z)= z\phi( {L}(z)) \;\;\; where\;\;\; \phi(z)=\dfrac{1}{1-\frac{36z-102z^2+159z^3-148z^4+81z^5-24z^6+3z^7}{4(1-z)^6}}.\] \end{theorem} We therefore obtain the first terms of the series expansion of $L(z)$, \[ {L}(z)=z+9z^2+\frac{381}{2}z^3+\frac{20013}{4}z^4+\frac{588119}{4}z^5+\frac{37023465}{8}z^6+\cdots, \] as reported in Table~\ref{TableNumbers}. \subsection{Exact enumeration formula} As in the previous sections, Theorem~\ref{thm:GF_rooted_level2} allows to derive an explicit formula for the number $\ell_n$ of rooted level-2 phylogenetic networks with $n$ leaves. This complicated formula is given in Appendix. \subsection{Asymptotic evaluation} Similarly, from Theorem~\ref{thm:GF_rooted_level2}, we can also derive the asymptotic behavior of $\ell_n$. \begin{proposition}\label{asy_rooted2} The number $ \ell_n $ of rooted level-2 phylogenetic networks with $ n $ leaves behaves asymptotically as \[ \ell_n \sim c_{1}c_{2}^n n^{n-1}, \] where $c_{1}\approx 0.02931$ and $ c_{2}\approx 15.433$. \end{proposition} \begin{proof} Recall that \[ {L}(z)= z\phi( {L}(z)) \;\;\; where\;\;\; \phi(z)=\dfrac{1}{1-\frac{36z-102z^2+159z^3-148z^4+81z^5-24z^6+3z^7}{4(1-z)^6}}. \] Denoting by $\tau \approx 0.0445$ the unique solution of the characteristic equation $\phi(z)-z\phi'(z)=0$ in the disk of convergence of $\phi$, and $\rho = \frac{\tau}{\phi(\tau)} \approx 0.0238$, the Singular Inversion Theorem gives: $$[z^n] {L}(z) \sim \sqrt{\frac{\phi(\tau)}{2\phi''(\tau)}} \frac{{\rho}^{-n}}{\sqrt{\pi n^3}}\textrm{.} $$ Like before, we get the claimed result from $\ell_n = n! [z^n] {L}(z)$ and the Stirling estimate of the factorial. \end{proof} \subsection{Refined enumeration formula and asymptotic distribution of parameters} Let ${L}(z,x,y)= \sum_{n,k,m} \ell_{n,k,m} \frac{z^n}{n!} x^k y^m$ be the multivariate generating function counting rooted level-2 networks w.r.t. their number of leaves (variable $z$), their number of bridgeless components of level 1 or 2 (variable $x$) and their number of arcs across all these (variable $y$). From the specification of $\mathcal{L}$ discussed earlier, $ {L}(z,x,y)= {L} $ is easily seen to satisfy the following equation: \begin{align} {L}=z&+\frac{{L}^2}{2}+x \Big( \frac{y^6{L}^2}{2} + (y^3+6y^6)\frac{{L}^2}{1-y{L}} +\frac{3y^7{L}^3}{2(1-y{L})} + (\tfrac{y^4}{2} + \tfrac{27y^7}{2}) \frac{{L}^3}{(1-y{L})^2} \nonumber \\ & +\frac{15y^8{L}^4}{4(1-y{L})^2} + \frac{29y^8{L}^4}{2(1-y{L})^3} +\frac{5y^9{L}^5}{(1-y{L})^3}+\frac{15y^9{L}^5}{2(1-y{L})^4} +\frac{15y^{10}{L}^6}{4(1-y{L})^4} \nonumber \\ &+\frac{3y^{10}{L}^6}{2(1-y{L})^5} +\frac{3y^{11}{L}^7}{2(1-y{L})^5} +\frac{y^6 {L}^2}{(1-y{L})^6} +\frac{y^{12}{L}^8}{4(1-y{L})^6} \Big). \label{eq:multi_rooted2} \end{align} From the above equation, an explicit formula for $ \ell_{n,k,m}$ could routinely be derived, as in Proposition~\ref{prop:refinedEnumerationRooted1}, although the computations are more involved. We decided not to report this formula here. Eq.~\eqref{eq:multi_rooted2} also allows to study the asymptotic behavior of the considered parameters. \begin{proposition}\label{asymultirooted2} Let $X_n$ (resp. $Y_n$) be the random variable counting the number of bridgeless components of level 1 or 2 (resp. the number of edges across them) in rooted level-$2$ networks with $n$ leaves. Both $X_n$ and $Y_n$ are asymptotically normally distributed, and more precisely, we have \[ \mathbb{E} {X_n}= \mu_{X } n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{X_{n}}=\sigma^{2}_{X} n+O(1) \;\;\;\; \] \[ \mathbb{E} {Y_{n}}= \mu_{Y} n+ O(1), \;\;\;\;\;\; \mathbb{V}ar{Y_{n}}=\sigma^{2}_{Y} n+O(1) \;\;\;\; \] where $\mu_{X} \approx 0.8243$, $\sigma^{2}_{X} \approx 0.1232$, $\mu_Y \approx 4.8133 $ and $\sigma^{2}_{Y} \approx 3.5523 $. \label{prop:normaldistribrooted1} \end{proposition} \begin{proof} To prove the result for $X_n$ (resp. $Y_n$), we specialize Eq.~\eqref{eq:multi_rooted2} for $y=1$ (resp. $x=1$) and rewrite it as $L(z,x,1) = F(L(z,x,1),z,x)$ for some explicit function $F$ (resp. $L(z,1,y) = F(L(z,1,y),z,y)$, for an explicit different $F$). It is readily checked that $F$ satisfies all hypotheses of Theorem~\ref{Drmota}, as well as the solutions $(L_0,z_0)$ of the system \begin{align*} L=&F(L,z,1) \\ 1=&F_L(L,z,1) \end{align*} whose approximate values are $L_0 \approx 0.04447 $ and $z_0 \approx 0.02384$. The result then follows from Theorem~\ref{Drmota}, and the numerical estimates of $\mu_X$ and $\sigma_X^2$ (resp. $\mu_Y$ and $\sigma_Y^2$) are obtained plugging the numerical estimates for $L_0$ and $z_0$ into the explicit formulas given by Theorem~\ref{Drmota}. \end{proof} \section*{Acknowledgments} This work was supported by a ``junior guest'' grant by the LABRI and bilateral Austrian-Taiwanese project FWF-MOST, grants I~2309-N35 (FWF) and MOST-104-2923- M-009-006-MY3 (MOST). We thank Carine Pivoteau for her insights about random generation of combinatorial structures as well as two anonymous reviewers for their useful comments. \bibliographystyle{alpha}
\section{Conclusion} In this paper, we introduce \emph{nearest neighbor overlap} (N2O), a comparative approach to quantifying similarity between sentence embedders. Using N2O, we draw comparisons across 21 embedders. We also provide additional analyses made possible with N2O, from which we find high variation in embedders' treatment of semantic similarity. \section{Corpus-Based Embedding Comparison} \label{sec:embed-comparison} We first motivate and introduce our nearest neighbor overlap (N2O) procedure for comparing embedders (maps from objects to vectors). Although we experiment with sentence embedders in this paper, we note that this comparison procedure can be applied to other types of embedders (e.g., phrase-level or document-level).\footnote{We also note that nearest neighbor search has been frequently used on \emph{word} embeddings (e.g., word analogy tasks).} \subsection{Desiderata} We would like to quantify the extent to which sentence embedders vary in their treatment of ``similarity.'' For example, given the sentence \emph{Mary gave the book to John}, embedders based on bag-of-words will treat \emph{John gave the book to Mary} as being maximally similar to the first sentence, whereas different embedders may yield lower similarity for that compared to the sentence \emph{Mary gave the dictionary to John}. We would like our comparison to reflect this intuition. We would also like to focus on using naturally-occuring text for our comparison. Although there is merit in expert-constructed examples (see linguistic probing tasks referenced in \S\ref{sec:related}), we have little understanding of how these models will generalize to text from real documents; many application settings involve computing similarity across texts in a corpus. Finally, we would like our evaluation to be task-agnostic, since we expect embeddings learned from large unannotated corpora in a self-supervised (and task-agnostic) manner to continue to play an important role in NLP. As a result, we base our comparison on the property of \emph{nearest neighbors}: first, because similarity is often assumed as corresponding to nearness in embedding space (Fig.~\ref{fig:overview}), which may not be true in practice; second, because nearest neighbor methods are used directly for clustering, retrieval, and other applications; and finally, because the nearest neighbors of a sentence can be computed for any embedder on any corpus without additional annotation. \subsection{Algorithm} Suppose we want to compare two sentence embedders, $\emb{A}(\cdot)$ and $\emb{B}(\cdot)$, where each embedding method takes as input a natural language sentence $\seq{s}$ and outputs a $d$-dimensional vector. For our purposes, we consider variants trained on different data or using different hyperparameters, even with the same parameter estimation \emph{procedure}, to be different sentence embedders. Take a corpus $C$, which is likely to have some semantic overlap in its sentences, and segment it into sentences $\seq{s}_1, \ldots, \seq{s}_{|C|}$. Randomly select a small subset of the sentences in $C$ as ``queries'' ($\seq{q}_1, \ldots, \seq{q}_{n}$). To see how similar $\emb{A}$ and $\emb{B}$ are, we compute the overlap in nearest neighbor sentences, averaged across multiple queries; the algorithm is in Figure~\ref{alg:n2o}. $\mathit{nearest}(\emb{i}, \seq{q}_j, C, k)$ returns the $k$ nearest neighbor sentences in corpus $C$ to the query sentence $\seq{q}_j$, where all sentences are embedded with $\emb{i}$.\footnote{One of these will be the query sentence itself, since we sampled it from the corpus; we assume $\mathit{nearest}$ ignores it when computing the $k$-nearest-neighbor lists.} There are different ways to define nearness and distance in embedding spaces (e.g., using cosine similarity or Euclidean distance); in this paper we use cosine similarity. We can think about this procedure as randomly probing the sentence vector space (through the $n$ query sentences) from the larger space of the embedded corpus, under a sentence embedder $\emb{i}$; in some sense, $k$ controls the depth of the probe. The $\mathit{N2O}$ procedure then compares the sets of sentences recovered by the probes. \section{Sentence Embedding Methods} \label{sec:embed-description} In the previous section, we noted that we consider a ``sentence embedder'' to encompass how it was trained, which data it was trained on, and any other hyperparameters involved in its creation. In this section, we first review the broader methods behind these embedders, turning to implementation decisions in \S\ref{sec:experiments}. \subsection{tf-idf} We consider \textbf{tf-idf}, which has been clasically used in information retrieval settings. The tf-idf of a word token is based off two statistics: term frequency (how often a term appears in a document) and inverse document frequency (how rare the term is across all documents). The vector representation of the document is the idf-scaled term frequencies of its words; in this work we treat each sentence as a ``document'' and the vocabulary-length tf-idf vector as its embedding. \subsection{Word Embeddings} Because sentence embeddings are often built from word embeddings (through initialization when training or other composition functions), we briefly review notable word embedding methods. \paragraph{Static embeddings.} We define ``static embeddings'' to be fixed representations of every word type in the vocabulary, regardless of its context. We consider three popular methods: \textbf{word2vec} \citep{Mikolov:13} embeddings optimized to be predictive of a word given its context (continuous bag of words) or vice versa (skipgram); \textbf{GloVe} \citep{Pennington:14} embeddings learned based on global cooccurrence counts; and \textbf{FastText} \citep{Conneau:17}, an extension of word2vec which includes character $n$-grams (for computing representations of out-of-vocabulary words). \paragraph{Contextual embeddings.} Contextual word embeddings, where a word token's representation is dependent on its context, have become popular due to improvements over state-of-the-art on a wide variety of tasks. We consider: \begin{itemize} \item \textbf{ELMo} \citep{Peters:18} embeddings are generated from a multi-layer, bidirectional recurrent language model that incorporates character-level information. \item \textbf{GPT} \citep{Radford:18} embeddings are generated from a unidirectional language model with multi-layer transformer decoder; subword information is included via byte-pair encoding (BPE; \citealp{Sennrich:16}). \item \textbf{BERT} \citep{Devlin:19} embeddings are generated from a transformer-based model trained to predict (a) a word given both left and right context, and (b) whether a sentence is the ``next sentence'' given a previous sentence. Subword information is incorporated using the WordPiece model \citep{Schuster:12}. \end{itemize} \paragraph{Composition of word embeddings.} The simplest way to obtain a sentence's embedding from its sequence of words is to average the word embeddings.\footnote{In the case of GPT and BERT, which yield subword embeddings, we treat those as we would standard word embeddings.} Despite the fact that averaging discards word order, it performs surprisingly well on sentence similarity, NLI, and other downstream tasks \citep{Wieting:16, Arora:17}.\footnote{\citet{Arora:17} also suggest including a PCA-based projection with word embedding averaging to further improve downstream performance. However, because our focus is on behavior of the embeddings themselves, we do not apply this projection here.} In the case of contextual embeddings, there may be other conventions for obtaining the sentence embedding, such as using the embedding for a special token or position in the sequence. With BERT, the \texttt{[CLS]} token representation (normally used as input for classification) is also sometimes used as a sentence representation; similarly, the last token's representation may be used for GPT. \subsection{Encoders} A more direct way to obtain sentence embeddings is to learn an encoding function that takes in a sequence of tokens and outputs a single embedding; often this is trained using a relevant supervised task. We consider two encoder-based methods: \begin{itemize} \item \textbf{InferSent} \citep{Conneau:17}: supervised training on the Stanford Natural Language Inference (SNLI; \citealp{Bowman:15}) dataset; the sentence encoder provides representations for the premise and hypothesis sentences, which are then fed into a clasifier. \item Universal Sentence Encoder (\textbf{USE}; \citealp{Cer:18}): supervised, multi-task training on several semantic tasks (including semantic textual similarity); sentences are encoded either with a deep averaging network or a transformer. \end{itemize} \section{Experimental Details} \label{sec:experiments} \input{figures/table-embed-funcs.tex} Our main experiment is a broad comparison, using N2O, of the embedders discussed above and listed in Table~\ref{tab:embed-models}. Despite the vast differences in methods, N2O allows us to situate each in terms of its functional similarity to the others. \paragraph{N2O computation.} We describe a N2O sample as, for a given random sample of $n$ queries, the computation of $\mathit{N2O}(\emb{A}, \emb{B}, C, k)$ for every pair of sentence embedders through the procedure described in \S\ref{sec:embed-comparison}, using cosine similarity to determine nearest neighbors. The results in \S\ref{sec:results} are with $k$ (the number of sentences retrieved) set to 50, averaged across five samples of $n=100$ queries. We illustrate the effects of different $k$ and N2O samples in \S\ref{sec:robustness}. \paragraph{Corpus.} For our corpus, we draw from the English Gigaword \citep{Parker:11}, which contains newswire text from seven news sources. For computational feasibility, we use the articles from 2010, for a total of approximately 8 million unique sentences.\footnote{Because many news articles show up multiple times in the corpus, 23\% of sentences in the English Gigaword are exact duplicates of one another; we remove these duplicates.} We note preprocessing details (segmentation, tokenization) in Appendix~\ref{sec:implementation}. \paragraph{Queries.} For each N2O sample, we randomly select 100 ledes (opening sentences) from the news articles of our corpus, and use the same ones across all embedders. Because the Gigaword corpus contains text from multiple news sources covering events over the same time period, it is likely that the corpus will contain semantically similar sentences for a given lede. The average query length is 30.7 tokens (s.d.~10.2); an example query is: ``Sandra Kiriasis and brakewoman Stephanie Schneider of Germany have won the World Cup bobsled race at Lake Placid.'' \begin{figure*} \centering \includegraphics[width=\linewidth]{figures/heatmap-all.pdf} \caption{Heatmap of N2O for every pair of sentence embedders in Table \ref{tab:embed-models} for $k=50$, averaged across five samples of $n=100$ queries; darker colors indicate higher overlap. A larger version of this plot (annotated with N2O values) is in Appendix~\ref{sec:full-results}.} \label{fig:heatmap-all} \end{figure*} \paragraph{Sentence embedders.} Table~\ref{tab:embed-models} lists the sentence embedders we use in our experiments, their dimensions, and the manner in which their word embeddings were composed (if applicable). In general, we use popular pretrained versions of the methods described in \S\ref{sec:embed-description}. We also select pretrained variations of the same method (e.g., FastText embeddings trained from different corpora; pretrained ELMo models with different capacity) to permit more controlled comparisons. In a couple of cases, we train/finetune models of our own. For tf-idf, we compute frequency statistics using our corpus, with each sentence as its own ``document.'' For BERT, we use the Hugging Face implementation with default hyperparameter settings,\footnote{\url{https://github.com/huggingface/pytorch-transformers}} and finetune using the matched subset of the MultiNLI dataset \citep{Williams:18} for three epochs (dev.~accuracy 84.1\%). We note that additional embedders are easily situated among the ones tested in this paper by first computing nearest neighbors of the same query sentences, and then computing overlap with the nearest neighbors obtained in this paper. To enable this, the code, query sentences, and nearest neighbors per embedder and query are publicly available (link on p.~1). \section{Introduction} Continuous embeddings---of words and of larger linguistic units---are now ubiquitious in NLP. The success of self-supervised pretraining methods that deliver embeddings from raw corpora has led to a proliferation of embedding methods, with an eye toward ``universality'' across NLP tasks. Our focus here is on \textbf{sentence embedders}, and specifically their evaluation. As with most NLP components, intrinsic (e.g., \citealp{Conneau:18}) and extrinsic (e.g., GLUE; \citealp{Wang:18}) evaluations have emerged for sentence embedders. Our approach, \textbf{nearest neighbor overlap} (N2O), is something different: it compares a pair of embedders in a linguistics- and task-agnostic manner, using only a large unannotated corpus. The central idea is that two embedders are more similar if, for a fixed query sentence, they tend to find nearest neighbor sets that overlap to a large degree. By drawing a random sample of queries from the corpus itself, we can estimate N2O using realistic data drawn from a domain of interest. N2O enables exploration of nearest neighbor behavior without domain-specific annotation, and therefore can help inform embedder choices in applications such as text clustering \citep{Cutting:92}, information retrieval \citep{Salton:88}, and open-domain question answering \citep{Seo:18}, among others. After motivating and explaining the N2O method (\S\ref{sec:embed-comparison}), we apply it to 21 sentence embedders (\S\ref{sec:embed-description}-\ref{sec:experiments}). Our findings (\S\ref{sec:results}) reveal relatively high similarity among averaged static (i.e., noncontextual) word type embeddings, a strong effect of the use of subword information, and that BERT and GPT are distant outliers. In \S\ref{sec:robustness}, we demonstrate the robustness of N2O across different query samples and sample sizes. Finally, we illustrate additional analyses made possible by N2O: identifying embedding-space neighbors of a query sentence that are stable across embedders, and those that are not (\S\ref{sec:popularity}); and probing the abilities of embedders to find a known paraphrase (\S\ref{sec:paraphrase}). The latter experiment reveals considerable variance across embedders' ability to identify semantically similar sentences from a broader corpus. \xdef\@thefnmark{}\@footnotetext{The code and nearest neighbor output for this paper are available at \url{https://homes.cs.washington.edu/~lucylin/research/N2O/}.} \begin{figure} \centering \begin{minipage}[b]{0.45\textwidth} \input{figures/fig-1.tex} \caption{A toy example of two sentence embedders and how they might affect nearest neighbor sentences. \label{fig:overview}} \end{minipage} \hfill \begin{minipage}[b]{0.45\textwidth} \algrenewcommand\algorithmicindent{1em} \begin{algorithmic} \Function{$\mathit{N2O}$}{$\emb{A}, \emb{B}, C, k$} \For{each query $\seq{q}_j \in \{\seq{q}_i\}_{i=1}^n$} \State $\mathit{neighbors}_A \gets \mathit{nearest}(\emb{A}, \seq{q}_j, C, k)$ \State $\mathit{neighbors}_B \gets \mathit{nearest}(\emb{B}, \seq{q}_j, C, k)$ \State $o[j] \gets | \mathit{neighbors}_A \cap \mathit{neighbors}_B |$ \EndFor \State \textbf{return} $\sum_j o[j] / (k \times n)$ \EndFunction \end{algorithmic} \caption{Computation of nearest neighbor overlap (N2O) for two embedders, $\emb{A}$ and $\emb{B}$, using a corpus $C$; the number of nearest neighbors is given by $k$. $n$ is the number of queries ($\seq{q}_1 \ldots \seq{q}_n$), which are sampled uniformly from the corpus without replacement. The output is in [0, 1], where 0 indicates no overlap between nearest neighbors for all queries, and 1 indicates perfect overlap. \label{alg:n2o}} \end{minipage} \end{figure} \section*{Acknowledgements} We thank members of the UW NLP community and anonymous reviewers for their helpful feedback. This research was supported in part by a NSF Graduate Research Fellowship to LHL. \section{Related Work} \label{sec:related} Recent comparisons of sentence embedders have been primarily either (1) linguistic probing tasks or (2) downstream evaluations. Linguistic probing tasks test whether embeddings can distinguish surface level properties, like sentence length; syntactic properties, like tree depth; and semantic properties, like coordination inversion. See \citet{Ettinger:16}, \citet{Adi:17}, \citet{Conneau:18}, and \citet{Zhu:18}, among others. Downstream evaluations are often classification tasks for which good sentence representations are helpful (e.g., NLI). Evaluations like the RepEval 2017 shared task \citep{Nangia:17}, SentEval toolkit \citep{Conneau:18b}, and GLUE benchmark \citep{Wang:18} seek to standardize comparisons across sentence embedding methods. N2O is complementary to the above, providing a task-agnostic way to compare embedders' functionality. \section{Results} \label{sec:results} In this section, we present the results from the experiment described in \S\ref{sec:experiments}. Fig.~\ref{fig:heatmap-all} shows N2O between each pair of sentence embedders listed in Table~\ref{tab:embed-models} over the 100 queries; the values range from 0.04 to 0.62. While even the maximum observed value may not seem large, we reiterate that overlap is computed over two draws of $k=50$ sentences (nearest neighbors) from approximately 8 million sentences, and even an N2O of 0.04 is unlikely from random chance alone. \begin{figure*} \begin{subfigure}[t]{0.5\textwidth} \vskip 0pt \centering \includegraphics{figures/heatmap-static.pdf} \end{subfigure}% ~ \begin{subfigure}[t]{0.5\textwidth} \vskip 0pt \centering \includegraphics{figures/heatmap-contextual.pdf} \end{subfigure} \caption{N2O values for a subset of embedders (L: static word embeddings; R: contextual embeddings), $k=50$. \label{fig:heatmap-detailed}} \end{figure*} \begin{wrapfigure}{r}{0.5\textwidth} \centering \includegraphics{figures/lexical-overlap-static.pdf} \caption{Average token overlap between a query and its nearest neighbors ($k=50$), averaged over all queries. Error bars represent 95\% confidence intervals. \label{fig:token-overlap-static}} \end{wrapfigure} \paragraph{Averages of static word embeddings.} We first observe that there is generally high N2O among this set of embedders in comparison to other categories (Fig.~\ref{fig:heatmap-detailed}, left). Some cases where N2O is high for variations of the same embedder: \texttt{glove-6b-100d} and \texttt{glove-6b-300d}, which have different dimensionality but are otherwise trained with the same method and corpus (and to a lesser extent \texttt{glove-840b-300d}, which retains casing and is trained on a different corpus); \texttt{fasttext-cc} and \texttt{fasttext-wiki}, which again are trained with the same method, but different corpora. The use of subword information, unique to \texttt{fasttext-cc-sub} and \texttt{fasttext-wiki-sub}, has a large effect on N2O; there is a high (0.52) N2O value between these two and much lower N2O with other embedders, including their analogues without subword information. This effect is also illustrated by measuring, for a given embedder, the average token overlap between the query and its neighbors (Fig.~\ref{fig:token-overlap-static}). As we would expect, subword methods find near neighbors with lower token overlap, because they embed surface-similar strings near to each other. \paragraph{tf-idf.} Unsurprisingly, tf-idf has low N2O with other embedders (even those based on static word embeddings). Like the subword case, we can also use token overlap to understand why this is the case: its nearest neighbors have by far the largest token overlap with the query (0.43). \paragraph{Averages of ELMo embeddings.} We test three ELMo pretrained models across different capacities (\texttt{elmo-small}, \texttt{elmo-orig}) but the same training data, and across different training data but the same model capacity (\texttt{elmo-orig}, \texttt{elmo-orig-5.5b}). These two embedder pairs have high N2O (0.42 and 0.55 respectively); the mismatched pair, with both different training data and capacities, has slightly lower N2O (0.38). \begin{figure*} \centering \includegraphics[width=\linewidth]{figures/one-vs-rest.pdf} \caption{Comparison of N2O distribution between each embedder and all others. \label{fig:one-vs-rest}} \end{figure*} \paragraph{BERT and GPT.} We first find that specific-token representations for BERT or GPT (\texttt{bert-base-cls}, \texttt{gpt-last}) are outliers compared to other embedders (i.e., low N2O; see Fig.~\ref{fig:heatmap-detailed}). This itself is not unexpected, as the training objectives for both of the pretrained models (without finetuning) are not geared towards semantic similarity the way other embedders may be. What is surprising is that this effect seems to hold even for the MultiNLI-finetuned version of BERT (\texttt{bert-ft-cls}); if anything, this decreases N2O with other embedders further.\footnote{In preliminary experiments, we also saw similar results with BERT finetuned on the Microsoft Research Paraphrase Corpus \citep{Dolan:04}; that is, the effect does not seem specific to MultiNLI.} To further confirm this, we plot the N2O values for each embedder (compared to all others) in Fig.~\ref{fig:one-vs-rest}. Notably, we also find that taking \emph{averaged} BERT and GPT embeddings yields higher N2O with other embedders, especially ELMo-based ones; we see this effect most strongly when comparing \texttt{bert-base-cls} to \texttt{bert-base-avg}. \paragraph{Encoder-based embedders.} We find that InferSent has highest N2O ($\sim$0.2--0.3) with the embeddings based on averaging, despite InferSent being trained using a NLI task; that said, this is not wholly surprising as the model was initialized using GloVe vectors (\texttt{glove-840b-300d}) during training. The USE variants (DAN and Transformer) have fairly distinct nearest neighbors compared to other methods, with highest N2O between each other (0.24). \section{Robustness and Runtime Considerations} \label{sec:robustness} \paragraph{Varying $k$.} One possible concern is how sensitive our procedure is to $k$ (the number of nearest neighbors from which overlap is computed): we would not want conflicting judgments of how similar two sentence embedders are due to different $k$. To confirm that changing $k$ does not significantly affect these judgments, we first compute the ranked lists of N2O output for each $k \in \{5, 10, \ldots, 45, 50\}$, where each list consists of all embedder pairs ordered by N2O for that $k$. We then compute Spearman's rank correlation coefficient ($\rho$) between each pair of ranked lists, where 1 indicates perfect positive correlation. We find that the average Spearman's $\rho$ is very high (0.996; min.~0.986) --- i.e., the rankings of embedder similarity by N2O are reasonably stable across different values of $k$, even as far as $k=5$ and $k=50$. \paragraph{Query sampling.} We also examine how the results may vary across different query samples; as noted previously, the presented results are averaged across five samples of $n=100$ queries each. Standard deviations for N2O values across the five samples range from 0.005 to 0.019 (avg.~0.011). That is, given the range of N2O values being compared, the differences due to different query samples is small. We compute Spearman's $\rho$ across different N2O samples in the same manner as above ($k=50$) and find an average $\rho$ of 0.994 (min.~0.991). \paragraph{Runtime.} A theoretical concern with N2O is that, naively, its computation is linear in the size of the corpus, and to have reasonable semantic overlap within a diverse set of sentences, the corpus should be large. While our implementation of exact nearest neighbor search is sufficiently fast in practice,\footnote{Given precomputed sentence embeddings, exact nearest neighbor search across the corpus takes 30 s.--1 min.~(depending on dimensionality) for a batch of $n=100$ queries and $k=50$, across two 12-core Intel Xeon CPUs (E5-2960/2.60GHz).} we provide comments on use of approximate nearest neighbor methods in Appendix~\ref{sec:efficiency}. \section{Popularity of Neighbors} \label{sec:popularity} Previously, we performed a basic comparison between sentence embedders using N2O. Here, we show one kind of analysis enabled by N2O: given a query, which sentences from the corpus $C$ are consistently its neighbors across different embedders? We might expect, for example, that a nearly identical paraphrase of the query will be a ``popular'' neighbor chosen by most embedders. Table~\ref{tab:popular-ex} shows an example query with a sentence that is in the 5-nearest neighborhood for all sentence embedders. We also show sentences that are highly ranked for \emph{some} embedder but not in the nearest neighbor sets for \emph{any other} embedder (for larger $k=50$). Qualitatively, what we find with this example's outlier sentences is that they are often thematically similar in some way (such as fiscal matters in Table~\ref{tab:popular-ex}), but with different participants. We also observe that extremely ``popular'' neighbors tend to have high lexical overlap with the query. \input{figures/table-popular-ex} \section{Query Paraphrasing} \label{sec:paraphrase} Attempts to derive sentence embeddings that capture semantic similarity are inspired by the phenomenon of paraphrase; in this section, we use nearest neighbors to probe how sentence embedders capture paraphrase. More specifically, we carry out a ``needle-in-a-haystack'' experiment using the Semantic Textual Similarity Benchmark (STS; \citealp{Cer:17}). STS contains sentence pairs with human judgments of semantic similarity on a 1--5 continuous scale (least to most similar). We take 75 sentence pairs in the 4--5 range from the STS development and test sets where the sentence pair has word-level overlap ratio $<$ 0.6 --- i.e., near paraphrases with moderately different surface semantics. We also constrain the sentence pairs to come from the newstext-based parts of the dataset. The first sentence in each sentence pair is the ``query,'' and the second sentence is (temporarily) added to our Gigaword corpus. An example sentence pair, scored as 4.6, is: (A) \emph{Arkansas Supreme Court strikes down execution law} and (B) \emph{Arkansas justices strike down death penalty}. We then compute the \emph{rank} of the sentence added to the corpus (i.e., the value of $k$ such that the added sentence is part of the query's nearest neighbors). An embedder that ``perfectly'' correlates semantic similarity and distance should yield a rank of 1 for the sentence added to the corpus, since that sentence would be nearest to the query. \input{figures/table-paraphrase.tex} \paragraph{Results.} Table~\ref{tab:paraphrase} shows the performance of the 21 sentence embedders; we compute mean reciprocal rank (MRR), the number of queries for which its paraphrase was its nearest neighbor, and the number of queries for which the paraphrase was in its 5-nearest neighborhood. We find that the larger ELMo models do particularly well at placing paraphrase pairs near each other. We also can see that averaged BERT and GPT embeddings perform better than the $\texttt{[CLS]}$/final token ones\footnote{The BERT results with STS are consistent with concurrent work by \citet{Riemers:19}.}; this is consistent with our earlier observation (\S\ref{sec:results}) that their training objectives may not yield specific-token embeddings that directly encode semantic similarity, hence why they are outliers by N2O. \section{Implementation Details} \label{sec:implementation} In this section, we include additional implementation details for experiments performed in the paper. Generally, we use parameters consistent with the original work when possible. \paragraph{Sentence segmentation.} We use the \texttt{spacy}\footnote{\url{http://spacy.io}} library (2.0.16) to perform sentence segmentation; for word tokenization, we defer to preferences for the original embedder implementations if specified (see below), or use the \texttt{spacy} tokenizer otherwise. \paragraph{Tf-idf.} We use the \texttt{gensim} library (3.7.3) implementation of tf-idf,\footnote{\url{https://radimrehurek.com/gensim/}} with frequency statistics learned on the 2010 section of the Gigaword corpus (i.e., the same corpus used to find nearest neighbors). For tokenization, we use the Gensim tokenizer and lowercase all word tokens. \paragraph{Word2vec.} We use pretrained 300D Google News embeddings available from Google.\footnote{\url{https://code.google.com/archive/p/word2vec/}} We use \texttt{spacy} to perform word tokenization and embedding lookup. \paragraph{GloVe.} We use three sets of standard pretrained GloVe embeddings: 100D and 300D embeddings trained on Wikipedia and Gigaword (6B tokens), and 300D embeddings trained on Common Crawl (840B tokens).\footnote{\url{https://nlp.stanford.edu/projects/glove/}} We handle tokenization and embedding lookup identically to word2vec; for the Wikipedia/Gigaword embeddings, which are uncased, we lower case all tokens as well. \paragraph{FastText.} We use four sets of pretrained FastText embeddings: two trained on Wikipedia and other news corpora, and two trained on Common Crawl (each with an original version and one trained on subword information).\footnote{\url{https://fasttext.cc/docs/en/english-vectors.html}} We use the Python port of the FastText implementation to handle tokenization, embedding lookup, and OOV embedding computation.\footnote{\url{https://github.com/facebookresearch/fastText/tree/master/python}} \paragraph{ELMo.} We use three pretrained models made available by AllenNLP: \emph{small}, \emph{original}, and \emph{original (5.5B)}.\footnote{\url{https://allennlp.org/elmo}} We use \texttt{spacy} to perform word tokenization, consistent with the \texttt{allennlp} library; we also use \texttt{allennlp} (0.7.2) to compute the ELMo embeddings. We average the embeddings over all three bidirectional LSTM layers. \paragraph{BERT.} We use Hugging Face's \texttt{pytorch-transformers} (0.6.2) implementation and pretrained BERT base cased model.\footnote{\url{https://github.com/huggingface/pytorch-transformers}} To tokenize, we use the provided \texttt{BertTokenizer}, which handles WordPiece (subword) tokenization, and in general follow the library's recommendations for feature extraction. For finetuning BERT on MultiNLI (matched subset), we generally use the default parameters provided in the library's \texttt{run\_classifier.py} (batch size = 32, learning rate = 5e-5, etc.). We finetune for three epochs, and obtain 84.1\% dev accuracy (reasonably consistent with the original work). \paragraph{GPT.} We use the same Hugging Face library and associated pretrained model for GPT; we use their BPE tokenizer and \texttt{spacy} for subword and word tokenization respectively. \paragraph{InferSent.} We use the authors' implementation of InferSent, as well as their pretrained V1 model based on GloVe.\footnote{\url{https://github.com/facebookresearch/InferSent}} (Unfortunately, the FastText-based V2 model was not available while performing the experiments in this paper; see issues \#108 and \#124 in the linked Github.) As per their README, we use the \texttt{nltk} tokenizer (3.2.5). \paragraph{Universal Sentence Encoder.} We use pretrained models available on TensorFlow Hub for both the DAN and Transformer variants.\footnote{DAN: \url{https://tfhub.dev/google/universal-sentence-encoder/2}\\Transformer: \url{https://tfhub.dev/google/universal-sentence-encoder-large/3}} The modules handle text preprocessing on their own. \subsection*{Computational Details} Experiments for ELMo, BERT, GPT, and the Transformer version of USE were run on a NVIDIA Titan XP GPU with CUDA 9.2. All other experiments were performed on CPUs. \section{Full Results} \label{sec:full-results} The figure on the next page is a larger version of Fig.~3 that includes the actual N2O values. \begin{landscape} \begin{figure} \centering \includegraphics{figures/heatmap-big.pdf} \end{figure} \end{landscape} \section{Approximate Nearest Neighbors} \label{sec:efficiency} As noted in \S\ref{sec:robustness}, N2O computation is linear in the size of the corpus, and to have reasonable semantic overlap within a diverse set of sentences, the corpus should be large. The upfront cost of computing sentence embeddings across the corpus is unavoidable (and, for many applications, necessary anyways); our implementation of exact search is fast enough that repeated queries given precomputed embeddings is not a concern (see footnote 8). However, we note that approximate nearest neighbor (ANN) methods are also a viable option, where computation of building an index of the corpus is front-loaded to ensure sub-linear search time. We recommend use of a small held-out set of queries to tune the ANN method parameters towards higher precision/recall (vs.~speed). All of the results in this paper were obtained using exact (linear) search. However, we also performed preliminary experiments using the NGT (neighborhood graph tree) library, which achieves good recall in high-dimensional settings \citep{Iwasaki:18, Aumuller:19}.\footnote{\url{https://github.com/yahoojapan/NGT}} We were able to obtain similar N2O-ranked results (query recall $\sim$0.96) relatively quickly: 0.25--5 s./query (depending on embedding dimension). We note that, in related work, ANN is commonly used in retrieval settings; e.g., \citet{Sugawara:16} test multiple ANN methods for similar \emph{word} embedding search, and \citet{Bhagavatula:18} use an ANN method to index documents for citation recommendation. We believe that approximate methods can be of use for scalable N2O computation as well.
\section{Introduction} The rollout of 5\textsuperscript{th} generation (5G) of communication networks has commenced with Release-15 of 3\textsuperscript{rd} Generation Partnership Project (3GPP) \cite{3GPPrel15}. This release of 5G new radio (5G NR) has extended the provisions for both standalone and non-standalone operations. Based on the ongoing field trials and non-commercial (test) deployment based investigations, the standardization of 5G is expected to mature with Release-16 of 3GPP by the year 2020. The 5G networks are expected to bring a transformative impact in the role that mobile communication technologies play in the society \cite{obiodu20175g}. The 5G has taken a huge leap forward in the offered services, which are introduced through the advent of various new innovative technologies. The notable target 5G services can be named as enhanced mobile broadband (eMBB), ultra-reliable low latency communications (URLLCs), massive machine-type communications (mMTCs), and Tactile Internet (TI) \cite{7414384,shafi20175g,Simsek2016tactile}. To solely benefit from the services offered by 5G technologies, the substantiation of 5G affordability and business case is a vital necessity. \subsection{Motivation for 5G Business Case} Despite the revolutionary technologies and innovative services being offered by 5G networks, the difficulties associated with their deployment along with other technological shortcomings have already started to appear in the literature, see e.g., \cite{schneir2019business,wisely2018capacity,8412482,chianiopen}. The registered critical limitations and challenges for 5G networks can be summarized as: i) the enormous deployment cost, ii) the explosion of connected devices caused by the advent of mMTCs may very rapidly lead towards reaching the network capacity limit, iii) the rate and volume of the data generated in hyper massively connected 5G networks may need new data analytic innovations, and iv) the privacy and security provisions in massively connected networks -- to name a few. The telecommunication engineers, industries, and researchers from around the globe have also already initiated the speculative propositions for network requirements and candidate technologies for beyond 5G (B5G) networks, see e.g., \cite{QML_6G_Junaid,Saad_6G_2019,Tariq6G_2019,8760275,8782879}. With a drastic increase in mobile internet users, the subscribers are likely to reach 5.0bn over the next 15 years \cite{Report_MobileEconomy2019}. Moreover, the sole mobile subscribers are expected to rise to 5.8bn between the years 2018 to 2025. A contribution of \$ 2.2 trillion from 5G technologies to the global economy in the next 15 years is projected \cite{Report_MobileEconomy2019}. To facilitate this generation shift, a capital expenditure (CapEx) of \$ 480bn is anticipated from the MNOs between the years 2018 and 2020. Moreover, with most of the 5G services happening after 2020, the CapEx will significantly exceed the CapEx anticipated by 2020. Admittedly, a huge investment for the network infrastructure deployment is a prerequisite to fully reap the benefits offered by the 5G networks. This necessitates the development of a comprehensive business model for 5G rollout to convince the investors, mobile operators, and other stake-holders to invest the requisite revenue. To this end, very recently, only a few articles discussing the 5G rollout cost, business cases, and other associated implications have appeared in the literature. Nevertheless, there is a strong need to thoroughly research the 5G rollout implications and to develop the sustainable business models addressing the complete scope of all 5G services (e.g., eMBB, mMTC, TI, etc) and all network scenarios (e.g., urban, rural, etc). \subsection{Potential Solutions for 5G Affordability} The affordability of delivering the eMBB services offered by 5G is regarded as a vital issue by International Telecommunication Union (ITU) broadband commission \cite{8300495}. The potential domains that can be explored to meet the challenge of making the ultra-fast mobile broadband as affordable to further enable the smooth provision of different societal and other interesting services can be identified as: i) infrastructure sharing, ii) Neutral hosting, iii) unlicensed spectrum utilization, iv) location-based spectrum licensing, v) energy-efficient networking, vi) wireless backhauling, vii) infrastructure cost reduction through softwarization and virtualization of the network functions, and viii) data sharing. Furthermore, in \cite{8516977}, a comparison of different potential technologies for the provision of network backhaul has been conducted. The fixed wireless backhaul is suggested as the most cost-effective solution for high cost fibers, while the utilization of low cost fibers has been suggested to result in direct-fiber technology as the most cost-effective solution. In \cite{oughton2019assessing}, the 5G infrastructure strategies for capacity, coverage, and cost of 5G eMBB have been discussed for the Netherlands. The analysis for both supply-driven and demand-driven investment has been conducted. Also, the potential for traffic capacity enhancement in the existing Dutch macrocell network with the integration of the new 5G spectrum (only) has been studied. It has been determined that the average per-user capacity enhancement of 40\%, as compared to the existing 4\textsuperscript{th} generation (4G) networks, can be achieved by solely integrating the new 5G spectrum (i.e., without deploying the small-cells). The further improvement required beyond this determined threshold will necessitate the densification of the network with small-cells. The development of a framework to study the affordability of all 5G services, beyond eMBB, is a vital need at the current context. Moreover, the establishment of worldwide prospective on the affordability of 5G rollout is another important open challenge. \subsection{5G Rollout in the United Kingdom} In this section, we discuss about various aspects of 5G rollout in the United Kingdom (UK) including the recent developments. The ambitions of the UK government to be a global leader in 5G communication network technology needs the resolution of barriers and challenges in the commercial deployment of 5G. In this direction, the article \cite{jones2019commentary} provided a review of critical problems related to the market factors for 5G rollout in the UK. In \cite{yaghoubi2019techno}, a framework for the techno-economic market analysis of network backhaul has been proposed. The proposed framework can be used to study the total cost of ownership (TCO) of a network backhaul and business feasibility of the 5G network deployment aspects. The module takes the consideration of both the network CapEx and OpEx. A case study has also been conducted to demonstrate the usability of the proposed framework. A thorough analysis of techno-economic aspects of deploying eMBB in a typical dense urban area, realized by a 1km$^2$ grid of central London in the UK, has been conducted in \cite{wisely2018capacity}. Various aspects such as CapEx/OpEx, maximum user rate, and capacity have been studied for macro, micro, and hot-spot cellular network settings at 700MHz, 3.5GHz, and 24--27.5GHz operating frequencies, respectively. The headline rate of 64 to 100 Mbps, across all the coverage area, is expected to be achieved through several different technology prospects. However, the use of mmWave and 802.11ac are advised as necessary for achieving capacity in the orders of 100Gbps/km$^2$ for outdoor and indoor settings, respectively. It has been speculated that a 100-fold increased capacity and 100Mbps headline rate everywhere may be attained with an escalation of 4 to 5 times in the deployment cost as compared to that of 4G Long Term Evolution (LTE) networks. Furthermore, in \cite{schneir2019business}, a business model to study the cost and revenue flow of 5G has been proposed by conducting the case studies for three different boroughs of central London, UK. The eMBB services of 5G are considered important for the business case between the years 2020 to 2030. Some business risks that may emerge in the later years are also indicated. The network share has been highlighted as a significantly helpful aspect in improving the business case. Moreover, it is encouraged to conduct further research for different regions to obtain a nationwide understanding of the business case. In \cite{oughton2018cost}, the 5G rollout implications in UK have been discussed. The history of implications faced in the 4G rollout has been extrapolated to forecast the characteristics between the years 2020 and 2030. It has been concluded that the 5G eMBB may reach out to 90\% of Britain's population by 2027. The challenges associated with capital intensity fluctuations may affect the pace of 5G rollout to the rural areas. Some infrastructure sharing suggestions for deploying small-cells can be considered to reduce the 5G deployment cost. The Ofcom has recently initiated the location-based licensing of 5G compatible radio spectrum \cite{ofcom_licence}, which will significantly help in making 5G affordable in the UK. Moreover, authors in \cite{oughton2018cost} thoroughly discussed the policy matters and potential directions to drive the 5G rollout. Furthermore, the need for incorporating more spectrum for serving ultra-high-speed broadband to rural area users has also been suggested. In summary, the development of a comprehensive understanding of the disruptive impacts of 5G and beyond wireless networks in the UK is of vital importance in promoting a sustainable and ambitious digital economy in the long-term. \subsection{Contributions and Organization} The main contribution of this paper is the investigation of potential long- and short-term transformative and disruptive impacts of 5G rollout. Potential solutions for reducing the 5G deployment cost and developing long-term sustainable business model for 5G through network infrastructure sharing, public infrastructure sharing, radio spectrum sharing, and data sharing are proposed. A typical UK city is taken for conducting the case study in this paper. Different to the approach of extrapolating the historic prospective adopted in \cite{oughton2018cost}, our work intends to provide the prospective learnt from a 5G testbed environment. The notable contributions of this paper are highlighted as follows, \begin{itemize} \item Starting with a review of the main 5G new technologies and target services, existing open challenges in the deployment of 5G networks and the research challenges that may go beyond 5G networks are thoroughly reviewed along with the potential future enabling technologies. \item The requirements, challenges, and solutions associated with 5G rollout are thoroughly reviewed. In this regard, a comprehensive study on the potential sharing of network infrastructure, public infrastructure, radio spectrum, and generated-data for reducing the 5G deployment cost and developing a sustainable 5G business is conducted. \item Along with a discussion on the potential barriers in sharing of data in 5G and beyond networks, the state-of-the-art on data privacy and security techniques and their importance in data-sharing based business models is thoroughly reviewed. \item State-of-the-art of spectrum trading and management techniques is reviewed, and the analysis is further extended to motivate the location-based shared licensing of the radio spectrum. \item A framework for passive infrastructure sharing (e.g., public infrastructure, site sharing, mast sharing, power cabling sharing, etc) and neutral hosting is proposed to reduce the deployment cost and provide an opportunity to the local authorities to become direct or indirect partners in the 5G business model. \item A case study, based on a 5G testbed environment, is conducted for a typical city of UK. The infrastructure sharing potential in reducing the 5G deployment cost in the UK as compared to its anticipated cost is studied. Moreover, the data-sharing and location-based licensing are motivated to bring a significant further reduction in the deployment cost as well as to provide a long-term sustainable business model. \item Finally, based on the proposed case study and conducted analysis, a data economy based long-term 5G business model is proposed and a list of related recommendations is provided. \end{itemize} The rest of the paper is organized as follows. Section II provides an overview of the technologies, services, and open challenges in 5G networks and beyond while Section III presents the deployment requirements, economic constraints, and the potential solutions. Section IV presents a 5G testbed environment learnt prospective for a typical UK city along with a thorough analysis and list of recommendations. Finally, the paper is concluded in Section V. \section{5G Wireless Networks and Beyond} The 5G wireless communication networks have introduced various new revolutionary technologies along with the evolution in the existing networks. The 5G networks are envisaged to offer various new services of new types to everything at all-time with ultra-reliable, ultra-fast, and ultra-low-latency communication links. The standardization of 5G networks as the standalone and non-standalone operating network has appeared with Release 15 \cite{3GPPrel15} of 3GPP named as 5G New Radio (NR). This initial standardization effort is expected to mature with the Release 16 of 3GPP by the year 2020. The test and commercial deployment of 5G NR has now started in some cities of the world. This section provides an overview of the key 5G technologies and services. The challenges associated with the deployment of 5G networks and various other open research challenges (that may go beyond 5G (B5G) networks) are highlighted in this section. \subsection{5G Target Services} This section provides an overview of the prime 5G target services, i.e., eMBB, mMTC, and URLLC. Moreover, their enabling technologies and application scenarios are also briefly discussed. \paragraph{Enhanced Mobile Broadband (eMBB)} The enhanced mobile broadband (eMBB) in 5G networks targets to provide an increase of $1000\times$ and $10\times$ in aggregate and individual-link throughput \cite{AndrewsJSAC5G}, respectively, compared to the 4G wireless networks. The downlink and uplink data rate targets of 5G networks are up to 20Gbps and 10Gbps, respectively. This high data rate is envisioned to support high throughput demanding services, e.g., tactile internet (TI), augmented reality and HD video streaming. TI is a new 5G service that aims at providing a real-time interface for humans and machines interaction \cite{Simsek2016tactile}. The interface may support real-time audiovisual and haptic inputs based controlling of machines, e.g., remote humanly controlled robots for industrial and other operations, etc \cite{8452975}. The notable new technologies enabling such high throughput in 5G networks can be named as massive multiple-input multiple-output (mMIMO) and mmWave band. \paragraph{Ultra Reliable Low Latency Communications (URLLC)} The 5G wireless networks target at achieving packet error rate and end-to-end latancy of $\leq 10^5$ and ~1ms, respectively. Such ultra reliable low latency communications (URLLC) will help in realizing the dreams of various new types of network services, e.g., auto-driving cars, remote health services (ambulance aid, robotic surgeries etc), logistics automation, to name a few \cite{8467353,IMTvision,8403963}. The critical technology innovations enabling URLLC in 5G networks are network slicing (NS), network softwarization, network function virtualization (NFV), and mobile edge computing (MEC). \paragraph{Massive Machine Type Communications (mMTC)} The target of mMTC in 5G networks is the provision of internet access to a massive number of low data-rate and low power devices, e.g., the requisite connectivity to IoT devices. The communication in such typical applications is usually only occasionally required, e.g., in remote environmental sensing and utility metering applications, etc. The key technology enablers for mMTC in 5G networks providing minimal operational cost, grant-free, and time alignment-free connectivity to a massive number of devices can be listed as non-orthogonal multiple access (NOMA), end-to-end (E2E) network slicing (NS), collaborative edge and cloud computing framework, and network function virtualization (NFV) \cite{Bockelmann2018mmtc,Sharmaedgecloudedge}. \subsection{5G New Radio Technologies} 5G NR is a new radio interface released by 3GPP to satisfy the growing needs of radio access in future wireless networks. The 5G-NR provides a number of significant new technologies and advantages compared to the 4G networks. In the following, we highlight the key features of different evolved and new revolutionary technologies in the 5G NR. \paragraph{mmWave} The scarcity of conventional microwave band has led to the exploration of mmWave realm. The multi-gigahertz bandwidth available in mmWave range has a strong potential in addressing the capacity demands of 5G and beyond wireless networks. The initial standardization of mmWave technology for short-range communications initially appeared in IEEE 802.11ad \cite{6736746}. The Release 15 of 3GPP has specified 24.25GHz -- 52.6GHz band associated with the band numbers from 257 to 511 as one of the major 5G frequency ranges \cite{sanfilippo2018concise}. The propagation behavior of mmWave spectrum in terms of high pathloss and the dominant phenomenon of specular reflections (instead of scattering, as in microwave band) has confined its applications to short-range and line-of-sight (LoS) communications \cite{8594703}. Establishing a better understanding of propagation behavior of mmWave and beyond bands (e.g., sub-teraHz and teraHz bands) may lead to the availability of more usable bandwidth for B5G networks in the future. \paragraph{Massive-MIMO} Massive multiple-input multiple-output (mMIMO) \cite{6736761} is defined by a large-scale multi-antenna system in which massive amount of antennas are employed at the base station (BS), i.e., significantly larger than the users being served. The use of large-scale multiple antennas allows the aggressive manipulation of angular/spatial domain. The manipulation of angular domain parameters helps in countering the time and/or frequency selective behaviour of the propagation channels \cite{5462882,mansoor2017massive}. This additional degree-of-freedom (DoF) offered by mMIMO systems can be exploited for diversity, multiplexing, and/or beamforming gains. The 5G NR with mMIMO can exploit 3D beamforming with up to 256 antenna elements at the BS to increase the coverage and capacity of the network \cite{dahlman20185g}. \paragraph{NOMA} The provision of wireless medium's access to multiple users was conventionally achieved through the allocation of (sliced) distinct channel resources (time, frequency, or code, etc.) among the users and spatial re-utilization of the resources. The massive growth in the number of network users and the limited availability of usable frequency spectrum has led towards the evolution of multiple-access methods from orthogonal to non-orthogonal resource allocation based methods. The NOMA scheme allocates non-orthogonal channel resources to the users while exploiting an additional dimension/domain of power. Signal processing methods for channel estimation and interference suppression are the prime operations required in NOMA transceivers. Practically, the hybrid of conventional orthogonal multiple access schemes (e.g., CDMA, SDMA, etc.) and power domain multiple access is also referred to as hybrid NOMA. The chipset hardware support for the user side to perform successive interference cancellation (SIC) is also released \cite{8357810}. Along with many other new technologies, NOMA is also one of the technology revolutions being introduced for the first time in 5G \cite{7263349}. The spectrum efficiency and grant-free access provision advantages offered by NOMA makes it one of the core mMTC enablers in 5G wireless networks. \paragraph{Full-Duplex} Full-duplex is a key 5G technology, which theoretically has the potential of doubling the channel capacity through the concurrent transmission and reception of information in a single channel resource. The performance of full-duplex method relies on the performance of self-interference-cancellation methods, which may practically be performed through active analog/digital cancellation or passive cancellation methods \cite{8396262}. \paragraph{Small-Cells} The ultra-dense network (UDN) planning enables the deployment of multiple small cells within the coverage region of a macro-cell \cite{8516948}. These low-power short-elevation BSs based small cells employ a more aggressive spatial reuse of the resources and efficient users to BS association based on promising propagation channel conditions. The ultra-dense deployment of small cells is a crucial enabler for eMBB in 5G networks \cite{7422408}. \paragraph{Network Slicing, Network Softwarization, and Mobile Edge Computing} The new novel concepts of network slicing (NS) and NFV constitute an important part of the list of revolutionary technologies of 5G. In NFV, various network service features are designed as implemented in software that runs on off-the-shelf hardware \cite{7994617}. The examples of these service feature include caching, network address translation, and domain name services. The NS allows the operations on an infrastructure shared among multiple network slices to create an end-to-end (E2E) true virtual network \cite{8320765}. Mobile Edge Computing (MEC) is another exciting technology which offloads the network traffic by serving the users demands directly from the network edge, e.g., this can be achieved through caching of the popular (users specific) contents on the network edge (e.g., BS, access points, etc) \cite{Abbas2018mec}. These technologies hold the key role in achieving URLLC in 5G networks. \subsection{5G and Beyond Open Challenges} Despite that 5G networks have introduced various revolutionary technologies and promising services; the huge cost of deployment associated to 5G networks and further growing demands of rigorous network performance requirements necessitate the initiation of dedicated efforts to indicate and resolve the challenges. This section highlights the challenges in the deployment of 5G and some open research challenges and technologies for B5G wireless networks. \paragraph{Energy Efficiency} The energy efficiency of communication networks has a direct relationship with the operational, environmental, and economic factors. The 5G technology innovations, such as mMIMO and ultra-dense networks, provide a manifold increase in energy efficiency. A further improvement in network operational energy efficiency in densely connected networks of the future will only help in reducing the network operational cost but also in realizing the dream of a green world. With the advent of mMTCs and small-cells in 5G networks, a huge number of BSs, sensing nodes, and user devices will constitute the network. In this massive connectivity context, the energy-efficient design of the network devices will be a highly compelling aspect \cite{7446253}. The realization of joint energy, spectral, and spatially efficient green communication systems of the future will be in the optimization of b/s/J/m$^3$. \paragraph{Network Capacity} With the advent of mMTC in 5G networks, a massive proliferation in the number of network nodes is expected in the coming years. The densification of cells may eventually meet its practical limit, as a further decrease in cell size (towards very tiny cells) may have some unmanageable associated physical deployment constraints, deployment costs, and inter-cell interference. Further evolution and revolution in network technologies and extension in usable frequency spectrum may be required. A promising future enhancement can be seen in the idea of employing vehicular BSs, i.e., cell-free networks served through Unmanned Aerial Vehicles (UAVs). The future networks may be 3-D natured with volumetric quantification of coverage specifications and spectral efficiency \cite{QML_6G_Junaid} (i.e., b/s/Hz/m\textsuperscript{3}). \paragraph{Throughput} The throughput offerings of 5G wireless networks are expected to attract various high data rate demanding applications, e.g., virtual reality applications. Such applications and massive connectivity may result in 5G reaching its limit in a decade or so \cite{8760275}. For meeting the exceptionally high throughput demands of future networks, one venue can be the exploration of mmWave, sub-teraHz, and teraHz bands. Moreover, communication in the optical spectrum (visible light) may also attract various LoS and indoor communication applications \cite{8782879}. \paragraph{Inter-portability and Congestion in Heterogeneous Networks} The 5G networks will operate in the coexistence of its predecessors (1G to 4G). Achieving harmonization of operations across different network architectures with different conditions for real-time communication applications is another challenging issue for operations in 1G-5G hybrid heterogeneous networks. The MNOs may deploy a core 5G radio access network (RAN) infrastructure to coordinate the network heterogeneity \cite{obiodu20175g}. The application of machine Learning (ML) methods for achieving the harmonization and learning of the network state is a potential enabler \cite{QML_6G_Junaid}. The MEC technology of 5G wireless networks is expected to provide a substantial improvement in the performance of not only to 5G users/devices but also to users operating on previous generations \cite{Abbas2018mec,QML_6G_Junaid}. The intelligent caching at the network edge will help in offloading the data traffic from the network backhaul. The congestion in access networks in ultra-dense connectivity scenarios (e.g., mMTC, etc.) is another challenging issue. Grant-free access to IoT devices may help in resolving the congestion in ultra-dense access networks imposed due to the heavy burden of signaling for enabling communication of a large number of short-data-packets. \paragraph{Ethics for Big Data Analytics} The recent advances in communication network technologies, proliferation in the number of connected devices, and growing multimedia applications are leading towards a flourishing expansion in the data generation \cite{8304385}. The radio communication networks are not only the carriers but also a leading source of generation of data. Appropriate exploitation of big data analytics has a strong potential in facilitating the improvement in the performance of the communication systems as well as in maximizing the revenue generation opportunities for the stakeholders \cite{7429688}. In \cite{Sharmaedgecloudedge}, the data-aware intelligence for extracting useful information from the data and enhancing the network performance for IoT applications have been discussed. Also, a collaborative processing framework while combining the benefits of edge and cloud computing for live data anaytics in IoT networks has been proposed. Along with the benefits offered by big data analytics, there are also various critical concerns being raised regarding the ethics of the analytics \cite{7515114}. The essential factors for devising comprehensive data sharing policies need to be explored to interpret the broader context of data choice, collection circumstances, ownership rights, substantiation and usage permissions. There is a need to conduct thorough investigations to understand the implications related to data analytics technology in B5G communication networks concerning the individuals and organizational interests. \paragraph{Security and Privacy} The provision of security and privacy of data is among the most important concerns in 5G rollout. In densely connected networks, provided the provisions of data security and privacy, the enormous amount of generated data can be potentially used to enhance the network performance \cite{8428412} as well as revolutionize the existing business models. Devising a data value generation based long-term business model for 5G may help in attracting the operators to invest the requisite revenue for 5G rollout. However, ensuring a balance in the policies for necessary data sharing with high data security may emerge as a main policing challenge in the future. A thorough review on security and privacy related challenges in 5G and beyond networks is provided in the sequel. \paragraph{High Deployment cost and Lack of Business Models} The huge CapEx and operational expenditure (OpEx) requirements and lack of clear business model are among the major challenges in fully benefiting from the proposed 5G technologies. The prominent directions to reduce the deployment costs can be stated as infrastructure (passive and active) sharing, neutral hosting, and location-based spectrum licensing. The deployment cost analysis and proposals for the solutions are one of the primary focus of this papers, the details are discussed in the following dedicated sections. \section{5G Deployment Requirements, Challenges, and Solutions} This section mainly discusses the 5G deployment requirements, the economic constraints associated with the 5G rollout, and their potential solutions. The principal factors that may affect the speed of adoption of 5G and its generation of value can be listed as the cost of 5G rollout, availability of opportunities for different 5G service classes, need for a supportive policy framework, availability of 5G devices, compelling business model and value perception \cite{Report_MobileEconomy2019}. We propose that smart management and sharing of infrastructure (network and public), generated data, and radio spectrum between different users/operators are the potential directions to reduce the 5G deployment cost as well as develop long-term 5G business models. To this end, this section first thoroughly investigates the potential in sharing of network and public infrastructure for reducing the 5G rollout cost. Furthermore, the potential of smart management and sharing of the radio spectrum in reducing the 5G rollout cost is reviewed. The sharing of data to generate value as well as improve network performance requires comprehensive data privacy and security model. Therefore, security and privacy concerns and other barriers in sharing of data are also thoroughly studied in this section. \subsection{Infrastructure Requirements} Over the past few decades, the land-mobile radio cellular networks have evolved from 1G to 4G. The infrastructure for these mobile generations has been established with a massive investment. In the existing infrastructure, there may exist over several hundred thousands of wireless communication sites worldwide. The sites may include wireless setups for emergency services, broadcast services, cellular communication services, and other national communication services. The reduction in a typical cell-size has been witnessed along with the progression in generations of wireless networks. The cell coverage radius of a standard cell from 2G to 4G has evolved from approximately 10s of km to a single km. To fully harvest the benefits from 5G technologies, an extension in the spectrum and densification of the network is obliged. The inclusion of radically high mmWave radio spectrum in 5G requires beamforming and beam-management equipment at the small-cell BSs. Furthermore, the ultra-dense deployment of cells, i.e., small-cells with cell-radius of only a few meters, necessitates massive infrastructural provisions. Consequently, to meet the vast infrastructural requirements for deploying small-cells and mmWave communication facilities at the ultra-densified BSs in 5G networks, an enormous revenue investment is needed. \begin{table}[t] \centering \caption{Safe work distance recommended by ICNIRP from the typical transmit power of the respective frequency \cite{ICNIRP_guideline_distance_98}} \begin{tabular}{|c|c|c|c|} \hline \multicolumn{1}{|p{6.145em}|}{\textbf{Frequency (MHz)}} & \multicolumn{1}{p{6.73em}|}{\textbf{ICNIRP EMF Limit (V/m)}} & \multicolumn{1}{p{4.985em}|}{\textbf{EIRP (W)}} & \multicolumn{1}{p{5.715em}|}{\textbf{Distance (cm)}} \bigstrut\\ \hline\hline \textbf{800} & 39 & 100 & 140.44 \bigstrut\\ \hline \textbf{900} & 41 & 100 & 133.59 \bigstrut\\ \hline \textbf{1800} & 58 & 50 & 66.78 \bigstrut\\ \hline \textbf{2100} & 61 & 50 & 63.49 \bigstrut\\ \hline \textbf{2600} & 61 & 10 & 28.39 \bigstrut\\ \hline \textbf{3500} & 61 & 2 & 12.7 \bigstrut\\ \hline \end{tabular}% \label{tab_safe_distance}% \vspace{5pt} \centering \caption{Typical mapping of installation classes for typical small cell deployments \cite{SCF_19}} \begin{tabular}{|c|p{3.145em}|p{3.8em}|p{4.0em}|p{3.0em}|p{3em}|} \hline \multicolumn{1}{|p{3.5em}|}{\textbf{3GPP BS Class}} & \textbf{Config-uration} & \textbf{Typical Total Tx Power} & \textbf{Typical Gain} & \textbf{EIRP Range} & \textbf{Insta-llation Class} \bigstrut\\ \hline \hline \multicolumn{1}{|c|}{\multirow{2}[4]{2.3em}{Medium Range BS}} & 2 bands & 20 W & 7 - 13 dBi & 100 - 400 W & E+ \bigstrut\\ \cline{2-6} & 1 band & 10 W & 7 - 13 dBi & 50 - 200 W & E100 or E+ \bigstrut\\ \hline \multicolumn{1}{|c|}{\multirow{2}[4]{2em}{Local Area BS}} & 5 bands & 2.5 W & 2 - 5 dBi & 4 - 8 W & E10 \bigstrut\\ \cline{2-6} & 1 band & 0.5 W & 2 - 5 dBi & 0.8 - 1.6 W & E0 or E2 \bigstrut\\ \hline \multicolumn{1}{|c|}{\multirow{2}[4]{2em}{Home BS}} & 5 bands & 100 mW & 0 - 3 dBi & 0.1 - 0.2 W & E0 or E2 \bigstrut\\ \cline{2-6} & 1 band & 20 mW & 0 - 3 dBi & 0.02 - 0.04 W & E0 \bigstrut\\ \hline \end{tabular}% \label{table_small_cell_classes}% \end{table}% In the provision of true 5G services, an ultra-densification is inevitable, and meeting the challenges in providing essential infrastructural requirements needs the conduction of thorough investigations. In such an ultra-dense BSs deployment context, the conventional BSs deployment-related challenges may also get amplified. These challenges include: abidance of BSs antenna tilts and power radiation standards for health/safety, lease disputes with landlords, planning permissions and lack of suitable sites. The safe user to BSs distance can be calculated by exercising the recommendations for electric field intensity by the International Commission on Non-Ionizing Radiation Protection (ICNIRP) \cite{ICNIRP_guideline_distance_98}. For radiations at different frequency bands, Table \ref{tab_safe_distance} presents the electric field intensity (using ICNIRP recommendations), equivalent isotropically radiated power (EIRP), and safe-user-distance in volts per meter (V/m), Watts (W), and centimeter (cm), respectively. The basic deployment principle being followed by the operators is to ensure 1/10\textsuperscript{th} of the ICNIRP voltage density, for the exposure of RF for a long time (i.e., more than six minutes). Thus, considering the radiation power, the safe-user-distance in the table represents the shortest permissible distance between the transmitter and human-head. The enforcement of maximum power radiation standards and safe-user-distance assurance for health/safety may be another critical challenge in ultra-dense deployment context. The details of different classes of BSs defined by 3GPP that can be manifested as small-cells for ultra-network-densification, as provided by \cite{SCF_19}, are presented in Table \ref{table_small_cell_classes}. The typical BS bands, transmit power, gain, EIRP range, and installation classes configurations are classified into medium range, local area, and home BSs. The details provided in Table \ref{tab_safe_distance} and \ref{table_small_cell_classes} may assist in devising a comprehensive strategy for infrastructure sharing and value generation opportunities to support a swift 5G rollout. \begin{figure} \centering \includegraphics[width=\columnwidth]{typical_infrastructure.jpg} \caption{Schematic diagram of a cell site illustrating the components in the context of possible infrastructure sharing.} \label{fig_schematic_s9} \end{figure} \begin{figure*}[th] \centering \includegraphics[width=\textwidth]{Poll_config.jpg} \caption{iWS recommended solution for small cell mast \cite{iws_sol_1} and installation classes for simplified deployment of small cells.} \label{fig_poll_s8} \end{figure*} \subsection{Infrastructure Sharing Potential} Sharing of existing telecommunication and public infrastructure for small-cell deployment is an attractive solution to substantially reduce the 5G deployment cost and to encourage revenue generation opportunities for Mobile Network Operators (MNOs). The hesitance of MNOs in implementing the standalone 5G solution is understandable. Fig. \ref{fig_schematic_s9} illustrates the schematic diagram of network infrastructure by highlighting the important candidate components for possible infrastructure sharing. To this end, the solution may be in the optimization of technology and passive infrastructure along with the development of the revenue generation models for supporting the sharing of active infrastructure. To make the cost-optimization more effective and quick, devising a robust pathway is vital. In this regard, the promotion of competition among different partakers from infrastructure domain may help. Moreover, the thorough policying for sharing infrastructural services between different MNOs is another potential step. More importantly, the induction of non-MNO assets for 5G deployment into the infrastructure sharing business model will help in further stimulating the rollout. The Neutral Hosting model can be mainly signified as an effective form of infrastructure sharing. \emph{Active sharing} requires the MNOs to share elements of the active network layer. The active sharing components include RF antennas, MSC, HLR, OMC, SGSN/GGSN, core transmission ring, core network logical entities, billing platform and value-added services (VAS). Despite the cost optimization advantages associated with active sharing approach, it is becoming unpopular due to various dynamic reasons linked to network infrastructure domain. The forms of \emph{passive sharing} are site and mast sharing. The passive sharing agreements are associated with multi-tenancy within sites (physical location), power cabling, cabinet/ shelter, generator, cooling system, and mast and backhaul (fiber). The following is the potential list of sharing components. \begin{enumerate} \item Mast Sharing \item Site Sharing \item Full RAN Sharing \item Network Roaming \item Core Transmission Ring Sharing \item Shared Core Network Elements and Platforms \end{enumerate} Moreover, the public infrastructure from local governments potentially available for sharing/reuse can be listed as: \begin{enumerate} \item Streetlamps \item Road/street signs \item Rooftops \item Tall building with suitable projections surfaces –- considering proximity \item Traffic signals \item Cabinets \item CCTV installations \end{enumerate} For sharing the indicated public infrastructure, there are various other factors which may need careful consideration. The capability of street furniture (e.g., streetlamps) for bearing the extra weight required to hold antennas and other equipment needs to be assessed. Moreover, the height requirements of the street furniture to facilitate different BS installation classes to meet the safe-user-distance recommendations (as discussed in the previous subsection) also needs to be investigated. Furthermore, various other factors like weather aspects (e.g., aerodynamics etc.) are also critical in adopting a passive infrastructure sharing option. In light of these critical factors, streetlamps are recommended as the most suitable choice for passive infrastructure sharing in this work. The iWS recommended design \cite{iws_sol_1} for a typical small-cell mast is illustrated in Fig. \ref{fig_poll_s8} along with the height recommendations for different BS installation classes. This solution is for 4G cells, which can be revisited in the context of required ultra-densification in 5G networks. \subsection{Data Sharing Potential and Associated Barriers} A significant increase in the generation of data from different network services is expected in the coming years \cite{QML_6G_Junaid}. An annual growth of 55\% in data-traffic is forecasted from the year 2020 to 2030 \cite{union2015imt}, which will include a significant contribution from the subscriptions of new services introduced by 5G such as mMTC. As a result, the data generated per month is expected to reach $5.016$ ZetaBytes (ZB) by the year 2030. Appropriate exploitation of this huge amount of generated data can assist in not only improving the user experience but also in creating the new revenue generation opportunities. A balanced policy for sharing of data with different stakeholders, while also maintaining the necessary privacy and security provisions, can help in directly translating the data value into performance enhancement and revenue generation opportunities. To this end, this section highlights the barriers in data sharing and motivates the opportunities for their resolution. \paragraph{Lack of use cases} There are no explicit motivational use cases available; which is because of the data value conception being a recently emerged perspective. This data-value based core business has developed with a drastic increase in the amount of data generation arose with the growing network services. Development of explicit examples/models for facilitating successful selling and buying of valuable data in the mutual benefit of all stakeholders is necessarily required. \paragraph{Immature market} The current business strategy is not exclusively based on the data value. The immaturity of the market in this context is one of the critical barriers in the initiation of dedicated efforts for defining the required policies of data sharing. The commissioning of data sharing has a strong potential in generating new data value based business models in the long-term. \paragraph{Fragmented data landscape} The data in the current model is often not in the entangled form, which is a primary requirement to identify the data value. The lack of availability of concatenated/de-fragmented data to define a meaningful business model is a crucial barrier. \paragraph{Reluctance of data sharing} The data privacy, security of data privacy, and the absence of any comprehensive business model are among the primitive reasons causing hesitation in the sharing of data. The lack of a distinct definition of direct or indirect financial benefits associated with data sharing for core business is another leading cause. \paragraph{Skills and Competence} The lack of skill sets for the collection and processing of data into suitable compositions for enabling data sharing is another critical barrier. The shortage of available data scientists and the high cost of associated equipment are vital causes. Moreover, the absence of a unified technical-platform for data processing and serving is also a prime contributor to the barrier. \subsection{Security Challenges} The provision of security and privacy in massively connected 5G and B5G communication networks is one of the biggest challenges of the future. 5G offers new and disruptive business cases \cite{8648405}. While rolling out 5G networks in the next-generation smart cities in general and UK in particular, due to many new features of 5G networks and the fact that 5G will envelop almost all dimensions of human life, business, and government affairs with ultra-high-speed access to services, anywhere, anytime and any type, 5G security requirements have to be thoroughly researched \cite{7345407}. 5G rollout will also bring a wide range of threats and a greatly expanded attack surface \cite{8334918}. For example, 5G physical layer security at the RAN \cite{7345407} is susceptible to new types of attacks and performance bottlenecks such as eavesdropping, contaminating, spoofing, and jamming. Since 5G rollout will leverage existing telecom infrastructure and other computing and networking paradigms \cite{7345407}, 5G will be live within heterogeneous networks (HetNets) \cite{7081072}. The HetNet architecture, compared to a single-tier architecture, can potentially lead to the UEs to be more vulnerable to eavesdropping \cite{8125684} and hence privacy and location leakage may arise due to frequent handover caused by the high density of small cells in the HetNet \cite{7081072}. As a result, a new generation of security services has to be offered \cite{8125684}. Novel 5G AKA, USIM and ECC based design of handoff authentication for 5G-WLAN HetNets will be needed that can extend the provisions of secure and seamless internet connectivity \cite{8706883}. Many of these additional requirements come from the technology shift to SDN \cite{7345407} and NF virtualization (NFV) \cite{7994617}, network slicing, massive MIMO \cite{6736761}, NOMA \cite{7842433}, ultra-dense small cell network \cite{8516948}, D2D and M2M communications, and the cloud, and they lead to the need of increased security on the network side. 5G NOMA, mmWave, massive MIMO, and beamforming can improve physical layer security of 5G networks through co-operative jamming \cite{8125684,8792139}, which will allow secret and high-quality channel with the legitimate UEs while frustrating eavesdroppers with noisy, random, and poor channel conditions. The directional property of mmWave can be leveraged to establish and share secret keys that are unconditionally secure from the passive eavesdroppers\cite{8594703,8684919}. A variety of emerging new use-cases and networking paradigms demand new security requirements and considerations \cite{8125684}. For example, 5G networks need to employ adaptive intrusion detection system, which can perform the following tasks: (i) detect bandwidth spoofing attack on 5G relay, small cell access point, and base station, (ii) employ UEs initial authentication at the access points, and 5G RAN by a highly secured authentication and handover mechanism with the minimal handover latency and no loss of user privacy. The SDN controller handles DDoS attack and a secure VNF in the cloud filters out malicious packets from legitimate packets \cite{8523804}. 5G device-to-device (D2D) and machine-to-machine (M2M) communication security needs, vulnerabilities, and potential solutions have to be investigated. To this end, the important contexts include the following: (i) direct radio communications, (ii) large-scale D2D deployments, (iii) cooperative communications for securing D2D communications, (iv) power control and channel access in securing D2D communications,(v) continuous authenticity with legitimacy patterns, (vi) key exchange protocols involved with the D2D users and gNB, (vii) design of D2D links to use as friendly jammers, and (viii) helping authorized cellular users against malicious wiretapping \cite{8125684,8335294}. Furthermore, C-RAN security has to be ensured in service plane, control plane, and physical plane \cite{7954591}. 5G NR vulnerability has to be addressed in terms of jamming and spoofing by investigating the physical downlink and uplink control channels/signals and through designing proper mitigation strategies for proceeding towards the design of 5G NR chipsets and BSs \cite{8403769}. New 5G paradigms will have to be handled by the UK MNO businesses. For example, security challenges related to network slicing; such as on-demand security isolation of network slices, the security of inter-slice communications, impersonation attack, security policy mismatch, DoS attack, side-channel attacks, privacy attacks, resource harmonization between inter-domain slice segments and hypervisor attacks have to be considered \cite{8334918,8792139}. New types of 5G-based verticals, e.g., IoT, need to establish secure 5G-based network slicing technique with secure key establishment among IoT devices, MEC, and IoT cloud server \cite{8314666}. UK businesses will need innovative 5G Network Slice brokering mechanism using blockchain for reducing service creation time and for enabling the manufacturing equipment to autonomously and dynamically acquire the slice required for more efficient operations \cite{8260929}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Security_1.jpg} \caption{5G and Beyond Roll out Security Consideration Scope} \label{fig_security_1} \end{figure} Moreover, SDN and NFVs are vulnerable to various types of attacks including the following: (i) DoS, hijacking, and saturation attack on SDN controller, switches, and hypervisor, (ii) network slice theft from hypervisor and shared cloud resources and SDN (virtual) switches, (iii) routers configuration attacks, (iv) SDN configuration attacks, (v) penetration attack on SDN virtual resources, (vi) TCP-level attack on SDN controller-switch communication, and (vii) man-in-the-middle attack on the SDN controller-communication \cite{8334918,8125684,8792139,8712553}. The advent in security mechanisms is highly required to meet the overall 5G advanced features such as ultra-low latency and ultra-high energy efficiency \cite{8125684}. Different to the conventional radio cellular networks, the emerging 5G wireless networks will be service-oriented, which necessitates a particular emphasis on security and privacy requirements from the perspective of service-based architecture (SBA) \cite{8125684}. Hence, UK MNOs have to ensure data exchange security for network function (NF) service registration and de-registration, NF service discovery, NF service authorization and authentication in the presence of different attack vectors that may cause loss of NF availability, loss of data integrity, and attack from the insiders \cite{8771320}. 5G advocates the use of MEC, which offers heterogeneous network nodes inter-operating in an open ecosystem where distributed computing and virtualization may be exploited by service providers to extend the provisions of different applications to the end-users \cite{8334918}. Hence, at the time of rolling out 5G networks, MEC threats have to be considered at the frontend (UE/IoT to MEC network), backend (MEC network to cloud), and 5G MEC core network \cite{8334918,8314666}. New dimensions of 5G UE Security, trust, authentication, policy, compliance, and privacy for ultra-mobility will be required. Since 5G networks are expected to extend the provisions of everything as a service, where the users data/information will be stored and shared online, maintaining users/data privacy during 5G rollout in HetNets will be highly challenging \cite{8334918}. Due to the reduced cell size in 5G networks, there may often appear the scenarios in which a mobile user may move through multiple small sized cells within a single communication session. Therefore, the privacy assurance is more challenging in 5G networks due to the possible involvement of untrusted or compromised APs involved during the handover \cite{7081072}. Hence, hybrid and flexible authentication of UEs should be devised that will allow authentication by the network only, authentication by the service provider only, and authentication by both the network and service providers \cite{8125684}. 5G rollout cost model in terms of financial protection against secrecy outage and service outage can be considered by introducing a cyber-insurance framework for 5G cellular networks \cite{8335293}. Pre-5G or legacy privacy vulnerabilities should be carefully addressed while rolling out 5G network \cite{8712553}. Pre-5G legacy authentication, privacy, and protocol exploits in the context of 5G have to be addressed such as implicit trust in pre-authentication messages and legacy symmetric key security architecture \cite{jover2019current}. Furthermore, identify security, location security, IMSI security, and mobile terminal security have to be considered \cite{8334918}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Security_2.jpg} \caption{Proposed Security endpoints to be considered while rolling out 5G Infrastructure in UK} \label{fig_security_2} \end{figure} While rolling out 5G in the UK, the threats originated from devices or UEs, the air interface at RAN threats \cite{8454666}, edge network threats, backhaul threats, 5G core network threats, and external network threats have to be considered \cite{8334918} \cite{8792139}. Because failing to handle the security and privacy of user data and application would have the repercussion of 5G rollout costs. For example, the 5G network has to proactively handle UE threats such as bots, DDos, man-in-the-middle attacks, firmware hacks, device tampering, and malware. The 5G RAN air interface threats include physical layer security to handle jamming, man-in-the-middle attacks, and eavesdropping. The threats at the MEC layer have to handle MEC server vulnerability, rogue nodes, weak authentication issues, side-channel attacks, and improper access control. The backhaul threats include DDoS attacks, control and user plane sniffing, MEC backhaul sniffing, and flow modification attacks. The 5G core network threats that need to be mitigated and handled are software and SDN issues, API vulnerabilities, network slicing issues, DoS and DDoS attacks, improper access control, and virtualization issues. Finally, the external network threats include application server vulnerabilities, cloud services vulnerabilities, bots, and other IP based attacks, application vulnerabilities, API vulnerabilities, and roaming partner vulnerabilities \cite{8792139}. Different stakeholders related to 5G rollout are recommended to consider the following B5G security considerations to minimize the costs related to security breaches and safety and privacy of data flowing through 5G networks \cite{8712553}. Fig. \ref{fig_security_1} shows a high-level requirement of 5G security considerations, and Fig. \ref{fig_security_2} shows the salient areas of 5G security that needs to be considered while rolling out 5G. In this section, we will illustrate the state-of-the-art 5G rollout security dimensions that need to be considered by the concerned entities. \paragraph{Blockchain usage for B5G Applications} UK businesses can use blockchain for a 5G-based decentralized business model such as commerce, context, content, and connection \cite{8648405,8712553}. For example, blockchain smart contract can be used for secure 5G network slice brokering and maintaining immutable service level agreement (SLA) ledgers to bind 5G business actors such as manufacturing equipment owner, IoT manufacturing equipment, infrastructure providers (InP), MNOs, micro-operators ($\mu$O), virtual mobile network operators (MVNO), over-the-top service providers (OTT) and verticals. Blockchain can be used for secure 5G network sharing scenarios \cite{8685867}, e.g., multiple 5G network operators can extend and collaborate among roaming end-users and incentivizes local businesses and other actors to densify and extend the 5G coverage. Blockchain ledger can be used to store the proof of bandwidth and other types of 5G network resource usage, traffic flow and accounting. MNOs can employ blockchain to provide secure authentication scheme for 5G Ultra Dense Access Point Network \cite{8470085}. Also, blockchain is envisioned to provide security and privacy of IoT data in 5G HetNets \cite{8731639}. In the literature, researchers have proposed blockchain to offer efficient privacy-preserving and data sharing schemes for 5G verticals \cite{8320551}. UK businesses can leverage blockchain for secure registration of a new cellular user and UE, authentication and authorization of users and different services, usage of networks, distributed mobility management (DMM), authenticate the priorities and 5G network services usage and propose algorithm of allocating communication and computation resources to minimize the delay of data transmission and computation, billing and payment and manage roaming bills context of 5G HetNets \cite{8356363}. Blockchain can handle robust and universal seamless handover authentication for 5G HetNets by leveraging the trapdoor collision property and the tamper-resistant property. More specifically, blockchain will allow 5G network slice providers to securely perform brokering process and allow leasing resources from different providers securely and privately \cite{8707070}. Furthermore, blockchain will allow UK's businesses to enable industry 4.0 automation processes and manufacturing IoT equipment to autonomously and dynamically acquire the 5G-based slices with QoS needed for most efficient operations \cite{8368983}. Blockchain-based authentication and key agreement protocol can be employed, which will allow UEs to move smoothly in a trusted APs group without frequent authentication within an ultra-dense small cell network \cite{8470085}. \paragraph{Artificial Intelligence, Deep Learning and Machine Learning for 5G Security Threat Intelligence} Since the UK is one of the leaders in artificial intelligence research, 5G security can leverage this strength. Various use case scenarios of AI-based security for 5G and beyond applications can be found at \cite{8712553}. Blockchain and AI methods can together form a strong platform to support secure and intelligent resource management, flexible networking, and reliable orchestration in 5G and beyond scenarios such as spectrum sharing, D2D caching, V2V energy optimization, and computation off-loading \cite{8726067}. The novel machine learning algorithm can be trained to teach security threats faced by 5G network-interfaced intrusion detection and prevention system, cyber threat and anomaly identification system, and help to secure threats on UK's 5G network \cite{8304873}. UK's 5G MNOs or service brokers can use AI to allow self-adaptation of security needs according to live 5G traffic flowing through VNF. The AI-based VNF can employ auto-scaling and deploy more 5G network resources, employ appropriate deep learning framework, or even the detection model, with a more suitable one to the given cyber-defense context \cite{8283694}. \paragraph{Quantum Safety and Next Generation Ciphers for B5G Applications} In order to face the challenge of cryptographic vulnerability threats due to advancements in computing capabilities of adversaries, UK 5G rollout should consider quantum-resistant authentication and data distribution scheme, and lattice-based homomorphic encryption technology, which greatly reduces the network burden at the same time achieves strong security including privacy protection and anti-quantum attacks \cite{8781929}. 5G MNOs can leverage the visible spectrum as a noise source for designing next-generation random cryptographic seeds and key generation system suitable for 5G networks \cite{8276259}. To support real-time data secrecy over 5G intra-slice security applications and protect the private information and hide the communication signals in the frequency, spectrum stream cipher can be a viable option \cite{8315003}. To lower the authentication delay in an ultra-dense small cell network, certificate authority (CA)-based approach can be availed \cite{8718355}. Different 5G network slicing may deploy different public-key cryptosystems, and hence, the 5G network should allow diversified types of cryptosystems that will allow heterogeneous sign-cryption schemes such as public key infrastructure and the certificate-less public key cryptography environment \cite{8268052}. \paragraph{5G Verticals' Security Considerations} In general, an integrated effort has to be given to secure the UK's business verticals. In the following, we focus security considerations of rolling out 5G-based V2X and Industry 4.0 verticals. Security vulnerabilities in the areas of mutual authentication and authorization, confidentiality and integrity protection, replay protection, Secure provisioning and storage, privacy ID, personal data, and tracking in the vehicular context are of significant importance \cite{8088619}. Especially, the security analysis of V2X verticals in the areas of the termination of user plane security at gNB, authentication and authorization of UE at the 5G RAN, 5G RAN security, UE Security, and network Slicing security have to be ensured \cite{8088619}. V2X security can be obtained by securing 5G network slicing through permissioned consortium blockchain. Using dedicated networking slicing and blockchain ledgers, vehicles can share information via 5G networks with outside world entities or D2D entities \cite{8343866}. A 5G enabled vehicular network can facilitate a reliable, secure and privacy-aware real-time video reporting service by using novel block cipher with 1.2 Gbps speed of secure video data sharing. This is to enable the participating vehicles to instantly report the high-definition videos/photos of any events (e.g., traffic accidents, etc) to ensure a timely response from concerned departments (e.g., sending ambulance vehicles to the accident scene, etc) \cite{7433471}. Using blockchain, SDN-enabled 5G-V2X can detect malicious vehicular nodes or messages while keeping the overhead and impact on the network performance in an acceptable range \cite{8701642}. Leveraging 5G SDN \cite{8792139} with resilient V2X security design, different types of attacks such as DDoS targeting either the controllers or the vehicles in the network can be mitigated, and at the same time, it allows tracing back the source of the attack \cite{7939143}. By leveraging the directional beamforming, secure 5G V2X applications such as vehicle platooning will allow platoons to establish shared secret keys \@ 166 Mbps, which is four-times higher than that of Diffie-Hellman and assumed to allow One Time Pad (OTP) encryption \cite{8684919}. Due to the vulnerabilities of IoT devices, the IoT verticals need to establish a secure MEC framework for cloud-assisted IoT environments and the secure APIs through which developers serve contents to such IoT applications of MEC \cite{8334918}. Extensive security surveys based on 5G properties in the areas of short-range IoT applications, delay-tolerant IoT applications, critical IoT application, and massive IoT applications are needed before 5G rollout \cite{8792139}. For example, 5G vertical security requirements of IoT-based electricity services within a smart city is needed before 5G roll out in UK \cite{8340149}. Attack vectors on SDN-based identity and access management, authentication, non-repudiation, audit, trust and assurance, compliance, confidentiality, integrity, availability, and privacy issues are to be considered, and proper safeguards and security risk mitigation techniques to support security at 5G access network, application layer, UE, management, core network, and infrastructure and virtualization components have to be deployed. The utilization of innovative security measures for IoT networks, such as two-factor authentication and key agreement schemes, can help in resisting various different types of attacks to ensure user privacy through both anonymity and unlinkability \cite{8267060}. Since botnet is a major threat for IoT verticals \cite{8039305}, 5G roll-out design should be able to dynamically detect botnet traffic pattern and mitigate the attack in 5G network environment by leveraging the combination of SDN and NFV techniques to adapt botnet detection and reaction functions in 5G networks. \subsection{Spectrum Coexistence and Trading} The demands for new radio spectrum to meet the increasing growth of data traffic are rapidly increasing. To this end, the induction of new spectrum, location-based licensing of spectrum, efficient management of spectrum, and advent in green radio communication technologies are among the prominent solutions. Dynamic spectrum sharing techniques can enable the sharing of the radio spectrum among two or more wireless systems and can effectively utilize the available radio frequencies \cite{SharmaFD2018}. The existing dynamic spectrum sharing models can be broadly categorized into the following three types: (i) Commons Model, (ii) Shared-use model, and (iii) exclusive-use model \cite{Hassan2017exclusive}. In the spectrum commons model, radio spectrum is not owned by any provider and all the secondary users or unlicensed users can access the spectrum with equal rights. This sharing model suitable for spectrum sharing operation in the unlicensed bands such as Unlicensed National Information Infrastructure (U-NII),i.e., 5GHz, and Industrial, Scientific and Medical (ISM), i.e., 2.4 GHz. The main problem with this open access approach is that unlicensed users may suffer from the inter-user interference, and this may result in the network congestion. In the shared-use model, the secondary users utilize the vacant spectrum or underutilized spectrum in an opportunistic way or an interference-avoidance manner without harming the normal operation of the primary users by using various Cognitive Radio (CR) techniques. The CR technology is considered as one promising technology to address the issue of spectrum scarcity, which can enable the coexistence of two or more wireless systems either in an opportunistic mode, i.e., interweave paradigm or with the interference avoidance mode, i.e., underlay paradigm \cite{Sharma2015CR}. The interweave paradigm mainly deals with the spectrum sharing or database assisted techniques, while the underlay techniques enable the spectrum sharing techniques of wireless systems by means of suitable interference mitigation techniques such as beamforming and power control. Besides the aforementioned interweave and underlay paradigms, several advanced spectrum sharing mechanisms including Carrier Aggregation (CA) and Channel Bonding (CB) \cite{Khan2014CA}, Spectrum Access System (SAS), Licensed Shared Access (LSA) and Licensed Assisted Access (LAA) \cite{Mukherjee2016LAA} have been investigated in the literature. Furthermore, various other spectrum sharing techniques such as spectrum leasing, spectrum trading, spectrum harvesting and spectrum mobility have been discussed in the literature towards improving the spectrum efficiency and energy efficiency of wireless networks \cite{Yang2016advanced}. On the other hand, the secondary users can acquire the exclusive spectrum usages right for the required bandwidth and duration in the exclusive-use model. These exclusive rights can be obtained from the primary system either by purchasing the spectrum from the primary service providers or spectrum licensees or by providing a cooperation reward, for instance the relaying of the primary data. As compared to the shared-used model, this approach has several advantages for the secondary users as they do not need to sense the primary channel and do not need to switch from one channel to another channel. This mode of spectrum sharing in the exclusive-mode is also called as spectrum trading \cite{Hassan2017exclusive}, which can be implemented either directly between the secondary and primary service providers or can be managed by a spectrum manager/broker or a spectrum exchange market. An auction operation may be needed or not depending on the required duration for spectrum trading, i.e., long duration of spectrum trading needs an auction while a short duration may not need an auction. Auctioning process becomes more suitable in the scenarios with a high demand and limited supply since a seller can attract more benefits by involving multiple bidders. However, this method depends on various factors such as low number of bidders or a single bidder, all bidders asking below the required price, time dependency, and the need of multiple iterations to obtain a suitable solution, thus resulting to the need of a real-time multi-seller and multi-channel model while considering the dynamicity of the channel and traffic conditions \cite{Hassan2017exclusive}. On the other hand, non-auction based models can be designed based on game-theoretical models and may be categorized into monetary \cite{Bajaj2015spectrumtrading} and non-monetary types \cite{Simeone2008leasing}. Considering the increasing demand for Ultra-Reliable and Low-Latency Communications (URLLC) applications such as industrial automation, there arises the need of meeting reliability requirements with the available spectrum. The existing factory automation generally utilizes unlicensed Industrial, Scientific and Medical (ISM) bands and benefits from their wider bandwidths in handling large traffic volumes. However, the reliability targets of below 10 ms can not meet with the existing solutions \cite{Holfeld2016factory}, and also the unlicensed mode of operation requires the careful design of minimizing or avoiding interference being subject to strict regulatory constraints. Considering these drawbacks of utilizing unlicensed bands or factory automation applications, the authors in \cite{8685776} demonstrated the possibility of utilizing 5G cellular licensed band as an alternative option for factory automation applications, and also showed the significance of utilizing integrated unlicensed and licensed bands in terms of economic viability. However, several challenges in terms of synchronized operation in the unlicensed and licensed bands and over-the-air inter-system coordination needs to be addressed to realize this integrated spectrum utilization approach in practice. The authors in \cite{8708839} discussed the use of 24 GHz as the Gigabit wireless networking spectrum based on the forecast methodology for 5G spectrum by K-ICT for IMT 2020 Korea \cite{KICTIMT2020Korea}, where three different forecast methodologies for 5G spectrum needs, namely, traffic forecast-based approach, technical performance-based approach, and application-based approach have been identified. From the analysis presented in \cite{8708839} regarding the use of 24 GHz, there arises the requirement of over 370 MHz spectrum for mobile broadband services for 1 Gbps speed and this requirement is expected to increase by 10\% till 2024. Also, the analysis pointed out the need of about 233,282 base stations in the analyzed regions consisting of dense urban, urban and sub-urban areas to support the increasing number of 5G users. Moreover, understanding the spectrum usage pattern with the help of suitable spectrum monitoring techniques/platforms is a vital task towards enhancing the radio spectrum utilization efficiency of Beyond 5G dynamic sharing systems. In this direction, Machine Learning (ML) techniques are of significant importance to predict the future spectrum usage and to address the inefficiency issues in spectrum management and utilization. The existing ML techniques can be broadly categorized into supervised, unsupervised and reinforcement learning \cite{Sharma2019mMTC}. Authors in \cite{7289481} carried out the analysis of spectrum occupancy in CR networks by utilizing different supervised and unsupervised ML techniques. Under the supervised learning approach, various techniques including Naive Bayesian Classifier (NBC), Support Vector Machine (SVM), Decision Trees (DT), and Linear Regression (LR) were considered while under the unsupervised learning, Hidden Markov Model (HMM) approach was investigated along with their numerical comparisons in terms of computational time and classification accuracy. \begin{table}[t] \centering \caption{Summary of 5G networks target KPIs} \begin{tabular}{|p{2.8em}|p{3.1em}|p{2.5em}|p{2.7em}|p{2.7em}|p{2.4em}|p{2.98em}|} \hline \textbf{Service Platform} & \textbf{Device Density (/km$^2$)} & \multicolumn{1}{p{2.6em}|}{\textbf{Mob- ility (km/h)}} & \textbf{User Data Rate.} & \textbf{Cell Edge Rate} & \textbf{Lat-ency} & \textbf{ Availa-bility (Relia-bility)} \bigstrut\\ \hline \hline \textbf{eMBB} & Up to 10k & \multicolumn{1}{l|}{\multirow{3}[6]{2.6em}{0 to 360}} & 50 - 100 Mbps & 50 Mbps DL, 25 Mbps UL & 10 - 50ms & \multicolumn{1}{l|}{99\%} \bigstrut\\ \cline{1-2}\cline{4-7} \textbf{mMTC} & Up to 1m & & Up to 100kbps & 100 kbps DL and UL & $>$50ms & \multicolumn{1}{l|}{99\%} \bigstrut\\ \cline{1-2}\cline{4-7} \textbf{URLLC} & Up to 10k & \ & Up to 100 Mbps & 10 Mbps DL and UL & 1 - 50ms & 99.9\% - 99.999\% \bigstrut\\ \hline \end{tabular}% \label{tab_5G_KPIs}% \vspace{8pt} \centering \caption{Coverage range approximation for favourable channel conditions.} \begin{tabular}{|p{2em}|p{3.785em}|c|c|c|} \hline \multicolumn{1}{|p{2em}|}{\multirow{2}[4]{2em}{\textbf{Frequency Band}}} & \multirow{2}[4]{3.785em}{\textbf{Envir-onment}} & \multicolumn{3}{p{12.645em}|}{\textbf{Coverage range (kms)}} \bigstrut\\ \cline{3-5} & \multicolumn{1}{c|}{} & \multicolumn{1}{p{4.215em}|}{\textbf{eMBB}} & \multicolumn{1}{p{4.215em}|}{\textbf{URLLC}} & \multicolumn{1}{p{4.215em}|}{\textbf{mMTC}} \bigstrut\\ \hline & Rural & 2.62 & 2.69 & 12.5 \bigstrut\\ \cline{2-5} \multicolumn{1}{|p{5.145em}|}{\textbf{700MHz}} & Sub-Urban & 0.8 & 0.82 & 7 \bigstrut\\ \cline{2-5} & Urban & 0.59 & 0.65 & 4.3 \bigstrut\\ \hline & Rural & 0.62 & 0.65 & 5.65 \bigstrut\\ \cline{2-5} \multicolumn{1}{|p{5.145em}|}{\textbf{3.5GHz}} & Sub-Urban & 0.17 & 0.17 & 2.09 \bigstrut\\ \cline{2-5} & Urban & 0.09 & 0.09 & 0.47 \bigstrut\\ \hline & Rural & 0.16 & 0.17 & 1.52 \bigstrut\\ \cline{2-5} \multicolumn{1}{|p{5.145em}|}{\textbf{26GHz}} & Sub-Urban & 0.13 & 0.13 & 0.97 \bigstrut\\ \cline{2-5} & Urban & 0.08 & 0.08 & 0.48 \bigstrut\\ \hline \end{tabular}% \label{table_converage_range_bands}% \end{table} Furthermore, a conceptual framework of end-to-end learning for spectrum monitoring applications has been presented in \cite{Kulin2018endtoend} along with a generic methodology to design and implement wireless signal classifiers followed by two case-studies related to modulation recognition and wireless technology interference detection. The end-to-end learning concept investigated in \cite{Kulin2018endtoend} refers to a learning procedure in which the features of a wireless signal are extracted, and a wireless signal classifier is utilized to classify the received signals. Moreover, it may not be reliable in practice to learn the radio spectrum usage by an individual node due to several issues such as multi-path fading and hidden node problem, leading to the need of collaborative learning and spectrum sharing strategy \cite{SharmaPIMRC2017}. Also, a non-collaborative way of spectrum usage learning in mmWave bands may result in challenging issues due to the involved directional antenna beams, and this can be improved by enabling collaboration among the secondary users to predict or estimate the spectrum occupancy distribution of the radio channels \cite{Liglobecomlearning}. \section{case study: A Typical UK City} This section presents a case study conducted to represent a typical UK city. For this purpose, the local authority involved typical West Midlands city layout is used. The study is focused on to demonstrate the potential of street furniture and public building for infrastructure sharing. There are four major MNOs in the UK. In Table \ref{tab_UK_consumers}, the details of current major infrastructure consumers in the UK are provided, which are classified into MNOs, MVNOs, private networks, and semi-private networks classes. We begin with the introduction of the 5G testbed environment and experimental setup, then further proceed with conducting a comprehensive analysis on our findings. \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{case_study_s13.jpg} \caption{Case study-- A 5 km$^2$ area of a typical city.} \label{fig_case_s13} \end{figure} \begin{table}[ht] \centering \caption{Details of the infrastructure consumers.} \begin{tabular}{|p{4em}|p{8.5em}|p{13.5em}|} \hline \textbf{MNO } & \textbf{MVNO } & \textbf{Private \& semi private network} \bigstrut\\ \hline\hline \multirow{2}[2]{*}{EE} & \multirow{2}[2]{9.4em}{Virgin Mobile; ASDA Mobile; BT Mobile } & National Roads Telecommunications Services (NRTS) and Traffic Scotland \bigstrut[t]\\ \multicolumn{1}{|c|}{} & \multicolumn{1}{c|}{} & Network Rail Telecom \bigstrut[b]\\ \hline Three & iDmobile; FreedomPop; The People's Operator & Airwave/ESN \bigstrut\\ \hline O2 & Tesco Mobile; Lycamobile; Giffgaff & Power Utilities \bigstrut\\ \hline Vodafone & Lebara Mobile; TalkTalk Mobile; TalkMobile & Sigfox/Arqiva \bigstrut\\ \hline \end{tabular}% \label{tab_UK_consumers} \end{table}% \subsection{5G Testbed Environment and Experimental Setup} West-Midland 5G (WM5G) is the UK's largest 5G testbed, which is available at the 5G business \& innovation center (5GBIC) in Birmingham City University (BCU) UK. The WM5G is a public-private partnership initiative with an investment of up to \textsterling 150m. This partnership aims at providing innovation to attain enhanced digital productivity and economy. The WM5G at 5GBIC is utilized for the conduction of the proposed case study. The 5G testbed key performance indicators (KPIs) are summarized in Table \ref{tab_5G_KPIs}. The derived coverage range estimate for different 5G target services (i.e., eMBB, URLLC, and mMTC) is provided in Table \ref{table_converage_range_bands}. The table exhibits a more ubiquitous view of the scale of infrastructural provisions required for 5G services. The characterization of coverage range into different cellular conditions/environments (i.e., rural, sub-urban, and urban) and various frequency bands (i.e., 700MHz, 3.5GHz, and 26GHz) is also presented. The Case study is conducted for a 5 km$^2$ area of a typical UK city. The existing telecom and local authorities owned infrastructure in the considered region is plotted in Fig. \ref{fig_case_s13}. In Fig. \ref{fig_case_s13}(a), (b), (c), and (d), the location of existing 4G macro-cells, with added public buildings, with added street furniture, and superimposed all available infrastructure are plotted. There is a requirement to provide good quality outdoor services for at least 140,000 premises to which the obligation holder does not currently provide the good coverage. Moreover, there is a requirement to deploy at least 500 new wide area mobile sites in rural areas, to be co-located at least at 1 km distance from existing sites. This concludes that each of the new 500 sites shall have a minimum EIRP of 43 dBm. The conduction of a comprehensive study on ICNIRP requirements and environmental sustainability of the structures is suggested. It is observed that the potential of public buildings and street furniture to facilitate the necessary infrastructure for 5G deployment also provides a significant opportunity for the Local Authority to directly or indirectly participate in the business model along with the MNOs \cite{patwary2016universal}. \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{Ofcom_Spectrum.jpg} \caption{Ofcom 5G Spectrum sharing framework UK; i.e., for 1.8GHz, 2.3GHz, 3.8-4.2GHz, Lower-26GHz, and Upper-26GHz bands \cite{Ofcom_location_licensing_2019}.} \label{fig_spectrum_uk} \end{figure} \subsection{Spectrum Flexibility Policy in the UK} The radio frequency spectrum being a core enabler of wireless communications has a high significance in shaping a country's economy and society. The huge deployment and radio spectrum costs are regarded as the potential delaying causes in the provision of 5G technology innovations. Enabling opportunities for innovation with spectrum sharing has a strong potential in reducing the overall cost. In the light of growing interest in the use of communication applications and services introduced by 5G, there is a need to develop viable solutions for licensing the radio spectrum for meeting the local connectivity needs. In this regard, the location-based licensing of the radio spectrum can significantly help the MNOs in utilizing the 5G radio spectrum in the suitable local regions. The UK, in this regard, has become the first country in location-based spectrum licensing. The Ofcom has become the leader by releasing the location-based licensing of 5G compatible bands \cite{ofcom_licence}. This new way of spectrum licensing also mainly opens the possibilities for location wise re-licensing of the radio spectrum which is allocated to the MNOs but it is not being utilized in the locations. The nature of 5G-compatible radio, e.g., millimeter-wave (mmWave) signal propagation, and small-sized cells suit the adoption of such location-based licenses due to their shorter coverage distance from a base station. The offering of location-based spectrum licensing will also open opportunities for small drivers (businesses, organizations, enterprises, industries, etc) to set up their own customized local wireless network at a cheaper cost with higher reliability and security provisions. The extended application scenarios of this arrangement may include private wireless networks for machine-to-machine communications in industrial, agricultural, others for various useful services. Moreover, the deployment of setup for wireless broadband connectivity in rural areas using fixed wireless access (FWA) may also benefit from it. The framework of four prime 5G bands for location-based shared licensing released by Ofcom UK \cite{Ofcom_location_licensing_2019} are shown in Fig. \ref{fig_spectrum_uk}, i.e., 1.8GHz, 2.3GHz, 3.8 - 4.2 GHz, and 26GHz. The configuration of existing users in the corresponding bands are also indicated. The provision of a new regulatory framework for new users to access the spectrum is provided under \emph{Mobile Trading Regulations} \cite{Ofcom_location_licensing_2011_ammeded}. The radio spectrum landscape indicating the new users with individual per-location licences, fixed links licences, concurrent spectrum access (CSA) licences, and former CSA licences are also indicated in the Fig. \ref{fig_spectrum_uk}. The scenarios for Ofcom and operator model prediction using UK's geo coverage model and requirements are illustrated in Fig. \ref{scenarios_ofcome_flow_UK}. The compliance threshold for Ofcom model is 88\% and 92\% for the scenario of operator-model predicting above Ofcome-model and Ofcome-model predicting above operator-model, respectively. The summary of prices of channels of different sizes in the UK by Ofcom \cite{Ofcom_location_licensing_2019} is provided in Table \ref{table_channel_price_UK}. The average size of channel is considered as 40 MHz, where the cost for channel sizes higher and lower than 40 MHz are decided in proportionate to that. Complete details of tariffs by Ofcom for the year 2019/2020 can be found in \cite{Ofcom_Tarrif_2019_20}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Scenarios_UK_flow.jpg} \caption{Scenarios for Ofcom and operator model prediction using UK's geo coverage model and requirements \cite{ofcom_licence,Ofcom_location_licensing_2019}.} \label{scenarios_ofcome_flow_UK} \end{figure} \begin{table}[t] \centering \caption{Channel size and price in the UK \cite{Ofcom_location_licensing_2019}} \begin{tabular}{|c|c|} \hline \multicolumn{1}{|p{10.43em}|}{\textbf{Channel size (MHz)}} & \multicolumn{1}{p{10.43em}|}{\textbf{Price per channel ( \textsterling)}} \bigstrut\\ \hline\hline 2$\times$3.3 & 80 \bigstrut\\ \hline 10 & 80 \bigstrut\\ \hline 20 & 160 \bigstrut\\ \hline 30 & 240 \bigstrut\\ \hline 40 & 320 \bigstrut\\ \hline 50 & 400 \bigstrut\\ \hline 60 & 480 \bigstrut\\ \hline 80 & 640 \bigstrut\\ \hline 100 & 800 \bigstrut\\ \hline \end{tabular}% \label{table_channel_price_UK}% \end{table}% \begin{table}[t] \centering \caption{Typical infrastructure capability for different network architecture site types} \begin{tabular}{|p{5.215em}|p{3.115em}|p{3.315em}|p{3.115em}|p{3.85em}|p{2.7em}|} \hline \textbf{Site Deployment Option:} & \textbf{Macro Cell} & \textbf{Microcell} & \textbf{Picocell} & \textbf{Femtocell} & \textbf{Small Cell} \bigstrut\\ \hline\hline \textbf{Greenfield} & \cmark & \xmark & \xmark & \xmark & \xmark \bigstrut\\ \hline \textbf{Rooftop} & \cmark & \cmark & \xmark & \xmark & \xmark \bigstrut\\ \hline \textbf{Streetworks} & \xmark & \cmark & \cmark & \xmark & \cmark \bigstrut\\ \hline \textbf{Indoor} & \xmark & \xmark & \cmark & \cmark & \cmark \bigstrut\\ \hline \end{tabular}% \label{table_cell_types}% \end{table}% \begin{table}[t] \centering \caption{Typical CapEx requirement to upgrade existing macro-cells with 5G capabilities. The sharing and non-sharing based costs comparison is presented. The cost heads shared between two MNOs are shaded in Gray color.} \begin{tabular}{|p{10em}|r|r|r|} \hline \multirow{2}[2]{*}{\textbf{Macro Item costs}} & \multicolumn{1}{c|}{\textbf{Not Shared}} & \multicolumn{2}{p{9em}|}{\textbf{Cost shared between two MNOs}} \bigstrut[b]\\ \cline{2-4} \multicolumn{1}{|c|}{} & \multicolumn{1}{p{5em}|}{\textbf{Urban/Rural Sites (Rooftop/ greenfield) (\textsterling)}} & \multicolumn{1}{p{4.3em}|}{\textbf{MNO 1 (\textsterling)}} & \multicolumn{1}{p{4.3em}|}{\textbf{MNO 2 (\textsterling)}} \bigstrut[t] \\ \hline\hline \rowcolor[rgb]{ .851, .851, .851} Survey and Design & \cellcolor[rgb]{ 1, 1, 1}1,700.00 & 850.00 & 850.00 \bigstrut[b]\\ \hline \rowcolor[rgb]{ .851, .851, .851} Site Acquisition and planning & \cellcolor[rgb]{ 1, 1, 1}4,000.00 & 2,000.00 & 2,000.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} Civils works - Urban (mainly RT) & \cellcolor[rgb]{ 1, 1, 1}60,000.00 & 30,000.00 & 30,000.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} PSU & \cellcolor[rgb]{ 1, 1, 1}2,400.00 & 1,200.00 & 1,200.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} HVAC & \cellcolor[rgb]{ 1, 1, 1}6,600.00 & 3,300.00 & 3,300.00 \bigstrut\\ \hline Rigging & 6,000.00 & 6,000.00 & 6,000.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} Antenna's (x6) & \cellcolor[rgb]{ 1, 1, 1}6,000.00 & 3,000.00 & 3,000.00 \bigstrut\\ \hline Antenna MIMO X3 (Based on \textsterling15k per 64x mMIMO) & 45,000.00 & 45,000.00 & 45,000.00 \bigstrut\\ \hline Radio Hardware & 5,000 & 5,000.00 & 5,000.00 \bigstrut\\ \hline DICI & 4,000.00 & 4,000.00 & 4,000.00 \bigstrut\\ \hline Transfer to Operations & 1,000.00 & 1,000.00 & 1,000.00 \bigstrut\\ \hline Project Management & 4,000.00 & 4,000.00 & 4,000.00 \bigstrut\\ \hline \textbf{Total without mMIMO} & \textbf{100,700.00} & \textbf{60,350.00 } & \textbf{60,350.00 } \bigstrut\\ \hline \textbf{Total With mMIMO} & \textbf{145,700.00} & \textbf{105,350.00 } & \textbf{105,350.00 } \bigstrut\\ \hline \textbf{Total without mMimo - including Risk and Margin} & \textbf{120,840.00} & \textbf{72,420.00 } & \textbf{72,420.00 } \bigstrut\\ \hline \end{tabular}% \label{table_macrocell_items}% \end{table}% \subsection{Market Interests and Cost Analysis} The overall 5G rollout cost in the UK is estimated as \textsterling 30bn - \textsterling 50bn, while the UK mobile operator annual CapEx is estimated as \textsterling 2.5bn. Such a high cost of the rollout in the UK is highly unlikely to be solely supported by the MNOs. This section discusses the economic constraints related with to rollout of 5G and B5G network in the UK. Moreover, the consumer market saturated and flat revenue prospects are also discussed. There will be 518,345 sites required to be deployed in the UK \cite{NIC_report_2016}. These sites are classified as:(i) 7,616 sites for dense urban areas, (ii) 186,732 sites for urban areas, (iii) 309,014 sites for sub-urban areas, and (iv) 15,000 sites for rural areas. Typical infrastructure capability for different site deployment options and cell types are indicated in Table \ref{table_cell_types}. The following subsections thoroughly discuss the CapEx and OpEx associated with new standalone and shared-infrastructure based macro-cell and small-cells. \paragraph{Macro-cells} Out of the total number of required sites, about 40,000 existing cell sites can be reused for macro-cells. The CapEx requirements to upgrade the existing macro-cells with 5G capability, without sharing the costs, for urban and rural areas are indicated in Table \ref{table_macrocell_items}. Moreover, for the case of shared costs between different MNOs, the CapEx required for upgrading the existing macro-cells with 5G capabilities are also indicated in Table \ref{table_macrocell_items}. From different heads of CapEx, a few can be identified as shareable among multiple MNOs. In this context, the equal cost sharing map between two different MNOs (i.e., MNO1 and MNO2) is shown in the table with the rows representing the shared-cost heads shaded in Grey color. These items for macro-cells include, survey and design, site acquisition and planning, civil works, PSU, HVAC, and antennas. Moreover, the cost of non-shareable heads is also indicated. The sharing of costs between two MNOs can reduce the cost from \textsterling 100,700.00 to \textsterling 60,350.00 and \textsterling 145,700.00 to \textsterling 105,350.00 for the cases of without and with mMIMO capability, respectively. Moreover, by including the risk and margin costs, the cost of without mMIMO capability scenario can be reduced from \textsterling 120,840.00 to \textsterling 72,420.00 through sharing the potential head costs equally between two MNOs. \begin{table*}[t] \centering \caption{Generic CapEx requirements for different deployment options for small-cells} \begin{tabular}{|c|c|c|c|c|p{5em}|} \hline \multicolumn{1}{|c|}{\multirow{2}[3]{*}{\textbf{Small-Cell items}}} & \multicolumn{2}{c|}{\textbf{Single Operator}} & \multicolumn{2}{c|}{\textbf{Shared between two operators}} & \multirow{2}[3]{*}{Sharing (\%)} \bigstrut \\ \cline{2-5} & \multicolumn{1}{p{7em}|}{\textbf{Deploying new pole. Cost (\textsterling)}} & \multicolumn{1}{p{7.5em}|}{\textbf{Using existing street furniture. Cost (\textsterling)}} & \multicolumn{1}{p{7.5em}|}{\textbf{Deploying new pole. Cost for each operator (\textsterling)}} & \multicolumn{1}{p{9.5em}|}{\textbf{Using existing street furniture. Cost for each operator (\textsterling)}} & \multicolumn{1}{c|}{} \bigstrut[t]\\ \hline\hline \multicolumn{1}{|p{15em}|}{Design development of street-side pole (new)} & \multicolumn{1}{c|}{5000} & 0 & 2500 & 0 & \multicolumn{1}{c|}{50\%} \bigstrut[b]\\ \hline \multicolumn{1}{|p{13.645em}|}{Design \& Engineering (existing)} & \multicolumn{1}{c|}{2000} & 2000 & 1200 & 1200 & \multicolumn{1}{c|}{60\%} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{Civil Work} & \multicolumn{1}{c|}{1000} & 1000 & 800 & 800 & \multicolumn{1}{c|}{80\%} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{Power} & \multicolumn{1}{c|}{1000} & 1000 & 500 & 500 & \multicolumn{1}{c|}{50\%} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{New Fibre (could be reduced if fibre already present)} & \multicolumn{1}{c|}{2660} & 2660 & 1330 & 1330 & \multicolumn{1}{c|}{50\%} \bigstrut\\ \hline \multicolumn{1}{|l|}{\multirow{2}[4]{*}{RF equipment ( non-shared)}} & \multicolumn{1}{c|}{\multirow{2}[4]{*}{7500}} & \multirow{2}[4]{*}{7500} & 7500 & 7500 & \multicolumn{1}{r|}{} \bigstrut\\ \cline{4-6} \multicolumn{1}{|l|}{} & \multicolumn{1}{c|}{} & & \multicolumn{1}{p{7.5em}|}{(4500, if dual band transceiver is used of \textsterling 9000)} & \multicolumn{1}{p{7.5em}|}{(4500, if dual band transceiver is used of \textsterling9000)} & \multicolumn{1}{r|}{} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{\textbf{Total:}} & \multicolumn{1}{c|}{\textbf{19,160}} & \textbf{14,160} & \textbf{13,830} & \textbf{11,330} & Single band antenna \bigstrut[t]\\ \hline \multicolumn{3}{|c|}{\multirow{2}[2]{*}{}} & \multicolumn{1}{p{7.5em}|}{Exiting pole + antenna sharing - 9000)} & \multicolumn{1}{p{7.5em}|}{Exiting pole + antenna sharing - 9000)} & \multicolumn{1}{r|}{} \bigstrut[b]\\ \cline{4-6} \multicolumn{3}{|c|}{} & \textbf{10,830} & \textbf{8,330} & With dual band antenna \bigstrut[t]\\ \hline \end{tabular}% \label{table_Capex_smallcell}% \end{table*}% \paragraph{Small-cells} The CapEx requirements for small-cells deployment with and without sharing options are presented in Table \ref{table_Capex_smallcell}. For the case of the sole operator, the costs of deploying a small-cell with a new pole compared to the cost for utilizing the existing street-furniture are presented. Moreover, for the case of sharing the small-cell poles between two operators, the cost comparison for new pole and street-furniture based deployment cases is also presented. For all four cases, the costs of design development of street-side pole, design and engineering aspects, civil work, power, new fibers, and RF-equipment items are discussed. Moreover, the anticipated sharing percentage of different items are also indicated. For the case of sole operator BSs (no active sharing), the CapEx requirements for 5G small-cell deployment is calculated to be \textsterling 19,160 and \textsterling 14,160 for the cases of new-pole and street-furniture utilization based implementations, respectively. For the model of cost-sharing between two operators, the CapEx requirements for 5G small-cell deployment is calculated to be \textsterling 13,830 and \textsterling 11,330 for the case of new-pole and street-furniture utilization based deployments, respectively. The costs are for single-band antenna BSs, whereas, the dual-band antenna based BSs deployment costs are also indicated. To achieve the cost reduction offered by these models, the assessment of characteristics of available street furniture and public infrastructure in the UK for their capacity to hold extra weight, requisite height compliance, wind sustainability, neighborhood infrastructure availability, and suitability in terms of OpEx is essential. In Table \ref{table_small_cell_charac}, the target range for small-cell deployment compared to the available range of the public infrastructure in the UK in terms of discussed critical parameters are presented. \begin{table}[t] \centering \caption{Characteristics of public infrastructure in the UK related to small cell deployment} \begin{tabular}{|p{10em}|p{5em}|p{9.0em}|} \hline \textbf{Parameter to consider} & \textbf{Target } & \textbf{Available range} \bigstrut\\ \hline\hline Height & 4 meter & 6 - 10m \bigstrut\\ \hline Weight bearing capacity & 7.5kg & 5 - 15kg \bigstrut\\ \hline Wind sustainability & 20km/h & 22km/h for continuous 10 minutes \bigstrut\\ \hline Neighbourhood (infrastructure distance) & 50 - 80m & 40 - 100m \bigstrut\\ \hline Opex & unknown & \textsterling 700 - 800 per pole per year \bigstrut\\ \hline \end{tabular}% \label{table_small_cell_charac} \end{table}% \subsection{Revenue and Data Flow Model} A shift in the attitude of the mobile service providers from transaction to relationship, marketing push to consumer pull, customer acquisition to customer retention, average revenue per user to average profit per user, intelligence in platform to intelligence in user equipment, investment infrastructure to leveraging key assets, and technology to content/data is presumed to arise. The drive for revenue generation from 5G technologies can be achieved by devising separate short- and long-term strategies. In the short-term, the existing practices can be potentially evolved to offer the necessary infrastructure for attractive 5G business models; e.g., Neutral Hosting for small-cell sites, etc. To this end, the active and passive infrastructure sharing may be vital to facilitate the initial rollout. There is also a need to thoroughly study the available avenues for further reducing both capital expenditures (CapEx) and operational expenditures (OpEx). However, with the advent of 5G features, the existing backbone revenue-generating services (e.g., voice and text messaging) may not stay as an attractive proposition for long. In the long-term, big data analytics and innovative new services based entirely new platforms for value extraction may be strongly be required to build prevailing business models. The notable items for consideration under the CapEx head can be listed as RF design and planning, site engineering, cabinet/antenna, baseband radios, installation and swap, project management, software (SW) license, cell-site gateway, antennas, site acquisition, power, backhaul, network implementation, and system integration. The primary items under OpEx head can be arranged as site rentals, power supply, backhaul, annual fees (SW etc.), network optimizations, central operations, hardware (HW) maintenance, SW Maintenance, and support setup. To attain the optimized CapEx and OpEx for the 5G network rollout, the following multi-step way forward is suggested, \begin{itemize} \item Split the intended coverage area into small cells -- although the appropriate coverage can be attained with macro cell infrastructure. \item Use street furniture as possible infrastructure for small cells as the first option, followed by public and private buildings or rooftops and then telegraph poles if available. \item If possible, share antennas of the neighbouring spectrum at the same small cell site. \item Share fibre, power and other maintenance CapEx and OpEx. \end{itemize} There exist various strong synergies between infrastructure designs, business models, and revenue generation methods. Fig. \ref{fig_s4_revenue_flow} shows the primary landscape of revenue flow; where the consumer, network connectivity, and service providers act as the central elements of the ecosystem. The new market entrant are highlighted in gray color. The notable stakeholders and revenue-flow aspect are indicated in Table \ref{table_business_stakeholders}. The landscape of business is inscribed as infrastructure provider, connectivity provider, connectivity dependent services provider, and service consumers with mobility and connectivity. Examples of essential stakeholders, along with the crucial new entrants, are also quoted. There exist a substantial potential for the local authorities to become stakeholders in the business model by offering the public infrastructure as utilizable in the telecommunication setup deployments. The business model may adapt direct revenue sharing or utility-based incentives for inducing the local authorities into the future telecom ecosystem. The understanding of the potential benefits that the infrastructure sharing agreements can bring to the local authorities is also of critical importance for achieving long-term sustainability. \begin{figure}[t] \centering \includegraphics[width=0.84\columnwidth]{Reve_flow.jpg} \caption{A simplified new revenue flow landscape with consumer, connectivity and service provider 5G will promote}\label{fig_s4_revenue_flow} \end{figure} The proposed system model for data and revenue flow between different stakeholders is illustrated in Fig. \ref{fig_schematic_model}. A \emph{unified data special hub} may have two-way information and context flow with connection providers, advertisers, and companies with social research interests. The data-sharing may be protected with privacy and security suits. A controlled interface of applications developers to the data hub is critical in facilitating the development of advanced applications and indirect revenue flow, while also protecting the sanctity of the data. The application developers also require a two-way direct and in-direct revenue flow model with the partnership for gain share and data owners/generators, respectively. The partnership for gain share may be implemented as block-chain dependant facilitated through the direct revenue flow with application developers. The modeling and designing of the information-sharing platform between connection providers and data owners is another necessity to sanction the essential availability of data to the \emph{unified data social hub}. Information flow from advertisers to the data hub can run through corporate (Microsoft etc.) banners/advertisements while modeling a direct revenue flow mechanism between the two is also crucial. The companies with social research interest along with information sharing also need a revenue flow model to benefit from and to the unified data social hub. The proposed data economy-oriented business model indicates the potential commodification of data and data transactions along with low-cost physical infrastructure and spectrum. It can be foreseen that the 5G network will introduce significant disruption within the Telco business ecosystem. Although there are large investment saving, we also understand, and considerations need to be made that not owning the physical infrastructure by telecom service providers there are potential legal complexities to acquire the positions and installations of the equipment on these proposed locations. This is due to heterogeneous public or private ownership of these infrastructures, and it is challenging to make a standard legal framework and financial model to acquire these resources. However, if we make a cost-benefit analysis, this is still a viable route for success without making this 5G infrastructure building a huge question for public-private investors. \begin{table}[t] \centering \caption{The new-look; stakeholders and revenue-flow.} \begin{tabular}{|p{6.5em}|p{9em}|p{9em}|} \hline \textbf{Nature of business} & \textbf{ Stakeholder} & \cellcolor[rgb]{ .949, .949, .949}\textbf{New Entrant } \bigstrut\\ \hline \textbf{Infrastructure provider} & TowerCo (4 in the UK, one of them dominates the market) & \cellcolor[rgb]{ .949, .949, .949}Local Authority (LA) as neutral host with public infrastructure offer to MNO \bigstrut\\ \hline \textbf{Connectivity provider} & MNOs (4 in the UK) & \cellcolor[rgb]{ .949, .949, .949} Private network, community networks, micro operator with cheap infrastructure and spectrum \bigstrut\\ \hline \textbf{Connectivity dependent service provider} & Social networks (Facebook, Google, Uber etc) & \cellcolor[rgb]{ .949, .949, .949} Federated private networks/ SME's providing data as a services decision as a service. \bigstrut\\ \hline \textbf{Service consumer with Mobility and Connectivity} & User & \cellcolor[rgb]{ .949, .949, .949}Independent user/ SME's consuming data as a services decision as a service. \bigstrut\\ \hline \end{tabular}% \label{table_business_stakeholders} \end{table}% \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{Proposed_Model.jpg} \caption{Proposed System Model for Data and Revenue Flow.} \label{fig_schematic_model} \end{figure} \subsection{Future Recommendations} In the following, we provide some recommendations towards accelerating the 5G deployment process and reducing its cost. \begin{enumerate} \item The local authority-owned street furniture and other associated public infrastructure assets form the strongest possible set of candidate infrastructure assets for 5G deployment. This provides Local Authorities with potential opportunities for creating new direct or indirect streams of revenue generation. \item Considering the currently available radio technology and existing roadside infrastructure, it is possible to continue with the current models of active and passive infrastructure sharing. \item Neutral Hosting may potentially disrupt the current models of TowerCo business oligopoly. \item Data as a service and decision as a service is to be one of the prime revenue generating services to corporate and retail consumers for the 5G's success. \item MNOs are required to adopt a harmonised co-existence with micro-operators, community network, and other private networks. \item The success of federated private networks will introduce the potential of distributed web, a way forward to redefine the internet. \end{enumerate} \section{Conclusion}\label{Sec_4} A thorough analysis of the potential long- and short-term transformative impacts anticipated from the 5G rollout has been conducted in this paper. The huge anticipated cost of 5G deployment is one of the major barriers in fully receiving the benefits from the innovative 5G communication technologies. Moreover, the lack of confidence of the MNOs on the revenue generation opportunities and existing business models is a primary determinant restraining them from investing the requisite deployment cost. To this end, the sharing of network infrastructure, public infrastructure, radio spectrum, and data are recommended as potential measures to reduce the deployment, operational, and maintenance costs as well as to develop a marketable 5G business model. The local authorities can potentially avail this opportunity to become direct or indirect partners in the telecommunication business model by offering the provisions of sharing the public infrastructure (street furniture, public buildings, etc.) for 5G deployment. A data sharing based value generation model as a long-term 5G business solution has also been proposed in this manuscript. The barriers in the sharing of data have been highlighted. Moreover, the concerns associated with data privacy and security, along with their potential solutions, have also been studied. Based on the proposed resolutions, a 5G testbed environment-based case study for a typical UK city has been conducted. It has been concluded that public infrastructure sharing can potentially contribute to a reduction of 40-60\% in the deployment cost compared to the anticipated cost. In addition, the location-based shared spectrum licensing and proposed data value generation based long-term sustainable business model have been shown to help in further reducing the CapEx and OpEx significantly. Based on the conducted case study and analysis, a list of recommendations is proposed to reduce the 5G deployment cost and encourage the business. \bibliographystyle{IEEEtran} \section{Introduction} The rollout of 5\textsuperscript{th} generation (5G) of communication networks has commenced with Release-15 of 3\textsuperscript{rd} Generation Partnership Project (3GPP) \cite{3GPPrel15}. This release of 5G new radio (5G NR) has extended the provisions for both standalone and non-standalone operations. Based on the ongoing field trials and non-commercial (test) deployment based investigations, the standardization of 5G is expected to mature with Release-16 of 3GPP by the year 2020. The 5G networks are expected to bring a transformative impact in the role that mobile communication technologies play in the society \cite{obiodu20175g}. The 5G has taken a huge leap forward in the offered services, which are introduced through the advent of various new innovative technologies. The notable target 5G services can be named as enhanced mobile broadband (eMBB), ultra-reliable low latency communications (URLLCs), massive machine-type communications (mMTCs), and Tactile Internet (TI) \cite{7414384,shafi20175g,Simsek2016tactile}. To solely benefit from the services offered by 5G technologies, the substantiation of 5G affordability and business case is a vital necessity. \subsection{Motivation for 5G Business Case} Despite the revolutionary technologies and innovative services being offered by 5G networks, the difficulties associated with their deployment along with other technological shortcomings have already started to appear in the literature, see e.g., \cite{schneir2019business,wisely2018capacity,8412482,chianiopen}. The registered critical limitations and challenges for 5G networks can be summarized as: i) the enormous deployment cost, ii) the explosion of connected devices caused by the advent of mMTCs may very rapidly lead towards reaching the network capacity limit, iii) the rate and volume of the data generated in hyper massively connected 5G networks may need new data analytic innovations, and iv) the privacy and security provisions in massively connected networks -- to name a few. The telecommunication engineers, industries, and researchers from around the globe have also already initiated the speculative propositions for network requirements and candidate technologies for beyond 5G (B5G) networks, see e.g., \cite{QML_6G_Junaid,Saad_6G_2019,Tariq6G_2019,8760275,8782879}. With a drastic increase in mobile internet users, the subscribers are likely to reach 5.0bn over the next 15 years \cite{Report_MobileEconomy2019}. Moreover, the sole mobile subscribers are expected to rise to 5.8bn between the years 2018 to 2025. A contribution of \$ 2.2 trillion from 5G technologies to the global economy in the next 15 years is projected \cite{Report_MobileEconomy2019}. To facilitate this generation shift, a capital expenditure (CapEx) of \$ 480bn is anticipated from the MNOs between the years 2018 and 2020. Moreover, with most of the 5G services happening after 2020, the CapEx will significantly exceed the CapEx anticipated by 2020. Admittedly, a huge investment for the network infrastructure deployment is a prerequisite to fully reap the benefits offered by the 5G networks. This necessitates the development of a comprehensive business model for 5G rollout to convince the investors, mobile operators, and other stake-holders to invest the requisite revenue. To this end, very recently, only a few articles discussing the 5G rollout cost, business cases, and other associated implications have appeared in the literature. Nevertheless, there is a strong need to thoroughly research the 5G rollout implications and to develop the sustainable business models addressing the complete scope of all 5G services (e.g., eMBB, mMTC, TI, etc) and all network scenarios (e.g., urban, rural, etc). \subsection{Potential Solutions for 5G Affordability} The affordability of delivering the eMBB services offered by 5G is regarded as a vital issue by International Telecommunication Union (ITU) broadband commission \cite{8300495}. The potential domains that can be explored to meet the challenge of making the ultra-fast mobile broadband as affordable to further enable the smooth provision of different societal and other interesting services can be identified as: i) infrastructure sharing, ii) Neutral hosting, iii) unlicensed spectrum utilization, iv) location-based spectrum licensing, v) energy-efficient networking, vi) wireless backhauling, vii) infrastructure cost reduction through softwarization and virtualization of the network functions, and viii) data sharing. Furthermore, in \cite{8516977}, a comparison of different potential technologies for the provision of network backhaul has been conducted. The fixed wireless backhaul is suggested as the most cost-effective solution for high cost fibers, while the utilization of low cost fibers has been suggested to result in direct-fiber technology as the most cost-effective solution. In \cite{oughton2019assessing}, the 5G infrastructure strategies for capacity, coverage, and cost of 5G eMBB have been discussed for the Netherlands. The analysis for both supply-driven and demand-driven investment has been conducted. Also, the potential for traffic capacity enhancement in the existing Dutch macrocell network with the integration of the new 5G spectrum (only) has been studied. It has been determined that the average per-user capacity enhancement of 40\%, as compared to the existing 4\textsuperscript{th} generation (4G) networks, can be achieved by solely integrating the new 5G spectrum (i.e., without deploying the small-cells). The further improvement required beyond this determined threshold will necessitate the densification of the network with small-cells. The development of a framework to study the affordability of all 5G services, beyond eMBB, is a vital need at the current context. Moreover, the establishment of worldwide prospective on the affordability of 5G rollout is another important open challenge. \subsection{5G Rollout in the United Kingdom} In this section, we discuss about various aspects of 5G rollout in the United Kingdom (UK) including the recent developments. The ambitions of the UK government to be a global leader in 5G communication network technology needs the resolution of barriers and challenges in the commercial deployment of 5G. In this direction, the article \cite{jones2019commentary} provided a review of critical problems related to the market factors for 5G rollout in the UK. In \cite{yaghoubi2019techno}, a framework for the techno-economic market analysis of network backhaul has been proposed. The proposed framework can be used to study the total cost of ownership (TCO) of a network backhaul and business feasibility of the 5G network deployment aspects. The module takes the consideration of both the network CapEx and OpEx. A case study has also been conducted to demonstrate the usability of the proposed framework. A thorough analysis of techno-economic aspects of deploying eMBB in a typical dense urban area, realized by a 1km$^2$ grid of central London in the UK, has been conducted in \cite{wisely2018capacity}. Various aspects such as CapEx/OpEx, maximum user rate, and capacity have been studied for macro, micro, and hot-spot cellular network settings at 700MHz, 3.5GHz, and 24--27.5GHz operating frequencies, respectively. The headline rate of 64 to 100 Mbps, across all the coverage area, is expected to be achieved through several different technology prospects. However, the use of mmWave and 802.11ac are advised as necessary for achieving capacity in the orders of 100Gbps/km$^2$ for outdoor and indoor settings, respectively. It has been speculated that a 100-fold increased capacity and 100Mbps headline rate everywhere may be attained with an escalation of 4 to 5 times in the deployment cost as compared to that of 4G Long Term Evolution (LTE) networks. Furthermore, in \cite{schneir2019business}, a business model to study the cost and revenue flow of 5G has been proposed by conducting the case studies for three different boroughs of central London, UK. The eMBB services of 5G are considered important for the business case between the years 2020 to 2030. Some business risks that may emerge in the later years are also indicated. The network share has been highlighted as a significantly helpful aspect in improving the business case. Moreover, it is encouraged to conduct further research for different regions to obtain a nationwide understanding of the business case. In \cite{oughton2018cost}, the 5G rollout implications in UK have been discussed. The history of implications faced in the 4G rollout has been extrapolated to forecast the characteristics between the years 2020 and 2030. It has been concluded that the 5G eMBB may reach out to 90\% of Britain's population by 2027. The challenges associated with capital intensity fluctuations may affect the pace of 5G rollout to the rural areas. Some infrastructure sharing suggestions for deploying small-cells can be considered to reduce the 5G deployment cost. The Ofcom has recently initiated the location-based licensing of 5G compatible radio spectrum \cite{ofcom_licence}, which will significantly help in making 5G affordable in the UK. Moreover, authors in \cite{oughton2018cost} thoroughly discussed the policy matters and potential directions to drive the 5G rollout. Furthermore, the need for incorporating more spectrum for serving ultra-high-speed broadband to rural area users has also been suggested. In summary, the development of a comprehensive understanding of the disruptive impacts of 5G and beyond wireless networks in the UK is of vital importance in promoting a sustainable and ambitious digital economy in the long-term. \subsection{Contributions and Organization} The main contribution of this paper is the investigation of potential long- and short-term transformative and disruptive impacts of 5G rollout. Potential solutions for reducing the 5G deployment cost and developing long-term sustainable business model for 5G through network infrastructure sharing, public infrastructure sharing, radio spectrum sharing, and data sharing are proposed. A typical UK city is taken for conducting the case study in this paper. Different to the approach of extrapolating the historic prospective adopted in \cite{oughton2018cost}, our work intends to provide the prospective learnt from a 5G testbed environment. The notable contributions of this paper are highlighted as follows, \begin{itemize} \item Starting with a review of the main 5G new technologies and target services, existing open challenges in the deployment of 5G networks and the research challenges that may go beyond 5G networks are thoroughly reviewed along with the potential future enabling technologies. \item The requirements, challenges, and solutions associated with 5G rollout are thoroughly reviewed. In this regard, a comprehensive study on the potential sharing of network infrastructure, public infrastructure, radio spectrum, and generated-data for reducing the 5G deployment cost and developing a sustainable 5G business is conducted. \item Along with a discussion on the potential barriers in sharing of data in 5G and beyond networks, the state-of-the-art on data privacy and security techniques and their importance in data-sharing based business models is thoroughly reviewed. \item State-of-the-art of spectrum trading and management techniques is reviewed, and the analysis is further extended to motivate the location-based shared licensing of the radio spectrum. \item A framework for passive infrastructure sharing (e.g., public infrastructure, site sharing, mast sharing, power cabling sharing, etc) and neutral hosting is proposed to reduce the deployment cost and provide an opportunity to the local authorities to become direct or indirect partners in the 5G business model. \item A case study, based on a 5G testbed environment, is conducted for a typical city of UK. The infrastructure sharing potential in reducing the 5G deployment cost in the UK as compared to its anticipated cost is studied. Moreover, the data-sharing and location-based licensing are motivated to bring a significant further reduction in the deployment cost as well as to provide a long-term sustainable business model. \item Finally, based on the proposed case study and conducted analysis, a data economy based long-term 5G business model is proposed and a list of related recommendations is provided. \end{itemize} The rest of the paper is organized as follows. Section II provides an overview of the technologies, services, and open challenges in 5G networks and beyond while Section III presents the deployment requirements, economic constraints, and the potential solutions. Section IV presents a 5G testbed environment learnt prospective for a typical UK city along with a thorough analysis and list of recommendations. Finally, the paper is concluded in Section V. \section{5G Wireless Networks and Beyond} The 5G wireless communication networks have introduced various new revolutionary technologies along with the evolution in the existing networks. The 5G networks are envisaged to offer various new services of new types to everything at all-time with ultra-reliable, ultra-fast, and ultra-low-latency communication links. The standardization of 5G networks as the standalone and non-standalone operating network has appeared with Release 15 \cite{3GPPrel15} of 3GPP named as 5G New Radio (NR). This initial standardization effort is expected to mature with the Release 16 of 3GPP by the year 2020. The test and commercial deployment of 5G NR has now started in some cities of the world. This section provides an overview of the key 5G technologies and services. The challenges associated with the deployment of 5G networks and various other open research challenges (that may go beyond 5G (B5G) networks) are highlighted in this section. \subsection{5G Target Services} This section provides an overview of the prime 5G target services, i.e., eMBB, mMTC, and URLLC. Moreover, their enabling technologies and application scenarios are also briefly discussed. \paragraph{Enhanced Mobile Broadband (eMBB)} The enhanced mobile broadband (eMBB) in 5G networks targets to provide an increase of $1000\times$ and $10\times$ in aggregate and individual-link throughput \cite{AndrewsJSAC5G}, respectively, compared to the 4G wireless networks. The downlink and uplink data rate targets of 5G networks are up to 20Gbps and 10Gbps, respectively. This high data rate is envisioned to support high throughput demanding services, e.g., tactile internet (TI), augmented reality and HD video streaming. TI is a new 5G service that aims at providing a real-time interface for humans and machines interaction \cite{Simsek2016tactile}. The interface may support real-time audiovisual and haptic inputs based controlling of machines, e.g., remote humanly controlled robots for industrial and other operations, etc \cite{8452975}. The notable new technologies enabling such high throughput in 5G networks can be named as massive multiple-input multiple-output (mMIMO) and mmWave band. \paragraph{Ultra Reliable Low Latency Communications (URLLC)} The 5G wireless networks target at achieving packet error rate and end-to-end latancy of $\leq 10^5$ and ~1ms, respectively. Such ultra reliable low latency communications (URLLC) will help in realizing the dreams of various new types of network services, e.g., auto-driving cars, remote health services (ambulance aid, robotic surgeries etc), logistics automation, to name a few \cite{8467353,IMTvision,8403963}. The critical technology innovations enabling URLLC in 5G networks are network slicing (NS), network softwarization, network function virtualization (NFV), and mobile edge computing (MEC). \paragraph{Massive Machine Type Communications (mMTC)} The target of mMTC in 5G networks is the provision of internet access to a massive number of low data-rate and low power devices, e.g., the requisite connectivity to IoT devices. The communication in such typical applications is usually only occasionally required, e.g., in remote environmental sensing and utility metering applications, etc. The key technology enablers for mMTC in 5G networks providing minimal operational cost, grant-free, and time alignment-free connectivity to a massive number of devices can be listed as non-orthogonal multiple access (NOMA), end-to-end (E2E) network slicing (NS), collaborative edge and cloud computing framework, and network function virtualization (NFV) \cite{Bockelmann2018mmtc,Sharmaedgecloudedge}. \subsection{5G New Radio Technologies} 5G NR is a new radio interface released by 3GPP to satisfy the growing needs of radio access in future wireless networks. The 5G-NR provides a number of significant new technologies and advantages compared to the 4G networks. In the following, we highlight the key features of different evolved and new revolutionary technologies in the 5G NR. \paragraph{mmWave} The scarcity of conventional microwave band has led to the exploration of mmWave realm. The multi-gigahertz bandwidth available in mmWave range has a strong potential in addressing the capacity demands of 5G and beyond wireless networks. The initial standardization of mmWave technology for short-range communications initially appeared in IEEE 802.11ad \cite{6736746}. The Release 15 of 3GPP has specified 24.25GHz -- 52.6GHz band associated with the band numbers from 257 to 511 as one of the major 5G frequency ranges \cite{sanfilippo2018concise}. The propagation behavior of mmWave spectrum in terms of high pathloss and the dominant phenomenon of specular reflections (instead of scattering, as in microwave band) has confined its applications to short-range and line-of-sight (LoS) communications \cite{8594703}. Establishing a better understanding of propagation behavior of mmWave and beyond bands (e.g., sub-teraHz and teraHz bands) may lead to the availability of more usable bandwidth for B5G networks in the future. \paragraph{Massive-MIMO} Massive multiple-input multiple-output (mMIMO) \cite{6736761} is defined by a large-scale multi-antenna system in which massive amount of antennas are employed at the base station (BS), i.e., significantly larger than the users being served. The use of large-scale multiple antennas allows the aggressive manipulation of angular/spatial domain. The manipulation of angular domain parameters helps in countering the time and/or frequency selective behaviour of the propagation channels \cite{5462882,mansoor2017massive}. This additional degree-of-freedom (DoF) offered by mMIMO systems can be exploited for diversity, multiplexing, and/or beamforming gains. The 5G NR with mMIMO can exploit 3D beamforming with up to 256 antenna elements at the BS to increase the coverage and capacity of the network \cite{dahlman20185g}. \paragraph{NOMA} The provision of wireless medium's access to multiple users was conventionally achieved through the allocation of (sliced) distinct channel resources (time, frequency, or code, etc.) among the users and spatial re-utilization of the resources. The massive growth in the number of network users and the limited availability of usable frequency spectrum has led towards the evolution of multiple-access methods from orthogonal to non-orthogonal resource allocation based methods. The NOMA scheme allocates non-orthogonal channel resources to the users while exploiting an additional dimension/domain of power. Signal processing methods for channel estimation and interference suppression are the prime operations required in NOMA transceivers. Practically, the hybrid of conventional orthogonal multiple access schemes (e.g., CDMA, SDMA, etc.) and power domain multiple access is also referred to as hybrid NOMA. The chipset hardware support for the user side to perform successive interference cancellation (SIC) is also released \cite{8357810}. Along with many other new technologies, NOMA is also one of the technology revolutions being introduced for the first time in 5G \cite{7263349}. The spectrum efficiency and grant-free access provision advantages offered by NOMA makes it one of the core mMTC enablers in 5G wireless networks. \paragraph{Full-Duplex} Full-duplex is a key 5G technology, which theoretically has the potential of doubling the channel capacity through the concurrent transmission and reception of information in a single channel resource. The performance of full-duplex method relies on the performance of self-interference-cancellation methods, which may practically be performed through active analog/digital cancellation or passive cancellation methods \cite{8396262}. \paragraph{Small-Cells} The ultra-dense network (UDN) planning enables the deployment of multiple small cells within the coverage region of a macro-cell \cite{8516948}. These low-power short-elevation BSs based small cells employ a more aggressive spatial reuse of the resources and efficient users to BS association based on promising propagation channel conditions. The ultra-dense deployment of small cells is a crucial enabler for eMBB in 5G networks \cite{7422408}. \paragraph{Network Slicing, Network Softwarization, and Mobile Edge Computing} The new novel concepts of network slicing (NS) and NFV constitute an important part of the list of revolutionary technologies of 5G. In NFV, various network service features are designed as implemented in software that runs on off-the-shelf hardware \cite{7994617}. The examples of these service feature include caching, network address translation, and domain name services. The NS allows the operations on an infrastructure shared among multiple network slices to create an end-to-end (E2E) true virtual network \cite{8320765}. Mobile Edge Computing (MEC) is another exciting technology which offloads the network traffic by serving the users demands directly from the network edge, e.g., this can be achieved through caching of the popular (users specific) contents on the network edge (e.g., BS, access points, etc) \cite{Abbas2018mec}. These technologies hold the key role in achieving URLLC in 5G networks. \subsection{5G and Beyond Open Challenges} Despite that 5G networks have introduced various revolutionary technologies and promising services; the huge cost of deployment associated to 5G networks and further growing demands of rigorous network performance requirements necessitate the initiation of dedicated efforts to indicate and resolve the challenges. This section highlights the challenges in the deployment of 5G and some open research challenges and technologies for B5G wireless networks. \paragraph{Energy Efficiency} The energy efficiency of communication networks has a direct relationship with the operational, environmental, and economic factors. The 5G technology innovations, such as mMIMO and ultra-dense networks, provide a manifold increase in energy efficiency. A further improvement in network operational energy efficiency in densely connected networks of the future will only help in reducing the network operational cost but also in realizing the dream of a green world. With the advent of mMTCs and small-cells in 5G networks, a huge number of BSs, sensing nodes, and user devices will constitute the network. In this massive connectivity context, the energy-efficient design of the network devices will be a highly compelling aspect \cite{7446253}. The realization of joint energy, spectral, and spatially efficient green communication systems of the future will be in the optimization of b/s/J/m$^3$. \paragraph{Network Capacity} With the advent of mMTC in 5G networks, a massive proliferation in the number of network nodes is expected in the coming years. The densification of cells may eventually meet its practical limit, as a further decrease in cell size (towards very tiny cells) may have some unmanageable associated physical deployment constraints, deployment costs, and inter-cell interference. Further evolution and revolution in network technologies and extension in usable frequency spectrum may be required. A promising future enhancement can be seen in the idea of employing vehicular BSs, i.e., cell-free networks served through Unmanned Aerial Vehicles (UAVs). The future networks may be 3-D natured with volumetric quantification of coverage specifications and spectral efficiency \cite{QML_6G_Junaid} (i.e., b/s/Hz/m\textsuperscript{3}). \paragraph{Throughput} The throughput offerings of 5G wireless networks are expected to attract various high data rate demanding applications, e.g., virtual reality applications. Such applications and massive connectivity may result in 5G reaching its limit in a decade or so \cite{8760275}. For meeting the exceptionally high throughput demands of future networks, one venue can be the exploration of mmWave, sub-teraHz, and teraHz bands. Moreover, communication in the optical spectrum (visible light) may also attract various LoS and indoor communication applications \cite{8782879}. \paragraph{Inter-portability and Congestion in Heterogeneous Networks} The 5G networks will operate in the coexistence of its predecessors (1G to 4G). Achieving harmonization of operations across different network architectures with different conditions for real-time communication applications is another challenging issue for operations in 1G-5G hybrid heterogeneous networks. The MNOs may deploy a core 5G radio access network (RAN) infrastructure to coordinate the network heterogeneity \cite{obiodu20175g}. The application of machine Learning (ML) methods for achieving the harmonization and learning of the network state is a potential enabler \cite{QML_6G_Junaid}. The MEC technology of 5G wireless networks is expected to provide a substantial improvement in the performance of not only to 5G users/devices but also to users operating on previous generations \cite{Abbas2018mec,QML_6G_Junaid}. The intelligent caching at the network edge will help in offloading the data traffic from the network backhaul. The congestion in access networks in ultra-dense connectivity scenarios (e.g., mMTC, etc.) is another challenging issue. Grant-free access to IoT devices may help in resolving the congestion in ultra-dense access networks imposed due to the heavy burden of signaling for enabling communication of a large number of short-data-packets. \paragraph{Ethics for Big Data Analytics} The recent advances in communication network technologies, proliferation in the number of connected devices, and growing multimedia applications are leading towards a flourishing expansion in the data generation \cite{8304385}. The radio communication networks are not only the carriers but also a leading source of generation of data. Appropriate exploitation of big data analytics has a strong potential in facilitating the improvement in the performance of the communication systems as well as in maximizing the revenue generation opportunities for the stakeholders \cite{7429688}. In \cite{Sharmaedgecloudedge}, the data-aware intelligence for extracting useful information from the data and enhancing the network performance for IoT applications have been discussed. Also, a collaborative processing framework while combining the benefits of edge and cloud computing for live data anaytics in IoT networks has been proposed. Along with the benefits offered by big data analytics, there are also various critical concerns being raised regarding the ethics of the analytics \cite{7515114}. The essential factors for devising comprehensive data sharing policies need to be explored to interpret the broader context of data choice, collection circumstances, ownership rights, substantiation and usage permissions. There is a need to conduct thorough investigations to understand the implications related to data analytics technology in B5G communication networks concerning the individuals and organizational interests. \paragraph{Security and Privacy} The provision of security and privacy of data is among the most important concerns in 5G rollout. In densely connected networks, provided the provisions of data security and privacy, the enormous amount of generated data can be potentially used to enhance the network performance \cite{8428412} as well as revolutionize the existing business models. Devising a data value generation based long-term business model for 5G may help in attracting the operators to invest the requisite revenue for 5G rollout. However, ensuring a balance in the policies for necessary data sharing with high data security may emerge as a main policing challenge in the future. A thorough review on security and privacy related challenges in 5G and beyond networks is provided in the sequel. \paragraph{High Deployment cost and Lack of Business Models} The huge CapEx and operational expenditure (OpEx) requirements and lack of clear business model are among the major challenges in fully benefiting from the proposed 5G technologies. The prominent directions to reduce the deployment costs can be stated as infrastructure (passive and active) sharing, neutral hosting, and location-based spectrum licensing. The deployment cost analysis and proposals for the solutions are one of the primary focus of this papers, the details are discussed in the following dedicated sections. \section{5G Deployment Requirements, Challenges, and Solutions} This section mainly discusses the 5G deployment requirements, the economic constraints associated with the 5G rollout, and their potential solutions. The principal factors that may affect the speed of adoption of 5G and its generation of value can be listed as the cost of 5G rollout, availability of opportunities for different 5G service classes, need for a supportive policy framework, availability of 5G devices, compelling business model and value perception \cite{Report_MobileEconomy2019}. We propose that smart management and sharing of infrastructure (network and public), generated data, and radio spectrum between different users/operators are the potential directions to reduce the 5G deployment cost as well as develop long-term 5G business models. To this end, this section first thoroughly investigates the potential in sharing of network and public infrastructure for reducing the 5G rollout cost. Furthermore, the potential of smart management and sharing of the radio spectrum in reducing the 5G rollout cost is reviewed. The sharing of data to generate value as well as improve network performance requires comprehensive data privacy and security model. Therefore, security and privacy concerns and other barriers in sharing of data are also thoroughly studied in this section. \subsection{Infrastructure Requirements} Over the past few decades, the land-mobile radio cellular networks have evolved from 1G to 4G. The infrastructure for these mobile generations has been established with a massive investment. In the existing infrastructure, there may exist over several hundred thousands of wireless communication sites worldwide. The sites may include wireless setups for emergency services, broadcast services, cellular communication services, and other national communication services. The reduction in a typical cell-size has been witnessed along with the progression in generations of wireless networks. The cell coverage radius of a standard cell from 2G to 4G has evolved from approximately 10s of km to a single km. To fully harvest the benefits from 5G technologies, an extension in the spectrum and densification of the network is obliged. The inclusion of radically high mmWave radio spectrum in 5G requires beamforming and beam-management equipment at the small-cell BSs. Furthermore, the ultra-dense deployment of cells, i.e., small-cells with cell-radius of only a few meters, necessitates massive infrastructural provisions. Consequently, to meet the vast infrastructural requirements for deploying small-cells and mmWave communication facilities at the ultra-densified BSs in 5G networks, an enormous revenue investment is needed. \begin{table}[t] \centering \caption{Safe work distance recommended by ICNIRP from the typical transmit power of the respective frequency \cite{ICNIRP_guideline_distance_98}} \begin{tabular}{|c|c|c|c|} \hline \multicolumn{1}{|p{6.145em}|}{\textbf{Frequency (MHz)}} & \multicolumn{1}{p{6.73em}|}{\textbf{ICNIRP EMF Limit (V/m)}} & \multicolumn{1}{p{4.985em}|}{\textbf{EIRP (W)}} & \multicolumn{1}{p{5.715em}|}{\textbf{Distance (cm)}} \bigstrut\\ \hline\hline \textbf{800} & 39 & 100 & 140.44 \bigstrut\\ \hline \textbf{900} & 41 & 100 & 133.59 \bigstrut\\ \hline \textbf{1800} & 58 & 50 & 66.78 \bigstrut\\ \hline \textbf{2100} & 61 & 50 & 63.49 \bigstrut\\ \hline \textbf{2600} & 61 & 10 & 28.39 \bigstrut\\ \hline \textbf{3500} & 61 & 2 & 12.7 \bigstrut\\ \hline \end{tabular}% \label{tab_safe_distance}% \vspace{5pt} \centering \caption{Typical mapping of installation classes for typical small cell deployments \cite{SCF_19}} \begin{tabular}{|c|p{3.145em}|p{3.8em}|p{4.0em}|p{3.0em}|p{3em}|} \hline \multicolumn{1}{|p{3.5em}|}{\textbf{3GPP BS Class}} & \textbf{Config-uration} & \textbf{Typical Total Tx Power} & \textbf{Typical Gain} & \textbf{EIRP Range} & \textbf{Insta-llation Class} \bigstrut\\ \hline \hline \multicolumn{1}{|c|}{\multirow{2}[4]{2.3em}{Medium Range BS}} & 2 bands & 20 W & 7 - 13 dBi & 100 - 400 W & E+ \bigstrut\\ \cline{2-6} & 1 band & 10 W & 7 - 13 dBi & 50 - 200 W & E100 or E+ \bigstrut\\ \hline \multicolumn{1}{|c|}{\multirow{2}[4]{2em}{Local Area BS}} & 5 bands & 2.5 W & 2 - 5 dBi & 4 - 8 W & E10 \bigstrut\\ \cline{2-6} & 1 band & 0.5 W & 2 - 5 dBi & 0.8 - 1.6 W & E0 or E2 \bigstrut\\ \hline \multicolumn{1}{|c|}{\multirow{2}[4]{2em}{Home BS}} & 5 bands & 100 mW & 0 - 3 dBi & 0.1 - 0.2 W & E0 or E2 \bigstrut\\ \cline{2-6} & 1 band & 20 mW & 0 - 3 dBi & 0.02 - 0.04 W & E0 \bigstrut\\ \hline \end{tabular}% \label{table_small_cell_classes}% \end{table}% In the provision of true 5G services, an ultra-densification is inevitable, and meeting the challenges in providing essential infrastructural requirements needs the conduction of thorough investigations. In such an ultra-dense BSs deployment context, the conventional BSs deployment-related challenges may also get amplified. These challenges include: abidance of BSs antenna tilts and power radiation standards for health/safety, lease disputes with landlords, planning permissions and lack of suitable sites. The safe user to BSs distance can be calculated by exercising the recommendations for electric field intensity by the International Commission on Non-Ionizing Radiation Protection (ICNIRP) \cite{ICNIRP_guideline_distance_98}. For radiations at different frequency bands, Table \ref{tab_safe_distance} presents the electric field intensity (using ICNIRP recommendations), equivalent isotropically radiated power (EIRP), and safe-user-distance in volts per meter (V/m), Watts (W), and centimeter (cm), respectively. The basic deployment principle being followed by the operators is to ensure 1/10\textsuperscript{th} of the ICNIRP voltage density, for the exposure of RF for a long time (i.e., more than six minutes). Thus, considering the radiation power, the safe-user-distance in the table represents the shortest permissible distance between the transmitter and human-head. The enforcement of maximum power radiation standards and safe-user-distance assurance for health/safety may be another critical challenge in ultra-dense deployment context. The details of different classes of BSs defined by 3GPP that can be manifested as small-cells for ultra-network-densification, as provided by \cite{SCF_19}, are presented in Table \ref{table_small_cell_classes}. The typical BS bands, transmit power, gain, EIRP range, and installation classes configurations are classified into medium range, local area, and home BSs. The details provided in Table \ref{tab_safe_distance} and \ref{table_small_cell_classes} may assist in devising a comprehensive strategy for infrastructure sharing and value generation opportunities to support a swift 5G rollout. \begin{figure} \centering \includegraphics[width=\columnwidth]{typical_infrastructure.jpg} \caption{Schematic diagram of a cell site illustrating the components in the context of possible infrastructure sharing.} \label{fig_schematic_s9} \end{figure} \begin{figure*}[th] \centering \includegraphics[width=\textwidth]{Poll_config.jpg} \caption{iWS recommended solution for small cell mast \cite{iws_sol_1} and installation classes for simplified deployment of small cells.} \label{fig_poll_s8} \end{figure*} \subsection{Infrastructure Sharing Potential} Sharing of existing telecommunication and public infrastructure for small-cell deployment is an attractive solution to substantially reduce the 5G deployment cost and to encourage revenue generation opportunities for Mobile Network Operators (MNOs). The hesitance of MNOs in implementing the standalone 5G solution is understandable. Fig. \ref{fig_schematic_s9} illustrates the schematic diagram of network infrastructure by highlighting the important candidate components for possible infrastructure sharing. To this end, the solution may be in the optimization of technology and passive infrastructure along with the development of the revenue generation models for supporting the sharing of active infrastructure. To make the cost-optimization more effective and quick, devising a robust pathway is vital. In this regard, the promotion of competition among different partakers from infrastructure domain may help. Moreover, the thorough policying for sharing infrastructural services between different MNOs is another potential step. More importantly, the induction of non-MNO assets for 5G deployment into the infrastructure sharing business model will help in further stimulating the rollout. The Neutral Hosting model can be mainly signified as an effective form of infrastructure sharing. \emph{Active sharing} requires the MNOs to share elements of the active network layer. The active sharing components include RF antennas, MSC, HLR, OMC, SGSN/GGSN, core transmission ring, core network logical entities, billing platform and value-added services (VAS). Despite the cost optimization advantages associated with active sharing approach, it is becoming unpopular due to various dynamic reasons linked to network infrastructure domain. The forms of \emph{passive sharing} are site and mast sharing. The passive sharing agreements are associated with multi-tenancy within sites (physical location), power cabling, cabinet/ shelter, generator, cooling system, and mast and backhaul (fiber). The following is the potential list of sharing components. \begin{enumerate} \item Mast Sharing \item Site Sharing \item Full RAN Sharing \item Network Roaming \item Core Transmission Ring Sharing \item Shared Core Network Elements and Platforms \end{enumerate} Moreover, the public infrastructure from local governments potentially available for sharing/reuse can be listed as: \begin{enumerate} \item Streetlamps \item Road/street signs \item Rooftops \item Tall building with suitable projections surfaces –- considering proximity \item Traffic signals \item Cabinets \item CCTV installations \end{enumerate} For sharing the indicated public infrastructure, there are various other factors which may need careful consideration. The capability of street furniture (e.g., streetlamps) for bearing the extra weight required to hold antennas and other equipment needs to be assessed. Moreover, the height requirements of the street furniture to facilitate different BS installation classes to meet the safe-user-distance recommendations (as discussed in the previous subsection) also needs to be investigated. Furthermore, various other factors like weather aspects (e.g., aerodynamics etc.) are also critical in adopting a passive infrastructure sharing option. In light of these critical factors, streetlamps are recommended as the most suitable choice for passive infrastructure sharing in this work. The iWS recommended design \cite{iws_sol_1} for a typical small-cell mast is illustrated in Fig. \ref{fig_poll_s8} along with the height recommendations for different BS installation classes. This solution is for 4G cells, which can be revisited in the context of required ultra-densification in 5G networks. \subsection{Data Sharing Potential and Associated Barriers} A significant increase in the generation of data from different network services is expected in the coming years \cite{QML_6G_Junaid}. An annual growth of 55\% in data-traffic is forecasted from the year 2020 to 2030 \cite{union2015imt}, which will include a significant contribution from the subscriptions of new services introduced by 5G such as mMTC. As a result, the data generated per month is expected to reach $5.016$ ZetaBytes (ZB) by the year 2030. Appropriate exploitation of this huge amount of generated data can assist in not only improving the user experience but also in creating the new revenue generation opportunities. A balanced policy for sharing of data with different stakeholders, while also maintaining the necessary privacy and security provisions, can help in directly translating the data value into performance enhancement and revenue generation opportunities. To this end, this section highlights the barriers in data sharing and motivates the opportunities for their resolution. \paragraph{Lack of use cases} There are no explicit motivational use cases available; which is because of the data value conception being a recently emerged perspective. This data-value based core business has developed with a drastic increase in the amount of data generation arose with the growing network services. Development of explicit examples/models for facilitating successful selling and buying of valuable data in the mutual benefit of all stakeholders is necessarily required. \paragraph{Immature market} The current business strategy is not exclusively based on the data value. The immaturity of the market in this context is one of the critical barriers in the initiation of dedicated efforts for defining the required policies of data sharing. The commissioning of data sharing has a strong potential in generating new data value based business models in the long-term. \paragraph{Fragmented data landscape} The data in the current model is often not in the entangled form, which is a primary requirement to identify the data value. The lack of availability of concatenated/de-fragmented data to define a meaningful business model is a crucial barrier. \paragraph{Reluctance of data sharing} The data privacy, security of data privacy, and the absence of any comprehensive business model are among the primitive reasons causing hesitation in the sharing of data. The lack of a distinct definition of direct or indirect financial benefits associated with data sharing for core business is another leading cause. \paragraph{Skills and Competence} The lack of skill sets for the collection and processing of data into suitable compositions for enabling data sharing is another critical barrier. The shortage of available data scientists and the high cost of associated equipment are vital causes. Moreover, the absence of a unified technical-platform for data processing and serving is also a prime contributor to the barrier. \subsection{Security Challenges} The provision of security and privacy in massively connected 5G and B5G communication networks is one of the biggest challenges of the future. 5G offers new and disruptive business cases \cite{8648405}. While rolling out 5G networks in the next-generation smart cities in general and UK in particular, due to many new features of 5G networks and the fact that 5G will envelop almost all dimensions of human life, business, and government affairs with ultra-high-speed access to services, anywhere, anytime and any type, 5G security requirements have to be thoroughly researched \cite{7345407}. 5G rollout will also bring a wide range of threats and a greatly expanded attack surface \cite{8334918}. For example, 5G physical layer security at the RAN \cite{7345407} is susceptible to new types of attacks and performance bottlenecks such as eavesdropping, contaminating, spoofing, and jamming. Since 5G rollout will leverage existing telecom infrastructure and other computing and networking paradigms \cite{7345407}, 5G will be live within heterogeneous networks (HetNets) \cite{7081072}. The HetNet architecture, compared to a single-tier architecture, can potentially lead to the UEs to be more vulnerable to eavesdropping \cite{8125684} and hence privacy and location leakage may arise due to frequent handover caused by the high density of small cells in the HetNet \cite{7081072}. As a result, a new generation of security services has to be offered \cite{8125684}. Novel 5G AKA, USIM and ECC based design of handoff authentication for 5G-WLAN HetNets will be needed that can extend the provisions of secure and seamless internet connectivity \cite{8706883}. Many of these additional requirements come from the technology shift to SDN \cite{7345407} and NF virtualization (NFV) \cite{7994617}, network slicing, massive MIMO \cite{6736761}, NOMA \cite{7842433}, ultra-dense small cell network \cite{8516948}, D2D and M2M communications, and the cloud, and they lead to the need of increased security on the network side. 5G NOMA, mmWave, massive MIMO, and beamforming can improve physical layer security of 5G networks through co-operative jamming \cite{8125684,8792139}, which will allow secret and high-quality channel with the legitimate UEs while frustrating eavesdroppers with noisy, random, and poor channel conditions. The directional property of mmWave can be leveraged to establish and share secret keys that are unconditionally secure from the passive eavesdroppers\cite{8594703,8684919}. A variety of emerging new use-cases and networking paradigms demand new security requirements and considerations \cite{8125684}. For example, 5G networks need to employ adaptive intrusion detection system, which can perform the following tasks: (i) detect bandwidth spoofing attack on 5G relay, small cell access point, and base station, (ii) employ UEs initial authentication at the access points, and 5G RAN by a highly secured authentication and handover mechanism with the minimal handover latency and no loss of user privacy. The SDN controller handles DDoS attack and a secure VNF in the cloud filters out malicious packets from legitimate packets \cite{8523804}. 5G device-to-device (D2D) and machine-to-machine (M2M) communication security needs, vulnerabilities, and potential solutions have to be investigated. To this end, the important contexts include the following: (i) direct radio communications, (ii) large-scale D2D deployments, (iii) cooperative communications for securing D2D communications, (iv) power control and channel access in securing D2D communications,(v) continuous authenticity with legitimacy patterns, (vi) key exchange protocols involved with the D2D users and gNB, (vii) design of D2D links to use as friendly jammers, and (viii) helping authorized cellular users against malicious wiretapping \cite{8125684,8335294}. Furthermore, C-RAN security has to be ensured in service plane, control plane, and physical plane \cite{7954591}. 5G NR vulnerability has to be addressed in terms of jamming and spoofing by investigating the physical downlink and uplink control channels/signals and through designing proper mitigation strategies for proceeding towards the design of 5G NR chipsets and BSs \cite{8403769}. New 5G paradigms will have to be handled by the UK MNO businesses. For example, security challenges related to network slicing; such as on-demand security isolation of network slices, the security of inter-slice communications, impersonation attack, security policy mismatch, DoS attack, side-channel attacks, privacy attacks, resource harmonization between inter-domain slice segments and hypervisor attacks have to be considered \cite{8334918,8792139}. New types of 5G-based verticals, e.g., IoT, need to establish secure 5G-based network slicing technique with secure key establishment among IoT devices, MEC, and IoT cloud server \cite{8314666}. UK businesses will need innovative 5G Network Slice brokering mechanism using blockchain for reducing service creation time and for enabling the manufacturing equipment to autonomously and dynamically acquire the slice required for more efficient operations \cite{8260929}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Security_1.jpg} \caption{5G and Beyond Roll out Security Consideration Scope} \label{fig_security_1} \end{figure} Moreover, SDN and NFVs are vulnerable to various types of attacks including the following: (i) DoS, hijacking, and saturation attack on SDN controller, switches, and hypervisor, (ii) network slice theft from hypervisor and shared cloud resources and SDN (virtual) switches, (iii) routers configuration attacks, (iv) SDN configuration attacks, (v) penetration attack on SDN virtual resources, (vi) TCP-level attack on SDN controller-switch communication, and (vii) man-in-the-middle attack on the SDN controller-communication \cite{8334918,8125684,8792139,8712553}. The advent in security mechanisms is highly required to meet the overall 5G advanced features such as ultra-low latency and ultra-high energy efficiency \cite{8125684}. Different to the conventional radio cellular networks, the emerging 5G wireless networks will be service-oriented, which necessitates a particular emphasis on security and privacy requirements from the perspective of service-based architecture (SBA) \cite{8125684}. Hence, UK MNOs have to ensure data exchange security for network function (NF) service registration and de-registration, NF service discovery, NF service authorization and authentication in the presence of different attack vectors that may cause loss of NF availability, loss of data integrity, and attack from the insiders \cite{8771320}. 5G advocates the use of MEC, which offers heterogeneous network nodes inter-operating in an open ecosystem where distributed computing and virtualization may be exploited by service providers to extend the provisions of different applications to the end-users \cite{8334918}. Hence, at the time of rolling out 5G networks, MEC threats have to be considered at the frontend (UE/IoT to MEC network), backend (MEC network to cloud), and 5G MEC core network \cite{8334918,8314666}. New dimensions of 5G UE Security, trust, authentication, policy, compliance, and privacy for ultra-mobility will be required. Since 5G networks are expected to extend the provisions of everything as a service, where the users data/information will be stored and shared online, maintaining users/data privacy during 5G rollout in HetNets will be highly challenging \cite{8334918}. Due to the reduced cell size in 5G networks, there may often appear the scenarios in which a mobile user may move through multiple small sized cells within a single communication session. Therefore, the privacy assurance is more challenging in 5G networks due to the possible involvement of untrusted or compromised APs involved during the handover \cite{7081072}. Hence, hybrid and flexible authentication of UEs should be devised that will allow authentication by the network only, authentication by the service provider only, and authentication by both the network and service providers \cite{8125684}. 5G rollout cost model in terms of financial protection against secrecy outage and service outage can be considered by introducing a cyber-insurance framework for 5G cellular networks \cite{8335293}. Pre-5G or legacy privacy vulnerabilities should be carefully addressed while rolling out 5G network \cite{8712553}. Pre-5G legacy authentication, privacy, and protocol exploits in the context of 5G have to be addressed such as implicit trust in pre-authentication messages and legacy symmetric key security architecture \cite{jover2019current}. Furthermore, identify security, location security, IMSI security, and mobile terminal security have to be considered \cite{8334918}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Security_2.jpg} \caption{Proposed Security endpoints to be considered while rolling out 5G Infrastructure in UK} \label{fig_security_2} \end{figure} While rolling out 5G in the UK, the threats originated from devices or UEs, the air interface at RAN threats \cite{8454666}, edge network threats, backhaul threats, 5G core network threats, and external network threats have to be considered \cite{8334918} \cite{8792139}. Because failing to handle the security and privacy of user data and application would have the repercussion of 5G rollout costs. For example, the 5G network has to proactively handle UE threats such as bots, DDos, man-in-the-middle attacks, firmware hacks, device tampering, and malware. The 5G RAN air interface threats include physical layer security to handle jamming, man-in-the-middle attacks, and eavesdropping. The threats at the MEC layer have to handle MEC server vulnerability, rogue nodes, weak authentication issues, side-channel attacks, and improper access control. The backhaul threats include DDoS attacks, control and user plane sniffing, MEC backhaul sniffing, and flow modification attacks. The 5G core network threats that need to be mitigated and handled are software and SDN issues, API vulnerabilities, network slicing issues, DoS and DDoS attacks, improper access control, and virtualization issues. Finally, the external network threats include application server vulnerabilities, cloud services vulnerabilities, bots, and other IP based attacks, application vulnerabilities, API vulnerabilities, and roaming partner vulnerabilities \cite{8792139}. Different stakeholders related to 5G rollout are recommended to consider the following B5G security considerations to minimize the costs related to security breaches and safety and privacy of data flowing through 5G networks \cite{8712553}. Fig. \ref{fig_security_1} shows a high-level requirement of 5G security considerations, and Fig. \ref{fig_security_2} shows the salient areas of 5G security that needs to be considered while rolling out 5G. In this section, we will illustrate the state-of-the-art 5G rollout security dimensions that need to be considered by the concerned entities. \paragraph{Blockchain usage for B5G Applications} UK businesses can use blockchain for a 5G-based decentralized business model such as commerce, context, content, and connection \cite{8648405,8712553}. For example, blockchain smart contract can be used for secure 5G network slice brokering and maintaining immutable service level agreement (SLA) ledgers to bind 5G business actors such as manufacturing equipment owner, IoT manufacturing equipment, infrastructure providers (InP), MNOs, micro-operators ($\mu$O), virtual mobile network operators (MVNO), over-the-top service providers (OTT) and verticals. Blockchain can be used for secure 5G network sharing scenarios \cite{8685867}, e.g., multiple 5G network operators can extend and collaborate among roaming end-users and incentivizes local businesses and other actors to densify and extend the 5G coverage. Blockchain ledger can be used to store the proof of bandwidth and other types of 5G network resource usage, traffic flow and accounting. MNOs can employ blockchain to provide secure authentication scheme for 5G Ultra Dense Access Point Network \cite{8470085}. Also, blockchain is envisioned to provide security and privacy of IoT data in 5G HetNets \cite{8731639}. In the literature, researchers have proposed blockchain to offer efficient privacy-preserving and data sharing schemes for 5G verticals \cite{8320551}. UK businesses can leverage blockchain for secure registration of a new cellular user and UE, authentication and authorization of users and different services, usage of networks, distributed mobility management (DMM), authenticate the priorities and 5G network services usage and propose algorithm of allocating communication and computation resources to minimize the delay of data transmission and computation, billing and payment and manage roaming bills context of 5G HetNets \cite{8356363}. Blockchain can handle robust and universal seamless handover authentication for 5G HetNets by leveraging the trapdoor collision property and the tamper-resistant property. More specifically, blockchain will allow 5G network slice providers to securely perform brokering process and allow leasing resources from different providers securely and privately \cite{8707070}. Furthermore, blockchain will allow UK's businesses to enable industry 4.0 automation processes and manufacturing IoT equipment to autonomously and dynamically acquire the 5G-based slices with QoS needed for most efficient operations \cite{8368983}. Blockchain-based authentication and key agreement protocol can be employed, which will allow UEs to move smoothly in a trusted APs group without frequent authentication within an ultra-dense small cell network \cite{8470085}. \paragraph{Artificial Intelligence, Deep Learning and Machine Learning for 5G Security Threat Intelligence} Since the UK is one of the leaders in artificial intelligence research, 5G security can leverage this strength. Various use case scenarios of AI-based security for 5G and beyond applications can be found at \cite{8712553}. Blockchain and AI methods can together form a strong platform to support secure and intelligent resource management, flexible networking, and reliable orchestration in 5G and beyond scenarios such as spectrum sharing, D2D caching, V2V energy optimization, and computation off-loading \cite{8726067}. The novel machine learning algorithm can be trained to teach security threats faced by 5G network-interfaced intrusion detection and prevention system, cyber threat and anomaly identification system, and help to secure threats on UK's 5G network \cite{8304873}. UK's 5G MNOs or service brokers can use AI to allow self-adaptation of security needs according to live 5G traffic flowing through VNF. The AI-based VNF can employ auto-scaling and deploy more 5G network resources, employ appropriate deep learning framework, or even the detection model, with a more suitable one to the given cyber-defense context \cite{8283694}. \paragraph{Quantum Safety and Next Generation Ciphers for B5G Applications} In order to face the challenge of cryptographic vulnerability threats due to advancements in computing capabilities of adversaries, UK 5G rollout should consider quantum-resistant authentication and data distribution scheme, and lattice-based homomorphic encryption technology, which greatly reduces the network burden at the same time achieves strong security including privacy protection and anti-quantum attacks \cite{8781929}. 5G MNOs can leverage the visible spectrum as a noise source for designing next-generation random cryptographic seeds and key generation system suitable for 5G networks \cite{8276259}. To support real-time data secrecy over 5G intra-slice security applications and protect the private information and hide the communication signals in the frequency, spectrum stream cipher can be a viable option \cite{8315003}. To lower the authentication delay in an ultra-dense small cell network, certificate authority (CA)-based approach can be availed \cite{8718355}. Different 5G network slicing may deploy different public-key cryptosystems, and hence, the 5G network should allow diversified types of cryptosystems that will allow heterogeneous sign-cryption schemes such as public key infrastructure and the certificate-less public key cryptography environment \cite{8268052}. \paragraph{5G Verticals' Security Considerations} In general, an integrated effort has to be given to secure the UK's business verticals. In the following, we focus security considerations of rolling out 5G-based V2X and Industry 4.0 verticals. Security vulnerabilities in the areas of mutual authentication and authorization, confidentiality and integrity protection, replay protection, Secure provisioning and storage, privacy ID, personal data, and tracking in the vehicular context are of significant importance \cite{8088619}. Especially, the security analysis of V2X verticals in the areas of the termination of user plane security at gNB, authentication and authorization of UE at the 5G RAN, 5G RAN security, UE Security, and network Slicing security have to be ensured \cite{8088619}. V2X security can be obtained by securing 5G network slicing through permissioned consortium blockchain. Using dedicated networking slicing and blockchain ledgers, vehicles can share information via 5G networks with outside world entities or D2D entities \cite{8343866}. A 5G enabled vehicular network can facilitate a reliable, secure and privacy-aware real-time video reporting service by using novel block cipher with 1.2 Gbps speed of secure video data sharing. This is to enable the participating vehicles to instantly report the high-definition videos/photos of any events (e.g., traffic accidents, etc) to ensure a timely response from concerned departments (e.g., sending ambulance vehicles to the accident scene, etc) \cite{7433471}. Using blockchain, SDN-enabled 5G-V2X can detect malicious vehicular nodes or messages while keeping the overhead and impact on the network performance in an acceptable range \cite{8701642}. Leveraging 5G SDN \cite{8792139} with resilient V2X security design, different types of attacks such as DDoS targeting either the controllers or the vehicles in the network can be mitigated, and at the same time, it allows tracing back the source of the attack \cite{7939143}. By leveraging the directional beamforming, secure 5G V2X applications such as vehicle platooning will allow platoons to establish shared secret keys \@ 166 Mbps, which is four-times higher than that of Diffie-Hellman and assumed to allow One Time Pad (OTP) encryption \cite{8684919}. Due to the vulnerabilities of IoT devices, the IoT verticals need to establish a secure MEC framework for cloud-assisted IoT environments and the secure APIs through which developers serve contents to such IoT applications of MEC \cite{8334918}. Extensive security surveys based on 5G properties in the areas of short-range IoT applications, delay-tolerant IoT applications, critical IoT application, and massive IoT applications are needed before 5G rollout \cite{8792139}. For example, 5G vertical security requirements of IoT-based electricity services within a smart city is needed before 5G roll out in UK \cite{8340149}. Attack vectors on SDN-based identity and access management, authentication, non-repudiation, audit, trust and assurance, compliance, confidentiality, integrity, availability, and privacy issues are to be considered, and proper safeguards and security risk mitigation techniques to support security at 5G access network, application layer, UE, management, core network, and infrastructure and virtualization components have to be deployed. The utilization of innovative security measures for IoT networks, such as two-factor authentication and key agreement schemes, can help in resisting various different types of attacks to ensure user privacy through both anonymity and unlinkability \cite{8267060}. Since botnet is a major threat for IoT verticals \cite{8039305}, 5G roll-out design should be able to dynamically detect botnet traffic pattern and mitigate the attack in 5G network environment by leveraging the combination of SDN and NFV techniques to adapt botnet detection and reaction functions in 5G networks. \subsection{Spectrum Coexistence and Trading} The demands for new radio spectrum to meet the increasing growth of data traffic are rapidly increasing. To this end, the induction of new spectrum, location-based licensing of spectrum, efficient management of spectrum, and advent in green radio communication technologies are among the prominent solutions. Dynamic spectrum sharing techniques can enable the sharing of the radio spectrum among two or more wireless systems and can effectively utilize the available radio frequencies \cite{SharmaFD2018}. The existing dynamic spectrum sharing models can be broadly categorized into the following three types: (i) Commons Model, (ii) Shared-use model, and (iii) exclusive-use model \cite{Hassan2017exclusive}. In the spectrum commons model, radio spectrum is not owned by any provider and all the secondary users or unlicensed users can access the spectrum with equal rights. This sharing model suitable for spectrum sharing operation in the unlicensed bands such as Unlicensed National Information Infrastructure (U-NII),i.e., 5GHz, and Industrial, Scientific and Medical (ISM), i.e., 2.4 GHz. The main problem with this open access approach is that unlicensed users may suffer from the inter-user interference, and this may result in the network congestion. In the shared-use model, the secondary users utilize the vacant spectrum or underutilized spectrum in an opportunistic way or an interference-avoidance manner without harming the normal operation of the primary users by using various Cognitive Radio (CR) techniques. The CR technology is considered as one promising technology to address the issue of spectrum scarcity, which can enable the coexistence of two or more wireless systems either in an opportunistic mode, i.e., interweave paradigm or with the interference avoidance mode, i.e., underlay paradigm \cite{Sharma2015CR}. The interweave paradigm mainly deals with the spectrum sharing or database assisted techniques, while the underlay techniques enable the spectrum sharing techniques of wireless systems by means of suitable interference mitigation techniques such as beamforming and power control. Besides the aforementioned interweave and underlay paradigms, several advanced spectrum sharing mechanisms including Carrier Aggregation (CA) and Channel Bonding (CB) \cite{Khan2014CA}, Spectrum Access System (SAS), Licensed Shared Access (LSA) and Licensed Assisted Access (LAA) \cite{Mukherjee2016LAA} have been investigated in the literature. Furthermore, various other spectrum sharing techniques such as spectrum leasing, spectrum trading, spectrum harvesting and spectrum mobility have been discussed in the literature towards improving the spectrum efficiency and energy efficiency of wireless networks \cite{Yang2016advanced}. On the other hand, the secondary users can acquire the exclusive spectrum usages right for the required bandwidth and duration in the exclusive-use model. These exclusive rights can be obtained from the primary system either by purchasing the spectrum from the primary service providers or spectrum licensees or by providing a cooperation reward, for instance the relaying of the primary data. As compared to the shared-used model, this approach has several advantages for the secondary users as they do not need to sense the primary channel and do not need to switch from one channel to another channel. This mode of spectrum sharing in the exclusive-mode is also called as spectrum trading \cite{Hassan2017exclusive}, which can be implemented either directly between the secondary and primary service providers or can be managed by a spectrum manager/broker or a spectrum exchange market. An auction operation may be needed or not depending on the required duration for spectrum trading, i.e., long duration of spectrum trading needs an auction while a short duration may not need an auction. Auctioning process becomes more suitable in the scenarios with a high demand and limited supply since a seller can attract more benefits by involving multiple bidders. However, this method depends on various factors such as low number of bidders or a single bidder, all bidders asking below the required price, time dependency, and the need of multiple iterations to obtain a suitable solution, thus resulting to the need of a real-time multi-seller and multi-channel model while considering the dynamicity of the channel and traffic conditions \cite{Hassan2017exclusive}. On the other hand, non-auction based models can be designed based on game-theoretical models and may be categorized into monetary \cite{Bajaj2015spectrumtrading} and non-monetary types \cite{Simeone2008leasing}. Considering the increasing demand for Ultra-Reliable and Low-Latency Communications (URLLC) applications such as industrial automation, there arises the need of meeting reliability requirements with the available spectrum. The existing factory automation generally utilizes unlicensed Industrial, Scientific and Medical (ISM) bands and benefits from their wider bandwidths in handling large traffic volumes. However, the reliability targets of below 10 ms can not meet with the existing solutions \cite{Holfeld2016factory}, and also the unlicensed mode of operation requires the careful design of minimizing or avoiding interference being subject to strict regulatory constraints. Considering these drawbacks of utilizing unlicensed bands or factory automation applications, the authors in \cite{8685776} demonstrated the possibility of utilizing 5G cellular licensed band as an alternative option for factory automation applications, and also showed the significance of utilizing integrated unlicensed and licensed bands in terms of economic viability. However, several challenges in terms of synchronized operation in the unlicensed and licensed bands and over-the-air inter-system coordination needs to be addressed to realize this integrated spectrum utilization approach in practice. The authors in \cite{8708839} discussed the use of 24 GHz as the Gigabit wireless networking spectrum based on the forecast methodology for 5G spectrum by K-ICT for IMT 2020 Korea \cite{KICTIMT2020Korea}, where three different forecast methodologies for 5G spectrum needs, namely, traffic forecast-based approach, technical performance-based approach, and application-based approach have been identified. From the analysis presented in \cite{8708839} regarding the use of 24 GHz, there arises the requirement of over 370 MHz spectrum for mobile broadband services for 1 Gbps speed and this requirement is expected to increase by 10\% till 2024. Also, the analysis pointed out the need of about 233,282 base stations in the analyzed regions consisting of dense urban, urban and sub-urban areas to support the increasing number of 5G users. Moreover, understanding the spectrum usage pattern with the help of suitable spectrum monitoring techniques/platforms is a vital task towards enhancing the radio spectrum utilization efficiency of Beyond 5G dynamic sharing systems. In this direction, Machine Learning (ML) techniques are of significant importance to predict the future spectrum usage and to address the inefficiency issues in spectrum management and utilization. The existing ML techniques can be broadly categorized into supervised, unsupervised and reinforcement learning \cite{Sharma2019mMTC}. Authors in \cite{7289481} carried out the analysis of spectrum occupancy in CR networks by utilizing different supervised and unsupervised ML techniques. Under the supervised learning approach, various techniques including Naive Bayesian Classifier (NBC), Support Vector Machine (SVM), Decision Trees (DT), and Linear Regression (LR) were considered while under the unsupervised learning, Hidden Markov Model (HMM) approach was investigated along with their numerical comparisons in terms of computational time and classification accuracy. \begin{table}[t] \centering \caption{Summary of 5G networks target KPIs} \begin{tabular}{|p{2.8em}|p{3.1em}|p{2.5em}|p{2.7em}|p{2.7em}|p{2.4em}|p{2.98em}|} \hline \textbf{Service Platform} & \textbf{Device Density (/km$^2$)} & \multicolumn{1}{p{2.6em}|}{\textbf{Mob- ility (km/h)}} & \textbf{User Data Rate.} & \textbf{Cell Edge Rate} & \textbf{Lat-ency} & \textbf{ Availa-bility (Relia-bility)} \bigstrut\\ \hline \hline \textbf{eMBB} & Up to 10k & \multicolumn{1}{l|}{\multirow{3}[6]{2.6em}{0 to 360}} & 50 - 100 Mbps & 50 Mbps DL, 25 Mbps UL & 10 - 50ms & \multicolumn{1}{l|}{99\%} \bigstrut\\ \cline{1-2}\cline{4-7} \textbf{mMTC} & Up to 1m & & Up to 100kbps & 100 kbps DL and UL & $>$50ms & \multicolumn{1}{l|}{99\%} \bigstrut\\ \cline{1-2}\cline{4-7} \textbf{URLLC} & Up to 10k & \ & Up to 100 Mbps & 10 Mbps DL and UL & 1 - 50ms & 99.9\% - 99.999\% \bigstrut\\ \hline \end{tabular}% \label{tab_5G_KPIs}% \vspace{8pt} \centering \caption{Coverage range approximation for favourable channel conditions.} \begin{tabular}{|p{2em}|p{3.785em}|c|c|c|} \hline \multicolumn{1}{|p{2em}|}{\multirow{2}[4]{2em}{\textbf{Frequency Band}}} & \multirow{2}[4]{3.785em}{\textbf{Envir-onment}} & \multicolumn{3}{p{12.645em}|}{\textbf{Coverage range (kms)}} \bigstrut\\ \cline{3-5} & \multicolumn{1}{c|}{} & \multicolumn{1}{p{4.215em}|}{\textbf{eMBB}} & \multicolumn{1}{p{4.215em}|}{\textbf{URLLC}} & \multicolumn{1}{p{4.215em}|}{\textbf{mMTC}} \bigstrut\\ \hline & Rural & 2.62 & 2.69 & 12.5 \bigstrut\\ \cline{2-5} \multicolumn{1}{|p{5.145em}|}{\textbf{700MHz}} & Sub-Urban & 0.8 & 0.82 & 7 \bigstrut\\ \cline{2-5} & Urban & 0.59 & 0.65 & 4.3 \bigstrut\\ \hline & Rural & 0.62 & 0.65 & 5.65 \bigstrut\\ \cline{2-5} \multicolumn{1}{|p{5.145em}|}{\textbf{3.5GHz}} & Sub-Urban & 0.17 & 0.17 & 2.09 \bigstrut\\ \cline{2-5} & Urban & 0.09 & 0.09 & 0.47 \bigstrut\\ \hline & Rural & 0.16 & 0.17 & 1.52 \bigstrut\\ \cline{2-5} \multicolumn{1}{|p{5.145em}|}{\textbf{26GHz}} & Sub-Urban & 0.13 & 0.13 & 0.97 \bigstrut\\ \cline{2-5} & Urban & 0.08 & 0.08 & 0.48 \bigstrut\\ \hline \end{tabular}% \label{table_converage_range_bands}% \end{table} Furthermore, a conceptual framework of end-to-end learning for spectrum monitoring applications has been presented in \cite{Kulin2018endtoend} along with a generic methodology to design and implement wireless signal classifiers followed by two case-studies related to modulation recognition and wireless technology interference detection. The end-to-end learning concept investigated in \cite{Kulin2018endtoend} refers to a learning procedure in which the features of a wireless signal are extracted, and a wireless signal classifier is utilized to classify the received signals. Moreover, it may not be reliable in practice to learn the radio spectrum usage by an individual node due to several issues such as multi-path fading and hidden node problem, leading to the need of collaborative learning and spectrum sharing strategy \cite{SharmaPIMRC2017}. Also, a non-collaborative way of spectrum usage learning in mmWave bands may result in challenging issues due to the involved directional antenna beams, and this can be improved by enabling collaboration among the secondary users to predict or estimate the spectrum occupancy distribution of the radio channels \cite{Liglobecomlearning}. \section{case study: A Typical UK City} This section presents a case study conducted to represent a typical UK city. For this purpose, the local authority involved typical West Midlands city layout is used. The study is focused on to demonstrate the potential of street furniture and public building for infrastructure sharing. There are four major MNOs in the UK. In Table \ref{tab_UK_consumers}, the details of current major infrastructure consumers in the UK are provided, which are classified into MNOs, MVNOs, private networks, and semi-private networks classes. We begin with the introduction of the 5G testbed environment and experimental setup, then further proceed with conducting a comprehensive analysis on our findings. \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{case_study_s13.jpg} \caption{Case study-- A 5 km$^2$ area of a typical city.} \label{fig_case_s13} \end{figure} \begin{table}[ht] \centering \caption{Details of the infrastructure consumers.} \begin{tabular}{|p{4em}|p{8.5em}|p{13.5em}|} \hline \textbf{MNO } & \textbf{MVNO } & \textbf{Private \& semi private network} \bigstrut\\ \hline\hline \multirow{2}[2]{*}{EE} & \multirow{2}[2]{9.4em}{Virgin Mobile; ASDA Mobile; BT Mobile } & National Roads Telecommunications Services (NRTS) and Traffic Scotland \bigstrut[t]\\ \multicolumn{1}{|c|}{} & \multicolumn{1}{c|}{} & Network Rail Telecom \bigstrut[b]\\ \hline Three & iDmobile; FreedomPop; The People's Operator & Airwave/ESN \bigstrut\\ \hline O2 & Tesco Mobile; Lycamobile; Giffgaff & Power Utilities \bigstrut\\ \hline Vodafone & Lebara Mobile; TalkTalk Mobile; TalkMobile & Sigfox/Arqiva \bigstrut\\ \hline \end{tabular}% \label{tab_UK_consumers} \end{table}% \subsection{5G Testbed Environment and Experimental Setup} West-Midland 5G (WM5G) is the UK's largest 5G testbed, which is available at the 5G business \& innovation center (5GBIC) in Birmingham City University (BCU) UK. The WM5G is a public-private partnership initiative with an investment of up to \textsterling 150m. This partnership aims at providing innovation to attain enhanced digital productivity and economy. The WM5G at 5GBIC is utilized for the conduction of the proposed case study. The 5G testbed key performance indicators (KPIs) are summarized in Table \ref{tab_5G_KPIs}. The derived coverage range estimate for different 5G target services (i.e., eMBB, URLLC, and mMTC) is provided in Table \ref{table_converage_range_bands}. The table exhibits a more ubiquitous view of the scale of infrastructural provisions required for 5G services. The characterization of coverage range into different cellular conditions/environments (i.e., rural, sub-urban, and urban) and various frequency bands (i.e., 700MHz, 3.5GHz, and 26GHz) is also presented. The Case study is conducted for a 5 km$^2$ area of a typical UK city. The existing telecom and local authorities owned infrastructure in the considered region is plotted in Fig. \ref{fig_case_s13}. In Fig. \ref{fig_case_s13}(a), (b), (c), and (d), the location of existing 4G macro-cells, with added public buildings, with added street furniture, and superimposed all available infrastructure are plotted. There is a requirement to provide good quality outdoor services for at least 140,000 premises to which the obligation holder does not currently provide the good coverage. Moreover, there is a requirement to deploy at least 500 new wide area mobile sites in rural areas, to be co-located at least at 1 km distance from existing sites. This concludes that each of the new 500 sites shall have a minimum EIRP of 43 dBm. The conduction of a comprehensive study on ICNIRP requirements and environmental sustainability of the structures is suggested. It is observed that the potential of public buildings and street furniture to facilitate the necessary infrastructure for 5G deployment also provides a significant opportunity for the Local Authority to directly or indirectly participate in the business model along with the MNOs \cite{patwary2016universal}. \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{Ofcom_Spectrum.jpg} \caption{Ofcom 5G Spectrum sharing framework UK; i.e., for 1.8GHz, 2.3GHz, 3.8-4.2GHz, Lower-26GHz, and Upper-26GHz bands \cite{Ofcom_location_licensing_2019}.} \label{fig_spectrum_uk} \end{figure} \subsection{Spectrum Flexibility Policy in the UK} The radio frequency spectrum being a core enabler of wireless communications has a high significance in shaping a country's economy and society. The huge deployment and radio spectrum costs are regarded as the potential delaying causes in the provision of 5G technology innovations. Enabling opportunities for innovation with spectrum sharing has a strong potential in reducing the overall cost. In the light of growing interest in the use of communication applications and services introduced by 5G, there is a need to develop viable solutions for licensing the radio spectrum for meeting the local connectivity needs. In this regard, the location-based licensing of the radio spectrum can significantly help the MNOs in utilizing the 5G radio spectrum in the suitable local regions. The UK, in this regard, has become the first country in location-based spectrum licensing. The Ofcom has become the leader by releasing the location-based licensing of 5G compatible bands \cite{ofcom_licence}. This new way of spectrum licensing also mainly opens the possibilities for location wise re-licensing of the radio spectrum which is allocated to the MNOs but it is not being utilized in the locations. The nature of 5G-compatible radio, e.g., millimeter-wave (mmWave) signal propagation, and small-sized cells suit the adoption of such location-based licenses due to their shorter coverage distance from a base station. The offering of location-based spectrum licensing will also open opportunities for small drivers (businesses, organizations, enterprises, industries, etc) to set up their own customized local wireless network at a cheaper cost with higher reliability and security provisions. The extended application scenarios of this arrangement may include private wireless networks for machine-to-machine communications in industrial, agricultural, others for various useful services. Moreover, the deployment of setup for wireless broadband connectivity in rural areas using fixed wireless access (FWA) may also benefit from it. The framework of four prime 5G bands for location-based shared licensing released by Ofcom UK \cite{Ofcom_location_licensing_2019} are shown in Fig. \ref{fig_spectrum_uk}, i.e., 1.8GHz, 2.3GHz, 3.8 - 4.2 GHz, and 26GHz. The configuration of existing users in the corresponding bands are also indicated. The provision of a new regulatory framework for new users to access the spectrum is provided under \emph{Mobile Trading Regulations} \cite{Ofcom_location_licensing_2011_ammeded}. The radio spectrum landscape indicating the new users with individual per-location licences, fixed links licences, concurrent spectrum access (CSA) licences, and former CSA licences are also indicated in the Fig. \ref{fig_spectrum_uk}. The scenarios for Ofcom and operator model prediction using UK's geo coverage model and requirements are illustrated in Fig. \ref{scenarios_ofcome_flow_UK}. The compliance threshold for Ofcom model is 88\% and 92\% for the scenario of operator-model predicting above Ofcome-model and Ofcome-model predicting above operator-model, respectively. The summary of prices of channels of different sizes in the UK by Ofcom \cite{Ofcom_location_licensing_2019} is provided in Table \ref{table_channel_price_UK}. The average size of channel is considered as 40 MHz, where the cost for channel sizes higher and lower than 40 MHz are decided in proportionate to that. Complete details of tariffs by Ofcom for the year 2019/2020 can be found in \cite{Ofcom_Tarrif_2019_20}. \begin{figure} \centering \includegraphics[width=\columnwidth]{Scenarios_UK_flow.jpg} \caption{Scenarios for Ofcom and operator model prediction using UK's geo coverage model and requirements \cite{ofcom_licence,Ofcom_location_licensing_2019}.} \label{scenarios_ofcome_flow_UK} \end{figure} \begin{table}[t] \centering \caption{Channel size and price in the UK \cite{Ofcom_location_licensing_2019}} \begin{tabular}{|c|c|} \hline \multicolumn{1}{|p{10.43em}|}{\textbf{Channel size (MHz)}} & \multicolumn{1}{p{10.43em}|}{\textbf{Price per channel ( \textsterling)}} \bigstrut\\ \hline\hline 2$\times$3.3 & 80 \bigstrut\\ \hline 10 & 80 \bigstrut\\ \hline 20 & 160 \bigstrut\\ \hline 30 & 240 \bigstrut\\ \hline 40 & 320 \bigstrut\\ \hline 50 & 400 \bigstrut\\ \hline 60 & 480 \bigstrut\\ \hline 80 & 640 \bigstrut\\ \hline 100 & 800 \bigstrut\\ \hline \end{tabular}% \label{table_channel_price_UK}% \end{table}% \begin{table}[t] \centering \caption{Typical infrastructure capability for different network architecture site types} \begin{tabular}{|p{5.215em}|p{3.115em}|p{3.315em}|p{3.115em}|p{3.85em}|p{2.7em}|} \hline \textbf{Site Deployment Option:} & \textbf{Macro Cell} & \textbf{Microcell} & \textbf{Picocell} & \textbf{Femtocell} & \textbf{Small Cell} \bigstrut\\ \hline\hline \textbf{Greenfield} & \cmark & \xmark & \xmark & \xmark & \xmark \bigstrut\\ \hline \textbf{Rooftop} & \cmark & \cmark & \xmark & \xmark & \xmark \bigstrut\\ \hline \textbf{Streetworks} & \xmark & \cmark & \cmark & \xmark & \cmark \bigstrut\\ \hline \textbf{Indoor} & \xmark & \xmark & \cmark & \cmark & \cmark \bigstrut\\ \hline \end{tabular}% \label{table_cell_types}% \end{table}% \begin{table}[t] \centering \caption{Typical CapEx requirement to upgrade existing macro-cells with 5G capabilities. The sharing and non-sharing based costs comparison is presented. The cost heads shared between two MNOs are shaded in Gray color.} \begin{tabular}{|p{10em}|r|r|r|} \hline \multirow{2}[2]{*}{\textbf{Macro Item costs}} & \multicolumn{1}{c|}{\textbf{Not Shared}} & \multicolumn{2}{p{9em}|}{\textbf{Cost shared between two MNOs}} \bigstrut[b]\\ \cline{2-4} \multicolumn{1}{|c|}{} & \multicolumn{1}{p{5em}|}{\textbf{Urban/Rural Sites (Rooftop/ greenfield) (\textsterling)}} & \multicolumn{1}{p{4.3em}|}{\textbf{MNO 1 (\textsterling)}} & \multicolumn{1}{p{4.3em}|}{\textbf{MNO 2 (\textsterling)}} \bigstrut[t] \\ \hline\hline \rowcolor[rgb]{ .851, .851, .851} Survey and Design & \cellcolor[rgb]{ 1, 1, 1}1,700.00 & 850.00 & 850.00 \bigstrut[b]\\ \hline \rowcolor[rgb]{ .851, .851, .851} Site Acquisition and planning & \cellcolor[rgb]{ 1, 1, 1}4,000.00 & 2,000.00 & 2,000.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} Civils works - Urban (mainly RT) & \cellcolor[rgb]{ 1, 1, 1}60,000.00 & 30,000.00 & 30,000.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} PSU & \cellcolor[rgb]{ 1, 1, 1}2,400.00 & 1,200.00 & 1,200.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} HVAC & \cellcolor[rgb]{ 1, 1, 1}6,600.00 & 3,300.00 & 3,300.00 \bigstrut\\ \hline Rigging & 6,000.00 & 6,000.00 & 6,000.00 \bigstrut\\ \hline \rowcolor[rgb]{ .851, .851, .851} Antenna's (x6) & \cellcolor[rgb]{ 1, 1, 1}6,000.00 & 3,000.00 & 3,000.00 \bigstrut\\ \hline Antenna MIMO X3 (Based on \textsterling15k per 64x mMIMO) & 45,000.00 & 45,000.00 & 45,000.00 \bigstrut\\ \hline Radio Hardware & 5,000 & 5,000.00 & 5,000.00 \bigstrut\\ \hline DICI & 4,000.00 & 4,000.00 & 4,000.00 \bigstrut\\ \hline Transfer to Operations & 1,000.00 & 1,000.00 & 1,000.00 \bigstrut\\ \hline Project Management & 4,000.00 & 4,000.00 & 4,000.00 \bigstrut\\ \hline \textbf{Total without mMIMO} & \textbf{100,700.00} & \textbf{60,350.00 } & \textbf{60,350.00 } \bigstrut\\ \hline \textbf{Total With mMIMO} & \textbf{145,700.00} & \textbf{105,350.00 } & \textbf{105,350.00 } \bigstrut\\ \hline \textbf{Total without mMimo - including Risk and Margin} & \textbf{120,840.00} & \textbf{72,420.00 } & \textbf{72,420.00 } \bigstrut\\ \hline \end{tabular}% \label{table_macrocell_items}% \end{table}% \subsection{Market Interests and Cost Analysis} The overall 5G rollout cost in the UK is estimated as \textsterling 30bn - \textsterling 50bn, while the UK mobile operator annual CapEx is estimated as \textsterling 2.5bn. Such a high cost of the rollout in the UK is highly unlikely to be solely supported by the MNOs. This section discusses the economic constraints related with to rollout of 5G and B5G network in the UK. Moreover, the consumer market saturated and flat revenue prospects are also discussed. There will be 518,345 sites required to be deployed in the UK \cite{NIC_report_2016}. These sites are classified as:(i) 7,616 sites for dense urban areas, (ii) 186,732 sites for urban areas, (iii) 309,014 sites for sub-urban areas, and (iv) 15,000 sites for rural areas. Typical infrastructure capability for different site deployment options and cell types are indicated in Table \ref{table_cell_types}. The following subsections thoroughly discuss the CapEx and OpEx associated with new standalone and shared-infrastructure based macro-cell and small-cells. \paragraph{Macro-cells} Out of the total number of required sites, about 40,000 existing cell sites can be reused for macro-cells. The CapEx requirements to upgrade the existing macro-cells with 5G capability, without sharing the costs, for urban and rural areas are indicated in Table \ref{table_macrocell_items}. Moreover, for the case of shared costs between different MNOs, the CapEx required for upgrading the existing macro-cells with 5G capabilities are also indicated in Table \ref{table_macrocell_items}. From different heads of CapEx, a few can be identified as shareable among multiple MNOs. In this context, the equal cost sharing map between two different MNOs (i.e., MNO1 and MNO2) is shown in the table with the rows representing the shared-cost heads shaded in Grey color. These items for macro-cells include, survey and design, site acquisition and planning, civil works, PSU, HVAC, and antennas. Moreover, the cost of non-shareable heads is also indicated. The sharing of costs between two MNOs can reduce the cost from \textsterling 100,700.00 to \textsterling 60,350.00 and \textsterling 145,700.00 to \textsterling 105,350.00 for the cases of without and with mMIMO capability, respectively. Moreover, by including the risk and margin costs, the cost of without mMIMO capability scenario can be reduced from \textsterling 120,840.00 to \textsterling 72,420.00 through sharing the potential head costs equally between two MNOs. \begin{table*}[t] \centering \caption{Generic CapEx requirements for different deployment options for small-cells} \begin{tabular}{|c|c|c|c|c|p{5em}|} \hline \multicolumn{1}{|c|}{\multirow{2}[3]{*}{\textbf{Small-Cell items}}} & \multicolumn{2}{c|}{\textbf{Single Operator}} & \multicolumn{2}{c|}{\textbf{Shared between two operators}} & \multirow{2}[3]{*}{Sharing (\%)} \bigstrut \\ \cline{2-5} & \multicolumn{1}{p{7em}|}{\textbf{Deploying new pole. Cost (\textsterling)}} & \multicolumn{1}{p{7.5em}|}{\textbf{Using existing street furniture. Cost (\textsterling)}} & \multicolumn{1}{p{7.5em}|}{\textbf{Deploying new pole. Cost for each operator (\textsterling)}} & \multicolumn{1}{p{9.5em}|}{\textbf{Using existing street furniture. Cost for each operator (\textsterling)}} & \multicolumn{1}{c|}{} \bigstrut[t]\\ \hline\hline \multicolumn{1}{|p{15em}|}{Design development of street-side pole (new)} & \multicolumn{1}{c|}{5000} & 0 & 2500 & 0 & \multicolumn{1}{c|}{50\%} \bigstrut[b]\\ \hline \multicolumn{1}{|p{13.645em}|}{Design \& Engineering (existing)} & \multicolumn{1}{c|}{2000} & 2000 & 1200 & 1200 & \multicolumn{1}{c|}{60\%} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{Civil Work} & \multicolumn{1}{c|}{1000} & 1000 & 800 & 800 & \multicolumn{1}{c|}{80\%} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{Power} & \multicolumn{1}{c|}{1000} & 1000 & 500 & 500 & \multicolumn{1}{c|}{50\%} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{New Fibre (could be reduced if fibre already present)} & \multicolumn{1}{c|}{2660} & 2660 & 1330 & 1330 & \multicolumn{1}{c|}{50\%} \bigstrut\\ \hline \multicolumn{1}{|l|}{\multirow{2}[4]{*}{RF equipment ( non-shared)}} & \multicolumn{1}{c|}{\multirow{2}[4]{*}{7500}} & \multirow{2}[4]{*}{7500} & 7500 & 7500 & \multicolumn{1}{r|}{} \bigstrut\\ \cline{4-6} \multicolumn{1}{|l|}{} & \multicolumn{1}{c|}{} & & \multicolumn{1}{p{7.5em}|}{(4500, if dual band transceiver is used of \textsterling 9000)} & \multicolumn{1}{p{7.5em}|}{(4500, if dual band transceiver is used of \textsterling9000)} & \multicolumn{1}{r|}{} \bigstrut\\ \hline \multicolumn{1}{|p{13.645em}|}{\textbf{Total:}} & \multicolumn{1}{c|}{\textbf{19,160}} & \textbf{14,160} & \textbf{13,830} & \textbf{11,330} & Single band antenna \bigstrut[t]\\ \hline \multicolumn{3}{|c|}{\multirow{2}[2]{*}{}} & \multicolumn{1}{p{7.5em}|}{Exiting pole + antenna sharing - 9000)} & \multicolumn{1}{p{7.5em}|}{Exiting pole + antenna sharing - 9000)} & \multicolumn{1}{r|}{} \bigstrut[b]\\ \cline{4-6} \multicolumn{3}{|c|}{} & \textbf{10,830} & \textbf{8,330} & With dual band antenna \bigstrut[t]\\ \hline \end{tabular}% \label{table_Capex_smallcell}% \end{table*}% \paragraph{Small-cells} The CapEx requirements for small-cells deployment with and without sharing options are presented in Table \ref{table_Capex_smallcell}. For the case of the sole operator, the costs of deploying a small-cell with a new pole compared to the cost for utilizing the existing street-furniture are presented. Moreover, for the case of sharing the small-cell poles between two operators, the cost comparison for new pole and street-furniture based deployment cases is also presented. For all four cases, the costs of design development of street-side pole, design and engineering aspects, civil work, power, new fibers, and RF-equipment items are discussed. Moreover, the anticipated sharing percentage of different items are also indicated. For the case of sole operator BSs (no active sharing), the CapEx requirements for 5G small-cell deployment is calculated to be \textsterling 19,160 and \textsterling 14,160 for the cases of new-pole and street-furniture utilization based implementations, respectively. For the model of cost-sharing between two operators, the CapEx requirements for 5G small-cell deployment is calculated to be \textsterling 13,830 and \textsterling 11,330 for the case of new-pole and street-furniture utilization based deployments, respectively. The costs are for single-band antenna BSs, whereas, the dual-band antenna based BSs deployment costs are also indicated. To achieve the cost reduction offered by these models, the assessment of characteristics of available street furniture and public infrastructure in the UK for their capacity to hold extra weight, requisite height compliance, wind sustainability, neighborhood infrastructure availability, and suitability in terms of OpEx is essential. In Table \ref{table_small_cell_charac}, the target range for small-cell deployment compared to the available range of the public infrastructure in the UK in terms of discussed critical parameters are presented. \begin{table}[t] \centering \caption{Characteristics of public infrastructure in the UK related to small cell deployment} \begin{tabular}{|p{10em}|p{5em}|p{9.0em}|} \hline \textbf{Parameter to consider} & \textbf{Target } & \textbf{Available range} \bigstrut\\ \hline\hline Height & 4 meter & 6 - 10m \bigstrut\\ \hline Weight bearing capacity & 7.5kg & 5 - 15kg \bigstrut\\ \hline Wind sustainability & 20km/h & 22km/h for continuous 10 minutes \bigstrut\\ \hline Neighbourhood (infrastructure distance) & 50 - 80m & 40 - 100m \bigstrut\\ \hline Opex & unknown & \textsterling 700 - 800 per pole per year \bigstrut\\ \hline \end{tabular}% \label{table_small_cell_charac} \end{table}% \subsection{Revenue and Data Flow Model} A shift in the attitude of the mobile service providers from transaction to relationship, marketing push to consumer pull, customer acquisition to customer retention, average revenue per user to average profit per user, intelligence in platform to intelligence in user equipment, investment infrastructure to leveraging key assets, and technology to content/data is presumed to arise. The drive for revenue generation from 5G technologies can be achieved by devising separate short- and long-term strategies. In the short-term, the existing practices can be potentially evolved to offer the necessary infrastructure for attractive 5G business models; e.g., Neutral Hosting for small-cell sites, etc. To this end, the active and passive infrastructure sharing may be vital to facilitate the initial rollout. There is also a need to thoroughly study the available avenues for further reducing both capital expenditures (CapEx) and operational expenditures (OpEx). However, with the advent of 5G features, the existing backbone revenue-generating services (e.g., voice and text messaging) may not stay as an attractive proposition for long. In the long-term, big data analytics and innovative new services based entirely new platforms for value extraction may be strongly be required to build prevailing business models. The notable items for consideration under the CapEx head can be listed as RF design and planning, site engineering, cabinet/antenna, baseband radios, installation and swap, project management, software (SW) license, cell-site gateway, antennas, site acquisition, power, backhaul, network implementation, and system integration. The primary items under OpEx head can be arranged as site rentals, power supply, backhaul, annual fees (SW etc.), network optimizations, central operations, hardware (HW) maintenance, SW Maintenance, and support setup. To attain the optimized CapEx and OpEx for the 5G network rollout, the following multi-step way forward is suggested, \begin{itemize} \item Split the intended coverage area into small cells -- although the appropriate coverage can be attained with macro cell infrastructure. \item Use street furniture as possible infrastructure for small cells as the first option, followed by public and private buildings or rooftops and then telegraph poles if available. \item If possible, share antennas of the neighbouring spectrum at the same small cell site. \item Share fibre, power and other maintenance CapEx and OpEx. \end{itemize} There exist various strong synergies between infrastructure designs, business models, and revenue generation methods. Fig. \ref{fig_s4_revenue_flow} shows the primary landscape of revenue flow; where the consumer, network connectivity, and service providers act as the central elements of the ecosystem. The new market entrant are highlighted in gray color. The notable stakeholders and revenue-flow aspect are indicated in Table \ref{table_business_stakeholders}. The landscape of business is inscribed as infrastructure provider, connectivity provider, connectivity dependent services provider, and service consumers with mobility and connectivity. Examples of essential stakeholders, along with the crucial new entrants, are also quoted. There exist a substantial potential for the local authorities to become stakeholders in the business model by offering the public infrastructure as utilizable in the telecommunication setup deployments. The business model may adapt direct revenue sharing or utility-based incentives for inducing the local authorities into the future telecom ecosystem. The understanding of the potential benefits that the infrastructure sharing agreements can bring to the local authorities is also of critical importance for achieving long-term sustainability. \begin{figure}[t] \centering \includegraphics[width=0.84\columnwidth]{Reve_flow.jpg} \caption{A simplified new revenue flow landscape with consumer, connectivity and service provider 5G will promote}\label{fig_s4_revenue_flow} \end{figure} The proposed system model for data and revenue flow between different stakeholders is illustrated in Fig. \ref{fig_schematic_model}. A \emph{unified data special hub} may have two-way information and context flow with connection providers, advertisers, and companies with social research interests. The data-sharing may be protected with privacy and security suits. A controlled interface of applications developers to the data hub is critical in facilitating the development of advanced applications and indirect revenue flow, while also protecting the sanctity of the data. The application developers also require a two-way direct and in-direct revenue flow model with the partnership for gain share and data owners/generators, respectively. The partnership for gain share may be implemented as block-chain dependant facilitated through the direct revenue flow with application developers. The modeling and designing of the information-sharing platform between connection providers and data owners is another necessity to sanction the essential availability of data to the \emph{unified data social hub}. Information flow from advertisers to the data hub can run through corporate (Microsoft etc.) banners/advertisements while modeling a direct revenue flow mechanism between the two is also crucial. The companies with social research interest along with information sharing also need a revenue flow model to benefit from and to the unified data social hub. The proposed data economy-oriented business model indicates the potential commodification of data and data transactions along with low-cost physical infrastructure and spectrum. It can be foreseen that the 5G network will introduce significant disruption within the Telco business ecosystem. Although there are large investment saving, we also understand, and considerations need to be made that not owning the physical infrastructure by telecom service providers there are potential legal complexities to acquire the positions and installations of the equipment on these proposed locations. This is due to heterogeneous public or private ownership of these infrastructures, and it is challenging to make a standard legal framework and financial model to acquire these resources. However, if we make a cost-benefit analysis, this is still a viable route for success without making this 5G infrastructure building a huge question for public-private investors. \begin{table}[t] \centering \caption{The new-look; stakeholders and revenue-flow.} \begin{tabular}{|p{6.5em}|p{9em}|p{9em}|} \hline \textbf{Nature of business} & \textbf{ Stakeholder} & \cellcolor[rgb]{ .949, .949, .949}\textbf{New Entrant } \bigstrut\\ \hline \textbf{Infrastructure provider} & TowerCo (4 in the UK, one of them dominates the market) & \cellcolor[rgb]{ .949, .949, .949}Local Authority (LA) as neutral host with public infrastructure offer to MNO \bigstrut\\ \hline \textbf{Connectivity provider} & MNOs (4 in the UK) & \cellcolor[rgb]{ .949, .949, .949} Private network, community networks, micro operator with cheap infrastructure and spectrum \bigstrut\\ \hline \textbf{Connectivity dependent service provider} & Social networks (Facebook, Google, Uber etc) & \cellcolor[rgb]{ .949, .949, .949} Federated private networks/ SME's providing data as a services decision as a service. \bigstrut\\ \hline \textbf{Service consumer with Mobility and Connectivity} & User & \cellcolor[rgb]{ .949, .949, .949}Independent user/ SME's consuming data as a services decision as a service. \bigstrut\\ \hline \end{tabular}% \label{table_business_stakeholders} \end{table}% \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{Proposed_Model.jpg} \caption{Proposed System Model for Data and Revenue Flow.} \label{fig_schematic_model} \end{figure} \subsection{Future Recommendations} In the following, we provide some recommendations towards accelerating the 5G deployment process and reducing its cost. \begin{enumerate} \item The local authority-owned street furniture and other associated public infrastructure assets form the strongest possible set of candidate infrastructure assets for 5G deployment. This provides Local Authorities with potential opportunities for creating new direct or indirect streams of revenue generation. \item Considering the currently available radio technology and existing roadside infrastructure, it is possible to continue with the current models of active and passive infrastructure sharing. \item Neutral Hosting may potentially disrupt the current models of TowerCo business oligopoly. \item Data as a service and decision as a service is to be one of the prime revenue generating services to corporate and retail consumers for the 5G's success. \item MNOs are required to adopt a harmonised co-existence with micro-operators, community network, and other private networks. \item The success of federated private networks will introduce the potential of distributed web, a way forward to redefine the internet. \end{enumerate} \section{Conclusion}\label{Sec_4} A thorough analysis of the potential long- and short-term transformative impacts anticipated from the 5G rollout has been conducted in this paper. The huge anticipated cost of 5G deployment is one of the major barriers in fully receiving the benefits from the innovative 5G communication technologies. Moreover, the lack of confidence of the MNOs on the revenue generation opportunities and existing business models is a primary determinant restraining them from investing the requisite deployment cost. To this end, the sharing of network infrastructure, public infrastructure, radio spectrum, and data are recommended as potential measures to reduce the deployment, operational, and maintenance costs as well as to develop a marketable 5G business model. The local authorities can potentially avail this opportunity to become direct or indirect partners in the telecommunication business model by offering the provisions of sharing the public infrastructure (street furniture, public buildings, etc.) for 5G deployment. A data sharing based value generation model as a long-term 5G business solution has also been proposed in this manuscript. The barriers in the sharing of data have been highlighted. Moreover, the concerns associated with data privacy and security, along with their potential solutions, have also been studied. Based on the proposed resolutions, a 5G testbed environment-based case study for a typical UK city has been conducted. It has been concluded that public infrastructure sharing can potentially contribute to a reduction of 40-60\% in the deployment cost compared to the anticipated cost. In addition, the location-based shared spectrum licensing and proposed data value generation based long-term sustainable business model have been shown to help in further reducing the CapEx and OpEx significantly. Based on the conducted case study and analysis, a list of recommendations is proposed to reduce the 5G deployment cost and encourage the business. \bibliographystyle{IEEEtran}
\section{INTRODUCTION} \par As one of the most important materials on earth, water has an enormous impact on life. The unique functionalities of water lie in its liquid structure as depicted by the H-bond network. In this nearly tetrahedral structure, water molecules on neighboring sites are attracted by highly directional H-bonds, which constantly break and reform under thermal fluctuations at ambient conditions. Not surprisingly, the fundamental understanding of liquid water properties is at the center of scientific interests \cite{swartz_ab_2013,thamer_ultrafast_2015,kim_maxima_2017,Debenedetti_chemical_2017,chen_hydroxide_2018}. \par Advanced experimental methods, such as scattering \cite{soper_radial_2013,skinner_benchmark_2013} and spectroscopy \cite{fransson_x-ray_2016} techniques, have been developed and applied to detect the nature of H-bond in water. In particular, the infrared (IR) spectroscopy provides a unique probe, in which both molecular configuration and its dynamics dielectric response can be inferred from the measured spectra \cite{brubach_signatures_2005,auer_hydrogen_2007}. In the IR spectrum, four main spectral features have been identified in experiments. Located in the relatively higher frequency range, the stretching and the bending bands can be traced back to the molecular vibrations in water vapor, which are strongly modified due to the presence of H-bond network in condensed phase. On the other hand, the libration and the hindered translational bands with lower frequencies originate from the collective motion of water molecules in the H-bonded network. Therefore, such vibrations have no counterparts in a single molecule. \par $Ab$ $initio$ molecular dynamics (AIMD) simulation provides an ideal theoretical framework to study the IR spectra in water from first principles \cite{car_unified_1985}. In AIMD simulations, water structures can be modeled by AIMD trajectories at finite temperatures, in which the forces acting on nuclei are obtained by the electronic ground state determined by the density functional theory (DFT) \cite{hohenberg_inhomogeneous_1964,kohn_self-consistent_1965}. The direct calculation of IR spectrum is allowed by the advent of modern theory of polarization given by the Berry phase formulation for extended systems \cite{king-smith_theory_1993}. The detailed dynamics dipolar correlation and its dependence on the H-bond network were further revealed later \cite{sharma_intermolecular_2005}, The above were facilitated by a rigorous decomposition of overall polarization onto the electric dipoles belonging to individual water molecules based on maximally-localized Wannier functions (MLWFs) \cite{marzari_maximally_2012}. \par Despite the above progress, difficulties remain when the computed IR is compared with available experiments. It is recognized that the accuracy of the predicted water structure depends on the level of adopted exchange-correlation functional in DFT. For the simulations of water, the GGA \cite{perdew_generalized_1996} is widely applied. However, the GGA functional significantly overestimates the H-bonding strength as well as the polarizability of water, which is evidenced by the large red shift ($\sim$200 cm$^{-1}$) \cite{sharma_intermolecular_2005, chen_role_2008} of the computed stretching band compared to the experimental data. The above deficiency is partially due to the inherited self-interaction error. As a result, one electron state applies a spurious electrostatic interaction on itself \cite{perdew_self-interaction_1981}. By mixing a fraction of exact exchange, recent simulations showed that the underestimated stretching band in IR spectra of water can be largely improved by the PBE0-based AIMD simulation \cite{zhang_first_2011}. However, the application of hybrid DFT based AIMD demands significantly increased computational cost. Due to this reason, the available AIMD trajectories were relatively short, and the statistics was limited. Moreover, all the conventional functional approximations at the GGA level lack the description of long-range van der Waals (vdW) interactions. The long-range vdW is the key physical factor behind the larger mass density of water than that of ice \cite{zhang_structural_2011,chen_ab_2017}. Even in the canonical (NVT) ensemble, where the density of water is fixed to the experimental value at ambient conditions, the vdW inclusive AIMD simulation was found to have large effects on the water structure, which can be seen by the enhanced population of water molecules in the interstitial region \cite{schmidt_isobaricisothermal_2009,hermann_first-principles_2017}. It is accepted that the long-range vdW interaction has relatively small effect on the directional H-bonding. However, water molecules in the interstitial region are expected to be weakly bonded or non-bonded. So far, it is unclear whether or not the increased fluctuation of water molecules in the interstitial region will affect the overall IR spectra in a nontrivial way. Clearly, an improved modeling of the water structure and its dynamics via the DFT approach is prerequisite to answer the above questions. \par To address the above issues, we compute the IR spectrum of water from a systematically improved modeling of liquid water by the SCAN \cite{sun_strongly_2015} meta-GGA functional. The IR spectrum computed from the conventional PBE-GGA \cite{perdew_generalized_1996} AIMD trajectory is also presented here for comparison. By satisfying all the seventeen known exact constraints on the semi-local functional, the recently developed SCAN functional presented a greatly improved description in both covalency in water cluster \cite{sun_accurate_2016} and H-bond network in liquid water and ice \cite{chen_ab_2017,zheng_structural_2018}. Consistently, our computed IR spectrum based on SCAN-AIMD shows a significant improvement over the entire spectral range compared to the spectrum generated from conventional PBE-GGA functional. The red frequency shift and overestimated amplitude of the stretching band obtained with the PBE-GGA functional are largely corrected by the improved directional H-bonding strength. By using the MLWFs as basis, the increased population of water molecules in the interstitial region is found to be anticorrelated which partially contributes to the decreased spectral amplitude towards the measured IR spectrum. The better agreement of the bending band frequency can be mainly attributed to the improved description of covalency of water molecules. On the other hand, the blue shift of the libration modes towards the experimental direction is correlated to the improved prediction of dynamical property in water. \section{METHODS} \label{part2} \par We computed the IR spectra of liquid water based on trajectories from Car-Parrinello molecular dynamics \cite{car_unified_1985} using the Quantum Espresso package \cite{Giannozzi_advanced_2017}. The PBE and SCAN exchange-correlation functionals were used. Norm-conserving pseudopotentials \cite{hamann_optimized_2013} were adopted with an energy cutoff of 85 Ry. All simulations were carried out in a periodically cubic box with side lengths of 23.57 Bohr ($12.47$ \r{A}), and 64 D$_2$O molecules were included in the box. The time step was set to 2 a.u. ($\sim$0.048 fs), with electron mass as 100 a.u.. The temperature was set to 330 K and the Nos\'e-Hoover thermostat \cite{nose_unified_1984,hoover_canonical_1985} was adopted with the canonical ensemble. The 30 K increases to ambient temperature are applied to roughly mimic nuclear quantum effects on liquid structures, especially the oxygen-oxygen pair distribution function, and be consistent with previous studies\cite{Morrone_nuclear_2008,chen_ab_2017}. All simulations were run for more than 50 ps. In addition, we carried out ground-state DFT calculations for water monomer in a cubic box with cell lengths being 30 Bohr (15.88 \r{A}), using both SCAN and PBE with an energy cutoff of 250 Ry, to calculate the vibrational frequencies. \par The IR spectra of liquid water are computed based on the IR absorption rate in terms of the total dipole moment. The formula \cite{mcquarrie_statistical_2000} is derived using the Fermi's golden rule and Poynting vector with a classical approach \cite{bader_quantum_1994} applied, where we treat the quantum time correlation function classically: \begin{equation} \label{eq_ir} \alpha(\omega)n(\omega) = \frac{2\pi\beta\omega^2}{3cV} \int_{-\infty}^{+\infty} dt{e}^{-i\omega t} \langle M(0)M(t) \rangle \end{equation} where $\alpha(\omega)$ is the light absorption coefficient per unit depth as a funcition of the frequency $\omega$, $n(\omega)$ is the refractive index, $\beta = (k_BT)^{-1}$ with $k_B$ and $T$ being the Boltzmann factor and temperature, respectively. The total dipole moment $M$ in the simulation cell is computed via the formula: $\sum_{i=1}^{n}\mu_i$, where the molecular dipole moment of the $i$th water molecule $\mu_i$ can be calculated via the position of nuclei and corresponding Wannier centers. Furthermore, we adopted a gaussian window \cite{harris_use_1978} in the form of $e^{-t^2/2\alpha^2}$ with $\alpha=0.5$ ps, when the discrete Fourier transform in Eq. \ref{eq_ir} is performed. \section{RESULTS and DISCUSSIONS} \label{sis} \begin{figure}[h] \centering \includegraphics[width=\columnwidth]{IR.pdf} \caption{(Color online) IR spectra of liquid water obtained from AIMD simulations in the NVT ensembles. The experimental data are from Refs. \onlinecite{max_isotope_2009} at room temperature. Labels $\nu_T$, $\nu_L$, $\nu_B$, and $\nu_S$ correspond to translation, libration, DOD bending, and OD stretching peaks, respectively. } \label{fig1} \end{figure} \par As shown in Fig. \ref{fig1}, we present the theoretical IR spectra generated by SCAN-AIMD and PBE-AIMD trajectories. For comparison, the experimental spectrum is also shown. Four main dipole correlated vibrational bands can be identified in Fig. \ref{fig1}, whose characteristics belong to the hindered translation (T), libration (L), deuterium-oxygen-deuterium (DOD) bending (B), and the oxygen-deuterium (OD) stretching (S) modes with increasing frequencies. The IR spectrum computed from SCAN-AIMD shows a significantly improved accuracy comparable to that computed with the hybrid DFT functional \cite{zhang_first_2011}, in which the better agreement with the experiment can be seen in both the spectral positions and spectral shape. The peaks of the above four bands, calculated by SCAN-AIMD, are centered at $\nu_T$=172 (186) cm$^{-1}$, $\nu_L$=483 (486) cm$^{-1}$, $\nu_B$=1207 (1209) cm$^{-1}$, $\nu_S$=2448 (2498) cm$^{-1}$. In comparison, the same bands obtained from PBE-AIMD are predicted to be centered at $\nu_T$=207 (186) cm$^{-1}$, $\nu_L$=572 (486) cm$^{-1}$, $\nu_B$=1174 (1209) cm$^{-1}$, and $\nu_S$=2233 (2498) cm$^{-1}$ respectively. In the above, the values presented in the parenthesis are taken from experiment \cite{max_isotope_2009}. In particular, the improvement by SCAN in the positions of the liberation and stretching modes is significant, which can be seen by the frequency shift of $\sim$100 and $\sim$200 cm$^{-1}$ respectively. At the same time, the spectral shape is also largely improved towards the experimental direction as clearly evidenced by the reduced intensity in the stretching band over 30\%, which is severely overestimated at the PBE level. \begin{table}[t] \centering \caption{Water monomer (D$_2$O) vibration frequencies in cm$^{-1}$. (Subscripts $b$,$ss$, and $as$ stand for bending, symmetric stretching, and anti-symmetric stretching modes, respectively.)} \label{vf} \begin{ruledtabular} \begin{tabular}{p{0.23\columnwidth}<{\centering}p{0.23\columnwidth}<{\centering}p{0.23\columnwidth}<{\centering}p{0.23\columnwidth}<{\centering}} Methods&$\nu_b $&$\nu_{ss}$&$\nu_{as}$\\ \hline SCAN&1193&2710&2832\\ PBE&1162&2660&2770\\ EXP \cite{benedict_rotationvibration_1956}&1206&2784&2889\\ \end{tabular} \end{ruledtabular} \end{table} \par The OD stretching band originates from the molecular vibrations in water vapor (gas) phase. Based on the C$_{2v}$ point group symmetry of water monomer, these vibrations can be further categorized as symmetric and anti-symmetric eigen modes with a slightly higher frequency of the later in experiments. Under the development of stretching modes, the covalent bond is elongated with a tendency towards dissociation, which also directly modifies the electric dipole of water molecules. Not surprisingly, the stretching band in the IR spectra not only locates at the highest frequency range but also has the most prominent spectral intensity among the four IR spectral features. At the PBE level, the frequencies of both symmetric and anti-symmetric modes in gas phase are underestimated over $\sim$4\% compared to experiment as shown in Table \ref{vf}, which is consistent with the previous calculations \cite{zhang_first_2011}. Compared to PBE, the SCAN functional predicts better stretching frequencies in water gas phase with improvement of $\sim$2\% towards experiment as shown in Table \ref{vf}. The above can be attributed to the improved prediction of covalency in water monomer. Indeed, the better agreement with experiments by SCAN functional in terms of bond angle, bong length, and binding energies in single water molecule and water clusters in gas phase have been widely recognized recently \cite{sun_accurate_2016,zheng_structural_2018}. \par In the liquid phase, the difference between symmetric and anti-symmetric modes is smeared by the disordered environment and the stretching band is formed. Moreover, the H-bond, represented by the weak attraction of a proton to the oxygen lone pair of the neighboring molecules, also facilitates the elongation of OH bonds as shown by the red shift of the stretching vibration by $\sim$300 cm$^{-1}$ in liquid compared to the corresponding vibration in vapor phase as measured experimentally in Fig. \ref{vapor} (a). However, due to the significant overestimation of the H-bond strength by PBE functional, the stretching frequency of liquid water is predicted to be $\sim$500 cm$^{-1}$ lower than that of water in vapor phase. The artificially strengthened H-bond by PBE also leads to the overestimated dipole-dipole correlation in the H-bond network as evidenced by the much greater IR spectral intensity than the experimental spectrum in Fig. \ref{fig1}. In sharp contrast, the IR spectrum computed by SCAN functional shows a significantly better agreement in the above aspects. We attribute this improvement to the more accurate H-bond structure as well as dynamical correlation described by SCAN functional. \begin{figure}[t] \centering \includegraphics[width=0.7\columnwidth]{wv_stretching.pdf} \includegraphics[width=0.7\columnwidth]{wv_bending.pdf} \caption{(Color online) (a) Stretching frequency $\nu_S$ and (b) bending frequency $\nu_B$ of single water molecule (vapor) and liquid water as compared using SCAN, PBE, and experiment data (EXP) of vapor \cite{benedict_rotationvibration_1956} and liquid water \cite{max_isotope_2009}. (Note that symmetric stretching frequency $\nu_{ss}$ and anti-symmetric stretching frequency $\nu_{as}$ are listed separately for water vapor.)} \label{vapor} \end{figure} \begin{figure*}[!t] \centering \includegraphics[width=0.99\columnwidth]{rdf_OO_pbe.pdf} \includegraphics[width=0.99\columnwidth]{rdf_OO_scan.pdf} \includegraphics[width=0.99\columnwidth]{IR_spactial_pbe.pdf} \includegraphics[width=0.99\columnwidth]{IR_spactial_scan.pdf} \caption{(Color online) Oxygen-oxygen pair distribution functions and the corresponding spacial decompositions by (a) PBE and (b) SCAN functionals compared with X-ray diffraction experiment \cite{skinner_benchmark_2013}. Intramolecular ${\rm IR_{self}}$ (red dotted lines) and spacial intermolecular ${\rm IR_{1st}}$ ${\rm IR_{inters.}}$, and ${\rm IR_{\geq 2nd}}$ (colored dashed lines) contributions to the calculated IR spectra (black solid lines) using (c) PBE and (d) SCAN in the NVT ensemble. Decompositions of ${\rm IR_{inters.}}$ into non H-bonded (dashed lines) and H-bonded (solid lines) water contributions are shown as insets in (c) and (d).} \label{fig3} \end{figure*} \par In order to elucidate the spectral signatures of liquid structure, we further decompose the overall spectrum into contributions from different ranges in the H-bond network. Based on the method introduced by Chen et al. \cite{chen_role_2008}, the total dipole correlation function in the temporal domain of Eq.(\ref{eq_ir}) can be rewritten as the sum of a correlation function of any pair of water molecules as $\langle M(0)M(t)\rangle(r_1,r_2)=\langle\sum_{i,j}\mu_i(0)\mu_j(t)\rangle$. In the above, the electronic and ionic contributions of dipole moment $\mu_i$ and $\mu_j$ of water molecules at any time $t$ are rigorously determined by the Wannier centers and the ionic coordinates respectively, both of which are generated on the fly in the AIMD simulation. Therefore, the spectrum can be divided into intramolecular ${\rm IR_{self}}$ ($i=j$) and intermolecular ($i\neq j$) parts \cite{sharma_intermolecular_2005}. In current work, we further divide the intermolecular part into spectral contributions from the first coordination shell ${\rm IR_{1st}}$, water in the interstitial region ${\rm IR_{inters.}}$, and water from the second shell and beyond ${\rm IR_{\geq 2nd}}$\footnote{In order to sample the angular distribution uniformly while calculating the IR spectra of second shell and beyond region. We apply an upper limit of the correlated distance as half of the box length.}, respectively based on the distance $r_{ij}$ between the molecule pairs as illustrated in Fig. \ref{fig3} (a) and (b). The criterion for interstitial region is chosen to be $3.10$ \r{A} $\leq r_{ij} < 4.00$ \r{A} in SCAN and $2.96$ \r{A} $\leq r_{ij} < 3.91$ \r{A} in PBE, where the oxygen-oxygen pair distribution function ${\rm g_{OO}}(r)$ is less than 1 between the first and second peaks. In the decomposition, water molecules are considered as H-bonded if the O-O distance is less than 3.5 \r{A} and the OOD angle is less than 30$^{\circ}$\cite{luzar_hydrogen-bond_1996}. The resulting spectral decompositions and the corresponding ${\rm g_{OO}}(r)$ are shown in Fig. \ref{fig3} for both PBE and SCAN functionals. \par Dynamically, the stretching mode not only modifies the electric dipole of the water molecule under vibration, but also strongly polarizes the surrounding water molecules via the H-bonds. Therefore, the stretching band of IR spectrum is dominated by both ${\rm IR_{self}}$ and ${\rm IR_{1st}}$ contributions. Such effect has been well captured by both SCAN and PBE functionals which can be seen by the large and comparable intensities from these two decompositions. In the above, the ${\rm IR_{self}}$ has a slightly higher frequency than that of ${\rm IR_{1st}}$. It is not surprising since the ${\rm IR_{1st}}$ is more sensible to the H-bond network, while the ${\rm IR_{self}}$ is instead more affected by the intrinsic vibration of water monomer. However, the IR spectrum from PBE functional suffers from clear drawbacks. Compared to the experimental measurement, the ${\rm g_{OO}}(r)$ is significantly over-structured with a shorter first peak position than experimental measurement, indicating the overestimated H-bond strength, as shown in Fig. \ref{fig3} (a). As a result, the stretching band of IR spectrum computed at the PBE level is centered at a much lower frequency of 2233 cm$^{-1}$ with a much higher intensity in comparison to experimental measurements. It is consistent with the fact that PBE predicts the proton to be more delocalized and easier to be donated to the neighboring water molecules than it should be. Such a severely overestimated directional H-bond strength is largely improved by SCAN functional, which can be seen by the less structured coordination shell and increased distance of the first peak in ${\rm g_{OO}}(r)$, as shown in Fig. \ref{fig3} (b). The softer H-bond network towards the experimental direction also generates a less polarizable liquid water, as indicated by the predicted average electric dipole by SCAN (2.95 $\pm$ 0.28 D) being much closer to the experimental reference (2.9 $\pm$ 0.6 D) \cite{badyal_electron_2000} than that of PBE (3.22 $\pm$ 0.29 D). As expected, the stretching mode in the less polarizable medium becomes harder and shifts the stretching band center to a higher frequency at 2448 cm$^{-1}$ as well as reduces intensities mainly from both ${\rm IR_{self}}$ and ${\rm IR_{1st}}$. \par The dynamical polar correlation from stretching vibration decays rather rapidly for water molecules separated by a distance further away from the first coordination shell, which are qualitatively similar for both PBE and SCAN predictions as shown in Figs. \ref{fig3} (c)(d). Indeed, it is consistent with the weaker structural correlations in the radial distribution ${\rm g_{OO}}(r)$ beyond the first peak in Figs. \ref{fig3} (a)(b). However, the drawbacks can be still identified due to the over-structured liquid water by PBE functional. On the one hand, the spectral contribution from water in the second shell and beyond ${\rm IR_{\geq 2nd}}$ is predicted to have a higher intensity in PBE than that from SCAN. On the other hand, due to the artificially strengthened H-bond strength, most water molecules in the interstitial region are still H-bonded to the central molecule under stretching motion, giving rise to the positively spectral intensity in the insert of Fig. \ref{fig3} (c). However, the opposite trend is observed in the prediction by SCAN functional, in which the water molecules in the interstitial region are mostly non-bounded with the observed anti-correlation as seen by the negative spectral intensity in the insert of Fig. \ref{fig3} (d). It should be noted that the increasingly populated water molecules in the interstitial region should be attributed to the intermediate range vdW interactions captured by SCAN function, which is found to be the key physical effect in predicting a higher mass density of water than that of ice \cite{chen_ab_2017}. With the weaker dipole correlations from water molecules beyond the first coordination shell that correctly predicted by SCAN functional, the overestimated IR spectral intensity by PBE is further reduced towards the experimental direction. \par Moreover, a shoulder around $\sim$2300 cm$^{-1}$ on the left-hand side of the peak is identified in the stretching band in experimental spectra of water. According to recent theoretical analyses\cite{kananenka_fermi_2018,hunter_disentangling_2018}, this shoulder feature is attributed to the so-called Fermi resonance which describes the spectral enhancement due to the intramolecular vibrational coupling between the OD stretching mode and the overtone of bending mode. At both PBE and SCAN levels of studies, the shoulder appears roughly at the same position around 2300 cm$^{-1}$. This is not surprising since the bending overtone in this frequency range carries twice the frequency of water bending motion, and both PBE and SCAN yield a reasonably accurate bending frequency around 1200 cm$^{-1}$. Nevertheless, the relative position of the Fermi resonance shoulder feature is misplaced, which shows a blue shift appearing on the right-hand side of the stretching peak in the IR spectroscopy at PBE level in Fig. \ref{fig1}. In sharp contrast, as the SCAN functional accurately predicted the OD stretching frequencies, the shoulder emerges clearly as shown in Fig. \ref{fig1}. At the same time, more pronounced enhancement of IR spectral amplitudes is observed for ${\rm IR_{self}}$ and ${\rm IR_{1st}}$ in the above frequency region for the spectral by SCAN. The above is exactly consistent with intramolecular vibrational coupling nature of the Fermi resonance\cite{kananenka_fermi_2018,hunter_disentangling_2018}. \par Among the four spectral features, the bending band has the second largest frequency centered at around 1200 cm$^{-1}$, which originates from the bending mode of water monomer. Under the bending mode, the DOD bonding angle is modulated, which in turn changes the electric dipole of the molecule, but with a much weaker coupling strength than stretching mode. Not surprisingly, the resulting spectral intensity is also smaller than the stretching band. In vapor phase, the frequency of the bending mode is underestimated by $\sim$4\% at PBE level, while the calculation by SCAN functional gives rise to a much more accurate value with an error of $\sim$1\% compared to experiment at 1206 cm$^{-1}$ in Table \ref{vf} and Fig. \ref{vapor} (b). Clearly, such a significant improvement should be again attributed to the better description of the covalency by SCAN. Indeed, the bonding angle and bonding length of water monomer are respectively found to be 104.4$^{\circ}$ (104.5$^{\circ}$) and 0.961 \r{A} (0.957 \r{A}) by SCAN, showing a large improvement over the PBE functional of 104.2$^{\circ}$ and 0.970 \r{A} as compared to the experimental values in the parenthesis \cite{sun_accurate_2016}. \par In condensed phase, the bending band instead of discrete levels is formed by the disordered liquid structure. According to the spectral decompositions in Figs. \ref{fig3} (c)(d), the bending band is mainly contributed by the intramolecular contribution and the first coordination shell. In particular, the water molecules in the first coordination shell provide a large negative spectral intensity resulting from its anti-correlation in nature. It is not surprising since the protons under bending mode move along the normal direction of H-bond. Therefore, the development of bending vibration needs to overcome the energy to break the H-bond and generate out-of-phase dynamical dipole correlation \cite{chen_role_2008}. As a result, unlike the stretch band, the presence of H-bond network in liquid water impedes the bending mode resulting in a slightly increased frequency relatively to that in water vapor in experiment. Such a feature has been qualitatively predicted in both PBE and SCAN functionals. Clearly, the frequency difference is still overestimated by roughly the similar magnitude for both functionals. The deficiency is likely due to the self-interaction error inherited in both GGA and meta-GGA functionals resulting in the delocalized protons that are more easily to be donated to neighboring oxygen atom. \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{RCF1.pdf} \caption{(Color online) First order rotational correlation functions of liquid water obtained from AIMD simulations with SCAN (red dashed line) and PBE (blue dotted line) in the NVT ensembles. The inset shows enlarged rotational correlation functions in the first 0.2 ps.} \label{fig5} \end{figure} \par In the far-infrared region in Fig. \ref{fig1}, the two spectral features in a rather broad distribution are associated with the collective vibrations on the H-bond network, which emerge in the condensed phases such as ice and water. The feature at the higher frequency branch around $\sim$500 cm$^{-1}$ is attributed to the libration mode. Depicted by water libration, the water molecules undergo hindered rotational motions restricted by the presence of H-bond network. Therefore, such spectral signal is absent in the water vapor since it is free to rotate an isolated molecule. Like the bending motion, water molecules under libration also needs to overcome the energy barrier by breaking H-bonds. Consistently, the spectral decomposition from intramolecular and first coordination contributions are dominant, in which the latter is characterized by the anti-correlation with negative spectral intensities as shown in Figs. \ref{fig3} (c)(d). Because of the over-structured H-bond network, the frequency of the libration motion is exaggerated $\sim$20\% by PBE functional, centered at 572 cm$^{-1}$. The less structured liquid water modeled by the SCAN functional eases the water libration at 483 cm$^{-1}$, matching accurately the experimental data at 486 cm$^{-1}$. Because the direction of water polarity aligns along HOH angular bisector, the hindered water rotation is also highly associated with dynamical properties such as the rotational diffusion constant and rotational relaxation time which is accessible to experiments. The relaxation time $\tau_n$ is obtained by fitting with $e^{-t/\tau}$ to the $n$th order rotational correlation functions, which are defined by the time correlation function \unexpanded{$C_n(t) = \left \langle P_n[\boldsymbol{\hat{u}}(0)\boldsymbol{\hat{u}}(t)] \right \rangle$}. Here $P_n$ is the $n$th Legendre polynomial and $\boldsymbol{\hat{u}}$ is the in plane unit vector along the symmetry axis of a water molecule. To this end, we compute the first order rotational correlation function $C_1(t)$ and the corresponding relaxation time $\tau_1$ based on trajectories from both PBE and SCAN functionals as shown in Fig. \ref{fig5}. It should be noted that features at the beginning of rotational correlation function around 0.066 and 0.062 ps, magnified in the inserts of Fig. \ref{fig5}, are corresponding to the libration motion that have been observed in the frequency domain in Fig. \ref{fig3}. As time passes, the rotational correlation decays in both trajectories giving rise to the relaxation time $\tau_1$. Under the Debye's model, the relation between relaxation time $\tau_n$ and the rotational diffusion constant $D_R$ takes the form of $\tau_n = 1/[n(n+1)D_R]$. In the above, the rotational diffusion constant $D_R$ is given by the inverse of $\tau_1$, which is measured to be 2.0-7.5 ps \cite{laage_molecular_2008}. Clearly, the over-structured water model by PBE functional hampers the rotation motion and predicts an unphysically long relaxation time $\tau_1$=$20.91(\pm0.22$) ps with the corresponding small rotational diffusion constant $D_R$=0.047 ps$^{-1}$. In sharp contrast, the less structured water modeled by SCAN functional largely facilitates the water rotation and gives rise to much more reasonable values of $\tau_1$=$4.08 (\pm 0.02$) ps and $D_R$=0.24 ps$^{-1}$, respectively. The result consists with previous studies on diffusion coefficient\cite{zheng_structural_2018}. As a conclusion, the modified libration peak from the SCAN functional indicates an improved description of the diffusion related dynamics in liquid water. \par In the gas phase, the water molecule is free to undergo a translation motion in space. In liquid, water molecules however undergo hindered translation constrained by the H-bond network, which is depicted by the lower branch feature of the far-infrared band centered at $\sim$200 cm$^{-1}$ in Fig. \ref{fig1}. Similar to the stretching mode, the spectral decomposition in Fig. \ref{fig3} shows that the IR signals are mainly contributed by the dynamical correlation from intramolecular contribution and molecules in the first coordination shell, which is consistent with the first-principles studies of Chen et al \cite{chen_role_2008}. Unlike the stretching mode that is directly coupled to the electric dipole, the dynamical correlation here is generated by the induced dipole-dipole interaction under the hindered translation motion \cite{guillot_molecular_1991}. Therefore, the intensities of hindered translation are much weaker than those in the stretching band as shown in Fig. \ref{fig3}. Not surprisingly, the artificially overstructured liquid water predicted by PBE functional overestimates the energy barrier cost of hindered translation, which is evidenced by an overestimated peak position at 207 cm$^{-1}$, compared to the experimental value of 186 cm$^{-1}$. On the other hand, the less structured liquid water model by SCAN functional facilitates the water translation with a slightly underestimated value of 172 cm$^{-1}$. \par It is well accepted that the liquid water structure under PBE prediction is ice-like which is not only over structured but also sluggish that barely diffuses in space. As a result, the overall shape of the libration and hindered translation band is also ice like under the PBE prediction as shown in Fig. \ref{fig1}. In the above, the distinction between the two modes is exaggerated by the rather deep minimum with a frequency gap around 370 cm$^{-1}$. Indeed, in the crystalline ice, the libration and hindered translation are two distinct spectral bands, which are separated completely with frequencies of 640 cm$^{-1}$ and 222 cm$^{-1}$ in experiment \cite{eisenberg_structure_2005}, respectively. Strikingly, the above ice-like error is mostly corrected in the spectrum modeled by SCAN functional. For a liquid water structure that is more softened and disordered towards the experimental direction, the distinction between libration and hindered translation is also smeared as shown in Fig. \ref{fig1}. \section{CONCLUSION} \par In conclusion, we have performed careful and comparative first-principles molecular dynamics studies on the IR spectra of liquid water obtained by SCAN meta-GGA and PBE GGA functionals. Our results showed the SCAN meta-GGA functional provides significant improvements on all four peaks in the IR spectra, compared to those obtained by PBE. Our analysis demonstrate that the SCAN functional models water more precisely on both molecular and liquid levels, and gives better descriptions of electronic structure, range dependent correlations, and dynamical properties. On one hand, SCAN reaches the accuracy level of the IR spectra obtained by PBE0 hybrid functional \cite{zhang_first_2011}, with a relatively low computational cost. On the other hand, one may expect that the hybrid functional SCAN0 mitigates the self-interaction error in DFT, and brings the calculated IR spectra closer to the experiments. Furthermore, recent studies \cite{Ceriotti_nuclear_2013,sun_electron-hole_2018,hunter_disentangling_2018} suggested that nuclear quantum effects due to light protons play a crucial role in obtaining accurate liquid water properties. The role played by quantum nuclei awaits the future investigation which is likely to broaden the spectral features and slightly reduce the frequencies of stretching band due to the delocalized protons. \begin{acknowledgments} \par This work was supported as part of the Center for the Computational Design of Functional Layered Materials, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Basic Energy Sciences under Award No. DE-SC0012575. X. Wu is partially supported by National Science Foundation through Awards No. DMR-1552287. The computational work used resources of the National Energy Research Scientific Computing Center (NERSC), a U.S. Department of Energy Office of Science User Facility operated under Contract No. DE-AC02-05CH11231. And this research includes calculations carried out on Temple University's HPC resources and thus was supported in part by the National Science Foundation through major research instrumentation grant number 1625061 and by the US Army Research Laboratory under contract number W911NF-16-2-0189. \end{acknowledgments}
\part{title} \usepackage{tabularx} \begin{document} \title{Complex hybridization physics and evidence of structural anomaly to be a bulk property in an exotic Fe-based compound, CaFe$_2$As$_2$} \author{Ram Prakash Pandeya} \author{Arindam Pramanik} \author{Anup Pradhan Sakhya} \author{A. Thamizhavel} \author{Kalobaran Maiti} \altaffiliation{Corresponding author: <EMAIL>} \affiliation{Department of Condensed Matter Physics and Materials Science, Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai - 400 005, INDIA.} \date{\today} \begin{abstract} Surface of quantum materials often exhibits significantly different behavior than the bulk due to changed topologies and symmetry protections. The outstanding problem is to find out if the exoticity of a material is linked to the changed topology at the surface or it is a bulk property. Hard $x$-ray photoemission spectroscopy (HAXPES) is a significantly bulk sensitive technique (escape depth of valence electrons is about 40 \AA\ for 6 keV photon energy) and the probing depth can be tuned by changing the electron emission angle. Therefore, HAXPES is often used to reveal the surface-bulk differences in a material. Here, we show that the delineation of surface-bulk differences in the valence band spectral functions using this method is highly non-trivial due to the complexity arising from linear dichroic effect in addition to the change in surface sensitivity. We show that core level spectra can be used to reveal the surface-bulk differences in the electronic structure. The Ca 2$p$ spectra exhibit evidence of significant hybridization with the conduction electrons revealing their importance in the electronic properties of the system as also found for the charge reservoir layers in cuprate superconductors. The Fe 2$p$ core level spectra as a function of bulk sensitivity and temperature reveals an unusual scenario; while the surface electronic structure corroborates well with the observed phase transitions of the system, the bulk spectra exhibit signature of additional structural phases providing a rare evidence of structural anomaly to be a bulk property. \end{abstract} \pacs{73.90.+f, 68.35.bd, 71.45.Gm, 75.30.Fv, 79.60.Bm} \maketitle Study of high temperature superconductors continues to attract tremendous attention due to various unresolved longstanding puzzles in these materials important for both fundamental physics and technological applications. Most of these materials forms in layered structure separated by an insulating layer, which is often called charge reservoir layer.\cite{chargereservoir} It is believed that these layers play an important role to derive superconductivity via preserving two dimensionality of the system and protecting the conduction layers via screening various types of disorder, which is introduced to achieve suitable charge carrier density. Recently discovered Fe-based superconductors also form in effective two-dimensional structure with intermittent insulating layer and exhibit additional complexity in the physics of these systems. For example, CaFe$_2$As$_2$, a 122-type Fe-based material, forms in tetragonal structure at room temperature and undergoes a transition\cite{Ni} to orthorhombic-antiferromagnetic phase below 170 K breaking the $C_4$ rotational symmetry to $C_2$-symmetry, which is often referred as nematicity. One can preserve the $C_4$ rotational symmetry by application of a small pressure ($>$0.35 GPa), which is called collapsed tetragonal (cT) phase although long range magnetic order gets destroyed.\cite{Kreyssig,Goldman,Pratt,Goldman2} Interestingly, a recent study found evidence of cT phase bands even within the ambient electronic structure.\cite{Khadiza-ARPES} CaFe$_2$As$_2$ exhibits superconductivity at low temperatures under varied conditions such as application of external pressure, chemical substitution at any of the three sites and quenching of the sample after/or during the preparation of the sample.\cite{Milton,Ca1-xRxFe2As2-Yanpeng,CaFe2-xIrxAs2-Yanpeng,CaFe2-xRhxAs2-Yanpeng,Saha,Kazutaka,Chen,Zhao} All these processes lead to the suppression of magnetic order. Pressure induced superconductivity is often accompanied by cT phase that led to controversy on the link between superconductivity and non-magnetic cT phase; while some studies support this idea, there are contrasting views indicating absence of superconductivity in the cT phase.\cite{Yu} It appears that lack of hydrostaticity of the applied pressure have an important role in the superconductivity of CaFe$_2$As$_2$. On the other hand, non-hydrostaticity in EuFe$_2$As$_2$ reduces the superconducting transition temperature.\cite{EuFe2As2-pressure} Angle resolved photoemission spectroscopy (ARPES) studies of CaFe$_2$As$_2$ have been carried out using wide photon energy range (20-100 eV) to probe the near Fermi energy occupied electronic structure at different temperatures.\cite{KBM-Pramana,Ganesh-JAP,ARPES1} Since, the electron mean free path inside the material is around 10 \AA\ or lower in this photon energy range,\cite{surface} the ARPES measurements are highly surface sensitive. Therefore, it is not clear if anomalies observed in these materials are due to the complexity associated to the surface strain/reconstructions or it is a bulk phenomena. In order to address this outstanding puzzle, we employed hard $x$-ray photoemission spectroscopy (HAXPES) to study the electronic structure of CaFe$_2$As$_2$, which has significantly high bulk sensitivity.\cite{haxpes,SREP-Bi2Se3} We discover evidence of finite hybridization of the charge reservoir layer with the conduction states and unusual surface bulk differences involving the cT phase in the electronic structure. High quality single crystals of CaFe$_2$As$_2$ were grown by high temperature solution growth method using Sn flux.\cite{crystal,crystal2} The crystal structure and chemical composition of the sample were confirmed using $x$-ray diffraction and energy dispersive analysis of $x$-rays. Magnetic susceptibility measurements exhibit sharp transition at 170 K indicating good quality of the sample. The HAXPES measurements were carried out at the P09 beamline at Pettra-III DESY, Hamburg using Phoibos electron analyser from Specs GmbH. Experimental setup was optimized to achieve the best energy resolution; 200 meV energy resolution was found at a photon energy of 5947.5 eV, which was used for all the measurements. In order to change the bulk sensitivity, measurements were carried out at different polar angles with respect to the surface normal. Fermi level was derived using valence band spectrum of Au mounted in the electrical contact with the sample. The sample was cleaved in ultrahigh vacuum condition and the photoemission measurements were done at a vacuum of 2$\times$10$^{-10}$ Torr. Electronic structure calculation was carried out using density functional theory (DFT) following the full potential linearized augmented plane wave method as captured in Wien2k software.\citep{wien2k} The convergence to the ground state was achieved self-consistently using 1000 $k$-points within the first Brillouin zone. We have used the Perdew-Burke-Ernzerhof generalized gradient approximation (PBE-GGA) for the density functional calculations. \begin{figure} \vspace{-2ex} \includegraphics[scale = 0.45]{Fig1VB.eps} \vspace{-16ex} \caption{(a) Valence band spectra at temperatures 210 K (solid circles), 118 K (solid line) and 25 K (open circles) at normal emission (NE) and 60$^o$ angled emission angles. (b) 210 K spectra at normal emission (open circles) and 60$^o$ emission (solid circles) are superimposed. The thin line (NE) and thick line (60$^o$ emission) represent the calculated spectral function after considering the cross section due to linear dichroic and transition matrix element effects.} \label{fig1:VB} \end{figure} In Fig. \ref{fig1:VB}, we show the valence band spectra exhibiting a feature around 12 eV binding energy corresponding to As 4$s$ photoemission signal and five distinct features denoted by A, B, C, D and E. The spectra collected at different temperatures (25 K - 210 K) at a particular experimental geometry overlap with each other almost perfectly although the system has undergone a concomitant structural and magnetic transition at 170 K. However, the relative intensities of the features at different emission angles are significantly different. The intensity pattern is very different from that in the Al $K\alpha$ spectra too.\cite{Ganesh-JAP} Difference with Al $K\alpha$ spectrum is complex due to the change in photoemission cross section in addition to the surface sensitivity. The drastic change in spectral intensities due to change in emission angle that correspond to different surface sensitivity of the technique may arise due to the difference in surface and bulk electronic structures. From the electronic structure calculations and various ARPES studies, it is well known that the valence band in the vicinity of the Fermi level is constituted primarily by Fe 3$d$ states. Contributions from As 4$p$ states is large in 3 - 4 eV binding energies relative to that in the other energy regimes. The photoelectron cross-section \cite{cross-section} of Fe 3$d$ states is almost 10 times of the cross-section of As 4$p$ states for the photon energy range 27 - 100 eV. In the hard $x$-ray regime (photon energy $\sim$ 6-8 keV), Fe 3$d$ cross-section reduces to about one tenth of As 4$p$ cross-section. Therefore, in addition to high bulk sensitivity, the HAXPES is better to reveal the properties of the As 4$p$ states that has been found important due to significant covalency of these materials.\cite{Ganesh-FeTeSe,Kotliar-NPhys} The other concern is the linear polarization of the incident beam. A change in emission angle significantly changes the angle between orbital axis and the incident light polarization vector, thereby, changes the corresponding photoemission cross-section. In order to verify such dichroic effect in the photoemission spectra, we have calculated the electronic structure of CaFe$_2$As$_2$; these results are consistent with the published data.\cite{Khadiza-SREP} Photoemission cross-section of the partial density of states (PDOS) is calculated in the following way: (i) First, we calculated the polarization dependent matrix elements of each of the Fe 3$d$ and As 4$p$ orbitals for different emission angles. (ii) The results were multiplied by the corresponding PDOS. Fe 3$d$ and As 4$p$ orbital contributions are added separately. (iii) The Fe 3$d$ and As 4$p$ contributions were multiplied by the photoemission cross-section to include the radial integration part of the matrix cross section.\citep{cross-section} (iv) To compare with the experimental results, we have convoluted the calculated spectral functions with the Fermi-Dirac distribution function and Gaussian (FWHM = 200 meV) representing resolution broadening. The final results are shown in Fig. \ref{fig1:VB}(b). The simulated spectra at two different emission angles following this simple method reproduce{\bf s} the experimental scenario remarkably well. This suggests that the changes observed in the valence band spectra at different emission angles have large contribution from the linear dichroic effect in addition to the change in escape depth. The escape depth of the valence electrons in normal emission geometry of HAXPES ($h\nu \sim$ 6 keV) is close to 40 \AA\ and the bulk contribution in the normal emission spectra is about 86\% considering top 4 layers near the surface provide the upper limit of the surface layer thickness. At the emission angle of 60$^o$, the escape depth becomes 20 \AA, which is still quite large providing a bulk sensitivity of $\sim$74\%. All these observations suggest that it is difficult to probe the surface-bulk differences in the valence band of this material simply by changing the emission angle due to polarization induced effects. Change in photon energy is even more complex for such covalent system\cite{Ganesh-FeTeSe,Kotliar-NPhys} as it modifies the relative photoemission cross section of various constituent valence states significantly. \begin{figure} \includegraphics[scale = 0.4]{Fig2Plasmon.eps} \caption{Core level spectra of (a) As 3$p$, (b) Ca 2$p$ and (c) Fe 2$p$ collected at normal emission (open circles) and 60$^o$ angled emission (solid line) at 210 K. Weak intensities at higher binding energies are shown in renormalized intensity scale as mentioned in the figure. The insets show the same spectra in an enlarged energy scale.} \label{fig2:plasmon} \end{figure} Thus, we look for other method to find the evidence of differences between the surface and bulk electronic structures. It is well known that the photoemission spectra of the core levels are also derived by the eigenstates of the final state Hamiltonian containing interaction between the photo-hole and the valence electrons. In Fig. \ref{fig2:plasmon}, we show the core level spectra of As 3$p$, Ca 2$p$ and Fe 2$p$ collected at 210 K and two different electron emission geometries. Distinct features for the spin-orbit split peaks are observed in all the spectra exhibiting significant asymmetry due to excitation of electrons across the Fermi level along with the photoexcitation of the core electrons. This suggests metallic ground state of this material, which is consistent with the theoretical\cite{Khadiza-SREP} and experimental studies.\cite{Khadiza-ARPES,Khadiza-epjb} There are intense additional broad features around 20 eV away from the As 3\textit{p} core level peaks. Similar energy difference of these features from the main peak in every core level spectra indicate that these are related to the energy loss due to collective excitations such as plasmon excitations.\cite{SREP-Bi2Se3} The experimental spectra collected at different emission angles are shown by superimposing over each other and the highest angular momentum peak is shown in the inset. The plasmon peaks do not show significant angle dependence. The As 3$p$ spectra shown in Fig. \ref{fig2:plasmon}(a) is found to be insensitive to the change in probing depth of the technique. Ca 2$p$ spectra shown in Fig. \ref{fig2:plasmon}(b), exhibit similar intensities in the higher binding energy region (355-380 eV). The intensity of the shoulder region of the main peak [e.g. $\sim$ 347.5 eV for 2$p_{3/2}$ signal shown by `B' in the inset of Fig. \ref{fig2:plasmon}(b)] is enhanced in the 60$^o$ emission case relative to the intensity of feature `A' suggesting its link to the surface electronic structure. CaFe$_2$As$_2$ is known to cleave at the Ca-layer keeping about 50\% of the Ca atoms on each of the cleaved surfaces. Such surface in the 122-class of materials often show significant reconstruction.\cite{SurfReconstruct} Thus, the electronic property of the surface Ca is expected to be different from the bulk Ca. In the Fe 2$p$ data, the higher binding energy regime (725-760 eV) appears quite similar for both the emission angles. However, the main peaks exhibit an interesting scenario [see the inset in Fig. \ref{fig2:plasmon}(c)]; the intensity at the peak position, `C' diminishes in the surface sensitive case while the intensity in the remaining part of the spectra remains unchanged. \begin{figure} \includegraphics[scale = 0.45]{Fig3Fit.eps} \vspace{-20ex} \caption{(a) Ca 2$p$ and (b) Fe 2$p$ core level spectra. Open circles are the experimental data and superimposed lines are the simulated data. The constituent peaks are shown separately by line and area plot. Insets shows the higher angular momentum peak in an enlarged energy scale.} \label{fig3:Fit} \end{figure} In order to explore the underlying physics of these scenarios, we have simulated the experimental spectra using asymmetric Gaussian-Lorentzian product functions within the least square error method; the results are shown in Fig. \ref{fig3:Fit}. Asymmetric Gaussian-Lorentzian product functions contain effects due to energy resolution (Gaussian) and lifetime broadenings (Lorentzian). Plasmon peaks could be captured remarkably well considering two peaks with energy separation and intensity ratio identical to the spin-orbit split features in each case. The simulation of each of the spin-orbit split features in the Ca 2$p$ spectrum required at least two peaks; the features shown by yellow shaded area plot represent the shoulder intensities at 347.6 eV and 351.5 eV for Ca 2$p_{3/2}$ and 2$p_{1/2}$ signals, respectively. In the inset of Fig. \ref{fig3:Fit}(a), the scenario of 2$p_{3/2}$ is shown with two peaks at about 346.4 eV (Peak A) and 347.6$\pm$0.2 eV (Peak B). The experiment with higher surface sensitivity exhibit enhancement of Peak B intensity suggesting it to be a surface feature. The energy of the peak B is very similar to the Ca 2$p$ signal in CaO indicating effective divalency of surface Ca. The lower binding energy of the bulk Ca indicates its valency smaller than (+2) and hence, Ca 4$s$ band is not entirely empty due to hybridization induced effects. In addition to these features, another set of features were required to simulate the intensities between 350-360 eV binding energies; signature of these features could also be seen in the experimental data (see arrows in the figure). This indicates that there are multiple final states associated to the Ca 2$p$ core level excitations in addition to the plasmon peaks. Such features in the core level spectra appear due to final state effects involving transfer of charge to screen the core hole.\cite{ruth-PRB} The presence of multiple features is an evidence of finite hybridization of Ca states with the ligand states that allows charge transfer for the core hole screening. Empty Ca 3$d$ levels appear far above the Fermi level making it energy expensive for charge transfer to Ca 3$d$ bands for the core-hole screening. Electronic structure calculations\cite{Khadiza-SREP} exhibit finite hybridization between Ca4$s$-As4$p$ states, which provides a pathway to charge transfer for core-hole screening. The simulation of Fe 2$p$ spectrum shown in Fig. \ref{fig3:Fit}(b) also exhibit signature of multiple features. The depletion of intensity at 706.6 eV (peak C) [see the inset of Fig. \ref{fig2:plasmon}(c)] with the increase in surface sensitivity of the technique suggests that 706.6 eV peak corresponds to the bulk Fe 2$p$ signal while the surface feature appears at 707.7$\pm$0.2 eV (peak D). The higher binding energy of the surface feature may be attributed to the enhancement of surface potential arising from the changes in the surface Ca layer. From the analysis shown in Fig. \ref{fig2:plasmon}, it is clear that the feature around 727 eV binding energy is related to the loss due to plasmon excitation associated to the 2$p_{3/2}$ emission and the feature related to 2$p_{1/2}$ emission appears at 742 eV. The peaks at 740 eV and 754 eV may also be attributed to the plasmon excitations; in this case, the energy separation from the main peaks is double of the separation of the other plasmon peaks. It is noted here that Fe 2$p$ core level excitations often show satellite peaks\cite{DD,Fujimori} due to final state effects arising from the interaction between the valence electrons and the interaction of valence electron with the core hole. In the present case, it appears that one can simulate the Fe 2$p$ core level spectra without considering such features. It is not clear if such features are indeed absent or their distinct signature could not be probed in the experimental spectra due to overlapping broad plasmon peaks in the relevant energy regime. \begin{figure} \vspace{-2ex} \includegraphics[scale = 0.45]{Fig4.eps} \vspace{-8ex} \caption{(a) Fe 2$p$ core level spectra collected at normal emission and 60$^o$ angled emission at different temperatures. Weak intensities at higher binding energies are shown in an enlarged intensity scale as mentioned in the figure. (b) Fe 2$p_{3/2}$ core level region at different temperatures; 210 K (open circles), 118 K (red line) and 25 K (blue line) in an enlarged energy scale showing enhancement of width with the increase in temperature. (c) Difference spectra: (210K-25K) is shown by open circles and (118K-25K) by closed circles. Lines are hand drawn smooth curves.} \label{fig4:Temp} \end{figure} In order to investigate the influence of structural and magnetic phase transition on the electronic structure, we have collected data at varied temperatures such as 210 K, 118 K and 25 K. Since, the valence band, in particular, near Fermi energy states are dominated by the Fe 3\emph{d} contributions and primarily derive the electronic properties, we focus on the evolution of the Fe 2\emph{p} core level spectra with temperature; As 3$p$ spectra (not shown here) do not show noticeable change with the change in temperature. Fe 2$p$ spectra shown in Fig. \ref{fig4:Temp}(a) exhibit identical lineshape and intensities of the features at higher binding energies (energy $\geq$ 722 eV) at different temperatures. Interestingly, the main peak exhibit a finite change with temperature, which can be interpreted as a small shift in energy or change in linewidth. The spectral modification is clearly visible as shown in Fig. \ref{fig4:Temp}(b); significant change despite large intrinsic width of the features. The width of the 60$^o$ emission spectra is same at 118 K and 25 K, and becomes larger above the transition temperature of 170 K. This is evident in the difference spectra shown in Fig. \ref{fig4:Temp}(c); (118K-25K) data exhibit almost no change while there is significant intensity at about 706.3 eV in the (210K-25K) data. Curiously, the normal emission spectra exhibit gradual increase in intensity at the same energy in both the cases as demonstrated in the subtracted data in Fig. \ref{fig4:Temp}(c). It is well established that the valence electrons are involved in screening the core hole - electrons from ligand levels hops to the unoccupied part of the local electronic structure of the photoemission site. Thus, the width of the valence band will get convoluted resulting into additional width of the screened core level peaks. The larger width at 210 K observed here can be attributed to the larger valence bandwidth in the tetragonal structure possessing $C_4$ symmetry. Below the structural phase transition, the system evolves to orthorhombic structure having $C_2$-symmetry (nematic phase). Consequently, the bandwidth reduces - shrinking of Fermi surface at lower temperatures due to structural transition has indeed been observed in earlier studies.\cite{Khadiza-SREP} The narrowing of the width at lower temperatures may be attributed to such changes in the electronic structure. While this scenario is consistent with the evolution of the surface spectra, the scenario of bulk electronic structure appears anomalous. Recent ARPES study\cite{Khadiza-ARPES} discovered signature of the energy bands related to the cT phase even in ambient conditions of the valence bands. The Fermi surface remain almost unchanged down to about 100 K. At lower temperatures ($<$ 100 K), one of the three hole pockets around the $\Gamma$-point vanishes and the overall band structure assume effective three dimensionality.\cite{Khadiza-ARPES,2dto3d} Thus, the low temperature width is expected to be narrower due to the band structure effect. The presence of larger width below the structural transition temperature of 170 K can be attributed to the presence of cT phase in the bulk possessing $C_4$-symmetry indicating that the presence of cT phase within the orthorhombic structure is a bulk property. In conclusion, we studied the electronic structure of CaFe$_2$As$_2$ using hard $x$-ray photoemission spectroscopy. Although the surface sensitivity of the technique could be changed by changing photoelectron emission angle, the experimental valence band spectra exhibit complexity due to the linear dichroic effect that makes it difficult to delineate the surface-bulk differences of the valence band. The core level spectra, however, is less influenced by such effect and we observe significantly different surface and bulk features in the Ca 2$p$ and Fe 2$p$ core level spectra. The surface peaks appear at higher binding energies, which is attributed to the surface potential created by 50\% occupancy of the Ca-layer on the cleaved surface. The Ca 2$p$ spectra exhibit signature of satellites indicating significant Ca 4$s$-As 4$p$ hybridization. The temperature dependence of the Fe 2$p$ linewidth reveals unusual scenario. While surface is usually expected to be anomalous due to defects, surface reconstruction, symmetry protection, etc., the surface electronic structure of CaFe$_2$As$_2$ found here follows observed structural/magnetic transition and the hidden structural phases appears to be a bulk property. Authors acknowledge the financial support under DST-DESY program and thank Dr. Andrei Gloskovskii for his support during the experiments. KM acknowledges financial assistance from the Department of Science and Technology, Government of India under J. C. Bose Fellowship program and the Department of Atomic Energy under the DAE-SRC-OI Award program.
\section{Introduction} \label{sec:intro} The bottom-up construction of effective-field-theory (EFT) Lagrangians proceeds from a field content and imposed---spacetime, local, and global---symmetries~\cite{Weinberg:1978kz}. Similarly, the structure of on-shell amplitudes is stringently constrained by Lorentz and global internal symmetries, combined with locality and unitarity (for reviews see, {\em e.g.}, refs.~\cite{Elvang:2013cua, Dixon:2013uaa, Schwartz:2013pla, Henn:2014yza, Elvang:2015rqa, Cheung:2017pzi}). This parallel motivates the application of on-shell methods to the direct derivation of EFT amplitudes. The advantages of this approach include the absence of gauge or operator redundancies, and the prospect of further leveraging the power of on-shell techniques in EFT contexts. As a first step in this direction, tree-level amplitudes involving a massive color singlet of spin $0$ or $1$ and up to three gluons were derived using on-shell methods in ref.~\cite{Shadmi:2018xan}, including the contributions of non-renormalizable operators up to dimension $13$. This procedure also gives a simple counting and classification of independent EFT operators at a given dimension, providing an alternative to EFT Lagrangian constructions~\cite{Leung:1984ni, Buchmuller:1985jz, Jenkins:2009dy, Grzadkowski:2010es, Lehman:2015coa, Henning:2015alf, Lehman:2015via, Henning:2017fpj, Gripaios:2018zrz, Henning:2019enq, Henning:2019mcv, Ruhdorfer:2019qmk}. In this paper, we apply these methods to the electroweak sector of the standard model (SM). A recent addition to the on-shell toolbox, which is essential for SM applications, is the systematic treatment of massive spinning particles introduced in ref.~\cite{Arkani-Hamed:2017jhn}. Each massive momentum is decomposed as the sum of two lightlike vectors, which transform under the $SU(2)$ little group. The corresponding spinors then carry an $SU(2)$ little-group index, and symmetric combinations of these spinors are employed to represent particles of any spin. Little-group covariance implies powerful selection rules on the allowed structure of amplitudes. For related work and previous applications see refs.~\cite{Conde:2016vxs,Christensen:2018zcq, Shadmi:2018xan, Ma:2019gtx, Herderschee:2019ofc,Herderschee:2019dmc,Aoude:2019tzn, Ochirov:2018uyq, Bonifacio:2018vzv, Chung:2018kqs, Chen:2019dkx, Alonso:2019ptb}. Spontaneous electroweak symmetry breaking (EWSB) through the Brout-Englert-Higgs mechanism~\cite{Englert:1964et, Higgs:1964pj} is a crucial ingredient of the SM. In a bottom-up construction of on-shell amplitudes, the natural objects to consider are the physical SM particles in the broken phase. One of the main goals of this paper is to explicitly see how EWSB emerges from this construction. Given the electroweak particle content, the $SU(2)_L\times U(1)_Y$ local symmetry follows from perturbative tree-level unitarity imposed on a sufficient number of four- and higher-point amplitudes~\cite{LlewellynSmith:1973yud,Joglekar:1973hh, Cornwall:1974km,Vayonakis:1976vz,Lee:1977eg,Chanowitz:1985hj}. The relations between couplings and masses predicted by the SM Higgs mechanism should emerge in this way. At the non-renormalizable level, perturbative unitarity would also yield relations between various couplings, and in particular, between amplitudes differing only by the numbers of external Higgs legs (see sec.~3.3 of ref.~\cite{Maltoni:2019aot} for an example featuring a fermion dipole operator). The standard-model effective field theory (SMEFT) should emerge below cutoffs parametrically higher than the electroweak scale. Alternatively, by relaxing the requirement of perturbative unitarity at the non-renormalizable level, our bottom-up construction can be used to explore general non-renormalizable interactions, beyond the SMEFT, such as non-linear realizations of $SU(2)_L\times U(1)_Y$~\cite{Alonso:2012px,Buchalla:2013rka, Brivio:2013pma, deFlorian:2016spz}. A related study recently appeared in ref.~\cite{Aoude:2019tzn}, where broken-phase amplitudes involving certain bosonic SMEFT operators were computed. We instead adopt a bottom-up approach, without imposing the $SU(2)_L\times U(1)_Y$ symmetry at the outset, and also include fermion amplitudes. Massive three-point SM amplitudes were studied in ref.~\cite{Christensen:2018zcq}, focusing on renormalizable interactions.\footnote{While submitting this paper, we also noted the new ref.~\cite{Christensen:2019mch} where decay processes are computed from the renormalizable three-point amplitudes of ref.~\cite{Christensen:2018zcq}.} There are some discrepancies between our results that of ref.~\cite{Christensen:2018zcq} where non-renormalizable contributions were argued to vanish in the massless limit. Three-point amplitudes of supersymmetric theories and their high-energy limits were studied in ref.~\cite{Herderschee:2019ofc}, and used as building blocks for the construction of higher-point amplitudes in theories with ${\cal N}=4$ supersymmetry~\cite{Herderschee:2019dmc}. It was demonstrated in ref.~\cite{Ma:2019gtx} that the on-shell construction of amplitudes in the unbroken phase efficiently reproduces the counting of dimension-six SMEFT operators. We adopt a simplified electroweak-like spectrum with a pair of massive Dirac fermions $\psi,\psi'$ of electric charges differing by one unit (plus the corresponding anti-fermions), the massive $Z$ and $W^\pm$ electroweak bosons, the Higgs $h$, and the photon. The fermion pair can represent the up- and down-type quarks of any generation, or a charged lepton and neutrino. Gluons are not considered and trivial color structures are understood where necessary. The most general amplitudes consistent with electric charge and fermion number conservation are constructed, including both renormalizable and non-renormalizable interactions. These assumptions let us focus on the most phenomenologically relevant amplitudes but could easily be relaxed. Considering Majorana particles would be more involved. Besides its particle spectrum, the resulting theory is characterized by the coefficients of a finite number of three-point amplitudes and of an infinite set of higher-point contact terms. These correspond to the coefficients of independent non-renormalizable operators. We first construct and analyze all the three-point amplitudes. These depend on several different scales, including the particle masses and the cutoff ${\bar\Lambda}$ of the broken-phase theory. As usual, three-point amplitudes can be formulated \emph{on-shell} for any external masses by analytically continuing the momenta to the complex plane. General prescriptions for constructing the allowed spinorial structures in three-point amplitudes of different masses and spins were given in ref.~\cite{Arkani-Hamed:2017jhn}. In some cases, most notably the $WWZ$ amplitude, it is actually easier to directly build the list of independent spinor structures. As a cross-check, we use a simple group-theory argument to determine the number of independent structures in each three-point amplitude. With three external particles, this number is given by the number of ways to form overall angular-momentum singlets from the combinations of three spins. Having obtained the three-point amplitudes, our next task is to identify the non-renormalizable tree-level terms. For this purpose, one needs to analyze the high-energy growth of physical scattering amplitudes, starting with the four-point amplitudes. Terms growing as $E$ or faster must be suppressed by an appropriate power of the cutoff ${\bar\Lambda}$. It suffices however to examine the three-point amplitudes. Since these are defined in the complex plane, one can consider their \emph{high-energy} or massless limit, which encodes information about the high-energy behavior of physical scattering amplitudes. This high-energy limit was used in ref.~\cite{Arkani-Hamed:2017jhn} to uncover many properties of the Higgs mechanism in two renormalizable examples: a fully Higgsed $U(1)$, and a fully-Higgsed non-abelian gauge theory. In our electroweak toy model, the high-energy limit of the amplitudes easily reveals many known features of EWSB. Thus for example, we see that fermions with a vector-like coupling to the $Z$ do not interact with its longitudinal component in this limit; conversely, for fermions with a chiral coupling to the $Z$, the coupling to the longitudinal component is proportional to the fermion mass. While this high-energy limit is equivalent to taking all the masses to zero at the same rate---preserving the particle spectrum---different scenarios can be studied by taking the external masses to zero at different rates. The fermion-fermion-$Z$ amplitude for instance tells us that the vector mass cannot be taken to zero faster than the fermion mass, unless the coupling is vector-like (see \autoref{sec:ppZ}). The $WWZ$ amplitude is of special significance, and the underlying $SU(2)$ gauge-group structure follows from the consideration of this three-point amplitude on its own. For three degenerate bosons ({\em i.e.}, for $m_Z=m_W$), we show that the three vector coupling is proportional to $\epsilon^{abc}$. Unlike in the massless case, the three vectors can be taken to have identical polarizations in this case, so that Bose symmetry under permutations of all three bosons is readily seen. For $m_Z\neq m_W$, the renormalizable amplitude is fully determined by a single coupling and the $W$, $Z$ mass ratio, and automatically preserves $U(1)_{\rm EM}$. Furthermore, only two types of non-renormalizable couplings are allowed. The first is associated with the three-field-strength dimension-six operator. The other vanishes in the limit $m_Z\to m_W$. At tree level it is therefore proportional to $m_W^2-m_Z^2$. Indeed, in the SM, this term is proportional to the electromagnetic coupling. We then turn to the calculation of four-point tree-level amplitudes, and derive the ${\psi^c}\psi Zh$ amplitude as an example. Generically, these amplitudes have factorizable parts, featuring single-particle poles, and non-factorizable parts, with no poles. To derive the amplitudes one can write down the full list of kinematic structures, consistent with Lorentz symmetry, and the little group in particular, allowing for single-particle poles. For the massive four-point amplitudes we consider, each term contains a single pole, corresponding to a particular factorization channel. The residue at each pole is given by the product of the two on-shell, three-point amplitudes associated with this factorization channel. This uniquely determines the factorizable part of the tree-level amplitude. This procedure can also be described as the \emph{gluing} of two three-point amplitudes. Note that, since we only work at tree-level, we can only consistently glue together two tree-level three-point amplitudes. In our bottom-up derivation, the remaining, non-factorizable part features arbitrary coefficients, corresponding to the unknown Wilson coefficients of non-renormalizable operators. Combinations of operators giving rise to three-point amplitudes that vanish on-shell do not appear in this gluing procedure. Their contributions are accounted for by the \emph{non-factorizable} terms in the on-shell approach. The constructibility of EFT amplitudes was studied in ref.~\cite{Cohen:2010mi}. A judicious choice of momentum shifts, with all-line holomorphic or antiholomorphic shifts, was shown to give vanishing boundary terms in these examples. The main result is very intuitive: contact-term contributions can only be inferred from lower-point amplitudes if they are related to them by a symmetry~\cite{Cohen:2010mi}. Earlier applications of factorization to the derivation of tree-level EFT amplitudes were studied in refs.~\cite{Dixon:1993xd,Dixon:2004za}. The ${\psi^c}\psi Zh$ amplitude is relevant for Higgs decay as well as $Zh$ production at hadron and lepton colliders. We derive the factorizable and non-factorizable components of this amplitude at the tree level. As explained above, the non-factorizable part is determined by Lorentz symmetry, and in particular by little-group considerations. The general, all-order result is given by $12$ independent spinorial structures. As in ref.~\cite{Shadmi:2018xan}, the expansion of non-factorizable amplitude coefficients in $(p_i\cdot p_j)/{\bar\Lambda}^2$ can be used to infer the number of independent operators contributing at each ${\bar\Lambda}$ order. At the leading order in the EFT expansion, there are only four contact-terms. Imposing perturbative unitarity on four-point (and higher-point) amplitudes would restrict the allowed contact terms, and reproduce the constraints of $SU(2)_L\times U(1)_Y$. Here we restrict our attention to the renormalizable part of the ${\psi^c}\psi Zh$ amplitude. Perturbative unitarity determines the fermion mass in terms of the $Z$-boson mass, the Yukawa coupling and the gauge coupling. Finally, we provide the matching of all the unknown coefficients appearing in the three-point and ${\psi^c}\psi Zh$ amplitudes to the broken-phase SMEFT (in the conventions of ref.~\cite{Dedes:2017zog}). This completes the results obtained in ref.~\cite{Aoude:2019tzn} with fermionic three-point amplitudes and the four-point ${\psi^c}\psi Zh$ one. With this, all elements needed for computing the factorizable contributions to other electroweak four-point amplitudes are available. This paper is organized as follows. We describe the essentials of the massive-spinor formalism~\cite{Arkani-Hamed:2017jhn} in \autoref{sec:bolded}. The construction and discussion of three-point amplitudes are addressed in \autoref{sec:3pt}. At the end of this section, we comment on the matching to the amplitudes of the high-energy unbroken theory, and note how the unbroken $SU(2)_L\times U(1)_Y$ emerges. Tree-level factorizable and non-factorizable contributions to the ${\psi^c}\psi Zh$ four-point amplitude are then obtained in \autoref{sec:4-pt}, including the leading non-renormalizable terms. We derive in particular the advertised relation between the gauge and Yukawa couplings and the $Z$-boson and fermion masses. Our conventions and notations are defined in \autoref{sec:formalism}, where we also clarify some elements of the massive spinor formalism. Subsequent appendices contain a matching of amplitude coefficients to the SMEFT in the broken phase (\autoref{sec:matching}), a compendium of massless amplitudes (\autoref{sec:massless}), and a derivation of the non-factorizable ${\psi^c}\psi Zh$ amplitudes for massless fermions (\autoref{sec:ffZh_EFT_derivation}). \section{Massive spinor formalism} \label{sec:bolded} Spinor helicity variables have been widely used for the computation of massless helicity amplitudes (for reviews, see {\em e.g.}\ refs.~\cite{Mangano:1990by, Elvang:2015rqa, Schwartz:2013pla}). With the four-momenta and external polarizations written in terms of the basic building blocks of the Lorentz group, namely, massless spinors, the amplitudes take compact forms, and their little-group structure is manifest. Here we briefly summarize the essential elements of the spinor variables we will use. For details, we refer the reader to \autoref{sec:formalism}. A lightlike momentum is written in terms of a pair of chiral and anti-chiral spinors, \begin{align}\label{eqn:massless_momenta_spinors} p_{\alpha\dot{\alpha}} \equiv p_\mu \sigma^\mu_{\alpha\dot{\alpha}} = \lambda_\alpha \tilde\lambda_{\dot\alpha} \equiv \ketBra{p}{p} \,,~~~~ ~~~~ \bar{p}^{\dot\alpha \alpha} \equiv p_\mu \bar\sigma^{\mu \dot\alpha\alpha} = \tilde\lambda^{\dot\alpha} \lambda^{\alpha} \equiv \Ketbra{p}{p}\,, \end{align} where the half-brackets are defined in \autoref{sec:formalism}. These spinors carry undotted or dotted indices and transform as the $(1/2,0)$ and $(0,1/2)$ representations of the $\SL{2}{\mathbb{C}}$ Lorentz group, respectively. Here and in the following, we interchangeably refer to these spinors as dotted and undotted, or square- and angle-spinors. Little-group transformations, which form a $U(1)$ in the massless case, correspond to opposite phase rotations of square- and angle-spinors,% \footnote{Note that $\xi$ is real for real Lorentzian momenta, such that \autoref{eqn:massless_momenta_spinors} is Hermitian. When the momenta are complex the parameter $\xi$ can be complex.} \begin{align} \ket{p}\to e^{-i\xi}\ket{p} \,,~~~~ \text{and} ~~~~ \Bra{p} \to e^{ +i\xi}\Bra{p}\,. \end{align} These leave the momentum invariant, but phase-rotate the polarization associated with the external fermion or vector of momentum $p$. Amplitudes of particles with non-zero spin thus carry little-group charges, or weights, and these lead to selection rules on the allowed spinor structures. Different generalizations of this formalism for the treatment of massive particles have been explored (see, {\em e.g.}, refs.~\cite{Kleiss:1985yh,Dittmaier:1998nn,Arkani-Hamed:2017jhn}). Here we adopt the method of ref.~\cite{Arkani-Hamed:2017jhn}. A massive momentum ($p^2 = m^2 > 0$) can be decomposed in terms of chiral and anti-chiral spinors similarly to \autoref{eqn:massless_momenta_spinors}, but two pairs of massless spinors are now required, \begin{align}\label{eqn:massive_momenta_spinors} \bs{p}_{\alpha\dot{\alpha}} = \bs{\lambda}^I_\alpha \bs{\tilde\lambda}_{I\dot\alpha} = \ketBra{\bs{p}^I}{\bs{p}_I} \,,~~~~ \text{and} ~~~~ \bar{\bs{p}}^{\dot\alpha \alpha} = -\bs{\tilde\lambda}^{I \dot\alpha} \bs{\lambda}_{I}^{\alpha} = -\Ketbra{\bs{p}^I}{\bs{p}_I}\,. \end{align} Here $I=1,2$, and boldface is used to denote massive momenta and their corresponding spinors. The equation of motion then reads, \beq\label{eqn:eom} \bs{p} \Ket{\bs{p}^{I }} = m \ket{\bs{p}^I}\,, ~~ \bar{\bs{p}} \ket{ \bs{p}^I }= m \Ket{ \bs{p}^{I }}\,,~~ \Bra{\bs{p}^{I}} \bar{\bs{p}}= - m \bra{\bs{p}^{I}}\,, ~~ \bra{\bs{p}^{I }} \bs{ p} = - m \Bra{\bs{p}^{I}} \,. \eeq Little-group transformations, which form an $SU(2)$ in the massive case, rotate the vectors $\bs{p}^I$, and leave $\bs{p}$ invariant, \begin{align} \ket{\bs{p}^I} \to W^I_{\, J}\ket{\bs{p}^J} \,,~~~~ \text{and} ~~~~ \Bra{\bs{p}_I} \to \parn{W^{-1}}^{\, J}_{I}\Bra{\bs{p}_J} \,. \end{align} For real Lorentzian momenta, $W^I_J$ is a matrix in the $SU(2)$ subgroup of $\SL{2}{\mathbb{C}}$. Since any spin $s$ can be obtained by combining spin-1/2 representations, the polarizations of massive particles can be expressed as completely symmetric $SU(2)$ tensors of rank $2s$. An amplitude with a massive spin-$s$ particle of momentum $\bs{p}$ can then be written as (see ref.~\cite{Arkani-Hamed:2017jhn}), \begin{align} \mathcal{M}^{I_1 \dots I_{2s}} = \ket{\bs{p}}^{I_1}_{\alpha_{1}} \dots \ket{\bs{p}}^{I_{2s}}_{\alpha_{2s}} M^{\left\lbrace \alpha_{1} \dots \alpha_{2s} \right\rbrace } \; = \Ket{\bs{p}}^{I_1}_{\dot\alpha_{1}} \dots \Ket{\bs{p}}^{I_{2s}}_{\dot\alpha_{2s}} \tilde{M}^{\left\lbrace \dot\alpha_{1} \dots \dot\alpha_{2s} \right\rbrace } {\,,} \label{eqn:spin_amp} \end{align} where $I_1\dots I_{2s}$ are massive little-group indices. The reduced amplitudes $M$ and $\tilde{M}$ are equivalent, as one can switch between the dotted and undotted spinors with~\autoref{eqn:eom}. They are also completely symmetric in the $\SL{2}{\mathbb{C}}$ indices $\alpha$ and $\dot{\alpha}$. Thus, the amplitudes we write below are given in terms of angle- and square-spinors, and as usual, we abbreviate the spinor associated with external leg $i$ by $|p_i]\to |i]$ or $|p_i\rangle\to |i\rangle$. The multiple occurrences of boldfaced $|\bs{i}]$, $|\bs{i}\rangle$ spinors in an amplitude are understood to carry $SU(2)$ little-group indices which are completely symmetrized. For a fermion external leg, there is a single such spinor, while a vector external leg carries two spinors whose indices are symmetrized. Thus for example, if particle $\bs{1}$ is a massive vector, the amplitude could feature $|\bs{1}]|\bs{1}]\equiv|\bs{1}^{\{I_1}]|\bs{1}^{I_2\}}]$. Note that we define the symmetric states using the appropriate Clebsch-Gordan coefficients (see \autoref{eqn:bold_clebsch}). This convention is convenient for handling physical states. Obviously, the choice of the pair of vectors $\bs{p}^I$ is arbitrary. Generically, this can be used to choose arbitrary spin-quantization axes, and our general expressions do not assume any particular direction. Different values for the $I_1\dots I_{2s}$ indices in \autoref{eqn:spin_amp} yield the amplitudes for the different spin polarizations along the chosen direction. Massive-vector amplitudes for transverse polarizations are for instance obtained with $I_1=I_2=1$ and $2$, while $I_1\neq I_2$ yield the amplitude for zero polarization. For considering the high-energy limit where helicity amplitudes are the natural choice, it will be convenient to choose the spatial direction of $\bs{p}^{I}$ along the direction of the particle momentum. The leading contribution in the high-energy limit can then simply be obtained by unbolding the spinors~\cite{Arkani-Hamed:2017jhn}. Further details of this formalism and the high-energy limit are discussed in \autoref{sec:formalism}. \section{Three-point amplitudes} \label{sec:3pt} In this section, we study the massive three-point amplitudes of our simplified electroweak theory, including non-renormalizable contributions. In our bottom-up approach, the only dimensionful parameters are the masses and the EFT cutoff scale ${\bar\Lambda}$. The Higgs vacuum expectation value never appears explicitly. We distinguish ${\bar\Lambda}$ in the broken-phase theory from $\Lambda$ in the unbroken SMEFT. The latter only appears explicitly in the matching of \autoref{sec:matching}. Terms suppressed by ${\bar\Lambda}^{\bar n}$ correspond to SMEFT contributions of order $m^{n}/\Lambda^{\bar n+n}$ where $m$ generically denotes external particle masses. For each amplitude, we derive the most general set of independent kinematic structures allowed. Structures generated by non-renormalizable couplings at the tree level can be identified based on simple dimensional analysis in the high-energy limit. This limit should of course be interpreted in the complex plane, where the amplitudes can be defined on-shell independently of external particle masses. Angle- and square-spinors are then no longer related by complex conjugation, and the massless three-point kinematics can be smoothly approached, with square-spinor bilinears scaling as $E$, and angle-spinor bilinears scaling as $m^2/E$, or vice versa. Here $m$ stands for any of the external-state masses. Assuming that the cutoff ${\bar\Lambda}$ is parametrically higher than $m$, terms growing as $E^2$ in three-point amplitudes correspond to non-renormalizable tree-level interactions and are therefore assigned a prefactor $1/{\bar\Lambda}$. This simple rule of thumb follows from the high-energy behavior of the four-point amplitudes at tree-level. Unitarity restricts the energy growth of these amplitudes. Terms growing as $E$ or faster should be suppressed by the cutoff ${\bar\Lambda}$, where perturbative unitarity is lost. Since the tree-level four-point amplitudes are obtained by gluing two three-point amplitudes with a propagator scaling as $1/E^2$, three-point amplitudes growing as $E^2$ should be suppressed by ${\bar\Lambda}$ as well. Indeed, three-point amplitudes have mass dimension $1$, so $\mathcal{O}(E)$ terms are consistent with renormalizable couplings, while $\mathcal{O}(E^2)$ growths must be accompanied by an inverse mass. Such terms can of course be generated by the renormalizable SM couplings at the loop level, but these contributions cannot be consistently included in the tree-level gluing we rely on. In full one-loop computations, the high-energy growth of loop three-point functions shuts-off in the massless limit. The implicit assumption in the discussion above is that the new physics at ${\bar\Lambda}$ is decoupling and can be integrated out. If it is not, ${\bar\Lambda}$ cannot be taken to be much higher than $m$, and its precise value depends on the measured values of the different couplings. In all cases considered, our results are consistent with the SMEFT. Eventually, the systematic evaluation of four- and higher-point amplitudes should be performed to determine the exact constraints applying to three-point amplitude coefficients in a bottom-up way. For our toy electroweak theory, this task is however left for future work. \subsection{\texorpdfstring{${\psi^c}\psi Z$}{ffZ}} \label{sec:ppZ} \newcommand{\mffz}[3]{\mathcal{M}(1_{\psi^c}^#1,2_\psi^#2,3_Z^#3)} \newcommand{\cffz}[3]{c_{{\psi^c}\psi Z}^{\chir{#1}\chir{#2}\chir{#3}}} We first consider the massive fermion-fermion-vector amplitude, with equal-mass fermions. Since this is our first example, we will cover it in detail. It is not difficult to show that the $\mathcal{M}(\bs{1}_{\psi^c}, \bs{2}_{\psi},\bs{3}_{Z})$ amplitude is fully characterized by the following spinorial structures: \begin{equation} \mathcal{M}(\bs{1}_{\psi^c}, \bs{2}_{\psi},\bs{3}_{Z})= \frac{\cffz+++}{{\bar\Lambda}} \sqb{\bs{13}}\sqb{\bs{23}} + \frac{\cffz-+0}{m_Z} \anb{\bs{13}}\sqb{\bs{23}} + \frac{\cffz+-0}{m_Z} \sqb{\bs{13}}\anb{\bs{23}} + \frac{\cffz---}{{\bar\Lambda}} \anb{\bs{13}}\anb{\bs{23}}\,. \label{eqn:mffz} \end{equation} Our specific choice of dimensional normalization will prove appropriate for our tree-level description. The $\cffz{}{}{}$ coefficients are dimensionless and their superscripts refer to chiralities.% \footnote{Recall that all particles are incoming. For our choice of massive momenta decomposition, the fermion chirality label corresponds to the fermion helicity in the massless limit. Thus, for $\bs1$ and $\bs2$ being charge conjugates of each other, the second and third terms with $LR$ and $RL$ give rise to the chirality preserving gauge couplings, and the $RR$ and $LL$ terms are chirality violating. The vector labels are not as intuitive, with the gauge coupling originating from the terms with $0$ vector label.} Different helicity amplitudes generically get contributions from all four terms, with appropriate mass suppressions. Having assumed that $\bs1_{{\psi^c}}$ and $\bs2_{\psi}$ are conjugate of each others (they have the same mass and opposite charges), $\CP$ would interchange their labels in addition to flipping all helicities ({\em i.e.}, interchanging square and angle brackets).\footnote{% To be precise, parity sends $\ket{\lambda^I} \leftrightarrow \Ket{\tilde \lambda_I} $ and $\Ket{\tilde \lambda^I} \leftrightarrow - \ket{\lambda_I} $, or equivalently $\ket{k} \leftrightarrow \Ket{k}$ and $\ket{q} \leftrightarrow \Ket{q}$ in the two-lightlike spinors notation. } The renormalizable spinor structures are thus self-conjugate, while the non-renormalizable ones (of dipole type) are exchanged under $\CP$. Since the overall phase of an amplitude is not physical, statements about $\CP$ conservation have to be made at the squared amplitude level. Considering for instance the interference of a renormalizable contribution with dipole ones, we learn that the coefficients of the dipole terms are equal if $\CP$ is conserved, since these terms are exchanged by $\CP$. In three-point amplitudes, Mandelstam variables are combinations of external masses squared. All kinematics is therefore encoded in the spinor structures, and their coefficients are pure constants. These coefficients, together with the external particle masses, fully specify the amplitude. The number of independent kinematic structures can actually be inferred from angular momentum considerations. In the ${\psi^c}\psi Z$ case, there are four distinct ways to form a singlet out of two spin-$1/2$ and one massive spin-$1$ particle: adding two spin $1/2$, we can form states with total spin $0$ and orbital angular momentum $1$, or total spin $1$ and orbital angular momentum $0$, $1$ or $2$, each of which admits a total angular momentum $J=1$ matching the $Z$-boson spin. In contrast, higher-point amplitudes involve additional relative orbital angular momenta, which allow for infinite ways to form invariants. Indeed, these amplitudes generically depend on an infinite set of parameters, multiplying arbitrary high powers of the Mandelstam variables. For three-point amplitudes, this counting is equivalent to that of the number of irreducible representations appearing in the sum of the three spins, since the orbital angular momentum configuration can always be adjusted to form an overall singlet. In the present ${\psi^c}\psi Z$ case, labeling irreducible representations by their dimensions one indeed finds four of them: $2\otimes2\otimes3=1\oplus3\oplus3\oplus5$. Following the reasoning outlined in the introduction to this section, we would like to determine which spinorial structures can be associated with renormalizable interactions at the tree level. For this purpose, we consider the massless limit of the theory, for constant ${\bar\Lambda}$, with all mass ratios held fixed. As mentioned above, for complex momenta, this can be loosely thought of as the high-energy limit, with all masses held constant, and either square or angle spinor products scaling as $E\to\infty$, with $E/{\bar\Lambda}$ fixed. \newcommand{\affz}[3]{a^{\chir{#1}\chir{#2}\chir{#3}}} The spinorial structures leading to the fastest energy growth in the ${\psi^c}\psi Z$ amplitude of \autoref{eqn:mffz} are the first and fourth ones. They generate $\mffz+++$ and $\mffz---$ amplitudes scaling as $E^2$:% \footnote{Here, either $\sqb{ij}\sim E$ and $\anb{ij}\sim m^2/E$, or $\anb{ij}\sim E$ and $\sqb{ij}\sim m^2/E$. Reference~\cite{Christensen:2018zcq} argued that these amplitudes, and more generally, other non-renormalizable ones, vanish in the massless limit, see {\em e.g.}, eqs.~(50) and (51). We disagree with these claims.} \begin{gather}\label{highe} \mffz+++ \to \sqb{13}\sqb{23} \;\cffz+++ /{\bar\Lambda}\,,\qquad \mffz--- \to \anb{13}\anb{23} \;\cffz--- /{\bar\Lambda}\,. \end{gather} As discussed above, this behavior should be accompanied at the tree level by a factor of $1/{\bar\Lambda}$. This justifies our choice of normalization of these terms. Indeed, these amplitudes are generated by SM loops and, at tree-level, by dipole operators in the SMEFT (see matching in \subappref{sec:ffZ}).% \footnote{In the SMEFT, these terms arise at dimension six, suppressed by $1/\Lambda^2$. From a bottom-up perspective, a well-behaved high-energy limit for the ${\psi^c}\psi ZZ$ amplitude requires this $1/\Lambda^2$ suppression in a chiral theory where $\cffz-+0\ne\cffz+-0$. Dipole operators of dimension five, suppressed only by $1/\Lambda$, would however be allowed for fermions having vector-like $\cffz-+0=\cffz+-0$ coupling. The presentation of an explicit derivation of this result is left for future work.} No such constraint applies to the $\anb{\bs{13}}\sqb{\bs{23}}$ and $\sqb{\bs{13}}\anb{\bs{23}}$ spinor structures. These do not give rise to $E^2$ terms in the high-energy limit since, for instance, $\anb{13}\sqb{23} = -\langle 132] = \langle 1(1+2)2] = 0$ for massless kinematics. They only generate amplitudes of acceptable linear energy growth: \begin{equation} \begin{aligned} \mffz--0 &\to + \anb{12}\; (\cffz-+0-\cffz+-0)\; m_\psi/\sqrt{2}m_Z \,, \\\mffz-+- &\to - \frac{\anb{13}^2}{\anb{12}} \cffz-+0 \,, \\\mffz-++ &\to + \frac{\sqb{23}^2}{\sqb{12}} \cffz-+0 \,, \\\mffz+-- &\to + \frac{\anb{23}^2}{\anb{12}} \cffz+-0 \,, \\\mffz+-+ &\to - \frac{\sqb{13}^2}{\sqb{12}} \cffz+-0 \,, \\\mffz++0 &\to - \sqb{12}\; (\cffz-+0-\cffz+-0)\; m_\psi/\sqrt{2}m_Z \,, \end{aligned} \label{eqn:mffz_HE} \end{equation} up to corrections of order $m_Z^2/E^2$ and $m_\psi^2/E^2$. Since parity flips chiralities by exchanging angle and square brackets, we learn, by comparing the \amp++0 and \amp--0 amplitudes, that the longitudinal component of the $Z$ boson has a pseudo-scalar, or parity-odd, coupling to fermions in the high-energy limit. The high-energy relations between coefficients of longitudinal and transverse amplitudes are also remarkable. They imply that vector-like fermions, having parity conserving couplings to the transverse components of the $Z$ boson ($\cffz-+0=\cffz+-0$), do not couple to its longitudinal component in the high-energy limit. On the other hand, chiral fermions for which $\cffz-+0\ne \cffz+-0$ do couple to the longitudinal component of the $Z$, with a strength proportional to their mass, in the high-energy limit. The \amp++-, \amp+-0, \amp-+0, \amp--+ amplitudes only arise at order $\cffz\pm\mp0\:m$ and $\cffz\pm\pm\pm\:m^2/{\bar\Lambda}$ and are therefore subleading in the high-energy limit. \paragraph{Limits to other amplitudes and theories} Going to the high-energy limit by keeping all mass ratios constant allowed us to constrain the form of the ${\psi^c}\psi Z$ amplitudes. Taking instead $m_Z/E$ and $m_\psi/E$ to zero at different rates (such that the mass ratios are modified), allows us to make contact with the ${\psi^c}\psi\gamma$ amplitudes of the next section, and with a theory of massless fermions. Let us first consider the limit in which $m_Z/E$ goes to zero faster than $m_\psi/E$. We can then expand the amplitude coefficients in powers of $m_Z/m_\psi$: \begin{equation} \cffz\pm\mp0 = \sum_n\left(\frac{m_Z}{m_\psi}\right)^n\: \affz\pm\mp0_n(m/{\bar\Lambda}). \end{equation} A smooth $m_Z/m_\psi\to0$ limit for the transverse amplitudes of \autoref{eqn:mffz_HE} require $\affz\pm\mp0_{n<0}=0$. In this limit, all $\affz\pm\mp0_{n>0}$ terms moreover give vanishing contributions to these transverse amplitudes, which thus only receive finite contributions from the $n=0$ term. Additionally, a smooth limit for the longitudinal amplitudes of \autoref{eqn:mffz_HE} requires $\affz+-0_0=\affz-+0_0$. We therefore learn that massive fermions only have vector-like renormalizable couplings to massless vectors in the high-energy limit. Note that the longitudinal amplitudes were crucial in reaching this conclusion, although they are absent if one starts off with a massless vector. In the next section, we will directly consider the massless vector amplitude and obtain the same result. Conversely, the mass of a vector having chiral $\affz+-0_0\ne\affz-+0_0$ couplings to a fermion cannot be consistently taken to zero faster than the fermion mass. On the other hand, if $m_\psi/E$ goes to zero faster than $m_Z/E$, we must impose $\affz\pm\mp0_{n>0}=0$ for the transverse amplitudes of \autoref{eqn:mffz_HE} to be well behaved. All $\affz\pm\mp0_{n<1}$ terms moreover give vanishing contributions to the longitudinal amplitudes in this limit. We therefore learn that the coupling of a massless fermion to the longitudinal component of a vector vanishes in the high-energy limit. The corresponding amplitude is suppressed by $m_Z/E$ compared to transverse ones. This is in line with what we expect from the Higgs mechanism. \paragraph{Summary} To summarize, by considering the high-energy limit of the ${\psi^c}\psi Z$ amplitude, we learn that: \begin{itemize} \item The $\sqb{\bs{13}}\sqb{\bs{23}}$ and $\anb{\bs{13}}\anb{\bs{23}}$ spinorial structures are generated by non-renormalizable interactions at tree level. \item In the high-energy limit, the fermion coupling to the longitudinal $Z$ boson has a pseudo-scalar spinor structure. \item In the high-energy limit, fermions with a vector-like $LR0/RL0$ coupling to the $Z$ boson do not interact with its longitudinal component. \item Fermions with chiral $LR0/RL0$ couplings to the $Z$ boson, do interact with its longitudinal component in the high-energy limit, with a strength proportional to their mass. \item A massive fermion only has vector-like $LR0/RL0$ coupling to a massless vector. \item The coupling of a massless fermion to the longitudinal component of a massive vector vanishes in the high-energy limit. \item The mass of a fermion with chiral $LR0/RL0$ couplings to a massive vector, can only be taken to vanish at least as fast as the vector mass. \end{itemize} This is a nice bottom-up derivation of results expected from the Higgs mechanism, and specifically from the Goldstone boson equivalence theorem. Indeed, vector-like fermions do not obtain their mass from the Higgs mechanism, and therefore do not couple to the Goldstone component of the massive vector to leading order in the high-energy expansion. Their masses are furthermore independent of the vector boson masses. In contrast, chiral fermions must get their mass solely from some Higgs field, and thus couple to the longitudinal $Z$ boson with a coupling proportional to this mass. At this stage, however, no relation between the ${\psi^c}\psi h$ and longitudinal ${\psi^c}\psi Z$ couplings is forced upon us. We will get back to this point and derive this relation when considering the ${\psi^c}\psi Zh$ amplitude in \autoref{sec:4-pt}. \subsection{\texorpdfstring{${\psi^c}\psi\gamma$}{ffA}} \label{sec:ffA} \newcommand{\cffa}[3]{c_{{\psi^c}\psi\gamma}^{\chir{#1}\chir{#2}\chir{#3}}} As discussed in ref.~\cite{Arkani-Hamed:2017jhn}, the construction of three-point amplitudes with one massless particle and two particles of the same mass requires the introduction of an ancillary spinor, which we denote by $\zeta$. In such cases, external states can indeed only be used to form one independent spinor instead of two. Labeling the massive particles by $1,2$, and the massless particle by $3$, the spinors $\ket{3}$ and $\bs1\Ket{3}$ are in particular not independent since $\langle3\bs13]=2\,(p_\bs1\cdot p_3) = m_2^2-m_1^2 = 0$. The proportionality constant between these two spinors can be derived by contracting them with $\bra{\zeta}$. It is given by $\langle\zeta\bs13]/\anb{\zeta3}$. Up to normalization, this is the $x$-factor of ref.~\cite{Arkani-Hamed:2017jhn}. Note that it carries helicity weight $+1$ for particle $3$. (Similarly, the spinors $\Ket{3}$ and $\bar{\bs1}\ket{3}$ are the same, up to the proportionality factor $[\zeta\bs13\rangle/\sqb{\zeta3}$, which carries helicity weight $-1$ for particle $3$.) The construction of the negative-helicity ${\psi^c}\psi\gamma^-$ amplitudes can then proceed by contracting the $\bra{\bs1},\bra{\bs2}$ massive spinors with $\epsilon_{\alpha \beta} [\zeta\bs13\rangle/\sqb{\zeta3}$ or with $\ket{3},\ket{3}$ structures. One thus obtains that the ${\psi^c}\psi\gamma^-$ amplitude can be expressed as a linear combination of $\sqb{\bs1\bs2}\langle\zeta\bs13]/\anb{\zeta3}$ and $\sqb{\bs13}\sqb{\bs23}$ (and similarly for the positive helicity amplitude, with angle and square brackets exchanged). The Schouten identity and momentum conservation ($\bs1+\bs2+3=0$) however lead to: \begin{equation} \begin{aligned} \sqb{\bs1\bs2}\langle\zeta\bs13]/\anb{\zeta3} &=m (\anb{\zeta\bs1}\sqb{3\bs2} +\anb{\zeta\bs2}\sqb{3\bs1})/\anb{\zeta3} +\sqb{\bs13}\sqb{\bs23}\,, \\ \anb{\bs1\bs2}[\zeta\bs13\rangle/\sqb{\zeta3} &=m (\sqb{\zeta\bs1}\anb{3\bs2} +\sqb{\zeta\bs2}\anb{3\bs1})/\sqb{\zeta3} +\anb{\bs13}\anb{\bs23}\,, \\ \anb{\bs1\bs2}\langle\zeta\bs13]/\anb{\zeta3} &=m (\anb{\zeta\bs1}\sqb{3\bs2} +\anb{\zeta\bs2}\sqb{3\bs1})/\anb{\zeta3} \,, \\ \sqb{\bs1\bs2}[\zeta\bs13\rangle/\sqb{\zeta3} &=m (\sqb{\zeta\bs1}\anb{3\bs2} +\sqb{\zeta\bs2}\anb{3\bs1})/\sqb{\zeta3} \,, \end{aligned} \label{eqn:x_factor_equalities} \end{equation} where $m=m_1=m_2$ (see \autoref{sec:identities} for a detailed derivation). Using the massless polarization vectors defined in \autoref{eqn:polarimassless1} and \eqref{eqn:polarimassless2}, the first two equalities allow us to write the positive-helicity amplitude as a linear combination of $(\langle\bs1\varepsilon_3^+\bs2]+\langle\bs2\varepsilon_3^+\bs1])$ and $\sqb{\bs13}\sqb{\bs23}$ and similarly for the negative-helicity amplitude. Thus we obtain: \begin{equation} \begin{aligned} \mathcal{M}(\bs1_{\psi^c},\bs2_\psi,3_\gamma^+) &= \cffa{}{}{} (\langle\bs1\varepsilon_3^+\bs2]+\langle\bs2\varepsilon_3^+\bs1]) + \frac{\cffa+++}{{\bar\Lambda}} \sqb{\bs13}\sqb{\bs23}\,, \\ \mathcal{M}(\bs1_{\psi^c},\bs2_\psi,3_\gamma^-) &= \cffa{}{}{} (\langle\bs1\varepsilon_3^-\bs2]+\langle\bs2\varepsilon_3^-\bs1]) + \frac{\cffa---}{{\bar\Lambda}} \anb{\bs13}\anb{\bs23}\,, \end{aligned} \label{eqn:mffa} \end{equation} where $\cffa{}{}{}$, $\cffa+++$, $\cffa---$ are dimensionless functions of $m/{\bar\Lambda}$ and mass ratios. In particular, the first terms on the right-hand side of \autoref{eqn:mffa} are the electromagnetic gauge interactions and correctly reproduce the $g=2$ factor (see~\subappref{sec:g2}). An alternative notation involves the $\anb{\bs1\bs2}\langle\zeta\bs13]/\anb{\zeta3},\,\sqb{\bs13}\sqb{\bs23}$ and $\sqb{\bs1\bs2}[\zeta\bs13\rangle/\sqb{\zeta3},\,\anb{\bs13}\anb{\bs23}$ spinor structures. It is obtained from the above one by applying (backwards) the last two equalities of \autoref{eqn:x_factor_equalities}. The high-energy limits of the ${\psi^c}\psi\gamma$ amplitudes have the same form as the transverse ${\psi^c}\psi Z$ ones provided in \autoref{eqn:mffz_HE}. The exact expressions are obtained with the following replacements: \begin{equation} \cffz-+0\to \cffz+-0\to -\sq2\: \cffa{}{}{}\,. \label{eqn:ffz2ffa_replacement} \end{equation} As suggested by our choice of normalization, the $\sqb{\bs13}\sqb{\bs23}$ and $\anb{\bs13}\anb{\bs23}$ spinorial structures are thus expected to only arise at the non-renormalizable (or loop) level. It is remarkable that the amplitude formalism forces the $c_{{\psi^c}\psi\gamma}$ terms to be purely vectorial, without an axial-vector component. This confirms the conclusion derived in the previous section from massive vector amplitudes, and their longitudinal components in particular. The coefficients of the $\langle\bs1\varepsilon_3^+\bs2]$ and $\langle\bs1\varepsilon_3^-\bs2]$ terms (as well as $\langle\bs2\varepsilon_3^+\bs1]$ and $\langle\bs2\varepsilon_3^-\bs1]$ ones) are moreover the same since the two photon helicities are parts of the same irreducible representation of the Lorentz group. Altogether, one thus obtains that $c_{{\psi^c}\psi\gamma}$ terms conserve parity which for instance sends the $\langle\bs1\varepsilon_3^+\bs2]$ spinorial structure onto the $\langle\bs2\varepsilon_3^-\bs1]$ one. The presence of three independent coefficients is also confirmed by angular-momentum considerations similar to those exposed in the previous section. Placing the two components of the massless photon in a fundamental representation, the decomposition of the $2\otimes2\otimes2$ product indeed involves three irreducible representations: $2\oplus2\oplus4$. \subsection{\texorpdfstring{${\psi^c}\psi' W$}{ff'W}} \label{sec:ffW} \newcommand{\mffw}[3]{\mathcal{M}(1_{\psi^c}^#1,2_{\psi'}^#2,3_W^#3)} \newcommand{\cffw}[3]{c_{{\psi^c}\psi' W}^{\chir{#1}\chir{#2}\chir{#3}}} The ${\psi^c}\psi'W$ amplitude takes the same form as the ${\psi^c}\psi Z$ one: \begin{equation} \mathcal{M}(\bs{1}_{\psi^c}, \bs{2}_{\psi'},\bs{3}_{W})= \frac{\cffw+++}{{\bar\Lambda}} \sqb{\bs{13}}\sqb{\bs{23}} + \frac{\cffw-+0}{m_W} \anb{\bs{13}}\sqb{\bs{23}} + \frac{\cffw+-0}{m_W} \sqb{\bs{13}}\anb{\bs{23}} + \frac{\cffw---}{{\bar\Lambda}} \anb{\bs{13}}\anb{\bs{23}} \,, \label{eqn:mffw} \end{equation} where $c_{{\psi^c}\psi'W}$ are again dimensionless. Because $m_\psi\ne m_{\psi'}$ in general, the high-energy-limit expressions for \amp\pm\pm0\ amplitudes become: \begin{align} \mffw--0 &\to + \anb{12}\; (m_{\psi'}\, \cffw-+0 - m_{\psi}\,\cffw+-0)/\sqrt{2}m_W \,, \label{eqn:mffw_mm0} \\\mffw++0 &\to - \sqb{12}\; (m_\psi\, \cffw-+0 - m_{\psi'}\,\cffw+-0)/\sqrt{2}m_W \,. \label{eqn:mffw_pp0} \end{align} \paragraph{Limits to other amplitudes and theories} \newcommand{\affw}[3]{a^{\chir{#1}\chir{#2}\chir{#3}}} Taking $m_W/E$ to zero faster than both $m_{\psi}/E$ and $m_{\psi'}/E$, the expansion of $\cffw\pm\mp0$ coefficients in powers of $m_W/m_\psi$ is \begin{equation} \cffw\pm\mp0 = \sum_n \left(\frac{m_W}{m_\psi}\right)^n \affw\pm\mp0_n(m/{\bar\Lambda})\,. \end{equation} A smooth limit for transverse amplitudes (analogous to that of \autoref{eqn:mffz_HE} in the ${\psi^c}\psi Z$ case) requires $\affw\pm\mp0_{n<0}=0$. The transverse amplitudes therefore receive finite contributions from $\affw\pm\mp0_{n=0}$ only. A smooth limit for the longitudinal amplitudes however requires $m_\psi\, \affw-+0_{n=0} = m_{\psi'}\,\affw+-0_{n=0}$. A fairly peculiar relation between the $\chir+${}$\chir-0$ and $\chir-${}$\chir+0$ couplings is therefore obtained in theories where a massless vector couples to two fermions of different non-vanishing masses. \subsection{\texorpdfstring{${\psi^c}\psi h$}{ffh}} \newcommand{\cffh}[2]{c_{{\psi^c}\psi h}^{\chir{#1}\chir{#2}}} \newcommand{\mffh}[2]{\mathcal{M}({1}_{\psi^c}^{#1},{2}_\psi^{#1}, \bs{3}_{h})} It is straightforward to obtain the general form of the massive fermion-fermion-scalar amplitude: \beq \mathcal{M}(\bs{1}_{{\psi^c}},\bs{2}_{\psi}, \bs{3}_{h})= \cffh++ \sqb{\bs{12}} + \cffh--\anb{\bs{12}}\,. \label{eqn:mffh} \eeq This form does not depend on whether the scalar is massive or massless. The high-energy limit does not lead to any further insights. For a massless fermion, $ \mffh++ \to \cffh++ \sqb{12} $, $\; \mffh-- \to \cffh-- \anb{12} $ where $\cffh\pm\pm$ are now evaluated towards $m_\psi\to0$. We will however show in \autoref{sec:4-pt} that perturbative unitarity requires that these couplings actually vanish for a massless fermion, up to non-renormalizable contributions. \subsection{\texorpdfstring{$ZZh$ and $WWh$}{ZZh and WWh}} \label{sec:vvh} \newcommand{\cvvh}[2]{c_{VVh}^{\chir#1\chir#2}} \newcommand{\czzh}[2]{c_{ZZh}^{\chir#1\chir#2}} \newcommand{\cwwh}[2]{c_{WWh}^{\chir#1\chir#2}} The massive $VVh$ amplitude can be parametrized as \begin{equation} \mathcal{M}(\bs1_V, \bs2_V, \bs3_h) = \frac{\cvvh++}{{\bar\Lambda}} \sqb{\bs1\bs2}^2 + \frac{\cvvh00}{m_V} \sqb{\bs1\bs2}\anb{\bs1\bs2} + \frac{\cvvh--}{{\bar\Lambda}} \anb{\bs1\bs2}^2\,, \label{eqn:mvvh} \end{equation} where $VV$ stands for either $ZZ$ or $W^+W^-$, and $\cvvh{}{}$ are dimensionless. The presence of three independent terms is compatible with the angular-momentum considerations introduced in \autoref{sec:ppZ} since three irreducible representations are found in the product of two spin-$1$ and one spin-$0$ representations: $3\otimes3\otimes1 = 1\oplus3\oplus5$. Similarly to other amplitudes involving scalars, this form does not depend on whether $h$ is massive or not. Given that all spinor structures in \autoref{eqn:mvvh} are symmetric under the exchange of $1\leftrightarrow 2$ spinor labels, the $W^+W^-h$ amplitudes are automatically invariant under charge conjugation. \newcommand{\mzzh}[2]{\mathcal{M}(1_V^#1,2_V^#2,3_h)} In the high-energy limit (with $m_V/E\to 0$ for constant $E/{\bar\Lambda}$ and mass ratios) the fastest growing amplitudes are generated by the $\sqb{\bs1\bs2}^2$ and $\anb{\bs1\bs2}^2$ terms: \begin{equation} \begin{aligned} \mzzh++ &\to \cvvh++ \sqb{12}^2 /{\bar\Lambda},\\ \mzzh-- &\to \cvvh-- \anb{12}^2 /{\bar\Lambda}. \end{aligned} \label{eqn:mvvh_HE} \end{equation} which scale as $E^2$. This justifies the choice of $1/{\bar\Lambda}$ for their normalizations. The $\sqb{\bs1\bs2}^2$ and $\anb{\bs1\bs2}^2$ terms should thus only arise at the non-renormalizable or loop level. Subleading amplitudes, which grow like $E$, are generated by the $\sqb{\bs1\bs2}\anb{\bs1\bs2}$ term for \amp\pm00 and \amp0\pm0 helicities: \begin{equation} \begin{aligned} \mzzh-0 &\to +\anb{12}\anb{13}/\anb{23} \;(\cvvh00 - 2\cvvh-- m_Z/{\bar\Lambda}) /\sq2 ,\\ \mzzh0- &\to -\anb{12}\anb{23}/\anb{13} \;(\cvvh00 - 2\cvvh-- m_Z/{\bar\Lambda}) /\sq2 ,\\ \mzzh0+ &\to -\sqb{12}\sqb{23}/\sqb{13} \;(\cvvh00 - 2\cvvh++ m_Z/{\bar\Lambda}) /\sq2 ,\\ \mzzh+0 &\to +\sqb{12}\sqb{13}/\sqb{23} \;(\cvvh00 - 2\cvvh++ m_Z/{\bar\Lambda}) /\sq2 . \end{aligned} \label{eqn:mvvh_E0} \end{equation} Thus, the high-energy helicity amplitudes with a longitudinal $Z$ boson have the same form as amplitudes with the longitudinal $Z$ replaced by a scalar (see \autoref{eqn:ssv}), consistent with the Goldstone boson equivalence theorem. The \amp\pm\mp0 amplitudes only receive contributions scaling as $m_V\,\cvvh00$ or $m_V^2\,\cvvh\pm\pm/{\bar\Lambda}$ and are therefore subleading in the high-energy limit: \begin{equation} \begin{aligned} \mzzh+- &\to -\sqb{13}^2/\sqb{23}^2\; (\cvvh00 - (\cvvh+++\cvvh--)\: m_Z/{\bar\Lambda})\:m_Z\,,\\ \mzzh-+ &\to -\sqb{23}^2/\sqb{13}^2\; (\cvvh00 - (\cvvh+++\cvvh--)\: m_Z/{\bar\Lambda})\:m_Z\,.\\ \end{aligned} \end{equation} Finally, for purely longitudinal \amp000\ amplitude, we get \begin{equation} \mzzh00 \to - \cvvh00\: (m_h^2-2m_V^2)/2m_V - (\cvvh++ + \cvvh--) m_V^2/{\bar\Lambda}\,. \label{eqn:mvvh_00} \end{equation} This is the only amplitude in which the spinorial structure gives rise, in the high-energy limit, to a factor of $m_h$, leaving a factor of $m_V$ in the denominator for dimensional reasons. \paragraph{Limits to other amplitudes and theories} If $m_V/E$ goes to zero faster than $m_h/E$, the expansion of $\cvvh00$ in powers of $m_V/m_h$, \begin{equation} \cvvh00 = \sum_n \left(\frac{m_V}{m_h}\right)^n a_n(m_h/{\bar\Lambda})\,, \end{equation} is forced by the \amp000 amplitude of \autoref{eqn:mvvh_00} to start at least at $n=1$ ({\em i.e.}, $a_{n<1}=0$). The \amp0\pm0, \amp\pm00 amplitudes of \autoref{eqn:mvvh_E0} then vanish in this limit. Conversely, requiring them to be non-vanishing constrains $m_h/E$ to go to zero at least as fast as $m_V/E$. In the opposite limit, if $m_h/E$ goes to zero faster than $m_V/E$, a smooth limit for the \amp0\pm0, \amp\pm00 amplitudes of \autoref{eqn:mvvh_E0} requires $a_{n>0}=0$. \paragraph{Summary} To summarize, we learn that, \begin{itemize} \item The coupling of a scalar $h$ to two transverse vectors of equal polarizations, only arises at the non-renormalizable or loop level. \item At the renormalizable level, the tree $VVh$ amplitude is controlled by a single coupling. Vector bosons of opposite polarizations are involved. \item The only renormalizable amplitudes that remain non-zero in the high-energy limit are the \amp0\pm0 and \amp\pm00 ones, which involve one transverse and one longitudinal vector. \item The \amp\pm\mp0 and \amp000 amplitudes are proportional to vector and scalar masses in the high-energy limit. \item Allowing mass ratio to vary, the renormalizable \amp0\pm0 and \amp\pm00 amplitudes only remain non-vanishing provided $m_h/E\to0$ at least as fast as $m_V/E$. \end{itemize} These conclusions are again compatible with our knowledge about the Goldstone boson equivalence theorem and of the Higgs mechanism. \subsection{\texorpdfstring{$\gamma\gamma h$}{AAh} and \texorpdfstring{$\gamma Zh$}{AZh}} \newcommand{\caah}[2]{c_{\gamma\gamma h}^{\chir#1\chir#2}} \newcommand{\cazh}[2]{c_{\gamma Z h}^{\chir#1\chir#2}} The $\gamma\gamma h$ amplitude can be obtained from the $VVh$ one of the previous subsection, in the $m_V/m_h\to0$ limit. The $\cvvh00$ coupling then vanishes identically. So one obtains in general: \begin{equation} \mathcal{M}(1^+_\gamma,2^+_\gamma,\bs3_h) = \frac{\caah++}{{\bar\Lambda}} \sqb{12}^2, \qquad\text{and}\qquad \mathcal{M}(1^-_\gamma,2^-_\gamma,\bs3_h) = \frac{\caah--}{{\bar\Lambda}} \anb{12}^2. \end{equation} Thus there is no renormalizable $\gamma\gamma h$ amplitude at tree-level. Similarly for $\gamma Zh$ amplitudes, one can only write the following spinorial structures: \begin{equation} \mathcal{M}(1^+_\gamma,\bs2_Z,\bs3_h) = \frac{\cazh++}{{\bar\Lambda}} \sqb{1\bs2}^2, \qquad\text{and}\qquad \mathcal{M}(1^-_\gamma,\bs2_Z,\bs3_h) = \frac{\cazh--}{{\bar\Lambda}} \anb{1\bs2}^2. \label{eqn:mazh} \end{equation} \subsection{\texorpdfstring{$hhZ$}{hhZ} and \texorpdfstring{$hh\gamma$}{hhA}} \label{sec:hhZhhA} The vector coupling to two identical scalars vanishes because of Bose symmetry. To see this, note first that the $\sqb{\bs{33}}$ and $\anb{\bs{33}}$ bilinears vanish. The $SU(2)$ little-group indices must appear in a symmetric combination, but $\sqb{3^I3^J}=\epsilon^{IJ}m_3=-\anb{3^I3^J}$ is antisymmetric. Thus the $\mathcal{M}(\bs1_h,\bs2_h,\bs3_Z)$ amplitude can only contain the $\langle \bs3(\bs1-\bs2)\bs3]$ spinorial structure. For identical scalars, the amplitude is however required to be symmetric under the $\bs1\leftrightarrow\bs2$ exchange. Since no symmetric structure can be written down, one concludes that the $hhZ$ amplitude vanishes.% \footnote{This gives a short proof that $\rho^0 \to 2 \pi^0$ is forbidden.} Likewise, starting directly with a massless vector, the only possible structure is $[3(\bs{1} - \bs{2})\zeta\rangle/\anb{3 \zeta}$, with some auxiliary spinor $\zeta$ (or similarly with angle and square brackets exchanged). This spinorial structure is again antisymmetric under the $\bs1\leftrightarrow\bs2$ exchange. There is thus no $\mathcal{M}(\bs1_h,\bs2_h,3_\gamma)$ amplitude either. \subsection{\texorpdfstring{$hhh$}{hhh}} The triple-Higgs amplitude is trivial: \begin{equation} \mathcal{M}(\bs1_h,\bs2_h,\bs3_h) = m_h\;c_{hhh}\,. \end{equation} \subsection{\texorpdfstring{$WWZ$}{WWZ}} \label{sec:wwz} \newcommand{\cwwz}[4][]{c_{WWZ}^{\chir{#2}\chir{#3}\chir{#4}}} The $WWZ$ amplitude has a central role in the theory, as it determines the underlying non-abelian gauge structure. The derivation below only relies on the Lorentz structure, namely, the fact that the three particles have spin $1$, and that two of them are mass-degenerate. Indeed, with no information about the remaining amplitudes, we have no notion of charge, and the amplitude we write down below can be interpreted either as the $W^+ W^- Z$ amplitude, with distinguishable $W$s, or as the amplitude of two indistinguishable $W$s carrying an index $a=1,2$. As we will see below, the only renormalizable coupling allowed preserves $U(1)_{{\rm EM}}$. This is related to the fact that only three massive vector bosons participate in the interaction, corresponding to an $SU(2)$ gauge theory. It is also instructive to consider the amplitude for $m_Z=m_W$. The $SU(2)$ group theory structure follows in this case solely from Bose statistics of the three-point amplitude. Constructing the massive $WWZ$ amplitude following the prescription of eq.\,(4.27) in ref.~\cite{Arkani-Hamed:2017jhn} is somewhat tedious. From the eleven spinorial structures originally generated, eight independent ones survive after extensive use of the Schouten identity, momentum conservation, and on-shell conditions. Another way to obtain the same result is to list independent spinor contractions, and construct products of appropriate helicity weights. All possible spinor bilinears can be employed: \begin{equation} \begin{array}{ccc} \anb{\bs{12}}, &\anb{\bs{13}}, &\anb{\bs{23}},\\ \sqb{\bs{12}}, &\sqb{\bs{13}}, &\sqb{\bs{23}}. \end{array} \label{eqn:wwz_bilinears} \end{equation} The $[\bs{ijk}\rangle$ trilinears involving all three spinors can be reduced to bilinears by imposing momentum conservation ($\bs j=-\bs i-\bs k$) and using on-shell conditions like $\bs{k}\ket{\bs{k}} = + m_k \Ket{\bs{k}}$. Quadrilinears and higher multilinears can be reduced in the same way. The $[\bs i (\bs j-\bs k) \bs i\rangle = \langle\bs i(\bs j-\bs k) \bs i]$ trilinears involving identical bra and ket spinors could have been expressed as dot products of momenta if $\bs i$ was massless. They are equivalent to $[\bs i \bs j\bs i\rangle$ or $[\bs i \bs k\bs i\rangle$ structures, up to terms involving bilinear products. In a triple-vector amplitude, since each spinor should appear twice, a $[\bs i \cdot\bs i\rangle$ trilinear would necessarily be multiplied by bilinears involving both $\bs j$ and $\bs k$, or by $[\bs j \cdot\bs j\rangle$ and $[\bs k \cdot\bs k\rangle$ trilinears. Both kinds of products are however reducible to products of bilinears using the Schouten identity, momentum conservation and on-shell conditions. One for instance obtains: \begin{equation} \begin{array}{rcl} [\bs{iji}\rangle \anb{\bs{kj}} =&[\bs{ijk}\rangle \anb{\bs{ij}} - [\bs{ijj}\rangle \anb{\bs{ik}} &= m_i \anb{\bs{ik}}\anb{\bs{ij}} - m_k \sqb{\bs{ik}}\anb{\bs{ij}} - m_j \sqb{\bs{ij}}\anb{\bs{ik}} ,\\[.5ex] [\bs{iji}\rangle [\bs{jij}\rangle =&-\sqb{\bs{ijij}}\anb{\bs{ij}} +[\bs{ijj}\rangle \langle\bs{iij}] &= -2(p_i\cdot p_j) \sqb{\bs{ij}} \anb{\bs{ij}} -m_i m_j (\anb{\bs{ij}}^2+\sqb{\bs{ij}}^2) . \end{array} \end{equation} So one concludes that the amplitudes for three massive vectors can all be constructed from products of the bilinears in \autoref{eqn:wwz_bilinears}. The restriction that each spinor appears exactly twice leads to eight independent terms: \begin{equation} \begin{aligned} \mathcal{M}(\bs 1_W,\bs 2_W,\bs 3_Z) &= \anb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \;\cwwz---/{\bar\Lambda}^2 \\ &+ \anb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} \;\cwwz-00/m_W m_Z \\ &+ \anb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}} \;\cwwz0-0/m_W m_Z \\ &+ \sqb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \;\cwwz00-/m_W^2 \\ &+ \anb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} \;\cwwz00+/m_W^2 \\ &+ \sqb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} \;\cwwz0+0/m_W m_Z \\ &+ \sqb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}} \;\cwwz+00/m_W m_Z \\ &+ \sqb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} \;\cwwz+++/{\bar\Lambda}^2\,, \end{aligned} \hspace{1cm}\text{\raisebox{2.5cm}{\rotatebox{-90}{(superseded by \autoref{eqn:mwwz})}}} \label{eqn:mwwz_preliminary} \end{equation} where the $\cwwz{}{}{}$'s are dimensionless coefficients, and their specific normalizations are chosen for later convenience. Not all of these structures are actually independent. One relation will be found between them. There are indeed seven distinct ways to combine three spin-one representations. Labeling representations by their dimensions, one indeed finds $3\otimes3\otimes3=1\oplus3\oplus3\oplus3\oplus5\oplus5\oplus7$. Additional constraints, not apparent in \autoref{eqn:mwwz_preliminary}, appear in the high-energy limit ($m_Z/E\to 0$, for $m_W/m_Z$ and $E/{\bar\Lambda}$ fixed). Eventually, \autoref{eqn:mwwz_preliminary} will be replaced by \autoref{eqn:mwwz}. \newcommand{\mwwz}[3]{\mathcal{M}(1_W^#1,2_W^#2,3_Z^#3)} The amplitudes with the fastest energy growth ($E^3$) are, \begin{equation} \begin{aligned} \mwwz--- &\to \anb{12}\anb{13}\anb{23} \;\cwwz---/{\bar\Lambda}^2,\\ \mwwz+++ &\to \sqb{12}\sqb{13}\sqb{23} \;\cwwz+++/{\bar\Lambda}^2. \end{aligned} \end{equation} The $\anb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}}$ and $\anb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}}$ spinorial structure should thus only arise at the non-renormalizable (or loop) level. This motivates our initial choice of normalization for those terms. Amplitudes growing like $E^2$ are produced by other terms which are thus also expected to only arise at the non-renormalizable (or loop) level. They are: \begin{equation} \begin{aligned} \mwwz--0 &\to +\anb{12}^2\; (\cwwz-00 - \cwwz0-0) /\sq2 m_Z ,\\ \mwwz-0- &\to -\anb{13}^2\; (\cwwz-00 - \cwwz00- ) /\sq2 m_W ,\\ \mwwz0-- &\to +\anb{23}^2\; (\cwwz0-0 - \cwwz00- ) /\sq2 m_W ,\\ \mwwz0++ &\to +\sqb{23}^2\; (\cwwz0+0 - \cwwz00+ ) /\sq2 m_W ,\\ \mwwz+0+ &\to -\sqb{13}^2\; (\cwwz+00 - \cwwz00+ ) /\sq2 m_W ,\\ \mwwz++0 &\to +\sqb{12}^2\; (\cwwz+00 - \cwwz0+0) /\sq2 m_Z . \end{aligned} \label{eqn:mwwz_E2_preliminary} \hspace{1cm}\text{\raisebox{2.3cm}{\rotatebox{-90}{(superseded by \autoref{eqn:mwwz_E2})}}} \end{equation} A well-behaved high-energy limit can be obtained with the following ansatz: \newcommand{\LA}{[\!L0]0}% \newcommand{\LS}{\{\!L0\}0}% \newcommand{\RA}{[\!R0]0}% \newcommand{\RS}{\{\!R0\}0}% \newcommand{\cwwzLA}{c_{WWZ}^{\LA}}% \newcommand{\cwwzLS}{c_{WWZ}^{\LS}}% \newcommand{\cwwzRA}{c_{WWZ}^{\RA}}% \newcommand{\cwwzRS}{c_{WWZ}^{\RS}}% \begin{equation} \begin{aligned} (\cwwz-00 - \cwwz0-0) /m_Z &\equiv 2\cwwzLA m_W/m_Z{\bar\Lambda}\,,\\ (\cwwz-00 - \cwwz00-) /m_W &\equiv (\cwwzLS + \cwwzLA)/{\bar\Lambda}\,,\\ (\cwwz0-0 - \cwwz00-) /m_W &\equiv (\cwwzLS - \cwwzLA)/{\bar\Lambda}\,,\\ (\cwwz0+0 - \cwwz00+) /m_W &\equiv (\cwwzRS + \cwwzRA)/{\bar\Lambda}\,,\\ (\cwwz+00 - \cwwz00+) /m_W &\equiv (\cwwzRS - \cwwzRA)/{\bar\Lambda}\,,\\ (\cwwz0+0 - \cwwz+00) /m_Z &\equiv 2\cwwzRA m_W/m_Z{\bar\Lambda}\,. \end{aligned} \label{eqn:mwwz_he_constraints} \end{equation} The $\cwwz-00$, $\cwwz0-0$, $\cwwz0+0$ and $\cwwz+00$ coefficients can then for instance be eliminated in favor of the four new ones appearing on the right-hand side of \autoref{eqn:mwwz_he_constraints}. The $\cwwz00\pm$ terms are then \begin{equation} \begin{aligned} &+ (\sqb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \;m_Z/m_W +\anb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}} +\anb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}}) \;\cwwz00-/m_Z m_W \\ &+ (\anb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} \;m_Z/m_W \; +\sqb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} \; +\sqb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}})\, \;\cwwz00+/m_Z m_W\,. \end{aligned} \label{eqn:cwwz_pm} \end{equation} These two spinorial structures are however equivalent. Using the Schouten identity in a form similar to that of \autoref{eqn:x_factor_equalities}, one obtains: \begin{equation} \begin{aligned} \langle\bs{313}]\sqb{\bs{12}} &=m_1\anb{\bs{13}}\sqb{\bs{23}} +m_2\sqb{\bs{13}}\anb{\bs{23}} -m_3\sqb{\bs{13}}\sqb{\bs{23}}\,, \\ [\bs{313}\rangle\anb{\bs{12}} &=m_1\sqb{\bs{13}}\anb{\bs{23}} +m_2\anb{\bs{13}}\sqb{\bs{23}} -m_3\anb{\bs{13}}\anb{\bs{23}}. \end{aligned} \label{eqn:equalities_wwz} \end{equation} The left-hand side of the first equality times $\anb{\bs{12}}$ is equal to that of the second one times $\sqb{\bs{12}}$. One therefore obtains an identity involving only products of bilinears: \begin{equation} \begin{aligned} &m_1\anb{\bs{12}}\anb{\bs{13}}\sqb{\bs{23}} +m_2\anb{\bs{12}}\sqb{\bs{13}}\anb{\bs{23}} +m_3\sqb{\bs{12}}\anb{\bs{13}}\anb{\bs{23}}\\ =\: &m_1\sqb{\bs{12}}\sqb{\bs{13}}\anb{\bs{23}} \:+m_2\sqb{\bs{12}}\anb{\bs{13}}\sqb{\bs{23}} \:+m_3\anb{\bs{12}}\sqb{\bs{13}}\sqb{\bs{23}}\,, \end{aligned} \label{eqn:wwz_bilinear_id} \end{equation} which indeed demonstrates that the two spinorial structures in \autoref{eqn:cwwz_pm} are equivalent. We choose to keep them both and give them the same coefficient $\cwwz{}{}{}=\cwwz00+=\cwwz00-$. Eventually, one therefore obtains that, at the renormalizable level, the $WWZ$ amplitude features a single coupling, namely $\cwwz{}{}{}$, \begin{equation} \begin{aligned} \mathcal{M}(\bs 1_W,\bs 2_W,\bs 3_Z) = &+ \anb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \;\cwwz---/{\bar\Lambda}^2 \\ &+ \anb{\bs{12}} (\anb{\bs{13}} \sqb{\bs{23}} - \sqb{\bs{13}} \anb{\bs{23}} ) \;\cwwzLA/m_Z{\bar\Lambda} \\ &+ \anb{\bs{12}} (\anb{\bs{13}} \sqb{\bs{23}} + \sqb{\bs{13}} \anb{\bs{23}} ) \;\cwwzLS/m_Z{\bar\Lambda} \\[-1mm]& + \Big(\sqb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \;r_{\!\scriptscriptstyle{ZW}} +\anb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}} +\anb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} \\[-2mm] &+ \anb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} \;r_{\!\scriptscriptstyle{ZW}} \; +\sqb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} \; +\sqb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}}\Big)\, \;\cwwz{}{}{}/m_Z m_W \\[-1mm] &+ \sqb{\bs{12}} (\anb{\bs{13}} \sqb{\bs{23}} - \sqb{\bs{13}} \anb{\bs{23}} ) \;\cwwzRA/m_Z{\bar\Lambda} \\ &+ \sqb{\bs{12}} (\anb{\bs{13}} \sqb{\bs{23}} + \sqb{\bs{13}} \anb{\bs{23}} ) \;\cwwzRS/m_Z{\bar\Lambda} \\ &+ \sqb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} \;\cwwz+++/{\bar\Lambda}^2\,, \end{aligned} \label{eqn:mwwz} \end{equation} where we defined $r_{\!\scriptscriptstyle{ZW}}\equiv m_Z/m_W$, and as we will now see, $\cwwzLA=\cwwzRA=0$. It is remarkable that the non-trivial structure of the single renormalizable term is entirely dictated by purely bottom-up considerations, without imposing electroweak symmetry. It is parity invariant, and just flips sign under either $\text{C}$ or $\CP$. All spinorial structures except the $\cwwzLA$ and $\cwwzRA$ ones are actually odd under the $1\leftrightarrow2$ exchange associated with charge conjugation. A $\CP$ conserving interference between, for instance, the renormalizable and $LLL/RRR$ terms is thus obtained if $\cwwz+++=\cwwz---$. Since the renormalizable term is antisymmetric under $1\leftrightarrow2$ exchange, it also preserves $U(1)_{{\rm EM}}$: amplitudes with same-sign $W$s vanish. In contrast, the even character of $\cwwzLA$ and $\cwwzRA$ terms implies that their interferences with the renormalizable term violate $\text{C}$. Since the $W^+W^-Z$ amplitude is self-conjugate, we conclude that $\cwwzLA$ and $\cwwzRA$ must vanish. An explicit matching to the SMEFT confirms this conclusion (see~\autoref{eqn:WWZA}). \newcommand{\cwww}[4][]{c_{WWW}^{\chir{#2}\chir{#3}\chir{#4}}} \paragraph{Massive degenerate vectors and Lie group structure constants.} It is interesting to consider our starting point, \autoref{eqn:mwwz_preliminary} in the $m_W=m_Z$ limit. Labeling the three vectors by $W^{a=1,2,3}$ and choosing them all to have the same helicity (with say, $I=J=1$ for all), Bose symmetry implies,% \footnote{To see this, one can assign a three-index tensor prefactor to each of the spinor structures, and impose overall Bose symmetry under, each particle exchange and a cyclic permutation of all three.} \begin{equation} \begin{aligned} \mathcal{M}(\bs 1_W^a,\bs 2_W^b,\bs 3_W^c) = \epsilon^{abc}\,\bigg\{ &+\anb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \; \cwww---/{\bar\Lambda}^2 \\[-2mm] &+ \Big(\anb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} + \anb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}} + \sqb{\bs{12}} \anb{\bs{13}} \anb{\bs{23}} \\[-2mm] &+ \anb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} + \sqb{\bs{12}} \anb{\bs{13}} \sqb{\bs{23}} + \sqb{\bs{12}} \sqb{\bs{13}} \anb{\bs{23}} \Big)\; \cwww{}{}{}/m_W^2 \\[-2mm] &+ \sqb{\bs{12}} \sqb{\bs{13}} \sqb{\bs{23}} \;\cwww+++/{\bar\Lambda}^2 \bigg\} \,, \end{aligned} \label{eqn:mwww} \end{equation} Thus, with only three vectors, the $SU(2)$ structure constants emerge already at the level of the three-point function. More generally, with $n>3$ degenerate vectors, the $\epsilon^{abc}$ is replaced by completely antisymmetric tensors $C^{abc}$. At this point, we can appeal to the four-point function in the massless limit to obtain the Jacobi identity, which establishes the identification of $C^{abc}$ with the Lie algebra structure constants $f^{abc}$. Restricting attention to any subset of three out of the $n$ vectors, we would again recover $\epsilon^{abc}$; indeed, any three generators form an $SU(2)$ sub-algebra. Note that deriving the $f^{abc}$ structure in the massive case is in some sense more straightforward that in the massless case. Here all three vectors can have the same spin polarization, while in the massless case, the gauge coupling corresponds to \amp\pm\pm\mp\ helicity amplitudes. Since the four $\cwwzLS$, $\cwwzRS$, $\cwwzLA$, $\cwwzRA$ terms are forbidden for vectors of identical masses, they must be proportional to the $m_Z-m_W$ mass difference in the $m_Z \to m_W$ limit. Indeed, in the SM, the source of $\cwwzLS$, $\cwwzRS$ terms (which preserve $\text{C}$) is the additional $U(1)_Y$ (see~\autoref{eqn:WWZS}). Additionally, in a gauge theory featuring a single $SU(2)$, spontaneous symmetry breaking leads to three degenerate massive bosons. \paragraph{High-energy limit} In the high-energy limit, the amplitude of \autoref{eqn:mwwz} has non-renorma\-lizable terms growing as $E^3$ and $E^2$, as well as renormalizable terms scaling as $E$, \begin{align} &\begin{aligned} \mwwz--- &\to \anb{12}\anb{13}\anb{23} \;\cwwz---/{\bar\Lambda}^2,\\ \mwwz+++ &\to \sqb{12}\sqb{13}\sqb{23} \;\cwwz+++/{\bar\Lambda}^2, \end{aligned} \label{eqn:mwwz_E3}\\ \intertext{and} &\begin{aligned} \mwwz--0 &\to +\anb{12}^2\; \cwwzLA \sq2/r_{\!\scriptscriptstyle{ZW}}{\bar\Lambda} ,\\ \mwwz-0- &\to -\anb{13}^2\; (\cwwzLS + \cwwzLA)/\sq2{\bar\Lambda} ,\\ \mwwz0-- &\to +\anb{23}^2\; (\cwwzLS - \cwwzLA)/\sq2{\bar\Lambda} ,\\ \mwwz0++ &\to +\sqb{23}^2\; (\cwwzRS + \cwwzRA)/\sq2{\bar\Lambda} ,\\ \mwwz+0+ &\to -\sqb{13}^2\; (\cwwzRS - \cwwzRA)/\sq2{\bar\Lambda} ,\\ \mwwz++0 &\to -\sqb{12}^2\; \cwwzRA \sq2/r_{\!\scriptscriptstyle{ZW}}{\bar\Lambda} , \end{aligned} \label{eqn:mwwz_E2}\\ \intertext{and} &\begin{aligned} \mwwz--+ &\to - {\anb{12}^3}/{\anb{13}\anb{23}} \;\:\cwwz{}{}{} ,\\ \mwwz-00 &\to + {\anb{12}\anb{13}}/{\anb{23}} \;\:(r_{\!\scriptscriptstyle{ZW}}\,\cwwz{}{}{} + (\cwwzRA - \cwwzLA)\: m_W/r_{\!\scriptscriptstyle{ZW}}{\bar\Lambda}) ,\\ \mwwz-+- &\to - {\anb{13}^3}/{\anb{12}\anb{23}} \;\: (\cwwz{}{}{} + (\cwwzRS +\cwwzRA)\,m_W/{\bar\Lambda}) ,\\ \mwwz-++ &\to - {\sqb{23}^3}/{\sqb{12}\sqb{13}} \;\: (\cwwz{}{}{} + (\cwwzLS+\cwwzLA)\,m_W/{\bar\Lambda}) ,\\ \end{aligned}\nonumber\\ &\begin{aligned} \mwwz0-0 &\to + {\anb{12}\anb{23}}/{\anb{13}} \;\:(r_{\!\scriptscriptstyle{ZW}}\,\cwwz{}{}{} - (\cwwzRA - \cwwzLA) m_W/r_{\!\scriptscriptstyle{ZW}}{\bar\Lambda}) ,\\ \mwwz00- &\to + {\anb{13}\anb{23}}/{\anb{12}} \;\:((2 - r_{\!\scriptscriptstyle{ZW}}^2)\cwwz{}{}{} + (\cwwzRS+\cwwzLS)\: m_W/{\bar\Lambda}) ,\hspace*{-4cm}\\ \mwwz00+ &\to + {\sqb{13}\sqb{23}}/{\sqb{12}} \;\:((2 - r_{\!\scriptscriptstyle{ZW}}^2)\cwwz{}{}{} + (\cwwzRS+\cwwzLS)\: m_W/{\bar\Lambda}) ,\hspace*{-4cm}\\ \mwwz0+0 &\to + {\sqb{12}\sqb{23}}/{\sqb{13}} \;\:(r_{\!\scriptscriptstyle{ZW}}\,\cwwz{}{}{} - (\cwwzRA - \cwwzLA) m_W/r_{\!\scriptscriptstyle{ZW}}{\bar\Lambda}) ,\\ \end{aligned} \label{eqn:mwwz_E1}\\ &\begin{aligned} \mwwz+-- &\to - {\anb{23}^3}/{\anb{12}\anb{13}} \;\: (\cwwz{}{}{} + (\cwwzRS-\cwwzRA)\,m_W/{\bar\Lambda}) ,\\ \mwwz+-+ &\to - {\sqb{13}^3}/{\sqb{12}\sqb{23}} \;\: (\cwwz{}{}{} + (\cwwzLS-\cwwzLA)\,m_W/{\bar\Lambda}) ,\\ \mwwz+00 &\to + {\sqb{12}\sqb{13}}/{\sqb{23}} \;\:(r_{\!\scriptscriptstyle{ZW}}\,\cwwz{}{}{} + (\cwwzRA - \cwwzLA)\: m_W/r_{\!\scriptscriptstyle{ZW}}{\bar\Lambda} ,\\ \mwwz++- &\to - {\sqb{12}^3}/{\sqb{13}\sqb{23}} \;\:\cwwz{}{}{} .\\ \end{aligned} \nonumber \end{align} \paragraph{Limits to other amplitudes and theories} Taking $m_W$ to zero faster than $m_Z$ ($1/r_{\!\scriptscriptstyle{ZW}}=m_W/m_Z\to0$) one can expand $\cwwz{}{}{}$, like other coefficients, in powers of $m_W/m_Z$, \begin{equation} \cwwz{}{}{} = \sum_n \left(\frac{m_W}{m_Z}\right)^n \:a_n(m/{\bar\Lambda})\,, \end{equation} A smooth limit for \amp00\pm\ amplitudes requires $a_{n<2}=0$. They only receive finite contributions from $a_{n=2}$. The $a_{n\ge2}$ terms are however irrelevant for all other amplitudes in this limit. The purely non-renormalizable coefficients have $m_W/m_Z$ expansions which are forced by $E^3$ and $E^2$ amplitudes to only contain non-negative powers. The \amp\pm\pm0 amplitudes therefore vanish in this limit. Taking $m_Z/E$ to zero faster than $m_W/E$, the fully transverse amplitudes of \autoref{eqn:mwwz_E1} require $a_{n>0}=0$ and only receive finite contributions from $a_{n=0}$. Lower powers are irrelevant for all other amplitudes. The purely non-renormalizable terms have a $m_Z/m_W=r_{\!\scriptscriptstyle{ZW}}$ expansion which is forced by $E^3$ and $E^2$ amplitudes to contain only non-negative powers. The $\cwwzLA$ and $\cwwzRA$ coefficients are moreover required by \amp\pm\pm0 amplitudes to start with a strictly positive power of $m_Z/m_W=r_{\!\scriptscriptstyle{ZW}}$. \subsection{\texorpdfstring{$WW\gamma$}{WWA}} \label{sec:wwa} \newcommand{\cwwa}[3]{c_{WW\gamma}^{\chir{#1}\chir{#2}\chir{#3}}} Instead of constructing the $WW\gamma$ amplitude from scratch, it is instructive to obtain it from the massless $Z$-boson limit of the $WWZ$ amplitude. For the positive helicity photon amplitude, $\mathcal{M}(\bs 1_W,\bs 2_W,3_\gamma^+)$, one obtains from \autoref{eqn:mwwz}: \begin{equation} \begin{aligned} &+\anb{\bs{12}} \anb{\bs1 3_q} \anb{\bs2 3_q} \;\cwwz---/{\bar\Lambda}^2 \\ &+\sqb{\bs{12}} \anb{\bs1 3_q} \anb{\bs2 3_q} \;\cwwz{}{}{}/m_W^2 \\ &+\anb{\bs{12}} (\anb{\bs1 3_q} \sqb{\bs2 3} - \anb{\bs2 3_q} \sqb{\bs1 3}) \;\cwwzLA/m_Z{\bar\Lambda} \\ &+\sqb{\bs{12}} (\anb{\bs1 3_q} \sqb{\bs2 3} - \anb{\bs2 3_q} \sqb{\bs1 3}) \;\cwwzRA/m_Z{\bar\Lambda} \\ &+\anb{\bs{12}} (\anb{\bs1 3_q} \sqb{\bs2 3} + \anb{\bs2 3_q} \sqb{\bs1 3}) \;(\cwwz{}{}{} + \cwwzLS\:m_W/{\bar\Lambda})/m_Zm_W \\ &+\sqb{\bs{12}} (\anb{\bs1 3_q} \sqb{\bs2 3} + \anb{\bs2 3_q} \sqb{\bs1 3}) \;(\cwwz{}{}{} + \cwwzRS\:m_W/{\bar\Lambda})/m_Zm_W \\ &+\anb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3} \;\cwwz{}{}{}/m_W^2 \\ &+\sqb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3} \;\cwwz+++/{\bar\Lambda}^2\,. \end{aligned} \label{eqn:mwwz_massless} \end{equation} According to our discussion of the $m_Z/m_W\to0$ limit in the previous subsection, the expansion of all $\cwwz{}{}{}$ involves only non-negative powers of $m_Z/m_W$. The expansion of $\cwwzLA$ and $\cwwzRA$ coefficients also starts with a strictly positive power. Given that $\ket{3_q}$ scales as $m_Z/\sqrt{E}$, one obtains that the first four terms of \autoref{eqn:mwwz_massless} vanish in the $m_Z/m_W\to 0$ limit. Introducing an auxiliary spinor $\zeta$, one can identify $\ket{3_q}/m_Z\to \ket{\zeta}/\anb{3\zeta}$ (and similarly $\Ket{3_q}/m_Z\to \Ket{\zeta}/\sqb{\zeta3}$). Using the equalities of \autoref{eqn:x_factor_equalities}, one can also rewrite: \begin{equation} \begin{aligned} \anb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3} &= m_W(\anb{\bs{12}}-\sqb{\bs{12}}) (\anb{\bs1\zeta}\sqb{\bs23} +\anb{\bs2\zeta}\sqb{\bs13})/\anb{3\zeta} , \\ \sqb{\bs{12}} \anb{\bs1 3} \anb{\bs2 3} &= m_W(\sqb{\bs{12}}-\anb{\bs{12}}) (\sqb{\bs1\zeta}\anb{\bs23} +\sqb{\bs2\zeta}\anb{\bs13})/\sqb{3\zeta} . \end{aligned} \label{eqn:x_factor_consequence} \end{equation} The spinorial structures in the fifth to seventh lines in \autoref{eqn:mwwz_massless} thus reduce to two independent structures. One can also introduce the massless polarization vector of \autoref{eqn:polarimassless1} and \eqref{eqn:polarimassless2} to rewrite: \begin{equation} \begin{aligned} (\anb{\bs1\zeta}\sqb{\bs23} +\anb{\bs2\zeta}\sqb{\bs13})/\anb{3\zeta} &= -(\langle\bs1\varepsilon^+_3 \bs2] + \langle\bs2\varepsilon^+_3 \bs1])/\sq2 \,, \\ (\sqb{\bs1\zeta}\anb{\bs23} +\sqb{\bs2\zeta}\anb{\bs13})/\sqb{3\zeta}\; &= -(\langle\bs1\varepsilon^-_3 \bs2] + \langle\bs2\varepsilon^-_3 \bs1])/\sq2 \,. \end{aligned} \end{equation} Thus, the massless $Z$-boson limit of the $WWZ$ amplitude yields only three terms with a positive-helicity $Z$: \begin{equation} \begin{aligned} &-\anb{\bs{12}} (\langle\bs1\varepsilon_3^+\bs2] + \langle\bs2\varepsilon_3^+\bs1]) \;(2\cwwz{}{}{} + \cwwzLS\:m_W/{\bar\Lambda})/\sq2 m_W \\ &-\sqb{\bs{12}} (\langle\bs1\varepsilon_3^+\bs2] + \langle\bs2\varepsilon_3^+\bs1]) \;\cwwzRS/\sq2{\bar\Lambda} \\[1mm] &+\sqb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3} \;\cwwz+++/{\bar\Lambda}^2 . \end{aligned} \label{eqn:cwwz_to_cwwA} \end{equation} One can finally use \autoref{eqn:x_factor_consequence} to trade $\sqb{\bs{12}} (\langle\bs1\varepsilon_3^+\bs2] + \langle\bs2\varepsilon_3^+\bs1])$ for a combination of $\anb{\bs{12}} (\langle\bs1\varepsilon_3^+\bs2] + \langle\bs2\varepsilon_3^+\bs1])$ and $\anb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3}/m_W$. Following the same reasoning for the $\mathcal{M}(\bs 1_W,\bs 2_W, 3_\gamma^-)$ amplitude, and introducing new $\cwwa{}{}{}$ coefficients, one thus finally obtains: \begin{equation} \begin{aligned} \mathcal{M}(\bs 1_W,\bs 2_W, 3_\gamma^+) = &+\sqb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3} \;\cwwa+++/{\bar\Lambda}^2 \\ &+\anb{\bs{12}} \sqb{\bs1 3} \sqb{\bs2 3} \;\cwwa00+/m_W{\bar\Lambda} \\ &+\anb{\bs{12}} (\langle\bs1\varepsilon^+_3\bs2]+\langle\bs2\varepsilon^+_3\bs1]) \; \cwwa{}{}{}/m_W\,, \\ \mathcal{M}(\bs 1_W,\bs 2_W, 3_\gamma^-) = &+\anb{\bs{12}} \anb{\bs1 3} \anb{\bs2 3} \;\cwwa---/{\bar\Lambda}^2 \\ &+\sqb{\bs{12}} \anb{\bs1 3} \anb{\bs2 3} \;\cwwa00-/m_W{\bar\Lambda} \\ &+\sqb{\bs{12}}\: (\langle\bs1\varepsilon^-_3\bs2]+\langle\bs2\varepsilon^-_3\bs1]) \; \cwwa{}{}{}/m_W \,, \end{aligned} \label{eqn:mwwa} \end{equation} with, in particular, \begin{equation} -(2\cwwz{}{}{} + (\cwwzLS + \cwwzRS) m_W/{\bar\Lambda})/\sq2 \to \cwwa{}{}{}\,. \label{eqn:cwwz2cwwa} \end{equation} The same result can also be obtained from eq.~(4.12) of ref.~\cite{Arkani-Hamed:2017jhn}. The presence of five independent coefficients is compatible with the angular-momentum counting introduced in \autoref{sec:ppZ}. Placing the two photon components in a fundamental representation and labeling representations by their dimensions, one indeed obtains five terms in the $3\otimes3\otimes2= 2\oplus2\oplus4\oplus4\oplus6$ decomposition. \subsection{\texorpdfstring{$ZZZ$, $ZZ\gamma$, $Z\gamma\gamma$, and $\gamma\gamma\gamma$}{ZZZ, ZZA, ZAA, and AAA}} \newcommand{\mzzz}[3]{\mathcal{M}(1_Z^#1,2_Z^#2,3_Z^#3)} \newcommand{\czzz}[3]{c_{ZZZ}^{#1#2#3}} In our discussion of the $WWZ$ amplitude, we found that for three mass-degenerate vectors, the $V^a V^b V^c$ amplitude is proportional to $\epsilon^{abc}$. The $ZZZ$ amplitude therefore vanishes identically. In amplitudes involving three identical massless vectors, permutation symmetry must be enforced among the same helicity ones. Amplitudes involving three massless vectors of identical helicity are formed as spinor bilinear products like $\anb{12}\anb{13}\anb{23}$. No fully symmetric combination can be formed out of such structures. Amplitudes involving two massless vectors of identical helicity take forms like the ${\anb{12}^3}/{\anb{13}\anb{23}}$ one for the \amp--+ case. They are thus antisymmetric under the exchange of the same-helicity vectors and therefore also vanish if those are identical. We therefore conclude that no $\gamma\gamma\gamma$ amplitude can be written down. Similarly, the $ZZ\gamma$ amplitude can be obtained from the $WW \gamma$ one with a symmetrization under $1\leftrightarrow 2$ exchange. All the spinorial structures of the $WW \gamma$ amplitude are however antisymmetric under that exchange. So we conclude that no $ZZ\gamma$ amplitude can be written down. The $\mathcal{M}(\bs 1_Z, 2^{h_2}_\gamma,3^{h_3}_\gamma)$ amplitude is restricted by little-group considerations to the following structures (see {\em e.g.}\ refs.~\cite{Arkani-Hamed:2017jhn}): $[\bs{1} 2]^{1 + h_2 - h_3}[\bs{1} 3]^{1 + h_3 - h_2} [23]^{h_2 + h_3 -1}= [\bs{1}2][\bs{1}3][23]$, $\anb{\bs{1}2}\anb{\bs{1}3} \anb{23}$ which are also antisymmetric under the $2\leftrightarrow 3$ exchange and thus incompatible with Bose statistics. So we conclude that no $Z\gamma\gamma$ amplitude can be written down in agreement with the Landau--Yang theorem~\cite{Landau:1948kw, Yang:1950rg}. \subsection{High-energy theory and \texorpdfstring{$SU(2)_L\times U(1)_Y$}{SU(2)L x U(1)Y}} \label{sec:hesu2} Our approach throughout this paper is purely bottom-up. We only assume the unbroken symmetries of the SM, and we expect the $SU(2)_L\times U(1)_Y$ structure to emerge once unitarity is imposed on the four- and higher-point amplitudes of the SM particles. It is instructive however to briefly comment on how this gauge structure emerges if we instead assume that the theory has a smooth massless limit, and make contact with the high-energy theory. The high-energy theory comprises four massless spin-one degrees of freedom arising as linear combinations of the $W^\pm$, $Z$ and the photon, as well as four scalars arising from the Higgs $h$ and the longitudinal components of the $W^\pm$ and $Z$. The $WWZ$ amplitude then includes interactions between three massless transverse vectors, and we have already seen that, for degenerate vectors $V^{a=1,2,3}$, it is proportional to $\epsilon^{abc}$. We can furthermore isolate a $U(1)_Y$ gauge boson, by defining the combination $B \propto \sqrt{2} c_{WWZ} \, \gamma + c_{WW\gamma}\, Z$, such that the renormalizable $WWB$ amplitude vanishes in the high-energy limit for transverse polarizations.% \footnote{The appearance of this specific combination can be traced back to the renormalizable part of the \autoref{eqn:cwwz2cwwa} redefinition performed when taking the limit of the $WWZ$ amplitude to the $WW\gamma$ one.} The high-energy limit of the ${\psi^c}\psi'W$ amplitudes then implies that the fermions come in specific $SU(2)_L$ representations. Similarly, the coupling of the scalar to the longitudinal components of the vector implies that they should be embedded in a $SU(2)_L$ multiplet in the high-energy theory. With one scalar and three longitudinal vector components, one can form a complex doublet. A consistent factorization of the massless fermion-fermion-vector-vector or scalar-scalar-vector-vector amplitudes moreover relate the fermion-vector, scalar-vector, and triple-vector couplings~\cite{Arkani-Hamed:2017jhn} for both $SU(2)_L$ and $U(1)_Y$ vectors. The $SU(2)_L\times U(1)_Y$ symmetry of the massless high-energy theory can thus be inferred from known results mostly concerning massless amplitudes. We expect that the same conclusion can be obtained by considering the high-energy limit of massive four- and higher-point amplitudes. Their study is postponed to future work but we detail the specific example of the ${\psi^c}\psi Zh$ amplitude in the next section. \section{Four-point \texorpdfstring{${\psi^c} \psi Z h$}{ffZh} amplitude} \label{sec:4-pt} We now turn to the construction of four-point, tree-level amplitudes. These generically have factorizable parts, featuring single-particle poles, and non-factorizable parts, or contact-terms, with no negative powers of the kinematic invariants. For the massive external states considered here, constructing the factorizable part is straightforward: each pole is associated with a particular factorization channel, and its residue is given by the product of two on-shell three-point functions. This part of the amplitude can be simply obtained by gluing two three-point amplitudes, with the appropriate propagator. Thus for example, gluing two three-point amplitudes along a massive vector line gives, \begin{equation} - \frac{1}{p^2-m^2} \left[ \sum_{I,J,\tilde{I},\tilde{J}=1,2} \frac{\mathcal{M}^{IJ}_1(p) + \mathcal{M}^{JI}_1(p)}{2}\; \epsilon_{I\tilde I}\;\epsilon_{J\tilde J} \frac{\mathcal{M}^{\tilde I\tilde J}_2(\tilde p) + \mathcal{M}^{\tilde J\tilde I}_2(\tilde p)}{2} \right]_{p^2=m^2}\,, \label{eqn:gluing_prescription} \end{equation} where $m$ is the vector mass, and $\tilde p$ stands for an {\sl outgoing} momentum. Pictorially, \begin{center} \begin{fmfgraph*}(40,20) \fmfleft{l1,l2} \fmfright{r1,r2} \fmf{vanilla}{l1,v1,l2} \fmf{photon,tension=1, lab=$\leftarrow p$}{v1,v2} \fmf{vanilla}{r1,v2,r2} \fmfv{d.shape=circle,d.fill=shaded, lab=$\mathcal{M}_1^{IJ}(p)$,lab.angle=180, lab.dist=4mm}{v1} \fmfv{d.shape=circle,d.fill=shaded, lab=$\mathcal{M}_2^{\tilde{I}\tilde{J}}(\tilde{p})\;.$,lab.angle=0, lab.dist=4mm}{v2} \fmffreeze \fmfcmd{ vdraw; pair mid; path p; mid := .5[vloc(__v1),vloc(__v2)]; p := (-.5mm,-1.5mm)--(.5mm,1.5mm); draw (p shifted mid) withpen (pencircle xscaled 1mm) withcolor white; draw ((p shifted mid) shifted (.5mm,0)); draw ((p shifted mid) shifted (-.5mm,0)); vlist.last := 0; } \end{fmfgraph*} \end{center} Recall that so far we have taken all momenta to be incoming. When gluing together two three-point amplitudes, we need to consistently define the contractions of bolded spinors for incoming and outgoing momenta. These are discussed in \subappref{sec:massive_gluing}. To obtain the non-factorizable component, we write the most general kinematic structures involving positive powers of the spinor products, that are consistent with little-group constraints, similarly to the derivation of the three-point amplitudes. These structures appear with a-priori arbitrary coefficients. Combining the factorizable and non-factorizable pieces we thus get the most general amplitude which consistently factorizes on single particle poles. Imposing $SU(2)_L\times U(1)_Y$, or alternatively, requiring perturbative unitarity, would imply specific relations between the contact-term coefficients and the couplings of three-point amplitudes. For definiteness, we will focus on the ${\psi^c} \psi Z h$ amplitudes relevant for Higgs decay and associated production at both hadron and lepton colliders. The high-energy limit of non-factorizable contributions does not lead to energy growths that are not matched by appropriate power of the cutoff ${\bar\Lambda}$. This does however occur for factorizable contributions, which feature negative powers of the masses, and thus allow us to derive relations between amplitude coefficients, satisfied up to $m/{\bar\Lambda}$ corrections. \subsection{Non-factorizable contributions} \newcommand{\cffzh}[4][]{c_{{\psi^c}\psi Z h}^{\chir{#2}\chir{#3}\chir{#4}#1}} \newcommand{^\text{nf}}{^\text{nf}} Using momentum conservation, Schouten identities, on-shell conditions and Dirac matrix algebra, it is possible to show that all non-factorizable contributions to the fully massive ${\psi^c}\psi Zh$ four-point amplitude can be reduced to the following twelve terms: \begin{equation} \begin{aligned} \mathcal{M}^\text{nf}(\bs1_{\psi^c},\bs2_\psi,\bs3_Z,\bs4_h) &= \frac{\cffzh+++}{{\bar\Lambda}^2} \sqb{\bs{13}}\sqb{\bs{23}} + \frac{\sqb{\bs{12}}}{{\bar\Lambda}^3} \langle\bs3\;\{ \cffzh[_A]++0 (\bs1+\bs2) +\cffzh[_S]++0 (\bs1-\bs2) \}\;\bs3] \\&+ \frac{\cffzh+-0}{{\bar\Lambda}^2}\sqb{\bs{13}}\anb{\bs{23}} + \frac{\cffzh+-+}{{\bar\Lambda}^3}[\bs{312}\rangle \sqb{\bs{13}} + \frac{\cffzh+--}{{\bar\Lambda}^3}\langle\bs{321}] \anb{\bs{23}} \\&+ \frac{\cffzh-+0}{{\bar\Lambda}^2}\anb{\bs{13}}\sqb{\bs{23}} + \frac{\cffzh-++}{{\bar\Lambda}^3}[\bs{321}\rangle \sqb{\bs{23}} + \frac{\cffzh-+-}{{\bar\Lambda}^3}\langle\bs{312}] \anb{\bs{13}} \\&+ \frac{\cffzh---}{{\bar\Lambda}^2} \anb{\bs{13}}\anb{\bs{23}} + \frac{\anb{\bs{12}}}{{\bar\Lambda}^3} \langle\bs3\;\{ \cffzh[_A]--0 (\bs1+\bs2) +\cffzh[_S]--0 (\bs1-\bs2) \}\;\bs3] . \end{aligned} \label{eqn:mffzh} \end{equation} In the case of three-point amplitudes, all kinematics dependence was included in the spinor structures, leaving only constant coefficients. For four-point amplitudes such as that of \autoref{eqn:mffzh}, the twelve $\cffzh{}{}{}$ coefficients are functions of $s_{ij}$. At tree-level, each of them is given as an expansion in positive powers of the $s_{ij}$. In the construction of \autoref{eqn:mffzh}, $p_4$ is eliminated using momentum conservation. Each term must contain a single angle- or square-bracket spinor for particles $1$ and $2$, as well as two such spinors for particle $3$, and therefore involves two spinor products. In order to find the independent structures, one need only start with terms involving two spinor products and up to one insertion of each of the momenta, since multiple insertions can be eliminated using anti-commutation relations and/or on-shell conditions. We have verified explicitly that these structures can be systematically reduced to \autoref{eqn:mffzh}. The following equality is for instance used to eliminate the $\chir+\chir+\chir-$ term (and the $\chir-\chir-\chir+$ one by exchanging square and angle brackets): \begin{multline} \sqb{\bs{12}}\anb{\bs{3123}} =\: 2\; \sqb{\bs{12}} \; \langle\bs3\;\{ \bs1\: (p_2\cdot p_3) -\bs2\: (p_1\cdot p_3)\}\; \bs3] /m_3 \\- 2(p_1\cdot p_2) \sqb{\bs{13}}\sqb{\bs{23}} - m_1 [\bs{321}\rangle \sqb{\bs{23}} - m_2 [\bs{312}\rangle \sqb{\bs{13}}. \label{eqn:ffzh++-} \end{multline} Remarkably, the first term on the right-hand side has a well-defined $m_3\to 0$ limit since the leading $(p_2\cdot p_3) \langle3 1 3 ] - (p_1\cdot p_3) \langle 3 2 3]$ term vanishes identically. We also note that the second line is equal to $\sqb{\bs{12}}\sqb{\bs{3213}}$, a structure that is thus also reducible to the ones of \autoref{eqn:mffzh}. The massless fermion amplitude can be obtained by simply unbolding the fermion spinors. A direct derivation of the massless fermion amplitude is provided in \autoref{sec:ffZh_EFT_derivation}. The agreement between the results of \autoref{eqn:mffzh}, \autoref{eqn:ffZh_EFT_helicity_amp_appendix} in the massless fermion limit establishes the independence of the twelve terms of \autoref{eqn:mffzh}. This independence can also be verified numerically, by considering vectors formed by the numerical values of the twelve spinor structures for arbitrary choices of momenta, and verifying that they are linearly independent. \newcommand{\mffzh}[4][]{\mathcal{M}#1(1_{\psi^c}^#2,2_\psi^#3,3_Z^#4,4_h)} The leading high-energy contributions are obtained by simple \emph{unbolding} of the spinorial structures in \autoref{eqn:mffzh} (see also a direct derivation from $U(1)$ little group in \subappref{sec:massless_ffzh}): \begin{equation} \begin{aligned} \mffzh[^\text{nf}]+++ &\to \sqb{13}\sqb{23} \;\cffzh+++ /{\bar\Lambda}^2 ,\\ \mffzh[^\text{nf}]++0 &\to 2\;\sqb{12} \;\{ \cffzh[_A]++0\; p_3\cdot(p_1+p_2) + \cffzh[_S]++0\; p_3\cdot(p_1-p_2)\} /{\bar\Lambda}^3 ,\\ \mffzh[^\text{nf}]+-0 &\to -[132\rangle \;\cffzh+-0 /{\bar\Lambda}^2 ,\\ \mffzh[^\text{nf}]+-+ &\to - \langle 1 2\rangle \sqb{13}^2 \;\cffzh+-+ /{\bar\Lambda}^3 ,\\ \mffzh[^\text{nf}]+-- &\to [12] \anb{23}^2 \;\cffzh+-- /{\bar\Lambda}^3 ,\\ \mffzh[^\text{nf}]-+0 &\to -[231\rangle \;\cffzh-+0 /{\bar\Lambda}^2 ,\\ \mffzh[^\text{nf}]-++ &\to \langle12 \rangle\sqb{23}^2 \;\cffzh-++ /{\bar\Lambda}^3 ,\\ \mffzh[^\text{nf}]-+- &\to - [12] \anb{13}^2 \;\cffzh-+- /{\bar\Lambda}^3 ,\\ \mffzh[^\text{nf}]--- &\to \anb{13}\anb{23} \;\cffzh--- /{\bar\Lambda}^2 ,\\ \mffzh[^\text{nf}]--0 &\to 2\;\anb{12} \;\{ \cffzh[_A]--0\; p_3\cdot(p_1+p_2) + \cffzh[_S]--0\; p_3\cdot(p_1-p_2)\} /{\bar\Lambda}^3 . \end{aligned} \end{equation} This justifies the normalization adopted with inverse powers of ${\bar\Lambda}$ (at tree level). In the SMEFT, dimension-six operators (dipoles and vectors) lead to the four $1/{\bar\Lambda}^2$ structures (see \subappref{sec:matching_ffzh}). The missing $\mffzh[^\text{nf}]++-\;\text{ and }\;\mffzh[^\text{nf}]--+$ amplitudes are generated at orders $1/{\bar\Lambda}^4$ (see \autoref{eqn:massless_FFVS}) by the specific linear combination in the right-hand side of \autoref{eqn:ffzh++-} and its analogue with square and angle brackets interchanged. In the soft-Higgs limit, with the four-momentum $p_\bs4\to 0$, only the four $1/{\bar\Lambda}^2$ terms of \autoref{eqn:mffzh} survive, reproducing the list of structures found for the ${\psi^c}\psi Z$ amplitude in \autoref{eqn:mffz}. Indeed, at the level of the non-factorizable terms, this limit corresponds to setting the Higgs field to its vacuum expectation value. \subsection{Factorizable contributions} Given the field content of our electroweak theory, the possible factorizable contributions to the ${\psi^c}\psi Zh$ amplitudes are: \begin{equation}\raisebox{-10mm}{% \fmfframe(5,5)(5,5){\begin{fmfgraph*}(20,10) \fmfleft{l1,l2} \fmfright{r1,r2} \fmf{fermion}{l1,v1,l2} \fmflabel{$\bs2_\psi$}{l1} \fmflabel{$\bs1_{\psi^c}$}{l2} \fmf{photon,tens=1,lab=$\bs p_{Z,,\gamma}$}{v1,v2} \fmf{photon}{v2,r2} \fmflabel{$\bs3_Z$}{r2} \fmf{dashes}{v2,r1} \fmflabel{$\bs4_h$}{r1} \end{fmfgraph*}} \quad \fmfframe(5,5)(5,5){\begin{fmfgraph*}(20,10) \fmfleft{l1,l2} \fmfright{r1,r2} \fmf{fermion}{l1,v1} \fmf{fermion}{v2,l2} \fmflabel{$\bs2_\psi$}{l1} \fmflabel{$\bs1_{\psi^c}$}{l2} \fmf{fermion,tens=.5,lab=$\bs p_\psi$}{v1,v2} \fmf{photon}{v2,r2} \fmflabel{$\bs3_Z$}{r2} \fmf{dashes}{v1,r1} \fmflabel{$\bs4_h$}{r1} \end{fmfgraph*}} \quad \fmfframe(5,5)(5,5){\begin{fmfgraph*}(20,10) \fmfleft{l1,l2} \fmfright{r1,r2} \fmf{fermion}{l1,v1} \fmf{fermion}{v2,l2} \fmflabel{$\bs2_\psi$}{l1} \fmflabel{$\bs1_{\psi^c}$}{l2} \fmf{fermion,tens=.5,lab=$\bs p_\psi$,lab.side=left}{v1,v2} \fmf{phantom}{v2,r2} \fmf{phantom}{v1,r1} \fmffreeze \fmf{photon}{v1,r2} \fmflabel{$\bs3_Z$}{r2} \fmf{dashes}{v2,r1} \fmflabel{$\bs4_h$}{r1} \end{fmfgraph*}} \quad \fmfframe(5,5)(5,5){\begin{fmfgraph*}(20,10) \fmfleft{l1,l2} \fmfright{r1,r2} \fmf{fermion}{l1,v1,l2} \fmflabel{$\bs2_\psi$}{l1} \fmflabel{$\bs1_{\psi^c}$}{l2} \fmf{dashes,tens=1,lab=$\bs p_h$}{v1,v2} \fmf{photon}{v2,r2} \fmflabel{$\bs3_Z$}{r2} \fmf{dashes}{v2,r1} \fmflabel{$\bs4_h$}{r1} \end{fmfgraph*}} } \label{eqn:ffzh_diagrams} . \end{equation} We know however that, for identical scalars, the $hhZ$ amplitude vanishes on-shell. Thus, only $s$-channel $Z$ and photon exchanges, as well as $t$- and $u$-channel fermion ones have to be considered. We treat each of those contributions in turn, employing the \emph{gluing} prescription detailed in \autoref{sec:massive_gluing}. \paragraph{\texorpdfstring{$s$}{s}-channel \texorpdfstring{$Z$}{Z} exchange} Let us start with the $s$-channel $Z$-boson exchange. The three-point amplitudes to be joined are those of \autoref{eqn:mffz} and \eqref{eqn:mvvh}. Applying the prescription of \autoref{eqn:gluing_prescription}, we obtain the following $s$-channel amplitude: \begin{equation} \begin{aligned} \mathcal{M}^Z(\bs1_{\psi^c},\bs2_\psi,\bs3_Z,\bs4_h) &\times (s-m_Z^2)=\\ &+(\anb{\bs{12}} - \sqb{\bs{12}}) \; \langle\bs3(\bs1+\bs2)\bs3] \; (\cffz+-0 - \cffz-+0) \czzh00 \; m_\psi/2m_Z^2 \\ &- \anb{\bs{13}} \sqb{\bs{23}}\; \cffz-+0 \czzh00 \\ &- \anb{\bs{23}} \sqb{\bs{13}}\; \cffz+-0 \czzh00 \\[1.5mm] &+(\anb{\bs{12}}-\sqb{\bs{12}}) \langle\bs3 (\bs1-\bs2) \bs3] \; (\cffz--- - \cffz+++) \czzh00 \; /4{\bar\Lambda} \\ &+(\anb{\bs{12}}+\sqb{\bs{12}}) \langle\bs3 (\bs1-\bs2) \bs3] \; (\cffz--- + \cffz+++) \czzh00 \; /4{\bar\Lambda} \\ &-(\anb{\bs{13}} \sqb{\bs{23}} + \anb{\bs{23}} \sqb{\bs{13}}) \; (\cffz--- + \cffz+++) \czzh00 \; m_\psi/{\bar\Lambda} \\[1.5mm] &+ \anb{\bs{13}} \langle\bs3\bs1\bs2]\; \cffz-+0 \czzh-- / {\bar\Lambda} \\ &+ \anb{\bs{23}} \langle\bs3\bs2\bs1]\; \cffz-+0 \czzh-- / {\bar\Lambda} \\ &- \anb{\bs{13}} \anb{\bs{23}}\; (\cffz+-0 + \cffz-+0) \czzh-- m_\psi/{\bar\Lambda} \\[1.5mm] &+ \sqb{\bs{13}} \langle\bs2\bs1\bs3]\; \cffz-+0 \czzh++ / {\bar\Lambda} \\ &+ \anb{\bs{23}} \langle\bs1\bs2\bs3]\; \cffz-+0 \czzh++ / {\bar\Lambda} \\ &- \sqb{\bs{13}} \sqb{\bs{23}}\; (\cffz+-0 + \cffz-+0) \czzh++ m_\psi/{\bar\Lambda}\,, \end{aligned} \end{equation} where only one non-renormalizable vertex has been allowed. In the high-energy limit, the longitudinal component of the $\langle\bs3(\bs1+\bs2)\bs3]$ spinorial structure tends to $-s/\sq2$ and cancels the propagator up to mass corrections. (The square root of two arises from the Clebsch-Gordan coefficient in the prescription of \autoref{eqn:bold_clebsch}). The fastest growing $s$-channel amplitudes are thus: \begin{equation} \begin{aligned} \mffzh[^Z]--0 &\to -\anb{12} \; ((\cffz+-0 - \cffz-+0) \; m_\psi/m_Z^2 -\cffz---\: (t-u)/s{\bar\Lambda})\; \czzh00 /2\sq2 ,\\ \mffzh[^Z]-+- &\to +\anb{13}^2/\anb{12}\; \cffz-+0 \czzh-- /{\bar\Lambda} ,\\ \mffzh[^Z]-++ &\to -\sqb{23}^2/\sqb{12}\; \cffz-+0 \czzh++ /{\bar\Lambda} ,\\ \mffzh[^Z]+-- &\to -\anb{23}^2/\anb{12}\; \cffz+-0 \czzh-- /{\bar\Lambda} ,\\ \mffzh[^Z]+-+ &\to +\sqb{13}^2/\sqb{12}\; \cffz+-0\czzh++ /{\bar\Lambda} ,\\ \mffzh[^Z]++0 &\to + \sqb{12} \; ((\cffz+-0 - \cffz-+0) \; m_\psi/m_Z^2 +\cffz+++\: (t-u)/s{\bar\Lambda})\; \czzh00 /2\sq2 ,\\ \end{aligned} \end{equation} where we have used $\sqb{12}/s\to -1/\anb{12}$ and $\anb{12}/s\to -1/\sqb{12}$. Compared to the expectation deriving from our simplified argument based three-point amplitudes, we note that the \amp--{00} and \amp++{00} receive contributions of unacceptable $E/m$ growths. Amplitudes involving longitudinal vector bosons are well-known to give rise to such behaviors. \paragraph{\texorpdfstring{$s$}{s}-channel photon exchange} The $s$-channel photon exchange only arises at the non-renormalizable level, since the $\gamma Zh$ amplitude of \autoref{eqn:mazh} receives no renormalizable tree-level contribution. The result can be obtained from the $m_Z\to 0$ limit of the $Z$-boson exchange with $\cffz-+0\to \cffz+-0\to -\sq2\: \cffa{}{}{}$ (following \autoref{eqn:ffz2ffa_replacement}): \begin{equation} \begin{aligned} \mathcal{M}^A(\bs1_{\psi^c},\bs2_\psi,\bs3_Z,\bs4_h) \times s= &- \sqrt{2}\anb{\bs{13}} \langle\bs3\bs1\bs2]\; \cffa{}{}{} \cazh-- / {\bar\Lambda} \\ &- \sqrt{2}\anb{\bs{23}} \langle\bs3\bs2\bs1]\; \cffa{}{}{} \cazh-- / {\bar\Lambda} \\ &+ 2 \sqrt{2} \anb{\bs{13}} \anb{\bs{23}}\;\cffa{}{}{} \cazh-- m_\psi/{\bar\Lambda} \\[1.5mm] &- \sqrt{2}\sqb{\bs{13}} \langle\bs2\bs1\bs3]\; \cffa{}{}{} \cazh++ / {\bar\Lambda} \\ &- \sqrt{2}\sqb{\bs{23}} \langle\bs1\bs2\bs3]\; \cffa{}{}{} \cazh++ / {\bar\Lambda} \\ &+2 \sqrt{2} \sqb{\bs{13}} \sqb{\bs{23}}\;\cffa{}{}{}\cazh++ m_\psi/{\bar\Lambda} . \end{aligned} \end{equation} This form is also obtained from a direct gluing of the \autoref{eqn:mffa} and \eqref{eqn:mazh} photon amplitudes. \paragraph{\texorpdfstring{$t$- and $u$-}{t- and u-}channel fermion exchanges} The $t$- an $u$-channel diagrams of \autoref{eqn:ffzh_diagrams} involve the three-point amplitudes of \autoref{eqn:mffz} and \eqref{eqn:mffh}. The prescription of \autoref{eqn:gluing_prescription} leads to the following $t$-channel amplitude: \begin{equation} \begin{aligned} \mathcal{M}^t(\bs1_{\psi^c},\bs2_\psi,\bs3_Z,\bs4_h) &\times (t-m_\psi^2)=\\ &- \anb{\bs{12}} \langle\bs{313}]\;\cffh-- \cffz-+0 /m_Z \\ &- \sqb{\bs{12}} \langle\bs{313}]\;\cffh++ \cffz+-0 /m_Z \\ &+ \anb{\bs{13}} \sqb{\bs{23}}\; ((\cffz+-0-\cffz-+0) m_\psi/m_Z - \cffz--- m_Z/{\bar\Lambda}) \cffh++ \\ &- \anb{\bs{23}} \sqb{\bs{13}}\; ((\cffz+-0-\cffz-+0) m_\psi/m_Z + \cffz+++ m_Z/{\bar\Lambda}) \cffh-- \\[1.5mm] &-\anb{\bs{13}}\anb{\bs{23}}\; (\cffz-+0 + \cffz--- m_\psi/{\bar\Lambda}) \cffh-- \\ &-\anb{\bs{13}}\langle\bs{312}]\; \cffh++\cffz---/{\bar\Lambda} \\[1.5mm] &-\sqb{\bs{13}}\sqb{\bs{23}}\; (\cffz+-0 + \cffz+++ m_\psi/{\bar\Lambda}) \cffh++ \\ &-\sqb{\bs{13}}\langle\bs{213}]\; \cffh--\cffz+++/{\bar\Lambda}\,. \end{aligned} \end{equation} In the high-energy limit, the longitudinal component of the $\langle\bs{313}]$ spinor structure tends to $t/\sq2$. The fastest growing amplitudes are then: \begin{equation} \begin{aligned} \mffzh[^t]--0 &\to -\anb{12} \; \cffz-+0\cffh-- \; /\sq2m_Z \,,\\ \mffzh[^t]-+- &\to -\anb{13}^2/\anb{12}\; \cffz---\cffh++\; s/t{\bar\Lambda} \,,\\ \mffzh[^t]+-+ &\to -\sqb{13}^2/\sqb{12}\; \cffz+++\cffh--\; s/t{\bar\Lambda} \,,\\ \mffzh[^t]++0 &\to -\sqb{12} \; \cffz+-0\cffh++ \; /\sq2m_Z \,, \end{aligned} \end{equation} where again the \amp--{00} and \amp++{00} ones receive energy-growing contributions not naively expected from our simplified analysis of three-point amplitudes. Similarly, the $u$-channel contribution is: \begin{equation} \begin{aligned} \mathcal{M}^u(\bs1_{\psi^c},\bs2_\psi,\bs3_Z,\bs4_h) &\times (u-m_\psi^2)=\\ &+ \anb{\bs{12}} \langle\bs{323}]\;\cffh-- \cffz+-0 /m_Z \\ &+ \sqb{\bs{12}} \langle\bs{323}]\;\cffh++ \cffz-+0 /m_Z \\ &- \anb{\bs{23}} \sqb{\bs{13}}\; ((\cffz+-0-\cffz-+0) m_\psi/m_Z + \cffz--- m_Z/{\bar\Lambda}) \cffh++ \\ &+ \anb{\bs{13}} \sqb{\bs{23}}\; ((\cffz+-0-\cffz-+0) m_\psi/m_Z - \cffz+++ m_Z/{\bar\Lambda}) \cffh-- \\[1.5mm] &-\anb{\bs{13}}\anb{\bs{23}}\; (\cffz+-0 + \cffz--- m_\psi/{\bar\Lambda}) \cffh-- \\ &-\anb{\bs{23}}\langle\bs{321}]\; \cffh++\cffz---/{\bar\Lambda} \\[1.5mm] &-\sqb{\bs{13}}\sqb{\bs{23}}\; (\cffz-+0 + \cffz+++ m_\psi/{\bar\Lambda}) \cffh++ \\ &-\sqb{\bs{23}}\langle\bs{123}]\; \cffh--\cffz+++/{\bar\Lambda}\,, \end{aligned} \end{equation} where $\langle\bs{323}]$ tends to $u/\sq2$ in the high-energy limit. The leading amplitudes are then: \begin{equation} \begin{aligned} \mffzh[^u]--0 &\to +\anb{12} \; \cffz+-0\cffh-- \; /\sq2m_Z \,,\\ \mffzh[^u]-++ &\to +\sqb{23}^2/\sqb{12} \; \cffz+++\cffh-- s/u{\bar\Lambda} \,,\\ \mffzh[^u]+-- &\to +\anb{23}^2/\anb{12} \; \cffz---\cffh++ s/u{\bar\Lambda} \,,\\ \mffzh[^u]++0 &\to +\sqb{12} \; \cffz-+0\cffh++ \; /\sq2m_Z \,, \end{aligned} \end{equation} and the \amp--{00} and \amp++{00} again display a growth not expected from the three-point amplitude analysis. Note that the $u$-channel amplitude is obtained from the $t$-channel one by exchange of the fermion labels (including chirality labels, where needed). \paragraph{Perturbative unitarity and the fermion mass.} Perturbative unitarity constrains the parameters of the $\psi^c\psi Zh$ amplitude. For the non-renormalizable terms, this gives non-trivial relations among the coefficients of the factorizable and non-factorizable terms. The $s$-wave coefficients of each helicity amplitude growing like a power of $E/{\bar\Lambda}$, must be smaller than a some numerical value such that unitarity is only lost at $E={\bar\Lambda}$. Since the result of \autoref{eqn:mffzh} is an all-orders result, which can be expanded in powers of $p_i\cdot p_j/{\bar\Lambda}^2$, this implies quantitative relations between the coefficients in this expansion. We leave a full exploration of these relations to future work. Furthermore, at the renormalizable level, there is $E/m$ energy growth in the sum of contributions to the \amp\pm\pm{00} amplitudes. To cancel this, one is forced to impose: \begin{equation} \begin{aligned} (\cffz+-0 - \cffz-+0)\; ( \czzh00\:{m_\psi}/{2m_Z} - \cffh--) &= 0 + \Order({m}/{{\bar\Lambda}})\,,\\ (\cffz+-0 - \cffz-+0)\; ( \czzh00\:{m_\psi}/{2m_Z} - \cffh++) &= 0 + \Order({m}/{{\bar\Lambda}})\,. \end{aligned} \label{eqn:four-point-relation} \end{equation} One can distinguish two possibilities for satisfying this condition. One is that \beq \cffz+-0 = \cffz-+0 + \Order(m/{\bar\Lambda})\,. \eeq In this case, the fermion has a \emph{vector-like} coupling to the $Z$ boson, up to $m/{\bar\Lambda}$ corrections. No relation is then forced between its mass and its Yukawa coupling. The second possibility is that the fermion has \emph{chiral} couplings to the $Z$ boson, with $\cffz+-0 \ne \cffz-+0$ at zeroth order in $m/{\bar\Lambda}$. Then, its mass is directly related to the Yukawa coupling, \beq \cffh++= \czzh00 m_\psi/2m_Z = \cffh--\,, \eeq up to $m/{\bar\Lambda}$ corrections (see also eq.\,(5.5) of ref.~\cite{Maltoni:2019aot}). In the SM, it is of course this second possibility that is realized, and the requirements of \autoref{eqn:four-point-relation} are explicitly satisfied in the SMEFT (see \subappref{sec:four-point-relation-matching}). In the presence of additional Higgses, which couple to $\psi$, this relation would be modified. Then, the low energy theory would feature an additional scalar, $h^\prime$, and the $\psi^c\psi Zh$ amplitude would get a contribution from factorization on $\psi^c\psi h^\prime$ and $Z h h^\prime$. Indeed, with two different scalars, the latter can be nonzero. \section{Conclusions} \label{sec:conclusion} We adopted massive on-shell amplitude methods to examine a theory of the electroweak spectrum from the bottom up, including both renormalizable and non-renormalizable interactions. Our main objectives were first to explicitly demonstrate the emergence of the patterns due to electroweak symmetry breaking and, second, to provide the necessary basis for on-shell amplitude computations equivalent to those obtained from the Lagrangian of the standard-model effective field theory (SMEFT). We started by performing the bottom-up construction of all massive on-shell three-point amplitudes with the electroweak field content. The only assumptions made concerned the particle spectrum, as well as electric-charge and fermion-number conservation. A simplified argument based on the tree-level unitarity of factorizable four-point amplitudes was employed to distinguish renormalizable and non-renormalizable contributions to tree-level, three-point amplitudes, without reference to a Lagrangian. The non-trivial structure of the renormalizable ${\psi^c}\psi\gamma$, $WWZ$ or $WW\gamma$ amplitudes could for instance be obtained in a purely bottom-up way. The emergence of properties expected from electroweak symmetry breaking, the Higgs mechanism and the Goldstone equivalence theorem were highlighted. Prescriptions for the treatment of massive spinors and the gluing of massive three-point amplitudes into tree-level higher-point ones were clarified. The construction of both factorizable and non-factorizable contributions to the ${\psi^c}\psi Zh$ four-point amplitude was detailed as illustration. Imposing tree-level unitarity up to an arbitrarily high cutoff scale led to the expected relation between renormalizable $ZZh$,\,${\psi^c}\psi h$ couplings and $m_Z$,\,$m_\psi$ masses. All renormalizable and non-renormalizable parameters appearing in the three-point and non-factorizable four-point amplitudes were defined and matched at tree-level to the broken-phase of the SMEFT. This laid the basis for future SMEFT computations using on-shell amplitude methods. Operator redundancies due to field redefinitions are absent in this approach. Sticking to a bottom-up approach, all the four-fermion, two-fermion-two-boson and four-boson amplitudes would next need to be considered. As in the ${\psi^c}\psi Zh$ case we discussed, the unitarity of these four-point amplitudes would impose further constraints on both the renormalizable and non-renormalizable parameters introduced here. All relations deriving from the underlying $SU(2)_L\times U(1)_Y$ symmetry of the theory are expected to be obtained from four- and higher-point amplitudes. For an electroweak-like particle spectrum, this is indeed the only consistent ultraviolet completion. Before perturbative unitarity is imposed, our bottom-up construction also applies to more general theories featuring for instance a low-cutoff scale or non-linearly realized $SU(2)_L\times U(1)_Y$ symmetry. The breakdown of unitarity in such theories may be best probed by amplitudes with $n>4$ vector boson and Higgs legs~\cite{Henning:2018kys,Chang:2019vez}. The general, relatively compact expressions for $n$-point amplitudes obtained in our approach will be useful starting points for this study. It will also be interesting to use these results in order to explore the relation between the high-energy behavior and analytic structure of the amplitudes, and the non-analytic Higgs potentials featured in EFTs beyond the SMEFT~\cite{Falkowski:2019tft}. The soft limits of on-shell EFT amplitudes have yielded powerful restrictions on general EFTs~\cite{Cheung:2014dqa, Cheung:2015ota, Cheung:2015cba, Cheung:2016drk, Low:2017mlh, Cheung:2018oki, Low:2019ynd}, and it would be interesting to explore them in the case at hand. Amplitudes with Goldstone bosons should vanish in this limit, while the soft-Higgs limit amounts to setting the Higgs to its vacuum expectation value~\cite{Dixon:2004za}. \section*{Acknowledgments} We thank Junmou Chen, Go Mishima, and Ofri Telem for valuable discussions. This research is supported by the Israel Science Foundation (Grant No.~720/15), by the United-States-Israel Binational Science Foundation (BSF) (Grant No.~2014397), and by the ICORE Program of the Israel Planning and Budgeting Committee (Grant No.~1937/12). The work of G.D.\ is supported in part at the Technion by a fellowship from the Lady Davis Foundation. The work of T.K.\ is supported by the Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Number 19K14706. G.D.\ thanks the Aspen Center for Physics, which is supported by National Science Foundation grant PHY-1607611, where some of this work was performed.
\section{Introduction} Boolean functions are widely studied and applied in coding theory, cryptography and other fields. The properties of (vectorial) Boolean functions play a critical role in cryptography, particularly in the design of symmetric key algorithms in block cipher and nonlinear filters and combiners in stream ciphers. To find a function with good properties for a cryptosystem to possess robust resistance against most of the known attacks, a lot of effort is required. Cryptographic Boolean functions should satisfy various criteria simultaneously, for instance balancedness, high nonlinearity and good autocorrelation properties, to particularly resist linear cryptanalysis and differential cryptanalysis \cite{Tang}. This paper discusses some cryptographic properties of Boolean functions and is organised as follows. Section~\ref{sect-2} reports some known results which form a basis for what is being studied in this paper. In Section \ref{sect-3}, we show how the weight of any Boolean function can be related to the weights of some other functions at a lower dimension, we prove some results on weight and balancedness of "splitting" functions and a special class of cubic Boolean functions. In Section~\ref{sect-4}, we give an inequality relation which relate the nonlinearity of any Boolean function to the nonlinearity of some other functions at a lower dimension and nonlinearity of some splitting functions is proved. Finally, in Section~\ref{sect-5}, a parameter of a Boolean function based on its second-order derivatives is introduced and has been used for characterization of quadratic and cubic APN functions. \section{Preliminaries}\label{sect-2} In this section we report some definitions and results which we use in our work. For more details, the reader is referred to \cite{Beth,Bra,Car1,Chee,Mac,Wu}. We denote the field of two elements, $0$ and $1$, by $\mathbb{F}$. Any vector in the vector space $\mathbb{F}^n$ is denoted as $v$ (not as $\mathbf{v}$ or $\vec{v}$). The size of a set $A$ is denoted as $|A|$. A {\em Boolean function (Bf)} is any function $f$ from $\mathbb{F}^n$ to $\mathbb{F}$ and a {\em vectorial Boolean function (vBf)} is any function $F$ from $\mathbb{F}^n$ to $\mathbb{F}^m$, $n,m\in\mathbb{N}$. However, in the present paper we only consider vBf's from $\mathbb{F}^n$ to $\mathbb{F}^n$. We use algebraic normal form (ANF for short), to represent the Bf's, which is the $n$-variable polynomial representation over $\mathbb{F}$ given by \[f(x_1,...,x_n)=\sum_{I\subseteq \mathcal{P}}a_I\left(\prod_{i\in I}x_i\right)\] where $\mathcal{P}=\{1,...,n\}$ and $a_I\in \mathbb{F}$. The {\em algebraic degree} or simply {\em degree} of $f$ (denoted by $\deg(f)$) is \(\max_{a_I\ne 0}|I|.\) The set of all Bf's is denoted by $B_n$. For a Bf $f$, we say that $f$ is {\em linear} if $\deg(f)\le 1$ and $f(0)=0$, {\em affine} if $\deg(f)\le 1$, {\em quadratic} if $\deg(f)=2$ and {\em cubic} if $\deg(f)=3$. The set of all affine functions is denoted by $A_n$. Given a vBf $F=(f_1,...,f_n)$, the functions $f_1,...,f_n$ are called {\em coordinate functions} and the functions $\lambda\cdot F$, where $\lambda\in \mathbb{F}^n\setminus\{0\}$ and "$\cdot$" is a dot product, are called {\em component functions} and we write $F_\lambda=\lambda\cdot F$. The degree of a vBf $F$ is given by $\deg(F)=\max_{\lambda\in \mathbb{F}^n\setminus\{0\}}\deg(F_\lambda)$. We say that $F$ is {\em quadratic} if $\deg(F)=2$ and {\em cubic} if $\deg(F)=3$. If all components of a vBf $F$ are quadratic, we call $F$ a {\em pure quadratic}. For $m<n$, if $f$ is in $B_n$ and depends only on $m$ variables, then we denote by $f_{\restriction\mathbb{F}^m}$ its restriction to these $m$ variables. Clearly, $f_{\restriction\mathbb{F}^m}$ is in $B_m$. The {\em Hamming weight} of $f$ is given by $\mathrm{w}(f)=|\{x\in \mathbb{F}^n\mid f(x)=1\}|$. We say that $f$ is {\em balanced} if $\mathrm{w}(f)=2^{n-1}$. All non-constant affine functions are balanced. The {\em distance} between $f$ and $g$ is $d(f,g)=\mathrm{w}(f+g)$ and the {\em nonlinearity} of $f$ is $\mathcal{N}(f)=\min_{\alpha \in A_n}d(f,\alpha)$. We define the {\em Walsh transform} of $f$, the function $\mathcal{W}_f$ from $\mathbb{F}^n$ to $\mathbb{Z}$, as \[\mathcal{W}_f(a)=\sum_{x\in\mathbb{F}^n}(-1)^{f(x)+a\cdot x}\,,\] for all $a \in \mathbb{F}^n$. Let $\mathcal{ L}(f)=\max\limits_{a\in \mathbb{F}^n}|\mathcal{W}_f(a)|$. We define $\mathcal{F}(f)$ as \[\mathcal{F}(f)=\mathcal{W}_f(0)=\sum_{x\in \mathbb{F}^n}(-1)^{f(x)}=2^n-2\mathrm{w}(f).\] Observe that $f$ is balanced if and only if $\mathcal{F}(f)=0$. The nonlinearity of a Bf $f$ can also be given by \(\mathcal{N}(f)=2^{n-1}-\frac{1}{2}\mathcal{L}(f).\) A Bf $f$ on $n$ variables is called {\em bent} if \(\mathcal{N}(f)=2^{n-1}-2^{\frac{n}{2}-1}\) (this happens only for $n$ even). The lowest possible value for $\mathcal{L}(f)$ is $2^{\frac{n}{2}}$ and this bound is achieved for bent functions (and only them). Let $a,b\in \mathbb{F}^n$. The {\em first-order derivative} of $f\in B_n$ at $a$ is defined by \[D_af(x)=f(x+a)+f(x)\] and its {\em second-order derivative} at $a$ and $b$ is \[D_bD_af(x)=f(x)+f(x+b)+f(x+a)+f(x+a+b).\] \begin{theorem}\label{bent-thm} A Bf $f$ on $n$ variables is bent if and only if $D_af$ is balanced for any nonzero $a\in\mathbb{F}^n$. \end{theorem} For $n$ odd, a Bf $f$ is called {\em semi-bent} if $\mathcal{N}(f)=2^{n-1}-2^{\frac{n-1}{2}}$. A vBf $F$ in odd dimension is {\em almost-bent (AB)} if all its components are semi-bent. \begin{theorem}\label{permuatation} Let $F$ be a vBf. Then $F$ is a {\em permutation} if and only if all components are balanced. \end{theorem} Two Bf's $f,g:\mathbb{F}^n\rightarrow \mathbb{F}$ are said to be {\em affine equivalent} if there exists an affinity $\varphi:\mathbb{F}^n\rightarrow \mathbb{F}^n$ such that $f=g\circ \varphi$. This relation is denoted by $\sim_A $ and we write $f\sim_A g$. Observe that $\sim_A$ is an equivalence relation. The following result is well-known. \begin{proposition}\label{equivalence-properties} Let $f,g\in B_n$ be such that $f\sim_A g$ . Then $\mathrm{w}(f)=\mathrm{w}(g)$ and so $f$ is balanced $\iff g$ is balanced. \end{proposition} \begin{remark}\label{fourier-equivalence} Since, by Proposition \ref{equivalence-properties}, $\mathrm{w}(f)=\mathrm{w}(g)$ if $f\sim_A g$, then it also implies that $\mathcal{F}(f)=\mathcal{F}(g)$ as $\mathcal{F}(f)=2^n-2\mathrm{w}(f)$. \end{remark} \begin{proposition}\label{extended-Walsh} Let $f,g\in B_n$ be such that $f\sim_A g$. Then \[\{|\mathcal{W}_f(a)|\}_{a\in \mathbb{F}^n}=\{|\mathcal{W}_g(a)|\}_{a\in \mathbb{F}^n}.\] Moreover, we have $\mathcal{N}(f)=\mathcal{N}(g)$. \end{proposition} Next we present the theorem on classification of quadratic Boolean functions, whose proof can be found in \cite{Mac} page 438. \begin{theorem}\label{quadratic} Let $f\in B_n$ be quadratic. Then \begin{itemize} \item[(i)] $f\sim_A x_1x_2+\cdots x_{2k-1}x_{2k}+x_{2i+1}$ with $k\leq \lfloor \frac{n-1}{2}\rfloor$ if $f$ is balanced, \item[(ii)] $f\sim_A x_1x_2+\cdots x_{2k-1}x_{2k}+c$, with $k\leq \lfloor \frac{n}{2}\rfloor$ and $c\in \mathbb{F}$, if $f$ is unbalanced. \end{itemize} \end{theorem} The proof of the next theorem and lemma (respectively) can be found in \cite{Cus} on page 134. \begin{theorem}\label{nonlinearity-quadratics} Let $f$ be a quadratic Bf denoted as in Theorem \ref{quadratic}. Then we have \\$\mathcal{W}_f(a)\in\{0,\pm 2^{n-k}\}$, for $a\in \mathbb{F}^n$, and \(\mathcal{N}(f)=2^{n-1}-2^{n-k-1}\). \end{theorem} \begin{lemma}\label{weight-affine-equivalent-quadratics} Two quadratic Bf's $g$ and $h$ on $\mathbb{F}^n$ are affine equivalent if and only if $\mathrm{w}(g)=\mathrm{w}(h)$ and $\mathcal{N}(g)=\mathcal{N}(h)$. \end{lemma} An element $a\in \mathbb{F}^n$ is called a {\em linear structure} of Bf $f$ if $D_af$ is constant. Denote by $V(f)=\{a\in\mathbb{F}^n\mid D_af \text{ is a constant}\}$ the set of all linear structures and we call it the {\em linear space} of a Bf $f$. A Bf $f$ is {\em partially-bent} if there exists a linear subspace $W$ of $\mathbb{F}^n$ such that the restriction of $f$ to $W$ is affine and the restriction of $f$ to any complementary subspace $U$ of $W$, $W\oplus U=\mathbb{F}^n$, is bent \cite{Cal}. In fact the linear subspace $W$ of $\mathbb{F}^n$ is formed by the set of all linear structures of $f$, that is, $W=V(f)$ and observe that the dimension of $U$ must be even. A partially-bent $f$ can be represented as a direct sum of the restricted functions such as $f(y+z)=f(y)+f(z)$, for all $y\in U$ and $z \in V(f)$. \begin{remark}\label{quadratic-partially-bent} From Theorem \ref{quadratic}, it can be deduced that any quadratic function $f$ is partially-bent and $\dim V(f)$ is even if $n$ is even and odd if $n$ is odd. Moreover, we must have $\dim V(f)=0$ if and only if $f$ is bent. \end{remark} The following result is well-known. \begin{proposition}\label{balanced-splitting} A Bf $g(x_1,...,x_{n-1})+x_n$ on $n$ variables is balanced. \end{proposition} \section{On the weight of Boolean functions}\label{sect-3} In this section we classify the weight of some class of cubic functions and others. Some conditions for these functions to be balanced are determined. \begin{definition}\label{splitting} A Bf $f$ on $n$ variables is a {\em splitting function} if \[f\sim_A g(x_1,...,x_s)+h(x_{s+1},...,x_n),\] for some positive integer $s<n$, $g\in B_s$ and $h\in B_{n-s}$. \end{definition} \begin{remark}\label{split-weight-fourier} If $g(x_1,...,x_s)$, with $s<n$, is in $B_n$ then $\mathrm{w}(g)=2^{n-s}\mathrm{w}(g_{\restriction\mathbb{F}^s})$ and \(\mathcal{F}(g)=2^{n-s}\mathcal{F}(g_{\restriction\mathbb{F}^s})\). Furthermore, $g$ is balanced if and only if $g_{\restriction\mathbb{F}^s}$ is balanced and also \(\mathcal{F}(g)=0\) if and only if \(\mathcal{F}(g_{\restriction\mathbb{F}^s})=0\). \end{remark} Next we consider the weight and balancedness of splitting Bf's. \begin{lemma}\label{fourier-split} Let $f\in B_n$ be such that \(f\sim_Ag(x_1,...,x_s)+h(x_{s+1},...,x_n)\), with $s<n$ Then \[\mathcal{F}(f)=\mathcal{F}(g_{\restriction\mathbb{F}^s})\mathcal{F}(h_{\restriction\mathbb{F}^{n-s}})=2^{-n}\mathcal{F}(g)\mathcal{F}(h).\] \end{lemma} \begin{proof} Since, by Remark \ref{fourier-equivalence}, $\mathcal{F}(f)$ is invariant under affine equivalence, then we have \begin{align*} \mathcal{F}(f)&=\sum_{(y,x)\in\mathbb{F}^s\times\mathbb{F}^{n-s}}(-1)^{g(y)+h(x)}=\sum_{y\in \mathbb{F}^s}(-1)^{g(y)}\sum_{x\in \mathbb{F}^{n-s}}(-1)^{h(x)}\\&=\mathcal{F}(g_{\restriction\mathbb{F}^s})\mathcal{F}(h_{\restriction\mathbb{F}^{n-s}})=2^{-n}\left(2^{n-s}\mathcal{F}(g_{\restriction\mathbb{F}^s})\right)\left(2^s\mathcal{F}(h_{\restriction\mathbb{F}^{n-s}})\right)\\&=2^{-n}\mathcal{F}(g)\mathcal{F}(h). \qedhere \end{align*} \end{proof} It is immediate from Remark \ref{split-weight-fourier} and Lemma \ref{fourier-split} that the following corollary holds. \begin{corollary}\label{general-fourier-split} For $t\in\mathbb{N}$ and $1\leq i\leq t$, let $X_i\subset X=\{x_1,...,x_n\}$, with $|X_i|=n_i$, be such that all $X_i$ are pairwise disjoint. If \(f(X)=\sum_{i=1}^tf_i(X_i),\) with $f_i~\in~B_{n_i}$, then \(\mathcal{F}(f)=2^{n-r}\prod_{i=1}^t\mathcal{F}({f_i}_{\restriction\mathbb{F}^{n_i}})\), with $r=n_1+\cdots +n_t$. \end{corollary} \begin{proposition}\label{split-weight} Let $f\in B_n$ be such that $f\sim_Ag(x_1,...,x_s)+h(x_{s+1},...,x_n)$, with $s<n$. Then \begin{align*}\mathrm{w}(f)&=2^{n-s}\mathrm{w}(g_{\restriction\mathbb{F}^s})+2^s\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})-2\mathrm{w}(g_{\restriction\mathbb{F}^s})\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})\\&=\mathrm{w}(g)+\mathrm{w}(h)-2^{1-n}\mathrm{w}(g)\mathrm{w}(h).\end{align*} \end{proposition} \begin{proof} We have \begin{align*} \mathrm{w}(f)&=2^{n-1}-\frac{1}{2}\mathcal{F}(f)=2^{n-1}-\frac{1}{2}\left(2^{-n}\mathcal{F}(g_{\restriction\mathbb{F}^s})\mathcal{F}(h_{\restriction\mathbb{F}^{n-s}})\right)\nonumber\\&=2^{n-1}-\frac{1}{2}\left[\left(2^s-2\mathrm{w}(g_{\restriction\mathbb{F}^s})\right)\left(2^{n-s}-2\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})\right)\right]\nonumber\\&=2^{n-s}\mathrm{w}(g_{\restriction\mathbb{F}^s})+2^s\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})-2\mathrm{w}(g_{\restriction\mathbb{F}^s})\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})\nonumber\\&=2^{n-s}\mathrm{w}(g_{\restriction\mathbb{F}^s})+2^s\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})-2^{1-n}\left(2^{n-s}\mathrm{w}(g_{\restriction\mathbb{F}^s})\right)\left(2^s\mathrm{w}(h_{\restriction\mathbb{F}^{n-s}})\right)\nonumber\\&=\mathrm{w}(g)+\mathrm{w}(h)-2^{1-n}\mathrm{w}(g)\mathrm{w}(h).\qedhere \end{align*} \end{proof} We now present some results on balanced splitting functions. \begin{theorem}\label{split-balanced} Let $f\in B_n$ be such that $f\sim_A g(x_1,...,x_s)+h(x_{s+1},...,x_n)$, with $s<n$. Then $f$ is balanced if and only if either $g$ or $h$ is balanced. \end{theorem} \begin{proof} $f$ is balanced $\Longleftrightarrow \mathcal{F}(f)=0\Longleftrightarrow \left(\mathcal{F}(g_{\restriction\mathbb{F}^s})=0 \text{ or } \mathcal{F}(h_{\restriction\mathbb{F}^{n-s}})=0\right)\Longleftrightarrow$ either $g$ or $h$ is balanced. \end{proof} \begin{proposition}\label{split-terms-of-same-degree-weight} Let $f\in B_n$, with $\deg(f)=m$, be such that \[f\sim_A \sum_{i=0}^{k-1}\prod_{j=1}^{m}x_{mi+j}.\] Then $\mathcal{F}(f)=2^{n-mk}(2^m-2)^k$ and \(\mathrm{w}(f)=2^{n-1}-2^{n-mk-1}(2^m-2)^k\). \end{proposition} \begin{proof} First, let $f_i=\prod_{j=1}^{m}x_{mi+j}$ so that $f\sim_A \sum_{i=0}^{k-1}f_i$. Then, by Corollary~\ref{general-fourier-split}, we have $\mathcal{F}(f)=2^{n-mk}\prod_{i=0}^{k-1}\mathcal{F}({f_i}_{\restriction{\mathbb{F}^m}})$. For all $x\in\mathbb{F}^m\setminus\{\mathbf{1}\}$, observe that $f_i{_{\restriction{\mathbb{F}^m}}}(x)=0$, and $f_i{_{\restriction{\mathbb{F}^m}}}(\mathbf{1})=1$ so $\mathcal{F}({f_i}_{\restriction{\mathbb{F}^m}})=2^m-2$. Thus $\mathcal{F}(f)=2^{n-mk}(2^m-2)^k$. So $\mathrm{w}(f)=2^{n-1}-\frac{1}{2}\mathcal{F}(f)=2^{n-1}-\frac{1}{2}[2^{n-mk}(2^m-2)^k]=2^{n-1}-2^{n-mk-1}(2^m-2)^k$. \end{proof} Observe that the function $f$ in Proposition \ref{split-terms-of-same-degree-weight} is balanced if and only if $m=1$, that is, $f$ is balanced if and only if it is a linear function. \begin{remark}\label{quadratic_weight} All quadratic Bf's are splitting functions (deduced from Theorem~\ref{quadratic}) and those which are unbalanced are of the form given in Proposition~\ref{split-terms-of-same-degree-weight} and their complements, with $m=2$. So applying Proposition~\ref{split-terms-of-same-degree-weight}, $\mathrm{w}(f)=2^{n-1}-2^{n-k-1}$ and \\$\mathrm{w}(f+1)=2^{n-1}+2^{n-k-1}$. This result on weight of quadratic is well-known. \end{remark} Now we study the weight and balancedness of Bf's in some given form. We show how the weight of a Bf on $n$ variables can be related to the weights of some other functions at a lower dimension. Any Bf can be expressed in the form \begin{align}\label{factoring} f\sim_A x_1g(x_2,...,x_n)+h(x_2,...,x_n).\end{align} Observe that \(f\sim_A x_1g(x_2,...,x_n)+h(x_2,...,x_n)=x_1(g+h)+(1+x_1)h\). So any Bf $f$ on $n+1$ variables can be written in the form \begin{align}\label{convolutional-product-form}f\sim_A x_{n+1}g(x_1,...,x_n)+(1+x_{n+1})h(x_1,...,x_n).\end{align} We say that $f$ is the {\em convolutional product} of $g$ and $h$. Observe that the convolutional product is a special case of the form defined by \begin{align}\label{generalised-convolutional-product} f\sim_A \left(\prod_{j=1}^mx_j\right)g(x_{m+1},...,x_{m+n})+\left(1+\prod_{j=1}^mx_j\right)h(x_{m+1},...,x_{m+n}),\end{align} for some positive integer $m$ and Bf's $g$ and $h$ on $n$ variables. In fact, for any Bf $f$, there exists a positive integer $m$ such that $f$ can be expressed in the form \eqref{generalised-convolutional-product}. Next we show that if the weights of $g$ and $h$ are known, then the weight of $f$ is obtained. \begin{theorem}\label{generalised-convolutional_product_weight} Let $f\in B_{m+n}$ be a Bf of the form (\ref{generalised-convolutional-product}). Then \begin{itemize} \item[(a)] \(\mathrm{w}(f)=(2^m-1)\mathrm{w}(h_{\restriction\mathbb{F}^n})+\mathrm{w}(g_{\restriction\mathbb{F}^n})\), \item[(b)] $f$ is balanced if and only if \(\mathcal{F}(h_{\restriction\mathbb{F}^n})=-\mathcal{F}(g_{\restriction\mathbb{F}^n})/(2^m-1)\), \item[(b)] $f$ is balanced if both $g$ and $h$ are balanced, \item[(d)] $f$ is unbalanced if one in $\{g,h\}$ is balanced and the other is not. \end{itemize} \end{theorem} \begin{proof} We have \\\(f=\left(\prod_{j=1}^mx_j\right)g(x_{m+1},...,x_{m+n})+\left(1+\prod_{j=1}^mx_j\right)h(x_{m+1},...,x_{m+n}).\) \begin{itemize} \item[(a)] Let $X=(x,y)\in\mathbb{F}^m\times\mathbb{F}^n$. Then we have \begin{align}\label{fourier} \mathcal{F}(f)&=\sum_{X\in\mathbb{F}^{n+m}}(-1)^{f(X)}=\sum_{(x,y)\in\mathbb{F}^m\setminus \{1\}\times\mathbb{F}^n}(-1)^{h(y)}+\sum_{(x,y)\in\{1\}\times\mathbb{F}^n}(-1)^{g(y)}\nonumber\\&=(2^m-1)\sum_{y\in\mathbb{F}^n}(-1)^{h(y)}+\sum_{y\in\mathbb{F}^n}(-1)^{g(y)}\nonumber\\&=(2^m-1)\mathcal{F}(h_{\restriction\mathbb{F}^n})+\mathcal{F}(g_{\restriction\mathbb{F}^n}) \end{align} Since $\mathcal{F}(f)=2^{m+n}-2w(f)$, so we have \begin{align*} w(f)&=2^{n+m-1}-\frac{1}{2}\mathcal{F}(f)= 2^{n+m-1}-\frac{1}{2}\left[(2^m-1)\mathcal{F}(h_{\restriction\mathbb{F}^n})+\mathcal{F}(g_{\restriction\mathbb{F}^n})\right]\\&=2^{n+m-1}-\frac{1}{2}\left[(2^m-1)(2^n-2w(h_{\restriction\mathbb{F}^n}))+(2^n-2w(g_{\restriction\mathbb{F}^n}))\right]\\&= 2^{n+m-1}-\frac{1}{2}\left[2^{n+m}-2^{m+1}w(h_{\restriction\mathbb{F}^n})+2w(h_{\restriction\mathbb{F}^n})-2w(g_{\restriction\mathbb{F}^n})\right]\\&=(2^m-1)w(h_{\restriction\mathbb{F}^n})+w(g_{\restriction\mathbb{F}^n}). \end{align*} \item[(b)] Recall that $f$ is balanced if and only if we have $\mathcal{F}(f)=0$ if and only if \\$(2^m-1)\mathcal{F}(h_{\restriction\mathbb{F}^n})+\mathcal{F}(g_{\restriction\mathbb{F}^n})=0$ if and only if $\mathcal{F}(h_{\restriction\mathbb{F}^n})=-\mathcal{F}(g_{\restriction\mathbb{F}^n})/(2^m-1)$. \item[(c)] Suppose $g$ and $h$ are both balanced. Then $\mathcal{F}(g_{\restriction\mathbb{F}^n})=\mathcal{F}(h_{\restriction\mathbb{F}^n})=0$. Applying Equation \eqref{fourier}, it implies that $\mathcal{F}(f)=0$, and so $f$ is balanced. \item[(d)] Without loss of generality, suppose that $g$ is balanced while $h$ not. Then $\mathcal{F}(g_{\restriction\mathbb{F}^n})=0$ and $\mathcal{F}(h_{\restriction\mathbb{F}^n})\neq 0$ which, by Equation \eqref{fourier}, implies that $\mathcal{F}(f)\neq 0$, and so $f$ is unbalanced.\qedhere \end{itemize} \end{proof} \begin{remark}\label{convolutional_product_weight} If $m=1$ in Theorem \ref{generalised-convolutional_product_weight} [i.e., $f=(x_{n+1})g+(1+x_{n+1})h$] then we have $\mathrm{w}(f)=\mathrm{w}(h_{\restriction\mathbb{F}^n})+\mathrm{w}(g_{\restriction\mathbb{F}^n})$. \end{remark} Observe that if $g$ and $h$ are such that $g=h\circ \varphi +1$, for some affinity $\varphi$, then $f$ is balanced since $\mathrm{w}(f)=\mathrm{w}(h_{\restriction\mathbb{F}^n})+\mathrm{w}(g_{\restriction\mathbb{F}^n})=\mathrm{w}(h_{\restriction\mathbb{F}^n})+2^n-\mathrm{w}(h\circ \varphi_{\restriction\mathbb{F}^n})=\mathrm{w}(h_{\restriction\mathbb{F}^n})+2^n-\mathrm{w}(h_{\restriction\mathbb{F}^n})=2^n$. Finally, we consider the weight of cubic Bf's. Generally, it is difficult to determine the weight for Bf's of degree greater than $2$ (see \cite{Car4}). Next we present a result which completely describes the weight of a special class of cubic functions. This result allows us to construct an algorithm that computes the weight of any cubic function. Since we have the knowledge of weights of affine and quadratic functions (see Remark \ref{quadratic_weight}) and by applying Remark \ref{convolutional_product_weight}, we can state our classification theorem for the weight of the special class of cubic functions. We omit the proof of Theorem~\ref{weight-of-cubic} because it is a direct case-by-case computation. \begin{theorem}\label{weight-of-cubic} Let $f=x_{n+1}g(x_1,...,x_n)+(1+x_{n+1})h(x_1,...,x_n)$ be a cubic Bf such that $\deg(g),\deg(h)\leq 2$. Then $h\sim_A q=x_1x_2+\cdots+x_{2k-1}x_{2k}$ or $h\sim_A \bar{q}=q+1$ and $g\sim_A r=x_1x_2+\cdots+x_{2\ell-1}x_{2\ell}$ or $g\sim_A\bar{r}=r+1$, with $k, \ell\leq \lfloor \frac{n}{2}\rfloor$, if $h$ and $g$ are quadratic unbalanced. Moreover, {\small \begingroup \allowdisplaybreaks\[\mathrm{w}(f)=\begin{cases}2^n & \text{if both } h \text{ and } g \text{ are balanced}\\ 2^{n-1} & \text{if } h \text{ (resp. $g$) is bal. quad. and } g \text{ (resp. $h$)}=0\\ 2^n+2^{n-1} & \text{if } h \text{ (resp. $g$) is bal. quad. and } g \text{ (resp. $h$)}= 1\\2^{n-1}\pm 2^{n-k-1} & \text{if } h \text{ is unbal. quad. and } g=0\\2^n+2^{n-1}\pm 2^{n-k-1} & \text{if } h \text{ is unbal. quad. and } g= 1\\ 2^{n-1}\pm 2^{n-\ell-1} & \text{ if } h=0 \text{ and } g \text{ is unbal. quad. } \\2^n+2^{n-1}\pm 2^{n-\ell-1} & \text{if } h=1 \text{ and } g \text{ is unbal. quad. } \\2^n\pm 2^{n-k-1} & \text{if } h \text{ is unbal. quad. and } g \text{ is bal. }\\ 2^n\pm 2^{n-\ell-1} & \text{if } h \text{ is bal. and } g \text{ is unbal. quad. }\\2^n-2^{n-k-1}-2^{n-\ell-1} & \text{if } h\sim_A q \text{ and } g\sim_A r \\2^n+2^{n-k-1}+2^{n-\ell-1} & \text{if } h\sim_A \overline{q} \text{ and } g\sim_A \overline{r}\\2^n+2^{n-k-1}-2^{n-\ell-1} & \text{if } h\sim_A \overline{q} \text{ and } g \sim_A r\\2^n-2^{n-k-1}+2^{n-\ell-1} & \text{if } h\sim_A q \text{ and } g \sim_A \overline{r}.\end{cases}\]\endgroup} \end{theorem} Thanks to Theorem \ref{weight-of-cubic}, the following corollary which gives a description of all balanced cubic functions of the class $f=x_{n+1}g(x_1,...,x_n)+(1+x_{n+1})h(x_1,...,x_n)$, with $\deg(g),\deg(h)\leq 2$, is deduced. \begin{corollary}\label{balanced-convolutional-cubic} With the same notation as in Theorem \ref{weight-of-cubic}, a cubic Bf $f$ is balanced if and only if one of the following holds: \begin{itemize} \item[(a)] both $g$ and $h$ are balanced, \item[(b)] $g\sim_A q$ and $h\sim_A \overline{q}$, \item[(c)] $g\sim_A \overline{q}$ and $h\sim_A q$. \end{itemize} \end{corollary} Applying Lemma \ref{weight-affine-equivalent-quadratics} and Theorem \ref{weight-of-cubic}, Corollary \ref{balanced-convolutional-cubic} can be simplified as in the following. \begin{corollary} Let $f=x_{n+1}g(x_1,...,x_n)+(1+x_{n+1})h(x_1,...,x_n)$, with $g,h\in B_n$ and $\deg(h),\deg(g)\leq 2$, be cubic Boolean function. Then $f$ is balanced if and only if either both $g$ and $h$ are balanced or $g=h\circ \varphi +1$, for some affinity $\varphi$. \end{corollary} \begin{proof} By Equation \eqref{fourier}, we have \(\mathcal{F}(f)=\mathcal{F}(g_{\restriction\mathbb{F}^n})+\mathcal{F}(h_{\restriction\mathbb{F}^n})\). So it follows that $f$ is balanced $\iff \mathcal{F}(f)=0\iff \mathcal{F}(g_{\restriction\mathbb{F}^n})=-\mathcal{F}(h_{\restriction\mathbb{F}^n})\iff 2^n-2\mathrm{w}(g_{\restriction\mathbb{F}^n})=-2^n+2\mathrm{w}(h_{\restriction\mathbb{F}^n})\iff \mathrm{w}(g_{\restriction\mathbb{F}^n})+\mathrm{w}(h_{\restriction\mathbb{F}^n})=2^n\iff$ either both $g$ and $h$ are balanced or $\mathrm{w}(g_{\restriction\mathbb{F}^n})=\mathrm{w}(h_{\restriction\mathbb{F}^n}+1)$ with both $g$ and $h$ unbalanced quadratics $\iff$ either both $g$ and $h$ are balanced or $g=h\circ \varphi +1$, for some affinity $\varphi$ (by Lemma \ref{weight-affine-equivalent-quadratics}). \end{proof} Now we consider cubic Bf's which cannot be expressed in the form described in Theorem \ref{weight-of-cubic}. If a Bf $f$ is expressed in the form \eqref{factoring}, that is, $f=x_1g(x_2,...,x_n)+h(x_2,...,x_n)$ then $\mathrm{w}(f)=\mathrm{w}((g+h)_{\restriction\mathbb{F}^{n-1}})+\mathrm{w}(h_{\restriction\mathbb{F}^{n-1}})$. Since our interest is in cubic functions, it can be assumed that $g$ is quadratic and $h$ can be affine, quadratic or cubic. If $h$ is affine or quadratic, then weight of $f$ can be easily computed by Theorem \ref{weight-of-cubic}. It becomes difficult to find the weight of $f$ if $h$ is cubic since in this case it implies that $g+h$ is also cubic and finding $\mathrm{w}(h_{\restriction\mathbb{F}^{n-1}})$ and $\mathrm{w}((g+h)_{\restriction\mathbb{F}^{n-1}})$ is not easy. However, we can recursively repeat the process of decomposition of $f$ so that its weight is the sum of weights of some affine or quadratic functions on a vector space of dimension $<n$ over $\mathbb{F}$. For instance, further decomposing $g+h$ and $h$ into the form $g+h=x_2g_1(x_3,...,x_n)+h_1(x_3,...,x_n)$ and $h=x_2g'_1(x_3,...,x_n)+h'_1(x_3,...,x_n)$, the weight of $f$ becomes $\mathrm{w}(f)=\mathrm{w}((g_1+h_1)_{\restriction\mathbb{F}^{n-2}})+\mathrm{w}({h_1}_{\restriction\mathbb{F}^{n-2}})+\mathrm{w}((g'_1+h'_1)_{\restriction\mathbb{F}^{n-2}})+\mathrm{w}({h'_1}_{\restriction\mathbb{F}^{n-2}})$. We use this idea to build an algorithm which computes the weight of any cubic Bf's and its efficiency and simplicity relies on Theorem \ref{weight-of-cubic} and the known results about the weights of affine and quadratic functions. \subsection*{Algorithm 1}\label{algorithm1} The following algorithm computes the weight of a cubic function $f$ on $n$ variables: \begin{tabular}{ll} {\bf Input: } & cubic function $f$, \\ {\bf Output: }& $\mathrm{w}(f)$,\\ {\bf Step 1: }& express $f$ in the form $f=x_1g(x_2,...,x_n)+h(x_2,...,x_n)$ so that\\ & $g$ is quadratic,\\ {\bf Step 2: }& if $\deg(h)\leq 2$, compute $\mathrm{w}(f)$ by using Theorem \ref{weight-of-cubic} and return $\mathrm{w}(f)$,\\ {\bf Step 3: }& otherwise, recursively compute the weights of $g+h$ and $h$ by \\ &applying {\bf Step 1} and {\bf Step 2},\\ {\bf Step 4: }& sum up all the weights found to obtain $\mathrm{w}(f)$. \end{tabular} \section{Nonlinearity of Boolean functions}\label{sect-4} We begin with the nonlinearity of a function whose terms have the degree but their variables are pairwise disjoint. \begin{proposition}\label{terms-of-same-degree-nonlinearity} Let $f\in B_n$, with $\deg(f)=m$ and $m>1$, be such that \[f\sim_A\sum_{t=0}^{k-1}\prod_{j=1}^{m}x_{mt+j}.\] Then \(\mathcal{N}(f)=2^{n-1}-2^{n-mk-1}(2^m-2)^k.\) \end{proposition} \begin{proof} Let $f_i=\prod_{j=1}^{m}x_{mi+j}$. Then $f\sim_A \sum_{i=0}^{k-1}f_i$. Let $l_\alpha(x)=\alpha\cdot x$, where $\alpha,x\in\mathbb{F}^n$. Observe that $f+l_\alpha$ is balanced if $l_\alpha$ has some variables which are not in $f$ (see Proposition \ref{balanced-splitting}) and in this case, we have $\mathcal{W}_{f}(\alpha)=\mathcal{F}(f+l_\alpha)=0$. Thus we can assume that $l_\alpha(x)=l_a(X)=a\cdot X$, with \(a=(a_0,...,a_{k-1})\) and $X=(y_0,...,y_{k-1})$ in $\left(\mathbb{F}^m\right)^k$, so that all variables in $l_a$ are also in $f$. By Corollary~\ref{general-fourier-split}, we have \[\mathcal{W}_{f}(\alpha)=\mathcal{F}(f+l_a)=2^{n-mk}\prod_{i=0}^{k-1}\mathcal{F}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m}).\] Recall that $\mathcal{N}(f)=2^{n-1}-\frac{1}{2}\max_{\alpha\in\mathbb{F}^n}|\mathcal{W}_{f}(\alpha)|$. Clearly, $|\mathcal{W}_{f}(\alpha)|$ is maximal if all \\$\mathcal{F}([g_i+l_{a_i}]_{\restriction\mathbb{F}^m})$ are maximal. $\mathcal{F}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})=2^m-2\mathrm{w}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})$ and it is clear that $\mathrm{w}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})\neq 0$. So $\mathcal{F}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})$ is maximal if $a_i=(0,...,0)$ since in this case $\mathrm{w}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})=\mathrm{w}({f_i}_{\restriction\mathbb{F}^m})=1$. Thus, $|\mathcal{W}_{f}(\alpha)|$ is maximal if, for all $i$, we have $\mathcal{F}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})=\mathcal{F}({f_i}_{\restriction\mathbb{F}^m})=2^m-2$, implying that it is maximal when $\alpha=(0,...,0)$. Substituting $\mathcal{F}([f_i+l_{a_i}]_{\restriction\mathbb{F}^m})=2^m-2$, we obtain $\mathcal{W}_{f}(\alpha)=2^{n-mk}(2^m-2)^k$. Hence \(\mathcal{N}(f)=2^{n-1}-2^{n-mk-1}(2^m-2)^k.\) \end{proof} \begin{remark} We deduce from Proposition \ref{terms-of-same-degree-nonlinearity} that $f$ is bent if and only if $m=2$ and $k=n/2$, for $n$ even, otherwise $2^{n-mk-1}2^k(2^{m-1}-1)^k$ would be equal to $2^{\frac{n}{2}-1}$, for some positive integer $k$, contradicting the fact that $(2^{m-1}-1)\nmid 2^{\frac{n}{2}-1}$ since $(2^{m-1}-1)$ is odd and $2^{\frac{n}{2}-1}$ cannot be divisible by an odd number. \end{remark} \begin{theorem}\label{walsh-nonlinearity-generalised-conv} Let $f$ be a Bf of the form (\ref{generalised-convolutional-product}). Let $\alpha=(a,b)\in \mathbb{F}^m\times \mathbb{F}^n$, with $a=(a_1,...,a_m)$ and $b=(b_1,...,b_n)$ . Then \begin{itemize} \item[(i)]\( \mathcal{W}_f(\alpha)= \begin{cases} \left(2^m-1\right)\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)+\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b) & \text{ if } a=0\\(-1)^\lambda\left(\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)-\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)\right)& \text{ otherwise}, \end{cases}\) \\with $\lambda=a_1+\cdots +a_m$, \item [(ii)] \(\mathcal{N}(f)\geq (2^m-1)\mathcal{N}(h_{\restriction\mathbb{F}^n})+\mathcal{N}(g_{\restriction\mathbb{F}^n})\). \end{itemize} \end{theorem} \begin{proof} Since nonlinearity is invariant under affine equivalence, we can simply write\\ \(f=\left(\prod_{j=1}^mx_j\right)g(x_{m+1},...,x_{m+n})+\left(1+\prod_{j=1}^mx_j\right)h(x_{m+1},...,x_{m+n}).\) Let\\ $X=(y,x)\in \mathbb{F}^m\times \mathbb{F}^n$, with $y=(x_1,...,x_m)$ and $x=(x_{m+1},...,x_{m+n})$, and $\mathbf{1}=(1,1,...,1)$. Then \begingroup \allowdisplaybreaks \begin{align*} \mathcal{W}_f(\alpha)&=\sum_{X\in\mathbb{F}^{m+n}}(-1)^{f(X)+\alpha\cdot X}\\&=\sum_{(y,x)\in\mathbb{F}^m\setminus\{\mathbf{1}\}\times \mathbb{F}^n}(-1)^{h(x)+a\cdot y+b\cdot x}+\sum_{(y,x)\in\{\mathbf{1}\}\times \mathbb{F}^n}(-1)^{g(x)+a\cdot y+b\cdot x}\\&=\sum_{(y,x)\in\mathbb{F}^m\times \mathbb{F}^n}(-1)^{h(x)+a\cdot y+b\cdot x}-\sum_{(y,x)\in\{\mathbf{1}\}\times \mathbb{F}^n}(-1)^{h(x)+a\cdot y+b\cdot x}\\&+\sum_{(y,x)\in\{\mathbf{1}\}\times \mathbb{F}^n}(-1)^{g(x)+a\cdot y+b\cdot x}\\&=\left( \sum_{y\in\mathbb{F}^m}(-1)^{a\cdot y}\right)\cdot\left(\sum_{x\in\mathbb{F}^n}(-1)^{h(x)+b\cdot x}\right)-(-1)^\lambda\sum_{x\in\mathbb{F}^n}(-1)^{h(x)+b\cdot x}\\&+(-1)^\lambda\sum_{x\in \mathbb{F}^n}(-1)^{g(x)+b\cdot x}\\&=\left( \sum_{y\in\mathbb{F}^m}(-1)^{a\cdot y}\right)\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)-(-1)^\lambda\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)+(-1)^\lambda\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)\\&=\begin{cases} (2^m-1)\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)+\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)& \text{ if } a=0\\ (-1)^\lambda\left[\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)-\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)\right]& \text{ otherwise}. \end{cases} \end{align*} \endgroup To reach the last step we used the fact that \[\sum_{y\in\mathbb{F}^m}(-1)^{a\cdot y}=\begin{cases} 2^m & \text{ if } a=0,\\0 & \text{ otherwise} \end{cases}\] and also that $\lambda=0$ if $a=0$. For any two integers $c$ and $d$, it is well-known that $|c+d|\leq |c|+|d|$. Clearly, we have \[|\mathcal{W}_f(\alpha)|\leq \begin{cases} (2^m-1)|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|+|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|& \text{ if } a=0\\ |\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|+|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|& \text{ otherwise}. \end{cases}\] Since \[|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|+|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|\leq (2^m-1)|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|+|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|,\] then we deduce that, for any $\alpha=(a,b)$, we have \[|\mathcal{W}(\alpha)|\leq (2^m-1)|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|+|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|.\] So \begin{align*} \mathcal{N}(f)&=2^{n+m-1}-\frac{1}{2}\max_{\alpha\in\mathbb{F}^{n+m}}|\mathcal{W}_f(\alpha)|\\&\geq 2^{n+m-1}-\frac{1}{2}\max_{b\in \mathbb{F}^n}\left((2^m-1)|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|+|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|\right)\\&\geq 2^{n+m-1}-\frac{1}{2}(2^m-1)\max_{b\in \mathbb{F}^n}|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|-\frac{1}{2}\max_{b\in \mathbb{F}^n}|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|\\&=(2^m-1)2^{n-1}+2^{n-1}-\frac{1}{2}(2^m-1)\max_{b\in \mathbb{F}^n}|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|-\frac{1}{2}\max_{b\in \mathbb{F}^n}|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|\\&=(2^m-1)2^{n-1}-\frac{1}{2}(2^m-1)\max_{b\in \mathbb{F}^n}|\mathcal{W}_{h_{\restriction\mathbb{F}^n}}(b)|+2^{n-1}-\frac{1}{2}\max_{b\in \mathbb{F}^n}|\mathcal{W}_{g_{\restriction\mathbb{F}^n}}(b)|\\&=(2^m-1)\mathcal{N}(h_{\restriction\mathbb{F}^n})+\mathcal{N}(g_{\restriction\mathbb{F}^n}).\qedhere \end{align*} \end{proof} \begin{remark}\label{nonlinearity-remark} Note that if $m=1$, by Theorem \ref{walsh-nonlinearity-generalised-conv}, the nonlinearity of \[f\sim_A x_{n+1}g(x_1,..,x_n)+(1+x_{n+1})h(x_1,...,x_n)\] is $\mathcal{N}(f)\geq \mathcal{N}(h_{\restriction\mathbb{F}^n})+\mathcal{N}(g_{\restriction\mathbb{F}^n})$. \end{remark} It is immediate from Theorem \ref{nonlinearity-quadratics} and Remark \ref{nonlinearity-remark} that the following corollary holds. \begin{corollary}\label{nonlinearity-cubics} Let $f$ be as described in Theorem \ref{weight-of-cubic}. Then \[\mathcal{N}(f)\geq\begin{cases} 2^{n-1}-2^{n-k-1} & \text{ if } g \text{ is quadratic and } h \text{ affine,}\\2^{n-1}-2^{n-\ell-1} & \text{ if } g \text{ is affine and } h \text{ quadratic,}\\2^n-2^{n-k-1}-2^{n-\ell-1} & \text{ if both } g \text{ and } h \text{ are quadratic}. \end{cases}\] \end{corollary} Corollary \ref{nonlinearity-cubics} suggests a way of constructing Bf's with high non-linearity. \section{A Characterization of APN Functions}\label{sect-5} In this section we define a parameter which is used for characterization of quadratic and cubic APN function. This parameter can also be used to describe some properties for quadratic and cubic partially-bent functions. \subsection{Some known results on APN functions} Some definitions and known results on APN functions, which can be found in \cite{Ber,Beth,Cal,Cant,Car1}, are reported. \begin{definition} Define \(\delta_F(a,b)=|\{x\in \mathbb{F}^n| D_aF(x)=b\}|\), for $a,b\in \mathbb{F}^n$ and vBf $F$. The {\em differential uniformity of $F$ is} \[\delta(F)=\max_{a\neq 0,b\in \mathbb{F}^n}\delta_F(a,b)\] and always satisfies $\delta(F)\geq 2$. A function with $\delta(F)=2$ is called {\em Almost Perfect Nonlinear (APN)}. \end{definition} For a vBf $F$, the $k$th power moment of Walsh transform is defined as \[L_k(F)=\sum_{\lambda\in\mathbb{F}^n\setminus\{0\}}L(F_\lambda).\] Next we state a result in which APN functions are characterized by the fourth power moment of Walsh transform. \begin{theorem}\label{APN-momentum-vectorial} Let $F$ be a vBf from $\mathbb{F}^n$ to itself. Then \[L_4(F)\geq 2^{3n+1}(2^n-1).\] Moreover, $F$ is APN if and only if equality holds. \end{theorem} The following result can be easily deduced from Theorem \ref{APN-momentum-vectorial}. \begin{theorem}\label{APN-first-order-derivatives} Let $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ be a vBf. Then \[\sum_{\lambda\neq 0,a\in\mathbb{F}^n}\mathcal{F}^2(D_aF_\lambda)\geq 2^{2n+1}(2^n-1).\] Moreover, $F$ is APN if and only if equality holds. \end{theorem} \subsection{The parameter $\mathcal{M}(f)$}\label{subsect-2} We define and study some properties of a parameter for a Boolean function based on its second-order derivatives and in the next subsection we use it for characterization of quadratic and cubic APN functions. \begin{definition}\label{mf} For $a\in\mathbb{F}^n$ and $f\in B_n$, define $\mathit{Z}_a(f):=\{b\in \mathbb{F}^n\mid D_bD_af= 0\}$, $\mathit{U}_a(f):=\{b\in \mathbb{F}^n\mid D_bD_af= 1\}$ and $\mathcal{M}_a(f):=|\mathit{Z}_a(f)|-|\mathit{U}_a(f)|$. We define the parameter $\mathcal{M}(f)$ by \[\mathcal{M}(f):=\sum\limits_{a\in \mathbb{F}^n\setminus\{0\}}\mathcal{M}_a(f).\] \end{definition} \begin{lemma}\label{equivalence-derivatives} Let $g_1,g_2\in B_n$ be such that $g_1=g_2(Mx+w)$, with invertible $M\in GL_n(\mathbb{F})$ and $w\in\mathbb{F}^n$. Then, for any $a\in\mathbb{F}^n\setminus\{0\}$, we have $D_ag_1\sim_A D_{M\cdot a}g_2$. \end{lemma} \begin{proof} Let $\varphi$ be the affinity of $\mathbb{F}^n$ associated with $M\in GL_n(\mathbb{F})$, $w\in\mathbb{F}^n$, that is, $\varphi(y)=M\cdot y+w$, for all $y\in \mathbb{F}^n$. For $a\in \mathbb{F}^n$, we have \begin{align*} D_ag_1(x)&=D_a(g_2\circ \varphi)(x)\\&=g_2(\varphi(x+a))+g_2(\varphi(x))\\&=g_2(M\cdot (x+a)+w)+g_2(\varphi(x))\\&=g_2(M\cdot x+M\cdot a+w)+g_2(\varphi(x))\\&=g_2(M\cdot a+\varphi(x))+g_2(\varphi(x))\\&=D_{M\cdot a}g_2(\varphi(x))=(D_{M\cdot a}g_2\circ \varphi)(x). \end{align*} So it implies that $D_ag_1\sim_A D_{M\cdot a}g_2$. \end{proof} \begin{proposition} Let $f\in B_n$. Then, for all $a\in \mathbb{F}^n$, \begin{itemize} \item[(i)] $\mathit{Z}_a(f)$ is a vector space and has nonzero dimension, \item[(ii)] $\mathit{U}_a(f)$ is either a coset of $\mathit{Z}_a(f)$ or the empty set. \end{itemize} \end{proposition} \begin{proof} (i) It is clear that $0$ is in $Z_a(f)$ since $D_0D_a(f)=0$. Suppose we have $b_1,b_2\in Z_a(f)$. Then \[D_{b_1+b_2}D_af(x)=D_{b_1}f(x)+D_{b_2}D_af(x+b_1)=0+0=0,\] implying that $b_1+b_2\in Z_a(f)$ [note that we deduced that $D_{b_2}D_af(x+b_1)=0$ from Lemma \ref{equivalence-derivatives}]. To show that it is of nonzero dimension, observe that if $a=0$ then $Z_a(f)=\mathbb{F}^n$ and if $a\neq 0$, then we have $D_aD_af(x)=0$, implying that $\{0,a\}\subseteq Z_a(f)$. So the dimension of $Z_a(f)$ is at least $1$. (ii) Suppose that $U_a(f)\neq \varnothing$. For any $b_1\in U_a(f)$, we show that $b_1+Z_a(f)=U_a(f)$. Let $b_2=b_1+d$, with $d\in Z_a(f)$. We have \[D_{b_2}D_af(x)=D_{b_1+d}D_af(x)=D_{b_1}D_af(x)+D_dD_af(x+b_1)=1+0=1.\] Thus, $b_2\in U_a(f)$. Conversely, for $e\in U_a(f)$, we have \[D_{b_1+e}D_af(x)=D_{b_1}D_af(x)+D_eD_af(x+b_1)=1+1=0.\] It follows that $e+b_1\in Z_a(f)\implies e\in b_1+Z_a(f)$. \end{proof} \begin{proposition}\label{quadratic-cubic-mf} Let $f\in B_n$ be a Bf with $\deg(f)\in\{2,3\}$. Then, for some even integer $j$, with $1<j<n$ and any $a\in\mathbb{F}^n$, we have \[\mathcal{M}_a(f)= \begin{cases}0 & \text{ if and only if $D_af$ balanced},\\ 2^n& \text{ if and only if $D_af$ is constant},\\ 2^{n-j} & \text{otherwise}.\\ \end{cases}\] \end{proposition} \begin{proof} Since $\deg(f)\in\{2,3\}$ then $\deg(D_af)\in\{0,1,2\}$. It is clear from the definition of $\mathcal{M}_a(f)$ that \(\deg(D_af)=0\iff \mathcal{M}_a(f)=2^n.\) Suppose that $\deg(D_af)=1$. Then $D_af(x)$ is a non-constant affine function, so it is balanced. That is, we can write $D_af(x)=v\cdot x+c$, for some $v\in\mathbb{F}^n\setminus\{0\}$ and $c\in\mathbb{F}$. Observe that \begin{align*} D_bD_af(x)&=v\cdot x+c+v\cdot (x+b)+c\\&=v\cdot x+v\cdot x+v\cdot b\\&=v\cdot b. \end{align*} So $D_bD_af(x)=0\iff b\in W=<v>^{\perp}$ and $D_bD_af(x)=1\iff b\in W^c$ ($A^\perp$ denotes the dual set and $A^c$ denotes the complement of a set $A$). Thus, $Z_a(f)=W$ and $U_a(f)=W^c$. It is clear that $|W|=|W^c|=2^{n-1}$. So we have $\mathcal{M}_a(f)=0$. Finally, suppose that $\deg(D_af)=2$, that is, by Theorem \ref{quadratic}, we know that $D_af\sim_A x_1x_2+\cdots +x_{2i-1}x_{2i}+x_{2i+1}$, with $i \leq \lfloor(n-1)/2\rfloor$, if $D_af$ is balanced and $D_af\sim_A x_1x_2+\cdots +x_{2i-1}x_{2i}+e$, with $i \leq \lfloor n/2\rfloor$ and $e\in \mathbb{F}$, if $D_af$ is unbalanced. Suppose that $D_af$ is balanced. Then \[|Z_a(f)|=|\{c=(c_1,...,c_n)\in\mathbb{F}^n\mid c_1=\cdots=c_{2i+1}=0\}|\] and \[|U_a(f)|=|\{c=(c_1,...,c_n)\in\mathbb{F}^n\mid c_1=\cdots=c_{2i}=0, c_{2i+1}=1\}|.\] Observe that in both cases, $|Z_a(f)|=|U_a(f)|=2^{n-2i-1}$. Hence $\mathcal{M}_a(f)=0$. Now suppose that $D_af$ is unbalanced. Then we have \[|Z_a(f)|=|\{c=(c_1,...,c_n)\in\mathbb{F}^n\mid c_1=\cdots=c_{2i}=0\}|\] and \(U_a(f)=\varnothing\). It follows that $|Z_a(f)|=2^{n-2i}$ and $|U_a(f)|=0$. So it implies that $\mathcal{M}_a(f)=2^{n-2i}$. \end{proof} \begin{proposition}\label{mf-partially-bent} For any quadratic and cubic partially-bent function $f$, we have \[\mathcal{M}(f)=2^n(2^k-1),\] where $k=\dim V(f)$. \end{proposition} \begin{proof} We know, from Proposition \ref{quadratic-cubic-mf}, that $\mathcal{M}_a(f)=0$ if and only if $D_af$ is balanced and $\mathcal{M}_a(f)=2^n$ if and only if $D_af$ is a constant. We deduce, from the definition, that for any partially-bent function $f$, $D_af$ is constant if and only if $a\in V(f)$ and $D_af$ is balanced if and only if $a\notin V(f)$. Recall that all quadratic functions are partially-bent. Thus, for any quadratic function or cubic partially-bent function $f$, we have \[\mathcal{M}(f)=\sum_{a\in \mathbb{F}^n\setminus\{0\}}\mathcal{M}_a(f)=\sum_{a\in V(f)\setminus\{0\}}\mathcal{M}_a(f)=2^n(2^k-1),\] with $k=\dim V(f)$. \end{proof} If a function $f$ is bent, then $k=0$ and so, by Proposition \ref{mf-partially-bent}, $\mathcal{M}(f)=0$. Thus, we state this in the following. \begin{corollary}\label{bent-mf} Let $f\in B_n$ be a quadratic or cubic function. Then $f$ is bent if and only if $\mathcal{M}(f)=0$. \end{corollary} Observe that the result in Corollary \ref{bent-mf} can also be deduced by Theorem~\ref{bent-thm} and Proposition~\ref{quadratic-cubic-mf}. \begin{lemma}\label{semi-bent-V(f)} Let $f\in B_n$, with $n$ odd, be quadratic. Then $\dim V(f)\geq 1$ and equality holds if and only if $f$ is semi-bent. \end{lemma} \begin{proof} From Theorem \ref{quadratic}, observe that \[|V(f)|=|\{c=(c_1,...,c_n)\in\mathbb{F}^n| c_1=\cdots=c_{2i}=0, i\leq (n-1)/2\}|.\] It follows that $|V(f)|=2^{n-2i}$. Since $n$ is odd, so we must have $\dim V(f)\geq 1$. It can be observed, from Theorem \ref{nonlinearity-quadratics}, that $f$ is semi-bent $\iff f\sim_A x_1x_2+\cdots +x_{n-2}x_{n-1}+x_{n}$ or $f\sim_A x_1x_2+\cdots +x_{n-2}x_{n-1}+c$, with $c\in\mathbb{F}$, from which we deduce that $f$ is semi-bent $\iff \dim V(f)=1$. \end{proof} By Theorem \ref{quadratic} and Lemma \ref{semi-bent-V(f)}, the following corollary holds. \begin{corollary}\label{semi-bent-mf} For $n$ odd, a quadratic Bf $f$ is semi-bent if and only if $\mathcal{M}(f)=2^n$. \end{corollary} \subsection{APN functions and their second-order derivatives} For a vBf $F:\mathbb{F}^n\rightarrow\mathbb{F}^n$, define \(\mathcal{M}(F)=\sum_{\lambda\neq 0\in \mathbb{F}^n}\mathcal{M}(F_\lambda).\) It is clear from Subsection~\ref{subsect-2} that the quantity $\mathcal{M}(F)$ is defined based on second-order derivatives of components of $F$. We establish a connection between the fourth power moment of the Walsh transform and the value \(\mathcal{M}(F)\), and consequently derive a characterization of quadratic and cubic APN functions based on the latter quantity. \begin{lemma}\label{momentum-lemma-mf-vectorial} Let \(F:\mathbb{F}^n\rightarrow \mathbb{F}^n\) be a vBf of $\deg(F)\in\{2,3\}$. Then \[L_4(F)=2^{3n}(2^n-1)+2^{2n}\mathcal{M}(F).\] \end{lemma} \begin{proof} We have \begingroup \allowdisplaybreaks \begin{align}\label{momentum-fourier-equation} L_4(F)&=\sum_{\lambda\neq 0\in\mathbb{F}^n}L_4(F_\lambda)=\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{a\in \mathbb{F}^n}\mathcal{W}_{F_\lambda}^4 (a)\nonumber\\&=\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{a\in\mathbb{F}^n}\sum_{x,y,z,w\in \mathbb{F}^n}(-1)^{F_\lambda(x)+F_\lambda(y)+F_\lambda(z)+F_\lambda(w)+a\cdot (x+y+z+w)}\nonumber\\&=\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{a\in\mathbb{F}^n}\sum_{x,y,z,w\in \mathbb{F}^n}(-1)^{F_\lambda(x)+F_\lambda(y)+F_\lambda(z)+F_\lambda(w)}(-1)^{a\cdot (x+y+z+w)}\nonumber\\&=\sum_{\lambda\neq 0\in \mathbb{F}^n}\sum_{x,y,z,w\in\mathbb{F}^n}(-1)^{F_\lambda(x)+F_\lambda(y)+F_\lambda(z)+F_\lambda(w)}\sum_{a\in \mathbb{F}^n}(-1)^{a\cdot (x+y+z+w)}\nonumber\\&=\sum_{\lambda\neq 0\in \mathbb{F}^n}\sum_{x,y,z,w\in\mathbb{F}^n |x+y+z+w=0}2^n(-1)^{F_\lambda(x)+F_\lambda(y)+F_\lambda(z)+F_\lambda(w)}\nonumber\\&=2^n\sum_{\lambda\neq 0\in \mathbb{F}^n}\sum_{x,y,z,w\in\mathbb{F}^n |w=x+y+z}(-1)^{F_\lambda(x)+F_\lambda(y)+F_\lambda(z)+F_\lambda(w)}\nonumber\\&=2^n\sum_{\lambda\neq 0\in \mathbb{F}^n}\sum_{x,y,z\in\mathbb{F}^n }(-1)^{F_\lambda(x)+F_\lambda(y)+F_\lambda(z)+F_\lambda(x+y+z)}\nonumber\\& \left(\text{substituting $y=x+b$ and $z=x+c$ we have}\right)\nonumber\\& =2^n\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{x,b,c\in \mathbb{F}^n}(-1)^{F_\lambda(x)+F_\lambda(x+b)+F_\lambda(x+c)+F_\lambda(x+b+c)}\nonumber\\&=2^n\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{x,b,c\in \mathbb{F}^n}(-1)^{D_bF_\lambda(x)+D_bF_\lambda(x+c)}\nonumber\\&=2^n\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{x,b,c\in \mathbb{F}^n}(-1)^{D_cD_bF_\lambda(x)}\\& (\deg(D_cD_bF_\lambda)=1\implies \sum_{x\in \mathbb{F}^n}(-1)^{D_cD_bF_\lambda(x)}=0, \text{ so we have}) \nonumber\\&=2^n\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{x,b,c\in \mathbb{F}^n|\deg(D_cD_bF_\lambda)=0}(-1)^{D_cD_bF_\lambda(x)}\nonumber\\&=2^n\sum_{\lambda\neq 0\in\mathbb{F}^n}2^n\sum_{b,c\in \mathbb{F}^n|\deg(D_cD_bF_\lambda)=0}(-1)^{D_cD_bF_\lambda(0)}\nonumber\\&= 2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\left(\sum_{b,c\in \mathbb{F}^n|D_cD_bF_\lambda=0}(-1)^0+\sum_{b,c\in \mathbb{F}^n|D_cD_bF_\lambda=1}(-1)^1\right)\nonumber\\&=2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\left(|\{b,c\in \mathbb{F}^n\mid D_cD_bF_\lambda=0\}|-|\{b,c\in \mathbb{F}^n\mid D_cD_bF_\lambda=1\}|\right)\nonumber\\&=2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{b\in\mathbb{F}^n}\left(|\{c\in \mathbb{F}^n\mid D_cD_bF_\lambda=0\}|-|\{c\in \mathbb{F}^n\mid D_cD_bF_\lambda=1\}|\right)\nonumber\\&=2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\left(|\{c\in \mathbb{F}^n\mid D_cD_0F_\lambda=0\}|-|\{c\in \mathbb{F}^n\mid D_cD_0F_\lambda=1\}|\right)\nonumber\\&+2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{b\neq 0\in\mathbb{F}^n}\mathcal{M}_b(F_\lambda)\nonumber\\&=2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\left(|\{c\in \mathbb{F}^n\mid D_c(0)=0\}|-|\{c\in \mathbb{F}^n\mid D_c(0)=1\}|\right)\nonumber\\&+2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{b\neq 0\in\mathbb{F}^n}\mathcal{M}_b(F_\lambda)\nonumber\\&=2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\left(2^n-0\right)+2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{b\neq 0\in\mathbb{F}^n}\mathcal{M}_b(F_\lambda)\nonumber\\&=2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}2^n+2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{b\neq 0\in\mathbb{F}^n}\mathcal{M}_b(F_\lambda)\nonumber\\&=2^{3n}(2^n-1)+2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\sum_{b\neq 0\in \mathbb{F}^n}\mathcal{M}_b(F_\lambda)\nonumber\\&=2^{3n}(2^n-1)+2^{2n}\sum_{\lambda\neq 0\in\mathbb{F}^n}\mathcal{M}(F_\lambda)=2^{3n}(2^n-1)+2^{2n}\mathcal{M}(F)\nonumber. \qedhere \end{align} \endgroup \end{proof} We deduce by Lemma \ref{momentum-lemma-mf-vectorial} and Theorem \ref{APN-momentum-vectorial} that the following theorem holds. \begin{theorem}\label{mf-cubic-quadratic-APN} Let $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ be a vBf with $\deg(F)\in \{2,3\}$. Then \[\mathcal{M}(F)\geq 2^{n}(2^n-1).\] Moreover, $F$ is APN if and only if equality holds. \end{theorem} By Theorem \ref{mf-cubic-quadratic-APN}, the following corollary holds. \begin{corollary}\label{APN-mf} If a vBf $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ is a quadratic or cubic APN then there is a nonzero $\lambda\in \mathbb{F}^n$ such that $\mathcal{M}(F_\lambda)\leq 2^n$. \end{corollary} By Proposition \ref{mf-partially-bent}, we can deduce that the following corollary holds. \begin{corollary}\label{sum-mf-quadratic} Let $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ be a quadratic function or cubic partially-bent function. Then \begin{align}\label{mf-quadratic-eqn}\mathcal{M}(F)=2^n\sum_{\lambda\in\mathbb{F}^n\setminus\{0\}} (2^{\dim V(F_\lambda)}-1).\end{align} \end{corollary} \begin{example} {\rm Let $F(x_1, x_2, x_3) = (f_1, f_2, f_3)$ where $f_1 = x_1x_3 + x_2x_3+x_1$, $f_2= x_2x_3+x_1 + x_2$ and $f_3= x_1x_2+x_1 + x_2+x_3$ are all in $B_3$. One can verify that all components are quadratic. By Corollary \ref{sum-mf-quadratic}, $\mathcal{M}(F)=2^3\cdot (2^3-1)=56$ and so, by Theorem \ref{mf-cubic-quadratic-APN}, we conclude that $F$ is an APN function. Moreover, all components are balanced, implying that $F$ is an APN permutation.} \end{example} We deduce, from Lemma \ref{semi-bent-V(f)}, Corollary \ref{sum-mf-quadratic} and Theorem \ref{mf-cubic-quadratic-APN}, that the following corollary holds. \begin{corollary}\label{quadratic-mf-APN-odd dimension} Let $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$, with $n$ odd, be a quadratic function or cubic partially-bent function. Then $F$ is APN if and only if, for all $\lambda\neq 0 \in\mathbb{F}^n$, $\mathcal{M}(F_\lambda)=2^n$. \end{corollary} By Theorem \ref{mf-cubic-quadratic-APN} and Corollary \ref{sum-mf-quadratic}, the following result holds. \begin{corollary}\label{sum-mf-quadratic-APN} Let $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ be a quadratic function or cubic partially-bent function. Then \begin{align}\label{mf-quadratic-eqn-1}\sum_{\lambda\neq 0\in\mathbb{F}^n} (2^{\dim V(F_\lambda)}-1)\geq 2^n-1.\end{align} Moreover, equality holds if and only if $F$ is APN. \end{corollary} By applying Lemma \ref{semi-bent-V(f)} and Corollary \ref{sum-mf-quadratic-APN}, we can deduce the only well-known result present in this subsection. \begin{theorem}[\cite{Bud}]\label{quadratic-apn} Let $F:\mathbb{F}^n\rightarrow\mathbb{F}^n$, with $n$ odd, be a pure quadratic function. Then $F$ is APN if and only if it is AB. \end{theorem} For any partially-bent function $f$ in even dimension, $\dim V(f)$ must be even and $\dim V(f)=0$ if and only if $f$ is bent. So we deduce, from Corollary \ref{sum-mf-quadratic-APN}, that a quadratic function or cubic partially-bent APN function $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ must have $2(2^n-1)/3$ bent components if the linear spaces for all components have dimensions $0$ or $2$. Moreover, if there is a component with dimension $2\ell$, $\ell>1$, then the number of bent components has to be increased by $(2^{2\ell}-1)/3-1$ in order for equality of Relation \eqref{mf-quadratic-eqn-1} to hold. Since, in the case of $n=4$, the dimension of linear space of any quadratic function is either $0$ or $2$, then we deduce the following. \begin{proposition} A pure quadratic function $Q:\mathbb{F}^4\rightarrow \mathbb{F}^4$ is APN if and only if there are $10$ bent components. \end{proposition} By Equation \eqref{momentum-fourier-equation} in Lemma \ref{momentum-lemma-mf-vectorial}, for any vBf $F:\mathbb{F}^n\rightarrow\mathbb{F}^n$, we have \begin{align}\label{fourier-second-derivatives-APN-eqn} L_4(F)=2^n\sum_{\lambda\neq 0,c,b\in\mathbb{F}^n}\mathcal{F}(D_bD_cF_\lambda).\end{align} So, by Theorem \ref{APN-momentum-vectorial} and Equation \eqref{fourier-second-derivatives-APN-eqn}, we deduce the following result which relates an APN function to its second order derivatives (this result can also be directly deduced from Theorem~\ref{APN-first-order-derivatives}). \begin{theorem}\label{APN-second-order-derivatives} Let $F:\mathbb{F}^n\rightarrow \mathbb{F}^n$ be a vBf. Then \[\sum_{\lambda\neq 0,b,c\in\mathbb{F}^n}\mathcal{F}(D_bD_cF_\lambda)\geq 2^{2n+1}(2^n-1).\] Moreover, $F$ is APN if and only if equality holds. \end{theorem} \section{Conclusion} In this paper, we proved some results about the weight, balancedness and nonlinearity of some splitting functions and a special class of cubic functions. We also proved some results on how the weight and nonlinearity of any Boolean function can be, respectively, related to the weights and nonlinearity of some other functions at a lower dimension. Furthermore, we introduced a parameter of a Boolean function, based on second-order derivatives, from which we derived a characterization of quadratic and cubic APN functions. \section*{Acknowledgements} The results in this paper appear partially in the last author's MSc thesis and mostly in the first author's PhD thesis, both supervised by the second author.
\section{Introduction} Magnatoelectric and multiferroic materials specially perovskite and double perovskites oxides with rare earth and transition metals have been the focus of study due to various exotic phenomena like magnatoelectric/magnatodielectric effects, tunable pyroelectric and ferroelectric properties.\cite{ere, che, sug, van} These materials shows low temperature ferroelectic transition and have spontaneous polarization and also shows strong magnetic effects, where dielectric properties are controlled with magnetic field. Several material have been investigated to achieve the desired interplay of electric and magnetic properties for-instance, (Gd/Tb/Dy)MnO$_3$/HoMnO$_3$/YMnO$_3$.\cite{kim1, kim2, goto, yama, ishi, lor} The multiferric perovskite magnates HoMnO$_3$ with ferroelectic transition and large polarization $\sim$ $56 mC/m^2$ shows giant magnetocaloic effects and was reported by Hur et al.\cite{hur} Further, multeroferroic properties have been observed in A-type antiferromagnet Sm$_x$Y$_1$-xMn$O_3$ .\cite{flynn} Exchange intersection ferrielectric in multiferric HoMn$O_3$ have been reported by Lee et al. \cite{lee} Recently 3d based double perovskite R$_2$CoMnO$_6$ based R=rare earth elements have been receiving great attraction of researchers due to their electric and magnetic properties. In theses compounds a $Co^{2+}$ with electronic configuration $d^7$ t$_2g^5$ e$_g^2$ and Mn$^4+$ with $d^3$ t$_2g^3$ e$_g^0$ ions are presents. The super exchanges interactions between $Co^{2+}$ and $Mn^4+$ give rise to ferromagnetic ordering in most of these materials.\cite{goodenough} The magnates double peroskites with heavier rare earth elements shows remarkable properties like magnetization reversal and inverse exchange based in Er$_2$CoMnO$_6$,\cite{banerjee} anisotropy magnetic properties and giant magnatocaloric effect in Tb$_2$CoMnO$_6$,\cite{moon} negative magnatocapaictance Yb$_2$CoMnO$_6$ have also been observed. However Ho$_2$CoMnO$_6$ is less studied. Ho having high magnetic moment and relatively small size compared to other rare-earth would be quite interesting to investigate. In this paper we investigation the structural magnetic and dielectric properties of Ho$_2$CoMnO$_6$. In this paper we have investigated structural, magnetic and dielectric properties of the nano-crystalline Ho$_2$CoMnO$_6$. Structural investigation show that the samples crystallize in monoclinic structure and adopt \textit{P2$_1$/n} space group. Charge state of various elements present in the material is confirmed using X-ray photoelectron spectroscopy. Magnetization study shows that the material is ferromagnetic in nature and shows phase transition around 85 K. The effective magnetic moment obtained experimentally as 5.25 $\mu_B$/f.u. is found close to calculated value. Raman study shows that spin phonon coupling is present as indicated by mode frequency deviation from anharmonic behavior across $T_c$. Dielectric measurements have been performed on Ho$_2$CoMnO$_6$ with both temperature and frequency dependence. We found a very high dielectric constant which increases with decreasing frequency. The tangent loss shows the relaxation mechanism is active and it follows thermally activated behavior. The impedance spectroscopy reveals that relaxation time is distributive and shows deviation from ideal Dabye's model. AC conductivity have been studied as a function of both temperature and frequency. We found that the conduction mechanism is obeyed by Jonscher's model. The exponent factor $n$ is suggestive that the material deviates from ideal Debye's model. \section{Experimental details} The nano-crystalline sample Ho$_2$CoMnO$_6$ was prepared by Sol gel method. We have taken the ingredients, Ho$_2$O$_3$, Co(NO$_3$)$_2$.6H$_2$O and C$_4$H$_6$MnO$_4$.4H$_2$O in stoichiometric ratio. First we dissolved these ingredients in water in separate beakers with continuous stirring, where Co(NO$_3$)$_2$.6H$_2$O and C$_4$H$_6$MnO$_4$.4H$_2$O were completely dissolved in water and make clear solutions. However, Ho$_2$O$_3$ did not dissolve in water, so we added HNO$_3$ in the mixture drop by drop stirred on magnetic stirrer at 70 $^o$C continuously. After 45 minute the solution become clear and Ho$_2$O$_3$ was competely dissolved. These three solution were added in 400 ml beaker with water and placed on the magnetic stirrer for 24 hours for reaction to take place. The solution was turned into the gel form due to evaporation of water. At that time the temperature is increase to 200 $^o$C and the gel is started to dry, after complete dry out of the remain in the beaker was collected and ground in mortar and pestles for 25 minutes to make fine powder. The obtained powder is then placed in furnace for oxidation at 900$^o$C. The phase purity of prepared sample is checked by powder X-ray differection (XRD) study. XRD data collected at room temperature in 2$\theta$ range 10$^o$ -90$^o$ with step size of 0.02$^o$ and scan rate of 2$^o$/min. Crystal structural analysis was done by Rietveld refinement of XRD data using Fullprof program. The XPS measurements were performed with base pressure in the range of $10^{−10}$ mbar using a commercial electron energy analyzer (Omnicron nanotechnology) and a non-monochromatic Al$_{K\alpha}$ X-ray source (h$\nu$ = 1486.6 eV). The XPSpeakfit software has been used to analyze the XPS data. The samples used for XPS study are in pellet form where an ion beam sputtering has been done on the samples to expose clean surface before measurements. Magnetic data was collected by Physical Properties Measurement System by Cryogenic Inc. Temperature dependent Raman spectra have been recorded using Diode based laser ($\lambda$ = 473 nm) coupled with a Labram-HR800 micro-Raman spectrometer. It is a single spectrometer with 1800 grooves/mm grating and a peltier cooled CCD detector with a overall spectral resolution of $\sim$ 1 cm$^{−1}$. For the low temperature Raman measurements, the material has been mounted on a THMS600 stage from Linkam UK, with temperature stability of $\pm$0.1 K. Temperature as well as frequency dependent dielectric measurements have been performed on home made dielectric setup in the frequency range from 1 Hz to 5.5 MHz. The measurements were carried out in temperature range 20 K to 300 K the low temperature is achieved by close cycle refrigerator \begin{figure}[t] \centering \includegraphics[width=8cm]{Fig1.eps} \caption{(Color online) X-ray diffraction pattern along with Rietveld refinement for nano-crystalline Ho$_2$CoMnO$_6$ (b) Representative SEM image use to estimate particle size. Inset shows grain size distribution.} \label{fig:Fig1} \end{figure} \section{Result and Discussions} \subsection{Structural study} Sample in powder form is characterization by X-ray diffraction (XRD) at room temperature for structural study. The powder diffraction data is analyzed with Rietveld refinement by using Fullprof software. Fig. 1a) represent the XRD pattern along with rietveld refinement for Ho$_2$CoMnO$_6$. Black open circle in the diagram represents original experiment data, red solid lines are represents calculated pattern, with blue thin lines are difference and navy blue bars represents Braggs positions. Rietveld refinement of the XRD data was fine and sample is in single phase. The analysis of XRD data with rietveld refinement shows that the sample crystallize in monoclinic crystal structure and adopt \textit{P2$_1$/n} space group. The fitting parameters χ 2 and R$_{wp}$/R$_{exp}$ ratio which gives the goodness of fit of experimental data with the model are found to be 2.05 and 1.27 and are quite acceptable.\cite{ilyas1, bhatti1, bhatti2} The lattice parameter \textit{a},\textit{b} and \textit{c} at room temperature are obtained as 5.1990(2) $\AA$, 5.5550(8) $\AA$ and 7.4289(5) $\AA$ respectively for Ho$_2$CoMnO$_6$. The unit cell volume and $\beta$ values for Ho$_2$CoMnO$_6$ are found to be 214.5499 $\AA^3$ and 90.037$^o$ respectively. Further, to obtan the partical size in the nano-crystaline sample of Ho$_2$CoMnO$_6$ we have performed the scanning electron microscopy. Fig. 1(b) shows the SEM image obtained for the nano-crystalline structure. The SEM image is analyzed using ImageJ software. We observed that the average grain size for present compound is $\sim$76.65 nm. Further, we have potted the grain size distribution as shown in inset of Fig. 1b. \begin{figure}[th] \centering \includegraphics[width=8cm, height=12cm]{Fig2.eps} \caption{(Color online) (a) The XPS core level spectra of Co 2$p$ (b) XPS core level spectra of Mn 2$p$. (c) XPS core level spectra of Ho 4$d$ for Ho$_2$CoMnO$_6$. In the figure the red solid line is the overall envelop of the XPS spectrum and the other colored solid lines are the other respective fitted peaks.} \label{fig:Fig2} \end{figure} \subsection{X-ray photo-electron spectroscopy (XPS)} Understanding the oxidation state of elements present in the material gives vital information about the physical properties of materials and underlying physics. Here we have employed XPS to understand the charge state at surface of Ho$_2$CoMnO$_6$. We have employed the XPS to study the cationic charge state of Co, Mn and Ho in Ho$_2$CoMnO$_6$. XPS spectrum of Co 2$p$ is shown in Fig. 2a in which the open black circle are the experimental data the red line is overall envelop of the spectrum the solid blue lines are the Co 2$p$ peaks where as orange solid lines are the satellite peaks. It is evident from the Fig. 2a there are two peaks located at 780.4 eV and 795.8 eV for Co 2$p$$_{3/2}$ and Co 2$p$$_{1/2}$ respectively resulted from spin orbital splitting of 2$p$ orbital with splitting energy of 15.4 eV. Beside the Co 2$p$ peaks two satellite peaks have also been observed close to Co 2$p$ peaks are in agreement with literature.\cite{qiu} The peaks locations of Co 2$p$ core level indicates that the Co cations presents in +2 oxidation states. The measured XPS spectrum for Mn 2$p$ core levels along with peak fitting is shown in Fig. 2b, where the open black circle are the experimental data the red line is overall envelop of the spectrum the solid blue lines are the Mn 2$p$ peaks are shown. The Mn 2$p$ spectrum shows two distinct peaks located at 642.2 eV and 654.1 eV corresponding to Mn 2$p$$_{3/2}$ and 2$p$$_{1/2}$ resulted from spin-orbital splitting of 2$p$ orbitals with splitting energy of 12.1 eV. The peak position reveals that the Mn cation present in +4 oxidation state and results are agreement with literature.\cite{cao} Fig. 2c shows the core level spectra of Ho 4$d$ along with the fitting. In the figure open black circle is experimental data, solid red line is the overall envelop of the XPS spectrum and solid blue lines are the Ho 4$d$ orbitals. It is quite evident from the figure that the Ho 4$d$$_{5/2}$ peak is located at 160.6 eV. The detail analysis of XPS spectrum and peak postition of 4$d$ core level reveals that the Ho cation are resent in +3 oxidation states and matches with earlier literature.\cite{ho} The XPS study revails that the observed cationic oxidation state are Co$^{2+}$, Mn$^{4+}$ and Ho$^{3+}$ in Ho$_2$CoMnO$_6$. \begin{figure}[th] \centering \includegraphics[width=8cm]{Fig3.eps} \caption{(Color online) Temperature dependent magnetization data M(T) shown for Ho$_2$CoMnO$_6$ measured at different fields.} \label{fig:Fig3} \end{figure} \subsection{Magnetization study} DC magnetization data was measured as both temperature dependent ($M(T)$) and field dependent at constant temperature ($M(H)$) for Ho$_2$CoMnO$_6$. Temperature variation of magnetization data is recorded in both zero field cooled ($ZFC$) and field cooled ($FC$) mode as shown in Fig. 3. In this study $ZFC$ data is measured in 300 K to 2 K range in an applied field of 100 Oe for Ho$_2$CoMnO$_6$ sample. $FC$ data is also measured at three different applied magnetic fields (see Fig. 3). The close observation of Fig. 3 shows that with decreasing temperature the magnetic moment ($M$) in $M(T)$ curve under both $ZFC$ and $FC$ mode is steady till $\sim$90 K, however with further lowering of temperature magnetic moment begin to rise below 90 K. The sharp rise in moment around below 90 K is marked by paramagnetic to ferromagnetic phase transition in Ho$_2$CoMnO$_6$. Further, it is worth to mention here that our XPS results reveals that Mn and Co cations are in +4 and +2 oxidation states respectively with outer electronic configuration Mn$^{4+}$ (t$_{2g}^{3}$e$_{g}^{0}$), Co$^{2+}$ (t$_{2g}^{5}$e$_{g}^{2}$). It is expected that these Mn$^{4+}$-Co$^{2+}$ will engage in superexchange interaction and would ferromagnetically ordered. It is quite evident from the figure that with decreasing temperature the $M_{ZFC}$ curve shows a peak like behavior at T$_c$, whereas $M_{FC}$ increases monotonically with lowering temperature. $M_{ZFC}$ and $M_{FC}$ curves measured at 100 Oe are overlapping on each other till 80 K, however with further decreasing temperature large bifurcation in $M_{ZFC}$ and $M_{FC}$ curves is observed. Further, $M_{ZFC}$ curve shows a little rise in magnetic moment at low temperature whereas $M_{FC}$ shows a slight down fall in moment at low temperature below 20 K which can be seen in $dM/dT$ vs $T$ plot (see inset Fig. 4). Since, the Ho$_2$CoMnO$_6$ shows a magnetic phase transition from typical like PM-FM with sharp rise in magnetic moment around 90 K. To precisely find the transition temperature we chose to plot the temperature derivative of magnetic moment against temperature i.e. $dM/dT$ vs $T$ plot shown in inset Fig. 4. The point of inflection or minima in the $dM/dT$ vs $T$ plot gives the transition temperature ($T_c$) = 80 for Ho$_2$CoMnO$_6$. Further, it is evident that the $dM/dT$ vs $T$ gives another local minima at low temperature which is often attributed to the ordering of moments on rare earth ions present in the material.\cite{sanch, kaka} We have measured $M_{FC}$ data at different applied field we observe that with increasing field T$_c$ shifts to higher field which can be understood assuming that the forced spin arrangement happens in field direction. It is further worth considering that at low temperature the feature of $M_{FC}$ changes with increasing field. It is evident in Fig. 3 $M_{FC}$ measured at 500 Oe and 1000 Oe shows a sharp increase in magnetic moment below 20 K, which at low field shows a downfall in moment. The possible reason of this increase in moment at higher field may be due to spin flipping of rare earth ions and favoring ferromagnetic ordering with Mn/Co sublattice. \begin{figure}[t] \centering \includegraphics[width=8cm]{Fig4.eps} \caption{(Color online) M(T) data plotted in terms of inverse susceptibility $\chi^{-1}$, black and red solid lines are fitting due to Curie Weiss Law and modified Curie Weiss Law respectively. Inset shows dM/dT vs T plot showing T$_c$ for Ho$_2$CoMnO$_6$.} \label{fig:Fig4} \end{figure} \begin{figure}[t] \centering \includegraphics[width=8cm]{Fig5.eps} \caption{(Color online) Isothermal data collected at 2 K in applied field of $\pm$ 50 kOe for Ho$_2$CoMnO$_6$.} \label{fig:Fig5} \end{figure} \begin{figure*}[th] \centering \includegraphics[width=14cm]{Fig6.eps} \caption{(Color online) (a) Raman spectra of Ho$_2$CoMnO$_6$ measured at different temperatures. (b) shows the line shape and its Lorentzian fitting of A$_{1g}$ and B$_{2g}$ Raman modes at 494 and 644 cm$^{-1}$ respectively.} \label{fig:Fig6} \end{figure*} \begin{figure}[th] \centering \includegraphics[width=8cm]{Fig7.eps} \caption{(Color online) Tempeature Variation of (a) Raman shift (b) FWHM for Raman mode at 640 cm$^{-1}$ corresponding to stretching of Co/MnO$_6$ for Ho$_2$CoMnO$_6$. The solid line is fitting due to Eq. 2} \label{fig:Fig7} \end{figure} \begin{figure*}[th] \centering \includegraphics[width=14cm]{Fig8.eps} \caption{(Color online) Temperature dependent (a) real part of complex dielectric permittivity ($\epsilon$$^\prime$) (b) loss tangent (tan $\delta$) measure for Ho$_2$CoMnO$_6$ in the temperature range of 20 K to 300 K at various frequencies.} \label{fig:Fig8} \end{figure*} \begin{figure}[h!] \centering \includegraphics[width=8cm]{Fig9.eps} \caption{(Color online) Variation of relaxation time against normalized temperature i.e ln $\tau$ vs 1000/T obtained from tangent loss plot.} \label{fig:Fig9} \end{figure} To understand magnetic behavior in further depth we have plotted magnetization data in terms of temperature dependent inverse magnetic susceptibility i.e. $\chi^{^{-1}}$ vs $T$ as shown in Fig. 4. In paramagnetic region close above T$_c$ we see inverse magnetic susceptibility data shows deviation from linearity unlike expected for paramagnetic system by Curie Weiss (CW) law. Such failure from linearity of inverse susceptibility in paramagnetic state have also been reported for Ho$_2$NiMnO$_6$.\cite{retu} In paramagnetic region above T$_c$ it is generally believe that the double perovskite compound with rare earth ions at A-site shows such deviation in inverse magnetic susceptibility. The conventional Curie Weiss law fails to described this behavior successfully (see the straight line fitting using conventional CW law represented by black solid line in Fig. 4) thus a modified CW law is employed to analyze the magnetic susceptibility:\cite{booth} \begin{eqnarray} \chi = \frac{C_{TM}}{T - \theta_{TM}} + \frac{C_{RE}}{T - \theta_{RE}} \end{eqnarray} Here $C_{TM}$ and $\theta_{TM}$ is Curie Constant and paramagnetic Curie temperature for transition metal sublattice. Where $C_{RE}$ and $\theta_{RE}$ are the Curie Constant and paramagnetic Curie temperatures for rare earth sublattice. We have performed the non-linear fitting of susceptibility data measured at 100 Oe for Ho$_2$CoMnO$_6$. The fitting is done above $T_c$ in the temperature range 80 K to 300 K. The fitting parameters obtained from fitting of $\chi^{-1}$ with Eq. 1 in Fig. 4 (see solid red line) gives the value of $C_{TM}$ and $\theta_{TM}$ as 3.452(3) emu K mole$^{-1}$ Oe$^{-1}$ and 80.06 K respectively. The effective paramagnetic moment ($\mu_{eff}^{TM}$) is calculated using these fitting parameters come out to be 5.202(5) $\mu_B/f.u.$, the obtained values are in close to theoretical calculations. Further, we have observed that the values of $C_{RE}$ and $\theta_{RE}$ for Ho$_2$CoMnO$_6$ are 38.87 emu K mole${_1}$ Oe$^{-1}$ and -8.2(1) K respectively. The negative value of $\theta_RE$ signifies that the Ho$^{3+}$ spins are antiferromagnetic ordering relative to Mn/Co sublattice. However, the effective magnetic moments for rare earth ($\mu_{eff}^{RE}$) is 17.4 $\mu_B/f.u.$ which is higher then the effective magnetic moment for free Ho$^{3+}$ ions. The modified Curie Weiss law in Eq. 1 is presented considering non-interacting Mn/Co and Ho sublattics in this compound. However, the higher value of $\mu_{eff}^{RE}$ possibly due to interaction of Mn/Co and Ho ions at low temperature. However, the detail understanding of this fact require investigation using local probing techniques. Fig. 5 shows the isothermal magnetization $M(H)$ data i.e. $M vs H$ plot collected at 2 K up to $\pm$50 kOe applied magnetic field. Isothermal magnetization curve shows hysteresis which is signature of ferromagnetic ordering. However the $M(H)$ curve is asymmetric about origin. Further the magnetic moment does not show any signature of saturation even at highest applied magnetic field of 50 kOe. The magnetic moment at 50 kOe is about 11.16(5) $\mu$$_B$/f.u. where as the remanent magnetization and coercive force is 1.009 $\mu$$_B$/f.u. and 2 kOe respectively. \subsection{Temperature dependent Raman study} It is well know fact that most materials with magnetic ordering shows to spin phonon coupling.\cite{ilive, sing, kumar, liu} The spin phonon coupling can be understood from Raman study as the deviation of mode position and the line width from anharmonic behavior.\cite{ilive} The change in Raman mode frequency, line width and modulation in intensity of a particular mode is associated with incommensurate modulation of the atomic positions as explained by Slawinski \textit{et al}.\cite{slw} In many ferromagnetic compounds with perovskite/double perovskite structure strong spin phonon coupling have been reported earlier.\cite{kumar, liu, laver} Ho$_2$CoMnO$_6$ shows ferromagnetic magnetic ordering around 80 K as discussed in magnetization section above. The sharp magnetic transition is associated with ordering of Co/Mn spins by superexchange interaction via Co$^{2+}$-O-Mn$^{4+}$. This motivated us to carry out the Raman study to investigate the presence of spin phonon coupling in this material. \begin{figure*}[h!] \centering \includegraphics[width=14cm]{Fig10.eps} \caption{(Color online) Frequency dependent (a) real part of complex dielectric permittivity ($\epsilon$$^\prime$) (b) loss tangent (tan $\delta$) measure for Ho$_2$CoMnO$_6$ at various temperatures between 25 K and 300 K in the frequency range 1 Hz to 5.6 MHz.} \label{fig:Fig10} \end{figure*} Fig. 6a shows the temperature dependent Raman spectra collected at various temperatures, including magnetic transition temperature $T_c$ around 80 K for Ho$_2$CoMnO$_6$. The Raman spectra shows a intense phonon mode at 640 cm$^{-1}$ which is focus of our investigation in this study. This Raman mode is known as A$_{1g}$ breathing mode, associated with the symmetric stretching of the (Co/Mn)O$_6$ octahedra.\cite{ilive} Additionally, the other weak modes at 494 cm$^{-1}$ and 1278 cm$^{-1}$ are due to bending/ rotation of Co/MnO$_6$ octahedra and second-order overtones of the breathing mode respectively.\cite{meyer} The temperature dependent Raman spectra shows a evolution of phonon modes and line width. We have analyzed the raman spectra at all temperatures by fitting with Lorentzian function. The peak shape for A$_{1g}$ Raman mode along with Lorentzian fitting is shown in Fig. 6b for Raman spectrum at 100 K temperature. From the fitting we have obtained the temperature evolution of Raman mode frequency and line width. Fig. 6a and 6b shows the temperature evolution of phonon mode position and line width for A$_{1g}$ breathing mode for Ho$_2$CoMnO$_6$. It is well exhibited in the Fig. 7 that both the phonon mode position and line width shows the deviation at magnetic ordering temperature. Such deviation is due to spin phonon coupling in ferromagnetic ordered systems. \begin{figure}[th] \centering \includegraphics[width=8cm, height=12cm]{Fig11.eps} \caption{(Color online) (a) Frequency dependent real part of impedance $Z^{\prime}$ measure at different temperatures. (b) Frequency dependent imaginary part of impedance $Z^{\prime\prime}$ measure at various temperatures. (c), (d) real $Z^{\prime}$ and imaginary part $Z^{\prime\prime}$ plotted in terms of Nyquist plot $Z^{\prime}$ vs $Z^{\prime\prime}$. (e) Equivalent circuit of Nyquist plot for Ho$_2$CoMnO$_6$} \label{fig:Fig11} \end{figure} \subsection{Dielectric study} To understand the dielectric response of the nano-crystalline Ho$_2$CoMnO$_6$ we have carried out the detail measurements. The temperature dependent real part of complex dielectric permittivity $\epsilon^{\prime}$ and tan $\delta$ presented in Fig. 8a and 8b respectively. The measurements are performed in the temperature range of 20 K to 300 K at different frequencies for Ho$_2$CoMnO$_6$. Further, for relaxor systems with relaxation mechanisms, each relaxation component will correspond to plateaus in $\epsilon^{\prime}$(T) and respond with peaks in tangent loss factor (tan$\delta$). For this material we have observed that with increasing temperature the $\epsilon^{\prime}$ at low temperatures $\epsilon^{\prime}$ increases slowly. However with increasing temperature $\epsilon^{\prime}$ increases sharply. Further, with increasing frequencies $\epsilon^{\prime}$ decreases sharply. The higher value of $\epsilon^{\prime}$ at low frequency is attributed to the accumulation of the charges at grain boundaries On careful observation of tangent loss curve tan $\delta$ it is clearly seen that there is a broad hump at low temperature which is feature of relaxor phenomenon. The observed relaxation is frequency dependent and shift to higher temperature with increasing frequency. To understand the mechanism of relaxation process we have picked the temperature corresponding to the peak value in the tan$\delta$ and plotted against the frequency/relaxation time. The relaxation time $\tau$ can be calculated from frequency at which tan$\delta$ peak is observed using the formula $\tau$ = 1/2$\pi$f. The relaxation time $\tau$ is plotted as a function of absolute temperature shown in Fig. 9. The relaxation time is distributive i.e. the peak in tangent loss is shifted to higher temperature with increasing frequency. This fact indicates that the relaxation mechanism is thermally activated. The relaxation mechanisms and its origin can be analyzed by fitting the data presented in Fig. 9 with Arrhenius law given by, $\tau_{tan \delta}$ = $\tau_0$ exp(-$E_a$/$K_{B}$$T$) where, $T$ is the temperature where peak occurs in tangent loss curve at a particular frequency $f_{tan \delta}$, $\tau_0$ and $E_a$ are characteristic frequency and activation energy respectively and, $k_B$ is the Boltzmann constant. From the fitting parameters obtained in Fig. 9 we have calculated the activation energy E$_a$ = 0.18 eV. To further understand the dielectric response we have measure the frequency dependent $\epsilon$$\prime$ and tan $\delta$ over the frequency range 1 Hz to 5.5 MHz for Ho$_2$CoMnO$_6$ at different temperatures ranging from 50 K to 300 K. In the Fig. 10a we observed that Ho$_2$CoMnO$_6$ exhibits high dielectric constant at low frequency and at high temperature. The dielectric spectrum shown in Fig. 10a clearly shows strong dispersion indicated at low frequency which moves to higher frequency with decreasing temperature. The separate plateau in Fig. 10a are attributed to static and optical dielectric constant. The dielectric loss have be shown in Fig. 10b its is found that the dielectric loss shows similar response. \subsection{Impedance spectroscopy} Fig. 11a shows the real part of complex impedance ($Z^{\prime}$) plotted as a function of frequency in the frequency range 1 Hz to 5.5 MHz at various temperatures between 50 K to 300 K. For clarity both the axis are in logarithmic scales. Impedance spectroscopy can be utilized to distinguish the contributions to the dielectric properties from grain, grain boundaries and electrode-sample contact interface. It is quite evident from the figure that the $Z^{\prime}$ decreases with increasing temperature. At low temperature $Z^{\prime}$ remains almost constant with increasing frequency, however with further increase in frequency it decreases sharply. With increasing temperature the constant region in the $Z^{\prime}$ i.e frequency independent region decreases. It is observed that, the frequency independent region moves to higher frequency with increasing temperature. Further, it is observed that at higher frequency and high temperature the $Z^{\prime}$ almost merg into one set of plot. This feature is possibly due to the release of accumulated space charges at high temperatures hence contribute to the enhancement of conduction in this material at high temperature. Imaginary part of impedance ($Z^{\prime\prime}$) is shown in Fig. 11b for wide frequency range. $Z^{\prime\prime}$ shows a peak which attain $Z^{\prime\prime}_{max}$ for all the curves measured at different temperatures, further it is evident that the peak moves towards higher frequency with increasing temperature. The peak shift to higher frequency with increasing temperature suggests that the relaxation time constant decreases with increasing temperature. The relaxation time is distributive and suggests the thermally activated relaxation mechanism. \begin{figure}[h!] \centering \includegraphics[width=8cm]{Fig12.eps} \caption{(Color online) Variation of relaxation time against normalized temperature i.e ln $\tau$ vs 1000/T obtained from Z$^\prime\prime$ plot.} \label{fig:Fig12} \end{figure} We know that the most probable relaxation time ($\tau$) can be determined for relaxation system by identification the position of the loss peak in the $Z^{\prime\prime}$ vs log ($f$) plots using the relation: \begin{eqnarray} \tau = \frac{1}{\omega} = \frac{1}{2 \pi f} \end{eqnarray} where $\tau$ is relaxation time and $f$ is the relaxation frequency. To further understand the relaxation behavior we have plotted the relaxation time $\tau$ vs temperature 10$^3$/$T$ (K$^{-1}$). Fig. 12 shows the $\tau$ plotted as a function of absolute temperature obtained from imaginary part of complex impedance. It is observed that the relaxation time follows Arrhenius behavior given as: \begin{eqnarray} \tau_{b} = \tau_{0}] exp{\left( \frac{-E_a}{k_BT} \right)} \end{eqnarray} where $\tau_0$ is the pre-exponential factor, k$_B$ the Boltzmann constant and $T$ the absolute temperature. From the fitting parameters the activation energy (E$_a$) have been calculated and is found to be 0.29 eV. Fig. 11c and 11d shows the $Z^{\prime}$ vs $Z^{\prime\prime}$ in the form of Nyquist plots at some selective temperatures measure in the wide frequency range 1 Hz to 5.5 MHz. It is quite evident from the figures that the plot gives the semicircle in whole range of temperature. It is found that the radius of Nyquist plot decreases with increasing temperature. The semicircle in the Nyquist plots have the origin on the x-axis which suggest that the Debye type of relaxation is found in this material. It also manifests that there is a distribution of relaxation time instead of a single relaxation time in the material. The experimental results reveals that the material is deviated from ideal Debye's behavior. The Equivalent circuit for the Nyquist plot represented in Fig. 11c and 11d is given in Fig. 11(e). The equivalent circuit consists of series and parallel combination of resistor, constant phase change and Warburg Open. \begin{figure*}[th] \centering \includegraphics[width=14cm]{Fig13.eps} \caption{(Color online) (a) Variation of real part of electrical modulus ($M^\prime$) with temperature. (b) Imaginary part of electrical modulus $M^{\prime\prime}$ as a function of temperature.} \label{fig:Fig13} \end{figure*} \begin{figure}[th] \centering \includegraphics[width=8cm]{Fig14.eps} \caption{(Color online) Variation of relaxation time against normalized temperature i.e ln $\tau$ vs 1000/T obtained from M$^\prime\prime$ plot.} \label{fig:Fig14} \end{figure} \begin{figure}[th] \centering \includegraphics[width=8cm]{Fig15.eps} \caption{(Color online) (a,b) shows real and imaginary parts of electrical modulus as a function of frequency. (c) shows the niqust plot of electrical modelus i.e. M$^\prime$ vs M$^\prime\prime$.} \label{fig:Fig15} \end{figure} \subsection{Electrical modulus} Information of interface polarization, relaxation time, electrical conductivity and grain boundary conduction effects etc can be deduced from electrical modulus of materials. Figs. 13a and 13b show the temperature dependent real ($M^{\prime}$) and imaginary ($M^{\prime\prime}$) part of electrical modulus obtained at selective frequencies for Ho$_2$CoMnO$_6$ in the temperature range of 20 K to 300 K. Its evident from the Fig. 13a that the real part of electrical modulus is steady at low temperature for all frequencies. It further found that with increasing temperature the $M^{\prime}$ decreases sharply. with increasing frequency the steady feature at low temperature moves to higher temperature. There is large dispersion in the $M^{\prime}$ curves at temperature above 100 K. At 300 K the $M^{\prime}$ is further merges into one curve. Further, Fig. 13b shows the variation of $M^{\prime\prime}$ as function of temperature. From the figure it is evident that $M^{\prime\prime}$ shows a peak position in the $M^{\prime\prime}$ vs T plot. It is further observed that the peak position in $M^{\prime\prime}$ data moves to the higher temperature with increasing frequency. Moreover, The $M^{\prime\prime}_{max}$ increases with increasing frequency. The shifting of peak to higher temperature with increasing frequency shows that the relaxation mechanism in this material is thermally activated. The frequency and corresponding temperature at which peak position in $M^{\prime\prime}$ vs T data is found is piked up and plotted in in Fig. 14. The relaxation time $\tau$ can be obtained from frequency $f$ using formula $\tau$ = 1/2$\pi$$f$. Fig. 14 shows the variation of relaxation time as function of absolute temperature i.e. $\tau$ vs 1000/T. It is found that the relaxation time obeys and fitted well with Arrhenius law given as: \begin{eqnarray} \tau vs \tau_0exp\left(-E_a/k_BT\right) \end{eqnarray} where $\tau$ is relaxation time, E$_a$ is activation energy k$_B$ is the Boltzmann constant. The relaxation time obtained from the $M^{\prime\prime}$ is well fitted with the Arrhenius law for thermally activated mechanisms. The activation energy is calculated from the fitting parameters and we found that the E$_a$ = 0.29 eV in agreement of with our impedance spectroscopy results. Fig. 15 summarize the variation of $M^{\prime}$ and $M^{\prime\prime}$ with frequency at selected temperatures and plot of $M^{\prime}$ vs $M^{\prime\prime}$ on a complex plane. Once again, $M^{\prime\prime}$ spectroscopy plot reveals relaxation phenomena in the material. The maximum value ($M^{\prime\prime}$) of the $M^{\prime\prime}$ peak shifts to higher frequency, which suggests that hopping of charge carriers is predominantly thermally activated. Asymmetric broadening of the peak indicates spread of relaxation with different time constants, which once again suggests the material is non-Debye-type. Fig. 15c shows the Nyquist plot for electrical modulus. It si observed that the relaxation time is distributed and thus the feature suggest that the materals non-Debye's in nature. \begin{figure}[th] \centering \includegraphics[width=8cm]{Fig16.eps} \caption{(Color online) Frequency dependence plot of the conductivity ($\sigma_{ac}$) for temperatures ranging from 50 K to 300 K are shown for Ho$_2$CoMnO$_6$. solid red lines are fitting due to Eq. 6. (b) Figure shows the exponent $n$ versus the temperature for nano-crystalline Ho$_2$CoMnO$_6$} \label{fig:Fig16} \end{figure} \begin{figure}[th] \centering \includegraphics[width=8cm]{Fig17.eps} \caption{(Color online) The variation of $\sigma_{ac}$ with absolute temperature (10$^3$/T) is shown for Ho$_2$CoMnO$_6$.} \label{fig:Fig17} \end{figure} \subsection{Electric conductivity} To further understand the charge hoping and electrical properties we have investigated the AC conductivity in Ho$_2$CoMnO$_6$. The AC conductivity is calculated by using relation $\sigma_{ac} = \epsilon_0 \omega \epsilon^{\prime\prime}$.\cite{sing} Fig. 16a shows the variation of AC conductivity with frequency i.e. $\sigma_{ac}$ vs $f$ at some selective temperatures in the range 50 K to 300 K. It is evident from the figure that at low frequencies the conductivity is independent of frequency and gives a plateau region at all temperatures. In this region of frequency the conduction is mainly dominated by DC conductivity ($\sigma_{dc}$). However, at higher frequencies the conductivity increases with increasing frequency. It is further notable that the plateau region marked by DC conductivity in the Fig. 16a extends to the higher frequencies with increasing temperature. The frequency independent region also suggests that the hopping charges carrier is absent at low frequencies. The AC conductivity at high frequency in this case obey Jonscher‟s Universal Power Law given as follow:\cite{thakur} \begin{eqnarray} \sigma_{ac} = \sigma_{dc} + A\omega^n \end{eqnarray} when A is a temperature dependent constant, $\omega$ = 2$\pi$$f$ and $n$ is the power law exponent which generally varies between 0 and 1 depending upon temperature. The value of power law exponent $n$ represent the extent of interaction between mobile ions and lattice around. For non-interacting Debye system $n$ = 1 and with decreasing $n$ value the interaction is expected to increase between lattice surrounding and mobile ions. Further the constant A gives the degree of polarizibility. The frequency dependent $\sigma_{ac}$ is fitted with the power law as shown in Fig. 16a. The conductivity data is fitted well in full frequency range 1 Hz to 5.5 MHz. From the fitting parameter we have calculated the exponent $n$. The Fig. 16b shows the variation of $n$ with temperature its is observed that the $n$ is less then 1 at high temperature and with decreasing temperature it increases. The variation of $n$ with temperature is suggestive of non-Debye's type behavior. The variation of AC conductivity with inverse absolute temperature i.e. $\sigma_{ac}$ vs 10$^3$/T at some selective frequencies is shown in Fig. 17. We observed that with increasing frequency the conductivity increases. the conductivity data is fitted with following equation: \begin{eqnarray} \sigma_{ac} = \sigma_{0}exp\left(\frac{-E_a}{k_BT}\right) \end{eqnarray} where $\sigma_{0}$ is pre-exponent factor, $k_B$ is Boltzmann constant and $E_a$ is the activation energy. It is found that the temperature dependent data is fitted at high temperatures for all frequencies as shown by solid lines in Fig. 17. From the fittng parameters we have calculated the activation energy for conductivity measured at different frequencies and are found that with increasing frequency the activation decreases. The obtained activaton energies are listed here $E_a$(1 MHz) = 1.19 eV, $E_a$(100 kHz) = 2.90 eV, $E_a$(10 kHz) = 3.54 eV, $E_a$(1 kHz) = 3.60 eV, $E_a$(100 Hz) = 3.68eV and $E_a$(10 Hz) = 3.70 eV. \section{Conclusion} Ho$_2$CoMnO$_6$ nano-crystalline was successfully synthesised by sol-gel method. Structural, magnetic and dielectric properties were studied. Structural analysis of XRD shows the samples crystallize in monoclinic structure with \textit{P2$_1$/n} space group with average crystallite size for present compound is $\sim$76.65 nm. Charge state of various elements present in the material is confirmed using X-ray photoelectron spectroscopy. Magnetization study shows that the material is ferromagnetic in nature and shows phase transition around 85 K. The effective magnetic moment obtained experimentally as 5.25 $\mu_B$/f.u. is found close to calculated value. Raman study shows spin phonon coupling is present as indicated by mode frequency deviation from anharmonic behavior across $T_c$. Dielectric measurements have been performed on Ho$_2$CoMnO$_6$ both temperature and frequency dependent. We found a very high dielectric constant which increases with decreasing frequency. The tangent loss shows the relaxation mechanism is active and it follows thermally activated behavior. The impedance spectroscopy reveals that the relaxation time is distributive and shows deviation from ideal Debye model. AC conductivity have been studied as a function of both temperature and frequency. We found that the conduction mechanism is obeyed by Jonscher's model. The exponent factor $n$ suggest that the material deviates from the ideal Debye model. \section{Acknowledgment} We acknowledge MNIT Jaipur, India for XPS data, AIRF (JNU) for magnetic measurement and SEM facilities. We acknowledge UGC-DAE-Consortium Indore and Dr. V. G. Sathe for Raman data. We also acknowledge Dr. A. K. Pramanik for dielectric measurement and UPEA-II funding for LCR meter. Author Ilyas Noor Bhatti acknowledge University Grants Commission, India for financial support.
\section{Upper and lower bounds on the radius of comparison}\label{Sec_Bounds} We recall the required standard definitions and notation related to the Cuntz semigroup. See Section~2 of~\cite{rordam-tensored-by-uhf-ii} for details. For a unital $C^*$-algebra~$A$, we denote its tracial state space by ${\operatorname{T}} (A)$. We take $M_{\infty} (A) = \bigcup_{n = 1}^{\infty} M_n (A)$, using the usual embeddings $M_n (A) \hookrightarrow M_{n + 1} (A)$. For $\tau \in {\operatorname{T}} (A)$, we define $d_{\tau} \colon M_{\infty} (A)_{+} \to [0, \infty)$ by $d_{\tau} (a) = \lim_{n \to \infty} \tau (a^{1/n})$. If $a, b \in M_{\infty} (A)_{+}$, then $a \precsim b$ ($a$ is Cuntz subequivalent to~$b$) if there is a sequence $(v_n)_{n = 1}^{\infty}$ in $M_{\infty} (A)$ such that $\limi{n} v_n b v_n^* = a$. Following \cite[Definition 6.1]{Toms-flat-dim-growth}, for $\rho \in [0, \infty)$, we say that $A$ has $\rho$-comparison if whenever $a, b \in M_{\infty} (A)_{+}$ satisfy $d_{\tau} (a) + \rho < d_{\tau} (b)$ for all $\tau \in {\operatorname{T}} (A)$, then $a \precsim b$. The radius of comparison of~$A$, denoted ${\operatorname{rc}} (A)$, is \[ {\operatorname{rc}} (A) = \inf \big( \big\{ \rho \in [0, \infty) \mid {\mbox{$A$ has $\rho$-comparison}} \big\} \big) \, . \] We take ${\operatorname{rc}} (A) = \infty$ if there is no $\rho$ such that $A$ has $\rho$-comparison. Since AH~algebras are nuclear, all quasitraces on them are traces by \cite[Theorem 5.11]{haagerup-quasitraceas}. Thus, we ignore quasitraces. Also, by Proposition 6.12 of~\cite{Phl40}, the radius of comparison remains unchanged if we replace $M_{\infty} (A)$ by $K \otimes A$ throughout. Thus, we may work only in $M_{\infty} (A)$. Our construction uses a specific setup, with a number of parameters of various kinds which must be chosen to satisfy specific conditions. Construction \ref{Cn_6918_General} lists for reference many of the objects used in it, and some of the conditions they must satisfy. It abstracts the diagram~(\ref{Eq_9Y01_Diagram}). Construction~\ref{Cn_6918_General_Part_1a} specifies the choices of spaces and maps needed for the results on Cuntz comparison, and Construction~\ref{Cn_6921_GeneralPart2} together with the additional maps in parts (\ref{Cn_6918_General_2nd}), (\ref{Cn_9Y01_Gen_2ndDiag}), and~(\ref{Cn_6918_General_Agree}) of Construction~\ref{Cn_6918_General}, is used to arrange the existence of a suitable automorphism of the tracial state space of the algebra we construct. Because of the necessity of passing to a subsystem at one stage in this process, we must start the proof of the main theorem with a version of just the top row in the diagram~(\ref{Eq_9Y01_PrelimDiagram}); this is Construction~\ref{Cn_9104_Half}. Many of the lemmas use only a few of the objects and their properties, so that the reader can refer back to just the relevant parts of the constructions. In particular, many details are used only in this section or only in Section~\ref{Sec_Traces}. Some of the details are used for just one lemma each. \begin{Construction}\label{Cn_6918_General} For much of this paper, we will consider algebras constructed in the following way and using the following notation: \begin{enumerate} \item\label{Cn_6918_General_dn} $(d (n) )_{n = 0, 1, 2, \ldots}$ and $(k (n) )_{n = 0, 1, 2, \ldots}$ are sequences in~${\mathbb{Z}}_{\geq 0}$, with $d (0) = 1$ and $k (0) = 0$. Moreover, for $n \in {\mathbb{Z}}_{\geq 0}$, \[ l (n) = d (n) + k (n) \, , \qquad r (n) = \prod_{j = 0}^n l (j) \, , \qquad {\mbox{and}} \qquad s (n) = \prod_{j = 0}^n d (j) \, . \] Further define $t (n)$ inductively as follows. Set $t (0) = 0$, and \[ t (n + 1) = d (n + 1) t (n) + k (n + 1) [r (n) - t (n)] \, . \] (See Lemma~\ref{L_7816_Rankq} for the significance of $t (n)$.) \item\label{Cn_6918_General_dnkn} We will assume that $k (n) < d (n)$ for all $n \in {\mathbb{Z}}_{\geq 0}$. \item\label{Cn_6918_General_Size} We define \[ \kappa = \inf_{n \in {\mathbb{Z}}_{> 0}} \frac{s (n)}{r (n)} \, . \] For estimates involving the radius of comparison, we will assume $\kappa > \frac{1}{2}$. \item\label{Cn_6918_General_rrp} The numbers $\omega, \omega' \in (0, \infty]$ are defined by \[ \omega = \frac{k (1)}{k (1) + d (1)} \qquad {\mbox{and}} \qquad \omega' = \sum_{n = 2}^{\infty} \frac{k (n)}{k (n) + d (n)} \, . \] We will require $\omega' < \omega < \frac{1}{2}$. In particular, \[ \sum_{n = 1}^{\infty} \frac{k (n)}{k (n) + d (n)} < \infty \, . \] \item\label{Cn_6918_General_kpom} We will also eventually require that $\kappa$ as in (\ref{Cn_6918_General_Size}) and $\omega$ as in (\ref{Cn_6918_General_rrp}) are related by $2 \kappa - 1 > 2 \omega$. \item\label{Cn_6918_General_Spaces} $(X_n)_{n = 0, 1, 2, \ldots}$ and $(Y_n)_{n = 0, 1, 2, \ldots}$ are sequences of compact metric spaces. (They will be further specified in Construction \ref{Cn_6918_General_Part_1a}.) \item\label{Cn_6918_General_Algs} For $n \in {\mathbb{Z}}_{\geq 0}$, the algebra $C_n$ is \[ C_n = M_{r (n)} \otimes \big( C (X_n) \oplus C (Y_n) \big) \, . \] We further make the identifications: \begin{align*} & C (X_{n + 1}, \, M_{r (n + 1)}) = M_{l (n + 1)} \otimes C (X_{n + 1}, \, M_{r (n)}), \\ & C (Y_{n + 1}, \, M_{r (n + 1)}) = M_{l (n + 1)} \otimes C (Y_{n + 1}, \, M_{r (n)}), \\ & C (X_n) \oplus C (Y_n) = C (X_n \amalg Y_n), \\ & C (X_n, \, M_{r (n)}) \oplus C (Y_n, \, M_{r (n)}) = C (X_n \amalg Y_n, M_{r (n)}) \, . \end{align*} \item\label{Cn_6918_General_Maps} For $n \in {\mathbb{Z}}_{> 0}$, we are given a unital homomorphism \[ \gamma_n \colon C (X_n) \oplus C (Y_n) \to M_{l (n + 1)} \big( C (X_{n + 1}) \oplus C (Y_{n + 1}) \big) \, , \] and the homomorphism{} \[ \Gamma_{n + 1, \, n} \colon C_n \to C_{n + 1} \] is given by $\Gamma_{n + 1, \, n} = {\operatorname{id}}_{M_{r (n)}} \otimes \gamma_n$. Moreover, for $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$, \[ \Gamma_{n, m} = \Gamma_{n, n - 1} \circ \Gamma_{n - 1, \, n - 2} \circ \cdots \circ \Gamma_{m + 1, m} \colon C_m \to C_n \, . \] In particular, $\Gamma_{n, n} = {\operatorname{id}}_{C_n}$. \item\label{Cn_6918_General_Diag} We require that the maps \[ \gamma_n \colon C (X_n \amalg Y_n) \to M_{l (n + 1)} \bigl( C (X_{n + 1} \amalg Y_{n + 1}) \bigr) \] in~(\ref{Cn_6918_General_Maps}) be diagonal, that is, that there exist continuous function{s} \[ S_{n, 1}, \, S_{n, 2}, \, \ldots, \, S_{n, \, l (n + 1)} \colon X_{n + 1} \amalg Y_{n + 1} \to X_n \amalg Y_n \] such that for all $f \in C (X_n \amalg Y_n)$, we have \[ \gamma_n (f) = {\operatorname{diag}} \big( f \circ S_{n, 1}, \, f \circ S_{n, 2}, \, \ldots, \, f \circ S_{n, \, l (n + 1)} \big) \, . \] (These maps will be specified further in Construction~\ref{Cn_6918_General_Part_1a}.) \item\label{Cn_6918_General_Limit} We set $C = \displaystyle \lim_{\longrightarrow}_n C_n$, taken with respect to the maps $\Gamma_{n, m}$. The maps associated with the direct limit will be called $\Gamma_{\infty, m} \colon C_m \to C$ for $m \in {\mathbb{Z}}_{\geq 0}$. \setcounter{CnsEnumi}{\value{enumi}} \end{enumerate} We sometimes use additional objects and conditions in the construction, as follows: \begin{enumerate} \setcounter{enumi}{\value{CnsEnumi}} \item\label{Cn_6918_General_2nd} For $n \in {\mathbb{Z}}_{> 0}$, we may be given an additional unital homomorphism \[ \gamma_n^{(0)} \colon C (X_n) \oplus C (Y_n) \to M_{l (n + 1)} \big( C (X_{n + 1}) \oplus C (Y_{n + 1}) \big) \, . \] Then the maps $\Gamma_{n + 1, \, n}^{(0)} \colon C_n \to C_{n + 1}$, $\Gamma_{n, m}^{(0)} \colon C_m \to C_n$ are defined analogously to~(\ref{Cn_6918_General_Maps}), the algebra $C^{(0)}$ is given as $C^{(0)} = \displaystyle \lim_{\longrightarrow}_n C_n$, taken with respect to the maps $\Gamma_{n, m}^{(0)}$, and the maps $\Gamma_{\infty, m}^{(0)} \colon C_m \to C^{(0)}$ are defined analogously to~(\ref{Cn_6918_General_Limit}). \item\label{Cn_9Y01_Gen_2ndDiag} In~(\ref{Cn_6918_General_2nd}), analogously to~(\ref{Cn_6918_General_Diag}), we may require that there be \[ S_{n, 1}^{(0)}, \, S_{n, 2}^{(0)}, \, \ldots, \, S_{n, \, l (n + 1)}^{(0)} \colon X_{n + 1} \amalg Y_{n + 1} \to X_n \amalg Y_n \] such that for all $f \in C (X_n \amalg Y_n)$, we have \[ \gamma_n^{(0)} (f) = {\operatorname{diag}} \big( f \circ S_{n, 1}^{(0)}, \, f \circ S_{n, 2}^{(0)}, \, \ldots, \, f \circ S_{n, \, l (n + 1)}^{(0)} \big) \, . \] (These maps will be specified further in Construction~\ref{Cn_6918_General_Part_1a}.) \item\label{Cn_6918_General_Agree} Assuming diagonal maps as in~(\ref{Cn_6918_General_Diag}), we may require that they agree in the coordinates $1, 2, \ldots, d (n + 1)$, that is, for $n \in {\mathbb{Z}}_{> 0}$ and $k = 1, 2, \ldots, d (n + 1)$, we have $S_{n, k}^{(0)} = S_{n, k}$. \setcounter{CnsEnumi}{\value{enumi}} \end{enumerate} \end{Construction} \begin{Lemma}\label{L_6922_Noninc} In Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}), the sequence $\left ( \frac{s (n)}{r (n)} \right )_{n = 1, 2, \ldots}$ is strictly decreasing. \end{Lemma} \begin{proof} The proof is straightforward. \end{proof} \begin{Lemma}\label{L_7814_Inc} In Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}), and assuming Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dnkn}), we have \[ 0 = \frac{t (0)}{r (0)} < \frac{t (1)}{r (1)} < \frac{t (2)}{r (2)} < \cdots < \frac{1}{2} \, . \] \end{Lemma} \begin{proof} We have $t (0) = 0$ by definition. We prove by induction on~$n \in {\mathbb{Z}}_{> 0}$ that \begin{equation}\label{Eq_7814_IndHyp} \frac{t (n - 1)}{r (n - 1)} < \frac{t (n)}{r (n)} < \frac{1}{2}. \end{equation} This will finish the proof. For $n = 1$, we have \[ \frac{t (1)}{r (1)} = \frac{k (1)}{k (1) + d (1)} \, , \] which is in $\big( 0, \frac{1}{2} \big)$ by Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dnkn}). Now assume~(\ref{Eq_7814_IndHyp}); we prove this relation with $n + 1$ in place of~$n$. We have $r (n) - t (n) > t (n)$, so \begin{align} \frac{t (n + 1)}{r (n + 1)} & = \frac{d (n + 1) t (n) + k (n + 1) [r (n) - t (n)]}{ [d (n + 1) + k (n + 1)] r (n)} \label{Eq_7816_Start} \\ & > \frac{d (n + 1) t (n) + k (n + 1) t (n)}{ [d (n + 1) + k (n + 1)] r (n)} = \frac{t (n)}{r (n)} \, . \notag \end{align} Also, with \[ \alpha = \frac{d (n + 1)}{d (n + 1) + k (n + 1)} \qquad {\mbox{and}} \qquad \beta = \frac{t (n)}{r (n)} \, , \] starting with the first step in~(\ref{Eq_7816_Start}), and at the end using $\alpha > \frac{1}{2}$ (by Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dnkn})) and $\beta < \frac{1}{2}$ (by the induction hypothesis), we have \[ \frac{t (n + 1)}{r (n + 1)} = \alpha \beta + (1 - \alpha) (1 - \beta) = \frac{1}{2} \big[ 1 - (2 \alpha - 1) (1 - 2 \beta) \big] < \frac{1}{2} \, . \] This completes the induction, and the proof. \end{proof} \begin{Lemma}\label{L_6922_Rho} With the notation of Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}) and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}), and assuming the conditions in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dnkn}) and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}), for all $n \in {\mathbb{Z}}_{> 0}$ we have \[ \omega \leq \frac{t (n)}{r (n)} \leq \omega + \omega' < 2 \omega \, . \] \end{Lemma} \begin{proof} The third inequality is immediate from Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}). By Lemma~\ref{L_7814_Inc}, the sequence $\left ( \frac{t (n)}{r (n)} \right )_{n = 1, 2, \ldots}$ is strictly increasing. Also, \begin{equation}\label{Eq_7806_StSt} \frac{t (1)}{r (1)} = \frac{k (1)}{k (1) + d (1)} = \omega. \end{equation} The first inequality in the statement now follows. Next, we claim that \[ \frac{t (n)}{r (n)} \leq \sum_{j = 1}^{n} \frac{k (j)}{k (j) + d (j)} \] for all $n \in {\mathbb{Z}}_{> 0}$. The case $n = 1$ is~(\ref{Eq_7806_StSt}). Assume this inequality is known for~$n$. Then \begin{align*} \frac{t (n + 1)}{r (n + 1)} & = \left( \frac{d (n + 1)}{k (n + 1) + d (n + 1)} \right) \left( \frac{t (n)}{r (n)} \right) \\ & \hspace*{3em} {\mbox{}} + \left( \frac{k (n + 1)}{k (n + 1) + d (n + 1)} \right) \left( \frac{r (n) - t (n)}{r (n)} \right) \\ & \leq \frac{t (n)}{r (n)} + \frac{k (n + 1)}{k (n + 1) + d (n + 1)} \leq \sum_{j = 1}^{n + 1} \frac{k (j)}{k (j) + d (j)} \, , \end{align*} as desired. The second inequality in the statement now follows. \end{proof} \begin{Notation}\label{N_7730_Cone} For a topological space $X$, we define \[ \mathrm{cone} (X) = (X \times [0, 1]) / (X \times \{ 0 \}) \, . \] Then $\mathrm{cone} (X)$ is contractible, and $\mathrm{cone} ( \cdot )$ is a covariant functor: if $T \colon X \to Y$ is a continuous map, then it induces a continuous map $\mathrm{cone} (T) \colon \mathrm{cone} (X) \to \mathrm{cone} (Y)$. We identify $X$ with the image of $X \times \{ 1 \}$ in $\mathrm{cone} (X)$. \end{Notation} \begin{Construction}\label{Cn_6918_General_Part_1a} We give further details on the spaces $X_n$ and $Y_n$ in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Spaces}). \begin{enumerate} \setcounter{enumi}{\value{CnsEnumi}} \item\label{Cn_6918_General_1a_Xn} The space $X_n$ is chosen as follows. First set $Z_0 = S^2$. With $(d (n) )_{n = 0, 1, 2, \ldots}$ and $(s (n) )_{n = 0, 1, 2, \ldots}$ as in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}), define inductively \[ Z_{n} = Z_{n - 1}^{d (n)} = (S^2)^{s (n)}. \] Then set $X_n = \mathrm{cone} (Z_n)$. (In particular, $X_n$ is contractible, and $Z_n \S X_n$ as in Notation~\ref{N_7730_Cone}.) Further, for $n \in {\mathbb{Z}}_{\geq 0}$ and $j = 1, 2, \ldots, d (n + 1)$, we let $P^{(n)}_j \colon Z_{n + 1} \to Z_{n}$ be the $j$-th coordinate projection, and we set $Q^{(n)}_j = \mathrm{cone} \big( P^{(n)}_j \big) \colon X_{n + 1} \to X_{n}$. \item\label{Cn_6918_General_1a_YnIs01} $Y_n = [0, 1]$ for all $n \in {\mathbb{Z}}_{> 0}$. (In particular, $Y_n$ is contractible.) \item\label{condition-points-dense} We assume we are given points $x_m \in X_m$ for $m \in {\mathbb{Z}}_{\geq 0}$ such that, using the notation in~(\ref{Cn_6918_General_1a_Xn}), for all $n \in {\mathbb{Z}}_{\geq 0}$, the set \begin{align*} & \big\{ \big( Q^{(n)}_{\nu_{1}} \circ Q^{(n + 1)}_{\nu_{2}} \circ \cdots \circ Q^{(m - 1)}_{\nu_{m - n}} \big) (x_m) \mid \\ & \hspace*{1em} {\mbox{}} {\mbox{$m = n + 1, \, n + 2, \, \ldots$ and $\nu_j = 1, 2, \ldots, d (n + j)$ for $j = 1, 2, \ldots, m - n$}} \big\} \end{align*} is dense in $X_n$. \item\label{Cn_6918_General_1a_yn} We assume we are given a sequence $(y_k)_{k = 0, 1, 2, \ldots}$ in $[0, 1]$ such that for all $n \in {\mathbb{Z}}_{\geq 0}$, the set $\{ y_k \mid k \geq n \}$ is dense in $[0, 1]$. \item\label{Cn_6918_General_1a_Maps} The maps \[ \gamma_n \colon C (X_n \amalg Y_n) \to M_{l (n + 1)} \bigl( C (X_{n + 1} \amalg Y_{n + 1}) \bigr) \] will be as in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Diag}), with the maps $S_{n, j} \colon X_{n + 1} \amalg Y_{n + 1} \to X_n \amalg Y_n$ appearing there defined as follows: \begin{enumerate} \item\label{Cn_6918_General_1a_Maps_XLow} With $Q^{(n)}_j$ as in~(\ref{Cn_6918_General_1a_Xn}), we set $S_{n, j} (x) = Q^{(n)}_j (x)$ for $x \in X_{n + 1}$ and $j = 1, 2, \ldots, d (n + 1)$. \item\label{Cn_6918_General_1a_Maps_XHigh} $S_{n, j} (x) = y_n$ for \[ x \in X_{n + 1} \qquad {\mbox{and}} \qquad j = d (n + 1) + 1, \, d (n + 1) + 2, \, \ldots, \, l (n + 1) \, . \] \item\label{Cn_6918_General_1a_Maps_YBottom} There are continuous function{s} \[ R_{n, 1}, \, R_{n, 2}, \, \ldots, \, R_{n, \, d (n + 1)} \colon Y_{n + 1} \to Y_n \] (which will be taken from Proposition \ref{P_arbitrary_trace_space} below) such that $S_{n, j} (y) = R_{n, j} (y)$ for $y \in Y_{n + 1}$ and $j = 1, 2, \ldots, d (n + 1)$. \item\label{Cn_6918_General_1a_Maps_YTop} $S_{n, j} (y) = x_n$ for \[ y \in Y_{n + 1} \qquad {\mbox{and}} \qquad j = d (n + 1) + 1, \, d (n + 1) + 2, \, \ldots, \, l (n + 1) \, . \] \end{enumerate} \item\label{Cn_9Y01_Gen_1a_Maps2} The maps \[ \gamma_n^{(0)} \colon C (X_n \amalg Y_n) \to M_{l (n + 1)} \bigl( C (X_{n + 1} \amalg Y_{n + 1}) \bigr) \] will be as in Construction \ref{Cn_6918_General}(\ref{Cn_9Y01_Gen_2ndDiag}), with the maps $S_{n, j}^{(0)} \colon X_{n + 1} \amalg Y_{n + 1} \to X_n \amalg Y_n$ appearing there given by $S_{n, j}^{(0)} = S_{n, j}$ for $j = 1, 2, \ldots, d (n + 1)$ and to be specified later for $j = d (n + 1) + 1, \, d (n + 1) + 2, \, \ldots, \, l (n + 1)$. \setcounter{CnsEnumi}{\value{enumi}} \end{enumerate} \end{Construction} With the choices in Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Maps}), the map \[ \gamma_{n} \colon C (X_n) \oplus C (Y_n) \to C (X_{n + 1}, \, M_{l (n + 1)}) \oplus C (Y_{n + 1}, \, M_{l (n + 1)}) \] in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Maps}), as further specified in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Diag}), is given as follows. With ${\mathbb{C}}^{d (n)}$ viewed as embedded in $M_{d (n)}$ as the diagonal matrices, there is a homomorphism{} \[ \delta_{n} \colon C (Y_n) \to C (Y_{n + 1}, \, {\mathbb{C}}^{d (n + 1)}) \subset C (Y_{n + 1}, M_{d (n + 1)}) \] such that \begin{align} \gamma_{n} (f, g) & = \Bigg( {\operatorname{diag}} \Big( f \circ Q^{(n)}_1, \, f \circ Q^{(n)}_2, \, \ldots, \, f \circ Q^{(n)}_{d (n + 1)}, \, \underbrace{g (y_n), \, g (y_n), \, \ldots, \, g (y_n)}_{\mbox{$k (n + 1)$ times}} \Big), \notag \\ & \hspace*{3em} {\mbox{}} {\operatorname{diag}} \Big( \delta_{n} (g), \, \underbrace{f (x_n), \, f (x_n), \, \ldots, \, f (x_n)}_{\mbox{$k (n + 1)$ times}} \Big) \Bigg) \, . \label{Eq_7830_Star} \end{align} For the purposes of this section, we need no further information on the maps~$\delta_n$, except that they send constant functions to constant functions. \begin{Lemma}\label{L_0725_Simplicity} Assume the notation and choices in parts (\ref{Cn_6918_General_dn}), (\ref{Cn_6918_General_Algs}), (\ref{Cn_6918_General_Maps}), and~(\ref{Cn_6918_General_Limit}) of Construction~\ref{Cn_6918_General}, and in Construction \ref{Cn_6918_General_Part_1a} (except part~(\ref{Cn_9Y01_Gen_1a_Maps2})) and the parts of Construction~\ref{Cn_6918_General} referred to there. Then the algebra $C$ is simple. \end{Lemma} As the proof is a standard argument using Construction \ref{Cn_6918_General_Part_1a}(\ref{condition-points-dense}), we omit it. \begin{Notation}\label{N_7806_Bott} Let $p \in C (S^2, M_2)$ denote the Bott projection, and let $L$ be the tautological line bundle over $S^2 \cong {\mathbb{C}} \mathbb{P}^1$. (Thus, the range of~$p$ is the section space of~$L$.) Recalling that $X_0 = \mathrm{cone} (S^2)$, parametrized as in Notation~\ref{N_7730_Cone}, define $b \in C (X_0, M_2)$ by $b (\lambda) = \lambda \cdot p$ for $\lambda \in [0, 1]$. Assuming the notation and choices in parts (\ref{Cn_6918_General_dn}), (\ref{Cn_6918_General_Spaces}), (\ref{Cn_6918_General_Algs}), (\ref{Cn_6918_General_Maps}), and~(\ref{Cn_6918_General_Limit}) of Construction~\ref{Cn_6918_General} and in Construction \ref{Cn_6918_General_Part_1a}, for $n \in {\mathbb{Z}}_{\geq 0}$ set $b_n = ({\operatorname{id}}_{M_2} \otimes \Gamma_{n, 0}) (b, 0) \in M_2 (C_n)$. \end{Notation} We require the following simple lemma concerning characteristic classes. It gives us a way of estimating the radius of comparison which is similar to the one used in \cite[Lemma 1]{Villadsen-perforation}, but more suitable for the types of estimates we need here. \begin{Lemma}\label{Lemma:Chern-class} The Cartesian product $L^{\times k}$ does not embed in a trivial bundle over $(S^2)^k$ of rank less than $2k$. \end{Lemma} \begin{proof} We refer the reader to \cite[Section 14]{milnor-stasheff} for an account of Chern classes. The Chern character $c (L)$ is of the form $1 + \varepsilon$, where $\varepsilon$ is a generator of $H^2 (S^2, {\mathbb{Z}})$, and the product operation satisfies $\varepsilon^2 = 0$. Let $P_1, P_2, \ldots, P_k \colon (S^2)^k \to S^2$ be the coordinate projections. For $j = 1, 2, \ldots, k$, set $\varepsilon_j = P_j^* (\varepsilon)$. The elements $\varepsilon_1, \varepsilon_2, \ldots, \varepsilon_k \in H^2 ((S^2)^k, {\mathbb{Z}})$, along with $1 \in H^0 ((S^2)^k, {\mathbb{Z}})$ (the standard generator) generate the cohomology ring of $(S^2)^k$, and satisfy $\varepsilon_j^2 = 0$ for $j = 1, 2, \ldots, k$. By naturality of the Chern character (\cite[Lemma 14.2]{milnor-stasheff}) and the product theorem (\cite[(14.7) on page 164]{milnor-stasheff}), we have $c (L^{\times k}) = \prod_{j = 1}^k (1 + \varepsilon_j)$. Now, suppose $L^{\times k}$ embeds as a subbundle of a trivial bundle~$E$. Let $F$ be the complementary bundle, so that $L^{\times k} \oplus F = E$. By the product theorem, $c (L^{\times k}) c (F) = c (L^{\times k}\oplus F) = c (E) = 1$. Thus, $c (F) = c (L^{\times k})^{-1} = \prod_{j = 1}^k (1 - \varepsilon_j)$. Since $c (F)$ has a nonzero term in the top cohomology class $H^{2 k} ((S^2)^{k})$, it follows that ${\operatorname{rank}} (F)$ is at least $k$. Thus, ${\operatorname{rank}} (E) = {\operatorname{rank}} (L^{\times k}) + {\operatorname{rank}} (F) \geq 2k$, as required. \end{proof} \begin{Lemma}\label{L_7906_RankB} Adopt the assumptions and notation of Notation~\ref{N_7806_Bott}. Let $n \in {\mathbb{Z}}_{> 0}$. Then $b_n |_{Z_n}$ is the orthogonal sum of a projection $p_n$ whose range is isomorphic to the section space of the Cartesian product bundle $L^{\times s (n)}$ and a constant function of rank at most $r (n) - s (n) - t(n)$. \end{Lemma} We don't expect $b_n |_{Z_n}$ to be a projection, since some of the point evaluations occurring in the maps of the direct system will be at points $x \in \mathrm{cone} (Z_m) \setminus Z_m$ for values of $m < n$, and $b_m (x)$ is not a projection{} for such~$x$. We don't need the estimate on the rank of the second part of the description of $b_n |_{Z_n}$; it is included to make the construction more explicit. If there are no evaluations at the ``cone points'' \[ (Z_m \times \{ 0 \}) / (Z_m \times \{ 0 \}) \in (Z_m \times [0, 1]) / (Z_m \times \{ 0 \}) \] (following the parametrization in Notation~\ref{N_7730_Cone}), then this rank will be exactly $r (n) - s (n) - t(n)$. \begin{proof}[Proof of Lemma~\ref{L_7906_RankB}] For $n \in {\mathbb{Z}}_{\geq 0}$ write $b_n = (c_n, g_n)$ with \[ c_n \in M_2 (C (X_n, M_{r (n)} )) \qquad {\mbox{and}} \qquad g_n \in M_2 (C (Y_n, M_{r (n)} )) \, . \] Further, for $j = 1, 2, \ldots, s (n)$ let $T_j^{(n)} \colon (S^2)^{s (n)} \to S^2$ be the $j$-th coordinate projection. We claim that $c_n$ is an orthogonal sum $c_{n, 0} + c_{n, 1}$, in which $c_{n, 0}$ is the direct sum of the functions $b \circ \mathrm{cone} \big( T_j^{(n)} \big)$ for $j = 1, 2, \ldots, s (n)$ and $c_{n, 1}$ is a constant function of rank at most $r (n) - s (n) - t (n)$, and moreover that $g_n$ is a constant function of rank at most $t (n)$. The statement of the lemma follows from this claim. The proof of the claim is by induction on~$n$. The claim is true for $n = 0$, by the definition of~$b$ and since $s (0) = 1$, $t (0) = 0$, and $r (0) - s (0) - t (0) = 0$. Now assume that the claim is known for~$n$, recall that $\Gamma_{n + 1, \, n} = {\operatorname{id}}_{M_{r (n)}} \otimes \gamma_n$ (see Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Maps})), and examine the summands in the description~(\ref{Eq_7830_Star}) of the map $\gamma_{n}$ (after Construction \ref{Cn_6918_General_Part_1a}). With this convention, first take $(f, g)$ in~(\ref{Eq_7830_Star}) to be $( c_{n, 0}, 0 )$. The first coordinate $\Gamma_{n + 1, n} ( c_{n, 0}, 0 )_1$ is of the form required for $c_{n + 1, 0}$, while $\Gamma_{n + 1, n} ( c_{n, 0}, 0 )_2$ is a constant function of rank $k (n + 1) s (n)$ unless $c_n (x_n) = 0$, in which case it is zero. In the same manner, we see that: \begin{itemize} \item $\Gamma_{n + 1, n} ( c_{n, 1}, 0 )_1$ is constant of rank at most $d (n + 1) [r (n) - s (n) - t (n)]$. \item $\Gamma_{n + 1, n} ( c_{n, 1}, 0 )_2$ is constant of rank at most $k (n + 1) [r (n) - s (n) - t (n)]$. \item $\Gamma_{n + 1, n} ( 0, g_n )_1$ is constant of rank at most $k (n + 1) t (n)$. \item $\Gamma_{n + 1, n} ( 0, g_n )_2$ is constant of rank at most $d (n + 1) t (n)$. \end{itemize} Putting these together, we get in the first coordinate of $\Gamma_{n + 1, n} (b_n)$ the direct sum of $c_{n + 1, 0}$ as described and a constant function of rank at most \[ d (n + 1) [r (n) - s (n) - t (n)] + k (n + 1) t (n) \, . \] A computation shows that this expression is equal to $r (n + 1) - s (n + 1) - t (n + 1)$. In the second coordinate we get a constant function of rank at most \[ k (n + 1) s (n) + k (n + 1) [r (n) - s (n) - t (n)] + d (n + 1) t (n) = t (n + 1) \, . \] This completes the induction, and the proof. \end{proof} \begin{Cor}\label{C_7808_BigRank} Adopt the assumptions and notation of Notation~\ref{N_7806_Bott}. Let $n \in {\mathbb{Z}}_{\geq 0}$. Let $e = (e_1 ,e_2)$ be an element in $M_{\infty} (C_n) \cong M_{\infty}(C (X_n) \oplus C (Y_n))$ such that $e_1$ is a projection which is equivalent to a constant projection. If there exists $x \in M_{\infty} (C_n)$ such that $\| x e x^* - b_n \| < \frac{1}{2}$ then ${\operatorname{rank}} (e_1) \geq 2 s (n)$. \end{Cor} \begin{proof} Recall from Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Xn}) and Notation~\ref{N_7730_Cone} that \[ Z_n = (S^2)^{s (n)} \qquad {\mbox{and}} \qquad Z_n \subset \mathrm{cone} (Z_n) = X_n \subset X_n \amalg Y_n \, . \] Also recall the line bundle $L$ and the projection~$p$ from Notation~\ref{N_7806_Bott}. It follows from Lemma~\ref{L_7906_RankB} that there is a projection{} $q \in M_{2 r (n)} (C (Z_n))$ whose range is isomorphic to the section space of the $s (n)$-dimensional vector bundle $L^{\times s (n)}$ and such that $q (b_n |_{Z_n} ) q = q$. Now $\| x e x^* - b_n \| < \frac{1}{2}$ implies $\| q (x e x^* |_{Z_n} ) q - q \| < \frac{1}{2}$. Since $e |_{Z_n}$ and $q |_{Z_n}$ are projections, it follows that $q |_{Z_n}$ is Murray-von Neumann equivalent to a subprojection of $e |_{Z_n} = e_1 |_{Z_n}$. Therefore ${\operatorname{rank}} ( e |_{Z_n} ) \geq 2 s (n)$ by Lemma~\ref{Lemma:Chern-class}. So ${\operatorname{rank}} ( e_1 ) \geq 2 s (n)$. \end{proof} Although not strictly needed for the sequel, we record the following. \begin{Cor}\label{Cor-rc-C} Assume the notation and choices in parts (\ref{Cn_6918_General_dn}), (\ref{Cn_6918_General_Size}) (including $\kappa > \frac{1}{2}$), (\ref{Cn_6918_General_Algs}), (\ref{Cn_6918_General_Maps}), and~(\ref{Cn_6918_General_Limit}) of Construction~\ref{Cn_6918_General}, and in Construction \ref{Cn_6918_General_Part_1a} (except part~(\ref{Cn_9Y01_Gen_1a_Maps2})) and the parts of Construction~\ref{Cn_6918_General} referred to there. Then the algebra $C$ satisfies $\mathrm{rc} (C) \geq 2 \kappa - 1 > 0$. \end{Cor} \begin{proof} Suppose $\rho < 2 \kappa - 1$. We show that $C$ does not have $\rho$-comparison. Choose $n \in {\mathbb{Z}}_{> 0}$ such that $1 / {r (n)} < 2 \kappa - 1 - \rho$. Choose $M \in {\mathbb{Z}}_{\geq 0}$ such that $\rho + 1 < M / {r (n)} < 2 \kappa$. Let $e \in M_{\infty} (C_n)$ be a trivial projection{} of rank~$M$. By slight abuse of notation, we use $\Gamma_{m, n}$ to denote the amplified map from $M_{\infty} (C_n)$ to $M_{\infty} (C_m)$ as well. For $m > n$, the rank of $\Gamma_{m, n} (e)$ is $M \cdot \frac{r (m)}{r (n)}$, and the choice of $M$ guarantees that this rank is strictly less than $2 s (m)$. Now, for any trace $\tau$ on $C_m$ (and thus for any trace on $C$), and justifying the last step afterwards, we have \[ d_{\tau} (\Gamma_{m, n} (e)) = \tau (\Gamma_{m, n} (e)) = \frac{1}{r (m)} \cdot M \cdot \frac{r (m)}{r (n)} \geq 1 + \rho > d_{\tau} (b_m) + \rho \, . \] To explain the last step, recall $b_m$ from Notation~\ref{N_7806_Bott}, and use Lemma~\ref{L_7906_RankB} to see that the ranks of its components $(b_m)_1 \in M_2 \bigl( C (X_m, M_{r (m)}) \bigr)$ and $(b_m)_2 \in M_2 \bigl( C (Y_m, M_{r (m)}) \bigr)$ are both less than $r (m)$, while the identity element has rank $r (m)$. On the other hand, if $\Gamma_{\infty, 0} (b) \precsim \Gamma_{\infty, n} (e)$ then, in particular, there exists some $m > n$ and $x \in M_{\infty} (C_m)$ such that $\|x\Gamma_{m, n} (e)x^* - b_m\| < \frac{1}{2}$, which contradicts Corollary~\ref{C_7808_BigRank}. \end{proof} \begin{Notation}\label{notation-q-q-perp} We assume the notation and choices in parts (\ref{Cn_6918_General_dn}), (\ref{Cn_6918_General_Spaces}), (\ref{Cn_6918_General_Algs}), (\ref{Cn_6918_General_Maps}), and~(\ref{Cn_6918_General_Limit}) of Construction~\ref{Cn_6918_General}. In particular, $C_0 = C (X_0) \oplus C (Y_0)$. Define $q_0 = (1, 0) \in C (X_0) \oplus C (Y_0)$ and $q_0^{\perp} = 1 - q_0$. For $n \in {\mathbb{Z}}_{> 0}$ define $q_n = \Gamma_{n, 0} (q_0) \in C_n$ and $q_n^{\perp} = 1 - q_n$, and finally, define $q = \Gamma_{\infty, 0} (q_0) \in C$ and $q^{\perp} = 1 - q$. \end{Notation} \begin{Lemma}\label{L_7816_Rankq} Make the assumptions in Notation~\ref{notation-q-q-perp}. Further assume the notation and choices in Construction \ref{Cn_6918_General_Part_1a} (except part~(\ref{Cn_9Y01_Gen_1a_Maps2})). Then the projection \[ 1 - q_n \in M_{l (n)} ( C (X_n) ) \oplus M_{l (n)} ( C (Y_n) ) \] has the form $(e, f)$ for a constant projection $e \in M_{l (n)} ( C (X_n) ) = C (X_n, M_{l (n)})$ of rank $t (n)$ and a constant projection $f \in M_{l (n)} ( C (Y_n) ) = C (Y_n, M_{l (n)})$ of rank $r (n) - t (n)$. \end{Lemma} {}From Construction \ref{Cn_6918_General_Part_1a}, we don't actually need to know anything about the spaces $X_n$ and~$Y_n$, we don't need to know anything about the points $x_n$ and~$y_n$ except which spaces they are in, and we don't need to know anything about the maps $Q_j^{(n)}$ and $R_{n, j}$ except their domains and codomains. \begin{proof}[Proof of Lemma~\ref{L_7816_Rankq}] The proof is an easy induction argument, using the fact that the image of a constant function under a diagonal map is again a constant function. \end{proof} \begin{Lemma}\label{Lemma:rc_lower_bound} Assume the notation and choices in parts (\ref{Cn_6918_General_dn})--(\ref{Cn_6918_General_Limit}) of Construction \ref{Cn_6918_General}, Construction \ref{Cn_6918_General_Part_1a} (except part~(\ref{Cn_9Y01_Gen_1a_Maps2})), and Notation~\ref{notation-q-q-perp}, including $k (n) < d (n)$ for all $n \in {\mathbb{Z}}_{\geq 0}$, $\kappa > \frac{1}{2}$, $\omega > \omega'$, and $2 \kappa - 1 > 2 \omega$. Then \[ \mathrm{rc} (q^{\perp} C q^{\perp}) \geq \frac{2 \kappa - 1}{2 \omega} \, . \] \end{Lemma} \begin{proof} We proceed as in the proof of Corollary~\ref{Cor-rc-C}, although the rank computations are somewhat more involved. The difference is in the definition of $d_{\tau}$. In this corner, $d_{\tau}$ is normalized so that $d_{\tau} (q^{\perp}) = 1$ for all $\tau \in {\operatorname{T}} (C)$. To avoid redefining the notation, we will use $\tau$ to denote a tracial state on~$C$, and therefore our dimension functions will be of the form $a \mapsto d_{\tau} (a)/\tau (q^{\perp})$, noting that $\tau (q^{\perp}) = d_{\tau}(q^{\perp})$ since $q^{\perp}$ is a projection. It suffices to show that for all $\rho \in \left (1, \frac{2 \kappa - 1}{2 \omega} \right ) \cap {\mathbb{Q}}$, we have $\mathrm{rc} (q^{\perp} C q^{\perp}) \geq \rho$. Fix $\delta \in (0, \omega)$ such that \begin{equation}\label{Eq_7906_Star} \rho < (1 - \delta) \left( \frac{2 \kappa - 1}{2 \omega} \right) \, . \end{equation} Set \begin{equation}\label{Eq_7906_DefEps} \varepsilon = \frac{\delta}{2 \rho (1 - \delta)} > 0. \end{equation} Since the sequence $\left (\frac{s (n)}{r (n)} \right)_{n = 0, 1, 2, \ldots}$ is nonincreasing and converges to a nonzero limit~$\kappa$, there exists $n_0 \in {\mathbb{Z}}_{\geq 0}$ such that for all $n$ and $m$ with $m\geq n \geq n_0$, we have \[ 0 \leq 1 - \frac{r (n)}{s (n)} \cdot \frac{s (m)}{r (m)} < \varepsilon \, . \] This implies that \begin{equation}\label{Eq_7906_epsEst} \frac{r (m)}{r (n)} - \frac{s (m)}{s (n)} < \varepsilon \cdot \frac{r (m)}{r (n)} \, . \end{equation} Using~(\ref{Eq_7906_Star}) and $\delta < \omega$ at the first step, we get \[ 1 - \omega + 2 \rho \omega < 1 - \delta + 2 (1 - \delta) \left( \frac{2 \kappa - 1}{2 \omega} \right) \omega = 2 \kappa (1 - \delta) \, . \] Now write $\rho = \alpha / \beta$ with $\alpha, \beta \in {\mathbb{Z}}_{> 0}$. Choose $n \geq n_0$ such that \[ \frac{\beta}{r (n)} < 2 \kappa (1 - \delta) - (1 - \omega + 2 \rho \omega) \, . \] Then there exists $N_1 \in {\mathbb{Z}}_{> 0}$ such that $\rho N_1 \in {\mathbb{Z}}_{> 0}$ and \begin{equation}\label{Eq_7906_DefM1} 2 \kappa (1 - \delta) > \frac{N_1}{r (n)} > 1 - \omega + 2 \rho \omega \, . \end{equation} Set \begin{equation}\label{Eq_8Y28_NL} N_2 = \rho N_1 \, . \end{equation} Using $\rho > 1$ at the last step, we have \[ \frac{N_2}{r (n)} = \frac{\rho N_1}{r (n)} > \rho (1 - \omega + 2 \rho \omega) > \rho (1 - \omega) + 2 \omega \, . \] Now suppose $e \in M_{\infty} (C_n) = M_{\infty} \bigl( C (X_n) \oplus C (Y_n) \bigr)$ is an ordered pair whose first component is a trivial projection on $X_n$ of rank $N_1$ and whose second component is a (trivial) projection on $Y_n$ of rank $N_2$. Let $m > n$, and let $f$ be the first component of $\Gamma_{m, n} (e)$; we estimate ${\operatorname{rank}} (f)$. (The second component is a trivial projection over $Y_m$ whose rank we don't care about.) Now $f$ is the direct sum of $r (m) / r (n)$ trivial projections, coming from $C (X_n, M_{r (n)})$ and $C (Y_n, M_{r (n)})$. At least $s (m) / s (n)$ of these summands come from $C (X_n, M_{r (n)})$. So at most $r (m) / r (n) - s (m) / s (n)$ of these summands come from $C (Y_n, M_{r (n)})$. The summands coming from $C (X_n, M_{r (n)})$ have rank~$N_1$ and the summands coming from $C (Y_n, M_{r (n)})$ have rank~$N_2$. Since $N_2 > N_1$, we get \begin{align*} {\operatorname{rank}} (f) & \leq \left( \frac{r (m)}{r (n)} - \frac{s (m)}{s (n)} \right) N_2 + \frac{s (m)}{s (n)} \cdot N_1 \\ & = \frac{r (m)}{r (n)} \cdot N_1 + \left (\frac{r (m)}{r (n)} - \frac{s (m)}{s (n)} \right ) (N_2 - N_1) \, . \end{align*} Combining this with~(\ref{Eq_7906_epsEst}) at the first step, and using (\ref{Eq_8Y28_NL}) at the second step, (\ref{Eq_7906_DefEps}) at the third step, (\ref{Eq_7906_DefM1}) at the fifth step, and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}) at the sixth step, we get \begin{align*} {\operatorname{rank}} (f) & < \frac{r (m)}{r (n)} \cdot (N_1 + \varepsilon N_2) = \frac{r (m)}{r (n)} \cdot (1 + \varepsilon \rho) \cdot N_1 \\ & = \frac{r (m)}{r (n)} \cdot \frac{2 - \delta}{2 (1 - \delta)} \cdot N_1 < \frac{r (m)}{r (n)} \cdot \frac{N_1}{1 - \delta} < 2 \kappa r (m) \leq 2 s (m) \, . \end{align*} So Corollary~\ref{C_7808_BigRank} implies that there is no $x \in M_{\infty} (C_m)$ for which $\|x \Gamma_{n, m} (e) x^* - b_m \| < \frac{1}{2}$. Since $m > n$ is arbitrary, \begin{equation}\label{Eq_8Y29_2NL} \Gamma_{\infty, n} (e) \not\precsim b \, . \end{equation} Now let $\tau$ be a trace on $C$, and restrict it to $C_n \cong M_{r (n)} \big( C (X_n) \oplus C (Y_n) \big)$. Denote by $\mathrm{tr}$ the normalized trace on $M_{r (n)}$. There is a probability measure $\mu$ on $X_n \amalg Y_n$ such that $\tau (a) = \int_{X_n \amalg Y_n} \mathrm{tr} (a) \, d \mu$ for all $a \in C_n$. Define $\lambda = \mu (X_n)$, so $1 - \lambda = \mu (Y_n)$. Then, using (\ref{Eq_8Y28_NL}) at the second step, \[ \tau (e) = \frac{\lambda N_1 + (1 - \lambda) N_2}{r (n)} = \frac{[\lambda + \rho (1 - \lambda)] N_1}{r (n)} \, . \] Using Lemma~\ref{L_7816_Rankq} to calculate the ranks of the components of $q_n^{\perp}$, we get \begin{equation}\label{Eq_7910_tauqnperp} \tau (q_n^{\perp}) = \frac{\lambda t (n) + (1 - \lambda) [r (n) - t (n)]}{r (n)} \end{equation} and \begin{equation}\label{Eq_7910_tauqn} \tau (q_n) = 1 - \tau (q_n^{\perp}) = \frac{\lambda [r (n) - t (n)] + (1 - \lambda) t (n)}{r (n)} \, . \end{equation} It follows from Lemma~\ref{L_7906_RankB} and Lemma~\ref{L_7816_Rankq} that $d_{\tau} (b_n) \leq \tau (q_n)$. Using this at the first step, and (\ref{Eq_7910_tauqnperp}) and~(\ref{Eq_7910_tauqn}) at the second step, we get \[ \frac{d_{\tau} (b_n)}{\tau (q_n^{\perp})} \leq \frac{\tau (q_n)}{\tau (q_n^{\perp})} = \frac{\lambda [r (n) - t (n)] + (1 - \lambda) t (n)}{\lambda t (n) + (1 - \lambda) [r (n) - t (n)]} \, . \] So \[ \frac{\tau (e) - d_{\tau} (b_n)}{\tau (q_n^{\perp})} \geq \frac{\big( \lambda + \rho (1 - \lambda) \big) N_1 - \big( \lambda [r (n) - t (n)] + (1 - \lambda) t (n) \big)}{ \lambda t (n) + (1 - \lambda) [r (n) - t (n)]} \, . \] The last expression is a fractional linear function in $\lambda$, and is defined for all values of $\lambda$ in the interval $[0, 1]$. Any such function is monotone on $[0, 1]$. In the following calculations, we recall from Lemma~\ref{L_6922_Rho} that $\omega \leq \frac{t (n)}{r (n)} < 2 \omega$. If we set $\lambda = 1$ and use~(\ref{Eq_7906_DefM1}), the value we obtain is \[ \frac{N_1 / r (n) - (1 - t (n)/r (n))}{t (n)/r (n)} > \frac{(1 - \omega + 2 \rho \omega) - (1 - \omega)}{2 \omega} = \rho \, . \] If we set $\lambda = 0$, we get, using~(\ref{Eq_7906_DefM1}) at the first step and $\rho > 1$ at the last step, \[ \frac{\rho N_1/r (n) - t (n)/r (n)}{1 - t (n)/r (n)} > \frac{\rho (1 - \omega + 2 \rho \omega) - 2 \omega}{ 1 - \omega} = \rho + \frac{2 \rho^2 \omega - 2 \omega}{1 - \omega} > \rho \, . \] Therefore \[ \frac{d_{\tau} (\Gamma_{\infty, n} (e) )}{d_{\tau} (q^{\perp})} > \frac{d_{\tau} (b)}{d_{\tau} (q^{\perp})} + \rho \] for all traces $\tau$ on $C$, so $\mathrm{rc} (q^{\perp} C q^{\perp}) > \rho$, as required. \end{proof} We now turn to the issue of finding upper bounds on the radius of comparison. For this, we appeal to results of Niu from \cite{niu-mean-dimension}. Niu introduced a notion of mean dimension for a diagonal AH-system, \cite[Definition 3.6]{niu-mean-dimension}. Suppose we are given a direct system of homogeneous algebras of the form \[ A_n = C (K_{n, 1}) \otimes M_{j_{n, 1}} \oplus C (K_{n, 2}) \otimes M_{j_{n, 2}} \oplus \cdots \oplus C (K_{n, m (n)}) \otimes M_{j_{n, m (n)}} \, , \] in which each of the spaces involved is a connected finite CW~complex, and the connecting maps are unital diagonal maps. Let $\gamma$ denote the mean dimension of this system, in the sense of Niu. It follows trivially from \cite[Definition 3.6]{niu-mean-dimension} that \[ \gamma \leq \lim_{n \to \infty} \max \left (\left \{ \frac{\dim (K_{n, l})}{j_{n, l}} \mid l = 1, 2, \ldots, m (n) \right \} \right ) \, . \] Theorem~6.2 of \cite{niu-mean-dimension} states that if $A$ is the direct limit of a system as above, and $A$ is simple, then $\mathrm{rc} (A) \leq \gamma/2$. Since the system we are considering here is of this type, Niu's theorem applies. With that at hand, we can derive an upper bound for the radius of comparison of the complementary corner. \begin{Lemma}\label{Lemma:rc-upper-bound} Under the same assumptions as in Lemma~\ref{Lemma:rc_lower_bound}, we have \[ \mathrm{rc} (q C q) \leq \frac{1}{1 - 2 \omega} \, . \] \end{Lemma} \begin{proof} The algebra $C$ is simple by Lemma~\ref{L_0725_Simplicity}, so $q C q$ is also simple. This fact and Lemma~\ref{L_7816_Rankq} allow us to apply the discussion above, getting \[ \mathrm{rc} (q C q) \leq \frac{1}{2} \lim_{n \to \infty} \max \left ( \frac{\dim (X_n)}{{\operatorname{rank}} (q_n |_{X_n})}, \, \frac{\dim (Y_n)}{{\operatorname{rank}} ( q_n |_{Y_n} )} \right )\, . \] As $\dim (Y_n) = 1$ for all $n$, the second term converges to~$0$. As for the first term, by Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Xn}), we have $\dim (X_n) = 2 s (n) + 1$. Also, ${\operatorname{rank}} (q_n |_{X_n}) = r (n) - t (n)$ by Lemma~\ref{L_7816_Rankq}. Thus, using Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}), Lemma~\ref{L_6922_Rho}, and $d (n) \to \infty$ (which follows from Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp})) at the last step, \[ \lim_{n \to \infty} \frac{\dim (X_n)}{{\operatorname{rank}} (q_n |_{X_n})} = \lim_{n \to \infty} \frac{2 s (n) + 1}{r (n) - t (n)} \leq \lim_{n \to \infty} \frac{2 r (n) + 1}{r (n) - t (n)} \leq \frac{2}{1 - 2 \omega}\, . \] This gives us the required estimate. \end{proof} \begin{Lemma}\label{lemma-stable-rank-1} Let the assumptions and notation be as in Notation~\ref{notation-q-q-perp}, Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Xn}), and Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_YnIs01}). If $e \in C$ is a projection which has the same same $K_0$-class as $q$ then $e$ is unitarily equivalent to $q$. The same holds with $q^{\perp}$ in place of $q$. \end{Lemma} \begin{proof} This can be seen directly from the construction. For each $n \in {\mathbb{Z}}_{\geq 0}$, since $X_n$ and $Y_n$ are contractible (Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Xn}) and Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_YnIs01})), if $e \in M_{\infty} (C_n)$ is a projection which has the same $K_0$-class as $q$, then $e$ is actually unitarily equivalent to $q_n$. The same holds for $q_n^{\perp}$. It follows that this is the case in $C$ as well. \end{proof} We point out that this lemma can also be deduced using cancellation. By \cite[Theorem 4.1]{elliott-ho-toms}, simple unital AH algebras which arise from AH systems with diagonal maps have stable rank~$1$. Rieffel has shown that $C^*$-algebras with stable rank $1$ have cancellation; see \cite[Theorem 6.5.1]{blackadar-k-theory}. \section{The tracial state space}\label{Sec_Traces} For a compact Hausdorff space~$X$, we will need all of $C (X, {\mathbb{R}})$ (the space of real valued continuous function{s} on~$X$), the tracial state space of $C (X)$ (and of $C (X, M_n)$), and the space of affine functions on the tracial state space. This last space is an order unit space, and much of our work will be done there. For later reference, we recall some of the definitions, and then describe how to move between these spaces. We begin with the definition of an order unit space from the discussion before Proposition II.1.3 of~\cite{Alf}. We suppress the order unit in our notation, since (except in several abstract results) our order unit spaces will always be sets of affine continuous function{s} on compact convex sets with order unit the constant function~$1$. \begin{Def}\label{D_6919_OrUnitSp} An {\emph{order unit space}}~$V$ is a partially ordered real Banach space (see page~1 of~\cite{Gdr0} for the axioms of a partially ordered real vector space) which is {\emph{Archimedean}} (if $v \in V$ and $\{ \lambda v \mid \lambda \in (0, \infty) \}$ has an upper bound, then $v \leq 0$), with a distinguished element $e \in V$ which is an {\emph{order unit}} (that is, for every $v \in V$ there is $\lambda \in (0, \infty)$ such that $- \lambda e \leq v \leq \lambda e$), and such that the norm on~$V$ satisfies \[ \| v \| = \inf \big( \big\{ \lambda \in (0, \infty) \mid - \lambda e \leq v \leq \lambda e \big\} \big) \] for all $v \in V$. The morphisms of order unit spaces are the positive linear maps which preserve the order units. \end{Def} The morphisms of compact convex sets (compact convex subsets of locally convex topological vector spaces) are just the continuous affine maps. \begin{Def}\label{N_7701_Aff} If $K$ is a compact convex set, we denote by ${\operatorname{Aff}} (K)$ the order unit space of continuous{} affine functions $f \colon K \to {\mathbb{R}}$, with the supremum norm and with order unit the constant function~$1$. If $K$ and $L$ are compact convex sets and $\lambda \colon K \to L$ is continuous and affine, we let $\lambda^* \colon {\operatorname{Aff}} (L) \to {\operatorname{Aff}} (K)$ be the positive linear order unit preserving map given by $\lambda^* (f) = f \circ \lambda$ for $f \in {\operatorname{Aff}} (L)$. \end{Def} This definition makes $K \mapsto {\operatorname{Aff}} (K)$ a functor. \begin{Def}\label{N_7701_StateSpace} If $V$ is an order unit space with order unit~$e$, we denote by $S (V)$ (or $S (V, e)$ if $e$ is not understood) its state space (the order unit space morphisms to $({\mathbb{R}}, 1)$), which is a compact convex set with the weak* topology. If $W$ is another order unit space and $\varphi \colon V \to W$ is positive, linear, and order unit preserving, we let $S (\varphi) \colon S (W) \to S (V)$ be the continuous affine map given by $S (\varphi) (\omega) = \omega \circ \varphi$ for $\omega \in S (W)$. \end{Def} This definition makes $V \mapsto S (V)$ a functor. \begin{Thm}[Theorem~7.1 of~\cite{Gdr0}]\label{T_7701_AffKToK} There is a natural isomorphism $S ({\operatorname{Aff}} (K)) \cong K$ for compact convex sets~$K$, given by sending $x \in K$ to the evaluation map ${\operatorname{ev}}_x \colon {\operatorname{Aff}} (K) \to {\mathbb{R}}$ defined by ${\operatorname{ev}}_x (f) = f (x)$ for $f \in {\operatorname{Aff}} (K)$. \end{Thm} \begin{Def}\label{N_6919_Traces} For a unital C*-algebra~$A$, we denote its tracial state space by ${\operatorname{T}} (A)$. If $A$ and $B$ are unital $C^*$-algebra{s} and $\varphi \colon A \to B$ is a unital homomorphism, we let ${\operatorname{T}} (\varphi) \colon {\operatorname{T}} (B) \to {\operatorname{T}} (A)$ be the continuous affine map given by ${\operatorname{T}} (\varphi) (\tau) = \tau \circ \varphi$ for $\tau \in {\operatorname{T}} (B)$. We let ${\widehat{\varphi}} \colon {\operatorname{Aff}} ({\operatorname{T}} (A)) \to {\operatorname{Aff}} ({\operatorname{T}} (B))$ be the positive order unit preserving map given by ${\widehat{\varphi}} (f) = f \circ {\operatorname{T}} (\varphi)$ for $f \in {\operatorname{Aff}} ({\operatorname{T}} (A))$. (Thus, ${\widehat{\varphi}} = {\operatorname{T}} (\varphi)^*$.) \end{Def} \begin{Lemma}\label{L_7701_XToTCX} Let $X$ be a compact Hausdorff space. Then $C (X, {\mathbb{R}})$, with the supremum norm and distinguished element the constant function~$1$, is a complete order unit space. Restriction of tracial states on $C (X)$ is an affine homeomorphism from ${\operatorname{T}} (C (X))$ to $S (C (X, {\mathbb{R}}))$. The map from $X$ to $S (C (X, {\mathbb{R}}) )$ which sends $x \in X$ to the point evaluation ${\operatorname{ev}}_x \colon C (X, {\mathbb{R}}) \to {\mathbb{R}}$ is a homeomorphism onto its image, and the map $R_X \colon {\operatorname{Aff}} \big( S (C (X, {\mathbb{R}})) \big) \to C (X, {\mathbb{R}})$, given by $R_X (f) (x) = f ({\operatorname{ev}}_x)$ for $f \in {\operatorname{Aff}} \big( S (C (X, {\mathbb{R}})) \big)$ and $x \in X$, is an isomorphism of order unit spaces. If $Y$ is another compact Hausdorff space, then the function which sends a positive linear order unit preserving map $Q \colon C (X, {\mathbb{R}}) \to C (Y, {\mathbb{R}})$ to $S (Q) \colon S (C (Y, {\mathbb{R}})) \to S (C (X, {\mathbb{R}}))$, as in Definition~\ref{N_7701_StateSpace}, is a bijection to the continuous affine maps from $S (C (Y, {\mathbb{R}}))$ to $S (C (X, {\mathbb{R}}))$. Its inverse is the map $E$ given as follows. For a continuous affine map $\lambda \colon S (C (Y, {\mathbb{R}})) \to S (C (X, {\mathbb{R}}))$, using the notation of Definition~\ref{N_7701_Aff}, define $E (\lambda) \colon C (X, {\mathbb{R}}) \to C (Y, {\mathbb{R}})$ by $E (\lambda) = R_Y \circ \lambda^* \circ R_X^{-1}$. \end{Lemma} A positive linear order unit preserving map from $C (X, {\mathbb{R}})$ to $C (Y, {\mathbb{R}})$ is called a {\emph{Markov operator}}. \begin{proof}[Proof of Lemma~\ref{L_7701_XToTCX}] It is immediate that $C (X, {\mathbb{R}})$ is a complete order unit space. The identification of $S (C (X, {\mathbb{R}}))$ is also immediate. The fact that $R_X$ is bijective follows from \cite[Corollary 11.20]{Gdr0} using the identification of $X$ with the extreme points of $S (C (X, {\mathbb{R}}))$. For the second paragraph, it is immediate that $S$ sends positive linear order unit preserving maps to continuous affine maps, and that $E$ does the reverse. For the rest, we must show that $S \circ E$ and $E \circ S$ are the identity maps on the appropriate sets. We first claim that for $g \in {\operatorname{Aff}} \big( S (C (X, {\mathbb{R}})) \big)$ and $\rho \in S (C (X, {\mathbb{R}}))$ we have \begin{equation}\label{Eq_9X30_MoveRX} g (\rho) = \rho (R_X (g)) \, . \end{equation} This formula is true by definition when $\rho = {\operatorname{ev}}_x$ for some $x \in X$. Since, for fixed~$g$, both sides of~(\ref{Eq_9X30_MoveRX}) are continuous affine functions of~$\rho$, and since $S (C (X, {\mathbb{R}}))$ is the closed convex hull of $\{ {\operatorname{ev}}_x \mid x \in X \}$, the claim follows. We next claim that if $\lambda \colon S (C (Y, {\mathbb{R}})) \to S (C (X, {\mathbb{R}}))$ is continuous{} and affine, $\omega \in S (C (Y, {\mathbb{R}}))$, and $g \in {\operatorname{Aff}} \big( S (C (X, {\mathbb{R}})) \big)$, then \begin{equation}\label{Eq_9X30_MoveLd} (\omega \circ R_Y) (g \circ \lambda) = (\lambda (\omega) \circ R_X) (g) \, . \end{equation} To prove this claim, for the same reasons as in the proof of the first claim, it suffices to prove this when there is $y \in Y$ such that $\omega = {\operatorname{ev}}_y$. In this case, using the definition of $R_Y$ at the second step and the previous claim with $\rho = \lambda ({\operatorname{ev}}_y)$ at the third step, \[ ({\operatorname{ev}}_y \circ R_Y) (g \circ \lambda) = R_Y (g \circ \lambda) (y) = (g \circ \lambda) ({\operatorname{ev}}_y) = (\lambda ({\operatorname{ev}}_y) \circ R_X) (g) \, , \] as desired. Now let $\lambda \colon S (C (Y, {\mathbb{R}})) \to S (C (X, {\mathbb{R}}))$ be continuous{} and affine; we prove that $S (E (\lambda)) = \lambda$. Let $\omega \in S (C (X, {\mathbb{R}}))$ and let $f \in C (Y, {\mathbb{R}})$. Working through the definitions gives \[ S (E (\lambda)) (\omega) (f) = (\omega \circ R_Y) ( R_X^{-1} (f) \circ \lambda) \, . \] By (\ref{Eq_9X30_MoveLd}) with $g = R_X^{-1} (f)$, the right hand side is $\lambda (\omega) (f)$, as desired. Finally, let $Q \colon C (X, {\mathbb{R}}) \to C (Y, {\mathbb{R}})$ be a positive linear order unit preserving map; we show that $E (S (Q)) = Q$. Let $f \in C (X, {\mathbb{R}})$ and let $y \in Y$. Working through the definitions gives \[ E (S (Q)) (f) (y) = R_X^{-1} (f) ({\operatorname{ev}}_y \circ Q) \, . \] Applying (\ref{Eq_9X30_MoveRX}) with $g = R_X^{-1} (f)$ and $\rho = {\operatorname{ev}}_y \circ Q$, we see that the right hand side is $({\operatorname{ev}}_y \circ Q) (f) = Q (f) (y)$. This proves that $E (S (Q)) = Q$, and the proof is complete. \end{proof} Direct limits of direct systems of order unit spaces are constructed at the beginning of Section~3 of~\cite{thomsen}, including Lemma~3.1 there. \begin{Prop}\label{P_6919_CommLim} Let $\big( (D_n)_{n = 0, 1, 2, \ldots}, ( \varphi_{n, m} )_{0 \leq m \leq n} \big)$ be a direct system of unital $C^*$-algebra{s} and unital homomorphism{s}. Set $D = \displaystyle \lim_{\longrightarrow}_{n} D_n$. Then there are a natural homeomorphism \[ {\operatorname{T}} (D) \to \varprojlim_n {\operatorname{T}} (D_n) \] and a natural isomorphism \[ {\operatorname{Aff}} ( {\operatorname{T}} (D)) \to \displaystyle \lim_{\longrightarrow}_n {\operatorname{Aff}} ({\operatorname{T}} (D_n)) \] of order unit spaces. \end{Prop} \begin{proof} The first part is Lemma~3.3 of~\cite{thomsen}. The second part is Lemma~3.2 of~\cite{thomsen}, combined with the fact (Theorem~\ref{T_7701_AffKToK}) that the state space of ${\operatorname{Aff}} (K)$ is naturally identified with $K$. \end{proof} \begin{Def}\label{D_6921_DSumOrdUn} Let $V$ and $W$ be order unit spaces, with order units $e \in V$ and $f \in W$. We define the {\emph{direct sum}} $V \oplus W$ to be the vector space direct sum $V \oplus W$ as a real vector space, with the order $(v_1, w_1) \leq (v_2, w_2)$ for $v_1, v_2 \in V$ and $w_1, w_2 \in W$ if and only if $v_1 \leq v_2$ and $w_1 \leq w_2$, with the order unit $(e, f)$, and the norm $\| (v, w) \| = \max ( \| v \|, \, \| w \| )$. \end{Def} \begin{Lemma}\label{L_6921_DSumIsOU} Let $V$ and $W$ be order unit spaces. Then $V \oplus W$ as in Definition~\ref{D_6921_DSumOrdUn} is an order unit space, which is complete if $V$ and $W$ are. \end{Lemma} \begin{proof} The proof is straightforward. \end{proof} \begin{Lemma}\label{L_6921_DSumTraces} Let $A$ and $B$ be unital $C^*$-algebra{s}. Then, taking the direct sum on the right to be as in Definition~\ref{D_6921_DSumOrdUn}, there is an isomorphism \[ {\operatorname{Aff}} ({\operatorname{T}} (A \oplus B )) \cong {\operatorname{Aff}} ({\operatorname{T}} (A)) \oplus {\operatorname{Aff}} ({\operatorname{T}} (B )) \, , \] given as follows. Identify ${\operatorname{T}} (A)$ with a subset of ${\operatorname{T}} (A \oplus B )$ by, for $\tau \in {\operatorname{T}} (A)$, defining $i (\tau) (a, b) = \tau (a)$ for all $a \in A$ and $b \in B$, and similarly identify ${\operatorname{T}} (B)$ with a subset of ${\operatorname{T}} (A \oplus B )$. Then the map ${\operatorname{Aff}} ({\operatorname{T}} (A \oplus B )) \to {\operatorname{Aff}} ({\operatorname{T}} (A)) \oplus {\operatorname{Aff}} ({\operatorname{T}} (B ))$ is $f \mapsto (f |_{{\operatorname{T}} (A)}, \, f |_{{\operatorname{T}} (B)})$. \end{Lemma} \begin{proof} It is clear that if $f \in {\operatorname{Aff}} ({\operatorname{T}} (A \oplus B))$, then $f |_{{\operatorname{T}} (A)} \in {\operatorname{Aff}} ({\operatorname{T}} (A))$ and $f |_{{\operatorname{T}} (B)} \in {\operatorname{Aff}} ({\operatorname{T}} (B))$, and moreover that the map of the lemma is linear, positive, and preserves the order units. One easily checks that every tracial state{} on $A \oplus B$ is a convex combination of tracial states on $A$ and~$B$, from which it follows that if $f |_{{\operatorname{T}} (A)} = 0$ and $f |_{{\operatorname{T}} (B)} = 0$ then $f = 0$. It remains to prove that the map of the lemma is surjective. Let $g \in {\operatorname{Aff}} ({\operatorname{T}} (A))$ and $h \in {\operatorname{Aff}} ({\operatorname{T}} (B))$. Define $f \colon {\operatorname{T}} (A \oplus B ) \to {\mathbb{R}}$ by, for $\tau \in {\operatorname{T}} (A \oplus B )$, \[ f (\tau) = \tau (1, 0) g \big( \tau (1, 0)^{-1} \tau |_A \big) + \tau (0, 1) g \big( \tau (0, 1)^{-1} \tau |_B \big) \] (taking the first summand to be zero if $\tau (1, 0) = 0$ and the second summand to be zero if $\tau (0, 1) = 0$). Straightforward but somewhat tedious calculations show that $f$ is weak* continuous{} and affine, and clearly $f |_{{\operatorname{T}} (A)} = g$ and $f |_{{\operatorname{T}} (B)} = h$. \end{proof} The following result generalizes Lemma~3.4 of~\cite{thomsen}. It still isn't the most general Elliott approximate intertwining result for order unit spaces, because we assume that the underlying order unit spaces of the two direct systems are the same. The main effect of this assumption is to simplify the notation. \begin{Prop}\label{P_6917_OrdULim} Let $(V_m)_{m = 0, 1, 2, \ldots}$ be a sequence of separable complete order unit spaces, and let \[ \big( (V_m)_{m = 0, 1, 2, \ldots}, \, ( \varphi_{n, m} )_{0 \leq m \leq n} \big) \qquad {\mbox{and}} \qquad \big( (V_m)_{m = 0, 1, 2, \ldots}, \, ( \varphi_{n, m}' )_{0 \leq m \leq n} \big) \] be two direct systems of order unit spaces, using the same spaces, and with maps $\varphi_{n, m}, \varphi_{n, m}' \colon V_m \to V_n$ which are linear, positive, and preserve the order units. Let $V$ and $V'$ be the direct limits \[ V = \displaystyle \lim_{\longrightarrow}_n \big( (V_m)_{m = 0, 1, 2, \ldots}, \, ( \varphi_{n, m} )_{0 \leq m \leq n} \big) \] and \[ V' = \displaystyle \lim_{\longrightarrow}_n \big( (V_m)_{m = 0, 1, 2, \ldots}, \, ( \varphi_{n, m}' )_{0 \leq m \leq n} \big) \, , \] with corresponding maps \[ \varphi_{\infty, n} \colon V_n \to V \qquad {\mbox{and}} \qquad \varphi_{\infty, n}' \colon V_n \to V' \] for $n \in {\mathbb{Z}}_{\geq 0}$. For $n \in {\mathbb{Z}}_{\geq 0}$ further let \[ v_0^{(n)}, \, v_1^{(n)}, \, \ldots \in V_n \] be a dense sequence in the closed unit ball of~$V_n$, and define $F_n \S V_n$ to be the finite set \[ F_n = \bigcup_{m = 0}^n \left[ \big\{ \varphi_{n, m} \big( v_k^{(m)} \big) \colon 0 \leq k \leq n \big\} \cup \big\{ \varphi_{n, m}' \big( v_k^{(m)} \big) \colon 0 \leq k \leq n \big\} \right] \, . \] Suppose that there are $\delta_0, \delta_1, \ldots \in (0, \infty)$ such that \begin{equation}\label{Eq_6917_SumDt} \sum_{n = 0}^{\infty} \delta_n < \infty \end{equation} and for all $n \in {\mathbb{Z}}_{\geq 0}$ and all $v \in F_n$ we have \[ \| \varphi_{n + 1, \, n} (v) - \varphi_{n + 1, \, n}' (v) \| < \delta_n \, . \] Then there is a unique isomorphism $\rho \colon V \to V'$ such that for all $m \in {\mathbb{Z}}_{\geq 0}$ and all $v \in V_m$ we have \[ \rho ( \varphi_{\infty, m} (v)) = \lim_{n \to \infty} ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) \, . \] Its inverse is determined by \[ \rho^{-1} ( \varphi_{\infty, m}' (v)) = \lim_{n \to \infty} ( \varphi_{\infty, n} \circ \varphi_{n, m}' ) (v) \] for $m \in {\mathbb{Z}}_{\geq 0}$ and $v \in V_m$. \end{Prop} \begin{proof} We first claim that for $m \in {\mathbb{Z}}_{\geq 0}$ and $v \in F_m$, the sequence $\big( ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) \big)_{n \geq m}$ is a Cauchy sequence in~$V'$. For $n \geq m$, we estimate, using $\| \varphi_{\infty, n + 1}' \| \leq 1$, $\| v \| \leq 1$, and $\varphi_{n, m} (v) \in F_n$ at the last step: \begin{align*} & \big\| ( \varphi_{\infty, n + 1}' \circ \varphi_{n + 1, \, m} ) (v) - ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) \big\| \\ & \hspace*{3em} {\mbox{}} = \big\| ( \varphi_{\infty, n + 1}' \circ \varphi_{n + 1, \, n} \circ \varphi_{n, m} ) (v) - ( \varphi_{\infty, n + 1}' \circ \varphi_{n + 1, \, n}' \circ \varphi_{n, m} ) (v) \big\| \\ & \hspace*{3em} {\mbox{}} \leq \| \varphi_{\infty, n + 1}' \| \big\| \varphi_{n + 1, \, n} ( \varphi_{n, m} (v) ) - \varphi_{n + 1, \, n}' ( \varphi_{n, m} (v) ) \big\| \leq \delta_n \, . \end{align*} The claim now follows from~(\ref{Eq_6917_SumDt}). Next, we claim that for $m \in {\mathbb{Z}}_{\geq 0}$ and $k \in {\mathbb{Z}}_{> 0}$, the sequence $\big( ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) \big( v_k^{(m)} \big) \big)_{n \geq m}$ is a Cauchy sequence in~$V'$. Indeed, taking $m_0 = \max (m, k)$, this follows from the previous claim and the fact that $\varphi_{m_0, m} \big( v_k^{(m)} \big) \in F_{m_0}$. Now we claim that for $m \in {\mathbb{Z}}_{\geq 0}$ and $v \in V_m$, the sequence $( ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) )_{n \geq m}$ is a Cauchy sequence in~$V'$. Without loss of generality $\| v \| \leq 1$. This claim follows from a standard $\frac{\varepsilon}{3}$~argument: to show that \[ \big\| ( \varphi_{\infty, n_1}' \circ \varphi_{n_1, m} ) (v) - ( \varphi_{\infty, n_2}' \circ \varphi_{n_2, m} ) (v) \big\| < \varepsilon \] for all sufficiently large~$n_1$ and~$n_2$, choose $k \in {\mathbb{Z}}_{> 0}$ such that $\big\| v - v_k^{(m)} \big\| < \frac{\varepsilon}{3}$, and use the previous claim. Since $V'$ is complete, it follows that $\lim_{n \to \infty} ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v)$ exists for all $m \in {\mathbb{Z}}_{\geq 0}$ and $k \in {\mathbb{Z}}_{> 0}$. Since $\| \varphi_{\infty, n}' \circ \varphi_{n, m} \| \leq 1$ whenever $m, n \in {\mathbb{Z}}_{\geq 0}$ satisfy $m \leq n$, it follows that for $m \in {\mathbb{Z}}_{> 0}$ there is a unique bounded linear map $\rho_m \colon V_m \to V'$ such that $\| \rho_m \| \leq 1$ and $\rho_m (v) = \lim_{n \to \infty} ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v)$ for all $k \in {\mathbb{Z}}_{> 0}$. It is clear from the construction that $\rho_n \circ \varphi_{n, m} = \rho_m$ whenever $m, n \in {\mathbb{Z}}_{\geq 0}$ satisfy $m \leq n$. By the universal property of the direct limit, there is a unique bounded linear map $\rho \colon V \to V'$ such that $\rho \circ \varphi_{\infty, m} = \rho_m$ for all $m \in {\mathbb{Z}}_{\geq 0}$. It is clearly contractive, order preserving, and preserves the order units, and is uniquely determined as in the statement of the proposition. The same argument shows that there is a unique contractive linear map $\lambda \colon V' \to V$ determined in the analogous way. For all $m \in {\mathbb{Z}}_{\geq 0}$, we have \[ \lambda \circ \rho \circ \varphi_{\infty, m} = \lambda \circ \varphi_{\infty, m}' = \varphi_{\infty, m} \, , \] so the universal property of the direct limit implies $\lambda \circ \rho = {\operatorname{id}}_V$. Similarly $\rho \circ \lambda = {\operatorname{id}}_{V'}$. \end{proof} \begin{Prop}\label{P_6918_Nat} The isomorphism of Proposition~\ref{P_6917_OrdULim} has the following naturality property. Let the notation be as there, and suppose that, in addition, we are given separable complete order unit spaces $W_n$ for $n \in {\mathbb{Z}}_{\geq 0}$, direct systems \[ \big( (W_m)_{m = 0, 1, 2, \ldots}, \, ( \psi_{n, m} )_{0 \leq m \leq n} \big) \qquad {\mbox{and}} \qquad \big( (W_m)_{m = 0, 1, 2, \ldots}, \, ( \psi_{n, m}' )_{0 \leq m \leq n} \big) \] using the same spaces, with positive linear order unit preserving maps, with direct limits $W$ and~$W'$, and with corresponding maps \[ \psi_{\infty, n} \colon W_n \to W \qquad {\mbox{and}} \qquad \psi_{\infty, n}' \colon W_n \to W' \] for $n \in {\mathbb{Z}}_{\geq 0}$. Also suppose that for $n \in {\mathbb{Z}}_{> 0}$ there is a sequence \[ w_0^{(n)}, \, w_1^{(n)}, \, \ldots \in W_n \] which is dense in the closed unit ball of~$W_n$, and that there is a sequence $(\varepsilon_n)_{n = 0, 1, 2, \ldots}$ in $(0, \infty)$ such that $\sum_{n = 0}^{\infty} \varepsilon_n < \infty$ and, with \[ G_n = \bigcup_{m = 0}^n \left[ \big\{ \psi_{n, m} \big( w_k^{(m)} \big) \mid 0 \leq k \leq n \big\} \cup \big\{ \psi_{n, m}' \big( w_k^{(m)} \big) \mid 0 \leq k \leq n \big\} \right] \, , \] for all $n \in {\mathbb{Z}}_{\geq 0}$ and all $w \in G_n$ we have \[ \| \psi_{n + 1, \, n} (w) - \psi_{n + 1, \, n}' (w) \| < \varepsilon_n \, . \] Let $\sigma \colon W \to W'$ be the isomorphism of Proposition~\ref{P_6917_OrdULim}. Suppose further that we have positive linear order unit preserving maps $\mu_n, \mu_n' \colon V_n \to W_n$ for $n \in {\mathbb{Z}}_{\geq 0}$ such that \[ \mu_n \circ \varphi_{n, m} = \psi_{n, m} \circ \mu_m \qquad {\mbox{and}} \qquad \mu_n' \circ \varphi_{n, m}' = \psi_{n, m}' \circ \mu_m' \] for all $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$. Let $\mu \colon V \to W$ and $\mu' \colon V' \to W'$ be the induced maps of the direct limits. Then $\mu' \circ \rho = \sigma \circ \mu$. \end{Prop} \begin{proof} By construction, $\rho \colon V \to V'$ and $\sigma \colon W \to W'$ are determined by \begin{equation}\label{Eq_6919_Star} \rho ( \varphi_{\infty, m} (v)) = \lim_{n \to \infty} ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) \end{equation} for $m \in {\mathbb{Z}}_{\geq 0}$ and $v \in V_m$, and \begin{equation}\label{Eq_6919_Star_2} \sigma ( \psi_{\infty, m} (w)) = \lim_{n \to \infty} ( \psi_{\infty, n}' \circ \psi_{n, m} ) (w) \end{equation} for $m \in {\mathbb{Z}}_{\geq 0}$ and $w \in W_m$. Using~(\ref{Eq_6919_Star}) at the first step and~(\ref{Eq_6919_Star_2}) at the last step, for $m \in {\mathbb{Z}}_{\geq 0}$ and $v \in V_m$ we therefore have \begin{align*} (\mu' \circ \rho) ( \varphi_{\infty, m} (v) ) & = \mu' \left( \lim_{n \to \infty} ( \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) \right) = \lim_{n \to \infty} (\mu' \circ \varphi_{\infty, n}' \circ \varphi_{n, m} ) (v) \\ & = \lim_{n \to \infty} ( \psi_{\infty, n}' \circ \psi_{n, m} \circ \mu_m ) (v) = (\sigma \circ \mu) ( \varphi_{\infty, m} (v) ) \, . \end{align*} Since $\bigcup_{m = 0}^{\infty} \varphi_{\infty, m} (V_m)$ is dense in~$V$, the result follows. \end{proof} Proposition~\ref{P_arbitrary_trace_space} below can essentially be extracted from the proof of Lemma~3.7 of~\cite{thomsen}. We give here a precise formulation which is needed for our purposes. The difference between our formulation and that of~\cite{thomsen} is that we need more control over the matrix sizes in the construction. In the argument, the following result substitutes for Lemma~3.6 there. \begin{Lemma}[Based on~\cite{thomsen}]\label{L_7630_ConvComb} Let $X$ and $Y$ be compact Hausdorff spaces, with $X$ path connected. Let $\lambda \colon {\operatorname{T}} (C (Y)) \to {\operatorname{T}} (C (X))$ be affine and continuous. Let $E (\lambda) \colon C (X, {\mathbb{R}}) \to C (Y, {\mathbb{R}})$ be as in Lemma~\ref{L_7701_XToTCX}. Then for every $\varepsilon > 0$ and every finite set $F \S C (X, {\mathbb{R}})$ there exists $N_0 \in {\mathbb{Z}}_{> 0}$ such that for every $N \in {\mathbb{Z}}_{> 0}$ with $N \geq N_0$ there are continuous function{s} $g_1, g_2, \ldots, g_N \colon Y \to X$ such that for every $f \in F$ we have \[ \Bigg\| E (\lambda) (f) - \frac{1}{N} \sum_{j = 1}^N f \circ g_j \Bigg\|_{\infty} < \varepsilon \, . \] \end{Lemma} \begin{proof} It suffices to prove the result under the additional assumption that $\| f \| \leq 1$ for all $f \in F$. Let $\varepsilon > 0$. Since $E (\lambda)$ is a Markov operator, Theorem~2.1 of~\cite{thomsen} provides $n \in {\mathbb{Z}}_{> 0}$, unital homomorphism{s} $\psi_1, \psi_2, \ldots, \psi_n \colon C (X) \to C (Y)$, and $\alpha_1, \alpha_2, \ldots, \alpha_n \in [0, 1]$ with $\sum_{l = 1}^n \alpha_l = 1$ such that \[ \left\| E (\lambda) (f) - \sum_{l = 1}^n \alpha_l \psi_l (f) \right\|_{\infty} < \frac{\varepsilon}{2} \] for all $f \in F$. Note that if $\beta_1, \beta_2, \ldots, \beta_n \in [0, 1]$ satisfy $\sum_{l = 1}^n | \alpha_l - \beta_l | < \frac{\varepsilon}{2}$ then \[ \left\| E (\lambda) (f) - \sum_{l = 1}^n \beta_l \psi_l (f) \right\|_{\infty} < \varepsilon \] for all $f \in F$. Choose $N_0 \in {\mathbb{Z}}_{> 0}$ such that $N_0 > 4 n / \varepsilon$. Let $N \in {\mathbb{Z}}_{> 0}$ satisfy $N \geq N_0$. For $l = 1, 2, \ldots, n - 1$ choose $\beta_l \in \left( \alpha_l - \frac{1}{N}, \, \alpha_l \right] \cap \frac{1}{N} {\mathbb{Z}}$, and set $\beta_n = 1 - \sum_{l = 1}^{n - 1} \beta_l$. Then \[ \beta_1, \beta_2, \ldots, \beta_n \in \frac{1}{N} {\mathbb{Z}}_{\geq 0}, \qquad \sum_{l = 1}^n \beta_l = 1, \qquad {\mbox{and}} \qquad \sum_{l = 1}^n | \alpha_l - \beta_l | < \frac{\varepsilon}{2} \, . \] Set $m_l = N \beta_l$ for $l = 1, 2, \ldots, n$. Then for all $f \in F$ we have \[ \left\| E (\lambda) (f) - \frac{1}{N} \sum_{l = 1}^n m_l \psi_l (f) \right\|_{\infty} < \varepsilon \, . \] Now for $l = 1, 2, \ldots, n$ let $h_l \colon Y \to X$ be the continuous function{} such that $\psi_l (f) = f \circ h_l$ for all $f \in C (X)$, and for $j = 1, 2, \ldots, N$ define $g_j = h_l$ when \[ \sum_{k = 1}^{l - 1} m_k < j \leq \sum_{k = 1}^{l} m_k \, . \] Then \[ \frac{1}{N} \sum_{l = 1}^n m_l \psi_l (f) = \frac{1}{N} \sum_{j = 1}^N f \circ g_j \] for all $f \in C (X)$. \end{proof} \begin{Prop}\label{P_arbitrary_trace_space} Let $K$ be a metrizable Choquet simplex, and let $(l (n))_{n = 0, 1, 2, \ldots}$ be a sequence of integers such that $l (n) \geq 2$ for all $n > 0$. For $n \in {\mathbb{Z}}_{\geq 0}$ set $r (n) = \prod_{j = 1}^n l (j)$. Then there exist $n_0 < n_1 < n_2 < \cdots \in {\mathbb{Z}}_{> 0}$, with $n_0 = 0$ and $n_1 = 1$, and a direct system \[ C ([0, 1]) \otimes M_{r (n_0)} \overset{\alpha_{1, 0}}{\longrightarrow} C ([0, 1]) \otimes M_{r (n_1)} \overset{\alpha_{2, 1}}{\longrightarrow} C ([0, 1]) \otimes M_{r (n_2)} \overset{\alpha_{3, 2}}{\longrightarrow} \cdots \] with injective maps which are diagonal (in the sense analogous to Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Diag})) and such that the direct limit $A$ satisfies ${\operatorname{T}} (A) \cong K$. \end{Prop} It is easy to arrange that the algebra $A$ in this proposition be simple: by Proposition~\ref{P_6917_OrdULim}, replacement of a small enough fraction of the maps $g_{k, l}$ in the proof with suitable point evaluations does not change the tracial state space. However, doing so at this stage does not help with later work. The conditions $n_0 = 0$ and $n_1 = 1$ are needed because we will later need to pass to a corresponding subsystem of a system as in Construction~\ref{Cn_6918_General} (more accurately, Construction~\ref{Cn_9104_Half} below), and we want to avoid later complexity of the argument by preserving the value of~$\omega$. \begin{proof}[Proof of Proposition~\ref{P_arbitrary_trace_space}] We mostly follow the proof of Lemma~3.7 of~\cite{thomsen}, using Lemma~\ref{L_7630_ConvComb} in place of Lemma~3.6 of~\cite{thomsen}, and slightly changing the order of the steps to accommodate the difference between our conclusion and that of Theorem~3.9 of~\cite{thomsen}. For convenience, we will use Proposition~\ref{P_6917_OrdULim} in place of Lemma~3.4 of~\cite{thomsen}. For convenience of notation, and following~\cite{thomsen}, set $P = {\operatorname{T}} (C ([0, 1]))$. Lemma 3.8 of~\cite{thomsen} provides an inverse system $\big( (P_k)_{k = 0, 1, \ldots}, \, (\lambda_{j, k})_{0 \leq j \leq k} \big)$ with continuous{} affine maps $\lambda_{j, k} \colon P_k \to P_j$ such that $P_k = P$ for all $k \in {\mathbb{Z}}_{\geq 0}$ and \begin{equation}\label{Eq_7822_NN} \varprojlim \big( (P_k)_{k = 0, 1, \ldots}, \, (\lambda_{j, k})_{0 \leq j \leq k} \big) \cong K. \end{equation} Choose $f_0, f_1, \ldots \in C ([0, 1], \, {\mathbb{R}})$ such that $\{ f_0, f_1, \ldots \}$ is dense in $C ([0, 1], \, {\mathbb{R}})$. We now construct numbers $n_k \in {\mathbb{Z}}_{> 0}$ for $k \in {\mathbb{Z}}_{\geq 0}$, finite subsets $F_k \S C ([0, 1], \, {\mathbb{R}})$ for $k \in {\mathbb{Z}}_{\geq 0}$, positive unital linear maps $\psi_{k + 1, \, k} \colon C ([0, 1], \, {\mathbb{R}}) \to C ([0, 1], \, {\mathbb{R}})$ for $k \in {\mathbb{Z}}_{> 0}$, and continuous function{s} \[ g_{k, 1}, g_{k, 2}, \ldots, g_{k, \, r (n_{k + 1}) / r (n_k)} \colon [0, 1] \to [0, 1] \, , \] such that the following conditions are satisfied: \begin{enumerate} \item\label{7701_Ind_F} $F_0 = \{ f_0 \}$ and for $k \in {\mathbb{Z}}_{\geq 0}$, \[ F_{k + 1} = F_k \cup \{ f_{k + 1} \} \cup E (\lambda_{k, \, k + 1} ) ( F_k \cup \{ f_{k + 1} \} ) \cup \psi_{k + 1, \, k} ( F_k \cup \{ f_{k + 1} \} ) \, . \] \item\label{7701_Ind_Ratio} $n_0 = 0$, $n_1 = 1$, and $n_2 = 2$, and for $k \in {\mathbb{Z}}_{> 0}$ with $k \geq 2$ we have $n_{k + 1} > n_k$ and $r (n_{k + 1}) / r (n_k) > 2^k$. \item\label{7701_Ind_psi} For $k \in {\mathbb{Z}}_{\geq 0}$ and $f \in C ([0, 1], \, {\mathbb{R}})$, \[ \psi_{k + 1, \, k} (f) = \frac{r (n_k)}{r (n_{k + 1})} \sum_{l = 1}^{r (n_{k + 1}) / r (n_k)} f \circ g_{k, l} \, . \] \item\label{7701_Ind_Small} $\big\| E (\lambda_{k, \, k + 1} ) (f) - \psi_{k + 1, \, k} (f) \big\| < 2^{- k}$ for $k \geq 2$ and $f \in F_k$. \end{enumerate} We carry out the construction by induction on~$k$. Define $F_0 = \{ f_0 \}$, $n_0 = 0$, and $n_1 = 1$. Take $g_{0, l} \colon [0, 1] \to [0, 1]$ to be the identity map for $l = 1, 2, \ldots, r (1)$. Then define $\psi_{1, \, 0}$ by~(\ref{7701_Ind_psi}) and define $F_{1}$ by~(\ref{7701_Ind_F}). Now suppose $k \geq 1$ and we have $F_k$ and~$n_k$; we construct \[ F_{k + 1}, \,\,\,\,\,\, n_{k + 1}, \,\,\,\,\,\, g_{k, 1}, g_{k, 2}, \ldots, g_{k, \, r (n_{k + 1}) / r (n_k)}, \qquad {\mbox{and}} \qquad \psi_{k + 1, \, k} \, . \] Apply Lemma~\ref{L_7630_ConvComb} with $\lambda = \lambda_{k, \, k + 1}$, with $\varepsilon = 2^{- k}$, and with $F = F_k$, obtaining $N_0 \in {\mathbb{Z}}_{> 0}$. Choose $n_{k + 1} > n_k$ and so large that \[ \frac{r (n_{k + 1})}{r (n_k)} > \max \left( N_0, \, 2^k \right) \, . \] This gives~(\ref{7701_Ind_Ratio}). Apply the conclusion of Lemma~\ref{L_7630_ConvComb} with $N = r (n_{k + 1}) / r (n_k)$, calling the resulting functions $g_{k, 1}, g_{k, 2}, \ldots, g_{k, \, r (n_{k + 1}) / r (n_k)}$. Then define $\psi_{k + 1, \, k}$ by~(\ref{7701_Ind_psi}). This gives~(\ref{7701_Ind_Small}). Finally, define $F_{k + 1}$ by~(\ref{7701_Ind_F}). This completes the induction. For $j, k \in {\mathbb{Z}}_{\geq 0}$ with $j \leq k$, define $\psi_{k, j} \colon C ([0, 1], \, {\mathbb{R}}) \to C ([0, 1], \, {\mathbb{R}})$ by \[ \psi_{k, j} = \psi_{k, \, k - 1} \circ \psi_{k - 1, \, k - 2} \circ \cdots \circ \psi_{j + 1, \, j} \, . \] An induction argument shows that for $j, k \in {\mathbb{Z}}_{\geq 0}$ with $j \leq k$, we have \[ E (\lambda_{j, k}) (f_j) \in F_k \qquad {\mbox{and}} \qquad \psi_{k, j} (f_j) \in F_k \, . \] This condition, together with Proposition~\ref{P_6917_OrdULim}, allows us to conclude that, as order unit spaces, we have \begin{align}\label{Eq_7729_OUS_Iso} & \varinjlim \big( (C ([0, 1], \, {\mathbb{R}}))_{k = 0, 1, \ldots}, \, ( E (\lambda_{j, k}))_{0 \leq j \leq k} \big) \\ & \hspace*{6em} {\mbox{}} \cong \varinjlim \big( (C ([0, 1], \, {\mathbb{R}}))_{k = 0, 1, \ldots}, \, ( \psi_{k, j})_{0 \leq j \leq k} \big) \, . \notag \end{align} For $k \in {\mathbb{Z}}_{\geq 0}$ define \[ \alpha_{k + 1, \, k} \colon C ([0, 1], \, M_{r (n_k)}) \to C ([0, 1], \, M_{r (n_{k + 1})}) = M_{r (n_{k + 1}) / r (n_k)} \big( C ([0, 1], \, M_{r (n_k)} ) \big) \] by \[ \alpha_{k + 1, \, k} (f) = {\operatorname{diag}} \big( f \circ g_{k, 1}, \, f \circ g_{k, 2}, \, \ldots, \, f \circ g_{k, \, r (n_{k + 1}) / r (n_k)} \big) \] for $f \in C ([0, 1], \, M_{r (n_k)})$. Let $A$ be the resulting direct limit $C^*$-algebra. It is easy to check, and is stated as Lemma~3.5 of~\cite{thomsen}, that ${\widehat{\alpha_{k + 1, k}}} = \psi_{k + 1, k}$. Letting $V$ and $W$ be the order unit spaces \[ V = \varinjlim \big( (C ([0, 1], \, {\mathbb{R}}))_{k = 0, 1, \ldots}, \, ( E (\lambda_{j, k}))_{0 \leq j \leq k} \big) \] and \[ W = \varinjlim \big( (C ([0, 1], \, {\mathbb{R}}))_{k = 0, 1, \ldots}, \, ( {\widehat{\alpha_{k, j} }} )_{0 \leq j \leq k} \big) \, , \] (\ref{Eq_7729_OUS_Iso}) now says $V \cong W$. Lemma~3.2 of~\cite{thomsen} and~(\ref{Eq_7822_NN}) imply that $V \cong {\operatorname{Aff}} (K)$. Proposition~\ref{P_6919_CommLim} implies that ${\operatorname{Aff}} (T (A)) \cong W$. So ${\operatorname{Aff}} (T (A)) \cong {\operatorname{Aff}} (K)$, whence $T (A) \cong K$ by Theorem~\ref{T_7701_AffKToK}. \end{proof} \begin{Prop}\label{P_6917_CStLim} Let $(D_n)_{n = 0, 1, 2, \ldots}$ and $(C_n)_{n = 0, 1, 2, \ldots}$ be sequences of unital $C^*$-algebra{s}. Let \[ \big( (D_n)_{n = 0, 1, 2, \ldots}, ( \varphi_{n, m} )_{0 \leq m \leq n} \big) \qquad {\mbox{and}} \qquad \big( (D_n)_{n = 0, 1, 2, \ldots}, ( \varphi_{n, m}' )_{0 \leq m \leq n} \big) \] and \[ \big( (C_n)_{n = 0, 1, 2, \ldots}, ( \psi_{n, m} )_{0 \leq m \leq n} \big) \qquad {\mbox{and}} \qquad \big( (C_n)_{n = 0, 1, 2, \ldots}, ( \psi_{n, m}' )_{0 \leq m \leq n} \big) \] be direct systems with unital homomorphism{s}, and call the direct limits (in order) $D$, $D'$, $C$, and~$C'$. Suppose further that we have unital homomorphism{s} $\mu_n, \mu_n' \colon D_n \to C_n$ for $n \in {\mathbb{Z}}_{\geq 0}$ such that \[ \mu_n \circ \varphi_{n, m} = \psi_{n, m} \circ \mu_n \qquad {\mbox{and}} \qquad \mu_n' \circ \varphi_{n, m}' = \psi_{n, m}' \circ \mu_n' \] for all $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$. Let $\mu \colon D \to C$ and $\mu' \colon D' \to C'$ be the induced maps of the direct limits. Assume that for all $m \in {\mathbb{Z}}_{\geq 0}$ we have \[ \sum_{n = m}^{\infty} \big\| {\widehat{\varphi_{n, m}}} - {\widehat{\varphi_{n, m}'}} \big\| < \infty \qquad {\mbox{and}} \qquad \sum_{n = m}^{\infty} \big\| {\widehat{\psi_{n, m}}} - {\widehat{\psi_{n, m}'}} \big\| < \infty \, . \] Then there exist isomorphisms \[ \rho \colon {\operatorname{Aff}} ({\operatorname{T}} (D)) \to {\operatorname{Aff}} ({\operatorname{T}} (D')) \qquad {\mbox{and}} \qquad \sigma \colon {\operatorname{Aff}} ({\operatorname{T}} (C)) \to {\operatorname{Aff}} ({\operatorname{T}} (C')) \] such that ${\widehat{\mu'}} \circ \rho = \sigma \circ {\widehat{\mu}}$. Moreover, if $C_n = D_n$ for all $n \in {\mathbb{Z}}_{\geq 0}$ and $\psi_{n, m} = \varphi_{n, m}$ and $\psi_{n, m}' = \varphi_{n, m}$ for all $m$ and~$n$, then we can take $\sigma = \rho$. \end{Prop} \begin{proof} We can apply Proposition~\ref{P_6917_OrdULim} and Proposition~\ref{P_6918_Nat} using arbitrary countable dense subsets of the closed unit balls of ${\operatorname{Aff}} ({\operatorname{T}} (D_n))$ and ${\operatorname{Aff}} ({\operatorname{T}} (C_n))$ for $n \in {\mathbb{Z}}_{> 0}$. Under the hypotheses of the last statement, the uniqueness statement in Proposition~\ref{P_6917_OrdULim} implies that $\sigma = \rho$. \end{proof} \begin{Lemma}\label{L_6919_IfAgreeTodn} Adopt the notation of Construction~\ref{Cn_6918_General}, including (\ref{Cn_6918_General_2nd}) (a second set of maps), and (\ref{Cn_6918_General_Diag}) and~(\ref{Cn_6918_General_Agree}) (diagonal maps, agreeing in the coordinates $1, 2, \ldots, d (n + 1)$). Then \[ \Big\| {\widehat{\Gamma_{n + 1, \, n}^{(0)}}} - {\widehat{\Gamma_{n + 1, \, n}}} \Big\| \leq \frac{2 k (n + 1)}{d (n + 1) + k (n + 1)} \] for all $n \in {\mathbb{Z}}_{\geq 0}$. \end{Lemma} \begin{proof} For a compact metrizable space~$Z$, let $M (Z)$ be the real Banach space consisting of all signed Borel measures on~$Z$. (That is, $M (Z)$ is the dual space of $C (Z, {\mathbb{R}})$.) Identify $Z$ with the set of point masses in $M (Z)$. For $n \in {\mathbb{Z}}_{\geq 0}$, we can identify ${\operatorname{T}} (C_n)$ with the weak* compact convex subset of $M (X_n \amalg Y_n)$ consisting of probability measures. Thus $X_n \amalg Y_n \S {\operatorname{T}} (C_n)$. For every function $f \in {\operatorname{Aff}} ( {\operatorname{T}} (C_n) )$, the function $\iota_n (f) (z) = f (z) \cdot 1_{M_{r (n)}}$ for $z \in X_n \amalg Y_n$ is in $C (X_n \amalg Y_n, \, M_{r (n)}) = C_n$, and $\tau (\iota_n (f)) = f (\tau)$ for all $\tau \in X_n \amalg Y_n \S {\operatorname{T}} (C_n)$, hence also all $\tau \in {\operatorname{T}} (C_n)$ by linearity and continuity. For $f \in {\operatorname{Aff}} ( {\operatorname{T}} (C_n) )$ and $\tau \in {\operatorname{T}} (C_{n + 1})$, we can apply the formula in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Diag}) to $\iota_n (f)$ and apply $\tau$ to everything, to get \[ {\widehat{\Gamma_{n + 1, \, n}^{(0)}}} (f) (\tau) = \frac{1}{l (n + 1)} \sum_{k = 1}^{l (n + 1)} \tau (f \circ S_{n, 1}^{(0)}) \] and \[ {\widehat{\Gamma_{n + 1, \, n}}} (f) (\tau) = \frac{1}{l (n + 1)} \sum_{k = 1}^{l (n + 1)} \tau (f \circ S_{n, 1}) \, . \] Using~(\ref{Cn_6918_General_Agree}), we get \begin{align*} \left| {\widehat{\Gamma_{n + 1, \, n}^{(0)}}} (f) (\tau) - {\widehat{\Gamma_{n + 1, \, n}}} (f) (\tau) \right| & = \frac{1}{l (n + 1)} \left| \sum_{k = d (n + 1) + 1}^{l (n + 1)} \big[ \tau (f \circ S_{n, 1}^{(0)}) - \tau (f \circ S_{n, 1}) \big] \right| \\ & \leq \frac{l (n + 1) - d (n + 1)}{l (n + 1)} \big( 2 \| f \|_{\infty} ) \, . \end{align*} The conclusion follows. \end{proof} We add additional parts to Construction~\ref{Cn_6918_General} and Construction~\ref{Cn_6918_General_Part_1a}. \begin{Construction}\label{Cn_6921_GeneralPart2} Adopt the assumptions and notation of all parts of Construction~\ref{Cn_6918_General} (except (\ref{Cn_6918_General_Agree})), and in addition make the following assumptions and definitions: \begin{enumerate} \setcounter{enumi}{\value{CnsEnumi}} \item\label{Cn_6918_General_Cross} For all $m \in {\mathbb{Z}}_{\geq 0}$, the maps $S_{m, j}^{(0)}, S_{m, j} \colon X_{m + 1} \amalg Y_{m + 1} \to X_m \amalg Y_m$ satisfy \[ S_{m, j}^{(0)} (X_{m + 1}) \S X_m \qquad {\mbox{and}} \qquad S_{m, j}^{(0)} (Y_{m + 1}) \S Y_m \] for $j = 1, 2, \ldots, l (m)$, \[ S_{m, j} (X_{m + 1}) \S X_m \qquad {\mbox{and}} \qquad S_{m, j} (Y_{m + 1}) \S Y_m \] for $j = 1, 2, \ldots, d (m)$, and \[ S_{m, j} (X_{m + 1}) \S Y_m \qquad {\mbox{and}} \qquad S_{m, j} (Y_{m + 1}) \S X_m \] for $j = d (m) + 1, \, d (m) + 2, \, \ldots, \, l (m)$. \item\label{Cn_6918_General_AF} For $m \in {\mathbb{Z}}_{\geq 0}$, define $D_m = M_{r (m)} \oplus M_{r (m)}$. Define $\varphi^{(0)}_{m + 1, m}, \, \varphi_{m + 1, m} \colon D_m \to D_{m + 1}$ by, for $a, b \in M_{r (m)}$, \[ \varphi_{m + 1, m}^{(0)} (a, b) = \big( {\operatorname{diag}} (a, a, \ldots, a), \, {\operatorname{diag}} (b, b, \ldots, b) \big) \] and \[ \varphi_{m + 1, m} (a, b) = \big( {\operatorname{diag}} (a, a, \ldots, a, b, b, \ldots, b), \, {\operatorname{diag}} (b, b, \ldots, b, a, a, \ldots, a) \big) \, , \] in which $a$ occurs $d (m)$ times in the first entry on the right and $k (m)$ times in the second entry, while $b$ occurs $k (m)$ times in the first entry and $d (m)$ times in the second entry. For $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$, define \[ \varphi_{n, m} = \varphi_{n, n - 1} \circ \varphi_{n - 1, \, n - 2} \circ \cdots \circ \varphi_{m + 1, m} \colon D_m \to D_n \, , \] and define $\varphi^{(0)}_{n, m} \colon D_m \to D_n$ similarly. Define the following AF algebras: \[ D = \displaystyle \lim_{\longrightarrow}_m (D_m,\varphi_{m + 1, m} ) \qquad {\mbox{and}} \qquad D^{(0)} = \displaystyle \lim_{\longrightarrow}_m (D_m, \varphi^{(0)}_{m + 1, m} ) \, , \] and for $m \in {\mathbb{Z}}_{> 0}$ let $\varphi_{\infty, m} \colon D_m \to D$ and $\varphi^{(0)}_{\infty, m} \colon D_m \to D^{(0)}$ be the maps associated to these direct limits. \item\label{Cn_6918_General_Map} For $m \in {\mathbb{Z}}_{\geq 0}$, define $\mu_m \colon D_m \to C_m$ as follows. For $a, b \in M_{r (m)}$ let $f \in C (X_m, M_{r (m)})$ and $g \in C (Y_m, M_{r (m)})$ be the constant functions with values $a$ and~$b$. Then set $\mu_m (a, b) = (f, g)$. Further, following Lemma \ref{L_6921_Conseq}(\ref{L_6921_Conseq_Comm}) below, let $\mu \colon D \to C$ and $\mu^{(0)} \colon D^{(0)} \to C^{(0)}$ be the direct limits of the maps~$\mu_m$. \item\label{Cn_6918_General_Flip} For $m \in {\mathbb{Z}}_{\geq 0}$, define $\theta_m \colon D_m \to D_m$ by $\theta_m (a, b) = (b, a)$ for $a, b \in M_{r (m)}$. Further, following Lemma \ref{L_6921_Conseq}(\ref{L_6921_Conseq_Flip}) below, let $\theta \in {\operatorname{Aut}} (D)$ and $\theta^{(0)} \in {\operatorname{Aut}} \bigl( D^{(0)} \bigr)$ be the direct limits of the maps~$\theta_m$. \end{enumerate} \end{Construction} \begin{Lemma}\label{L_6921_Conseq} Under the assumptions of Construction~\ref{Cn_6918_General} (except (\ref{Cn_6918_General_Agree})), Construction~\ref{Cn_6918_General_Part_1a}, and Construction~\ref{Cn_6921_GeneralPart2}, the following hold: \begin{enumerate} \item\label{L_6921_Conseq_Separate} The direct system $\big( (C_n^{(0)})_{n = 0, 1, 2, \ldots}, ( \Gamma^{(0)}_{n, m} )_{0 \leq m \leq n} \big)$ is the direct sum of two direct systems \[ \big( (C (X_n, \, M_{r (n)}))_{n = 0, 1, 2, \ldots}, ( \Gamma^{(0)}_{n, m} |_{C (X_m, \, M_{r (m)})} )_{0 \leq m \leq n} \big) \] and \[ \big( (C (Y_n, \, M_{r (n)}))_{n = 0, 1, 2, \ldots}, ( \Gamma^{(0)}_{n, m} |_{C (Y_m, \, M_{r (m)})} )_{0 \leq m \leq n} \big) \, , \] and $C^{(0)}$ is isomorphic to the direct sum of the direct limits $A$ and $B$ of these systems. \item\label{L_6921_Conseq_Comm} For all $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$, \[ \Gamma_{n, m}^{(0)} \circ \mu_m = \mu_n \circ \varphi_{n, m}^{(0)} \qquad {\mbox{and}} \qquad \Gamma_{n, m} \circ \mu_m = \mu_n \circ \varphi_{n, m} \, . \] Moreover, the maps $\mu_m$ induce unital homomorphism{s} $\mu^{(0)} \colon D^{(0)} \to C^{(0)}$ and $\mu \colon D \to C$, and for all $m \in {\mathbb{Z}}_{\geq 0}$, \[ \Gamma_{\infty, m}^{(0)} \circ \mu_m = \mu^{(0)} \circ \varphi_{\infty, m}^{(0)} \qquad {\mbox{and}} \qquad \Gamma_{\infty, m} \circ \mu_m = \mu \circ \varphi_{\infty, m} \, . \] \item\label{L_6921_Conseq_Flip} For all $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$, \[ \varphi_{n, m}^{(0)} \circ \theta_m = \theta_n \circ \varphi_{n, m}^{(0)} \qquad {\mbox{and}} \qquad \varphi_{n, m} \circ \theta_m = \theta_n \circ \varphi_{n, m} \, . \] The maps $\theta_m$ induce automorphisms $\theta \colon D \to D$ and $\theta^{(0)} \colon D^{(0)} \to D^{(0)}$ such that \[ \varphi_{\infty, m} \circ \theta_m = \theta \circ \varphi_{\infty, m} \qquad {\mbox{and}} \qquad \varphi_{\infty, m}^{(0)} \circ \theta_m = \theta^{(0)} \circ \varphi_{\infty, m}^{(0)} \] for all $m \in {\mathbb{Z}}_{\geq 0}$. \item\label{L_6921_Conseq_Kth} For all $m \in {\mathbb{Z}}_{\geq 0}$, $(\mu_m)_* \colon K_* (D_m) \to K_* (C_m)$ is an isomorphism, and \[ \mu_* \colon K_* (D) \to K_* (C) \qquad {\mbox{and}} \qquad \bigl( \mu^{(0)} \bigr)_* \colon K_* \big( D^{(0)} \big) \to K_* \big( C^{(0)} \big) \] are isomorphisms. \end{enumerate} \end{Lemma} \begin{proof} The fact that all the maps in~(\ref{L_6921_Conseq_Kth}) are isomorphisms on K-theory comes from the assumption that the spaces $X_m$ and $Y_m$ are contractible ((\ref{Cn_6918_General_1a_Xn}) and (\ref{Cn_6918_General_1a_YnIs01}) in Construction~\ref{Cn_6918_General_Part_1a}). Everything else is essentially immediate from the constructions. \end{proof} \section{The main theorem}\label{Sec_Main} We now have the ingredients to deduce the main theorem of this paper, Theorem \ref{T_6922_FlipOfEll}. To state the theorem, we first need to define automorphisms of Elliott invariants, so we need a category in which they lie. For convenience, we restrict to unital $C^*$-algebra{s}, and we give a very basic list of conditions. \begin{Def}\label{D_6921_AbstractEllInv} An {\emph{abstract unital Elliott invariant}} is a tuple $G = \big( G_0, (G_0)_+, g, G_1, K, \rho \big)$ in which $(G_0, (G_0)_+, g)$ is a preordered abelian group with distinguished positive element~$g$, $G_1$ is an abelian group, $K$ is a compact convex set (possibly empty), and $\rho \colon G_0 \to {\operatorname{Aff}} (K)$ is an order preserving group homomorphism{} such that $\rho (g)$ is the constant function~$1$. (If $K = \varnothing$, we take ${\operatorname{Aff}} (K) = \{ 0 \}$, and we take $\rho$ to be the constant function with value~$0$.) If \[ G^{(0)} = \big( G_0^{(0)}, \big( G^{(0)}_0 \big)_+, g^{(0)}, G_1^{(0)}, K^{(0)}, \rho^{(0)} \big) \] and \[ G^{(1)} = \big( G_0^{(1)}, \big( G^{(1)}_0 \big)_+, g^{(1)}, G_1^{(1)}, K^{(1)}, \rho^{(1)} \big) \] are abstract unital Elliott invariants, then a {\emph{morphism}} from $G^{(0)}$ to $G^{(1)}$ is a triple $F = (F_0, F_1, S)$ in which $F_0 \colon G_0^{(0)} \to G_0^{(1)}$ is a group homomorphism{} satisfying \[ F_0 \big( \bigl( G_0^{(0)} \bigr)_{+} \big) \S \bigl( G_0^{(1)} \bigr)_{+} \qquad {\mbox{and}} \qquad F_0 \big( g^{(0)} \big) = g^{(1)} \, , \] $F_1 \colon G_1^{(0)} \to G_1^{(0)}$ is a group homomorphism, and $S \colon K^{(1)} \to K^{(0)}$ is a continuous affine map satisfying \begin{equation}\label{Eq_6922_Compat} \rho^{(1)} (F_0 (\eta)) = \rho^{(0)} (\eta) \circ S \end{equation} for all $\eta \in G_0^{(0)}$. If \[ F^{(0)} \colon G^{(0)} \to G^{(1)} \qquad {\mbox{and}} \qquad F^{(1)} = \big( F_0^{(1)}, F_1^{(1)}, S^{(1)} \big) \colon G^{(1)} \to G^{(2)} \] are morphisms of abstract unital Elliott invariants, then define \[ F^{(1)} \circ F^{(0)} = \big( F_0^{(1)} \circ F_0^{(0)}, \, F_1^{(1)} \circ F_1^{(0)}, \, S^{(0)} \circ S^{(1)} \big) \, . \] (Note: $S^{(0)} \circ S^{(1)}$, not $S^{(1)} \circ S^{(0)}$.) The {\emph{Elliott invariant of a unital $C^*$-algebra~$A$}} is \[ {\operatorname{Ell}} (A) = \big( K_0 (A), \, K_0 (A)_{+}, \, [1], \, K_1 (A), \, {\operatorname{T}} (A), \, \rho_A \big) \, , \] in which $\rho_A \colon K_0 (A) \to {\operatorname{Aff}} ({\operatorname{T}} (A))$ is given by $\rho_A (\eta) (\tau) = \tau_* (\eta)$ for $\eta \in K_0 (A)$ and $\tau \in {\operatorname{T}} (A)$. If $A$ and $B$ are unital $C^*$-algebra{s} and $\varphi \colon A \to B$ is a unital homomorphism, then we define $\varphi_* \colon {\operatorname{Ell}} (A) \to {\operatorname{Ell}} (B)$ to consist of the maps $\varphi_*$ from $K_0 (A)$ to $K_0 (B)$ and from $K_1 (A)$ to $K_1 (B)$, together with the map ${\operatorname{T}} (\varphi)$ of Definition~\ref{N_6919_Traces}. We write it as $(\varphi_{*, 0}, \, \varphi_{*, 1}, \, {\operatorname{T}} (\varphi))$. \end{Def} Definition~\ref{D_6921_AbstractEllInv} is enough to make the abstract unital Elliott invariants into a category such that ${\operatorname{Ell}} (\cdot)$ is a functor from unital $C^*$-algebra{s} and unital homomorphism{s} to abstract unital Elliott invariants. \begin{Thm}\label{T_6922_FlipOfEll} There exists a simple unital separable AH algebra $C$ with stable rank~$1$ and with the following property. There exists an automorphism $F$ of ${\operatorname{Ell}} (C)$ such $F \circ F$ is the identity morphism of ${\operatorname{Ell}} (C)$, but there is no automorphism $\alpha$ of $C$ such that $\alpha_* = F$. \end{Thm} We outline the proof. We make a first pass through Construction~\ref{Cn_6918_General} and Construction~\ref{Cn_6918_General_Part_1a}, without the spaces~$Y_n$, and without specifying the point evaluation maps. This is Construction~\ref{Cn_9104_Half} below. We get a direct system; call its direct limit~${\widetilde{C}}$. Apply Proposition~\ref{P_arbitrary_trace_space} using the sequence of matrix sizes in this system and $K = {\operatorname{T}} \bigl( {\widetilde{C}} \bigr)$. Doing so requires passing to a subsequence of the sequence of matrix sizes. Replace the original system with the corresponding subsystem; Lemma \ref{L_9104_Subsystem} below justifies this. Then make a second pass through Construction~\ref{Cn_6918_General} and Construction~\ref{Cn_6918_General_Part_1a}, taking the spaces $X_n$ and the maps between them from this subsystem and the spaces $Y_n$ and the maps between them from the system gotten from Proposition~\ref{P_arbitrary_trace_space}, as needed substituting appropriate point evaluations for the diagonal entries of the formulas for the maps. This requires sufficiently few changes that, by our work in Section~\ref{Sec_Traces}, the tracial state space remains the same. Therefore the algebra obtained from these constructions has an order two automorphism of its tracial state space which corresponds to exchanging the two rows in the diagram~(\ref{Eq_9Y01_Diagram}). The constructions have been designed so that there is also a corresponding automorphism of the K-theory. Our work in Section~\ref{Sec_Bounds} rules out the possibility of a corresponding automorphism of the algebra, because such an automorphism would necessarily send a particular corner of the algebra to another one with a different radius of comparison. We start with the following construction, which is ``half'' of Construction~\ref{Cn_6918_General}, and gives just the top row of the diagram~(\ref{Eq_9Y01_PrelimDiagram}). \begin{Construction}\label{Cn_9104_Half} We will consider direct systems and their associated direct limits constructed as follows. \begin{enumerate} \item\label{Cn_9104_Half_dn} The sequences $(d (n) )_{n = 0, 1, 2, \ldots}$ and $(k (n) )_{n = 0, 1, 2, \ldots}$ in~${\mathbb{Z}}_{\geq 0}$ are as in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}) and satisfy the condition of Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dnkn}). We further define $(l (n) )_{n = 0, 1, 2, \ldots}$ $(r (n) )_{n = 0, 1, 2, \ldots}$, and $(r (n) )_{n = 0, 1, 2, \ldots}$ as in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}). \item\label{Cn_9104_Half_kappa} Following Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}) and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}), we define \[ \kappa = \inf_{n \in {\mathbb{Z}}_{> 0}} \frac{s (n)}{r (n)} \, , \qquad \omega = \frac{k (1)}{k (1) + d (1)} \, , \qquad {\mbox{and}} \qquad \omega' = \sum_{n = 2}^{\infty} \frac{k (n)}{k (n) + d (n)} \, . \] (These will not be used directly in connection with this direct system.) \item\label{Cn_9104_Half_Spaces} As in Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Xn}), we define compact metric spaces by $X_n = \mathrm{cone} \bigl( (S^2)^{s (n)} \bigr)$ for $n \in {\mathbb{Z}}_{\geq 0}$, and we define maps $Q^{(n)}_j \colon X_{n + 1} \to X_{n}$ for $n \in {\mathbb{Z}}_{\geq 0}$ and $j = 1, 2, \ldots, d (n + 1)$ to be the cones over the projection maps \[ (S^2)^{s (n + 1)} = \bigl( (S^2)^{s (n)} \bigr)^{d (n + 1)} \to (S^2)^{s (n)}. \] \item\label{Cn_9104_Half_Maps} We are given maps $\delta_n \colon C (X_n) \to C (X_{n + 1}, \, M_{l (n + 1)} )$ (as in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Maps}), but with only one summand) which are diagonal, that is, there are continuous maps \[ T_{n, 1}, \, T_{n, 2}, \, \ldots, \, T_{n, l (n + 1)} \colon X_{n + 1} \to X_n \] such that \[ \delta_n (f) = {\operatorname{diag}} \bigl( f \circ T_{n, 1}, \, f \circ T_{n, 2}, \, \ldots, \, f \circ T_{n, l (n + 1)} \bigr) \] for $f \in C (X_n)$. (Compare with Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Diag}).) Moreover, $T_{n, j} = Q^{(n)}_j$ for $j = 1, 2, \ldots, d (n + 1)$. The maps $T_{n, j}$ are unspecified for $j = d (n + 1) + 1, \, d (n + 1) + 2, \, \ldots, \, l (n + 1)$. \item\label{Cn_9104_Half_System} Set $A_n = M_{r (n)} \otimes C ( X_n )$ (like in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Algs}) but with only one summand). Following Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Maps}), set \[ \Delta_{n + 1, \, n} = {\operatorname{id}}_{M_{r (n)}} \otimes \delta_n \colon A_n \to A_{n + 1} \, , \] and for $m, n \in {\mathbb{Z}}_{\geq 0}$ with $m \leq n$, we take \[ \Delta_{n, m} = \Delta_{n, n - 1} \circ \Delta_{n - 1, \, n - 2} \circ \cdots \circ \Delta_{m + 1, m} \colon A_m \to A_n \, . \] \item\label{Cn_9104_Half_Lim} Define $A = \displaystyle \lim_{\longrightarrow}_n A_n$, taken with respect to the maps $\Delta_{n, m}$. For $n \in {\mathbb{Z}}_{\geq 0}$, let $\Delta_{\infty, n} \colon A_n \to A$ be the map associated with the direct limit. \end{enumerate} \end{Construction} To avoid confusing notation, we isolate the following computation as a lemma. \begin{Lemma}\label{L_0722_Comb} Let $n \in {\mathbb{Z}}_{> 0}$ and let $\kappa_1, \kappa_2, \ldots, \kappa_n, \delta_1, \delta_2, \ldots, \delta_n \in (0, \infty)$. Then \[ \sum_{j = 1}^n \frac{\kappa_j}{\delta_j + \kappa_j} \geq \frac{\prod_{j = 1}^n (\delta_j + \kappa_j) - \prod_{j = 1}^n \delta_j}{ \prod_{j = 1}^n (\delta_j + \kappa_j)}. \] \end{Lemma} \begin{proof} For $j = 1, 2, \ldots, n$ define \[ \lambda_j = \frac{\kappa_j}{\delta_j + \kappa_j}. \] Then $\lambda_j \in (0, 1)$. Some calculation shows that the conclusion of the lemma becomes \begin{equation}\label{Eq_0722_Lambda} \sum_{j = 1}^n \lambda_j \geq 1 - \prod_{j = 1}^n (1 - \lambda_j). \end{equation} We prove~(\ref{Eq_0722_Lambda}) by induction on~$n$. For $n = 1$ it is trivial. Suppose~(\ref{Eq_0722_Lambda}) is known for some value of~$n$. Given $\lambda_1, \lambda_2, \ldots, \lambda_{n + 1} \in (0, 1)$, set $\mu = 1 - (1 - \lambda_n) (1 - \lambda_{n + 1} )$. Then \[ \mu \in (0, 1) \qquad {\mbox{and}} \qquad \mu = \lambda_n + \lambda_{n + 1} - \lambda_n \lambda_{n + 1} \leq \lambda_n + \lambda_{n + 1}. \] Applying the induction hypothesis on $\lambda_1, \lambda_2, \ldots, \lambda_{n - 1}, \mu$ at the second step, we then have \[ \sum_{j = 1}^{n + 1} \lambda_j \geq \sum_{j = 1}^{n - 1} \lambda_j + \mu \geq 1 - \Biggl[ \prod_{j = 1}^{n - 1} (1 - \lambda_j) \Biggr] (1 - \mu) = 1 - \prod_{j = 1}^{n + 1} (1 - \lambda_j). \] This completes the induction, and the proof of the lemma. \end{proof} \begin{Lemma}\label{L_9104_Subsystem} Let a direct system as in Construction~\ref{Cn_9104_Half} be given, but using sequences $\bigl( {\widetilde{d}} (n) \bigr)_{n = 0, 1, 2, \ldots}$ and $\bigr( {\widetilde{k}} (n) \bigr)_{n = 0, 1, 2, \ldots}$ in place of $(d (n) )_{n = 0, 1, 2, \ldots}$ and $(k (n) )_{n = 0, 1, 2, \ldots}$. Denote the additional sequences analogous to those in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_dn}) by ${\widetilde{l}}$, ${\widetilde{r}}$, and~${\widetilde{s}}$. Denote the numbers analogous to those in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_kappa}) by ${\widetilde{\kappa}}$, ${\widetilde{\omega}}$, and~${\widetilde{\omega}}'$. Denote the spaces used in the system by ${\widetilde{X}}_{n}$. Let $\nu \colon {\mathbb{Z}}_{\geq 0} \to {\mathbb{Z}}_{\geq 0}$ be a strictly increasing function such that $\nu (0) = 0$ and $\nu (1) = 1$. Then the direct system $\bigl( C \bigl( {\widetilde{X}}_{\nu (m)}, \, M_{{\widetilde{r}} (\nu (m))} \bigr) \bigr)_{m = 0, 1, 2, \ldots}$ is isomorphic to a system as in Construction \ref{Cn_9104_Half}, with the choices $d (0) = 1$, $k (0) = 0$, \begin{equation}\label{Eq_0722_dm} d (m) = {\widetilde{d}} \bigl( \nu (m - 1) + 1 \bigr) {\widetilde{d}} \bigl( \nu (m - 1) + 2 \bigr) \cdots {\widetilde{d}} \bigl( \nu (m) \bigr) \end{equation} and \begin{equation}\label{Eq_0722_km_Form} k (m) = {\widetilde{l}} \bigl( \nu (m - 1) + 1 \bigr) {\widetilde{l}} \bigl( \nu (m - 1) + 2 \bigr) \cdots {\widetilde{l}} \bigl( \nu (m) \bigr) - d (m) \end{equation} for $m \in {\mathbb{Z}}_{> 0}$. Moreover, following the notation of Construction \ref{Cn_9104_Half}, \begin{equation}\label{Eq_0723_lm_is_prod} l (m) = {\widetilde{l}} \bigl( \nu (m - 1) + 1 \bigr) {\widetilde{l}} \bigl( \nu (m - 1) + 2 \bigr) \cdots {\widetilde{l}} \bigl( \nu (m) \bigr), \end{equation} \[ r (m) = {\widetilde{r}} \bigl( \nu (m) \bigr), \qquad {\mbox{and}} \qquad s (m) = {\widetilde{s}} \bigl( \nu (m) \bigr) \] for $m \in {\mathbb{Z}}_{\geq 0}$, and \[ \kappa = {\widetilde{\kappa}}, \qquad \omega = {\widetilde{\omega}}, \qquad {\mbox{and}} \qquad \omega' \leq {\widetilde{\omega}}'. \] \end{Lemma} \begin{proof} Given the definitions of $d$ and~$k$, the proofs of the formulas for $l$, $r$, and~$s$ are easy. Using Lemma~\ref{L_6922_Noninc} at the first and fourth steps, we now get \[ {\widetilde{\kappa}} = \lim_{n \to \infty} \frac{{\widetilde{s}} (n)}{{\widetilde{r}} (n)} = \lim_{m \to \infty} \frac{{\widetilde{r}} \bigl( \nu (m) \bigr)}{ {\widetilde{s}} \bigl( \nu (m) \bigr)} = \lim_{m \to \infty} \frac{s (m)}{r (m)} = \kappa. \] We have $\omega = {\widetilde{\omega}}$ because $\nu (1) = 1$. Using Lemma~\ref{L_0722_Comb} at the second step and (\ref{Eq_0722_dm}), (\ref{Eq_0722_km_Form}) and~(\ref{Eq_0723_lm_is_prod}) at the third step, we have \begin{align*} {\widetilde{\omega}}' & = \sum_{m = 2}^{\infty} \sum_{j = \nu (m - 1) + 1}^{\nu (m)} \frac{{\widetilde{k}} (j)}{{\widetilde{k}} (j) + {\widetilde{d}} (j)} \\ & \geq \sum_{m = 2}^{\infty} \frac{\prod_{j = \nu (m - 1) + 1}^{\nu (m)} [{\widetilde{d}} (j) + {\widetilde{k}} (j)] - \prod_{j = \nu (m - 1) + 1}^{\nu (m)} {\widetilde{d}} (j)}{ \prod_{j = \nu (m - 1) + 1}^{\nu (m)} [{\widetilde{d}} (j) + {\widetilde{k}} (j)]} \\ & = \sum_{m = 2}^{\infty} \frac{k (m)}{k (m) + d (m)} = \omega'. \end{align*} Define $X_m = {\widetilde{X}}_{\nu (m)}$ for $m \in {\mathbb{Z}}_{\geq 0}$. Clearly $X_m = \mathrm{cone} \bigl( (S^2)^{s (m)} \bigr)$, as required. Denote the maps in the system of the hypotheses by \[ {\widetilde{\delta}}_n \colon C \bigl( {\widetilde{X}}_{n} \bigr) \to C ({\widetilde{X}}_{n + 1}, \, M_{{\widetilde{l}} (n + 1)} \bigr) \qquad {\mbox{and}} \qquad {\widetilde{\Delta}}_{n, m} \colon {\widetilde{C}}_{m} \to {\widetilde{C}}_{n}, \] with ${\widetilde{\delta}}_n$ being built using maps \[ {\widetilde{T}}_{n, 1}, \, {\widetilde{T}}_{n, 2}, \, \ldots, \, {\widetilde{T}}_{n, \, l (n + 1)} \colon {\widetilde{X}}_{n + 1} \to {\widetilde{X}}_{n}, \] as in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_Maps}). For $p = \nu (m), \, \nu (m) + 1, \, \ldots, \, \nu (m + 1) - 1$, set \[ j (p) = \frac{{\widetilde{r}} (p)}{{\widetilde{r}} (\nu (m))} = {\widetilde{l}} \bigl( \nu (m) + 1 \bigr) {\widetilde{l}} \bigl( \nu (m) + 2 \bigr) \cdots {\widetilde{l}} (p). \] Then define \[ \delta^{(0)}_m \colon C \bigl( {\widetilde{X}}_{\nu (m)} \bigr) \to C ({\widetilde{X}}_{\nu (m + 1)}, \, M_{l (n + 1)} \bigr) \] by \[ \delta^{(0)}_m = {\operatorname{id}}_{M_{j (\nu (m + 1) - 1)}} \otimes {\widetilde{\delta}}_{\nu (m + 1) - 1} \circ {\operatorname{id}}_{M_{j (\nu (m + 1) - 2)}} \otimes {\widetilde{\delta}}_{\nu (m + 1) - 2} \circ \cdots \circ {\widetilde{\delta}}_{\nu (m)}. \] (In the last term we omit ${\operatorname{id}}_{M_{j (\nu (m))}}$ since $j (\nu (m)) = 1$.) With this definition, one checks that ${\operatorname{id}}_{M_{{\widetilde{r}} (\nu (m))}} \otimes {\widetilde{\delta}}_m = {\widetilde{\Delta}}_{ \nu (m + 1), \, \nu (m) }$, so that the direct system gotten using the maps $\delta^{(0)}_m$ in Construction~\ref{Cn_9104_Half} is a subsystem of the system given in the hypotheses. We claim that $\delta^{(0)}_m$ is unitarily equivalent to a map $\delta_m \colon C ( X_{m} ) \to C (X_{m + 1}, \, M_{l (n + 1)} \bigr)$ as in Construction~\ref{Cn_9104_Half}. This will imply isomorphism of the direct systems, and complete the proof of the lemma. First, $\delta^{(0)}_m$ is given as in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_Maps}) using some maps from ${\widetilde{X}}_{\nu (m + 1)}$ to ${\widetilde{X}}_{\nu (m)}$, namely all possible compositions \[ {\widetilde{T}}_{\nu (m), \, i_{\nu (m)}} \circ {\widetilde{T}}_{\nu (m) + 1, \, i_{\nu (m) + 1}} \circ \cdots \circ {\widetilde{T}}_{\nu (m + 1) - 1, \, i_{\nu (m + 1) - 1}} \] with $i_p = 1, 2, \ldots, {\widetilde{l}} (p + 1)$ for $p = \nu (m), \, \nu (m) + 1, \, \ldots, \nu (m + 1) - 1$. Moreover, since the composition of projection maps is a projection map, restricting to $i_p = 1, 2, \ldots, {\widetilde{d}} (p + 1)$ for all~$p$ gives exactly all the maps $Q^{(m)}_j \colon X_{m + 1} \to X_m$ for $j = 1, 2, \ldots, d (n + 1)$. Therefore $\delta^{(0)}_m$ is unitarily equivalent to a map as in Construction~\ref{Cn_9104_Half} by a permutation matrix. \end{proof} \begin{proof}[Proof of Theorem~\ref{T_6922_FlipOfEll}] Choose $N \in {\mathbb{Z}}_{> 0}$ such that \begin{equation}\label{Eq_0722_ChooseN} N > 5 \qquad {\mbox{and}} \qquad \exp \left( - \frac{1}{N - 1} \right) > \frac{3}{4}. \end{equation} (For example, $N = 6$ will work.) We make preliminary choices of the numbers $d (n)$ etc.\ in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_dn}), calling them ${\widetilde{d}} (n)$ etc. Take ${\widetilde{d}} (0) = 1$ and ${\widetilde{k}} (0) = 0$, and take ${\widetilde{d}} (n) = N^n$ and ${\widetilde{k}} (n) = 1$ for $n \in {\mathbb{Z}}_{> 0}$. Then \[ {\widetilde{l}} (n) = N^n + 1, \qquad {\widetilde{r}} (n) = \prod_{j = 1}^n (N^j + 1), \qquad {\mbox{and}} \qquad {\widetilde{s}} (n) = \prod_{j = 1}^n N^j \] for $n \in {\mathbb{Z}}_{> 0}$. We obtain numbers as in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_kappa}) (equivalently, Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}) and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp})), which we call ${\widetilde{\kappa}}$, ${\widetilde{\omega}}$, and ${\widetilde{\omega}}'$. Further, adopt the definitions and notation of Construction \ref{Cn_9104_Half}, except that we use ${\widetilde{X}}_n$ instead of~$X_n$ and similarly throughout. That is, in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_Spaces}) we call the spaces ${\widetilde{X}}_n$ instead of~$X_n$, the projection maps ${\widetilde{Q}}_j^{(n)}$, in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_Maps}) we call the maps of algebras ${\widetilde{\delta}}_n$ and the maps of spaces ${\widetilde{T}}_{n, j} \colon {\widetilde{X}}_{n + 1} \to {\widetilde{X}}_{n}$, in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_System}) we call the algebras ${\widetilde{A}}_n$ and the maps ${\widetilde{\Delta}}_{n, m}$, and in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_Lim}) we call the direct limit~${\widetilde{A}}$ and the maps to it ${\widetilde{\Delta}}_{\infty, n}$. As in Construction \ref{Cn_9104_Half}(\ref{Cn_9104_Half_Maps}), we take ${\widetilde{T}}_{n, j} = {\widetilde{Q}}^{(n)}_j$ for $j = 1, 2, \ldots, {\widetilde{d}} (n + 1)$. For $n \in {\mathbb{Z}}_{\geq 0}$ choose an arbitrary point ${\widetilde{x}}_{n} \in {\widetilde{X}}_n$, and for $j = {\widetilde{d}} (n + 1) + 1$ let ${\widetilde{T}}_{n, j}$ be the constant function on ${\widetilde{X}}_{n + 1}$ with value ${\widetilde{x}}_{n}$. (Note that ${\widetilde{d}} (n + 1) + 1 = {\widetilde{l}} (n + 1)$.) We claim that the conditions in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}), Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}), and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_kpom}) are satisfied, and moreover that \[ \frac{1}{1 - 2 {\widetilde{\omega}}} < \frac{2 {\widetilde{\kappa}} - 1}{2 {\widetilde{\omega}}} \, . \] For $n \in {\mathbb{Z}}_{> 0}$ we have, using $\log (m + 1) - \log (m) < \frac{1}{m}$ at the third step, \begin{align*} \frac{{\widetilde{s}} (n)}{{\widetilde{r}} (n)} & = \prod_{j = 1}^n \frac{N^j}{N^j + 1} = \exp \Biggl( \sum_{j = 1}^n - \big[ \log (N^j + 1) - \log (N^j) \big] \Biggr) \\ & \geq \exp \Biggl( - \sum_{j = 1}^n \frac{1}{N^j} \Biggr) > \exp \left( - \frac{1}{N - 1} \right) \, . \end{align*} So ${\widetilde{\kappa}} \geq \exp \left( - \frac{1}{N - 1} \right) > \frac{3}{4}$ by~(\ref{Eq_0722_ChooseN}). Moreover, \[ {\widetilde{\omega}} = \frac{1}{N + 1} < \frac{1}{4} \qquad {\mbox{and}} \qquad {\widetilde{\omega}}' = \sum_{j = 2}^{\infty} \frac{1}{N^j + 1} < \sum_{j = 2}^{\infty} \frac{1}{N^j} = \frac{1}{N (N - 1)} \, , \] so the conditions ${\widetilde{\omega}}' < {\widetilde{\omega}} < \frac{1}{2}$ in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}) and $2 {\widetilde{\kappa}} - 1 > 2 {\widetilde{\omega}}$ in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_kpom}) are satisfied. Moreover, \[ \frac{1}{1 - 2 {\widetilde{\omega}}} = \frac{N + 1}{N - 1} < \frac{N + 1}{4} = \frac{1}{4 {\widetilde{\omega}}} = \frac{2 \left( \frac{3}{4} \right) - 1}{2 {\widetilde{\omega}}} < \frac{2 {\widetilde{\kappa}} - 1}{2 {\widetilde{\omega}}} \, . \] The claim is proved. Apply Proposition~\ref{P_arbitrary_trace_space} with $K = {\operatorname{T}} \bigl( {\widetilde{A}} \bigr)$ and with ${\widetilde{l}} (n)$ and ${\widetilde{r}} (n)$ in place of $l (n)$ and $r (n)$, getting a strictly increasing sequence, which we call $(\nu (n))_{n = 0, 1, 2, \ldots}$, with $\nu (j) = j$ for $j = 0, 1$, an AI~algebra $B_0$ (called $A$ in Proposition~\ref{P_arbitrary_trace_space}) which is the direct limit of a unital system \[ C ([0, 1]) \otimes M_{r (\nu (0))} \overset{\alpha_{1, 0}}{\longrightarrow} C ([0, 1]) \otimes M_{r (\nu (1))} \overset{\alpha_{2, 1}}{\longrightarrow} C ([0, 1]) \otimes M_{r (\nu (2))} \overset{\alpha_{3, 2}}{\longrightarrow} \cdots \] with injective diagonal maps $\alpha_{n + 1, \, n}$ given by \[ f \mapsto {\operatorname{diag}} \big( f \circ R_{n, 1}, \, f \circ R_{n, 2}, \, \ldots, \, f \circ R_{n, \, r (\nu_{n + 1}) / r (\nu_{n})} \big) \] for continuous{} functions \[ R_{n, 1}, R_{n, 2}, \ldots, R_{n, \, r (\nu (n + 1)) / r (\nu (n))} \colon [0, 1] \to [0, 1] \, , \] and an isomorphism ${\operatorname{T}} (B_0) \to {\operatorname{T}} \bigl( {\widetilde{A}} \bigr)$. Apply Lemma~\ref{L_9104_Subsystem} with this choice of~$\nu$. Define the sequences $(d (n) )_{n = 0, 1, 2, \ldots}$ and $(k (n) )_{n = 0, 1, 2, \ldots}$ as in Lemma~\ref{L_9104_Subsystem}, and then make all the definitions in Construction \ref{Cn_6918_General} and \ref{Cn_6918_General_Part_1a}. (Some are also given in the statement of Lemma~\ref{L_9104_Subsystem}.) Then, as in the proof of Lemma~\ref{L_9104_Subsystem}, $X_n = {\widetilde{X}}_{\nu (n)}$. We make the following choices for the unspecified objects in these constructions. We choose points $x_n \in X_n$ and $y_n \in [0, 1]$ for $n \in {\mathbb{Z}}_{\geq 0}$ such that the conditions in Construction \ref{Cn_6918_General_Part_1a}(\ref{condition-points-dense}) and Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_yn}) are satisfied. (It is easy to see that this can be done.) Use these points in Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Maps_XHigh}) and Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Maps_YTop}). Take the maps \[ R_{n, 1}, \, R_{n, 2}, \, \ldots, \, R_{n, \, d (n + 1)} \colon Y_{n + 1} \to Y_n \] in Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_6918_General_1a_Maps_YBottom}) to be those from the application of Proposition \ref{P_arbitrary_trace_space} above. For $j = 1, \, 2, \, \ldots, \, l (n + 1)$, let $S_{n, j}^{(0)} |_{X_{n + 1}} \colon X_{n + 1} \to X_n$ be the maps in the system obtained from Lemma~\ref{L_9104_Subsystem}, and take $S_{n, j}^{(0)} |_{Y_{n + 1}} = R_{n, j}$. The requirement $S_{n, j}^{(0)} = S_{n, j}$ for $j = 1, 2, \ldots, d (n + 1)$ in Construction \ref{Cn_6918_General_Part_1a}(\ref{Cn_9Y01_Gen_1a_Maps2}) is then satisfied, so that the condition in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Agree}) is also satisfied. Moreover, with these choices, the conditions in Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_Cross}) are satisfied. By Lemma~\ref{L_9104_Subsystem}, the numbers $\kappa$, $\omega$, and~$\omega'$ from Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}) and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}) satisfy \[ \kappa = {\widetilde{\kappa}}, \qquad \omega = {\widetilde{\omega}}, \qquad {\mbox{and}} \qquad \omega' \leq {\widetilde{\omega}}'. \] Therefore $\kappa > \frac{1}{2}$, $\omega' < \omega < \frac{1}{2}$, and $2 \kappa - 1 > 2 \omega$, as required in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_Size}), Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_rrp}), and Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_kpom}); moreover \begin{equation}\label{Eq_0724_omkpRel} \frac{1}{1 - 2 \omega} < \frac{2 \kappa - 1}{2 \omega} \, . \end{equation} The algebra~$C$ is simple by Lemma~\ref{L_0725_Simplicity}. The algebras $A$ and $B$ of Lemma~\ref{L_6921_Conseq}(\ref{L_6921_Conseq_Separate}) are now $A = {\widetilde{A}}$ and $B = B_0$, so that $C^{(0)}$, as in Construction \ref{Cn_6918_General}(\ref{Cn_6918_General_2nd}), is isomorphic to ${\widetilde{A}} \oplus B_0$. The isomorphism ${\operatorname{T}} (B_0) \to {\operatorname{T}} \bigl( {\widetilde{A}} \bigr)$ gives an isomorphism $\zeta^{(0)}_0 \colon {\operatorname{Aff}} ({\operatorname{T}} (A)) \to {\operatorname{Aff}} ({\operatorname{T}} (B))$. This provides an automorphism of ${\operatorname{Aff}} ({\operatorname{T}} (A)) \oplus {\operatorname{Aff}} ({\operatorname{T}} (B))$, given by \[ (f, g) \mapsto \bigl( \bigl(\zeta^{(0)}_0 \bigr)^{-1} (g), \, \zeta^{(0)}_0 (f) \bigr) \, . \] Let $\zeta^{(0)}$ be the corresponding automorphism of ${\operatorname{Aff}} ({\operatorname{T}} (A \oplus B)) = {\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( C^{(0)} \bigr) \bigr)$ gotten using Lemma~\ref{L_6921_DSumTraces}. Clearly $\zeta^{(0)} \circ \zeta^{(0)}$ is the identity map on ${\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( C^{(0)} \bigr) \bigr)$. Adopt the notation of Construction \ref{Cn_6921_GeneralPart2}: $C$ and $C^{(0)}$ are as already described, $D$ and $D^{(0)}$ are the AF~algebras from Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_AF}), $\mu \colon D \to C$ and $\mu^{(0)} \colon D^{(0)} \to C^{(0)}$ are the maps of Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_Map}) (which are isomorphisms on K-theory by Lemma \ref{L_6921_Conseq}(\ref{L_6921_Conseq_Kth})), and $\theta \in {\operatorname{Aut}} (D)$ and $\theta^{(0)} \in {\operatorname{Aut}} \bigl( D^{(0)} \bigr)$ are as in Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_Flip}). Define $E = \displaystyle \lim_{\longrightarrow}_n M_{r (m)}$, with respect to the maps $a \mapsto {\operatorname{diag}} (a, a, \ldots, a)$, with $a$ repeated $l (n)$ times. The direct system defining $D^{(0)}$ is the direct sum of two copies of the direct system just defined, so \[ D^{(0)} \cong E \oplus E \qquad {\mbox{and}} \qquad {\operatorname{Aff}} \bigl({\operatorname{T}} \bigl( D^{(0)} \bigr) \bigr) \cong {\operatorname{Aff}} ({\operatorname{T}} (E \oplus E)). \] Since $E$ is a UHF~algebra, we have ${\operatorname{Aff}} ({\operatorname{T}} (E)) \cong {\mathbb{R}}$ with the usual order and order unit~$1$. Using ${\operatorname{id}}_{{\operatorname{Aff}} ({\operatorname{T}} (E))}$ in place of $\zeta^{(0)}_0$ above, we get an automorphism of ${\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( D^{(0)} \bigr) \bigr)$. But this automorphism is just~${\widehat{\theta^{(0)}}}$. We claim that $\zeta^{(0)} \circ {\widehat{\mu^{(0)}}} = {\widehat{\mu^{(0)}}} \circ {\widehat{\theta^{(0)}}}$. To prove the claim, we work with \[ {\operatorname{Aff}} ({\operatorname{T}} (E)) \oplus {\operatorname{Aff}} ({\operatorname{T}} (E)) \qquad {\mbox{and}} \qquad {\operatorname{Aff}} ({\operatorname{T}} (A)) \oplus {\operatorname{Aff}} ({\operatorname{T}} (B)) \] in place of ${\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( D^{(0)} \bigr) \bigr)$ and ${\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( C^{(0)} \bigr) \bigr)$, but keep the same names for the maps. Since $\mu^{(0)} \colon E \oplus E \to A \oplus B$ is the direct sum of unital maps from the first summand to~$A$ and the second summand to~$B$, the map ${\widehat{\mu^{(0)}}}$ is similarly a direct sum of maps ${\operatorname{Aff}} ({\operatorname{T}} (E)) \to {\operatorname{Aff}} ({\operatorname{T}} (A))$ and ${\operatorname{Aff}} ({\operatorname{T}} (E)) \to {\operatorname{Aff}} ({\operatorname{T}} (B))$. Let $e$ and $f$ be the order units of ${\operatorname{Aff}} ({\operatorname{T}} (A))$ and ${\operatorname{Aff}} ({\operatorname{T}} (B))$. The unique positive order unit preserving maps ${\operatorname{Aff}} ({\operatorname{T}} (E)) \to {\operatorname{Aff}} ({\operatorname{T}} (A))$ and ${\operatorname{Aff}} ({\operatorname{T}} (E)) \to {\operatorname{Aff}} ({\operatorname{T}} (B))$ are $\alpha \mapsto \alpha e$ and $\beta \mapsto \beta f$ for $\alpha, \beta \in {\mathbb{R}}$. Therefore ${\widehat{\mu^{(0)}}} (\alpha, \beta) = (\alpha e, \beta f)$. Since $\zeta_0^{(0)}$ is order unit preserving, we have $\zeta_0^{(0)} (e) = f$, so \[ \zeta^{(0)} (\alpha e, \beta f) = (\beta e, \alpha f) = {\widehat{\mu^{(0)}}} (\beta, \alpha) = \bigl( {\widehat{\mu^{(0)}}} \circ {\widehat{\theta^{(0)}}} \bigr) (\alpha, \beta) \, . \] The claim follows. Using conditions (\ref{Cn_6918_General_rrp}) and~(\ref{Cn_6918_General_Agree}) in Construction~\ref{Cn_6918_General}, Lemma~\ref{L_6919_IfAgreeTodn}, and Proposition~\ref{P_6917_CStLim}, we get isomorphisms \[ \rho \colon {\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( D^{(0)} \bigr) \bigr) \to {\operatorname{Aff}} ({\operatorname{T}} (D)) \qquad {\mbox{and}} \qquad \sigma \colon {\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( C^{(0)} \bigr) \bigr) \to {\operatorname{Aff}} ({\operatorname{T}} (C)) \] such that ${\widehat{\mu}} \circ \rho = \sigma \circ {\widehat{\mu^{(0)}}}$. Define \[ \eta = \rho \circ {\widehat{\theta^{(0)}}} \circ \rho^{-1} \in {\operatorname{Aut}} \big( {\operatorname{Aff}} ({\operatorname{T}} (D)) \big) \quad {\mbox{and}} \quad \zeta = \sigma \circ \zeta^{(0)} \circ \sigma^{-1} \in {\operatorname{Aut}} \big( {\operatorname{Aff}} ({\operatorname{T}} (C)) \big) \, . \] A calculation now shows that the claim above implies \begin{equation}\label{Eq_6922_PreCDiag} \zeta \circ {\widehat{\mu}} = {\widehat{\mu}} \circ \eta. \end{equation} We also have $\zeta \circ \zeta = {\operatorname{id}}_{{\operatorname{Aff}} ({\operatorname{T}} (C))}$. We want to apply Proposition~\ref{P_6917_CStLim} with $D_n$ and $\varphi_{n, m}$ as in Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_AF}), and $\varphi_{n, m}^{(0)}$ as there in place of $\varphi_{n, m}'$, so that $D$ and $D^{(0)}$ are as already given, with $C_n = D_n$ for all $n \in {\mathbb{Z}}_{\geq 0}$ and $\psi_{n, m} = \varphi_{n, m}$ and $\psi_{n, m}' = \varphi_{n, m}$ for all $m$ and~$n$, and with $\theta_n$, $\theta_n^{(0)}$, $\theta$, and $\theta^{(0)}$ from Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_Flip}) in place of $\mu_n$, $\mu_n'$, $\mu$, and $\mu'$. As before, this application is justified by conditions (\ref{Cn_6918_General_rrp}) and~(\ref{Cn_6918_General_Agree}) in Construction~\ref{Cn_6918_General}, and Lemma~\ref{L_6919_IfAgreeTodn}. The outcome is an isomorphism $\rho' \colon {\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( D^{(0)} \bigr) \bigr) \to {\operatorname{Aff}} ({\operatorname{T}} (D))$ such that \begin{equation}\label{Eq_0724_rhPrime} {\widehat{\theta}} = \rho' \circ {\widehat{\theta^{(0)}}} \circ (\rho')^{-1}. \end{equation} We claim that $\eta = {\widehat{\theta}}$. The ``right'' way to do this is presumably to show that $\rho' = \rho$ above, but the following argument is easier to write. We have \[ {\operatorname{Aff}} ({\operatorname{T}} (D)) \cong {\operatorname{Aff}} \bigl( {\operatorname{T}} \bigl( D^{(0)} \bigr) \bigr) \cong {\mathbb{R}}^2, \] with order $(\alpha, \beta) \geq 0$ if and only if{} $\alpha \geq 0$ and $\beta \geq 0$ and order unit $(1, 1)$. Since the state space $S ({\mathbb{R}}^2)$ of ${\mathbb{R}}^2$ with this order unit space structure is an interval, and automorphisms of order unit spaces preserve the extreme points of the state space, there is only one possible action of a nontrivial automorphism of ${\mathbb{R}}^2$ on $S ({\mathbb{R}}^2)$. Theorem~\ref{T_7701_AffKToK} implies that ${\mathbb{R}}^2 \cong {\operatorname{Aff}} (S ({\mathbb{R}}^2))$, so there is only one nontrivial automorphism of ${\mathbb{R}}^2$. Since ${\widehat{\theta^{(0)}}}$ is nontrivial, so is ${\widehat{\theta}}$ by~(\ref{Eq_0724_rhPrime}), and so is $\eta$ by its definition. The claim follows. The claim and~(\ref{Eq_6922_PreCDiag}) imply \begin{equation}\label{Eq_6922_CDiag} \zeta \circ {\widehat{\mu}} = {\widehat{\mu}} \circ {\widehat{\theta}}. \end{equation} Passing to state spaces and applying Theorem~\ref{T_7701_AffKToK}, we get an affine homeomorphism $H \colon {\operatorname{T}} (C) \to {\operatorname{T}} (C)$ such that $\zeta (f) = f \circ H$ for all $f \in {\operatorname{Aff}} ({\operatorname{T}} (C))$, and moreover $H \circ H = {\operatorname{id}}_{{\operatorname{T}} (C)}$. By Lemma~\ref{L_6921_Conseq}(\ref{L_6921_Conseq_Kth}), the expression $\mu_* \circ \theta_* \circ (\mu_*)^{-1}$ is a well defined automorphism of $K_* (C)$, of order~$2$. We claim that $F = \big( \mu_* \circ \theta_* \circ (\mu_*)^{-1}, \, H)$ is an order~$2$ automorphism of ${\operatorname{Ell}} (C)$. We use the notation of Definition~\ref{D_6921_AbstractEllInv} for the Elliott invariant of a $C^*$-algebra; in particular, $\rho_C$ and $\rho_D$ are not related to the maps $\rho$ and $\rho'$ above. The only part needing work is the compatibility condition~(\ref{Eq_6922_Compat}) in Definition~\ref{D_6921_AbstractEllInv}, which amounts to showing that \[ \rho_{C} \circ \mu_* \circ \theta_* \circ (\mu_*)^{-1} = \zeta \circ \rho_{C} \, . \] To see this, we calculate, using at the second and last steps the notation of Definition~\ref{N_6919_Traces} and the fact that the morphisms of Elliott invariants defined by $\mu$ and $\theta$ satisfy~(\ref{Eq_6922_Compat}) in Definition~\ref{D_6921_AbstractEllInv}, and using (\ref{Eq_6922_CDiag}) at the third step, \begin{align*} \zeta \circ \rho_{C} & = \zeta \circ \rho_{C} \circ \mu_* \circ (\mu_*)^{-1} = \zeta \circ {\widehat{\mu}} \circ \rho_{D} \circ (\mu_*)^{-1} \\ & = {\widehat{\mu}} \circ {\widehat{\theta}} \circ \rho_{D} \circ (\mu_*)^{-1} = \rho_{C} \circ \mu_* \circ \theta_* \circ (\mu_*)^{-1} \, , \end{align*} as desired. Thus, we have constructed an automorphism $F$ of ${\operatorname{Ell}} (C)$ of order~$2$. It remains to show that $F$ is not induced by any automorphism of~$C$. Using~(\ref{Eq_6922_CDiag}) on the last components, one easily sees that $F \circ \mu_* = \mu_* \circ \theta_*$. Let $q$ and $q^{\perp}$ be as in Notation \ref{notation-q-q-perp}. In the construction of $D$ as in Construction \ref{Cn_6921_GeneralPart2}(\ref{Cn_6918_General_AF}), set $e = \varphi_{\infty,1}((1,0))$ and $e^{\perp} = 1 - e = \varphi_{\infty,1}((0,1))$. Then $\theta (e) = e^{\perp}$, $\mu (e) = q$, and $\mu(e^{\perp}) = q^{\perp}$. Therefore $F ([q]) = [q^{\perp}]$. Suppose now that there exists an automorphism $\alpha$ such that $\alpha_* = F$. Then $[\alpha (q)] = [q^{\perp}]$. By Lemma \ref{lemma-stable-rank-1}, $\alpha (q)$ is unitarily equivalent to $q^{\perp}$. Let $u$ be a unitary such that $u\alpha (q)u^* = q^{\perp}$. Thus, since $\alpha(q A q) = \alpha (q)A\alpha (q) = u^* q^{\perp} A q^{\perp} u$, it follows that the $q A q$ and $q^{\perp} A q^{\perp}$ have the same radius of comparison. By~(\ref{Eq_0724_omkpRel}), this contradicts Lemmas \ref{Lemma:rc_lower_bound} and~\ref{Lemma:rc-upper-bound}. \end{proof} \begin{rmk}\label{R_0727_DontNeedKThy} One can easily check that, with $C$ as in the proof of Theorem~\ref{T_6922_FlipOfEll}, there is a unique automorphism of ${\operatorname{Ell}} (C)$ whose component automorphism of the tracial state space is as in the proof. Therefore the conclusion can be slightly strengthened: there is an automorphism of ${\operatorname{T}} (C)$ which is compatible with an automorphism of ${\operatorname{Ell}} (C)$ but which is not induced by any automorphism of~$C$. \end{rmk} \begin{qst}\label{Q_7816_DynEx} Does there exist a compact metric space~$X$ and a minimal homeomorphism{} $h \colon X \to X$ such that the crossed product $C^* ({\mathbb{Z}}, X, h)$ has the same features as the example we construct here? \end{qst} \begin{qst}[Blackadar]\label{Q_7910_NotOrder2} Does there exist a simple separable stably finite unital nuclear $C^*$-algebra~$C$ and an automorphism $F$ of ${\operatorname{Ell}} (C)$ such that: \begin{enumerate} \item\label{Item_Q_7910_NotOrder2_FF} $F \circ F$ is the identity morphism of ${\operatorname{Ell}} (C)$. \item\label{Item_Q_7910_NotOrder2_alpha} There is an automorphism $\alpha$ of $C$ such that $\alpha_* = F$. \item\label{Item_Q_7910_NotOrder2_noalpha2} There is no $\alpha$ as in~(\ref{Item_Q_7910_NotOrder2_alpha}) which in addition satisfies $\alpha \circ \alpha = {\operatorname{id}}_C$. \end{enumerate} Can such an algebra be chosen to be AH and have stable rank~$1$? \end{qst} Our method of proof suggests that, instead of being just a number, the radius of comparison should be taken to be a function from $V (A)$ to $[0, \infty]$. If one uses the generalization to nonunital algebras in \cite[Section 3.3]{BRTTW}, one could presumably even get a function from ${\operatorname{Cu}} (A)$ to $[0, \infty]$. \bibliographystyle{alpha}
\section{Introduction} Let $F/F_{0}$ be a quadratic extension of $p$-adic fields of residue characteristic $p$, and let $\sigma$ denote its non-trivial automorphism. For $G=\mathrm{GL}_{n}(F)$, we write $\varepsilon$ as a \emph{hermitian matrix} in $G$, i.e. $\sigma(\,^t\varepsilon)=\varepsilon$ with $\,^{t}$ denoting the transpose of the matrices. We denote $$\tau_{\varepsilon}(x)=\varepsilon\sigma(\,^{t}x^{-1})\varepsilon^{-1}$$ for any $x\in G$ which we call a \emph{unitary involution} on $G$. We fix $\tau=\tau_{\varepsilon}$ as a unitary involution on $G$ and we denote by $G^{\tau}$ the subgroup of $G$ consisting of the elements fixed by $\tau$ which we call the \emph{unitary subgroup} of $G$ with respect to $\tau$. For $\pi$ an irreducible smooth representation of $G$ over $\mathbb{C}$, Jacquet proposed to study the space of $G^{\tau}$-invariant linear forms on $\pi$, i.e. the space $$\mathrm{Hom}_{G^{\tau}}(\pi,1).$$ When the space is non-zero, he called $\pi$ to be \emph{distinguished by} $G^{\tau}$. For $n=3$ and $\pi$ supercuspidal, he proved in \cite{jacquet2001factorization} by using global argument, that the space is non-zero if and only if $\pi$ is $\sigma$-invariant, i.e. $\pi^{\sigma}\cong\pi$, where $\pi^{\sigma}:=\pi\circ\sigma$ denotes the representation of $\sigma(G)=G$. Moreover he showed that this space is of dimension one as a complex vector space when the condition above is satisfied. Besides in \emph{ibid.}, he also gave a sketch of applying his method to the case when $n=2$ and $\pi$ is supercuspidal, to give the same distinction criterion and the same dimension one theorem. Based on these results as one of the main reasons, he conjectured that in general, $\pi$ is distinguished by $G^{\tau}$ if and only if $\pi$ is $\sigma$-invariant. Moreover, it is also interesting to determined the dimension of the space of $G^{\tau}$-invariant linear forms which is not necessary to be one in general. Under the assumption when $\pi$ is $\sigma$-invariant and supercuspidal, Jacquet further conjectured that the dimension equals to one. In addition, by Arthur-Clozel \cite{arthur1989simple}, for $\pi$ an irreducible representation of $G$, it is in the image of quadratic base change with respect to $F/F_{0}$ if and only if it is $\sigma$-invariant. Thus for irreducible representations, the conjecture of Jacquet gives a relation between quadratic base change and $G^{\tau}$-distinction. Beside of the special case mentioned above, there are two more evidences which support the consideration of the conjecture above. First we consider the analogue of the conjecture in the finite field case. For $\overline{\rho}$ an irreducible complex representation of $\mathrm{GL}_{n}(\mathbb{F}_{q^{2}})$, Gow \cite{gow1984two} proved that $\overline{\rho}$ is distinguished by the unitary subgroup $\mathrm{U}_{n}(\mathbb{F}_{q})$ if and only if $\overline{\rho}$ is isomorphic to its twist under the non-trivial element of $\mathrm{Gal}(\mathbb{F}_{q^{2}}/\mathbb{F}_{q})$. Under this condition, he also showed that the space of $\mathrm{U}_{n}(\mathbb{F}_{q})$-invariant linear forms is of dimension one as a complex vector space. In addition, Shintani \cite{shintani1976two} showed that all the irreducible representations of $\mathrm{GL}_{n}(\mathbb{F}_{q})$ are one-to-one corresponding to the Galois invariant irreducible representations of $\mathrm{GL}_{n}(\mathbb{F}_{q^{2}})$, where the correspondence, called the \emph{base change map}, is given by a formula of trace of representations. These two results give us a clear feature between base change map and $\mathrm{U}_{n}(\mathbb{F}_{q})$-distinction. Finally, when $\overline{\rho}$ is generic and Galois-invariant, Anandavardhanan and Matringe \cite{anandavardhanan2018test} recently showed that the $\mathrm{U}_{n}(\mathbb{F}_{q})$-average of Bessel function of $\overline{\rho}$ on the Whittaker model as a $\mathrm{U}_{n}(\mathbb{F}_{q})$-invariant linear form is non-zero. Since the space of $\mathrm{U}_{n}(\mathbb{F}_{q})$-invariant linear forms is of dimension one, this result gives us a specific characterization of the space. The other evidence for Jacquet conjecture is its global analogue. We assume $\mathcal{K}/\mathcal{K}_{0}$ to be a quadratic extension of number fields and we denote by $\sigma$ its non-trivial automorphism. We consider $\tau$ to be a unitary involution on $\mathrm{GL}_{n}(\mathcal{K})$, which also gives us an involution on $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$ that we still denote by $\tau$ by abuse of notation, where $\mathbb{A}_{\mathcal{K}}$ denotes the ring of ad\`eles of $\mathcal{K}$. We denote by $\mathrm{GL}_{n}(\mathcal{K})^{\tau}$ (resp. $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})^{\tau}$) the unitary subgroup of $\mathrm{GL}_{n}(\mathcal{K})$ (resp. $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$) with respect to $\tau$. For $\phi$ a cusp form of $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$, we define $$\mathcal{P}_{\tau}(\phi)=\int_{\mathrm{GL}_{n}(\mathcal{K})^{\tau}\backslash\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})^{\tau}}\phi(h)dh$$ to be the \emph{unitary period integral} of $\phi$ (with respect to $\tau$). We say a cuspidal automorphic representation $\Pi$ of $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$ is $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})^{\tau}$-distinguished if there exists a cusp form in the space of $\Pi$ such that $\mathcal{P}_{\tau}(\phi)\neq 0$. In 1990's, Jacquet and Ye began to study the relation between $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})^{\tau}$-distinction and global base change (see for example \cite{jacquet1996distinguished} when $n=3$). For general $n$, Jacquet \cite{jacquet2005kloosterman} showed that $\Pi$ is contained in the image of quadratic base change map (or equivalently $\Pi$ is $\sigma$-invariant by Arthur-Clozel \cite{arthur1989simple}) with respect to $\mathcal{K}/\mathcal{K}_{0}$ if and only if there exists a unitary involution $\tau$ such that $\Pi$ is $G^{\tau}$-distinguished. This result may be viewed as the global version of Jacquet conjecture for supercuspidal representations. In fact, for the special case of Jacquet conjecture in \cite{jacquet2001factorization}, Jacquet used the global analogue of the same conjecture and relative trace formula as two main techniques to finish the proof. To say it simple, he first proved the global analogue of the conjecture. Then he used the relative trace formula to write a non-zero unitary period integral as the product of its local components at each place of $\mathcal{K}_{0}$, where each local component characterizes the distinction of the local component of $\Pi$ with respect to the corresponding unitary group over local fields. When $\pi$ is $\sigma$-invariant, he chose $\Pi$ as a $\sigma$-invariant cuspidal automorphic representation of $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$ and $v_{0}$ as a non-archimedean place of $\mathcal{K}_{0}$ such that $(G^{\tau},\pi)=(\mathrm{GL}_{n}(\mathcal{K}_{v_{0}})^{\tau},\Pi_{v_{0}})$. Then the product decomposition leads to the proof of the "if" part of the conjecture. The "only if" part of the conjecture, which will be discussed in section 4, requires the application of globalization theorem. His method was generalized by Feigon-Lapid-Offen in \cite{feigon2012representations} to general $n$ and more general family of representations. They showed that Jacquet conjecture works for generic representations of $G$. Moreover for the same family of representations, they were able to give a lower bound for the dimension of $\mathrm{Hom}_{G^{\tau}}(\pi,1)$ and they further conjectured that the inequality they gave is actually an equality. Finally, Beuzart-Plessis has recently announced that he had verified the equality conjectured above which is unpublished right now. Thus for generic representations of $G$, the Jacquet conjecture was settled. Instead of using global method, there are other methods to study this conjecture which are local and algebraic. Hakim-Mao \cite{hakim1998supercuspidal} verified the conjecture when $\pi$ is supercuspidal of level zero, i.e. $\pi$ is supercuspidal such that $\pi^{1+\mathfrak{p}_{F}\mathrm{M}_{n}(\mathfrak{o}_{F})}\neq 0$, where $\mathfrak{o}_{F}$ denotes the ring of integers of $F$ and $\mathfrak{p}_{F}$ denotes its maximal ideal. When $\pi$ is supercuspidal and $F/F_{0}$ is unramified, Prasad \cite{prasad2001conjecture} proved the conjecture by applying simple type theory developed by Bushnell-Kutzko in \cite{bushnell129admissible}. When $\pi$ is tame supercuspidal, i.e. $\pi$ is a supercuspidal representation arising from the construction of Howe \cite{howe1977tamely}, Hakim-Murnaghan \cite{hakim2002tame} verified the conjecture. Noting that in the results of Hakim-Mao and Hakim-Murnaghan, they need the additional assumption that the residue characteristic $p\neq 2$. The discussion above leaves us an open question: \emph{Is there any local and algebraic method that leads to a proof of the Jacquet conjecture which works for all supercuspidal representations of $G$?} First, this method will generalize the results of Hakim-Mao, Prasad and Hakim-Murnaghan which we mentioned in the last paragraph. Secondly, instead of considering complex representations, we are also willing to study $l$-modular representations with $l\neq p$. One hopes to prove an analogue of Jacquet conjecture for $l$-modular supercuspidal representations, which will generalize the result of Feigon-Lapid-Offen for supercuspidal representations. Noting that they use global method in their proof, which strongly relies on the assumption that all the representations are complex. Thus their method doesn't work anymore for $l$-modular representations. Finally, we are willing to consider $F/F_{0}$ to be a quadratic extension of non-archimedean locally compact fields instead of $p$-adic fields. Since the result of Feigon-Lapid-Offen heavily relies on the fact that the characteristic of $F$ equals to 0, their method fails when considering non-archimedean locally compact fields of characteristic positive. The aim of this paper is to answer this question. We say a bit more about $l$-modular representations. The study of smooth $l$-modular representations of $G=\mathrm{GL}_{n}(F)$ has been initiated by Vign\'eras \cite{vigneras1996representations}, \cite{vigneras2001correspondance} to extend the local Langlands program to $l$-modular representations. In this spirit, many classical results related to smooth complex representations of $p$-adic groups have been generalized to $l$-modular representations. For example, the local Jacquet-Langlands correspondence related to $l$-modular representations has been studied in detail in \cite{dat2011cas}, \cite{minguez2017correspondance} and \cite{secherre2019towards}. Thus, it is also natural to consider the $l$-modular version of Jacquet conjecture, which hopes to build up the relation between distinction and an expected $l$-modular version of quadratic base change. This paper is the starting point of the whole project. To begin with, from now on we assume $F/F_{0}$ to be a quadratic extension of non-archimedean locally compact fields of residue characteristic $p\neq 2$ instead of $p$-adic fields. We fix $R$ be an algebraically closed field with characteristic $l\neq p$, permitting the possibility that $l=0$. When $l>0$, we say that we are in the $l$-modular case (or modular case in short). From now on, we always consider smooth representations over $R$ and we come back to our former discussion when $R=\mathbb{C}$ and $F$ is $p$-adic. We assume $\pi$ to be a supercuspidal representation of $G$ over $R$. Be aware that when $l\neq 0$, supercuspidal representation is not the same as cuspidal representation of $G$, although they are the same when $l=0$ (see for example Vign\'eras \cite{vigneras1996representations}, chapitre II, section 2). Now we state our first main theorem: \begin{theorem}\label{Thmmain} For $\pi$ a supercuspidal representation of $G=\mathrm{GL}_{n}(F)$ and $\tau$ a unitary involution of $G$, we have $\pi$ is distinguished by $G^{\tau}$ if and only if $\pi^{\sigma}\cong\pi$. \end{theorem} Moreover, we may also calculate the dimension of the space of $G^{\tau}$-invariant linear forms: \begin{theorem}\label{Thmmult1} For $\pi$ a $\sigma$-invariant supercuspidal representation of $G$, we have $$\mathrm{dim}_{R}\mathrm{Hom}_{G^{\tau}}(\pi,1)=1.$$ \end{theorem} One important corollary of Theorem \ref{Thmmain} relates to the $\overline{\mathbb{Q}_{l}}$-lift of a $\sigma$-invariant supercuspidal representation of $G$ over $\overline{\mathbb{F}_{l}}$ when $l>0$, where we denote by $\overline{\mathbb{Q}_{l}}$, $\overline{\mathbb{Z}_{l}}$ and $\overline{\mathbb{F}_{l}}$ the algebraic closure of an $l$-adic field, its ring of integers and the algebraic closure of finite field of $l$ elements respectively. For $(\widetilde{\pi}, V)$ a smooth irreducible representation of $G$ over $\overline{\mathbb{Q}_{l}}$, we call it \emph{integral} if it admits an integral structure, i.e. a $\overline{\mathbb{Z}_{l}}[G]$-submodule $L_{V}$ of $V$ such that $L_{V}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}=V$. For such a representation, the semi-simplification of $L_{V}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}}$ doesn't depend on the choice of $L_{V}$, which we denote by $r_{l}(\widetilde{\pi})$ as a representation of $G$ over $\overline{\mathbb{F}_{l}}$, called the \emph{reduction modulo $l$} of $\pi$ (see \cite{vigneras1996representations} for more details). The following theorem which will be proved at the end of this paper, says that it is always possible to find a $\sigma$-invariant $\overline{\mathbb{Q}_{l}}$-lift for a $\sigma$-invariant supercuspidal representation of $G$ over $\overline{\mathbb{F}_{l}}$. \begin{theorem}\label{Thmlift} For $\pi$ a $\sigma$-invariant supercuspidal representation of $G$ over $\overline{\mathbb{F}_{l}}$, there exists an integral $\sigma$-invariant supercuspidal representation $\widetilde{\pi}$ of $G$ over $\overline{\mathbb{Q}_{l}}$, such that $r_{l}(\widetilde{\pi})=\pi$. \end{theorem} Let us now outline the contents of this paper by introducing the strategy of our proof for Theorem \ref{Thmmain} and Theorem \ref{Thmmult1}. In section 2 we introduce our settings and basic knowledge about hermitian matrices and unitary subgroups. Our main tool to prove the theorems will be simple type theory developed by Bushnell-Kutzko in \cite{bushnell129admissible}, and further generalized by Vign\'eras \cite{vigneras1996representations} and M\'{\i}nguez-S\'echerre \cite{minguez2014types} to the $l$-modular case. In section 3 we will give a detailed introduction of this theory, but here we also recall a little bit for convenience. The idea of simple type theory is to realize any cuspidal representation $\pi$ of $G$ as the compact induction of a finite dimensional representation $\Lambda$ on an open subgroup $\boldsymbol{J}$ which is compact modulo its center. Such a pair $(\boldsymbol{J},\Lambda)$ is called an \emph{extended maximal simple type} which we will abbreviate to \emph{simple type} for simplicity. We also mention the following main properties of $(\boldsymbol{J},\Lambda)$: (1) The group $\mathbf{J}$ contains a unique maximal open compact subgroup $J$ which contains a unique maximal normal pro-$p$-subgroup $J^{1}$; (2) We have $J/J^{1}\cong \mathrm{GL}_{m}(\boldsymbol{l})$, where $\boldsymbol{l}$ is the residue field of $E$ which is a field extension over $F$ of degree $d$. Moreover we have $n=md$, where $m$ and $d$ are determined intrinsically by $\pi$; (3) We may write $\Lambda=\boldsymbol{\kappa}\otimes\boldsymbol{\rho}$, where $\boldsymbol{\kappa}$ and $\boldsymbol{\rho}$ are irreducible representations of $\boldsymbol{J}$ such that the restriction $\boldsymbol{\kappa}|_{J^{1}}=\eta$ is an irreducible representation of $J^{1}$ which we call it a \emph{Heisenberg representation}, and $\boldsymbol{\rho}|_{J}$ is the inflation of a cuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})\cong J/J^{1}$. For a given supercuspidal representation $\pi$ of $G$, our starting point is to prove the "only if" part of Theorem \ref{Thmmain}. When $R=\mathbb{C}$ and $\mathrm{char}(F)=0$, it is a standard result by using global argument, especially the globalization theorem (\cite{hakim2002globalization}, Theorem 1). When $\mathrm{char}(F)=p>0$, we may keep the original proof except that we need a characteristic $p$ version of the globalization theorem. Fortunately we can use a more general result due to Gan-Lomel\'{\i} \cite{ganglobalization} to get the result we need. Since each supercuspidal representation of $G$ over a characteristic 0 algebraically closed field can be realized as a representation over $\overline{\mathbb{Q}}$ up to multiplying an unramified character, we finish the proof when $\mathrm{char}(R)=0$. When $R=\overline{\mathbb{F}_{l}}$, we consider the projective envelope $P_{\Lambda|_{J}}$ of $\Lambda|_{J}$ and using the results in \cite{vigneras1996representations} to study its irreducible components and the irreducible components of its $\overline{\mathbb{Q}_{l}}$-lift. Finally we will show that there exists a $\overline{\mathbb{Q}_{l}}$-lift of $\pi$ which is supercuspidal and $G^{\tau}$-distinguished. Thus by using the characteristic 0 case we finish the proof for the "only if" part for any $R$ under our settings. The details will be presented in section 4. In section 5, we prove the \emph{$\tau$-selfdual type theorem}, which says that for any given unitary involution $\tau$ and a $\sigma$-invariant cuspidal representation of $G$ with a technical condition which can be removed later, we may find a simple type $(\boldsymbol{J},\Lambda)$ contained in $\pi$ such that $\tau(\boldsymbol{J})=\boldsymbol{J}$ and $\Lambda^{\tau}\cong\Lambda^{\vee}$, where $^{\vee}$ denotes the smooth contragredient. In other words, we find a "symmetric" simple type contained in $\pi$ with respect to $\tau$. Our strategy follows from \cite{anandavardhanan2018galois}, section 4. First we consider the case when $E/F$ is totally wildly ramified and $n=d$. Then for $E/F$ in general with $n=d$, we make use of the techniques about endo-class and tame lifting developed in \cite{bushnell1996local} to prove the theorem by reducing it to the former case. Finally by using the $n=d$ case, we prove the general theorem. In section 6, for a given cuspidal representation $\pi$ and a certain unitary involution $\tau$, we first use our results in section 5 to choose a $\tau$-selfdual simple type $(\boldsymbol{J},\Lambda)$ contained in $\pi$. The main result of section 6, which we call it \emph{distinguished type theorem}, says that $\pi$ is distinguished by $G^{\tau}$ if and only if there exists a $\tau$-selfdual and distinguished simple type of $\pi$. More specifically, by Frobenius reciprocity and Mackey formula, we have: $$\mathrm{Hom}_{G^{\tau}}(\pi,1)\cong\prod_{g\in\boldsymbol{J}\backslash G/G^{\tau}}\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1).$$ We concentrate on those $g$ in the double coset such that $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\neq 0$. The proof of distinguished type theorem also shows that there are at most two such double cosets which can be written explicitly. Moreover for those $g$ we have: $$\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\kappa}^{g},\chi^{-1})\otimes_{R}\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\rho}^{g},\chi),$$ where $\boldsymbol{\kappa}^{\tau}\cong\boldsymbol{\kappa}^{\vee}$ and $\chi$ is a quadratic character of $\boldsymbol{J}^{g}\cap G^{\tau}$ which is trivial when restricting to $J^{1g}\cap G^{\tau}$. In the tensor product, the first term $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\kappa}^{g},\chi^{-1})$ is of dimension one as an $R$-vector space. So essentially we only need to study the second term. If we denote by $\overline{\rho^{g}}$ the cuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})\cong J^{g}/J^{1g}$ whose inflation equals to $\boldsymbol{\rho}^{g}|_{J^{g}}$ , and we denote by $\overline{\chi}$ the character of $H:=J^{g}\cap G^{\tau}/J^{1g}\cap G^{\tau}$ whose inflation equals to $\chi|_{J^{g}\cap G^{\tau}}$, then we further have: $$\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\rho}^{g},\chi)\cong\mathrm{Hom}_{H}(\overline{\rho^{g}},\overline{\chi}).$$ Here $H$ could be a unitary subgroup, an orthogonal subgroup or a symplectic subgroup of $\mathrm{GL}_{m}(\boldsymbol{l})$. So when $\pi$ is supercuspidal, we reduce our problem to study the $H$-distinction of a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$. Moreover at the beginning of section 6, we use the result in section 5 to extend $\sigma$ to a non-trivial involution on $E$. We write $E_{0}=E^{\sigma}$ and we get $E/E_{0}$ as a quadratic extension. When $E/E_{0}$ is unramified, we know that $H$ is a unitary subgroup. We first use the result of Gow \cite{gow1984two} to deal with the characteristic 0 case. For $\mathrm{char}(R)>0$, we use the same method as in section 4. When $E/E_{0}$ is ramified, we know that $H$ is either an orthogonal subgroup or a symplectic subgroup. When $H$ is orthogonal, we use Deligne-Lusztig theory \cite{deligne1976representations}, especially a formula given by Hakim-Lansky \cite{hakim2012distinguished} to calculate the dimension of $\mathrm{Hom}_{H}(\overline{\rho^{g}},\overline{\chi})$ when $\mathrm{char}(R)=0$. For $\mathrm{char}(R)>0$, we use again the same method as in section 4 to finish the proof. When $H$ is symplectic, we show that the space is always 0 by first using characteristic 0 result and then generalizing it to $l$-modular representations. These two cases will be dealt in section 7 and section 8 separately. It is worth to mention that in \cite{secherre2018supercuspidal}, S\'echerre studied the $\sigma$-selfdual supercuspidal representations of $G$ over $R$, with the same notation unchanged as before. He proved the following \emph{Dichotomy Theorem} and \emph{Disjunction Theorem}: For $\pi$ a supercuspidal representation of $G$, it is $\sigma$-selfdual (i.e. $\pi^{\sigma}\cong\pi^{\vee}$) if and only if $\pi$ is either distinguished by $\mathrm{GL}_{n}(F_{0})$ or $\omega$-distinguished, where $\omega$ denotes the unique non-trivial character of $F_{0}^{\times}$ which is trivial on $\mathrm{N}_{F/F_{0}}(F^{\times})$. The method we use in this paper is the same as which was developed in \emph{ibid.} For example, our section 5 corresponds to section 4 of \cite{anandavardhanan2018galois} and our section 6 corresponds to section 6 of \cite{secherre2018supercuspidal}, etc. To point out the main differences in our case as the end of the introduction, first in section 5 we will find that in a certain case, it is even impossible to find a hereditary order $\mathfrak{a}$ such that $\tau(\mathfrak{a})=\mathfrak{a}$ , which isn't a problem in section 4 of \cite{anandavardhanan2018galois}. That's why we need to add a technical condition in the main theorem of section 5 and finally verify it for supercuspidal representations. Precisely, for a $\sigma$-invariant supercuspidal representation, we first consider the unitary involution $\tau=\tau_{1}$ corresponding to the identity hermitian matrix $I_{n}$. In this case, we may use our discussion in section 5 to find a $\tau$-selfdual type contained in $\pi$ and we may further use our discussion in section 6 and section 7 to show that when $E/E_{0}$ is unramified, then $m$ is odd. This exactly affirms the condition we need, and we may repeat the procedure of section 5 and section 6 for general unitary involutions. This detouring argument also indicates that for a $\sigma$-invariant cuspidal not supercuspidal representation, sometimes we cannot find a $\tau$-selfdual simple type contained in that representation, which justifies that our supercuspidal (instead of cuspidal) assumption is somehow important. Furthermore in section 8, we may find out that the character $\chi$ mentioned above cannot always be realized as a character of $\boldsymbol{J}$, thus cannot be assumed to be trivial a priori as in \cite{secherre2018supercuspidal}. It means that we need to consider a supercuspidal representation of general linear group over finite field distinguished by a non-trivial character over an orthogonal subgroup instead of the trivial one. That's why the result of Hakim-Lansky (\cite{hakim2012distinguished} Theorem 3.11) shows up. Last but not least, in section 6 a large part of our results are stated and proved for a general involution instead of a unitary one. This provides the possibility to generalize this method to study the distinction of supercuspidal representations of $G$ by other involutive subgroups. For instance, the similar problem for orthogonal subgroups is a work in progress by the author. \textbf{Acknowledgements.} This work forms part of my PhD project. I thank my PhD advisor, Vincent S\'echerre, for starting me this projet, for helpful discussions and suggestions, and in particular, for his careful reading and revising for the early versions of this paper. I also thank EDMH for financial support of my PhD project and Universit\'e de Versailles for excellent research conditions. \section{Notation and basic definitions} \subsection{Notation} Let $F/F_{0}$ be a quadratic extension of non-archimedean locally compact fields with residue characteristic $p\neq 2$ and let $\sigma$ be the unique non-trivial involution in the Galois group. Write $\mathfrak{o}_{F}$ and $\mathfrak{o}_{F_{0}}$ for the ring of integers of $F$ and $F_{0}$ and write $\boldsymbol{k}$ and $\boldsymbol{k}_{0}$ for the residue field of $F$ and $F_{0}$ respectively. The involution $\sigma$ induces a $\boldsymbol{k}_{0}$-automorphism of $\boldsymbol{k}$ generating $\mathrm{Gal}(\boldsymbol{k}/\boldsymbol{k}_{0})$, still denoted by $\sigma$. Let $R$ be an algebraically closed field of characteristic $l\geq 0$ different from $p$. If $l>0$, then we are in the "modular case". We fix a character: $$\psi_{0}: F_{0}\rightarrow R^{\times}$$ trivial on the maximal ideal of $\mathfrak{o}_{F_{0}}$ but not on $\mathfrak{o}_{F_{0}}$, and we define $\psi=\psi_{0}\circ\mathrm{tr}_{F/F_{0}}$. Let $G=\mathrm{GL}_{n}(F)$ be the locally profinite group with $n\geq 1$, equipped with the involution $\sigma$ acting componentwise. Let $\varepsilon$ be an \emph{hermitian matrix} in $\mathrm{M}_{n}(F)$, which means that $\varepsilon^{*}=\varepsilon$, where $x^{*}:=\sigma(\,^{t}x)$ for any matrix $x\in\mathrm{M}_{n}(F)$ and we write $\,^{t}$ for the transpose operator. Sometimes we write $\sigma_{t}(x):=x^{*}$ for any $x\in\mathrm{M}_{n}(F)$ to emphasize $\sigma_{t}$ as an anti-involution over $\mathrm{M}_{n}(F)$ extending $\sigma$. We consider the \emph{unitary involution} $\tau_{\varepsilon}$ corresponding to $\varepsilon$: for $\varepsilon$ hermitian and $g\in G$, we define $\tau_{\varepsilon}(g)=\varepsilon\sigma(\,^t g^{-1})\varepsilon^{-1}$. For $\tau$ a fixed unitary involution, we denote by $G^{\tau}$ the unitary subgroup corresponding to a unitary involution $\tau$, which consists of the elements of $G$ fixed by $\tau$. By \emph{representations} of a locally profinite group, we always mean smooth representations on an $R$-module. Given a representation $\pi$ of a closed subgroup $H$ of $G$, we write $\pi^{\vee}$ for the smooth contragredient of $\pi$. We write $\pi^{\sigma}$ and $\pi^{\tau}$ for the representations $\pi\circ\sigma$ and $\pi\circ\tau$ of groups $\sigma(H)$ and $\tau(H)$ respectively. We say that $\pi$ is \emph{$\tau$-selfdual} if $H$ is $\tau$-stable and $\pi^{\tau}$ and $\pi^{\vee}$ are isomorphic. We say that $\pi$ is \emph{$\sigma$-invariant} if $H$ is $\sigma$-stable and $\pi^{\sigma}$ and $\pi$ are isomorphic. For $g\in G$, we write $H^{g}=\{g^{-1}hg|h\in H\}$ as a closed subgroup and we write $\pi^{g}:x\mapsto\pi(gxg^{-1})$ as a representation of $H^{g}$. For $\mathfrak{a}$ an $\mathfrak{o}_{F}$-subalgebra of $\mathrm{M}_{n}(F)$ and $\tau=\tau_{\varepsilon}$ a unitary involution, we denote by $$\tau(\mathfrak{a}):=\sigma_{\varepsilon}(\mathfrak{a})=\{\sigma_{\varepsilon}(x)|x\in\mathfrak{a}\}$$ an $\mathfrak{o}_{F}$-subalgebra of $\mathrm{M}_{n}(F)$, where $\sigma_{\varepsilon}(x):=\varepsilon\sigma(\,^{t}x)\varepsilon^{-1}$ is an anti-involution for any $x\in\mathrm{M}_{n}(F)$. We say $\mathfrak{a}$ is \emph{$\tau$-stable} if $\tau(\mathfrak{a})=\mathfrak{a}$. Moreover for $g\in G$, we get: $$\tau(\mathfrak{a})^{g}=g^{-1}\sigma_{\varepsilon}(\mathfrak{a})g=\sigma_{\varepsilon}(\sigma_{\varepsilon}(g)\mathfrak{a}\sigma_{\varepsilon}(g^{-1}))=\sigma_{\varepsilon}(\tau(g)^{-1}\mathfrak{a}\tau(g))=\tau(\mathfrak{a}^{\tau( g)})$$ In other words, the notation $\tau(\mathfrak{a})$ is compatible with $G$-conjugacy. For $\tau$ a unitary involution and $\pi$ a representation of $H$ as above, we say $\pi$ is $H\cap G^{\tau}$-\emph{distinguished}, or just \emph{distinguished}, if the space $\mathrm{Hom}_{H\cap G^{\tau}}(\pi,1)$ is non-zero. An irreducible representation of $G$ is called \emph{cuspidal} if it doesn't occur as a subrepresentation of a proper parabolically induced representation. It is called \emph{supercuspidal} if it doesn't occur as a subquotient of a proper parabolically induced representation. \subsection{Hermitian matrices and unitary groups}\label{subsectionunitary} We make use of this subsection to introduce basic knowledge of hermitian matrices and unitary groups. The basic references will be \cite{hakim1998supercuspidal} and \cite{jacobowitz1962hermitian}. Let $E/E_{0}$ be a quadratic extension of non-archimedean locally compact fields which are algebraic extensions of $F$ and $F_{0}$ respectively. Write $\mathfrak{o}_{E}$ for the ring of integer of $E$ and $\mathfrak{o}_{E_{0}}$ for that of $E_{0}$. Let $\sigma'\in\mathrm{Gal}(E/E_{0})$ be the unique non-trivial involution in the Galois group. For $\varepsilon'\in\mathrm{GL}_{m}(E)$, just as in the last subsection, we say $\varepsilon'$ is a hermitian matrix if $(\varepsilon')^{*}=\varepsilon'$, where we consider the $(\cdot)^{*}$ as above with $n$, $F$, $F_{0}$, $\sigma$ replaced by $m$, $E$, $E_{0}$, $\sigma'$ respectively. Write $\varpi_{E}$ for a uniformizer of $E$ such that $$\sigma'(\varpi_{E})= \begin{cases} \varpi_{E} & \text{if}\ E/E_{0}\ \text{is unramified},\\ -\varpi_{E} & \text{if}\ E/E_{0}\ \text{is ramified}. \end{cases}$$ Let $\mathcal{X}$ denote the set of all the hermitian matrices. The group $G$ acts on $\mathcal{X}$ by $g\cdot x=gxg^{*}$. We have the following proposition: \begin{proposition}[\cite{jacobowitz1962hermitian}, Theorem 3.1]\label{PropGOH} There are exactly two $\mathrm{GL}_{m}(E)$-orbits of $\mathcal{X}$ with respect to the action given above. Furthermore, the elements in each orbit are exactly determined by the classes of their determinants in $E_{0}^{\times}/\mathrm{N}_{E/E_{0}}(E^{\times})$. \end{proposition} We may also consider the $\mathrm{GL}_{m}(\mathfrak{o}_{E})$-orbits of $\mathcal{X}$. We consider sequences $\alpha=(\alpha_{1},...,\alpha_{r})$ of certain triples $\alpha_{i}=(a_{i},m_{i},\delta_{i})$, such that $a_{1}>...>a_{r}$ is a decreasing sequence of integers, and $m_{1}+...+m_{r}=m$ is a partition of $m$ by positive integers, and $\delta_{1},...,\delta_{r}$ are elements of $E$ such that: (1) If $E/E_{0}$ is unramified, then $\delta_{i}=1$; (2) If $E/E_{0}$ is ramified and $a_{i}$ is odd, then $\delta_{i}=1$ and $m_{i}$ is even; (3) If $E/E_{0}$ is ramified and $a_{i}$ is even, then $\delta_{i}$ is either 1 or $\epsilon$, with $\epsilon\in \mathfrak{o}_{E_{0}}^{\times}\backslash\mathrm{N}_{E/E_{0}}(\mathfrak{o}_{E}^{\times})$ fixed.\\ Let $\mathcal{A}$ be the set of all sequences $\alpha$ satisfying these requirements. For each $\alpha=(\alpha_{1},...,\alpha_{r})\in\mathcal{A}$, we introduce a hermitian matrix $\varpi_{E}^{\alpha}=\varpi_{E}^{\alpha_{1}}\oplus...\oplus\varpi_{E}^{\alpha_{r}}$, where $\varpi_{E}^{\alpha_{i}}\in \mathrm{GL}_{m_{i}}(E)$ is a hermitian matrix, such that: (\romannumeral1) In the case (1), $\varpi_{E}^{\alpha_{i}}=\varpi_{E}^{a_{i}}I_{m_{i}}$; (\romannumeral2) In the case (2), $\varpi_{E}^{\alpha_{i}}=\varpi_{E}^{a_{i}}J_{m_{i}/2} , where $J_{m_{i}/2}=\bigg(\begin{matrix}0 & I_{m_{i}/2} \\ -I_{m_{i}/2} & 0\end{matrix}\bigg)$; (\romannumeral3) In the case (3), $\varpi_{E}^{\alpha_{i}}=\varpi_{E}^{a_{i}}\mathrm{diag}(1,...,1,\delta_{i})$, where $\mathrm{diag}(*,...,*)$ denotes the diagonal matrix with corresponding diagonal elements. We may state the following proposition which classifies all the $\mathrm{GL}_{m}(\mathfrak{o}_{E})$-orbits of $\mathcal{X}$. \begin{proposition}[\cite{jacobowitz1962hermitian}, Theorem 7.1, Theorem 8.2]\label{PropJOH} Each class of the $\mathrm{GL}_{m}(\mathfrak{o}_{E})$-orbits of $\mathcal{X}$ contains a unique representative of the form $\varpi_{E}^{\alpha}$ for a certain $\alpha\in\mathcal{A}$. \end{proposition} Now we study the properties of unitary groups. For $\varepsilon'\in\mathcal{X}$, we denote by $\mathrm{U}_{m}(\varepsilon')$ the unitary group consisting of those $g\in \mathrm{GL}_{m}(E)$ such that $g\varepsilon' g^{*}=\varepsilon'$. We say that two unitary groups are \emph{equivalent} if and only if they are conjugate by some $g\in G$. Since it is easy to check that $g\mathrm{U}_{n}(\varepsilon')g^{-1}=\mathrm{U}_{n}(g\varepsilon' g^{*})$, by Proposition \ref{PropGOH}, there are at most two equivalent classes of unitary groups, which are represented by $\mathrm{U}_{n}(E/E_{0}):=\mathrm{U}_{n}(I_{n})$ and $\mathrm{U}'_{n}(E/E_{0}):=\mathrm{U}_{n}(\varepsilon')$ for $\varepsilon'=\mathrm{diag}(1,...,1,\epsilon')$, where $\epsilon'\in E_{0}^{\times}\backslash\mathrm{N}_{E/E_{0}}(E^{\times})$ is fixed. \begin{remark}\label{rmkUequvclass} We list the following proposition for completeness: If $m$ is even, then $\mathrm{U}_{m}(E/E_{0})$ is not equivalent to $\mathrm{U}'_{m}(E/E_{0})$; if $m$ is odd, then $\mathrm{U}_{m}(E/E_{0})$ is equivalent to $\mathrm{U}'_{m}(E/E_{0})$. Since we will never use it in the future, we omit the proof. \end{remark} \begin{remark}\label{remuniequi} In the future, we only consider the following two cases. First, we consider $E=F$, $E_{0}=F_{0}$, $m=n$ and $\sigma'=\sigma$. For two unitary involutions with the corresponding hermitian matrices in the same $\mathrm{GL}_{n}(F)$-orbit, we already showed that the two unitary groups corresponding to these two involutions are equivalent. Since distinction is a property invariant up to equivalence of unitary groups, we may choose a hermitian matrix in its $G$-orbit such that the corresponding unitary involution $\tau$ is simple enough to simplify the problem. Secondly, we consider $E$ as a finite field extension of $F$ determined by a cuspidal representation $\pi$ such that $n=m[E:F]$. We will find out that if $\pi^{\sigma}\cong\pi$, then we may find an involution $\sigma'$ on $E$ such that $E_{0}=E^{\sigma'}$ and $\sigma'|_{F}=\sigma$. So we may make use of the propositions in this subsection to study hermitian matrices and unitary groups of $\mathrm{GL}_{m}(E)$. \end{remark} \section{Preliminaries on simple types} In this section, we recall the main results we will need on simple strata, characters and types \cite{bushnell129admissible}, \cite{bushnell1996local}, \cite{bushnell2014effective}, \cite{minguez2014types}. Moreover, we mainly follow the structure of \cite{anandavardhanan2018galois} and \cite{secherre2018supercuspidal}. \subsection{Simple strata and characters}\label{subsectionsimplestratum} Let $[\mathfrak{a},\beta]$ be a simple stratum in $\mathrm{M}_{n}(F)$ for a certain $n\geq 1$. Recall that $\mathfrak{a}$ is a hereditary order of $\mathrm{M}_{n}(F)$ and $\beta$ is in $\mathrm{GL}_{n}(F)$ such that: (1) the $F$-algebra $E=F[\beta]$ is a field with degree $d$ over $F$; (2) $E^{\times}$ normalizes $\mathfrak{a}^{\times}$. The centralizer of $E$ in $\mathrm{M}_{n}(F)$ is an $E$-algebra isomorphic to $\mathrm{M}_{m}(E)$ with $n=md$, which is denoted by $B$. The intersection $\mathfrak{b}:=\mathfrak{a}\cap B$ is a hereditary order of $B$. We denote by $\mathfrak{p}_{\mathfrak{a}}$ the Jacobson radical of $\mathfrak{a}$, and $U^{1}(\mathfrak{a})$ the compact open pro-$p$-subgroup $1+\mathfrak{p}_{\mathfrak{a}}$ of $G=\mathrm{GL}_{n}(F)$. Similarly, we denote by $\mathfrak{p}_{\mathfrak{b}}$ the Jacobson radical of $\mathfrak{b}$ and $U^{1}(\mathfrak{b})=1+\mathfrak{p}_{\mathfrak{b}}$ which is a compact open pro-$p$-subgroup of $B^{\times}$. We have the following \emph{simple intersection property}(\cite{bushnell129admissible}, Theorem 1.6.1): for any $x\in B^{\times}$, we have: \begin{equation}\label{UUinB} U^{1}(\mathfrak{a})x U^{1}(\mathfrak{a})\cap B^{\times}=U^{1}(\mathfrak{b})x U^{1}(\mathfrak{b}). \end{equation} Associated with $[\mathfrak{a},\beta]$, there are open compact subgroups: $$H^{1}(\mathfrak{a},\beta)\subset J^{1}(\mathfrak{a},\beta)\subset J(\mathfrak{a},\beta)$$ of $\mathfrak{a}^{\times}$ and a finite set $\mathcal{C}(\mathfrak{a},\beta)$ of characters of $H^{1}(\mathfrak{a},\beta)$ called \emph{simple characters}, which depends on the choice of the character $\psi$ fixed in subsection 2.1. We denote by $\boldsymbol{J}(\mathfrak{a},\beta)$ the compact modulo centre subgroup generated by $J(\mathfrak{a},\beta)$ and $\mathcal{N}(\mathfrak{b})$, where $\mathcal{N}(\mathfrak{b})$ is the normalizer of $\mathfrak{b}^{\times}$ in $B^{\times}$. \begin{proposition}[\cite{secherre2018supercuspidal}, Proposition 5.1]\label{PropJandJ1} We have the following properties: (1) The group $J(\mathfrak{a},\beta)$ is the unique maximal compact subgroup of $\boldsymbol{J}(\mathfrak{a},\beta)$; (2) The group $J^{1}(\mathfrak{a},\beta)$ is the unique maximal normal pro-$p$-subgroup of $J(\mathfrak{a},\beta)$; (3) The group $J(\mathfrak{a},\beta)$ is generated by $J^{1}(\mathfrak{a},\beta)$ and $\mathfrak{b}^{\times}$, and we have: \begin{equation} J(\mathfrak{a},\beta)\cap B^{\times}=\mathfrak{b}^{\times}, J^{1}(\mathfrak{a},\beta)\cap B^{\times}= U^{1}(\mathfrak{b}); \end{equation} (4) The normalizer of any simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ in $G$ is equal to $\boldsymbol{J}(\mathfrak{a},\beta)$; (5) The intertwining set of any $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ in $G$, which we denote by $I_{G}(\theta)$, is equal to $J^{1}(\mathfrak{a},\beta)B^{\times}J^{1}(\mathfrak{a},\beta)=J(\mathfrak{a},\beta)B^{\times}J(\mathfrak{a},\beta)$. \end{proposition} \begin{remark} We write in short $J$, $J^{1}$, $H^{1}$ for $J(\mathfrak{a},\beta)$, $J^{1}(\mathfrak{a},\beta)$, $H^{1}(\mathfrak{a},\beta)$ respectively if $\mathfrak{a}$ and $\beta$ is clear to us. \end{remark} By \cite{bushnell129admissible}, Theorem 3.4.1, $J^{1}(\mathfrak{a},\beta)/H^{1}(\mathfrak{a},\beta)$ is a finite $\boldsymbol{k}$-vector space, and the map: \begin{equation} (x,y)\mapsto<x,y>=\theta(xyx^{-1}y^{-1}) \end{equation} endows it with a non-degenerate symplectic space structure. When the hereditary order $\mathfrak{b}$ is a maximal order in $B$, we call the simple stratum $[\mathfrak{a},\beta]$ and the simple characters in $\mathcal{C}(\mathfrak{a},\beta)$ \emph{maximal}. If so, then given an isomorphism of $E$-algebras $B\cong\mathrm{M}_{m}(E)$ which identifies $\mathfrak{b}$ with the standard maximal order, we have group isomorphisms: \begin{equation}\label{eqGLml} J(\mathfrak{a},\beta)/J^{1}(\mathfrak{a},\beta)\cong\mathfrak{b}^{\times}/U^{1}(\mathfrak{b})\cong\mathrm{GL}_{m}(\boldsymbol{l}) \end{equation} where $\boldsymbol{l}$ is the residue field of $E$. \subsection{Types and cuspidal representations} Consider $\mathrm{GL}_{n}(F)$ for $n\geq 1$. A pair $(\boldsymbol{J},\Lambda)$ called an \emph{extended maximal simple type} (we always write \emph{simple type} in short) is made of a subgroup $\boldsymbol{J}$ open and compact modulo centre, and an irreducible representation $\Lambda$ of $\boldsymbol{J}$. It has been constructed in \cite{bushnell129admissible} in the characteristic 0 case and in \cite{minguez2014types} in the modular case. Given a simple type ($\boldsymbol{J},\Lambda$) in $G$, there are a maximal simple stratum $[\mathfrak{a},\beta]$ of $\mathrm{M}_{n}(F)$ and a maximal simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$, such that $\boldsymbol{J}(\mathfrak{a},\beta)=\boldsymbol{J}$ and $\theta$ is contained in the restriction of $\Lambda$ to $H^{1}(\mathfrak{a},\beta)$. Such a character $\theta$ is said to be \emph{attached to} $\Lambda$. By \cite{bushnell129admissible} Proposition 5.1.1 (or \cite{minguez2014types}, Proposition 2.1 in the modular case), the group $J^{1}(\mathfrak{a},\beta)$ has, up to isomorphism, a unique irreducible representation $\eta$ whose restriction to $H^{1}(\mathfrak{a},\beta)$ contains $\theta$. Such a representation $\eta$, called the \emph{Heisenberg representation} associated to $\theta$, has the following properties: (1) the restriction of $\eta$ to $H^{1}(\mathfrak{a},\beta)$ is made of $(J^{1}(\mathfrak{a},\beta):H^{1}(\mathfrak{a},\beta))^{1/2}$ copies of $\theta$. Here $(J^{1}(\mathfrak{a},\beta):H^{1}(\mathfrak{a},\beta))^{1/2}$ is a power of $p$; (2) the direct sum of $(J^{1}(\mathfrak{a},\beta):H^{1}(\mathfrak{a},\beta))^{1/2}$ copies of $\eta$, which we denote by $\eta^{(J^{1}(\mathfrak{a},\beta):H^{1}(\mathfrak{a},\beta))^{1/2}}$, is isomorphic to $\mathrm{Ind}_{H^{1}}^{J^{1}}\theta$; (3) the representation $\eta$ extends to $\boldsymbol{J}$; (4) the intertwining set of $\eta$, which we denote by $I_{G}(\eta)$, equals to $I_{G}(\theta)$. (5) for $h\in I_{G}(\eta)$, we have $\mathrm{dim}_{R}(\mathrm{Hom}_{J^{1}\cap J^{1h}}(\eta^{h},\eta))=1$. For any representation $\boldsymbol{\kappa}$ of $\boldsymbol{J}$ extending $\eta$, there is a unique irreducible representation $\boldsymbol{\rho}$ of $\boldsymbol{J}$ trivial on $J^{1}(\mathfrak{a},\beta)$ such that $\Lambda\cong\boldsymbol{\kappa}\otimes\boldsymbol{\rho}$. Through (\ref{eqGLml}), the restriction of $\boldsymbol{\rho}$ to $J=J(\mathfrak{a},\beta)$ identifies with the inflation of a cuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$. \begin{remark} Recall that in \cite{bushnell129admissible}, Bushnell and Kutzko also assume $\kappa^{0}=\boldsymbol{\kappa}|_{J(\mathfrak{a},\beta)}$ to be a so called \emph{beta-extension}, which means that: (1) $\kappa^{0}$ is an extension of $\eta$; (2) if we denote by $I_{G}(\kappa^{0})$ the intertwining set of $\kappa^{0}$, then $I_{G}(\kappa^{0})=I_{G}(\eta)=I_{G}(\theta)$. However in our case, since $\mathrm{GL}_{m}(\boldsymbol{l})$ is not isomorphic to $\mathrm{GL}_{2}(\mathbb{F}_{2})$ ($p\neq2$), any character of $\mathrm{GL}_{m}(\boldsymbol{l})$ factors through the determinant. It follows that any representation of $J$ extending $\eta$ is a beta-extension. So finally our consideration of $\kappa^{0}$ coincides with the original assumption of Bushnell and Kutzko. \end{remark} We have the following property which follows from \cite{minguez2014types}, Lemma 2.6. \begin{proposition}\label{xi} Let $\boldsymbol{\kappa}$ be a representation $\boldsymbol{J}$ extending $\eta$, then the map: $$\boldsymbol{\xi}\mapsto\boldsymbol{\kappa}\otimes\boldsymbol{\xi}$$ induces a bijection between the isomorphism classes of irreducible representation $\boldsymbol{\xi}$ of $\boldsymbol{J}$ trivial on $J^{1}$ and the isomorphism classes of irreducible representations of $\boldsymbol{J}$ whose restriction to $J^{1}$ contains $\eta$. \end{proposition} We now give the classification of irreducible cuspidal representations of $G$ in terms of simple types (see \cite{bushnell129admissible}, 6.2, 8.4 and \cite{minguez2014types}, Section 3 in the modular case). \begin{proposition}[\cite{bushnell129admissible},\cite{minguez2014types}]\label{PropType} Let $\pi$ be a cuspidal representation of $G$. (1) There is a simple type $(\boldsymbol{J},\Lambda)$ such that $\Lambda$ is a subrepresentation of the restriction of $\pi$ in $\boldsymbol{J}$. It is uniquely up to $G$-conjugacy. (2) Compact induction $c$-$\mathrm{Ind}_{\boldsymbol{J}}^{G}$ gives a bijection between the $G$-conjugacy classes of simple types and the isomorphism classes of cuspidal representations of $G$. \end{proposition} \subsection{Endo-classes, tame parameter fields and tame lifting}\label{subsectionendo} In this subsection, we introduce the concepts of endo-classes, tame parameter fields and tame lifting. Their definitions and properties will be used in the next section. The main references will be \cite{bushnell129admissible}, \cite{bushnell1996local} and \cite{bushnell2014effective}. For $[\mathfrak{a},\beta]$ a simple stratum of $\mathrm{M}_{n}(F)$ and $[\mathfrak{a}',\beta']$ a simple stratum of $\mathrm{M}_{n'}(F)$ with $n,n'\geq 1$, if we have an isomorphism of $F$-algebras $\phi: F[\beta]\rightarrow F[\beta']$ such that $\phi(\beta)=\beta'$, then there exists a canonical bijection: $$t_{\mathfrak{a},\mathfrak{a}'}^{\beta,\beta'}:\mathcal{C}(\mathfrak{a},\beta)\rightarrow\mathcal{C}(\mathfrak{a}',\beta')$$ called the \emph{transfer map} (see \cite{bushnell129admissible}, Theorem 3.6.14). Now let $[\mathfrak{a}_{1},\beta_{1}]$ and $[\mathfrak{a}_{2},\beta_{2}]$ be simple strata of $\mathrm{M}_{n_{1}}(F)$ and $\mathrm{M}_{n_{2}}(F)$ respectively with $n_{1},n_{2}\geq 1$. We call two simple characters $\theta_{1}\in\mathcal{C}(\mathfrak{a}_{1},\beta_{1})$ and $\theta_{2}\in\mathcal{C}(\mathfrak{a}_{2},\beta_{2})$ \emph{endo-equivalent}, if there are simple strata $[\mathfrak{a}',\beta_{1}']$ and $[\mathfrak{a}',\beta_{2}']$ of $\mathrm{M}_{n'}(F)$ for some $n'\geq 1$ such that $\theta_{1}$ and $\theta_{2}$ transfer to two simple characters $\theta_{1}'\in\mathcal{C}(\mathfrak{a}',\beta_{1}')$ and $\theta_{2}'\in\mathcal{C}(\mathfrak{a}',\beta_{2}')$ respectively which intertwine (or by \cite{bushnell1996local}, Theorem 3.5.11 which are $\mathrm{GL}_{n'}(F)$-conjugate). This defines an equivalent relation on $$\bigcup_{[\mathfrak{a},\beta]}\mathcal{C}(\mathfrak{a},\beta),$$ where the union runs over all simple strata of $\mathrm{M}_{n}(F)$ for all $n\geq 1$ (see \cite{bushnell1996local}, section 8). An equivalent class for this equivalent relation is called an \emph{endo-class}. For $\pi$ a cuspidal representation of $G=\mathrm{GL}_{n}(F)$, there exists a simple stratum $[\mathfrak{a},\beta]$ and a simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ contained in $\pi$. The set of simple characters $\theta$ contained in $\pi$ constitutes a $G$-conjugacy class, thus they are endo-equivalent. So we may denote by $\Theta_{\pi}$ the endo-class of $\pi$ which is the endo-class determined by $\theta$ for any $\theta$ contained in $\pi$. Given $\theta\in\mathcal{C}(\mathfrak{a},\beta)$, the degree of $E/F$, its ramification index and its residue degree only depend on the endo-class of $\theta$. They are called the degree, ramification index and residue degree of this endo-class. Although the field extension $E/F$ is not uniquely determined, its maximal tamely ramified subextension is uniquely determined by the endo-class of $\theta$ up to an $F$-isomorphism. This field is called a \emph{tame parameter field} of the endo-class (see \cite{bushnell2014effective}, 2.2, 2.4). We denote by $\mathcal{E}(F)$ the set of endo-classes of simple characters over $F$. Given a finite tamely ramified extension $T$ of $F$, we have a surjection: $$\mathcal{E}(T)\rightarrow\mathcal{E}(F)$$ with finite fibers, which is called \emph{restriction map} (see \cite{bushnell2014effective}, 2.3). Given $\Theta\in\mathcal{E}(F)$, the endo-classes $\Psi\in\mathcal{E}(T)$ restricting to $\Theta$ are called the $T/F$-lifts of $\Theta$. If $\Theta$ has a tame parameter field $T$, then $\mathrm{Aut}_{F}(T)$ acts faithfully and transitively on the set of $T/F$-lifts of $\Theta$ (see \cite{bushnell2014effective}, 2.3, 2.4). Let $[\mathfrak{a},\beta]$ be a simple stratum and let $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ be a simple character . Let $T$ be the maximal tamely ramified extension of $F$ in $E$. Let $\Theta$ be the endo-class of $\theta$, then $T$ is a tame parameter field for $\Theta$. Let $C\cong\mathrm{M}_{n/t}(T)$ denote the centralizer of $T$ in $\mathrm{M}_{n}(F)$, where $t=[T:F]$. The intersection $\mathfrak{c}=\mathfrak{a}\cap C$ is a minimal order in $C$ (Actually $\mathfrak{c}$ is the hereditary order of $C\cong\mathrm{M}_{n/t}(T)$ normalized by $E$ corresponding to the totally wildly extension $E/T$.) which gives rise to a simple stratum $[\mathfrak{c},\beta]$. The restriction of $\theta$ to $H^{1}(\mathfrak{c},\beta)$, denoted by $\theta_{T}$, is a simple character associated to this simple stratum, called the \emph{interior $T/F$-lift} of $\theta$. Its endo-class, denoted by $\Psi$, is a $T/F$-lift of $\Theta$. For the origin and details for the construction of $\Psi$ by using interior $T/F$-lift of $\theta$, see \cite{bushnell1996local}. We may change our choice of simple stratum $[\mathfrak{a},\beta]$ but fix $T\hookrightarrow\mathrm{M}_{n}(F)$ unchanged, then the map $$\mathfrak{a}\mapsto\mathfrak{a}\cap C$$ is injective from the set of hereditary orders of $\mathrm{M}_{n}(F)$ normalized by $T^{\times}$ to the set of hereditary orders of $C$ (see \cite{bushnell1996local}, section 2). Moreover the following map: $$\theta\mapsto\theta_{T}$$ is injective from $\mathcal{C}(\mathfrak{a},\beta)$ to $\mathcal{C}(\mathfrak{c},\beta)$ (see \cite{bushnell1996local}, section 9). \subsection{Supercuspidal representations} Let $\pi$ be a cuspidal representation of $G$. By Proposition \ref{PropType}, it contains a simple type $(\boldsymbol{J},\Lambda)$. Fix a maximal simple stratum $[\mathfrak{a},\beta]$ such that $\boldsymbol{J}=\boldsymbol{J}(\mathfrak{a},\beta)$, and fix an irreducible representation $\boldsymbol{\kappa}$ as in subsection 3.2, then by Proposition \ref{xi}, there exists a unique $\boldsymbol{\rho}$ as corresponding representation of $\boldsymbol{J}$ trivial on its maximal normal pro-$p$-subgroup $J^{1}$. Write $E=F[\beta]$ and let $\overline{\rho}$ be the cuspidal representation of $J/J^{1}\cong\mathrm{GL}_{m}(\boldsymbol{l})$ whose inflation equals to $\boldsymbol{\rho}|_{J}$. We have the following proposition: \begin{proposition}[\cite{minguez2014representations}, Proposition 6.10] The representation $\pi$ is supercuspidal if and only if $\overline{\rho}$ is supercuspidal. \end{proposition} \section{Distinction implies Galois invariance for a supercuspidal representation} Let $G=\mathrm{GL}_{n}(F)$ and let $G^{\tau}$ be the unitary group corresponding to a unitary involution $\tau$. We state the following theorem which is well-known when $R=\mathbb{C}$ and $\mathrm{char}(F)=0$ (see for example \cite{hakim2002globalization}, section 4, corollary or more ancient paper \cite{harder1986algebraische} which illustrates the idea). \begin{theorem}\label{Thmdistgalinv} Let $\pi$ be a supercuspidal representation of $G$. If $\pi$ is distinguished by $G^{\tau}$, then $\pi$ is $\sigma$-invariant. \end{theorem} Before proving Theorem \ref{Thmdistgalinv}, we state a useful lemma which will be used not only in the proof of this theorem, but also in the latter sections. \begin{lemma}\label{LemmaunitaryJJ0} For $\delta$ a unitary involution and for $(\boldsymbol{J},\Lambda)$ a simple type of $G$, we have $\boldsymbol{J}\cap G^{\delta}=J\cap G^{\delta}$. \end{lemma} \begin{proof} For $x\in\boldsymbol{J}\cap G^{\delta}$, we have $\delta(x)=x$ which implies that $\sigma(\mathrm{det}(x))\mathrm{det}(x)=1$, where we denote by $\mathrm{det}(\cdot)$ the determinant function defined on $G$. Thus we have $\mathrm{det}(x)\in\mathfrak{o}_{F}^{\times}$. Since $\boldsymbol{J}=E^{\times}J$, we get $x\in\mathfrak{o}_{E}^{\times}J\cap G^{\delta}=J\cap G^{\delta}$. Since $x$ is arbitrary, we finish the proof. \end{proof} Moreover, we need the following lemma which says that the properties of distinction and $\sigma$-invariance are maintained up to change of base fields. \begin{lemma}\label{lemmabasechange} Let $R_{1}\hookrightarrow R_{2}$ be a fixed embedding of two algebraically closed fields of characteristic $l\geq 0$. Let $\pi_{0}$ be a supercuspidal representation of $G$ over $R_{1}$. Let $\pi=\pi_{0}\otimes_{R_{1}}R_{2}$ be the corresponding representation of $G$ over $R_{2}$. Then: (1) $\pi_{0}$ is distinguished by $G^{\tau}$ for a unitary involution $\tau$ if and only if $\pi$ is distinguished by $G^{\tau}$; (2) $\pi_{0}^{\sigma}\cong\pi_{0}$ if and only if $\pi^{\sigma}\cong\pi$. \begin{proof} For (1), let $(\boldsymbol{J},\Lambda_{0})$ be a simple type of $\pi_{0}$, then $(\boldsymbol{J},\Lambda):=(\boldsymbol{J},\Lambda_{0}\otimes_{R_{1}}R_{2})$ is a simple type of $\pi$ and thus $\pi$ is also supercuspidal. Using Frobenius reciprocity and Mackey formula\footnote{This argument will occur several times in this section, so we refer to the reader for more details in the proof of Theorem \ref{Thmdistgalinv}.}, we have: $$\mathrm{Hom}_{R_{1}[G^{\tau}]}(\pi_{0},1)\neq 0\Longleftrightarrow\ \text{There exists }\ g\in G\ \text{suth that}\ \mathrm{Hom}_{R_{1}[\boldsymbol{J}^{g}\cap G^{\tau}]}(\Lambda_{0}^{g},1)\neq 0$$ and $$\mathrm{Hom}_{R_{2}[G^{\tau}]}(\pi,1)\neq 0\Longleftrightarrow\ \text{There exists }\ g\in G\ \text{suth that}\ \mathrm{Hom}_{R_{2}[\boldsymbol{J}^{g}\cap G^{\tau}]}(\Lambda^{g},1)\neq 0$$ By Lemma \ref{LemmaunitaryJJ0}, we get $\boldsymbol{J}^{g}\cap G^{\tau}=J^{g}\cap G^{\tau}$ is a compact group, and $\Lambda_{0}^{g}$ is a representation of finite dimension. Thus we get $$\mathrm{Hom}_{R_{1}[\boldsymbol{J}^{g}\cap G^{\tau}]}(\Lambda_{0}^{g},1)\otimes_{R_{1}}R_{2}\cong\mathrm{Hom}_{R_{2}[\boldsymbol{J}^{g}\cap G^{\tau}]}(\Lambda^{g},1)$$ which finishes the proof of (1). For (2), from \cite{vigneras1996representations}, Chapitre I, 6.13 we know that $\pi_{0}$ is isomorphic to $\pi_{0}^{\sigma}$ if and only if their trace characters are equal up to a scalar in $R_{1}^{\times}$, and similarly for $\pi$ and $\pi^{\sigma}$. Since the trace characters of $\pi_{0}$ and $\pi$ are the same up to the change of scalars, and similarly for $\pi_{0}^{\sigma}$ and $\pi^{\sigma}$, we finish the proof of (2). \end{proof} \end{lemma} \begin{proof}[Proof of Theorem \ref{Thmdistgalinv}] First we consider $R=\mathbb{C}$. If $\mathrm{char}(F)=0$, it is a standard result proved by using global method (\cite{hakim2002globalization}, section 4, Corollary). Especially, their result is based on the globalization theorem, saying a distinguished $\pi$ under our settings can be realized as a local component of a cuspidal automorphic representation $\Pi$ of $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$, which is distinguished by a unitary subgroup of $\mathrm{GL}_{n}(\mathbb{A}_{\mathcal{K}})$ with respect to a quadratic extension of number fields $\mathcal{K}/\mathcal{K}_{0}$ (see \emph{ibid.}, Theorem 1). If $\mathrm{char}(F)>0$, in order to use the proof of Hakim-Murnaghan, we only need a variant of globalization theorem for characteristic positive case. Fortunately, Gan-Lomel\'{\i} already built up such kind of result for general reductive groups over function fields and locally compact fields of characteristic positive (see \cite{ganglobalization}, Theorem 1.3). Following their settings, we choose the reductive group $H$ to be $\mathrm{R}_{\mathcal{K}/\mathcal{K}_{0}}(\mathrm{GL}_{n}(\mathcal{K}))$, where $\mathcal{K}/\mathcal{K}_{0}$ is a quadratic extension of function fields, and $\mathrm{R}_{\mathcal{K}/\mathcal{K}_{0}}$ is the Weil restriction. We choose $V$ to be $\mathrm{M}_{n}(\mathcal{K})$ as a $\mathcal{K}_{0}$-vector space and $\iota:H\rightarrow\mathrm{GL}(V)$ to be a representation over $\mathcal{K}_{0}$ defined as $$\iota(h)x=hx\sigma(\,^{t}h),\quad\ x\in V,\ h\in H, $$ with $\sigma$ denotes the non-trivial involution in $\mathrm{Gal}(\mathcal{K}/\mathcal{K}_{0})$. If we choose $x_{0}\in V$ to be a hermitian matrix in $\mathrm{M}_{n}(\mathcal{K})$ and $H^{x_{0}}$ to be the stabilizer of $x_{0}$, thus $H^{x_{0}}$ becomes a unitary subgroup of $H$ which satisfies the condition of \emph{loc. cit.} In order to use their result, we only need to verify the condition (a) and (b) in their theorem. For condition (a), $\iota$ is semi-simple since it is the direct sum of two irreducible subrepresentations, composing of hermitian matrices and anti-hermitian matrices respectively \footnote{Here we need the assumption $p\neq 2$.}. For condition (b), since we only care about the case when $\chi=1$, it is automatically satisfied. Thus, if we use \cite{ganglobalization}, Theorem 1.3 to replace \cite{hakim2002globalization}, Theorem 1 and follow the proof in \cite{hakim2002globalization}, then we finish the proof when $R=\mathbb{C}$ and $F/F_{0}$ is a quadratic extension of locally compact fields of characteristic $p$. For $\mathrm{char}(R)=0$ in general, we know that a supercuspidal representation of $G$ can be realized as a representation over $\overline{\mathbb{Q}}$ up to a unramified character, where $\overline{\mathbb{Q}}$ is the algebraic closure of $\mathbb{Q}$. More precisely, there exists a character $\chi:F^{\times}\rightarrow R^{\times}$ such that $\chi|_{\mathfrak{o}_{F}^{\times}}=1$ and $\pi\chi$ can be realized as a representation over $\overline{\mathbb{Q}}$. Since $G^{\tau}\cap F^{\times}=G^{\tau}\cap \mathfrak{o}_{F}^{\times}$, we have $\pi$ is $G^{\tau}$-distinguished if and only if $\pi\chi$ is, as a representation over $R$, and also as a representation over $\overline{\mathbb{Q}}$ or $\mathbb{C}$ by Lemma \ref{lemmabasechange}.(1). Using the complex case, we know that $\pi\chi$ is $\sigma$-invariant as a representation over $\mathbb{C}$, and also as a representation over $\overline{\mathbb{Q}}$ or $R$ by Lemma \ref{lemmabasechange}.(2). By definition, $\chi$ is $\sigma$-invariant, thus $\pi$ is also $\sigma$-invariant. For $R=\overline{\mathbb{F}_{l}}$, we write $\pi\cong\mathrm{c}$-$\mathrm{Ind}_{\boldsymbol{J}}^{G}\Lambda$ for a simple type $(\boldsymbol{J},\Lambda)$. By using Mackey formula and Frobenius reciprocity, we have: $$0\neq\mathrm{Hom}_{G^{\tau}}(\pi,1)\cong\prod_{g\in\boldsymbol{J}\backslash G/G^{\tau}}\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1).$$ Thus $\pi$ is distinguished if and only if there exists $g\in G$ such that $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\neq 0$. Let $\gamma=\tau(g)g^{-1}$ and let $\delta(x)=\gamma^{-1}\tau(x)\gamma$ for $x\in G$ which is also a unitary involution, then we have: $$0\neq\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\delta}}(\Lambda,1)=\mathrm{Hom}_{J\cap G^{\delta}}(\Lambda^{0},1)\cong\mathrm{Hom}_{J}(\Lambda^{0},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{F}_{l}}),$$ where $\Lambda^{0}=\Lambda|_{J}$ and we use the fact that $\boldsymbol{J}\cap G^{\delta}=J\cap G^{\delta}$ by Lemma \ref{LemmaunitaryJJ0}. Since $\pi$ is supercuspidal, if we consider $P_{\Lambda^{0}}$ as the projective envelope of $\Lambda^{0}$ as $\overline{\mathbb{Z}_{l}}[J]$-modules, where we denote by $\overline{\mathbb{Z}_{l}}$ the ring of integer of $\overline{\mathbb{Q}_{l}}$, then we have (\cite{vigneras1996representations}, Chapitre III, 4.28 and \cite{serre2012linear}, Proposition 42 for finite group case. Since $\Lambda^{0}$ is a smooth representation of compact group $J$ of finite dimension, it can be regarded as a representation of a finite group.): (1) $P_{\Lambda^{0}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}}$ is the projective envelope of $\Lambda^{0}$ as $\overline{\mathbb{F}_{l}}[J]$-modules, which is indecomposable of finite length, with each irreducible component isomorphic to $\Lambda^{0}$. Thus $\mathrm{Hom}_{\overline{\mathbb{F}_{l}}[J]}(P_{\Lambda^{0}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{F}_{l}})\neq 0$; (2) If we write $\widetilde{P_{\Lambda^{0}}}=P_{\Lambda^{0}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}$ as the $\overline{\mathbb{Q}_{l}}$-lift of $P_{\Lambda^{0}}$, then $\widetilde{P_{\Lambda^{0}}}\cong\bigoplus\widetilde{\Lambda^{0}}$, where $\widetilde{\Lambda^{0}}$ in the direct sum are $\overline{\mathbb{Q}_{l}}$-lifts of $\Lambda^{0}$ with multiplicity 1 (The multiplicity 1 statement is derived by counting the length of $P_{\Lambda^{0}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}}$, and the number of different $\widetilde{\Lambda^{0}}$ in $\widetilde{P_{\Lambda^{0}}}$, and then showing that they are equal. The argument is indicated in the proof of \cite{vigneras1996representations}, Chapitre III, 4.28, or more precisely, \emph{ibid.}, Chapitre III, Th\'eor\`eme 2.2 and Th\'eor\`eme 2.9); (3) In (2), each $(J,\widetilde{\Lambda^{0}})$ can be extended to a simple type $(\boldsymbol{J},\widetilde{\Lambda})$ of $G$ as a $\overline{\mathbb{Q}_{l}}$-lift of $(\boldsymbol{J},\Lambda)$. Using (1), we have $\mathrm{Hom}_{\overline{\mathbb{F}_{l}}[J]}(P_{\Lambda^{0}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{F}_{l}})\neq 0$. Since $P_{\Lambda^{0}}$ is a projective $\overline{\mathbb{Z}_{l}}[J]$-module, it is a free $\overline{\mathbb{Z}_{l}}$-module. Since $\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Z}_{l}}$ is a free $\overline{\mathbb{Z}_{l}}$-module, we have $$\mathrm{Hom}_{\overline{\mathbb{Z}_{l}}[J]}(P_{\Lambda^{0}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Z}_{l}})$$ is a free $\overline{\mathbb{Z}_{l}}$-module. As a result: $$\mathrm{Hom}_{\overline{\mathbb{F}_{l}}[J]}(P_{\Lambda^{0}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{F}_{l}})\cong\mathrm{Hom}_{\overline{\mathbb{Z}_{l}}[J]}(P_{\Lambda^{0}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Z}_{l}})\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}}\neq 0$$ if and only if $$\mathrm{Hom}_{\overline{\mathbb{Z}_{l}}[J]}(P_{\Lambda^{0}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Z}_{l}})\neq 0$$ if and only if $$\mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[J]}(\widetilde{P_{\Lambda^{0}}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Q}_{l}})\cong\mathrm{Hom}_{\overline{\mathbb{Z}_{l}}[J]}(P_{\Lambda^{0}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Z}_{l}})\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}\neq 0,$$ So there exists $\widetilde{\Lambda^{0}}$ as in condition (2) such that $\mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[J]}(\widetilde{\Lambda^{0}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Q}_{l}})\neq 0$. Using (3), we may choose $(\boldsymbol{J},\widetilde{\Lambda})$ as an extension of $(J,\widetilde{\Lambda^{0}})$. We denote $\widetilde{\pi}=\mathrm{Ind}_{\boldsymbol{J}}^{G}\widetilde{\Lambda}$ which is a supercuspidal representation of $G$ over $\overline{\mathbb{Q}_{l}}$. By using $$\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\widetilde{\Lambda}^{g},1)\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\delta}}(\widetilde{\Lambda},1)=\mathrm{Hom}_{J\cap G^{\delta}}(\widetilde{\Lambda^{0}},1)\cong\mathrm{Hom}_{J}(\widetilde{\Lambda^{0}},\mathrm{Ind}_{J\cap G^{\delta}}^{J}\overline{\mathbb{Q}_{l}})\neq 0$$ and Mackey formula and Frobenius reciprocity as before, $\widetilde{\pi}$ is $G^{\tau}$-distinguished. Using the result of characteristic 0 case, we have $\widetilde{\pi}^{\sigma}\cong\widetilde{\pi}$. Using (3), we know that $\widetilde{\Lambda}$ is a lift of $\Lambda$. So $\widetilde{\pi}$ is a lift of $\pi$. So we have $\pi^{\sigma}\cong\pi$. For $\mathrm{char}(R)=l>0$ in general, as in the characteristic zero case, there exists a character $\chi:F^{\times}\rightarrow R^{\times}$ such that $\chi|_{\mathfrak{o}_{F}^{\times}}=1$ and $\pi\chi$ can be realized as a representation over $\overline{\mathbb{F}_{l}}$. Since $G^{\tau}\cap F^{\times}=G^{\tau}\cap \mathfrak{o}_{F}^{\times}$, we have $\pi$ is $G^{\tau}$-distinguished if and only if $\pi\chi$ is, as a representation over $R$, and also as a representation over $\overline{\mathbb{F}}_{l}$ by Lemma \ref{lemmabasechange}.(1). Using the case above, we know that $\pi\chi$ is $\sigma$-invariant, as a representation over $\overline{\mathbb{F}}_{l}$, and also as a representation over $R$ by Lemma \ref{lemmabasechange}.(2). By definition, $\chi$ is $\sigma$-invariant, thus $\pi$ is also $\sigma$-invariant. \end{proof} \begin{remark} It is also possible to give a pure local proof (without using the result for complex supercuspidal case) for this theorem which also works for cuspidal case. Since our proof relies on the refinement of the results and the arguments in section 5 and section 6, which will break the structure of this paper, we simply omit it here. \end{remark} \section{The $\tau$-selfdual type theorem} Let $G=\mathrm{GL}_{n}(F)$ and let $\tau$ be a unitary involution of $G$ corresponding to a hermitian matrix $\varepsilon$. Let $\pi$ be a cuspidal representation of $G$. From our settings of section 3, there exists a maximal simple stratum $[\mathfrak{a},\beta]$ and a simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ contained in $\pi$. The field $E=F[\beta]$ may change when we change our simple stratum. However, from \cite{bushnell1996local} we know that $d=[E:F]$ and $m=n/d$ are only determined by $\pi$; moreover for $T/F$ as the largest tamely ramified subextension under $E/F$, we know that $T$ is only determined by $\pi$ up to $F$-isomorphism. First of all, we have the following lemma: \begin{lemma}\label{LemmatauE} If $\pi$ is $\sigma$-invariant, then we may choose the simple stratum as above such that $\sigma(\,^{t}\beta)=\beta$. As a result, $\sigma_{t}$ (see section 2) is an involution defined on $E$ whose restriction on $F$ is $\sigma$. \end{lemma} Let $E_{0}=E^{\sigma_{t}}$, where $E=F[\beta]$ and $\beta$ is chosen as in Lemma \ref{LemmatauE}. We may state the following important theorem. \begin{theorem}\label{Thmtautheta} Let $\pi$ be a $\sigma$-invariant cuspidal representation of $G$ and let $\tau$ be a unitary involution. We also assume the following additional condition: \emph{If the hermitian matrix corresponding to $\tau$ is not in the same class as $I_{n}$ in $\mathcal{X}$ up to $G$-action and if there exists a maximal simple stratum $[\mathfrak{a},\beta]$ as in Lemma \ref{LemmatauE} with a $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ contained in $\pi$, such that the corresponding $E/E_{0}$ is unramified, then $m$ is odd.} Then there exist a maximal simple stratum $[\mathfrak{a}',\beta']$ and a simple character $\theta'\in\mathcal{C}(\mathfrak{a}',\beta')$ contained in $\pi$ such that: (1) $\tau(\beta')=\beta'^{-1}$; (2) $\tau(\mathfrak{a}')=\mathfrak{a}'$ and\footnote{For the meaning of $\tau(\mathfrak{a}')$, see subsection 2.1. Same notations for Theorem \ref{Thmendotautheta} and further proofs.} $\tau(H^{1}(\mathfrak{a}',\beta'))=H^{1}(\mathfrak{a}',\beta')$; (3) $\theta'\circ \tau=\theta'^{-1}$. \end{theorem} As a corollary of Theorem \ref{Thmtautheta}, we state the following theorem as the main theorem of this section: \begin{theorem}[The $\tau$-selfdual type theorem]\label{Thmselfdualtype} Under the same condition of Theorem \ref{Thmtautheta}, there exists a simple type $(\boldsymbol{J},\Lambda)$ contained in $\pi$ such that $\tau(\boldsymbol{J})=\boldsymbol{J}$ and $\Lambda^{\tau}\cong\Lambda^{\vee}$. \end{theorem} In the following subsections, we will focus on the proof of the results stated. \subsection{Endo-class version of main results} To prove Theorem \ref{Thmtautheta} and Theorem \ref{Thmselfdualtype}, we state the following corresponding endo-class version theorems. Let $\Theta$ be an endo-class over $F$. As mentioned in section 3, we denote $d=\mathrm{deg}(\Theta)$. Moreover, its tame parameter field $T$ as a tamely ramified extension of $F$ is unique up to a $F$-isomorphism. We denote by $\Theta^{\sigma}$ the corresponding endo-class when acting $\sigma$ on $\Theta$. From the definition of endo-class, we may choose a maximal simple stratum $[\mathfrak{a},\beta]$ and a simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ such that $\theta\in\Theta$, or in other words, $\theta$ represents $\Theta$. We denote by $n$ the size of $\mathfrak{a}$, i.e. $\mathfrak{a}\hookrightarrow\mathrm{M}_{n}(F)$ as a hereditary order. We write $n=md$ such that $m$ is a positive integer. First of all, we have the following lemma as an endo-class version of Lemma \ref{LemmatauE} which will be proved in subsection 5.4. \begin{lemma}\label{LemmaendotauE} If $\Theta^{\sigma}=\Theta$, then we may choose $\beta$ in the simple stratum as above such that $\sigma(\,^{t}\beta)=\beta$. As a result, $\sigma_{t}$ is an involution defined on $E$ whose restriction on $F$ is $\sigma$. \end{lemma} Let $E_{0}=E^{\sigma_{t}}$, where $E=F[\beta]$ and $\beta$ is chosen as in Lemma \ref{LemmaendotauE}. The following theorem as an endo-class version of Theorem \ref{Thmtautheta} says that we may adjust our choice of simple stratum and simple character such that they are $\tau$-selfdual with respect to a unitary involution $\tau$: \begin{theorem}\label{Thmendotautheta} Let $\Theta\in\mathcal{E}(F)$ be an endo-class over $F$ such that $\Theta^{\sigma}=\Theta$. Let $\tau$ be a unitary involution of $G$. We also assume the following additional condition: \emph{If the hermitian matrix corresponding to $\tau$ is not in the same class as $I_{n}$ in $\mathcal{X}$ up to $G$-action and if there exists a maximal simple stratum $[\mathfrak{a},\beta]$ as in Lemma \ref{LemmaendotauE} with a $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ contained in $\Theta$, such that the corresponding $E/E_{0}$ is unramified, then $m=n/d$ is odd.} Then there exist a maximal simple type $[\mathfrak{a}',\beta']$ of $\mathrm{M}_{n}(F)$ and a simple character $\theta'\in\mathcal{C}(\mathfrak{a}',\beta')$ such that: (1) $\tau(\beta')=\beta'^{-1}$; (2) $\tau(\mathfrak{a}')=\mathfrak{a}'$ and $\tau(H^{1}(\mathfrak{a}',\beta'))=H^{1}(\mathfrak{a}',\beta')$; (3) $\theta'\in\Theta$ and $\theta'\circ\tau=\theta'^{-1}$. \end{theorem} Later we will focus on the proof of Theorem \ref{Thmendotautheta}. So before we begin our proof, it is necessary to illustrate how does this theorem imply Theorem \ref{Thmtautheta} and Theorem \ref{Thmselfdualtype}. First, we have the following important result due to Gelfand and Kazhdan (see \cite{bernstein1976representations}, Theorem 7.3 for complex case and \cite{secherre2016modular}, Proposition 8.4 for $l$-modular case): \begin{proposition}\label{PropGelKa} For $\pi$ an irreducible representation of $\mathrm{GL}_{n}(F)$, the representation defined by $g\mapsto\pi(\,^{t}g^{-1})$ for any $g\in\mathrm{GL}_{n}(F)$ is isomorphic to $\pi^{\vee}$. \end{proposition} For $\pi$ given as in Lemma \ref{LemmatauE}, if we denote by $\Theta_{\pi}$ the endo-class corresponding to $\pi$, then we get $\Theta_{\pi}^{\sigma}=\Theta_{\pi}$. So we may use Lemma \ref{LemmaendotauE} to get Lemma \ref{LemmatauE} and use Theorem \ref{Thmendotautheta} to get Theorem \ref{Thmtautheta}. Now we show that Theorem \ref{Thmtautheta} implies Theorem \ref{Thmselfdualtype}. Using Proposition \ref{PropGelKa}, we have $\pi^{\tau\vee}\cong\pi^{\sigma}\cong\pi$. Let $(\boldsymbol{J},\Lambda)$ be a simple type of $\pi$ containing $\theta'$, where $\theta'$ is obtained from Theorem \ref{Thmtautheta}. Moreover from Theorem \ref{Thmtautheta}, we know that $\theta'\circ\tau=\theta'^{-1}$, thus $\tau(\boldsymbol{J})=\boldsymbol{J}$ since they are the $G$-normalizers of $\theta'\circ\tau$ and $\theta'^{-1}$ respectively. Since $\pi^{\tau\vee}\cong\pi$, it contains both $(\boldsymbol{J},\Lambda)$ and $(\boldsymbol{J},\Lambda^{\tau\vee})$. By Proposition \ref{PropType}, there exists $g\in G$ such that $(\boldsymbol{J},\Lambda^{\tau\vee})=(\boldsymbol{J}^{g},\Lambda^{g})$. Since $\Lambda^{\tau\vee}\cong\Lambda^{g}$ contains both $(\theta'\circ\tau)^{-1}=\theta'$ and $\theta'^{g}$ as simple characters, if we restrict $\Lambda^{g}$ to the intersection: \begin{equation}\label{eqH1int} H^{1}(\mathfrak{a}',\beta')\cap H^{1}(\mathfrak{a}',\beta')^{g} \end{equation} then we get a direct sum of copies of $\theta'^{g}$ restricting to (\ref{eqH1int}) which contains the restriction of $\theta'$ to (\ref{eqH1int}). It follows that $g$ intertwines $\theta'$. By Proposition \ref{PropJandJ1}.(5), we know that $g\in J(\mathfrak{a}',\beta')B'^{\times}J(\mathfrak{a}',\beta')$ with $B'$ the centralizer of $E'$ in $\mathrm{M}_{n}(F)$. Thus we may assume $g\in B'^{\times}$. By the uniqueness of maximal compact subgroup in $\boldsymbol{J}$, we have $\boldsymbol{J}^{g}=\boldsymbol{J}$ implies $J(\mathfrak{a}',\beta')^{g}=J(\mathfrak{a}',\beta')$. Intersecting it with $B'^{\times}$ implies that $\mathfrak{b}'^{\times g}=\mathfrak{b}'^{\times}$. Since $\mathfrak{b}'^{\times}$ is a maximal compact subgroup of $B'^{\times}\cong\mathrm{GL}_{m}(E')$ and $g\in B'^{\times}$, we get $g\in E'^{\times}\mathfrak{b}'^{\times}\subset J(\mathfrak{a}',\beta')$. Thus $(\boldsymbol{J}^{g},\Lambda^{g})=(\boldsymbol{J},\Lambda)$, which finishes the proof of Theorem \ref{Thmselfdualtype}. Finally we state the following two lemmas which will be useful in our further proof: \begin{lemma}\label{Lemmasigmaendo} Let $[\mathfrak{a},\beta]$ be a maximal simple stratum of $\mathrm{M}_{n}(F)$ and let $\Theta$ be a $\sigma$-invariant endo-class over $F$, such that there exists $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ a simple character representing $\Theta$. Then we have $\theta\circ\tau$ and $\theta^{-1}$ are in the same endo-class. In particular, if the hereditary order $\mathfrak{a}$ is $\tau$-invariant, then $\theta\circ\tau$ conjugates to $\theta^{-1}$ by an element in $U(\mathfrak{a})$. \end{lemma} \begin{proof} We choose $\pi$ as any cuspidal representation of $G$ such that $\theta$ is contained in $\pi$. Thus by definition, we have $\Theta_{\pi}=\Theta$. Using Proposition \ref{PropGelKa}, we have $\pi^{\tau}\cong\pi^{\sigma\vee}$. So we have $\theta\circ\tau\in\Theta_{\pi^{\tau}}=\Theta_{\pi^{\sigma\vee}}=\Theta_{\pi^{\vee}}^{\sigma}$ and $\theta^{-1}\in\Theta_{\pi^{\vee}}$. Since $\Theta^{\sigma}=\Theta$, we have $\Theta_{\pi^{\vee}}^{\sigma}=\Theta_{\pi^{\vee}}$, which means that $\theta\circ\tau$ and $\theta^{-1}$ are in the same endo-class. If $\tau(\mathfrak{a})=\mathfrak{a}$, then by definition and construction of endo-equivalence (\cite{bushnell1996local}, Theorem 8.7), we know that $\theta\circ\tau$ intertwines with $\theta^{-1}$. By \cite{bushnell129admissible}, Theorem 3.5.11, $\theta\circ\tau$ conjugates to $\theta^{-1}$ by an element in $U(\mathfrak{a})$. \end{proof} The following lemma will be used to show that sometimes we may change the choice of unitary involution up to $G$-action on its corresponding hermitian matrix. \begin{lemma}\label{lemGconjtau} Let $\tau=\tau_{\varepsilon}$ be the unitary involution on $\mathrm{GL}_{n}(F)$ corresponding to a hermitian matrix $\varepsilon$, let $[\mathfrak{a},\beta]$ be a maximal simple stratum of $\mathrm{M}_{n}(F)$ and let $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ be a simple character, such that $$\tau(\mathfrak{a})=\mathfrak{a},\quad \theta\circ\tau=\theta^{-1}\quad (\text{and}\ \tau(\beta)=\beta^{-1}).$$ Then for $\tau'=\tau_{\varepsilon'}$ as the unitary involution on $\mathrm{GL}_{n}(F)$ corresponding to a hermitian matrix $\varepsilon'=g^{-1}\varepsilon\sigma(\,^{t}g^{-1})$, we have $$\tau'(\mathfrak{a}^{g})=\mathfrak{a}^{g},\quad \theta^{g}\circ\tau'=(\theta^{g})^{-1}\quad (\text{and}\ \tau'(\beta^{g})=(\beta^{g})^{-1}).$$ \end{lemma} \begin{proof} The proof is just a simple calculation, for example \begin{align*} \tau'(\mathfrak{a}^{g})=\tau'(g^{-1})\tau'(\mathfrak{a})\tau'(g)=\tau'(g^{-1})\varepsilon'\varepsilon^{-1}\tau(\mathfrak{a})(\varepsilon'\varepsilon^{-1})^{-1}\tau'(g)=g^{-1}\tau(\mathfrak{a})g, \end{align*} where the last step we use $$(\varepsilon'\varepsilon^{-1})^{-1}\tau'(g)=\varepsilon\sigma(\,^{t}g^{-1})\varepsilon'^{-1}=g.$$ Since $\tau(\mathfrak{a})=\mathfrak{a}$, we get $\tau'(\mathfrak{a}^{g})=\mathfrak{a}^{g}$. The other two equations can be proven in similar way. \end{proof} \subsection{The maximal and totally wildly ramified case} Now we focus on the proof of Theorem \ref{Thmendotautheta}. We imitate the strategy in \cite{anandavardhanan2018galois}, section 4 which first consider special case, and then use tame lifting developed by Bushnell and Henniart \cite{bushnell1996local} and other tools developed by Bushnell and Kutzko \cite{bushnell129admissible} to generalize our result. In this subsection, we prove the following proposition as a special case of (2) and (3) of Theorem \ref{Thmendotautheta}: \begin{proposition}\label{propmaxwild} Let $[\mathfrak{a},\beta]$ be a simple stratum of $\mathrm{M}_{n}(F)$ and let $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ such that $\theta\in\Theta$ with $\Theta$ a $\sigma$-invariant endo-class. Let $E/F$ be totally wildly ramified of degree $n$. Let $\tau=\tau_{1}$ with $\tau_{1}(x):=\sigma(\,^{t}x^{-1})$ for any $x\in G$. Then there exist a simple stratum $[\mathfrak{a}'',\beta'']$ and a simple character $\theta''\in\mathcal{C}(\mathfrak{a}'',\beta'')$ such that $(\mathfrak{a}'',\theta'')$ is $G$-conjugate to $(\mathfrak{a},\theta)$ with the property $\tau(\mathfrak{a}'')=\mathfrak{a}''$ and $\theta''\circ\tau=\theta''^{-1}$. \end{proposition} \begin{remark} We have $[E:F]=d=n$, which is a power of $p$ as an odd number. \end{remark} Up to $G$-conjugacy, we may and will assume that $\mathfrak{a}$ is standard (that is, $\mathfrak{a}$ is made of matrices with upper triangular elements in $\mathfrak{o}_{F}$ and other elements in $\mathfrak{p}_{F}$.). First we prove the following lemma: \begin{lemma}\label{lemmataua} There exist $g_{1}\in G$ and $a_{1},...,a_{n}\in\mathfrak{o}_{F}^{\times}$ such that $$\tau(g_{1})g_{1}^{-1}=A:=\begin{pmatrix}0 & 0 & \ldots & 0 & a_{1}\\ 0 & \iddots & \iddots & a_{2} & 0 \\ \vdots & \iddots & \iddots & \iddots & \vdots \\ 0 & a_{n-1} & \iddots & \iddots & 0 \\ a_{n} & 0 & \ldots & 0 & 0 \end{pmatrix}.$$ Moreover, if we define $\mathfrak{a}':=\mathfrak{a}^{g_{1}}$, then we have $\tau(\mathfrak{a}')=\mathfrak{a}'$. \end{lemma} \begin{proof} First we claim that we may choose $a_{i}\in\mathfrak{o}_{F}^{\times}$ such that $A$ is a hermitian matrix and $\mathrm{det}(A)\in\mathrm{N}_{F/F_{0}}(F^{\times})$. To do that, noting that $A^{*}=A$ if and only if $a_{i}=\sigma(a_{n+1-i})$ for $i=1,2,...,n$. So we choose $a_{i}=\sigma(a_{n+1-i})$ for $i=1,2,...,(n-1)/2$ randomly but only to make sure that they are in $\mathfrak{o}_{F}^{\times}$. Finally we choose $a_{(n+1)/2}\in\mathfrak{o}_{F_{0}}^{\times}$ to make sure that $\mathrm{det}(A)\in\mathrm{N}_{F/F_{0}}(F^{\times})$. So we finish the proof of the claim. Since $A$ is a hermitian matrix which is in the same $G$-orbit as $I_{n}$ by considering the determinant, using Proposition \ref{PropGOH}, there exists $g_{1}\in G$ such that $(g_{1}^{-1})^{*}g_{1}^{-1}=A$, which means that $\tau(g_{1})g_{1}^{-1}=A$. By definition $\tau(\mathfrak{a}')=\mathfrak{a}'$ if and only if $\tau(g_{1}^{-1})\tau(\mathfrak{a})\tau(g_{1})=g_{1}^{-1}\mathfrak{a}g_{1}$. Since $\mathfrak{a}^{*}=\,^{t}\mathfrak{a}$, we have $\tau(\mathfrak{a}')=\mathfrak{a}'$ if and only if $A^{-1}\,^{t}\mathfrak{a}A=(\tau(g_{1})g_{1}^{-1})^{-1}\,^{t}\mathfrak{a}\tau(g_{1})g_{1}^{-1}=\mathfrak{a}$. From our choice of $A$ and the definition of $\mathfrak{a}$, this can be verified directly. So we finish the proof. \end{proof} Now keep $g_{1}$ as in Lemma \ref{lemmataua}. We denote $\theta'=\theta^{g_{1}}$ and $\beta'=\beta^{g_{1}}$. Since $\mathfrak{a'}=\mathfrak{a}^{g_{1}}$, we also have: (1) $U'^{i}:=U^{i}(\mathfrak{a}')=U^{i}(\mathfrak{a})^{g_{1}}$, where $U^{i}(\mathfrak{a}):=1+\mathfrak{p}_{\mathfrak{a}}^{i}$ for $i\geq 1$; (2) $J':=J(\mathfrak{a}',\beta')=J(\mathfrak{a},\beta)^{g_{1}}$; (3) $J'^{1}:=J^{1}(\mathfrak{a}',\beta')=J^{1}(\mathfrak{a},\beta)^{g_{1}}$; (4) $\boldsymbol{J}':=\boldsymbol{J}(\mathfrak{a}',\beta')=\boldsymbol{J}(\mathfrak{a},\beta)^{g_{1}}$; (5) $H'^{1}:=H^{1}(\mathfrak{a}',\beta')=H^{1}(\mathfrak{a},\beta)^{g_{1}}$; (6) $M':=M^{g_{1}}$, where $M=\mathfrak{o}_{F}^{\times}\times...\times\mathfrak{o}_{F}^{\times}$ is the subgroup of diagonal matrices contained in $\mathfrak{a}$. Since $\mathfrak{a}'$ is $\tau$-stable and $\Theta^{\sigma}=\Theta$, using Lemma \ref{Lemmasigmaendo}, there exists $u'\in U(\mathfrak{a}')$ such that $\theta'\circ\tau=(\theta'^{-1})^{u'}$. Since $\theta'=\theta'\circ\tau\circ\tau=(\theta'^{-1})^{u'}\circ\tau=\theta'^{u'\tau(u')}$, we get $u'\tau(u')$ normalizes $\theta'$, which means that $u'\tau(u')\in \boldsymbol{J}'\cap U(\mathfrak{a}')=J'$ by using Proposition \ref{PropJandJ1}.(4). To prove Proposition \ref{propmaxwild}, we only need to search for $x'\in G$ such that $\mathfrak{a}'':=\mathfrak{a'}^{x'}$ is $\tau$-stable, and the character $\theta'':=\theta'^{x'}$ has the desired property. By direct calculation, it means that $\tau(x')x'^{-1}$ normalizes $\mathfrak{a}'$ and $u'\tau(x')x'^{-1}$ normalizes $\theta'$, so it suffices to choose $x'$ such that $u'\tau(x')x'^{-1}\in\boldsymbol{J}'$ by using Proposition \ref{PropJandJ1}.(4) and the fact that $u'^{-1}\boldsymbol{J}'\subset \mathcal{N}(\mathfrak{a}')$, where $\mathcal{N}(\mathfrak{a}')$ denotes the normalizer of $\mathfrak{a}'$. First we prove the following lemma: \begin{lemma}\label{LemmayU1} There exists $y'\in M'$ such that $u'\tau(y')y'^{-1}\in J(\mathfrak{a'},\beta')U^{1}(\mathfrak{a}')=\mathfrak{o}_{F}^{\times}U^{1}(\mathfrak{a}')$. \end{lemma} \begin{proof} First we let $u'=g_{1}^{-1}ug_{1}$ for $u\in U(\mathfrak{a})$. Then $u'\tau(u')\in J(\mathfrak{a'},\beta')$ implies that $uA^{-1}(u^{-1})^{*}A\in J(\mathfrak{a},\beta)\subset \mathfrak{o}_{F}^{\times}U^{1}(\mathfrak{a})$ by a simple calculation, where $A$ is defined as in Lemma \ref{lemmataua}. We choose $y'=g_{1}^{-1}yg_{1}$ with $y=\mathrm{diag}(y_{1},...,y_{n})\in M=\mathfrak{o}_{F}^{\times}\times...\times\mathfrak{o}_{F}^{\times}$ to be determined. By a simple calculation, $u'\tau(y')y'^{-1}\in J(\mathfrak{a'},\beta')U^{1}(\mathfrak{a}')$ if and only if $uA^{-1}(y^{-1})^{*}Ay^{-1}\in J(\mathfrak{a},\beta)U^{1}(\mathfrak{a})=\mathfrak{o}_{F}^{\times}U^{1}(\mathfrak{a})$. We use $\overline{u_{i}}$, $\overline{a}$, $\overline{y_{i}}$ and $\overline{b}$ to denote the image of $u_{i}$, $a$, $y_{i}$, $b$ in $k_{F}\cong\mathfrak{o}_{F}/\mathfrak{p}_{F}$ respectively, where $a,b,u_{i}\in\mathfrak{o}_{F}$ will be defined in the future. We denote $A=\begin{pmatrix}0 & 0 & \ldots & 0 & a_{1}\\ 0 & \iddots & \iddots & a_{2} & 0 \\ \vdots & \iddots & \iddots & \iddots & \vdots \\ 0 & a_{n-1} & \iddots & \iddots & 0 \\ a_{n} & 0 & \ldots & 0 & 0 \end{pmatrix}$ and $u=\begin{pmatrix} u_{1} & *_{\mathfrak{o}_{F}} & \ldots & \ldots & \ *_{\mathfrak{o}_{F}} \\ *_{\mathfrak{p}_{F}} & u_{2} & \ddots & \ddots & \vdots \\ \vdots & \ddots & \ddots & \ddots & \vdots \\ \vdots & \ddots & \ddots & u_{n-1} & *_{\mathfrak{o}_{F}} \\ *_{\mathfrak{p}_{F}} & \ldots & \ldots & *_{\mathfrak{p}_{F}} & u_{n}\end{pmatrix}$, where $*_{\mathfrak{o}_{F}}$ and $*_{\mathfrak{p}_{F}}$ represent elements in $\mathfrak{o}_{F}$ and $\mathfrak{p}_{F}$ respectively. By direct calculation, we have: $$uA^{-1}(u^{-1})^{*}A= \begin{pmatrix} u_{1}\sigma(u_{n}^{-1}) & *_{\mathfrak{o}_{F}} & \ldots & \ldots & \ *_{\mathfrak{o}_{F}} \\ *_{\mathfrak{p}_{F}} & u_{2}\sigma(u_{n-1}^{-1}) & \ddots & \ddots & \vdots \\ \vdots & \ddots & \ddots & \ddots & \vdots \\ \vdots & \ddots & \ddots & u_{n-1}\sigma(u_{2}^{-1}) & *_{\mathfrak{o}_{F}} \\ *_{\mathfrak{p}_{F}} & \ldots & \ldots & *_{\mathfrak{p}_{F}} & u_{n}\sigma(u_{1}^{-1})\end{pmatrix}\in\mathfrak{o}_{F}^{\times}U^{1}(\mathfrak{a}),$$ which means that there exists $a\in\mathfrak{o}_{F}^{\times}$ such that: \begin{equation}\label{equsigmau} u_{1}\sigma(u_{n}^{-1}), u_{2}\sigma(u_{n-1}^{-1}),...,u_{n}\sigma(u_{1}^{-1})\in a(1+\mathfrak{p}_{F}). \end{equation} Also by direct calculation, we have:$$uA^{-1}(y^{-1})^{*}Ay^{-1}=\begin{pmatrix} u_{1}y_{1}^{-1}\sigma(y_{n}^{-1}) & *_{\mathfrak{o}_{F}} & \ldots & \ldots & \ *_{\mathfrak{o}_{F}} \\ *_{\mathfrak{p}_{F}} & u_{2}y_{2}^{-1}\sigma(y_{n-1}^{-1}) & \ddots & \ddots & \vdots \\ \vdots & \ddots & \ddots & \ddots & \vdots \\ \vdots & \ddots & \ddots & u_{n-1}y_{n-1}^{-1}\sigma(y_{2}^{-1}) & *_{\mathfrak{o}_{F}} \\ *_{\mathfrak{p}_{F}} & \ldots & \ldots & *_{\mathfrak{p}_{F}} & u_{n}y_{n}^{-1}\sigma(y_{1}^{-1})\end{pmatrix}$$ which means that the lemma is true if and only if there exists $b\in\mathfrak{o}_{F}^{\times}$ such that: \begin{equation}\label{equAsigmay} u_{1}y_{1}^{-1}\sigma(y_{n}^{-1}),u_{2}y_{2}^{-1}\sigma(y_{n-1}^{-1}),...,u_{n}y_{n}^{-1}\sigma(y_{1}^{-1})\in b(1+\mathfrak{p}_{F}). \end{equation} If we consider modulo $\mathfrak{p}_{F}$, then condition (\ref{equsigmau}) becomes: \begin{equation}\label{eqmodusigmau} \overline{u_{1}}\sigma(\overline{u_{n}}^{-1})=\overline{u_{2}}\sigma(\overline{u_{n-1}}^{-1})=...=\overline{u_{n}}\sigma(\overline{u_{1}}^{-1})=\overline{a}. \end{equation} Moreover, if we consider modulo $U^{1}(\mathfrak{a})$, then $uA^{-1}(y^{-1})^{*}Ay^{-1}\in\mathfrak{o}_{F}^{\times}U^{1}(\mathfrak{a})$ if and only if there exists $y_{i}\in\mathfrak{o}_{F}^{\times}$ such that there exists $b\in\mathfrak{o}_{F}^{\times}$ in condition (\ref{equAsigmay}) such that: \begin{equation}\label{eqmoduAsigmay} \overline{u_{1}}\overline{y_{1}}^{-1}\sigma(\overline{y_{n}}^{-1})=\overline{u_{2}}\overline{y_{2}}^{-1}\sigma(\overline{y_{n-1}}^{-1})=...=\overline{u_{n}}\overline{y_{n}}^{-1}\sigma(\overline{y_{1}}^{-1})=\overline{b}. \end{equation} We choose $b=u_{(n+1)/2}$, thus we have $\overline{b}\sigma(\overline{b}^{-1})=\overline{a}$. Furthermore we choose $y_{i}=b^{-1}u_{i}$ when $i=1,2,...,(n-1)/2$ and $y_{i}=1$ when $i=(n+1)/2,...,n$. Combining with equation (\ref{eqmodusigmau}), the equation (\ref{eqmoduAsigmay}) is satisfied. So we finish the proof. \end{proof} Let us write $z'u'\tau(y')y'^{-1}\in U'^{1}$ for some $y'\in M'$ and $z'\in \mathfrak{o}_{F}^{\times}$ given by Lemma \ref{LemmayU1}. By replacing the stratum $[\mathfrak{a}',\beta']$ with $[\mathfrak{a}'^{y'},\beta'^{y'}]$, the simple character $\theta'$ with $\theta'^{y'}$ and $u'$ with $y'^{-1}z'u'\tau(y')$, which doesn't affect the fact that the order is $\tau$-stable, we can and will assume that $u'\in U'^{1}$. We denote $J'^{i}=J'\cap U'^{i}$ for $i\geq 1$. Now we state the following two lemmas which correspond to Lemma 4.16 and Lemma 4.17 in \cite{anandavardhanan2018galois}. Actually the same proofs work when one replaces the Galois involution $\sigma$ in the original lemmas with any involution $\tau$ on $G$. \begin{lemma}\label{Lemmavtauvi+1} Let $v'\in U'^{i}$ for some $i\geq 1$ and assume that $v'\tau(v')\in J'^{i}$. Then there exist $j'\in J'^{i}$ and $x'\in U'^{i}$ such that $j'v'\tau(x')x'^{-1}\in U'^{i+1}$. \end{lemma} Using Lemma \ref{Lemmavtauvi+1} to replace Lemma 4.16 in \cite{anandavardhanan2018galois}, we may prove the following lemma: \begin{lemma}\label{Lemmaxjvh} There exists a sequence of $(x_{i}',j_{i}',v_{i}')\in U'^{i}\times J'^{i}\times U'^{i+1}$ for $i\geq 0$, satisfying the following conditions: (1) $(x_{0}',j_{0}',v_{0}')=(1,1,u')$; (2) for all $i\geq 0$, if we set $y'_{i}=x_{0}'x_{1}'...x_{i}'\in U'^{1}$, then the simple character $\theta_{i}'=\theta'^{y_{i}'}\in\mathcal{C}(\mathfrak{a}',\beta'^{y_{i}'})$ satisfies $\theta_{i}'\circ\tau=(\theta_{i}'^{-1})^{v_{i}'}$; (3) for all $i\geq 1$, we have $y_{i}'v_{i}'=j_{i}'y_{i-1}'v_{i-1}'\tau(x_{i}')$. \end{lemma} Let $x'\in U'^{1}$ be the limit of $y_{i}'=x_{0}'x_{1}'...x_{i}'$ and let $h'\in J'^{1}$ be that of $j_{i}'...j_{1}'j_{0}'$ when $i$ tends to infinity. By Lemma \ref{Lemmaxjvh}.(3), we have: $$y_{i}'v_{i}'\tau(y_{i}'^{-1})=j_{i}'y_{i-1}'v_{i-1}'\tau(y_{i-1}'^{-1})=...=j_{i}'...j_{1}'j_{0}'u'.$$ Passing to the limit, we get $x'\tau(x')^{-1}=h'u'$, which implies that $u'\tau(x')x'^{-1}=h'^{-1}\in J'$. Let $(\mathfrak{a}'',\theta'')=(\mathfrak{a}'^{x'},\theta'^{x'})$, we finish the proof of Proposition \ref{propmaxwild}. \subsection{The maximal case} In this subsection, we generalize Proposition \ref{propmaxwild} to the following situation: \begin{proposition}\label{Propmaximalonly} Let $[\mathfrak{a},\beta]$ be a simple stratum of $\mathrm{M}_{n}(F)$ such that $[E:F]=n$ and let $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ such that $\theta\in\Theta$ with $\Theta$ a $\sigma$-invariant endo-class. Let $\tau$ be a given unitary involution. Then there exist a simple stratum $[\mathfrak{a}'',\beta'']$ and a simple character $\theta''\in\mathcal{C}(\mathfrak{a}'',\beta'')$ such that $(\mathfrak{a}'',\theta'')$ is $G$-conjugate to $(\mathfrak{a},\theta)$ with the property $\tau(\mathfrak{a}'')=\mathfrak{a}''$ and $\theta''\circ\tau=\theta''^{-1}$. \end{proposition} To prove the proposition, we first study the property of an endo-class $\Theta$ over $F$ which is $\sigma$-invariant, i.e. $\Theta^{\sigma}=\Theta$. Let $T$ be a tame parameter field of $\Theta$. First we have the following lemma: \begin{lemma}\label{LemmaTFlift} Let $\Theta$ be a $\sigma$-invariant endo-class and let $T/F$ be its tame parameter field. Then given a $T/F$-lift $\Psi$ of $\Theta$, there is a unique involution $\alpha$ of $T$ extending $\sigma$ such that $\Psi^{\alpha}=\Psi$. \end{lemma} \begin{proof} The proof of Lemma 4.8 in \cite{anandavardhanan2018galois} can be used almost unchanged to our lemma. We only need to consider $\Theta$ instead of $\Theta^{\vee}$ and $\Psi$ instead of $\Psi^{\vee}$. \end{proof} Let $\alpha$ be the involution of $T$ given by Lemma \ref{LemmaTFlift}, and let $T_{0}$ be the fixed point of $\alpha$ in $T$. Thus $T_{0}\cap F=F_{0}$. We denote $t=[T:F]=[T_{0}:F_{0}]$. We need the following proposition due to Hakim and Murnaghan (see \cite{hakim2002tame}, Proposition 2.1): \begin{proposition}\label{Proptameembed} There exists an embedding $\iota: T\hookrightarrow \mathrm{M}_{t}(F)$ of $F$-algebras such that for $x\in T$, we have $\iota(\alpha(x))=\iota(x)^{*}:=\sigma(\,^{t}\iota(x))$. Consequently, $\iota(T_{0})$ is contained in the set of hermitian matrices. \end{proposition} \begin{proof}[Proof of Proposition \ref{Propmaximalonly}] Let $E=F[\beta]$ and let $T$ be the maximal tamely ramified extension of $F$ in $E$. It is a tame parameter field of the endo-class $\Theta$. The simple character $\theta$ gives $\Psi$, the endo-class of the interior $T/F$-lift of $\Theta$, as we introduced in subsection \ref{subsectionendo}. Let $\alpha$ be defined as in Lemma \ref{LemmaTFlift}. Let $\iota$ be defined as in Proposition \ref{Proptameembed}. We may also consider $$\iota:\mathrm{M}_{n/t}(T)\hookrightarrow\mathrm{M}_{n/t}(\mathrm{M}_{t}(F))=\mathrm{M}_{n}(F)$$ as each block defined by the original $\iota$. First we consider $\tau(x)=\varepsilon\sigma(\,^{t}x^{-1})\varepsilon^{-1}$ for any $x\in G$ with $\varepsilon=I_{n}$ or $\mathrm{diag}(\iota(\epsilon),...,\iota(\epsilon),\iota(\epsilon))$, where $\epsilon\in T_{0}^{\times}\backslash\mathrm{N}_{T/T_{0}}(T^{\times})$. The determinant of the latter matrix is $\mathrm{N}_{T_{0}/F_{0}}(\epsilon)^{n/t}$. Since $$\mathrm{N}_{T_{0}/F_{0}}:T_{0}^{\times}\rightarrow F_{0}^{\times}$$ is a homomorphisim which maps $\mathrm{N}_{T/T_{0}}(T^{\times})$ to $\mathrm{N}_{F/F_{0}}(F^{\times})$, it leads to a group homomorphism $$\mathrm{N}_{T_{0}/F_{0}}:T_{0}^{\times}/\mathrm{N}_{T/T_{0}}(T^{\times})\rightarrow F_{0}^{\times}/\mathrm{N}_{F/F_{0}}(F^{\times})$$ between two groups of order 2. We state and proof the following lemma in general: \begin{lemma}\label{Lemmafieldext} Let $F, F_{0}$ be defined as before. Let $L_{0}/F_{0}$ be a finite extension such that $L=L_{0}F$ is a field with $[L:L_{0}]=2$ and $F_{0}=L_{0}\cap F$. Then the group homomorphism $$\mathrm{N}_{L_{0}/F_{0}}:L_{0}^{\times}\rightarrow F_{0}^{\times}$$ induces a group isomorphism $$\mathrm{N}_{L_{0}/F_{0}}:L_{0}^{\times}/\mathrm{N}_{L/L_{0}}(L^{\times})\rightarrow F_{0}^{\times}/\mathrm{N}_{F/F_{0}}(F^{\times})$$ of groups of order 2. \end{lemma} \begin{proof} We first consider the case when $L_{0}/F_{0}$ is abelian. If on the contrary the induced homomorphism is not an isomorphism, then we get $\mathrm{N}_{L_{0}/F_{0}}(L_{0}^{\times})\subset\mathrm{N}_{F/F_{0}}(F^{\times})$ which means that $F$ is contained in $L_{0}$ by Local Class Field Theory (\cite{serre2013local}, Chapter 14, Theorem 1), which is absurd. When $L_{0}/F_{0}$ is Galois, we may write $F_{0}=L^{0}_{0}\subsetneq...\subsetneq L^{r}_{0}=L_{0}$, such that $L^{i+1}_{0}/L^{i}_{0}$ is abelian for $i=0,...,r-1$ (\cite{serre2013local}, Chapter 4, Proposition 7). We write $L^{i}=L^{i}_{0}F$. Thus it is easy to show that $L^{i}/L^{i}_{0}$ is quadratic, $L^{i}_{0}=L^{i+1}_{0}\cap L^{i}$ and $L^{i+1}_{0}L^{i}=L^{i+1}$ for $i=0,...,r-1$. Using the abelian case, we get $$\mathrm{N}_{L_{0}^{i+1}/L_{0}^{i}}:L_{0}^{i+1\times}/\mathrm{N}_{L^{i+1}/L_{0}^{i+1}}(L^{i+1\times})\rightarrow L_{0}^{i\times}/\mathrm{N}_{L^{i}/L^{i}_{0}}(L^{i\times})$$ is an isomorphism for $i=0,1,...,r-1$. Composing them together, we finish the proof. When $L_{0}/F_{0}$ is separable, we write $L_{0}'$ as the normal closure of $L_{0}$ over $F_{0}$. Thus $L_{0}'$ contains $L_{0}$ and $L_{0}'/F_{0}$ is a finite Galois extension. We write $L'=L_{0}'F$. By using the Galois case, we have $$\mathrm{N}_{L_{0}'/F_{0}}:L_{0}'^{\times}/\mathrm{N}_{L'/L_{0}'}(L'^{\times})\rightarrow F_{0}^{\times}/\mathrm{N}_{F/F_{0}}(F^{\times})$$ is an isomorphism. Since $\mathrm{N}_{L_{0}'/F_{0}}(L_{0}'^{\times})\subset\mathrm{N}_{L_{0}/F_{0}}(L_{0}^{\times})$, we get $$\mathrm{N}_{L_{0}/F_{0}}:L_{0}^{\times}/\mathrm{N}_{L/L_{0}}(L^{\times})\rightarrow F_{0}^{\times}/\mathrm{N}_{F/F_{0}}(F^{\times})$$ is also an isomorphism. When $L_{0}/F_{0}$ is in general, we write $L_{0}^{sep}$ as the maximal separable subextension of $F_{0}$ contained in $L_{0}$, thus $L_{0}/L_{0}^{sep}$ is purely inseparable. Thus $\mathrm{N}_{L_{0}/L_{0}^{sep}}(x)=x^{p^{[L_{0}:L_{0}^{sep}]}}$ for any $x\in L_{0}^{\times}$. Since $p\neq 2$ and $L_{0}^{\times}/\mathrm{N}_{L/L_{0}}(L^{\times})$ is of order 2, we get $$\mathrm{N}_{L_{0}/L_{0}^{sep}}:L_{0}^{\times}/\mathrm{N}_{L/L_{0}}(L^{\times})\rightarrow L_{0}^{sep\times}/\mathrm{N}_{L^{sep}/L_{0}^{sep}}(L^{sep\times})$$ is an isomorphism, where $L^{sep}:=LL_{0}^{sep}$. So we come back to the separable case which finishes the proof. \end{proof} Using Lemma \ref{Lemmafieldext} for $L_{0}=T_{0}$, we get the homomorphism above is actually an isomorphism. Since $n/t$ is odd and $\epsilon\in T_{0}^{\times}\backslash\mathrm{N}_{T/T_{0}}(T^{\times})$, we have $\mathrm{det}(\varepsilon)=\mathrm{N}_{T_{0}/F_{0}}(\epsilon)^{n/t}\in F_{0}^{\times}\backslash\mathrm{N}_{F/F_{0}}(F^{\times})$. So indeed these two involutions represent all the two $G$-classes of hermitian matrices. Thus by using Lemma \ref{lemGconjtau}, we may from now on assume $\tau$ to be the two unitary involutions as we mentioned above. Furthermore, $\iota(T)^{\times}$ is normalized by $\tau$ from the exact construction of $\tau$, where we regard $T$ as an $F$-subalgebra of $\mathrm{M}_{n/t}(T)$ given by the diagonal embedding. Since $T$ and $\iota(T)$ are isomorphic as $F$-subalgebras contained in $\mathrm{M}_{n}(F)$, by Skolem-Noether theorem, there exists $g\in G$ such that $\iota(T)=T^{g}$. Thus, if we denote $[\mathfrak{a}',\beta']=[\mathfrak{a}^{g},\beta^{g}]$, $\theta'=\theta^{g}$ and $E'=F[\beta']$, then $\theta'\in\Theta$ such that its tame parameter field equals to $\iota(T)$. Since $\tau$ normalizes $\iota(T)^{\times}$, we have $\theta'\circ\tau$ and $\theta'^{-1}$ have the same parameter field $\iota(T)$. If we write $\Psi'$ as the endo-class of the interior $\iota(T)/F$-lift corresponding to $\theta'$, and if we choose $\alpha'=\iota|_{T}\circ\alpha\circ\iota|_{\iota(T)}^{-1}$, then we have $\Psi'^{\alpha'}=\Psi'$. Let $C'=\mathrm{M}_{n/t}(\iota(T))$ denote the centralizer of $\iota(T)$ in $\mathrm{M}_{n}(F)$. For $c\in \mathrm{M}_{n/t}(T)$, we have: $$\tau(\iota(c))=\varepsilon\sigma(\,^{t}\iota(c)^{-1})\varepsilon^{-1}=\varepsilon(\,^{t_{C'}}\iota(\alpha(c))^{-1})\varepsilon^{-1}=\varepsilon(\alpha'(\,^{t_{C'}}\iota(c))^{-1})\varepsilon^{-1}=\tau'(\iota(c))$$ where we denote by $t_{C'}$ the transpose on $C'=\mathrm{M}_{n/t}(\iota(T))$ and $\tau'(c')=\varepsilon(\alpha'(\,^{t_{C'}}c'^{-1}))\varepsilon^{-1}$ for any $c'\in C'^{\times}$ . Thus $\tau'$ as the restriction of $\tau$ to $C'^{\times}$, is the unitary involution $\tau_{1}$ over $C'^{\times}=\mathrm{GL}_{n/t}(\iota(T))$ with respect to the Galois involution $\alpha'\in\mathrm{Gal}(\iota(T)/F)$. The intersection $\mathfrak{c}'=\mathfrak{a}'\cap C'$ gives rise to a simple stratum $[\mathfrak{c}',\beta']$. The restriction of $\theta'$ to $H^{1}(\mathfrak{c}',\beta')$, denoted by $\theta_{\iota(T)}'$, is a simple character associated to this simple stratum with endo-class $\Psi'$. Since $E'/\iota(T)$ is totally wildly ramified, using Proposition \ref{propmaxwild} with $G$, $\theta$, $\Theta$, $\sigma$ and $\tau$ replaced by $C'^{\times}$, $\theta_{\iota(T)}'$, $\Psi'$, $\alpha'$ and $\tau'$ respectively, there exists $c'\in C'^{\times}$ such that $\tau'(\mathfrak{c}'^{c'})=\mathfrak{c}'^{c'}$ and $\theta_{\iota(T)}'^{c'}\circ\tau'=(\theta_{\iota(T)}'^{c'})^{-1}$. By the injectiveness of $\mathfrak{a}\mapsto \mathfrak{a}\cap C'$ between sets of hereditary orders as mentioned in subsection \ref{subsectionendo}, we know that $\mathfrak{a}'':=\mathfrak{a'}^{c'}$ is $\tau$-stable. Moreover if we denote $\theta''=\theta'^{c'}$, then from our construction of $\tau$ and the definition of $\iota(T)/F$-lift, we have $$(\theta''\circ\tau)_{\iota(T)}=\theta''\circ\tau|_{H^{1}(\tau(\mathfrak{c}'),\tau(\beta'))}=\theta''\circ\tau'|_{H^{1}(\tau(\mathfrak{c}'),\tau(\beta'))}=\theta_{\iota(T)}''\circ\tau'$$ and $$(\theta''^{-1})_{\iota(T)}=\theta_{\iota(T)}''^{-1}$$ are equal. Since the interior $\iota(T)/F$-lift $\theta''\mapsto \theta''_{\iota(T)}$ is injective between sets of simple characters as mentioned in subsection \ref{subsectionendo}, the simple character $\theta''$ satisfies the property $\theta''\circ\tau=\theta''^{-1}$. \end{proof} \subsection{Proof of Lemma \ref{LemmaendotauE}} In this subsection, we prove Lemma \ref{LemmaendotauE} which helps us to generalize $\sigma$ as an involution on $E$. First of all, we recall the following result similar to that occurred in the paper of Stevens: \begin{proposition}[\cite{stevens2001intertwining}, Theorem 6.3]\label{Propstevens} Let $[\mathfrak{a},\beta]$ be a simple stratum in $\mathrm{M}_{n}(F)$ with $\sigma_{t}(\mathfrak{a})=\mathfrak{a}$. Suppose that there exists a simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ such that $H^{1}(\mathfrak{a},\beta)$ is $\sigma_{t}$-stable and $\theta\circ\sigma_{t}=\theta$. Then there exists a simple stratum $[\mathfrak{a},\gamma]$ such that $\theta\in\mathcal{C}(\mathfrak{a},\gamma)$ and $\sigma_{t}(\gamma)=\gamma$. \end{proposition} \begin{proof} The original proof of \cite{stevens2001intertwining}, Theorem 6.3 can be modified a little bit as follows, thus it can be used in our case without difficulty. For any $x\in \mathrm{M}_{n}(F)$, we use $-\sigma_{t}(x)$ to replace $\overline{x}$; we use $\sigma_{t}$ to replace $\sigma$; for $[\mathfrak{a},\beta]$ a simple stratum, we say it is \emph{$\sigma_{t}$-invariant} if $\sigma_{t}(\mathfrak{a})=\mathfrak{a}$, and $\sigma_{t}(\beta)=\beta$ and we use this concept to replace the concept \emph{skew simple stratum} in the original proof. With these replacements, the original proof can be used directly. \end{proof} \begin{proof}[Proof of Lemma \ref{LemmaendotauE}] We denote $\tau_{1}(x)=\sigma_{t}(x)^{-1}$ for any $x\in\mathrm{GL}_{d}(F)$. For $[\mathfrak{a},\beta]$ a simple stratum $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ such that $\theta\in\Theta$, using Skolem-Noether Theorem we may first change the simple stratum up to a $G$-conjugacy to assume that $\beta=\beta_{0}\otimes...\otimes\beta_{0}$ as an element in $\mathrm{M}_{m}(\mathrm{M}_{d}(F))\cong\mathrm{M}_{n}(F)$, where $F[\beta_{0}]\cong E$ such that $ \beta_{0}\in\mathrm{M}_{d}(F)$. We also regard $\mathrm{M}_{d}(F)$ as an $F$-subalgebra of $\mathrm{M}_{m}(\mathrm{M}_{d}(F))\cong\mathrm{M}_{n}(F)$ by diagonal embedding. Let $\mathfrak{a}_{0}$ denote the unique hereditary order in $\mathrm{M}_{d}(F)$ normalized by $F[\beta_{0}]^{\times}$ and let $\theta_{0}=t_{\mathfrak{a},\mathfrak{a}_{0}}^{\beta,\beta_{0}}(\theta)$ be the transfer of $\theta$ which is a simple character in $\Theta$. Using Proposition \ref{Propmaximalonly}, there exists $[\mathfrak{a}_{0}',\beta_{0}']$ and $\theta_{0}'$ such that $(\mathfrak{a}_{0}',\theta_{0}')$ is $\mathrm{GL}_{d}(F)$-conjugate to $(\mathfrak{a}_{0},\theta_{0})$. Moreover $\mathfrak{a}_{0}$ is $\tau_{1}$-invariant and $\theta_{0}\circ\tau_{1}=\theta_{0}^{-1}$, or in other words, $\theta_{0}\circ\sigma_{t}=\theta_{0}$. Now using Proposition \ref{Propstevens}, there exists a simple stratum $[\mathfrak{a}_{0}',\gamma_{0}]$ such that $\theta_{0}\in\mathcal{C}(\mathfrak{a}_{0}',\gamma_{0})$ and $\sigma_{t}(\gamma_{0})=\gamma_{0}$. We denote $\gamma=\gamma_{0}\otimes...\otimes\gamma_{0}$ as an element in $G$. We write $g_{0}\in\mathrm{GL}_{d}(F)$ such that $\mathfrak{a}_{0}'=\mathfrak{a}_{0}^{g_{0}}$. We denote $g=g_{0}\otimes...\otimes g_{0}$ as an element in $G$ and $\mathfrak{a}'=\mathfrak{a}^{g}$. Then $[\mathfrak{a}',\gamma]$ is a simple stratum of $\mathrm{M}_{n}(F)$ such that $\theta':=t_{\mathfrak{a}_{0}',\mathfrak{a}'}^{\gamma_{0},\gamma}(\theta'_{0})\in\mathcal{C}(\mathfrak{a}',\gamma)$. Moreover, we have $\sigma_{t}(\gamma)=\sigma_{t}(\gamma_{0})\otimes...\otimes\sigma_{t}(\gamma_{0})=\gamma$. So $([\mathfrak{a}',\gamma],\theta')$ is what we want. \end{proof} \subsection{The general case} In this subsection we prove Theorem \ref{Thmendotautheta}. We write $n=md$ with $m\geq 1$. We choose $[\mathfrak{a}_{0},\beta_{0}]$ as a maximal simple stratum of $\mathrm{M}_{d}(F)$ and $\theta_{0}\in\mathcal{C}(\mathfrak{a}_{0},\beta_{0})$ such that $\theta_{0}\in\Theta$. By Proposition \ref{Propmaximalonly}, there are a maximal simple stratum $[\mathfrak{a}_{0}',\beta_{0}']$ and a simple character $\theta_{0}'\in\mathcal{C}(\mathfrak{a}_{0}',\beta_{0}')$ which is $\mathrm{GL}_{d}(F)$-conjugate to $\theta_{0}$ such that: (1) the order $\mathfrak{a}_{0}'$ is $\tau_{1}$-stable; (2) the group $H^{1}(\mathfrak{a}_{0}',\beta_{0}')$ is $\tau_{1}$-stable and $\theta_{0}'\circ\tau_{1}=\theta_{0}'^{-1}$; Furthermore, using Proposition \ref{Propstevens} we may assume that: (3) $\sigma_{t}(\beta_{0}')=\beta_{0}'$. Let us now embed $\mathrm{M}_{d}(F)$ diagonally in the $F$-algebra $\mathrm{M}_{n}(F)$. This gives a $F$-algebra homomorphism $\iota':F[\beta_{0}']\hookrightarrow\mathrm{M}_{n}(F)$. Write $\beta'=\iota'(\beta_{0}')=\beta_{0}'\otimes...\otimes\beta_{0}'$ and $E'=F[\beta']$. The centralizer $B'$ of $E'$ in $\mathrm{M}_{n}(F)$ is naturally identified with $\mathrm{M}_{m}(E')$. We regard $\sigma_{t}$ as an involution on $E'$ extending $\sigma$ and we denote $E_{0}'=E'^{\sigma_{t}}$. By Lemma \ref{lemGconjtau}, we may change $\tau$ up to $G$-action on its corresponding hermitian matrix which doesn't change the content of the theorem. So if $\varepsilon$ is in the same $G$-class as $I_{n}$, we may simply choose $\tau=\tau_{1}$, where $\tau_{1}(x)=\sigma(\,^{t}x^{-1})$ for any $x\in G$. If not, we choose $\epsilon\in E_{0}'^{\times}\backslash\mathrm{N}_{E'/E_{0}'}(E'^{\times})$. Regarding $\epsilon$ as an element in $\mathrm{M}_{d}(F)$, we have $\mathrm{det}(\epsilon)=\mathrm{N}_{E_{0}'/F_{0}}(\epsilon)$. Since $$\mathrm{N}_{E_{0}'/F_{0}}:E_{0}'^{\times}\rightarrow F_{0}^{\times}$$ is a homomorphism which maps $\mathrm{N}_{E'/E_{0}'}(E'^{\times})$ to $\mathrm{N}_{F/F_{0}}(F^{\times})$, by Lemma \ref{Lemmafieldext} with $L_{0}=E_{0}'$, it leads to an isomorphism $$\mathrm{N}_{E_{0}'/F_{0}}:E_{0}'^{\times}/\mathrm{N}_{E'/E_{0}'}(E'^{\times})\rightarrow F_{0}^{\times}/\mathrm{N}_{F/F_{0}}(F^{\times})$$ of the two groups of order 2. Thus we have $\mathrm{N}_{E_{0}'/F_{0}}(\epsilon)\in F_{0}^{\times}\backslash\mathrm{N}_{F/F_{0}}(F^{\times})$. If $E'/E_{0}'$ is unramified, we write $\varepsilon=\mathrm{diag}(\epsilon,...,\epsilon)$. From the condition of this theorem, we know that $m$ is odd. We have $\mathrm{det}(\varepsilon)=\mathrm{N}_{E_{0}'/F_{0}}(\epsilon)^{m}\in F_{0}^{\times}\backslash\mathrm{N}_{F/F_{0}}(F^{\times})$, which is because $F_{0}^{\times}/\mathrm{N}_{F/F_{0}}(F^{\times})$ is a group of order 2, and $m$ is odd. If $E'/E_{0}'$ is ramified, we may assume further that $\epsilon\in\mathfrak{o}_{E_{0}'}^{\times}$. We write $\varepsilon=\mathrm{diag}(I_{d},...,I_{d},\epsilon)$ and we have $\mathrm{det}(\varepsilon)=\mathrm{N}_{E_{0}'/F_{0}}(\epsilon)\in F_{0}^{\times}\backslash\mathrm{N}_{F/F_{0}}(F^{\times})$. For both two cases, we have $\tau_{\varepsilon}(x):=\varepsilon\sigma(\,^{t}x^{-1})\varepsilon^{-1}$ for $x\in G$ as a unitary involution whose corresponding hermitian matrix is not in the same $G$-class as $I_{n}$. So from now on, we only consider the three unitary involutions as above. From our assumption of $\tau$, the restriction of $\tau$ on $\mathrm{GL}_{m}(E')$ is also a unitary involution $\tau'=\tau_{1}$ or $\tau_{\varepsilon}$ with $\varepsilon=\mathrm{diag}(1,...,1,\epsilon)$. In particular, since $\epsilon$ is an element in $E'$, we know that $\varepsilon$ commutes with elements in $E'$ and we have $\tau(\beta')=\beta'^{-1}$. Let $\mathfrak{b}'$ be a maximal standard hereditary order in $B'$ which may be identified with $\mathrm{M}_{m}(\mathfrak{o}_{E'})$ that is thus $\tau'$-fixed , and let $\mathfrak{a}'=\mathrm{M}_{m}(\mathfrak{a}_{0}')$ be the unique hereditary order of $\mathrm{M}_{n}(F)$ normalized by $E'^{\times}$ such that $\mathfrak{a}'\cap B'=\mathfrak{b}'$. Then we have a simple stratum $[\mathfrak{a}',\beta']$ of $\mathrm{M}_{n}(F)$. Let $\theta'\in\mathcal{C}(\mathfrak{a}',\beta')$ be the transfer of $\theta_{0}'$. Since $\mathfrak{a}_{0}'$ is $\tau_{1}$-stable and $\mathfrak{b}'$ is $\tau'$-stable, from our assumption of $\tau$ we have $\mathfrak{a}'$ is $\tau$-stable, or by definition $\varepsilon\sigma_{t}(\mathfrak{a}')\varepsilon^{-1}=\mathfrak{a}'$. Since $\sigma_{t}(\beta')=\beta'$, by direct calculation we have: $$\tau(H^{1}(\mathfrak{a}',\beta'))=\varepsilon H^{1}(\sigma_{t}(\mathfrak{a}'),\sigma_{t}(\beta'))^{-1}\varepsilon^{-1}=H^{1}(\sigma_{t}(\mathfrak{a}')^{\varepsilon^{-1}},\beta'^{\varepsilon^{-1}})=H^{1}(\mathfrak{a}',\beta'^{\varepsilon^{-1}})=H^{1}(\mathfrak{a}',\beta').$$ Let $M$ be the standard Levi subgroup of $G$ isomorphic to $\mathrm{GL}_{d}(F)\times...\times\mathrm{GL}_{d}(F)$. Let $P$ be the standard parabolic subgroup of $G$ generated by $M$ and upper triangular matrices, and let $N$ be its unipotent radical. Let $N^{-}$ be the unipotent radical of the parabolic subgroup opposite to $P$ with respect to $M$. By \cite{secherre2008representations}, Th\'eor\`eme 2.17, we have: \begin{align}\label{eqHNMN} H^{1}(\mathfrak{a}',\beta')&=(H^{1}(\mathfrak{a}',\beta')\cap N^{-})\cdot(H^{1}(\mathfrak{a}',\beta')\cap M)\cdot(H^{1}(\mathfrak{a}',\beta')\cap N),\\ H^{1}(\mathfrak{a}',\beta')\cap M&=H^{1}(\mathfrak{a}_{0}',\beta'_{0})\times...\times H^{1}(\mathfrak{a}_{0}',\beta'_{0}). \end{align} By \emph{loc. cit.}, the character $\theta'$ is trivial on $H^{1}(\mathfrak{a}',\beta')\cap N^{-}$ and $H^{1}(\mathfrak{a}',\beta')\cap N$, and the restriction of $\theta'$ on $H^{1}(\mathfrak{a}',\beta')\cap M$ equals to $\theta_{0}'\otimes...\otimes\theta_{0}'$. We have $$\theta'\circ\tau|_{H^{1}(\mathfrak{a}',\beta')\cap N^{-}}=\theta'\circ\tau|_{H^{1}(\mathfrak{a}',\beta')\cap N}=\theta'^{-1}|_{H^{1}(\mathfrak{a}',\beta')\cap N^{-}}=\theta'^{-1}|_{H^{1}(\mathfrak{a}',\beta')\cap N}=1.$$ Moreover, we have $$\theta'\circ\tau|_{H^{1}(\mathfrak{a}',\beta')\cap M} =\theta_{0}'\circ\tau_{1}\otimes...\otimes\theta_{0}'\circ\tau_{1}=\theta_{0}'^{-1}\otimes...\otimes\theta_{0}'^{-1}=\theta'^{-1}|_{H^{1}(\mathfrak{a}',\beta')\cap M}$$ for $\tau=\tau_{1}$ or $\tau_{\varepsilon}$ with $\varepsilon=\mathrm{diag}(\epsilon,...,\epsilon)$ or $\mathrm{diag}(1,...,1,\epsilon)$, since $\epsilon\in F[\beta_{0}']^{\times}$ normalizes $\theta_{0}'$. Thus by equation (\ref{eqHNMN}), we have $\theta'\circ\tau=\theta'^{-1}$. \begin{remark}\label{remindchoose} From the proof of Theorem \ref{Thmendotautheta}, we can see that if $\tau$ is chosen as one of the three unitary involutions mentioned in the proof, then we may choose the same simple stratum and simple character which satisfy the conclusion of the theorem. \end{remark} \begin{remark} We give a counter-example to show that the condition in Theorem \ref{Thmendotautheta} is necessary. Let $n=2$, $F/F_{0}$ unramified, $\Theta$ is trivial and $\varepsilon=\mathrm{diag}(1,\varpi_{F_{0}})$. Then $d=1$, $m=n=2$, $E=F$ and $E_{0}=F_{0}$. If the theorem is true, then $\mathfrak{a}=\mathrm{M}_{2}(\mathfrak{o}_{F})^{g}$ for some $g\in\mathrm{GL}_{2}(F)$ and $\tau(\mathfrak{a})=\mathfrak{a}$. By direct calculation $\sigma(\,^{t}g^{-1})\varepsilon g^{-1}$ normalizes $\mathrm{M}_{2}(\mathfrak{o}_{F})$, which means that $\sigma(\,^{t}g^{-1})\varepsilon^{-1}g^{-1}\in F^{\times}\mathrm{GL}_{2}(\mathfrak{o}_{F})$. It is impossible since $\mathrm{det}(\sigma(\,^{t}g^{-1})\varepsilon^{-1}g^{-1})\in \varpi_{F_{0}}\mathrm{N}_{F/F_{0}}(F^{\times})$, while $\mathrm{det}(F^{\times}\mathrm{GL}_{2}(\mathfrak{o}_{F}))\subset\mathrm{N}_{F/F_{0}}(F^{\times})$. \end{remark} \section{The distinguished type theorem} Let $\pi$ be a cuspidal representation of $G$ such that $\pi^{\sigma}\cong\pi$. Noting that by Theorem \ref{Thmdistgalinv}, if $\pi$ is supercuspidal and distinguished by a unitary subgroup $G^{\tau}$, then $\pi^{\sigma}\cong\pi$. From the statements and proofs of Theorem \ref{Thmtautheta}, \ref{Thmselfdualtype} and \ref{Thmendotautheta}, we may assume the following conditions as a remark of section 5: \begin{remark}\label{rempicond} (1) For $\tau=\tau_{1}$, there exist a simple stratum $[\mathfrak{a},\beta]$ and a simple character $\theta\in\mathcal{C}(\mathfrak{a},\beta)$ contained in $\pi$ such that $\tau(\mathfrak{a})=\mathfrak{a}$, $\tau(H^{1}(\mathfrak{a},\beta))=H^{1}(\mathfrak{a},\beta)$, $\theta\circ \tau=\theta^{-1}$ and $\tau(\beta)=\beta^{-1}$, where $\tau_{1}(x):=\sigma(\,^{t}x^{-1})$ for any $x\in\mathrm{GL}_{n}(F)$; (2) For $\tau=\tau_{1}$, there exists a simple type $(\boldsymbol{J},\Lambda)$ containing $\theta$ and contained in $\pi$ such that $\tau(\boldsymbol{J})=\boldsymbol{J}$ and $\Lambda^\tau\cong\Lambda^{\vee}$; (3) $\sigma_{t}$ is an involution on $E=F[\beta]$, whose restriction on $F$ equals to $\sigma$. So by abuse of notation, we identify $\sigma$ with $\sigma_{t}$. Let $E_{0}=E^{\sigma}$.\textbf{ We assume further in this section that if $E/E_{0}$ is unramified, then $m$ is odd\footnote{ Although this condition seems a little bit annoying, finally in section \ref{sectionunram} we may find out that this condition is automatically satisfied for $\pi$ as a $\sigma$-invariant supercuspidal representation.}.}; (4) Write $\tau(x)=\varepsilon\sigma(\,^{t}x^{-1})\varepsilon^{-1}$ for any $x\in G$ such that: when $E/E_{0}$ is unramified, we may assume $\varepsilon=I_{n}$ or $\mathrm{diag}(\varpi_{E},...,\varpi_{E})\in\mathrm{GL}_{m}(E)\hookrightarrow \mathrm{GL}_{md}(F)=\mathrm{GL}_{n}(F)$; when $E/E_{0}$ is ramified, we may assume $\varepsilon=I_{n}$ or $\mathrm{diag}(1,...,1,\epsilon)\in\mathrm{GL}_{m}(E)\hookrightarrow \mathrm{GL}_{n}(F)$ with $\epsilon\in\mathfrak{o}_{E_{0}}^{\times}\backslash\mathrm{N}_{E/E_{0}}(\mathfrak{o}_{E}^{\times})$. By Remark \ref{remindchoose}, we assume further that for these three unitary involutions, condition (1) and (2) are also satisfied. \textbf{From now on until the end of this section, we assume $\varepsilon$ to be one of these three hermitian matrices and $\tau$ to be one of these three corresponding involutions.} (5) the element $\beta$ has the block diagonal form: $$\beta=\mathrm{diag}(\beta_{0},...,\beta_{0})=\beta_{0}\otimes1\in\mathrm{M}_{d}(F)\otimes_{F}\mathrm{M}_{m}(F)=\mathrm{M}_{n}(F)$$ for some $\beta_{0}\in\mathrm{M}_{d}(F)$, where $d$ is the degree of $\beta$ over $F$ and $n=md$. The centralizer $B$ of $E$ in $\mathrm{M}_{n}(F)$ is identified with $\mathrm{M}_{m}(E)$. If we regard $\tau$ as the restriction of the original involution on $B^{\times}$, then it is a unitary involution with respect to $B^{\times}=\mathrm{GL}_{m}(E)$, $E/E_{0}$ and $\sigma\in\mathrm{Gal}(E/E_{0})$; (6) the order $\mathfrak{b}=\mathfrak{a}\cap B$ is the standard maximal order $\mathrm{M}_{m}(\mathfrak{o}_{E})$ of $\mathrm{M}_{m}(E)$. Thus if we write $\mathfrak{a}_{0}$ as the hereditary order of $\mathrm{M}_{d}(F)$ normalized by $E$, then $\mathfrak{a}$ is identified with $\mathrm{M}_{m}(\mathfrak{a}_{0})$; (7) $\varpi_{E}$ is a uniformizer of $E$ such that: $$\sigma(\varpi_{E})= \begin{cases} \varpi_{E} & \text{if}\ E\ \text{is unramified over}\ E_{0}; \\ -\varpi_{E} & \text{if}\ E\ \text{is ramified over}\ E_{0}. \end{cases}$$ \end{remark} Now we state the main theorem of this section: \begin{theorem}[distinguished type theorem]\label{thmtype} For $\pi$ a $\sigma$-invariant cuspidal representation, it is $G^{\tau}$-distinguished if and only if it contains a $\tau$-selfdual simple type $(\boldsymbol{J},\Lambda)$ such that $\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)\neq 0$. \end{theorem} \begin{remark} Since every hermitian matrix is equivalent to one of the hermitian matrices mentioned in Remark \ref{rempicond}.(4) up to $G$-action, and the property of distinction is invariant up to equivalence of unitary group, this theorem works for every unitary involution, although we only consider those occurring in \emph{loc. cit.} \end{remark} Choose $(\boldsymbol{J},\Lambda)$ as in Remark \ref{rempicond}, using Mackey formula and Frobenius reciprocity, we have: $$\mathrm{Hom}_{G^{\tau}}(\pi,1)\cong\prod_{g}\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)$$ where $g$ ranges over a set of representatives of $(\boldsymbol{J},G^{\tau})$-double cosets in $G$. So $\pi$ is $G^{\tau}$-distinguished if and only if there exists $g$ as a representative of a $(\boldsymbol{J},G^{\tau})$-double coset such that $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\neq 0$. We will study such $g$ and will show that $(\boldsymbol{J}^{g},\Lambda^{g})$ is actually $\tau$-selfdual. This will finish the proof of this theorem. \subsection{Double cosets contributing to the distinction of $\theta$} First we have the following proposition: \begin{proposition}\label{propint} Let $g\in G$. Then the character $\theta^{g}$ is trivial on $H^{1g}\cap G^{\tau}$ if and only if we have $\tau(g)g^{-1}\in JB^{\times}J$. \end{proposition} \begin{proof} We only need to use the same proof of \cite{secherre2018supercuspidal}, Proposition 6.6, with $\sigma$ replaced by $\tau$. \end{proof} As a result, since $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\neq 0$ implies that $\mathrm{Hom}_{H^{1g}\cap G^{\tau}}(\theta^{g},1)\neq 0$, using Proposition \ref{propint} we have $\gamma:=\tau(g)g^{-1}\in JB^{\times}J$. \subsection{The double coset lemma} The next step is to prove the following double coset lemma: \begin{lemma}\label{lemdoucos} Let $g\in G$. Then $\gamma=\tau(g)g^{-1}\in JB^{\times}J$ if and only if $g\in JB^{\times}G^{\tau}$. \end{lemma} \begin{proof} If $g\in JB^{\times}G^{\tau}$, one verifies immediately that $\gamma\in JB^{\times}J$. Conversely, suppose that $\gamma\in JB^{\times}J$, first we need the following lemma: \begin{lemma}\label{lembfix} There exists a $b\in B^{\times}$ such that $\gamma\in JbJ$ and $b\tau(b)=1$. \end{lemma} \begin{proof} Since $B^{\times}\cap J=\mathfrak{b}^{\times}$ is a maximal compact subgroup of $B^{\times}$, using the Cartan decomposition over $B^{\times}\cong \mathrm{GL}_{m}(E)$, we may assume that $\gamma=xcy$ with $x,y\in J$ and $c=\mathrm{diag}(\varpi_{E}^{a_{1}}I_{m_{1}},...,\varpi_{E}^{a_{r}}I_{m_{r}})$, where $a_{1}>...>a_{r}$ as integers and $m_{1}+...+m_{r}=m$. If $E/E_{0}$ is unramified, then by definition $c^{*}=c$. So if we choose $b=c\varepsilon^{-1}$, then $b\varepsilon (b^{*})^{-1}\varepsilon^{-1}=c(c^{*})^{-1}=1$, i.e. $b\tau(b)=1$. If $E/E_{0}$ is ramified, since $\tau(\gamma)\gamma=1$, we have $xcy=\varepsilon y^{*}c^{*}x^{*}\varepsilon^{-1}$ which is equivalent to $(y^{*})^{-1}\varepsilon^{-1}xc=c^{*}x^{*}\varepsilon^{-1}y^{-1}$. Let $z=x^{*}\varepsilon^{-1}y^{-1}\in J$, then we have $z^{*}c=c^{*}z$. We regard $z$ and $c$ as matrices in $\mathrm{M}_{m}(\mathrm{M}_{d}(F))$. Denote by $z^{(j)}\in \mathrm{M}_{m_{j}}(\mathrm{M}_{d}(F))$ the block matrix in $z$ which is of the same place as $\varpi_{E}^{a_{j}}I_{m_{j}}$ in $c$. Since $z^{*}c=c^{*}z$, from direct calculation we have: \begin{equation}\label{eqzi} (z^{(j)})^{*}\varpi_{E}^{a_{j}}=(-1)^{a_{j}}\varpi_{E}^{a_{j}}z^{(j)}\quad \text{for}\ j=1,...,r. \end{equation} By considering the following embedding: \begin{align*} \mathrm{M}_{m_{j}}(\mathrm{M}_{d}(F))\hookrightarrow&\mathrm{M}_{m}(\mathrm{M}_{d}(F))\\ h\mapsto&\mathrm{diag}(0_{m_{1}d},...,0_{m_{j-1}d},h,0_{m_{j+1}d},...,0_{m_{r}d}), \end{align*} we may regard $\mathrm{M}_{m_{j}d}(F)$ as a subalgebra of $\mathrm{M}_{md}(F)$ which we denote by $A^{(j)}$, where $0_{m_{j}d}$ represents zero matrix of size $m_{j}d\times m_{j}d$. We denote $\mathfrak{a}^{(j)}=\mathfrak{a}\cap A^{(j)}$. By abuse of notation, we identify the element $\beta_{0}\otimes...\otimes{\beta}_{0}$, which consists of $m_{j}$ copies of $\beta_{0}$ and is contained in $\mathrm{M}_{m_{j}}(\mathrm{M}_{d}(F))$, with $\beta$. By \cite{secherre2008representations}, Th\'eor\`eme 2.17, since $z\in J(\mathfrak{a},\beta)$, we get $z^{(j)}\in J(\mathfrak{a}^{(j)},\beta)$ for $j=1,...,r$. By \emph{loc. cit.}, if we denote by $$M=\mathrm{GL}_{m_{1}d}(F)\times...\times\mathrm{GL}_{m_{r}d}(F)$$ the Levi subgroup of $G$ corresponding to the partition $n=m_{1}d+...+m_{r}d$, we know that $$ M\cap J=J(\mathfrak{a}^{(1)},\beta)\times...\times J(\mathfrak{a}^{(r)},\beta)$$ and $$M\cap J^{1}= J^{1}(\mathfrak{a}^{(1)},\beta)\times...\times J^{1}(\mathfrak{a}^{(r)},\beta).$$ Thus we get $\mathrm{diag}(z^{(1)},...,z^{(r)})\in M\cap J$. And further we have: $$M\cap J/M\cap J^{1}\cong J(\mathfrak{a}^{(1)},\beta)/J^{1}(\mathfrak{a}^{(1)},\beta)\times...\times J(\mathfrak{a}^{(r)},\beta)/J^{1}(\mathfrak{a}^{(r)},\beta)\cong\mathrm{GL}_{m_{1}}(\boldsymbol{l})\times...\times\mathrm{GL}_{m_{r}}(\boldsymbol{l}).$$ Since $(\cdot)^{*}$ fixes $M\cap J$ and $M\cap J^{1}$, we have $(\cdot)^{*}$ induces a map: \begin{align*} M\cap J/M\cap J^{1}\cong \mathrm{GL}_{m_{1}}(\boldsymbol{l})\times...\times\mathrm{GL}_{m_{r}}(\boldsymbol{l})&\longrightarrow \mathrm{GL}_{m_{1}}(\boldsymbol{l})\times...\times\mathrm{GL}_{m_{r}}(\boldsymbol{l})\cong M\cap J/M\cap J^{1},\\ (\overline{z^{(1)}},...,\overline{z^{(r)}})&\longmapsto(\overline{(z^{(1)})^{*}},...,\overline{(z^{(r)})^{*}}), \end{align*} where $\boldsymbol{l}$ is the residue field of $E$ and $E_{0}$, and $\overline{z^{(j)}}\in J(\mathfrak{a}^{(j)},\beta)/J^{1}(\mathfrak{a}^{(j)},\beta)\cong\mathrm{GL}_{m_{j}}(\boldsymbol{l})$ as the image of $z^{(j)}$. We want to show that for any $i$ such that $2\nmid a_{i}$, we have $2\mid m_{i}$. Consider $j=i$ in equation (\ref{eqzi}), we get $(z^{(i)})^{*}=-\varpi_{E}^{a_{i}}z^{(i)}\varpi_{E}^{-a_{i}}$. Since $J/J^{1}\cong U(\mathfrak{b})/U^{1}(\mathfrak{b})$ on which $E^{\times}$ acts trivially by conjugation, we get $\overline{z^{(i)}}=\overline{\varpi_{E}^{a_{i}}z^{(i)}\varpi_{E}^{-a_{i}}}=\overline{-(z^{(i)})^{*}}=-\,^{t}\overline{z^{(i)}}$. Since there exists no anti-symmetric invertible matrix of odd dimension, we must have $2| m_{i}$. Now for $\alpha_{j}=(a_{j},m_{j})$, define $$\varpi_{E}^{\alpha_{j}}=\begin{cases}\varpi_{E}^{a_{j}}I_{m_{j}}\ &\text{if} \ 2|a_{j}; \\ \varpi_{E}^{a_{j}}J_{m_{j}/2}\ &\text{if}\ 2\nmid a_{j}.\end{cases}$$ and $c'=\mathrm{diag}(\varpi_{E}^{\alpha_{1}},...,\varpi_{E}^{\alpha_{r}})$, where $J_{m_{j}/2}:=\bigg(\begin{matrix}0 & I_{m_{j}/2} \\ -I_{m_{j}/2} & 0\end{matrix}\bigg)$ . We have $c'=c'^{*}$ and $c'$ is in the same $J$-$J$ double coset as $c$. Let $b=c'\varepsilon^{-1}$, we get $b\tau(b)=1$. \end{proof} Now we write $\gamma=x'bx$ with $x,x'\in J$ and $b\in B^{\times}$ as in Lemma \ref{lembfix}. Replacing $g$ by $\tau(x')^{-1}g$ does not change the double coset $JgG^{\tau}$ but changes $\gamma$ into $bx\tau(x')$. So from now on, we will assume that: \begin{equation}\label{eqcondgamma} \gamma=bx,\quad b\tau(b)=1,\ x\in J, \quad b\ \text{is of the form in the proof of Lemma \ref{lembfix}}. \end{equation} Write $K$ for the group $J\cap b^{-1}Jb$. Since $\tau(b)=b^{-1}$ and $J$ is $\tau$-stable, we have $x\in K$. We have the following corollary of Lemma \ref{lembfix}. \begin{corollary} The map $\delta_{b}:k\mapsto b^{-1}\tau(k)b$ is an involution on $K$. \end{corollary} Now for $a_{1}>...>a_{r}$ as in the proof of Lemma \ref{lembfix}, and $M=\mathrm{GL}_{m_{1}d}(F)\times...\times\mathrm{GL}_{m_{r}d}(F)\subseteq G$, we write $P$ for the standard parabolic subgroup of $G$ generated by $M$ and upper triangular matrices. We write $N$ for the unipotent radicals of $P$ and $N^{-}$ for its opposite parabolic subgroup with respect to $M$. By definition of $b$, it normalizes $M$ and we have: \begin{align*} K=(K\cap N ^{-})\cdot(K\cap M)\cdot(K\cap N). \end{align*} We have similar properties for $V=K\cap B^{\times}=U\cap b^{-1}Ub$ as a subgroup of $B^{\times}$: \begin{align*} V=(V\cap N ^{-})\cdot(V\cap M)\cdot(V\cap N), \end{align*} where $U=U(\mathfrak{b})$ and $U^{1}=J^{1}\cap B^{\times}=U^{1}(\mathfrak{b})$. By definition, $V$ is also fixed by $\delta_{b}$. \begin{lemma}\label{lemK1} The subset: $$K^{1}=(K\cap N ^{-})\cdot(J^{1}\cap M)\cdot(K\cap N)$$ is a $\delta_{b}$-stable normal pro-$p$-subgroup of $K$, and we have $K=VK^{1}$. \end{lemma} \begin{proof} The proof is the same as which in \cite{secherre2018supercuspidal}, Lemma 6.10. \end{proof} Now we prove the following important lemma: \begin{lemma}\label{lemredpgroup} Let $y\in K$ such that $y\delta_{b}(y)=1$, then there are $k\in K$ and $v\in V$ such that: (1) the element $v$ is in $\mathrm{GL}_{m_{1}}(\mathfrak{o}_{E})\times...\times\mathrm{GL}_{m_{r}}(\mathfrak{o}_{E})\subseteq B^{\times}$ such that $v\delta_{b}(v)=1$; (2) one has $\delta_{b}(k)yk^{-1}\in vK^{1}$. \end{lemma} \begin{proof} Let $V^{1}=V\cap K^{1}$. We have: $$V^{1}=(V\cap N ^{-})\cdot(U^{1}\cap M)\cdot(V\cap N).$$ Thus we have canonical $\delta_{b}$-equivariant group isomorphisms: \begin{equation}\label{eqKK1} K/K^{1}\cong V/V^{1}\cong(U\cap M)/(U^{1}\cap M). \end{equation} Since we have $M\cap B^{\times}=\mathrm{GL}_{m_{1}}(E)\times...\times\mathrm{GL}_{m_{r}}(E)$, the right side of (\ref{eqKK1}) identifies with $\mathcal{M}=\mathrm{GL}_{m_{1}}(\boldsymbol{l})\times...\times\mathrm{GL}_{m_{r}}(\boldsymbol{l})$, where $\boldsymbol{l}$ denotes the residue field of $E$. From the proof of Lemma \ref{lembfix}, we may write $\varepsilon^{-1}b=\mathrm{diag}(\varpi_{E}^{a_{1}}c_{1},...,\varpi_{E}^{a_{r}}c_{r})$ with $c_{j}\in\mathrm{GL}_{m_{j}}(\mathfrak{o}_{E})$. Moreover, the involution $\delta_{b}(x)=b^{-1}\varepsilon\,\sigma(\,^tx^{-1})\varepsilon^{-1}b$ for any $x\in G$ acts on $\mathcal{M}$ by: $$(g_{1},...,g_{k})\mapsto(\overline{c_{1}}^{-1}\sigma(^tg_{1}^{-1})\overline{c_{1}},...,\overline{c_{r}}^{-1}\sigma(^tg_{r}^{-1})\overline{c_{r}}),$$ where we denote by $\overline{c_{j}}$ the image of $c_{j}$ in $\mathrm{GL}_{m_{j}}(\boldsymbol{l})$. The restriction of $\sigma$ on $\boldsymbol{l}$ is trivial or a non-trivial involution depending on $E/E_{0}$ is ramified or not. For $y$ such that $\delta_{b}(y)y=1$, we denote by $(g_{1},...,g_{r})$ its image in $\mathcal{M}=\mathrm{GL}_{m_{1}}(\boldsymbol{l})\times...\times\mathrm{GL}_{m_{r}}(\boldsymbol{l})$. When $E/E_{0}$ is unramified, we denote by $\boldsymbol{l_{0}}$ the residue field of $E_{0}$. So $\boldsymbol{l}/\boldsymbol{l_{0}}$ is quadratic and the restriction of $\sigma$ on $\boldsymbol{l}$ is the non-trivial involution in $\mathrm{Gal}(\boldsymbol{l}/\boldsymbol{l_{0}})$. Since $(b^{-1}\varepsilon)^{*}=\varepsilon(b^{*})^{-1}\varepsilon^{-1}\varepsilon=\tau(b)\varepsilon=b^{-1}\varepsilon$, we get $\overline{c_{j}}^{*}=\overline{c_{j}}$. If $y\delta_{b}(y)=1$, then we get $(\overline{c_{j}}g_{j})^{*}=g_{j}^{*}\overline{c_{j}}=\overline{c_{j}}g_{j}$. We need the following lemma: \begin{lemma}[\cite{kleidman1990subgroup}, Proposition 2.3.1]\label{lemherfin} For $x=x^{*}$ in $\mathrm{GL}_{s}(\boldsymbol{l})$, there exists $A\in\mathrm{GL}_{s}(\boldsymbol{l})$ such that $AxA^{*}=I_{s}$. \end{lemma} Using Lemma \ref{lemherfin}, we may choose $k_{j}\in\mathrm{GL}_{m_{j}}(\mathfrak{o}_{E})$ such that the image $\overline{k_{j}}$ in $\mathrm{GL}_{m_{j}}(\boldsymbol{l})$ satisfies $(\overline{k_{j}}^{*})^{-1}\overline{c_{j}}g_{j}\overline{k_{j}}^{-1}=I_{m_{j}}$. Choose $k=\mathrm{diag}(k_{1},...,k_{r})$ and $v=\mathrm{diag}(v_{1},...,v_{r})=\mathrm{diag}(c_{1}^{-1},...,c_{r}^{-1})$, we get $\delta_{b}(k)yk^{-1}\in vV^{1}$ and $\delta_{b}(v)v=\mathrm{diag}(c_{1}^{-1}c_{1}^{*}c_{1}c_{1}^{-1},...,c_{r}^{-1}c_{r}^{*}c_{r}c_{r}^{-1})=1$. When $E/E_{0}$ is ramified, the restriction of $\sigma$ on $\boldsymbol{l}$ is trivial. Since $(b^{-1}\varepsilon)^{*}=b^{-1}\varepsilon$, we get $c_{j}^{*}=(-1)^{a_{j}}c_{j}$ and $\,^{t}\overline{c_{j}}=(-1)^{a_{j}}\overline{c_{j}}$. We need the following two lemmas: \begin{lemma}[\cite{kleidman1990subgroup}, Proposition 2.5.4]\label{lemothfin} For $x=\,^t x$ in $\mathrm{GL}_{s}(\boldsymbol{l})$, there exists $A\in\mathrm{GL}_{s}(\boldsymbol{l})$ such that $ Ax \,^t A$ is either $I_{s}$ or $\overline{\varepsilon_{s}}=\mathrm{diag}(1,...,1,\overline{\epsilon})$, where $\overline{\epsilon}\in\boldsymbol{l}^{\times}\backslash\boldsymbol{l}^{\times2}$, with $\boldsymbol{l}^{\times2}$ denotes the group of square elements of $\boldsymbol{l}^{\times}$. \end{lemma} \begin{lemma}[\cite{kleidman1990subgroup}, Proposition 2.4.1]\label{lemsymfin} For $x=-\,^t x$ in $\mathrm{GL}_{s}(\boldsymbol{l})$ and $2\mid s$, there exists $A\in\mathrm{GL}_{s}(\boldsymbol{l})$ such that $Ax\,^t A=J_{s/2}$. \end{lemma} When $a_{j}$ is even, using Lemma \ref{lemothfin} we may choose $k_{j}\in\mathrm{GL}_{m_{j}}(\mathfrak{o}_{E})$ such that its image $\overline{k_{j}}$ in $\mathrm{GL}_{m_{j}}(\boldsymbol{l})$ satisfies that $(\,^{t}\overline{k_{j}})^{-1}\overline{c_{j}}g_{j}\overline{k_{j}}^{-1}$ equals to either $I_{m_{j}}$ or $\overline{\varepsilon_{m_{j}}}$, where we choose $\varepsilon_{m_{j}}=\mathrm{diag}(1,...,1,\epsilon)\in\mathrm{GL}_{m_{j}}(\mathfrak{o}_{E})$ such that its image $\overline{\varepsilon_{m_{j}}}$ in $\mathrm{GL}_{m_{j}}(\boldsymbol{l})$ is $\mathrm{diag}(1,...,1,\overline{\epsilon})$ as in Lemma \ref{lemothfin}. Let $v_{j}$ equal to $c_{j}^{-1}$ or $c_{j}^{-1}\varepsilon_{m_{j}}$ in the two cases respectively. From the proof of Lemma \ref{lembfix}, when $a_{j}$ is odd we have $m_{j}$ is even. Using Lemma \ref{lemsymfin}, we may choose $k_{j}\in\mathrm{GL}_{m_{j}}(\mathfrak{o}_{E})$ such that the image $\overline{k_{j}}$ in $\mathrm{GL}_{m_{j}}(\boldsymbol{l})$ satisfies $(\,^{t}\overline{k_{j}})^{-1}\overline{c_{j}}g_{j}\overline{k_{j}}^{-1}=J_{m_{j/2}}$. We choose $v_{j}=c_{j}^{-1}J_{m_{j}/2}$. Choose $k=\mathrm{diag}(k_{1},...,k_{r})$ and $v=\mathrm{diag}(v_{1},...,v_{r})$, we get $$\delta_{b}(k)yk^{-1}\in vV^{1}$$ and $$\delta_{b}(v)v=\mathrm{diag}(c_{1}^{-1}(v_{1}^{*})^{-1}c_{1}v_{1},...,c_{r}^{-1}(v_{r}^{*})^{-1}c_{r}v_{r})=1$$ by direct calculation to the two cases respectively. So no matter $E/E_{0}$ is ramified or not, we finish the proof. \end{proof} Now we are going to finish the proof of Lemma \ref{lemdoucos}. Applying Lemma \ref{lemredpgroup} to $x$ gives us $k\in K$ and $v\in V$, such that $bv\tau(bv)=1$ and $\delta_{b}(k)xk^{-1}\in vK^{1}$. Thus we have $\tau(k)\gamma k^{-1}\in bv K^{1}$. Therefore replacing $g$ by $kg$ and $b$ by $bv$, we will assume that $\gamma$ can be written as: \begin{equation}\label{eqgamma} \gamma=bx,\quad b\tau(b)=1, \quad x\in K^{1},\quad b\in\varpi_{E}^{a_{1}}\mathrm{GL}_{m_{1}}(\mathfrak{o}_{E})\times...\times\varpi_{E}^{a_{r}}\mathrm{GL}_{m_{r}}(\mathfrak{o}_{E}). \end{equation} Furthermore, we have $\delta_{b}(x)x=1$. Since $K^{1}$ is a $\delta_{b}$-stable pro-$p$-group and $p$ is odd, the first cohomology set of $\delta_{b}$ in $K^{1}$ is trivial. Thus $x=\delta_{b}(y)y^{-1}$ for some $y\in K^{1}$, hence $\gamma=\tau(y)by^{-1}$. Consider the determinant of this equation, we have $\mathrm{det}(b)\in\mathrm{N}_{F/F_{0}}(F^{\times})$. If we denote by $\mathrm{det}_{B}$ the determinant function defined on $B^{\times}=\mathrm{GL}_{m}(E)$, then we have $\mathrm{det}(b)=\mathrm{N}_{E/F}(\mathrm{det}_{B}(b))$. Using Lemma \ref{Lemmafieldext} for $L=E$, we get $\mathrm{det}_{B}(b)\in\mathrm{N}_{E/E_{0}}(E^{\times})$ and $\mathrm{det}_{B}(\varepsilon^{-1}b)\in\mathrm{det}_{B}(\varepsilon^{-1})\mathrm{N}_{E/E_{0}}(E^{\times})$. Since $\tau(b)b=1$, we have $(\varepsilon^{-1}b)^{*}=\varepsilon^{-1}b$. Using Proposition \ref{PropGOH}, there exists $h\in B^{\times}$ such that $\varepsilon^{-1}b=(h^{*})^{-1}\varepsilon^{-1} h^{-1}$. So we have $b=\tau(h)h^{-1}$. Thus $g\in yhG^{\tau}\subseteq JB^{\times}G^{\tau}$, which finishes the proof of Lemma \ref{lemdoucos}. \end{proof} \subsection{Distinction of the Heisenberg representation} Now let $\eta$ be the Heisenberg representation of $J^{1}$ associated to $\theta$. We have the following result similar with \cite{secherre2018supercuspidal}, Proposition 6.12. by replacing $\sigma$ with $\tau$: \begin{proposition}\label{propheis} Given $g\in G$, we have: $$\mathrm{dim}_{R}\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)=\begin{cases}1\quad &\text{if}\ g\in JB^{\times}G^{\tau},\\ 0\quad &\text{otherwise}.\end{cases}$$ \end{proposition} \begin{proof} It is useful to recall the detail of the proof of this proposition, which will be useful in the next subsection. We write $\delta(x):=\gamma^{-1}\tau(x)\gamma$ for any $x\in G$ which is an involution of $G$. And for any subgroup $H\subset G$, we have $H^{g}\cap G^{\tau}=(H\cap G^{\delta})^{g}$. When $g\notin JB^{\times}G^{\tau}$, restricting to $H^{1}$ and using Proposition \ref{propint} and Lemma \ref{lemdoucos}, we know that the dimension equals to 0. For $g\in JB^{\times}G^{\tau}$, we need to prove that $\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)=\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta,1)$ is of dimension 1. We state the following general proposition which works for a general involution over $G$: \begin{proposition}\label{Propheisdelta} Let $\delta$ be an involution over $G$ such that $\delta(H^{1})=H^{1\gamma}$ and $\theta\circ\delta=\theta^{-1\gamma}$, where $\gamma\in B^{\times}$ such that $\delta(\gamma)\gamma=1$. Then we have: $$\mathrm{dim}_{R}\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta,1)=1.$$ \end{proposition} Since Proposition \ref{Propheisdelta} in our special case implies Proposition \ref{propheis}, we only need to focus on the proof of this proposition. We only need to prove that the space: $$\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{(J^{1}:H^{1})^{1/2}},1)\cong\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\mathrm{Ind}_{H^{1}}^{J^{1}}(\theta),1)$$ is of dimension $(J^{1}:H^{1})^{1/2}$. First we prove the following lemmas which will also be used in the next subsection: \begin{lemma}\label{LemmaHg=Htaug} For $H$ a subgroup of $G$ such that $\delta(H)=H^{\gamma}$ with $\delta$ and $\gamma$ as in Proposition \ref{Propheisdelta}, we have: $$H\cap G^{\delta}=H^{\gamma}\cap G^{\delta}= H\cap H^{\gamma}\cap G^{\delta}.$$ \end{lemma} \begin{proof} We have $H\cap G^{\delta}=\delta(H\cap G^{\delta})=\delta(H)\cap\delta(G^{\delta})=H^{\gamma}\cap G^{\delta}$ which proves the lemma. \end{proof} \begin{lemma}\label{Lemmaindthetares} Let $\delta$ and $\gamma$ be as in Proposition \ref{Propheisdelta}, then we have the following isomorphisms of finite dimensional representations: (1) $\mathrm{Ind}_{H^{1}}^{J^{1}}\theta|_{J^{1}\cap J^{1\gamma}}\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta$; (2) $\mathrm{Ind}_{H^{1\gamma}}^{J^{1\gamma}}\theta^{\gamma}|_{J^{1}\cap J^{1\gamma}}\cong\bigoplus_{H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}$; (3) $\mathrm{Ind}_{H^{1}}^{J^{1}}\theta|_{J^{1}\cap G^{\delta}}\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\bigoplus_{H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}\theta$; (4) $\mathrm{Ind}_{H^{1\gamma}}^{J^{1\gamma}}\theta^{\gamma}|_{J^{1\gamma}\cap G^{\delta}}\cong\bigoplus_{H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}}\bigoplus_{J^{1}\cap H^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1\gamma}\cap G^{\delta}}\mathrm{Ind}_{H^{1\gamma}\cap G^{\delta}}^{J^{1\gamma}\cap G^{\delta}}\theta$. \end{lemma} \begin{proof} We only prove (1) and (3), since the proofs of (2) and (4) are similar to the proofs of (1) and (3) respectively. For (1), using Mackey formula, we have: \begin{align*} \mathrm{Ind}_{H^{1}}^{J^{1}}\theta|_{J^{1}\cap J^{1\gamma}}&\cong\bigoplus_{x\in H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1x}\cap(J^{1}\cap J^{1\gamma})}^{J^{1}\cap J^{1\gamma}}\theta^{x}\\ &\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta \end{align*} The last step is because $x\in J^{1}$ normalizes $H^{1}$ and $\theta$. For (3), using Mackey formula again, we have: \begin{align*} \mathrm{Ind}_{H^{1}}^{J^{1}}\theta|_{J^{1}\cap G^{\delta}}&\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta|_{J^{1}\cap G^{\delta}}\\ &\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\bigoplus_{y\in H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Ind}_{(H^{1}\cap J^{1\gamma})^{y}\cap (J^{1}\cap G^{\delta})}^{J^{1}\cap G^{\delta}}\theta^{y}\\ &\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\bigoplus_{H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}\theta \end{align*} The last step is because $y\in J^{1}\cap J^{1\gamma}$ normalizes $H^{1}\cap J^{1\gamma}$ and $\theta$, and $H^{1}\cap J^{1\gamma}\cap J^{1}\cap G^{\delta}=H^{1}\cap G^{\delta}$ by Lemma \ref{LemmaHg=Htaug}.(2) for $H=J^{1}$. So we finish the proof. \end{proof} \begin{lemma}\label{LemmaJHJgammaHgamma} Let $\delta$ and $\gamma$ be as in Proposition \ref{Propheisdelta}, then we have: (1) $|H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}|\cdot |H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}|=(J^{1}:H^{1})^{1/2};$ (2) $|H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}|\cdot |J^{1}\cap H^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1\gamma}\cap G^{\delta}|=(J^{1\gamma}:H^{1\gamma})^{1/2};$ (3) $(J^{1}:H^{1})^{1/2}=(J^{1\gamma}:H^{1\gamma})^{1/2}=(J^{1}\cap G^{\delta}:H^{1}\cap G^{\delta}).$ \end{lemma} \begin{proof} For (3), we refer to \cite{secherre2018supercuspidal} subsection 6.3 for a proof, by noting that all the results and proofs from Lemma 6.14 to the end of subsection 6.3 in \emph{ibid.} can be generalized to a general involution $\delta$ of $G$, with $\tau$ in \emph{loc. cit.} replaced by $\delta$ in our settings. For (1), since $J^{1}$ normalizes $H^{1}$ and $J^{1}\cap J^{1\gamma}$ normalizes $H^{1}\cap J^{1\gamma}$, we have: \begin{align*} \text{left hand side of (1)}=&(J^{1}:H^{1}(J^{1}\cap J^{1\gamma}))\cdot (J^{1}\cap J^{1\gamma}:(H^{1}\cap J^{1\gamma})(J^{1}\cap G^{\delta}))\\ =&(J^{1}:H^{1})\cdot(J^{1}\cap J^{1\gamma}:H^{1}\cap J^{1\gamma})^{-1}\cdot\\ &\cdot(J^{1}\cap J^{1\gamma}:H^{1}\cap J^{1\gamma})\cdot(J^{1}\cap G^{\delta}:H^{1}\cap J^{1\gamma}\cap G^{\delta})^{-1}\\ =&(J^{1}:H^{1})\cdot(J^{1}\cap G^{\delta}:H^{1}\cap G^{\delta})^{-1}\\ =&(J^{1}:H^{1})^{1/2} \end{align*} where we use Lemma \ref{LemmaHg=Htaug} for $H=J^{1\gamma}$ and (3) in the last two equations. So we finish the proof of (1), and the proof of (2) is similar. \end{proof} Combining Lemma \ref{Lemmaindthetares}.(3), Lemma \ref{LemmaJHJgammaHgamma}.(1)(3), we have: \begin{align*}\mathrm{dim}_{R}\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\mathrm{Ind}_{H^{1}}^{J^{1}}\theta,1)&=\mathrm{dim}_{R}\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\bigoplus_{H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}\theta,1)\\ &=(J^{1}:H^{1})^{1/2}\mathrm{dim}_{R}\mathrm{Hom}_{H^{1}\cap G^{\delta}}(\theta|_{H^{1}\cap G^{\delta}},1)\\ &=(J^{1}:H^{1})^{1/2}. \end{align*} For the last step, since $\gamma$ intertwines $\theta^{-1}$ and since $\theta\circ\delta=\theta^{-1\gamma}$, we have $\theta$ is trivial on $$\{y\delta(y)|y\in H^{1}\cap H^{1\gamma}\}$$ which equals to $H^{1}\cap G^{\delta}$ since the the first cohomology group of $\delta^{-1}$-action on $H^{1}\cap H^{1\gamma}$ is trivial. Thus $\theta|_{H^{1}\cap G^{\delta}}$ is a trivial character. So we finish the proof. \end{proof} \subsection{Distinction of extensions of the Heisenberg representation} Let $\boldsymbol{\kappa}$ be an irreducible representation of $\boldsymbol{J}$ extending $\eta$. There is a unique irreducible representation $\boldsymbol{\rho}$ of $\boldsymbol{J}$, which is trivial on $J^{1}$ satisfying $\Lambda\cong\boldsymbol{\kappa}\otimes\boldsymbol{\rho}$. First we have the following lemma: \begin{lemma}\label{lemkappa} Let $g\in JB^{\times}G^{\tau}$. (1) There is a unique character $\chi$ of $\boldsymbol{J}^{g}\cap G^{\tau}$ trivial on $J^{1g}\cap G^{\tau}$ such that: $$\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)=\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\kappa}^{g},\chi^{-1}).$$ (2) The canonical linear map: $$\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)\otimes\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\rho}^{g},\chi)\rightarrow\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1).$$ is an isomorphism. \end{lemma} \begin{proof} The proof is the same as which in \cite{secherre2018supercuspidal}, Lemma 6.20. \end{proof} For $g\in JB^{\times}G^{\tau}$, we have $\tau(g)\in \tau(JB^{\times}G^{\tau})=JB^{\times}G^{\tau}$, which means that we may consider the similar thing for $\tau(g)$ as for $g$ in Lemma \ref{lemkappa}. Thus, there exists a unique character $\chi'$ of $\boldsymbol{J}^{\tau(g)}\cap G^{\tau}$ trivial on $J^{1\tau(g)}\cap G^{\tau}$ such that: $$\mathrm{Hom}_{J^{1\tau(g)}\cap G^{\tau}}(\eta^{\tau(g)},1)\cong\mathrm{Hom}_{\boldsymbol{J}^{\tau(g)}\cap G^{\tau}}(\boldsymbol{\kappa}^{\tau(g)},\chi'^{-1}).$$ Moreover, we know that $\tau(\boldsymbol{J})=\boldsymbol{J}$, $\tau(J)=J$, $\tau(J^{1})=J^{1}$ and $\tau(H^{1})=H^{1}$, thus using Lemma \ref{LemmaunitaryJJ0} and Lemma \ref{LemmaHg=Htaug}, we have $\boldsymbol{J}^{g}\cap G^{\tau}=\boldsymbol{J}^{\tau(g)}\cap G^{\tau}=J^{g}\cap G^{\tau}=J^{\tau(g)}\cap G^{\tau}$, $J^{1g}\cap G^{\tau}=J^{1\tau(g)}\cap G^{\tau}$ and $H^{1g}\cap G^{\tau}=H^{1\tau(g)}\cap G^{\tau}$. As a result, $\chi$ and $\chi'$ are characters defined over the same group $\boldsymbol{J}^{g}\cap G^{\tau}=\boldsymbol{J}^{\tau(g)}\cap G^{\tau}$. A natural idea is to compare them. For the rest of this subsection, we focus on the proof of the following proposition: \begin{proposition}\label{Propchichi'} For $\chi$ and $\chi'$ defined above as characters of $\boldsymbol{J}^{g}\cap G^{\tau}=\boldsymbol{J}^{\tau(g)}\cap G^{\tau}$, we have $\chi=\chi'$. \end{proposition} We write $\delta(x)=\gamma^{-1}\tau(x)\gamma$ for any $x\in G$ with $\gamma=\tau(g)g^{-1}$. From subsection \ref{subsectionsimplestratum}, $\gamma\in I_{G}(\eta)=I_{G}(\kappa^{0})$, where $\kappa^{0}=\boldsymbol{\kappa}|_{J}$. Moreover we have: $$\mathrm{dim}_{R}(\mathrm{Hom}_{J\cap J^{\gamma}}(\kappa^{0\gamma},\kappa^{0}))=\mathrm{dim}_{R}(\mathrm{Hom}_{J^{1}\cap J^{1\gamma}}(\eta^{\gamma},\eta))=1.$$ Using Lemma \ref{LemmaHg=Htaug}, we have $J^{1}\cap G^{\delta}=J^{1\gamma}\cap G^{\delta}$ as a subgroup of $J^{1}\cap J^{1\gamma}$ and $H^{1}\cap G^{\delta}=H^{1\gamma}\cap G^{\delta}$. We claim the following proposition which works for general $\gamma$ and $\delta$: \begin{proposition}\label{Propvarphibijec} Let $\delta$ and $\gamma$ be as in Proposition \ref{Propheisdelta}, then for a non-zero homomorphism $\varphi\in\mathrm{Hom}_{J^{1}\cap J^{1\gamma}}(\eta^{\gamma},\eta)=\mathrm{Hom}_{J\cap J^{\gamma}}(\kappa^{0\gamma},\kappa^{0})$, it naturally induces a $R$-vector space isomorphism: \begin{align*} f_{\varphi}:\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta,1)&\rightarrow\mathrm{Hom}_{J^{1\gamma}\cap G^{\delta}}(\eta^{\gamma},1),\\ \lambda\quad&\mapsto\quad \lambda\circ\varphi \end{align*} \end{proposition} First we show that how does Proposition \ref{Propvarphibijec} imply Proposition \ref{Propchichi'}. Using Proposition \ref{propheis} for $g$ and $\tau(g)$ respectively, we have $\mathrm{dim}_{R}\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)=\mathrm{dim}_{R}\mathrm{Hom}_{J^{1\tau(g)}\cap G^{\tau}}(\eta^{\tau(g)},1)=1$. By Proposition \ref{Propvarphibijec}, we also have: \begin{align*} f_{\varphi}:\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)&\rightarrow\mathrm{Hom}_{J^{1\tau(g)}\cap G^{\tau}}(\eta^{\tau(g)},1),\\ \lambda\quad&\mapsto\quad \lambda\circ\varphi, \end{align*} is bijective. If we choose $$0\neq \lambda\in\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)\quad \text{and}\quad 0\neq \lambda':=f_{\varphi}(\lambda)=\lambda\circ\varphi\in\mathrm{Hom}_{J^{1\tau(g)}\cap G^{\tau}}(\eta^{\tau(g)},1),$$ then for any $v$ in the representation space of $\eta$ and any $x\in J^{g}\cap G^{\tau}=J^{\tau(g)}\cap G^{\tau}$, we have: \begin{align*} \chi'(x)^{-1}\lambda'(v)&=\lambda'(\kappa^{0\tau(g)}(x)v)\qquad(\text{by Proposition \ref{lemkappa}.(1)})\\ &=\lambda(\varphi(\kappa^{0\tau(g)}(x)v))\qquad(\text{by definition of}\ \lambda')\\ &=\lambda(\kappa^{0g}(x)\varphi(v))\qquad(\text{since}\ \varphi\in\mathrm{Hom}_{J^{g}\cap J^{\tau(g)}}(\kappa^{0\tau(g)},\kappa^{0g}))\\ &=\chi(x)^{-1}\lambda(\varphi(v))\qquad(\text{by Proposition \ref{lemkappa}.(1)})\\ &=\chi(x)^{-1}\lambda'(v)\qquad(\text{by definition of}\ \lambda'). \end{align*} Since $v$ and $x\in J^{g}\cap G^{\tau}=J^{\tau(g)}\cap G^{\tau}$ are arbitrary, we have $\chi'|_{J^{\tau(g)}\cap G^{\tau}}=\chi|_{J^{g}\cap G^{\tau}}$ which is Proposition \ref{Propchichi'}. So we only need to focus on the proof of Proposition \ref{Propvarphibijec}. First of all, we need the following important lemma: \begin{lemma}\label{LemmaPhicont} Let $\delta$ and $\gamma$ be as in Proposition \ref{Propheisdelta}, then there exist a $R[J^{1}\cap J^{1\gamma}]$-module homomorphism $$\Phi:\eta^{\gamma(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}\cong\mathrm{Ind}_{H^{1\gamma}}^{J^{1\gamma}}\theta^{\gamma}|_{J^{1}\cap J^{1\gamma}}\rightarrow\mathrm{Ind}_{H^{1}}^{J^{1}}\theta|_{J^{1}\cap J^{1\gamma}}\cong\eta^{(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}$$ and a linear form $\widetilde{L_{0}}\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{(J^{1}:H^{1})^{1/2}},1)$, such that $$0\neq\widetilde{L_{0}}\circ\Phi\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{\gamma(J^{1\gamma}:H^{1\gamma})^{1/2}},1).$$ \end{lemma} \begin{proof} We will prove this lemma by giving a direct construction of $\Phi$ and $\widetilde{L_{0}}$. First we choose our $\widetilde{L_{0}}$. We choose $\lambda_{0}\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}1,1)\cong R$ with the isomorphism given by the Frobenius reciprocity, such that its corresponding image in $R$ equals to 1. Then we choose $\widetilde{L_{0}}=(\lambda_{0},...,\lambda_{0})$ as a element in $$\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\bigoplus_{H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}1,1)\cong\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{(J^{1}:H^{1})^{1/2}},1),$$ where the isomorphism is determined by Lemma \ref{Lemmaindthetares}.(3), and by Lemma \ref{LemmaJHJgammaHgamma} the number of copies equals to $(J^{1}:H^{1})^{1/2}$. Now we focus on the construction of $\Phi$. We define \begin{equation}\label{eqf0} f_{0}(g):=\begin{cases} \theta^{\gamma}(g_{1})\theta(g_{2})\ &\text{if}\quad g=g_{1}g_{2}\in(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma})\\ 0 & \text{if}\quad g\in J^{1}\cap J^{1\gamma}\backslash(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma}) \end{cases}. \end{equation} as a continuous function defined on $J^{1}\cap J^{1\gamma}$ with values in $R$. Since $(J^{1}\cap H^{1\gamma})\cap(H^{1}\cap J^{1\gamma})=H^{1}\cap H^{1\gamma}$ and $\theta^{\gamma}=\theta$ over $H^{1}\cap H^{1\gamma}$, we know that $f_{0}$ is well-defined. We want to verify that $f_{0}\in\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta$ and $f_{0}\in\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}$. Since $J^{1}$ normalizes $H^{1}$ and $J^{1\gamma}$ normalizes $H^{1\gamma}$, by direct calculation we have $J^{1}\cap J^{1\gamma}$ normalizes $J^{1}\cap H^{1\gamma}$ and $H^{1}\cap J^{1\gamma}$. In particular, we have $(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma})=(H^{1}\cap J^{1\gamma})(J^{1}\cap H^{1\gamma})$. Moreover, since $J^{1}$ and $J^{1\gamma}$ normalize $\theta$ and $\theta^{\gamma}$ respectively, we have $(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma})=(H^{1}\cap J^{1\gamma})(J^{1}\cap H^{1\gamma})$ normalizes $\theta$ and $\theta^{\gamma}$. For $g_{1}'\in J^{1}\cap H^{1\gamma}$, $g_{2}'\in H^{1}\cap J^{1\gamma}$ and $g\in J^{1}\cap J^{1\gamma}$, if $g\notin(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma})$, we have $g_{1}'g, g_{2}'g\notin(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma})$, thus $$f_{0}(g_{1}'g)=f_{0}(g_{2}'g)=0;$$ if $g=g_{1}g_{2}\in(J^{1}\cap H^{1\gamma})(H^{1}\cap J^{1\gamma})$, we have $$f_{0}(g_{1}'g)=\theta^{\gamma}(g_{1}')\theta^{\gamma}(g_{1})\theta(g_{2})=\theta^{\gamma}(g_{1}')f_{0}(g)$$ and $$f_{0}(g_{2}'g)=f_{0}(g_{2}'g_{1}g_{2}'^{-1}g_{2}'g_{2})=\theta^{\gamma}(g_{2}'g_{1}g_{2}'^{-1})\theta(g_{2}')\theta(g_{2})=\theta(g_{2}')\theta^{\gamma}(g_{1})\theta(g_{2})=\theta(g_{2}')f_{0}(g).$$ Combining these facts, we have $f_{0}\in\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta$ and $f_{0}\in\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}$. We consider $J^{1}\cap J^{1\gamma}$-action on $f_{0}$ given by the right translation and we let $<f_{0}>$ be the $R[J^{1}\cap J^{1\gamma}]$-subspace of both $\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}$ and $\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta$ generated by $f_{0}$. We choose $V_{f_{0}}$ to be a $R[J^{1}\cap J^{1\gamma}]$-invariant subspace of $\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}$ such that $\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}=<f_{0}>\oplus V_{f_{0}}$. We define a $R[J^{1}\cap J^{1\gamma}]$-module homomorphism: $$\Phi_{1}:\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}\rightarrow\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta$$ such that $\Phi_{1}(f_{0})=f_{0}$ and $\Phi_{1}|_{V_{f_{0}}}=0$. And we define: $$\Phi:\bigoplus_{H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}\rightarrow\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta$$ given by $\Phi=\mathrm{diag}(\Phi_{1},0,...,0)\in \mathrm{M}_{N_{1}}(\mathrm{Hom}_{R[J^{1}\cap J^{1\gamma}]}(\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma},\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta))$, where the coordinates are indexed by $N_{1}:=|H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}|=|H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}|$. In particular, we let the first coordinate corresponds to the trivial double cosets $H^{1\gamma}(J^{1}\cap J^{1\gamma})$ and $H^{1}(J^{1}\cap J^{1\gamma})$ respectively. As a result, $\Phi$ gives a $R[J^{1}\cap J^{1\gamma}]$-module homomorphism. By Lemma \ref{Lemmaindthetares} we have: \begin{equation}\label{eqetaind} \eta^{(J^{1}:H^{1})^{1/2}}\cong\mathrm{Ind}_{H^{1}}^{J^{1}}\theta|_{J^{1}\cap J^{1\gamma}}\cong\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta \end{equation} and \begin{equation}\label{eqgammaetaind} \eta^{\gamma(J^{1}:H^{1})^{1/2}}\cong\mathrm{Ind}_{H^{1\gamma}}^{J^{1\gamma}}\theta^{\gamma}|_{J^{1}\cap J^{1\gamma}}\cong\bigoplus_{H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}. \end{equation} With these two isomorphisms, we may regard $\Phi$ as a homomorphism from $\eta^{\gamma(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}$ to $\eta^{(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}$. Finally, we need to study $\widetilde{L_{0}}\circ\Phi$. First we calculate: $$\Phi_{1}:\mathrm{Ind}_{J^{1}\cap H^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta^{\gamma}|_{J^{1}\cap G^{\delta}}\rightarrow\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta|_{J^{1}\cap G^{\delta}}.$$ We have the following isomorphism: \begin{equation}\label{eqindthetares} \mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta|_{J^{1}\cap G^{\delta}}\cong\bigoplus_{H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}1. \end{equation} By definition of $\Phi_{1}$ and (\ref{eqf0}),(\ref{eqindthetares}), $\Phi_{1}(f_{0}|_{J^{1}\cap G^{\delta}})=f_{0}|_{J^{1}\cap G^{\delta}}$ equals to \begin{equation}\label{eqf0res} (\mathbf{1}_{H^{1}\cap G^{\delta}},...,\mathbf{1}_{H^{1}\cap G^{\delta}},0,...,0)\in\bigoplus_{H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}}\mathrm{Ind}_{H^{1}\cap G^{\delta}}^{J^{1}\cap G^{\delta}}1, \end{equation} where the coordinates are indexed by the double coset $H^{1}\cap J^{1\gamma}\backslash J^{1}\cap J^{1\gamma}/J^{1}\cap G^{\delta}$, and those coordinates which equal to the characteristic function $\mathbf{1}_{H^{1}\cap G^{\delta}}$ are exactly indexed by the subset $H^{1}\cap J^{1\gamma}\backslash (J^{1}\cap H^{1\gamma})(J^{1}\cap H^{1\gamma})/J^{1}\cap G^{\delta}$. We define $v_{0}=(f_{0}|_{J^{1}\cap G^{\delta}},0,...,0)$ as an element in both $$\bigoplus_{H^{1}\backslash J^{1}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}^{J^{1}\cap J^{1\gamma}}_{J^{1}\cap H^{1\gamma}}\theta^{\gamma}|_{J^{1}\cap G^{\delta}}$$ and $$\bigoplus_{H^{1\gamma}\backslash J^{1\gamma}/J^{1}\cap J^{1\gamma}}\mathrm{Ind}_{H^{1}\cap J^{1\gamma}}^{J^{1}\cap J^{1\gamma}}\theta|_{J^{1}\cap G^{\delta}}$$ where the first coordinate corresponds to the trivial double cosets $H^{1}(J^{1}\cap J^{1\gamma})$ and $H^{1\gamma}(J^{1}\cap J^{1\gamma})$ respectively as in our definition of $\Phi$. Thus we have: \begin{align*}(\widetilde{L_{0}}\circ\Phi)(v_{0})&=\widetilde{L_{0}}((\Phi_{1}(f_{0}|_{J^{1}\cap G^{\delta}}),0,...,0))=\widetilde{L_{0}}((f_{0}|_{J^{1}\cap G^{\delta}},0,...,0))\\ &=|H^{1}\cap J^{1\gamma}\backslash (H^{1}\cap J^{1\gamma})(J^{1}\cap H^{1\gamma})/J^{1}\cap G^{\delta}|\lambda_{0}(\mathbf{1}_{H^{1}\cap G^{\delta}})\neq 0 \end{align*} where we use the definition of $\widetilde{L_{0}}$ and (\ref{eqf0res}) for the last equation. Thus we get $\widetilde{L_{0}}\circ\Phi\neq 0$ which finishes the proof. \end{proof} We also need the following lemma: \begin{lemma}\label{Lemmapushpull} We keep the same notations as in Proposition \ref{Propvarphibijec} and we fix $$0\neq \lambda_{0}'\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta,1)\quad \text{and}\quad 0\neq \lambda_{0}''\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{\gamma},1).$$ Then: (1) For any $\widetilde{L}\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{(J^{1}:H^{1})^{1/2}},1)$, there exists an $R[J^{1}\cap J^{1\gamma}]$-homomorphism $$\mathrm{Pr}:\eta^{(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}\rightarrow \eta|_{J^{1}\cap J^{1\gamma}}$$ such that $\widetilde{L}=\lambda_{0}'\circ \mathrm{Pr}$. (2) For any $\widetilde{L}\in\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{\gamma(J^{1}:H^{1})^{1/2}},1)$, there exists an $R[J^{1}\cap J^{1\gamma}]$-homomorphism $$s:\eta^{\gamma}|_{J^{1}\cap J^{1\gamma}}\rightarrow\eta^{\gamma(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}$$ such that $\lambda_{0}''=\widetilde{L}\circ s$. \end{lemma} \begin{proof} The proof is just a simple application of linear algebra. We denote $N=(J^{1}:H^{1})^{1/2}$. For (1), we define $\mathrm{pr}_{i}:\eta^{(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}}\rightarrow \eta|_{J^{1}\cap J^{1\gamma}}$ as the projection with respect to the $i$-th coordinates. Since $\lambda_{0}'\circ\mathrm{pr}_{1} $,...,$\lambda_{0}'\circ\mathrm{pr}_{N}$ are linearly independent, and $\mathrm{dim}_{R}\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{(J^{1}:H^{1})^{1/2}},1)=N$ as an $R$-vector space by Proposition \ref{propheis}, thus $\lambda_{0}'\circ\mathrm{pr}_{1}$,...,$\lambda_{0}'\circ\mathrm{pr}_{N}$ generate $\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{(J^{1}:H^{1})^{1/2}},1)$. So we may choose $\mathrm{Pr}$ to be the linear combination of $\mathrm{pr}_{j}$ which proves (1). The proof of (2) is similar. \end{proof} Now we finish the proof of Proposition \ref{Propvarphibijec}. Using Lemma \ref{Lemmapushpull}.(1) we choose $\mathrm{Pr}$ such that $\widetilde{L_{0}}=\lambda_{0}'\circ\mathrm{Pr}$, where $\widetilde{L_{0}}$ is defined as in the statement of Lemma \ref{LemmaPhicont}. By using Lemma \ref{LemmaPhicont}, there exists $\Phi$ such that $\widetilde{L_{0}}\circ\Phi\neq 0$. Using Lemma \ref{Lemmapushpull}.(2) we choose $s$ such that $\widetilde{L_{0}}\circ\Phi\circ s=\lambda_{0}''\neq 0$. And we define $\varphi'=\mathrm{Pr}\circ\Phi\circ s$, i.e. we have the following commutative diagram: $$\xymatrix{ \eta^{\gamma(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}} \ar[r]^{\Phi} & \eta^{(J^{1}:H^{1})^{1/2}}|_{J^{1}\cap J^{1\gamma}} \ar[d]^{\mathrm{Pr}} \\ \eta^{\gamma}|_{J^{1}\cap J^{1\gamma}} \ar[u]^{s} \ar[r]^{\varphi'} & \eta|_{J^{1}\cap J^{1\gamma}} }$$ By definition we have $\lambda_{0}'\circ\varphi'=\lambda_{0}'\circ\mathrm{Pr}\circ\Phi\circ s=\lambda_{0}''\neq 0$, which means that $\varphi'\neq 0$. Since $\mathrm{Hom}_{J^{1}\cap J^{1\gamma}}(\eta^{\gamma},\eta)$ is of dimension 1, we have $\varphi$ equals to $\varphi'$ multiplying with a non-zero scalar, which means that $\lambda_{0}'\circ\varphi\neq 0$. Since $\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta,1)$ and $\mathrm{Hom}_{J^{1}\cap G^{\delta}}(\eta^{\gamma},1)$ are of dimension 1, we know that $f_{\varphi}$ is an $R$-vector space isomorphism which proves Proposition \ref{Propvarphibijec}. \subsection{Existence of a $\tau$-selfdual extension of $\eta$} Now our aim is to choose a relatively simple $\boldsymbol{\kappa}$ as an extension of $\eta$. Specifically, under the condition of Remark \ref{rempicond}, we will show that we may assume $\boldsymbol{\kappa}$ to be $\tau$-selfdual, which means that $\boldsymbol{\kappa}^{\tau}\cong\boldsymbol{\kappa}^{\vee}$. First of all, we have the following lemma whose proof is the same as that in \cite{secherre2018supercuspidal}, Lemma 5.21: \begin{lemma}\label{lemmu} There exists a unique character $\mu$ of $\boldsymbol{J}$ trivial on $J^{1}$ such that $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}\mu$. It satisfies the identity $\mu\circ\tau=\mu$. \end{lemma} Now we are going to prove the following important proposition: \begin{proposition}\label{propselfdual} When $\mathrm{char}(R)=0$, then there exists a character $\phi$ of $\boldsymbol{J}$ trivial on $J^{1}$ such that $\mu=\phi(\phi\circ\tau)$. Moreover for any $R$, we may choose $\boldsymbol{\kappa}$ as an extension of $\eta$ such that $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}$. \end{proposition} \begin{proof} First we consider the case when char$(R)=0$. we need the following elementary lemma: \begin{lemma}\label{lem2sroot} We assume $\mathrm{char}(R)=0$. For $N$ odd and $A\in\mathrm{GL}_{N}(R)$ such that $A^{2^{s}}=cI_{N}$ for $s\in\mathbb{N}$ and $c\in R^{\times}$, we have $\mathrm{Tr}(A)\neq 0$. \end{lemma} \begin{proof} $s=0$ is trivial, so from now on we assume $s\geq 1$. Let $\zeta_{2^{s}}$ be a primitive $2^{s}$th root of $1$ in $R$ and let $c^{1/2^{s}}$ be a $2^{s}$th root of $c$ in $R$, then we get $\mathrm{Tr}(A)=c^{1/2^{s}}\sum_{i=1}^{N}\zeta_{2^{s}}^{n_{i}}$ with $n_{i}\in\{0,1,2,...,2^{s}-1\}$. We know that $P(x)=x^{2^{s-1}}+1$ is the minimal polynomial of $\zeta_{2^{s}}$ in $\mathbb{Q}[x]$. If $\mathrm{Tr}(A)=0$, then for $Q(x)=\sum_{i=1}^{N}x^{n_{i}}$, we have $Q(\zeta_{2^{s}})=0$. As a result, $P(x)|Q(x)$ in $\mathbb{Q}[x]$ thus in $\mathbb{Z}[x]$ by the Gauss lemma. However, the sum of all the coefficients of $P(x)$ is even and the sum of all the coefficients of $Q(x)$ equals to $N$ which is odd. We get a contradiction. So $\mathrm{Tr}(A)\neq 0$. \end{proof} Come back to our proof. We choose $\boldsymbol{\kappa}$ as any extension of $\eta$, thus as in Lemma \ref{lemmu}, there exists $\phi$ as a character of $\boldsymbol{J}$ such that $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}\mu$. If $E/E_{0}$ is unramified, we let $$\overline{\mu}:\mathrm{GL}_{m}(\boldsymbol{l})\cong J/J^{1}\rightarrow R^{\times}$$ be the character whose inflation is $\mu|_{J}$. There exists a character $\varphi:\boldsymbol{l}^{\times}\rightarrow R^{\times}$ such that $\overline{\mu}=\varphi\circ\mathrm{det}$. Since $\overline{\mu}\circ\tau=\overline{\mu}$, we get $(\varphi\circ\sigma)\varphi=1$, or equivalently $\varphi|_{\boldsymbol{l}_{0}^{\times}}=1$, where $\boldsymbol{l}_{0}$ is the residue field of $E_{0}$, and $\sigma$ acts on $\boldsymbol{l}$ as the Frobenius map corresponding to $\boldsymbol{l}_{0}$. Let $Q$ be the cardinality of $\boldsymbol{l}_{0}$, then the cardinality of $\boldsymbol{l}$ is $Q^{2}$. If we fix $\zeta_{\boldsymbol{l}}$ to be a generator of $\boldsymbol{l}^{\times}$, then we get $\zeta_{\boldsymbol{l}}^{Q+1}$ is a generator of $\boldsymbol{l}_{0}^{\times}$. So we have $\varphi(\zeta_{l})^{Q+1}=1$. Choose $\alpha:\boldsymbol{l}^{\times}\rightarrow R^{\times}$ as a character such that $$\alpha(\zeta_{\boldsymbol{l}}^{m})^{Q-1}=\varphi(\zeta_{\boldsymbol{l}})^{-m} \ \text{for}\ m\in\mathbb{Z}.$$ Since $$\alpha(\zeta_{\boldsymbol{l}})^{Q^{2}-1}=\varphi(\zeta_{\boldsymbol{l}})^{-Q-1}=1,$$ we know that $\alpha$ is well-defined as a character of $\boldsymbol{l}^{\times}$. Moreover, we get $\varphi=\alpha(\alpha\circ\sigma)^{-1}$. Choose $\phi^{0}:J\rightarrow R^{\times}$ as the inflation of $\alpha\circ\mathrm{det}$, we get $\mu|_{J}=\phi^{0}(\phi^{0}\circ\tau).$ Since $\varpi_{E}$ and $J$ generate $\boldsymbol{J}$, to choose $\phi$ as a character of $\boldsymbol{J}$ extending $\phi^{0}$, it suffices to show that $\mu(\varpi_{E})=1$. Since $\mu=\mu\circ\tau$, we get $$\mu(\varpi_{E})=\mu(\tau(\varpi_{E}))=\mu(\varpi_{E})^{-1}, \ \text{i.e.}\ \mu(\varpi_{E})\in\{1,-1\}.$$ Let $e$ be the ramification index of $E/F$, and let $\varpi_{E}^{e}=a_{0}\varpi_{F}$ for a certain $a_{0}\in\mathfrak{o}_{E}^{\times}$. So we have $$\varpi_{E}^{e(Q-1)}=a_{0}^{Q-1}\varpi_{F}^{Q-1}\ \text{with}\ a_{0}^{Q-1}\in 1+\mathfrak{p}_{E}\subset H^{1}(\mathfrak{a},\beta).$$ We write $e(Q-1)=2^{s}u$ for $2\nmid u$ and $s\in\mathbb{N}$. For $A=\boldsymbol{\kappa}(\varpi_{E}^{u})$, we have $$A^{2^{s}}=\boldsymbol{\kappa}(a_{0}^{Q-1}\varpi_{F}^{Q-1})=\theta(a_{0}^{Q-1})\omega_{\boldsymbol{\kappa}}(\varpi_{F}^{Q-1})I_{N},$$ where we use the fact that the restriction of $\boldsymbol{\kappa}$ to $H^{1}(\mathfrak{a},\beta)$ equals to $N$-copies of $\theta$ with $N=(J^{1}:H^{1})^{1/2}$, and $\omega_{\boldsymbol{\kappa}}$ is the central character of $\boldsymbol{\kappa}$. Using Lemma \ref{lem2sroot} with $A$ and $c=\theta(a_{0}^{Q-1})\omega_{\boldsymbol{\kappa}}(\varpi_{F}^{Q-1})$, we get $\mathrm{Tr}(\boldsymbol{\kappa}(\varpi_{E}^{u}))\neq 0.$ Since $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}\mu$, considering the trace of both sides at $\varpi_{E}^{u}$, we get $$\mathrm{Tr}(\boldsymbol{\kappa}(\varpi_{E}^{u}))=\mathrm{Tr}(\boldsymbol{\kappa}(\varpi_{E}^{u}))\mu(\varpi_{E}^{u}),$$ thus $\mu(\varpi_{E}^{u})=1$. Since $u$ is odd and $\mu(\varpi_{E})$ equals to either $1$ or $-1$, we get $\mu(\varpi_{E})=1$ which finishes the proof of this case. If $E/E_{0}$ is ramified, first we show that $\mu|_{\boldsymbol{l}^{\times}}=1$, where we consider the embedding $\boldsymbol{l}^{\times}\hookrightarrow E^{\times}$. Let $Q$ be the cardinality of $\boldsymbol{l}=\boldsymbol{l}_{0}$ and let $\zeta_{\boldsymbol{l}}$ be a generator of $\boldsymbol{l}^{\times}$, then we want to show that $\mu(\zeta_{\boldsymbol{l}})=1$. Write $Q-1=2^{s}u$ with $2\nmid u$ and use Lemma \ref{lem2sroot} with $A=\boldsymbol{\kappa}(\zeta_{\boldsymbol{l}}^{u})$ and $c=1$, we get $\mathrm{Tr}(\boldsymbol{\kappa}(\zeta_{\boldsymbol{l}}^{u}))\neq 0.$ Since $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}\mu$, we get $$\mathrm{Tr}(\boldsymbol{\kappa}(\zeta_{\boldsymbol{l}}^{u}))=\mathrm{Tr}(\boldsymbol{\kappa}(\zeta_{\boldsymbol{l}}^{u}))\mu(\zeta_{\boldsymbol{l}}^{u})$$ after considering the trace of the isomorphism. Thus $\mu(\zeta_{\boldsymbol{l}}^{u})=1$. Since $\mu(\zeta_{\boldsymbol{l}})$ equals to either $1$ or $-1$ which can be proved as the former case and $u$ is odd, we get $\mu(\zeta_{\boldsymbol{l}})=1$. Thus $\mu|_{J}=1$. To finish the definition of $\phi:\boldsymbol{J}\rightarrow R^{\times}$ such that $\mu=\phi(\phi\circ\tau)$, we only need to verify the equation: $$\mu(\varpi_{E})=\phi(\varpi_{E})\phi(\tau(\varpi_{E}))=\phi(\varpi_{E})\phi(-\varpi_{E}))^{-1}=\phi(-1)^{-1}.$$ Since we have already showed that $\mu(-1)=1$, using the relation $\mu=\mu\circ\tau$, we get $\mu(\varpi_{E}^{2})=\mu(-\varpi_{E}^{2})=\mu(\varpi_{E})\mu(\tau(\varpi_{E}))^{-1}=1$, so we get $\mu(\varpi_{E})$ equals to either $1$ or $-1$. Choose $\phi(-1)=\mu(\varpi_{E})$ which is well defined, we finish the definition of $\phi$ such that $\mu=\phi(\phi\circ\tau)$. Let $\boldsymbol{\kappa}'=\boldsymbol{\kappa}\phi$, then $\boldsymbol{\kappa}'$ is $\tau$-selfdual. Now we suppose $R=\overline{\mathbb{F}_{l}}$. Let $\widetilde{\theta}$ be the lift of $\theta$ to $\overline{\mathbb{Q}_{l}}$ given by the canonical embedding $\overline{\mathbb{F}_{l}}^{\times}\hookrightarrow\overline{\mathbb{Q}_{l}}^{\times}$, then we have $\widetilde{\theta}$ is a simple character and $\widetilde{\theta}\circ\tau=\widetilde{\theta}^{-1}$. There is a $\tau$-selfdual representation $\widetilde{\boldsymbol{\kappa}}$ of $\boldsymbol{J}$ extending the Heisenberg representation $\widetilde{\eta}$ of $J^{1}$ corresponding to $\widetilde{\theta}$. Moreover we can further choose $\widetilde{\boldsymbol{\kappa}}$ such that the central character of $\widetilde{\boldsymbol{\kappa}}$ is integral. To do this, first we choose $\widetilde{\boldsymbol{\kappa}^{0}}$ as a representation of $J$ extending $\eta$. We extend $\widetilde{\boldsymbol{\kappa}^{0}}$ to a representation of $F^{\times}J$. This requires us to choose a quasi-character $\widetilde{\omega}:F^{\times}\rightarrow \overline{\mathbb{Q}_{l}}^{\times}$ extending $\omega_{\widetilde{\boldsymbol{\kappa}^{0}}}$. We choose $\widetilde{\omega}$ such that it is integral. If we further extend this representation to $\widetilde{\boldsymbol{\kappa}}$ as a representation of $J=E^{\times}J$, then $\widetilde{\boldsymbol{\kappa}}$ is also integral. From the proof of characteristic $0$ case, we may further assume $\widetilde{\boldsymbol{\kappa}}^{\tau\vee}\cong\widetilde{\boldsymbol{\kappa}}$ without losing the property that $\widetilde{\boldsymbol{\kappa}}$ is integral. By \cite{minguez2014types} Paragraph 2.11, the reduction of $\widetilde{\boldsymbol{\kappa}}$ to $R$, denoted by $\boldsymbol{\kappa}$, is thus a $\tau$-selfdual representation of $\boldsymbol{J}$ extending $\eta$. For $\mathrm{char}(R)=l>0$ in general, we can simply follow the last paragraph of \cite{secherre2018supercuspidal}, Lemma 7.7, with $\sigma$ replaced by $\tau$. So finally we finish the proof. \end{proof} \subsection{Proof of Theorem \ref{thmtype}} Using Proposition \ref{propselfdual}, we may assume that $\boldsymbol{\kappa}$ is $\tau$-selfdual, which means that $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}$. From its proof, when $R=\overline{\mathbb{F}_{l}}$, we assume further that $\boldsymbol{\kappa}$ is the reduction of a $\tau$-selfdual representation $\widetilde{\boldsymbol{\kappa}}$ of $\boldsymbol{J}$ over $\overline{\mathbb{Q}_{l}}$, and when $\mathrm{char}(R)=l>0$ in general, we assume $\boldsymbol{\kappa}$ to be realized as a $\overline{\mathbb{F}_{l}}$-representation via a certain fields embedding $\overline{\mathbb{F}_{l}}\hookrightarrow R$. We have the following proposition: \begin{proposition}\label{propchiquad} The character $\chi$ defined by Lemma \ref{lemkappa}.(1) is quadratic over $J^{g}\cap G^{\tau}$, i.e. $\chi^{2}|_{J^{g}\cap G^{\tau}}=1$. \end{proposition} \begin{proof} First we assume that $\mathrm{char}(R)=0$. We have the following isomorphisms: \begin{align*} \mathrm{Hom}_{J^{1\tau(g)}\cap G^{\tau}}(\eta^{\tau(g)},1)&\cong\mathrm{Hom}_{J^{1g}\cap G^{\tau}}(\eta^{g},1)\\ &\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\kappa}^{g},\chi^{-1})\\ &\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\chi,\boldsymbol{\kappa}^{g\vee})\quad (\text{by the duality of contragredient})\\ &\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\kappa}^{g\vee},\chi)\quad (\text{since}\ \mathrm{char}(R)=0)\\ &\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\kappa}^{g\vee}\circ\tau,\chi\circ\tau)\\ &\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}((\boldsymbol{\kappa}^{\tau\vee})^{\tau(g)},\chi\circ\tau)\\ &\cong\mathrm{Hom}_{\boldsymbol{J}^{\tau(g)}\cap G^{\tau}}(\boldsymbol{\kappa}^{\tau(g)},\chi\circ\tau)\quad(\text{since}\ \boldsymbol{\kappa}\ \text{is}\ \tau\text{-selfdual}). \end{align*} Using Proposition \ref{Propchichi'} and the uniqueness of $\chi'$ in the \emph{loc. cit.}, we have $\chi\circ\tau=\chi^{-1}$. Since $\chi$ is defined on $\boldsymbol{J}^{g}\cap G^{\tau}$ which is $\tau$-invariant, we have $\chi\circ\tau=\chi$. Thus we have $\chi^{2}=\chi(\chi\circ\tau)=1$. If $R=\overline{\mathbb{F}_{l}}$, we denote by $\widetilde{\boldsymbol{\kappa}}$ a $\tau$-selfdual $\overline{\mathbb{Q}_{l}}$-lift of $\boldsymbol{\kappa}$ and we denote by $\widetilde{\chi}$ the character defined by Lemma \ref{lemkappa}.(1) with respect to $\widetilde{\boldsymbol{\kappa}}$ and $\widetilde{\eta}$, where $\widetilde{\eta}$ is a $J^{1}\cap G^{\tau}$-distinguished $\overline{\mathbb{Q}_{l}}$-lift of $\eta$. Using this proposition for $\overline{\mathbb{Q}_{l}}$-representations, we get $\widetilde{\chi}^{2}=1$. From the uniqueness of $\chi$, we know that $\widetilde{\chi}$ is a $\overline{\mathbb{Q}_{l}}$-lift of $\chi$. As a result, we get $\chi^{2}=1$. If $\mathrm{char}(R)=l>0$ in general, from the assumption of $\boldsymbol{\kappa}$ mentioned at the beginning of this subsection, via a fields embedding $\overline{\mathbb{F}_{l}}\hookrightarrow R$, we may realize all the representations mentioned in this proposition as representations over $\overline{\mathbb{F}_{l}}$, so we finish the proof by using the former case. \end{proof} As in the proof of Lemma \ref{lemdoucos}, we assume $g\in B^{\times}$ and \begin{equation}\label{eqgammabxcond} \gamma=bx,\quad b\tau(b)=1, \quad x\in K^{1},\quad b\in\varpi_{E}^{a_{1}}\mathrm{GL}_{m_{1}}(\mathfrak{o}_{E})\times...\times\varpi_{E}^{a_{r}}\mathrm{GL}_{m_{r}}(\mathfrak{o}_{E}). \end{equation} There exists a unique standard hereditary order $\mathfrak{b}_{m}\subseteq\mathfrak{b}$ such that: $$U^{1}(\mathfrak{b}_{m})=(U\cap\delta(U^{1}))U^{1}=(U\cap U^{1\gamma})U^{1},$$ where we define $\delta(y)=\gamma^{-1}\tau(y)\gamma$ for any $y\in G$ as an involution on $G$. First we have the following lemma whose proof is the same as which in \cite{secherre2018supercuspidal}, Lemma 6.22, inspired by \cite{hakim2008distinguished}, Proposition 5.20: \begin{lemma}\label{lemU1bm} We have $U^{1}(\mathfrak{b}_{m})=(U^{1}(\mathfrak{b}_{m})\cap G^{\delta})U^{1}$. \end{lemma} Now we may state and prove the following important theorem: \begin{theorem}\label{thmtaugg-1} Let $g\in G$ and suppose $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)$ is non-zero. Then $\tau(g)g^{-1}\in\boldsymbol{J}$. \end{theorem} \begin{proof} It is enough to show that $r=1$ in (\ref{eqgammabxcond}). If not, we know that $\mathfrak{b}_{m}$ by definition is a proper suborder of $\mathfrak{b}$. Furthermore, $\overline{U^{1}(\mathfrak{b}_{m})}:=U^{1}(\mathfrak{b}_{m})/U^{1}$ is a non-trivial unipotent subgroup of $U/U^{1}\cong\mathrm{GL}_{m}(\boldsymbol{l})$. Using Lemma \ref{lemkappa}.(2), we have: $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\delta}}(\boldsymbol{\rho},\chi^{g^{-1}})\cong\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\boldsymbol{\rho}^{g},\chi)\neq 0.$$ Restricting to $U^{1}(\mathfrak{b}_{m})\cap G^{\delta}$, we have: \begin{equation}\label{eqrho} \mathrm{Hom}_{U^{1}(\mathfrak{b}_{m})\cap G^{\delta}}(\boldsymbol{\rho},\chi^{g^{-1}})\neq 0. \end{equation} Using Lemma \ref{lemU1bm}, we have the isomorphism: $$(U^{1}(\mathfrak{b}_{m})\cap G^{\delta})U^{1}/U^{1}\cong U^{1}(\mathfrak{b}_{m})/U^{1}.$$ We denote by $\overline{\rho}$ as the cuspidal representation of $U^{0}/U^{1}\cong\mathrm{GL}_{m}(\boldsymbol{l})$ whose inflation is $\boldsymbol{\rho}|_{U^{0}}$, and $\overline{\chi^{g^{-1}}}$ the character of $\overline{U^{1}(\mathfrak{b}_{m})}$ whose inflation is $\chi^{g^{-1}}$. So if we consider the equation (\ref{eqrho}) modulo $U^{1}$, then we get: $$\mathrm{Hom}_{\overline{U^{1}(\mathfrak{b}_{m})}}(\overline{\rho},\overline{\chi^{g^{-1}}})\neq 0.$$ Since $\chi^{g^{-1}}|_{J\cap G^{\delta}}$ is quadratic and $\overline{U^{1}(\mathfrak{b}_{m})}$ is a $p$-group with $p\neq 2$, we get $\overline{\chi^{g^{-1}}}=1$, thus: $$\mathrm{Hom}_{\overline{U^{1}(\mathfrak{b}_{m})}}(\overline{\rho},1)\neq 0,$$ which contradicts to the fact that $\overline{\rho}$ is cuspidal. So we finish the proof. \end{proof} \begin{proof}[Proof of Theorem \ref{thmtype}] If there exists a $\tau$-selfdual simple type $(\boldsymbol{J},\Lambda)$ in $\pi$ such that $\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)$ is non-zero, then $\pi$ is $G^{\tau}$-distinguished. Conversely, there exists $g\in G$ such that $\mathrm{Hom}_{\boldsymbol{J}^{g}\cap G^{\tau}}(\Lambda^{g},1)\neq 0$. Using Theorem \ref{thmtaugg-1}, we get $(\boldsymbol{J}^{g},\Lambda^{g})$ is a $\tau$-selfdual simple type. \end{proof} Finally we state the following corollary of Theorem \ref{thmtaugg-1} as the end of this section: \begin{corollary}\label{corJGtau} Under the assumption of Theorem \ref{thmtaugg-1}, we have $g\in\boldsymbol{J}G^{\tau}$ or $g\in\boldsymbol{J}g_{1}G^{\tau}$, where the latter case exists only if $m$ is even, and $g_{1}\in B^{\times}$ is fixed such that $$\tau(g_{1})g_{1}^{-1}=\begin{cases}\varpi_{E}I_{m} &\quad \text{if}\ E/E_{0}\ \text{is unramified.}\\ \varpi_{E}J_{m/2} &\quad \text{if}\ E/E_{0}\ \text{is ramified.}\end{cases}$$ As a result, $$\mathrm{Hom}_{G^{\tau}}(\pi,1)\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)\oplus\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\Lambda^{g_{1}},1).$$ \end{corollary} \begin{proof} Recall that we have already assumed that $g\in B^{\times}$. Since $\tau(g)g^{-1}\in \boldsymbol{J}\cap B^{\times}=E^{\times}\mathfrak{b}^{\times}$, by changing $g$ up to multiplying by an element in $E^{\times}$ which doesn't change the double coset it represents, we may assume: $(g^{*})^{-1}\varepsilon^{-1}g^{-1}\in\mathfrak{b}^{\times}$ or $\varpi_{E}\mathfrak{b}^{\times}$, where $\varepsilon$ equals to $I_{m}$ for $E/E_{0}$ unramified\footnote{It is also possible in the unramified case that $\varepsilon=\mathrm{diag}(\varpi_{E},...,\varpi_{E})$. However at that time $\varepsilon\in E^{\times}$ which commutes with $B^{\times}$, thus this case can be combined into the case when $\varepsilon=I_{m}$.} and $\varepsilon$ equals to $I_{m}$ or $\mathrm{diag}(1,...,1,\epsilon)$ with $\epsilon\in \mathfrak{o}_{E_{0}}^{\times}\backslash\mathrm{N}_{E/E_{0}}(\mathfrak{o}_{E}^{\times})$ for $E/E_{0}$ ramified. Using Proposition \ref{PropJOH}, we may change $g^{-1}$ up to multiplying by an element in $\mathfrak{b}^{\times}$ on the right, thus we may write $(g^{*})^{-1}\varepsilon^{-1}g^{-1}=\varpi_{E}^{\alpha}$, where $\varpi_{E}^{\alpha}$ is defined as in subsection \ref{subsectionunitary}. Thus we get $\mathrm{det}_{B}(\varpi_{E}^{\alpha})/\mathrm{det}_{B}(\varepsilon^{-1})\in\mathrm{N}_{E/E_{0}}(E^{\times})$. If $(g^{*})^{-1}\varepsilon^{-1}g^{-1}\in\mathfrak{b}^{\times}$, from the definition and the uniqueness of $\varpi_{E}^{\alpha}$ in Proposition \ref{PropJOH}, we get $\varpi_{E}^{\alpha}=\varepsilon$. We may further change $g^{-1}$ up to multiplying an element in $\mathfrak{b}^{\times}$ on the right, such that $(g^{*})^{-1}\varepsilon^{-1}g^{-1}=\varepsilon^{-1}$. Thus we get $\tau(g)=\varepsilon(g^{*})^{-1}\varepsilon^{-1}=g$, which means that $g\in G^{\tau}$. If $(g^{*})^{-1}\varepsilon^{-1}g^{-1}\in \varpi_{E}\mathfrak{b}^{\times}$. By considering the determinant we get $\mathrm{det}_{B}((g^{*})^{-1}\varepsilon^{-1}g^{-1})\in E^{\times}$ is of even order with respect to the discrete valuation of $E$. Since the determinant of elements in $\varpi_{E}\mathfrak{b}^{\times}$ is of order $m$, we have $m$ is even. Thus from the definition and the uniqueness of $\varpi_{E}^{\alpha}$ in Proposition \ref{PropJOH}, we get $\varpi_{E}^{\alpha}=\varpi_{E}\varepsilon$ when $E/E_{0}$ is unramified and $\varpi_{E}^{\alpha}=\varpi_{E}J_{m/2}$ when $E/E_{0}$ is ramified. For the former case, we have $\varepsilon=I_{m}$. By using Proposition \ref{PropGOH}, we may choose $g_{1}\in B^{\times}$ such that $(g_{1}^{*})^{-1}g_{1}^{-1}=\varpi_{E}I_{m}=(g^{*})^{-1}g^{-1}$. Thus $g\in g_{1}G^{\tau}$. For the latter case, by considering the determinant we must have $\mathrm{det}_{B}(\varepsilon)\in\mathrm{N}_{E/E_{0}}(E^{\times})$, thus $\varepsilon=I_{m}$. Using Proposition \ref{PropGOH}, we may choose $g_{1}\in B^{\times}$ such that $(g_{1}^{*})^{-1}g_{1}^{-1}=\varpi_{E}J_{m/2}=(g^{*})^{-1}g^{-1}$. Thus $g\in g_{1}G^{\tau}$. \end{proof} \section{The supercuspidal unramified case}\label{sectionunram} In this section, we study the distinction of $\sigma$-invariant supercuspidal representations of $G$ in the case when $E/E_{0}$ is unramified. \subsection{The finite field case} In this subsection, we assume $\boldsymbol{l}/\boldsymbol{l}_{0}$ to be a quadratic extension of finite fields with characteristic equals to $p\neq 2$. Let $|\boldsymbol{l}_{0}|=Q$, then we have $|\boldsymbol{l}|=Q^{2}$. Let $\sigma$ be the Frobenius map corresponding to $\boldsymbol{l}$ only in this subsection. For $m$ a positive integer, we first consider the $\sigma$-invariant supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$. \begin{lemma}\label{Lemmafinsiginv} (1) If there exists a $\sigma$-invariant supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$, then $m$ is odd. (2) When $\mathrm{char}(R)=0$, the converse of (1) is true. \end{lemma} \begin{proof} Let $\boldsymbol{t}$ be an extension of degree $m$ of $\boldsymbol{l}$. We identify $\boldsymbol{t}^{\times}$ with a maximal torus of $\mathrm{GL}_{m}(\boldsymbol{l})$. We say a character $\xi:\boldsymbol{t}^{\times}\rightarrow R^{\times}$ is $\boldsymbol{l}$-regular (or regular in short) if for any $i=1,...,m-1$, we have $\xi^{|\boldsymbol{l}|^{i}}\neq\xi$. By Green \cite{green1955characters} for the case when $\mathrm{char}(R)=0$ and James \cite{james1986irreducible} when $\mathrm{char}(R)=l$ prime to $p$, there is a surjective map: $$\xi\mapsto\overline{\rho_{\xi}}$$ between $\boldsymbol{l}$-regular characters of $\boldsymbol{t}^{\times}$ and isomorphism classes of supercuspidal representations of $\mathrm{GL}_{m}(\boldsymbol{l})$, whose fibers are $\mathrm{Gal}(\boldsymbol{t}/\boldsymbol{l})$-orbits. Thus, for $\overline{\rho}$ a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$, we choose $\xi$ as a regular character of $\boldsymbol{t}^{\times}$ such that $\overline{\rho}=\overline{\rho_{\xi}}$. The representation $\overline{\rho}$ is $\sigma$-invariant if and only if: $$\xi^{Q^{2i}}=\xi^{Q}\quad \text{for a certain}\ i\in\{1,...,m\}.$$ Applying this equality twice gives us the equality $\xi^{Q^{4i-2}}=\xi$. The regularity assumption on $\xi$ implies that $2m$ divides $4i-2$. Since $1\leq i\leq m$, we get $m=2i-1$ as an odd number. Conversely, for $m=2i-1$ and $\mathrm{char}(R)=0$, we pick a character $\xi$ of $\boldsymbol{t}^{\times}$ of order $Q^{m}-1$. Thus we have $\xi^{Q^{2i}}=\xi^{Q^{m+1}}=\xi^{Q}$ and $\xi$ is regular. Thus the corresponding $\overline{\rho_{\xi}}$ is a $\sigma$-invariant supercuspidal representation. \end{proof} Let $H=\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0}):=\mathrm{U}_{m}(I_{m})$ be the unitary subgroup of $\mathrm{GL}_{m}(\boldsymbol{l})$ corresponding to the hermitian matrix $I_{m}$. We have the following lemma: \begin{lemma}\label{Lemmafinunidist} Suppose that $m=2i-1$ with $i\geq 1$, and let $\overline{\rho}$ be a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$. The following assertions are equvalent: (1) The representation $\overline{\rho}$ is $\sigma$-invariant; (2) The representation $\overline{\rho}$ is $H$-distinguished; (3) The $R$-vector space $\mathrm{Hom}_{H}(\overline{\rho},1)$ has dimension 1. \end{lemma} \begin{proof} When $R$ has characteristic 0, this is \cite{gow1984two}, Theorem 2.1, Theorem 2.4. Suppose now that $R=\overline{\mathbb{F}_{l}}$. First we prove that (1) is equivalent to (2). For $\overline{\rho}$ a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$, we denote by $P_{\overline{\rho}}$ the projective envelope of $\overline{\rho}$ as $\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]$-modules, where $\overline{\mathbb{Z}_{l}}$ is the ring of integer of $\overline{\mathbb{Q}_{l}}$. Using \cite{vigneras1996representations}, Chapitre III, Th\'eor\`eme 2.9 and \cite{serre2012linear}, Proposition 42, we have: (1) $P_{\overline{\rho}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}}$ is the projective envelope of $\overline{\rho}$ as $\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]$-modules, which is indecomposable of finite length, with each irreducible component isomorphic to $\overline{\rho}$; (2) If we write $\widetilde{P_{\overline{\rho}}}=P_{\overline{\rho}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}$ as the $\overline{\mathbb{Q}_{l}}$-lift of $P_{\overline{\rho}}$, then $\widetilde{P_{\overline{\rho}}}\cong\bigoplus\widetilde{\overline{\rho}}$, where $\widetilde{\overline{\rho}}$ in the direct sum are supercuspidal as $\overline{\mathbb{Q}_{l}}$-lifts of $\overline{\rho}$ of multiplicity 1. Using the result above, we have: \begin{align*} \mathrm{Hom}_{H}(\overline{\rho},1)\neq 0; &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\rho},\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})])\neq 0;\\ &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(P_{\overline{\rho}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}},\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})])\neq 0;\\ &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(P_{\overline{\rho}},\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})])\neq 0;\\ &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{P_{\overline{\rho}}},\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})])\neq 0;\\ &\Longleftrightarrow \text{There exists}\ \widetilde{\overline{\rho}}\ \text{as above such that}\ \mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{\overline{\rho}},\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})])\neq 0;\\ &\Longleftrightarrow \text{There exists}\ \widetilde{\overline{\rho}}\ \text{as above such that}\ \widetilde{\overline{\rho}}^{\sigma}=\widetilde{\overline{\rho}};\\ &\Longleftrightarrow \overline{\rho}^{\sigma}=\overline{\rho}. \end{align*} For the former equivalences, they are of the similar reason as in the proof of Theorem \ref{Thmdistgalinv}. For the second last equivalence we use the result for characteristic 0 case. For the last equivalence, we use the construction of supercuspidal representation given by Green and James as in Lemma \ref{Lemmafinsiginv}. Since it is always possible to lift a $\sigma$-invariant regular character over $\overline{\mathbb{F}_{l}}$ to a $\sigma$-invariant regular character over $\overline{\mathbb{Q}_{l}}$, it is always possible to find a $\sigma$-invariant $\overline{\mathbb{Q}_{l}}$-lift $\widetilde{\overline{\rho}}$ for a $\sigma$-invariant supercuspidal representation $\overline{\rho}$. Since (3) implies (2) by definition, we only need to prove (2) implies (3). We sum up the proof occurring in \cite{secherre2018supercuspidal}, Lemma 2.19. We have the following $\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]$-module decomposition: $$\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]=V_{\overline{\rho}}\oplus V',$$ where $V_{\overline{\rho}}$ is composed of irreducible components isomorphic to $\overline{\rho}$, and $V'$ has no irreducible component isomorphic to $\overline{\rho}$. First we verify that $\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}})$ is commutative. By \cite{gow1984two}, Theorem 2.1, the convolution algebra $\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})/H]$ is commutative. Modulo $l$ we get $$\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})/H]\cong\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})])\cong\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}})\oplus\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V')$$ is commutative, thus $\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}})$ is commutative. If we denote $P=P_{\overline{\rho}}$, then there exists a nilpotent endomorphism $N\in\mathrm{End}_{\overline{\mathbb{F}_{l}}}[P]$ such that $\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}[P]=\overline{\mathbb{F}_{l}}[N]$. And there exists $r\geq 1$ and $n_{1},...,n_{r}$ positive integers such that $$V_{\overline{\rho}}\cong\bigoplus_{i=1}^{r}P/N^{n_{i}}P.$$ Since $\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}})$ is commutative, we have $r=1$ and $V_{\overline{\rho}}=P/N^{n_{1}}P$. Thus $$\mathrm{Hom}_{H}(\overline{\rho},1)\cong\mathrm{Hom}_{\mathrm{GL}_{m}(\boldsymbol{l})}(\overline{\rho},V_{\overline{\rho}})=\mathrm{Hom}_{\mathrm{GL}_{m}(\boldsymbol{l})}(\overline{\rho},P/N^{n_{1}}P)\cong\overline{\mathbb{F}_{l}}.$$ Now for $\mathrm{char}(R)=l>0$ in general, there exists an equivalence of categories between representations of $\mathrm{GL}_{m}(\boldsymbol{l})$ over $\overline{\mathbb{F}_{l}}$, and representations of $\mathrm{GL}_{m}(\boldsymbol{l})$ over $R$, which is given by tensor product $\overline{\rho}_{0}\mapsto\overline{\rho}_{0}\otimes_{\overline{\mathbb{F}_{l}}}R$ for $\overline{\rho}_{0}$ as a representation of $\mathrm{GL}_{m}(\boldsymbol{l})$ over $\overline{\mathbb{F}_{l}}$. Thus we may use the former result to finish the proof. \end{proof} \begin{remark} We give an example of a $\sigma$-invariant cuspidal non supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$ which is not distinguished by $H$. Assume $m=2$ and $l\neq 2$ such that $l|Q^{2}+1$. Let $B$ be the subgroup of $\mathrm{GL}_{2}(\boldsymbol{l})$ consisting of upper triangular matrices. For $\mathrm{Ind}_{B}^{\mathrm{GL}_{2}(\boldsymbol{l})}1$, it is a representation of length 3, with each component of dimension $1,Q^{2}-1,1$. Choose $\overline{\rho}$ as the representation of dimension $Q^{2}-1$ as the subquotient. It is thus cuspidal (not supercuspidal) and $\sigma$-invariant. Let $\widetilde{\overline{\rho}}$ be a $\overline{\mathbb{Q}_{l}}$-lift of $\overline{\rho}$ which is an irreducible cuspidal representation. We write $\widetilde{\overline{\rho}}|_{H}=V_{1}\oplus...\oplus V_{r}$ as irreducible components. Since $|H|=Q(Q+1)(Q^{2}-1)$ is prime to $l$, reduction modulo $l$ preserves irreducibility. So $\overline{\rho}|_{H}$ decomposes as $W_{1}\oplus...\oplus W_{r}$, where $W_{i}$ is irreducible which is the reduction of $V_{i}$ modulo $l$ for each $i=1,...,r$. Suppose that $\overline{\rho}$ is distinguished. Then $W_{i}=1$ for some $i$. Thus $V_{i}$ is a character which must be trivial. It implies that $\widetilde{\overline{\rho}}$ is distinguished. It is impossible by Lemma \ref{Lemmafinsiginv} and Lemma \ref{Lemmafinunidist}, since $m=2$ is even. \end{remark} Finally, we need the following finite group version of Proposition \ref{PropGelKa}: \begin{proposition}\label{PropGelKafin} For $\overline{\rho}$ an irreducible representation of $\mathrm{GL}_{m}(\boldsymbol{l})$, we have $\overline{\rho}^{\vee}\cong\overline{\rho}(\,^{t}\cdot^{-1})$, where $\overline{\rho}(\,^{t}\cdot^{-1}):x\mapsto\overline{\rho}(\,^{t}x^{-1})$ for any $x\in\mathrm{GL}_{m}(\boldsymbol{l})$. \end{proposition} \begin{proof} By definition, the Brauer characters of $\overline{\rho}^{\vee}$ and $\overline{\rho}(\,^{t}\cdot^{-1})$ are the same. Thus we finish the proof. \end{proof} \subsection{Distinction criterion in the unramified case} Let $\pi$ be a $\sigma$-invariant supercuspidal representation of $G$. In this subsection we want to prove Theorem \ref{Thmmain} and Theorem \ref{Thmmult1} in the case when $E/E_{0}$ is unramified. Combining with Theorem \ref{Thmdistgalinv}, we only need to show that $\pi$ is distinguished by any unitary subgroup to finish the proof of Theorem \ref{Thmmain}. Since changing $\tau$ up to a $G$-action doesn't change the content of the theorem, we only need to consider two special unitary involutions as representatives of $G$-orbits of hermitian matrices as mentioned in Remark \ref{rempicond}. To insure that, first we prove the following lemma: \begin{lemma}\label{Lemmamodd} For any $\sigma$-invariant supercuspidal representation $\pi$ with $E/E_{0}$ unramified, $m$ is odd. \end{lemma} \begin{proof} We consider $\tau=\tau_{1}$, where $\tau_{1}(x)=\sigma(\,^{t}x^{-1})$ for any $x\in G$. We follow the settings of Remark \ref{rempicond}. For $(\boldsymbol{J},\Lambda)$ a simple type as in condition (2), we may write $\Lambda\cong\boldsymbol{\kappa}\otimes\boldsymbol{\rho}$ as before. Using Proposition \ref{propselfdual}, we may further assume $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}$. Since $\Lambda$ and $\boldsymbol{\kappa}$ are $\tau$-selfdual, we have $\boldsymbol{\rho}$ is $\tau$-selfdual. Let $\overline{\rho}$ be the supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})\cong J/J^{1}$ whose inflation equals to $\boldsymbol{\rho}|_{J}$, then $\overline{\rho}^{\tau\vee}\cong\overline{\rho}$ when regarding $\tau$ as a unitary involution of $\mathrm{GL}_{m}(\boldsymbol{l})$. Using Proposition \ref{PropGelKafin}, we have $\overline{\rho}\circ\sigma\cong\overline{\rho}$. Using Lemma \ref{Lemmafinsiginv}, we get $m$ is odd. \end{proof} With the aid of Lemma \ref{Lemmamodd}, we may assume as in Remark \ref{rempicond}.(4) that $\tau(x)=\varepsilon\sigma(\,^{t}x^{-1})\varepsilon^{-1}$ for any $x\in G$ with $\varepsilon$ equals to $I_{n}$ or $\mathrm{diag}(\varpi_{E},...,\varpi_{E})$, representing the two classes of unitary involutions. For $(\boldsymbol{J},\Lambda)$ a simple type as in condition (2), we may write $\Lambda\cong\boldsymbol{\kappa}\otimes\boldsymbol{\rho}$ as before. Using Proposition \ref{propselfdual}, we may further assume $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}$. Using Lemma \ref{lemkappa} with $g=1$, there exists a quadratic character $\chi:\boldsymbol{J}\cap G^{\tau}\rightarrow R^{\times}$ such that $$\mathrm{dim}_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},\chi^{-1})=1.$$ and $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},\chi^{-1})\otimes_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\rho},\chi).$$ We want to show that $\chi=1$. First we need the following lemma: \begin{lemma}\label{Lemmachiext} The character $\chi$ can be extended to a character $\chi'$ of $\boldsymbol{J}$. \end{lemma} \begin{proof} Using Lemma \ref{LemmaunitaryJJ0}, we have $\boldsymbol{J}\cap G^{\tau}=J\cap G^{\tau}$. Write $\overline{\chi}$ as the character of $\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0})\cong J\cap G^{\tau}/J^{1}\cap G^{\tau}$ whose inflation equals to $\chi$. Since it is well-known that the derived subgroup of $\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0})$ is $\mathrm{SU}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0}):=\{g\in\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0})|\mathrm{det}(g)=1\}$ (see \cite{cameron2000notes}, Theorem 5.4 and Theorem 5.5), we know that there exists $\overline{\phi}$ as a quadratic character of $\mathrm{det}(\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0}))=\{x\in\boldsymbol{l}^{\times}|x\sigma(x)=x^{Q+1}=1\}$, such that $\overline{\chi}=\overline{\phi}\circ\mathrm{det}|_{\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0})}$. We extend $\overline{\phi}$ to a character of $\boldsymbol{l}^{\times}$ and we write $\overline{\chi}'=\overline{\phi}\circ\mathrm{det}$ which is a character of $\mathrm{GL}_{m}(\boldsymbol{l})$ extending $\overline{\chi}$. Write $\chi'^{0}$ as the inflation of $\overline{\chi}'$ as a representation of $J$ with respect to the isomorphism $\mathrm{GL}_{m}(\boldsymbol{l})\cong J/J^{1}$. Finally we choose $\chi'$ as a character of $\boldsymbol{J}$ as an extension of $\chi'^{0}$ by choosing $\chi'(\varpi_{E})\neq 0$ randomly. By construction, $\chi'|_{\boldsymbol{J}\cap G^{\tau}}=\chi$. \end{proof} Now we state and proof the following proposition: \begin{proposition}\label{Propchi=1} (1) When $\mathrm{char}(R)=0$, for any $\chi'$ extends $\chi$ we have $\chi'(\chi'\circ\tau)=1$. (2) Furthermore, for any $R$ we have $\chi=1$. \end{proposition} \begin{proof} First we consider $\mathrm{char}(R)=0$. Since $m$ is odd, Lemma \ref{Lemmafinsiginv} implies that $\mathrm{GL}_{m}(\boldsymbol{l})$ possesses a $\sigma$-invariant supercuspidal representation $\overline{\rho'}$. Using Proposition \ref{PropGelKafin}, we get $\overline{\rho'}^{\tau\vee}\cong\overline{\rho'}$. We denote by $\boldsymbol{\rho}'$ a representation of $\boldsymbol{J}$ trivial on $J^{1}$ such that its restriction to $J$ is the inflation of $\overline{\rho'}$. Since $\sigma(\varpi_{E})=\varpi_{E}$, we have $\boldsymbol{\rho}'(\tau(\varpi_{E}))=\boldsymbol{\rho}'(\varpi_{E})^{-1}$ which means that $\boldsymbol{\rho}'$ is $\tau$-selfdual. By Lemma \ref{Lemmafinunidist}, it is also distinguished. Let $\Lambda'$ denote the $\tau$-selfdual type $\boldsymbol{\kappa}\otimes\boldsymbol{\rho}'$. The natural isomorphism: $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda',\chi^{-1})\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},\chi^{-1})\otimes_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\rho}',1)$$ shows that $\Lambda'$ is $\chi^{-1}$-distinguished. By Lemma \ref{Lemmachiext}, there exists a character $\chi'$ extending $\chi$. The representation $\Lambda''=\Lambda'\chi'$ is thus a distinguished type. Let $\pi''$ be the supercuspidal representation of $G$ compactly induced by $(\boldsymbol{J},\Lambda'')$. It is distinguished, thus $\tau$-selfdual by Theorem \ref{Thmdistgalinv} and Proposition \ref{PropGelKa}. Since $\Lambda''$ and $\Lambda''^{\tau\vee}\cong\Lambda''\chi'^{-1}(\chi'^{-1}\circ\tau)$ are both contained in $\pi''$, it follows that $\chi'(\chi'\circ\tau)$ is trivial. We write $\overline{\chi}=\overline{\phi}\circ\mathrm{det}$ with the same notation as in the proof of Lemma \ref{Lemmachiext}. Since $\chi'(\chi'\circ\tau)=1$, we get $\overline{\phi}(\overline{\phi\circ\sigma})^{-1}=\overline{\phi}^{1-Q}=1$. Choose $\zeta_{\boldsymbol{l}}$ as a primitive root of $\boldsymbol{l}^{\times}$, we know that $\zeta_{\boldsymbol{l}}^{Q-1}$ generates the group $\mathrm{det}(\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0}))=\{x\in\boldsymbol{l}^{\times}|x\sigma(x)=x^{Q+1}=1\}$. Since $\overline{\phi}(\zeta_{\boldsymbol{l}}^{1-Q})=1$, we get $\overline{\phi}|_{\mathrm{det}(\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0}))}$ is trivial, which means that $\overline{\chi}$ is trivial. Thus $\chi$ as the inflation of $\overline{\chi}$ is also trivial. Now we consider $R=\overline{\mathbb{F}_{l}}$. As already mentioned in the proof of Proposition \ref{propchiquad}, if we denote by $\widetilde{\boldsymbol{\kappa}}$ the $\overline{\mathbb{Q}_{l}}$-lift of $\boldsymbol{\kappa}$ and if we denote by $\widetilde{\chi}$ the character defined by Lemma \ref{lemkappa}.(1) with respect to $\widetilde{\boldsymbol{\kappa}}$ and $\widetilde{\eta}$, then we know that $\widetilde{\chi}$ is a $\overline{\mathbb{Q}_{l}}$-lift of $\chi$. By using the characteristic 0 case we already proved, we get $\widetilde{\chi}=1$ which implies that $\chi=1$. When $\mathrm{R}=l>0$ in general, we may just follow the same logic as in Proposition \ref{propchiquad} to finish the proof. \end{proof} \begin{remark} In fact in Proposition \ref{Propchi=1}, we proved that when $m$ is odd and $E/E_{0}$ is unramified, any $\tau$-selfdual $\boldsymbol{\kappa}$ constructed in Proposition \ref{propselfdual} as an extension of a $J^{1}\cap G^{\tau}$-distinguished Heisenberg representation $\eta$ is $\boldsymbol{J}\cap G^{\tau}$-distinguished. \end{remark} Now we come back to the proof of our main theorem. We have: $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},1)\otimes_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\rho},1),$$ where $\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},1)$ is of dimension 1, and $\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\rho},1)\cong\mathrm{Hom}_{\mathrm{U}_{m}(\boldsymbol{l}/\boldsymbol{l}_{0})}(\overline{\rho},1)$ is also of dimension 1 by Lemma \ref{LemmaunitaryJJ0}, Lemma \ref{Lemmafinunidist} and Proposition \ref{PropGelKafin}. So $\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)$ is of dimension 1, which implies that $\pi$ is $G^{\tau}$-distinguished. Thus we finish the proof of Theorem \ref{Thmmain} when $E/E_{0}$ is unramified. Using Corollary \ref{corJGtau} and the fact that $m$ is odd, we get $\mathrm{Hom}_{G^{\tau}}(\pi,1)$ is of dimension 1, which finishes the proof of Theorem \ref{Thmmult1} when $E/E_{0}$ is unramified. \section{The supercuspidal ramified case} In this section, we study the distinction of $\sigma$-invariant supercuspidal representations of $G$ in the case when $E/E_{0}$ is ramified. This finishes the proof of our main theorem. \subsection{The finite field case}\label{subsectionfiniteram} Let $\boldsymbol{l}$ be a finite field with characteristic $p\neq 2$. Let $|\boldsymbol{l}|=Q$. For $m$ a positive integer, we denote by $\mathbf{G}=\mathrm{GL}_{m}/\boldsymbol{l}$ the reductive group $\mathrm{GL}_{m}$ over $\boldsymbol{l}$. Thus by definition, $\mathbf{G}(\boldsymbol{l})=\mathrm{GL}_{m}(\boldsymbol{l})$. For $\overline{\varepsilon}$ a matrix in $\mathbf{G}(\boldsymbol{l})$ such that $\,^{t}\overline{\varepsilon}=\overline{\varepsilon}$, the automorphism defined by $\tau(x)=\overline{\varepsilon}\,^{t}x^{-1}\overline{\varepsilon}^{-1}$ for any $x\in\mathrm{GL}_{m}(\boldsymbol{l})$ gives an involution on $\mathrm{GL}_{m}(\boldsymbol{l})$, which induces an involution on $\mathbf{G}$. Thus $\mathbf{G}^{\tau}$ is the orthogonal group corresponding to $\tau$, which is a reductive group over $\boldsymbol{l}$. Thus $\mathbf{G}^{\tau}(\boldsymbol{l})=\mathrm{GL}_{m}(\boldsymbol{l})^{\tau}$ which is a subgroup of $\mathrm{GL}_{m}(\boldsymbol{l})$. In this subsection, for $\overline{\rho}$ a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$ and $\overline{\chi}$ a character of $\mathrm{GL}_{m}(\boldsymbol{l})^{\tau}$, we state the result mentioned in \cite{hakim2012distinguished} which gives a criterion to judge when $\overline{\rho}$ is distinguished by $\overline{\chi}$. First of all, we assume $R=\overline{\mathbb{Q}_{l}}$. We recall a little bit of Deligne-Lusztig theory (see \cite{deligne1976representations}). Let $\mathbf{T}$ be an elliptic maximal $\boldsymbol{l}$-torus in $\mathbf{G}$, where elliptic means that $\mathbf{T}(\boldsymbol{l})=\boldsymbol{t}^{\times}$ and $\boldsymbol{t}/\boldsymbol{l}$ is the field extension of degree $m$. Let $\xi$ be a regular character of $\mathbf{T}(\boldsymbol{l})$, where regularity means the same as in the construction of Green and James in subsection 7.1. Using \cite{deligne1976representations}, Theorem 8.3, there is a virtual character $R_{\mathbf{T},\xi}$ which is the character of a cuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$. Moreover if we fix $\mathbf{T}$, we know that $\xi\mapsto R_{\mathbf{T},\xi}$ gives a bijection from the set of Galois orbits of regular characters of $\mathbf{T}$ to the set of cuspidal representations of $\mathrm{GL}_{m}(\boldsymbol{l})$. So we may choose $\xi$ such that $\mathrm{Trace}(\overline{\rho})=R_{\mathbf{T},\xi}$. Moreover, using \cite{deligne1976representations}, Theorem 4.2, we get $R_{\mathbf{T},\xi}(-1)=\mathrm{dim}(\overline{\rho})\xi(-1)$ with $\mathrm{dim}(\overline{\rho})=(Q-1)(Q^{2}-1)...(Q^{m-1}-1)$. So if we denote by $\omega_{\overline{\rho}}$ the central character of $\overline{\rho}$, we get $\omega_{\overline{\rho}}(-1)=\xi(-1)$. Under the same settings, we have the following proposition due to Hakim and Lansky (\cite{hakim2012distinguished}, Proposition 6.7): \begin{proposition}\label{Proporthdist} For $\tau$, $\overline{\rho}$, $\boldsymbol{T}$ and $\xi$ as above, we have: $$\mathrm{dim}_{R}(\mathrm{Hom}_{\mathbf{G}^{\tau}(\boldsymbol{l})}(\overline{\rho},\overline{\chi}))= \begin{cases} 1 &\text{if}\ \omega_{\overline{\rho}}(-1)=\xi(-1)=\overline{\chi}(-1),\\ 0&\text{otherwise}. \end{cases}$$ \end{proposition} Now we consider the $l$-modular case. We assume $\mathrm{char}(R)=l>0$. We have the following proposition: \begin{proposition}\label{Proporthdistl} For $\tau$ as above and $\overline{\rho}$ a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$ over $R$, we have $\mathrm{Hom}_{\mathrm{GL}_{m}(\boldsymbol{l})^{\tau}}(\overline{\rho},\overline{\chi})\neq 0$ if and only if $\omega_{\overline{\rho}}(-1)=\overline{\chi}(-1)$. Moreover if the condition is satisfied, then we have $\mathrm{dim}_{R}(\mathrm{Hom}_{\mathrm{GL}_{m}(\boldsymbol{l})^{\tau}}(\overline{\rho},\overline{\chi}))=1.$ \end{proposition} \begin{proof} First we assume $R=\overline{\mathbb{F}_{l}}$. We use the similar proof as which in Lemma \ref{Lemmafinunidist}. Let $H=\mathrm{GL}_{m}(\boldsymbol{l})^{\tau}$ with other notations unchanged. We choose $\widetilde{\overline{\chi}}$ as a character of $H$ which lifts $\overline{\chi}$ as a character over $\overline{\mathbb{Z}_{l}}$, or its extension over $\overline{\mathbb{Q}_{l}}$ by abuse of notation. For $S=\overline{\mathbb{Z}_{l}}, \overline{\mathbb{Q}_{l}}$, we define $$S[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}:=\{f|f:\mathrm{GL}_{m}(\boldsymbol{l})\rightarrow S,\ f(hg)=\widetilde{\overline{\chi}}(h)f(g)\ \text{for any}\ h\in H, g\in \mathrm{GL}_{m}(\boldsymbol{l})\}.$$ Especially we have $$\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}=\mathrm{Ind}^{\mathrm{GL}_{m}(\boldsymbol{l})}_{H}\widetilde{\overline{\chi}}$$ as representations of $\mathrm{GL}_{m}(\boldsymbol{l})$ over $\overline{\mathbb{Q}_{l}}$, and we have $\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}$ as a free $\overline{\mathbb{Z}_{l}}$-module. If we further define $$\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}}=\mathrm{Ind}^{\mathrm{GL}_{m}(\boldsymbol{l})}_{H}\overline{\chi},$$ then we have $$\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}}=\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}}$$ and $$\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}=\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}.$$ We have: \begin{align*} \mathrm{Hom}_{H}(\overline{\rho},\overline{\chi})\neq 0; &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\rho},\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}})\neq 0;\\ &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(P_{\overline{\rho}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{F}_{l}},\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}})\neq 0;\\ &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(P_{\overline{\rho}},\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}})\neq 0;\\ &\Longleftrightarrow \mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{P_{\overline{\rho}}},\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}})\neq 0;\\ &\Longleftrightarrow \text{There exists}\ \widetilde{\overline{\rho}}\ \text{lifting}\ \overline{\rho}\ \text{such that}\ \mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{\overline{\rho}},\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}})\neq 0;\\ &\Longleftrightarrow \text{There exists}\ \widetilde{\overline{\rho}}\ \text{lifting}\ \overline{\rho}\ \text{such that}\ \omega_{\widetilde{\overline{\rho}}}(-1)=\widetilde{\overline{\chi}}(-1);\\ &\Longleftrightarrow \omega_{\overline{\rho}}(-1)=\overline{\chi}(-1). \end{align*} where the former equivalences are of the same reason as in the proof of Lemma \ref{Lemmafinunidist}, and we use Proposition \ref{Proporthdist} for the second last equivalence. For the last equivalence, the "$\Rightarrow$" direction is trivial. For the other direction, when $l\neq 2$, we choose $\widetilde{\overline{\rho}}$ to be any supercuspidal $\overline{\mathbb{Q}_{l}}$-lift of $\overline{\rho}$, thus we have $\omega_{\widetilde{\overline{\rho}}}(-1)=\omega_{\overline{\rho}}(-1)=\overline{\chi}(-1)=\widetilde{\overline{\chi}}(-1);$ when $l=2$, using the construction of Green and James, for $\xi$ a regular character over $\overline{\mathbb{F}_{l}}$ corresponding to $\overline{\rho}$, we may always find a $\overline{\mathbb{Q}_{l}}$-lift $\widetilde{\xi}$ which is regular and satisfies $\widetilde{\xi}(-1)=\widetilde{\overline{\chi}}(-1)$. Thus the supercuspidal representation $\widetilde{\overline{\rho}}$ corresponding to $\widetilde{\xi}$ as a lift of $\overline{\rho}$ satisfies $\omega_{\widetilde{\overline{\rho}}}(-1)=\widetilde{\overline{\chi}}(-1)$. So we finish the proof of the first part. To calculate the dimension, as in the proof of Lemma \ref{Lemmafinunidist} if we write $$\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}}=V_{\overline{\rho}}\oplus V',$$ where $V_{\overline{\rho}}$ is composed of irreducible components isomorphic to $\overline{\rho}$, and $V'$ has no irreducible component isomorphic to $\overline{\rho}$, then we only need to show that $\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}})$ is commutative. We consider the following $\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]$-module decomposition: $$\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}=\widetilde{V_{\overline{\rho}}}\oplus \widetilde{V'}$$ where $\widetilde{V_{\overline{\rho}}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}=\bigoplus_{\widetilde{\overline{\rho}}}\widetilde{\overline{\rho}}$ with the direct sum ranges over all the irreducible representations $\widetilde{\overline{\rho}}$ over $\overline{\mathbb{Q}_{l}}$ occurring in $\widetilde{P_{\overline{\rho}}}$ counting the multiplicity, and $\widetilde{V'}$ denotes a $\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]$-complement of $\widetilde{V_{\overline{\rho}}}$, such that $\widetilde{V'}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}$ contains no irreducible component of $\widetilde{\overline{\rho}}$. Using Proposition \ref{Proporthdist}, we know that $\widetilde{V_{\overline{\rho}}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}$ is multiplicity free, which means that $\mathrm{End}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{V_{\overline{\rho}}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}})$ is commutative. Since the canonical embedding from $\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}$ to $\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}$ induces the following ring monomorphism: $$\mathrm{End}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}})\hookrightarrow\mathrm{End}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\mathbb{Q}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}}),$$ given by tensoring $\overline{\mathbb{Q}_{l}}$, which leads to the ring monomorphism: $$\mathrm{End}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{V_{\overline{\rho}}})\hookrightarrow\mathrm{End}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{V_{\overline{\rho}}}\otimes_{\overline{\mathbb{Z}_{l}}}\overline{\mathbb{Q}_{l}}),$$ thus $\mathrm{End}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{V_{\overline{\rho}}})$ is also commutative. The modulo $l$ map from $\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}}$ to $\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}}$ induces the following ring epimorphism: $$\mathrm{End}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\mathbb{Z}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\widetilde{\overline{\chi}}})\twoheadrightarrow\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\mathbb{F}_{l}}[H\backslash\mathrm{GL}_{m}(\boldsymbol{l})]_{\overline{\chi}}),$$ which leads to the ring epimorphism $$\mathrm{End}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{V_{\overline{\rho}}})\twoheadrightarrow\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}}).$$ Since $\mathrm{End}_{\overline{\mathbb{Z}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{V_{\overline{\rho}}})$ is commutative, we know that $\mathrm{End}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(V_{\overline{\rho}})$ is also commutative. Thus we may use the same proof as in Lemma \ref{Lemmafinunidist} to show that $$\mathrm{dim}_{\overline{\mathbb{F}_{l}}}(\mathrm{Hom}_{\mathrm{GL}_{m}(\boldsymbol{l})^{\tau}}(\overline{\rho},\overline{\chi}))=1.$$ Finally for $\mathrm{char}(R)=l>0$ in general, we follow the corresponding proof in Lemma \ref{Lemmafinunidist}. \end{proof} \begin{remark} For $\mathbf{G}^{\tau}(\boldsymbol{l})$ as an orthogonal subgroup with $m\geq 2$, it is well-known that its derived group is always a subgroup of $\mathbf{G}^{\tau0}(\boldsymbol{l})$ of index 2 (see \cite{cameron2000notes}, Proposition 6.5) , which means that there exists a character of $\mathbf{G}^{\tau}(\boldsymbol{l})$ which isn't trivial on $\mathbf{G}^{\tau0}(\boldsymbol{l})$. It means that we cannot expect $\overline{\chi}$ to be trivial on $\mathbf{G}^{\tau0}(\boldsymbol{l})$ in general. However, for those $\overline{\chi}$ occurring in the next subsection, it is highly possible that $\overline{\chi}$ is trivial on $\mathbf{G}^{\tau0}(\boldsymbol{l})$. For example, \cite{hakim2012distinguished}, Proposition 6.4 gives an evidence in the case when $\pi$ is tame supercuspidal. However, I don't know how to prove it. \end{remark} Now we assume that $m$ is even. We denote $J_{m/2}=\bigg(\begin{matrix}0 & I_{m/2} \\ -I_{m/2} & 0\end{matrix}\bigg)$ and we denote by $$\mathrm{Sp}_{m}(\boldsymbol{l})=\{x\in\mathrm{GL}_{m}(\boldsymbol{l})|\,^{t}xJ_{m/2}x=J_{m/2}\}$$ the symplectic subgroup of $\mathrm{GL}_{m}(\boldsymbol{l})$. We prove the following result: \begin{proposition}\label{Propsympdisc} For $\overline{\rho}$ a supercuspidal representation of $\mathrm{GL}_{m}(\boldsymbol{l})$, we have $\mathrm{Hom}_{\mathrm{Sp}_{m}(\boldsymbol{l})}(\overline{\rho},1)=0$. \end{proposition} \begin{proof} When $\mathrm{char}(R)=0$, it is well-known (see for example \cite{hakim1998supercuspidal}, Lemma 6). When $R=\overline{\mathbb{F}_{l}}$, using the similar proof as which in Lemma \ref{Lemmafinunidist} and Proposition \ref{Proporthdistl}, we have: $$\mathrm{Hom}_{\overline{\mathbb{F}_{l}}[\mathrm{Sp}_{m}(\boldsymbol{l})]}(\overline{\rho},1)\cong\mathrm{Hom}_{\overline{\mathbb{F}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\overline{\rho},\mathrm{Ind}_{\mathrm{Sp}_{m}(\boldsymbol{l})}^{\mathrm{GL}_{m}(\boldsymbol{l})}1)=0$$ if and only if for all $\overline{\mathbb{Q}_{l}}$-lifts $\widetilde{\overline{\rho}}$ of $\overline{\rho}$, we have $$\mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[\mathrm{Sp}_{m}(\boldsymbol{l})]}(\widetilde{\overline{\rho}},1)\cong\mathrm{Hom}_{\overline{\mathbb{Q}_{l}}[\mathrm{GL}_{m}(\boldsymbol{l})]}(\widetilde{\overline{\rho}},\mathrm{Ind}_{\mathrm{Sp}_{m}(\boldsymbol{l})}^{\mathrm{GL}_{m}(\boldsymbol{l})}1)=0.$$ Thus by using the characteristic 0 case we finish the proof. When $\mathrm{char}(R)=l>0$ in general, we follow the corresponding proof in Lemma \ref{Lemmafinunidist}. \end{proof} \subsection{Distinction criterion in the ramified case} Still let $\pi$ be a $\sigma$-invariant supercuspidal representation of $G$. In this subsection we want to prove Theorem \ref{Thmmain} and Theorem \ref{Thmmult1} in the case when $E/E_{0}$ is ramified. Using Theorem \ref{Thmdistgalinv}, we only need to show that $\pi$ is distinguished by any unitary subgroup to finish the proof of Theorem \ref{Thmmain}. We may choose $\tau$ up to a $G$-action. Thus using Remark \ref{rempicond}.(4), we may assume $\tau(x)=\varepsilon\sigma(\,^{t}x^{-1})\varepsilon^{-1}$ for any $x\in G$, where $\varepsilon$ equals to $I_{n}$ or $\mathrm{diag}(I_{d},...,I_{d},\epsilon)$ with $\epsilon\in \mathfrak{o}_{E_{0}}^{\times}\backslash\mathrm{N}_{E/E_{0}}(\mathfrak{o}_{E}^{\times})$, representing the two classes of unitary involutions. We denote by $\overline{\varepsilon}$ the image of $\varepsilon$ in $\mathrm{GL}_{m}(\boldsymbol{l})$. For $(\boldsymbol{J},\Lambda)$ a simple type as in condition (3), we write $\Lambda\cong\boldsymbol{\kappa}\otimes\boldsymbol{\rho}$. Using Proposition \ref{propselfdual}, we may further assume $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}$. Using Lemma \ref{lemkappa} with $g=1$, there exists a quadratic character $\chi:\boldsymbol{J}\cap G^{\tau}\rightarrow R^{\times}$ such that \begin{equation}\label{eqkappa1} \mathrm{dim}_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},\chi^{-1})=1. \end{equation} and \begin{equation}\label{eqlamkaprho} \mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\kappa},\chi^{-1})\otimes_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\rho},\chi). \end{equation} If we denote by $\omega_{\boldsymbol{\kappa}}$ the central character of $\boldsymbol{\kappa}$ defined on $F^{\times}$. Using (\ref{eqkappa1}), we get $\omega_{\boldsymbol{\kappa}}=\chi^{-1}$ as characters of $F^{\times}\cap(\boldsymbol{J}\cap G^{\tau})$. In particular, $\omega_{\boldsymbol{\kappa}}(-1)=\chi^{-1}(-1)$. Since $\boldsymbol{\kappa}^{\tau\vee}\cong\boldsymbol{\kappa}$, we get $\omega_{\boldsymbol{\kappa}}\circ\tau=\omega_{\boldsymbol{\kappa}}^{-1}$. In particular, $$\omega_{\boldsymbol{\kappa}}(\varpi_{F})^{-1}=\omega_{\boldsymbol{\kappa}}(\tau(\varpi_{F}))=\omega_{\boldsymbol{\kappa}}(\varpi_{F})^{-1}\omega_{\boldsymbol{\kappa}}(-1)^{-1},$$ where we use the fact that $\sigma(\varpi_{F})=-\varpi_{F}$. Thus we get $\omega_{\boldsymbol{\kappa}}(-1)=\chi(-1)=1$. Since $\Lambda$ and $\boldsymbol{\kappa}$ are $\tau$-selfdual, we know that $\boldsymbol{\rho}$ is $\tau$-selfdual. Using the same proof as for $\boldsymbol{\kappa}$, we get $\omega_{\boldsymbol{\rho}}(-1)=1$. Let $\overline{\rho}$ be the supercuspidal representation of $\mathrm{GL_{m}}(\boldsymbol{l})\cong J/J^{1}$ whose inflation equals to $\boldsymbol{\rho}|_{J}$ and let $\overline{\chi}$ be the character of $$\mathbf{G}^{\tau}(\boldsymbol{l})\cong J\cap G^{\tau}/J^{1}\cap G^{\tau}$$ whose inflation equals to $\chi$, where $\tau$ naturally induces an orthogonal involution on $\mathbf{G}$ with respect to $\overline{\varepsilon}$ with the notation as in subsection \ref{subsectionfiniteram}. By definition and Lemma \ref{LemmaunitaryJJ0} we get $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\boldsymbol{\rho},\chi)\cong\mathrm{Hom}_{\mathbf{G}^{\tau}(\boldsymbol{l})}(\overline{\rho},\overline{\chi}).$$ Since $\omega_{\overline{\rho}}(-1)=\overline{\chi}(-1)=1$, using Proposition \ref{Proporthdist} and Proposition \ref{Proporthdistl}, we know that the space above is non-zero. Thus by (\ref{eqlamkaprho}) we have $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)\neq 0$$ which means that $\pi$ is distinguished by $G^{\tau}$, which finishes the proof of Theorem \ref{Thmmain}. Moreover using Proposition \ref{Proporthdist}, Proposition \ref{Proporthdistl}, (\ref{eqkappa1}) and (\ref{eqlamkaprho}), we get $$\mathrm{dim}_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)=1.$$ Now if $m$ is even and $\varepsilon=I_{m}$, we also need to study the space $\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\Lambda^{g_{1}},1)$, where $g_{1}$ is defined in Corollary \ref{corJGtau} such that $\tau(g_{1})g_{1}^{-1}=\varpi_{E}J_{m/2}\in B^{\times}$. By using Lemma \ref{lemkappa}, there exists a quadratic character $\chi_{1}:\boldsymbol{J}^{g_{1}}\cap G^{\tau}\rightarrow R^{\times}$ such that \begin{equation}\label{eqkappag1} \mathrm{dim}_{R}\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\boldsymbol{\kappa}^{g_{1}},\chi_{1}^{-1})=1. \end{equation} and \begin{equation}\label{eqlamkaprhog1} \mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\Lambda^{g_{1}},1)\cong\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\boldsymbol{\kappa}^{g_{1}},\chi_{1}^{-1})\otimes_{R}\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\boldsymbol{\rho}^{g_{1}},\chi_{1}). \end{equation} So we only need to calculate the space $\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\boldsymbol{\rho}^{g_{1}},\chi_{1})\cong\mathrm{Hom}_{\boldsymbol{J}\cap G^{\delta_{g_{1}}}}(\boldsymbol{\rho},\chi_{1}^{g_{1}^{-1}})$, where $$\delta_{g_{1}}(x):=(\tau(g_{1})g_{1}^{-1})^{-1}\tau(x)(\tau(g_{1})g_{1}^{-1})=(\varpi_{E}J_{m/2})^{-1}\tau(x)\varpi_{E}J_{m/2}$$ for any $x\in G$ as an involution on $G$. Let $\overline{\rho}$ be the supercuspidal representation of $\mathrm{GL_{m}}(\boldsymbol{l})\cong J/J^{1}$ whose inflation equals to $\boldsymbol{\rho}|_{J}$ and let $\overline{\chi_{1}^{g_{1}^{-1}}}$ be the character of $$\mathrm{Sp}_{m}(\boldsymbol{l})\cong J\cap G^{\delta_{g_{1}}}/J^{1}\cap G^{\delta_{g_{1}}}$$ whose inflation equals to $\chi_{1}^{g_{1}^{-1}}$, then we get $$\mathrm{Hom}_{\boldsymbol{J}\cap G^{\delta_{g_{1}}}}(\boldsymbol{\rho},\chi_{1}^{g_{1}^{-1}})\cong\mathrm{Hom}_{\mathrm{Sp}_{m}(\boldsymbol{l})}(\overline{\rho},\overline{\chi_{1}^{g_{1}^{-1}}})=\mathrm{Hom}_{\mathrm{Sp}_{m}(\boldsymbol{l})}(\overline{\rho},1),$$ where the last equation is because the well-known fact that $\mathrm{Sp}_{m}(\boldsymbol{l})$ equals to its derived group (\cite{cameron2000notes}, Lemma 4.8), thus $\overline{\chi_{1}^{g_{1}^{-1}}}|_{\mathrm{Sp}_{m}(\boldsymbol{l})}$ is trivial. Using Proposition \ref{Propsympdisc}, we get $\mathrm{Hom}_{\mathrm{Sp}_{m}(\boldsymbol{l})}(\overline{\rho},1)=0$. Thus $\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\Lambda^{g_{1}},1)=0$. Using Corollary \ref{corJGtau}, we get $$\mathrm{dim}_{R}\mathrm{Hom}_{G^{\tau}}(\pi,1)=\mathrm{dim}_{R}\mathrm{Hom}_{\boldsymbol{J}\cap G^{\tau}}(\Lambda,1)+\mathrm{dim}_{R}\mathrm{Hom}_{\boldsymbol{J}^{g_{1}}\cap G^{\tau}}(\Lambda^{g_{1}},1)=1,$$ which finishes the proof of Theorem \ref{Thmmult1} when $E/E_{0}$ is ramified. \begin{remark} From the proof as above, we may find out that when $E/E_{0}$ is ramified, for the two $\tau$-selfdual simple types mentioned as in Corollary \ref{corJGtau}, it is always the simple type $(\boldsymbol{J},\Lambda)$ which contributes to the distinction, and $(\boldsymbol{J}^{g_{1}},\Lambda^{g_{1}})$ never contributes to the distinction. \end{remark} \subsection{Proof of Theorem \ref{Thmlift}} We end this paper by finishing the proof of Theorem \ref{Thmlift}. Let $\pi$ be a $\sigma$-invariant supercuspidal representation of $G$ over $\overline{\mathbb{F}_{l}}$. For $\tau$ a unitary involution, by Theorem \ref{Thmmain}, $\pi$ is distinguished by $G^{\tau}$. From the proof of Theorem \ref{Thmdistgalinv}, there exists $\widetilde{\pi}$ as a $\sigma$-invariant supercuspidal representation of $G$ over $\overline{\mathbb{Q}_{l}}$ which is distinguished by $G^{\tau}$, such that $r_{l}(\widetilde{\pi})=\pi$, which finishes the proof. \newcommand{\etalchar}[1]{$^{#1}$}
\section{Introduction} \label{introduction} Emotions are ``generated states in humans that reflect evaluative judgments of the environment, the self and other social agents" \cite{hudlicka2011guidelines}. Messages in human communications inherently convey emotions. With the prevalence of social media platforms such as Facebook Messenger, as well as conversational agents such as Amazon Alexa, there is an emerging need for machines to understand human emotions in natural conversations. This work addresses the task of detecting emotions (e.g., happy, sad, angry, etc.) in textual conversations, where the emotion of an utterance is detected in the conversational context. Being able to effectively detect emotions in conversations leads to a wide range of applications ranging from opinion mining in social media platforms \cite{chatterjee2019understanding} to building emotion-aware conversational agents \cite{zhou2018emotional}. However, enabling machines to analyze emotions in human conversations is challenging, partly because humans often rely on the context and commonsense knowledge to express emotions, which is difficult to be captured by machines. Figure \ref{fig: example} shows an example conversation demonstrating the importance of context and commonsense knowledge in understanding conversations and detecting implicit emotions. \begin{figure}[!t] \centering \includegraphics[scale=0.25]{images/Example.pdf} \caption{An example conversation with annotated labels from the DailyDialog dataset \cite{li2017dailydialog}. By referring to the context, ``it" in the third utterance is linked to ``birthday" in the first utterance. By leveraging an external knowledge base, the meaning of ``friends" in the forth utterance is enriched by associated knowledge entities, namely ``socialize", ``party", and ``movie". Thus, the implicit ``happiness" emotion in the fourth utterance can be inferred more easily via its enriched meaning.} \label{fig: example} \end{figure} There are several recent studies that model contextual information to detect emotions in conversations. \citet{poria2017context} and \citet{majumder2018dialoguernn} leveraged recurrent neural networks (RNN) to model the contextual utterances in sequence, where each utterance is represented by a feature vector extracted by convolutional neural networks (CNN) at an earlier stage. Similarly, \citet{hazarika2018icon, hazarika2018conversational} proposed to use extracted CNN features in memory networks to model contextual utterances. However, these methods require separate feature extraction and tuning, which may not be ideal for real-time applications. In addition, to the best of our knowledge, no attempts have been made in the literature to incorporate commonsense knowledge from external knowledge bases to detect emotions in textual conversations. Commonsense knowledge is fundamental to understanding conversations and generating appropriate responses \cite{zhou2018commonsense}. To this end, we propose a Knowledge-Enriched Transformer (KET) to effectively incorporate contextual information and external knowledge bases to address the aforementioned challenges. The Transformer \cite{vaswani2017attention} has been shown to be a powerful representation learning model in many NLP tasks such as machine translation \cite{vaswani2017attention} and language understanding \cite{devlin2018bert}. The self-attention \cite{cheng2016long} and cross-attention \cite{bahdanau2014neural} modules in the Transformer capture the intra-sentence and inter-sentence correlations, respectively. The shorter path of information flow in these two modules compared to gated RNNs and CNNs allows KET to model contextual information more efficiently. In addition, we propose a hierarchical self-attention mechanism allowing KET to model the hierarchical structure of conversations. Our model separates context and response into the encoder and decoder, respectively, which is different from other Transformer-based models, e.g., BERT \cite{devlin2018bert}, which directly concatenate context and response, and then train language models using only the encoder part. Moreover, to exploit commonsense knowledge, we leverage external knowledge bases to facilitate the understanding of each word in the utterances by referring to related knowledge entities. The referring process is dynamic and balances between relatedness and affectiveness of the retrieved knowledge entities using a context-aware affective graph attention mechanism. In summary, our contributions are as follows: \begin{itemize} \item For the first time, we apply the Transformer to analyze conversations and detect emotions. Our hierarchical self-attention and cross-attention modules allow our model to exploit contextual information more efficiently than existing gated RNNs and CNNs. \item We derive dynamic, context-aware, and emotion-related commonsense knowledge from external knowledge bases and emotion lexicons to facilitate the emotion detection in conversations. \item We conduct extensive experiments demonstrating that both contextual information and commonsense knowledge are beneficial to the emotion detection performance. In addition, our proposed KET model outperforms the state-of-the-art models on most of the tested datasets across different domains. \end{itemize} \section{Related Work} \label{related work} \noindent\textbf{Emotion Detection in Conversations:} Early studies on emotion detection in conversations focus on call center dialogs using lexicon-based methods and audio features \cite{lee2005toward, devillers2006real}. \citet{devillers2002annotation} annotated and detected emotions in call center dialogs using unigram topic modelling. In recent years, there is an emerging research trend on emotion detection in conversational videos and multi-turn Tweets using deep learning methods \cite{hazarika2018conversational, hazarika2018icon, zahiri2018emotion, chatterjee2019understanding, zhong2019ntuer, poria2019emotion}. \citet{poria2017context} proposed a long short-term memory network (LSTM) \cite{hochreiter1997long} based model to capture contextual information for sentiment analysis in user-generated videos. \citet{majumder2018dialoguernn} proposed the DialogueRNN model that uses three gated recurrent units (GRU) \cite{cho2014learning} to model the speaker, the context from the preceding utterances, and the emotions of the preceding utterances, respectively. They achieved the state-of-the-art performance on several conversational video datasets. \noindent\textbf{Knowledge Base in Conversations:} Recently there is a growing number of studies on incorporating knowledge base in generative conversation systems, such as open-domain dialogue systems \cite{han2015exploiting, asghar2018affective, ghazvininejad2018knowledge, young2018augmenting, parthasarathi2018extending, liu2018knowledge, moghe2018towards, dinan2018wizard, zhong2019affect}, task-oriented dialogue systems \cite{madotto2018mem2seq, wu2018globaltolocal, he2019hierarchical} and question answering systems \cite{kiddon2016globally, hao2017end, sun2018open, mihaylov2018knowledgeable}. \citet{zhou2018commonsense} adopted structured knowledge graphs to enrich the interpretation of input sentences and help generate knowledge-aware responses using graph attentions. The graph attention in the knowledge interpreter \cite{zhou2018commonsense} is static and only related to the recognized entity of interest. By contrast, our graph attention mechanism is dynamic and selects context-aware knowledge entities that balances between relatedness and affectiveness. \noindent\textbf{Emotion Detection in Text:} There is a trend moving from traditional machine learning methods \cite{pang2002thumbs, wang2012baselines, seyeditabari2018emotion} to deep learning methods \cite{abdul2017emonet, zhang2018text} for emotion detection in text. \citet{khanpour2018fine} investigated the emotion detection from health-related posts in online health communities using both deep learning features and lexicon-based features. \noindent\textbf{Incorporating Knowledge in Sentiment Analysis:} Traditional lexicon-based methods detect emotions or sentiments from a piece of text based on the emotions or sentiments of words or phrases that compose it \cite{hu2009lyric, taboada2011lexicon, bandhakavi2017lexicon}. Few studies investigated the usage of knowledge bases in deep learning methods. \citet{kumar2018knowledge} proposed to use knowledge from WordNet \cite{fellbaum2012wordnet} to enrich the text representations produced by LSTM and obtained improved performance. \noindent\textbf{Transformer:} The Transformer has been applied to many NLP tasks due to its rich representation and fast computation, e.g., document machine translation \cite{zhang2018improving}, response matching in dialogue system \cite{zhou2018multi}, language modelling \cite{dai2019transformer} and understanding \cite{radford2018improving}. A very recent work \cite{koncel2019text} extends the Transformer to graph inputs and propose a model for graph-to-text generation. \begin{figure*}[!t] \centering \includegraphics[scale=0.55]{images/Architecture.pdf} \caption{Overall architecture of our proposed KET model. The positional encoding, residual connection, and layer normalization are omitted in the illustration for brevity.} \label{fig: architecture} \end{figure*} \section{Our Proposed KET Model} \label{our model} In this section we present the task definition and our proposed KET model. \subsection{Task Definition} \label{sec: task definition} Let $\{X^i_j, Y^i_j\}, i=1,...N, j=1,...N_i$ be a collection of \{\textit{utterance}, \textit{label}\} pairs in a given dialogue dataset, where $N$ denotes the number of conversations and $N_i$ denotes the number of utterances in the $i$th conversation. The objective of the task is to maximize the following function: \begin{equation} \label{eqn: objective} \Phi = \prod_{i=1}^N\prod_{j=1}^{N_i} p(Y^i_j|X^i_j, X^i_{j-1}, ..., X^i_1; \theta), \end{equation} where $X^i_{j-1}, ..., X^i_1$ denote contextual utterances and $\theta$ denotes the model parameters we want to optimize. We limit the number of contextual utterances to $M$. Discarding early contextual utterances may cause information loss, but this loss is negligible because they only contribute the least amount of information \cite{su2018time}. This phenomenon can be further observed in our model analysis regarding context length (see Section \ref{sec: model analysis}). Similar to \cite{poria2017context}, we clip and pad each utterance $X^i_j$ to a fixed $m$ number of tokens. The overall architecture of our KET model is illustrated in Figure \ref{fig: architecture}. \subsection{Knowledge Retrieval} \label{sec: knowledge retrieval} We use a commonsense knowledge base ConceptNet \cite{speer2017conceptnet} and an emotion lexicon NRC\_VAD \cite{mohammad2018obtaining} as knowledge sources in our model. ConceptNet is a large-scale multilingual semantic graph that describes general human knowledge in natural language. The nodes in ConceptNet are concepts and the edges are relations. Each $\langle$\textit{concept1}, \textit{relation}, \textit{concept2}$\rangle$ triplet is an assertion. Each assertion is associated with a confidence score. An example assertion is $\langle$\textit{friends}, \textit{CausesDesire}, \textit{socialize}$\rangle$ with confidence score of 3.46. Usually assertion confidence scores are in the $[1, 10]$ interval. Currently, for English, ConceptNet comprises 5.9M assertions, 3.1M concepts and 38 relations. NRC\_VAD is a list of English words and their VAD scores, i.e., valence (negative-positive), arousal (calm-excited), and dominance (submissive-dominant) scores in the $[0, 1]$ interval. The VAD measure of emotion is culture-independent and widely adopted in Psychology \cite{mehrabian1996pleasure}. Currently NRC\_VAD comprises around 20K words. In general, for each non-stopword token $t$ in $X^i_j$, we retrieve a connected knowledge graph $g(t)$ comprising its immediate neighbors from ConceptNet. For each $g(t)$, we remove concepts that are stopwords or not in our vocabulary. We further remove concepts with confidence scores less than 1 to reduce annotation noises. For each concept, we retrieve its VAD values from NRC\_VAD. The final knowledge representation for each token $t$ is a list of tuples: $(c_1, s_1, \textit{VAD}(c_1))$, $(c_2, s_2, \textit{VAD}(c_2))$, ..., $(c_{|g(t)|}, s_{|g(t)|}, \textit{VAD}(c_{|g(t)|}))$, where $c_k \in g(t)$ denotes the $k$th connected concept, $s_k$ denotes the associated confidence score, and $\textit{VAD}(c_k)$ denotes the VAD values of $c_k$. The treatment for tokens that are not associated with any concept and concepts that are not included in NRC\_VAD are discussed in Section \ref{sec: dynamic context-aware affective graph attention}. We leave the treatment on relations as future work. \subsection{Embedding Layer} \label{sec: embedding} We use a word embedding layer to convert each token $t$ in $X^i$ into a vector representation $\textbf{t} \in \mathbb{R}^{d}$, where $d$ denotes the size of word embedding. To encode positional information, the position encoding \cite{vaswani2017attention} is added as follows: \begin{equation} \label{eqn: embed} \textbf{t} = \textit{Embed}(t) + \textit{Pos}(t). \end{equation} Similarly, we use a concept embedding layer to convert each concept $c$ into a vector representation $\textbf{c} \in \mathbb{R}^{d}$ but without position encoding. \subsection{Dynamic Context-Aware Affective Graph Attention} \label{sec: dynamic context-aware affective graph attention} To enrich word embedding with concept representations, we propose a dynamic context-aware affective graph attention mechanism to compute the concept representation for each token. Specifically, the concept representation $\mathbf{c}(t) \in \mathbb{R}^d$ for token $t$ is computed as \begin{equation} \label{eqn: concept representation} \textbf{c}(t) = \sum_{k=1}^{|g(t)|}\alpha_k*\mathbf{c_k}, \end{equation} where $\mathbf{c_k} \in \mathbb{R}^d$ denotes the concept embedding of $c_k$ and $\alpha_k$ denotes its attention weight. If $|g(t)|=0$, we set \textbf{c}(t) to the average of all concept embeddings. The attention $\alpha_k$ in Equation \ref{eqn: concept representation} is computed as \begin{equation} \alpha_k = \textit{softmax}(w_k), \end{equation} where $w_k$ denotes the weight of $c_k$. The derivation of $w_k$ is crucial because it regulates the contribution of $\mathbf{c}_k$ towards enriching $\mathbf{t}$. A standard graph attention mechanism \cite{veličković2018graph} computes $w_k$ by feeding $\mathbf{t}$ and $\mathbf{c}_k$ into a single-layer feedforward neural network. However, not all related concepts are equal in detecting emotions given the conversational context. In our model, we make the assumption that important concepts are those that relate to the conversational context and have strong emotion intensity. To this end, we propose a context-aware affective graph attention mechanism by incorporating two factors when computing $w_k$, namely relatedness and affectiveness. \noindent\textbf{Relatedness:} Relatedness measures the strength of the relation between $c_k$ and the conversational context. The relatedness factor in $w_k$ is computed as \begin{equation} \textit{rel}_k = \textit{min-max}(s_k) * \textit{abs}(\cos(\mathbf{CR}(X^i), \mathbf{c_k})), \end{equation} where $s_k$ is the confidence score introduced in Section \ref{sec: knowledge retrieval}, $\textit{min-max}$ denotes min-max scaling for each token $t$, \textit{abs} denotes the absolute function, $\cos$ denotes the cosine similarity function, and $\mathbf{CR}(X^i) \in \mathbb{R}^d$ denotes the context representation of the $i$th conversation $X^i$. Here we compute $\mathbf{CR}(X^i)$ as the average of all sentence representations in $X^i$ as follows: \begin{equation} \mathbf{CR}(X^i) = \textit{avg}(\mathbf{SR}(X^i_{j-M}), ..., \mathbf{SR}(X^i_{j})), \end{equation} where $\mathbf{SR}(X^i_{j}) \in \mathbb{R}^d$ denotes the sentence representation of $X^i_j$. We compute $\mathbf{SR}(X^i_{j})$ via hierarchical pooling \cite{shen2018baseline} where $n$-gram ($n\leq 3$) representations in $X^i_j$ are first computed by max-pooling and then all $n$-gram representations are averaged. The hierarchical pooling mechanism preserves word order information to certain degree and has demonstrated superior performance than average pooling or max-pooling on sentiment analysis tasks \cite{shen2018baseline}. \noindent\textbf{Affectiveness:} Affectiveness measures the emotion intensity of $c_k$. The affectiveness factor in $w_k$ is computed as \begin{equation} \textit{aff}_k = \textit{min-max}(||[\textit{V}(c_k)-1/2, \textit{A}(c_k)/2]||_2), \end{equation} where $||.||_k$ denotes $l_k$ norm, $\textit{V}(c_k) \in [0,1]$ and $\textit{A}(c_k) \in [0,1]$ denote the valence and arousal values of $\textit{VAD}(c_k)$, respectively. Intuitively, $\textit{aff}_k$ considers the deviations of valence from neutral and the level of arousal from calm. There is no established method in the literature to compute the emotion intensity based on VAD values, but empirically we found that our method correlates better with an emotion intensity lexicon comprising 6K English words \cite{lrec18mohammad} than other methods such as taking dominance into consideration or taking $l_1$ norm. For concept $c_k$ not in NRC\_VAD, we set $\textit{aff}_k$ to the mid value of $0.5$. Combining both $\textit{rel}_k$ and $\textit{aff}_k$, we define the weight $w_k$ as follows: \begin{equation} \label{eqn: tradeoff} w_k = \lambda_k * \textit{rel}_k + (1-\lambda_k) * \textit{aff}_k, \end{equation} where $\lambda_k$ is a model parameter balancing the impacts of relatedness and affectiveness on computing concept representations. Parameter $\lambda_k$ can be fixed or learned during training. The analysis of $\lambda_k$ is discussed in Section \ref{sec: tradeoff}. Finally, the concept-enriched word representation $\mathbf{\hat{t}}$ can be obtained via a linear transformation: \begin{equation} \mathbf{\hat{t}} = \mathbf{W}[\mathbf{t};\mathbf{c}(t)], \end{equation} where $[;]$ denotes concatenation and $\textbf{W} \in \mathbb{R}^{d \times 2d}$ denotes a model parameter. All $m$ tokens in each $X^i_j$ then form a concept-enriched utterance embedding $\mathbf{\hat{X}}^i_j \in \mathbb{R}^{m \times d}$. \subsection{Hierarchical Self-Attention} \begin{table*}[!t] \small \centering \begin{tabular}{cccccc} \hline \textbf{Dataset} & \textbf{Domain} & \textbf{\#Conv. (Train/Val/Test)}& \textbf{\#Utter. (Train/Val/Test)}& \textbf{\#Classes}& \textbf{Evaluation}\\ \hline EC &Tweet&30160/2755/5509&90480/8265/16527&4&Micro-F1\\ DailyDialog &Daily Communication&11118/1000/1000&87170/8069/7740&7&Micro-F1\\ MELD &TV Show Scripts&1038/114/280&9989/1109/2610&7&Weighted-F1\\ EmoryNLP &TV Show Scripts&659/89/79&7551/954/984&7&Weighted-F1\\ IEMOCAP &Emotional Dialogues&100/20/31&4810/1000/1523&6&Weighted-F1\\ \hline \end{tabular} \caption{Dataset descriptions.} \label{table: dataset} \end{table*} We propose a hierarchical self-attention mechanism to exploit the structural representation of conversations and learn a vector representation for the contextual utterances $X^i_{j-1}, ..., X^i_{j-M}$. Specifically, the hierarchical self-attention follows two steps: 1) each utterance representation is computed using an utterance-level self-attention layer, and 2) a context representation is computed from $M$ learned utterance representations using a context-level self-attention layer. At step 1, for each utterance $X^i_n$, $n$=$j-1$, ..., $j-M$, its representation $\mathbf{\hat{X}}^{'i}_n \in \mathbb{R}^{m \times d}$ is learned as follows: \begin{equation} \label{eqn: MultiHead Output} \mathbf{\hat{X}}^{'i}_n = \textit{FF}(\textit{L}^{'}(\textit{MH}(\textit{L}(\mathbf{\hat{X}}^i_n), \textit{L}(\mathbf{\hat{X}}^i_n), \textit{L}(\mathbf{\hat{X}}^i_n)))), \end{equation} where $\textit{L}(\mathbf{\hat{X}}^i_n) \in \mathbb{R}^{m \times h\times d_s}$ is linearly transformed from $\mathbf{\hat{X}}^i_n$ to form $h$ heads ($d_s = d/h$), $\textit{L}^{'}$ linearly transforms from $h$ heads back to 1 head, and \begin{align} \textit{MH}(Q,K,V) = \textit{softmax}(\frac{QK^T}{\sqrt{d_s}})V,\\ \textit{FF}(x) = \textit{max}(0, xW_1 + b_1)W_2 + b_2, \end{align} where $Q$, $K$, and $V$ denote sets of queries, keys and values, respectively, $W_1 \in \mathbb{R}^{d\times p}, b_1 \in \mathbb{R}^p, W_2 \in \mathbb{R}^{p\times d}$ and $b_2 \in \mathbb{R}^d$ denote model parameters, and $p$ denotes the hidden size of the point-wise feedforward layer (FF) \cite{vaswani2017attention}. The multi-head self-attention layer (MH) enables our model to jointly attend to information from different representation subspaces \cite{vaswani2017attention}. The scaling factor $\frac{1}{\sqrt{d_s}}$ is added to ensure the dot product of two vectors do not get overly large. Similar to \cite{vaswani2017attention}, both MH and FF layers are followed by residual connection and layer normalization, which are omitted in Equation \ref{eqn: MultiHead Output} for brevity. At step 2, to effectively combine all utterance representations in the context, the context-level self-attention layer is proposed to hierarchically learn the context-level representation $\mathbf{C}^i \in \mathbb{R}^{M \times m \times d}$ as follows: \begin{equation} \mathbf{C}^i = \textit{FF}(\textit{L}^{'}(\textit{MH}(\textit{L}(\mathbf{\hat{X}}^i), \textit{L}(\mathbf{\hat{X}}^i), \textit{L}(\mathbf{\hat{X}}^i)))), \end{equation} where $\mathbf{\hat{X}}^i$ denotes $[\mathbf{\hat{X}}^{'i}_{j-M}; ...; \mathbf{\hat{X}}^{'i}_{j-1}]$, which is the concatenation of all learned utterance representations in the context. \subsection{Context-Response Cross-Attention} Finally, a context-aware concept-enriched response representation $\mathbf{R}^i \in \mathbb{R}^{m \times d}$ for conversation $X^i$ is learned by cross-attention \cite{bahdanau2014neural}, which selectively attends to the concept-enriched context representation as follows: \begin{equation} \mathbf{R}^i = \textit{FF}(\textit{L}^{'}(\textit{MH}(\textit{L}(\mathbf{\hat{X}}^{'i}_j), \textit{L}(\mathbf{C}^i), \textit{L}(\mathbf{C}^i)))), \end{equation} where the response utterance representation $\mathbf{\hat{X}}^{'i}_j \in \mathbb{R}^{m \times d}$ is obtained via the MH layer: \begin{equation} \mathbf{\hat{X}}^{'i}_j = \textit{L}^{'}(\textit{MH}(\textit{L}(\mathbf{\hat{X}}^i_j), \textit{L}(\mathbf{\hat{X}}^i_j), \textit{L}(\mathbf{\hat{X}}^i_j))), \end{equation} The resulted representation $\textbf{R}^i \in \mathbb{R}^{m \times d}$ is then fed into a max-pooling layer to learn discriminative features among the positions in the response and derive the final representation $\textbf{O} \in \mathbb{R}^d$: \begin{equation} \label{eqn: max pool} \textbf{O} = \textit{max\_pool}(\textbf{R}^i). \end{equation} The output probability $p$ is then computed as \begin{equation} \label{eqn: output} p = \textit{softmax}(\textbf{O}W_3 + b_3), \end{equation} where $W_3 \in \mathbb{R}^{d \times q}$ and $b_3 \in \mathbb{R}^q$ denote model parameters, and $q$ denotes the number of classes. The entire KET model is optimized in an end-to-end manner as defined in Equation \ref{eqn: objective}. Our model is available at here\footnote{https://github.com/zhongpeixiang/KET}. \begin{table*}[!t] \small \centering \begin{tabular}{cccccc} \hline \textbf{Model} & \textbf{EC} & \textbf{DailyDialog} & \textbf{MELD} & \textbf{EmoryNLP} & \textbf{IEMOCAP}\\ \hline cLSTM & 0.6913 & 0.4990 & 0.4972 & 0.2601 & 0.3484\\ CNN \cite{kim2014convolutional} & 0.7056 & 0.4934 & 0.5586 & 0.3259 & 0.5218\\ CNN+cLSTM \cite{poria2017context} & 0.7262 & 0.5024 & 0.5687 & 0.3289 & 0.5587\\ BERT\_BASE \cite{devlin2018bert} & 0.6946 & 0.5312 & 0.5621 & 0.3315 & 0.6119\\ DialogueRNN \cite{majumder2018dialoguernn} & 0.7405 & 0.5065 & 0.5627 & 0.3170 & \textbf{0.6121}\\ \hline KET\_SingleSelfAttn (ours) & 0.7285 & 0.5192 & 0.5624 & 0.3251 & 0.5810\\ KET\_StdAttn (ours) & \textbf{0.7413} & 0.5254 & 0.5682 & 0.3353 & 0.5861\\ KET (ours) & 0.7348 & \textbf{0.5337} & \textbf{0.5818} & \textbf{0.3439} & 0.5956\\ \hline \end{tabular} \caption{Performance comparisons on the five test sets. Best values are highlighted in bold.} \label{table: performance comparisons} \end{table*} \begin{table}[!t] \small \centering \begin{tabular}{cccccc} \hline \textbf{Dataset} & \textbf{M}& \textbf{m} & \textbf{d}& \textbf{p}& \textbf{h}\\ \hline EC & 2& 30 & 200 & 100 & 4\\ DailyDialog & 6& 30 & 300 & 400 & 4\\ MELD & 6& 30 & 200 & 100 & 4\\ EmoryNLP & 6& 30 & 100 & 200 & 4\\ IEMOCAP & 6& 30 & 300 & 400 & 4\\ \hline \end{tabular} \caption{Hyper-parameter settings for KET. $M$: context length. $m$: number of tokens per utterance. $d$: word embedding size. $p$: hidden size in FF layer. $h$: number of heads.} \label{table: hyper-parameters} \end{table} \section{Experimental Settings} \label{experiments} In this section we present the datasets, evaluation metrics, baselines, our model variants, and other experimental settings. \subsection{Datasets and Evaluations} \label{sec: dataset and evaluations} We evaluate our model on the following five emotion detection datasets of various sizes and domains. The statistics are reported in Table \ref{table: dataset}. \noindent\textbf{EC} \cite{chatterjee2019understanding}: Three-turn Tweets. The emotion labels include happiness, sadness, anger and other. \noindent\textbf{DailyDialog} \cite{li2017dailydialog}: Human written daily communications. The emotion labels include neutral and Ekman's six basic emotions \cite{ekman1992argument}, namely happiness, surprise, sadness, anger, disgust and fear. \noindent\textbf{MELD} \cite{poria2018meld}: TV show scripts collected from \textit{Friends}. The emotion labels are the same as the ones used in DailyDialog. \noindent\textbf{EmoryNLP} \cite{zahiri2018emotion}: TV show scripts collected from \textit{Friends} as well. However, its size and annotations are different from MELD. The emotion labels include neutral, sad, mad, scared, powerful, peaceful, and joyful. \noindent\textbf{IEMOCAP} \cite{busso2008iemocap}: Emotional dialogues. The emotion labels include neutral, happiness, sadness, anger, frustrated, and excited. In terms of the evaluation metric, for EC and DailyDialog, we follow \cite{chatterjee2019understanding} to use the micro-averaged F1 excluding the majority class (neutral), due to their extremely unbalanced labels (the percentage of the majority class in the test set is over 80\%). For the rest relatively balanced datasets, we follow \cite{majumder2018dialoguernn} to use the weighted macro-F1. \subsection{Baselines and Model Variants} \label{sec: baselines} For a comprehensive performance evaluation, we compare our model with the following baselines: \noindent\textbf{cLSTM}: A contextual LSTM model. An utterance-level bidirectional LSTM is used to encode each utterance. A context-level unidirectional LSTM is used to encode the context. \noindent\textbf{CNN} \cite{kim2014convolutional}: A single-layer CNN with strong empirical performance. This model is trained on the utterance-level without context. \noindent\textbf{CNN+cLSTM} \cite{poria2017context}: An CNN is used to extract utterance features. An cLSTM is then applied to learn context representations. \noindent\textbf{BERT\_BASE} \cite{devlin2018bert}: Base version of the state-of-the-art model for sentiment classification. We treat each utterance with its context as a single document. We limit the document length to the last 100 tokens to allow larger batch size. We do not experiment with the large version of BERT due to memory constraint of our GPU. \noindent\textbf{DialogueRNN} \cite{majumder2018dialoguernn}: The state-of-the-art model for emotion detection in textual conversations. It models both context and speakers information. The CNN features used in DialogueRNN are extracted from the carefully tuned CNN model. For datasets without speaker information, i.e., EC and DailyDialog, we use two speakers only. For MELD and EmoryNLP, which have 260 and 255 speakers, respectively, we additionally experimented with clipping the number of speakers to the most frequent ones (6 main speakers + an universal speaker representing all other speakers) and reported the best results. \noindent\textbf{KET\_SingleSelfAttn}: We replace the hierarchical self-attention by a single self-attention layer to learn context representations. Contextual utterances are concatenated together prior to the single self-attention layer. \noindent\textbf{KET\_StdAttn}: We replace the dynamic context-aware affective graph attention by the standard graph attention \cite{veličković2018graph}. \subsection{Other Experimental Settings} \label{sec: experimental settings} We preprocessed all datasets by lower-casing and tokenization using Spacy\footnote{https://spacy.io/}. We keep all tokens in the vocabulary\footnote{We keep tokens with minimum frequency of 2 for DailyDialog due to its large vocabulary size}. We use the released code for BERT\_BASE and DialogueRNN. For each dataset, all models are fine-tuned based on their performance on the validation set. For our model in all datasets, we use Adam optimization \cite{kingma2014adam} with a batch size of 64 and learning rate of 0.0001 throughout the training process. We use GloVe embedding \cite{pennington2014glove} for initialization in the word and concept embedding layers\footnote{We use GloVe embeddings from Magnitude Medium: https://github.com/plasticityai/magnitude}. For the class weights in cross-entropy loss for each dataset, we set them as the ratio of the class distribution in the validation set to the class distribution in the training set. Thus, we can alleviate the problem of unbalanced dataset. The detailed hyper-parameter settings for KET are presented in Table \ref{table: hyper-parameters}. \section{Result Analysis} \label{result analysis} In this section we present model evaluation results, model analysis, and error analysis. \begin{figure*}[!t] \centering \includegraphics[scale=0.6]{images/combined_image.pdf} \caption{Validation performance by KET. Top: different context length ($M$). Bottom: different sizes of random fractions of ConceptNet.} \label{fig: KBs} \end{figure*} \subsection{Comparison with Baselines} \label{sec: comparison with baselines} We compare the performance of KET against that of the baseline models on the five afore-introduced datasets. The results are reported in Table \ref{table: performance comparisons}. Note that our results for CNN, CNN+cLSTM and DialogueRNN on EC, MELD and IEMOCAP are slightly different from the reported results in \cite{majumder2018dialoguernn, poria2019emotion}. cLSTM performs reasonably well on short conversations (i.e., EC and DailyDialog), but the worst on long conversations (i.e., MELD, EmoryNLP and IEMOCAP). One major reason is that learning long dependencies using gated RNNs may not be effective enough because the gradients are expected to propagate back through inevitably a huge number of utterances and tokens in sequence, which easily leads to the vanishing gradient problem \cite{bengio1994learning}. In contrast, when the utterance-level LSTM in cLSTM is replaced by features extracted by CNN, i.e., the CNN+cLSTM, the model performs significantly better than cLSTM on long conversations, which further validates that modelling long conversations using only RNN models may not be sufficient. BERT\_BASE achieves very competitive performance on all datasets except EC due to its strong representational power via bi-directional context modelling using the Transformer. Note that BERT\_BASE has considerably more parameters than other baselines and our model (110M for BERT\_BASE versus 4M for our model), which can be a disadvantage when deployed to devices with limited computing power and memory. The state-of-the-art DialogueRNN model performs the best overall among all baselines. In particular, DialogueRNN performs better than our model on IEMOCAP, which may be attributed to its detailed speaker information for modelling the emotion dynamics in each speaker as the conversation flows. It is encouraging to see that our KET model outperforms the baselines on most of the datasets tested. This finding indicates that our model is robust across datasets with varying training sizes, context lengths and domains. Our KET variants KET\_SingleSelfAttn and KET\_StdAttn perform comparably with the best baselines on all datasets except IEMOCAP. However, both variants perform noticeably worse than KET on all datasets except EC, validating the importance of our proposed hierarchical self-attention and dynamic context-aware affective graph attention mechanism. One observation worth mentioning is that these two variants perform on a par with the KET model on EC. Possible explanations are that 1) hierarchical self-attention may not be critical for modelling short conversations in EC, and 2) the informal linguistic styles of Tweets in EC, e.g., misspelled words and slangs, hinder the context representation learning in our graph attention mechanism. \subsection{Model Analysis} \label{sec: model analysis} We analyze the impact of different settings on the validation performance of KET. All results in this section are averaged over 5 random seeds. \noindent\textbf{Analysis of context length:} We vary the context length $M$ and plot model performance in Figure \ref{fig: KBs} (top portion). Note that EC has only a maximum number of 2 contextual utterances. It is clear that incorporating context into KET improves performance on all datasets. However, adding more context is contributing diminishing performance gain or even making negative impact in some datasets. This phenomenon has been observed in a prior study \cite{su2018time}. One possible explanation is that incorporating long contextual information may introduce additional noises, e.g., polysemes expressing different meanings in different utterances of the same context. More thorough investigation of this diminishing return phenomenon is a worthwhile direction in the future. \noindent\textbf{Analysis of the size of ConceptNet:} We vary the size of ConceptNet by randomly keeping only a fraction of the concepts in ConceptNet when training and evaluating our model. The results are illustrated in Figure \ref{fig: KBs} (bottom portion). Adding more concepts consistently improves model performance before reaching a plateau, validating the importance of commonsense knowledge in detecting emotions. We may expect the performance of our KET model to improve with the growing size of ConceptNet in the future. \begin{table}[!t] \small \centering \begin{tabular}{ccccc} \hline \textbf{Dataset} & \textbf{0} & \textbf{0.3} & \textbf{0.7} & \textbf{1}\\ \hline EC & 0.7345 & 0.7397 & \textbf{0.7426} & 0.7363\\ DailyDialog & 0.5365 & 0.5432 & \textbf{0.5451} & 0.5383\\ MELD & 0.5321 & \textbf{0.5395} & 0.5366 & 0.5306\\ EmoryNLP & 0.3528 & \textbf{0.3624} & 0.3571 & 0.3488\\ IEMOCAP & 0.5344 & \textbf{0.5367} & 0.5314 & 0.5251\\ \hline \end{tabular} \caption{Analysis of the relatedness-affectiveness tradeoff on the validation sets. Each column corresponds to a fixed $\lambda_k$ for all concepts (see Equation \ref{eqn: tradeoff}).} \label{table: relatedness-affectiveness tradeoff} \end{table} \begin{table}[!t] \small \centering \begin{tabular}{cccc} \hline \textbf{Dataset} & KET & -context & -knowledge\\ \hline EC & \textbf{0.7451} & 0.7343 & 0.7359\\ DailyDialog & \textbf{0.5544} & 0.5282 & 0.5402\\ MELD & \textbf{0.5401} & 0.5177 & 0.5248\\ EmoryNLP & \textbf{0.3712} & 0.3564 & 0.3553\\ IEMOCAP & \textbf{0.5389} & 0.4976 & 0.5217\\ \hline \end{tabular} \caption{Ablation study for KET on the validation sets.} \label{table: ablation study} \end{table} \noindent\textbf{Analysis of the relatedness-affectiveness tradeoff:} \label{sec: tradeoff} We experiment with different values of $\lambda_k \in [0,1]$ (see Equation \ref{eqn: tradeoff}) for all $k$ and report the results in Table \ref{table: relatedness-affectiveness tradeoff}. It is clear that $\lambda_k$ makes a noticeable impact on the model performance. Discarding relatedness or affectiveness completely will cause significant performance drop on all datasets, with one exception of IEMOCAP. One possible reason is that conversations in IEMOCAP are emotional dialogues, therefore, the affectiveness factor in our proposed graph attention mechanism can provide more discriminative power. \noindent\textbf{Ablation Study:} We conduct ablation study to investigate the contribution of context and knowledge as reported in Table \ref{table: ablation study}. It is clear that both context and knowledge are essential to the strong performance of KET on all datasets. Note that removing context has a greater impact on long conversations than short conversations, which is expected because more contextual information is lost in long conversations. \subsection{Error Analysis} \label{sec: error analysis} Despite the strong performance of our model, it still fails to detect certain emotions on certain datasets. We rank the F1 score of each emotion per dataset and investigate the emotions with the worst scores. We found that disgust and fear are generally difficult to detect and differentiate. For example, the F1 score of fear emotion in MELD is as low as 0.0667. One possible cause is that these two emotions are intrinsically similar. The VAD values of both emotions have low valence, high arousal and low dominance \cite{mehrabian1996pleasure}. Another cause is the small amount of data available for these two emotions. How to differentiate intrinsically similar emotions and how to effectively detect emotions using limited data are two challenging directions in this field. \section{Conclusion} \label{conclusions} We present a knowledge-enriched transformer to detect emotions in textual conversations. Our model learns structured conversation representations via hierarchical self-attention and dynamically refers to external, context-aware, and emotion-related knowledge entities from knowledge bases. Experimental analysis demonstrates that both contextual information and commonsense knowledge are beneficial to model performance. The tradeoff between relatedness and affectiveness plays an important role as well. In addition, our model outperforms the state-of-the-art models on most of the tested datasets of varying sizes and domains. Given that there are similar emotion lexicons to NRC\_VAD in other languages and ConceptNet is a multilingual knowledge base, our model can be easily adapted to other languages. In addition, given that NRC\_VAD is the only emotion-specific component, our model can be adapted as a generic model for conversation analysis. \section*{Acknowledgments} The authors would like to thank the anonymous reviewers for their valuable comments. This research is supported, in part, by the National Research Foundation, Prime Minister’s Office, Singapore under its AI Singapore Programme (Award Number: AISG-GC-2019-003) and under its NRF Investigatorship Programme (NRFI Award No. NRF-NRFI05-2019-0002). This research is also supported, in part, by the Alibaba-NTU Singapore Joint Research Institute, Nanyang Technological University, Singapore. \bibliographystyle{acl_natbib}
\section{Introduction} \subsection{Motivation} Robotic systems often rely on advanced perception algorithms and complex sensor suites. Such perception algorithms provide measurements of position, velocity, and other relevant quantities, but the associated measurement noise is often correlated in time. Traditional Kalman filtering assumes white i.i.d. Gaussian measurement noise, and as such is not optimal for these applications. To address this gap, we propose using general (non-white) Gaussian Processes (GPs) as a non-parametric noise model that can capture the correlation present in these perception systems. As a Bayesian non-parametric model, GPs can capture a wide variety of qualitative behaviors. They are direct generalizations of the commonly used independent Gaussian and AR(p) noise models. At the same time, they retain many desirable computational properties, as they are based on multivariate Gaussian distributions, for which many mature mathematical and computational techniques exist. \subsection{Related Work} Most existing work on filtering with correlated measurement noise has focused on using autoregressive (AR) noise models. \citet{bryson1968estimation} provide the earliest work on optimal filtering with an AR(1) noise model, taking a state augmentation approach to transform the problem into one of Kalman filtering with white noise. More recently, \citet{petovello2009consideration} provided an alternative approach for AR(1) noise models using a ``time-differencing'' approach. Much recent research has focused on extending these approaches (state augmentation and time-differencing) to more general noise models. AR(p) and autoregressive moving average (ARMA) models were studied in \cite{geist2011kalman}, \cite{liu2015optimal} and \cite{jiang2010globally}. \cite{chang2014kalman} proved the theoretical equivalence of the time-differencing and state augmentation approaches. They note that accounting for correlation in the noise both improves the resulting estimate and results in more conservative error convariances, a measure of uncertainty in the estimate. We find a similar effect in this work for the case of GP measurement noise. A common approach to filtering with observations perturbed by correlated noise is to use a pre-whitening filter. In particular, given measurments $\mathbf{z} = \mathbf{x} + \mathbf{v}$, where $\mathbf{v} \sim \mathcal{N}(0,\Sigma)$ and $\Sigma$ has off-diagonal elements, we might apply a prewhitening transformation $U$ such that $U\mathbf{v} \sim \mathcal{N}(0,U\Sigma U^T)$ and $U\Sigma U^T$ is diagonal. To use this approach, however, we need to have access to all of the measurements $\mathbf{z}$ first. In robotics applications, these measurements a stream of data coming in in real time. At each step, we need to update our state estimate using the latest measurement. The prewhitening approach would require re-computing the transformation $U$ at each timestep as new measurements arrive and $\mathbf{z}$ increases in size, which might be computationally prohibitive. Instead, we take our inspiration from \cite{jiang2010globally}, which provides a recursive algorithm for optimal filtering for AR(p) measurement noise, which is derived directly as the minimum mean squared error (MMSE) linear filter. This formulation allows us to analytically derive an optimal filter for the GP noise case without resorting to state augmentation or prewhitening. In the control literature, GPs have been used to model the state transition and measurement functions, and new optimal filtering techniques have been developed for such models \cite{ko2009gp,deisenroth2012robust}. But to the best of our knowledge, this is the first work to propose using a general GP to model the measurement noise itself. \section{Preliminaries} \subsection{Kalman Filter} Kalman filtering is concerned with estimating the state of the linear state-space model \begin{equation}\label{eq:kalman_sys} \begin{gathered} x_{t+1} = F_tx_t + w_t \\ z_t = H_tx_t + v_t \end{gathered} \end{equation} where $x_t \in \mathbb{R}^n$ is the underlying state and $z_t \in \mathbb{R}^m$ are noisy observations. $w_t \sim \mathcal{N}(0,W_t)$ and $v_t \sim \mathcal{N}(0,V_t)$ represent the process and measurement noise respectively. The classical Kalman filter assumes that $w_t$ and $v_t$ are white and mutually uncorrelated. That is, \begin{gather*} E[v_t,w_{t^\prime}] = 0 ~~~~ \forall ~ t,t^\prime \\ E[w_t,w_{t^\prime}] = W_t\delta(t,t^\prime) \\ E[v_t,v_{t^\prime}] = V_t\delta(t,t^\prime) \end{gather*} where $\delta(i,j)$ is the Kronecker delta. Given observation $z_k$, the updated state estimate $\hat{x}_k$ and estimate covariance $P_k \in \mathbb{R}^{n\times n}$ are calculated in two steps as follows: First, system (\ref{eq:kalman_sys}) is used to update the estimate and propagate the uncertainty in the estimate. \begin{gather*} \hat{x}_k^- = F_{k-1}\hat{x}_{k-1} \\ P_k^- = F_{k-1}P_{k-1}F_{k-1}^T + W_k \end{gather*} Then, the measurement $z_k$ is used to refine this estimate and the associated covariance. \begin{gather*} K_k = P_k^-H_k^T[V_k + H_kP_k^-H_k^T]^{-1} \\ \hat{x}_{k} = \hat{x}_k^-+K_k(z_k-H_k\hat{x}_k^-) \\ P_k = (I - K_kH_k)P_k^- \end{gather*} \subsection{Gaussian Process} A Gaussian Process (GP) is a random process where every subset is a multivariate Gaussian random vector. GPs can be uniquely specified with a mean function $\mu(t)$ and a covariance function $k(t,t')$ as follows: \begin{equation} \mathbf{x} \sim \mathcal{GP}(\mu(t), k(t,t')) \end{equation} \begin{equation} \begin{bmatrix} \mathbf{x}_{t_1} \\ \mathbf{x}_{t_2} \\ \vdots \\ \mathbf{x}_{t_N} \end{bmatrix} \sim \mathcal{N}(\bm{\mu}, \mathbf{K}) \end{equation} where $[\bm{\mu}]_{t_i}=\mu(t_i)$ and $\mathbf{K}$ is the Gram matrix defined such that $[\mathbf{K}]_{i,j}=k(t_i,t_j)$. In most cases, the mean function is assumed to be zero. Gaussian Processes are an example of a \textit{Bayesian Non-parametric} model, in the sense that the parameters $\bm{\mu}$ and $\mathbf{K}$ are not specified directly, but rather determined by the hyperparameters of $\mu(t)$ and $k(t,t^\prime)$. Such hyperparameters can be determined from data using Bayesian techniques \cite{gelman2013bayesian}. For example, one commonly used Kernel function is the squared exponential, or RBF, kernel \begin{equation} k(t,t') = exp(\frac{\|t-t'\|^2}{2l^2}) \end{equation} The RBF kernel is characterized by a lengthscale $l$, which (intuitively) regulates how close the indices $(t,t^\prime)$ must be for $\mathbf{x}_t$ and $\mathbf{x}_{t^\prime}$ to be closely correlated. GPs with RBF kernels give rise to functions that are infinitely differentiable. Other kernel functions, such as the popular Mat\'ern class of kernels, describe less smooth functions, while others yet model periodic correlations \cite{rasmussen2004gaussian}. For a more comprehensive view of Gaussian processes, kernel functions, and their applications, we refer the interested reader to \cite{roberts2013gaussian,rasmussen2004gaussian}. \section{Gaussian Processes as Noise Model} A growing body of work in the control systems community has focused on Gaussian processes for system identification of stochastic systems. In this section, we propose Gaussian Processes as a flexible model of correlated measurement noise. Specifically, we consider a modification of System (\ref{eq:kalman_sys}) such that rather than being uncorrelated in time, $v_t$ is drawn from a zero-mean Gaussian Process: \begin{equation}\label{eq:gp_noise_model} v_t \sim \mathcal{GP}(0,k(t,t^\prime)). \end{equation} This formulation has a good deal of expressive power, as GPs can model a wide range of qualitative behaviors \cite{rasmussen2004gaussian,roberts2013gaussian}. This flexibility suggests that GPs can accurately model noise for a wide variety of sensor configurations and perception algorithms. Furthermore, the GP noise model generalizes both the common independent Gaussian noise model and the popular AR(p) model \cite{davis2014gaussian}. At the same time, GPs are simple enough to maintain useful computational properties, since every subset is a multivariate Gaussian. \subsection{Determining Model Hyperparameters} Much as a traditional independent Gaussian noise model requires determining a value of the covariance parameter $V_t$, using GPs as a noise model requires the specification of a kernel function, either from prior knowledge or from data. In this section, we demonstrate how Bayesian techniques can be used to determine a kernel's hyperparameters from data. GPs are an example of a \textit{Bayesian Non-parametric} model \cite{roberts2013gaussian}. As such, we do not infer any parameters directly, but rather reason about hyperparameters $\phi$. These hyperparameters characterize the kernel function, and can give rise to a wide variety of qualitative behaviors. To obtain posterior inference on the hyperparameters $\phi$, we must consider the likelihood $f(\mathbf{v} | \phi)$ where $\mathbf{v} = [v_0^T,v_1^T,\dots]^T$. The log likelihood is given by \begin{equation}\label{eq:lml} \log f(\mathbf{v} | \phi) = -\frac{1}{2}\mathbf{v}^T K_\mathbf{v}^{-1} \mathbf{v} - \frac{1}{2} \log |K_\mathbf{v}| - \frac{n}{2}\log 2\pi \end{equation} where $$ K_\mathbf{v} = \begin{bmatrix} k(t_1,t_1) & k(t_2,t_1) & \ldots \\ \vdots & \ddots & \\ k(t_n,t_1) & & k(t_n,t_n) \\ \end{bmatrix} $$ is specified according to the hyperparameters $\phi$ \cite{rasmussen2004gaussian}. \begin{figure*} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=\linewidth]{GP_absexp_trace.png} \caption{Best-fit (ML-II) Gaussian Process noise model with exponential kernel.} \label{fig:rgbdslam_example_gp} \end{subfigure} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=\linewidth]{gaussian_trace.png} \caption{Best-fit (Maximum a-postiori) i.i.d. Gaussian noise model.} \label{fig:rgbdslam_example_iid} \end{subfigure} \caption{Actual measurement noise (x,y,z) from RGBDSLAM \cite{endres20143} (top) compared to samples from a corresponding noise model. The Gaussian Process model captures autocorrelation in the noise, leading to error dynamics that are qualitatively similar to the actual error, while the typically i.i.d. Gaussian model does not account this autocorrelation.} \label{fig:rgbdslam_example} \end{figure*} Given this log likelihood function, we can use Bayes rule to determine the posterior disribution of the hyperparameters $\phi$: \begin{equation} f(\phi|\mathbf{v}) \propto f(\mathbf{v}|\phi)f(\phi). \end{equation} \subsection{Case Study: RGBDSLAM} In this case study, rather than finding the exact posterior distribution of the hyperparameters, we simply maximize the likelihood given in (\ref{eq:lml}), a technique known as ML-II \cite{rasmussen2004gaussian}. We model the noise $v_t$ as being drawn from a zero-mean stationary and isotropic GP. Specifically, we assume that the measurement noise on each axis, (x,y,z), is drawn from the same underlying process with an exponential kernel, \begin{equation}\label{eq:exp} k(r) = \sigma^2 exp(-\frac{r}{l}). \end{equation} The exponential kernel is a special case of the Matern kernel with degrees of freedom $\nu=1/2$. Functions drawn from a GP with an exponential kernel are once differentiable and correspond to the Ornstein-Ulenback (OU) process. The OU process describes a random walk which tends to return to the mean: intuitively reasonable behavior when considering localization error. RGBD-SLAM \cite{endres20143} is a standard SLAM algorithm that takes as input measurements from a RGB-D camera and outputs an estimated position and orientation. As a case study, we run RGBDSLAM on the ``freiburg1\_room'' scenario from the TUM-vision dataset \cite{sturm12iros}. ML-II yields hyperparameter values of $\sigma^2=1.2\times10^{-3}$ and $l=135$. The results ($N=100$) are shown in Figure \ref{fig:rgbdslam_example_gp}. We can quantify the auto-correlation present in the actual tracking error with the use of an autocorrelation function (ACF) plot, which essentially displays the sample autocorrelation for different timesteps (lags). An ACF plot for the y-axis error from RGBDSLAM and an ACF plot for i.i.d. Gaussian noise are shown in Figure \ref{fig:acf}. \begin{figure*} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=0.9\textwidth]{rgbdslam_acf.png} \caption{Autocorrelation function plot for RGBDSLAM data} \label{fig:acf_rgbdslam} \end{subfigure} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=0.9\textwidth]{gaussian_acf.png} \caption{Autocorrelation function plot for i.i.d. Gaussian data} \label{fig:acf_gaussian} \end{subfigure} \caption{Actual data from RGBDSLAM shows significant sample autocorrelation, while (simulated) i.i.d. Gaussian data shows close to none.} \label{fig:acf} \end{figure*} \section{Kalman Filtering with GP Measurement Noise} Given a complex perception system (such as RGBDSLAM or AprilTags) that provides noisy observations, we may wish to make an optimal estimate of the robots's state. A classical approach at this point would be to use a Kalman filter; however, as demonstrated above, the noisy observations produced by today's advanced perception algorithms contain significant autocorrelation. This noise is thus better modeled by Gaussian Processes than by the i.i.d. Gaussian noise assumed by the Kalman filter. In this section, we derive a linear unbiased estimator of the state $x_t$ given observations $Z_t = [z_1~z_2\dots z_t]^T$ that is optimal in the mean-square-error (MSE) sense. We take as our starting point the following standard intermediate result (stated as found in \cite{jiang2010globally}) from proving the optimality of the Kalman filter: \begin{theorem} Regardless of time correlation in $v_t$, the optimal estimate of $x_t$, $\hat{x}_t$, is given by \begin{align} & \hat{x}_t^- = F_{t-1}\hat{x}_{t-1} \\ & P_t^- = F_{t-1}P_{t-1}F_{t-1}^T + W_t \end{align} \begin{align} & \hat{x}_t = \hat{x}_t^- + K_t(z_t - \hat{z}_t)\label{eq:optimal_est}\\ & P_t = P_t^- - K_tJ_t^T\label{eq:optimal_var} \end{align} where \begin{align*} & \hat{z}_t = E[z_t] + Cov(z_t,Z_{t-1})Var(Z_t)^{-1}(Z_{t-1}-E[Z_{t-1}]), \\ & L_t = Var(z_t) + Cov(z_t,Z_{t-1})Var(Z_t)^{-1}Cov(Z_{t-1},z_t), \\ & J_t = P_t^-H_t^T, \\ & K_t = J_tL_t^{-1}. \end{align*} \end{theorem} Note that in the case of i.i.d. measurement noise $Cov(z_t,Z_t) = 0$, $\hat{z}_t = H_t\hat{x}_t^-$, and we recover the traditional Kalman filter. For the case of Gaussian Process noise, we proceed as follows. Note that \begin{equation} E[Z_t] = E[\begin{bmatrix}z_t \\ z_{t-1} \\ \vdots \end{bmatrix}] = \begin{bmatrix}H_t\hat{x}_t^- \\ H_{t-1}\hat{x}_{t-1}^- \\ \vdots \end{bmatrix}, \end{equation} \begin{equation} Cov(z_t,Z_{t-1}) = Cov(Z_{t-1},z_t)^T = [k(t,t+1)~k(t,t+2)\dots], \end{equation} and \begin{multline} Var(Z_t) = Var(\begin{bmatrix}z_t \\ z_{t-1} \\ \vdots \end{bmatrix}) = \\ \begin{bmatrix} H_tP_t^-H_t^T & 0 & \dots \\ 0 & H_{t-1}P_{t-1}^-H_{t-1}^T & \\ \vdots & & \ddots \end{bmatrix}+ \\ \begin{bmatrix} k(t,t) & k(t,t+1) & \dots \\ k(t+1,t) & k(t+1,t+1) & \\ \vdots & & \ddots \end{bmatrix}\label{eq:var_Z}. \end{multline} With this, we can compute $L_t, J_t$, and $\hat{z}_t$. The optimal estimate of the state $x_t$ is thus given by (\ref{eq:optimal_est}), and its associated error covariance by (\ref{eq:optimal_var}). \subsection{Practical Kalman Filtering} The procedure above gives the optimal estimate, which we now denote $\hat{x}^*_t$, but this estimate depends on the whole history of observations $Z_t$. Furthermore, this approach requires inverting $Var(Z_t)$, a $t\times t$ matrix which grows at every timestep. To avoid this increasing complexity, we propose to consider only a truncated version of the measurement history, $\hat{Z}_t = [z_{t-N+1}~z_{t-N+2}\dots z_{t}]$. By considering only this ``window'' of $N$ measurements, we can still compute an estimate $\hat{x}_t$ using (\ref{eq:optimal_est},\ref{eq:optimal_var}) and replacing $Z_t$ with $\hat{Z}_t$. But this time, the size of $Var(\hat{Z}_t)$ is fixed at $(N\times N)$. Furthermore, using a fixed size window allows us to take advantage of the structure of (\ref{eq:var_Z}) to more efficiently compute an estimate. Specifically, given a kernel function $k(\cdot,\cdot)$ and a window length $N$ we can precompute \begin{equation*} A^{-1} = \begin{bmatrix} k(t,t) & k(t,t+1) & \dots \\ k(t+1,t) & k(t+1,t+1) & \\ \vdots & & \ddots \end{bmatrix}^{-1}. \end{equation*} Note that we can decompose the other term in $Var(\hat{Z})$ as \begin{multline*} \begin{bmatrix} H_tP_t^-H_t^T & 0 & \dots \\ 0 & H_{t-1}P_{t-1}^-H_{t-1}^T & \\ \vdots & & \ddots \end{bmatrix} = UV = \\ \begin{bmatrix} H_tP_t^- \\ H_{t-1}P_{t-1}^- \\ \vdots \end{bmatrix} \begin{bmatrix} H_t^T & H_{t-1}^T & \dots \end{bmatrix}. \end{multline*} \begin{figure*} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=0.9\textwidth]{kalman_filter.png} \caption{Kalman Filter} \end{subfigure} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=0.9\textwidth]{our_filter.png} \caption{Our filter with full history} \end{subfigure} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=0.9\textwidth]{history_filter_2.png} \caption{Our filter with N=2} \end{subfigure} \begin{subfigure}{0.5\textwidth} \centering \includegraphics[width=0.9\textwidth]{history_filter_5.png} \caption{Our filter with N=5} \end{subfigure} \caption{Comparison of filtering paradigms for estimating a scalar value via noisy observations drawn from a Gaussian Process (Matern kernel, lengthscale 5).} \label{fig:matern_example} \end{figure*} We can then use the Sherman-Morrison-Woodbury matrix inversion lemma to compute $Var(\hat{Z})^{-1}$ as follows: \begin{multline*} Var(\hat{Z})^{-1} = (A+UCV)^{-1} = \\ A^{-1} - A^{-1}U(I_{m \times m} + VA^{-1}U)^{-1}VA^{-1}. \end{multline*} \begin{remark} $Var(\hat{Z})$ is an $Nn\times Nn$ matrix, and thus computing $Var(\hat{Z})^{-1}$ directly is an $O((Nn)^3)$ process. But if we precompute $A^{-1}$ and use the matrix inversion lemma as described above, we only need to compute the inverse of $I + VA^{-1}U$, an $m \times m$ matrix, at each timestep. Using this technique renders the complexity of calculating $\hat{x}_t$ linear in the size of the history window, i.e. $O(N)$. In practice, this means that we can choose quite a large $N$ without worrying about computational speed. \end{remark} From an engineering perspective, there is tradeoff that regulates the choice of the size of the window $N$. Choosing a larger $N$ generally results in better performance, since more observations are taken into account. At the same time, a larger $N$ increases the complexity of computing the estimate $\hat{x}_t$, though as stated above, this complexity is only $O(N)$. One option for choosing $N$ would be to choose the largest possible $N$ that allows for realtime computation of the state estimate. A more insightful way might be to note that most kernel functions decay as $t'-t$ increases, leading to behavior like that shown in Figure \ref{fig:acf_rgbdslam}. By setting some correlation threshold, we might choose some minimum coorelation $k_{min}$ and choose $N$ such that we neglect only those observations so far in the past that their correlation is below the threshold, i.e., \begin{align*} \min &~ N \\ \text{s.t.} &~ k(t,t+l) < k_{min} ~~~\forall~l\geq N. \end{align*} An alternative heuristic would be to start the estimation by using all available estimates $Z_t$, and determine $N$ on-the-fly based on the error covariance $P_t$. When $P_t$ falls below a certain threshold, we set $N$ and start moving the window of observations $\hat{Z}_t$. Since the error covariance generally decreases over time, this heuristic allows us to choose of $N$ in terms of the filtering error. \section{Example} As a simple example, consider estimating a scalar value from observations perturbed by noise drawn from a GP (Matern Kernel, lengthscale of 5), as shown in Figure \ref{fig:matern_example}. Using the Kalman filter (or equivalently, our filter with $N=1$) results in an overly optimistic estimate that follows the observations too closely: the assumption of uncorrelated noise leads to overaggressive following of the observations. Additionally, the error covariance $P_t$ (represented by the green shaded region) seems to be too small. Using our filter with the full full history $Z_t$ causes the estimate to follow the observations less closely and converge more steadily to the true value, but the computation is significantly slower, since this requires inverting matrices as large as $(100\times 100)$. With a truncated history $\hat{Z}_t$, using as few as $N=2$ steps already shows a marked improvement in performance. The resulting estimate with $N=5$ is virtually indistinguishable from the optimal estimate. This suggests that the GP lengthscale hyperparameter may be yet another useful heuristic for choosing how many steps of history to account for. \section{Conclusion} We presented general Gaussian Processes as a flexible model of measurement noise. We showed that advanced sensor systems and perception algorithms such as RGBDSLAM produce measurement errors that are highly correlated in time, and well modeled by GPs. We derived an optimal Kalman filter for the case of general Gaussian Process noise, and demonstrated in simulation that accounting for autocorrelations in measurement noise via a GP model leads to superior performance. \bibliographystyle{plainnat}
\subsection{Introduction} \noindent{}The presence of many overlapping feedback-based circuits within a cell's regulatory network has been theorized to give rise to a cellular epigenetic landscape (also called a phenotype landscape) with many metastable states~\cite{Chang2006mmd,Smits2006pvb}. Fluctuations in the cell's state due to molecular noise \cite{McAdams1997smg,Elowitz2000son,Paulsson2000rsf,Thattai2001ing,Ozbudak2002rne,Elowitz2002sge,Blake2003neg,Sasai2003sge,Rosenfeld2005grs,Golding2005rkg,Newman2006spa,Yu2006pge,Shahrezaei2008ads} randomly drive the cell along this epigenetic landscape bounded by the so-called quasi-potential barriers separating the metastable states \cite{Hasty2000nsa,Kepler2001str,Aurell2002eaf}. Most of the time the system dwells in the vicinity of one of these metastable states undergoing small random excursions about it. Occasionally, however, a rare, large fluctuation can move the system from one basin of attraction (of a metastable state) to another \cite{Roma2005ope,Schultz2007mls,Choi2008sse,Morelli2008efr,Mehta2008esn,Leisner2009kgs,Zong2010lsi,Wang2010kpt,Assaf2011dsg,Assaf2013end,Dixit2015itr,Ge2015spt,Roberts2015dsg,Ge2018rss}. The stability of these phenotypic states, quantified by the mean first passage time (MFPT) or mean switching time (MST) to transition from one state to another solely via fluctuations, is typically very long to ensure stable phenotypes \cite{Walczak2005art}, and yet cells must transition quickly and deterministically once the proper signal is received \cite{Eldar2010frn,Golding2011dml,Balazsi2011cdm,Ghusinga2017fta}. Such noise-driven switches, using positive and negative feedback loops, regulate diverse decision-making processes including persistence \cite{Balaban2004bpa,Rocco2013spf}, bet-hedging \cite{Veening2008beb,Nozoe2017ifl}, gradient decoding \cite{Barkai2009rgd,Sharma2016gsb}, differentiation \cite{Raj2010vge}, phage infection \cite{Zeng2010dms}, and resource sensing \cite{Roberts2011nci,levy2011competitive,Earnest2013dli}. In developmental processes, the regulatory network guides a developing cell through a series of transitions by moving from one metastable state to another along the quasi-potential landscape~\cite{Huang2009nhc,Garcia-Ojalvo2012tsm,Corson2017snd}. Stochastic fluctuations have been observed to be involved in several developmental processes \cite{Chubb2017sbd} and developmental transitions may involve quick passage through a number of intermediate states \cite{Antolovic2019tsd}. Indeed, cellular reprogramming under strong perturbations follows a barrier crossing process along a one-dimensional order parameter \cite{Pusuluri2017crd}. Using signals to guide a cell's state artificially along an epigenetic landscape could open new avenues to treating disease using induced pluripotent stem cells and must also underlie natural differentiation processes \cite{Bargaje2017cps,Kaity2018rot}. A theory to describe the work required to transition a cell between metastable states would be valuable in developing detailed models of differentiation networks, and designing differentiation protocols. Yet, reconstructing the cellular epigenetic landscape of a real biological phenotype from steady-state experimental data is usually impossible due to the extreme rareness of the transitions. Here, we describe a new approach for studying cellular decision landscapes using perturbations. The idea is similar in principle to single-molecule force spectroscopy studies of protein-folding landscapes, allowing one to extract transition information from force-spectroscopy pulling experiments~\cite{hummer2003kinetics,Dudko2008tai}. By pulling a macromolecule or molecular complex at a sufficient force, rare transitions in single molecules such as ligand-receptor dissociation~\cite{florin1994adhesion}, unfolding of a protein~\cite{kellermayer1997folding}, or unzipping of nucleic acids~\cite{liphardt2001reversible} can be experimentally observed. The authors in Refs.~\cite{hummer2003kinetics,Dudko2008tai} have devised a theoretical method, in the framework of the Kramers theory, that allows translating the distribution of rupture forces that can be measured experimentally, into the force-dependent lifetime of the system. In our case, starting with a cellular regulatory network, we apply an external ``force" or ``pulling" to perturb the network in the direction of the desired change. Here, pulling can represent, \textit{e.g.}, adding a time-dependent force to the protein's expression rate, such that the system is pushed closer to the switching barrier and can switch with an increased probability. At this point, the statistics of the response of the system, \textit{i.e.} the statistics of switching events in the presence of such pulling force, are then used to infer the topology of the landscape, which allows evaluating the lifetime of the various metastable states. To compute the response of the system to external pulling, we employ a semi-classical approach in the spirit of the Wentzel–Kramers–Brillouin (WKB) theory~\cite{Dykman1994lfo,Kessler2007erf,Meerson2008nup,Escudero2009srm,Assaf2010ems,Assaf2011dsg,Roberts2015dsg} in order to treat the underlying chemical master equation describing the stochastic dynamics of the regulatory network. This formalism allows us to transform the master equation into a set of Hamilton equations which can be dealt with analytically or numerically. We then solve these equations under a prescribed external perturbation with given magnitude and duration and compute the change in the switching probability due to the external pulling. Finally, we use our semiclassical solution in a maximum likelihood framework to infer the model's parameters, which allows reconstructing the epigenetic landscape of the network. We present our method on two prototypical model systems: a one-dimensional (1D) system of a self-regulating gene, and a two-dimensional (2D) system of mRNA-protein positive feedback loop. We then discuss how our model can be generalized to higher-dimensional systems. \subsection{Switching in the absence of an external perturbation} Our starting point is an effective 1D model for the dynamics of the protein of interest. It is assumed that the protein is expressed and degraded according to the following set of birth-death reactions \begin{equation}\label{reactions} n\xrightarrow[]{\Lambda_n}n+1,\;\;\;\;\;n\xrightarrow[]{{\cal M}_n}n-1, \end{equation} where $\Lambda_n$ and ${\cal M}_n$ are the expression and degradation rates, respectively, and $n$ is the protein copy number. Neglecting intrinsic noise, the mean number of proteins $\bar{n}$ satisfies the following \textit{deterministic} rate equation \begin{equation}\label{RE} \dot{\bar{n}}=\Lambda_{\bar{n}}-{\cal M}_{\bar{n}}. \end{equation} We are interested in a scenario where this rate equation has (at least) three fixed points: $n_1<n_2<n_3$, where $n_1$ and $n_3$ are stable fixed points corresponding to the \textit{low} and \textit{high} phenotypes, while $n_2$ is an intermediate unstable fixed point. One model system that exhibits this property is a protein that positively regulates itself -- a self-regulating gene (SRG). While our analysis below is done for generic $\Lambda_n$ and ${\cal M}_n$, in all our simulations we have chosen the birth and death rates to satisfy \begin{equation}\label{Hillrates} \lambda(q) = \alpha_0 + (1-\alpha_0)\frac{q^h }{q^h+\beta^h},\;\;\;\;\mu(q)=q. \end{equation} Here $\lambda(q)=\Lambda_n/N$ and $\mu(q)={\cal M}_n/N$ are rescaled expression and degradation rates, $q=n/N$ is the protein density, while $N$ is the typical system size, assumed to be large, which represents the typical protein copy number in the \textit{high} state. Furthermore, $\alpha_0$ is the rescaled baseline expression rate, $h$ is the Hill exponent, and $\beta$ is the midpoint of the Hill function. Fig.~S1 shows an example of rate equation~(\ref{RE}) using rates~(\ref{Hillrates}) when the system has three fixed points. Once intrinsic noise is accounted for, these stable fixed points become metastable, and noise-induced switching between $n_1$ and $n_3$ or \textit{vice versa}, occurs. To account for intrinsic noise, we write down the so-called chemical master equation describing the dynamics of $P_n(t)$ -- the probability to find $n$ proteins at time $t$: \begin{eqnarray}\label{ME} \dot{P}_n=\Lambda_{n-1}P_{n-1}+{\cal M}_{n+1}P_{n+1}-(\Lambda_n+{\cal M}_n)P_n. \end{eqnarray} Let us first consider the case of switching in the absence of external perturbations. Here, one can find an exact expression for the mean switching time (MST), by computing the mean time it takes the system to cross the unstable boundary starting from a state with $n$ proteins~\cite{Gardiner2004hsm}. Yet, since the resulting expression is highly cumbersome, throughout the text we instead use the WKB method~\cite{Dykman1994lfo} to compute the MST, or switching probability. To set the stage for the WKB method, let us assume without loss of generality that the system starts in the vicinity of the \textit{low} stable fixed point $n_1$. Assuming the typical system's size is large, $N\gg 1$, the resulting MST is expected to be exponentially long, see below. In this case, prior to switching the system enters a long-lived metastable state which is centered about $n_1$. Indeed, starting from any initial condition $n_0<n_2$, after a short ${\cal O}(1)$ relaxation time, the dynamics of the probability distribution function can be shown to satisfy the metastability ansatz: $P(n\leq n_2,t)\simeq \pi(n)e^{-t/\tau}$, while $\sum_{n>n_2}P(n)=1-e^{-t/\tau}$~\cite{Dykman1994lfo,Assaf2006stm,Kessler2007erf,Meerson2008nup,Escudero2009srm,Assaf2010ems,assaf2017wkb}. Here, $\tau$ is the MST, $\pi(n)$ is called the quasi-stationary distribution (QSD), which determines the \textit{shape} of the metastable state, and it is evident that the probability to be at $n>n_2$ is negligibly small at times $t\ll \tau$. We now plug this ansatz into master equation~(\ref{ME}), and neglect the exponentially small term proportional to $\tau^{-1}$ (see below). Employing the WKB ansatz $\pi(n)\equiv \pi(q)\sim\exp[-NS(q)]$ on the resulting quasistationary master equation, where $S(q)$ is the action function, yields a stationary Hamilton-Jacobi equation $H(q,\partial_q S)=0$, with the Hamiltonian being \begin{equation}\label{hamil0} H_0(q,p)=(e^p-1)\left[\lambda(q)-e^{-p}\mu(q)\right]. \end{equation} Here $p=\partial_q S$ is called the momentum in analogy to classical mechanics, while the subscript $0$ stands for the unperturbed case. To find the optimal path to switch -- the path the system takes with an overwhelmingly large probability during a switching event~\cite{dykman1979theory,freidlin1998random} -- we need to find a nontrivial heteroclinic trajectory, $p_0(q)$, connecting the saddles $(q,p)=(q_1,0)$ and $(q_2,0)$, where $q_1=n_1/N$ and $q_2=n_2/N$~\cite{Dykman1994lfo,Kessler2007erf,Meerson2008nup,Escudero2009srm,Assaf2010ems}. Equating $H_0=0$ yields \begin{equation}\label{p0} p_0(q)=\ln\left[\mu(q)/\lambda(q)\right]. \end{equation} Thus, the action function is found by integrating: $S(q)=\int p(q')dq'$. The MST between the \textit{low} and \textit{high} states can be shown to satisfy in the leading order~\cite{Dykman1994lfo,Meerson2008nup,Escudero2009srm,assaf2017wkb} \begin{equation} \tau_{\mbox{\tiny{low}}\to \mbox{\tiny{high}}}\sim e^{N{\cal S}_0^{lh}} \end{equation} where ${\cal S}_0^{lh}=S(q_2)-S(q_1)=\int_{q_1}^{q_2}\ln[\mu(q)/\lambda(q)]dq,$ is the switching barrier between the \textit{low} and \textit{high} states, in the absence of an external force. Similarly, $\tau_{\mbox{\tiny{high}}\to \mbox{\tiny{low}}}\sim e^{N{\cal S}_0^{hl}}$, where ${\cal S}_0^{hl}=S(q_2)-S(q_3)=\int_{q_3}^{q_2}\ln[\mu(q)/\lambda(q)]dq,$ is the switching barrier between the \textit{high} and \textit{low} states. For $N\gg 1$, these MSTs are indeed exponentially large thus validating our a-priori metastability assumption (see Fig.~S2). Note that, in the unperturbed case, the pre-factor of $\tau$ can be accurately found as well~\cite{Escudero2009srm,Newby2015bsa}. In the following, rather than the MST, we will be interested in computing ${\cal P}^{lh}$ and ${\cal P}^{hl}$ -- the switching \textit{probabilities} over some time $t\ll \tau$ starting from the \textit{low} to \textit{high} and \textit{high} to \textit{low} states, respectively. For example, starting from the vicinity of $n_1$, ${\cal P}^{lh}$ is determined by the fraction of stochastic realizations of process~(\ref{reactions}) that cross $n_2$ in a given time $t$ out of the total number of realizations. Using the metastability ansatz, and demanding that the total probability be unity, we have ${\cal P}^{lh}=\sum_{n>n_2}P(n,t)\simeq 1-e^{-t/\tau}\simeq t/\tau$, where the last approximation holds for $t\ll\tau$; that is, ${\cal P}^{lh}$ is exponentially small at $t\ll\tau$. As a result, in the absence of external force, and using a similar argument for the calculation of ${\cal P}^{hl}$, the switching probabilities up to some arbitrary time $t\ll \tau$ satisfy in the leading order \begin{eqnarray}\label{prob} \hspace{-4mm}{\cal P}^{lh}\sim \tau_{\mbox{\tiny{low}}\to \mbox{\tiny{high}}}^{-1}\sim e^{-N{\cal S}_0^{lh}},\;\;{\cal P}^{hl}\sim \tau_{\mbox{\tiny{high}}\to \mbox{\tiny{low}}}^{-1}\sim e^{-N{\cal S}_0^{hl}}\!, \end{eqnarray} where logarithmic corrections depending on the arbitrary time $t$ and the pre-factor entering $\tau$ have been omitted. \subsection{Switching in the presence of an external perturbation} \textit{Low-to-high switch.\;} Let us begin by studying the case of \textit{low} to \textit{high} switch in the presence of an external perturbation. To do so, we add an external time-dependent force to the protein's expression rate, $\Lambda_n\to\Lambda_n+\phi(t)$, where $\phi(t)$ is applied for a finite duration $T$ such that \begin{equation}\label{force} \phi(t)=\begin{cases} 0 & t<0\;\; \mbox{or} \;\;t>T, \\ F & 0<t<T. \end{cases} \end{equation} As shown in Fig.~S3, the result of this perturbation is that the system is pushed nearer to the switching barrier and with some increased probability can then switch to the \textit{high} state. The switching probability depends on both the force $F$ and duration $T$ of the perturbation. Note that, in general, the system does not need to relax to a new quasi-stationary distribution during the perturbation. We now compute the dependence of the change in the \textit{low} to \textit{high} switching barrier ${\cal S}^{lh}$ on $F$ and $T$. \begin{figure}[t!] \begin{center} \includegraphics{Figure1.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Calculation of the optimal switching path for the self-regulating gene.} (a) Illustration of the optimal paths to switching without (black) and with (blue) perturbation. The path segments are labeled as pre-perturbation (pre), perturbation (pert), and post-perturbation (post), see text. The top path shows \textit{low} to \textit{high} switching and the bottom path shows \textit{high} to \textit{low}. The yellow areas give the decrease in the switching barriers due to the perturbation. In the \textit{low} to \textit{high} switch we have taken $F=0.15$ and $E_p=0.01$ such that $T=1.1$, whereas for the \textit{high} to \textit{low} we have taken $F=0.2$ and $E_p=0.005$ such that $T=2.06$. The other parameters are $\alpha_0=0.2$, $\beta=0.562$ and $h=4$. (b) Plot of $T-\int 1/\dot{q}\,dq$ [see equation (12)] vs $E_p$ for the \textit{low} to \textit{high} switch under three different values of the perturbation strength $F$: 0.15 (blue), 0.20 (orange), 0.25 (green). Also shown are (c) momentum $p$ vs coordinate $q$ and (d) the action ${\cal S}_0^{lh}$ vs perturbation time $T$ for the same three $F$ values.} \label{fig:TheorySummary} \end{figure} Given the time-dependent protocol $\phi(t)$ [Eq.~(\ref{force})] for the change in the protein's expression rate, one can perform a similar WKB analysis as done above in the unperturbed case. This yields two distinct Hamiltonians: the unperturbed Hamiltonian~(\ref{hamil0}) before and after the external perturbation has been applied, and the Hamiltonian during the perturbation with an elevated expression rate: \begin{equation} \label{hamilpertlh} H_p(q,p) = (e^p-1)\left[\lambda(q)+F-e^{-p}\mu(q)\right], \end{equation} where the subscript $p$ stands for the perturbed case. Each of the two Hamiltonians is an integral of motion on the corresponding time interval. Here, the optimal switching path $[q_{op}(t),q_{op}(t)]$ starts at the saddle point $(q,p)=(q_1,0)$ well before the perturbation has been applied, and ends at the saddle point $(q,p)=(q_2,0)$, well after the perturbation has been applied. It can be found by matching three separate trajectory segments: the pre-perturbation, perturbation, and post-perturbation segments (see Fig.~\ref{fig:TheorySummary}a)~\cite{assaf2009population,vilk2018population,israeli2020population}. The matching conditions at times $t=0$ and $t=T$ are provided by the continuity of the functions $q(t)$ and $p(t)$~\cite{continuity}. The pre- and post-perturbation segments must have a zero energy, $E=0$, so they are parts of the original zero-energy trajectory, $p_0(q)$, see Eq.~(\ref{p0}). Yet, for the perturbation segment, the energy $E=E_p$ is nonzero and a-priori unknown. It parameterizes the intersection points $q_1^{p}$ and $q_2^{p}$ between the unperturbed zero-energy line $p_0(q)$ [Eq.~(\ref{p0})] and the perturbed path, $p_{p}(q)$~\cite{assaf2009population,vilk2018population,israeli2020population}. The latter is the solution of $H_p(q,p)=E_p$, yielding: \begin{equation} \label{pint} p_{p}(q)=\ln\left\{\left[B+\sqrt{B^2 - 4AC}\right]/(2A)\right\}, \end{equation} where $A$, $B$ and $C$ are functions of $q$ and satisfy $A=\lambda(q)+F$, $B=\lambda(q)+F+\mu(q)+E_p$, and $C=\mu(q)$. To determine the energy $E_p$, we demand that the duration of the perturbation be $T$~\cite{assaf2009population,vilk2018population,israeli2020population}. Thus, we have: \begin{equation} \label{Ep} T = \int_0^T dt = \int_{q_1^{p}(E_p)}^{q_2^{p}(E_p)}\frac{dq}{\dot{q}[q,p_{p}(q,E_p)]}, \end{equation} where $q_{1,2}^{p}(E_p)$ are the intersection points between the unperturbed $p_0(q)$ and perturbed $p_{p}(q)$ trajectories, and $\dot{q}(q,p)=dq/dt$ is given by Hamilton's equation $\dot{q} = \partial H_p/\partial p = [\lambda(q)+F]e^p - \mu(q)e^{-p}$. Therefore, plugging $p_p(q)$ from Eq.~(\ref{pint}) into $\dot{q}$, Eq.~(\ref{Ep}) becomes: \begin{equation} \label{EpT} T=\int_{q_1^{p}(E_p)}^{q_2^{p}(E_p)}\left(B^2-4AC\right)^{-1/2}dq, \end{equation} where $A$, $B$ and $C$ are given below Eq.~(\ref{pint}). Finally, using the fact that the action satisfies ${\cal S}=\int_{-\infty}^{\infty}\{p_{op}(t)\dot{q}_{op}(t)-H[q_{op}(t),p_{op}(t),t]\}dt$~\cite{escudero2008persistence,assaf2008population}, and recalling that $dS = (\partial S/\partial t)dt+(\partial S/\partial q)dq$, we arrive at the perturbed switching barrier from the \textit{low} to \textit{high} states: \begin{equation} \label{actiongeneral} {\cal S}^{lh} = {\cal S}_0^{lh} - \int_{q_1^{p}(E_p)}^{q_2^{p}(E_p)} \left[p_0(q) - p_p(q,E_p) \right]dq - E_p T, \end{equation} where $E_p = E_p(F,T)$ can be found from Eq.~(\ref{EpT}), ${\cal S}_0^{lh}=\int_{q_1}^{q_2}p_0(q)dq$ is the unperturbed switching barrier from the \textit{low} to \textit{high} states, and we have used the fact that $\int_0^T H_p dt=E_p T$. Note that, for the birth and death rates of the SRG model~(\ref{Hillrates}), Eq.~(\ref{EpT}) has no closed form solution. To study the switching behavior under such perturbation, we first numerically evaluate the integral equation to find the matching $E_p$ (see Fig.~\ref{fig:TheorySummary}b). Given a numerical value for $E_p$, we then use Eq.~(\ref{actiongeneral}) to calculate the perturbed action (Fig.~\ref{fig:TheorySummary}c-d). Finally, we use Eq.~(\ref{prob}) to calculate the perturbed switching probability ${\cal P}^{lh}$. \begin{figure}[t!] \begin{center} \includegraphics{Figure2.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Change in the switching probability with perturbation.} (a) Change in switching probability vs perturbation strength $F$ for the \textit{low} to \textit{high} switch. Symbols and lines give numerical and theoretical values, respectively. A constant prefactor of 0.15 was used with the theory. Data are shown for three values of the perturbation time $T$: 0.5 (blue $\times$), 0.75 (orange $\circ$), 1.0 (green $\bigtriangleup$). (b) Change in switching probability vs perturbation strength for the \textit{high} to \textit{low} switch with perturbation times 0.75 (blue $\times$), 1.0 (orange $\circ$), and 1.5 (green $\bigtriangleup$), and a prefactor of 0.2. (c+d) Switching probabilities in the $\beta$ vs $h$ plane for the \textit{low} to \textit{high} switch (c) and the \textit{high} to \textit{low} switch (d).} \label{fig:SRGSimTheoryComp} \end{figure} To check our theory, we compared the theoretical dependence of ${\cal P}^{lh}$ on $F$ and $T$ against Monte Carlo simulations \cite{Roberts2013lmh}. We calculated ${\cal P}^{lh}$ for a range of $F$ values for three different perturbation times $T$. Because we are trying to develop a theory that is directly relatable to biological experiments, the $F$ values were limited such that ${\cal P}^{lh} > 1 \times 10^{-6}$. Detecting a cell phenotype with a frequency of one per million cells is at the limit of feasibility using flow cytometry techniques. We also limited the comparison to ${\cal P}^{lh} < 1 \times 10^{-2}$, above which the switching barrier ${\cal S}^{lh}$ starts to become low enough such that the WKB approximation is invalidated~\cite{Escudero2009srm}. Figure~\ref{fig:SRGSimTheoryComp}a, shows excellent agreement between theory and numerics. Finally, our result for the switching probability in the aftermath of an external perturbation [Eq.~(\ref{actiongeneral})] can be simplified in three particular limits: (i) close to the bifurcation limit, where the \textit{low} and intermediate fixed points merge and the switching barrier vanishes, (ii) for weak external force, $F\ll 1$, and (iii) in the case of $h\to\infty$, \textit{i.e}, a very steep regulatory function. Close to the bifurcation limit, we find that ${\cal S}^{lh}$ depends only on the \textit{impulse} of the perturbation, $FT$, see Discussion and Appendix A; in the case of weak force, we show that the increase in the switching probability is exponential in $F$, see Appendix B, while in the limit of $h\to\infty$, where the expression rate is given by a heaviside step function, we find an explicit expression for ${\cal S}^{lh}$ as function of $F$ and $T$, see Appendix C. ~\\ \textit{High-to-low switch.\;} We now turn to the case of switching from the \textit{high} to \textit{low} states in the presence of an external perturbation. Here, switching can be driven, {\it e.g.}, by increasing the protein's degradation rate, $\mu(n)\to\mu(n)[1+\phi(t)]$, where $\phi(t)$ is given by Eq.~(\ref{force}), which yields the perturbed Hamiltonian \begin{equation} \label{hamilperthl} H_p(q,p) = (e^p-1)\left[\lambda(q)-e^{-p}\mu(q)(1+F)\right]. \end{equation} As a result, the intersection points $q_2^{p}$ and $q_3^{p}$ are now determined by equating $p_0(q)$ from Eq.~(\ref{p0}) with the perturbed path $p_{p}(q)$, given by Eq.~(\ref{pint}), with $A=\lambda(q)$, $B=\lambda(q)+\mu(q)(1+F)+E_p$, and $C=\mu(q)(1+F)$. To find $E_p$, we use Eq.~(\ref{hamilperthl}) to write Hamilton's equation $\dot{q} = \partial H_p/\partial p = \lambda(q)e^p - \mu(q)(1+F)e^{-p}$. Replacing the lower integration limit of Eq.~(\ref{Ep}) by $q_3^{p}(E_p)$, we find \begin{equation} \label{EpThl} T=\int_{q_2^{p}(E_p)}^{q_3^{p}(E_p)}\left(B^2-4AC\right)^{-1/2}dq, \end{equation} where $A$, $B$ and $C$ are given below Eq.~(\ref{hamilperthl}), and we have swapped the integration limits such that the integrand is positive. Finally, the switching barrier from the \textit{high} to \textit{low} states is given by Eq.~(\ref{actiongeneral}) upon replacing the lower integration limit by $q_3^{p}(E_p)$, and ${\cal S}_0^{lh}$ by ${\cal S}_0^{hl}$. Fig.~\ref{fig:SRGSimTheoryComp}b shows a comparison of the perturbed \textit{high} to \textit{low} switching probabilities from Monte Carlo simulations with ${\cal P}^{hl}$ calculated using the above action along with Eq.~(\ref{prob}). They are again in excellent agreement. Notably, in all of our calculations we have assumed a square pulse. Yet, such a pulse is practically impossible to realize experimentally. Instead, one expects experimental signals to be noisy, and to gradually rise and drop slowly rather than instantaneously. Nevertheless, we claim that the exact form of the pulse will not change the above results qualitatively. For example if instead of an instantaneous rise and drop, we have a linear rise in the pulse up to some maximal value, and a linear drop back to the original value, one can use the same mathematical formalism as above. Indeed, in this case the optimal path will be comprised of five segments rather than three: a pre- and post-perturbation segment, a perturbed segment, and two segments with intermediate values of force corresponding to the \textit{average} force value in the regimes of linear increase and decrease of the pulse. \subsection{Inference of the epigenetic landscape} We now proceed to our main idea which is to use our theoretical formalism to infer the epigenetic landscape of a regulatory network, given experimental data of the network's response to external perturbations. The goal is to find the set of parameters for the regulatory network that best recapitulate the observed responses. We first set out to determine the feasibility of inferring the parameters from the perturbation data. For the SRG, two key parameters that control the shape of the landscape are $\beta$, which influences the barrier position, and $h$, which influences the landscape steepness. We desired to know to what extent these two parameters could be independently distinguished using only the switching probability. To this end, we used our theory to calculate the dependence of ${\cal P}^{lh}$ and ${\cal P}^{hl}$ on $\beta$ and $h$. As can be seen in Fig.~\ref{fig:SRGSimTheoryComp}c+d, when switching either from \textit{low} to \textit{high} or from \textit{high} to \textit{low}, $\beta$ and $h$ can be changed simultaneously to maintain the same switching probability. This corresponds, \textit{e.g.}, to moving the barrier position closer to the starting state while increasing the height of the barrier. Yet, by considering switching in \textit{both} directions simultaneously, both $\beta$ and $h$ are uniquely constrained, and there is only one pair ($\beta$,$h$) consistent with both the \textit{low} to \textit{high} and \textit{high} to \textit{low} pulling. To perform parameter inference we adopted a \textit{maximum likelihood} approach. To generate synthetic experimental data we performed Monte Carlo simulations of the stochastic process~(\ref{reactions}), and measured for various values of $F$ and $T$ the number of realizations $k$, out of $m$ total realizations, that switched phenotypes after some designated time. For all of our simulations we used $m= 1 \times 10^{6}$. Given the switching probability ${\cal P}$ for each realization, and assuming that the sequence of ``experiments" or numerical realizations is independent and identically distributed, the probability $P(k)$ that exactly $k$ realizations out of $m$ switch is given by a binomial distribution \begin{equation} P(k)=\binom{m}{k} {\cal P}^k(1-{\cal P})^{m-k}. \end{equation} The likelihood of parameters $\theta$ producing the observed data $k$ given all of the various experimental $F$ and $T$ conditions is then given by the product of all $P(k)$ values \begin{equation} \hspace{-0.5mm}{\cal L}(\theta|k)=\!\!\!\!\!\prod_{\{T_i,F_j\}}\!\!\!\!\!P_{\theta}(k_{i,j})=\!\!\prod_{i,j}\!\binom{m}{k_{i,j}} \!{\cal P}_{\theta}^{k_{i,j}}(1\!-\!{\cal P}_{\theta})^{m-k_{i,j}}, \label{likelihood} \end{equation} where $i$ and $j$ denote the indices of the current values of $T$ and $F$, and $k_{i,j}$ denotes the number of realizations that switched given that $T=T_i$ and $F=F_j$. Note that, the likelihood function in Eq.~(\ref{likelihood}) includes both \textit{low} to \textit{high} and \textit{high} to \textit{low} pulling experiments. Importantly, the probability of success ${\cal P}$ is given by Eq.~(\ref{prob}); as we have shown, it depends, in addition to $T$ and $F$, on the parameters $\theta$ defining the birth and death rates. By maximizing the likelihood function ${\cal L}$, we find the most probable parameter set for the birth and death rates $\Lambda_n$ and ${\cal M}_n$, given the perturbation data. \begin{figure}[t!] \begin{center} \includegraphics{Figure3.pdf} \end{center} \vspace{-1.0cm} \caption{{\bf Log-likelihood function for inference of model parameters.} (top) The likelihood in the $N$ vs $\alpha_0$ plane where other parameters are fixed to their MLE. (bottom) The same for the $\beta$ vs $h$ plane. The white $\times$ symbols show the MLE and the white $\circ$ symbols show the true parameter values. The likelihood function is computed based on the data presented in Fig.~\ref{fig:SRGSimTheoryComp}.} \label{fig:SRGLikelihood} \end{figure} We used the synthetic data set shown in Fig.~\ref{fig:SRGSimTheoryComp}a+b along with Eq.~(\ref{likelihood}) to infer the maximum likelihood estimate (MLE) for the three model parameters $N$, $\beta$, and $h$. We assume that $\alpha_0$ can be obtained directly from experimental measurement of the ratio of the stable fixed points. Again, we used only $F$ and $T$ values with $1 \times 10^{-6} < {\cal P} < 1 \times 10^{-2}$, which amounted to $\sim$35 experimental conditions combined from both switching directions. Fig.~\ref{fig:SRGLikelihood} and Fig.~S8 show the likelihood distribution resulting from the inference. The MLE was $N=1554$, $\beta=0.5718$, and $h=3.492$, which was in excellent agreement with the true parameter values of $N=1500$, $\beta=0.5715$, and $h=3.5$. Because the WKB is a logarithmic theory, there is a preexponent in Eq.~(\ref{prob}) that must be estimated in order to compute the absolute value of ${\cal P}$. Typically, in a WKB theory this prefactor is obtained from fitting the functional dependence of the theory to the data. Here, we took the approach of obtaining the prefactor for both ${\cal P}^{lh}$ and ${\cal P}^{hl}$ directly from the likelihood estimation. We maximized likelihood over a range of prefactors and then used the set with the highest likelihood for all remaining calculations (see Fig.~S4). Comparison of the theory with optimized prefactors and parameters to the true parameters shows that the optimization leads to a moderate increase in likelihood while maintaining the excellent fits vs $T$ and $F$ (see Fig.~S12a+b). \begin{figure}[t!] \begin{center} \includegraphics{Figure4.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Comparison of actual and inferred probability distributions for the self-regulating gene.} (a) The actual (solid blue) and inferred (dashed orange) PDFs for the \textit{low} state, where $X$ denotes the protein copy number. (b) The same for the \textit{high} state. The model parameters were $N=1500$, $\alpha_0=0.2$, $\beta=0.5715$ and $h=3.5$ (a+b) and $h=3.65$ (c+d).} \label{fig:SRGFitPDF} \end{figure} Finally, we used the MLE parameters to reconstruct the stationary probability density function (PDF) that corresponds to the epigenetic landscape. Fig.~\ref{fig:SRGFitPDF}a+b shows a comparison of the inferred and true PDFs, which we calculated for a given set of parameters using an enhanced sampling technique \cite{Klein2019aec}. The agreement is again excellent and shows that by using only $\sim$35 perturbation data points we are able to successfully reconstruct the epigenetic landscape of the model. To further test our ability to use the theory to infer the network's PDF, we tested several other SRG parameters sets with increasing switching barrier heights (see Figs.~S4--S12). Fig.~\ref{fig:SRGFitPDF}c+d shows that for $h=3.65$ a greater discrepancy appears between the inferred and actual landscapes, with $\sim$5\% error in the height of the switching barrier. As the switching barrier continues to increase so does the estimated error (Fig.~S13). For $h=4.0$ the error is $\sim$10\% of the barrier height. However, at this value of $h$ the MST is $\sim{}10^{17}$. At these very long switching times, emanating from the large landscape steepness, additional perturbation points with ${\cal P} < 1 \times 10^{-6}$ may be necessary to accurately infer landscapes with a smaller error margin. \subsection{One-state mRNA-protein model} \textit{The unperturbed case.\;} Above, we used the SRG as a basis to infer the landscape of a 1D switch. To see how our method can be generalized to higher-dimensional systems, we now repeat the calculations done above for a 2D system: the one-state mRNA-protein model with positive feedback that displays bistability. We explicitly account for mRNA noise which has been shown to greatly affect the switching properties in genetic circuits \cite{Assaf2011dsg}. We consider a one-state gene-expression model where transcription depends on the protein copy number via positive feedback. The deterministic rate equation describing the dynamics of the average numbers of mRNA and proteins, respectively denoted by $\bar{m}$ and $\bar{n}$, satisfies: \begin{equation}\label{REmrna} \dot{\bar{m}}=\Lambda_{\bar{n}}/b-\gamma\bar{m}\;;\;\;\;\dot{\bar{n}}=\gamma b\bar{m}-\bar{n}. \end{equation} Here, $\gamma\gg 1$ is the mRNA degradation rate (relevant \textit{e.g.} for bacterial systems~\cite{Shahrezaei2008ads}), $\gamma b$ is the protein translation rate, such that $b$ is the burst size (the number of proteins created from a single instance of mRNA) and all rates are rescaled by the protein's degradation rate or cell division rate. Furthermore, $\Lambda_{\bar{n}}$ is a sigmoid-like function that ensures bistability (see Fig.~S14). By choosing the mRNA transcription rate to be $\Lambda_{\bar{n}}/b$, we made sure that the fixed points of the protein satisfy $\Lambda_{\bar{n}}=\bar{n}$, which coincide with those of Eq.~(\ref{RE}) for the SRG, upon choosing ${\cal M}_{\bar{n}}=\bar{n}$. To find the switching probability we write down the master equation describing the dynamics of $P_{m,n}$ -- the probability to find $m$ mRNA molecules and $n$ proteins: \begin{eqnarray}\label{MEmrna} \hspace{-5mm}&&\dot{P}_{m,n}\!=\![\Lambda_n/b](P_{m-1,n}\!-\!P_{m,n})\!+\!\gamma b m (P_{m,n-1}\!-\!P_{m,n})\nonumber\\ \hspace{-5mm}&&+\gamma[(m\!+\!1) P_{m\!+\!1,n}\!-\!mP_{m,n}]+(n+1)P_{m,n\!+\!1}\!-\!nP_{m,n}. \end{eqnarray} Following the SRG calculations above, we use the metastable ansatz $P_{m,n}=\pi_{m,n}e^{-t/\tau}$ in Eq.~(\ref{MEmrna}), and employ the WKB approximation, $\pi_{m,n}=\pi(x,y)=e^{-NS(x,y)}$. Here $S(x,y)$ is the action, $N\gg 1$ is the typical protein copy number at the \textit{high} state, and $x=m/N$ and $y=n/N$ are the mRNA and protein concentrations, respectively. This yields a stationary Hamilton-Jacobi equation $H(x,y,\partial_x S,\partial_y S)=0$ with Hamiltonian~\cite{Vardi2013bye,assaf2017wkb} \begin{equation}\label{Hammrna} H\!=\!y(e^{-p_y}-1)+\gamma b x(e^{p_y}-1)+\gamma x(e^{-p_x}-1)+\frac{\lambda(y)}{b}(e^{p_x}-1)\!, \end{equation} where $p_x=\partial_x S$ and $p_y=\partial_y S$ are the mRNA and protein associated momenta, respectively, and $\lambda(y)=\Lambda(y)/N$. The switching path from the \textit{low} to \textit{high} states (or vice versa) corresponds to a heteroclinic trajectory of Hamiltonian~(\ref{Hammrna}) connecting the saddle points $(x,y,p_x,p_y)=(y_{low}/(\gamma b),y_{low},0,0)$ and $(y_{high}/(\gamma b),y_{high},0,0)$ in the 4D phase space; it can be found by solving the Hamilton equations $\dot{x}=\partial_{p_x} H$, $\dot{y}=\partial_{p_y} H$, $\dot{p}_x=-\partial_{x} H$, and $\dot{p}_y=-\partial_{y} H$, which read \begin{eqnarray} &&\dot{x}=[\lambda(y)/b]e^{p_x}\!-\!\gamma xe^{-\!p_x},\;\;\dot{p}_x=\gamma b(1\!-\!e^{p_y})\!+\!\gamma(1\!-\!e^{-\!p_x}),\nonumber\\ &&\dot{y}=\gamma b xe^{p_y}\!-\!ye^{-\!p_y},\;\;\dot{p}_y=1\!-\!e^{-\!p_y}\!+\![\lambda'(y)/b](1\!-\!e^{p_x})\!.\label{Hameqs} \end{eqnarray} While a numerical solution can be found for any set of parameters, in order to make analytical progress we consider the limit where the mRNA lifetime is short compared to that of the protein, $\gamma\gg 1$, which holds \textit{e.g.}, in bacteria. In this limit, the mRNA concentration and momentum, $x(t)$ and $p_x(t)$, instantaneously equilibrate to some (slowly varying) functions of $y$ and $p_y$~\cite{assaf2008noise}. Putting $\dot{x}=\dot{p}_x=0$ in the first two of Eqs.~(\ref{Hameqs}), we obtain $e^{-p_x}=b(1-e^{p_y})+1$ and $x=[\lambda(y)/(\gamma b)]/[b(1-e^{p_y})+1]^{2}$. Using these relations in Hamiltonian~(\ref{Hammrna}) we arrive at a \textit{reduced} Hamiltonian for $y$ and $p_y$ only. Denoting $y\equiv q$ and $p_y\equiv p$, the effective 1D Hamiltonian reads~\cite{Vardi2013bye,assaf2017wkb} \begin{equation}\label{hamilmran0} H_0=q(e^{-p}-1)-\lambda(q)\frac{1-e^{p}}{b(1-e^{p})+1}, \end{equation} where the subscript $0$ denotes the unperturbed case. This Hamiltonian effectively accounts for the fact that the proteins are produced in geometrically distributed bursts with mean $b$, which in turn asymptotically accounts for the mRNA noise when $\gamma\gg 1$. This Hamiltonian is our starting point for treating this system under external perturbation, and serves as the unperturbed Hamiltonian, similarly as Hamiltonian~(\ref{hamil0}). Note that, as done for the SRG model above, using this unperturbed Hamiltonian [Eq.~(\ref{hamilmran0})], one can find the unperturbed action which yields the PDF, $P_{m,n}$, and MST, in the absence of external perturbation, see Fig.~S15+S16. ~\\ \textit{The perturbed case.\;} We now repeat the calculations done for the SRG in the perturbed case. Note that, here instead of perturbing the protein's expression and degradation rates, we perturb those of the mRNA. While both cases can be studied theoretically, we desired to study the impact of transcriptional perturbations as being more closely aligned with existing experimental techniques. We start by perturbing the mRNA's transcription rate $\Lambda_n\to\Lambda_n+\phi(t)$, where $\phi(t)$ is given by Eq.~(\ref{force}). As before, the optimal path is made of three segments: an unperturbed segment before the onset of perturbation, a perturbed segment while the perturbation is applied, and an unperturbed segment after the perturbation has terminated. The unperturbed segment is found by equating Hamiltonian~(\ref{hamilmran0}) to zero \begin{equation}\label{p0mrna} p_0(q)=\ln \{[(b+1)q]/[b q+\lambda(q)]\}. \end{equation} The perturbed segment can be found by using Hamiltonian~(\ref{hamilmran0}) with the perturbed transcription rate \begin{equation} \label{hamilpertlhmrna} H_p(q,p) = q(e^{-p}-1)-[\lambda(q)+F]\frac{1-e^{p}}{b(1-e^{p})+1}, \end{equation} and equating it to $E_p$; here the subscript $p$ stands for perturbation. The resulting perturbed segment reads \begin{equation}\label{pintmrna} p_{p}(q)=\ln\left\{\left[B+\sqrt{B^2 - 4AC}\right]/(2A)\right\}, \end{equation} where $A=\lambda(q)+F+b(E_p+q)$, $B=E_p(b+1)+\lambda(q)+F+q(1+2b)$, and $C=(1+b)q$. To determine the energy $E_p$, we use Eq.~(\ref{Ep}) with $\dot{q}$ found from Hamiltonian~(\ref{hamilpertlhmrna}). By doing so, condition~(\ref{Ep}) becomes: \begin{equation}\label{EpTmrna} T=\int_{q_1^{p}(E_p)}^{q_2^{p}(E_p)}\frac{2A+b\left(2A-B-\sqrt{B^2-4AC}\right)}{2A\sqrt{B^2-4AC}}dq. \end{equation} Finally, the action is given by Eq.~(\ref{actiongeneral}) with $E_p$ from Eq.~(\ref{EpTmrna}), while ${\cal S}_0^{lh}=\int_{q_1}^{q_2}p_0(q)dq$ is the unperturbed action from the \textit{low} to \textit{high} states. Next, we perturb the degradation rate of the mRNA such that $\gamma m$ becomes $\gamma(1+F)m$. As a result, after some algebra the perturbed Hamiltonian becomes \begin{equation} \label{hamilperthlmrna} H_p(q,p) = q(e^{-p}-1)-\lambda(q)\frac{1-e^{p}}{b(1-e^{p})+1+F}. \end{equation} Equating $H_p(q,p)=E_p$, the perturbed segment yields \begin{equation}\label{pintmrnahl} p_{p}(q)=\ln\left\{\left[B-\sqrt{B^2 - 4AC}\right]/(2A)\right\}, \end{equation} where $A=\lambda(q)+b(E_p+q)$, $B=E_p(1+b+F)+\lambda(q)+q(1+2b+F)$, and $C=q(1+b+F)$. To determine the energy $E_p$, we use Eq.~(\ref{Ep}) with $\dot{q}$ found from Hamiltonian~(\ref{hamilperthlmrna}). By doing so, condition~(\ref{Ep}) becomes: \begin{equation}\label{EpTmrnahl} T=\int_{q_2^{p}(E_p)}^{q_3^{p}(E_p)}\frac{2A(1+F)+b\left(2A-B+\sqrt{B^2-4AC}\right)}{2A\sqrt{B^2-4AC}}dq, \end{equation} where we have swapped the integration limits such that the integrand is positive. Finally, the action is given by Eq.~(\ref{actiongeneral}) with $E_p$ from Eq.~(\ref{EpTmrnahl}), while ${\cal S}_0^{hl}=\int_{q_3}^{q_2}p_0(q)dq$ is the unperturbed action from the \textit{high} to \textit{low} states. \begin{figure}[t!] \begin{center} \includegraphics{Figure5.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Perturbation effect on the mRNA-protein model.} (a) Change in switching probability vs perturbation strength $F$ for the \textit{low} to \textit{high} switch with $b=4$. Symbols and lines give numerical and theoretical values, respectively. Theoretical values were calculated using the maximum likelihood parameter estimates. Data are shown for five values of the perturbation time $T$: 0.35 (blue $\times$), 0.5 (orange $\circ$), 0.75 (green $\bigtriangleup$), 1.0 (red $\bigtriangledown$), 2.0 (purple $+$). (b) Change in switching probability vs $F$ for the \textit{high} to \textit{low} switch with $T= $ 1.0 (blue $\times$), 1.5 (orange $\circ$), 2.25 (green $\bigtriangleup$), 3.0 (red $\bigtriangledown$), 4.5 (purple $+$). (c+d) As above except for $b=3$.} \label{fig:MRNASimTheoryComp} \end{figure} To test the mRNA-protein model, we again ran sets of Monte Carlo simulations to calculate the dependence of ${\cal P}^{lh}$ and ${\cal P}^{hl}$ on $F$ for five values of $T$ with $b=4$. We then performed MLE estimation from these data, see Fig.~S18+S23. Fig.~\ref{fig:MRNASimTheoryComp}a+b shows an excellent agreement between the simulations and theory with the MLE parameters. Likewise, the reconstructed PDFs shown in Fig.~\ref{fig:MRNAFitPDF}a+b are in good agreement with the actual PDFs. Finally, we wanted to study the impact of increasing the barrier height while maintaining the position of the fixed points. To this end, we varied $b$ in a range of $1$--$5$ (Fig.~S17-S28). For parameter sets with longer switching times the low $F$ region is not well sampled (Fig.~\ref{fig:MRNASimTheoryComp}c+d), which leads to an increased error in the predicted switching barrier (Fig.~\ref{fig:MRNAFitPDF}c+d). With $b=1$ and a switching time of $1 \times 10^{20}$ the relative error in the barrier height is $\sim$20\%. As with the SRG, these errors could be reduced by including lower probability events in the MLE. \begin{figure}[t!] \begin{center} \includegraphics{Figure6.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Comparison of actual and inferred probability distributions for the mRNA-protein model.} (a) The actual (solid blue) and inferred (dashed orange) PDFs for the \textit{low} state with $b=4$. (b) The same for the \textit{high} state. (c+d) The same as (a+b) except for $b=3$.} \label{fig:MRNAFitPDF} \end{figure} \subsection{Discussion} \subsubsection{Generic models} We would now like to apply our methodology to arbitrarily complex networks, not only the simple models discussed above. A good example in this realm is the genetic toggle switch where two proteins negatively regulate each other using additional transcription factors~\cite{Allen2005srs,lipshtat2006genetic,Biancalani2015gts}. While a generalization to higher-dimensional systems is highly nontrivial, in what follows we will attempt to lay the theoretical grounds for such a generalization. Let us consider a gene-regulatory network with $M$ species, $\mathbf{n}=(n_A,n_B,\dots,n_M)$, describing \textit{e.g.}, $M$ different proteins that regulate each other, where $n_A,n_B,\dots,n_M$ denote the copy numbers of the various proteins $A$, $B$, $\dots$, $M$. It is our aim to find an effective landscape for the protein of interest, say $A$. In general, the production of $A$ is regulated by all other proteins including $A$, while the degradation takes the usual form: \begin{equation} n_A\xrightarrow{\phi(n_A,n_B,\dots,n_M)}n_A+1,\quad\quad n_A\xrightarrow{n_A}n_A-1, \end{equation} where $\phi(n_A,n_B,\dots,n_M)$ is a function of all proteins or transcription factors in the circuit including $A$. We seek to infer an effective birth or production rate $\tilde{\phi}(n_A)$, which is a 1D projection of the M-dimensional production rate $\phi(n_A,n_B,\dots,n_M)$. This will allow to effectively describe the dynamics of protein $A$, and to infer the same marginal PDF of $A$ obtained in the M-dimensional case. Moreover, this will allow one to find the quasi-potential landscape of $A$ and the relative stability of its phenotypes. Previously, when the regulatory network was known, we have used the master equation to account for demographic noise. Here, since we have an effective birth-death process for $A$, and the relation between the drift and diffusion is a-priori unknown, we will instead describe the stochastic dynamics of $A$ by a Langevin equation: \begin{equation} \label{LangevinEqA} \dot{q}=f(q)+\sqrt{D(q)/N}\eta(t). \end{equation} Here, $q=n_A/N$ is the density of $A$, and $N$ is its typical copy number in the \textit{high} state. Moreover, $f(q)=\tilde{\phi}(n_A)/N-q\,$ and $D(q)$ are the effective drift and diffusion functions, see below, while $\eta(t)$ is a delta-correlated normal random variable with mean $0$ and variance $1/dt$. In Eq.~(\ref{LangevinEqA}) both $f(q)$ and $D(q)$ are unknown and need to be found from perturbation experiments as done above. As we are interested in bistable systems, $f(q)$ has to be (at least) a cubic polynomial, to give rise to three fixed points at the deterministic level. We will assume for concreteness that the production rate is given by a Hill function such that: $f(q)=\alpha_0+(1-\alpha_0)q^h/(q^h+\beta^h)-q$. Naturally, other functional forms for $f(q)$ are possible as long as they yield three fixed points. Choosing a diffusion function is more intricate. In general, when a master equation is approximated by the van-Kampen system size expansion, one finds that the diffusion function $D(q)$ entering the resulting Fokker-Planck (or Langevin) equation, satisfies $D(q)=\lambda(q)+\mu(q)$~\cite{Gardiner2004hsm,assaf2017wkb}, where $\lambda(q)$ and $\mu(q)$ are the birth and death rates, respectively. Since a bistable system is obtained when $f(q)=\lambda(q)-\mu(q)$ is (at least) a cubic polynomial, we argue that taking $D(q)$ as a cubic polynomial $D(q)=D_0+D_1q+D_2q^2+D_3q^3$ should suffice to describe the effective noise in generic systems. In simpler cases, see below, a lower-order polynomial may also suffice. For example, applying the van-Kampen system size expansion on the SRG model, master equation~(\ref{ME}) becomes \begin{eqnarray}\label{FPE} \hspace{-5.0mm}\frac{\partial P(q,t)}{\partial t}=-\frac{\partial}{\partial q}[f(q)P(q,t)]+\frac{1}{2N}\frac{\partial^2}{\partial q^2}[D(q)P(q,t)], \end{eqnarray} where $f(q)$ and $D(q)$ are defined above, and $\lambda(q)$ and $\mu(q)$ are defined in Eq.~(\ref{Hillrates}). The zero-current, stationary solution of this Fokker-Planck equation reads~\cite{Gardiner2004hsm,assaf2017wkb} \begin{equation}\label{PDFFP} P(n)\simeq {\cal A}\exp\left[N\int_{q}\frac{2f(q)}{D(q)}dq\right], \end{equation} where to remind the reader, $n=Nq$ is the protein copy number, and ${\cal A}$ is a normalization constant, such that $\int_{0}^{\infty}P(n)dn=1$~\cite{footNote}. Now, let us observe what happens when we replace $D(q)$ by a simple polynomial. In Fig.~\ref{fig:diffusioncoeff}a shown is a comparison between the diffusion function, $D(q)=\lambda(q)+\mu(q)$, and a linear fit, $D(q)=2q$. The fact that the curves agree well is not surprising, as in the vicinity of the fixed points, $\lambda(q)=\mu(q)=q$, and thus $D(q)\simeq 2q$. In Fig.~\ref{fig:diffusioncoeff}b we compare the PDF, given by Eq.~(\ref{PDFFP}), with the approximated PDF, obtained by substituting $D(q)=2q$ in Eq.~(\ref{PDFFP}). As one can see, even a linear approximation of $D(q)$ yields a decent agreement between the PDFs. As explained above, for generic systems we argue that a cubic polynomial should suffice in order to accurately capture the switching landscape. \begin{figure}[t!] \begin{center} \includegraphics[width=9.108cm]{Figure7.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Comparison between the exact and approximated diffusion functions and probability distributions for the SRG model.} (a) The diffusion function obtained from a van-Kampen system size expansion (red line) as a function of $q=n/N$, compared with its linear fit (blue line). (b) The PDF given by Eq.~(\ref{PDFFP}) (red line) as a function of $n$ compared with the approximated PDF (blue line) computed with the linear diffusion function. Here, parameters were $\alpha_0=0.1$, $\beta=0.5$, $h=3$ and $N=100$, such that the fixed points satisfy $q_1\simeq 0.11$, $q_2\simeq 0.39$ and $q_3\simeq 0.85$.} \label{fig:diffusioncoeff} \end{figure} Now, as done above, we propose to use perturbation experiments to infer the effective 1D drift and diffusion functions, using the MLE. To do so, we can either add a temporary perturbation of magnitude $F$ and duration $T$ to the production rate of $A$, or increase its degradation rate by a factor of $(1+F)$ as before. The problem is that if we apply a force in an experiment, involving all proteins $A$, $B$, $\dots$, $M$, it is not at all clear how this force is projected onto the 1D space we are interested in. To continue, we can denote by ${\cal F}$ the 1D projection of the force $F$ applied in the M-dimensional space, such that ${\cal F}=\psi(F)$, where $\psi$ is some unknown function. In simple cases, for which the projection of the switching trajectory from a M-dimensional to a 1D space does not include multiple crossings of the switching barrier, we expect the function $\psi$ to be monotone increasing with $F$ and unique. However, for generic systems this is not the case, and finding $\psi$ is expected to be more involved, requiring a significant theoretical and numerical effort. Assuming for a moment that the effective 1D force is known, we can continue as in the simple cases discussed above. Using the WKB ansatz $\pi(q)\sim e^{-NS(q)}$ in the (stationary version of the) Fokker-Planck equation~(\ref{FPE}), to leading order in $N\gg 1$ one arrives at a stationary Hamilton-Jacobi equation with an unperturbed Hamiltonian: \begin{equation} H_0(q,p)=p\left[f(q)+pD(q)/2\right], \end{equation} where $p=dS/dq$ is the conjugate momentum. As a result, the unperturbed optimal path, $p_0(q)$, satisfies $p_0(x)=-2f(q)/D(q)$, which allows finding the action barrier as before, both from the \textit{low} to \textit{high}, and from the \textit{high} to \textit{low} states, see text below Eq.~(\ref{p0}). At this point, we can repeat the calculations done above in the perturbed case, by taking $\lambda(q)\to\lambda(q)+{\cal F}$, and $\mu(q)\to\mu(q)(1+{\cal F})$. This allows finding the perturbed action barrier, both from the \textit{low} to \textit{high}, and \textit{high} to \textit{low} states, which then allows one, using multiple switching experiments and the MLE, to extract the parameters defining $f(q)$ and $D(q)$. However, we have not yet determined how the effective 1D force ${\cal F}$ depends on the original pulling force $F$, and thus, applying this theory to realistic experiments remains far from being trivial. A possible way to study this functional dependence is to look at a 1D projection of deterministic trajectories of the full M-dimensional system upon applying a constant force for a finite duration. Here, understanding, \textit{e.g.}, the influence of the perturbation on the relaxation dynamics near a fixed point, or other dynamical properties, may allow one to get insight on how ${\cal F}$ depends on $F$. Yet, we leave this task to a future publication. \subsubsection{Dependence of switching probability on impulse} In physical terms $FT$ represents the total \textit{impulse} we apply to the system, which is equal to the force exerted on a particle multiplied by the duration of the force. In a mechanical system, when a constant force $F$ is applied on a particle for a duration $T$ in the direction of the particle's momentum, in the absence of dissipation or heat production, the particle's momentum is increased by $FT$. This increase is independent on $F$ or $T$ separately; that is, applying a small force for a long duration is equivalent to applying a large force for a short duration. This relationship is exactly what we observe for small impulses in our system. Fig.~\ref{fig:SRGBifurcation} shows the change in the switching barrier \textit{e.g.} between the \textit{low} and \textit{high} states, $\Delta{\cal S}\equiv {\cal S}^{lh}-{\cal S}^{lh}_0$ as a function of total impulse $FT$. One can see that for low $FT$ the change in the switching barrier depends linearly on the product $FT$ and not on $F$ or $T$ separately. However, as the impulse increases the change in switching barrier is no longer a unique function of $FT$. As the impulse duration $T$ is increased (high $FT$ with low $F$) not all of the impulse results in a reduction in the switching barrier. This discrepancy indicates that there is some sort of dissipation or uncontrolled heat/entropy production in the system. In contrast, when the system is near bifurcation we do expect the change in action to be a unique function of $FT$. In Appendix A we derive a simple analytical expression for the dependence of the switching barrier on $FT$ close to the bifurcation limit. As can be seen in Fig.~S29, the effect of the perturbation depends only on the product $FT$ in this case. \begin{figure}[t!] \begin{center} \includegraphics{Figure8.pdf} \end{center} \vspace{-0.5cm} \caption{{\bf Dependence of change in the switching barrier on impulse.} Distribution of the perturbed switching barrier $\Delta{}S = {\cal S}^{lh}-{\cal S}^{lh}_{0}$ versus the total applied impulse $F\,T$ for the SRG model. Each symbol represents a perturbation with a different $F$, which is given by the color. The solid line shows the bifurcation theory given in Eq.~(\ref{actionbifur}).} \label{fig:SRGBifurcation} \end{figure} Even though the switching barrier is a unique function of $FT$ close to bifurcation, see Eq.~(\ref{actionbifur}), we can see that the change in switching barrier is linear with $FT$ only at low impulse. Defining the \textit{efficiency} of inducing a switch by the change in the switching barrier divided by the impulse, $\Delta{\cal S}/(FT)$, from Eq.~(\ref{actionbifur}) we see that the efficiency decreases with $FT$. That is, the process of inducing a switch becomes less efficient as $FT$ is increased, while efficiency is maximized for weak impulses with vanishingly-small dissipation. \subsubsection{Role of perturbation energy $E_p$} What is the physical meaning of the perturbation energy $E_p$ which appears throughout our derivation? Mathematically, it is determined by a complicated function of the force $F$ and its duration $T$. However, looking at the result close to bifurcation (see Appendix A), the energy $E_p$ can be written as $E_p=E_0[1-(FT)^2/4]$, where $E_0$ is the maximal value of $E_p$ which is obtained as $F$ and/or $T$ vanish. Plugging this result into Eq.~(\ref{actionbifur}), and substituting $FT=2\sqrt{1-E_p/E_0}$, we find that for small impulses $\Delta{\cal S}/{\cal S}_0\sim \sqrt{E_0-E_p}$. This indicates that, in analogy to quantum mechanics, given a quasi-potential landscape $S(q)$, $E_0-E_p$ can be viewed as the ``energy excess" the particle receives to cross the switching barrier of height $E_0$. As a result, for $E_p=E_0$, the switching barrier remains unchanged (corresponding to $F=0$ and/or $T=0$), while for $E_p=0$, the energy excess is maximal corresponding to the absence of a switching barrier, leading to instantaneous switching. \subsection{Conclusion} Here, we have introduced a new theory for describing the effect of nonequilibrium perturbations on biological regulatory networks with metastable states, {\it i.e.}, epigenetic networks. Our theory can be used to infer the epigenetic landscape of a regulatory network by fitting a model using a series of perturbations of varying strength. The shape of the landscape is mapped out and reconstructed from the perturbation responses. The data needed for the fitting are purposely chosen to be reasonable biological observables. The principle of such an experiment would be to apply a genetic or biochemical perturbation to the network, such as by introducing an inducible gene using transfection and/or silencing expression using siRNA. A response is measured as a function of the strength and duration of the perturbation. Unlike other theories that relate switching dynamics to fluctuations along the epigenetic landscape, our theory does not require detailed time-lapse imaging to collect data. One simply needs to record the fraction of cells that switch phenotypes at some time in the future after the perturbation. Such data can be quickly collected for millions of cells using flow cytometry. Using the response data the parameters of a regulatory model can be inferred and the epigenetic landscape numerically reconstructed. Our method, therefore, has great potential to be used to help decipher complex biological developmental trajectories. Our theory also provides insights into the fundamental physics of how various signals induce state transitions in cells. As more complex cellular reprogramming is undertaken, it will become increasingly important to model how cells can be induced to make transitions between states. The impulse that we identified in our theory is one way to measure the work required to change phenotypic states. Further theoretical advances will be required to extend our understanding of important developmental techniques such as creation of induced pluripotent stem cells and cell reprogramming and differentiation. \subsection*{Acknowledgments} The authors would like to thank Chris Bohrer, Tom Israeli and Yen Ting Lin for useful discussions. ER acknowledges support from the National Science Foundation under grant PHY-1707961. MA and SB acknowledge support from the Israel Science Foundation grant No. 300/14 and the United States-Israel Binational Science Foundation grant No. 2016-655. \subsection*{Appendix A: Bifurcation Limit} In this section we show how the results derived for the SRG can be drastically simplified close to the bifurcation limit, where the stable and unstable fixed points merge. Without loss of generality, our analysis below will focus on the \textit{low} to \textit{high} switch, namely from $q_1$ to $q_3$, where the analysis of the \textit{high} to \textit{low} switch is identical. Let us denote by $\epsilon\equiv (q_2-q_1)/2\ll 1$, such that $2\epsilon$ is the distance between the two fixed points. Let us also denote by $q_m=(q_1+q_2)/2$ the mid point between the stable and unstable fixed points. As a result, we can write $q_1=q_m-\epsilon$ and $q_2=q_m+\epsilon$. It has been shown in previous works that in problems of switching between metastable states, close to bifurcation the momentum $p$ scales as $\epsilon^2$~\cite{Escudero2009srm,Assaf2010ems}. As a result, it is convenient to rescale the coordinate and momentum as follows: \begin{equation} \tilde{q} = (q-q_m)/\epsilon,\;\;\;\;\;\tilde{p} = p/\epsilon^2, \end{equation} where $\tilde{q},\tilde{p}$ are ${\cal O}(1)$. Note, that the fixed points in the rescaled coordinate become $\tilde{q}_1=-1$ and $\tilde{q}_2=1$. We further denote $R(q)=\lambda(q)-\mu(q)$, such that in the absence of external forcing the mean-field rate equation becomes $\dot{q}=R(q)$. Since $R(q)$ can be approximated by a parabola in the regime $q_1<q<q_2$, we have: $R(q)\simeq ({\cal R}/2)(q-q_1)(q-q_2) \simeq ({\cal R}/2)\epsilon^2(\tilde{q}^2-1)$, where ${\cal R}\equiv R''(q_m)$ is a positive constant. Therefore, at the midpoint $R(q=q_m)=-({\cal R}/2)\epsilon^2$ is negative, and $R'(q_m)=0$, since the parabola has a minimum at $q=q_m$. Using these results, and denoting by ${\cal D}\equiv\lambda(q_m)+\mu(q_m)$, we now expand the time-dependent Hamiltonian [Eq.~(\ref{hamilpertlh}) with $F$ replaced by $\phi(t)$] up to ${\cal O}(\epsilon^4)$ in the vicinity of $q=q_m$ and $p=0$. This results in \begin{equation} H(p,q,t)\simeq \tilde{p}\phi(t)\epsilon^2 +\tilde{p}\left\{\frac{\tilde{p}}{2}\left[{\cal D}+\phi(t)\right] +\frac{{\cal R}}{2}\left(\tilde{q}^2-1\right)\right\}\epsilon^4, \end{equation} where we have expanded $e^{\pm p} \simeq 1 \pm \epsilon^2\tilde{p} + (\epsilon^4/2)\tilde{p}^2$, and have also expanded $\lambda(q)$ and $\mu(q)$ around $q=q_m$, up to second order in $\varepsilon$. In the absence of external force, $\phi(t)=0$, the unperturbed optimal path satisfies $H=0$, which yields the unperturbed trajectory \begin{equation} \label{p0bifur} \tilde{p}_0(q) = {\cal R}(1-\tilde{q}^2)/{\cal D}. \end{equation} In the presence of an external force, $\phi(t)=F$, the perturbed Hamiltonian becomes in the leading order \begin{equation}\label{Hpbifur} H_p=\tilde{p}F\epsilon^2, \end{equation} independent of $\tilde{q}$. Thus, equating $H_p=E_p$ yields the perturbed optimal path, which becomes constant here \begin{equation}\label{ppbifur} \tilde{p}(q)=E_p/(F\epsilon^2)=\tilde{E}_p/F, \end{equation} where we have defined the rescaled energy $\tilde{E}_p=E_p/\epsilon^2$. Equating the unperturbed and perturbed optimal paths, Eqs.~(\ref{p0bifur}) and (\ref{ppbifur}), we find the intersection points $\tilde{q}^p_{1,2}$ to be $\tilde{q}^p_1=-\tilde{q}^p_2=-[1-\tilde{E}_p {\cal D}/(F{\cal R})]^{1/2}$. Let us now find the rescaled energy given the duration of the external perturbation $T$. Using Eqs.~(\ref{Ep}) and (\ref{Hpbifur}), and the fact that $\dot{q}=\partial H_p/\partial p=F$, we have \begin{equation} T = \frac{1}{F}\int_{q_1^{p}(E_p)}^{q_2^{p}(E_p)}dq = \frac{2\epsilon}{F}\tilde{q}^p_2, \end{equation} from which we can extract $E_p$ as a function of $T$: \begin{equation} \label{Epbifur} \tilde{E}_p=(F{\cal R})/{\cal D}\left[1-\left(F\tilde{T}/2\right)^2\right], \end{equation} where $\tilde{T}=T/\epsilon$. Note, that the result is valid as long as $\tilde{T}\leq 2/F$, which means that $T\leq 2\epsilon/F$. The is because when the system is close to bifurcation, a very small force, $F\sim \epsilon$ is sufficient to cause a deterministic switch. Therefore, if $F\sim \epsilon$, we have $T={\cal O}(1)$. Also note that, by using Eq.~(\ref{Epbifur}), the intersection points become $\tilde{q}^p_{1,2}=\mp F\tilde{T}/2$; here, at the maximal value of $\tilde{T}=2/F$ we obtain $E_p=0$, since $\tilde{q}^p_{1,2}=q_{1,2}=\mp 1$ (\textit{i.e.}, the unperturbed and perturbed fixed points coincide). Having found the perturbation energy, the correction to the switching barrier is given by Eq.~(\ref{actiongeneral}). Transforming to the rescaled coordinate and momentum, using Eqs.~(\ref{p0bifur}), (\ref{ppbifur}) and (\ref{Epbifur}), and using the definition of $\tilde{T}$, we finally have \begin{equation}\label{actionbifur} {\cal S}^{lh}={\cal S}^{lh}_0\left\{1-\frac{3F\tilde{T}}{4}\left[1-\frac{(F\tilde{T})^2}{12}\right]\right\}, \end{equation} where ${\cal S}^{lh}_0 = 4{\cal R}\epsilon^3/(3{\cal D})$, and the result is valid as long as $F\tilde{T}<2$. Fig.~S29 shows a comparison of Eq. (\ref{actionbifur}) and the full theory when the system is near bifurcation. Note, that as $\tilde{T}$ approaches $2/F$, action~(\ref{actionbifur}) approaches zero, which invalidates the WKB theory. The latter is valid as long as $N{\cal S}\gg 1$, which limits the duration and/or magnitude of the external force. \subsection*{Appendix B: Weak noise limit} In this section we derive the switching barrier under a weak external perturbation. Here, one must have a long perturbation duration; otherwise the effect is negligible. We will henceforth assume for simplicity that $E_p=0$, corresponding to a long perturbation duration, see below. When $E_p=0$, the perturbed and unperturbed optimal paths for switching intersect at $q_1$ and $q_2$, such that $q^p_{1,2}=q_{1,2}$. Therefore, putting $E_p=0$ and expanding in $F\ll 1$, the perturbed optimal path~(\ref{pint}) becomes \begin{equation} p_p(q)\simeq \ln\left[\mu(q)/\lambda(q)\right]-F/\lambda(q)=p_0(q)-F/\lambda(q). \end{equation} As a result, using Eq.~(\ref{actiongeneral}), and the fact that $E_p\simeq 0$, the correction to the switching barrier in the case of weak force, drastically simplifies and becomes \begin{equation} {\cal S}^{lh}={\cal S}^{lh}_0-F\int_{q_1}^{q_2}\frac{dq}{\lambda(q)}. \end{equation} Note, that in this case, the duration of the external perturbation is simply given by $T=\int_{q_1}^{q_2}dq/\dot{q}$, where $\dot{q}=\lambda(q)-\mu(q)$ is the unperturbed rate equation. \subsection*{Appendix C: Heaviside Step Function} In this section we consider the case of a translation rate with a very large Hill exponent in Eq.~(\ref{Hillrates}). In the limit $h\to\infty$ the translation rate becomes a step function \begin{equation} \lambda(q)=\alpha_0 + (1-\alpha_0)\Theta(q-\beta) \end{equation} where $\Theta(z)$ is a heaviside step function. In this case, the mean-field rate equation has three fixed points: $q_1=\alpha_0$, $q_2=\beta$ and $q_3=1$, where $q_1$ and $q_3$ are stable, while $q_2$ is unstable. Let us begin by computing the correction to the switching barrier from the \textit{low} to \textit{high} states. Here the unperturbed switching barrier satisfies ${\cal S}^{lh}_0=\alpha_0-\beta+\beta\ln(\beta/\alpha_0)$~\cite{Roberts2015dsg}. Going along the same lines as above, we can compute the unperturbed and perturbed optimal paths for switching using Eqs.~(\ref{p0}) and (\ref{pint}), as well as the intersection points between these paths, which satisfy $q_1^p=(E_p+F)\alpha_0/F$ and $q_2^p=\beta$. In this case, one can explicitly find $E_p$ using the expression for $\dot{q}$ and Eq.~(\ref{EpT}). The result is \begin{equation} E_p(F,T)=\frac{F\beta}{e^T (F+\alpha_0)-F}-e^{-T} F. \end{equation} Using this result and Eq.~(\ref{actiongeneral}), the correction to the switching barrier from the \textit{low} to \textit{high} states is: \begin{equation} {\cal S}^{lh}\! =\!{\cal S}^{lh}_0+F(1-e^{-T})+\beta\left\{T\!-\!\ln\left[e^T(1\!+\!F/\alpha_0)\!-\!F/\alpha_0\right]\right\}\!. \end{equation} We now move to compute the correction to the switching barrier from the \textit{high} to \textit{low} states. Here the unperturbed switching barrier satisfies ${\cal S}^{hl}_0=1-\beta+\beta\ln\beta$. Going along the same lines as above, we can compute the unperturbed and perturbed optimal paths for switching using Eqs.~(\ref{p0}) and (\ref{pint}) as well as the intersection points between these paths, which satisfy $q_3^p=1-E_p/F$ and $q_2^p=\beta$. In this case, one can also explicitly find $E_p$ using the expression for $\dot{q}$ and Eq.~(\ref{Ep}) with the lower integration limit replaced by $q_3^p(E_p)$. The result is \begin{equation} E_p(F,T)=\frac{F\left[e^{-(F+1)T}F+1-(F+1)\beta\right]}{e^{(F+1)T}+F}. \end{equation} Using this result and Eq. (\ref{actiongeneral}), the correction to the switching barrier from the \textit{high} to \textit{low} states is: \begin{eqnarray} \hspace{-3mm}{\cal S}^{hl} &=& {\cal S}^{lh}_0+(F+1)T\beta+\nonumber\\ &+&\frac{F}{F+1}[e^{-(F+1)T}-1]+\beta\ln\left[\frac{F+1}{e^{(F+1)T}+F}\right]. \end{eqnarray}
\section{Introduction} The celebrated theorem of Riemann states that every simply connected planar domain that is not the entire complex plane is conformally equivalent to the unit disk (that is, there is a conformal mapping between the domain and the disk). However, there are plenty of simply connected planar domains with quite complicated boundaries, and it is not always possible to extend these conformal mappings from such domains to their (topological) boundaries. The work of Carath\'eodory~\cite{Car} beautifully overcame this obstruction by the use of cross-cuts and the corresponding notion of prime ends, and showed that every such conformal mapping extends to a homeomorphism between the (Carath\'eodory) prime end boundary of the domain and the topological boundary (the unit circle) of the disk. This extension theorem is known in various literature as the Carath\'eodory theorem for conformal mappings and as the prime end theorem (see~\cite{Car}, \cite[Section~4.6]{Ahl} and~\cite[Chapter~2]{Pom}). In the case of non-simply connected planar domains or domains in higher dimensional Euclidean spaces (and Riemannian manifolds), the notion of prime ends of Carath\'eodory is not as fruitful. Indeed, it is not clear what should play the role of cross-cuts, as not all Jordan arcs in the domain with both end points in the boundary of the domain will separate the domain into exactly two connected components. There are viable extensions of the Carath\'eodory construction for certain types of Euclidean domains, called quasiconformally collared domains (see for example~\cite{Na, AW}), but this construction is not optimal when the domain of interest is not quasiconformally collared, and indeed, there is currently no analog of quasiconformal collared domains in the setting of general metric measure spaces. However, the workhorse of the prime end construction of Carath\'eodory is the nested sequence of components of the compliments of the Jordan arcs that make up the end. Keeping this in mind, an alternate notion of prime ends was proposed in~\cite{ABBS}. The construction given there proves to be useful even in the non-smooth setting of domains in metric measure spaces, and is a productive tool in potential theory and the Dirichlet problem for such domains, see~\cite{BBS2, ES, AS}. Branched quasisymmetric mappings (BQS) between metric spaces started life as extensions of quasiregular mappings between manifolds, see~\cite{Guo1, Guo2, GW1, GW2, LP}. The work of Guo and Williams~\cite{GW2} demonstrate the utility of BQS mappings in Stoilow-type factorizations of quasiconformal maps between metric measure spaces. Between metric spaces of bounded turning, the class of homeomorphisms that are BQS coincide with the class of quasisymmetric maps. However, for more general metric spaces, BQS homeomorphisms are not necessarily quasisymmetric, as demonstrated by the slit disk (see the discussion in Section~2). The focus of this present paper is to obtain a Carath\'eodory type extension theorem for two types of mappings between domains in locally path-connected metric spaces using the construction of prime ends from~\cite{ABBS}. The two types of mappings considered are \emph{branched quasisymmetrc} (BQS) homeomorphisms and \emph{geometric quasiconformal} homeomorphisms. In Theorem~\ref{thm:BQS-fp-homeo} we prove that every BQS homeomorphism between two bounded domains in locally path-connected metric spaces has a homeomorphic extension to the respective prime end closures. We also show that if these domains are finitely connected at their respective boundaries, then the extended homeomorphism is also BQS, see Proposition~\ref{prop:BQS-Mazur} and the subsequent remark. In Theorem~\ref{thm:BQS-unbdd} we also prove a Carath\'eodory extension theorem for BQS mappings between unbounded domains in locally path-connected metric spaces, where the notion of prime ends for unbounded domains is an extension of the one from~\cite{ABBS}, first formulated in~\cite{E}. We point out here that local path-connectedness of the ambient metric spaces can be weakened to local continuum-connectedness (that is, for each point in the metric space and each neighborhood of that point, there is a smaller neighborhood of the point such that each pair of points in that smaller neighborhood can be connected by a continuum in that smaller neighborhood). However, as local path-connectedness is a more familiar property, we will phrase our requirements in terms of it. In contrast to BQS homeomorphisms, geometric quasiconformal mappings do not always have a homeomorphic extension to the prime end closure for the prime ends as constructed in~\cite{ABBS}; for example, with $\Omega$ the planar unit disk and $\Omega^\prime$ the harmonic comb given by \begin{equation}\label{eq:example-comb} \Omega^\prime:=(0,1)\times(0,1)\setminus\left(\bigcup_n\{\tfrac{1}{n+1}\}\times[0,\tfrac12]\right), \end{equation} we know that $\Omega$ and $\Omega^\prime$ are conformally equivalent, but the prime end closure $\overline{\Omega}^P$ of $\Omega$ is the closed unit disk which is compact, while $\overline{\Omega^\prime}^P$ is not even sequentially compact. However, we show that if both domains are Ahlfors $Q$-regular Loewner domains for some $Q>1$ when equipped with the induced Mazurkiewicz metrics $\dum$ and $\dumm$ respectively, then geometric quasiconformal mappings between them extend to homeomorphisms between their prime end closures. Should the two domains be bounded, then the results in this paper also imply that the geometric quasiconformal mappings extend as homeomorphisms between the respective Mazurkiewicz boundaries, with the extended map serving as a quasisymmetric map thanks to~\cite[Theorem~4.9]{HeiK} together with~\cite[Theorem~3.3]{Korte}. In Theorem~\ref{thm:main-geomQC} we give a Carath\'eodory-type extension for geometric quasiconformal maps. Our results are related to those of~\cite{A, AW} where extensions, to the prime end closures, of certain classes of homeomorphisms between domains is demonstrated. In~\cite[Theorem~5]{A} it is shown that a homeomorphism between two bounded domains, one of which is of bounded turning and the other of which is finitely connected at the boundary, has a homeomorphic extension to the relevant prime end closures provided that the homeomorphism does not map two connected sets that are a positive distance apart to two sets that are zero distance apart (i.e., pinched). In general, it is not easy to verify that a given BQS or geometric quasiconformal map satisfies this latter non-pinching condition. Moreover, we do not assume that the domains are finitely connected at the boundary. We therefore prove homeomorphic extension results by hand. The paper~\cite{AW} deals with domains in the first Heisenberg group $\mathbf{H}^1$, and the prime ends considered there are \emph{not} those considered here. The notion of prime ends considered in~\cite{AW} are effectively that of Carath\'eodory, see~\cite[Definition~3.3]{AW}. In particular, topologically three-dimensional analogs of the harmonic comb, e.g.~ $\Omega^\prime\times(0,1)$ with $\Omega^\prime$ as in~\eqref{eq:example-comb}, will have no prime end considered in~\cite{AW} with impression containing any point in $\{0\}\times\{\tfrac12\}\times[0,1]$, whereas each point in this set forms an impression of a singleton prime end with respect to the notion of prime ends considered here. The paper~\cite{Sev} has a similar Carath\'eodory type extension results for the so-called ring mappings between two domains satisfying certain geometric restrictions at their respective boundaries. The structure of the paper is as follows. We give the background notions and results related to prime ends and BQS/geometric quasiconformal maps in Section~2. In Section~3 we describe bounded geometry and the Loewner property; these notions are not needed in the subsequent study of BQS mappings (Sections~4,5) but are needed in the study of geometric quasiconformal maps in Section~6. Using the prime end boundary for bounded domains as defined in Section~2, in Section~4 we prove a Carath\'eodory-type extension property of BQS homeomorphisms between bounded domains in proper locally path-connected metric spaces. In Section~5 we extend the prime end construction to unbounded domains, and demonstrate a Carath\'eodory-type extension of BQS homeomorphisms between unbounded domains in proper locally path-connected metric spaces. The final section is concerned with proving a Carath\'eodory-type extension property of geometric quasiconformal mappings between two domains in proper locally path-connected metric spaces, under certain geometric restrictions placed on the two domains. Note that it is not possible to have a BQS homeomorphism between a bounded domain and an unbounded domain, but it is possible to have a geometric quasiconformal map between a bounded domain and an unbounded domain, as evidenced by the conformal map between the unit disk and the half-plane. \section{Background notions}\label{sec:bdd-prime} In this section we give a definition of prime ends for bounded domains. An extension of this definition of prime ends (following~\cite{E}) for unbounded domain is postponed until Section~5 where it is first needed. We follow \cite[Section 4]{ABBS} in constructing prime ends for bounded domains. We say that a metric space $X$ is (metrically) doubling if there is a positive integer $N$ such that whenever $x\in X$ and $r>0$, we can cover the ball $B(x,r)$ by at most $N$ number of balls of radius $r/2$. Let $X$ be a complete, doubling metric space. It is known that a complete doubling space is proper, that is, closed and bounded subsets of the space are compact. Let $\Omega \subseteq X$ be a domain, that is, $\Omega$ is an open, non-empty, connected subset of $X$. \begin{defn}[Mazurkiewicz metric]\label{def:Mazurk} The Mazurkiewicz metric $\dum$ on $\Omega$ is given by \[ \dum(x,y):=\inf_E\diam(E) \] for $x,y\in\Omega$, where the infimum is over all continua (compact connected sets) $E\subset\Omega$ that contain $x$ and $y$. \end{defn} Note that in general $\dum$ can take on the value of $\infty$; however, if $X$ is locally path-connected (and hence so is $\Omega$), then $\dum$ is finite-valued and so is an actual metric on $\Omega$. \begin{defn}[Acceptable Sets] A bounded, connected subset $E \subseteq \Omega$ is an {\em acceptable set} if $\overline{E}$ is compact and $\overline{E} \cap \partial \Omega \neq \emptyset$. \end{defn} The requirement that $\overline{E}$ be compact was not needed to be explicitly stated in~\cite{ABBS} because it was assumed there that the metric space $X$ is complete and doubling, and so closed and bounded subsets are compact; as $\Omega$ is bounded and $E\subset\Omega$, it follows then that $\overline{E}$ is compact in the setting considered in~\cite{ABBS}. In our more general setting, we make this an explicit requirement. Given two sets $E,F\subset\Omega$, we know from Definition~\ref{def:Mazurk} that \[ \dM(E,F)=\inf_\gamma\diam(\gamma), \] where the infimum is over all continua $\gamma\subset\Omega$ with $\gamma\cap E\ne\emptyset\ne\gamma\cap F$. \begin{defn}[Chains]\label{def:chains} A sequence $\{E_i\}$ of acceptable sets is a {\em chain} is \begin{enumerate}[(a)] \item $E_{i+1} \subseteq E_i$ for all $i \geq 1$ \item $\dM(\Omega \cap \partial E_{i+1}, \Omega \cap \partial E_i) > 0$ for all $i \geq 1$ \item $\bigcap_{i=1}^{\infty} \overline{E_i} \subseteq \partial \Omega$. \end{enumerate} \end{defn} The second condition above guarantees also that $E_{i+1}$ is a subset of the interior $\text{int}(E_k)$ of $E_k$. \begin{defn}[Divisibility of Chains, and resulting ends] A chain $\{E_i\}$ {\em divides} a chain $\{F_j\}$ (written $\{E_i\} | \{F_j\}$) if for each positive integer $k$ there exists a positive integer $i_k$ with $E_{i_k} \subseteq F_k$. Two chains $\{E_i\}$ and $\{F_j\}$ are {\em equivalent} (written $\{E_i\} \sim \{F_j\}$) if $\{E_i\} | \{F_j\}$ and $\{F_j\} | \{E_i\}$. The equivalence class of a given chain $\{E_i\}$ under this relation is called an {\em end} and is denoted $[E_i]$. \end{defn} \begin{nota} We write ends using the Euler script font (e.g. $\mathscr{E}, \mathscr{F}, \mathscr{G}$). If $\{E_i\}$ is a chain representing the end $\mathscr{E}$, we write $\{E_i\} \in \mathscr{E}$. \end{nota} Note that if $\{E_k\} | \{G_k\}$ and $\{F_k\}\sim\{E_k\}$, then $\{F_k\} | \{G_k\}$. Moreover, if $\{E_k\} | \{G_k\}$ and $\{F_k\}\sim\{G_k\}$, then $\{E_k\} | \{F_k\}$. Therefore the notion of divisibility is inherited by ends from their constituent chains. \begin{defn}[Divisibility of Ends] An end $\mathscr{E}$ {\em divides} an end $\mathscr{F}$ (written $\mathscr{E} | \mathscr{F}$) if whenever $E_i \in \mathscr{E}$ and $F_j \in \mathscr{F}$, then $\{E_i\} | \{F_j\}$. \end{defn} \begin{defn}[Impressions] The {\em impression} of a chain $\{E_i\}$ is $\bigcap_{i=1}^{\infty} \overline{E_i}$. If two chains are equivalent, then they have the same impression. Hence, if $\mathscr{E}$ is an end, we may refer to the impression $I(\mathscr{E})$ of that end. We may also write $I[E_i]$ if $\{E_i\} \in \mathscr{E}$. \end{defn} \begin{defn}[Prime Ends and Prime End Boundary] An end $\mathscr{E}$ is called a {\em prime end} if $\mathscr{F}=\mathscr{E}$ whenever $\mathscr{F} | \mathscr{E}$. The collection of prime ends of $\Omega$ is called the {\em prime end boundary of $\Omega$} and is denoted $\partial_P \Omega$. The set $\Omega$ together with its prime end boundary form the {\em prime end closure} of $\Omega$, denoted $\overline{\Omega}^P = \Omega \cup \partial_P \Omega$. \end{defn} We next describe a topology on $\overline{\Omega}^P$ using a notion of convergence. \begin{defn}[Sequential topology for the prime end boundary] We say that a sequence $\{x_k\}$ of points in $\Omega$ converges to a prime end $\mathscr{E}=[E_k]$ if for each positive integer $k$ there is a positive integer $N_k$ such that $x_j\in E_k$ for all $j\ge N_k$. It is possible for a sequence of points in $\Omega$ to converge to more than one prime end, see~\cite{ABBS}. A sequence of prime ends $\{\mathscr{E}_j\}$ is said to converge to a prime end $\mathscr{E}$ if, with each (or, equivalently, with some) choice of $\{E_{k,j}\}\in\mathscr{E}_j$ and $\{E_k\}\in\mathscr{E}$, for each positive integer $k$ there is a positive integer $N_k$ such that whenever $j\ge N_k$ there is a positive integer $m_{j,k}$ such that $E_{m_{j,k},j}\subset E_k$. \end{defn} It is shown in~\cite{ABBS} that the above notion of convergence yields a topology on $\overline{\Omega}^P$ which may or may not be Hausdorff but satisfies the T1 separation axiom. Recall that a domain $\Omega$ is of \emph{bounded turning} if there is some $\lambda\ge 1$ such that whenever $x,y\in\Omega$ we can find a continuum $E_{x,y}\subset\Omega$ with $x,y\in E_{x,y}$ such that $\diam(E_{x,y})\le \lambda d(x,y)$. \begin{lemma}[Bounded Turning Boundary] Let $X$ be a complete metric space. Let $\Omega \subseteq X$ be a bounded domain with $\lambda$-bounded turning. Then, $\overline{\Omega}^P$ is metrizable by an extension of the Mazurkiewicz metric $\dum$ and there is a biLipschitz identification $\overline{\Omega}=\overline{\Omega}^P$. \end{lemma} \begin{proof} Let $x \in \partial \Omega$. Let $x_i \in \Omega$ be such that $d(x_i, x) < 2^{-i}$. For each $i$, let $\gamma_i$ be a continuum with $x_i, x_{i+1} \in \gamma_i$ and $\diam(\gamma_i) \leq \lambda d(x_i, x_{i+1})$, and let $\Gamma_j = \bigcup_{i=j}^\infty \gamma_i$. Then, $\Gamma_j$ is connected for each $j$ and $\diam(\Gamma_j) \leq \lambda 2^{-j+1}$. Let $E_j$ be the connected component of $B(x, \lambda 2^{-j+2}) \cap \Omega$ containing $\Gamma_j$. Then $x\in\partial\Omega\cap\overline{E_j}$, and so $E_j$ is an acceptable set. We claim $[E_j]$ is a prime end with $I(\{E_j\}) = \{x\}$. We first show $\{E_j\}$ is a chain. Condition~(a) is clear as $\Gamma_{j+1} \subseteq \Gamma_j$ for each $j$, and $B(x, \lambda 2^{-j+1}) \subseteq B(x, \lambda 2^{-j + 2})$ for each $j$. If $y\in B(x,\lambda 2^{-j+2})\cap\Omega\cap\partial E_j$, then there is some $\rho>0$ such that $B(y,\rho)\subset B(x,\lambda 2^{-j+2})\cap\Omega$, and there is a point $w\in B(y,\rho/[3\lambda])\cap E_j$. Thus whenever $z\in B(y,\rho/[3\lambda])$, by the bounded turning properety of $\Omega$ we know that there is a continuum in $\Omega$ containing both $z$ and $w$, with diameter at most $2\rho/3<\rho$, and so this continuum will lie inside $B(x,\rho)$. It follows that $B(y,\rho/[3\lambda])\subset E_j$, violating the assumption that $y\in\partial E_j$. Therefore $\Omega\cap \partial E_j\subset \partial B(x,\lambda 2^{-j+2})$. Hence \[ \dM(\Omega\cap \partial E_j,\Omega\cap \partial E_{j+1}) \ge \dist(\Omega\cap \partial E_j,\Omega\cap \partial E_{j+1})\ge 2^{-j+1}>0, \] that is, Condition~(b) is valid. Condition~(c) follows as $\{x\}=\bigcap_j\overline{E_j}$. Hence, $\{E_j\}$ is a chain and therefore $[E_j]$ is an end. That it is a prime end follows from~\cite{ABBS} together with the fact that $I[E_j]$ is a singleton set. We show that if $\mathscr{F}$ is a prime end with $I(\mathscr{F}) = \{x\}$, then $\mathscr{E} = \mathscr{F}$ where $\mathscr{E}$ is the one constructed above. To prove this it suffices to show that $\mathscr{F} | \mathscr{E}$. Let $\mathscr{E}=[E_k]$ as above, and choose $\{F_k\}\in\mathscr{F}$. Fix a positive integer $k$ and let $w_j\in \Omega\cap B(x,2^{-(2+k)})$ and $z_j\in E_k\cap B(x,2^{-(2+k)})$. Then by the bounded turning property, there is a continuum $K_j$ containing both $w_j$ and $z_j$ such that $\diam(K_j)\le \lambda d(z_j,w_j)<\lambda 2^{-k-2}$. It follows that $K_j\subset B(x,\lambda 2^{-k+2})\cap\Omega$, and so $K_j\subset E_k$. It follows that $B(x,2^{-k-2})\cap\Omega\subset E_k$. On the other hand, $\bigcap_j\overline{F_j}=\{x\}$, and as $\overline{F_1}$ is compact with $F_{j+1}\subset F_j$ for each $j$, it follows that for each $k$ there is some $j_k\in\mathbb{N}$ such that $F_{j_k}\subset B(x,2^{-k-2})\cap\Omega$. It then follows that $F_{j_k}\subset E_k$. Therefore we have that $\{F_j\} | \{E_k\}$, that is, $\mathscr{F} | \mathscr{E}$ as desired. We now show that if $\mathscr{F}$ is a prime end, then $I(\mathscr{F})$ consists of a single point. Let $x\in I(\mathscr{F})$ and choose $\{F_k\}\in\mathscr{F}$. Then for each positive integer $k$ we set \[ \tau_k:=[3\lambda]^{-1}\min\{2^{-k-2}, \dM(\Omega\cap\partial F_j,\Omega\cap\partial F_{j+1})\, :\, j=1,\cdots, k\}. \] Note that $\tau_{k+1}\le \tau_k$ with $\lim_k\tau_k=0$. We can then find a point $x_k\in B(x,\tau_k)\cap F_{k+1}$ since $x\in\partial F_j$ for each $j\in\mathbb{N}$. Note that as $F_{j+1}\subset F_j$ for each $j$, we necessarily have $x_{k+1}, x_k\in F_{k+1}$. By the bounded turning property of $\Omega$ we can find a continuum $K_k\subset\Omega$ such that $x_k,x_{k+1}\in K_k$ and $\diam(K_k)\le \lambda d(x_k,x_{k+1})<2\lambda\tau_k$. As \[ 2\lambda\tau_k<\dM(\Omega\cap\partial F_k,\Omega\cap\partial F_{k+1}) \] and $x_k,x_{k+1}\in F_{k+1}$, it follows that $K_k\subset F_k$ for each positive integer $k$. A similar argument now also shows that $B(x,\tau_k)\cap\Omega$ is contained in the connected component $G_k$ of $B(x,2\lambda\tau_k)\cap\Omega$ containing $K_k$, and hence $B(x,\tau_k)\cap\Omega\subset G_k\subset F_k$. It follows that $\{G_k\}$ is a chain in $\Omega$ with $\{G_k\} | \{F_k\}$, and as $\{F_k\}$ is a prime end, it follows that $[G_k]=\mathscr{F}$. Thus we have $I(\mathscr{F})=I([G_k])=\{x\}$. The above argument shows that $\partial_P\Omega$ consists solely of singleton prime ends, and hence by the results of~\cite{ABBS} we know that $\overline{\Omega}^P$ is compact and is metrizable by an extension of the Mazurkiewicz metric $\dum$. Moreover, for each $x\in\partial\Omega$ there is exactly one prime end $\mathscr{E}_x\in\partial_P\Omega$ such that $I(\mathscr{E}_x)=\{x\}$. To complete the proof of the lemma, note that if $x,y\in\Omega$, we can find a continuum $E_{x,y}\subset\Omega$ with $x,y\in E_{x,y}$ such that $\diam(E_{x,y})\le \lambda d(x,y)$; therefore $d(x,y)\le \dum(x,y)\le \lambda d(x,y)$. Since $\overline{\Omega}^P$ is the completion of $\Omega$ with respect to the metric $\dum$, this biLipschitz correspondence extends to $\overline{\Omega}\to\overline{\Omega}^P$ as wished for. \end{proof} Throughout this paper, $\Omega$ and $\Omega^\prime$ are domains in $X$. Recall that a set $E\subset X$ is a continuum if it is connected and compact. Such a set $E$ is nondegenerate if in addition it has at least two points. \begin{defn}\label{defn:finiteConnBdy} A domain $\Omega$ is said to be \emph{finitely connected at} a point $x\in\partial\Omega$ if for every $r>0$ the following two conditions are satisfied: \begin{enumerate} \item There are only finitely many connected components $U_1,\cdots U_k$ of $B(x,r)\cap\Omega$ with $x\in\partial U_i$ for $i=1,\cdots, k$, \item there is some $\rho>0$ such that $B(x,\rho)\cap\Omega\subset \bigcup_{j=1}^k U_j$. \end{enumerate} \end{defn} It was shown in~\cite{ABBS} (see also~\cite{BBS1}) that $\Omega$ is finitely connected at every point of its boundary if and only if every prime end of $\Omega$ has a singleton impression (that is, its impression has only one point) and $\partial_P\Omega$ is compact. It is an open problem whether, given a bounded domain, every end of that domain is divisible by a prime end, see for example~\cite{ABBS, AS, ES}. Since this property is of importance in the theory of Dirichlet problem for prime end boundaries (see for instance~\cite{AS, ES}), the following useful lemma is also of independent interest. \begin{lemma}[Divisibility]\label{lem:end-div-prime-finite-conn} Suppose that $\Omega$ is a bounded domain that is finitely connected at $x\in\partial\Omega$, and let $[E_k]$ be an end of $\Omega$ with $x\in I[E_k]$. Then there is a prime end $[G_k]$ such that $[G_k]\, |\, [E_k]$. \end{lemma} \begin{proof} For each positive integer $j$ let $C^j_1, \cdots, C^j_{k_j}$ be the connected components of $B(x,2^{-j})\cap \Omega$ that contain $x$ in their boundary. For each choice of positive integers $j$ and $k$, there is at least one choice of $m\in\{1,\cdots,k_j\}$ such that $C^j_m\cap E_k$ is non-empty. Let $V^\prime$ be the collection of all $C^j_m$, $j\in\mathbb{N}$ and $m\in\{1,\cdots, k_j\}$ for which $C^j_m$ intersects $E_k$ for infinitely many positive integers $k$ (and hence, by the nested property of the chain $\{E_k\}$, all positive integers $k$), and let $V:=V^\prime\cup\{\Omega\}$. As $\Omega$ is finitely connected at the boundary, it follows that for each $j$ there is at least one $m\in\{1,\cdots, k_j\}$ such that $C^j_m$ has this property. We set $C^0_1:=\Omega$. For non-negative integer $j$ we say that $C^j_m$ is a neighbor of $C^{j+1}_n$ if and only if $C^{j+1}_n\subset C^j_m$. This neighbor relation creates a tree structure, with $V$ as its vertex set, with each vertex of finite degree. Note that for each positive integer $M$, there is a path in this tree (starting from the root vertex $C^0_1=\Omega$) with length at least $M$. Because each vertex has finite degree, it follows that there is a path in this tree with infinite length. To see this we argue as follows. Let property (P) be the property, applicable to vertices $C^j_m$, that the sub-tree with the vertex as its root vertex has arbitrarily long paths starting at that vertex. For each non-negative integer $j$ the vertex $C^j_m$ has finite degree, and so if $C^j_m$ has property (P) then it has at least one descendant neighbor (also known as a child in graph theory) $C^{j+1}_n$ with property (P). Since $C^0_1=\Omega$ has property (P) as pointed out above, we know that there is a choice of $m_1\in\{1,\cdots, k_1\}$ such that the vertex $C^1_{m_1}$ also has property (P). From here we can find $m_2\in\{1,\cdots, k_2\}$ such that $C^1_{m_2}$ also has property (P) \emph{and} $C^1_{m_1}$ is a neighbor of $C^2_{m_2}$. Inductively we can find $C^j_{m_j}$ for each positive integer $j$ to create this path. Denoting this path by $\Omega\sim C^1_{m_1}\sim C^2_{m_2}\sim\cdots$, we see that the collection $\{C^j_{m_j}\}$ is a chain for $\Omega$ with impression $\{x\}$. As a chain with singleton impression, it belongs to a prime end $[G_k]$. Recall that $X$ is locally path-connected and $\Omega\subset X$ is an open connected set. Therefore, for each positive integer $i$ we see that there is some $j_i$ such that $C^j_{m_j}\subset E_i$ when $j\ge j_i$, and so $[G_k]\, |\, [E_k]$ (for if not, then for each $j$ the open set $C^j_{m_j}$ contains a point from $E_{i+1}$ and a point from $\Omega\setminus E_i$, and so $\dM(\Omega\cap\partial E_i,\Omega\cap\partial E_{i+1})\le 2^{1-j}$ for each $j$, violating the property of $\{E_k\}$ being a chain). \end{proof} The following two lemmata regarding ends are useful to us. \begin{lemma}\label{lem:open-end} Let $\{E_k\}$ be a chain of $\Omega$. Then there is a chain $\{F_k\}$ of $\Omega$ that is equivalent to $\{E_k\}$ such that for each $k\in\mathbb{N}$ the set $F_k$ is open. \end{lemma} \begin{proof} For each positive integer $k$ we choose $F_k$ to be the connected component of $\text{int}(E_k)$ that contains $E_{k+1}$. It is clear that \begin{equation}\label{eq:AAA} F_{k+1}\subset E_k\subset F_k \end{equation} for each $k\in\mathbb{N}$ and that $F_k$ is connected and open. Moreover, as $E_{k+1}\subset F_k$, it follows that $\bigcap_k\overline{E_k}\subset\bigcap_k\overline{F_k}\subset\bigcap_k\overline{E_k}\subset\partial\Omega$, and so we have that \begin{equation}\label{eq:AA} \emptyset\ne\bigcap_k\overline{F_k}. \end{equation} We show now that $\partial F_k\subset\partial E_k$, from which it will follow that \[ \dM(\Omega\cap\partial F_k,\Omega\cap\partial F_{k+1})>0 \] because $E_k, E_{k+1}$ also satisfy analogous condition. To see~\eqref{eq:AA}, let $x\in\partial F_k$. Then, for each $\varepsilon>0$, the ball $B(x,\varepsilon)$ intersects $F_k$, and so also intersects $E_k$. Hence $x\in\overline{E_k}$. If $x\not\in\partial E_k$, then $x\in\text{int}(E_k)$, and in this case there is a ball $B(x,\tau)\subset E_k$; we argue that this is not possible. Indeed, by the local path-connectedness of $X$ there must be a connected open set $U\subset\Omega$ such that $x\in U\subset B(x,\tau)\subset E_k$, and as $x\in\partial F_k$, necessarily $U$ intersects $F_k$ as well. Then $F_k\cup U$ is connected, with $F_k\cup U\subset E_k$; this is not possible as $F_k$ is the largest open connected subset of $E_k$. Therefore $x\not\in\text{int}(E_k)$, and so $x\in\partial E_k$. From the above we have that $\{F_k\}$ is a chain of $\Omega$. By~\eqref{eq:AAA} we also know that this chain is equivalent to the original chain $\{E_k\}$. \end{proof} \begin{lemma}\label{lem:connected-impression} If $\{E_k\}$ is a chain of $\Omega$, then its impression $I\{E_k\}$ is a compact connected subset of $X$. \end{lemma} \begin{proof} For each $j\in\mathbb{N}$ set $K_j:=\overline{E_j}$. Then $K_j$ is compact, non-empty, and connected with $K_{j+1}\subset K_j$. Set $K:=\bigcap_jK_j$. Suppose that $K$ is not connected. Then there are open sets $V,W\subset X$ with $K\subset V\cup W$, $K\cap V\ne\emptyset$, $K\cap W\ne \emptyset$, and $K\cap V\cap W$ empty. We set $K_V:=K\cap V$ and $K_W:=K\cap W$. Then $K_V=K\setminus W$ and $K_W=K\setminus V$, and so both $K_V$ and $K_W$ are compact sets. Moreover, $K_V\cap K_W=K\cap V\cap W=\emptyset$. Therefore \[ \dist(K_V,K_W)>0, \] and so there are open sets $O_V, O_W\subset X$ such that $K_V\subset O_V$, $K_W\subset O_W$, and $O_V\cap O_W=\emptyset$. Set $U:=O_v\cup O_W$. As each $K_j$ is connected, it follows that we cannot have $K_j\subset U$, for then we will have $K_j\subset O_V\cup O_W$ with $K_j\cap O_V\cap O_W$ empty but $K_j\cap O_V\supset K\cap O_V\ne\emptyset$ and $K_j\cap O_W\supset K\cap O_W\ne \emptyset$. It follows that for each $j\in\mathbb{N}$ there is a point $x_j\in K_j\setminus O$. This forms a sequence in the compact set $K_1$, and so there is a subsequence $x_{j_n}$ that converges to some point $x\in K_1$. For each $k\in\mathbb{N}$ we have that $K_k$ is compact and $\{x_k\}_{j\ge k}$ a sequence there; so $x\in K_k$ for each $k\in\mathbb{N}$, that is, $x\in K$. However, $K\subset O$ and each $x_j\in X\setminus O$; therefore we must have $x\in X\setminus O$ (recall that $O$ is open), leading us to a contradiction. Therfore we conclude that it is not possible for $K$ to be not connected. \end{proof} \begin{defn}[BQS homeomorphisms] A homeomorphism $f:\Omega\to\Omega^\prime$ is said to be a \emph{branched quasisymmetric homeomorphism} (or BQS homeomorphism) if there is a monotone increasing map $\eta:(0,\infty)\to(0,\infty)$ with $\lim_{t\to0^+}\eta(t)=0$ such that whenever $E,F\subset\Omega$ are nondegenerate continua with $E\cap F$ non-empty, we have \[ \frac{\text{diam}(f(E))}{\text{diam}(f(F))}\le \eta\left(\frac{\text{diam}(E)}{\text{diam}(F)}\right). \] \end{defn} \begin{defn}[Quasisymmetry] A homeomorphism $f:\Omega\to\Omega^\prime$ is said to be an $\eta$-quasisymmetry if $\eta:[0,\infty)\to[0,\infty)$ is a homeomorphism and for each triple of distinct points $x,y,z\in\Omega$ we have \[ \frac{d_Y(f(x),f(y))}{d_Y(f(x),f(z))}\le \eta\left(\frac{d_X(x,y)}{d_X(x,z)}\right). \] \end{defn} Quasisymmetries are necessarily BQS homeomorphisms, but not all BQS homeomorphisms are quasisymmetric as the mapping $f$ in Example~\ref{ex:not-BQS-Plane-Sphere} shows. However, if both $\Omega$ and $\Omega^\prime$ are of bounded turning, then every BQS homeomorphism is necessarily quasisymmetric. BQS homeomorphisms between two locally path-connected metric spaces continue to be BQS homeomorphisms when we replace the original metrics with their respective Mazurkiewicz metrics, see Proposition~\ref{prop:BQS-Mazur}. When equipped with the respective Mazurkiewicz metrics, the class of BQS homeomorphisms coincides with the class of quasisymmetric maps. However, a domain equipped with its Mazurkiewicz metric could have a different prime end structure than the prime end structure obtained with respect to the original metric, see Example~\ref{ex:long-toothed-double-comb} for instance. Hence, considering BQS maps as quasisymmetric maps between two metric spaces equipped with a Mazurkiewicz metric would not give a complete picture of the geometry of the domain. There are many notions of quasiconformality in the metric setting, the above two being examples of them. The following is a geometric version. \begin{defn}[Geometric quasiconformality] Let $\mu_Y$ be an Ahlfors $Q$-regular measure on $Y$ and $\mu_X$ be a doubling measure on $X$. A homeomorphism $f:\Omega\to\Omega^\prime$ is a \emph{geometrically quasiconformal} mapping if there is a constant $C\ge 1$ such that whenever $\Gamma$ is a family of curves in $\Omega$, we have \[ C^{-1} \Mod_Q(f\Gamma)\le \Mod_Q(\Gamma)\le C \Mod_Q(f\Gamma). \] Here, by $\Mod_p(\Gamma)$ we mean the number \[ \Mod_p(\Gamma):=\inf_\rho\int_\Omega\rho^p\, d\mu_X \] with infimum over all non-negative Borel-measurable functions $\rho$ on $\Omega$ for which $\int_\gamma\rho\, ds\ge 1$ whenever $\gamma\in\Gamma$. \end{defn} From the work of Ahlfors and Beurling~\cite{Ahl, Ahl1, AB} we know that conformal mappings between two planar domains are necessarily geometrically quasiconformal; a nice treatment of quasiconformal mappings on Euclidean domains can be found in~\cite{Va}. Hence every simply connected planar domain that is not the entire complex plane is geometrically quasiconformally equivalent to the unit disk. However, as Example~\ref{example:comb} shows, not every conformal map is a BQS homeomorphism; hence among homeomorphisms between two Euclidean domains, the class of BQS homeomorphisms is smaller than the class of geometric quasiconformal maps. Furthermore, from Example~\ref{example:slit} we know that while quasisymmetric maps between two Euclidean domains are BQS homeomorphisms, not all BQS homeomorphisms are quasisymmetric. Thus the narrowest classification of Euclidean domains is via quasisymmetric maps, the next narrowest is via BQS homeomorphisms. Among locally Loewner metric measure spaces, geometric quasiconformal maps provide the widest classification. Therefore, even in classifying simply connected planar domains, a deeper understanding of the geometry of the domains is gained by considering the Carath\'eodory prime end compactification in tandem with the prime ends constructed in~\cite{ABBS, ES, E}. \section{Bounded geometry and Loewner property} Not all BQS homeomorphisms are quasisymmetric, as shown by Example~\ref{example:slit} from the previous section, and not all geometrically quasiconformal maps are BQS, as shown by Example~\ref{example:comb}. On the other hand, BQS homeomorphisms need not be geometrically quasiconformal, as the next example shows. \begin{ex} Let $X=\mathbb{R}^n$ be equipped with the Euclidean metric and Lebesgue measure, and $Y=\mathbb{R}^n$ be equipped with the metric $d_Y$ given by $d_Y(x,y)=\sqrt{\Vert x-y\Vert}$. Then $X$ has a positive modulus worth of families of non-constant curves, while $Y$ has none. Therefore the natural identification map $f:X\to Y$ is not geometrically quasiconformal; however, it is not difficult to see that $f$ is a BQS homeomorphism and a quasisymmetric map. \end{ex} In this section we will describe notions of Ahlfors regularity and Poincar\'e inequality that are needed in the final section of this paper where geometric quasiconformal maps are studied. \begin{remark} Note that $\Omega$ is a domain in $X$, and hence it inherits the metric $d_X$ from $X$. However, $\Omega$ also has other induced metrics as well, for example the Mazurkiewicz metric $\dum$ as in Definition~\ref{def:Mazurk}. We denote the balls in $\Omega$ with respect to the Mazurkiewicz metric $\dum$, centered at $z\in\Omega$ and with radius $\rho>0$, by $B_M(z,\rho)$. Since we assume that $X$ is locally path connected, we know that the topology generated by $d_X$ in $\Omega$ and the topology generated by $\dum$ are the same. To see this, observe that if $U\subset\Omega$ is open with respect to the metric $d_X$, then for each $x\in U$ there is some $r>0$ such that $B(x,2r)\subset U$. Then as $d_X\le \dum$, it follows that $B_M(x,r)\subset B(x,2r)\subset U$; that is, $U$ is open with respect to $\dum$. Next, suppose that $U\subset\Omega$ is open with respect to $\dum$, and let $x\in U$. Then there is some $\rho>0$ such that $B_M(x,3\rho)\subset U$. We can also choose $\rho$ small enough so that $B(x,3\rho)\subset\Omega$. Then by the local path-connectedness of $X$, there is an open set $W\subset B(x,\rho)$ with $x\in W$ such that $W$ is path-connected. So for each $y\in W$ there is a path (and hence a continuum) $K\subset W$ with $x,y\in K$. Note that then $\dum(x,y)\le \diam(K)\le 2\rho<3\rho$, that is, $y\in B_M(x,3\rho)\subset U$. Therefore $W\subset U$ with $x\in W$ and $W$ open with respect to the metric $d_X$. It follows that $U$ is open with respect to $d_X$ as well. \end{remark} From the above remark, given an interval $I\subset\mathbb{R}$, a map $\gamma:I\to\Omega$ is a path with respect to $d_X$ if and only if it is a path with respect to $\dum$. \begin{defn}[Upper gradients] Let $Z$ be a metric space and $d_\Omega$ a metric on $\Omega$. Given a function $f:\Omega\to Z$, we say that a non-negative Borel function $g$ is an upper gradient of $f$ in $\Omega$ with respect to the metric $d_\Omega$ if whenever $\gamma$ is a non-constant compact rectifiable curve in $\Omega$, we have \[ d_Z(f(x),f(y))\le \int_\gamma g\, ds, \] where $x,y$ denote the end points of $\gamma$ and the integral on the right-hand side is taken with respect to the arc-length on $\gamma$. \end{defn} \begin{lemma} If $\gamma$ is a curve in $\Omega$, then $\gamma$ is rectifiable with respect to $\dum$ if and only if it is rectifiable with respect to $d_X$; moreover, $\ell_{d_X}(\gamma)=\ell_{\dum}(\gamma)$. Furthermore, if $g$ is a non-negative Borel measurable function on $\Omega$, then $g$ is an upper gradient of a function $u$ with respect to the metric $d_X$ if and only if it is an upper gradient of $u$ with respect to $\dum$. Also, given a family $\Gamma$ of paths in $\Omega$ and $1\le p<\infty$, the quantity $\Mod_p(\Gamma)$ is the same with respect to $d_X$ and with respect to $\dum$. \end{lemma} \begin{proof} It suffices to prove the lemma for non-constant paths $\gamma:I\to \Omega$ with $I$ a compact interval in $\mathbb{R}$. Since $d_X\le \dum$, it follows that $\ell_{d_X}(\gamma)\le \ell_{\dum}(\gamma)$ (whether $\gamma$ is rectifiable or not, this holds). To show that converse inequality, let $t_0<t_1<\cdots<t_m$ be a partition of the domain interval $I\subset\mathbb{R}$ of $\gamma$. Then for $j=0,\cdots, m-1$, note that \[ \dum(\gamma(t_j),\gamma(t_{j+1}))\le \diam(\gamma\vert_{[t_j,t_{j+1}]}) \le \ell_{d_X}(\gamma\vert_{[t_j,t_{j+1}]}). \] It follows that \[ \sum_{j=0}^{m-1}\dum(\gamma(t_j),\gamma(t_{j+1}))\le \ell_{d_X}(\gamma). \] Taking the supremum over all such partitions of $I$ gives $\ell_{\dum}(\gamma)\le \ell_{d_X}(\gamma)$. Therefore, whether $\gamma$ is rectifiable or not (with respect to either of the two metrics), we have $\ell_{d_X}(\gamma)=\ell_{\dum}(\gamma)$. The rest of the claims of the lemma now follow directly from this identity. \end{proof} Given the above lemma, the notions of Moduli of path families and geometric quasiconformality of mappings can be taken with respect to either of $d_X$ or $\dum$ (and respectively on the image side in the case of geometric quasiconformal mappings). On the other hand, the notions of Poincar\'e inequality and Ahlfors regularity differ in general based on whether we consider the metric $d_X$ or the metric $\dum$, for the balls are different with respect to these two metrics. \begin{defn}[Poincar\'e inequality] We say that $\Omega$ supports a $p$-Poincar\'e inequality with respect to the metric $d_\Omega$ if there are constants $C>0$ and $\lambda\ge 1$ such that whenever $u:\Omega\to\mathbb{R}$ has $g$ as an upper gradient on $\Omega$ with respect to the metric $d_\Omega$ and whenever $x\in\Omega$ and $r>0$, we have \[ \inf_{c\in\mathbb{R}}\frac{1}{\mu(B_\Omega)}\int_B|u-c|\, d\mu\le C\, r\, \left(\frac{1}{\mu(\lambda B_\Omega)}\int_{\lambda B}g^p\, d\mu\right)^{1/p}, \] where $B_\Omega:=\{y\in\Omega\, :\, d_\Omega(x,y)<r\}$ and $\lambda B_\Omega:=\{y\in\Omega\, :\, d_\Omega(x,y)<\lambda r\}$. \end{defn} \begin{defn}[Ahlfors regularity] We say that a measure $\mu$ is doubling on $\Omega$ with respect to a metric $d_\Omega$ if $\mu$ is Borel regular and there is a constant $C\ge 1$ such that for each $x\in \Omega$ and $r>0$, \[ \mu(B_\Omega(x,2r))\le C\, \mu(B_\Omega(x,r)). \] We say that $\mu$ is Ahlfors $Q$-regular (with respect to the metric $d_\Omega$) for some $Q>0$ if there is a constant $C\ge 1$ such that whenever $x\in\Omega$ and $0<r<2\diam(\Omega)$ (with diameter taken with respect to the metric $d_\Omega$) if \[ \frac{r^Q}{C}\le \mu(B_\Omega(x,r))\le C\, r^Q. \] \end{defn} From the seminal work of Heinonen and Koskela~\cite[Theorem~5.7]{HeiK} we know that if a complete metric measure space $(X,d,\mu)$ is Ahlfors $Q$-regular (with some $Q>1$), then it supports a $Q$-Poincar\'e inequality if and only if it satisfies a strong version of the $Q$-Loewner property. \begin{defn} We say that $(X,d,\mu)$ satisfies a \emph{$Q$-Loewner property} if there is a function $\phi:(0,\infty)\to(0,\infty)$ such that whenever $E,F\subset X$ are two disjoint continua (that is, connected compact sets with at least two points), \[ \Mod_Q(\Gamma(E,F,X)\ge \phi(\Delta(E,F)) \] where $\Gamma(E,F,X)$ is the collection of all curves in $X$ with one end point in $E$ and the other in $F$, and \[ \Delta(E,F):=\frac{\dist(E,F)}{\min\{\diam(E),\diam(F)\}} \] is the relative distance between $E$ and $F$. The strong version of the $Q$-Loewner property is that \[ \liminf_{t\to 0^+}\phi(t)=\infty. \] \end{defn} \begin{thm}[{\cite[Theorem~3.6]{HeiK}}]\label{thm:HeiK} If $(X,d,\mu)$ is $Q$-Loewner for some $Q>1$ and $\mu$ is Ahlfors $Q$-regular, then we can take $\phi(t)=C\, \max\{\log(1/t), |\log(t)|^{1-Q}\}$ for some constant $C\ge 1$. \end{thm} \section{Extending BQS homeomorphisms between bounded domains to prime end closures} The principal focus of this section and the next section is to obtain a Carath\'eodory-type extension of BQS homeomorphisms between two domains. In this section we will focus on bounded domains, and in the next section we will study unbounded domains. Thus in this section both $\Omega$ and $\Omega^\prime$ are bounded domains in proper, locally connected metric spaces. Theorem~\ref{thm:BQS-fp-homeo} and Proposition~\ref{prop:bdd-domain-ends-match} are the two main results of this section. However, Proposition~\ref{prop:BQS-Mazur} is of independent interest as it demonstrates that BQS property and geometric quasiconformality can be formulated equivalently with respect to $d_X, d_Y$ or with respect to $\dum,\dumm$; moreover, this proposition holds also for unbounded domains. To understand how BQS homeomorphisms transform prime ends, we first need the following two lemmata. \begin{lemma}\label{lem:bdd-to-bdd} Let $X$ and $Y$ be complete, doubling, locally path-connected metric spaces with $\Omega\subset X$, $\Omega^\prime\subset Y$ two domains (not necessarily bounded). If there is a BQS homeomorphism $f:\Omega\to\Omega^\prime$, then $\Omega$ is bounded if and only if $\Omega^\prime$ is bounded. Moreover, if $A\subset\Omega$ with $\diam_M(A)<\infty$, then $\diam_M^\prime(f(A))<\infty$. \end{lemma} \begin{proof} It suffices to show that if $\Omega$ is bounded, then $\Omega^\prime$ is also bounded. We fix a continuum $\Gamma\subset\Omega$ such that $\diam(\Gamma)\ge \diam(\Omega)/2$, and let $\tau:=\diam(\Gamma)$, $s:=\diam(f(\Gamma))$. Note that $0<s\tau<\infty$. Let $z,w\in\Omega^\prime$. Then as $\Omega$ is locally path-connected, it follows that there is a path (and hence a continuum) $\Lambda$ connecting $f^{-1}(z)$ to $f^{-1}(w)$. The set $f(\Lambda)$ is a continuum in $\Omega^\prime$ with $z,w\in f(\Lambda)$. Let $\Gamma_1$ be the continuum obtained by connecting $\Gamma$ to $\Lambda$ in $\Omega$; then $\diam(\Gamma_1)\ge \tau$ and so by the BQS property of $f$ we now have \[ \frac{\diam(f(\Lambda))}{\diam(f(\Gamma_1))}\le \eta\left(\frac{\diam(\Lambda)}{\tau}\right) \le \eta\left(\frac{\diam(\Omega)}{\tau}\right). \] Moreover, as $\Gamma$ and $\Gamma_1$ intersect with \[ \diam(\Omega)/2\le \diam(\Gamma)\le \diam(\Gamma_1)\le \diam(\Omega), \] we know from the BQS property of $f$ that \[ \frac{\diam(f(\Gamma_1))}{s}\le \eta\left(\frac{\diam(\Omega)}{\diam(\Omega)/2}\right). \] It follows that \[ d_Y(z,w)\le \diam(f(\Lambda)) \le \diam(f(\Gamma_1))\, \eta\left(\frac{\diam(\Omega)}{\tau}\right) \le s\, \eta(2)\, \eta\left(\frac{\diam(\Omega)}{\tau}\right)<\infty, \] and so $\Omega^\prime$ is also bounded. Now suppose that $A\subset\Omega$ with $\diam_M(A)<\infty$. If $A$ has only one point, then there is nothing to prove. Hence assume that $0<\diam_M(A)$; then we can find a continuum $\Gamma\subset\Omega$ intersecting $A$, such that \[ \diam_M(A)/2\le \diam(\Gamma)=\diam_M(\Gamma)\le 2\diam_M(A). \] Let $z,w\in f(A)$; then we can find a path $\beta\subset\Omega$ with end points $f^{-1}(z), f^{-1}(w)$ such that $\diam(\beta)\le 2\diam_M(A)$. We can also find a continuum $\gamma\subset\Omega$ with $f^{-1}(w)$ and a point from $A\cap\Gamma$ contained in $\gamma$ and $\diam(\gamma)\le 2\diam_M(A)$ (note that $f^{-1}(w)\in A\cap\beta$). It follows from the BQS property of $f$ that \[ \frac{\diam(f(\beta))}{\diam(f(\gamma\cup \Gamma))} \le \eta\left(\frac{\diam(\beta)}{\diam(\gamma\cup \Gamma)}\right) \le \eta\left(\frac{2\diam_M(\Gamma)}{\diam(f(\Gamma))}\right). \] Applying the BQS property of $f$ to the two intersecting continua $\gamma\cup \Gamma$ and $\Gamma$ gives \[ \frac{\diam(f(\gamma\cup \Gamma))}{\diam(f(\Gamma))} \le \eta\left(\frac{\diam(\gamma\cup \Gamma)}{\diam(\Gamma)}\right) \le \eta(8). \] It follows that \[ \dumm(z,w) \le \diam(f(\beta))\le \eta(8)\, \eta\left(\frac{2\diam_M(\Gamma)}{\diam(f(\Gamma))}\right). \] It follows that \[ \diam_M^\prime(f(A)) \le \diam(f(\beta))\le \eta(8)\, \eta\left(\frac{2\diam_M(\Gamma)}{\diam(f(\Gamma))}\right)<\infty \] as desired. \end{proof} \begin{lemma}\label{lem:maz-dist-bdry-positive} Let $X$ and $Y$ be complete, doubling, locally path-connected metric spaces with $\Omega\subset X$, $\Omega^\prime\subset Y$ two domains (not necessarily bounded) and let $f:\Omega\to\Omega^\prime$ be a BQS homeomorphism. Suppose that $E,F\subset\Omega$ are two non-empty bounded connected open sets with $E\subset F$ such that \begin{equation}\label{eq:pos-mzr} \dM(\Omega\cap\partial E,\Omega\cap\partial F)>0. \end{equation} Then \[ \dM^\prime(\Omega^\prime\cap\partial f(E),\Omega^\prime\cap\partial f(F))>0. \] \end{lemma} \begin{proof} Suppose $\gamma$ is a continuum in $\Omega^\prime$ connecting $\Omega^\prime\cap\partial f(E),\Omega^\prime\cap\partial f(F)$. Then because $f$ is a homeomorphism, $f^{-1}(\gamma)$ is a continuum in $\Omega$ connecting $\Omega\cap\partial E,\Omega\cap\partial F$, and hence \[ \diam(f^{-1}(\gamma)\ge \dM(\Omega\cap\partial E,\Omega\cap\partial F):=\tau>0. \] Let $A\subset\Omega$ be a continuum in $F$ with $2\diam(F)\ge \diam(A)$; as $X$ is locally path connected and $F$ is a non-empty bounded connected open set, such a continuum exists. As $f^{-1}\gamma$ intersects $F$ (for by the assumption~\eqref{eq:pos-mzr}, we know that $\Omega\cap\partial E\subset F$), we can find a continuum $\beta\subset F$ intersecting both $A$ and $f^{-1}(\gamma)\cap F$ such that $\diam(\beta)\le 2\diam(F)$. By applying the BQS property of $f$ to the two intersecting continua $A\cup\beta$ and $f^{-1}(\gamma)$, we have \[ \frac{\diam(f(A\cup\beta))}{\diam(\gamma)}\le \eta\left(\frac{\diam(A\cup\beta)}{\diam(f^{-1}(\gamma))}\right) \le \eta\left(\frac{4\diam(F)}{\tau}\right). \] As $\diam(f(A\cup\beta))\ge \diam(f(A))>0$, we see that \[ \diam(\gamma)\ge \frac{\diam(f(A))}{\eta\left(\frac{4\diam(F)}{\tau}\right)}>0, \] that is, \[ \dM^\prime(\Omega^\prime\cap\partial f(E),\Omega^\prime\cap\partial f(F)) \ge \frac{\diam(f(A))}{\eta\left(\frac{4\diam(F)}{\tau}\right)}>0 \] as desired. \end{proof} \begin{lemma}\label{lem:BQS-single-to-single} Let $X$ and $Y$ be complete, doubling, locally path-connected metric spaces with $\Omega\subset X$, $\Omega^\prime\subset Y$ two domains (not necessarily bounded) and let $f:\Omega\to\Omega^\prime$ be a BQS homeomorphism. If $\{E_k\}$ is a chain of $\Omega$ with singleton impression, then $\bigcap_k\overline{f(E_k)}$ has only one point. \end{lemma} \begin{proof} Suppose that and let $\{E_k\}$ is a chain with singleton impression. Then $\lim_k\diam(E_k)=0$. We fix a continuum $J\subset E_1$ with $\diam(E_1)/2\le \diam(J)\le \diam(E_1)$, and let $k\in\mathbb{N}$. For each pair $z,w\in f(E_k)$ we can find a continuum $\gamma\subset E_k$ containing $f^{-1}(z)$ and $f^{-1}(w)$ such that $\diam(\gamma)\le \diam(E_k)$. Let $J_k$ be a continuum in $E_1$ that intersects both $J$ and $\gamma$; note that $\diam(J_k\cup J)\le \diam E_1$ as well. Then by the BQS property of $f$, we obtain \[ \frac{\diam(f(\gamma))}{\diam(f(J\cup J_k))} \le \eta\left(\frac{\diam(\gamma)}{\diam(J\cup J_k)}\right)\le \eta\left(\frac{\diam(E_k)}{\diam(J)}\right). \] On the other hand, by applying the BQS property of $f$ to the two intersecting continua $J$ and $J\cup J_k$, we see that \[ \frac{\diam(f(J\cup J_k))}{\diam(f(J))} \le \eta\left(\frac{\diam(J\cup J_k)}{\diam(f(J))}\right)\le \eta(2). \] Therefore \[ \diam(f(\gamma))\le \eta(2)\, \eta\left(\frac{\diam(E_k)}{\diam(J)}\right). \] It follows that \[ \diam(f(E_k))\le \eta(2)\, \eta\left(\frac{\diam(E_k)}{\diam(J)}\right)\to 0\text{ as }k\to\infty. \] Therefore $\bigcap_k\overline{f(E_k)}$ has at most one point, and as $\overline{f(E_1)}$ is compact and $\emptyset\ne\overline{f(E_{k+1})}\subset\overline{f(E_k)}$, it follows that $\bigcap_k\overline{f(E_k)}$ has exactly one point. \end{proof} \begin{thm}\label{thm:BQS-fp-homeo} Let $X$ and $Y$ be complete, doubling metric spaces that are locally path connected. Let $\Omega \subseteq X$ and $\Omega' \subseteq Y$ be bounded domains. Let $f \colon \Omega \to \Omega'$ be a branched quasi-symmetric (BQS) homeomorphism. Then, $f$ induces a homeomorphism $f_P \colon \pec{\Omega} \to \pec{\Omega'}$. \end{thm} Note that both $\Omega$ and $\Omega^\prime$ are locally path connected because $X$ and $Y$ are; however, we do not assume any further topological properties for these domains. For instance, we do not assume that either $\Omega$ or $\Omega^\prime$ is finitely connected at their boundaries, and so we do not know that $\overline{\Omega}^P$ is compact. \begin{proof} We must show that $f$ maps prime ends to prime ends. We first show that $f$ maps chains to chains. As $f$ is a homeomorphism, $f$ maps admissible sets to admissible sets. Indeed, if $E\subset\Omega$ is an admissible set, then $E$ is connected and so $f(E)$ is also connected. Suppose $\overline{f(E)}$ does not intersect $\partial\Omega^\prime$; then $\overline{f(E)}$ is a compact subset of $\Omega^\prime$, and hence $f^{-1}(\overline{f(E)})$ is a compact subset of $\Omega$. Therefore $\overline{E}\subset f^{-1}(\overline{f(E)})\subset\Omega$, which violates the requirement that $\overline{E}\cap\partial\Omega$ be non-empty. Suppose $\{E_i\}$ is a chain in $\Omega$. We check conditions $(a) - (c)$ of Definition~\ref{def:chains} for the sequence $\{fE_i\}$. Note that if $E \subseteq F \subseteq \Omega$, then $fE \subseteq fF \subseteq \Omega'$ as $f$ is a homeomorphism. Hence, $fE_{i+1} \subseteq fE_i$ for all $i$, so condition (a) holds. Condition~(b) follows from Lemma~\ref{lem:maz-dist-bdry-positive} by considering $E:=E_{k+1}$ and $F:=E_k$. Lastly, let $\{E_i\} \in \mathscr{E}$, and for each $i$ let $F_i = fE_i$. Suppose $y \in \Omega'$. Let $x = f^{-1}(y) \in \Omega$. As $\bigcap_{i=1}^\infty \overline{E_i} \subseteq \partial \Omega$, there is an $i_0$ and a $\rho > 0$ such that $B(x, \rho) \subseteq \Omega$ and $B(x, \rho) \cap \overline{E_{i_0}} = \emptyset$. Then, $f(B(x,\rho))\cap f(E_{i_0})$ is empty. As $f(B(x,\rho))$ open and $y\in f(B(x,\rho))$, there is some $\rho_1>0$ such that $B(y,\rho_1)\subset\Omega^\prime\cap f(B(x,\rho))$. It follows that $\overline{f(E_{i_0})}\cap B(y,\rho_1/2)$ is empty, and hence $y\not\in\overline{f(E_{i_0})}$. Condition (c) follows. The above argument tells us that given a BQS homeomorphism $f:\Omega\to\Omega^\prime$, each chain $\{E_k\}$ is mapped to a chain $f\{E_k\}:=\{f(E_k)\}$. Next we show that ends are mapped to ends. To this end, note that if $\{G_k\}$ is also a chain in $\Omega$ with $\{G_k\} | \{F_k\}$, then for each $k$ there is a positive integer $i_k$ such that $G_{i_k}\subset F_k$. Hence $f(G_{i_k})\subset f(E_k)$, that is, $f\{G_k\} | f\{E_k\}$. Therefore division relation among chains is respected by $f$. Therefore, for each end $\mathscr{E}$ we have that $f\mathscr{E}\subset\mathscr{G}$ for some end $\mathscr{G}$ of $\Omega^\prime$. Given that $f^{-1}:\Omega^\prime\to\Omega$ is also a BQS homeomorphism, we see that $f\mathscr{E}=\mathscr{G}$. Finally, if $\mathscr{E}$ is a prime end, then whenever $\{G_k\}$ is an end for $\Omega^\prime$ with $\{G_k\} | f\mathscr{E}$, we have that $f^{-1}\{G_k\} | \mathscr{E}$ and hence as $\mathscr{E}$ is a prime end, we must have $f^{-1}\{G_k\}\in\mathscr{E}$. Therefore $\mathscr{E} | f^{-1}\{G_k\}$, from which it follows that $f\mathscr{E} | \{G_k\}$, that is, $\{G_k\}\in f\mathscr{E}$. Hence $f\mathscr{E}$ is also a prime end. Thus we conclude that whenever $\mathscr{E}\in\partial_P\Omega$, we must have $f\mathscr{E}\in\partial_P\Omega^\prime$, and we therefore have the natural extension $f_P:\overline{\Omega}^P\to\overline{\Omega^\prime}^P$ as desired. The fact that $f_P$ is bijective follows from applying the above discussion also to $f^{-1}$ (a BQS homeomorphism in its own right) to obtain an inverse of $f_P$. To complete the proof of the theorem it suffices to show that $f_P$ is continuous, for then a similar argument applied to $f^{-1}$ and $f^{-1}_P$ yields continuity of $f_P^{-1}$. To show continuity, it suffices to show that if $\{\zeta_k\}$ is a sequence in $\overline{\Omega}^P$ and $\zeta\in\overline{\Omega}^P$ such that $\zeta_k\to\zeta$, then $f\zeta_k\to f\zeta$. If $\zeta\in\Omega$, then the tail-end of the sequence also must lie in $\Omega$, and thus the claim will follow from the fact that $f_P\vert_\Omega=f$ is a homeomorphism of $\Omega$. Therefore it suffices to consider only the case $\zeta\in\partial_P\Omega$. By separating the sequence into two subsequences if necessary, we can consider two cases, namely, that $\zeta_k\in\Omega$ for each $k$, or $\zeta_k\in\partial_P\Omega$ for each $k$. First, suppose that $\zeta_k\in\Omega$ for each $k$. Let $\{E_k\}\in\zeta$. Then the fact that $\zeta_k\to\zeta$ tells us that for each $k\in\mathbb{N}$ we can find a positive integer $i_k$ such that whenever $i\ge i_k$, we have $\zeta_i\in E_k$. It then follows that $f(\zeta_i)\in f(E_k)$. Thus for each $k$ there is a positive integer $i_k$ with $f(\zeta_i)\in f(E_k)$ when $i\ge i_k$, that is, $f(\zeta_k)\to f([E_k])=f(\zeta)$. Finally, suppose that $[F_{j,k}]=\zeta_k\in\partial_P\Omega$ for each $k$. We again choose any chain $\{E_k\}\in\zeta$. Then for each $k$ there is a positive integer $i_k$ such that for each $i\ge i_k$, there exists a positive integer $j_{i,k}$ such that whenever $j\ge j_{i,k}$ we have $F_{j,i}\subset E_k$. So we have $f(F_{j,i})\subset f(E_k)$ for $j\ge j_{i,k}$, that is, $f([F_{j,k}])=f(\zeta_k)\to f([E_k])=f(\zeta)$. This completes the proof of the theorem. \end{proof} \begin{remark}\label{rmk:usefulness1} The only place in the above proof where the BQS property plays a key role is in verifying that if $E_k,E_{k+1}$ are two connected sets in $\Omega$ with $E_{k+1}\subset E_k$ and \begin{equation}\label{eq:0} \dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1})>0, \end{equation} then we must have \begin{equation}\label{eq:1} \dM(\Omega^\prime\cap\partial f(E_k),\Omega^\prime\cap\partial f(E_{k+1}))>0. \end{equation} This part was explicated into Lemma~\ref{lem:maz-dist-bdry-positive}. The remaining parts of the proof of existence and continuity of the map $f_P$ hold for \emph{any} homeomorphism $f:\Omega\to\Omega^\prime$ that satisfies~\eqref{eq:1} for each pair of connected sets $E_{k+1}\subset E_{k}\subset \Omega$ that satisfies~\eqref{eq:0}. This is useful to keep in mind in the final section, where we consider quasiconformal mappings that are not necessarily BQS maps. \end{remark} In the situation of the above theorem, if $\overline{\Omega}^P$ is compact, then so is $\overline{\Omega^\prime}^P$. This is a useful property in determining that two domains are not BQS-homeomorphically equivalent, as the following example shows. \begin{ex}\label{example:comb} With $\Omega$ a planar disk and $\Omega^\prime$ given by \[ \Omega^\prime:=(0,1)\times(0,1)\setminus \bigcup_{n\in\mathbb{N}}\{1/n\}\times[0,1/2], \] we know from the Riemann mapping theorem that $\Omega$ and $\Omega^\prime$ are conformally equivalent. However, as $\overline{\Omega}^P$ is the closed disk, which is compact, and as $\overline{\Omega^\prime}^P$ is not even sequentially compact, it follows that there is \emph{no} BQS homeomorphism between these two planar domains. \end{ex} The above theorem is useful in other contexts as well. \begin{prop}\label{prop:bdd-domain-ends-match} Suppose that $X$ and $Y$ are locally path connected and $\Omega\subset X$, $\Omega^\prime\subset Y$ are bounded open connected sets. Suppose that there is a BQS homeomorphism $f:\Omega\to\Omega^\prime$. \begin{enumerate} \item[(a)] If $\overline{\Omega}^P$ is compact, then so is $\overline{\Omega^\prime}^P$. \item[(b)] If $\overline{\Omega}^P$ is metrizable, then so is $\overline{\Omega^\prime}^P$. \item[(c)] If $\Omega$ is finitely connected at the boundary, then so is $\Omega^\prime$. \end{enumerate} \end{prop} \begin{proof} By Theorem~\ref{thm:BQS-fp-homeo}, homeomorphically invariant properties of $\overline{\Omega}^P$ will be inherited by $\overline{\Omega^\prime}^P$; hence the first two claims of the proposition are seen to be true. On the other hand, finite connectivity of a domain at its boundary is not a homeomorphic invariant. Hence we provide a proof of the last claim of the proposition here. Note by~\cite{BBS1} that a bounded domain is finitely connected at the boundary if and only if all of its prime ends are singleton prime ends and its prime end closure is compact. Thus if $\Omega$ is finitely connected at the boundary, then $\overline{\Omega}^P$ is compact, and hence so is $\overline{\Omega^\prime}^P$. Hence to show that $\Omega^\prime$ is finitely connected at the boundary, it suffices to show that all of the prime ends of $\Omega^\prime$ are singleton prime ends. This is done by invoking Lemma~\ref{lem:BQS-single-to-single}. \end{proof} \begin{ex}\label{ex:long-toothed-double-comb} It is possible to have two homeomorphic equivalent domains with one finitely connected at the boundary and the other, not finitely connected at the boundary. Let \[ \Omega:=(0,1)\times(0,1)\setminus\bigcup_{n\in\mathbb{N}}\left([0,1-1/n]\times\{1/2n\}\right)\cup\left([1/n,1]\times\{1/(2n+1)\}\right) \] and $\Omega^\prime$ be the planar unit disk. Then as $\Omega$ is simply connected and bounded, it follows from the Riemann mapping theorem that $\Omega$ and $\Omega^\prime$ are conformally, and hence homeomorphically, equivalent. However, $\Omega^\prime$ is finitely connected at the boundary and $\Omega$ is not. \end{ex} \begin{ex} The domain $\Omega$ constructed in Example~\ref{ex:long-toothed-double-comb} has the property that $\overline{\Omega}^P$ is compact and metrizable. This is seen by the fact that $\overline{\Omega}^P$ is homeomorphic to $\overline{U}^P$ where $U:=\varphi(\Omega)$ where $\varphi:\mathbb{R}^2\to\mathbb{R}^2$ is given by $\varphi(x,y)=(xy,y)$. Observe that $U$ is simply connected at its boundary, and so $\overline{U}^P$ is metrizable. On the other hand, the domain $\Omega^\prime$ given by \[ \Omega^\prime:=(0,1)\times(0,1)\setminus\bigcup_{n\in\mathbb{N}}\left([0,2/3]\times\{1/2n\}\right)\cup \left([1/3,1]\times\{1/(2n+1)\}\right) \] has the property that $\overline{\Omega^\prime}^P$ is not compact. Hence $\Omega$ is not BQS homeomorphically equivalent to $\Omega^\prime$, even though both are simply connected planar domains that are not finitely connected at the boundary. \end{ex} \begin{ex}\label{example:slit} With $\Omega$ the planar domain given by \[ \Omega:=\{z\in\mathbb{C}\, :\, |z|<1\text{ and }\text{Im}(z)>0\} \] and $\Omega^\prime:=\{z\in\mathbb{C}\, :\, |z|<1\}\setminus [0,1]$ a slit disk, the map $f:\Omega\to\Omega^\prime$ given by $f(z)=z^2$ is a conformal equivalence that is not a quasisymmetric map. However, this map is a BQS homeomorphism, and so has an extension $f_P:\overline{\Omega}=\overline{\Omega}^P\to\overline{\Omega^\prime}^P$. This follows from~\cite[Theorem~6.50]{GW2}. \end{ex} \begin{ex} With $\Omega$ and $\Omega^\prime$ as in Example~\ref{example:slit} above, the map $h:\Omega\to\Omega^\prime$ given by $h(re^{i\theta})=re^{2i\theta}$ is also a BQS homeomorphism which is not conformal. This again follows from~\cite[Theorem~6.50]{GW2}. \end{ex} As indicated by the definition of chains in the prime end theory, a domain $\Omega$ can also naturally be equipped with the Mazurkiewicz metric $\dum$. \begin{prop}\label{prop:BQS-Mazur} Let $X$ and $Y$ be locally path-connected metric spaces, and $f:\Omega\to\Omega^\prime$ be a homeomorphism. Then $f$ is BQS with respect to the respective metrics $d_X$ and $d_Y$ on $\Omega$ and $\Omega^\prime$ if and only if it is BQS with respect to the corresponding Mazurkiewicz metrics $\dum$, $\dumm$. \end{prop} \begin{proof} To prove the theorem it suffices to show that whenever $E\subset\Omega$ is a continuum, we have $\diam(E)=\diam_M(E)$. Note that $x,y\in\Omega$ we have $d(x,y)\le \dum(x,y)$. To prove the reverse of this inequality, let $E\subset\Omega$ be a continuum, $\varepsilon>0$, and we choose $x,y\in E$ such that $[1+\varepsilon]\dum(x,y)\ge \diam_M(E)$. By the definition of the Mazurkiewicz metric $\dum$ (see Definition~\ref{def:Mazurk}), we have \[ \dum(x,y)\le \diam(E). \] It follows that \[ \diam_M(E)\le [1+\varepsilon]\diam(E), \] The desired claim now follows by letting $\varepsilon\to 0^+$. \end{proof} \begin{remark}\label{rem:fp-is-BQS} By the above proposition together with~\cite[Proposition~10.11]{Hei}, if $\Omega$ and $\Omega^\prime$ are finitely connected at their respective boundaries and $f:\Omega\to\Omega^\prime$ is a BQS homeomorphism, then its extension $f_P:\overline{\Omega}^P\to\overline{\Omega^\prime}^P$ is a BQS homeomorphism with respect to the respective Mazurkiewicz metrics $\dum$ and $\dumm$. \end{remark} Given Proposition~\ref{prop:BQS-Mazur} and the above remark, it is natural to ask why we do not consider prime ends as constructed with respect to the Mazurkiewicz metric induced by the original metric $d_X$ on $\Omega$. However, while the property that a set $E\subset\Omega$ be connected is satisfied under both $d_X$ and the induced Mazurkiewciz metric $\dum$, the crucial property that $\overline{E}\cap\partial\Omega$ be non-empty depends on the metric (since the closure $\overline{E}$ depends on the metric), and hence we have fewer acceptable sets and chains, and therefore prime ends, under the induced metric $\dum$ than under the original metric $d_X$. See Lemma~\ref{lem:prime-end-dM} below for the limitations put on prime ends under $\dum$. For instance, the domain $\Omega$ as in Example~\ref{ex:long-toothed-double-comb} will have as prime ends under $\dum$ only the singleton prime ends, with no prime end with impression containing any point $(x,0)$, $0\le x\le 1$. Hence under the metric $\dum$ the prime end closure of $\Omega$ will not be compact. The issue of considering prime ends with respect to the original metric $d_X$ versus the induced metric $\dum$ becomes even more of a delicate issue when $\Omega$ is not bounded, see Section~\ref{sec:unbounded} below. \begin{lemma}\label{lem:prime-end-dM} Let $\Omega$ be a bounded domain in a locally path connected complete metric space $X$, and let $\dum$ be the Mazurkiewicz metric on $\Omega$ induced by the metric $d_X$ inherited from $X$. If $[\{E_k\}]$ is a prime end in $\Omega$ with respect to $\dum$, then $[\{E_k\}]$ is a prime end with respect to $d_X$ with $\bigcap_k\overline{E_k}$ a singleton set. \end{lemma} \begin{proof} Note first that if $E\subset\Omega$ with $\overline{E}^M$ compact, then $\overline{E}^M$ is sequentially compact and hence so is $\overline{E}$; hence it follows that if $\overline{E}^M$ is compact, then $\overline{E}$ is also compact. Combining this together with the fact that $\diam=\diam_M$ for connected sets, tells us that if $\{E_k\}$ is a chain with respect to $\dum$ then it is a chain with respect to $d$. Next, note that if $\{E_k\}$ is a chain with respect to $\dum$ and $\{G_k\}$ is a chain with respect to $d$ such that $\{G_k\}\, |\, \{E_k\}$, then, by passing to a sub-chain if necessary, $\{G_k\}$ is also a chain with respect to $\dum$. Indeed, the only property that needs to be verified here is whether each $\overline{G_k}^M$ is compact. By the divisibility assumption, we know that there is some $j_0\in\mathbb{N}$ such that whenever $j\ge j_0$ we have $G_j\subset E_1$. Then $\overline{G_j}^M$ is a closed subset of the compact set $\overline{E_1}^M$, and hence is compact. Since $E_k$ is acceptable with respect to $\dum$, we know that $\overline{E_k}^M$, the closure of $E_k$ under the metric $\dum$, is compact. It then follows also that $\bigcap_k\overline{E_k}^M$ is non-empty and has a point $\zeta\in\partial_M\Omega$. We can then find a sequence $x_k\in E_k$ with $\lim_k \dum(x_k,\zeta)=0$. Since $d_X\le \dum$ on $\Omega$, it follows that $\{x_k\}$ is a Cauchy sequence with respect to the metric $d_X$, and as $X$ is complete, there is a point $x\in \overline{\Omega}$ such that $\lim_kd_X(x_k,x)=0$. Since $\{x_k\}$ is also a Cauchy sequence with respect to the metric $\dum$, for each positive integer $k$ we can find a continuum $\Gamma_k$ in $\Omega$ with end points $x_k$ and $x_{k+1}$ such that (by passing to a subsequence if necessary) \[ \diam_M(\Gamma_k)=\text{diam}(\Gamma_k)\le 2^{-(k+1)}. \] In the above, the first identity is inferred from the proof of Proposition~\ref{prop:BQS-Mazur} above. For each positive ineger $k$ let $G_k$ be the connected component of $B(x,2^{1-k})\cap\Omega$ containing the connected set $\bigcup_{j\ge k}\Gamma_j\subset\Omega$. Then $\{G_k\}$ is a chain in $\Omega$ with respect to the metric $d$, and $\{x\}=I(\{G_k\})$. It is clear from the second paragraph above that $\{G_k\}$ is a chain also with respect to $\dum$, with $\{\zeta\}=\bigcap_k\overline{G_k}^M$. As a chain with singleton impression, it follows that the end (with respect to $\dum$) that $\{G_k\}$ belongs to is a prime end. Moreover, for each positive integer $k$ we know that infinitely many of the sets $G_j$, $j\in\mathbb{N}$, intersect $E_k$; it follows from the assumption that $[\{E_k\}]$ is a prime end that $[\{E_k\}]=[\{G_k\}]$ (see the last part of the proof of Lemma~\ref{lem:end-div-prime-finite-conn}), and so the claim follows. \end{proof} \section{Prime ends for unbounded domains and extensions of BQS homeomorphisms}\label{sec:unbounded} In this section we consider unbounded domains, and so we adopt the modification to the construction of ends found in~\cite[Definition~4.12]{E}. However, we introduce a slight modification, namely the boundedness of the separating compacta $R_k$ and $K$ wiht respect to the Mazurkiewicz metric $\dum$. Recall that a metric space is proper if closed and bounded subsets of the space are compact. \begin{defn}\label{def:type-ab-ends} A connected set $E\subset\Omega$ is said to be acceptable if $\overline{E}$ is proper and $\overline{E}\cap\partial\Omega$ is non-empty. A sequence $\{E_k\}$ of acceptable subsets of $\Omega$ is a chain if for each positive integer $k$ we have \begin{enumerate} \item[(a)] $E_{k+1}\subset E_k$, \item[(b)] $\overline{E_k}$ is compact, or $E_k$ is unbounded and there is a compact set $R_k\subset X$ such that $\Omega\setminus R_k$ has two components $C_{1,k}$ and $C_{2,k}$ with $\Omega\cap\partial E_k\subset C_{1,k}$ and $\Omega\cap\partial E_{k+1}\subset C_{2,k}$, and $\diam_M(R_k\cap\Omega)$ is finite, \item[(c)] $\dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1})>0$, \item[(d)] $\emptyset\ne\bigcap_k\overline{E_k}\subset\partial\Omega$. \end{enumerate} \end{defn} The above notion of ends agrees with the notion of ends from Section~\ref{sec:bdd-prime} when $\Omega$ is bounded, for then the properness of $\overline{E}$ will guarantee that $\overline{E}$ is compact. When $\Omega$ is not bounded, the above definition gives us two types of ends,~(a) those that are bounded (i.e.~$E_k$ is bounded for some positive integer $k$) and (b)~those that are unbounded (i.e.~$E_k$ is unbounded for each $k$). While the definition above agrees in philosophy with that from~\cite{E}, but the requirement that $\diam_M(R_k\cap\Omega)$ be finite eliminates some of the candidates for ends from~\cite{E} here. However, ends in our sense are necessarily ends in the sense of~\cite{E}. From~\cite[Section~4.2]{E} we know that if $X$ itself is proper, then ends (and prime ends, see below) as given in~\cite{E} are invariant under sphericalization and flattening procedures, and so understanding ends of type~(b) above can be accomplished by sphericalizing the domain and understanding ends of the resulting bounded domain with impression containing the new point that corresponds to $\infty$. Both of these types of ends have non-empty impressions. The next definition deals with ends that should philosophically be ends with only $\infty$ in their impressions. \begin{defn}\label{def:type-c-ends} An unbounded connected set $E\subset\Omega$ is said to be \emph{acceptable at $\infty$} if $\overline{E}$ is proper and there is a compact set $K\subset X$ such that $\diam_M(K\cap\Omega)<\infty$ and $E$ is a component of $\Omega\setminus K$. A sequence $\{E_k\}$ of sets that are acceptable at $\infty$ is said to be a \emph{chain at $\infty$} if for each positive integer $k$ we have \begin{enumerate} \item[(a)] $E_{k+1}\subset E_k$, \item[(b)] $\dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1})>0$, \item[(c)] $\bigcap_k\overline{E_k}=\emptyset$. \end{enumerate} \end{defn} As with chains and ends for bounded domains in Section~\ref{sec:bdd-prime}, we define divisibility of one chain by another, and say that two chains are equivalent if they divide each other. An end is an equivalence class of chains, and a prime end is an end that is divisible only by itself. It was noted in~\cite[Remark~4.1.14]{E} that every end at $\infty$ is necessarily a prime end. We now return to some mechanisms that make unbounded ends from Definition~\ref{def:type-ab-ends} work. \begin{lemma}\label{lem:E1-E2-separation} Let $E_1$ and $E_2$ be two open connected subsets of $\Omega$ such that $E_2\subset E_1$. Suppose in addition that $R$ is a compact subset of $X$ such that no component of $\Omega\setminus R$ contain points from both $\Omega\cap\partial E_1$ and $\Omega\cap\partial E_2$. Let $R_0:=R\cap\overline{E_1}\setminus E_2$. Then $E_2$ is contained in a component $\widehat{C}$ of $\Omega\setminus R_0$ and $\widehat{C}\subset E_1$. Moreover, no component of $\Omega\setminus R_0$ contains points from both $\Omega\cap\partial E_1$ and $\Omega\cap\partial E_2$. \end{lemma} \begin{proof} Let $C_1$ be the union of all the components of $\Omega\setminus R_0$ that contain points from $\Omega\cap\partial E_1$, and let $C_2$ be the union of all the components of $\Omega\setminus R_0$ that contain points from $\Omega\cap\partial E_2$. Since $\Omega\cap\partial E_2\subset C_2$ and $C_2$ is open, it follows that $C_2\cup E_2$ is a connected subset of $\Omega\setminus R_0$. So there is a component $\widehat{C}$ of $\Omega\setminus R_0$ such that $C_2\cup E_2\subset\widehat{C}\subset \Omega\setminus R_0$, and hence $C_2=\widehat{C}\supset E_2$. Let $U$ be a component of $\Omega\setminus R_0$ such that $U\subset C_1$. If $U\cap\widehat{C}$ is non-empty, then $U=\widehat{C}$, and in this case there are two points $z\in U\cap\partial E_1$ and $w\in\widehat{C}\cap\partial E_2$ such that $z,w\in U$. As $U$ is an open and connected subset of $\Omega$, we can find a curve $\gamma:[0,1]\to U$ with $\gamma(0)=z$ and $\gamma(1)=w$. We can assume, by considering a subcurve of $\gamma$ and modifying $z$ and $w$ if necessary, that $\gamma((0,1))\cap\partial E_1$ and $\gamma((0,1))\cap\partial E_2$ are empty. As $\Omega\cap\partial E_2\subset E_1$, it follows that $\gamma((0,1))\subset \overline{E_1}\setminus E_2$. By the property of separation that $R$ has, we must have $\gamma((0,1))\cap R$ non-empty. Hence $\gamma((0,1))$ intersects $R\cap \overline{E_1}\setminus E_2=R_0$. This contradicts the fact that $\gamma\subset U$ with $U\cap R_0$ empty. We therefore conclude that $C_1\cap\widehat{C}$ is empty. Finally we are ready to prove that $\widehat{C}\subset E_1$. Suppose there is a point $z\in\widehat{C}\setminus E_1$. Since $E_2\subset\widehat{C}$ and $\widehat{C}$ is open and connected, there is a point $w\in E_2\subset E_1$ and a curve $\beta\subset\widehat{C}$ connecting $z$ to $w$. As $z\not\in E_1$, it follows that $\gamma$ intersects $\Omega\cap\partial E_1$, which violates the conclusion reached in the previous paragraph that $\Omega\cap\partial E_1$ does not intersect $\widehat{C}$. Hence such $z$ cannot exist, whence it follows that $\widehat{C}\subset E_1$. \end{proof} As mentioned above, by~\cite[Section~4.2]{E}, understanding prime ends for unbounded domains can be done by first sphericalizing them and transforming them into bounded domains and then studying the prime ends of the transformed domains. There is a metric analog of reversing sphericalizations, called flattening. However, the category of BQS homeomorphisms need not be preserved by the sphericalization and flattening transformations, see the example below. Therefore sphericalization and flattening may not provide as useful a tool as we like in the study of BQS maps. \begin{ex}[BQS Sphere $\nRightarrow$ BQS Plane] Let $f:\mathbb{C}^*=\mathbb{C}\setminus\{0\}\to\mathbb{C}^*$ be given by $f(z)=1/z$. The push-forward of $f$ under sphericalization of $C^*$ to the twice-punctured sphere gives a BQS homeomorphism, but $f$ is not a BQS homeomorshim from $C^*$ to itself, for the families of pairs of continua $E_r:=[r,1]$ and $F_r:=\mathbb{S}^1$, $0<r<1/10$, have the property that \[ \frac{\diam(E_r)}{\diam(F_r)}\approx 1, \qquad \frac{\diam(f(E_r))}{\diam(f(F_r))}\approx \frac{1}{r}. \] \end{ex} \begin{ex}[BQS Plane $\nRightarrow$ BQS Sphere]\label{ex:not-BQS-Plane-Sphere} For each positive integer $k$ let \begin{equation*} \begin{split} A_k = (\{\tfrac{1}{2^k}\} \times [1, 2^k]) \cup ([\tfrac{1}{2^{k+1}}, \tfrac{1}{2^k}]) \times \{2^k\}) \cup (\{\tfrac{1}{2^{k+1}}\} \times [0, 2^k]) \\ \cup ([\tfrac{1}{2^{k+2}}, \tfrac{1}{2^{k+1}}] \times \{0\}) \cup (\{\tfrac{1}{2^{k+2}}\} \times [0, 1]), \end{split} \end{equation*} let $\varepsilon_k = \tfrac{1}{64^k}$, $\ell(A_k)=2^{k+1}+\tfrac{3}{2^{k+2}}$ the length of $A_k$, and let \[ \Omega:=\bigcup_{j\in\mathbb{N}}\bigcup_{z\in A_{2j}}Q(z,\varepsilon_{2j}), \] where, for $z\in\mathbb{C}$, the cube $Q(z,t)=(\text{Re}(z)-t,\text{Re}(z)+t)\times(\text{Im}(z)-t,\text{Im}(z)+t)$. \begin{figure}[!htb] \begin{center} \begin{tikzpicture} \draw[black, thick] (-1,1) -- (-1, 4); \draw[black, thick] (-1,4) -- (-1.5, 4); \draw[black, thick] (-1.5,4) -- (-1.5, 0); \draw[black, thick] (-1.5,0) -- (-1.75, 0); \draw[black, thick] (-1.75,0) -- (-1.75, 1); \draw[black, dashed] (1,1) -- (1, 4); \draw[black, dashed] (1,4) -- (.5, 4); \draw[black, dashed] (.5,4) -- (.5, 0); \draw[black, dashed] (.5,0) -- (.25, 0); \draw[black, dashed] (.25,0) -- (.25, 1); \draw[black] (1.0625,0.9375) -- (1.0625, 4.0625); \draw[black] (1.0625,4.0625) -- (.4375, 4.0625); \draw[black] (.4375,4.0625) -- (.4375, 0.0625); \draw[black] (.4375,0.0625) -- (.3125, 0.0625); \draw[black] (.3125,0.0625) -- (.3125, 1.0625); \draw[black] (.9375,0.9375) -- (.9375, 3.9375); \draw[black] (.9375,3.9375) -- (.5625, 3.9375); \draw[black] (.5625,3.9375) -- (.5625, -.0625); \draw[black] (.5625,-.0625) -- (.1875, -.0625); \draw[black] (.1875,-.0625) -- (.1875, 1.0625); \end{tikzpicture} \end{center} \caption{$A_k$ and its cube neighborhood} \end{figure} For $m \geq 1$, let $a_m = \sum_{j=1}^{m} \ell(A_{2j})$, and set $a_0 = 0$. Let \[ I_m = [a_{m-1}, a_m]=[a_{m-1}, a_{m-1}+\ell(A_{2m)}], \ I = [0, \infty). \] Let $\Omega^\prime = \bigcup_{m=1}^\infty I_m \times (-\varepsilon_{2m}, \varepsilon_{2m})$. Then, there is a BQS map $f \colon \Omega^\prime \to \Omega$ defined as follows. On $I$, this map is the arclength parametrization of the curve $\bigcup_k A_{2k}$. On most of $\Omega^\prime$, this map is defined similarly; for $m\in\mathbb{N}$ and $\varepsilon_{2m+2}\le\tau<\varepsilon_{2m}$, the line $(0,a_m)\times\{\tau\}$ is mapped by $f$ as a parametrization to a curve that is an $\ell^\infty$-distance $\tau$ ``above" the curve $\bigcup_kA_{2k}$ (the dashed straight line gets mapped to the dashed bent line above $f(I)$ in Figure~2 below). This parametrization is mostly an arclength parametrization, although near the corners of $\Omega$ we change speed of this parametrization by an amount that is determined by $\tau$. We can ensure that this speed is at least $1/128$ and $128$. For example, in the picture below, the dashed curve on the left is mapped to the dashed curve on the right by $f$ at a speed that is the ratio of the lengths of the dashed curve on the right and the middle curve on the right. \begin{figure}[!htb] \begin{center} \begin{tikzpicture} \draw[black, thick] (-10, 1.5) -- (-6, 1.5); \draw[black, thick] (-10, -.5) -- (-6, -.5); \draw[black, dashed] (-10, 1) -- (-6, 1); \draw[black] (-10, .5) -- (-6, .5); \node at (-3.5,.875) {$f$}; \node at (-5.8,.5) {$I$}; \node at (2.4,0) {$f(I)$}; \draw[->] (-5,.5) -- (-2,.5); \draw[black] (0,0) -- (2,0); \draw[black] (0,2) -- (0,0); \draw[black, thick] (1,1) -- (2,1); \draw[black, thick] (1,2) -- (1,1); \draw[black, thick] (-1,-1) -- (-1, 2); \draw[black, thick] (-1,-1) -- (2, -1); \draw[black, dashed] (.5, .5) -- (2, .5); \draw[black, dashed] (.5, .5) -- (.5, 2); \end{tikzpicture} \end{center} \caption{Fiber map of $f$ near corners} \end{figure} By using $\epsilon_k$ much smaller than $2^k$ (as $k \geq 2$) and changing the ``tube size'' at $y=1$, this guarantees that near each of these corners the map is biLipschitz and hence BQS there. The arclength parameterization guarantees that the map is BQS at large scales, and hence BQS. After applying the stereographic projection $\varphi$ (projection to the sphere), however, there is some $C>0$ such that for any $i < j$ we have $\diam(\varphi(\cup_{k=i}^j A_{2k}))\ge C$, whereas $\diam(\varphi(f(\cup_{k=i}^\infty A_{2k})) \to 0$ as $i \to \infty$. Hence the induced map between $\varphi(\Omega)$ and $\varphi(\Omega^\prime)$ is not BQS. \end{ex} Now we are ready to study boundary behavior of BQS homeomorphisms between two unbounded domains. Let $\Omega,\Omega^\prime$ be two open, connected subsets of metric spaces $X,Y$ respectively, with $X$ and $Y$ both proper and locally path-connected metric spaces. Let $f:\Omega\to\Omega^\prime$ be a BQS homeomorphism. In light of Lemma~\ref{lem:bdd-to-bdd}, we now concentrate on the case of both $\Omega$ and $\Omega^\prime$ being unbounded. So henceforth, we assume that $\Omega$ and $\Omega^\prime$ are unbounded domains in proper, locally path-connected metric spaces and that $f:\Omega\to\Omega^\prime$ is a BQS homeomorphism. Recall that we have now to deal with three types of prime ends. \begin{defn}[{\bf Prime end types}] We categorize the three types of ends as follows: \begin{enumerate} \item[(a)] Ends $[\{E_k\}]$ for which there is some positive integer $k$ with $\overline{E_k}$ compact, \item[(b)] Ends $[\{E_k\}]$ for which each $E_k$ is unbounded and $I[\{E_k\}]$ is non-empty, \item[(c)] Ends that are ends at $\infty$; these are also unbounded. \end{enumerate} \end{defn} \begin{remark} A few words comparing prime ends with respect to the original metric $d_X$ on $\Omega$ and prime ends with respect to the induced Mazurkiewicz metric $\dum$ are in order here. A prime end of type~(c) with respect to $d_X$ will continue to be a prime end of type~(c) with respect to $\dum$. A prime end of type~(b) with respect to $d_X$ will be a prime end of type~(c) with respect to $\dum$, and so information about the impression of such a prime end is lost. A singleton prime end of type~(a) with respect to $d_X$ will continue to be a singleton prime end of type~(a) with respect to $\dum$. However, a non-singleton prime end of type~(a) with respect to $d_X$ will cease to be a prime end (and indeed, cease to be even an end) with respect to $\dum$. Indeed, if $[\{E_k\}]$ is a prime end of type~(a) with respect to $d_X$ with $I[\{E_k\}]$ non-singleton, then no point of $I[\{E_k\}]$ can be accessible from inside the chain $\{E_k\}$, as can be seen from an easy adaptation of the proof of Lemma~\ref{lem:end-div-prime-finite-conn}. Therefore $\bigcap_k\overline{E_k}^M$ is empty, and so the sequence $\{E_k\}$ fails the definition of an end with respect to $\dum$. \end{remark} \begin{lemma}\label{lem:end-b-is-prime} Suppose that $\overline{\Omega}^M$ is proper. Fix $x_0\in\Omega$ and a strictly increasing sequence $\{n_k\}$ of positive real numbers with $\lim_kn_k=\infty$. Then, for each $k\in\mathbb{N}$ there is only finitely many unbounded components of $\Omega\setminus\overline{B_M(x_0,n_k)}$. If for each $k\in\mathbb{N}$ we choose an unbounded component $F_k$ of $\Omega\setminus\overline{B_M(x_0,n_k)}$ such that $F_{k+1}\subset F_k$, then $\{F_k\}$ is a chain for $\Omega$ such that $[\{F_k\}]$ is a prime end of $\Omega$. \end{lemma} \begin{proof} To see the veracity of the first claim, note that if there are infinitely many unbounded components of $\Omega\setminus\overline{B_M(x_0,n_k)}$, then there are infinitely many components of $\Omega\setminus\overline{B_M(x_0,n_k)}$ that intersect $B_M(x_0,n_{k+2})\cap\Omega$, in which case we can extract out a sequence of points $\{x_j\}$ from $B_M(x_0,n_{k+1})\cap\Omega\setminus B_M(x_0,n_{k+1})$ such that for $j\ne i$ we have $2n_{k+2}\ge \dum(x_j,x_i)\ge n_{k+2}-n_{k+1}>0$, and this sequence will not have any subsequence converging in $\overline{\Omega}^M$, violating the properness of $\overline{\Omega}^M$. Given the first claim, it is not difficult to see that we can choose a sequence $\{F_k\}$ as in the second hypothesis of the lemma. Since \[ \dM(\Omega\cap\partial F_k,\Omega\cap\partial F_{k+1})\ge \dM(\Omega\cap\partial B_M(x_0,n_k),\Omega\cap\partial B_M(x_0,n_{k+1}))\ge n_{k+1}-n_k>0, \] it follows that $\{F_k\}$ is a chain of type~(b) if $\bigcap_k\overline{F_k}$ is non-empty, and is a chain of type~(c) (chain at $\infty$) if $\bigcap_k\overline{F_k}$ is empty. In this latter case, we already have that $[\{F_k\}]$ is prime. Hence suppose that $\bigcap_k\overline{F_k}$ is non-empty, and suppose that $\{G_k\}\, |\, \{F_k\}$ for some chain $\{G_k\}$ of $\Omega$. By passing to a subsequence of $\{G_k\}$ if necessary, we can then assume that $G_k\subset F_k$ for all $k\in\mathbb{N}$. We need to show that $\{F_k\}\, |\, \{G_k\}$. Suppose this is not the case. Then there is some positive integer $k_0\ge 2$ such that for each $j\in\mathbb{N}$ the set $F_j\setminus G_{k_0}$ is non-empty. Recall that $G_k\subset F_k$ for each $k\in\mathbb{N}$. Therefore, it follows from the nested property of $\{G_k\}$, that both $F_j\setminus G_{k_0}$ and $F_j\cap G_{k_0}$ are non-empty for each $j\in\mathbb{N}$. This immediately implies that $\{G_k\}$ cannot be a chain of type~(a). Suppose that $\{G_k\}$ is a chain of type~(c). As $F_j$ is an open connected subset of $\Omega$, it follows that $\Omega\cap\partial G_{k_0}$ must intersect $F_j$. Hence, for each $j\in\mathbb{N}$ we have that $\Omega\cap\partial G_{k_0}\cap F_j\ne\emptyset$, which violates the requirement that $\diam_M(\Omega\cap\partial G_{k_0})<\infty$. Therefore we have that $\{G_k\}$ cannot be of type~(c). If $\{G_k\}$ is of type~(b), then as $R_k$ separates $\Omega\cap\partial G_{k_0-1}$ from $\Omega\cap\partial G_{k_0}$, we must have that for each $j\in\mathbb{N}$, $R_k$ intersects $F_j$. This again violates the requirement that $\diam_M(R_k\cap\Omega)<\infty$. Therefore we must have that $\{F_k\}\, |\, \{G_k\}$ as well. Hence $[\{F_k\}]$ is a prime end. \end{proof} \begin{lemma}\label{lem:bdd-end} If $\mathscr{E}$ is a bounded prime end of $\Omega$, then $f(\mathscr{E})$ is a bounded prime end of $\Omega^\prime$. Moreover, if $\mathscr{E}$ is a singleton prime end (that is, its impression contains only one point), then $f(\mathscr{E})$ is also a singleton prime end. \end{lemma} \begin{proof} Let $\{E_k\}\in\mathscr{E}$; by passing to a subsequence if need be, we can also assume that $\overline{E_1}$ is compact. Moreover, by Lemma~\ref{lem:open-end} we can also assume that each $E_k$ is open. Then the restriction $f\vert_{E_1}$ is also a BQS homeomorphism onto $f(E_1)$, and it follows from Lemma~\ref{lem:bdd-to-bdd} above that $f(E_1)$ is also bounded. Therefore for each positive integer $k$ we have that $f(E_k)$ is bounded, and by the properness of $Y$ we also have that $\overline{f(E_k)}$ is compact. Moreover, since $\overline{E_k}\cap\partial\Omega$ is non-empty, we can find a sequence $x_m$ of points in $E_k$ converging to some $x\in \overline{E_k}\cap\partial\Omega$; since $f$ is a homeomorphism, it follows that $f(x_m)$ cannot converge to any point in $\Omega^\prime$, and so by the compactness of $\overline{f(E_k)}$ we have a subsequence converging to a point in $\overline{f(E_k)}\cap\partial\Omega^\prime$, that is, $\overline{f(E_k)}\cap\partial\Omega^\prime$ is non-empty. A similar argument also shows that $\bigcap_k\overline{f(E_k)}$ is non-empty and is a subset of $\partial\Omega^\prime$. From Lemma~\ref{lem:maz-dist-bdry-positive} we know that for each positive integer $k$, \[ \dM^\prime(\Omega^\prime\cap\partial f(E_k),\Omega^\prime\cap\partial f(E_{k+1}))>0. \] Therefore $f(\mathscr{E})$ is an end of $\Omega^\prime$. Next, if $\mathscr{F}$ is an end that divides $f(\mathscr{E})$, then with $\{F_k\}\in\mathscr{F}$ we must have that $F_k$ is bounded (and hence, $\overline{F_k}$ is compact) for sufficiently large $k$. The above argument, applied to $\{F_k\}$ and the BQS homeomorphism $f^{-1}$ tells us that $f^{-1}(\mathscr{F})$ is an end of $\Omega$ dividing the prime end $\mathscr{E}$; it follows that $f^{-1}(\mathscr{F})=\mathscr{E}$, and so $\mathscr{F}=f(\mathscr{E})$, that is, $f(\mathscr{E})$ is a prime end of $\Omega^\prime$. The last claim of the theorem follows from Lemma~\ref{lem:BQS-single-to-single}. \end{proof} \begin{lemma}\label{lem:type-b} Let $\mathscr{E}$ be a prime end of $\Omega$ of type~(b). Then $f(\mathscr{E})$ is a prime end of type~(b) for $\Omega^\prime$ or there is an end $\mathscr{F}$ at $\infty$ for $\Omega^\prime$ such that with $\{E_k\}\in\mathscr{E}$ there exists $\{F_k\}\in\mathscr{F}$ with $F_{k+1}\subset f(E_k)\subset F_k$ for each positive integer $k$. \end{lemma} \begin{proof} Here we cannot invoke Lemma~\ref{lem:maz-dist-bdry-positive} as neither $E_k$ nor $E_{k+1}$ is bounded; but the idea for the proof is similar, as we now show. Suppose $E_1, E_2\subset\Omega$ be connected open sets with $E_2\subset E_1$ and $\tau:=\dM(\Omega\cap\partial E_1,\Omega\cap\partial E_2)>0$. Suppose also that there is a compact set $R\subset X$ such that $\Omega\cap\partial E_1$ and $\Omega\cap\partial E_2$ belong to different components of $\Omega\setminus R$ and that $\diam_M(R\cap\Omega)<\infty$. We fix a continuum $A\subset\Omega$ that intersects $R$ with $\diam(A)\le 2\diam_M(R\cap\Omega)$. If $\gamma$ is a continuum in $\Omega$ intersecting both $\Omega\cap\partial E_1$ and $\Omega\cap\partial E_2$, then it must intersect $R$. Hence we can find a continuum $\beta\subset\Omega$ intersecting both $\gamma\cap R$ and $A\cap R$ such that $\diam_M(\beta)=\diam(\beta)\le 2\diam_M(R\cap\Omega)$. Now by the BQS property of $f$, we see that \[ \frac{\diam(f(\beta\cup A))}{\diam(f(\gamma))} \le \eta\left(\frac{\diam(\beta\cup A)}{\diam(\gamma)}\right) \le \eta\left(\frac{\diam(\beta\cup A)}{\tau}\right). \] Note that $\beta$ and $A$ are intersecting continua with diameter at most $2\diam_M(R\cap\Omega)$. It follows that $\diam(\beta\cup A)\le 4\diam_M(R\cap\Omega)<\infty$. Hence \[ \frac{\diam(f(A))}{\diam(f(\gamma))}\le \eta\left(\frac{4\diam_M(R\cap\Omega)}{\tau}\right), \] that is, \[ 0<\frac{\diam(f(A))}{\eta\left(\frac{4\diam_M(R\cap\Omega)}{\tau}\right)}\le \diam(f(\gamma)). \] It follows that \[ \dM(\Omega^\prime\cap\partial f(E_1),\Omega^\prime\cap\partial f(E_2))>0. \] From the second claim of Lemma~\ref{lem:bdd-to-bdd}, we know that $f(R\cap\Omega)$ is bounded with respect to the Mazurkiewicz metric $\dumm$ and hence with respect to $d_Y$. From the fact that $f$ is a homeomorphism from $\Omega$ to $\Omega^\prime$, it also follows that $\Omega^\prime\cap\partial f(E_1)$ and $\Omega^\prime\cap\partial f(E_2)$ belong to different components of $\Omega^\prime\setminus f(R\cap\Omega)$. The properness of $Y$ together with the fact that $\diam_{d_Y}(f(\Omega\cap R))\le \diam_M^\prime(f(\Omega\cap R))<\infty$ tells us that $\overline{f(\Omega\cap R)}$ is compact in $Y$. From the above argument, we see that $f(\mathscr{E})$ is an end of $\Omega^\prime$ provided that $\bigcap_k\overline{f(E_k)}$ is non-empty. Similar argument as at the end of the proof of Lemma~\ref{lem:bdd-end} then tells us that $f(\mathscr{E})$ is a prime end. Suppose now that $\bigcap_k\overline{f(E_k)}\ne\emptyset$. To see that $f(\mathscr{E})$ is of type~(b), note that with $\{E_k\}\in\mathscr{E}$, each $E_k$ is unbounded (and without loss of generality, open, see Lemma~\ref{lem:open-end}). Hence by Lemma~\ref{lem:bdd-to-bdd} we know that $f(E_k)$ is unbounded. This completes the proof in the case that $\bigcap_k\overline{f(E_k)}$ is non-empty. Finally, suppose that $\bigcap_k\overline{f(E_k)}$ is empty. We construct the end at $\infty$, $\mathscr{F}$, as follows. By Lemma~\ref{lem:E1-E2-separation}, we can assume that the separating sets $R_k$ have the added feature that $E_{k+1}$ is a subset of a component of $\Omega\setminus R_k$ and that that component is a subset of $E_k$. So for each positive integer $k$ we set $F_k^*$ to be the image of this component under $f$. Then $\bigcap_k\overline{F_k}\subset\bigcap_k\overline{f(E_k)}=\emptyset$. Moreover, $F_k^*$ is a component of $\Omega^\prime\setminus K_k$ with $K_k=\overline{f(R_k\cap\Omega)}$, and as $R_k$ is compact and $\diam_M(R_k\cap\Omega)<\infty$, by Lemma~\ref{lem:bdd-to-bdd} we know that $\diam_M^\prime(f(R_k\cap\Omega))<\infty$ and so $\overline{f(R_k\cap\Omega)}$ is compact in $Y$. We cannot however guarantee that $\dM^\prime(\Omega^\prime\cap \partial F_k^*,\Omega^\prime\cap\partial F_{k+1}^*)$ is positive; hence we set $F_k:=F_{2k-1}^*$ and note that \[ \dM^\prime(\Omega^\prime\cap \partial F_k,\Omega^\prime\cap\partial F_{k+1}) \ge \dM^\prime(\Omega^\prime\cap\partial E_{2k},\Omega^\prime\cap\partial E_{2k+1})>0. \] Thus the sequence $\{F_k\}$ is an end at $\infty$ of $\Omega^\prime$, completing the proof. \end{proof} Given that ends at infinity are prime ends (no other ends divide them, see~\cite{E}), it follows that should $\mathscr{E}$ be associated with an end $\mathscr{F}$ at $\infty$, there can be only one such end at $\infty$ it can be associated with. We next consider the last of the three types of prime ends of $\Omega$. We say that a chain $\{E_k\}$ in an end $\mathscr{E}$ at $\infty$ of $\Omega$ is a \emph{standard representative} of $\mathscr{E}$ if there is a point $x_0\in X$ and a strictly monotone increasing sequence $R_k\to\infty$ such that for each $k$ the set $E_k$ is a connected component of $\Omega\setminus \overline{B_M(x_0,R_k)}$. Note that if $H\subset\Omega$ such that $\diam_M(H)<\infty$, then $diam_M(\overline{H}\cap\Omega)$ is also finite. \begin{lemma}\label{lem:standard-rep} Let $\mathscr{E}$ be an end at $\infty$ of $\Omega$. Then there is a standard representative $\{E_k\}\in\mathscr{E}$. Moreover, for each $x_0\in\Omega$ there is a representative chain $\{F_k\}\in\mathscr{E}$ such that for each $k\in\mathbb{N}$, $F_k$ is a component of $\Omega\setminus\overline{B_M(x_0,k)}$. \end{lemma} \begin{proof} Let $\{G_k\}\in\mathscr{E}$ and for each $k$ let $K_k$ be a compact subset of $X$ such that $\diam_M(K_k\cap\Omega)$ is finite and $G_k$ is an unbounded component of $\Omega\setminus K_k$. Fix $x_0\in\Omega$. Since $\bigcap\overline{E_k}$ is empty, we can assume without loss of generality that $x_0\not\in\overline{E_1}$. Then $x_0$ is in a different component from $E_k$ of the set $\Omega\setminus K_k$ for each $k\in\mathbb{N}$. In what follows, by $B_M(x_0,\tau)$ we mean the ball \emph{in $\Omega$} centered at $x_0$ with radius $\tau$ with respect to the Mazurkiewicz metric $\dum$. As $\tau_k:=\diam_M(K_k)<\infty$, inductively we can find a sequence of strictly monotone increasing positive real numbers $R_k$ as follows. Let \[ R_1:=\max\{1, \diam_M(\{x_0\}\cup K_1)\}. \] We claim that there is some $L_1\in\mathbb{N}$ such that $\overline{G_{1+L_1}}$ does not intersect $\overline{B_M(x_0,R_1)}$. If this claim is wrong, then for each positive integer $j\ge 2$ there is a point $x_j\in\overline{G_j}\cap \overline{B_M(x_0,R_1)}$, in which case, by the compactness of the set $\overline{B_M(x_0,R_1)}$ there is a subsequence $x_{j_n}$ and a point $x_\infty\in \overline{B_M(x_0,R_1)}\subset X$ such that $x_{j_n}\to x_\infty$; note by the nestedness property of the chain $\{G_k\}$ that $x_\infty\in\overline{G_k}$ for each $k$, violating the property that $\bigcap_k\overline{G_k}$ is empty. Therefore the claim holds. We set $E_1$ to be the connected component of $\Omega\setminus \overline{B_M(x_0,R_1)}$ that contains $G_{1+L_1}$. Set $n_1=1+L_1$. We then set \[ R_2:=\max\{2, R_1+1, \diam_M(\{x_0\}\cup K_{n_1})\}, \] and as before, note that there is some $n_2>n_1$ such that $\overline{G_{n_2}}$ is disjoint from $\overline{B_M(x_0,R_2)}$. We set $E_2$ to be the component of $\Omega\setminus\overline{B_M(x_0,R_2)}$ that contains $G_{n_2}$. Thus inductively, once $R_1,\cdots, R_k$ have been determined and the corresponding strictly monotone increasing sequence of integers $n_1,\cdots, n_k$ have also been chosen, we set \[ R_{k+1}:=\max\{k+1,R_k+1, \diam_M(\{x_0\}\cup K_{n_k})\} \] and choose $n_{k+1}$ such that $n_{k+1}>n_k$ and $\overline{G_{n_{k+1}}}\cap \overline{B_M(x_0,R_{k+1})}$ is empty, and set $E_{k+1}$ to be the component of $\Omega\setminus \overline{B_M(x_0,R_{k+1})}$ that contains $G_{n_{k+1}}$. Thus we obtain the sequence $\{E_k\}$; it is not difficult to see that this sequence is a chain at $\infty$ according to Definition~\ref{def:type-c-ends}. Indeed, as $G_{n_{k+1}}\subset E_{k+1}$, and as $G_{n_{k+1}}\subset G_{n_k}$ and $K_{n_k}\cap E_{k+1}=\emptyset$, it follows that $E_{k+1}$ belongs to the same component as $G_{n_{k+1}}$ of $\Omega\setminus K_{n_k}$, and so $E_{k+1}\subset G_{n_k}$. Thus we have \[ G_{n_{k+1}}\subset E_{k+1}\subset G_{n_k}\subset E_k, \] and so we have both the nested property of the sequence $\{E_k\}$ and the fact that $\{G_k\}$ divides $\{E_k\}$. Therefore, $[\{E_k\}]$ is an end at $\infty$ of $\Omega$ and hence is a prime end, and thus $[\{E_k\}]=\mathscr{E}$; see~\cite[Remark~4.1.11, Remark~4.1.14]{E} for details of the proof. The last part of the claim follows from knowing that for each $k\in\mathbb{N}$ there are positive integers $j,l$ such that $R_k\le j\le R_{k+l}$. \end{proof} \begin{lemma} Let $\mathscr{E}$ be an end at $\infty$ of $\Omega$. Then either $\bigcap_k\overline{f(E_k)}=\emptyset$ for each $\{E_k\}\in\mathscr{E}$ or $\bigcap_k\overline{f(E_k)}$ non-empty for each $\{E_k\}\in\mathscr{E}$. In the first case $f(\mathscr{E})$ is an end at $\infty$ of $\Omega^\prime$. In the second case $f(\mathscr{E})$ is a prime end of type~(b) of $\Omega^\prime$. \end{lemma} \begin{proof} Let $\{E_k\}\in\mathscr{E}$ be a standard representative; hence, there is some $x_0\in \Omega$ and for each $k\in\mathbb{N}$ there exists $R_k>0$ such that the sequence $\{R_k\}$ is strictly monotone increasing with $\lim_k R_k=\infty$, and $E_k$ is a component of $\Omega\setminus \overline{B_M(x_0,R_k)}$. Fix a continuum $A\subset\Omega$ intersecting $\Omega\cap\partial E_k$ and with \[ \diam(A)\le 2\diam_M(\Omega\cap\partial E_k)<\infty. \] Let $z\in\Omega^\prime\cap\partial f(E_k)$ and $w\in\Omega^\prime\cap\partial f(E_{k+1})$, and let $\gamma$ be a continuum in $\Omega^\prime$ containing $z,w$. Then $f^{-1}(\gamma)$ is a continuum in $\Omega$ containing $f^{-1}(z)\in \Omega\cap\partial E_k$ and $f^{-1}(w)\in\Omega\cap\partial E_{k+1}$. By the fact that $\{E_k\}$ is a chain of $\Omega$, we know that \[ \diam(f^{-1}(\gamma))\ge \tau:=\dist_M(\Omega\cap\partial E_k, \Omega\cap\partial E_{k+1})>0. \] As $f^{-1}(\gamma)$ intersects both $\Omega\cap\partial E_k$ and $\Omega\cap\partial E_{k+1}$, we can find a continuum $\beta$ connecting $A\cap\partial E_k$ and $f^{-1}(\gamma)\cap\partial E_k$ such that $\diam(\beta)\le 2\diam_M(\Omega\cap\partial E_k)$. By the BQS property, we now have \[ \frac{\diam(f(\beta\cup A))}{\diam(\gamma)}\le \eta\left(\frac{\diam(\beta\cup A)}{\diam(f^{-1}(\gamma)}\right) \le \eta\left(\frac{4\diam_M(\Omega\cap\partial E_k)}{\tau}\right), \] and so \[ 0<\frac{\diam(f(A))}{\eta\left(\frac{4\diam_M(\Omega\cap\partial E_k)}{\tau}\right)}\le \diam(\gamma), \] and so we have that \begin{equation}\label{eq:positive-separation1} \dist_M(\Omega^\prime\cap\partial f(E_k),\Omega^\prime\cap\partial f(E_{k+1})) \ge \frac{\diam(f(A))}{\eta\left(\frac{4\diam_M(\Omega\cap\partial E_k)}{\tau}\right)}>0. \end{equation} Note that as neither $E_k$ nor $E_{k+1}$ is bounded, we cannot utilize that lemma directly, nor can we directly call upon the relevant part of the proof of Lemma~\ref{lem:type-b} as there is no separating set $R_k$; but the idea of the proof is quite similar. For the convenience of the reader we gave the complete proof above. Now we have two possibilities, either $\bigcap_k\overline{f(E_k)}$ is empty, or it is not empty. \noindent{\bf Case 1:} $\bigcap_k\overline{f(E_k)}=\emptyset$. For each $k\in\mathbb{N}$ note that $f(E_k)$ is a component of $\Omega^\prime\setminus f(\overline{B_M(x_0,R_k)}\cap\Omega)$. By Lemma~\ref{lem:bdd-to-bdd}, we know that $\dist_M^\prime(f(\overline{B_M(x_0,R_k)}\cap\Omega))<\infty$, and moreover, as the topology on $\Omega$ with respect to $d_X$ and with respect to $\dum$ are the same, we also have that \[ \overline{f(\overline{B_M(x_0,R_k)}\cap\Omega)}\cap\Omega^\prime=f(\overline{B_M(x_0,R_k)}\cap\Omega). \] Also, $\overline{f(\overline{B_M(x_0,R_k)}\cap\Omega)}$ is compact as $Y$ is proper and $\diam(\overline{f(\overline{B_M(x_0,R_k)}\cap\Omega)})=\diam(f(\overline{B_M(x_0,R_k)}\cap\Omega) \le \diam_M(f(\overline{B_M(x_0,R_k)}\cap\Omega)<\infty$. Again, as $Y$ is proper, $\overline{f(E_k)}$ is also proper. Therefore $f(E_k)$ is an acceptable set at $\infty$, and by~\eqref{eq:positive-separation1} we see that $\{f(E_k)\}$ is a chain at $\infty$ of $\Omega^\prime$. \noindent{\bf Case 2:} $\bigcap_k\overline{f(E_k)}\ne\emptyset$. In this case we need to show that $\{f(E_k)\}$ forms a chain of type~(b). The only additional condition we need to check is that for each $k\in\mathbb{N}$ there is some compact set $P_k\subset Y$ such that $\Omega^\prime\cap\partial f(E_k)$ and $\Omega^\prime\cap\partial f(E_{k+1})$ are in different \emph{components} of $\Omega^\prime\setminus P_k$. In what follows, by $S_M(x_0,\tau)$ we mean the set $\{y\in\Omega\, :\, \dum(x_0,y)=\tau\}$. We choose \[ P_k=\overline{f(S_M(x_0,\tfrac{R_k+R_{k+1}}{2}))}. \] Since $\Omega\cap\partial E_k\subset\Omega\cap\partial B_M(x_0,R_k)$ and $\Omega\cap\partial E_{k+1}\subset\Omega\cap\partial B_M(x_0,R_{k+1})$, it follows that these two sets cannot intersect the same connected component of $\Omega\setminus S_M(x_0,\tfrac{R_k+R_{k+1}}{2}))$. Since $\overline{B_M(x_0,R_k)}\cap\Omega$ is connected in $\Omega$, it follows that $\Omega\cap\partial E_k$ is in one component of $\Omega\setminus S_M(x_0,\tfrac{R_k+R_{k+1}}{2}))$. As $\Omega\cap\overline{E_{k+1}}\subset\Omega\setminus B_M(x_0,R_{k+1})$ is connected, it also follows that $\Omega\cap\partial E_{k+1}$ lies in a component of $\Omega\setminus S_M(x_0,\tfrac{R_k+R_{k+1}}{2}))$. As $f$ is a homeomorphism, similar statements hold for $\Omega^\prime\cap\partial f(E_k)$, $\Omega^\prime\cap\partial f(E_{k+1})$, that is, they are contained in two different components of $\Omega\setminus P_k$. As $\diam_M(P_k\cap\Omega^\prime)<\infty$ by Lemma~\ref{lem:bdd-to-bdd}, it follows also that $P_k$ is a compact subset of $Y$. Thus the separation condition for the sequence $\{f(E_k)\}$ is verified, and so this sequence is a chain of $\Omega^\prime$ of type~(b). To see that $[\{f(E_k)\}]$ is a prime end, note that if $\{G_k\}$ is a chain that divides $\{f(E_k)\}$, then $\{f^{-1}(G_k)\}$ is a chain of $\Omega$ that divides $\{E_k\}$; as $\{E_k\}$ is a prime end, it follows that $\{E_k\}$ divides $\{f^{-1}(G_k)\}$, and so $\{f(E_k)\}$ divides $\{G_k\}$ as well. Thus the corresponding end is a prime end. \end{proof} \begin{ex} In Example~\ref{ex:not-BQS-Plane-Sphere}, $\Omega$ has a prime end of type~(b) with impression $\{0\} \times [0,\infty)$ (e.g. take $E_k = \biggl((0, \tfrac{3}{2^k}) \times (0, \infty) \biggr) \cap \Omega$) which gets mapped to an end at $\infty$ by $f$. The BQS map $f^{-1}$ then also maps an end at infinity to an end of type (b). \end{ex} We now summarize the above study. Recall that we assume $X$ and $Y$ to be locally path-connected proper metric spaces and that $\Omega\subset X$, $\Omega^\prime\subset Y$ are domains. \begin{thm}\label{thm:BQS-unbdd} Suppose that $\Omega$ is an unbounded domain and let $f:\Omega\to\Omega^\prime$ be a BQS homeomorphism. Then there is a homeomorphism $f_P:\overline{\Omega}^P\to\overline{\Omega^\prime}^P$ such that $f(\mathscr{E})$ is a bounded prime end (i.e.~a prime end of type~(a)) if $\mathscr{E}$ is a bounded prime end, and $f(\mathscr{E})$ is either an unbounded prime end (i.e.~of type~(b)) or is an end at $\infty$ of $\Omega^\prime$ if $\mathscr{E}$ is an unbounded prime end or an end at $\infty$ of $\Omega$. Moreover, if $\mathscr{E}$ is a singleton prime end, then so is $f(\mathscr{E})$. \end{thm} \begin{remark} Combining the above theorem with~\cite[Proposition~10.11]{Hei} we see that if $\Omega$ is finitely connected at the boundary, then $f_P\vert_{\overline{\Omega}^P\setminus\partial_\infty\Omega}$ is a BQS homeomorphism with respect to the Mazurkiewicz metric $\dum$, where $\partial_\infty\Omega$ is the collection of all ends at $\infty$ of $\Omega$. However, unlike in the case of bounded domains (see Proposition~\ref{prop:bdd-domain-ends-match}(c)), we cannot conclude here that $\Omega^\prime$ must also be finitely connected at the boundary, see Example \ref{ex:not-BQS-Plane-Sphere}; however, this is not an issue as no continuum in $\overline{\Omega}^P$ contains points from $\partial_\infty\Omega$. The obstacle however is to know about $f^{-1}_P$, and therefore it is natural to ask whether there are continua in $\overline{\Omega^\prime}^P$ that do not lie entirely in $\Omega^\prime\cup\partial_B\Omega^\prime$, where $\partial_B\Omega^\prime$ is the collection of all bounded prime ends of $\Omega^\prime$ (which is the same as the collection of all singleton prime ends, thanks to the above theorem). Unfortunately it is possible for $\partial_P\Omega^\prime\setminus[\partial_B\Omega^\prime\cup\partial_\infty\Omega^\prime]$ to contain many continua, as Example~\ref{ex:infinite-dog-poo-volume} below shows. We do not have a notion of metric on $\overline{\Omega^\prime}^P$ in this case, and so it does not make sense to ask that $f_P$ is itself a BQS map unless $\Omega^\prime$ is also finitely connected at the boundary (in which case, it is indeed a BQS homeomorphism). \end{remark} \begin{ex}\label{ex:infinite-dog-poo-volume} Let $\Omega_0$ be the planar domain \[ \{(x,y)\in\mathbb{R}^2\, :\, x>0, 0<y<\tfrac{1}{1+x}\}\setminus \left( \bigcup_{2\le n\in\mathbb{N}} [0,2n-2]\times\{\tfrac{1}{2n}\} \bigcup_{n\in\mathbb{N}}[\tfrac{1}{2}, 2n]\times\{\tfrac{1}{2n+1}\}\right), \] and set $\Omega=\Omega_0\times(0,\infty)$. \begin{figure}[!htb] \begin{center} \begin{tikzpicture}[xscale = 1, yscale=5, domain=0:8,samples=600, smooth] \draw[black, thick] (0,0) -- (0, .6); \draw[black, thick] (0,0) -- (8, 0); \draw[black, domain=.666:8] plot(\x, {1/(\x+1)}); \draw[black] (0, .25) -- (2, .25); \draw[black] (.5, .2) -- (4, .2); \draw[black] (0, .166) -- (4, .166); \draw[black] (.5, .143) -- (6, .143); \draw[black] (0, .125) -- (6, .125); \draw[black] (.5, .111) -- (8, .111); \node at (4, .08) {$\vdots$}; \end{tikzpicture} \end{center} \caption{$\Omega_0$} \end{figure} Note that $\Omega$ is not finitely connected at the boundary. For each $t>0$ and $k\in\mathbb{N}$ consider \[ E_k^t:=\{(x,y,z)\in\mathbb{R}^3\, :\, y^2+(z-t)^2<\tfrac{1}{(k+1)^2}\}. \] Observe that for each $t>0$ the sequence $\{E_k^t\}$ is a chain of $\Omega$ with impression $\mathbb{R}\times\{0\}\times\{t\}$. The corresponding end is a prime end, and for each compact interval $I\subset(0,\infty)$, the set $\{[\{E_k^t\}]\, :\, t\in I\}$ is a subset of $\partial_P\Omega\setminus[\partial_B\Omega\cup\partial_\infty\Omega]$ and is a continuum. Note that in this example, $\partial_\infty\Omega$ is empty. By opening up the domain along the slitting planes $[0,2n-2]\times\{\tfrac{1}{2n}\}$ and $[\tfrac{1}{2}, 2n]\times\{\tfrac{1}{2n+1}\}$, we obtain a domain that is finitely connected at the boundary, and the map from $\Omega$ to this domain can be seen to be a BQS homeomorphism. \end{ex} The following example shows that it is possible to have a prime end in the sense of~\cite{E} which makes the prime end closure sequentially compact, but no equivalent prime end in our sense. \begin{ex} We construct $\Omega$ by removing closed subsets of $\mathbb{R}^2$. The ``barrier" $G(h)$ centered at $(0,0)$ with height $h$ is given by $G(h) = \bigcup_{k \in \mathbb{Z}} C_k$, where $C_0:=((-\infty,-1]\cup[1,\infty))\times\{0\}$ and for $h, k > 0$, \begin{equation*} \begin{split} C_k &= (\{1 - 2^{-k}\} \times [-h2^{-k}, h2^{-k}]) \cup ([1-2^{-k}, 2^k] \times \{-h2^{-k}, h2^{-k}\}) \\ C_{-k} &= (\{-1 + 2^{-k}\} \times [-h2^{-k}, h2^{-k}]) \cup ([-2^k, -1+2^{-k}] \times \{-h2^{-k}, h2^{-k}\}) \end{split} \end{equation*} Thus $C_{-k}$ is obtained from $C_k$ by reflecting it about the $y$-axis. See Figure~3 below for an illustration of the barrier $G(h)$. \begin{figure}[!htb] \begin{center} \begin{tikzpicture} \draw[black, thick] (-6, 0) -- (-1, 0); \draw[black, thick] (1,0) -- (6,0); \draw[<->, black, thick] (0, -.5) -- (0, .5); \node at (-.25,0) {$h$}; \draw[black] (.5, -.5) -- (.5, .5); \draw[black] (.5, .5) -- (2, .5); \draw[black] (.5, -.5) -- (2, -.5); \draw[black] (.75, -.25) -- (.75, .25); \draw[black] (.75, .25) -- (4, .25); \draw[black] (.75, -.25) -- (4, -.25); \draw[black] (.875, -.125) -- (.875, .125); \draw[black] (.875, .125) -- (6, .125); \draw[black] (.875, -.125) -- (6, -.125); \draw[black] (-.5, .5) -- (-.5, -.5); \draw[black] (-.5, -.5) -- (-2, -.5); \draw[black] (-.5, .5) -- (-2, .5); \draw[black] (-.75, .25) -- (-.75, -.25); \draw[black] (-.75, -.25) -- (-4, -.25); \draw[black] (-.75, .25) -- (-4, .25); \draw[black] (-.875, .125) -- (-.875, -.125); \draw[black] (-.875, -.125) -- (-6, -.125); \draw[black] (-.875, .125) -- (-6, .125); \end{tikzpicture} \end{center} \caption{The gate $G(h)$ centered at $(0,0)$.} \end{figure} Given a set $A\subset \mathbb{R}^2$ and a point $(a,b)\in\mathbb{R}^2$, we denote by $A+(a,b)$ the set \[ A+(a,b):=\{(x+a,y+b)\, :\, (x,y)\in A\}. \] We now set \[ \Omega:=\mathbb{R}\times(0,\infty)\setminus \bigcup_{2\le j\in\mathbb{N}} \left(G(2^{-4j})+(2^{j},2^{-j})\right). \] The sets $E_j:=\Omega\cap(\mathbb{R}\times(0,2^{-j}))$ forms a chain $\{E_j\}$ of $\Omega$ in the sense of~\cite{E} with $[\{E_j\}]$ prime, but this does not form a chain in our sense, nor is it equivalent to a chain that is also a chain in our sense. \end{ex} \section{Geometric quasiconformal maps and prime ends} In this section we consider a Carath\'eodory extension theorem for geometric quasiconformal maps. Unlike with BQS homeomorphisms, geometric quasiconformal maps can map bounded domains to unbounded domains. In this section we will consider quasiconformal maps between two domains without assuming boundedness or unboundedness for either domain. As we have less control with geometric quasiconformal maps than with BQS maps, here we need additional constraints on the two domains. The main theorem of this section is Theorem~\ref{thm:main-geomQC}. In this section, we will assume that $X$ and $Y$ are proper metric spaces that are locally path-connected, and that $\Omega\subset X$, $\Omega^\prime\subset Y$ are domains. We also assume that both $(\Omega,\dum)$ and $(\Omega^\prime,\dumm)$ are Ahlfors $Q$-regular and support a $Q$-Poincar\'e inequality for some $Q>1$, $\mu$ is a Radon measure on $\Omega$ such that bounded subsets of $\Omega$ have finite measure, and that $f:\Omega\to\Omega^\prime$ is a geometric quasiconformal mapping. In light of the following lemma, if both $\Omega$ and $\Omega^\prime$ are bounded, then their prime end closures and their Mazurkiewicz metric completions are equivalent, in which case by the results of~\cite{HeiK} and~\cite[Proposition~10.11]{Hei}, we know that geometric quasiconformal maps between them have even a geometric quasiconformal homeomorphic extension to their prime end closures. Thus the interesting situation to consider here is when at least one of the domains is unbounded. Before addressing the extension result given in Theorem~\ref{thm:main-geomQC} below, we first need to study the properties of prime ends of domains that are Ahlfors regular and support a Poincar\'e inequality as above. \begin{lemma}\label{lem:finite-conn-at-bdy-implication} The domain $\Omega$ is finitely connected at the boundary if and only if the following three conditions hold: \begin{enumerate} \item[(i)] $\overline{\Omega}^M$ is proper, \item[(ii)] $\Omega$ has no type~(b) prime ends, \item[(iii)] $\overline{\Omega}^P$ is sequentially compact. \end{enumerate} \end{lemma} \begin{proof} We first show that $\overline{\Omega}^M$ is proper. It suffices to show that bounded sequences in $\Omega$ have a convergent subsequence converging to a point in $\overline{\Omega}^M$. Let $\{x_n\}$ be a bounded sequence (with respect to the Mazurkiewicz metric $\dum$) in $\Omega$. Then it is a bounded sequence in $X$, and as $X$ is proper, it has a subsequence, also denoted $\{x_n\}$, and a point $x_0\in X$ such that $\lim_nx_n=x_0$, the limit occurring with respect to the metric $d_X$. If $x_0\in\Omega$, then by the local path-connectivity of $X$, we also have that the limit occurs with respect to $\dum$ as well. If $x_0\not\in\Omega$, then $x_0\in\partial \Omega$. Since $\Omega$ is finitely connected at the boundary, it follows that there are only finitely many components $U_1(1),\cdots, U_{k_1}(1)$ of $B(x_0,1)\cap\Omega$ with $x_0\in\partial U_j(1)$ for $j=1,\cdots, k_1$, and we also have that $B(x_0,\rho_1)\cap\Omega\subset\bigcup_{j=1}^{k_1}U_j(1)$ for some $\rho_1>0$. We have a choice of some $j_1\in\{1,\cdots,k_1\}$ such that infinitely many of the terms in the sequence $\{x_n\}$ lie in $U_{j_1}(1)$. this gives us a subsequence $\{x_n^1\}$ with $\dum(x_n^1,x_m^1)\le 1$. Similarly, we have finitely many components $U_1(2),\cdots, U_{k_2}(2)$ of $B(x_0,2^{-1})\cap\Omega$, with $x_0\in\partial U_j(2)$ for $j=1,\cdots, k_2$, and we also have that $B(x_0,\rho_2)\cap\Omega\subset\bigcup_{j=1}^{k_2}U_j(2)$ for some $\rho_2>0$. We then find a further subsequence $\{x_n^2\}$ of the sequence $\{x_n^1\}$ lying entirely in $U_{j_2}(2)$ for some $j_2\in\{1,\cdots,k_2\}$. Note that $\dum(x_n^2,x_m^2)\le 2^{-1}$. Inductively, for each $l\in\mathbb{N}$ with $l\ge 2$ we can find a subsequence $\{x_n^l\}$ contained within a component of $B(x_0,2^{-l})\cap\Omega$ with that component containing $x_0$ in its boundary, such that $\{x_n^l\}$ is a subsequence of $\{x_n^{l-1}\}$. We then have $\dum(x_n^l,x_m^l)\le 2^{-l}$. Now a Cantor diagonalization argument gives a subsequence $\{y_l\}$ of the original sequence $\{x_n\}$ such that for each $l\in\mathbb{N}$, $\dum(y_l,y_{l+1})\le 2^{-l}$, that is, this subsequence is Cauchy with respect to the Mazurkiewicz metric $\dum$ and so is convergent to a point in $\overline{\Omega}^M$. We next verify that there cannot be any prime end of type~(b). Suppose $\mathscr{E}$ is a prime end of $\Omega$ with impression $I(\mathscr{E})$ containing more than one point. Then by Lemma~\ref{lem:end-div-prime-finite-conn} there is a singleton prime end $\mathscr{G}$ with $\mathscr{G}\, |\, \mathscr{E}$, and as the impression of $\mathscr{E}$ is not a singleton set, we have $\mathscr{G}\ne\mathscr{E}$, violating the primality of $\mathscr{E}$. Thus there cannot be a prime end of type~(b), nor a non-singleton prime end of type~(a). To verify that $\overline{\Omega}^P$ is sequentially compact, we first consider sequences $\{x_k\}$ in $\Omega$. If this sequence is bounded in the metric $d_X$, then by the properness of $X$ there is a subsequence $\{x_{n_j}\}$ that converges to a point $x_0\in\overline{\Omega}$. If $x_0\in\Omega$, then that subsequence converges to $x_0$ also in $\overline{\Omega}^P$. If $x_0\in\partial\Omega$, then using the finite connectivity of $\Omega$ at $x_0$ we can find a singleton prime end $\mathscr{E}=[\{E_k\}]$ with $\{x_0\}=I(\mathscr{E})$ such that for each $k\in\mathbb{N}$ there is an infinite number of positive integers $j$ for which $x_{n_j}\in E_k$. Now a Cantor-type diagonalization argument gives a further subsequence that converges in $\overline{\Omega}^P$ to $\mathscr{E}$. If the sequence is not bounded in $d_X$, then we argue as follows. Fix $z\in\Omega$. Then for each $n\in\mathbb{N}$ there are only finitely many components of $\Omega\setminus B_M(z,n)$ that intersect $\Omega\setminus B_M(z,n+1)$ (for if not, then we can find a sequence of points $y_j$ in the unbounded components of $\Omega\setminus B(z,n)$, with no two belonging to the same unbounded component, such that $\dum(z,y_j)=n+\tfrac12$ and $\dum(y_j,y_l)\ge \tfrac12$ for $j\ne l$; then $\{y_j\}$ would be a bounded sequence with respect to $d_X$, and the properness of $X$ gives us a subsequence that converges to some $y_0\in\partial\Omega$, and $\Omega$ would then not be finitely connected at $y_0$). Hence there is an unbounded component $U_1$ of $\Omega\setminus B_M(z,1)$ that contains $x_k$ for infinitely many $k\in\mathbb{N}$, that is, there is a subsequence $\{x^1_j\}$ of $\{x_k\}$ that is contained in $U_1$. There is an unbounded component $U_2$ of $\Omega\setminus B_M(z,2)$ that contains $x^1_j$ for infinitely many $j\in\mathbb{N}$, and so we obtain a further subsequence $\{x^2_j\}$ lying in $U_2$. Since this further subsequence also lies in $U_1$, it follows that $U_2\subset U_1$. Thus inductively we find unbounded components $U_n$ of $\Omega\setminus B_M(z,n)$ and subsequence $\{x^n_j\}$ of $\{x^{n-1}_j\}$ such that $x^n_j\in U_n$; moreover, $U_n\subset U_{n-1}$. If $\bigcap_n\overline{U_n}$ is non-empty, then $\bigcap_n\overline{U_n}\subset\partial\Omega$ (because for every point $w\in\Omega$ we know from the local connectivity of $X$ that $\dum(z,w)<\infty$), and $\Omega$ will not be finitely connected at each point in $\bigcap_n\overline{U_n}$. It follows that we must have $\bigcap_n\overline{U_n}=\emptyset$. Therefore $\{U_n\}$ is an end at $\infty$ for $\Omega$, and by considering the subsequence $z_n=x^n_n$ of the original sequence $\{x_k\}$, we see that $\{z_n\}$ converges in $\overline{\Omega}^P$ to $\{U_n\}$. This concludes the proof that sequences in $\Omega$ have a subsequence that converges in $\overline{\Omega}^P$. Next, if we have a sequence $\mathscr{E}^n$ of points in $\partial_P\Omega$ that are all singleton prime ends (that is, they have a representative in $\partial_M\Omega$), then we can use the Mazurkiewicz metric to choose $\{E^n_k\}\in\mathscr{E}^n$ such that for each $n,k\in\mathbb{N}$ we have $\diam_M(E^n_k)<2^{-(k+n)}$, and choose $y_n=x^n_n\in E^n_n$ to obtain a sequence in $\Omega$. The above argument then gives a subsequence $y_{n_j}$ and $\mathscr{F}\in\partial_P\Omega$ such that $y_{n_j}\to\mathscr{F}$ as $j\to\infty$ in the prime end topology. If $\mathscr{F}$ is a singleton prime end, then the properness of $\overline{\Omega}^M$ implies that $\mathscr{E}^{n_j}\to\mathscr{F}$. If $\mathscr{F}$ is not a singleton prime end, then it is an end at $\infty$ (because we have shown that there are no ends of type~(b)), in which case we can find a sequence of positive real numbers $R_k\to\infty$ and $\{F_k\}\in\mathscr{F}$ such that$F_k$ is a component of $\Omega\setminus \overline{B_M(x_0,R_k)}$ for some fixed $x_0\in\Omega$, see Lemma~\ref{lem:standard-rep}. Since we can find $L\in\mathbb{N}$ such that $R_{k+L}-R_k>1$, and as $y_j\in F_{k+L}$ for sufficiently large $j\in\mathbb{N}$, it follows that $E^{n_j}_{n_j}\subset F_k$. Therefore $\mathscr{E}^{n_j}\to\mathscr{F}$. Finally, if $\mathscr{E}^n$ are all ends at $\infty$, then from the second part of Lemma~\ref{lem:standard-rep} we can fix $x_0\in\Omega$ and choose $\{E^n_k\}\in\mathscr{E}^n$ with $E^n_k$ a component of $\Omega\setminus\overline{B_M(x_0,k)}$. For each $k\in\mathbb{N}$ there are only finitely many components of $\Omega\setminus\overline{B_M(x_0,k)}$ that are unbounded, and so it follows that there is some component $F_1$ of $\Omega\setminus\overline{B_M(x_0,1)}$ for which the set \[ I(1):=\{n\in\mathbb{N}\, :\, E^n_1=F_1\} \] has infinitely many terms. Note that necessarily $F_2\subset F_1$. It then follows that there is some component $F_2$ of $\Omega\setminus\overline{B_M(x_0,2)}$ such that \[ I(2):=\{n\in I(1)\, :\, n\ge 2\text{ and }E^n_2=F_2\} \] has infinitely many terms. Proceeding inductively, we obtain sets $I(j+1)\subset I(j)$ of infinite cardinality and $F_j$ such that $\{F_j\}$ is an end at $\infty$, and a sequence $n_j\in\mathbb{N}$ with $j\le n_j\in I(j)$ such that $E^{n_j}_j=F_j$. It follows that $\mathscr{E}^n$ converges in the prime end topology to $\{F_j\}$. Now we prove that if $\Omega$ satisfies conditions~(i)--(iii), then it is finitely connected at the boundary. Recall the definition of finitely connected at the boundary from Definition~\ref{defn:finiteConnBdy}. Suppose that $x_0\in\partial\Omega$ such that $\Omega$ is not finitely connected at $x_0$. Then there is some $r>0$ such that either there are infinitely many components of $B(x_0,r)\cap\Omega$ with $x_0$ in their boundaries, or else there are only finitely many such components $U_1,\cdots, U_k$ such that for all $\rho>0$, $B(x_0,\rho)\setminus\bigcup_{j=1}^kU_j$ is non-empty. In the first case, $B(x_0,r/2)$ intersects each of those components, and hence infinitely many components of $B(x_0,r)\cap\Omega$ intersect $B(x_0,r/2)$. In the second case, we see that $B(x_0,r/2)\setminus \bigcup_{j=1}^kU_j$ is non-empty; in this case, if there are only finitely many components of $B(x_0,r)\cap\Omega$ that intersect $B(x_0,r/2)$, then for each of these components $W$ that are not one of $U_1,\cdots, U_k$, we must have that $\dist(x_0,W)>0$, and so the choice of $\rho\le r/2$ as no larger than the minimum of $\dist(x_0,W)$ over all such $W$ tells us that $B(x_0,\rho)\cap\Omega\subset\bigcup_{j=1}^kU_j$, contradicting the fact that $\Omega$ is not finitely connected at $x_0$. From the above two cases, we know that there is some $r>0$ such that there are infinitely many components of $B(x_0,r)\cap\Omega$ intersecting $B(x_0,r/2)$. Hence we can choose a sequence of points, $y_j\in\Omega$, with no two belonging to the same component of $B(x_0,r)\cap\Omega$, such that $d(x_0,y_j)=r/2$. Then we have that for each $j,l\in\mathbb{N}$ with $j\ne l$, $\dum(y_j,y_l)\ge r/2$. Since by condition~(i) we know that $\overline{\Omega}^M$ is proper, we must necessarily have that $\{y_j\}$ has no bounded subsequence with respect to the Mazurkiewicz metric $\dum$. By the sequential compactness of $\overline{\Omega}^P$ there must then be a prime end $\mathscr{E}$, and a subsequence, also denoted $\{y_j\}$, such that this subsequence converges to $\mathscr{E}$ in the topology of $\overline{\Omega}^P$. Since $\{y_j\}$ is a bounded sequence in $X$, it follows from the properness of $X$ that there is a subsequence converging to some $w\in\overline{\Omega}$. As $w\not\in\Omega$, we must have that $w\in\partial\Omega$, and moreover, $w\in I(\mathscr{E})$. Thus $\mathscr{E}$ is of type~(a) since by condition~(ii) we have no type~(b) prime ends. It then follows that when $\{E_k\}\in\mathscr{E}$, for sufficiently large $k$ the open connected set $E_k$ must be bounded in $d_X$ and hence in $\dum$. This creates a conflict between the fact that the tail end of the sequence $\{y_j\}$ lies in $E_k$ and the fact that $\{y_j\}$ has no bounded subsequence with respect to the metric $\dum$. Hence $\Omega$ must be finitely connected at $x_0$. \end{proof} \begin{ex} Let $\Omega\subset\mathbb{R}^2$ be given by \[ \Omega=(0,\infty)\times(0,1)\setminus\bigcup_{k\in\mathbb{N}} [0,k]\times\{2^{-k}\}. \] Then $\Omega$ has no type~(b) prime end. Moreover, any sequence $\{x_k\}$ in $\Omega$ that is bounded in the Mazurkiewicz metric $\dum$ will have to lie in a subset $(0,\infty)\times(2^{-k},1)$ for some $k\in\mathbb{N}$, and so $\overline{\Omega}^M$ is proper. However, $\Omega$ is \emph{not} finitely connected at the boundary. Thus Conditions~(i),(ii) on their own do not characterize finite connectedness at the boundary. \end{ex} \begin{lemma}\label{lem:bdd-sets-to-bdd-sets} Suppose that $\overline{\Omega}^M$ proper. Let $A,B\subset\Omega$ with $\dM(\overline{A}^M,\overline{B}^M)=\tau>0$ and $\diam_M(A), \diam_M(B)$ both finite. Then either $\diam_M^\prime(f(A))$ is finite or else $\diam_M^\prime(f(B))$ is finite. \end{lemma} \begin{proof} Suppose that $\diam_M^\prime(f(A))=\infty=\diam_M^\prime(f(B))$. Then we can find two sequences $z_k\in f(A)$ and $w_k\in f(B)$ such that $\dumm(z_k,z_{k+1})\ge k$ and $\dumm(w_k,w_{k+1})\ge k$ for each $k\in\mathbb{N}$. Let $x_k=f^{-1}(z_k)$ and $y_k=f^{-1}(w_k)$. By the properness of $\overline{\Omega}^M$, we can find two subsequences, also denoted $x_k$ and $y_k$, such that these subsequences are Cauchy in $\dum$. We can also ensure that $\dum(x_k,x_{k+1})<2^{-k}\tau/8$ and $\dum(y_k,y_{k+1})<2^{-k}\tau/8$. Then for each $k$ there is are continua $\alpha_k, \beta_k\subset\Omega$ with $x_k,x_{k+1}\in\alpha_k$, $y_k,y_{k+1}\in\beta_k$, and $\max\{\diam_M(\alpha_k),\diam_M(\beta_k)\}<2^{-k}\tau/8$. Since $x_k\in A$, $y_k\in B$, and $\dM(\overline{A}^M,\overline{B}^M)=\tau>0$, we must have that $\bigcup_k\alpha_k$ and $\bigcup_k\beta_k$ are disjoint with \[ \dM\left(\bigcup_k\alpha_k, \bigcup_k\beta_k\right)\ge 3\tau/4. \] For each $n\in\mathbb{N}$ set $\Gamma_n=\bigcup_{k=1}^n\alpha_k$ and $\Lambda_n=\bigcup_{k=1}^n\beta_k$. Then $\Gamma_n$ and $\Lambda_n$ are disjoint continua with $\dM(\Lambda_n,\Gamma_n)\ge 3\tau/4$ and \[ \Gamma_n\cup\Lambda_n\subset \bigcup_{z\in A\cup B}B(z,\tau+\diam(A)+\diam(B))=:U. \] Hence \[ \Mod_Q(\Gamma(\Gamma_n,\Lambda_n))\le \int_\Omega\rho^Q\, d\mu<\infty \] where $\rho:=\tfrac{4}{3\tau}\chi_U$ is necessarily admissible for the family $\Gamma(\Gamma_n,\Lambda_n)$ of curves in $\Omega$ connecting points in $\Gamma_n$ to points in $\Lambda_n$. However, $f(\Lambda_n)$ is a continuum containing $z_1$ and $z_n$, and so $\diam_M^\prime(f(\Lambda_n))\to\infty$ as $n\to\infty$; a similar statement holds for $f(\Gamma_n)$. Moreover, $\dM^\prime(f(\Lambda_n),f(\Gamma_n))\le \dumm(z_1,w_1)<\infty$. Hence by the $Q$-Loewner property together with the Ahlfors $Q$-regularity of $(\Omega^\prime,\dumm)$ gives us \[ \Mod_Q(\Gamma(f(\Gamma_n),f(\Lambda_n))) \ge \Phi\left(\frac{\dM^\prime(f(\Gamma_n),f(\Lambda_n))} {\min\{\diam_M^\prime(f(\Lambda_n)),\diam_M^\prime(f(\Gamma_n))\}}\right)\to\infty\text{ as }n\to\infty. \] this violates the geometric quasiconformality of $f$. \end{proof} \begin{lemma}\label{lem:bdd-geom-ends} Suppose that $(\Omega,\dum)$ is Ahlfors $Q$-regular for some $Q>1$ and supports a $Q$-Poincar\'e inequality. Then every type~(a) prime end of $\Omega$ is a singleton prime end, and $\overline{\Omega}^M$ is proper. Moreover, $\overline{\Omega}^P$ is sequentially compact. \end{lemma} Thanks to Lemma~\ref{lem:finite-conn-at-bdy-implication}, if the domain $\Omega$ satisfies the hypotheses of the above lemma and in addition has no type~(b) ends, then $\Omega$ is finitely connected at the boundary. As Example~\ref{ex:not-BQS-Plane-Sphere} shows, there are domains $\Omega$ for which $\overline{\Omega}^M$ is proper and $\overline{\Omega}^P$ is sequentially compact but $\Omega$ is not finitely connected at its boundary. We do not know whether this is still possible if we also require $(\Omega,\dum)$ to be Ahlfors $Q$-regular for some $Q>1$ and support a $Q$-Poincar\'e inequality. \begin{proof} The properness of $\overline{\Omega}^M$ is a consequence of the fact that $\mathcal{H}^Q$ (this Hausdorff measure taken with respect to the Mazurkiewicz metric $\dum$) is doubling and that $\overline{\Omega}^M$ is complete, see for example~\cite[Lemma~4.1.14]{HKSTbook}. Let $\mathscr{E}$ be a prime end of type~(a) for $\Omega$, and let $x_0\in I(\mathscr{E})$. Let $\{E_k\}\in\mathscr{E}$ such that $E_1$ is bounded (in $d_X$, and hence by the local connectedness of $X$ and the fact that $E_1$ is open, in the Mazurkiewicz metric $\dum$ as well). Let $\{x_j\}$ be a sequence in $E_1$ with $x_j\in E_j$ such that it converges (in the metric $d_X$) to $x_0$. Then as this sequence is bounded in $\dum$, it follows from the properness of $\overline{\Omega}^M$ that there is a subsequence, also denoted $\{x_j\}$, such that this subsequence converges in $\dum$ to a point $\zeta\in\partial_M\Omega$. For $n\in\mathbb{N}$ we claim that $B_M(\zeta,2^{-n})\cap\Omega$ is connected. Indeed, by the definition of Mazurkiewicz closure, we can find a Cauchy sequence $x_k\in\Omega$ with $\dum(x_k,\zeta)\to 0$. For $x\in B_M(\zeta,2^{-n})\cap\Omega$ we have $\dum(x,\zeta)<2^{-n}$, and so for sufficiently large $k$ we also have that $\dum(x,x_k)<2^{-n}$. Thus we can find a continuum in $\Omega$ connecting $x$ to $x_k$ with diameter smaller than $2^{-n}$. Note that each point on this continuum necessarily then lies in $B_M(\zeta,2^{-n})\cap\Omega$. Now if $y\in B_M(\zeta,2^{-n})\cap\Omega$, then we can connect both $x$ and $y$ to $x_k$ for sufficiently large $k$ and hence obtain a continuum in $B_M(\zeta,2^{-n})\cap\Omega$ connecting $x$ to $y$. Therefore $B_M(\zeta,2^{-n})\cap\Omega$ is a connected set. Let $F_n=B_M(\zeta,2^{-n})\cap\Omega$ that contain $x_j$ for sufficiently large $j$. Then $\{F_n\}$ is a chain for $\Omega$ with $\{x_0\}=I(\{F_n\})$, and so it forms a singleton prime end $\mathscr{F}=[\{F_n\}]$. We claim now that $\mathscr{F}\, |\, \mathscr{E}$. For each $k\in\mathbb{N}$ we know that $x_j\in E_{k+1}$ for all $j\ge k+1$; as $\dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1})>0$, it follows that for large $j$ the connected set $F_j$ contains $x_m$ for all $m\ge j+1$ with \[ \diam_M(F_j)<\frac12 \dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1}); \] hence $F_j\subset E_k$ for sufficiently large $j$. Now the primality of $\mathscr{E}$ tells us that $\mathscr{E}=\mathscr{F}$, that is, $\mathscr{E}$ is a singleton prime end. Now we show that $\overline{\Omega}^P$ is sequentially compact. If $\{x_j\}$ is a sequence in $\Omega$ that is bounded in the Mazurkiewicz metric $\dum$, then by the properness of $\overline{\Omega}^M$ we see that there is a subsequence that converges to a singleton prime end or to a point in $\Omega$. Similarly, if we have a sequence of singleton prime ends that is bounded with respect to $\dum$ (and recall that singleton prime ends correspond to points in the Mazurkiewicz boundary $\partial_M\Omega$, see~\cite{BBS2}), then we have a convergent subsequence. It now only remains to consider sequences $\{\zeta_j\}$ from $\overline{\Omega}^P$ such that the sequence is either an unbounded (in $\dum$) sequence of points from $\overline{\Omega}^M$ or is a sequence of prime ends that are of types~(b) and~(c). In this case, we fix $x_0\in\Omega$ and construct a prime end $[\{F_k\}]$ as follows. With $n_k=k$ in Lemma~\ref{lem:end-b-is-prime}, we choose $F_1$ to be the unbounded component of $\Omega\setminus \overline{B_M(x_0,1)}$ that contain infinitely many points from $\{\zeta_j\}$ if this sequence consist of points in $\overline{\Omega}^M$, or tail-end of the chains $\{E_k^j\}\in\zeta_j$ for infinitely many $j$. We then choose $F_2$ to be the unbounded component of $\Omega\setminus \overline{B_M(x_0,2)}$ that contain infinitely many of the points $\{\zeta_j\}$ that are in $F_1$ if $\{\zeta_j\}\subset\overline{\Omega}^M$, or tail-end of the chains $\{E_k^j\}\in\zeta_j$ for infinitely many $j$ that also gave a tail-end for $F_1$. Proceeding inductively, we obtain a chain $\{F_k\}$; by Lemma~\ref{lem:end-b-is-prime} we know that $[\{F_k\}]$ is a prime end of $\Omega$, and by the above construction and by a Cantor diagonalization, we have a subsequence of $\{\zeta_j\}$ that converges to $[\{F_k\}]$. \end{proof} Chains in prime ends of type~(b) have corresponding separating sets $R_k$, but no control over the Mazurkiewicz diameter of the boundaries of the acceptable sets that make up the chains. The following lemma and its corollary give us a good representative chain in the prime end of type~(b) that gives us control over the boundary of the acceptable sets as well as dispenses with the need for the separating sets $R_k$. \begin{lemma}\label{lem:standard-rep-b} Let $\mathscr{E}$ be an end of type~(b) of $\Omega$. Let $\{E_k\}$ be a representative chain for $\mathscr{E}$ and let $R_k$ be as given in Definition \ref{def:type-ab-ends}. Then, there is a representative chain $\{F_k\}$ of $\mathscr{E}$ and compact sets $S_k \subset X$ with the following properties: \begin{enumerate} \item[(i)] $F_k$ is a component of $\Omega \setminus S_k$, \item[(ii)] $\diam_M(S_k \cap \Omega) < \infty$, \item[(iii)] $\dist_M(S_k \cap \Omega, S_{k+1} \cap \Omega) > 0$. \end{enumerate} Furthermore, there are corresponding separating sets $R_k^F$ from Definition~\ref{def:type-ab-ends} that have the properties that $\dist_M(R_k^F \cap \Omega, R_{k+1}^F \cap \Omega) > 0$ and $\diam_M(R_k^F \cap \Omega) < \infty$. \end{lemma} \begin{proof} Let \[ T_k = \overline{(R_k \cap \Omega \setminus E_{k+1}) \cap E_k}. \] We see $E_{k+1}$ belongs to a single component of $\Omega \setminus T_k$ because $E_{k+1}$ is connected and $E_{k+1} \cap T_k = \emptyset$. This follows as $E_{k+1}$ is open in $X$ and $(R_k \cap \Omega \setminus E_{k+1}) \cap E_k = \emptyset$. We also see that $T_k \cap \Omega \subset E_k$ because $R_k \cap \partial E_k = \emptyset$ and so $T_k\cap\Omega=(R_k\cap E_k)\setminus E_{k+1}$. By Lemma~\ref{lem:E1-E2-separation}, we observe that there are no points $x \in \partial \Omega\cap E_k$ and $y\in\Omega\cap\partial E_{k+1}$ that belong to the same component of $\Omega \setminus T_k$. Let $S_k = T_{2k}$ and let $F_k$ be the component of $\Omega \setminus S_k$ containing $E_{2k + 1}$. The sets $S_k$ are compact as they are closed subsets of the sets $R_{2k}$. We first verify properties (i) - (iii) and then show that $\{F_k\}$ is a chain equivalent to $\{E_k\}$. Property (i) follows immediately from the definition of $F_k$. Property (ii) follows as $S_k \subseteq R_{2k}$ and $\diam_M(R_{2k}) < \infty$. For property (iii), let $x \in S_k \cap \Omega$ and $y \in S_{k+1} \cap \Omega$. Let $E \subset \Omega$ be a continuum containing $x$ and $y$. As $x \in S_k$, we have $x \notin E_{2k+1}$. As $y \in S_{k+1}$, we have $y \in E_{2k + 1}$, so there must exist a point $z_1 \in E \cap \partial E_{2k+1}$. Similarly, $x \notin E_{2k+2}$ and $y \in E_{2k+2}$, so there is a point $z_2 \in E \cap \partial E_{2k+2}$. Hence, \[ 0 < \dist_M(\partial E_{2k+1} \cap \Omega, \partial E_{2k+2} \cap \Omega) \leq \dum(z_1, z_2). \] and, as $x,y$ are arbitrary, we have $\dist_M(S_k \cap \Omega, S_{k+1} \cap \Omega) > 0$. It remains to show that $F_k$ is a chain of type~(b) that is equivalent to $\{E_k\}$. We first note that $F_{k+1} \subset E_{2k + 1} \subset F_k$, from which equivalence follows. Indeed, $E_{2k+1} \subset F_k$ follows immediately from the definition of $F_k$. To see that $F_{k+1} \subset E_{2k+1}$, suppose that there is a point $y\in F_{k+1}\setminus E_{2k+1}$. Let $x\in E_{2k+3}\subset F_{k+1}$; then by the connectedness of the open set $F_{k+1}$ together with local connectedness of $\Omega$, there is a continuum $\gamma\subset F_{k+1}$ containing the points $x,y$. Then as $x\in E_{2k+1}$ and $y\not\in E_{2k+1}$, $\gamma$ intersects $\Omega\cap\partial E_{2k+1}$. Moreover, as $x\in E_{2k+2}$ and $y\not\in E_{2k+2}$, we must also have that $\gamma$ intersects $\Omega\cap \partial E_{2k+2}$. Then as $T_{2k+1}$ separates $\Omega\cap\partial E_{2k+1}$ from $\Omega\cap\partial E_{2k+2}$, it follows that $\gamma$ intersects $T_{2k+1}$, contradicting the fact that $\gamma\subset F_{k+1}$. Properties (a) and (d) in Definition \ref{def:type-ab-ends} follow immediately from the above observation. Property (c) follows from (iii) as $\Omega\cap\partial F_k\subseteq S_k \cap \Omega$. For property (b), we use the sets $R_k^F = T_{2k+1}$. Compactness of $R_k^F$ follows as before: $R_k^F$ is a closed subset of the compact set $R_{2k+1}$. We see $\diam_M(R_k^F \cap \Omega) \leq \diam_M(R_{2k+1} \cap \Omega) < \infty$. The separation property of $R_k^F$ is similar to the separation property for the sets $T_k$: let $x \in \partial F_k$ and $y \in \partial F_{k+1}$ and suppose $\gamma$ is a path in $\Omega \setminus T_{2k+1}$ with $\gamma(0) = x$ and $\gamma(1) = y$. Then, $y \in T_{2k+2}$ so $y \in E_{2k+2}$ and $x \in T_{2k}$ so $x \notin E_{2k+1}$. Thus, $\gamma$ contains points in $\partial E_{2k+1}$ and $\partial E_{2k+2}$. Considering an appropriate subpath of $\gamma$ as before leads to a point in $\gamma \cap T_{2k+1}$, a contradiction. The inequality $\dist_M(R_k^F \cap \Omega, R_{k+1}^F \cap \Omega) > 0$ follows as in the proof that $\dist_M(S_k \cap \Omega, S_{k+1} \cap \Omega) > 0$. The inequality $\diam_M(R_k^F \cap \Omega) < \infty$ follows as $R_k^F \cap \Omega \subseteq R_{2k+1}$. \end{proof} The following corollary is a direct consequence of the above lemma and its proof. \begin{cor}\label{cor:Reduce-b} If $\{E_k\}$ is a representative chain of a type~(b) prime end of $\Omega$, then there is a sequence $\{F_k\}$ of unbounded open connected subsets of $\Omega$ such that \begin{enumerate} \item[(a)] $F_{k+1}\subset F_k$ for each $k\in\mathbb{N}$, \item[(b)] $\diam_M(\Omega\cap\partial F_k)<\infty$ for each $k\in\mathbb{N}$, \item[(c)] $\dM(\Omega\cap\partial F_k,\Omega\cap\partial F_{k+1})>0$ for each $k\in\mathbb{N}$, \item[(d)] $\emptyset\ne\bigcap_k\overline{F_k}\subset\partial\Omega$, \end{enumerate} and in addition, for each $k\in\mathbb{N}$ we can find $j_k,i_k\in\mathbb{N}$ such that \[ F_{j_k}\subset E_k\, \text{ and }\, E_{i_k}\subset F_k. \] Moreover, if $\{F_k\}$ is a sequence of unbounded open connected subsets of $\Omega$ that satisfy Conditions~(a)--(d) listed above, then $\{F_{2k}\}$ is a representative chain of a type~(b) prime end of $\Omega$. \end{cor} \begin{lemma}\label{image separation inequality} Suppose that both $(\Omega,\dum)$ and $(\Omega^\prime,\dumm)$ are Ahlfors $Q$-regular for some $Q>1$ and that they both support a $Q$-Poincar\'e inequality with respect to the respective Ahlfors regular Hausdorff measure. Let $\mathscr{E}$ be an end of any type of $\Omega$. Let $\{E_k\} \in \mathscr{E}$ be a chain with $\diam_M(\Omega\cap\partial E_k) < \infty$ for all $k$ and let $F_k = f(E_k)$. Then, \begin{equation}\label{eq:positive-dist-bdy} \dM^\prime(\Omega^\prime\cap\partial F_k,\Omega^\prime\cap\partial F_{k+1})>0. \end{equation} \end{lemma} Chains with $\diam_M(\Omega\cap\partial E_k) < \infty$ for all $k$ exist for all types of ends by Lemma \ref{lem:bdd-geom-ends} (for type (a)), Lemma \ref{lem:standard-rep-b} (for type (b)), and Lemma \ref{lem:standard-rep} (for type (c)). Here $\dM^\prime$ is the distance between the two sets with respect to the Mazurkiewicz metric $\dumm$. \begin{proof} Suppose \eqref{eq:positive-dist-bdy} is not the case for some positive integer $k$. Then we can find two sequences $w_j\in \Omega^\prime\cap\partial F_k$ and $z_j\in \Omega^\prime\cap\partial F_{k+1}$ such that $\dumm(w_j,z_j)\to 0$ as $j\to\infty$. Let $x_j\in\Omega\cap\partial E_k$ be such that $f(x_j)=w_j$, and $y_j\in\Omega\cap\partial E_{k+1}$ be such that $f(y_j)=z_j$. By passing to a subsequence if necessary, we may assume that $w_1\ne w_2$ and that $z_1\ne z_2$; therefore we also have $x_1\ne x_2$ and $w_1\ne w_2$. Note that as \[ \tau_k:=\dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1})>0, \] we must have that $\infty>\diam_M(E_1)\ge\dum(x_j,y_j)\ge \tau_k$ for each $j$. By Lemma~\ref{lem:bdd-geom-ends} we know that $\overline{\Omega}^M$ is proper, and so sequences that are bounded in $\Omega$ have a subsequence that converges in $\dum$ (and hence in $d_X$ as well) to some point in $\overline{\Omega}^M$. By~\cite[Theorem~1.1]{BBS1} we know that there is a bijective correspondence between singleton prime ends and points in $\partial_M\Omega$. Therefore by passing to a subsequence if necessary, we can find $\zeta,\xi\in\partial_P\Omega$ with $\zeta\ne \xi$ such that $x_j\to\zeta$ and $y_j\to\xi$. Note that $\dum(\xi,\zeta)\ge \tau_k$. So we can choose chains $\{G_m\}\in\xi$ and $\{H_m\}\in\zeta$ such that for each $m$ the completion in $\dum$ of $G_m$ and the completion of $H_m$ in $\dum$ are disjoint (indeed, we can ensure that $G_m\subset B_M(\xi, \tau_k/3)$ and $H_m\subset B_M(\zeta,\tau_k/3)$). As $x_j\to\zeta$, by passing to a further subsequence if needed, we can ensure that for each positive integer $j$, $x_j\in H_1$; similarly, we can assume that $y_j\in G_1$. As $H_1$ and $G_1$ are open connected subsets of $\Omega$ and $X$ is locally path-connected, it follows that for each $j$ there is a path $\gamma_j$ in $H_1$ connecting $x_j$ to $x_{j+1}$; similarly there is a path $\beta_j$ in $G_1$ connecting $y_j$ to $y_{j+1}$. For each positive integer $n$ let $\alpha_n$ be the concatenation of $\gamma_j$, $j=1,\cdots, n$, and let $\sigma_n$ be the concatenation of $\beta_j$, $j=1,\cdots, n$. Then $\alpha_n$ and $\sigma_n$ are continua in $\Omega$ with $\dM(\alpha_n,\sigma_n)\ge \tau_k/3$. Therefore for each $n$ we have \[ \Mod_Q(\Gamma(\alpha_n,\sigma_n))\le \frac{3^Q}{\tau_k^Q}\mu(\Omega)<\infty. \] On the other hand, with $A_n=f(\alpha_n)$ and $\Sigma_n=f(\sigma_n)$, we know that $\dM^\prime(A_n,\Sigma_n)\to 0$ as $n\to\infty$. However, \begin{align*} \liminf_{n\to\infty}\diam_M^\prime(A_n)&\ge \diam_M^\prime(A_1)>0,\\ \liminf_{n\to\infty}\diam_M^\prime(\Sigma_n)&\ge \diam_M^\prime(\Sigma_1)>0. \end{align*} Therefore by the Ahlfors regularity together with the Poincar\'e inequality on $\Omega^\prime$ with respect to $\dumm$, we know that \[ \Mod_Q(\Gamma(A_n,\Sigma_n))\to\infty\text{ as }n\to\infty. \] Since \[ f(\Gamma(\alpha_n,\sigma_n))=\Gamma(A_n,\Sigma_n), \] this violates the geometric quasiconformality of $f$, see Theorem~\ref{thm:HeiK}. Hence~\eqref{eq:positive-dist-bdy} must hold true. \end{proof} \begin{lemma}\label{lem: ends-to-ends} Suppose that both $(\Omega,\dum)$ and $(\Omega^\prime,\dumm)$ are Ahlfors $Q$-regular for some $Q>1$ and that they both support a $Q$-Poincar\'e inequality with respect to the respective Ahlfors regular Hausdorff measure. Let $\mathscr{E}$ be an end of any type of $\Omega$. Let $\{E_k\} \in \mathscr{E}$ be an appropriate chain with $\diam_M(\Omega\cap\partial E_k)<\infty$ for all $k$ and let $F_k = f(E_k)$. Then, \begin{enumerate} \item[(i)] If $\diam(F_k) < \infty$ for some $k$, then $\{F_k\}$ is a chain corresponding to an end of type (a). \item[(ii)] If $\diam(F_k) = \infty$ for all $k$ and $\bigcap_k \overline{F_k} \neq \emptyset$, then $\{F_k\}$ is a chain corresponding to an end of type (b). \item[(iii)] If $\diam(F_k) = \infty$ for all $k$ and $\bigcap_k \overline{F_k} = \emptyset$, then $\{F_k\}$ is a chain corresponding to an end of type (c). \end{enumerate} \end{lemma} We use the phrase ``appropriate chain'' to mean one which has the properties in Lemma \ref{lem:standard-rep-b} for type (b) or of the form given in Lemma \ref{lem:standard-rep} for type (c). As $f$ is a homeomorphism, this means that $f$ induces a map from ends of $\Omega$ to ends of $\Omega'$. \begin{proof} Let $\mathscr{E}$ be an end and let $\{E_k\}$ be a chain representing $\mathscr{E}$ with $\diam_M(\Omega\cap\partial E_k) < \infty$ for all $k$. Let $F_k = f(E_k)$. The proof will be split into several cases. We note that in all cases, the containments $F_{k+1} \subseteq F_k$ are immediate and the separation inequality~\eqref{eq:positive-dist-bdy} follows from Lemma~\ref{image separation inequality}, so we only check the other conditions. \noindent {\bf Case 1 [(a),(b),(c) $\to$ (a)]:} Suppose $\diam(F_k) < \infty$ for some $k$. By considering the tail end of this sequence, we assume $\diam(F_k) < \infty$ for all $k$. Then, as $f$ is a homeomorphism, each $F_k$ is a bounded, connected, open set. The sets $\overline{F_k}$ are compact as $Y$ is proper. As $Y$ is complete, it follows that $\bigcap_k \overline{F_k} \neq \emptyset$. The fact that $\bigcap_k \overline{F_k} \cap \Omega' = \emptyset$ follows as $f$ is a homeomorphism: if $x' = f(x) \in \bigcap_k \overline{F_k} \cap \Omega'$, then as $\Omega'$ is open we can find $r'>0$ with $B(x', r) \subset \Omega'$. Then, there is an $r > 0$ with $B(x, r) \subset f^{-1}(B(x', r'))$. For all types of ends, there is an index $I$ with $E_I \cap B(x, r/2) = \emptyset$. Hence $f(B(x, r/2)) \cap F_I = \emptyset$, and so $x \notin \overline{F_I}$. In particular, $\overline{F_k} \cap \partial \Omega' \neq \emptyset$ for all $k$, so the sets $F_k$ are admissible, and $\bigcap_k \overline{F_k} \subset \partial \Omega$, so $\{F_k\}$ is a chain. \noindent {\bf Case 2 [(a),(b),(c) $\to$ (b)]:} We assume that $\diam(F_k) = \infty$ for all $k$ and that $\bigcap_k \overline{F_k} \neq \emptyset$. As in Case 1, we must have $\bigcap_k \overline{F_k} \subseteq \partial \Omega'$. Moreover, $\overline{F_k}$ is proper for all $k$ as $Y$ is proper. Now the fact that $\{F_k\}$ corresponds to an end of type~(b) follows from Corollary~\ref{cor:Reduce-b} together with Lemma~\ref{lem:bdd-sets-to-bdd-sets}. \noindent {\bf Case 3 [(a),(b),(c) $\to$ (c)]:} We assume that $\diam(F_k) = \infty$ for all $k$ and that $\bigcap_k \overline{F_k} = \emptyset$. We only need to check that there exists a compact subset $K_k \subset Y$ with $\diam_M^\prime(K_k \cap \Omega') < \infty$ such that $F_k$ is a component of $\Omega' \setminus K_k$. Note that for each $k$ we have $\diam_M(\Omega\cap\partial E_k)<\infty$, and $\dM(\Omega\cap\partial E_k,\Omega\cap\partial E_{k+1})>0$. Therefore for all except at most one $k$ we have that $\diam_M^\prime(\Omega^\prime\cap\partial f(E_k))<\infty$ by Lemma~\ref{lem:bdd-sets-to-bdd-sets}. Set $K_k=\overline{f(\partial E_k \cap \Omega')}$. To see that $F_k=f(E_k)$ is a component of $\Omega' \setminus K_k$, we note that as $F_k$ is connected it is contained in some component of $\Omega' \setminus K_k$. If $F_k$ is not this entire component, then as open connected sets are path connected, this component contains a point of $\partial F_k$, but this is impossible as $\partial F_k \subseteq K_k$ because $f$ is a homeomorphism. \end{proof} \begin{thm}\label{thm:main-geomQC} Suppose that both $(\Omega,\dum)$ and $(\Omega^\prime,\dumm)$ are Ahlfors $Q$-regular for some $Q>1$ and that they both support a $Q$-Poincar\'e inequality with respect to the respective Ahlfors regular Hausdorff measure. Let $f \colon \Omega \to \Omega'$ be a geometric quasiconformal mapping. Then, $f$ induces a homeomorphism $f \colon \overline{\Omega}^P \to \overline{\Omega'}^P$. \end{thm} \begin{proof} By Lemma \ref{lem: ends-to-ends}, $f$ induces a map from ends of $\Omega$ to ends of $\Omega'$. As continuity is determined by inclusions of sets in chains and $f$ as a homeomorphism preserves these inclusions, the extended $f$ is also a homeomorphism. To see that $f$ maps prime ends to prime ends, suppose that $\mathscr{E}$ is a prime end of $\Omega$. Then, by Lemma~\ref{lem: ends-to-ends}, $f(\mathscr{E})$ is an end of $\Omega'$. If $\mathscr{F}$ is an end with $\mathscr{F} | f(\mathscr{E})$, then by applying Lemma~\ref{lem: ends-to-ends} to $f^{-1}$, we see that $f^{-1}(\mathscr{F})$ is an end with $f^{-1}(\mathscr{F}) | \mathscr{E}$. As $\mathscr{E}$ is prime, it follows that $\mathscr{E} | f^{-1}(\mathscr{F})$ as well, and so $f(\mathscr{E}) | \mathscr{F}$. It follows that $f(\mathscr{E})=\mathscr{F}$, so $f(\mathscr{E})$ is prime as $\mathscr{F}$ was arbitrary. \end{proof} We end this paper by stating the following two open problems: \begin{enumerate} \item If $\Omega$ is a domain (open connected set) in a proper locally path-connected metric space and $(\Omega,\dum)$ is Ahlfors $Q$-regular and supports a $Q$-Poincar\'e inequality for some $Q>1$, then could $\Omega$ have a prime end of type~(b)? \item If $\Omega$ and $\Omega^\prime$ are domains that satisfy the hypotheses of this section and $f:\Omega\to\Omega^\prime$ is geometrically quasiconformal, then is its homeomorphic extension $f:\overline{\Omega}^P\to\overline{\Omega^\prime}^P$ also quasiconformal, and does quasiconformality make sense in this situation when $\overline{\Omega}^P$ and/or $\overline{\Omega^\prime}^P$ are not metric spaces but are only topological spaces? If $\Omega$ and $\Omega^\prime$ are Euclidean domains with $\overline{\Omega}^P=\overline{\Omega}$ and $\overline{\Omega^\prime}^P=\overline{\Omega^\prime}$ then the results of~\cite{JoSmr} give a criterion under which $f$ extends to a quasiconformal mapping. \end{enumerate}
\section{Introduction} $3\alpha$ clustering is one of the hot subjects of C isotopes. A variety of $3\alpha$ cluster structures in $^{12}$C have been investigated (see for examples, review articles of Refs.~\cite{Fujiwara80,Yamada:2011bi,Horiuchi:2012,Freer:2014qoa,Funaki:2015uya,Freer:2017gip} and references therein). Particularly, the $0^+_2$ state of $^{12}$C has been attracting a great interest and discussed as a gas state of $\alpha$ particles. The strong monopole transition from the ground state supports the developed $3\alpha$ structure of the $0^+_2$ state. In higher energies than the $0^+_2$ state, other kinds of $3\alpha$-cluster structure such as a triangle, bending-chain, higher-nodal states have been theoretically suggested \cite{kamimura-RGM1,uegaki1,uegaki3,Kamimura:1981oxj,Descouvemont:1987zzb,KanadaEn'yo:1998rf,Tohsaki:2001an,Funaki:2003af,Neff:2003ib, Fedotov:2004nz,Kurokawa:2004ejb,Kurokawa:2005ax,Filikhin:2005nc,Funaki:2005pa,KanadaEn'yo:2006ze, Arai:2006bt,Chernykh:2007zz,ohtsubo13,Epelbaum:2012qn,Dreyfuss:2012us,Ishikawa:2014mza,Suhara:2014wua,Funaki:2014tda}. For neutron-rich C isotopes, further rich phenomena of the $3\alpha$ clustering are expected to appear because of surrounding excess neutrons. One of fascinating topics is the linear-chain $3\alpha$ structure in neutron-rich C. The linear-chain $3\alpha$ clustering in $^{12}$C was originally proposed by Morinaga \cite{Morinaga1956,Morinaga1966}, but it is considered to be unstable against bending motion. However in the case of neutron-rich C isotopes, the linear-chain clustering can be stabilized owing to excess neutrons as predicted in theoretical works \cite{Itagaki:2001mb,Itagaki:2006ic,Suhara:2010ww,Suhara:2011cc,Maruhn:2010dtc,Baba:2014lsa,Baba:2016sbi,yoshida2016-c14,Baba:2017opd}. In this decade, many experiments have been performed to observe cluster states in $^{14}$C \cite{Soic:2003yg,vonOertzen2004,Price:2007mm,Haigh:2008zz,Freer:2014gza,Fritsch:2016vcq,Yamaguchi:2016oay,Tian:2016vvb}. One of good tools to search for new cluster states is $\alpha$ resonant scattering, which has been recently utilized to study cluster states in such unstable nuclei as $^{14}\textrm{C}$. For $^{14}$C, candidate states of the linear-chain band have been reported by recent experiments of the $^{10}$Be+$\alpha$ resonant scattering \cite{Freer:2014gza,Fritsch:2016vcq,Yamaguchi:2016oay}, but its rotational band members have yet to be confirmed. An alternative tool to investigate cluster states is the $\alpha$ inelastic scattering off target nuclei because developed cluster states tend to be populated by the $\alpha$ scattering via isoscalar transitions \cite{Kawabata:2005ta,KanadaEn'yo:2006bd,Funaki:2006gt,Yamada:2008,Yamada:2011ri,Wakasa:2007zza,Itoh:2011zz,Chiba:2015zxa}. The $\alpha$ scattering has been utilized, in particular, to investigate isoscalar monopole transitions into excited $0^+$ states as done for $^{16}$O to study $0^+$ cluster states \cite{Wakasa:2007zza}. Our aim is to investigate cluster states in $^{14}\textrm{C}$ focusing on the monopole excitations as well as $\alpha$-decay property. In preceding works on the linear-chain structure of $^{14}\textrm{C}$ \cite{Suhara:2010ww,Baba:2014lsa,Baba:2017opd}, methods of antisymmetrized molecular dynamics (AMD) \cite{KanadaEnyo:1995tb,Kanada-Enyo:2001yji,KanadaEn'yo:2012bj} were applied, but the framework is not sufficient to describe detailed $^{10}\textrm{Be}+\alpha$ clustering features. The cluster structures of $^{14}\textrm{C}$ have been also studied by the generator coordinate method (GCM) of a $3\alpha+nn$ cluster model \cite{yoshida2016-c14}. However, the cluster model is not able to properly describe low-energy spectra because it is not suitable to describe shell model configurations nor cluster breaking in low-lowing states. One of the authors \cite{Kanada-Enyo:2014qwn} have studied low-lying states of $^{14}$C by a calculation of variation after angular momentum and parity projections (VAP) with the AMD model. The AMD calculation of VAP reasonably described the $0^+$, $2^+$, and $1^+$ spectra and Gamow-Teller transitions from $^{14}$N$(1^+_1)$ except for the anomalously hindered $\beta$ decay of the ground state of $^{14}\textrm{C}$. In the present paper, we apply the AMD method of VAP combining it with the GCM of the $3\alpha+nn$ cluster model, which we call ``VAP+cl-GCM'' in this paper, and discuss the energy spectra and band structure of $^{14}\textrm{C}$. A particular attention is paid on the monopole excitations and linear-chain band. Cluster features of $^{10}$Be+$\alpha$ and $3\alpha+nn$ clusterings are discussed. The $\alpha$ inelastic scattering off $^{14}\textrm{C}$ are also calculated with the microscopic coupled-channel (MCC) calculation using the matter and transition densities obtained by VAP+cl-GCM. The reaction approach is the $g$-matrix folding model, where $\alpha$-nucleus coupled-channel potentials are microscopically derived by folding the Melbourne $g$-matrix effective nuclear interaction with input of densities of the target nucleus from the structure model. Similar MCC calculations have been done for study of $^{12}$C($\alpha,\alpha')$ and $^{16}$C($\alpha,\alpha')$, and proved to reproduce cross sections of cluster states without phenomenologically adjusting parameters of the reaction calculation \cite{Minomo:2016hgc, Kanada-Enyo:2019prr,Kanada-Enyo:2019qbp}. The paper is organized as follows. The procedure of the structure calculation of VAP+cl-GCM is explained in Sec.~\ref{sec:framework}, and structure properties of $^{14}\textrm{C}$ are discussed in Sec.~\ref{sec:results-structure}. The result of the $\alpha$ scattering off $^{14}\textrm{C}$ is shown in Sec.~ \ref{sec:results-scattering}. Finally, a summary is given in Sec.~\ref{sec:summary}. \section{Formulation of VAP+cl-GCM} \label{sec:framework} \subsection{model wave function} $0^+$ and $2^+$ states of $^{14}$C are calculated with the VAP version of AMD combined with the cluster GCM, in which AMD and $3\alpha+nn$ wave functions are superposed. An AMD wave function is given by a Slater determinant of single-nucleon Gaussian wave functions as \begin{eqnarray} \Phi_{\rm AMD}({\boldsymbol{Z}}) &=& \frac{1}{\sqrt{A!}} {\cal{A}} \{ \varphi_1,\varphi_2,...,\varphi_A \},\label{eq:slater}\\ \varphi_i&=& \phi_{{\boldsymbol{X}}_i}\chi_i\tau_i,\\ \phi_{{\boldsymbol{X}}_i}({\boldsymbol{r}}_j) & = & \left(\frac{2\nu}{\pi}\right)^{3/4} \exp\bigl[-\nu({\boldsymbol{r}}_j-\boldsymbol{X}_i)^2\bigr], \label{eq:spatial}\\ \chi_i &=& (\frac{1}{2}+\xi_i)\chi_{\uparrow} + (\frac{1}{2}-\xi_i)\chi_{\downarrow}. \end{eqnarray} Here ${\cal{A}}$ is the antisymmetrizer, and $\varphi_i$ is the $i$th single-particle wave function written by a product of spatial ($\phi_{{\boldsymbol{X}}_i}$), spin ($\chi_i$), and isospin ($\tau_i$ fixed to be proton or neutron) wave functions. The width parameter $\nu$ is chosen to be the same value $\nu=0.19$ fm$^{-2}$ as Ref.~\cite{Kanada-Enyo:2014qwn}. The parameters ${\boldsymbol{Z}}\equiv \{{\boldsymbol{X}}_1,\ldots, {\boldsymbol{X}}_A,\xi_1,\ldots,\xi_A \}$ for Gaussian centroid positions and nucleon-spin orientations of all nucleons are treated as variational parameters, which are optimized of each state of $^{14}\textrm{C}$. We use five AMD wave functions $(\Phi^{(n)}_\textrm{AMD}$ $n=1,\ldots,5$) obtained for five states, $^{14}\textrm{C}(0^+_{1,2},2^+_{1,2},1^+_1)$, with the energy variation after $J^\pi$ (angular momentum and parity) projection in Ref.~\cite{Kanada-Enyo:2014qwn}. For more details, the reader is referred to this reference. \begin{figure}[!h] \begin{center} \includegraphics[width=6cm]{2a-nn-a-fig.pdf} \end{center} \caption{Schematic figure of $(2\alpha+nn)+\alpha$ configurations used in the GCM basis wave functions of $^{14}\textrm{C}$. \label{fig:3-alpha}} \end{figure} In addition to the AMD wave functions, $3\alpha+nn$ cluster wave functions are superposed to take into account large amplitude motion between $\alpha$ clusters. The model wave functions for $3\alpha+nn$ configurations are almost same as those adopted in Ref.~\cite{yoshida2016-c14}. We first compose wave functions of the subsystem $^{10}$Be with a $2\alpha+nn$ cluster model considering the $\alpha$-$\alpha$ motion in $^{10}$Be, and then place the third $\alpha$ cluster at various distances and angles from the $^{10}$Be core as illustrated by a schematic figure shown in Fig.~\ref{fig:3-alpha}. The first and second $\alpha$ clusters are placed on the $Z$ axis at $(0,0,\pm d/2)$ with the distance $d$. For two valence neutrons, we adopt neutron configurations of an cluster model for $^{10}$Be proposed by Itagaki {\it et al.} \cite{Itagaki:2005sy}, which is an extended version of the Brink-Bloch cluster model \cite{Brink66}. Namely, wave functions for spin-up and -down neutrons are given by Gaussian wave packets at the same position but the momentum opposite to each other. As a result, the $2\alpha+nn$ wave function is given as \begin{align} &\Phi_{2\alpha+nn}(d,\phi)={\cal A}\Bigl [ \Phi_\alpha(\boldsymbol{R}_1)\Phi_\alpha(\boldsymbol{R}_2) \varphi_{n\uparrow}(\boldsymbol{R}_{n\uparrow}) \varphi_{n\downarrow}(\boldsymbol{R}_{n\downarrow}) \Bigr ], \\ & \varphi_{n\uparrow(\downarrow)}(\boldsymbol{R}_{n\uparrow(\downarrow)})= \phi_{\boldsymbol{R}_{n\uparrow(\downarrow)}}\chi_{\uparrow(\downarrow)}, \end{align} with $\boldsymbol{R}_1=-\boldsymbol{R}_2=(0,0,d/2)$ and \begin{align} &\boldsymbol{R}_{n\uparrow}=\rho(\cos\phi,\sin\phi,0)+i\rho\Lambda(-\sin\phi,\cos\phi,0),\nonumber \\ &\boldsymbol{R}_{n\downarrow}=\rho(\cos\phi,\sin\phi,0)-i\rho\Lambda(-\sin\phi,\cos\phi,0). \end{align} Here $\Phi_\alpha(\boldsymbol{R}_k)$ is the $\alpha$ cluster wave function given by the $(0s)^4$ harmonic oscillator configuration located at $\boldsymbol{R}_k$ and the parameters $\rho$ and $\Lambda$ are optimized to minimize the $^{10}$Be energy for each $\alpha$-$\alpha$ distance $d$. Using the optimized values of $\rho$ and $\Lambda$, the $3\alpha+nn$ wave function is given as \begin{align} &\Phi_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)\\ &={\cal A}\Bigl [ \Phi_\alpha(\boldsymbol{R}_1)\Phi_\alpha(\boldsymbol{R}_2) \Phi_\alpha(\boldsymbol{R}_3) \varphi_{n\uparrow}(\boldsymbol{R}_{n\uparrow}) \varphi_{n\downarrow}(\boldsymbol{R}_{n\downarrow}) \Bigr ], \\ & \boldsymbol{R}_3=(D_\alpha\cos\theta_\alpha,0, D_\alpha\sin\theta_\alpha). \end{align} To exactly remove the center of mass motion from the total wave function, the Gaussian center positions are shifted as $\boldsymbol{R}_k\to \boldsymbol{R}_k-\boldsymbol{R}_G$ and $\boldsymbol{R}_{n\uparrow(\downarrow)}\to \boldsymbol{R}_{n\uparrow(\downarrow)} -\boldsymbol{R}_G$ with $\boldsymbol{R}_G\equiv (4\sum_k\boldsymbol{R}_k+ \boldsymbol{R}_{n\uparrow}+\boldsymbol{R}_{n\downarrow})/14$. The Gaussian widths of the $\alpha$ and neutron wave functions are common and taken to be the same $\nu$ value as that used in the AMD wave function. Note that the present $3\alpha+nn$ cluster wave function can be expressed by a specific configuration of the AMD wave function. The basis wave functions $\Phi_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ with various values of four parameters, $d$, $D_\alpha$, $\phi$, and $\theta_\alpha$, are projected to $J^\pi$ eigen states and superposed in the GCM calculation. We here simply denote the $m$th basis wave function as $\Phi_{3\alpha+nn}^{(m)}$ with the label $m$ for the parameter set $(d,D_\alpha, \phi, \theta_\alpha)$. The final wave function of VAP+cl-GCM for the $J^\pi_k$ state is obtained by combining the AMD and the $3\alpha+nn$ wave functions as \begin{align} \Psi(J^\pi_k)&=\sum_{n,K} c^{(n)}_{K}(J^\pi_k) P^{J\pi}_{MK} \Phi^{(n)}_\textrm{AMD} \nonumber\\ &+ \sum_{m,K} c'^{(m)}_{K}(J^\pi_k) P^{J\pi}_{MK} \Phi^{(m)}_{3\alpha+nn}, \end{align} where coefficients $c^{(n)}_{K}(J^\pi_k)$ and $c'^{(m)}_{K}(J^\pi_k)$ are determined by diagonalization of the norm and Hamiltonian matrices. In order to evaluate component of a specific $3\alpha+nn$ configuration contained in the $J^\pi_k$ state, we define the squared overlap of $\Psi(J^\pi_k)$ with a basis $3\alpha+nn$ wave function as \begin{align} {\cal O}^2_{3\alpha+nn}&(d,D_\alpha, \phi, \theta_\alpha)= \nonumber\\ &|\langle \Psi(J^\pi_k) | P^{J\pi}_{MK} \Phi_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)\rangle|^2 \label{eq:overlap}. \end{align} \subsection{Effective interactions and parameter setting} We use the effective nuclear interactions of the MV1 (case 3) central force \cite{TOHSAKI} supplemented by the spin-orbit term of the G3RS force \cite{LS1,LS2}, and the Coulomb force. The Bartlett, Heisenberg, and Majorana parameters, $b=h=0.125$ and $m=0.62$, in the MV1 force are adopted, and the strengths $u_{I}=-u_{II}=3000$ MeV of the G3RS spin-orbit force are used. These interaction parameters are consistent with those used in Ref.~\cite{Kanada-Enyo:2014qwn} for the study of $^{14}\textrm{C}$ with the VAP calculation \cite{Kanada-Enyo:2014qwn}. It should be commented that we use the MV1 force consisting of the finite-range 2-body and zero-range 3-body forces instead of the Volkov force \cite{Volkov:1965zz} used in Refs.~\cite{Suhara:2010ww,yoshida2016-c14}, because spectra of low-lying states in $^{14}$C and also those of cluster states in $^{16}$O were reasonably reproduced by the MV1 force but not by the Volkov force. For the generator coordinates $d$, $D_\alpha$, $\phi$, and $\theta_\alpha$ of the GCM calculation, we adopt discrete values, $d=2,3,4$~fm, $D_\alpha=2,3,\ldots,7$~fm, $\phi=\pi/8,3\pi/8, 5\pi/8, 7\pi/8$, and $\theta_\alpha=0, \pi/8, \pi/4, 3\pi/8, \pi/2$ of the $3\alpha+nn$ wave functions. Note that the angle ranges $0\le \phi\le \pi$ and $0\le \theta_\alpha \le \pi/2$ are equivalent to the full ranges $0\le \phi\le 2\pi$ and $0\le \theta_\alpha \le \pi$ because of the parity and angular momentum projections. In this parametrization, the number of basis $3\alpha+nn$ wave functions $\Phi^{(m)}_{3\alpha+nn}$ ($m=1,\ldots,m_\textrm{max}$) is $m_\textrm{max}=(3\times 4 \times 4 + 3) \times 6=306$. The values of $\rho$ and $\Lambda$ of neutron wave functions are listed in Table \ref{tab:be10spe}. In the first choice (set-1), we optimize $\rho$ and $\Lambda$ to minimize the $0^+$ energy of the subsystem $P^{0+}_{00}\Phi_{2\alpha+nn}$. In the second choice (set-2), we use alternative values of $\rho$ and $\Lambda$ for $d=3$ fm determined to minimize the $(J^\pi,K)=(2^+,2)$ energy of $P^{2+}_{M2}\Phi_{2\alpha+nn}$ so as to globally optimize energies of $^{10}$Be$(0^+_1)$, $^{10}$Be$(2^+_1)$, and $^{10}$Be$(2^+_2)$. As shown in Table \ref{tab:be10spe}, the second choice gives a better result of the low-energy energy spectra of $^{10}$Be, in particular, the energy of $^{10}$Be$(2^+_2)$. Therefore, we adopt parameters $\rho$ and $\Lambda$ of set-2 in the present calculation of $^{14}$C. \begin{table}[!ht] \caption{Optimized values of the $\rho$ and $\Lambda$ parameters and excitation energies of $^{10}$Be of the first (set-1) and second (set-2) of $2\alpha+nn$ wave functions. \label{tab:be10spe} } \begin{center} \begin{tabular}{ccccc} \hline & \multicolumn{2}{l}{$\rho$~(fm), $\Lambda$} & \\ & set-1 & set-2 & \\ $d=2$ fm & $(0.9,0.56)$ & $(0.9,0.56)$ & \\ $d=3$ fm & $(1.5,0.38)$ & $(1.9,0.02)$ & \\ $d=4$ fm & $(2.1,0.24)$ & $(2.1,0.24)$ &\\ & \multicolumn{3}{l}{$E_x$ (MeV)} & \\ & set(1) & set(2) & exp \\ $^{10}$B$(2^+_1)$ &2.57 & 2.52 & 3.368\\ $^{10}$B$(2^+_2)$ & 7.64 & 6.38 & 5.958\\ \hline \end{tabular} \end{center} \end{table} \section{Structure of $^{14}$C}\label{sec:results-structure} \subsection{Structure properties} The energy levels of $^{14}$C obtained by the VAP+cl-GCM calculation are shown in Fig.~\ref{fig:spe}. Root-mean-square radii and monopole transition strengths of the proton and neutron parts for $0^+$ states are listed in Table~\ref{tab:radii}, and quadrupole ($\lambda=2$) transition strengths of the proton and neutron parts are shown in Table~\ref{tab:be2}. \begin{figure}[!h] \begin{center} \includegraphics[width=8.6cm]{spe-fig.pdf} \end{center} \caption{ The calculated energy spectra of $0^+$, $2^+$, and $4^+$ states of $^{14}\textrm{C}$ are shown together with the experimental energy spectra assigned to $0^+$, $2^+$, and $4^+$ in Ref.~\cite{AjzenbergSelove:1991zz}. The experimental levels with asterisk symbols are the states reported in Ref.~\cite{Yamaguchi:2016oay} as candidates of the linear-chain band. \label{fig:spe}} \end{figure} \begin{table}[!ht] \caption{Root-mean-square radii of $^{14}$C$(0^+_k)$ and monopole transition strengths from the ground state calculated with VAP+cl-GCM. Proton and neutron parts of radii ($R_{p,n}$) and monopole transition strengths ($B_{p,n}(E0)$) are listed. The experimental proton radius of the ground state reduced from the experimental charge radius \cite{Angeli2013} is $R_p=2.37$~fm. \label{tab:radii} } \begin{center} \begin{tabular}{ccccc} \hline & $R_p$(fm) & $R_n $ (fm) & $B_p(E0)$ (fm$^4$) & $B_n(E0)$ (fm$^4$) \\ $0^+_1$ & 2.52 & 2.65 & & \\ $0^+_2$ & 2.62 & 2.80 & 1.1 & 2.5 \\ $0^+_3$ & 2.98 & 2.98 & 18 & 15 \\ $0^+_4$ & 3.48 & 3.37 & 1.0 & 0.7 \\ \hline \end{tabular} \end{center} \end{table} \begin{table}[!ht] \caption{$E2$ transition strengths of $2^+\to 0^+$ in $^{14}$C calculated with VAP+GCM. In addition to the proton contribution $B(E2)$, the neutron contribution ($B_n(E2)$) of the $\lambda=2$ transitions is also shown. The strengths for $0^+_1 \to 2^+_{1,2,3,4,5}$ and those with $B(E2) \ge 2$ fm$^4$ or $B_n(E2) \ge 2$ fm$^4$ in the transitions $2^+_{1,2,3,4,5}\to 0^+_{1,2,3,4}$ are given. The experimental value of $B(E2;2^+_1\to 0^+_1)$ is 3.6$\pm$0.6 fm$^4$ \cite{AjzenbergSelove:1991zz}. \label{tab:be2} } \begin{center} \begin{tabular}{ccccc} \hline & $B(E2)$ (fm$^4$) & $B_n(E2)$ (fm$^4$) \\ $2^+_1\to 0^+_1$ & 7.8 & 2.4 \\ $2^+_2\to 0^+_1$ & 0.0 & 1.5 \\ $2^+_3\to 0^+_1$ & 0.1 & 0.0 \\ $2^+_4\to 0^+_1$ & 0.0 & 0.0 \\ $2^+_5\to 0^+_1$ & 0.1 & 0.1 \\ &\\ $2^+_1\to 0^+_2$ & 0.6 & 2.7 \\ $2^+_2\to 0^+_2$ & 6.8 & 43.2 \\ $2^+_3\to 0^+_2$ & 3.8 & 3.7 \\ $2^+_4\to 0^+_1$ & 3.3 & 0.7 \\ $2^+_4\to 0^+_3$ & 6.0 & 2.3 \\ $2^+_5\to 0^+_3$ & 29.0 & 33.5 \\ $2^+_5\to 0^+_4$ & 162 & 175 \\ \hline \end{tabular} \end{center} \end{table} The calculated energy spectra of $0^+$, $2^+$, and $4^+$ states are compared with the experimental energy spectra in Fig.~\ref{fig:spe}. In the figure, the experimental levels with asterisk symbols are candidate states of the linear-chain band reported by recent experiment of Ref.~\cite{Yamaguchi:2016oay}. The $0^+_1$ and $0^+_2$ states are approximately described by the VAP wave functions showing shell-model like structure but no prominent cluster structure. In the mean-field picture, the $0^+_2$ state is approximately understood as neutron excitation into a $(sd)^2$ configuration and has a normal proton radius as small as that of the ground state. In contrast to the $0^+_2$ state, the $0^+_3$ and $0^+_4$ states have relatively large nuclear radii and spatially developed cluster structures. The $0^+_4$ state dominantly has the linear-chain $3\alpha$ structure and constructs a rotational band. In the monopole transition strengths listed in Table~\ref{tab:radii}, the remarkable strength from the ground state is obtained for the $0^+_3$ state because of its nature of the triangle $3\alpha$ vibration mode. On the other hand, the $0^+_4$ state has weak monopole transition strength even though it is a developed cluster state, because the linear-chain state has the linearly aligned $3\alpha$ configuration, which is much different from the ground state and difficult to be directly excited by the monopole operator. Let us discuss the band structure based on the $E2$ transition strengths shown in Table~\ref{tab:be2}. The $2^+_1$ state is assigned to the ground band and mainly contributed by the proton rotation. The $0^+_2$, $2^+_2$, and $4^+_1$ states with dominant neutron $(sd)^2$ components construct the $K^\pi=0^+_2$ band. The $0^+_3$ state shows no clear signal of band structure. Instead, the $E2$ strength from this state is fragmented into $2^+_4$ and $2^+_5$ states. The rotational band of the linear-chain structure is built on the $0^+_4$ state with the $2^+_5$ and $4^+_3$ states. This band has remarkably strong $E2$ transitions and large moment of inertia (small level spacing) because of the highly elongated structure. More detailed properties of $\alpha$ decays and cluster structures are discussed in the following sections. \subsection{$^{10}\textrm{Be}(0^+_1)+\alpha$ decay widths} \begin{figure}[!h] \begin{center} \includegraphics[width=8cm]{be10-a-fig.pdf} \end{center} \caption{The squared overlap of $\Psi(J^\pi_k)$ for the $0^+_{1,2,3,4}$ states with the $^{10}\textrm{Be}(0^+_1)+\alpha$ wave function at the distance $D_\alpha$. \label{fig:be10-alpha}} \end{figure} \begin{figure}[!h] \begin{center} \includegraphics[width=9.cm]{spe-Er-fig.pdf} \end{center} \caption{ The calculated energy spectra measured from the $^{10}\textrm{Be}(0^+_1)+\alpha$ threshold are shown together with $^{10}\textrm{Be}(0^+_1)+\alpha$ decay widths. The partial decay widths are calculated with the reduced widths and penetrability for $E_r$ at the channel radius $a=5$ fm. The levels connected by dashed lines are the linear-chain band members. In the right two columns, the linear-chain band members predicted in other calculations by Suhara {\it et al.} \cite{Suhara:2010ww} and Baba {\it et al.} \cite{Baba:2017opd} are shown. In the left three columns, the $0^+$, $2^+$ and $4^+$ states experimentally observed by $\alpha$ resonant scattering in Ref.~\cite{Freer:2014gza} by Freer {\it et al.}, Ref.~\cite{Fritsch:2016vcq} by Fritsch: {\it et al.}, and Ref.~\cite{Yamaguchi:2016oay} by Yamaguchi {\it et al.} \label{fig:spe-Er}} \end{figure} In order to discuss $\alpha$ decay properties, we calculate the $^{10}\textrm{Be}(0^+_1)+\alpha$ component in the $0^+$, $2^+$, and $4^+$ states. The squared overlap of $\Psi(J^\pi_k)$ obtained by VAP+cl-GCM with the $^{10}\textrm{Be}(0^+_1)+\alpha$ wave function with the distance $D_\alpha$ is calculated. The result for the $0^+_{1,2,3,4}$ states is shown in Fig.~\ref{fig:be10-alpha}. The ground state has the overlap only in the internal region indicating the $^{10}\textrm{Be}(0^+_1)+\alpha$ component as the ground state correlation but no spatially developed clustering. In the $0^+_2$ state, $^{10}\textrm{Be}(0^+_1)+\alpha$ component is relatively minor compared with the $0^+_3$ and $0^+_4$ states. In the $0^+_3$ state, the squared overlap is distributed in a wide range of $D_\alpha$ with the maximum amplitude at $D_\alpha=4$~fm meaning that the $\alpha$ cluster is moving in the broad region around the $^{10}\textrm{Be}(0^+_1)$ core. The $0^+_4$ state has large overlap amplitudes at $D_\alpha=6$~fm and shows remarkable development of the clustering. The significant amplitude at $D_\alpha=7$~fm may indicate some coupling with $^{10}\textrm{Be}(0^+_1)+\alpha$ continuum states. We evaluate the reduced widths for $^{10}\textrm{Be}(0^+_1)+\alpha$ from the calculated overlap with the approximation proposed in Ref.~\cite{Kanada-Enyo:2014mri}. The energy spectra and widths for the states having significant decay widths are shown in Fig.~\ref{fig:spe-Er}. The energy levels are plotted with respect to relative energies $E_r$ measured from the $^{10}\textrm{Be}+\alpha$ threshold energy. Here, the partially decay widths for the $^{10}\textrm{Be}+\alpha$ channel are evaluated with the reduced widths and penetrability of $E_r$ at the channel radius $a=5$ fm as often done in structure model calculations. The levels connected by dashed lines are the linear-chain band members. For comparison, theoretical results of the linear-chain bands predicted in other two calculations \cite{Suhara:2010ww,Baba:2017opd}. The theoretical widths are not necessarily consistent between three calculations mainly because of different theoretical values of $E_r$, which are affected by model ambiguity from effective nuclear interactions and model spaces. However, the dimensionless reduced widths $\theta(a)^2$ are not so much different: $\theta(a)^2$ for the $0^+$, $2^+$, and $4^+$ states are 0.15, 0.27, and 0.10 at $a=5$~fm in the present calculation, 0.16, 0.15, and 0.09 at $a=5$ fm in Ref.~\cite{Suhara:2010ww}, and 0.07, 0.07, and 0.05 at $a=6$~fm in Ref.~\cite{Baba:2017opd}. It means that the cluster structure of the linear-chain band is qualitatively similar between these calculations. The data of $0^+$, $2^+$ and $4^+$ states reported by experiments of the $\alpha$ resonant scattering \cite{Freer:2014gza,Fritsch:2016vcq,Yamaguchi:2016oay} are also shown in left three columns of Fig.~\ref{fig:spe-Er}. It is difficult to confirm the experimental assignment of the linear-chain band from those data because the data are not necessarily consistent between different experiments. The $\theta_\alpha^2(a)$ values at $a=5$ fm reported in Ref.~\cite{Yamaguchi:2016oay} are 0.34(12), 0.091(27), and 0.024(9) for the $0^+$, $2^+$, and $4^+$ states, respectively. The observed $\theta_\alpha^2(a)$ values of the $2^+$ and $4^+$ states are smaller than the present result. \subsection{$3\alpha+nn$ cluster structures} As mentioned previously, the remarkable monopole transition strength is obtained for the $0^+_3$ state, whereas the strengths of the $0^+_2$ and $0^+_4$ states are relatively weak. These features of monopole excitations can be understood by the $3\alpha+nn$ clustering. In order to clarify properties of the clustering, we calculate the squared overlap ${\cal O}^2_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ of $\Psi(J^\pi_k)$ with each $3\alpha+nn$ configuration specified by the parameters $D_\alpha$, $\theta_\alpha$, and $\phi$ as given in Eq.~\eqref{eq:overlap}. $D_\alpha$ and $\theta_\alpha$ describes the position of the third $\alpha$ cluster around the $^{10}\textrm{Be}$ core, and $\phi$ is the parameter for the $nn$ orientation against the $3\alpha$ plane (see Fig.~\ref{fig:3-alpha}). We categorize $\Phi_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ into three kinds of wave functions as ``tetrahedral'', ``planer'', and ``linear'' configurations with $(\theta_\alpha,\phi)=(\pi/2,5\pi/8)$, $(\theta_\alpha,\phi)=(\pi/2,\pi/8)$, and $\theta=0$, respectively. Each component contained in $J^\pi_k$ states is evaluated with ${\cal O}^2_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ for the corresponding configuration. Figure \ref{fig:over-base} shows components of the tetrahedral, planer, and linear configurations. Obtained values of ${\cal O}^2_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ are plotted as functions of the distance $D_\alpha$ of the third $\alpha$ from the subsystem $2\alpha+nn$. Here, we show the result for $d=4$ fm of the $\alpha$-$\alpha$ distance in the $2\alpha+nn$ part in order to discuss prominent cluster features. As shown in Fig.~\ref{fig:over-base}(a) for the tetrahedral, the ground state contains component of the compact tetrahedral configuration, and the $0^+_3$ state can be regarded as a vibration mode of the triangle $3\alpha$ in the tetrahedral configuration. This excitation mode of the $0^+_3$ contributes to the remarkable monopole transition strength because it expresses radial excitation of $\alpha$ clusters keeping the same shape as the $0^+_1$ state. The $0^+_4$ state contains dominantly the linear component with $D_\alpha=5-6$ and constructs the linear-chain band with a large momentum of inertia because of the highly elongated shape. The $0^+_2$ state shows weak cluster feature as it is the shell-model state and roughly described by the neutron excitation to the $sd$ shell. However, it contains significant planer component as can be seen in Fig.~\ref{fig:over-base}(a). From this feature found in the mapping onto the cluster model space, one can interpret the $0^+_2$ state as the excitation from the compact tetrahedral configuration of the ground state into the planer configuration. Such excitations into the planer and linear configurations obtained in the $0^+_2$ and $0^+_4$ states involve drastic changes of the geometric structure from the ground state, and describe suppression of monopole transitions in general. It should be commented that the squared overlap ${\cal O}_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ is not concentrated on a specific configuration but somewhat fragmented. It indicates non negligible configuration mixing and also may suggest coupling with continuum states. In the present calculation of VAP+cl-GCM, the linear-chain band is built on the $0^+_4$ state in the $3\alpha+nn$ cluster dynamics. This result is qualitatively similar to that of the previous calculation with the $3\alpha+nn$-cluster model \cite{yoshida2016-c14}. On the other hand, the AMD calculations in Refs.~\cite{Suhara:2010ww,Baba:2014lsa,Baba:2017opd} obtained the linear-chain state as the $0^+_3$ state. It means that a low-lying monopole excitation was missing in the AMD calculations because they do not fully take into account $3\alpha+nn$ cluster configurations. \begin{figure}[!h] \begin{center} \includegraphics[width=8cm]{over-base-fig.pdf} \end{center} \caption{ Components of (a) tetrahedral, (b) planer, and (c) linear configurations contained in $0^+$ states. The values of ${\cal O}^2_{3\alpha+nn}(d,D_\alpha, \phi, \theta_\alpha)$ given in Eq.~\eqref{eq:overlap} with $(\theta_\alpha,\phi)=(\pi/2,5\pi/8)$, $(\theta_\alpha,\phi)=(\pi/2,\pi/8)$, and $\theta=0$ for the tetrahedral, planer, and linear configurations, respectively, are plotted as functions of $D_\alpha$. $d=4$ fm is chosen for all the configurations. \label{fig:over-base}} \end{figure} \section{$\alpha$ inelastic scattering off $^{14}\textrm{C}$}\label{sec:results-scattering} As a probe of cluster states, we investigate the $\alpha$ inelastic scattering off $^{14}\textrm{C}$ with the MCC calculation. A particular attention is paid on the inelastic scattering of the $0^+_3$ having the strong monopole transition, which is expected to be strongly populated by the $\alpha$ scattering. For this state, the monopole transition matrix elements $M_p(E0)$ and $M_n(E0)$ of the proton and neutron parts are predicted to be $M_p(E0)=4.3$ fm$^2$ and $M_n(E0)=3.9$ fm$^2$, which are the same order as $M_p(E0)=5.48\pm 0.22$ fm$^2$ of $^{12}\textrm{C}(0^+_2)$ measured by electron pair emission \cite{Kelley:2017qgh}. The $\alpha$ inelastic scattering cross sections of the $0^+$ and $2^+$ states of $^{14}\textrm{C}$ are calculated using the matter and transition densities obtained by the present VAP+cl-GCM calculation. The reaction calculation is in principle the same approach as that of our previous works on the $^{12}\textrm{C}(\alpha,\alpha')$ and $^{16}\textrm{O}(\alpha,\alpha')$, which successfully reproduced inelastic cross sections of cluster states. The $\alpha$-nucleus CC potentials are microscopically derived by folding the Melbourne $g$-matrix effective $NN$ interaction \cite{Amos:2000} with an $\alpha$ density and the matter and transition densities of $^{14}$C. The channel-coupling of $\lambda=0$ and $\lambda=2$ transitions for the $0^+_{1,\ldots,10}$ and $2^+_{1,\ldots,10}$ states theoretically obtained by VAP+cl-GCM are taken into account. The calculated $\alpha$ scattering cross sections of $^{14}\textrm{C}(0^+)$ at incident energies of $E_\alpha=140$ and 400 MeV and those of $^{14}\textrm{C}(2^+)$ states are shown in Figs.~\ref{fig:cross-c14-1} and \ref{fig:cross-c14-2}, respectively. The strong monopole excitation to the $0^+_3$ state by the $\alpha$ scattering is predicted because of the remarkable isoscalar monopole transition. Inelastic cross sections of the $0^+_4$ state are relatively small. This is consistent with the weak isoscalar monopole transitions from the ground states in prediction of the structure calculation. Among the $2^+$ states, the cross sections of the $2^+_1$ state in the ground band are significantly large, but those of other $2^+$ states are relatively small. There is no $\alpha$ scattering experiment that observed the $0^+_3$ and $0^+_4$ states. From the present prediction of the enhanced $0^+_3$ cross sections, one expects strong population of the $0^+_3$ state in the $\alpha$ scattering. On the other hand, the present result suggests relatively weak productions of the linear-chain states, the $0^+_4$ and $2^+_5$ states of $^{14}\textrm{C}$, even though they have a developed cluster structure. However, as seen in Figs.~\ref{fig:cross-c14-1} and \ref{fig:cross-c14-2}, the CC effect is minor for the cross sections to those linear-chain states at $E_\alpha=400$ MeV. This result may suggest a possibility of observing the predicted $0^+_4$ and $2^+_5$ states in the linear-chain band via a multipole decomposition analysis of the $\alpha$ scattering. \begin{figure}[!h] \begin{center} \includegraphics[width=8.6cm]{cross-c14a-fig.pdf} \end{center} \caption{$0^+$ cross sections of the $\alpha$ scattering off $^{14}\textrm{C}$ obtained with the MCC and DWBA calculations at incident energies of $E_\alpha=140$ MeV and 400 ($\times 10^{-2}$) MeV. \label{fig:cross-c14-1}} \end{figure} \begin{figure}[!h] \begin{center} \includegraphics[width=8.6cm]{cross-c14a-fig2.pdf} \end{center} \caption{$2^+$ cross sections of the $\alpha$ scattering off $^{14}\textrm{C}$ obtained with the MCC and DWBA calculations at incident energies of $E_\alpha=140$ MeV and 400 ($\times 10^{-2}$) MeV. \label{fig:cross-c14-2}} \end{figure} \section{Summary}\label{sec:summary} Cluster features of $^{14}$C were investigated with VAP+cl-GCM, which is a method of AMD combined with the $3\alpha+nn$ cluster model. In the structure calculation of $^{14}$C, the AMD wave functions obtained with the variation after parity and angular momentum projections for $^{14}\textrm{C}(0^+_{1,2})$, $^{14}\textrm{C}(2^+_{1,2})$, and $^{14}\textrm{C}(1^+_{1})$ are used. In addition to the AMD wave functions, $3\alpha+nn$ wave functions are superposed with GCM to take into account large amplitude cluster motion. The energy spectra and band structures of $0^+$, $2^+$, and $4^+$ states were discussed. The $0^+_3$ and $0^+_4$ states with prominent cluster structures were obtained. The $0^+_3$ state has the remarkable monopole transitions from the ground state and is regarded as the vibrational mode of the triangle $3\alpha$ configuration. The $0^+_4$ state contains dominantly the linear-chain $3\alpha$ structure with two neutrons. The cluster feature of the $0^+_4$ state is qualitatively consistent with the $0^+_4$ state obtained with the $3\alpha+nn$ cluster model calculation in Ref.~\cite{yoshida2016-c14}, and similar to the $0^+_3$ state of the AMD predictions in Refs.~\cite{Suhara:2010ww,Baba:2014lsa,Baba:2017opd}. The $^{10}$Be$(0^+_1)$+$\alpha$ components and the $\alpha$-decay widths were discussed. The calculated result for the linear-chain band was compared with the observed data reported by $\alpha$ resonant scattering experiments \cite{Freer:2014gza,Fritsch:2016vcq,Yamaguchi:2016oay}. The $\alpha$ inelastic scattering off $^{14}$C at $E_\alpha=140$ and 400 MeV were also calculated by the MCC calculation with the Melbourne $g$-matrix interaction for the folding model by utilizing the matter and transition densities obtained from the structure calculation. The calculation predicts enhanced monopole cross sections for the $0^+_3$ state because of the remarkable monopole transition strength, and suggests a possible observation of the $0^+_3$ state via an $\alpha$ inelastic scattering experiment in future. For the $0^+_4$ and $2^+_5$ states of the linear-chain band, the result shows smaller cross sections compared with the $2^+_1$ and $0^+_3$ states. In the present calculation, we could not draw a definite assignment of the obtained linear-chain band to observed levels because model ambiguities remains and also experimental information is still limited. In the experimental side, many states have been observed near and above the $^{10}$Be+$\alpha$ threshold energy. The $\alpha$ inelastic scattering can be a good probe for the monopole excitation of the triangle vibration mode predicted as the $0^+_3$ state. For the linear-chain band, the present calculation predicts relatively weaker production of the $0^+_4$ and $2^+_5$ states in the $\alpha$ scattering. Nevertheless, the CC effect is minor for the cross sections to those linear-chain states at $E_\alpha=400$ MeV. This result may suggest a possibility of observing the predicted linear-chain band via a multipole decomposition analysis of the $\alpha$ scattering. \begin{acknowledgments} The computational calculations of this work were performed by using the supercomputer in the Yukawa Institute for theoretical physics, Kyoto University. This work was partly supported by Grants-in-Aid of the Japan Society for the Promotion of Science (Grant Nos. JP18K03617, JP16K05352, and 18H05407) and by the grant for the RCNP joint research project. \end{acknowledgments}
\section{Introduction} The determination of parton distribution functions (PDFs) is a particular topic which strongly relies on three dynamic and time dependent factors: new experimental data, higher order theoretical predictions and fitting methodology. In this environment, there are two main tasks for PDF fitters such as the NNPDF collaboration~\cite{AbdulKhalek:2019ihb,AbdulKhalek:2019bux,Ball:2018iqk}, MMHT~\cite{Harland-Lang:2014zoa} or CTEQ~\cite{Hou:2019jgw}. The first task consists in maintaining and organizing a workflow which incrementally implements new features proposed by the respective experimental and theoretical communities. The second task of a PDF fitter corresponds to investigate new numerical and efficient approaches to PDF fitting methodology. While the former relies almost exclusively on external groups and communities, the later is under full control of the PDF fitting collaborations, and in most cases it reflects the differences between them. As a real example of the previous description we show in figure~\ref{timeline} a non-exhaustive timeline for PDF determinations with QED corrections. Since 2004 we observe at least three different fitting approaches to the determination of the photon PDF, starting from model based approach where the photon PDF is modelled by an ad-hoc distribution~\cite{Martin:2004dh,Schmidt:2015zda}, then to a data driven approach where the photon PDF is extracted directly from data~\cite{Ball:2013hta,Bertone:2016ume,Giuli:2017oii}, and finally to a more precise procedure involving theory calculations~\cite{Manohar:2016nzj,Manohar:2017eqh,Bertone:2017bme,Nathvani:2018pys,Harland-Lang:2019pla}. Improvements in terms of PDF quality and physics content are however accompanied by a negative performance trend associated to longer fitting times and increased computational cost due to larger datasets and increasingly complex procedures. This in turn makes more difficult the task of developing and testing novel fitting procedures. In this proceedings we describe a new approach to deal with this growing trend in computational resources for PDF determination. We focus our discussion on the new methodology recently presented by the N3PDF team within the NNPDF collaboration and summarized in the next paragraphs. \begin{figure} \centering \includegraphics[scale=0.35]{plots/timeline} \caption{\label{timeline} Illustrative timeline of PDF releases with QED corrections since 2004. Arrows pointing up refer to publications providing PDF sets as deliverables.} \end{figure} \section{A deep learning approach to PDFs} In Ref.~\cite{Carrazza:2019mzf} we presented a new approach to PDF fits based on deep learning techniques in the context of the NNPDF methodology. We implement a new efficient computing framework based on graph generated models for PDF parametrization and gradient descent optimization called {\tt n3fit}. The best model configuration is derived from a robust cross-validation mechanism through a hyperparametrization tune procedure. From a practical point of view the {\tt n3fit} code uses Keras~\cite{chollet2015keras} and TensorFlow (TF)~\cite{tensorflow2015:whitepaper} as backends. From a technical perspective, one of the most relevant achievements of {\tt n3fit} is the reduction of computational time required to obtain PDF sets based on the NNPDF3.1 dataset~\cite{Ball:2017nwa}. In figure~\ref{times} we show the running time (in hours) required to fit 100 PDF replicas using the new {\tt n3fit} fitting code and we compare it to the latest {\tt NNPDF3.1} algorithm. On the left plot, we show a fit to DIS-only data, while in the right plot we have a global fit. In both cases we observe an improvement of between one to two orders of magnitude, {\it e.g.}~the new {\tt n3fit} code takes in average one hour to complete a global fit whereas the old code could take more than 40 hours. These improvements are partially due to the new minimizer (based on gradient descent instead of on genetic algorithms) in combination with multi-threading CPU calculations when executing the TensorFlow graph model. The great performance improvement observed with {\tt n3fit} suggests that we may find new code strategies which take advantage of hardware acceleration. At this point, one may ask if it is possible improve the performance from the default TensorFlow graph optimization for CPU and eventually use hardware accelerators such as graphic processing units (GPUs), field-programmable gate arrays (FPGAs), or tensor processing units (TPUs). \begin{figure} \centering \includegraphics[scale=0.52]{plots/dis}\includegraphics[scale=0.52]{plots/all} \caption{\label{times} Fitting time distribution per replica PDF for NNPDF and {\tt n3fit} codes for DIS-only (left plot) and global datasets (right plot).} \end{figure} \section{Hardware accelerating PDF determination} The first step towards faster fits consists in profiling the code and isolate the most time consuming operations during PDF fits. Fortunately, the answer to this question is simple and involves the computation of physical observables through PDF and matrix elements convolutions, \begin{equation} \sigma^{N} = \sum_{i, j, \alpha, \beta} f_{\alpha}(x_{i}) f_{\beta}(x_{j}) {\rm FK}^{N}_{ i j \alpha \beta} \;, \label{eq:observable} \end{equation} where $f_{\alpha}(x_{i})$ stands for the PDF of a particular flavor species $\alpha$ evaluated in the point $x_{i}$ of the grid in $x$. ${\rm FK}^{N}_{ i j \alpha \beta}$ is a Fast Kernel (FK) table which contains the information about the partonic cross section, following the description presented in~\cite{Carrazza:2019mzf}. In the case of hadronic observables the evaluation of predictions produces a vector of $N$ observables, $\sigma^{N}$, by building a neural network that generates the PDFs sampling from a grid in $x$, representing the fractions of momenta that a particular parton could carry, and then convoluting the result with an FK table containing the partonic information. Given that TensorFlow relies on symbolic computation and graph generation to represent a model, as a first step we investigate if the memory usage it requires is higher than the one needed by a custom code specialized in convolutions. We wrote a custom operator in {\tt C++} for TensorFlow that performs the convolution and its corresponding gradient, directly without graph evaluations. In table~\ref{table1} we cross-check the implementation by looking at examples of convolution and gradient computation for DIS and hadronic observables. The ratio between both implementations confirms excellent numerical agreement. The memory usage for the default TensorFlow implementation and the custom convolution code are shown in table~\ref{table2}. We observe a reduction of 3.2 GB and 5.9 GB of resident memory when using our custom operator, when loading all NNPDF3.1 hadronic and global data respectively. The reduction of memory usage is a great benefit because it gives the possibility to run PDF fits in consumer level hardware and, most importantly, load all data in the limited memory space available in hardware accelerators. Once the memory saving is obtained, the performance can also be improved by multi-threading our custom operator on the CPU. \begin{table} \centering \vspace{0.5cm} \begin{tabular}{|c|c|c|c|c|} \cline{3 - 5} \multicolumn{2}{c|}{ } & TensorFlow [pb] & Custom [pb] & Ratio \\ \hline & & 1.9207904 & 1.9207904 & 1.0000000 \\ DIS & Convolution & 2.4611666 & 2.4611664 & 0.9999999 \\ & & 1.3516952 & 1.3516952 & 1.0000000 \\ \cline{2 - 5} & & 1.8794115 & 1.8794115 & 1.0000000 \\ & Gradient & 1.505316 & 1.505316 & 1.0000000 \\ & & 2.866085 & 2.866085 & 1.0000000 \\ \hline & & 8.142365 & 8.142366 & 1.0000001 \\ Hadronic & Convolution & 8.947762 & 8.947762 & 1.0000000 \\ & & 7.4513326 & 7.4513316 & 0.9999999 \\ \cline{2 - 5} & & 18.525095 & 18.525095 & 1.0000000 \\ & Gradient & 19.182995 & 19.182993 & 0.9999999 \\ & & 19.551006 & 19.551004 & 0.9999999 \\ \hline \end{tabular} \caption{\label{table1} Example of convolution and gradient computations for both DIS and hadronic observables. The ratio between TensorFlow and the custom computation confirms excellent numerical agreement.} \end{table} \begin{table} \centering \begin{tabular}{|c|c|c|c|c|} \cline{3 - 5} \multicolumn{2}{c|}{ } & TensorFlow & Custom Convolution & Difference (TensorFlow - custom) \\ \hline Hadronic & Virtual & {\color{darkred} 17.7 GB} & {\color{darkgreen} 13.8 GB} & {\color{darkgreen} 3.9 GB} \\ & RES & {\color{darkred} 12.1 GB} & {\color{darkgreen} 8.39 GB} & {\color{darkgreen} 3.2 GB} \\ \hline Global & Virtual & {\color{darkred} 23.5 GB} & {\color{darkgreen} 19.7 GB} & {\color{darkgreen} 3.8 GB} \\ & RES & {\color{darkred} 18.4 GB} & {\color{darkgreen} 12.5 GB} & {\color{darkgreen} 5.9 GB} \\ \hline \end{tabular} \caption{\label{table2} Memory usage after model generation and fit for both hadronic and global (DIS + hadronic).} \end{table} After the memory usage analysis, we carried out a time performance comparison running the convolution both on CPU and GPU. Shifting the computation from CPU to GPU one can take advantage of the parallelization over the increased number of cores. In table~\ref{table3} we show the overall running time for several examples of toy PDF and FK tables based on hadronic observables. The numbers include the computation time as well as the time required for the memory transfer to the GPU. The performance of Advanced Vector Extensions (AVX) on CPU, OpenCL~\cite{opencl} on GPU and TF both on CPU and GPU are compared. As it is shown in table~\ref{table3}, AVX and TF running on CPU are faster up to a certain number of columns (for the FK table) or rows (for the PDFs matrices). Once the size of the operation is big enough, AVX is over one order of magnitude slower than OpenCL and even two orders of magnitude slower than TF on GPU. TF on CPU is more resilient than our AVX implementation and it is competitive with the GPU convolutions for a larger range of dimensions. According to these results, for given dimensions of the FK table and the PDF matrices, it is convenient to carry out the PDF fits on GPU devices, parallelizing, for instance, over the different PDF replicas, allowing the fit of all of them to run simultaneously. In other words, hardware accelerators become competitive tools for PDF fitting once the penalty introduced by the memory transfer between devices is overcome. \begin{table} \centering \renewcommand{\arraystretch}{1.2} \begin{tabular}{|m{2cm}|m{2.2cm}|m{2cm}|m{2cm}|m{2cm}|m{2cm}|} \hline Size of the PDF & Size of the FK Table & TensorFlow CPU [s] & AVX [s] & TensorFlow GPU [s] & OpenCL [s] \\ \hline 35721 $\times$ 1 & 8 $\times$ 35721 & 1.10 $\cdot 10^{-2}$ & \textcolor{darkgreen}{1.57 $\cdot 10^{-4}$} & 4.14 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hlineB{2.5} $10^{6}$ $\times$ 1 & 8 $\times$ $10^{6}$ & 4.70 $\cdot 10^{-2}$ & \textcolor{darkgreen}{5.00 $\cdot 10^{-3}$} & 4.49 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hline $10^{7}$ $\times$ 1 & 8 $\times$ $10^{7}$ & 3.20 $\cdot 10^{-1}$ & \textcolor{darkgreen}{5.70 $\cdot 10^{-2}$} & 7.90 $\cdot 10^{-1}$ & 1.38 \\ \hline $10^{8}$ $\times$ 1 & 8 $\times$ $10^{8}$ & 2.90 & \textcolor{darkgreen}{5.70 $\cdot 10^{-1}$} & 4.21 & 6.31 \\ \hlineB{2.5} 35721 $\times$ $10^{2}$ & 8 $\times$ 35721 & 6.90 $\cdot 10^{-2}$ & \textcolor{darkgreen}{1.60 $\cdot 10^{-2}$} & 4.31 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hline 35721 $\times$ $10^{3}$ & 8 $\times$ 35721 & \textcolor{darkgreen}{1.50 $\cdot 10^{-1}$} & 1.69 $\cdot 10^{-1}$ & 5.63 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hline 35721 $\times$ $10^{4}$ & 8 $\times$ 35721 & \textcolor{darkgreen}{1.12} & 1.73 & 1.92 & 1.76 \\ \hline $35721 \times 5 \cdot 10^{4}$ & 10 $\times$ 35721 & \textcolor{darkgreen}{5.33} & 8.93 & 7.83 & 5.80 \\ \hlineB{2.5} 35721 $\times$ 1 & $10^{2}$ $\times$ 35721 & 2.80 $\cdot 10^{-2}$ & \textcolor{darkgreen}{2.43 $\cdot 10^{-3}$} & 4.24 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hline 35721 $\times$ 1 & $10^{3}$ $\times$ 35721 & 1.30 $\cdot 10^{-1}$ & \textcolor{darkgreen}{2.14 $\cdot 10^{-2}$} & 5.60 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hline 35721 $\times$ 1 & $10^{4}$ $\times$ 35721 & 1.14 & \textcolor{darkgreen}{2.16 $\cdot 10^{-1}$} & 1.93 & 1.76 \\ \hlineB{2.5} 35721 $\times$ $10^{2}$ & $10^{2}$ $\times$ 35721 & \textcolor{darkgreen}{6.20 $\cdot 10^{-2}$} & 1.86 $\cdot 10^{-1}$ & 4.32 $\cdot 10^{-1}$ & $\sim$ 1 \\ \hline 35721 $\times$ $10^{3}$ & $10^{3}$ $\times$ 35721 & \textcolor{darkgreen}{3.00 $\cdot 10^{-1}$} & 21.61 & 7.19 $\cdot 10^{-1}$ & 5.25 \\ \hline $35721 \times 2 \cdot 10^{3}$ & $2 \cdot 10^{3} \times$ 35721 & 5.06 & 86.13 & \textcolor{darkgreen}{1.38} & 15.97 \\ \hlineB{2.5} \end{tabular} \caption{\label{table3} Time performances achieved with AVX, TensorFlow (both on CPU and GPU) and OpenCL for the given sizes of the FK table and the PDF matrix. In green is highlighted the lowest value within each row. Time is given in seconds. The base FK table used in this comparison consists on 49 flavour combinations and an grid in $x$ of size 27 (35721 elements in total).} \end{table} \section{Outlook and future developments} The results presented in this proceedings strongly suggest that PDF fits can benefit from hardware accelerators such as GPUs, and in future, FPGAs or TPUs thanks to the possibility of offloading the most time-consuming tasks to the accelerator. However, we should notice that in order to achieve performance improvements some precautions are required by defining the sizes of FK tables and the number of PDFs we would like to convolute simultaneously. In future work we are planning to extend the {\tt n3fit} framework to support GPU hardware. \section*{Acknowledgements} S.C. acknowledges the NVIDIA Corporation for the donation of a Titan V GPU used for this research. S.C., J.CM. and J.U. are supported by the European Research Council under the European Unions Horizon 2020 research and innovation Programme (grant agreement number 740006). S.C. is supported by the UNIMI Linea 2A grant ``New hardware for HEP''.
\section{Introduction} Protection of qubits from errors is a central and challenging task for quantum information processing \cite{di,ekert}. One prominent approach for this aim is quantum error correction (QEC) which encodes logical states in a set of physical qubits to detect and correct errors, provided that the error rate of each operation on the qubits is below some threshold \cite{shor,steane96,laflamme96,terhal,yao12,barends14,nigg14,cor15,kelly15}. A milestone of QEC is the invention of topological QEC, such as surface codes \cite{kitaev97,bravyi98,dennis02,fowler12pra,vijay,landau,brown,tuckett} and color codes \cite{bombin,kat,bombin15,lit,li}, in which quantum information is stored in topological degrees of freedom. Unlike other QEC proposals, the qubits in topological QEC are placed on a particular lattice embedded in a surface. For example, in surface codes \cite{kitaev97}, the qubits are arranged on a square lattice in a surface with holes, and the number of holes (or genus) determines how many logical qubits can be encoded \cite{bravyi98}. A significant merit of introducing topological ideas to QEC is that it provides a modest requirement for error threshold, only about $7.4\times10^{-4}$ or even higher, for a single operation in surface codes \cite{fowler12prl,stephens14}. Another route to protect qubits is to isolate them from the environment via dynamical decoupling (DD) \cite{viola98,viola99,viola00,viola03,viola05,kh05,kh10,uh07,gordon,yang,uys,west102,du09,zhang15,wang16}. A pioneering work showed how to suppress dephasing on a single qubit by successively applying Pauli operations on it \cite{viola98}. The idea is then extended to a general framework based on which linearly independent interactions between the qubits and their environment can be decoupled \cite{viola99, viola00}. To date, there have been many DD proposals, including Eulerian DD \cite{viola03}, random DD \cite{viola05}, concatenated DD \cite{kh05,kh10}, and optimized sequences \cite{uh07,gordon,yang,uys,west102}. However, none of the existing works on DD has considered where the qubits are placed and what we can benefit from the arrangement of the qubits. In this work, we consider the case where a set of qubits interacts with their environment. Each of the qubits is attached to an edge of a two-dimensional square lattice embedded in a torus. All the circles formed by the edges can be separated into four topological equivalence classes \cite{lidarbook}. By using the circles belonging to the topologically trivial equivalence class in the original and dual lattices, we develop a DD procedure to remove all the unwanted interactions with the environment from the dynamics of the qubits. When only the linearly independent interaction between the qubits and their environment and nearest-neighbor two-qubit interactions between the qubits are relevant, only two 4-ordered decoupling groups are needed in an alternative scheme, where each element in these two groups is related to a different topological equivalence class in the original or dual lattice. We explicitly show that this decoupling procedure can be realized with bounded-strength control Hamiltonians, and then generalize our method to planar square lattices which are used in a practical implementation of surface codes \cite{fowler12pra}. \section{Square chains and their boundaries} Consider a square lattice attached on a torus (i.e., a periodic lattice) with $n$ rows and $n$ columns. Its faces (squares), edges, and vertices are labeled with $f$, $e$, and $v$, respectively. Each square has four edges surrounding it as its boundary. A square chain comprises one or more squares which can be shown in the form of $c^2=\sum_if_i$, where $i$ is the index for the faces involved in the chain. The boundary of a square chain is the sum of the boundaries for all the involved squares, taking the addition rule $e_i^j+e_i^j=0$ into account. Several concrete examples are illustrated in Fig.~\ref{fig1}. The boundaries of all the square chains form an Abelian group $\mathcal{B}^1$ with empty set as its identity element and addition of the edges as its group law. \begin{figure}[!tb] \centering \includegraphics[width=0.48\textwidth]{fig1} \caption{(a) Illustration of elements of $\mathcal{B}^1$ in a periodic $6\times6$ square lattice. When a chain has only one square, e.g., $f_1$, its boundary is the four surrounding edges (labeled by blue solid lines). (b) When a chain contains $f_3$ and $f_4$, the common edge (labeled by blue dashed line) shared by them is not included in the boundary since $e_3^d\!+\!e_4^u=0$. (c) When a set of squares ($f_5$ to $f_{10}$) forms a row in the lattice, they constitute a ring on the surface.}\label{fig1} \end{figure} Since there are a total of $n^2$ squares in the lattice, the number of all square chains is $\sum_{i=0}^{n^2}C(n^2,i)=2^{n^2}$, where $C(n^2,i)$ is the number of $i$-combinations from the given $n^2$ squares. It is worthwhile to note that the boundary of the square chain which consists of all the $n^2$ squares is empty. Explicitly, we have the relation $\partial^2(\sum_{i=1}^{n^2}f_i)=0$, where $\partial^2$ is the boundary operator which projects a square chain to its boundary. This relation implies that the order of $\mathcal{B}^1$ is half of $\sum_{i=0}^{n^2}C(n^2,i)$, which is $2^{n^2-1}$. It is obvious that each element of $\mathcal{B}^1$ is a circle in the lattice. In fact, all the circles in the lattice can be divided into four kinds of topological equivalence classes: the topologically trivial circles that are boundaries of some faces; the circles that surround the ``handle'' of the torus; the ones that encircle the genus of the torus; the ones that surround both the ``handle'' and the genus. Apparently, the elements of $\mathcal{B}^1$ belong to the topologically trivial equivalence classes. \section{Topological dynamical decoupling} The physical model that we consider is a set of qubits interacting with their environment. The corresponding total Hamiltonian of the full quantum system reads $H_t=H_S+H_E+H_{S\!E}$, where $H_S$ is the qubits' Hamiltonian, $H_E$ is the environment Hamiltonian, and $H_{S\!E}=\sum_i\sigma_{\alpha}^i\otimes E^i$ [$\sigma_\alpha^i$ and $E^i$ are the Pauli-$\alpha$ ($\alpha=x,y$, or $z$) operator acting on the $i$th qubit and its corresponding environment operator, respectively] is the interaction between them. Dynamical decoupling can remove $H_{S\!E}$ from the dynamics of the qubits with fast and strong pulses \cite{viola98,viola99}. A typical decoupling procedure is composed of repetitive segments, each of which can be described with a notation $[g_m^\dag, \tau, g_mg_{m-1}^\dag,\cdots, g_3g_2^\dag,\tau,g_2g_1^\dag,\tau,g_1]$, where $g_i$ are unitary operators generated by the control pulses. From right to left, this notation means that, apply $g_1$ to the qubits, let the system evolve freely for time $\tau$, then apply $g_2 g_1^\dag$ followed by another free evolution for time $\tau$ and so on. A decoupling group is formed when $g_i$ form a finite group $\mathcal{G}=\{g_1,g_2,\cdots,g_m\}$. Let the time scale associated with one such segment be $T_c$. In the ideal limit of an arbitrarily short $T_c$, the dynamics of the qubits is transformed through a dynamically averaged operator of the form \begin{equation}\label{effha} \prod_{\mathcal{G}}(A)=\frac{1}{|\mathcal{G}|}\sum_{i}g_i^\dag Ag_i, \end{equation} where $|\mathcal{G}|$ is the order of group $\mathcal{G}$, and $A$ is an arbitrary operator acting on $S$ \cite{viola99}. It is clear that if a proper group is chosen so that $\prod_{\mathcal{G}}(\sigma_\alpha^i)=0$ for all $i$, the errors caused by $H_{S\!E}$ can be eliminated. \begin{figure}[!tb] \centering \includegraphics[width=0.45\textwidth]{fig2} \caption{A periodic square lattice (a) and its dual (b). (a) The four edges ($e_1^u$, $e_1^l$, $e_1^d$, and $e_1^r$) connecting head-to-tail form the boundary of $f_1$. The four edges ($e_c^u$, $e_c^l$, $e_c^d$, and $e_c^r$) sharing the same vertex constitute a cross. (b) The square $f_1$ in the original lattice is transformed into a cross in the dual. Meanwhile, a cross in the original lattice is changed into a square in the dual.}\label{fig2} \end{figure} Now we show how to remove $H_{S\!E}$ from the dynamics of the qubits. We first define $\mathcal{B}^z$. The elements of $\mathcal{B}^1$ and those of $\mathcal{B}^z$ are in a one-to-one correspondence. An element of $\mathcal{B}^1$ contains some edges in the lattice and every edge supports a qubit. An element $b^1_i\in \mathcal{B}^1$ can be transformed into its related element $b^z_i\in \mathcal{B}^z$ by replacing each edge of $b^1_i$ with the $\sigma_z$ operator acting on the corresponding qubit. In this way, $b^z_i$ turn out to be unitary operators which are strings of Pauli-$Z$ operators on different qubits. Group $\mathcal{B}^x$ is defined on the dual lattice shown in Fig.~\ref{fig2}(b). The dual lattice is constructed by placing a vertex within each face, and connecting pairs of these vertices with an edge wherever the two corresponding faces have overlapping boundaries. Each vertex of the original (or primal) lattice then corresponds to the face in the dual lattice whose boundary edges surround it. As we did for the original lattice, we can construct a group $\mathcal{B}^{1d}$ whose elements are the boundaries of the square chains in the dual lattice. Based on $\mathcal{B}^{1d}$, we can define a group $\mathcal{B}^{x}$ whose elements are in a one-to-one correspondence with $\mathcal{B}^{1d}$'s elements. An element $b^{x}_i\in \mathcal{B}^{x}$ can be obtained from its related element $b^{1d}_i\in \mathcal{B}^{1d}$ by replacing each edge of $b^{1d}_i$ with the $\sigma_x$ operator acting on the related qubit. By using $\mathcal{B}^{xz}=\mathcal{B}^x\times\mathcal{B}^z$ as the decoupling group, we can eliminate local Hamiltonians (such as all $\sigma_\alpha^i$) from the dynamics with the decoupling procedure denoted by $[b_{2^{2n^2-2}}^{xz}, \tau, b_{2^{2n^2-2}}^{xz}b_{2^{2n^2-2}-1}^{xz},\cdots, b^{xz}_3b_2^{xz},\tau,b^{xz}_2b^{xz}_1,\tau,b^{xz}_1]$, where $b^{xz}_i$ are the elements in group $\mathcal{B}^{xz}$. The reason is that group $\mathcal{B}^{xz}$ is an Abelian group, thus it has a total of $2^{2n^2-2}$ irreducible representations (irreps), each of which is 1-dimensional. The corresponding group algebra takes the form of \begin{equation}\label{} \mathbb{C}\mathcal{B}^{xz}\cong \oplus_{J=1}^{2^{2n^2-2}}M_{d_J}, \end{equation} where $J$ is the irrep index, $d_J=1$ is the dimension of each irrep. Due to the symmetry of the generators, the Hilbert space $\mathcal{H}$ spanned by the qubits can be decomposed into \begin{equation}\label{} \mathcal{H}\cong\oplus_{J=1}^{2^{2n^2-2}} \mathbb{C}_{n_J}\otimes \mathbb{C}_{d_J}, \end{equation} where all $n_J=4$ and $d_J=1$. The $n_J=4$ corresponds to the homology degrees of freedom. Therefore, the DD procedure denoted by $[b_{2^{2n^2-2}}^{xz}, \tau, b_{2^{2n^2-2}}^{xz}b_{2^{2n^2-2}-1}^{xz},\cdots, b^{xz}_3b_2^{xz},\tau,b^{xz}_2b^{xz}_1,\tau,b^{xz}_1]$ can filter out all the Hamiltonians that have no component in the $\mathbb{C}_{n_J}$ section according to the dynamically averaged operator $\prod_{\mathcal{B}^{xz}}(A)$. Apparently, a local Hamiltonian $H$ acting on the qubits, e.g., the single particle Hamiltonians and two-qubit interactions, has no component in $\mathbb{C}_{n_J}$, and thus $\prod_{\mathcal{B}^{xz}}(H)=0$. As a result, the linearly independent interaction $H_I=\sum_{i,\alpha}\sigma_\alpha^i\otimes E_{\alpha}^i$ ($i$ is the qubit index and $\alpha=x,y,z$) between the qubits and the environment can be removed from the dynamics of the qubits. \begin{figure}[!tb] \centering \includegraphics[width=.45\textwidth]{fig3} \caption{(a) A pair of nearest-neighbor qubits $a$ and $b$ (labeled as red circles), and related squares. Qubit $a$ is on the common edge of $f_1$ and $f_2$ while qubit $b$ is on the common edge of $f_1$ and $f_3$. (b) Four cases where the corresponding elements in $\mathcal{B}^z$ are not commutative with $H_{ab}$.}\label{fig3} \end{figure} In addition to the interaction $H_I$, our topological DD scheme can also remove the nearest-neighbour interactions between qubits. This is quite relevant to quantum error correction because the unwanted interactions between qubits can spread errors from one qubit to another. Since the error spread can cause undetectable errors, the elimination of the unwanted interactions can help to keep the errors local so that the undetectable errors are avoided. Now we consider a pair of nearest-neighbor qubits $a$ and $b$ with a Heisenberg interaction $H_{ab}=\sum_{i=x,y,z}\sigma_i^a\sigma_i^b$ between them. Among all the elements of $\mathcal{B}^z$, there are four kinds of elements that are not commutative with $H_{ab}$: those associated with $f_2$ but not $f_1$ and $f_3$; those associated with $f_3$ but not $f_1$ and $f_2$; those associated with $f_1$ and $f_2$ but not $f_3$; those associated with $f_1$ and $f_3$ but not $f_2$ (see Fig. \ref{fig3}). The number of the elements for every kind is $2^{n^2-4}$. Thus, there are a total of $4\times2^{n^2-4}=2^{n^2-2}$ elements that are not commutative with $H_{ab}$, which transform $H_{ab}$ into $-\sigma_x^a\sigma_x^b-\sigma_y^a\sigma_y^b+\sigma_z^a\sigma_z^b$. Since the other $2^{n^2-2}$ elements leave $H_{ab}$ unchanged, we obtain the averaged operator: $\prod_{\mathcal{B}^z}(H_{ab})=\sum_{i=1}^{2n^2}\sigma_z^a\sigma_z^b$. The remaining terms can be wiped out by the group $\mathcal{B}^x$ because half of its elements are commutative with $\prod_{\mathcal{B}^z}(H_{ab})$ while the others are not, indicating the same situation as above. Despite the significant decoupling power, the required steps in the above procedure scale exponentially with the number of the squares. This may limit its practical application. However, if only $H_{S\!E}$ and nearest-neighbor two-qubit interactions $H_{a,b}=\sigma_{\alpha_a}^a\otimes\sigma_{\alpha_b}^b$ ($a$, $b$ are the qubit indexes and $\alpha_a,\alpha_b=x,y,z$) are relevant, a much simpler scheme can be developed. To this end, we introduce two decoupling groups $\mathcal{T}^z$ and $\mathcal{T}^x$. Explicitly, $\mathcal{T}^z=\{I, t_1, t_2, t_1t_2\}$ and $\mathcal{T}^x=\{I, t_1^d, t_2^d, t_1^dt_2^d\}$, where $t_1$ ($t_1^d$) is a Pauli operator chain which comprises the $\sigma_z$ ($\sigma_x$) operators acting on all the qubits attached on the vertical edges in the original (dual) lattice, and $t_2$ ($t_2^d$) comprises the $\sigma_z$ ($\sigma_x$) operators acting on all the qubits attached on the horizontal edges in the original (dual) lattice. The topological meaning of the decoupling groups $\mathcal{T}^z$ and $\mathcal{T}^x$ is clear. The four elements in group $\mathcal{T}^z$ ($\mathcal{T}^x$) are related to the topologically trivial circles, the circles surrounding the ``handle'', the circles encircling the genus, and the circles surrounding both the ``handle'' and the genus in the original (dual) lattice, respectively. \begin{figure}[!tb] \centering \includegraphics[width=0.45\textwidth]{fig4} \caption{(a) Schematic diagram for the group element $t_1$ and $t_2$ in the original lattice. (b) Schematic diagram for the corresponding group element $t_1^d$ and $t_2^d$ in the dual lattice.}\label{fig4} \end{figure} Based on $\mathcal{T}^z$, we can design a decoupling procedure $D^z=[t_1t_2,\tau,t_1,\tau,t_2t_1,\tau,t_1,\tau,I]$, in which $t_i\cdot t_i=I$ ($i=1,2$) is used. The corresponding dynamically averaged operator for $H_{S\!E}$ can be written as \begin{equation}\label{} H_{{D}^z}=\prod_{\mathcal{T}^z}(H_{S\!E})=\sum_{i=1}^{2n^2}\sigma_z^i\otimes E_z^i, \end{equation} because each qubit on the lattice are associated with two elements in $\mathcal{T}^z$ which turn $\sigma_x^a\otimes E_x^a+\sigma_y^a\otimes E_y^a+\sigma_z^a\otimes E_z^a$ into $-\sigma_x^a\otimes E_x^a-\sigma_y^a\otimes E_y^a+\sigma_z^a\otimes E_z^a$ while the other two elements leave it unchanged. Further, based on $\mathcal{T}^x$, a decoupling procedure, ${D}^{xz}=[t_1^dt_2^d,{D}^z,t_1^d,{D}^z,t_2^dt_1^d,{D}^z,t_1^d,{D}^z,I]$ can be established. With ${D}^{xz}$, $H_{S\!E}$ can be removed from the dynamics of the qubits since \begin{equation}\label{} H_{{D}^{xz}}=\prod_{{\mathcal{T}}^x}(H_{{D}^z})=0, \end{equation} for the same reason as $H_{{D}^z}$. Besides $H_{S\!E}$, the nearest-neighbor interaction $H_{a,b}$ between two qubits can be decoupled too. The key point is that, as shown in Fig.~\ref{fig4}, qubit $a$ is related to $t_1$ ($t_2^d$) and qubit $b$ is associated with $t_2$ ($t_1^d$) in the original (dual) lattice. It is easy to check that, just like $H_{S\!E}$, $H_{a,b}$ commutes with two elements but anti-commutes with the other two elements in $\mathcal{T}^z$ ($\mathcal{T}^x$). Therefore, we can obtain \begin{equation}\label{} \prod_{\mathcal{T}^x}(\prod_{\mathcal{T}^z}(H_{a,b}))=0, \end{equation} for any pair of nearest-neighbor $a$ and $b$. So far, our decoupling procedures are designed based on the original and dual lattices embedded in a torus (with genus $G=1$). A closed surface with a higher genus $G=k$, can be obtained by gluing $k$ tori together. It follows that the corresponding $\mathcal{B}^z$ and $\mathcal{B}^{x}$ are $k2^{n^2-1}$ ordered groups while $T^z$ and $T^x$ both have $4k$ elements. Therefore, the decoupling groups on such a surface can be defined and similar decoupling procedures can be developed. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{fig5} \caption{(a) Cayley graph and Eulerian cycles for $\mathcal{T}^z$. One possible Eulerian cycle is $I\rightarrow t_1\rightarrow t_{12}\rightarrow t_2\rightarrow I\rightarrow t_2\rightarrow t_{12} \rightarrow t_1\rightarrow I$. (b) A modified Eulerian cycle and its Cayley graph to implement logical Pauli-$x$ and Pauli-$z$ operators. Three additional $I$ operators along with a logical operator generated with the same Hamiltonian are added to the original Eulerian cycles.}\label{fig5} \end{figure} \section{Realizing $D^z$ with bounded-strength controls} In the above section, the decoupling procedure $D^z$ is developed by assuming the decoupling operators $t_1$ and $t_2$ can be achieved instantaneously. This requires the capability of applying arbitrarily strong control Hamiltonians, which is not practical in experiments. Below, we show that the same effective Hamiltonian $H_{D^z}$ can be realized with bounded-strength controls. Our method is to use Eulerian cycles on the Cayley graph \cite{viola03} associated with group $\mathcal{T}^z$ (see Fig.~\ref{fig5}). Since $\mathcal{T}^z$ consists of two generators $t_1$ and $t_2$, the corresponding Eulerian cycles comprise $8$ directed edges. One of the possible control paths can be written as $I\xrightarrow{t_1}t_1\xrightarrow{t_2}t_{12}\xrightarrow{t_1}t_2\xrightarrow{t_2}I\xrightarrow{t_2}t_2\xrightarrow{t_1}t_{12} \xrightarrow{t_2}t_1\xrightarrow{t_1}I$ [see Fig.~\ref{fig5}(a)], where the time interval between two adjacent decoupling operators is $\tau$. Note that each decoupling operator in the path is related with its former one with a generator ($t_1$ or $t_2$), implying that we only have to repeatedly applying the generators in the time interval $\tau$ to the qubits according to the control path. It follows that the needed control Hamiltonian for $t_1$ or $t_2$ can be written as $H_{i}^z=\frac{\pi}{2\tau}\sum_{k\in S_i}\sigma_z^k$, where $S_i$ being the set of qubits related with $t_i$. It is clear that when $\tau$ is nonzero, $H_{1}^z$ and $H_2^z$ are bounded-strength controls. The associated dynamically averaged Hamiltonian $H^E_{D^z}$ is identical with $H_{D^z}$. It follows that if $H_{SE}$ consists of only $\sigma_{x/y}\otimes B_{x/y}$ terms, it can be fully decoupled from the total dynamics. Given the same assumption, Eulerian cycles based on a modified Cayley graph allow us to build logical gates which are protected by the decoupling procedure [see Fig.~\ref{fig5}(b)]. The key idea is that when a particular logical gate $U^L$ can be constructed with a Hamiltonian $H^L(t)$, we can also obtain an identity with use of $H^L$ and with the same error as $U^L$ \cite{kho09,kho09pra}. Thus, by adding an identity to each vertex in the Cayley graph (except the one for $U^L$), the error caused by $H_{S\!E}$ is averaged by group $\mathcal{T}^z$, leaving a net operator $U^L$ acting on the qubits. Given a square lattice, there are two logical qubits that can be encoded. The corresponding logical $\sigma_z$ and logical $\sigma_x$ operators can be constructed with the modified Eulerian cycles [shown in Fig.~\ref{fig5}(b)]. We generalize the above idea to realize the procedure $D^{xz}$ whose Cayley graph has 16 vertices with an Eulerian cycle consisting of 64 edges (see Supplemental Materials). Higher order errors can also be eliminated by combining this idea with concatenated DD \cite{kh05,kh10,west10}, so that the procedure can be implemented for long time decoupling. \begin{figure}[!tb] \centering \includegraphics[width=0.45\textwidth]{fig6} \caption{(a) A finite planar square lattice to implement surface codes. Each logical qubit is characterised by a pair of pink squares. When a logical operation on $L_1$ is performing, the physical qubits on the small lattice colored blue could be ``idle'' qubits. (b) The ``idle'' lattice shown in (a). The red solid circles on the edges are qubits $a$ and $b$, respectively. (c) The dual lattice of the $3\times3$ lattice in (b). (d) The $1\times2$ lattice considered in the numerical simulations.}\label{fig6} \end{figure} \section{Application to surface codes} In the above discussion, we focus on the case where the qubits are arranged on a periodic square lattice. Our method can be directly generalized to the case where the qubits are placed on a finite planar square lattice (i.e., a planar lattice with boundaries) shown in Fig.~\ref{fig6}(a). This is exactly the same lattice used to implement surface codes \cite{fowler12pra}. In doing quantum computation with surface codes, the qubits belonging to some logical qubits (e.g., $L_1$) are manipulated while the qubits in the rest area of the lattice, e.g., the qubits labeled blue in Fig.~\ref{fig6}(a), have to wait until a certain logical gate is performed. This leaves the ``idle'' qubits interacting with the environment for a considerable long time, which can cause severe decoherence that may not be correctable \cite{stephens14}. Besides, unwanted interactions between qubits can spread errors from one qubit to another, reducing the fault-tolerance of surface codes. Therefore, a method that can suppress the environmental noises on the ``idle'' qubits, remove the unwanted interactions from the qubits' dynamics is strongly desired. This task can be fulfilled by introducing two similar decoupling groups $\tilde{\mathcal{T}}^{z}$ and $\tilde{\mathcal{T}}^{x}$. Here, $\tilde{\mathcal{T}}^{z}=\{I, \tilde{t}_1, \tilde{t}_2, \tilde{t}_1\tilde{t}_2\}$ and $\tilde{\mathcal{T}}^{x}=\{I, \tilde{t}_1^{d}, \tilde{t}_2^{d}, \tilde{t}_1^{d}\tilde{t}_2^{d}\}$, where $I$ is the identity of the qubits, $\tilde{t}_1$ ($\tilde{t}_1^{d}$) consists of the $\sigma_z$ ($\sigma_x$) operators acting on all the qubits attached on the vertical edges in the original (dual) lattice, and $\tilde{t}_2$ ($\tilde{t}_2^{d}$) comprises the $\sigma_z$ ($\sigma_x$) operators acting on the qubits attached on the horizontal edges in the original (dual) lattice. Similarly, we can define two procedures $\tilde{D}^{z}=[\tilde{t}_1\tilde{t}_2,\tau,\tilde{t}_1,\tau,\tilde{t}_2\tilde{t}_1,\tau,\tilde{t}_1,\tau,I]$ and $\tilde{D}^{xz}=[\tilde{t}_1^{d}\tilde{t}_2^{d},\tilde{D}^{z},\tilde{t}_1^{d},\tilde{D}^{z},\tilde{t}_2^{d}\tilde{t}_1^{d}, \tilde{D}^{z},\tilde{t}_1^{d},\tilde{D}^{z},I]$ based on $\tilde{\mathcal{T}}^{z}$ and $\tilde{\mathcal{T}}^{x}$. Based on $\tilde{\mathcal{T}}^{z}$, we develop a decoupling procedure $\tilde{D}^{z}=[\tilde{t}_1\tilde{t}_2,\tau,\tilde{t}_1,\tau,\tilde{t}_2\tilde{t}_1, \tau,\tilde{t}_1,\tau,I]$. For a qubit on the lattice [e.g., qubit $a$ in Fig.~\ref{fig6}(b)], it is contained only in $\tilde{t}_1$ and $\tilde{t}_1\tilde{t}_2$. It follows that the interaction $H_{S\!E}^a$ between qubit $a$ and its environment is modified to $\prod_{\tilde{\mathcal{T}}^{z}}(H_{S\!E}^a)=\sigma_z^a\otimes E_z^a$. Thus \begin{equation}\label{} H_{\tilde{D}^{z}}=\prod_{\tilde{\mathcal{T}}^{z}}(H_{S\!E})=\sum_{i=1}^{2(n^2+n)}\sigma_z^i\otimes E_z^i. \end{equation} After another decoupling procedure $\tilde{D}^{xz}=[\tilde{t}_1^{d}\tilde{t}_2^{d},\tilde{D}^{z},\tilde{t}_1^{d},\tilde{D}^{z},\tilde{t}_2^{d}\tilde{t}_1^{d}, \tilde{D}^{z},\tilde{t}_1^{d},\tilde{D}^{z},I]$ based on $\tilde{\mathcal{T}}^{x}$, $H_{S\!E}$ can be completely decoupled since each remaining $\sigma_z^i\otimes E_z^i$ term is anti-commutative with two elements (one is $\tilde{t}_1^d$ or $\tilde{t}_2^d$, the other is $\tilde{t}_1^d\tilde{t}_2^d$) in $\tilde{\mathcal{T}}^{x}$. From Fig.~\ref{fig6}(b) and (c) we observe that a pair of nearest-neighbor qubits $a$ and $b$ is always associated with $\tilde{t}_1$ ($\tilde{t}_2^d$) and $\tilde{t}_2$ ($\tilde{t}_1^d$) in the original (dual) lattice, respectively. This is the same case as we meet in the periodic lattice. Thus, the point there is also valid: $H_{a,b}$ commutes with two elements but anti-commutes with the other two elements in $\tilde{\mathcal{T}}^z$ ($\tilde{\mathcal{T}}^x$), implying the same result $ \prod_{\tilde{\mathcal{T}}^x}(\prod_{\tilde{\mathcal{T}}^z}(H_{a,b}))=0$. \section{Numerical simulations} \begin{figure}[!tb] \centering \includegraphics[width=0.45\textwidth]{fig7} \caption{Fidelities between the initial state $\ket{\psi^L}$ and the corresponding $\rho(t)$ obtained from the reduced dynamics related to $D^z$ or $D^{xz}$ versus evolution time. For each procedure, we consider three cases: (i) with no control Hamiltonian (blue curves), (ii) with bounded-strength control Hamiltonians (yellow curves), and (iii) with arbitrary-strong control Hamiltonians (green curves). (a) Fidelities for $D^z$. (b) Fidelities for $D^{xz}$.}\label{fig7} \end{figure} To show the validity of our scheme, we perform numerical simulations to calculate the fidelities between an initial logical state and its corresponding one obtained from the reduced dynamics (with or without the dynamical decoupling). Here we consider a $1\times2$ lattice, which consists of $7$ qubits [see Fig.~\ref{fig6}(d)]. The environment interacting with the qubits is described by a set of boson models (i.e., $H_E=\sum_{l}\omega_la_l^\dag a_l$), through the interaction Hamiltonian $H_{S\!E}=\sum_{k,l}\sigma_\alpha^k(g_l^ka_l+g_l^{k*} a_l^\dag)$, where $a_l$ ($a_l^\dag$) is the annihilation (creation) operator for the boson model of frequency $\omega_l$, and $|g_l^k|$ correspond to the strength of the interaction, ranging from $0.01\omega_0$ to $0.03\omega_0$. The Hamiltonian for the total system takes the form \begin{equation}\label{} H=\sum_{(a,b)\in\mathcal{I}}\omega_{a,b}H_{a,b}+H_E+\sum_{k=1}^{7}\sum_{l}\sigma_{\alpha}^k(g_l^ka_l+g_l^{k*}a_l^{\dag}), \end{equation} where $\mathcal{I}$ is the set of nearest-neighbor qubit pairs [such as ($1,2$), ($2,3$), ($3,4$), and ($4,1$)], $\omega_{a,b}$ is the strength of $H_{a,b}$. Based on the stabilizers defined on the lattice, the logical state can be chosen as \begin{equation}\label{} \ket{\psi^L}=\frac{1}{2}(\ket{0000000}+\ket{1111000}+\ket{0001111}+\ket{1110111}). \end{equation} To show the decoupling procedure clearly, we first define the following decoupling operators involved in groups $\tilde{\mathcal{T}}^z$ and $\tilde{\mathcal{T}}^x$: \begin{align} &\tilde{t}_1=\sigma_z^2\sigma_z^4\sigma_z^6, \tilde{t}_2=\sigma_z^1\sigma_z^3\sigma_z^5\sigma_z^7, \tilde{t}_1\tilde{t}_2=\sigma_z^1\sigma_z^2\sigma_z^3\sigma_z^4\sigma_z^5\sigma_z^6\sigma_z^7; \nonumber \\ &\tilde{t}_1^d=\sigma_x^1\sigma_x^3\sigma_x^5\sigma_x^7, \tilde{t}_2^d=\sigma_z^2\sigma_z^4\sigma_z^6, \tilde{t}_{1}^d\tilde{t}_2^d=\sigma_x^1\sigma_x^2\sigma_x^3\sigma_x^4\sigma_x^5\sigma_x^6\sigma_x^7. \end{align} When $H_{SE}$ consists of only $\sigma_x$ and $\sigma_y$ terms, it can be removed from the dynamics of the qubits with decoupling group $\mathcal{T}^z$. In the first simulation, we choose that qubits $1$ to $4$ couple to the environment with $\sigma_x$ and qubits $5$ to $7$ couple to the environment with $\sigma_y$, the time interval between two pulses to be $\tau=0.1\omega_0t$ and all $\omega_{a,b}=0$. We consider three cases: (i) free evolution without control, (ii) realizing $D^z$ with arbitrarily strong controls, (iii) realizing $D^z$ with bounded-strength controls. The results have been shown in Fig.~\ref{fig7}(a). One may notice that the fidelity for case (iii) fluctuates with time. This is because the initial state $\ket{\psi^L}$ is an eigenstate of the decoupling operators, but not an eigenstate of the control Hamiltonians $H_1^z$ and $H_2^z$. When $H_{SE}$ comprises $\sigma_x$, $\sigma_y$, and $\sigma_z$ terms at the same time, we need to use $D^{xz}$ as the decoupling procedure. In this case, the qubits interact with the environment through Pauli operators randomly. In this simulation, we also set $\tau=0.1\omega_0t$. Under this condition, $D^{xz}$ can be realized with bounded-strength controls based on Eulerian cycles (for details, see Supplemental Materials). Here, we also set all $\omega_{a,b}=0$ and consider three cases: (i) free evolution without control, (ii) realizing $D^{xz}$ with arbitrarily strong controls, (iii) realizing $D^{xz}$ with bounded-strength controls. The results have been shown in Fig.~\ref{fig7}(b). We also consider a case where $\omega_{a,b}$ are set to be $0.03\omega_0$ (i.e., the interactions between nearest-neighbor qubits are open) and $H_{SE}$ consists of only $\sigma_x$ and $\sigma_y$ terms. By using $D^z$ and its related Eulerian cycles (setting $\tau=0.1\omega_0t$), we consider three cases: (i) free evolution without control, (ii) realizing $D^z$ with arbitrarily strong controls, (iii) realizing $D^z$ with bounded-strength controls. The results are shown in Fig.~\ref{fig8}. The reduced dynamics of the qubits can be obtained by using the stochastic Liouville equation methods~\cite{sto97,sto02,koch08,yan16}. We choose a Lorenz type spectrum $J(\omega)=\gamma/(\gamma^2+\omega^2)$ without the Matsubara terms, where $\gamma$ is the inverse of the bath correlation time. The corresponding correlation function is assumed to be of the exponential form $\alpha(t-s)=(\Gamma\gamma/2)\exp(-\gamma|t-s|)$ with $\Gamma$ being the coupling strength to the environment and $\gamma=1$. The state fidelity is defined as $F(t)=\sqrt{\bra{\psi^L}\rho(t)\ket {\psi^L}}$, where $\rho(t)$ is obtained from the reduced dynamics. In Fig.~\ref{fig7} (a) and (b), fidelities for the decoupling procedure $D^z$ and $D^{xz}$ are demonstrated. In order to show the instantaneous dynamics clearly, we choose a relatively long inner-pulse interval $\tau=0.1\omega_0 t$. Despite this, the numerical results show that our scheme improves the free fidelities considerably. For example, Fig.~\ref{fig7}(a) shows that, compared with the final fidelity for the free evolution ($88.2\%$), the final fidelities for the ideal control and the Eulerian cycle increase by $7.8\%$ and $7.6\%$, respectively. With a shorter $\tau$, the fidelities can be improved further. Another significant advantage demonstrated in Fig.~\ref{fig7} is that our scheme does not require arbitrary strong pulses: for $D^z$, the final fidelity for the bounded-strength controls is almost identical to the arbitrarily strong ones; for $D^{xz}$, the difference between the final fidelity for the bounded-strength controls and that for the ideal ones is less than $1\%$. This indicates that our scheme can be implemented with practical experimental technology. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{fig8} \caption{Fidelities between the initial state $\ket{\psi^L}$ and the corresponding $\rho(t)$ obtained from the reduced dynamics related to $D^z$ with $\omega_{a,b}=0.03\omega_0$ versus evolution time. We consider three cases: (i) with no control Hamiltonian (blue curve), (ii) with bounded-strength control Hamiltonians (yellow curve), and (iii) with arbitrarily strong control Hamiltonians (green curve).}\label{fig8} \end{figure} \section{Conclusions} In summary, we have used topological concepts to develop DD procedures to protect the qubits arranged on square lattices. In each procedure, the decoupling groups are formed from the original lattice and its dual. Owing to the topological nature of the decoupling groups, quantum information stored in the homology degrees of freedom can be preserved. We further show that the designed decoupling procedure can be implemented with realistic strength controls for a long time period. As an example, we explicitly show how our scheme can be generalized to a practical surface code implementation where a planar lattice with boundaries is involved. Our scheme opens a window to introduce DD approach to surface codes so that the errors caused by environments can be reduced, making the required threshold a more easily reachable target. \begin{acknowledgments} This work is supported by the National Basic Research Program of China under Grant Nos. ~2017YFA0303700 and ~2015CB921001, National Natural Science Foundation of China under Grant Nos.~61726801, ~11474168 and ~11474181, and in part by the Beijing Advanced Innovative Center for Future Chip(ICFC). J.Z. acknowledges support by the China Postdoctoral Science Foundation (Grant No. 2018M631437). X.D.Y. acknowledges support by the DFG and the ERC (Consolidator Grant 683107/TempoQ). \end{acknowledgments}
\section{Theoretical details} We consider a standard optomechanical system with a single relevant optical mode with frequency $\omega_c$, and annihilation operator $\hat a$ and a single relevant mechanical mode with frequency $\Omega_m$ and annihilation operator $\hat b$. The two modes interact via radiation pressure interaction with a single-photon coupling rate $g_0$. The Hamiltonian is given by~\cite{aspelmeyer2014} \begin{multline} \hat H = \hbar\omega_c\hat a\dagg\hat a + \hbar\Omega_m\hat b\dagg\hat b - \hbar g_0\hat a\dagg\hat a(\hat b\dagg+\hat b) \\ -i\hbar[\hat a\s{in}(t)\hat a\dagg - \hat a\s{in}(t)\dagg\hat a], \label{eq:Hamiltonian0} \end{multline} where $\hat a\s{in}(t) = e^{-i\omega_l t}(\bar a\s{in} + \delta\hat a\s{in})$ is a coherent drive at frequency $\omega_l$, separated into its mean and noise terms. For simplicity, we take the drive envelope to be constant. Following standard procedure, we move to a frame rotating with the drive frequency and linearize the dynamics about the mean values $\hat a = \bar a + \delta\hat a$ and $\hat b = \bar b + \delta\hat b$. This yields \begin{multline} H = -\hbar\Delta\delta\hat a\dagg\delta\hat a + \hbar\Omega_m\delta\hat b\dagg\delta\hat b - \hbar g(\delta\hat a+\delta\hat a\dagg)(\delta\hat b\dagg+\delta\hat b) \\ -i\hbar\bar a\s{in}(\delta\hat a\dagg - \delta\hat a), \label{eq:Hamiltonian1} \end{multline} where $\Delta=\omega_l-\omega_c$ and $g = g_0\bar a$. Including dissipation to the optical and mechanical baths as well as the adjoining input noises yields the Langevin equations \begin{subequations} \begin{align} \dot{\hat a} &= -(\kappa/2-i\Delta)\hat a - ig(\hat b\dagg +\hat b) + \sqrt{\kappa}\hat a\s{in},\\ \dot{\hat b} &= -(\Gamma_m/2+i\Omega_m)\hat b - ig(\hat a\dagg + \hat a) + \sqrt{\Gamma_m}\hat b\s{in}, \end{align} \end{subequations} where for brevity we have omitted the $\delta$ designation on the noise operators. When the drive is tuned to the lower mechanical sideband, $\Delta=-\Omega_m$, and in the good cavity limit, $\kappa\ll\Omega_m$, we can perform the rotating-wave approximation, leading to \begin{subequations} \begin{align} \dot{\hat a} &= -(\kappa/2-i\Delta)\hat a + ig\hat b + \sqrt{\kappa}\hat a\s{in},\\ \dot{\hat b} &= -(\Gamma_m/2+i\Omega_m)\hat b + ig\hat a + \sqrt{\Gamma_m}\hat b\s{in}, \end{align} \end{subequations} We will be interested in interactions occurring on a time scale much shorter than the mechanical dissipation, and hence we can neglect $\Gamma_m$. We further move into a frame rotating at the mechanical frequency to obtain \begin{subequations} \begin{align} \dot{\hat a} &= -\frac{\kappa}{2}\hat a + ig\hat b + \sqrt{\kappa}\hat a\s{in},\\ \dot{\hat b} &= ig\hat a, \end{align} \end{subequations} In the weak coupling limit $g\ll\kappa$, we can adiabatically eliminate the cavity dynamics, \begin{subequations} \begin{align} \hat a(t) &= i\frac{2g}{\kappa}\hat b + \frac{2}{\sqrt{\kappa}}\hat a\s{in}, \label{eq:A6a}\\ \hat b(t) &= e^{-\tilde g t}\hat b(0) + i\sqrt{2\tilde g}\,e^{-\tilde g t}\int_0^t dt' e^{\tilde g t'}\hat a\s{in}(t'), \label{eq:A6b} \end{align} \end{subequations} where we defined the coupling strength $\tilde g = 2g^2/\kappa$. Substituting the output field given by $\hat a\s{out} = -\hat a\s{in}+\sqrt{\kappa}\hat a$ in Eq.~\eqref{eq:A6a} yields \begin{equation} \hat a\s{out} = \hat a\s{in} + i\sqrt{2\tilde g}\hat b. \label{eq:A7} \end{equation} We introduce the temporal optical modes~\cite{hofer2011,galland2014} \begin{subequations} \begin{align} \Ain(t) &= \sqrt{\frac{2\tilde g}{e^{2\tilde g t}-1}} \int_0^t dt' e^{\tilde g t'}\hat a\s{in}(t'), \\ \Aout(t) &= \sqrt{\frac{2\tilde g}{1-e^{-2\tilde g t}}} \int_0^t dt' e^{-\tilde g t'}\hat a\s{out}(t'), \end{align} \end{subequations} which obey $[\hat A_i,\hat A_i\dagg]=1$, in Eqs.~\eqref{eq:A6b} and~\eqref{eq:A7} to yield \begin{subequations} \begin{align} \Aout(t) &= e^{-\tilde g t}\Ain(t) + i\sqrt{1-e^{-2\tilde g t}}\,\hat b(0),\\ \hat b(t) &= e^{-\tilde g t}\hat b(0) + i\sqrt{1-e^{-2\tilde g t}}\,\Ain(t). \end{align} \end{subequations} In other words, we realize a beam-splitter transformation between mechanical and optical modes \begin{equation} \begin{pmatrix} \Aout(t) \\ \hat b(t) \end{pmatrix} = \begin{pmatrix} \cos\theta & i\sin\theta \\ i\sin\theta & \cos\theta \end{pmatrix} \begin{pmatrix} \Ain(t)\\ \hat b(0) \end{pmatrix} \label{eq:beamsplitter} \end{equation} with $\cos\theta\equiv e^{-\tilde g t}$ and $\sin\theta\equiv\sqrt{1-e^{-2\tilde g t}}$. In our case, $\tilde gt\ll 1$ so $\theta\ll 1$. The unitary transformation~\eqref{eq:beamsplitter} entails~\cite{dakna1997,campos1989} $\Aout = U\dagg\Ain U$ and $\hat b(t) = U\dagg\hat b(0)U$ with $U=e^{i\frac{\pi}{2}\hat L_3}e^{-2i\theta\hat L_2}e^{-i\frac{\pi}{2}\hat L_3}$ and the ``angular momentum'' operators given by~\cite{yurke1986,ban1994,dakna1997} \begin{subequations} \begin{align} \hat L_2 &= \frac{1}{2i}[\Ain\dagg(t)\hat b(0)-\hat b\dagg(0)\Ain(t)],\\ \hat L_3 &= \frac{1}{2}[\Ain\dagg(t)\Ain(t)-\hat b\dagg(0)\hat b(0)]. \end{align} \end{subequations} Thus, in the Schr\"odinger picture, a system initially described by a density matrix $\hat\rho\s{in}$ will evolve according to $\hat\rho\s{out}=\hat U\hat\rho\s{in}\hat U\dagg$. The initial state of the systems is \begin{equation} \hat\rho\s{in} = \hat\rho\s{in}^M\otimes\lvert 0\rangle\langle 0\rvert, \end{equation} where $\hat\rho\s{in}^M$ is the mechanical input state and the cavity is in the vacuum state (hereafter all bras and kets refer to optical Hilbert space). In this case the output state is given by~\cite{ban1994,dakna1997} \begin{equation} \label{eq:outputstate} \begin{split} \hat\rho\s{out} &= \sum_{n=0}^{\infty}\sum_{m=0}^{\infty} \biggl[ \frac{e^{-i(m-n)\pi/2}}{\sqrt{n!\,m!}}(-1)^{m+n}\lvert\tan\theta\rvert^{m+n} \\ &\quad\times \hat b^m \lvert\cos\theta\rvert^{\hat b\dagg\hat b} \hat\rho\s{in}^M \lvert\cos\theta\rvert^{\hat b\dagg\hat b} \hat b\dagg{}^n \otimes \lvert m\rangle\langle n\rvert\biggr]. \end{split} \end{equation} Conditioned on detection of $m$ output photons, the mechanical state is reduced in the usual way \begin{equation} \label{eq:reducedstate} \rho\s{out}^{(m)} = \frac{\langle m\rvert\hat\rho\s{out}\rvert m\rangle}{\mathrm{tr}_M(\langle m\rvert\hat\rho\s{out}\rvert m\rangle)} \end{equation} with probability \begin{equation} \label{eq:prbability} \begin{split} P(m) &= \mathrm{tr}_M(\langle m\rvert\hat\rho\s{out}\rvert m\rangle) \\ &= \sum_{n=m}^{\infty} \binom{n}{m}(\sin\theta)^{2m}(\cos\theta)^{2(n-m)} \langle n\vert\hat\rho\s{in}^M\vert n\rangle. \end{split} \end{equation} Equations~\eqref{eq:outputstate}, \eqref{eq:reducedstate} and~\eqref{eq:prbability} can be solved for an arbitrary mechanical input state $\hat\rho\s{in}^M$. This has been done for squeezed vacuum in Ref.~\onlinecite{dakna1997}. In our work we solve numerically for $\hat\rho\s{out}^{(m)}$ for a squeezed thermal input state.
\section{Quantifying Results} \label{sec:QR} Our main goal of this section is to address the following question: \begin{question} Can we find quantifiable bounds on $\epsilon$ and the multi-slope $\alpha$ so that $M=N(\alpha)$ is an $(\epsilon, d_{N})$-twisted manifold (as defined in \Cref{def:edHTN})? \end{question} $(\epsilon, d_{N})$-twisted manifolds are a generalization of $(\epsilon, d_{L})$-twisted knot complements. Working in this broader context allows for a somewhat more streamlined discussion as we adapt various effectivization results of \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FPS19} to our setting. After adapting the necessary bounds, this section culminates in the construction of an infinite family of examples of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic fillings in \Cref{subsec:examples-twisted-generic}. Throughout this section, let $N$ be a hyperbolic manifold with cusps $\{C_0, C_1, \dots, C_n\}$, and let $M$ be a manifold obtained by Dehn filling all but one component of $N$. We may take the unfilled component to be $C_0$, so that our filling is along a multi-slope $\alpha = (-, s_1, \dots, s_n)$. Here $s_i=\frac{p_i}{q_i}$ for integers $p_i,q_i \ne 0$ and $\gcd(p_i,q_i)=1$ and we use `$-$' to demarcate the unfilled component of the boundary of N. Given such an $N$, let $d_N=4\frac{vol(N)}{v_0}$, where just as before $v_0$ is the volume of the regular ideal tetrahedron. \begin{defin}\label{def:edHTN} We say that a (hyperbolic) cusped manifold $M$ is \define{$(\epsilon,d_N)$-twisted}, or alternatively that $M$ is an \define{$(\epsilon,d_N)$-twisted filling} of $N$, if for $0<\epsilon < 3.45$ the following three conditions hold: \begin{enumerate}[label=(\roman*)] \item $N_{\geq \epsilon}$ is homeomorphic to $N \setminus n(\bigcup_i C_i)$, \item $M_{\geq \epsilon}$ is homeomorphic to $N_{\geq \epsilon}$, and \item $M_{\geq \epsilon/d_{N}}$ is homeomorphic to $N_{\geq \epsilon}$. \end{enumerate} Furthermore, we say that $M$ is an \define{$(\epsilon,d_N)$-twisted and generic} filling of $N$ if it is $(\epsilon,d_N)\mbox{-twisted}$ and no isometry of $M$ non-trivially permutes the set of core geodesics of the filling solid tori. \end{defin} \begin{prop}\label{prop:edNnonarithmetic} If $M$ is an $(\epsilon,d_N)$ filling of $N$, then $M$ is non-arithmetic. Moreover, $d_N=4 \frac{vol(N)}{v_0}$ is an upper bound for the degree of any cover $p: M \rightarrow \mathcal{O}$, where $\mathcal{O}$ is an orientable orbifold. \end{prop} \begin{proof} First we observe that $d_N=4\frac{vol(N)}{v_0} > 4 \frac{vol(M)}{v_0}$. By \def\citeauthoryear##1##2{##1, ##2}\@internalcite{CM01} we have $vol(M)>2v_0$ so $d_N >8$. If $M$ is arithmetic, then by \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 4.6]{NR92} its shortest geodesic is at least 0.43137. Since $\frac{\epsilon}{d_N}<\frac{3.45}{8}=0.43125$, we have $M_{\geq \epsilon/d_{N}}\cong M \not\cong N_{\geq \epsilon}$, contradicting (iii). The final part of the claim follows directly from the minimum volume bounds established by \Cref{lem:min_vol_non_arithmetic}. \end{proof} Each of the three conditions of \Cref{def:edHTN} can be translated into restrictions on the geometry of $N$ and the multi-slope $\alpha$. Condition (i) demands that we choose $\epsilon$ smaller than the systole length of $N$. Condition (ii) requires us to choose each filling slope large enough so that the core geodesics introduced under Dehn surgery are each shorter than $\epsilon$, while stabilizing the geodesic lengths coming from the unfilled manifold $N$. Condition (iii) further requires these core geodesics to be smaller than the geodesics coming from $N$ by a factor of $d_N=4\frac{vol(N)}{v_0}$. Based on this description, one can expect an explicit dependence on the systole length of $N$, the volume of $N$, and the multi-slope $\alpha$. Our goal is to use tools coming from the recent work of Futer--Purcell--Schleimer \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FPS19} (which builds off of the work of Hodgson and Kerckhoff \def\citeauthoryear##1##2{##1, ##2}\@internalcite{HK05}) to make this relationship as explicit as possible. We now introduce some terminology and the results needed from Futer--Purcell--Schleimer. Choose a cusp expansion for the cusps of $N$ corresponding to a maximal horoball packing in $\mathbb{H}^3$. Under this cusp expansion, each cusp $C_{i}$ of $N$ has a torus boundary $\partial C_{i}$. For a slope $s_i$ on $\partial C_{i}$ define the \define{normalized length} of $s_i$ to be \begin{equation*} \mathcal{L}_{i} = \frac{\ell_{\mathbb{E}}(s_i)}{\sqrt{area(\partial C_{i})}}, \end{equation*} where $\ell_{\mathbb{E}}(s_i)$ is the length of the Euclidean geodesic isotopic to $s_i$. For a multi-slope ${\alpha = (-,s_1, \dots, s_n)}$, the \define{total normalized length $\mathcal{L}$} is defined via \[ \frac{1}{\mathcal{L}^2} = \sum_{i=1}^{n} \frac{1}{\mathcal{L}_{i}^{2}}. \] Let $\Sigma = \{ \gamma_{i} \}_{i=1}^{n}$ be the set of $n$ core geodesics introduced in $N(\alpha)$ via Dehn filling $N$. Let $\ell(\Sigma)$ be the total length of the $n$ geodesics in $\Sigma$, as measured in the complete metric on $M$. Our first step is showing that we can explicitly choose the multi-slope $\alpha$ as a function of $\epsilon$ and $vol(N)$ in such a way that $\Sigma \subset N(\alpha)_{<\epsilon/d_N}$. For this, we will need the following reformulation of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 6.13]{FPS19}, specialized for our particular Dehn fillings. \begin{cor}[{\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 6.13]{FPS19}}] \label{cor:FPS1} Let $M$ be the manifold obtained by filling $N$ along the multi-slope $\alpha = (-, s_1, \ldots, s_n)$. If $\mathcal{L}^{2} \geq 61.2$, then \[ \frac{2\pi}{\mathcal{L}^{2}+16.17} < \ell(\Sigma) < \frac{2\pi}{\mathcal{L}^2 - 28.78} \] \end{cor} Intuitively, this lemma says that the total length of the core geodesics introduced from Dehn filling our crossing circle cusps is approximately $\frac{2\pi}{\mathcal{L}^{2}}$, assuming our Dehn filling slopes are sufficiently long (in terms of normalized length). Since we only need to make sure that each $\gamma_{i} \in \Sigma$ is sufficiently short, we will only need the upper bound on $\ell(\Sigma)$. This requires an upper bound on $\frac{1}{\mathcal{L}^2}$, given by the below lemma: \begin{lem} \label{lem:ExpThin} Let $N(\alpha)$ be the manifold obtained by Dehn filling $N$ along the multi-slope $\alpha = (-,s_1, \dots, s_n)$. For any $\epsilon >0$, if $$ \frac{1}{\mathcal{L}^2} \leq \min \bigg\{ \frac{1}{61.2}, \frac{\epsilon v_0}{8\pi vol(N)+ 28.78 \epsilon v_0 } \bigg\}, $$ then $\Sigma \subset N(\alpha)_{<\epsilon/d_N}$. \end{lem} \begin{proof} Since $\frac{1}{\mathcal{L}^2} < \frac{1}{61.2}$, \Cref{cor:FPS1} applies, so $\ell(\Sigma) <\frac{2\pi}{\mathcal{L}^2-28.78}$. Thus we just need to ensure that $\frac{2\pi}{\mathcal{L}^2-28.78} \le \frac{\epsilon}{d_N} = \frac{\epsilon v_0}{4 vol(N)}$. Solving this equation for $\frac{1}{\mathcal{L}^2}$ gives the second upper bound in the statement of the lemma. \end{proof} The above lemma explicitly shows that, for any choice of $\epsilon$, we can choose $\alpha$ so that our set of core geodesics $\Sigma$ is in $N(\alpha)_{<\epsilon/d_N}$. We also want to make sure that these are the only geodesics in $N(\alpha)_{< \epsilon}$ and quantify this relationship in terms of $\alpha$ and $\epsilon$. Another result of Futer--Purcell--Schleimer, restated for our purposes, is useful here. \begin{thm}[{\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 1.2]{FPS19}}] \label{thm:FPS1} Let $N(\alpha)$ be the manifold obtained by filling $N$ along the multi-slope $\alpha = (-, s_1, \dots, s_n)$. Fix $0 < \epsilon \leq \log(3)$ and $J >1$. If \[ \ell(\Sigma) \leq \min \bigg\{ \frac{\epsilon^{5}}{6771\cosh^{5}(0.6\epsilon + 0.1475)}, \frac{\epsilon^{5/2}\log(J)}{11.35} \bigg\}, \] then there exists a J-bilipschitz inclusion $\psi: N_{\geq \epsilon} \hookrightarrow N(\alpha)_{\geq \epsilon /1.2}$. \end{thm} In our applications, we will always have $J \ge 1.001 $. In this case we let $$ C(\epsilon) = \frac{\epsilon^{5}}{6771\cosh^{5}(0.6\epsilon + 0.1475)}, $$ and observe that $C(\epsilon) \le \frac{\epsilon^{5/2}\log(J)}{11.35}$ for any $\epsilon > 0$, $J\ge 1.001$, so we can disregard the latter bound. In what follows, let $\ell_{N}$ denote length as measured in the complete hyperbolic metric for $N$. Let $\ell_{N}(\gamma_s)$ denote the systole length of $N$, that is, the length of a shortest closed geodesic in $N$. \begin{thm} \label{thm:quantify} Let $N(\alpha)$ be the manifold obtained by filling $N$ along the multi-slope $\alpha = (-, s_1,\dots, s_n)$. If $\epsilon \leq \min \{ \frac{\ell_{N}(\gamma_s)}{1.001}, \log(3)\}$, and $$ \frac{1}{\mathcal{L}^2} \leq \min \bigg\{ \frac{\epsilon v_0}{8\pi vol(N)+ 28.78 \epsilon v_0 }, \frac{1}{\frac{2\pi}{C(\epsilon)}+28.78} \bigg \}, $$ then $M = N(\alpha)$ is $(\epsilon, d_{N})$-twisted. \end{thm} \begin{proof} Since $\epsilon < \ell_{N}(\gamma_s)$, item (1) from the definition $(\epsilon, d_N)$-twisted is satisfied. For items (2) and (3) to hold, we need to show that $\Sigma \subset N(\alpha)_{<\epsilon/d_N}$ and that these are the only closed geodesics in $N(\alpha)_{< \epsilon}$. First, note that since $\epsilon \le \log(3) = 1.099..$, we have that $$ \frac{1}{\mathcal{L}^2} \leq \frac{1}{\frac{2\pi}{C(1.099)}+28.78} \leq 0.0000086 < \frac{1}{61.2}. $$ As a result, our conditions on $\alpha$ guarantee that the hypotheses of \Cref{lem:ExpThin} hold, and so, $\Sigma \subset N(\alpha)_{<\epsilon/d_N}$. Let $\gamma \subset N$ be a closed geodesic and let $\gamma'$ be the corresponding geodesic in $N(\alpha)$. Note that since $\epsilon \le \frac{\ell_{N}(\gamma_s)}{1.001} < \ell_{N}(\gamma_s)$, $\gamma$ is in $N_{\geq \epsilon}$. We need to show that $\gamma' \subset N(\alpha)_{\geq \epsilon}$. To do this, we will apply \Cref{thm:FPS1} with $J = 1.001$ and $\epsilon$ as given in the statement of the theorem. To satisfy the hypothesis of \Cref{thm:FPS1} we need $\ell(\Sigma) \leq C(\epsilon).$ Similar to the proof of \Cref{lem:ExpThin}, we use inequality (1), namely $$ \ell(\Sigma) < \frac{2\pi}{\mathcal{L}^2 - 28.78}, $$ to restate this condition in terms of our Dehn filling parameters. If we choose our multi-slope $\alpha = (-, s_1,\dots, s_n)$ so that $\frac{ 2\pi}{\mathcal{L}^2-28.78} \leq C(\epsilon)$, then we have a $1.001$-bilipschitz map $\psi: N_{\geq \epsilon} \hookrightarrow N(\alpha)_{\geq \epsilon /1.2}$. It follows that we need $$ \frac{1}{\mathcal{L}^2} \leq \frac{2}{\frac{2\pi}{C(\epsilon)}+28.78}. $$ Under these conditions, our bilipschitz map guarantees that $$ \epsilon \le \frac{\ell_{N}(\gamma_s)}{1.001} \leq \frac{\ell_{N}(\gamma)}{1.001} \leq \ell_{N(\alpha)}(\gamma'). $$ \end{proof} If we want to apply \Cref{thm:quantify} to particular examples of manifold $N$, it is useful to have a way to estimate $\mathcal{L}_i^2$. A bit of plane geometry gives the below lemma: \begin{lem}\label{lem:NL_bound} Let $C_i$ be a cusp of $N$ with longitude $\lambda\in \mathbb{R}_{\ge 0}$ and meridian $\mu=re^{i\theta}$, and let $s=p\mu+q\lambda$ be a slope on $\partial C_i$. Then $$ \mathcal{L}_i^2 \ge \frac{p^2r^2+q^2\lambda^2}{r\lambda \sin \theta}-|pq \cot(\theta)| $$ \end{lem} In this paper our main interest is in the case where $N$ is an FAL complement with a planar component $K_0$ and crossing circles $C_1,\dots ,C_n$, and the filling multi-slope has the form $\alpha=(-, \frac{1}{q_1},\dots, \frac{1}{q_n})$. For a crossing circle the longitude always has length 2, and the value of $\theta$ in the above lemma is bounded away from $0$ and $\pi$. This allows us to greatly simplify the bound in \Cref{lem:NL_bound}, as is shown by the following result of Purcell. \begin{lem}[{\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 6.5]{Pur08b}}] \label{lem:NL} Let $N(\alpha)$ be the knot compliment obtained by filling an FAL complement $N=\SS^3\setminus L$ along the multi-slope $\alpha = (-, \frac{1}{q_{1}}, \ldots, \frac{1}{q_{n}})$. Then the normalized length $\mathcal{L}_{i}$ of the slope $\frac{1}{q_i}$ satisfies $\mathcal{L}_{i} \geq \sqrt{2q_{i}}$. \end{lem} By combining \Cref{lem:NL} with the bound $vol(N)\le 10v_0(n-1)$ given in the appendix of \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Lac04}, we get the following corollary of \Cref{thm:quantify}: \begin{cor} \label{thm:FALquantify} Let $N(\alpha)$ be the knot complement obtained by filling an FAL complement $N=\SS^3\setminus L$ along the multi-slope $\alpha = (-, \frac{1}{q_1},\dots, \frac{1}{q_n})$. If $\epsilon \leq \min \{ \frac{\ell_{N}(\gamma_s)}{1.001}, \log(3)\}$, and $$ \sum_{i=1}^n\frac{1}{q_i^2} \leq \min \bigg\{ \frac{2\epsilon }{80\pi(n-1)+ 28.78 \epsilon}, \frac{2}{\frac{2\pi}{C(\epsilon)}+28.78} \bigg \}, $$ then $M = N(\alpha)$ is $(\epsilon, d_{L})$-twisted. \end{cor} While \Cref{thm:FALquantify} does provide a quantified method to build $(\epsilon, d_{L})$-twisted knot complements, there are many explicit dependencies required for this method: $\epsilon$ depends on the systole length of $N$ and $\alpha$ depends on both the systole length of $N$ and the volume of $N$ (which can be restated in terms of a dependence on the $n$ crossing circles). It is natural to ask if all of these dependencies are necessary. In fact, work of Meyer--Millichap--Trapp \def\citeauthoryear##1##2{##1, ##2}\@internalcite{MeyerMillichapTrapp2018} shows that they are. First, we note the dependence on volume is necessary for \Cref{thm:FALquantify}. Recall from the proof of \Cref{prop:HT_non-empty} that $d_L=4\frac{vol(\SS^3\setminus L)}{v_0}$ was introduced to provide a bound on the degree of any cover from $N$ to an orbifold. Since there exist FAL complements that have both volume and orbifold covering degrees growing linearly with the number of crossing circles, we cannot avoid this dependence. The pretzel FAL complements discussed in \def\citeauthoryear##1##2{##1, ##2}\@internalcite{MeyerMillichapTrapp2018}, exhibit this feature; see the proofs of Theorem 7.7 and Corollary 7.8 from their paper for a description of particular orbifold covers and volumes of these manifolds. Now, consider a pretzel FAL $L_n$ with $n$ crossing circles, no half-twist going through the first crossing circle, and a single half-twist going through each of the $n-1$ remaining crossing circles. Such an FAL always has a single planar component, and for $n \geq$ 3, $N_n = \SS^3 \setminus L_n$ is hyperbolic. The proof of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 5.2]{MeyerMillichapTrapp2018} shows that $N_n$ has a closed geodesic $\gamma_n$ of length $\ell(\gamma_n) = 2 \ln(\frac{\csc(\pi/n)+1}{\csc(\pi/n)-1})$. As $n \rightarrow \infty$, $\ell(\gamma_n) \rightarrow 0$. Thus, there exist FAL complements with arbitrarily short systole length. This implies that we cannot avoid the dependence of $\epsilon$ on the systole length of $N$ in the construction of an $(\epsilon, d_L)$-twisted knot complement. Although the dependence on systole length is necessary when considering the full class of FAL complements, we can remove this dependence if we restrict to arithmetic FAL complements. This class includes all octahedral FALs (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 3.8]{Pur11} for an explicit description of this infinite class). By work of Neumann and Reid \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 4.5, Theorem 4.6]{NR92} any arithmetic link complement, in particular any arithmetic FAL complement has $\ell_{N}(\gamma_s) > 0.862554$. Using this fact, we get the following immediate corollary of \Cref{thm:FALquantify}, which gives a stronger version of that theorem, at the cost of restricting to arithmetic FALs. \begin{cor} \label{thm:ArithQuant} Let $N(\alpha)$ be the knot complement obtained by filling an arithmetic FAL complement $N=\SS^3\setminus L$ along the multi-slope $\alpha = (\frac{1}{q_{1}}, \ldots, \frac{1}{q_{n}})$. Let $\epsilon \le \frac{0.86255}{1.001}<0.861688$ and $$ \sum_{i=1}^{n} \frac{1}{q_{i}} \leq \min \bigg\{ \frac{2\epsilon}{80\pi (n-1)+ 28.78 \epsilon }, \frac{2}{\frac{2\pi}{C(\epsilon)}+28.78} \bigg \}. $$ Then $M = N(\alpha)$ is $(\epsilon, d_{L})$-twisted. In particular, if we choose $\epsilon = 0.86168$ and we require $$ \sum_{i=1}^{n} \frac{1}{q_{i}} \leq \min \bigg \{ \frac{1.72336}{80\pi(n-1) + 24.8}, 7.963 \times 10^{-6} \bigg \}, $$ then $M = N(\alpha)$ is $(\epsilon, d_{L})$-twisted. \end{cor} \subsection{Examples of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements.}\label{subsec:examples-twisted-generic} We conclude this section with a concrete family of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements. We will first discuss a rigorous construction and then contrast our numbers against experimental evidence which, although it may be susceptible to numerical errors, seems to suggest that $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements are obtained via relatively low filling parameters. \begin{figure} \includegraphics[width=.35\textwidth]{L_4} \caption{\label{fig:OctFALexample} The octahedral FAL $L_4$, from which we exhibit $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements that are the only knot complements in their respective commensurability classes.} \end{figure} We denote by $L_4$ the FAL shown in \Cref{fig:OctFALexample}. Using SnapPy's Sage interface \def\citeauthoryear##1##2{##1, ##2}\@internalcite{CDGW09}, we can rigorously compute the orientation preserving symmetry group of $\SS^3 \setminus L_4$ and its action on the cusps. In particular, this group is isomorphic to $\mathbb{Z}_2\times \mathbb{Z}_2$, and it fixes each cusp of $\SS^3\setminus L_4$. From this it follows that any $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ filling of $\SS^3 \setminus L_4$ is automatically an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic filling. Given that the link complement $\SS^3 \setminus L_4$ is in SnapPy's octahedral census as $\mathtt{ooct06\_06059}$, we see that $\SS^3 \setminus L_4$ is an octahedral FAL complement, i.e., it is arithmetic and has invariant trace field $\mathbb{Q}(\mathfrak{i})$. In this case \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 4.5, Theorem 4.6]{NR92} gives a lower bound on the systole of $0.962424$, which is an improvement on the bound used for \Cref{thm:ArithQuant}. While we could plug this value directly into \Cref{thm:FALquantify}, we can get a smaller lower bound on the $q_i$ by using \Cref{thm:quantify}. In particular, since SnapPy can rigorously compute the cusp translations for $\SS^3\setminus L_4$, we can use \Cref{lem:NL_bound} to get a better bound on $\mathcal{L}_i^2$ then is provided by \Cref{lem:NL}. As the link complement is octahedral, we can apply exact values from $\mathbb{Z}[i]$ with SnapPy's combinatorial calculations (eg the computation of peripheral tori) to rigorously obtain the following inequalities: $0\le \cot\theta_i\le 1$, $r_i\lambda_i\sin\theta \le 6$, and $r_i\ge 1$. Given that $p_i=1$ for all $i$ and crossing circles always have longitudes of length $\lambda_i=2$, \Cref{lem:NL_bound} yields $$ \mathcal{L}_i^2 \ge \frac{1+4q_i^2}{6}-q_i, $$ which implies that $\frac{1}{\mathcal{L}_i^2} \le \frac{3}{2(q_i-1)^2}$ since we may assume that $q_i\ge 3$. To apply \Cref{thm:quantify}, we find that we need $\frac{1}{\mathcal{L}^2} \le \sum_{i=1}^n \frac{3}{2(q_i-1)^2} \le .0000057524$ to ensure that the resulting filling of $\SS^3\setminus L_4$ is $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$. It follows that filling along slopes $\frac{1}{q_i}$ with $q_i\ge 1023$ for all $i$ will yield an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complement, which will moreover be $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic given the symmetry group calculation for $\SS^3\setminus L_4$. All calculations above are rigorous, and thus by \Cref{cor:unique_knot_comp_no_free_symms} the knots constructed above are an infinite family of knots that are the only knots in their commensurability classes. Furthermore, these are a new family that has not previously appeared in the literature, as we now show. By \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FKP08}, the constructed knots all have volumes within $1.18\times 10^{-11}$ of $vol(\SS^3\setminus L_4)=21.9831742603..$. There are three families of knots in the literature (that we are aware of) for which each is the only knot in its commensurability class. In \def\citeauthoryear##1##2{##1, ##2}\@internalcite{MaMa08}, the authors show that for $n\ne 7$, a $(-2,3,n)$ pretzel knot complement is the unique knot complement in its commensurability class. Such knot complements are all obtained by surgery on the arithmetic two-component census link $\mathtt{L9n9}$. Thus their volumes are bounded by $vol(\mathtt{L9n9})=5.333..$, so our knots are distinct from these. In \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Mil17} it is shown that certain pretzel knots obtained by long Dehn fillings of a subfamily of FALs have no other knots in their respective commensurability classes. Again using \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FKP08}, these knots must have volumes close to their FAL ancestors, whose volumes are all at least $29.31$, so our knots are distinct from these as well. Finally, in \def\citeauthoryear##1##2{##1, ##2}\@internalcite{RW08} the authors show that 2-bridge knots have no other knots in their commensurability classes, and that such knots always admit non-trivial symmetries acting freely on the cusp. Since no symmetry of $\SS^3\setminus L_4$ acts freely on the planar cusp, it follows that no symmetry of an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ filling will act freely on the cusp, so our knots are not 2-bridge knots. Thus the family of knots we construct is distinct from the three known families above, which gives the following theorem: \begin{thm}\label{thm:concrete_fam} Let $L_4$ be the link in \Cref{fig:OctFALexample}. Let $\SS^3 \setminus K$ be a knot complement obtained by preforming $1/q_i$ Dehn filling on each crossing circle cusp of $\SS^3 \setminus L_4$. If each $q_i\geq 1023$, then $\SS \setminus K$ is an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic filling and therefore it admits no hidden symmetries and is the unique knot complement in its commensurability class. \end{thm} While the bound of $q_i\ge 1023$ is as far as we are able to push things with rigorous computations, the following non-rigorous computations suggest that a far more modest bound will suffice. Using SnapPy, we find that filling the crossing circle cusps of $L_4$ along slopes $\frac{1}{22}$ yields a knot complement $M$ whose 4 shortest geodesics all have length less than $.02$. All other geodesics of $M$ have length at least $1.76$. Since the volume of $\SS^3\setminus L_4$ is $\sim 21.9831$, and the systole is $\sim 1.76$, if we choose $\epsilon = 1.75$ then we get $\frac{\epsilon}{d_L} > .02$. Thus the four short geodesics of $M$ are in $M_{<\epsilon/d_L}$, and these are the only geodesics in $M_{< \epsilon}$. Since drilling out these geodesics yields a manifold homeomorphic to $\SS^3\setminus L_4$, it follows that $M$ is $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic. Although systole computations and drilling geodesics are non-rigorous in SnapPy, these calculations suggest that for $L_4$, $q_i \ge 22$ is likely large enough. \section{Background}\label{sec:background} In this section, we describe the hyperbolic knots and links that we will analyze in this paper. The geometric structures of fully augmented link complements are discussed in \Cref{subsec:FALdecomp}. In \Cref{subsec:SuffTwisted}, we describe how to construct $(\epsilon,d_L)$-twisted knot complements by performing Dehn fillings on fully augmented link complements. For the remainder of the paper, all manifolds and orbifolds are assumed to be finite volume, orientable, and hyperbolic unless explicitly stated otherwise. \subsection{Fully Augmented Link Complements} \label{subsec:FALdecomp} Let $K$ be a hyperbolic link with \define{prime}, \define{twist-reduced} diagram $D(K)$, thought of as a 4-valent planar graph with vertices labelled by over- and under-crossing data (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FP07}, or \Cref{fig:prime_tr} for definitions). An edge of $D(K)$ is called \define{simple} if it is the unique edge connecting its vertices (i.e., it is not part of a multi-edge). We can partition $D(K)$ into \define{twist regions} by cutting it at the midpoint of every simple edge. More plainly, a twist region is a region of the diagram where two strands twist around each other a maximal number of times---in a twist region with $n$ crossings, the strands twist around each other $\frac{n}{2}$ times. Going forward, we will assume that our link $K$ is embedded in $\SS^3=\mathbb{R}^3\cup \{\infty\}$ so that it's projection onto the $x,y-$plane is the graph $D(K)$, thus allowing us to refer to twist regions of $K$. \begin{figure}[h] \begin{subfigure}{.45\textwidth} \centering \includegraphics[width=.7\textwidth]{prime} \label{fig:prime} \caption{} \end{subfigure} \begin{subfigure}{.45\textwidth} \centering \includegraphics[width=.7\textwidth]{twist_reduced} \label{fig:twist_reduced} \caption{} \end{subfigure} \caption{Left: A prime link. Right: A twist-reduced link.} \label{fig:prime_tr} \end{figure} Associated to $K$ is a \define{fully augmented link} $L$, obtained as follows. First, for each twist region $t_i$ of $K$, let $C_i$ be a circle that bounds a twice punctured disk in $\SS^3\setminus K$, punctured by the two strands of $t_i$. Let $L'$ be the disjoint union of $K$ and the circles $C_i$, and let $L$ be the link obtained by reducing modulo 2 the number of crossings in the twist region associated to each circle $C_i$ of $L'$ (see \Cref{fig:to_FAL}). If we consider the complement $\SS^3\setminus L'$, then this reduction modulo 2 is equivalent to removing full twists by cutting along the twice punctured disk bounded by each circle $C_i$, twisting one of the resulting boundary components until at most one crossing remains, then regluing by the identity. Since this operation is a homeomorphism of $\SS^3\setminus L'$, it follows that $\SS^3\setminus L \cong \SS^3 \setminus L'$. Any fully augmented link $L$ constructed in this manner is hyperbolic (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 2.2]{FP07} for a short proof of this fact, which follows from \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 4.1]{Ad86}). \begin{figure}[h] \begin{subfigure}{.32\textwidth} \raggedright \includegraphics[scale=1.3]{K} \label{fig:K} \caption{} \end{subfigure} \begin{subfigure}{.32\textwidth} \centering \includegraphics[scale=1.3]{L_prime} \label{fig:L_prime} \caption{} \end{subfigure} \begin{subfigure}{.32\textwidth} \raggedleft \includegraphics[scale=1.3]{L} \label{fig:L} \caption{} \end{subfigure} \caption{Left: A link $K$ with three twist regions. Center: $L'$ is obtained by augmenting each twist region of $K$ with a circle. Right: the FAL $L$ associated to $K$, obtained by removing full twists from $L'$.} \label{fig:to_FAL} \end{figure} If $K$ is an $m$-component link with $n$ twist regions, then the fully augmented link (FAL, henceforth) $L$ associated to $K$ will have $m$ \define{planar} components $K_1, \dots, K_m$ (corresponding to the components of $K$, with full twists removed), and $n$ \define{crossing circle} components $C_1,\dots, C_n$. At each crossing circle $C_i$ there is either one crossing, called a \define{half-twist}, or no crossings. A \textbf{planar cusp} of $\SS^3 \setminus L$ is a cusp of this link complement that corresponds with a planar component of $L$. Similary, a \textbf{crossing circle cusp} of $\SS^3 \setminus L$ corresponds with a crossing circle of $L$. \subsubsection{Polyhedral decomposition} \label{subsec:PD} In the Appendix of \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Lac04}, Agol and D. Thurston give a decomposition of $L$ into two isometric right-angled ideal polyhedra (see also \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FP07}, \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Pur11}). To simplify the description of this decomposition, we will assume for now that $L$ has no half-twists. Thus each planar component of $L$ can be thought of as a simple closed curve in the projection plane $\mathcal{P}$, which we identify with $\mathbb{R}^2\cup \{\infty\} \cong \SS^2\subset \SS^3$. Embed each crossing circle $C_i$ so that the twice punctured \define{crossing disk} it bounds is perpendicular to $\mathcal{P}$. Then the reflection in $\mathcal{P}$ preserves $L$, and is therefore a homeomorphism of $\SS^3\setminus L$. By Mostow--Prasad rigidity, this reflection is then an isometry of $\SS^3\setminus L$, and it follows that $\mathcal{P}\setminus L$ must be totally geodesic in $\SS^3\setminus L$. By a result of Adams \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Ad85} the crossing disks also must be totally geodesic surfaces in $\SS^3\setminus L$. By first cutting along $\mathcal{P}\setminus L$, then along the crossing disks, we obtain two ideal polyhedra $P_1$ and $P_2$. Let $P_1$ be the component that lies above the projection plane. Since we have cut along crossing disks, we can pull apart each half-disk in $P_1$ (see \Cref{fig:to_poly}). By contracting each component of $L$ to a point, we realize $P_1$ as an ideal polyhedron with geodesic faces, 4-valent vertices, and dihedral angles all $\frac{\pi}{2}$. The same is true for $P_2$, as it is isometric to $P_1$. If we shade the faces that come from cutting along disks, and leave projection plane faces unshaded, then the faces of each $P_i$ will be checkerboard colored, and every shaded face will be a triangle. \begin{figure}[h] \centering \includegraphics[scale=1.1]{to_poly} \caption{To construct $P_1$, first pull half-disks apart (left), then flatten them onto the projection plane (center), and contract the strands of the link to vertices (right).} \label{fig:to_poly} \end{figure} If $L$ has a half-twist at one (or more) of its crossing circles, then it still decomposes into polyhedra $P_1$ and $P_2$. The only difference is that when we glue $P_1$ to $P_2$ to recover $\SS^3\setminus L$, we must glue the punctured disks at that crossing circle with a half twist. This means that the corresponding pair of shaded faces of $P_1$ will glue to shaded faces of $P_2$. The above discussion shows that there are many totally geodesic properly embedded surfaces in an FAL complement, including several thrice-punctured spheres. In the example shown in \Cref{fig:to_poly}, for example, there are 3 obvious thrice-punctured spheres (the crossing disks), and one that is less apparent. In particular, the middle crossing circle bounds a thrice-punctured sphere on both sides (one contains the vertex at $\infty$). We can see this extra thrice-punctured sphere in $P_1\cup P_2$ as follows: a closed path that crosses three unshaded faces, but is not homotopic into the boundary of a shaded face, is the boundary of a triangle embedded in $P_1$, and another in $P_2$. The union of these triangles is a thrice-punctured sphere. Note that if we isotope the middle crossing circle in the left frame of in \Cref{fig:to_poly} so that it wraps around the other planar component, then the ``extra" thrice-punctured sphere is now a crossing disk. In general, if a crossing circle for $L$ bounds multiple twice-punctured disks (whose punctures are meridians of planar components), then such an isotopy exists for each one. For this reason we will call any such disk a \define{generalized crossing disk}. \subsubsection{Horoball packing} \label{subsec:HP} Let $\mathcal{O} = \mathbb{H}^3\setminus \Gamma$ be a hyperbolic orbifold with covering map ${\pi:\mathbb{H}^3\to \mathcal{O}}$. Given a cusp $\mathcal{C}$ of $\mathcal{O}$, a \define{cusp neighborhood} is a neighborhood $n(\mathcal{C})$ of $\mathcal{C}$ such that $\pi^{-1}(n(\mathcal{C}))$ is a union of horoballs. An embedded system of neighborhoods $\{n(\mathcal{C}_i)\}_i$ for the cusps of $\mathcal{O}$ is called a \define{cusp expansion}. Given a cusp expansion for $\mathcal{O}$, the union $\bigcup_i \pi^{-1}(n(\mathcal{C}_i))$ of the inverse images of the cusp neighborhoods is called a \define{horoball packing} of $\mathbb{H}^3$. Such a horoball packing is called \define{maximal} if increasing the size of any cusp neighborhood will result in horoballs in the packing whose interiors are not disjoint. We are now ready to describe the (preferred) horoball packing associated to an FAL $L$, which will be our main tool for ruling out hidden symmetries in \Cref{sec:hidden_syms}. We start by describing a certain lift of $P_1\cup P_2$ to $\mathbb{H}^3$. Going forward we will identify $\mathbb{H}^3$ with the upper half-space model, with coordinates $(z,t)\in \mathbb{C}\times \mathbb{R}_{>0}$. We will identify $\partial \mathbb{H}^3$ with the Riemmann sphere $\widehat{\CC}$. Let $\tau$ be a shaded face of $P_1$, and lift $\tau$ so that it has its vertices at $0$, $\mathfrak{i}$ and $\infty$. Our choice of lift for $\tau$ determines a holonomy representation for $\pi_1(\SS^3\setminus L)$, and a covering map $\pi:\mathbb{H}^3\to \SS^3\setminus L$. The horoball packing we are interested in is provided by the following theorem of Futer--Purcell: \begin{thm}[\def\citeauthoryear##1##2{##1, ##2}\@internalcite{FP07}]\label{thm:hbp_FP07} Let $L$ be an FAL, and $\pi:\mathbb{H}^3\to \SS^3\setminus L$ the covering map described above. Then there exists a maximal horoball packing $\H$ of $\mathbb{H}^3$ such that for any edge $e$ in $\pi^{-1}(P_1\cup P_2)$, the \emph{midpoint} of $e$ is at a tangency of two horoballs. \end{thm} Here the \define{midpoint} of an edge $e$ is defined to be the intersection point of $e$ and a geodesic perpendicular to $e$ that emanates from the vertex $v$, where $v$ is the vertex that lies across the shaded face that $e$ bounds (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Figure 8]{FP07}). For example, the vertical edges of the triangle $\tau$ have midpoints at height 1, as can easily be checked. \Cref{thm:hbp_FP07} implies that the boundary of the horoball $H_\infty$ at infinity must be at height 1. To describe the other features of this horoball packing that will be important going forward, we will need to understand the neighborhood of the cusp at $\infty \in \partial \mathbb{H}^3$. To this end, let $L_0$ be the component of $L$ whose corresponding cusp in $\SS^3\setminus L$ lifts to $\infty$ under $\pi$. Then $\pi(\partial H_\infty)$ is a torus that bounds a neighborhood of this cusp. Let $T_0$ be a lift of this torus to $H_\infty$ so that $T_0$ lies above the first quadrant of $\mathbb{C}$ and has a corner at $(0,1)\in \mathbb{H}^3$. To ease exposition, it will be convenient to again restrict to the case where $L$ has no half-twists. In this case we have the following lemma from \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FP07}: \begin{lem}\label{lem:tiled} $T_0$ is tiled by a grid of rectangles, each of which has sides of length 1 parallel to the imaginary axis which intersect shaded faces of $P_1$ or $P_2$, and sides parallel to the real axis intersecting unshaded faces. If $L_0$ is a planar component of $L$ that passes through $m$ crossing disks (counted with multiplicity), then $T_0$ consists of $2m$ tiles and has meridian of length 2, which is parallel with the imaginary axis. If $L_0$ is a crossing circle, then $T_0$ consists of $2$ tiles and has longitude of length 2, parallel with the imaginary axis. See \Cref{fig:cusp_tiles}. \end{lem} \begin{figure}[h] \begin{subfigure}{.33\textwidth} \centering \includegraphics[scale=1.2]{truncation} \label{fig:truncation} \caption{} \end{subfigure} \begin{subfigure}{.40\textwidth} \centering \includegraphics[scale=1.2]{planar} \label{fig:planar} \caption{} \end{subfigure} \begin{subfigure}{.25\textwidth} \centering \includegraphics[scale=1.2]{ccircle} \label{fig:ccircle} \caption{} \end{subfigure} \caption{Tilings of a planar cusp (center) and a crossing circle cusp (right). Tiles $a,b,c,d$, and $e$ come from truncation of vertices of $P_1$ as shown (left), while tiles $a',b',c',d'$ and $e'$ come from truncating vertices of $P_2$. Vertices coming from crossing circles are colored red, and larger.} \label{fig:cusp_tiles} \end{figure} Now let $L_0$ be a planar component, and let the shaded faces that intersect the tiles of $T_0$ lie over the lines $\line_i=\{\Re(z)=l_i\}$ for $0\le i\le m-1$, where $l_0=0$. Then the points $l_i$, $l_i+\mathfrak{i}$, and $l_i+2\mathfrak{i}$ along the line $\line_i$ are vertices of two shaded faces, and each such vertex is connected by an edge to the vertex at $\infty$. These shaded faces map via $p$ to a crossing disk $D_j$, and $L_0$ must pass through this crossing disk, as it is a vertex of said shaded faces. Since the midpoint of a vertical edge is at height 1, it follows from \Cref{thm:hbp_FP07} that there is a diameter 1 horoball centered at each of these vertices. One of these horoballs (of which there are two up to deck transformation) corresponds to the crossing circle $C_j$ that bounds $D_j$. The other corresponds to the other planar component that passes through $D_j$ (which may be $L_0$ itself). Translating these by the meridian deck transformation, we get a line of \define{full-sized} (i.e., diameter 1) horoballs at the points $l_i+k\mathfrak{i}$ for $k\in\mathbb{Z}$, which correspond alternately to crossing circle and planar components of $L$ (see \Cref{fig:horo_lines}). While we restricted to FALs without half-twists to make the statement of \Cref{lem:tiled} more palatable, the consequences of the lemma that we are interested in hold when half-twists are present. In particular, the pattern of lines of alternating color horoballs shown in \Cref{fig:horo_lines} is still present. We leave details to the reader. \begin{figure} \centering \includegraphics[scale=.95]{horo_lines} \caption{Looking down from a planar cusp $L_0$ lifted to infinity in $\partial \mathbb{H}^3$, we see lines of full sized horoballs parallel to the imaginary axis of $\mathbb{C}\subset \partial \mathbb{H}^3$. Each line corresponds to a crossing disk that $L_0$ passes through, and the embedded $\mathbb{H}^2$ lying above such a line is the developing image in $\mathbb{H}^3$ of the crossing disk. Horoballs corresponding to crossing circles are colored red, and drawn thicker.} \label{fig:horo_lines} \end{figure} Going forward, we will be interested solely in the case where there is a single planar component $K_0$ of $L$. By the horoball packing $\H$, we will always mean the horoball packing obtained from \Cref{thm:hbp_FP07}, where the planar component $K_0$ corresponds to the vertex lifted to $\infty$. In this case, $K_0$ passes through every crossing disk, and every shaded face has two of its vertices corresponding to $K_0$. It follows from the above discussion that for every crossing circle $C_j$ there is a line $\line_{i_j}$ of full-sized horoballs in $\H$ in which the horoballs correspond alternately to $C_j$ and $K_0$. In fact, there are two such lines $\line_{i_j}$. It will be convenient to record the following important consequence: \begin{lem}\label{lem:tangent} Let $L$ be an FAL with one planar component $K_0$, and let $\H$ be the horoball packing described above (with $K_0$ at $\infty$). Then for every component of $L$, there is a full-sized horoball in $\H$, necessarily tangent to $H_\infty$, that is a lift of a neighborhood of that component. \end{lem} \subsection{Knot Complements via Dehn Filling FAL Complements} \label{subsec:SuffTwisted} Throughout this section, let $L = K_0 \sqcup C_1 \sqcup \dots \sqcup C_n$ be an FAL with one planar component $K_0$ and $n$ crossing circles $C_i$, $i=1,\dots, n$. In this section and going forward, we will abuse notation and refer to $K_0$ and the $C_i$ both as components of $L$, and as cusps of $\SS^3\setminus L$. Let $T_i$ be the torus boundary of a neighborhood of a crossing circle $C_i$. An isotopy class of simple closed curve on $T_i$ is naturally identified with a tuple $(p_i,q_i)\in \mathbb{Z} \times \mathbb{Z} \cong H_1(T_i,\mathbb{Z})$, where we identify the canonical meridian and longitude of $C_i$ with a basis for $H_1(T_i,\mathbb{Z})$. By removing a neighborhood of $C_i$ and gluing in a solid torus along $T_i$ so that its meridian glues to the curve $(p_i,q_i)$, we obtain the $(p_i,q_i)$--Dehn filling of $C_i$. The parameters $(p_i,q_i)$ describes the \define{slope} of the filling. When $\gcd(p_i,q_i)=1$ it is natural to identify the slope of a filling with the rational number $\frac{p_i}{q_i}$. The main goal of our work is to better understand the geometry and topology of knot complements obtained from high parameter fillings of FAL complements. In \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Pur07}, Purcell studies fillings of FALs that result in at least $c$ crossings per twist region, where $c>0$ is an explicit universal constant. This condition is equivalent to requiring that the Dehn filling slope on each crossing circle $C_i$ is $\frac{1}{q_i}$, for some $q_{i} \geq c/2$, $i =1, \ldots, n$. A knot with this property is often called a highly twisted knot. Similar to Purcell, we will analyze knots with a large number of twists in each twist region. In some sense, the complement of such a knot is geometrically similar to the corresponding FAL complement, and we can control certain geometric aspects of the knot complement by leveraging the well-understood structure of the FAL complement. Specifically, we want to obtain control over the short geodesics in an FAL filling using the thick/thin decomposition of orbifolds, which we now define. Let $\mathcal{O} = \mathbb{H}^3 / \Gamma$ be a finite volume hyperbolic $3$-orbifold. Given $\epsilon > 0$, the \define{$\epsilon$-thick part} of $\mathcal{O}$ is defined as $$ \mathcal{O}_{\geq \epsilon} \coloneqq \{ x \in \mathcal{O} : d(\tilde{x}, \alpha \tilde{x}) \geq \epsilon \hspace{0.05in} \text{for all infinite order} \hspace{0.05in} \alpha \in \Gamma \hspace{0.05in} \text{and all lifts} \hspace{0.05in} \tilde{x} \in \mathbb{H}^3 \hspace{0.05in} \text{of} \hspace{0.05in} x \}. $$ The \define{$\epsilon$-thin part} of $\mathcal{O}$ is defined to be $\mathcal{O}_{< \epsilon} \coloneqq \mathcal{O}\setminus \mathcal{O}_{\geq \epsilon}$, the complement in $\mathcal{O}$ of the $\epsilon$-thick part. We refer the reader to \def\citeauthoryear##1##2{##1, ##2}\@internalcite{DunbarMeyerhoff1994} for a more thorough background on the thick/thin decomposition and other geometric properties of hyperbolic $3$-orbifolds. \subsubsection{$(\epsilon,d_L)$-twisted knot complements} \label{subsub:Twistedknots} Let $\SS^{3} \setminus K$ be a knot complement obtained by Dehn filling each crossing circle $C_i$ of $\SS^3\setminus L$ along a curve of slope $\frac{1}{q_{i}}$, and let $d_L=4\frac{vol(\SS^3\setminus L)}{v_0}$, where $v_0$ is the volume of the regular ideal tetrahedron. This setup implies that $L$ has one planar component. \begin{defin}\label{def:edHT} We say that $\SS^{3} \setminus K$ is \define{$(\epsilon,d_L)$-twisted}, or alternatively that $\SS^{3} \setminus K$ is an \define{$(\epsilon,d_L)$-twisted filling} of $\SS^3 \setminus L$ , if the following three conditions hold: \begin{enumerate}[label=(\roman*)] \item $(\SS^3 \setminus L)_{\geq \epsilon}$ is homeomorphic to $\SS^3 \setminus n(L)$, \item $(\SS^{3} \setminus K)_{\geq \epsilon}$ is homeomorphic to $(\SS^3 \setminus L)_{\geq \epsilon}$, and \item $(\SS^{3} \setminus K)_{\geq \epsilon/d_{L}}$ is homeomorphic to $(\SS^3 \setminus L)_{\geq \epsilon}$. \end{enumerate} \end{defin} For a more general version of this definition, see \Cref{sec:QR}. In this setting $\SS^{3} \setminus K$ is a knot complement with a suitable number of twists in each twist region, where the number of twists depends on the geometry of $\SS^3 \setminus L$. This distinguishes our $(\epsilon, d_L)$-twisted knots from Purcell's highly twisted knots, where the number of the twists required is independent of the geometry of $\SS^3 \setminus L$. We note here that with this definition, the figure-8 knot is \emph{not} $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ for any choice of $\epsilon$. This follows from observing that the systole of the figure-8 is $1.0870..$, while its FAL ancestor the Borromean rings has systole $2.122..$ and volume $7.327..$, so that $\frac{\epsilon}{d_L}\le \frac{(2.122..)}{4 (7.327..)/v_0}<1.0870$, and (iii) cannot hold. Our reason for wanting to rule out the figure-8 knot complement is that it is the only knot complement that is an \emph{arithmetic} manifold, by \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Reid91} (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite{NR92} for relevant background on arithmetic manifolds). Thus, it follows that any knot complement that is $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ is necessarily \emph{non-arithmetic}. This fact is important because it allows us to use the following lemma, which along with the proof of \Cref{prop:HT_non-empty} below, explains our choice of the constant $d_L$ in \Cref{def:edHT}. \begin{lem}\label{lem:min_vol_non_arithmetic} Let $\mathcal{Q}$ be a cusped non-arithmetic orbifold. Then $vol(\mathcal{Q}) \geq \frac{v_0}{4}$. \end{lem} \begin{proof} The statement follows from Adams' census of all cusped hyperbolic orbifolds with volume less than $\frac{v_0}{4}$ \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 6.2.]{Ad92} and Neumann--Reid's observations that each element of this census is arithmetic \def\citeauthoryear##1##2{##1, ##2}\@internalcite{NR92b}. \end{proof} In the next proposition, we show that $(\epsilon,d_L)$-twisted fillings exist in abundance, and have a nice orbifold covering property. In what follows, let $\gamma_{i}\subset \SS^3\setminus K$ be the core geodesic of the solid torus introduced by filling the $i^{th}$ crossing circle cusp of $\SS^{3} \setminus L$, for $i=1, \ldots, n$. \begin{prop}\label{prop:HT_non-empty} Let $\L=\SS^3 \setminus L$ be an FAL with one planar component and $n$ crossing circle components. Choose some ordering of the $n$ crossing circles. \begin{enumerate} \item There exists $\epsilon>0$, and positive integers $k_1,\dots, k_n$, such that if the $|q_i|\ge k_i$ for all $i$ then filling the $n$ crossing circle cusps along $\alpha=(\frac{1}{q_i},\dots,\frac{1}{q_n})$ results in an $(\epsilon,d_L)$-twisted knot complement. \item If $\mathcal{K}=\SS^{3} \setminus K$ is a $(\epsilon,d_L)$-twisted filling of $\L$ and $p:\mathcal{K} \rightarrow \mathcal{O}$ is an orbifold cover, then there is an orbifold cover $p_N: \L \rightarrow \mathcal{Q}$, where $\mathcal{Q} \cong \mathcal{O} \setminus \sqcup_{i=1}^{n} p(\gamma_{i})$. \end{enumerate} \end{prop} The following proof utilizes properties of geometric convergence. For further background on these ideas we refer the reader to \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Chapter E]{BP92}, \def\citeauthoryear##1##2{##1, ##2}\@internalcite{DunbarMeyerhoff1994}, and Thurston's notes \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Thu78}. \begin{proof} Let $\L=\SS^3\setminus L$, and denote by $\L_\alpha$ the Dehn filling of $\L$ along $\alpha=(\frac{1}{q_i},\dots,\frac{1}{q_n})$. Part (1): To start, we require our choice of $\epsilon$ to be smaller than the systole length of $\L$. Such a choice of $\epsilon$ immediately satisfies item (i) from the definition of $(\epsilon,d_L)$-twisted. After making $\epsilon$ smaller if necessary, \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 5.4, $(2) \Rightarrow (3)$]{DunbarMeyerhoff1994} implies that there exists $q_1,\dots,q_n$ such that for $|q_i|\ge k_i$, we have $(\L_\alpha)_{\geq \epsilon}$ is homeomorphic to $\L_{\geq \epsilon}$, showing item (ii) holds. In particular, this implies that $(\L_\alpha)_{< \epsilon}$ consists of a neighborhood of the planar cusp $K_0$, and a tubular neighborhood of each core geodesic introduced by Dehn filling a crossing circle. Furthermore, \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 5.4, $(2) \Rightarrow (3)$]{DunbarMeyerhoff1994} implies that the lengths of these core geodesics converge to zero, and the lengths of other geodesics in $\L_\alpha$ remain bounded below by $\epsilon$, as the $|q_i|$ go to $\infty$. Thus by making the $k_i$ larger if necessary, we can guarantee that $(\L_\alpha)_{\ge \epsilon/d_L}$ is homeomorphic to $(\L_\alpha)_{\geq \epsilon}$, while ensuring that (ii) still holds, giving (iii). Part (2): Let $\mathcal{K}$ be an $(\epsilon,d_L)$-twisted filling of $\L$ as given by Part (1) and let $d_p$ be the degree of the cover $p$. Since $\mathcal{K}$ is non-arithmetic, we have by \Cref{lem:min_vol_non_arithmetic} that $vol(\mathcal{O})\ge \frac{v_0}{4}$. Since volume decreases under Dehn filling, it follows that ${d_p =\frac{vol(M)}{vol(\mathcal{O})}\le \frac{vol(\SS^3\setminus L)}{\rfrac{v_0}{4}}=d_L}$. Hence $0<\frac{d_p}{d_L} \leq 1$ and we have that $\mathcal{K}_{< \epsilon/d_{L}}\subset p^{-1}(\mathcal{O}_{< \epsilon/d_{L}})\subset \mathcal{K}_{< \epsilon}$. Since $\mathcal{K}$ is $(\epsilon,d_L)$-twisted, its $\epsilon$-thick and $\epsilon/d_{L}$-thick parts are homeomorphic, and so, $p^{-1}(\mathcal{O}_{\geq \epsilon/d_{L}})$ is homeomorphic $\mathcal{K}_{\geq \epsilon/d_{L}}$. Let $\mathcal{Q} = \mathrm{int}(\mathcal{O}_{\geq \epsilon/d_{L}})$. Since $\mathcal{K}_{< \epsilon/d_{L}}$ contains only neighborhoods of the core geodesics $\gamma_i$ and of the planar cusp, it follows that $\mathcal{Q}\cong \mathcal{O}\setminus \sqcup_{i=1}^n p(\gamma_i)$. Since $\mathcal{K}$ is $\epsilon/d_L$-twisted, $\mathcal{K}_{\geq \epsilon/d_{L}}$ is homeomorphic to $\SS^3 \setminus n(L)$. Thus we get a cover $p_{\L}:\L \to \mathcal{Q}$, summarized below: \begin{figure}[ht] $$ \xymatrix{ \L \ar@{.>}[dr]_{p_N} \ar@{>}[r]^{\cong\qquad\,\,\,} & \mathrm{int}(\mathcal{K}_{\geq \epsilon/d_{L}}) \ar@{>}[r]^\cong & p^{-1}(\mathrm{int}(\mathcal{O}_{\geq \epsilon/d_{L}})) \ar@{->}[d]^p\\ & \mathcal{Q} & \mathrm{int}(\mathcal{O}_{\geq \epsilon/d_{L}}) \ar@{>}[l]_\cong} $$ \caption{\label{fig:edL_coverings} A schematic for covers used in the proof of \Cref{prop:HT_non-empty}. We stress that with respect to $p_N$ no geodesic in the $\epsilon$-thick part of $M$ can cover a geodesic in the $\epsilon/d_L$-thin part of $\mathcal{Q}$.} \end{figure} \end{proof} \begin{rem} In \Cref{sec:QR}, we produce a quantified version of \Cref{prop:HT_non-empty} by implementing recent tools developed by Futer--Purcell--Schleimer \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FPS19}. We also discuss how some of the dependencies on the geometry of $N$ can be simplified if we restrict to filling certain subclasses of FAL complements. \end{rem} The relevance of the proposition above to this paper is made clear by the following theorem of Neumann and Reid, which relates hidden symmetries of a knot complement to covering a rigid cusp orbifold. Recall that there are 3 types of Euclidean turn-overs: $\SS^2(2,3,6)$, $\SS^2(2,4,4)$, and $\SS^2(3,3,3)$. An orientable cusped orbifold is said to have a \define{rigid cusp} if it has a cusp with cross section of Euclidean turn-over. Otherwise, an orientable cusped orbifold is said to have non-rigid cusps. There are two types of non-rigid cusps: pillow-cases, which are homeomorphic to $\SS^{2}(2,2,2,2)$, and tori. \begin{thm}[{\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 9.1]{NR92}}]\label{thm:NR} Let $\SmK$ be a hyperbolic knot complement. Then $\SmK$ admits hidden symmetries if and only if $\SmK$ covers a rigid cusped orbifold. \end{thm} In the context of \Cref{prop:HT_non-empty}, this theorem tells us that if we can show that $\mathcal{O}$ does not have a rigid cusp, then it follows that $M$ does not admit hidden symmetries. The proposition allows us to pass to the orbifold $\mathcal{Q}$, and show instead that the corresponding cusp of $\mathcal{Q}$ is non-rigid. To show this, we will need to use the fact that the other cusps of $\mathcal{Q}$ must also be non-rigid, which follows from the fact that rigid cusps cannot be Dehn filled. This fact is discussed below in \Cref{sub:orbDehnFilling}, where we also give a detailed description of fillings of non-rigid cusps by solid torus quotients. Although such a description is really only needed as background for the proof of \Cref{lem:no_knot_covers}, we include it here since it has the added benefit of providing a description of the thin part $\mathcal{O}_{< \epsilon}$ of $\mathcal{O}$ (recall from the proof of \Cref{prop:HT_non-empty} that $\mathcal{Q}$ is obtained by removing $\mathcal{O}_{< \epsilon}$ from $\mathcal{O}$). Components of $\mathcal{O}_{< \epsilon}$ consist of the quotients of solid tori described below. We note that the core geodesics $p(\gamma_i)$ of $\mathcal{O}$ correspond in the description below to the curves and arcs of $n$-torsion in the solid torus quotients (where we may have $n=1$). \subsubsection{Orbifold Dehn filling}\label{sub:orbDehnFilling} An important distinction between rigid and non-rigid cusps is that non-rigid cusps have well-defined slopes. We include the discussion here to keep the paper self-contained and to set ideas and notation used later (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Section 4]{DunbarMeyerhoff1994} for further discussion of orbifold Dehn filling). First, consider a torus cusp $T$ of an orbifold $\mathcal{O}$. Such a cusp is filled using an \define{orbi-torus} $D^2(n) \times \SS^1$, where for $n=1$ we just have the solid torus $D^2\times \SS^1$. Alternatively, we could consider an orbi-torus as the quotient of a solid torus by an order-$n$ rotation about its core. Associated to a primitive element $(p,q)\in H_1(T,\mathbb{Z})$ is a simple closed curve $\alpha$. If we glue the meridian $\partial(D^2(n)\times \{0\})$ of an orbi-torus to $\alpha$, then we say that the fillings slope is $(np,nq)$. Thus the filling slope describes a multi-curve ($n$ copies of $\alpha$) that becomes trivial in the orbifold fundamental group of the filled orbifold. For an $\SS^2(2,2,2,2)$ cusp $P$ we fill using the order-2 quotient of an orbi-torus, which we call an \define{orbi-tangle}. This is a 2-strand rational tangle in a ball, with each strand labeled by 2-torsion, and an arc labelled by $n$-torsion connecting the strands of the tangle. When $n=1$ this is the 2-fold quotient of a solid torus (with fixed points on the boundary). A slope on $P$ is defined via a covering map $p: T \rightarrow P$, where $T$ is a torus. Any essential simple closed curve $\alpha$ on $T$ (which we may assume avoids the singularities) will project to an essential simple closed curve $\bar{\alpha}$ on $P$. We define a slope for such a closed curve in $P$ in terms of the slope it lifts to in $T$. If we are gluing in an orbi-tangle with $n$-torsion on the arc between the tangles, then there is an orbi-disk $D^2(n)$ properly embedded in the orbi-tangle that separates the two tangle strands. The orbi-tangle is glued to $P$ in such a way that the boundary of the orbi-disk glues to $\bar{\alpha}$ on $P$. If the slope of $\bar{\alpha} \subset P$ is $(p,q)$, then the filling slope for such a filling is $(np,nq)$. As with the torus filling, the filling slope describes a multi-curve ($n$ copies of $\alpha$) that becomes trivial after filling. On the other hand, it is not possible to (non-trivially) fill a rigid cusp of an orbifold. This is because no solid-torus quotient has a turnover as its boundary. We record this important fact in the following lemma: \begin{lem} \label{lem:slopes} Given any cusped (finite volume) hyperbolic $3$-orbifold $\mathcal{O}$, Dehn fillings can be performed only along non-rigid cusps. \end{lem} For a hyperbolic 3-orbifold $\mathcal{O}$, each slope we Dehn fill along is associated to a parabolic element of the fundamental group. If we inflate a (maximal) cusp neighborhood of a 3-orbifold and use that to determine a horoball packing of $\mathbb{H}^3$, we define the \define{length} of a slope to be the displacement of the parabolic in the appropriate horosphere. We point out that for any cover of $\mathcal{O}$ in which a slope lifts, this gives a consistent measure of the length of that slope. \subsubsection{$(\epsilon,d_L)$-twisted and generic knot complements} \label{subsub:TandGknots} Generically, one should expect the $\epsilon$-thin part of an orbifold or manifold to be a set of non-isometric tubes and a set of non-isometric cusp neighborhoods. This motivates the following definition: \begin{defin} We say that $\SS^3\setminus K$ is an \define{$(\epsilon,d_L)$-twisted and generic} filling of $\SS^3\setminus L$ if it is $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and no isometry of $\SS^3\setminus K$ non-trivially permutes the set of core geodesics of the filling solid tori. \end{defin} The above condition is satisfied if $(\SS^3 \setminus K)_{< \epsilon}$ is a set of (disjoint) pairwise non-isometric tubular neighborhoods of geodesics and a single cusp neighborhood. For example, this will be true if the geodesics in the filling solid tori all have different lengths. Note that if $\SS^3\setminus L$ has no symmetries that non-trivially permute crossing circle cusps, then \emph{every} $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ filling is generic in the sense of the above definition. This is because any isometry of $\SS^3\setminus K$ that permutes core geodesics restricts to a symmetry of $(\SS^3\setminus K)_{\geq \epsilon}$ permuting the corresponding boundary tori, and $(\SS^3\setminus K)_{\geq \epsilon}$ is homeomorphic to $\SS^3\setminus n(L)$. Since symmetry groups of link complements can be rigorously computed by SnapPy, this allows us to identify certain FALs for which all sufficiently long fillings are $(\epsilon,d_L)$-twisted and generic (see \Cref{subsec:examples-twisted-generic}). Certainly, though, this condition on the symmetry group of $\SS^3\setminus L$ is far from necessary, as the following proposition demonstrates. \begin{prop}\label{prop:HTHD_exist} For any FAL complement $N= \SS^3 \setminus L$ with one planar component, $(\epsilon,d_L)$-twisted and generic fillings exist. \end{prop} \begin{proof} By \Cref{prop:HT_non-empty} there are positive integers $q_1,\dots,q_n$ such that if $|q_i|\ge k_i$, then filling along $\alpha=(\frac{1}{q_1},\dots,\frac{1}{q_n})$ results in an $(\epsilon,d_L)$-twisted knot complement. Choose an ordering of the crossing circle cusps $\{C_1,...,C_n\}$ of $\SS^3 \setminus L$ and let $\alpha = (\frac{1}{q_{1}}, \ldots, \frac{1}{q_{n}})$ be a multi-slope with $|q_i|\ge k_i$ for all $i$. Then any multi-slope $\alpha' = (\frac{1}{q'_{1}}, \ldots, \frac{1}{q'_{n}})$ with each $ |q_i'| \geq |q_i|$ will also produce an $(\epsilon,d_L)$-twisted filling. To guarantee that such a filling is both $(\epsilon,d_L)$-twisted and generic, first fix a filling $\frac{1}{q'_1}$ for any $|q_1'|\ge |q_1|$ on the first crossing circle cusp. Then choose filling slope $\frac{1}{q'_2}$ for $C_2$, with $|q'_2| \geq |q_2|$, so that the core geodesics of the filling tori for $C_1$ and $C_2$ have distinct lengths. This will be true for all but finitely many choices of $q'_2$, since the length of the core geodesic goes to 0 as $q_2'$ goes to infinity. Continuing this procedure, choose the filling slope $\frac{1}{q'_{i}}$ for $C_i$, with $|q'_i| \geq |q_i|$, so that the resulting core geodesic does not have the same length as that associated to any previous filling. Since $|q_i'|\ge k_i$ for all $i$ and the core geodesics of filling solid tori have distinct lengths, the resulting filling is $(\epsilon,d_L)$-twisted and generic. \end{proof} \begin{rem} Though \Cref{prop:HTHD_exist} is only an existence statement, the proof shows that given any FAL complement, many of its fillings will be $(\epsilon,d_L)$-twisted and generic. In particular, the above proof did not rely on the choice of ordering of the cusps, and only required omitting finitely many fillings at each step (though this finite number will generally depend on the filling slopes of previously filled cusps). However, we make no formal claim that $(\epsilon,d_L)$-twisted and generic fillings are generic in a precise probabilistic sense, as we prefer to avoid discussions about probability measures that would take us too far from the goals of this paper. \end{rem} An important feature of $(\epsilon,d_L)$-twisted and generic fillings is that we can understand their symmetries in terms of symmetries of $\SS^3 \setminus L$ that map each cusp to itself. Recall that the orientation-preserving symmetry group of a hyperbolic $3$-manifold $M$ consists of the orientation-preserving homeomorphisms of $M$, up to isotopy; we denote this group by $Sym^{+}(M)$. The following proposition is key for the proof of \Cref{thm:max_size_sym_group}. \begin{prop} \label{prop:symrelation} Let $\mathcal{K}$ be an $(\epsilon,d_L)$-twisted filling of $\L=\SS^3 \setminus L$. Then there exists a monomorphism $f: Sym^{+}(\mathcal{K}) \hookrightarrow Sym^{+}(\L)$ such that for all $\beta \in Sym^{+}(\mathcal{K})$, $f(\beta)$ permutes the crossing circle cusps of $\L$. Furthermore, $\mathcal{K}$ is $(\epsilon,d_L)$-twisted and generic if and only if, for every $\beta\in Sym^{+}(\L)$, $f(\beta)$ maps every cusp of $\L$ to itself. \end{prop} \begin{proof} Let $\mathcal{K}$ be an $(\epsilon,d_L)$-twisted filling of $\L$ and let $\{ \gamma_{i} \}_{i=1}^{n}$ be the set of core geodesics in $\mathcal{K}$ introduced by Dehn filling the crossing circle cusps of $\L$. Then since $\{ \gamma_{i} \}_{i=1}^{n}$ are the only geodesics in $\mathcal{K}$ with length less than $\epsilon$, any $\beta \in Sym^{+}(\mathcal{K})$ must map this set of geodesics to itself. As a result, Kojima \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Lemma 5]{K88} gives a monomorphism ${f: Sym^{+}(\mathcal{K}) \hookrightarrow Sym^{+}(\L)}$. This monomorphism is called \textit{rest} in Kojima's paper, and comes from restricting the domain of any symmetry of $\mathcal{K}$ to $\mathcal{K}_{\geq \epsilon/d_{L}}$. Furthermore, Kojima's work implies that any $f(\beta)$ must fix the meridional classes of $C_1 \sqcup \dots \sqcup C_n$, and therefore must permute the cusps $\{C_1,\dots,C_n\}$. Now, assume $\mathcal{K}$ is $(\epsilon,d_L)$-twisted and generic. Then any $\beta \in Sym^{+}(\mathcal{K})$ must map each $\gamma_{i}$ to itself, for $i=1, \ldots, n$. Suppose $f(\beta)$ exchanges two cusps of $\L$. By the previous paragraph, we know that $f(\beta)$ must exchange two crossing circle cusps of $\L$. However, since the monomorphism $f$ comes from restricting symmetries of $\mathcal{K}$, the previous sentence implies that there is a symmetry of $\mathcal{K}$ that exchanges some $\gamma_{i}$ and $\gamma_{j}$, where $i \neq j$, which is a contradiction. Likewise, if every $f(\beta)$ maps every cusp of $N$ to itself, then we must have that each corresponding $\beta$ maps each core geodesic obtained from Dehn filling to itself, which implies $\mathcal{K}$ is $(\epsilon,d_L)$-twisted and generic. \end{proof} \section{Commensurability classes of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knots}\label{sect:unique_in_comm_class} In this section, we show that an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complement with at least 9 twist regions, each having at least 6 crossings, is the only knot complement in its commensurability class. Proving this result will rely on our classifications of hidden symmetries and symmetries from \Cref{sec:hidden_syms} and \Cref{sec:sym}, along with an analysis of short filling slopes for these knot complements and the orbifolds that they cover. In particular, the aforementioned lower bound on the number of twists regions and crossings will imply a lower bound on filling slope lengths, allowing us to obstruct non-hyperbolic surgeries, which by a theorem of Boileau--Boyer--Cebanu--Walsh will imply the claimed result. To be more specific, Boileau, Boyer, Cebanu and Walsh \def\citeauthoryear##1##2{##1, ##2}\@internalcite{BBCW12} showed that if a hyperbolic knot complement $\SS^3 \setminus K$ without hidden symmetries is commensurable with a second (distinct) knot complement $\SS^3 \setminus K'$, then both knot complements cover an orbifold $\mathcal{Q}$ with a torus cusp, and both covers are cyclic. In fact, the authors show that the set of knot complements that cover $\mathcal{Q}$ are in bijective correspondence with the set of finite cyclic fillings of $\mathcal{Q}$ (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 4.13]{BBCW12}). Their work also defines and characterizes \define{orbi-lens spaces}, which are cyclic quotients of $\SS^3$ (in the case that the quotient acts freely on $\SS^3$, the resulting space is just a lens space). Thus if $\SS^3\setminus K$ is commensurable with another knot complement, then it covers an orbifold with two distinct orbi-lens space fillings. The main technical result of this section will rule out the existence of orbi-lens space fillings on the quotients of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements. \subsection{Geometric Bases} \label{sec:GeometricBases} We begin by discussing geometric bases for co-compact groups of translations in the plane. We will identify the plane with $\mathbb{C}$, with the structure of a 2-dimensional $\mathbb{R}$-vector space. We say a \define{geometric basis} for such a group $G$ is a set of two $\mathbb{R}$-linearly independent elements $\{a,b\}$ of $\mathbb{C}$ such that for any $n,m \in \mathbb{Z}$ we have $|a| \leq |na+mb|$ and $|b| \leq |na+mb|$. A geometric basis can be found by a greedy algorithm. We start with the observation that given two non-zero elements $a,b \in \mathbb{C}$, $|ta+b|$ has a unique minimum for $t\in \mathbb{R}$ and one or two minima for $t \in \mathbb{Z}$. Moreover, if $|ta+b| \le |(t+1)a+b|$, then either $|(t-1)a+b| < |ta+b|$ or $|ta+b|$ is a minimum for $t \in \mathbb{Z}$. (Of course if $|(t \pm 1)a+b| = |ta+b|$, then both $|(t\pm 1)a+b|$ and $|ta+b|$ are minima.) In this way, we can start with two elements that form a basis $\{a,b\}$ (assume $|a| \leq |b|$) and replace $b$ with $ta+b$ to form a basis with shorter entries. If $|ta+b| < |a|$ we switch the roles of $a, b$ above and repeat until the process terminates. Note that even up to ordering such that $|a| \leq |b|$ a geometric basis might not be unique. For example, non-uniqueness occurs if $|b|= |a+b|$ or $|b|=|-a+b|$. The following proposition relates a geometric basis for a group of translations $G_1$ to geometric bases of an index 2 subgroup $G_2$. When used in context, $G_1$ will correspond to the peripheral subgroup of an orbifold and $G_2$ will be the peripheral subgroup of its manifold cover. Of course, the proposition applies much more generally. \begin{prop}\label{prop:quotientbases} Let $G_1$ be co-compact group of translations with geometric basis $\{a, b\}$, $|a|\le |b|$, and let $G_2$ be an index 2 subgroup. Then one of the following holds: \begin{enumerate} \item $a \in G_2$ and $2b \in G_2$, and $\{a, 2b\}$ or $\{a, a \pm 2b\}$ form a geometric basis for $G_2$, \item $2a \in G_2$ and $b \in G_2$ and $\{b, 2a\}$ or $\{b, b \pm 2a\}$ form a geometric basis for $G_2$, \item $a\pm b \in G_2$ and a geometric basis is a subset of $\{a \pm b, 2a\}$. \end{enumerate} \end{prop} The above proposition follows from a straightforward application of the greedy algorithm to each of the kernels of the three possible surjective maps from $\mathbb{Z} \times \mathbb{Z} \rightarrow \mathbb{Z}/2\mathbb{Z}$. \begin{lem}\label{lem:bounds} Let $G_1$ be co-compact group of translations with geometric basis $\{a_1, b_1\}$, and let $G_2$ be an index 2 subgroup with geometric basis $\{a_2,b_2\}$. If $|a_2|=2$ and $|b_2|>16$, then either $|b_1|>6$ or $|a_1|>6$. \end{lem} \begin{proof} If $|a_1|\le |b_1|$, then \Cref{prop:quotientbases} gives the possible bases for $G_2$. If $|b_1|<|a_1|$ then cases (1) and (2) in \Cref{prop:quotientbases} are unaffected, and in case (3) we simply exchange the roles of $a=a_1$ and $b=b_1$, giving the additional possible bases $\{2b_1, a_1\pm b_1\}$. \Cref{tab:short_quotient_slopes} shows all possible bases $\{a_2,b_2\}$, and the resulting bounds on $a_1$ and $b_1$. \end{proof} \begin{table}[ht] \begin{tabular}{|c|c|c|c|c||c|c|c|c|} \hline &$a_2$ & $b_2$ & $|a_2|$ & $|b_2|$ & $a_1$ & $b_1$ & $|a_1|$ & $|b_1|$\\ \hline \hline \multirow{3}{*}{(1)} &$a_1$ & $2b_1$ & 2 & $>12$ & $a_2$ & $ \frac{1}{2}b_2$ & 2 & $>6$\\ &$a_1$ & $a_1+2b_1$ & $2$ & $>14$ & $a_2$ & $\frac{1}{2}(b_2-a_2)$ & $2$ & $>6$\\ &$a_1$ & $a_1-2b_1$ & $2$ & $>14$ & $a_2$ & $\frac{1}{2}(a_2-b_2)$ & $2$ & $>6$\\ \hline \multirow{3}{*}{(2)}& $2a_1$ & $b_1$ & $2$ & $>6$ & $\frac{1}{2}a_2$ & $ b_2$ & $1$ & $>6$\\ &$b_1+2a_1$ & $b_1$ & $2$ & $>6$ & $\frac{1}{2}(a_2-b_2)$ & $ b_2$ & $>2$ & $>6$\\ &$b_1-2a_1$ & $b_1$ & $2$ & $>6$ & $\frac{1}{2}(b_2-a_2)$ & $b_2$ & $>2$ & $>6$\\ \hline \multirow{10}{*}{(3)} &\cellcolor{Gray} $a_1+b_1$ &\cellcolor{Gray} $a_1-b_1$ &\cellcolor{Gray} $2$ &\cellcolor{Gray} $>14$ &\cellcolor{Gray} $\frac{1}{2}(a_2+b_2)$ &\cellcolor{Gray} $\frac{1}{2}(a_2-b_2)$ &\cellcolor{Gray} $>6$ &\cellcolor{Gray} $>6 $ \\ &\cellcolor{Gray} $a_1-b_1$ &\cellcolor{Gray} $a_1+b_1$ &\cellcolor{Gray} $2$ &\cellcolor{Gray} $>14$ &\cellcolor{Gray} $\frac{1}{2}(a_2-b_2)$ &\cellcolor{Gray} $\frac{1}{2}(a_2+b_2)$ &\cellcolor{Gray} $>6$ &\cellcolor{Gray} $>6$ \\ &\cellcolor{Gray} $a_1+b_1$ &\cellcolor{Gray} $2a_1$ &\cellcolor{Gray} $2$ &\cellcolor{Gray} $>16$ &\cellcolor{Gray} $\frac{1}{2}b_2$ &\cellcolor{Gray} $a_2- \frac{1}{2}b_2$ &\cellcolor{Gray} $>8$ &\cellcolor{Gray} $>6$\\ & $2a_1$ & $a_1+b_1$ & $2$ & $>7$ &$\frac{1}{2}a_2$ & $b_2- \frac{1}{2}a_2$ & $1$ & $>6$\\ &\cellcolor{Gray} $a_1+b_1$ &\cellcolor{Gray} $2b_1$ &\cellcolor{Gray} $2$ &\cellcolor{Gray} $>16$ &\cellcolor{Gray} $a_2-\frac{1}{2}b_2$ &\cellcolor{Gray} $\frac{1}{2}b_2$ &\cellcolor{Gray} $>6$ &\cellcolor{Gray} $>8$\\ & $2b_1$ & $a_1+b_1$ & $2$ & $>7$ & $b_2-\frac{1}{2}a_2$ &$\frac{1}{2}a_2$ & $ >6$ & $1$\\ &\cellcolor{Gray} $a_1-b_1$ &\cellcolor{Gray} $2a_1$ &\cellcolor{Gray} $2$ &\cellcolor{Gray} $>16$ &\cellcolor{Gray} $a_2+\frac{1}{2}b_2$ &\cellcolor{Gray} $\frac{1}{2}b_2$&\cellcolor{Gray} $>6$ &\cellcolor{Gray} $>8$\\ & $2a_1$ & $a_1-b_1$ & $2$ & $>7$ &$\frac{1}{2}a_2$& $b_2+\frac{1}{2}a_2$ &$1$ & $>6$\\ &$a_1-b_1$ & $2b_1$ & $2$ & $>16$ & $a_2+\frac{1}{2}b_2$ & $\frac{1}{2}b_2$& $>6$ & $>8$\\ & $2b_1$ & $a_1-b_1$ & $2$ & $>7$ & $b_2+\frac{1}{2}a_2$ & $\frac{1}{2}a_2$& $>6$ & $1$\\ \hline \end{tabular} \caption{\label{tab:short_quotient_slopes} The relations and lengths for $a_1$, $b_1$, $a_2$, $b_2$, with rows grouped by the case breakdown in \Cref{prop:quotientbases}. A shaded row means that the choices of $a_1$ and $b_1$ cannot form a geometric basis given the constraints on $a_2$ and $b_2$, but are still relevant when accounting for short parabolic elements. For example, if $a_1=\frac{1}{2}(a_2+b_2)$ and $b_1=\frac{1}{2}(a_2-b_2)$ are a basis with $|a_2|=2$ and $|b_2|> 13$ then $a_2 = a_1+ b_1$ is shorter than both basis elements. Finally, we note that $|b_2|>16$ is the cutoff we need. } \end{table} \subsection{Orbifold Dehn fillings} \label{sect:6Theorem} We say a \define{good orbifold} is an orbifold that is covered by a manifold. Otherwise, it is \define{bad}. An orientable 2-orbifold is \define{bad} if it is $S^2(n)$ or $S^2(n,m)$ such that $n\ne m$ (see for example \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 2.10]{BMP03}). Rather directly, we can see that an orientable $3$-orbifold is bad if it contains a bad $2$-suborbifold. The following theorem of Boileau, Mallot, and Porti shows this is actually equivalent to being bad: \begin{thm} [{\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 3.28]{BMP03}}] A compact 3-orbifold is the quotient of a compact 3-manifold by an orientation preserving finite group action if and only if it does not contain a bad 2-suborbifold. \label{thm:BMP03} \end{thm} We now prove a weak corollary of the 6 Theorem of Agol \def\citeauthoryear##1##2{##1, ##2}\@internalcite{agol2000bounds} and Lackenby \def\citeauthoryear##1##2{##1, ##2}\@internalcite{lackenby2000word}, which will be sufficient for our purposes. In particular, our eventual goal is to obstruct orbi-lens space fillings of certain hyperbolic orbifolds having no short filling slopes (with length as defined in \Cref{sub:orbDehnFilling}). Since orbi-lens spaces are good {(they are covered by $\SS^3$)}, it is enough then to show that filling along a long slope (i.e., one of length greater than 6) results in an orbifold that is either hyperbolic or contains a bad 2-suborbifold. Our statement is as follows: \begin{thm} \label{thm:orb_6_theorem} Let $\mathcal{Q}$ be an (orientable) hyperbolic 3-orbifold that is the quotient of a hyperbolic $3$-manifold with torus cusps and assume the singular locus of $\mathcal{Q}$ is either empty, a single embedded knot $\Sigma$ consisting of cone points of order $n$, or a set of properly embedded arcs and simple closed curves all having cone points of order $2$. Furthermore, denote by $\mathcal{H}_\mathcal{Q}$ an (embedded) horoball packing of $\mathcal{Q}$. Let $\alpha$ be a multi-slope of $\mathcal{Q}$ such that the length of each component of $\alpha$ measured by its displacement in $\mathcal{H}_\mathcal{Q}$ is greater than $6$. Then $\mathcal{Q}(\alpha)$, the orbifold resulting from filling along $\alpha$, is either hyperbolic or contains a bad 2-suborbifold. \end{thm} \begin{proof} If $\mathcal{Q}$ is a manifold, then the standard 6 Theorem applies. So, assume the set of cone points of $\mathcal{Q}$ is non-empty. If $\mathcal{Q}(\alpha)$ contains a bad 2-suborbifold, we are done. Thus we may assume that $\mathcal{Q}(\alpha)$ is good and appeal to \Cref{thm:BMP03}, which gives a manifold cover $p:M_\alpha \rightarrow \mathcal{Q}(\alpha)$, for some 3-manifold $M_\alpha$. Let $\overline{\mathcal{Q}}$ be the result of drilling out from $\mathcal{Q}(\alpha)$ the surgery solid tori and surgery solid pillowcases (so that $\mathrm{int}(\overline{\mathcal{Q}})\cong \mathcal{Q}$), and let $\overline{M}=p^{-1}(\overline{\mathcal{Q}})$. The covering map $p$ restricts to a cover $p|_{\overline{M}}:\overline{M} \to \overline{\mathcal{Q}}$, which then extends to a cover $p_\mathcal{Q}:\mathrm{int}(\overline{M})\to \mathcal{Q}$. Note that $\mathrm{int}(\overline{M})$ is a cusped hyperbolic 3-manifold which admits a horoball packing consistent with $\mathcal{H}_\mathcal{Q}$. Under this packing each of the lifts of curves in $\alpha$ have length greater than $6$. Thus, $M_\alpha$ is hyperbolic by the standard 6 Theorem and $\mathcal{Q}(\alpha)$ is hyperbolic as well. \end{proof} We now prove the main theorem of this section. We define an \define{exceptional} filling of a hyperbolic orbifold to be a filling that results in a good non-hyperbolic orbifold. We separate out the case that a filling results in bad orbifold, because this distinction is relevant to our argument. This theorem was stated in the introduction. We restate here for convenience. \begin{thmn}[\ref{lem:second_slope_long}] \secondSlopeLongText \end{thmn} \begin{proof} Futer and Purcell's main result from \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 1.8]{FP07} establishes that $\SS^3 \setminus K$ does not admit any non-trivial exceptional surgeries. By \Cref{cor:free_cusp_symms}, $\SS^3 \setminus K$ has at most one non-trivial symmetry $\beta$ that acts freely on the cusp. Assume $\mathcal{Q}$ is a non-trivial orbifold quotient of $\SS^3 \setminus K$ by such a symmetry $\beta$, and let $\mathcal{Q}_L$ be the orbifold quotient of $\SS^3 \setminus L$ by the corresponding symmetry $f(\beta)$ of $\SS^3\setminus L$ given by the \Cref{prop:symrelation}. By \Cref{prop:symrelation}, $f(\beta)$ maps each cusp of $\SS^3\setminus L$ to itself, so any cusp expansion of $\SS^3 \setminus L$ induces an embedded cusp expansion of $\mathcal{Q}_L$. For the remainder of the proof we will assume that lengths of parabolic elements are measured based on the preferred horoball packing of $\mathbb{H}^3$, which by the preceding observation descends to embedded cusp expansions of both $\SS^3 \setminus L$ and $\mathcal{Q}_L$. Let $\alpha$ be the multi-slope that we have Dehn filled along to obtain $\SS^3 \setminus K$ from $\SS^3 \setminus L$, let $p$ be the covering map from $\SS^3 \setminus K$ to $\mathcal{Q}$, and let $p_L$ be the covering map from $\SS^3 \setminus L$ to $\mathcal{Q}_L$. The slope $\alpha$ projects via $p_L$ to a slope $\alpha_p$, along which $\mathcal{Q}_L$ is filled to obtain $\mathcal{Q}$. Let $s$ be a Dehn surgery slope for $\mathcal{Q}$ that is not the quotient of the meridian corresponding to the knot complement. Then filling $\mathcal{Q}$ along $s$ is equivalent to filling $\mathcal{Q}_L$ along $(s,\alpha_p)$: \[ \xymatrix{ \SS^3 \setminus L \ar[d]^{p_L} \ar[r]^{\alpha} & \SS^3 \setminus K \ar[d]_{p} &\\ \mathcal{Q}_L \ar[r]^{\alpha_p} \ar@/_2pc/[rr]_{(s,\alpha_p)} & \mathcal{Q} \ar[r]^-{s} & \mathcal{Q}(s)=\mathcal{Q}_L(s,\alpha_p) } \] It therefore is enough to show that fillings of the form $(s, \alpha_p)$ of $\mathcal{Q}_L$ have no non-trivial exceptional surgeries that are good orbifolds. We claim that for every such multi-slope $(s, \alpha_p)$, each component has length greater than $6$. The length of each component of $\alpha_p$ is equal to the length of the component of $\alpha$ that it lifts to. By \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 3.10]{FP07} the length of the each component of $\alpha$ is at least $ \sqrt{6^2+1}>6$ since each twist region has at least $6$ crossings. Thus it remains to analyze the length of $s$. Applying \Cref{prop:quotientbases} with $G_1$ corresponding to the peripheral subgroup of $\mathcal{Q}_L$ and $G_2$ corresponding to the peripheral subgroup of the cover $\SS^3 \setminus L$ allows us to analyze the lengths of surgery slopes of the cusps of $\mathcal{Q}_L$ in terms of the slope lengths on the cusps of $\SS^3 \setminus L$. In particular, our hypotheses imply that the longitude of the planar cusp has length at least $18>16$. By \Cref{lem:bounds}, this results in $s$ having length greater than $6$. Combining both length bounds with \Cref{thm:orb_6_theorem}, this filling of $\mathcal{Q}_L$ is either hyperbolic or a bad orbifold. Hence, the corresponding filling of $\mathcal{Q}$ is either hyperbolic or a bad orbifold. \end{proof} We conclude with the following corollary, which is stated previously in the introduction. \begin{corn}[\ref{thm:only_knot_comm_class}] Let $\SS^3 \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement admitting a twist-reduced diagram with at least $9$ twist regions such that each twist region has at least $6$ crossings. Then $\SS^3 \setminus K$ is the only knot complement in its commensurability class. \end{corn} \begin{proof} By \Cref{thm:ht_no_rigid_cusps} $\SS^3 \setminus K$ does not cover a rigid cusped orbifold, and thus $\SS^3 \setminus K$ does not admit hidden symmetries (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 9.1]{NR92}). Denote by $\mathcal{Q}$ the (possibly trivial) quotient of $\SS^3 \setminus K$ by the group of symmetries that act freely on the cusp. Then by the main results of \def\citeauthoryear##1##2{##1, ##2}\@internalcite{BBCW12} (especially \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 4.13]{BBCW12}), each knot complement commensurable with $\SS^3 \setminus K$ (including $\SS^3 \setminus K$ itself) corresponds to an orbi-lens space filling of $\mathcal{Q}$. We have shown above in \Cref{lem:second_slope_long} that all non-trivial fillings of $\mathcal{Q}$ are hyperbolic or bad orbifolds. In particular, only the trivial filling of $\mathcal{Q}$, i.e., along the image of the meridian of $\SS^3\setminus K$, can result in an orbi-lens space filling. Therefore, $\SS^3 \setminus K$ is the unique knot complement in its commensurability class. \end{proof} If we add the further assumption that $\SS^3 \setminus K$ does not admit any symmetries that act freely on the cusp, then $\SS^3 \setminus K$ would have to admit a lens space filling to be commensurable with a knot complement by \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 4.13]{BBCW12}. In this case, we can apply the bounds directly from Futer and Purcell \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 1.8]{FP07} with the Perelman's affirmative solution to the Geometrization Conjecture and obtain a similar result (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite{MorganTian2014} for example). \begin{cor}\label{cor:unique_knot_comp_no_free_symms} Let $\SS^3 \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement with at least $4$ twist regions such that each twist region has at least $6$ crossings. If $\SS^3 \setminus K$ does not admit any symmetries that act freely on the cusp, then $\SS^3 \setminus K$ is the only knot complement in its commensurability class. \end{cor} \section{Hidden symmetries and FALs} \label{sec:hidden_syms} In this section we prove \Cref{thm:no_rigid_cusps}. Recall that by \Cref{thm:NR}, for hyperbolic knot complements having hidden symmetries is equivalent to covering a rigid cusped orbifold. Thus \Cref{thm:no_rigid_cusps} will follow as a direct corollary of the following statement: \begin{thm}\label{thm:ht_no_rigid_cusps} Let L be an FAL with a single planar component, and let $\SmK$ be an $(\epsilon,d_L)$-twisted filling of $\SmL$. Then $\SmK$ does not cover a rigid cusped orbifold. \end{thm} We will delay the proof of the above theorem until the end of the section. However, the idea of the proof is to leverage the thick/thin decomposition of $\SmK$ to show that any orbifold covering $\SmK \rightarrow \mathcal{O}$ restricts to a covering from the thick part of $\SmK$ to the thick part of $\mathcal{O}$. Under this covering the thick part of $\mathcal{O}$ has at least two cusps, but at most one that is a rigid cusp. However, analyzing the embedded thrice punctured spheres in FAL complements shows that such a restricted cover is impossible. In this section we continue to restrict to FALs having a single planar component. Let $L=K_0 \sqcup C_1 \sqcup \cdots \sqcup C_n$ be such an FAL, possibly with half-twists at crossing circles. Recall from \Cref{sec:background} that the complement $\SS^3\setminus L$ decomposes as a union $P_1\cup P_2$ of isometric polyhedra. Since $L$ has a single planar component, every shaded face of $P_1\cup P_2$ has a vertex in the cusp $K_0$. We choose a lift of a shaded face $\tau$ of $P_1$ such that the vertices of $\tau$ lift to $0$, $\mathfrak{i}$, and $\infty$. We may further require that the vertex of $\tau$ corresponding to $K_0$ is the one that lifts to $\infty$. With this lift fixed, \Cref{thm:hbp_FP07} gives a maximal horoball packing $\H$. For this section, $\H$ will always denote this particular choice of maximal horoball packing, and we will refer to $\H$ as the \define{preferred horoball packing} for the FAL $L$. It follows from the previous section that $\H$ contains as a subset the pattern of full-sized horoballs shown in \Cref{fig:horo_lines}. Recall that a horoball is \define{full-sized} if it has diameter 1, i.e., it is tangent to the horoball at $\infty$. The proof of the main theorem follows from analyzing the possible rigid cusped orbifold quotients of all FALs with a single planar component. To prove this proposition, we start in \Cref{sec:order_3} by ruling out the possibility that $K_0$ covers an $\SS^2(2,3,6)$ or $\SS^2(3,3,3)$ rigid cusp. Then in \Cref{sec:order_4} we consider the possible orbifold covers where $K_0$ covers an $\SS^2(2,4,4)$ cusp. In both cases our approach is to study possible symmetries of the preferred horoball packing $\H$. The reason for this is made apparent by the below lemma. \begin{lem}\label{lem:H_orb} Let $L$ be an FAL with a single planar component $K_0$, and let ${p:\SS^3\setminus L \to \mathcal{O}}$ be an orbifold cover such that no crossing circle covers a rigid cusp. Then $K_0$ covers a rigid cusp in $\mathcal{O}$ if and only if $\H$ has a rotational symmetry of order 3 or order 4 fixing $\infty$ (depending on the rigid cusp type). \end{lem} \begin{proof} Suppose that $K_0$ covers a rigid cusp $\mathcal{C}_0$ of $\mathcal{O}$. Since by assumption no crossing circle covers a rigid cusp, $K_0$ is the only cusp covering $\mathcal{C}_0$. We will construct a horoball packing $\H_\mathcal{O}$ covering cusp neighborhoods of $\mathcal{O}$. First, let $\pi:\mathbb{H}^3\to \SS^3\setminus L$ be the cover defined in \Cref{subsec:HP}, and let $\pi_\mathcal{O}:\mathbb{H}^3\to \mathcal{O}$ be the composition $p\circ \pi$. Let $n(\mathcal{C}_0)$ be a maximal embedded cusp neighborhood of $\mathcal{C}_0$ (i.e., it contains every other embedded cusp neighborhood of $\mathcal{C}_0$). For the remaining cusps $\mathcal{C}_1,\dots,\mathcal{C}_m$ of $\mathcal{O}$, let $n(\mathcal{C}_i)$ be the largest embedded cusp neighborhood whose interior is disjoint from $n(\mathcal{C}_0)$, and from $n(\mathcal{C}_j)$ for $j<i$. Now let $\H_\mathcal{O}=\bigcup_i \pi_\mathcal{O}^{-1}(n(\mathcal{C}_i))$. Note that $\pi_\mathcal{O}^{-1}(n(\mathcal{C}_0))\subset (\H\cap \H_\mathcal{O})$, and among these lifts of $n(\mathcal{C}_0)$ are the horoball $H_\infty$ at infinity, and a full-sized horoball tangent to $H_\infty$. Each cusp $\mathcal{C}_i$, $i\ne 0$, is covered by one or more crossing circles. Since $n(\mathcal{C}_i)$ is maximal, it is either tangent to $n(\mathcal{C}_0)$, or to $n(\mathcal{C}_j)$ for some $j\le i$ (or both). First, consider the case where $n(\mathcal{C}_i)$ is tangent to $n(\mathcal{C}_0)$. Then $\pi_\mathcal{O}^{-1}(n(\mathcal{C}_i))$ contains a horoball tangent to $H_\infty$, necessarily full-sized. Let $C_k$ be any crossing circle covering $\mathcal{C}_i$, and let $n(C_k)\in p^{-1}(n(\mathcal{C}_i))$. The point of tangency between $n(\mathcal{C}_i)$ and $n(\mathcal{C}_0)$ lifts to a point of tangency between $n(C_k)$ and a neighborhood $n(K_0)\in p^{-1}(n(\mathcal{C}_0))$. It follows that there is a full-sized horoball in $\pi^{-1}(n(C_k))$, and this is the largest horoball covering $C_k$. Let $i_0$ be the smallest index so that $n(\mathcal{C}_{i_0})$ is \emph{not} tangent to $n(\mathcal{C}_0)$. Then since $\pi_\mathcal{O}=p\circ \pi$, it follows that $\bigcup_{i=0}^{i_0-1} \pi_\mathcal{O}^{-1}(n(\mathcal{C}_i))\subset \H$. Consider now the horoballs covering $n(\mathcal{C}_{i_0})$. Since they are not tangent to $n(\mathcal{C}_0)$, they cannot be full-sized. If $C_{k_0}$ is a crossing circle covering $\mathcal{C}_{i_0}$, then the horoballs covering $\mathcal{C}_{i_0}$ in $\H_\mathcal{O}$ are obtained by equivariantly deflating the horoballs in $\H$ covering $C_{k_0}$. But such horoballs in $\H$ are isolated, and hence they must be isolated in $\bigcup_{i=0}^{i_0} \pi_\mathcal{O}^{-1}(n(\mathcal{C}_i))$, since $\bigcup_{i=0}^{i_0-1} \pi_\mathcal{O}^{-1}(n(\mathcal{C}_i))\subset \H$. But this is a contradiction. Since $n(\mathcal{C}_{i_0})$ has a point of tangency with some $n(\mathcal{C}_j)$ for $j\le i_0$, the horoball lifts of $\mathcal{C}_{i_0}$ must be tangent to horoball lifts of $n(\mathcal{C}_j)$. It follows that for every crossing circle $C_j$, the largest horoball corresponding to $C_j$ is full-sized. By \Cref{lem:tangent}, the same holds for $\H$. Since $\pi_\mathcal{O}=p\circ \pi$, it follows that we must have $\H=\H_\mathcal{O}$. Since deck transformations for $\mathcal{O}$ are necessarily symmetries of $\H_\mathcal{O}$, $\H_\mathcal{O}$ must have an order-4 or order-3 rotation fixing $\infty$ (since $\infty$ covers the rigid cusp of $\mathcal{O}$). Hence $\H$ has an order-3 or order-4 rotation fixing $\infty$. Conversely, if $\H$ has an order-4 symmetry then $K_0$ covers an orbifold with an order 4 cone point, which must be $\SS^2(2,4,4)$ as this is the only Euclidean 2-orbifold with this property. Similarly, if $\H$ has an order-3 symmetry then $K_0$ must cover an orbifold with an order 3 cone point, i.e., $\SS^2(2,3,6)$ or $\SS^2(3,3,3)$. \end{proof} In the discussions to follow we will denote by $H_z$ the horoball in $\H$ centered at ${z\in \widehat{\CC}}$. Since we will usually not need to distinguish between horoballs coming from different crossing circles, we will refer to horoballs that lift from crossing circles as red horoballs. Horoballs that are lifts of $K_0$ will be referred to as blue horoballs. We will similarly refer to red and blue vertices of the polyhedra $P_i$ depending on whether the vertex corresponds to a crossing circle or a planar cusp. Finally, we denote by $\mathcal{N}$ the nerve associated to $L$, and we again color the edges of the nerve red or blue depending on the color of the vertex of $P_i$ to which they are dual. In the figures we will color these objects accordingly, and all red vertices, edges, and horoballs will also be drawn thicker. \subsection{Order 3 symmetries}\label{sec:order_3} In this section we will rule out the possibility that $K_0$ covers a rigid $\SS^2(2,3,6)$ or $\SS^2(3,3,3)$ cusp. By \Cref{lem:H_orb}, this reduces to showing that $\H$ does not admit order-3 symmetries fixing $\infty$. To this end, suppose that $\H$ does in fact have an order--3 symmetry $\sigma$ fixing $\infty$ and a point $z\in \mathbb{C}$, which we may assume is a counterclockwise rotation as seen from $\infty$. Recall that $\line_j$ denotes the line of full-sized horoballs along the line $\{\,\mathrm{Re}\,(z)=l_j\}$, as in \Cref{fig:horo_lines}. The image $\sigma(\line_0)$ is a line of horoballs having slopes $1/\sqrt{3}$. This line of horoballs must intersect each $\line_j$ in a horoball. In particular, $\line_0\cap \sigma(\line_0)$ is some horoball $H_0$. From here forward we will assume that $H_0$ is red, as shown in \Cref{fig:horo_lines}. If $H_0$ is blue then the discussion to follow and the proofs of \Cref{lem:6_vert} and \Cref{lem:no_ord3} go through with the only change being the reversal of colors. Rotating again by $\sigma$ gives another line $\sigma^2(\line_0)$ of horoballs, this time of slope $-1/\sqrt{3}$. It is clear that this line must also intersect $\line_0$ in a red horoball (since $H_0$ is red). After translating the horoballs in \Cref{fig:order_3} by the group generated by $\mu$ and $\sigma^{-1}\mu\sigma$, we get diameter $1$ horoballs tiling $\mathbb{C}$ in the pattern shown in \Cref{fig:o3_tiling}. It follows that for each $j$ we have $l_j=k_j \sqrt{3}$, for some $k_j\in \mathbb{Z}_{>0}$. \begin{figure}[h] \begin{subfigure}{.49\textwidth} \centering \includegraphics[scale=.9]{order_3} \caption{} \label{fig:order_3} \end{subfigure} \begin{subfigure}{.49\textwidth} \centering \includegraphics[scale=.9]{o3_tiling} \caption{} \label{fig:o3_tiling} \end{subfigure} \caption{The images of a line $\line_0$ of full sized horoballs under an order-3 rotation $\sigma$ by must intersect $\line_0$ in a full sized horoballs, as in (a). By translating the picture in (a) by deck transformations, we get the tiling in (b). As usual, crossing circle horoballs are colored red and drawn thicker.} \label{fig:o3} \end{figure} \begin{lem}\label{lem:6_vert} Suppose $\H$ has an order--3 rotational symmetry fixing infinity. Then every unshaded face of $P_i$, $i=1,2$ has at least $6$ vertices. \end{lem} \begin{proof} Let $F$ be an unshaded face of $P_1$. For some $0\le j_0\le m-1$ and $\delta\in\{0,1\}$, there is a lift of $F$ with a vertex at $\infty$, as well as vertices at $a_1=a'_1+\delta \mathfrak{i}, \dots, a_n=a'_n+\delta \mathfrak{i}$ for some $l_{j_0}=a'_1<a'_2<\dots<a'_n=l_{j_0+1}$. These vertices are centers for a horizontal string of tangent horoballs, since the endpoints of lifted edges of $P_1$ are centers of tangent horoballs. Recall that $l_j=k_j\sqrt{3}$ for all $j$, so that $|l_{j_0+1}-l_{j_0}|$ can only be a multiple of $\sqrt{3}$. If $|l_{j_0+1}-l_{j_0}|\ne \sqrt{3}$, then it is at least $2\sqrt{3}>3$. It is clear in this case that $n\ge 5$, and hence $F$ has at least $6$ vertices. Hence we may assume that $|l_{j_0+1}-l_{j_0}|=\sqrt{3}$. We will assume that the horoballs $H_{a_2}$ and $H_{a_{n-1}}$ (centered at $a_2$ and $a_{n-1}$) are as large as possible, without intersecting any horoball in the packing represented in \Cref{fig:o3_tiling}. Then we will show that $H_{a_2}$ and $H_{a_{n-1}}$ are not tangent, so that $3\ne n-1$. Our assumption that $H_{a_2}$ is as large as possible forces it to be tangent to both $H_{a_1}$ and the two blue horoballs $H$ and $H'$ that are tangent to $H_{a_1}$ and $H_{a_n}$ (see \Cref{fig:face_F}) . Hence the center of $H_{a_2}$ is at the barrycenter of the equilateral triangle with vertices the centers of $H_{a_1},H,$ and $H'$. This triangle has height $\frac{\sqrt{3}}{2}$, so the distance $x$ from $a_1$ to the barrycenter satisfies $x^2=(\frac{1}{2})^2+(\frac{\sqrt{3}}{2}-x)^2$, so that $x=\frac{1}{\sqrt{3}}$ (see \Cref{fig:face_F}). Refering to \Cref{fig:pythag_r}, it follows that the radius $r$ of $H_{a_2}$ satisfies $(\frac{1}{2}-r)^2+(\frac{1}{\sqrt{3}})^2=(\frac{1}{2}+r)^2$, so that $r=\frac{1}{6}$. By symmetry the radius of $H_{a_{n-1}}$ is also $\frac{1}{6}$. Since the center of $a_2$ (resp. $a_{n-1}$) is distance $\frac{1}{\sqrt{3}}$ from $a_1$ (resp. $a_n$) and has radius $\frac{1}{6}$, it follows that if $H_{a_2}$ and $H_{a_{n-1}}$ are tangent then the total distance from $H_{a_1}$ to $H_{a_n}$ must be $2(\frac{1}{6}+\frac{1}{\sqrt{3}})<\sqrt{3}$. But this is a contradiction of our observation that for any $j$, $l_j=k_j \sqrt{3}$, for some $k_j\in \mathbb{Z}_{>0}$. \end{proof} \begin{figure}[h] \begin{subfigure}{.55\textwidth} \centering \includegraphics[scale=1.8]{face_F} \caption{} \label{fig:face_F} \end{subfigure} \begin{subfigure}{.44\textwidth} \centering \includegraphics[scale=1.8]{pythag_r} \caption{} \label{fig:pythag_r} \end{subfigure} \caption{Computing the largest possible radius for $H_{a_2}$ and $H_{a_{n-1}}$.} \label{fig:radius} \end{figure} \begin{lem}\label{lem:no_ord3} Let $L$ be an FAL with a single planar component $K_0$, and let ${\pi:\SS^3\setminus L \to \mathcal{O}}$ be an orbifold cover such that no crossing circle covers a rigid cusp. Then the cusp corresponding to the main component $K_0$ cannot cover an $\SS^2(3,3,3)$ or $\SS^2(2,3,6)$ rigid cusp in $\mathcal{O}$. \end{lem} \begin{proof} By \Cref{lem:H_orb} the existence of such a cusp implies that there is an order--3 rotation fixing $\infty$. It follows from the \Cref{lem:6_vert} that if $\H$ has such an order--3 symmetry, then every unshaded face of $P_1$ has at least $6$ vertices. Following \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Lemma 2.3]{Pur11}, the nerve $\mathcal{N}$ of $P_1$ is a triangulation of $\SS^2$ (with no loops or multi-edges). However, every vertex in this nerve triangulation of $P_1$ is at least $6$-valent, which is impossible as $\chi(\SS^2)=2$. \end{proof} \subsection{Order 4 symmetries} \label{sec:order_4} In this section we investigate order-$4$ symmetries of the preferred horoball packing $\H$, with the goal of showing that $(\epsilon,d_L)$-twisted fillings of FALs cannot cover $\SS^2(2,4,4)$ rigid cusps. First, though, we remark that a recent pre-print of the first author \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 1.1]{hoffman_cusp_types} obstructs hyperbolic knot complements from covering orbifolds with $(2,4,4)$ cusps, and thus provides an alternate proof to the main result of this section. Nevertheless, we retain this section in order to keep our proof self-contained, and because we prove along the way some structural results of independent interest. We cannot rule out order--4 rotational symmetries for horoball packings of all FAL complements. In fact, octahedral FAL complements have horoball packings with order--4 symmetries, coming from the symmetries of the tessellation $\mathbb{H}^3$ by regular ideal octahedra. In this section, as in the last, $L=K_0\sqcup C_1 \sqcup \dots \sqcup C_n$ will be an FAL with a single planar component. Suppose that $\H$ has an order--4 symmetry $\sigma$ fixing $\infty$, and that $\sigma$ does not identify any red horoball with any blue horoball. For each fixed $j_0\in \{0,\dots, m-1\}$, $\sigma(\line_{j_0})$ is a horizontal line of horoballs alternating in color, which must intersect each vertical line $\line_j$ in a horoball. In particular, we have a horizontal line of horoballs $\sigma(\line_0)$, which after translating in the meridian direction gives horizontal lines of horoballs along the lines $\,\mathrm{Im}\,(z)=2k$ or $\,\mathrm{Im}\,(z)=(2k+1)$ for $k\in \mathbb{Z}$. Rotating again by $\sigma$ now gives one of the two horoball patterns shown in \Cref{fig:packings}. (recall that our lift was chosen so that the horoball at $0$ is red). \begin{figure} \begin{subfigure}{.49\textwidth} \centering \includegraphics[scale=1.1]{packing_even} \caption{} \label{fig:packing_even} \end{subfigure} \begin{subfigure}{.49\textwidth} \centering \includegraphics[scale=1.1]{packing_odd} \caption{} \label{fig:packing_odd} \end{subfigure} \caption{After rotating a line of full-sized horoballs by an order-4 rotation then translating by deck transformations, we get one of the two packings shown above. As usual, crossing circle horoballs are colored red and drawn thicker.} \label{fig:packings} \end{figure} \begin{figure} \begin{subfigure}{.49\textwidth} \centering \includegraphics[scale=1.5]{local_P_i} \caption{} \label{fig:local_P_i} \end{subfigure} \begin{subfigure}{.49\textwidth} \centering \includegraphics[scale=1.5]{bad_tris} \caption{} \label{fig:bad_tris} \end{subfigure} \caption{If all $l_j$ are even, then pairs of shaded faces meeting at a blue vertex must be as in (a). If an unshaded face does not satisfy either condition (1) or condition (2) of \Cref{lem:order4}, then (b) will appear. Red vertices are drawn larger in these figures.} \label{fig:tris} \end{figure} \begin{lem}\label{lem:order4} Suppose $\H$ has an order--4 symmetry such that no red horoball is in the orbit of a blue horoball, and all $l_j$ are even. Then every unshaded face of $P_i$ has either (1) all blue vertices, or (2) vertices that alternate in color on a walk around the boundary of the face. \end{lem} \begin{proof} In either case shown in \Cref{fig:packings}, it follows that pairs of triangular faces of $P_i$ meeting at a blue vertex are as shown in \Cref{fig:local_P_i}. To see this, consider the blue vertex connecting the two triangles in \Cref{fig:local_P_i} as lying at $\infty$, so that the four other vertices are on lines $\line_j$ and $\line_{j+1}$ for some $j$. Since all $l_j$ are even, and since the horoball packing contains one of the patterns shown in \Cref{fig:packings}, all horoballs at points $l_j+b\mathfrak{i}$ for fixed $b\in \mathbb{Z}$ are full-sized horoballs all of the same color. It follows that both vertices of a unshaded face adjacent to $\infty$ are the same color. Therefore $P_i$ must be built by joining together pieces like the one shown in \Cref{fig:local_P_i}. Suppose that some unshaded face does not satisfy either (1) or (2). Then along this face there are $3$ consecutive vertices that are blue, blue, red (note that red vertices can never be adjacent to each other). Consider the two triangles opposite the two edges joined by these vertices. Since every triangle contains exactly one red vertex, the only possible configuration of vertices for these two triangles is as in \Cref{fig:bad_tris}, contradicting our assertion that every pair of triangles must have the vertex configuration shown in \Cref{fig:local_P_i}. \end{proof} \begin{prop}\label{prop:fullH} Let $L = K_0 \sqcup C_1 \sqcup \dots \sqcup C_n$ be an FAL, and let $p: \SS^3\setminus L \to \mathcal{O}$ be an orbifold cover. Suppose that $K_0$ covers an $\SS^2(2,4,4)$ rigid cusp in $\mathcal{O}$, and that no crossing circle covers an $\SS^2(2,4,4)$ rigid cusp. Then $H_z$ is a full-sized horoball of $\H$ if and only if $z =a+b\mathfrak{i}$ with $a,b \in \mathbb{Z}$. Furthermore, \begin{enumerate} \item all of the cusps corresponding to crossing circles cover a single cusp of $\mathcal{O}$. \item all blue full-sized horoballs are centered at $z\in \mathbb{Z}[\mathfrak{i}]$ with $a+b \equiv 1 \mod 2$. \item all red full-sized horoballs are centered at $z\in \mathbb{Z}[\mathfrak{i}]$ with $a+b \equiv 0 \mod 2$. \item every blue full-sized horoball is centered at a fixed point of an order-4 rotation fixing $\infty$. \end{enumerate} \end{prop} \begin{proof} Suppose that $K_0$ covers an $\SS^2(2,4,4)$ rigid cusp. Since $K_0$ covers an $\SS^2(2,4,4)$ rigid cusp, there is an order--4 rotational symmetry $\sigma$ fixing infinity, which we may assume is a counter-clockwise rotation as seen from $\infty$. In this case the (maximal) horoball packing $\H$ contains one of the two patterns of horoballs shown in \Cref{fig:packings}, as discussed above. Note that since we are assuming that crossing circles do not cover an $\SS^2(2,4,4)$, the $\sigma$-orbits of blue horoballs and red horoballs are disjoint. First assume that all $l_j$ are even, and suppose for a contradiction that $\H$ contains the pattern in \Cref{fig:packing_odd}. Referring to the face $F$ highlighted in \Cref{fig:packing_odd} (in which we are looking down on the face), we see that the unshaded face having edges connecting the red vertex at $\infty$ to the blue vertices at $\mathfrak{i}$ and $l_1+\mathfrak{i}$ also has a red vertex. In particular, the red diameter 1 horoball $H$ centered at $1+\mathfrak{i}$ must be at a vertex of $F$. Since $F$ has three consecutive blue vertices, it cannot satisfy either condition of \Cref{lem:order4}. Thus if all $l_j$ are even then $\H$ cannot contain the pattern in \Cref{fig:packing_odd}, so it must contain that of \Cref{fig:packing_even}. Let $\mu\in\pi_1(\SS^3\setminus L)$ be the lift of the meridian of $K_0$ to the peripheral subgroup at $\infty$, and let $\Gamma_\infty=\langle \mu,\sigma\rangle$. If some $l_j$ is odd, then the $\Gamma_\infty$-orbits of $\line_j$ and $\line_0$ are different: one of them looks like \Cref{fig:packing_even} and the other like \Cref{fig:packing_odd}. The union of these orbits looks like \Cref{fig:packing_even} with additional red full-sized horoballs in the empty spaces. Thus $\H$ contains as a subset the pattern in \Cref{fig:packing_even}. In either case, we find that the horoball packing $\H$ must contain as a subset the horoball packing shown in \Cref{fig:packing_even}. Since $\tau=\sigma^{-1}\mu\sigma$ is a translation by 2 in the longitude direction (or $z \mapsto z+2$), a fundamental domain for $\langle \sigma,\tau\rangle$ is contained in $$ \{(z,t)\in\mathbb{H}^3 \mid 0\le Re(z) \le 2, 0\le Im(z) \le 2\}. $$ The intersection of this domain with $H_\infty$ is shown as a (large) grey square in \Cref{fig:packing_even}. Thus we may assume that the other fixed point $z_\sigma$ of $\sigma$ satisfies $0\le \,\mathrm{Re}\,(z_\sigma) < 2$ and $0\le \,\mathrm{Im}\,(z_\sigma)<2$. Since we are assuming that no crossing circle covers an $\SS^2(2,4,4)$ rigid cusp, it follows that either $z_\sigma=1+\mathfrak{i}$, or up to equivalence in $\Gamma_\infty$, it is at one of the two blue horoballs centered at $1$ and $\mathfrak{i}$ (since it cannot be centered at a red horoball). If $z_\sigma=1+\mathfrak{i}$, then $\mu\sigma$ is a rotation fixing the center of the red horoball at $2\mathfrak{i}$, which is not allowed. It follows that $z_\sigma$ is centered on a blue horoball, and in fact by composing with $\mu$ and $\tau$ it is easy to see that every blue horoball shown in \Cref{fig:packing_even} is centered at the fixed point of an order--4 symmetry. This establishes (4). It also follows that there must be a full-sized red horoball centered at $1+\mathfrak{i}$, and the centers of full sized horoballs are exactly the lattice $\mathbb{Z}[\mathfrak{i}]$, with checkerboard coloring as described by (2) and (3). To see that all of the crossing circle cusps cover the same cusp of $\mathcal{O}$, we observe that each crossing circle cusp cobounds a thrice punctured sphere with the cusp $K_0$. Hence, there is a cusp neighborhood of $C_i$ represented by some red full-sized horoball in $\H$. We observe that all red full-sized horoballs are identified by $\Gamma_\infty$, so that (1) follows. \end{proof} \begin{lem}\label{lem:rigid} Let $L = K_0 \sqcup C_1 \sqcup \dots \sqcup C_n$ be an FAL, and let $p:\SS^3\setminus L \to \mathcal{O}$ be an orbifold cover. If $K_0$ covers an $\SS^2(2,4,4)$ rigid cusp in $\mathcal{O}$, then either each crossing circle $C_i$ also covers an $\SS^2(2,4,4)$ rigid cusp in $\mathcal{O}$, or $\mathcal{O}$ is the orbifold in \Cref{fig:DL_orb}. \end{lem} \begin{proof} We will assume that no crossing circle covers an $\SS^2(2,4,4)$ rigid cusp in $\mathcal{O}$, and show that $\mathcal{O}$ must be the orbifold shown in \Cref{fig:DL_orb}. From \Cref{prop:fullH}, we have that the full sized horoballs of $\H$ are centered above points in the lattice $\mathbb{Z}[\mathfrak{i}]$ in a checkerboard pattern, and every blue horoball is the center of an order-4 rotation fixing $\infty$. We will assume from here forward that $\sigma$ is the rotation fixing $H_1$. With this choice of $\sigma$, the action of $\Gamma_\infty$ on $\mathbb{H}^3$ has a fundamental domain contained in $$ D_\infty=\{(z,t)\mid 0 \le Re(z)\le 1\}\cap \{(z,t)\mid 0 \le Im(z)\le 1\}. $$ We will construct a convex polyhedral fundamental domain $D_\mathcal{O}$ for $\mathcal{O}$, which we may assume has an ideal vertex at $\infty$, by further cutting down $D_\infty$. For $z\in \{1,\mathfrak{i}\}$, let $S_z$ be the unique half-space of $\mathbb{H}^3$ containing $H_\infty$, and containing no point of $H_z$. Since $D_\mathcal{O}$ is an intersection of half-spaces and contains an ideal vertex at $\infty$, it is contained in both $S_1$ and $S_\mathfrak{i}$. It follows that $D_\mathcal{O}\subset D\defeq D_\infty \cap S_1\cap S_\mathfrak{i}$, which is a finite volume convex domain having three ideal vertices, one blue (at $\infty$), and two red (at $0$ and $1+\mathfrak{i}$). The red vertices are identified under $\Gamma_\infty$. \begin{figure} \centering \includegraphics[scale=1.5]{D_orb} \caption{ If an FAL complement covers an orbifold , with the (single) planar component covering a rigid cusp and all crossing circles covering flexible cusps, then the fundamental domain of the orbifold must be the domain $D$ above, with edge identifications as shown.} \label{fig:D_orb} \end{figure} \begin{figure} \begin{subfigure}{.27\textwidth} \centering \includegraphics[scale=1.5]{orb2_gluing} \caption{} \label{fig:orb2_gluing} \end{subfigure} \begin{subfigure}{.27\textwidth} \centering \includegraphics[scale=1.3]{orb2} \caption{} \label{fig:orb2} \end{subfigure} \begin{subfigure}{.4\textwidth} \centering \includegraphics[scale=1.6]{cusp_kill} \caption{} \label{fig:cusp_kill} \end{subfigure} \caption{There is exactly one possible gluing of $D$ that gives an orbifold with a flexible cusp covered by crossing circles, shown in (a). The resulting orbifold is shown in (b) as a graph in $\SS^3$, with three finite vertices and two ideal vertices, and edges labelled by their degree. If we fill the red cusp and apply the cusp-killing homomorphism as shown in (c), then a loop of 2-torsion remains (top and bottom shows two possible cases up to symmetry).} \label{fig:DL_orb} \end{figure} \begin{clm}\label{clm:eq_doms} $D_\mathcal{O} = D$. \end{clm} \noindent\emph{Proof of \Cref{clm:eq_doms}.} If $D_\mathcal{O}\ne D$, then there exists an open half-space $S\subset\mathbb{H}^3$ such that $D_\mathcal{O}\subset D\cap S\neq \emptyset$. Let $\pi$ be the geodesic plane so that $S$ is a component of $\mathbb{H}^3\setminus \pi$. If $\pi$ is a vertical plane then it must cut $D$, so the peripheral subgroup at $\infty$ must be strictly larger than $\Gamma_\infty$. The only possible translation that does not map a blue horoball to a red horoball (up to composition with elements of $\Gamma_\infty$) is $\tau_0=\mat 1 {1+\mathfrak{i}} 0 1$. But $\sigma\tau_0$ is an order--4 rotation about the red horoball at $0$, so $\tau_0$ cannot be in $\pi_1(\mathcal{O})$ by our assumption that crossing circles do not cover $\SS^2(2,4,4)$ rigid cusps. Since there can be no order-4 rotation at a red horoball, the only possible rotation that does not exchange red and blue horoballs is an order-2 rotation at $\frac{1}{2}+\frac{\mathfrak{i}}{2}$. If $\sigma_2$ is such a rotation, and $\sigma$ is the counter-clockwise rotation centered at $H_1$, then $\sigma_2\sigma$ is an order-4 rotation centered at the red horoball at $1+i$. Thus the rotation $\sigma_2$ cannot be in the peripheral subgroup, and so $\pi$ is not a vertical plane. Since the peripheral subgroup of $\pi_1(\mathcal{O})$ fixing $\infty$ is $\Gamma_\infty$, the covering map $\mathbb{H}^3\to \mathcal{O}$ is a homeomorphism on $\mathrm{int}(D\cap H_\infty)$. It follows that $\pi$ is a hemisphere of radius less than or equal to 1. Since $\mathcal{O}$ has 2 cusps (one red and one blue), and since the two red vertices of $D$ are identified under $\Gamma_\infty$, $\pi$ cannot cut off either of the red vertices of $D$. Since the two finite vertices of $D$ are in the (closed) horoball $H_\infty$, $\pi$ cannot cut either finite vertex off of $D$. It follows that all vertices of $D$ (finite and ideal) are contained in the closure of $\mathbb{H}^3\setminus S$ (where we take the closure in $\mathbb{H}^3\cup \partial\mathbb{H}^3$). Since $D$ is the convex hull of these vertices, $D$ must then be contained in the closure of $\mathbb{H}^3\setminus S$. This contradicts our assumption that $S$ intersects $D$ non-trivially, and completes the proof of the claim. \begin{clm}\label{clm:two_possibilties} $\mathcal{O}$ is the orbifold shown in \Cref{fig:orb2}. \end{clm} \noindent\emph{Proof of \Cref{clm:two_possibilties}.} Now consider the fundamental domain $D=D_\mathcal{O}$. \Cref{fig:D_orb} shows edge identifications of this domain, induced by the action of $\Gamma_\infty$ on $\mathbb{H}^3$. Under this action, the four vertical faces of $D_\mathcal{O}$ are identified in pairs, as shown. This leaves 2 triangular faces $\Delta_1$ and $\Delta_2$. The gluing of $\Delta_1$ must be realized by some $\phi\in\mathrm{Isom}^+(\mathbb{H}^3)$ that either maps $\Delta_1$ to itself or to $\Delta_2$. The only two orientation-preserving maps satisfying this condition are the order--4 rotation about the edge connecting $0$ to $1+\mathfrak{i}$, and the order--2 rotation whose axis lies on $S_\mathfrak{i}$ and bisects $\Delta_1$. In the first case, the rotation is an order--4 rotation with fixed points on red horoballs, which is impossible given our assumption that crossing circles do not cover $\SS^2(2,4,4)$ rigid cusps in $\mathcal{O}$. In the second case, $\Delta_1$ is folded onto itself along the axis of $\phi$, and similarly $\Delta_2$ is folded onto itself along a bisecting edge on $S_1$ (see \Cref{fig:orb2_gluing}, in which $\Delta_1$ is the union of the two faces labelled by $E$, and $\Delta_2$ is the union of faces labelled by $F$). With this gluing of $D$ we get the orbifold shown in \Cref{fig:orb2}. This completes the proof of the claim, and of the Lemma. \end{proof} For the following lemma we rely on the discussion of orbifold Dehn filling from \Cref{sub:orbDehnFilling}. This lemma will rule out the possibility that any Dehn filling of the orbifold in \Cref{fig:orb2} is covered by a knot complement. Note that the statement below does not require the knot complement to be $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$, or even to be a filling of an FAL complement. \begin{lem}\label{lem:no_knot_covers} If $S^3 \setminus K$ a knot complement, then $S^3 \setminus K$ does not cover an orbifold obtained from filling the orbifold in \Cref{fig:orb2}. \end{lem} \begin{proof} Suppose $\SS^3\setminus K$ covers an orbifold $\mathcal{Q}$, and $\mathcal{Q}$ is obtained by Dehn-filling the flexible cusp of the orbifold $\mathcal{O}$ in \Cref{fig:DL_orb}. By \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 2.3, Remark 2.4]{Hoffman2015small} and the proof of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 4.11]{BBCW12}, the orbifold fundamental group of $\mathcal{Q}$ must be normally generated by the peripheral subgroup. Thus if we just quotient $\pi_1(\mathcal{Q})$ by the normal subgroup generated by peripheral torsion, the resulting group should be torsion free (and the corresponding orbifold should have empty singular set). The two possible orbi-tangle fillings of $\mathcal{O}$ (up to symmetry) are shown in the left frames of \Cref{fig:cusp_kill}. In this picture we draw the tangle strands as dotted lines to indicate that the drawing does not show the actual tangle, but rather just indicates which singularities on the cusp are joined to each other by the tangle strands (this will be sufficient for our purposes). The middle and right frames of \Cref{fig:cusp_kill} show the result of killing the peripheral torsion, with the middle frame corresponding to $n$ even and the right frame corresponding to $n$ odd. In both cases, we are still left with some order-2 torsion, so such an orbifold cannot be covered by a knot complement. \end{proof} \begin{rem} One can also prove a version of \Cref{lem:no_knot_covers} in the context of FAL fillings, by showing that any filling curve for the flexible cusp of $\mathcal{O}$ that lifts to a $\frac{1}{q}$-filling of some crossing circle of the FAL, must lift to an integer filling in some other crossing circle. This follows from the fact that the horoballs $H_0$ and $H_{1+i}$ are identified via the order--4 rotation fixing $1$ and $\infty$, so the longitude of the crossing circle lifting to $H_0$ is identified with the meridian of the crossing circle lifting to $H_{1+i}$. Unfortunately this argument still allows for the $(1,1)$-filling on each cusp. \end{rem} \subsection{Proof of \Cref{thm:ht_no_rigid_cusps}}\label{sec:rigid} We are now ready to prove \Cref{thm:ht_no_rigid_cusps}. \begin{proof}[Proof of \Cref{thm:ht_no_rigid_cusps}] Suppose $\SmK$ is an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$-filling of $\SmL$ and suppose $\SmK$ covers a rigid cusped orbifold $\mathcal{O}$. By \Cref{prop:HT_non-empty}, the cover $\SmK \rightarrow \mathcal{O}$ induces a cover $\SmL \rightarrow \mathcal{Q}$, where $\mathcal{Q} \cong \mathcal{O} \setminus \sqcup_{i=1}^{n} p(\gamma_{i})$. By construction, $\mathcal{Q}$ must have a rigid cusp, coming from the single rigid cusp of $\mathcal{O}$, which the cusp corresponding to $K_0$ covers. At the same time, $\mathcal{Q}$ must have non-rigid cusps that are tori coming from drilling out the set of geodesics $\{p(\gamma_{i})\}_{i=1}^{n}$ from $\mathcal{O}$. Consequently, either every crossing circle of $\SS^3\setminus L$ covers a non-rigid cusp in $\mathcal{Q}$, contradicting either \Cref{lem:rigid} or \Cref{lem:no_ord3}, or $\mathcal{Q}$ is the orbifold in \Cref{fig:DL_orb}, contradicting \Cref{lem:no_knot_covers}. \end{proof} \section{Introduction} Two manifolds are said to be \define{commensurable} if they share a common finite-sheeted cover. In the case of hyperbolic 3-manifolds, this property is an equivalence relation and the equivalence classes are called \define{commensurability classes}. In general, commensurability classes of hyperbolic 3-manifolds are not well-understood, and it is often difficult to decide if two such manifolds are commensurable. To make the commensurability problem more tractable, it is natural to restrict to the case of hyperbolic knot complements. Evidence from the literature suggests that hyperbolic knot complements are rarely commensurable with one another. More precisely, Reid and Walsh put forth the following conjecture: \begin{conj}[{\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Conjecture 5.2]{RW08}}]\label{conj:NR} There are at most three hyperbolic knot complements in a commensurability class. \end{conj} Much work has been done to verify the conjecture for particular classes of knot complements, which will be discussed below. Perhaps the biggest step forward toward a resolution comes from a result of Boileau, Boyer, Cebanu, and Walsh \def\citeauthoryear##1##2{##1, ##2}\@internalcite{BBCW12}, which asserts that the conjecture holds for a hyperbolic knot complement $\SmK$ that does not admit hidden symmetries. A \define{hidden symmetry} of a (finite volume) hyperbolic $3$-manifold $M$ is a symmetry of a finite-sheeted cover of $M$ that does not come from a symmetry of $M$. For hyperbolic knot complements, admitting hidden symmetries is equivalent to non-normally covering an orbifold \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Proposition 9.1]{NR92}, and we will frequently make use of this perspective. There are only three hyperbolic knot complements known to admit hidden symmetries: the figure-8 knot complement and the two dodecahedral knot complements of Aitchison and Rubinstein \def\citeauthoryear##1##2{##1, ##2}\@internalcite{AitchisonRubinstein92}. One of these dodecahedral knots is shown in \Cref{fig:dodeca}. Neumann and Reid have conjectured that these are the only hyperbolic knot complements admitting hidden symmetries. While confirming this conjecture in full generality has proven difficult, certain special (infinite) classes of knot complements have been shown to not have hidden symmetries: $2$-bridge knot complements \def\citeauthoryear##1##2{##1, ##2}\@internalcite{RW08}, \def\citeauthoryear##1##2{##1, ##2}\@internalcite{MW16}, certain highly-twisted pretzel knot complements \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Mil17}, and $(-2,3,n)$-pretzel knot complements with $n \neq 7$ \def\citeauthoryear##1##2{##1, ##2}\@internalcite{MaMa08}, as well as certain classes of knot complements that arise from surgery on a common manifold \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Hoffman2010}, \def\citeauthoryear##1##2{##1, ##2}\@internalcite{CDM19}. \begin{figure}[h] \begin{subfigure}{.32\textwidth} \raggedright \includegraphics[scale=2]{dodeca} \caption{} \label{fig:dodeca} \end{subfigure} \begin{subfigure}{.32\textwidth} \centering \includegraphics[scale=1.9]{dodec_FAL} \caption{} \label{fig:dodeca_FAL} \end{subfigure} \begin{subfigure}{.32\textwidth} \raggedleft \includegraphics[scale=2]{dodec_twisted} \caption{} \label{fig:dodeca_twisted} \end{subfigure} \caption{The dodedecahedral knot on the left is one of only three knots whose complements are known to have hidden symmetries. The twist regions of this knots are highlighted in gray. By augmenting each twist region with a crossing circle and reducing the number of twists modulo 2 we get the FAL in center. If we perform a $\frac{1}{q_i}$-Dehn surgery along each circle $C_i$ of the FAL, we get the knot on the right, with $2q_i$ crossings in each twist region. It is a consequence of \Cref{thm:no_rigid_cusps} that if each $|q_i|$ is sufficiently large, the complement of the knot on the right will have no hidden symmetries.} \label{fig:hs_knots} \end{figure} With an eye toward expanding this analysis to a far broader class of hyperbolic knot complements, we consider knot complements obtained as Dehn fillings of fully augmented link (FAL) complements. To construct an FAL $L$, start with a (twist-reduced) diagram of a knot $K$, insert a trivial component encircling each twist region (called a crossing circle), and reduce modulo 2 the number of crossings in each twist region. Conversely, $K$ can be recovered from $L$ by Dehn surgery along the crossing circles of $L$, for appropriately chosen surgery slopes (see \Cref{sec:background} for details); {for example consider the filling used to obtain \Cref{fig:dodeca}} from \Cref{fig:dodeca_FAL}. In fact, if we choose for each crossing circle component $C_i$ of $L$ \emph{any} slope of the form $\frac{1}{q_i}$, for any $q_i\in\mathbb{Z}_{\neq 0}$, the result will be a knot, which by the 6 Theorem will be hyperbolic assuming none of the $q_i$ are too small. Thus, we see that any hyperbolic knot $K$ can be obtained via Dehn surgery on an FAL, and a given FAL will be a Dehn surgery ancestor of infinitely many hyperbolic knots. In particular, the three knot complements known to have hidden symmetries can be obtained by surgery on an FAL; see \Cref{fig:dodeca_FAL} for the FAL ancestor of one of the dodecahedral knots. In addition to furnishing Dehn surgery ancestors for all hyperbolic knots, the class of FALs also has the benefit of some very nice geometric properties. Most notably, FALs admit an explicit geometric decomposition into a pair of right-angled ideal hyperbolic polyhedra, as was first demonstrated by Agol and D. Thurston in the appendix to \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Lac04} (see also \Cref{subsec:FALdecomp}). For sufficiently long Dehn surgeries of the crossing circles, the deformation of the geometric structure is minimal and we are able to study many topological and geometric properties of the resulting knot complements in terms of the geometric structures of the FAL complements {(see for example \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Pur07, FP07})}. Going forward this will be our main line of attack, and as a result we will be forced to restrict our analysis to hyperbolic knot complements having sufficiently many twists in each twist region, which we call $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complements. The exact parameters for the number of twists necessary for a knot to be $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ depends on the geometry of the FAL being filled; see \Cref{subsub:Twistedknots} for details and \Cref{subsec:examples-twisted-generic} for explicit examples. Our first result shows that such knot complements do not admit hidden symmetries, providing a major step towards analyzing their commensurability classes. \begin{thm}\label{thm:no_rigid_cusps} Let $M = \SS^{3} \setminus K$ be an $(\epsilon,d_L)$-twisted knot complement. Then $M$ admits no hidden symmetries. \end{thm} Although we prefer to delay the rather technical definition of $(\epsilon,d_L)$-twisted until the next section, we will show in \Cref{prop:HT_non-empty} that all sufficiently long $\frac{1}{q_i}$ fillings of FAL complements along crossing circles have this property. Thus we immediately get the following corollary about sequences of knot complements geometrically converging to an FAL complement: \begin{cor}\label{cor:no_geo_limit} Let $\{ M_i = \SS^3 \setminus K_i\}$ be a sequence of hyperbolic knot complements resulting from filling the crossing circles of an FAL complement $\SS^3\setminus L$, such that each filling slope has length at least $n_i$, with $\lim_{i\to \infty} n_i=\infty$. Then only finitely many $M_i$ have hidden symmetries. \end{cor} In light of this, it is perhaps unsurprising that each of the three examples of knot complements known to admit hidden symmetries arise with just two twists per twist region. Geometrically, this means that the hyperbolic structures of these knot complements are not similar to the hyperbolic structures of their ancestor FAL complements. By combining Theorem \ref{thm:no_rigid_cusps} with \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 1.4]{BBCW12} we also get the following corollary, which provides further evidence in favor of the conjecture of Reid and Walsh: \begin{cor} There are at most three hyperbolic knot complements in the commensurability class of an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complement. \end{cor} Work of Margulis \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Mar91} shows that any (non-arithmetic) hyperbolic knot complement covers a unique (orientable) minimal volume orbifold $\mathcal{O}$ in its commensurability class. Theorem \ref{thm:no_rigid_cusps} implies that when $M=\SS^3\setminus K$ is an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complement such a cover must be regular and in particular, $\mathcal{O}$ must be the quotient of $M$ by its group of orientation-preserving symmetries. Thus it is natural to study the symmetry group of $M$ in order to more fully understand the commensurability class of $M$. Since our definition of an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complement (see \Cref{subsub:Twistedknots}) guarantees that the core geodesics introduced under Dehn filling are the shortest geodesics in $M$, any symmetry of $M$ must map this set of geodesics to itself. This provides a significant restriction on the symmetry groups of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complements, which we highlight in the following theorem. For this result we not only need our knot complements to be $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$, but also generic, which means that no isometry of $\SmK$ permutes the core geodesics of the filling solid tori. For instance, if these core geodesics all have different lengths, then this filling is generic. See \Cref{subsub:TandGknots} for more details on this. \begin{thm}\label{thm:max_size_sym_group} Let $M = \SS^{3} \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement. Then $M$ has an orientation-preserving symmetry group of order at most $4$. \end{thm} In addition to establishing that such symmetry groups must be very small, we also determine how any non-trivial symmetries must act on the cusp of $M$; see \Cref{cor:free_cusp_symms}. Furthermore, we note that there are infinite families of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements with symmetry groups of order exactly 4; see \Cref{rem:tight}. Finally, combining \Cref{thm:max_size_sym_group} and \Cref{thm:no_rigid_cusps} shows that the minimal orbifold cover $M \rightarrow \mathcal{O}$ described in the previous paragraph is at most degree 4; this is stated in \Cref{cor:HTHDwithRigidCusps}. This result makes it quite feasible to directly analyze $\mathcal{O}$, and thus assist with distinguishing commensurability classes of $(\epsilon,d_L)$-twisted and generic knot complements. Futer and Purcell establish that if a twist-reduced diagram of a knot has enough twist regions and enough twists in each twist region, then the associated complement cannot admit exceptional surgeries (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Corollary 1.8]{FP07}). We refer the reader to \Cref{fig:dodeca_twisted} for a visual of twist regions and \Cref{sec:background} for the definition. We extend this result by obstructing quotients of $(\epsilon,d_L)$-twisted and generic knot complements with the same properties from admitting exceptional surgeries. We summarize both our result and those of Futer and Purcell in the following theorem. \newcommand{\secondSlopeLongText}{Let $\SS^3 \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement admitting a twist-reduced diagram with at least $9$ twist regions such that each twist region has at least $6$ crossings. Then $\SS^3 \setminus K$ has no non-trivial exceptional fillings, and the quotient $\mathcal{Q}$ of $\SS^3 \setminus K$ by its symmetries that act freely on the cusp has no non-trivial exceptional fillings that are good orbifolds. } \begin{thm}\label{lem:second_slope_long} \secondSlopeLongText \end{thm} See \Cref{sect:6Theorem} for the definition of a good orbifold.The fact that our results extend to quotients allows for the following corollary, which asserts that these knot complements are the unique knots in their respective commensurability classes. \newcommand{Let $\SS^3 \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement admitting a twist-reduced diagram with at least $9$ twist regions such that each twist region has at least $6$ crossings. Then $\SS^3 \setminus K$ is the only knot complement in its commensurability class.}{Let $\SS^3 \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement admitting a twist-reduced diagram with at least $9$ twist regions such that each twist region has at least $6$ crossings. Then $\SS^3 \setminus K$ is the only knot complement in its commensurability class.} \begin{cor}\label{thm:only_knot_comm_class} Let $\SS^3 \setminus K$ be an $(\epsilon,d_L)$-twisted and generic knot complement admitting a twist-reduced diagram with at least $9$ twist regions such that each twist region has at least $6$ crossings. Then $\SS^3 \setminus K$ is the only knot complement in its commensurability class. \end{cor} This paper focuses on knot complements having a large number of crossings in each twist region. It is natural to ask if it is sufficient to have a single twist region with a large number of crossings. Further, one might ask for a universal lower bound on what is meant by ``large." The below conjecture asserts that such a condition should be sufficient for the conclusion of \Cref{thm:no_rigid_cusps}. Proving such a result would be a major step toward resolving \Cref{conj:NR}. \begin{conj} Let $\SmK$ be a knot complement and $D$ be a twist-reduced diagram of $K$. If $\SmK$ admits hidden symmetries, there exists universal upper bound $C$ on the number of crossings in a twist region of $D$. \end{conj} \subsection{FAL structure results} In \Cref{sec:hidden_syms}, a significant amount of work goes into developing structural results for any hyperbolic FAL $L$ obtained from fully augmenting a knot $K$. While the main purpose of these results is to provide tools for proving {the above} theorems about $(\epsilon,d_L)$-twisted and generic knot complements, they also {highlight} some interesting properties of horoball packings and orbifold covers of FAL complements. In what follows, let $K_0$ be the component of $L$ corresponding to $K$ and suppose there exists an orbifold cover $p: \SS^{3} \setminus L \rightarrow \mathcal{O}$. \Cref{sec:order_3} shows that certain FAL complements cannot admit horoball packings with an order $3$-rotational symmetry, which then restricts the geometry of $\mathcal{O}$. Specifically, if none of the crossing circle cusps of $\SS^{3} \setminus L$ cover a rigid cusp, then the cusp of $\SS^3 \setminus L$ corresponding to $K_0$ cannot cover an $\SS^{2}(3,3,3)$ or $\SS^{2}(2,3,6)$ rigid cusp; see \Cref{subsub:Twistedknots} for more details on rigid cusps and \Cref{lem:no_ord3} for a precise statement of this fact. In \Cref{sec:order_4}, FAL complements whose horoball packings admit an order $4$-rotational symmetry are analyzed. Such FAL complements exist, though the geometry of their corresponding horoball packings is quite restrictive, as shown in \Cref{prop:fullH}. As a result, any FAL complement $\SS^3 \setminus L$ where the cusp corresponding to $K_0$ covers a $\SS^2(2,4,4)$ rigid cusp must either have every crossing circle cusp covering a rigid cusp or else $\SS^3 \setminus L$ covers a specific orbifold $\mathcal{O}$ with two $\SS^{2}(2,4,4)$ cusps; see \Cref{lem:rigid} for a statement of this result and \Cref{fig:D_orb} and \Cref{fig:DL_orb} for descriptions of $\mathcal{O}$. \subsection{Paper Organization} The paper is arranged as follows. In \Cref{sec:background}, we discuss the necessary background on the geometry of FAL complements and $(\epsilon,d_L)$-twisted knot complements. In particular, we describe how to construct such knot complements via Dehn filling FAL complements, and discuss some of the important covering space properties of these knot complements. In \Cref{sec:hidden_syms}, we provide a careful analysis of the horoball packings of FAL complements and leverage this analysis to understand orbifold covers of FAL complements that come from restricting orbifold covers of $(\epsilon,d_L)$-twisted knot complements. This all assists in proving \Cref{thm:no_rigid_cusps} at the end of \Cref{sec:hidden_syms}. In \Cref{sec:sym}, we further exploit our understanding of orbifold covers of FAL complements to prove \Cref{thm:max_size_sym_group} by restricting the degree of certain orbifold covers of FAL complements. In \Cref{sect:unique_in_comm_class}, we prove \ref{lem:second_slope_long} and \Cref{thm:only_knot_comm_class}, which builds off of our previous work along with an orbifold version of the 6-theorem. In \Cref{sec:QR}, we construct explicit examples of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements. For each one of these examples, the knot complement in question is the unique knot complement in its commensurability class. \subsection{Acknowledgements:} The first author was partially supported by grant from the Simons Foundation (\#524123 to Neil R. Hoffman). Part of this project began when the first and second authors were visiting the Okinawa Institute of Science and Technology during the Geometry and Topology of 3-manifolds workshop. We thank the Institute and the organizers of the workshop for their hospitality. The second author also wishes to thank Rice University and Oklahoma State University for hosting him during this project. We also thank Dave Futer for providing insightful suggestions on quantifying changes in geometry under Dehn surgery. We wish to thank Jason Deblois for a number of discussions, which led to revisions in \Cref{sec:hidden_syms}. Finally, we wish to thank the referee for a number of thoughtful suggestions about the paper, especially for the prompt to extract the relevant details from the final example as a theorem. \section{Symmetries of $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knots}\label{sec:sym} The symmetries of an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complement are restricted in the sense that the $\epsilon$-thin parts of the manifold must be permuted under any symmetry. When a knot complement is $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic such a permutation is trivial, and we can narrowly characterize the symmetry group of such a knot complement. In what follows, let $\mathcal{K}=\SS^3\setminus K $ be an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complement obtained by Dehn filling all of the crossing circles of an FAL complement $\L = \SS^3 \setminus L$, where $L$ has a single planar component. Our goal here is to prove the following theorem on the structure of the (orientation preserving) symmetry group $Sym^+(\mathcal{K})$. \begin{thm} \label{thm:HTHDcovering} If $\mathcal{K}$ is an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complement, then its orientation preserving symmetry group satisfies ${|Sym^+(M)| \leq 4}$. \end{thm} In fact, we will prove something slightly stronger, namely, that $|Sym^+(\mathcal{K})| = 1$, $2$, or $4$. In the case that the group is order two, the non-trivial element could be a strong involution fixing points on the cusp or an order 2 symmetry acting freely on the cusp, but fixing points in the interior of $\mathcal{K}$. We collect these facts in \Cref{cor:free_cusp_symms} at the end of this section. Together, \Cref{thm:ht_no_rigid_cusps} and \Cref{thm:HTHDcovering} provide important information about the commensurability class of $\mathcal{K} = \mathbb{H}^{3} / \Gamma$. Since $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ knot complements must be non-arithmetic (see \Cref{subsec:SuffTwisted}), work of Margulis \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Mar91} then implies that there exists a unique minimal (orientable) orbifold in the commensurability class of $M$, namely, $\mathcal{O} = \mathbb{H}^{3} / C^{+}(\Gamma)$, where $C^+(\Gamma) = \{ g \in \mathrm{Isom}^+(\mathbb{H}^{3}) : | \Gamma : \Gamma \cap g \Gamma g^{-1} | < \infty \}$. Our work places strong restrictions on the covering map $\psi: \mathcal{K} \rightarrow \mathcal{O}$ and the geometric structure of $\mathcal{O}$. \begin{cor}\label{cor:HTHDwithRigidCusps} If $\mathcal{K}$ is an $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complement, then the degree of the minimal orbifold covering map $\psi:\mathcal{K} \rightarrow \mathcal{O}$ is at most $4$. \end{cor} \begin{proof} Hidden symmetries of $\mathcal{K}$ correspond with elements of $C^{+}(\Gamma) \setminus \L^{+}(\Gamma)$, where $\L^{+}(\Gamma)$ is the normalizer of $\Gamma$ in $\mathrm{Isom}^{+}(\mathbb{H}^{3})$. \Cref{thm:ht_no_rigid_cusps} and \Cref{thm:NR} imply that $\mathcal{K}$ has no hidden symmetries, and so, $C^+(\Gamma) = \L^+(\Gamma)$. Since $Sym^+(\mathcal{K}) \cong \L^+(\Gamma) / \Gamma$, we have that $\mathcal{O} = \mathbb{H}^{3} / C^{+}(\Gamma) = \mathbb{H}^{3} / \L^{+}(\Gamma) = \mathcal{K} / Sym^{+}(\mathcal{K})$. Thus, \Cref{thm:HTHDcovering} restricts the degree of $\psi$ to at most $4$. \end{proof} \vspace{0.1in} As noted in the proof above, $C^{+}(\Gamma) = \L^+(\Gamma)$, and so $\psi: \mathcal{K} \rightarrow \mathcal{O}$ is just the quotient of $\mathcal{K}$ via $Sym^+(\mathcal{K})$. This fact only relies on \Cref{thm:ht_no_rigid_cusps}, and we will assume that it holds going forward. Thus, proving \Cref{thm:HTHDcovering} is equivalent to proving that the covering map $\psi: \mathcal{K} \rightarrow \mathcal{O}$ is at most degree $4$. Our work partially follows the same line of argument as the proof of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 1.7]{FM17}, which shows that certain hyperbolic $3$-manifolds are the minimal orbifold in their respective commensurability classes. Their work requires some very strong conditions placed on the geometry of thrice-punctured spheres inside of a cusped hyperbolic $3$-manifold in order to obtain the desired result. In a similar fashion, we exploit the geometry of thrice-punctured spheres in our FAL complements to help reach our desired covering restriction. Let $\mathcal{O} \cong M / Sym^{+}(M)$. \Cref{prop:HT_non-empty} implies that the quotient map $\psi:\mathcal{K} \rightarrow \mathcal{O}$ induces a quotient map $\psi_{\L}: \L \rightarrow \mathcal{Q}$ with $\mathcal{Q} \cong \mathcal{O} \setminus \sqcup_{i=1}^{n} \psi(\gamma_{i})$, where $\gamma_{i}$ is the geodesic core of the $i^{th}$ surgery solid torus. Furthermore, \Cref{prop:symrelation} tells us that $\mathcal{Q}$ is the quotient of $N$ by the subgroup of $Sym^{+}(N)$ that maps each cusp of $N$ to itself. We will now consider how thrice-punctured spheres in $N$ behave under the quotient map $\psi_{N}$. For our hyperbolic FAL complement $\L = \mathbb{S}^{3} \setminus L$, consider a crossing disk, as described in \Cref{subsec:PD}. Such a crossing disk is isotopic in $\L$ to a totally geodesic thrice-punctured sphere $S \subset \L$ \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Lemma 2.1]{Pur11}. Let $p_{1}$, $p_{2}$, and $p_{3}$ be the three punctures of $S$. Let $\H$ be the preferred horoball packing for $L$, with associated covering map $\pi:\mathbb{H}^3\to \L$, and let $n(K_0),n(C_1),\dots,n(C_n)$ be neighborhoods of the cusps of $\L$ that lift to $\H$. The neighborhood $n(K_0)$ contains neighborhoods of two of the punctures of $S$, say $p_2$ and $p_3$, given by the components of $S\cap n(K_0)$. Let $D_j$ be the connected component of $S\cap n(K_0)$ containing $p_j$, $j=2,3$. The third puncture $p_1$ is contained in $n(C_{i_S})$ for some crossing circle $C_{i_S}$, and we denote by $D_1$ the neighborhood of $p_1$ given by $S\cap n(C_{i_S})$. Let $\psi_S=\psi_N|_S$ be the restriction of $\psi_{\L}$ to $S$. The next lemma restricts the degree of $\psi_S$, and is the first step toward restricting the degree of $\psi$. \begin{lem} \label{lemma:cover3PS} Let $S \subset \L$ be a crossing disk. Then $\psi_S$ is either a 1-to-1 map, a 2-to-1 map or a 4-to-1 map. \end{lem} \begin{proof} Recall that $\psi_{\L}$ is the quotient map $\L/G$, where $G=f(Sym^+(\mathcal{K}))\le Sym^+(\L)$, and $S\subset \L$ is totally geodesic. It follows that $\psi_S$ is a quotient map for the quotient $S/G_S$, where $G_S\le G$ are the symmetries in $G$ that restrict to symmetries of $S$. By \Cref{prop:symrelation}, $G$ must map each cusp of $\L$ to itself. Thus, any symmetry in $G_S$ must take $D_1$ to itself, and permute $D_2$ and $D_3$ (possibly trivially). \Cref{fig:thrice_punctured_symms} shows three non-trivial symmetries on $S$ that satisfy these conditions, and generate a group of order 4. We claim that the symmetries described in \Cref{fig:thrice_punctured_symms} are the only symmetries of $S$ satisfying the required conditions. First, a thrice-punctured sphere $S$ has a unique hyperbolic structure, which implies that every homeomorphism of $S$ is isotopic to an isometry. Since homeomorphisms of $S$ are completely determined by their action on the cusps, we only need to consider how an isometry could permute cusps and possibly switch orientations on cusps of $S$. For us, the cusp corresponding to $p_{1}$ must be fixed under any isometry under consideration, and so, we only have 4 possible isometries coming from permuting the two remaining cusps and possibly switching orientations. \end{proof} \begin{figure} \centering \includegraphics[scale=2]{symmetries} \caption{ A schematic of the three non-trivial symmetries of the thrice punctured sphere that result in two cusped quotients. Using the standard fundamental domain for the thrice punctured sphere, two ideal triangles with vertices at $0$,$-1$,$1$, and $\infty$, these symmetries can be realized by a rotation of order 2 fixing $\mathfrak{i}$, a reflection through $0$,$\infty$ and a reflection through the line with endpoints $-1$ and $1$.} \label{fig:thrice_punctured_symms} \end{figure} Let $R = \psi_{\L}(S)$. In order to leverage the degree of $\psi_S$ determined above to obtain information about the degree of $\psi$, we will need to determine the number of pre-images in $\psi_{\L}^{-1}(R)$. To this end, we first show that $R$ must be an embedded, totally geodesic $2$-orbifold in $\mathcal{Q}$. The following lemma implies this fact. \begin{lem} \label{lemma:3PSintersections} The quotient $\psi_{\L}(S)$ has no transverse self-intersections. \end{lem} \begin{proof} Here, we follow a similar procedure to the one used in Lemma 2.8 of Futer--Millichap \def\citeauthoryear##1##2{##1, ##2}\@internalcite{FM17}. We first rule out transverse self-intersections between the images of the 2-dimensional cusp neighborhoods, $\psi(D_{i})$ for $i= 1, 2, 3$. Then we show this implies that we can not have transverse self-intersections anywhere else in $\psi_{\L}(S)$, completing the proof. As noted in the proof of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Lemma 2.8]{FM17}, the only way that $\psi_{\L}(D_i)$ can have transverse intersection with $\psi_{\L}(D_j)$ is if the cusp neighborhoods containing $D_i$ and $D_j$ are identified under $\psi_{\L}$, and $\psi_{\L}(\partial D_i)$ and $\psi_{\L}(\partial D_j)$ represent distinct slopes. The first condition can only be met for $D_2$ and $D_3$ (since $\psi_{\L}$ does not exchange cusps of $\L$), and the boundary of each of these meets the boundary torus of $n(K_0)$ in a meridian. Since the cusps in $\mathcal{Q}$ are non-rigid, this meridian maps down to a well-defined slope in $\mathcal{Q}$. So, the slopes of $\psi_{\L}(\partial D_i)$ and $\psi_{\L}(\partial D_j)$ must be the same in $\mathcal{Q}$. Thus, transverse self-intersections do not occur between the cusps of $\psi_{\L}(S)$. It remains to show that $\psi_{\L}(S)$ does not have transverse self-intersections outside of its cusp neighborhoods. For this the exact same argument as the one used in the proof of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Lemma 2.8]{FM17} goes through unchanged, and we refer the reader to this work for explicit details. In short, if $\psi_{\L}(S)$ has a transverse self-intersection somewhere outside of its cusp neighborhoods, then there exists a path of transverse self-intersections in $\psi_{\L}(S)$ that goes into some cusp of $\psi_{\L}(S)$, contradicting the previous paragraph. Therefore, $\psi_{\L}(S)$ has no transverse self-intersections. \end{proof} Next we show that for some crossing disk $S$, the embedded totally geodesic 2-orbifold $R=\psi_{\L}(S)$ has pre-image exactly $S$. To do this, we will first need to show that there is a crossing circle that has only one generalized crossing disk, which is its standard crossing disk (recall \Cref{subsec:PD} for the definition of generalized crossing disks). We first need a technical lemma that relies on the following definition. For $\SmL$, we have that $P_1$ and $P_2$ are the two polyhedra with shaded faces as in \Cref{sec:background}. The \emph{nerve} of $\SmL$ (or just the nerve of $L$) is the dual 1-skeleton of the unshaded faces of $P_1$ (see also \def\citeauthoryear##1##2{##1, ##2}\@internalcite{Pur11} for more background). \begin{lem}\label{lem:subgraph} Let $C$ be a crossing circle of an FAL $L$. If $C$ has more than one generalized crossing disk, then the nerve $\mathcal{N}$ of $L$ contains the subgraph $\mathcal{N}_C$ shown in \Cref{fig:subgraph}, in which the red edge corresponds to the crossing circle $C$. \end{lem} \begin{proof} Let $P_i$, $i\in\{1,2\}$, be the polyhedra coming from the polyhedral decomposition of $L$, and let $\mathcal{N}$ be the nerve. If $C$ has a generalized crossing disk that is not the standard crossing disk, then there are triangles $\tau_i\subset P_i$ such that $\tau_i$ has $C$ as a vertex, and $\tau_i$ separates $P_i$. On $P_i$, $\tau_i$ is a path across white faces connecting 3 distinct vertices. Such a path gives a 3-cycle in the nerve, one edge of which must correspond to $C$ since $\tau_i$ has a vertex corresponding to $C$. The two triangles of $\mathcal{N}$ adjacent to $C$ correspond to the standard crossing disk of $C$, so there must be 2 additional edges that form the 3-cycle corresponding to $\tau_i$. \end{proof} \begin{prop} \label{prop:CDs} Let $L$ be an FAL. Then $L$ has at least one crossing circle having only one generalized crossing disk. \end{prop} \begin{proof} Let $\mathcal{N}$ be the nerve for $L$. Suppose every crossing circle has $\ge 2$ generalized crossing disks. The preceding \Cref{lem:subgraph} then implies that for every crossing circle there is a subgraph as shown in \Cref{fig:subgraph}. In particular, for every crossing circle $C_i$ there is a 3-cycle $\beta_i$ in $\mathcal{N}$ that is non-trivial in the sense that it does not bound a triangle. Identify $\SS^2$ with $\widehat{\mathbb{R}^2}=\mathbb{R}^2\cup\{\infty\}$, so that the point $\infty$ is disjoint from the edges and vertices of $\mathcal{N}$. Let $\Delta_i$ be the component of $\widehat{\mathbb{R}^2}\setminus \beta_i$ that does not contain $\infty$. For any other crossing circle $C_j$, the corresponding non-trivial 3-cycle $\beta_j$ is either disjoint from $\Delta_i$ (though it may intersect $\beta_i$), or it has 1 or more vertices contained in $\Delta_i$, in which case it is contained in $\Delta_i\cup \beta_i$. Note that $\Delta_i$ does not contain the vertices of $\beta_i$ as we have defined it. It follows that we can find a crossing circle $C_{i_0}$ whose non-trivial 3-cycle $\beta_{i_0}$ is innermost, in the following sense: the component $\Delta_{i_0}$ of $\widehat{\mathbb{R}^2}\setminus \beta_{i_0}$ that does not contain $\infty$, contains no vertex of any other non-trivial 3-cycle associated to a crossing circle. Now consider the subgraph $\mathcal{N}_{C_{i_0}}$ given by \Cref{lem:subgraph}. The (arrow shaped) quadrilateral $Q\subset \mathcal{N}_{C_{i_0}}$ must contain a red colored edge (i.e., one associated to a crossing circle), otherwise $Q$ would subdivide into triangles, each having all three edges uncolored, contradicting the fact that every triangle of a nerve must have exactly one colored edge. This colored edge cannot be part of a non-trivial 3-cycle, as such a 3-cycle would have a vertex in $\Delta_{i_0}$, contradicting our requirement that $\beta_{i_0}$ is innermost. Thus the associated crossing circle has no generalized crossing disk other than the standard one, contradicting our assumption. \end{proof} \begin{figure} \centering \includegraphics[scale=1]{subgraph} \caption{The subgraph $\mathcal{N}_C$, with a (vertical) red edge corresponding to the crossing circle $C$, must be present if $C$ has more than one generalized crossing disk.} \label{fig:subgraph} \end{figure} We are now ready to prove our main theorem for this section. \begin{proof}[Proof of \Cref{thm:HTHDcovering}] Let $S$ be a totally geodesic thrice-punctured sphere that is a crossing disk for a crossing circle $C_{i}$ of $L$. First, we determine the structure of $\psi_{\L}^{-1}(R) = \psi_{\L}^{-1} \circ \psi_{\L} (S)$. \Cref{lemma:3PSintersections} implies that $\psi_{\L}(S)$ is an embedded totally geodesic cusped $2$-orbifold in $\mathcal{Q}$. Thus, $\psi_{\L}^{-1}(R)$ must be a disjoint union of embedded totally geodesic cusped surfaces in $\L$. Let $F$ be a component of $\psi_{\L}^{-1}(R)$. First, we will show that $F$ must be a totally geodesic thrice-punctured sphere in $\L$. This follows from the same argument used in the proof of \def\citeauthoryear##1##2{##1, ##2}\@internalcite[Theorem 2.3]{FM17} and requires analyzing a particular decomposition of $S$ (coming from a Ford domain for $S$), which we now describe. Consider our preferred horoball packing $\H$ coming from \Cref{thm:hbp_FP07}. Under our covering $\pi:\mathbb{H}^3\to \L$, this horoball packing descends to a particular choice of cusp neighborhoods for $\L$, which then (geometrically) determine the set of $2$-dimensional cusp neighborhoods $\{ D_i \}$ of $S$. Let $E_{i} \subset S$ be the closure of the set of points in $S$ that are closer to $D_{i}$ than to any other $D_{j}$. For this cusp expansion, the set $\{D_{i}\}$ is invariant under the symmetries of $S$ and each $\partial D_{i}$ has length $2$. Thus, the elements of $\{E_{i}\}$ are all isometric to a once-punctured disk with non-ideal boundary consisting of two geodesic segments meeting at angles of $2\pi/3$. We call this decomposition of $S$ into $\{E_{i}\}$ its Ford decomposition and each $E_{i}$ a Ford cell of $S$. We now bootstrap off of this Ford decomposition of $S$ to determine the corresponding Ford decomposition of $F$. The Ford decomposition of $F$ (relative to our preferred horoball packing $\H$) decomposes $F$ into a collection of Ford cells, one for each cusp of $F$. Since each $\psi_{\L} (\partial D_{j})$ realizes exactly one slope on each cusp of $\mathcal{Q}$ (see the proof of \Cref{lemma:3PSintersections}), each cusp of $F$ has the same slope as some $\partial D_{j}$. Thus, each cusp of $F$ has a boundary slope of length $2$, which implies each cusp of $F$ has area $2$ and is isometric to a copy of $D_i$. Since the density of the cusp neighborhoods of $F$ is the same as that of $S$, each Ford cell of $F$ must be isometric to $E_{i}$. The only complete, connected hyperbolic surface that can be constructed by gluing together some number of copies of $E_{i}$ is a thrice-punctured sphere, as needed. We now claim that $F$ must be a generalized crossing disk. \Cref{prop:symrelation} implies that there is a one-to-one correspondence between cusps of $\L$ and cusps of $\mathcal{Q}$, and so, we know that $F$ must have one cusp coming from intersecting $n(C_{i_S})$ and two cusps coming from intersecting $n(K_{0})$. The classification of thrice-punctured spheres in FAL complements given by Morgan--Spyropoulus--Trapp--Ziegler (\def\citeauthoryear##1##2{##1, ##2}\@internalcite[Propositions 9 and 13]{morganbelted}) implies that $F$ must be a generalized crossing disk. Since we are quotienting $\L$ by orientation-preserving symmetries, the singular locus of $\mathcal{Q}$ is at most one-dimensional, and so, we can conclude that the degree $d(\psi_{\L})$ of $\psi_{\L}$ is the same as the degree of the restriction $\psi_{\L}|_{\psi_{\L}^{-1}(R)}$ of $\psi_{\L}$ to the pre-image of $R=\psi_{\L}(S)$ for any crossing disk $S$. \Cref{lemma:cover3PS} tells us that $\psi_S$ is at most a 4-to-1 covering map. In addition, \Cref{prop:CDs} along with the previous paragraph implies that there exists some crossing disk $S_0$ such that $\psi_{\L}^{-1}(R_0) = \psi^{-1} \circ \psi (S_0) = S_0$. So, for this particular crossing disk, we have $d(\psi_{\L}|_{\psi_{\L}^{-1}(R_0)}) \le 4$. Therefore, $d(\psi_{\L})=d(\psi)$ is at most $4$, which implies that $|Sym^+(\mathcal{K})| \leq 4$. \end{proof} \begin{rem}\label{rem:tight} We observe that this bound on the number of symmetries is tight: there exists infinitely many $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complements that have an order four (orientation-preserving) symmetry group. For instance, any $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic 2-bridge knot complement will have exactly an order four (orientation-preserving) symmetry group; of course this is well-known (see \def\citeauthoryear##1##2{##1, ##2}\@internalcite{sakuma1990geometries} for example). \end{rem} We can completely describe the symmetry group of $\mathcal{K}$ based on how its inclusion into $Sym^+(N)$ acts on thrice punctured spheres. Thus, the proof of the following corollary follows directly from extending the action of the symmetries exhibited in \Cref{fig:thrice_punctured_symms} to $N$ and then $\mathcal{K}$. \begin{cor}\label{cor:free_cusp_symms} Let $\mathcal{K}$ be a $(\epsilon,d_L)\mbox{-twisted}}%{\epsilon\mbox{d}_L\mbox{-T}$ and generic knot complement. Then $Sym^+(\mathcal{K})$ has at most three non-trivial elements. Furthermore, the group has zero or one element that acts freely on the cusp. \end{cor}
\section{Introduction}\label{s:intro} The Bitcoin protocol was a remarkable feat: eleven years after its sudden appearance \cite{Satoshi}, and without much adjustment and debugging, it has been used by millions of people and has launched the blockchain industry. Arguably, the most crucial and ingenious aspect of its design lies in the {\em incentives} the protocol provides to its miners to participate and follow it faithfully. We believe it is of great importance and interest to understand and scrutinize the incentives provided by blockchain protocols---and to do so through the point of view and the methodology of Economic Theory, the science of incentives. Flaws in the incentives of a blockchain protocol can manifest themselves at multiple timescales. For longest-chain proof-of-work blockchains like Bitcoin, the most well-studied incentive-based attacks, such as selfish mining~\cite{EG14,SSZ16,KiayiasEC16} and transaction sniping~\cite{CKWN16}, concern miners reasoning strategically over multiple block creation epochs. For example, in selfish mining, a miner relinquishes revenue in the short term to achieve greater revenue (in expectation) in the long run via a type of forking attack. This paper studies incentive issues and potential deviations from intended miner behavior at the most basic time scale, that of a single block creation epoch. We focus on the allocation of {\em block rewards}, which drives the incentive structure in Bitcoin and many other similar protocols. The dominant paradigm in proof-of-work blockchains is to fix a per-block reward, and for each block to allocate the entire reward to whichever miner first solves a difficult cryptopuzzle. Assuming that miners independently and randomly guess and check possible solutions to the cryptopuzzle, the expected reward earned by a miner is proportional to their share of the total contributed computational power. The proportional reward allocation scheme is a simple, natural, and compelling idea, and in all evidence it works quite well. {\em But is there any sense in which it is ``optimal''?}\ To answer, one has to start by considering the whole spectrum of options; next one must articulate appropriate desiderata; and finally, characterize the full extent of possible solutions that satisfy these desiderata. This is in line with the axiomatic methodology, which has been traditionally employed in Economic Theory for the development of utility theory~\cite{vNM}, of impossibility results in social choice~\cite{Arrow}, as well as of cooperative game theory~\cite{Shapley}, to name three salient examples. The advantage of the axiomatic approach is that through it one understands not only the domain of possibilities, but also the costs of transgressing the boundaries of this domain. This is our focus in this paper. \subsection{The Proportional Allocation Rule and Its Alternatives} We formalize the question above through the concept of {\em allocation rules}, functions that map profiles of contributed hashing power to profiles of expected block rewards. The input to such a function is an $n$-tuple $\mathbf{h} =(h_1,h_2,\ldots,h_n)$ of positive integers, where $h_i$ is the hash rate contributed by miner~$i$ in a given block creation epoch, and~$n$ is the number of distinct miners (i.e., distinct public keys) that contribute a non-zero hash rate. When the epoch ends and a new block is authorized, one unit of reward becomes available, and the question is, {\em how should it be allocated to the miners?} The output of an allocation rule specifies an answer to this question, in the form of an $n$-tuple $\mathbf{p}=(p_1,p_2,\ldots,p_n)$, where~$p_i$ is the expected reward to miner~$i$. As mentioned above, the allocation rule corresponding to the Bitcoin protocol is the {\em proportional rule}, with \[ p_i = \frac{h_i}{\sum_{j=1}^n h_j}. \] Is the proportional rule ``optimal''? Or, an even more basic question: What alternatives to the proportional allocation rule are possible? At first blush, it might seem as though a proof-of-work blockchain has no choice but to implement the proportional allocation rule, as presumably the probability distribution over which miner is first to produce a cryptopuzzle solution will be proportional to the contributed computational power. However, as we discuss in Section~\ref{ss:impl}, a rich class of allocation rules can in principle be implemented (at least approximately) within a proof-of-work blockchain. The key idea is to wait for a large number of solutions to a medium-difficulty cryptopuzzle, rather than a single solution to a high-difficulty puzzle. Each solution acts as a single sample from the distribution proportional to miner hash rates, and with a large enough number of samples all miners' hash rates can be estimated with high accuracy. This, in turn, permits the (approximate) implementation of a wide range of allocation rules, even though the true miner hash rates are not a priori known to the protocol. \subsection{Properties of Allocation Rules}\label{ss:props} The definition of an allocation rule is generic enough; the question is, what kinds of properties should such allocation rules satisfy? We consider an array of possible properties, which a blockchain designer may (or may not) require of an allocation rule. The first several properties are motivated by economic viability and fairness rather than incentives per se. \begin{itemize} \item {\em Non-negativity.} Expected rewards (the $p_i$'s) should be nonnegative. That is, the protocol cannot require payments from miners. \item {\em Budget-balance.} The protocol cannot be ``in the red,'' meaning the sum of expected block rewards cannot exceed the unit of block reward available. {\em Strong} budget-balance insists that the entire unit of block reward is allocated, while {\em weak} budget-balance allows the protocol to withhold some of the block reward from miners. \item {\em Symmetry.} The allocation rule should not depend on the names of the miners (i.e., their public keys), only on their contributed hash rates. \end{itemize} Finally, there are two further properties aimed at disincentivizing certain behaviors by the miners that may be considered undesirable by the blockchain designer: \begin{itemize} \item {\em Sybil-proofness.} No miner can possibly benefit by creating many accounts and splitting its mining power among them. \item {\em Collusion-proofness.} Two or more miners cannot benefit by pooling their mining resources and somehow splitting the proceeds. This property has different variants depending on what types of payments between colluding miners are permitted; see Section~\ref{ss:axioms}. \end{itemize} The proportional allocation rule satisfies all five properties (presumably by design), including the strong version of budget-balance. \subsection{Our Results} We prove a number of characterization results that identify which allocation rules satisfy which sets of desired properties. We begin with risk-neutral miners, who care only about expected rewards (and no other details of the reward distribution). Our first result is: \begin{enumerate} \item The proportional allocation rule is the unique allocation rule that, with risk-neutral miners, satisfies non-negativity, strong budget-balance, symmetry, sybil-proofness, and a weak form of collusion-proofness (Theorem~\ref{theo1}). \end{enumerate} That Bitcoin's block reward scheme is a singularly good idea hardly comes as a surprise. Nevertheless, we believe there is value in formally articulating what makes it unique. Further, if one relaxes the requirements slightly, additional allocation rules become possible. For example: \begin{enumerate} \item [(2)] A family of allocation rules that we call the {\em generalized proportional allocation rules} constitute the only allocation rules that, with risk-neutral miners, satisfy non-negativity, weak budget-balance, symmetry, sybil-proofness, and a slightly stronger form of collusion-proofness (Theorem~\ref{theo2}). \end{enumerate} But is it reasonable to assume that miners are risk-neutral? The phenomenon of {\em mining pools} for Bitcoin and other cryptocurrencies (see e.g.~\cite{L+15}) is a behavior which, intuitively, aims to reduce the risk of each miner, and thus suggests that miners in the real world are {\em risk-averse.}\footnote{There may also be other reasons to join a mining pool, for example to avoid the cost of maintaining a full node, but risk-aversion is undoubtedly a first-order factor. (Who is willing to wait an expected twenty years for their first reward?)} We prove an {\em impossibility result} that makes this intuition precise: \begin{enumerate} \item [(3)] If miners are risk averse (equivalently, their utility is the expectation of a strictly concave function of the reward), then there is {\em no} non-zero allocation rule that is symmetric, (weakly) budget-balanced, sybil-proof, and (weakly) collusion-proof (Theorem~\ref{theo3}). \end{enumerate} {This result suggests that mining pools as a form of collusion are unavoidable.} In contrast: \begin{enumerate} \item [(4)] If miners are {\em risk-seeking}, then Bitcoin's proportional allocation rule satisfies (strong versions) of all of the desired properties (Theorem~\ref{theo7}). \item [(5)] A deterministic implementation of the proportional rule---with the block reward split fractionally between miners---satisfies all of the desired properties even with risk-averse miners (Corollary~\ref{cor:poss}). \end{enumerate} The deterministic implementation in~(5) can be viewed as a simulation of the functionality of a mining pool inside the blockchain protocol itself, analogous to the ``Revelation Principle'' from mechanism design theory.\footnote{FruitChain~\cite{FruitChain} can be likewise interpreted as a lower-variance version of the proportional allocation rule, with ``fruits'' playing the role of medium-difficulty puzzle solutions. Bobtail~\cite{Bobtail} gives still another implementation of the proportional allocation rule using multiple puzzle solutions; their primary motivation was to reduce the variance in time between consecutive blocks, rather than that of miners' rewards per se.} \section{Model}\label{s:model} \subsection{Allocation Rules}\label{ss:rules} Let $\mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}=\cup_{n\ge 1} \bN^n$ denote the set of all finite tuples of positive integers. For a positive integer $n$, we write $[n]$ to denote $\{1,2,\ldots,n\}$. An \emph{allocation rule} is a function $\mathbf{x}$ over $\mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ that maps each tuple $\mathbf{h}=(h_1,\ldots,h_n) \in \bN^n$ of length $n$ to an $n$-tuple $\mathbf{p}=(p_1,\ldots,p_n)$ of nonnegative real numbers. Here $h_i$ and $p_i$ are the hash rate and expected reward of miner~$i$.\footnote{For example, $h_i$ could be in units of hashes per second. For convenience, we assume this is an integer. All of our results for integral hash rates immediately imply the same results for arbitrary positive rational hash rates. (The proofs hold verbatim for hash rates that are integral multiples of~$1/m$ for some $m \in \bN$, and hence apply to all finite rational tuples of hash rates.)} We also write $x_i(\mathbf{h})$ for $p_i$ and $\mathbf{x}(\mathbf{h})$ for $\mathbf{p}$. We refer to a tuple $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ as a \emph{configuration} and $\mathbf{x}(\mathbf{h})$ as the corresponding \emph{allocation}. In this section and the next, we assume that miners care only about their expected rewards (with more being better), and in particular are risk-neutral. Section~\ref{s:risk} addresses the case of non-risk-neutral miners and the interesting new issues that they raise.\footnote{With risk-neutral miners, there is no need to specify details of the reward distribution beyond the expected reward for each miner. For example, $x_i(\mathbf{h})$ might represent a deterministic reward of~$x_i(\mathbf{h})$ to miner~$i$, or that miner~$i$ has a~$x_i(\mathbf{h})$ probability of winning the entire block reward (and with the remaining probability receives no reward). We'll be more specific about the semantics of an allocation rule in due time, when we consider non-risk-neutral miners in Section~\ref{s:risk}.} \subsection{Axioms}\label{ss:axioms} With the language and notation of allocation rules, we can translate the properties in Section~\ref{ss:props} into formal axioms.\footnote{Non-negativity is already baked into our definition of an allocation rule.} See Section~\ref{ss:exs} for examples of allocation rules that satisfy different subsets of these properties.\vspace{0.1cm} \begin{enumerate} \item [A1.] \textbf{Symmetry}: An allocation rule $\mathbf{x}$ is \emph{symmetric} if $\mathbf{x}(\pi(\mathbf{h}))=\pi(\mathbf{x}(\mathbf{h}))$ for every configuration $\mathbf{h}\in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ and every permutation $\pi$.\vspace{0.1cm} \end{enumerate} That is, the expected reward of a miner does not depend on how the miners are ordered (or their public keys). An example of an asymmetric rule is a {\em dictator} rule, which always allocates the block reward to the miner with the (say) lexicographically smallest public key. We consider only symmetric rules in this paper.\vspace{0.1cm} \begin{enumerate} \item [A2a.] \textbf{Strong budget-balance}: An allocation rule $\mathbf{x}$ is \emph{strongly budget-balanced} if $\sum_{i} x_i(\mathbf{h}) = 1$ for every configuration $\mathbf{h}$. \item [A2b.] \textbf{Weak budget-balance}: An allocation rule $\mathbf{x}$ is \emph{weakly budget-balanced} if $\sum_{i} x_i(\mathbf{h}) \le 1$ for every configuration $\mathbf{h}$. \item [A3.] \textbf{Sybil-proofness}: An allocation rule $\mathbf{x}$ is {\em sybil-proof} if: For every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ and every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a miner with hash rate $h_i$ by a set~$S$ of miners with total hash rate at most $h_i$ (i.e., with $\sum_{j \in S} h'_j \le h_i$), the total expected reward to miners of~$S$ under $\mathbf{h}'$ is at most that of miner~$i$ in the original configuration: \[ \sum_{j \in S} x_j(\mathbf{h}') \le x_i(\mathbf{h}).\vspace{0.0cm} \] \end{enumerate} We consider several natural definitions of collusion-proofness, depending on the type of reward sharing allowed inside the coalition and on whether a Pareto improvement for a coalition is required to be strict. We consider both arbitrary revenue-sharing agreements and proportional sharing. The latter corresponds to the reward schemes used in many Bitcoin mining pools (see e.g.~\cite{L+15}).\vspace{0.1cm} \begin{enumerate} \item [A4a.] \textbf{Collusion-proofness (under arbitrary reward sharing)}: An allocation rule $\mathbf{x}$ is {\em collusion-proof (under arbitrary reward sharing)} if: For every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ and every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a set~$T$ of miners with a new miner~$i^*$ (representing the coalition) with hash rate at most the total hash rate of miners in~$T$ (i.e., with $h'_{i^*} \le \sum_{j \in T} h_j$), the total expected reward to miner~$i^*$ under $\mathbf{h}'$ is at most the total expected reward of miners of~$T$ in the original configuration: \[ x_{i^*}(\mathbf{h}') \le \sum_{j \in T} x_j(\mathbf{h}). \] \item[A4b.] \textbf{Strong collusion-proofness (under proportional sharing)}: An allocation rule $\mathbf{x}$ is {\em strongly collusion-proof (under proportional sharing)} if: For every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ and every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a set~$T$ of miners with a new miner~$i^*$ with hash rate at most the total hash rate of miners in~$T$, either: (i) no miner of~$T$ has strictly higher expected reward in~$\mathbf{h}'$ (with proportional sharing) than in~$\mathbf{h}$; or (ii) some miner of~$T$ has strictly lower expected reward in~$\mathbf{h}'$ (with proportional sharing) than in~$\mathbf{h}$. That is, if \[ x_{i^*}(\mathbf{h}') \cdot \frac{h_i}{\sum_{j \in T} h_j} > x_i(\mathbf{h}) \] for some miner~$i \in T$, then \[ x_{i^*}(\mathbf{h}') \cdot \frac{h_{\ell}}{\sum_{j \in T} h_j} < x_{\ell}(\mathbf{h}) \] for some other miner~$\ell \in T$. \item[A4c.] \textbf{Weak collusion-proofness (under proportional sharing)}: An allocation rule $\mathbf{x}$ is {\em weakly collusion-proof (under proportional sharing)} if: For every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$ and every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a set~$T$ of miners with a new miner~$i^*$ with hash rate at most the total hash rate of miners in~$T$, some miner of~$T$ has expected reward under $\mathbf{h}'$ (with proportional sharing) at most that in the original configuration. That is, for some miner~$i \in T$, \[ x_{i^*}(\mathbf{h}') \cdot \frac{h_{i}}{\sum_{j \in T} h_j} \le x_{i}(\mathbf{h}). \] \end{enumerate} Every violation of~(4c) also constitutes a violation of~(4b), and similarly for~(4b) and~(4a). That is, (4a)--(4c) are ordered from strongest (i.e., most difficult to satisfy) to weakest. Impossibility and uniqueness results are most compelling for the weakest variants of budget-balance and collusion-proofness; possibility results are most impressive for the strongest variants. The proportional allocation rule satisfies the strongest versions of budget-balance and collusion-proofness (in addition to symmetry and sybil-proofness). \subsection{Examples}\label{ss:exs} This section gives several examples of allocation rules which satisfy different subsets of the axioms in Section~\ref{ss:axioms}. \begin{example}[Proportional allocation rule]\label{ex:1} The proportional allocation rule is defined for each configuration~$\mathbf{h}$ of length~$n$ by \[ x_i(\mathbf{h}) = \frac{h_i}{\sum_{j \in [n]} h_j}. \] This allocation rule is symmetric, strongly budget-balanced, sybil-proof, and collusion-proof under arbitrary reward sharing. \end{example} \begin{example}[All-zero allocation rule]\label{ex:2} The all-zero allocation rule is defined for each configuration~$\mathbf{h}$ of length~$n$ by \[ x_i(\mathbf{h}) = 0 \] for~$i=1,2,\ldots,n$. The all-zero allocation rule is symmetric, weakly budget-balanced, sybil-proof, and collusion-proof under arbitrary reward sharing. \end{example} Our next example comprises scaled versions of the proportional allocation rule, with the scaling constant dependent on the total hash rate. \begin{example}[Generalized proportional allocation rules]\label{ex:genprop} For every nondecreasing function $c:\mathbb{N}\rightarrow [0,1]$, the corresponding generalized proportional allocation rule is defined for each configuration~$\mathbf{h}$ of length~$n$ by \[ x_i(\mathbf{h}) = c\left(\sum_{j \in [n]} h_j \right) \cdot \frac{h_i}{\sum_{j \in [n]} h_j}. \] Examples \ref{ex:1} and \ref{ex:2} are the generalized proportional allocation rules corresponding to the functions $c(y)=1$ and $c(y)=0$, respectively. Generalized proportional allocation rules are symmetric, weakly budget-balanced, sybil-proof, and collusion-proof under arbitrary reward sharing. To check sybil-proofness, let $\mathbf{h}$ be a configuration and $\mathbf{h}'$ derived from~$\mathbf{h}$ by replacing some miner~$i$ with hash rate $h_i$ by a set~$S$ of miners with total hash rate at most $h_i$ (i.e., with $\sum_{j \in S} h'_j \le h_i$). Then, the total expected reward under $\mathbf{h}'$ of the miners in~$S$ is: \begin{align*} c \left(\sum_{j\in [n]} h_j-h_i+\sum_{j\in S} h'_j\right)&\cdot \frac{\sum_{j\in S} h'_j}{\sum_{j\in [n]} h_j-h_i+\sum_{j\in S} h'_j}\\[0.4ex] &\hspace{-3.5cm}=c \left(\sum_{j\in [n]} h_j-h_i+\sum_{j\in S} h'_j\right) \left(1-\frac{\sum_{j\in [n]}h_j-h_i}{\sum_{j\in [n]} h_j-h_i+\sum_{j\in S} h'_j}\right)\\[0.8ex] &\hspace{-3.5cm}\le c \left(\sum_{j\in [n]} h_j \right) \left(1-\frac{\sum_{j\in [n]}h_j-h_i}{\sum_{j\in [n]} h_j} \right)\\[0.8ex] &\hspace{-3.5cm} =c \left(\sum_{j\in [n]} h_j \right)\cdot \frac{h_i}{\sum_{j\in [n]} h_j}, \end{align*} with the inequality following from the fact that $\sum_{j\in S} h'_j \le h_i$. Since the final expression is miner~$i$'s expected reward in the original configuration, this verifies sybil-proofness. Collusion-proofness can be checked using a similar argument. \end{example} \begin{example}[Proportional-to-squares allocation rule] The propor\-tional-to-squares allocation rule is defined for each configuration~$\mathbf{h}$ of length~$n$ by \[ x_i(\mathbf{h}) = \frac{h^2_i}{\sum_{j=1}^n h^2_j}. \] This allocation rule is symmetric, strongly budget-balanced, and sybil-proof. It is not even weakly collusion-proof under proportional sharing. \end{example} \begin{example}[Proportional-to-square-roots allocation rule] The proportional-to-square-roots allocation rule is defined for each configuration~$\mathbf{h}$ of length~$n$ by \[ x_i(\mathbf{h}) = \frac{\sqrt{h_i}}{\sum_{j=1}^n \sqrt{h_j}}. \] This allocation rule is symmetric, strongly budget-balanced, and collusion-proof under arbitrary reward sharing. However, it is not sybil-proof. \end{example} \subsection{Implementing Non-Proportional Rules}\label{ss:impl} The proportional allocation rule is realizable, in that there is a proof-of-work blockchain protocol (namely, Bitcoin) that implements it. Are non-proportional allocation rules purely hypothetical? This section demonstrates that, at least in principle, {\em every} weakly budget-balanced and continuous allocation rule can be approximately implemented within a proof-of-work blockchain. Fix a power-of-2~$M$, a cryptographic hash function~$f$, and a difficulty level~$b$. A {\em full solution} is a preimage~$z$ such that $f(z)$ has at least $b$ trailing zeroes, and a {\em partial solution} is a~$z$ such that $f(z)$ has at least $b - \log_2 M$ trailing zeros. The parameter~$b$ is chosen so that random guessing by miners produces a full solution in a prescribed amount of time (on average), such as 10 minutes. One expects partial solutions to be discovered at~$M$ times the rate of full solutions. Fix a weakly budget-balanced allocation rule~$\mathbf{x}$. A high-level description of one possible corresponding protocol is then:\vspace{0.1cm} \begin{enumerate} \item Miners attempt to find partial and full solutions of the form $\langle pkey | \sigma | nonce \rangle$, where $pkey$ is the miner's public key, $\sigma$ is derived from the current blockchain state (e.g., the hash of the block of transactions at the end of the longest chain), and $nonce$ is a number of free bits specified by the miner. \item A miner who discovers a partial (non-full) solution can add it to the blockchain. \item A miner who discovers a full solution can authorize a new block of transactions and add it to the blockchain (along with their full solution). \item When a new full solution and corresponding block are published, block rewards are distributed according to the number of partial solutions contributed by each miner since the preceding full solution. Precisely, let $[n]$ denote the miners contributing at least one partial solution, $g_i$ the number contributed by miner~$i$, and~$M' = \sum_{i \in [n]} g_i$ the total number of partial solutions reported in this epoch. Define an estimate~$\smash{\hat{h}_i}$ of miner~$i$'s hash rate by \[ \hat{h}_i = g_i \cdot \rho \cdot \frac{M}{M'}, \] where~$\rho$ denotes the hash rate that would produce (on average) one partial solution in the prescribed amount of time. Define miner rewards by $\smash{\mathbf{x}(\hat{h}_1,\hat{h}_2, \ldots,\hat{h}_n)}$.\vspace{0.1cm} \end{enumerate} Several comments are in order. First, this protocol effectively simulates the typical functionality of a mining pool {\em inside the protocol itself}. This is reminiscent of the {\em Revelation Principle} from mechanism design (see e.g.~\cite{AGTbook}), which is a simulation argument that shows how to eliminate non-truthful reporting of preferences by moving the deviations inside the mechanism itself. Second, if we take~$M=1$, then partial and full solutions coincide, $M=M'=1$, and the protocol essentially recovers Bitcoin's implementation of the proportional allocation rule. Third, the larger we take~$M$, the more accurate the estimated hash rates $\smash{\hat{\mathbf{h}}}$. Thus any continuous allocation rule can be approximated as closely as desired by taking~$M$ sufficiently large. Fourth, we ignore incentive issues involving miners' delaying the publication of full or partial solutions; Schrivjers et al.~\cite{fc16} discuss (in the context of mining pools) methods for mitigating such incentive issues. Finally, we have deliberately avoided committing to the details of the implementation, such as the best way to record the partial solutions on-chain. Our point is simply that there appears to be no fundamental barrier to implementing a wide range of non-proportional allocation rules in a proof-of-work blockchain. \section{Characterizations with Risk-Neutral Miners}\label{s:unique} \subsection{A Uniqueness Result for the Proportional Allocation Rule}\label{ss:unique} We assume throughout this section that miners are risk-neutral and are concerned only with their expected rewards. Our first main result is a uniqueness result for the proportional allocation rule: It is the only rule that is symmetric, strongly budget-balanced, sybil-proof, and collusion-proof (even weakly collusion-proof with proportional sharing). \begin{theorem}[Characterization of Rules with A1, A2a, A3, A4c]\label{theo1} The proportional allocation rule is the unique allocation rule that is symmetric, strongly budget-balanced, sybil-proof, and weakly collusion-proof (with proportional sharing). \end{theorem} \begin{proof} Let $\mathbf{x}$ be an allocation rule that is symmetric, strongly budget-balanced, sybil-proof, and weakly collusion-proof (with proportional sharing). We prove by induction that for every configuration $\mathbf{h} \in \bN^*$, $\mathbf{x}$ satisfies $x_i(\mathbf{h}) = h_i/\sum_{j} h_j$. The induction is on the number $t$ of entries in $\mathbf{h}$ that are larger than $1$. The base case of $t=0$ is trivial since $\mathbf{h}$ is then an all-$1$ tuple (of length~$n$, say) and symmetry and strong budget-balance imply that $x_i(\mathbf{h}) = 1/n$ for every~$i$. For the inductive step, assume that the statement holds for all tuples with less than $t$ entries larger than $1$. Now consider a configuration $\mathbf{h} \in \mathbb{N}^n$ for some $n\ge t$ that sums to $m$ and has $t$ entries larger than $1$. Because $\mathbf{x}$ is symmetric, we can assume without loss of generality that $h_1,h_2,\ldots,h_t>1$ while $h_{t+1},h_{t+2},\ldots,h_{n}=1$. Let $\mathbf{p}=(p_1,\ldots,p_n)=\mathbf{x}(\mathbf{h})$. We claim that $p_i= {h_i}/{m}$ for each $i\in [t]$. This claim, together with the assumptions that $\mathbf{x}$ is symmetric and strongly budget-balanced, implies that $x_i(\mathbf{h})=1/m$ for all $i>t$ and hence $\mathbf{x}$ indeed agrees with the proportional rule on $\mathbf{h}$. Suppose $p_i> {h_i}/{m}$ for some $i \in [t]$. Then, consider the configuration $\mathbf{h}'$ obtained by splitting the miner $i$ into $h_i$ sybils, each with hash rate $1$. By the inductive hypothesis and the fact that $\mathbf{h}'$ has $t-1$ entries that are larger than $1$, $\mathbf{x}$ is proportional on $\mathbf{h}'$ and so each of these miners with hash rate $1$ receives $1/m$ which is strictly less than ${p_i}/{h_i}$. This means that, in $\mathbf{h}'$, these $h_i$ players with hash rate $1$ would all be better off by colluding and sharing their results proportionally (i.e., uniformly). This contradicts the assumption that $\mathbf{x}$ is weakly collusion-proof (with proportional sharing). We conclude that $p_i \le {h_i}/{m}$ for all $i \in [t]$. On the other hand, suppose $p_i<{h_i}/{m}$ for some $i \in [t]$, and consider the configuration $\mathbf{h}'$ obtained by splitting miner~$i$ into~$h_i$ sybils with hash rate 1 each. By the inductive hypothesis, each sybil receives expected reward ${1}/{m}$ under~$\mathbf{x}$ in~$\mathbf{h}'$. The total expected reward earned by the sybils therefore exceeds that of miner~$i$ in~$\mathbf{h}$. This contradicts the assumption that $\mathbf{x}$ is sybil-proof, so we can conclude that $p_i \ge {h_i}/{m}$ (and hence~$p_i = {h_i}/{m}$) for all $i \in [t]$. This completes the proof of the claim, the inductive step, and the theorem. \end{proof} \subsection{Weak Budget-Balance and Generalized Proportional Rules}\label{ss:generalized} Example~\ref{ex:genprop} shows that relaxing the strong budget-balance requirement to weak budget-balance enlarges the design space. One might suspect that, analogous to Theorem~\ref{theo1}, generalized proportional allocation rules are the only ones that satisfy symmetry, weak budget-balance, sybil-proofness, and weak collusion-proofness with proportional sharing. The next example shows that this is not the case. \begin{example}\label{ex:half} Consider the following allocation rule $\mathbf{x}$. For a configuration~$\mathbf{h}$ in which no miner has more than half the overall hash rate (i.e., $\smash{h_i \le \tfrac{1}{2} \sum_{j \in [n]} h_j}$ for every $i$), $\mathbf{x}$ agrees with the proportional allocation rule. For a configuration in which one miner~$i$ has more than half of the overall hash rate, miner~$i$ receives its fair share under the proportional rule (i.e., $x_i(\mathbf{h}) = h_i/\sum_{j \in [n]} h_j$), while other miners receive~0 ($x_j(\mathbf{h}) = 0$ for $j \neq i$). The rule $\mathbf{x}$ is symmetric, weakly budget-balanced, sybil-proof, and weakly collusion-proof under proportional sharing. It is not strongly collusion-proof under proportional sharing, however. \end{example} Our second main result shows that if weak collusion-proofness is strengthened to strong collusion-proofness (with proportional sharing), then generalized proportional allocation rules are indeed the only ones that satisfy the axioms~A1, A2b, A3, and A4b. \begin{theorem}[Characterization of Rules with A1, A2b, A3, A4b]\label{theo2} Generalized proportional allocation rules are the only allocation rules that are symmetric, weakly budget-balanced, sybil-proof, and strongly collusion-proof under proportional sharing. \end{theorem} \begin{proof} Let $\mathbf{x}$ be an allocation rule that is symmetric, weakly budget-balanced, sybil-proof, and strongly collusion-proof under proportional sharing. We claim that, for each positive integer~$m$, there is a nonnegative real number $c(m) \le 1$ such that \[ x_i(\mathbf{h}) = c(m) \cdot \frac{h_i}{m} \] for every configuration $\mathbf{h}$ with total hash rate ($\sum_j h_j$) equal to~$m$. To prove the claim, fix a positive integer $m$. First, let $1^m\in \mathbb{N}^m$ denote the all-$1$ tuple of length $m$ and define $$c(m) = \sum_{i \in [m]} x_i(1^m).$$ Since $\mathbf{h}$ is symmetric and weakly budget-balanced, $c(m)\le 1$ and $x_i(1^m) = {c(m)}/{m}$ for every~$i \in [m]$. Second, let $\mathbf{h}^*$ denote the configuration with a single miner with hash rate $m$. Since $\mathbf{x}$ is sybil-proof and strongly collusion-proof (under proportional sharing), the expected reward assigned by $\mathbf{x}$ to the sole miner in~$\mathbf{h}^*$ is~$c(m)$. We follow the approach in the proof of Theorem \ref{theo1} and prove by induction that, for every configuration $\mathbf{h}\in \bN^*$ with $\sum_i h_i = m$, \[ x_i(\mathbf{h}) = c(m) \cdot \frac{h_i}{m} \] for every miner~$i$. The induction is again on the number $t$ of entries in $\mathbf{h}$ that are larger than $1$. The base case of $t=0$ is trivial by the choice of $c(m)$. For the inductive step, we consider a configuration $\mathbf{h} \in \mathbb{N}^n$ for some $n\ge t$ with $\sum_{i \in [n]} h_i = m$ and exactly $t$ entries larger than $1$. Without loss of generality (since $\mathbf{x}$ is symmetric), assume that $h_1,\ldots,h_t>1$ and $h_{t+1},\ldots,h_{n}=1$. Let $\mathbf{p}=(p_1,\ldots,p_n)=\mathbf{x}(\mathbf{h})$. With respect to the first~$t$ miners, the same argument as in the proof of Theorem~\ref{theo1} shows that $p_i= c(m) \cdot ({h_i}/{m})$ for every $i\in [t]$. (This part of the argument requires only weak collusion-proofness under proportional rewards.) Example~\ref{ex:half} shows that the rest of the proof (for miners~$t+1,t+2,\ldots,n$) must differ from that of Theorem~\ref{theo1} and make use of strong collusion-proofness. The issue is that because $\mathbf{x}$ is only assumed to be weakly budget-balanced, it does not follow directly from $p_i= c(m)\cdot ({h_i}/{m})$ for all $i \in [t]$ that $p_i={c(m)}/{m}$ for all $i>t$. So assume for contradiction that $p_i\ne {c(m)}/{m}$ for some $i>t$ (and hence, by symmetry, for all such~$i$). If $p_i>{c(m)}/{m}$, then $\mathbf{x}$ fails sybil-proofness: the sole miner in configuration~$\mathbf{h}^*$ can increase its expected reward by splitting into $n$ sybils with hash rates as in $\mathbf{h}$. On the other hand, if $p_i< {c(m)}/{m}$, then $\mathbf{x}$ fails strong collusion-proofness under proportional sharing: if the $n$ miners in $\mathbf{h}$ form the grand coalition, then with proportional sharing, every miner $i\in [t]$ receives the same expected reward $p_i=c(m)\cdot ({h_i}/{m})$ as in $\mathbf{h}$ while the expected reward of every miner $i>t$ strictly increases (from~$p_i$ to ${c(m)}/{m}$). We conclude that $p_i = {c(m)}/{m}$ for every $i > t$ and hence $p_i = c(m) \cdot ({h_i}/{m})$ for every miner~$i$. This concludes the proof of the claim. All that remains is to show that~$c(m)$ must be a nondecreasing function of~$m$. This follows from sybil-proofness: if $c(m+1)<c(m)$ for some $m$, then in the single-miner configuration with hash rate $m+1$, the miner would have an incentive to replace itself with a miner with hash rate~$m$. \end{proof} \section{Beyond Risk Neutrality: Possibility and Impossibility Results}\label{s:risk} We have been assuming so far that miners are {\em risk-neutral} and care only about the {\em expectation} of their reward, as opposed to other distributional characteristics (like variance). Going beyond this assumption reveals the interesting ways in which risk affects incentives in blockchain protocols. \subsection{Von Neumann-Morgenstern Utilities}\label{ss:vnm} The earliest, and most principled, treatment of risk in economics is through von Neumann and Morgenstern's {\em utility theory,} articulated more than seven decades ago \cite{vNM}. One starts from each agent having a very general set of arbitrary preferences between {\em lotteries} (finite-support probabilistic distributions over different amounts of money), where the preferences of agents are assumed to satisfy four very natural and plausible axioms: completeness, transitivity, continuity, and independence. The remarkable result proved is that any such system of preferences of an agent is tantamount to the agent possessing {\em a utility function $U$,} a function mapping amounts of money to the reals, such that the agent prefers lottery $L$ to lottery $M$ if and only if $\expect[L]{U(p)} \geq \expect[M]{U(p)}$, where the expectation is over the random variable~$p$ (which is in units of money). That is, any agent with preferences satisfying the properties above can be modeled as an {\em expected utility-maximizer}. For an agent with utility function~$U$, we can interpret $U(p)$ as the amount of {\em utility} the agent receives from a reward of $p$. For ease of presentation, we assume throughout that $U(0)=0$ and that $U$ is twice-differentiable and strictly increasing. The risk sensitivity of an agent can then be gauged by the second derivative of $U$. Risk-neutrality corresponds to a linear utility function, with~0 second derivative; in this case, $\expect{U(p)} = U(\expect{p})$ for every distribution over rewards~$p$. A {\em risk-averse} agent is an expected utility maximizer with a strictly concave utility function---a function with an everywhere negative second derivative. For a risk-averse agent, $\expect{U(p)} \le U(\expect{p})$ for every distribution over~$p$ (by Jensen's inequality). For example, a risk-averse agent may not risk flipping a fair coin if the two outcomes are either losing $30\%$ of their fortune, or doubling it. (Whereas a risk neutral --- or {\em risk-seeking}, see Section~\ref{ss:seek} --- agent would be happy to flip the coin.) \subsection{Collusion-Proofness Revisited}\label{ss:axioms2} In this section and the next, we consider (randomized) allocation rules that allocate the entire reward to (at most) one miner. We interpret an output $x_i(\mathbf{h})$ of an allocation rule as the probability that miner~$i$ receives the entire reward in the configuration~$\mathbf{h}$. Of the four types of axioms in Section~\ref{ss:axioms}, symmetry and budget-balance are obviously independent of any model of miner utility. The sybil-proofness axiom requires only cosmetic changes:\vspace{0.15cm} \begin{enumerate} \item [A3.] \textbf{Sybil-proofness (with general utility functions)}: An allocation rule $\mathbf{x}$ is {\em sybil-proof} if: For every allowable miner utility function~$U$, every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$, and every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a miner with hash rate $h_i$ by a set~$S$ of miners with total hash rate at most $h_i$ (i.e., with $\sum_{j \in S} h'_j \le h_i$), the total expected utility to~$i$ in $\mathbf{h}'$ is at most that in the original configuration: \[ \sum_{j \in S} x_j(\mathbf{h}')\cdot U(1) \le x_i(\mathbf{h})\cdot U(1). \] \end{enumerate} Assuming that every allowable utility function~$U$ is strictly increasing (and thus, $U(1)>U(0)=0$), this axiom is equivalent to the definition of sybil-proofness for risk-neutral miners given in Section~\ref{ss:axioms}. We need to adjust the definition of collusion-proofness, since now the incentives of miners are affected by their utility functions. Fix a class $\calU$ of allowable utility functions --- for example, all linear functions, or all strictly concave functions. We next define analogs of axioms~(4a) and~(4c) from Section~\ref{ss:axioms} (we skip~(4b) because we do not need it in our statements). A {\em reward-sharing scheme} with miner set~$S$ specifies how the miners of~$S$ would split a block reward internally; formally, it is a collection of nonnegative random variables $\{ \mathbf{r}_i \}_{i \in S}$ that satisfy $\sum_{i \in S} \mathbf{r}_i \le 1$ with probability~1.\vspace{0.15cm} \begin{enumerate} \item [A4a.] \textbf{Collusion-proofness against $\calU$ (under arbitrary reward sharing)}: An allocation rule $\mathbf{x}$ is {\em collusion-proof against $\calU$ (under arbitrary reward sharing)} if: For every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$, every choice of utility function $U_i \in \calU$ for each participating miner~$i$, every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a set~$T$ of miners with a new miner~$i^*$ with hash rate at most the total hash rate of miners in~$T$, and every reward sharing scheme~$\{ \mathbf{r}_i \}_{i \in T}$, either: (i) no miner of~$T$ has higher expected utility in~$\mathbf{h}'$ (with the given reward sharing scheme) than in~$\mathbf{h}$; or (ii) some miner of~$T$ has strictly lower expected utility in~$\mathbf{h}'$ (with the given reward sharing scheme) than in~$\mathbf{h}$. That is, if \[ x_{i^*}(\mathbf{h}') \cdot \expect{U_i(\mathbf{r}_i)} > U_i(1) \cdot x_i(\mathbf{h}) \] for some miner~$i \in T$, then \[ x_{i^*}(\mathbf{h}') \cdot \expect{U_{\ell}(\mathbf{r}_{\ell})} < U_{\ell}(1) \cdot x_{\ell}(\mathbf{h}) \] for some other miner~$\ell \in T$. \item[A4c.] \textbf{Weak collusion-proofness against~$\calU$ (under proportional sharing)}: An allocation rule $\mathbf{x}$ is {\em weakly collusion-proof against $\calU$ (under proportional sharing)} if: For every configuration $\mathbf{h} \in \mathbb{N}^*} \def\bN{\mathbb{Z}^*_{\ge 0}$, every choice of utility function $U_i \in \calU$ for each participating miner~$i$, every configuration $\mathbf{h}'$ that can be derived from~$\mathbf{h}$ by replacing a set~$T$ of miners with a new miner~$i^*$ with hash rate at most the total hash rate of miners in~$T$, some miner of~$T$ has expected utility under $\mathbf{h}'$ (with proportional sharing) at most that in the original configuration. That is, for some miner~$i \in T$, \[ x_{i^*}(\mathbf{h}') \cdot U_i\left(\tfrac{h_i}{\sum_{j \in T} h_j} \right) \le U_i(1) \cdot x_i(\mathbf{h}). \] \end{enumerate} \subsection{Risk Aversion and Impossibility}\label{ss:imposs} With risk-neutral miners, the proportional allocation rule implemented by the Bitcoin protocol satisfies all of the axioms in Section~\ref{ss:axioms}, including collusion-proofness (even with arbitrary reward sharing). In reality, however, Bitcoin is {\em not} collusion-proof, in that most miners join a mining pool that effectively acts like a large single miner.\footnote{See \texttt{https://www.blockchain.com/en/pools} for the biggest Bitcoin mining pools. As of this writing, the largest pool (BTC.com) controls roughly 20\% of the total hash rate.} There is anecdotal evidence that miners generally join mining pools to lower the variance of the rewards received, analogous to an insurance policy, and we view the ubiquity of mining pools as strong evidence that most miners are risk-averse. How does risk aversion affect the set of possible allocation rules satisfying our standard axioms? The following {\em impossibility result} shows that the incentive to form mining pools is not an artifact of the specific allocation rule implemented in Bitcoin; rather, it is a fundamental difficulty with risk-averse miners. \begin{theorem}[Impossibility with Risk-Averse Miners]\label{theo3} Assume that all miners are expected utility-maximizers with the same strictly concave utility function~$U$ satisfying $U(1)>U(0)=0$. There is no non-zero allocation rule that is symmetric, weakly budget-balanced, sybil-proof, and weakly collusion-proof against $\calU=\{U\}$ (with proportional sharing). \end{theorem} Note that this impossibility result holds even with our weakest notions of budget-balance~(A2b) and collusion-proofness~(A4c). The assumption that all miners share the same utility function $U$ only makes the impossibility result more compelling. \begin{proof}[Proof of Theorem \ref{theo3}] Let~$\mathbf{x}$ be a non-zero and symmetric allocation rule. Let~$\mathbf{h}$ be a configuration such that $x_i(\mathbf{h}) > 0$ for some~$i$, and assume for simplicity that $h_i$ is even. Obtain~$\mathbf{h}'$ from $\mathbf{h}$ by replacing miner~$i$ with two miners $i_1$ and $i_2$ with hash rate $h_i/2$ each. By symmetry, $x_{i_1}(\mathbf{h}') = x_{i_2}(\mathbf{h}')$; let~$q$ denote this common probability. If $\mathbf{x}$ is sybil-proof, then $2q \le x_i(\mathbf{h})$; suppose this is indeed the case. Starting now from $\mathbf{h}'$, if the two miners~$i_1$ and~$i_2$ join forces and combine hash rates to produce the configuration $\mathbf{h}$ (sharing rewards proportionally), then their expected utilities change from \[ U(1) \cdot q \] to \[ U\left( \tfrac{1}{2}\right) \cdot x_i(\mathbf{h}) \ge 2 \cdot U\left( \tfrac{1}{2}\right) \cdot q. \] Our assumption on~$U$ implies that $2U(1/2) > U(1)$ and hence both miners are strictly better off in the coalition. We conclude that $\mathbf{x}$ is not weakly collusion-proof under proportional sharing. \end{proof} \subsection{Possibility with Deterministic Rewards}\label{ss:poss} The impossibility result in Theorem~\ref{theo3} holds for randomized allocation rules $\mathbf{x}$ that always allocate the entire block reward to a single miner according to the probability distribution specified by $\mathbf{x}(\mathbf{h})$. At the other extreme are {\em deterministic} allocation rules, for which each $x_i(\mathbf{h})$ represents a (fractional) block reward deterministically given to miner~$i$. With risk-neutral miners, there is no difference between the two types of rules, and both the randomized and deterministic implementations of the proportional allocation rule satisfy all of our axioms. With a deterministic allocation rule, the miner utility functions no longer matter---more (deterministic) reward is always better than less. (Remember that utility functions are strictly increasing.) In this case, miners effectively act as if they were risk-neutral, and so all results for risk-neutral miners carry over to deterministic allocation rules and miners with arbitrary utility functions. For example, the following corollary of Theorem~\ref{theo1} is immediate. \begin{corollary}[Possibility with Deterministic Rewards]\label{cor:poss} For every family $\calU$ of utility functions, the deterministic implementation of the proportional allocation rule is the unique deterministic allocation rule that is symmetric, strongly budget-balanced, sybil-proof, and weakly collusion-proof against $\calU$ (with proportional sharing). \end{corollary} Bitcoin's implementation of the proportional allocation rule is inherently randomized. But a deterministic version of the rule can be approximated as closely as desired using a protocol of the type described in Section~\ref{ss:impl} (with a sufficiently large value of the parameter~$M$). In the proposed implementation in Section~\ref{ss:impl}, the choice of the miner who can authorize a new block of transactions and add it to the blockchain---the first miner to find a full solution---is still effectively chosen randomly (see step~(3)). This highlights the fact that there are really two distinct problems to solve in each block creation epoch: \begin{enumerate} \item Electing a leader to authorize the next block of transactions. \item Distributing block rewards. \end{enumerate} In Bitcoin, the solutions to these problems are tightly coupled, in that the choices of the leader and of the recipient of the block reward are always the same. The solutions are decoupled in the deterministic implementation of the proportional allocation, with the leader elected randomly as in Bitcoin but with rewards distributed deterministically. \subsection{The Case of Risk-Seeking Miners}\label{ss:seek} For completeness, this section studies {\em risk-seeking} miners, meaning expected utility maximizers with strictly convex utility functions. In a surprising contrast with the impossibility result for risk-averse miners (Theorem~\ref{theo3}), here the (randomized implementation of the) proportional allocation rule satisfies all of the same axioms as in the case of risk-neutral miners. \begin{theorem}[The Proportional Rule with Risk-Seeking Miners]\label{theo7} Let $\calU$ be the set of all convex functions $U:[0,1]\rightarrow \mathbb{R}_{\ge 0}$ with $U(1)>U(0)=0$. The proportional allocation rule is symmetric, strongly budget-balanced, sybil-proof, and collusion-proof against $\calU$ under arbitrary reward sharing. \end{theorem} \begin{proof The proportional allocation rule is obviously symmetric and strongly budget-balanced. It is sybil-proof for risk-neutral miners and hence also non-risk-neutral miners (see the discussion in Section~\ref{ss:axioms2}). To complete the proof, assume for the purposes of contradiction that the proportional allocation rule is not collusion-proof under arbitrary transfers against the set $\calU$ of convex utility functions~$U$ that satisfy $U(1)>U(0)=0$. Then, there is a configuration $\mathbf{h}\in \bN^n$, utility functions $U_1,U_2,\ldots,U_n \in \calU$ for the participating miners, a subset $T\subseteq [n]$ of the miners, and a reward-sharing scheme $\{\mathbf{r}_i \}_{i\in T}$ such that \[ \frac{\sum_{j \in T} h_j}{\sum_{j \in [n]} h_j} \cdot \expect{U_i(\br_i)} \ge \frac{h_i}{\sum_{j \in [n]} h_j} \cdot U_i(1)\quad\text{for every $i\in T$}, \] with the inequality strict for at least one miner $i\in T$. Summing these inequalities over~$i \in T$ and using that $U_i(1)>0$ for every miner~$i$, we then have \[ \frac{\sum_{j \in T} h_j}{\sum_{j \in [n]} h_j} \cdot \sum_{i\in T} \expect{\frac{U_i(\mathbf{r}_i)}{U_i(1)}} >\sum_{i\in T} \frac{h_i}{\sum_{j \in [n]} h_j} \] and, thus, \[ \expect{\sum_{i\in T}\frac{U_i(\mathbf{r}_i)}{U_i(1)}}>1. \] However, since each $U_i$ is convex with $U_i(1)>U_i(0)=0$, we have $U_i(\br_i)\le \br_i\cdot U_i(1)$ (with probability~1) and thus, since $\sum_{i \in T} \mathbf{r}_i \le 1$ (again with probability~1), \[ \expect{\sum_{i\in T}\frac{U_i(\mathbf{r}_i)}{U_i(1)}} \le \expect{\sum_{i\in T}\mathbf{r}_i}\le 1. \] This completes the contradiction and the proof. \end{proof} \section{Acknowledgments} All three authors were supported in part by the Columbia-IBM Center for Blockchain and Data Transparency. The first author was also supported in part by NSF IIS-1838154 and NSF CCF-1703925. The second author was supported in part by NSF CCF-1763970. The third author was supported in part by NSF Award CCF-1813188 and ARO grant W911NF1910294. \begin{flushleft}
\section{Introduction} \SArtur{Remember: testable in constant time or with constant query complexity = \emph{testable}. (Disclaimer: we don't want to use \emph{constant time}!)} \SArtur{Emphasize: \emph{one-sided error}!} The fundamental problem in the area of graph property testing is for a given undirected graph $G$ to distinguish if $G$ satisfies some graph property $\mathcal{P}$ or if $G$ is $\eps$-far from satisfying $\mathcal{P}$, where $G$ is said to be $\eps$-far from satisfying $\mathcal{P}$ if an $\eps$-fraction of its representation should be modified in order to make $G$ satisfy~$\mathcal{P}$. The notion of testability of combinatorial structures and of graphs, has been introduced by Goldreich et al.\ \cite{GGR98}, who have shown that many natural graph properties such as $k$-colorability or having a large clique are \emph{testable}, that is, have a tester, whose query complexity, that is, the number of oracle queries to the input representation (in \cite{GGR98}, to the graph adjacency matrix) can be upper bounded by a function that depends only on the property $\mathcal{P}$ and on $\eps$, the proximity parameter of the test, and is independent of the size of the input graph $G$. This has been later extended to show that testability in the \emph{dense graph model} (of \cite{GGR98}) is closely related to the graph regularity lemma as one can show that a property is testable (with two-sided error) if and only if it can be reduced to testing for a finite number of regular partitions \cite{AFNS06}; for one-sided error testing, it has been shown that a property is testable if and only if it is hereditary or close to hereditary \cite{AS08}. In particular, we know that subgraph freeness is testable with one-sided error in this model (see, e.g., \cite{AS05}). We also know of similar logical characterization of families of testable graph properties (for example, every first-order graph property of type $\exists\forall$ is testable, while there are first-order graph properties of type $\forall\exists$ that are not testable~\cite{AFKS00}). While for many years the main efforts in property testing have been concentrated on the dense graph model, there has been also an increasing amount of research focusing on the \emph{bounded degree graph model} introduced by Goldreich and Ron \cite{GR97}, the model more suitable for sparse graphs. For example, while it is trivial to test the subgraph freeness with one-sided error in this model, testing $H$-minor freeness is more complex, and is possible with constant query complexity only if $H$ is cycle-free \cite{CGRSSS14}; if $H$ has a cycle, then $\widetilde{\Omega_{\eps}}(\sqrt{n})$ queries are required and effectively sufficient \cite{CGRSSS14,ERS17}. Among further highlights, it is known that every hyperfinite property is testable with two-sided error \cite{NS13} (see also earlier works in \cite{BSS10,CSS09,GR99}). Rather surprisingly, much less is known for \emph{general graphs}, that is, graphs with no bound for the maximum degree (see, e.g., \cite[Chapter~10]{Gol17}). The model has been initially studied by Kaufman et al.\ \cite{KKR04}, Parnas and Ron \cite{PR02}, and Alon et al.\ \cite{AKKR08}, where the main goal was to study the trade-off between the complexity for sparse graphs with that for dense graphs (it should be noted though that these papers were using a slightly different access oracle to the input graph). These results show that most of even very basic properties are \emph{not testable}. Czumaj et al.\ \cite{CMOS11} addressed a related question in this model, and show that in fact if one restricts the input graphs to be planar (but without any constraints on the maximum degree), then the benchmark problem of testing bipartiteness is testable in the random neighbor query model. In a similar vein, Ito \cite{Ito16} extended the framework from \cite{NS13} and show that all graph properties are testable for a certain special class of multigraphs called hierarchical-scale-free multigraphs. Still, despite these few results and despite its natural importance, \emph{our understanding of graph property testing for degree-unconstrained graphs is very limited}. In this paper we take on this major challenge and consider the problem of characterizing all testable graph properties in \emph{general planar graphs}. We consider the model in which a general planar graph can be accessed by the \emph{random neighbor oracle} that allows access to any given vertex and access to a random neighbor of a given vertex. We show that, informally, a graph property $\mathcal{P}$ is testable with one-sided error for general planar graphs \emph{if and only if} testing $\mathcal{P}$ can be reduced to testing for a finite family of finite forbidden subgraphs. While our presentation focuses on planar graphs, our approach extends easily to general minor-free graphs. \paragraph{Testing for subgraphs-freeness.} The central combinatorial problem considered in this paper is that of subgraph detection. The question of identifying frequent subgraphs in big graphs is one of the most fundamental problems in network analysis, extensively studied in the literature. It has been empirically shown that different classes of networks have the same frequent subgraphs and they differ for different network classes \cite{MSIKCA02}. In this context, frequently occurring subgraphs are also known as \emph{network motifs} \cite{MSIKCA02}. This raises the question how quickly we can identify the motifs of a given network. Recent work approaches this question by approximating the number of occurrences of certain subgraphs using random sampling \cite{ELRS17,ERS17,GRS11}. In this paper, we will study the corresponding property testing question: \emph{Can we distinguish a graph that has no copies of a predetermined subgraph $H$ from a graph in which we need to remove more than an $\eps$-fraction of its edges in order to obtain a graph that contains no copy of $H$}. This question has received a lot of attention in the property testing setting and it is known that subgraph freeness can be tested with a constant number of queries both in the dense graph model (see, e.g., \cite{AS05}) and in the bounded degree graph model, where testing subgraph freeness is simple. The problem of testing subgraph freeness has also been studied in the setting of general graphs \cite{AKKR08}, where the authors give a lower bound of $\Omega(n^{1/3})$ queries for testing triangle freeness\SArtur{I'm puzzled by this claim, since for general graphs, even for sparse ones, testing triangle freeness trivially requires $\Omega(\sqrt{n})$ complexity \dots take our standard example of a clique on $\sqrt{n}$ vertices and the rest consists of $n - \sqrt{n}$ isolated vertices.}, which can be extended to other non-bipartite subgraphs. They also give an upper bound of $O(n^{6/7})$ queries. We continue this line of research, but will put our focus on sparse graphs, i.e., graphs with bounded average degree. Since it seems that for many properties we cannot hope for extremely efficient, that is, testing algorithms with a constant number of queries in general graphs (often a hard example is a clique on $\sqrt{n}$ vertices), we focus our attention on \emph{planar graphs}. It has been only recently shown that bipartiteness in planar graphs can be tested with a constant number of queries \cite{CMOS11}. Our result can be viewed as a major extension of that result: we prove that for every fixed graph $H$, the property of $H$-freeness can be tested with a constant number of queries. Our approach extends to general \emph{minor-free graphs}. \subsection{Basic notation} Before we proceed with detailed description of our results, let us begin with some basic definitions. \paragraph{Notation.} \label{Notation} Throughout the paper we use several constants depending on $H$ (forbidden subgraph) and $\eps$. We use lower case Greek letters to denote constants that are typically smaller than $1$ (e.g., $\delta_i(\eps,H)$) and lower case Latin letters to denote constants that are usually larger than $1$ (e.g., $f_i(\eps,H)$). All these constants are always positive. Furthermore, throughout the paper we use the asymptotic symbols $O_{\eps,H}(\cdot)$, $\Omega_{\eps,H}(\cdot)$, and $\Theta_{\eps,H}(\cdot)$, which ignore multiplicative factors that depend only on $H$ and $\eps$ and that are positive for $\eps>0$. Throughout the paper, for any set of edge-disjoint subgraphs $\mathcal{S}$ of $G = (V,E)$, we write $\G[\mathcal{S}]$ to denote the graph with vertex set $V$ and edge set being the set of edges from the sets in $\mathcal{S}$. \subsubsection{Property testing and $H$-freeness} A \emph{graph property $\mathcal{P}$} is any family of graphs closed under isomorphism. (For example, bipartiteness is a graph property $\mathcal{P}$ defined by a family of all bipartite graphs.) We are interested in finding an algorithm (called \emph{tester}) for testing a given graph property $\mathcal{P}$, i.e., an algorithm that inspects only a very small part of the input graph $G$, and accepts if $G$ satisfies $\mathcal{P}$ with probability at least $\frac23$, and rejects $G$ if it is $\eps$-far away from $\mathcal{P}$ with probability at least $\frac23$, where $\eps$ is a proximity parameter, $0 \le \eps \le 1$. We say a simple graph $G$ is \emph{$\eps$-far from $\mathcal{P}$} if one has to delete or insert more than $\eps |V|$ edges from $G$ to obtain a graph satisfying $\mathcal{P}$\footnote{Similarly as in \cite{CMOS11}, we notice that the standard definition of being $\eps$-far (see, e.g., the definition in \cite{Gol17} or \cite{KKR04}) expresses the distance as the fraction of edges that must be modified in $G$ to obtain a graph satisfying $\mathcal{P}$; comparing this to our definition, instead of modifying $\eps |V|$ edges, one modifies $\eps |E|$ edges. In this paper we prefer to use the definition with $\eps |V|$ edge modifications because our focus is on the study of sparse graphs, graphs with $|E| = O(|V|)$. Indeed, for any class of planar graphs or graphs with an excluded minor, which are the main classes of graphs studied in this paper, the number of edges in the graph is upper bounded by $O(|V|)$. Moreover, unless the graph is very sparse (i.e., most of its vertices are isolated, in which case even finding a single edge in the graph may take a large amount of time), the number of edges in the graph is $\Omega(|V|)$. Thus, under the standard assumption that $|E| = \Omega(|V|)$, the $\eps$ in our definition and the $\eps$ in the previous definitions remain within a constant factor. We use our definition of being $\eps$-far for simplicity; our analysis can be extended to the standard definition in a straightforward way.}. The main focus of this paper is on the study of testers with \emph{one-sided error}, that is, testers that always accept all graphs satisfying $\mathcal{P}$ and can err only for graphs $\eps$-far from $\mathcal{P}$. (In contrast, \emph{two-sided error} testers can err (with probability at most $\frac13$) both for graphs $\eps$-far from $\mathcal{P}$ \emph{and} for graphs satisfying $\mathcal{P}$.) The main graph properties considered in this paper are related to \emph{forbidden subgraphs}. Throughout the entire paper we will fix $H = (V(E),E(H))$ to be an arbitrary, simple, finite undirected graph. The notion of a graph $H$ being \emph{finite} means that its size is constant, though we will allow the constant to be a function of $\eps$, the proximity parameter for property testing, which will be clear from the context. (That is, for a given graph property $\mathcal{P}$ and a proximity parameter $\eps$, $0 < \eps < 1$, we will say that a graph $H$ is \emph{finite} (for $\mathcal{P}$ and $\eps$) if there is $s = s(\eps) = O_{\eps}(1)$, such that $|V(H)| \le s$ for every $n \in \NATURAL$.) \junk{\Artur{You may want to have a more elaborate definition, but I don't think it's needed: \it For a given graph property $\mathcal{P} = (\mathcal{P}_n)_{n \in \NATURAL}$, a proximity parameter $\eps$, $0 < \eps < 1$, and $n \in \NATURAL$, we will say that a graph $H$ is \emph{finite} (for $\mathcal{P}$, $\eps$, and $n$) if there is $s = s(\eps) = O_{\eps}(1)$, such that $|V(H)| \le s$. For given $\mathcal{P}$, $\eps$, and $n$, a \emph{family $\mathcal{H}$ of finite graphs} is any family such that each $H \in \mathcal{H}$ is finite (for $\mathcal{P}$, $\eps$, and $n$). Furthermore, notice that since each $H \in \mathcal{H}$ is of size $O_{\eps}(1)$, so is the size of $\mathcal{H}$, that is, $|\mathcal{H}| = O_{\eps}(1)$. Hence, $\mathcal{H}$ is also a \emph{finite family} of \emph{finite graphs}. }} We say that a given graph $G$ is \emph{$H$-free} if $G$ does not contain a copy of $H$.\SArtur{Is this clear? Should we emphasize that we're not talking about induced copies?} Following the definition above, we say that a simple graph $G$ is \emph{$\eps$-far from $H$-free} if one has to delete more than $\eps |V|$ edges from $G$ to obtain an $H$-free graph. Our definitions extends to families of forbidden graphs in a natural way. If $\mathcal{H}$ is a finite family of finite graphs, then a given graph $G$ is \emph{$\mathcal{H}$-free} if for every $H \in \mathcal{H}$, $G$ is $H$-free. Similarly, $G$ is \emph{$\eps$-far from $\mathcal{H}$-free} if for every $H \in \mathcal{H}$, $G$ is $\eps$-far from $H$-free. Further, notice that if $\mathcal{H}$ is a finite family of finite graphs then since each $H \in \mathcal{H}$ is of size $O_{\eps}(1)$, so is the size of $\mathcal{H}$; hence, $\mathcal{H}$ is also a \emph{finite family} of \emph{finite graphs}. In our paper we will also consider the following generalization of $\mathcal{H}$-freeness. In what follows, for a given graph property $\mathcal{P}$ and $n \in \NATURAL$, let $\mathcal{P}_n$ be the graph property $\mathcal{P}$ for $n$-vertex graphs. \begin{definition}\textbf{(Semi-subgraph-freeness)}\it \label{def:semi-H-freeness} \SArtur{This definition should be independent of any complexity assumptions, independent on the query access model, etc. A graph property $\mathcal{P} = (\mathcal{P}_n)_{n \in \NATURAL}$ is \textbf{\emph{semi-subgraph-free}} if for every $\eps$, $0 < \eps < 1$, and every $n \in \NATURAL$, there is a finite family $\mathcal{H}$ of finite graphs such that the following hold: \begin{enumerate}[(i)] \item any graph $G$ satisfying $\mathcal{P}_n$ is $\mathcal{H}$-free, and \item any graph $G$ which is $\eps$-far from satisfying $\mathcal{P}_n$, is not $\mathcal{H}$-free (contains a copy of some $H \in \mathcal{H}$). \end{enumerate} \end{definition} Let us emphasize that in Definition \ref{def:semi-H-freeness} by a \emph{finite} family $\mathcal{H}$ of \emph{finite graphs} we mean that even though $\mathcal{H}$ may depend on $n$, the sizes of $\mathcal{H}$ and of any $H \in \mathcal{H}$ are always upper bounded by a function independent on $n$, $|\mathcal{H}| = O_{\eps}(1)$ and $|V(H)| = O_{\eps}(1)$. \subsubsection{Oracle access model: random neighbor queries} \label{subsubsec:oracle} The access to the input graph is given by an \emph{oracle}. We consider the \emph{random neighbor oracle}, in which an algorithm is given $n \in \NATURAL$ and access to an input graph $G = (V,E)$ by a query oracle, where $V = \{1, \dots, n\}$. The \emph{random neighbor query} specifies a vertex $v \in V$ and the oracle returns a vertex that is chosen i.u.r. (independently and uniformly at random) from the set of all neighbors of $v$. (Notice that in the random-neighbor model, since $V = \{1, \dots, n\}$, the algorithm can also trivially select a vertex from $V$ i.u.r.) We believe that the random-neighbor model is the most natural model of computations in the property testing framework in the context of very fast algorithms, and therefore our main focus is on that model. \begin{remark} \label{remark:modified-random-neighbor-oracle} We notice that all our results could be also presented in a variant of the model above in which we would allow only two types of queries: \emph{random vertex query}, which returns a random vertex, and \emph{random neighbor query}, which returns a random neighbor of a given vertex $v$. Each time we call the random neighbor oracle, the returned random vertex or its random neighbor is chosen \emph{independently and uniformly at random (i.u.r.)}. All vertices of the input graph are accessible and distinguishable by their IDs, and there is no requirement about the IDs other than that they are all distinct. Notice that in this model, the tester does not know $n$, the size of the input graph $G$. \end{remark} \paragraph{Query complexity.} The \emph{query complexity} of a tester is the number of oracle queries it makes. We say a graph property $\mathcal{P}$ is \emph{testable} if it has a \emph{tester with constant query complexity}, that is, for every $\eps$, $0 < \eps < 1$, there is $q = q(\eps)$ such that for every $n \in \NATURAL$ the tester has query complexity upper bounded by~$q$ (the complexity may depend on $\mathcal{P}$ and $\eps$, but not on the input graph nor its size).\SArtur{We may want to make a definition out of it, but since this would change the numbering of theorems/claims/etc, I decided to not do it \emph{yet} so, leaving it in the main text.} \paragraph{Other oracle access models.} There are some natural variations of the random neighbor oracle model that have been considered in the literature and that can be relevant here.\SArtur{Of course, we could also mention here the original model of incidence and adjacency queries proposed/used by Goldreich and Ron (see \cite{Gol17}, and also \cite{AKKR08,KKR04,PR02}), which assumes that one knows $n$ and one can ask the following queries: \begin{itemize} \item an incidence function $g_1 : [n] \times [n-1] \rightarrow \{0, 1, \dots, n\}$ such that $g_1(u,i) = 0$ if $u$ has less than $i$ neighbors and $g_1(u,i) = v$ if $v$ is the $i$th neighbor of $u$; \item an adjacency predicate $g_2 : [n] \times [n] \rightarrow \{0, 1\}$ such that $g_2(u,v) = 1$ if and only if $\{u, v\} \in E$. \end{itemize} While Goldreich \cite{Gol17} considers to allow both incidence queries and adjacency queries to be the ``most natural choice'' in the context of property testing of general graphs, we believe that especially in the context of analysing constant-query property testers (which is the main focus of this paper), the \emph{random neighbor oracle model} and other models considered in the paper to be \emph{more natural}. } \begin{enumerate}[I.] \item One could extend the random neighbor oracle model to the \emph{random distinct neighbor oracle model}, where one allows for every vertex to query for \emph{distinct} random neighbors (that is, each time we call the random distinct neighbor query for a given vertex $v$, the oracle returns a neighbor of $v$ chosen i.u.r. among all neighbors not returned earlier); if all neighbors have been already returned then the oracle would return a special symbol. \item One could consider a model allowing two other types of queries: \begin{inparaenum \item[\emph{degree queries:}] for every vertex $v \in V$, one can query the degree of $v$, and \item[\emph{neighbor queries:}] for every vertex $v \in V$, one can query its $i^{\text{th}}$ neighbor. \end{inparaenum} Observe that by first querying the degree of a vertex, we can always ensure that the $i^{\text{th}}$ neighbor of the vertex exists in the second type of query. \end{enumerate} It should be noted that while our main focus is on the random neighbor oracle model, our testers (and their analysis) for $H$-freeness can be trivially modified to work in the other three oracle access models (in particular, Theorems \ref{thm:main-H-freeness}, \ref{thm:main-extension}, and \ref{thm:main-H-minor-free-extension} hold in all these models). However, our main result, the characterization of testable properties in planar graphs cannot be extended to the other models (see Section \ref{subsubsec:sensitivity-of-the-models}), other than the variant of the random neighbor oracle discussed in Remark \ref{remark:modified-random-neighbor-oracle}. For the sake of completeness, in Appendix \ref{subsec:basic-planar} we recall some basic properties of planar graphs \subsection{Our results} In this paper we present a characterization of all testable graph properties for general planar graphs in the random neighbor oracle model, showing that, informally, a graph property $\mathcal{P}$ is testable with one-sided error for general planar graphs if and only if testing $\mathcal{P}$ can be reduced to testing for a finite family of finite forbidden subgraphs (see Theorem \ref{thm:characterization}). Further, the results extend to general families of \emph{minor-free graphs}~$G$. The result is proven in two steps: First we apply a recent result from \cite{CFPS19} (see Theorem \ref{thm:canonical-tester}) to argue in \textbf{Theorem \ref{thm:main-1-sided-reduces-to-H-freeness}} the (easier) necessary condition, that \begin{itemize} \item in the random neighbor oracle model, any graph property $\mathcal{P}$ testable with one-sided error can be reduced to testing for a finite family of forbidden subgraphs. \end{itemize} Then we prove \emph{our main technical contribution}, \textbf{Theorem \ref{thm:main-H-freeness}}, that \begin{itemize} \item for a given connected finite graph $H$, \emph{subgraph freeness} is \emph{testable} (can be tested with a constant number of queries) on any input \emph{planar graph} $G$, assuming the access to $G$ is via the random neighbor oracle. \end{itemize} This latter result extends to arbitrary (not necessarily connected) finite graphs $H$ and to testing for $\mathcal{H}$-freeness for any finite family $\mathcal{H}$ of finite graphs, see Theorem \ref{thm:main-extension} in Section \ref{sec:dics-many}. By combining these results, we obtain in \textbf{Theorem \ref{thm:characterization}} \begin{itemize} \item a characterization of graph properties testable with one-sided error for general planar graphs; this result extends to general minor-free graphs. \end{itemize} While we believe that our general characterization of all testable graph properties of planar and minor-free graphs is a central problem in property testing and is the main contribution of this paper, we also hope that our constant query time tester for subgraph freeness will further advance our understanding of efficient algorithms for that fundamental problem.\SArtur{Possibly more text here?} Our work is a continuation of our efforts to understand the complexity of testing basic graph properties in graphs with no bounds for the degrees. Indeed, while major efforts in the property testing community have been put to study dense graphs and bounded degree graphs (cf. \cite[Chapter~8-9]{Gol17}), we have seen only limited advances in the study of arbitrary graphs, in particular, sparse graphs but without any bounds for the maximum degrees. We believe that this model is one of the most natural models, and it is also most relevant to computer science applications (see also the motivation in \cite[Chapter~10.5.3]{Gol17}). While the understanding of testing in general graphs is still elusive, our work makes a major step forward towards understanding of testing properties for most extensively studied classes of graphs, in our case of planar and minor-free graphs. \subsubsection{Overview: Any testable property can be reduced to testing for forbidden subgraphs} \label{subsubsec:necessary-cond-testing} We begin with an \emph{easier part} of our characterization (see Section \ref{sec:testable-implies-forbidden-subgraphs} for details). Our approach follows the method of canonical testers for graph properties testable for general graphs developed recently in \cite{CFPS19}. The \emph{intuition} here is rather simple: if a graph property $\mathcal{P}$ is testable then all what the tester can do is for a given input graph $G$ to randomly sample a constant number of vertices and then to explore their neighborhoods of constant size, and on the basis of the visited subgraph $U$ of $G$ to decide whether to accept the input graph or to reject it. Further, the assumption that we consider a one-sided error tester implies that the tester must always accept any graph $G$ satisfying $\mathcal{P}$. Therefore, in particular, if we define $\mathcal{H}$ as the family of all $U$ for which the tester rejects any input graph $G$ that contains $U$, then we can argue that any graph $G$ satisfying $\mathcal{P}$ must be $\mathcal{H}$-free. The analysis can be easily extended to hold for an arbitrary class of the input graphs, e.g., for planar graphs. (Notice that these arguments show only that any testable graph property $\mathcal{P}$ has a finite family $\mathcal{H}$ of finite graphs such that $\mathcal{P}$ is $\mathcal{H}$-free. However, we do not say anything about any other properties of $\mathcal{P}$; indeed, $\mathcal{P}$ may be not only $\mathcal{H}$-free but also may have some other properties. A good example showing the sensitivity of this notion is testing bipartiteness. It has been shown \cite{CMOS11} that for general planar graphs bipartiteness is testable with one-sided error, but clearly, bipartiteness cannot be defined as a property of $\mathcal{H}$-freeness for a \emph{finite} family $\mathcal{H}$ of forbidden graphs. However, one can easily show (cf. [10, Section 2.1]) that if an input graph $G$ is $\eps$-far from bipartitiness, then there must be an odd $k = O(1/\eps^2)$, so that $G$ is $O(\eps)$-far from $C_k$-free, and this fact suffices to argue that bipartitiness for planar graphs is testable.) To turn this intuition into a formal proof, we need to do some additional work. We rely heavily on the canonical tester developed recently in \cite{CFPS19} to argue that to test any testable graph property we can assume that the tester at hand is ``oblivious'' and works non-adaptively. This allows us to obtain a clean characterization of forbidden subgraphs for any given testable property $\mathcal{P}$. Further, we lift this characterization to extend the analysis to \emph{semi-subgraph-free} graph properties, which are graph properties defined as $\mathcal{H}$-free or close to $\mathcal{H}$-free, for some finite family $\mathcal{H}$ of finite graphs. The analysis is presented in Section~\ref{sec:testable-implies-forbidden-subgraphs} (see Theorem~\ref{thm:main-1-sided-reduces-to-H-freeness}). \subsubsection{Overview: Testing for forbidden subgraphs in planar graphs and minor-free graphs} \label{subsubsec:sufficient-cond-testing} The \emph{main technical contribution} of this paper is a proof that \emph{for planar graphs}, the property of being $H$-free is testable with one-sided error for every connected finite subgraph $H$, in the random neighbor oracle model, see Theorem \ref{thm:main-H-freeness}. This result extends to arbitrary (not necessarily connected) finite graphs $H$ and to testing for $\mathcal{H}$-freeness for any finite family $\mathcal{H}$ of finite graphs, see Theorem \ref{thm:main-extension}. Further, the results extend to general families of \emph{minor-free graphs} $G$, see Theorem \ref{thm:main-H-minor-free-extension}. Let us first discuss the challenges of the task of testing $H$-freeness. It has been known for a long time that for \emph{bounded degree graphs} one can test $H$-freeness with a constant number of queries using the following simple tester: randomly sample a constant number of vertices and check whether any of them belongs to a copy of $H$. This result relies on two properties of bounded degree graphs: \begin{inparaenum}[\it (i)] \item that it is easy to test whether a given vertex belongs to a copy of $H$ (just run a BFS of depth $|V(H)|$), and \item that if a given graph is $\eps$-far from $H$-free then it has many edge-disjoint copies of $H$ that cover a total of a linear number of vertices. \end{inparaenum} But both these properties fail to work for general graphs. For example, for {\it (ii)}, consider an $n$-vertex graph $G$ with $n - \sqrt{n}$ isolated vertices and $\sqrt{n}$ vertices forming a clique. It is easy to see that $G$ is $\eps$-far from $H$-free (for a sufficiently small $\eps$ with respect to the size of $H$), but all copies of $H$ in $G$ are covered only by $\sqrt{n}$ vertices and as the result, testing $H$-freeness trivially requires $\Omega(\sqrt{n})$ queries: one has to perform so many queries (in expectation) to hit a first non-isolated vertex. In our analysis, by focusing on planar (or minor-free) graphs, we are able to circumvent the latter obstacle {\it (ii)} (argued implicitly in Lemma \ref{lemma:edge-disjoint-copies-H-free}), but the former obstacle {\it (i)} still persists. Our approach to cope with {\it (i)} is by devising a simple modification of BFS search, random bounded-breadth bounded-depth search. By bounding the breadth and depth of the graph exploration we are able to ensure that the complexity of the tester is bounded. However, then the main challenge in our analysis is to analyze this process, to show that indeed, it distinguishes between $H$-free graphs and graphs that are $\eps$-far from $H$-free. Our approach relies on a proof that for any planar graph $G$ that is $\eps$-far from $H$-free there exists a set $\DCH$ of edge-disjoint copies of $H$ such that, \begin{enumerate}[\it (i)] \item if we can find a copy of $H$ in $\G[\DCH]$ with a constant number of queries, then also in $G$ we can find a copy of $H$ with a constant number of queries, and \item if the input graph was $\G[\DCH]$, then we could find a copy of $H$ with a constant number of queries.\SArtur{To make the picture clearer, maybe we could have some arguments why on its own {\it (ii)} is non-trivial. I can see some potential readers claiming that {\it (ii)} is trivial since ???, e.g., \textcolor[rgb]{0.50,0.00,1.00}{\emph{it's obvious that if $G$ consists only of edge-disjoint copies of $H$, and in fact of a linear number of them, then we can find one copy easily}}.} \end{enumerate} The construction of the set $\DCH$ is existential, and is performed by a process of gradually deleting edges of $G$ so that after each round of edge deletions, {\it (i)} is maintained, and so that at the end, the structure of $\G[\DCH]$ is simple enough so that {\it (ii)} is easy. The process is controlled by a sequence of \emph{contractions}: we reduce the problem of finding a copy of $H$ in $G$ to the problem of finding a copy of $H$ with one vertex contracted, which in turn, we reduce to the problem of finding a copy of $H$ with two vertices contracted, and so on so forth. The idea is that if at the end of this process, we have to find a copy of $H$ contracted to single vertex, this task is easy to analyze. The main challenge of our analysis here is to carefully manage the contractions to have the analysis going through. In a similar context, the authors in \cite{CMOS11} have been arguing that this task is already very complex for cycles in the analysis of constant-length random walks in planar graphs, that is, graphs with good separators and bad expansion. However, by using a sequence of self-reductions relying on contractions (and hence reducing testing $C_k$-freeness to testing $C_{k-1}$-freeness, where $C_k$ is a cycle of length $k$), the authors in \cite{CMOS11} were able to show there that for planar graphs, \emph{testing bipartiteness} (implicitly, testing $C_k$-freeness for constant $k$) can be done with constant query complexity and with one-sided error. The approach presented in our paper can be seen as a major extension of the approach used for testing bipartiteness in \cite{CMOS11} to test $H$-freeness, though the problem of testing $H$-freeness is significantly more complex. Indeed, the central tool used for bipartiteness, contractions of a path or a cycle, becomes problematic when the forbidden graph $H$ has vertices of degree higher than~2. The challenge here is that to contract vertices of higher degrees, the information about their neighbors is difficult to be maintained. Still, we follow a similar approach, but since we cannot perform the contraction in term of graphs, we do it via introducing \emph{hyperedges}, to ensure that after contracting high degree vertices the information about their neighbors is memorized in a form of a \emph{hypergraph}. This extension of the framework from graphs to hypergraphs makes the entire analysis significantly more complicated and one of our main technical contributions is to make the analysis work for this case. For example, one central challenge is to ensure that the input graph, originally planar, maintain some planarity properties even after applying a sequence of contractions. This task is not very difficult if the contractions were performed in graphs, but when we have to process hypergraphs, maintaining planarity seems to be entirely \emph{hopeless}. Still, we will show how to efficiently model the connectivity information of the hypergraph using the concept of shadow graphs that are unions of planar graphs. The analysis is long, with many subtle fine points, and is presented in details in Sections \ref{sec:outline-proof}--\ref{sec:final-proof}. \begin{remark} While in our analysis we did not try to optimize the complexity of the $H$-freeness tester, focusing on the task of obtaining the query complexity of $O_{\eps,H}(1)$, let us mention that in fact, with the analysis as it is now, without any optimization efforts, the complexity of our tester is doubly exponential in $\Hsize/\eps$. \end{remark} \begin{remark} While our main focus is on the random neighbor oracle model, it is straightforward to extend our testers and their analysis for $H$-freeness and for $\mathcal{H}$-freeness to the other two oracle access models presented in Section \ref{subsubsec:oracle}. (However, our main result, the characterization of testable properties in planar graphs (and Theorem \ref{thm:main-1-sided-reduces-to-H-freeness}), cannot be extended to the other models (cf. Section \ref{subsubsec:sensitivity-of-the-models}), except the variant of the random neighbor oracle from Remark~\ref{remark:modified-random-neighbor-oracle}.)\SArtur{Think about it (\& remember to stay consistent, since this issue was mentioned in some other places (cf. Section~\ref{sec:minor-free})).} \end{remark} \subsubsection{Characterization of graph properties testable with one-sided error for planar/minor-free graphs} \label{Intro-characterization} By combining the results sketched in Sections \ref{subsubsec:necessary-cond-testing} and \ref{subsubsec:sufficient-cond-testing}, the following characterization of graph properties testable with one-sided error (in the random neighbor oracle model) for general planar graphs and for minor-free graphs follows:\SArtur{Later one may want to add some text about \textbf{non-uniformity} etc.} \begin{theorem} \label{thm:characterization} A graph property $\mathcal{P}$ is testable with one-sided error in the random neighbor oracle model for planar graphs (and for minor-free graphs) if and only if $\mathcal{P}$ is semi-subgraph-free. \end{theorem} The proof of Theorem \ref{thm:characterization} follows immediately from our Theorem \ref{thm:main-1-sided-reduces-to-H-freeness} (necessary condition) and Theorems~\ref{thm:main-extension} and \ref{thm:main-H-minor-free-extension} (sufficient condition). One can read this characterization informally as follows: \noindent\emph{A graph property $\mathcal{P}$ is testable with one-sided error in the random neighbor oracle model for planar graphs (or for minor-free graphs) if and only if $\mathcal{P}$ can be described as a property of testing forbidden subgraphs of constant size (the maximum size of any forbidden subgraph can be a function of $\mathcal{P}$ and $\eps$).} \subsubsection{Remarks on the sensitivity and robustness of the oracle access models} \label{subsubsec:sensitivity-of-the-models} While our tester for $H$-freeness (Section \ref{subsubsec:sufficient-cond-testing}) is robust, the characterization presented in Theorem \ref{thm:characterization} is very sensitive to the oracle model. For example, it might be natural to consider a variant of our random neighbor oracle model to allow for every vertex to query for \emph{distinct} random neighbors. That is, each time we call the random distinct neighbor query for a given vertex $v$, the oracle will return a neighbor of $v$ chosen i.u.r. among all neighbors not returned earlier. One important feature of this model is that after $\deg(v)+1$ queries for a random distinct neighbor of vertex $v$, we are able to detect the degree $\deg(v)$ of vertex $v$ in the input graph. This makes this model more powerful than our random neighbor oracle model, and in particular, it allows to test some properties that cannot be reduced to testing for forbidden subgraphs. For example, in that model one can test connectivity with $O(1/\eps^3)$ queries and one-sided error (see, e.g., \cite{GR97}). Indeed, if the input graph $G$ is $\eps$-far from being connected, then it is easy to see that $G$ must have $\frac12 \eps n$ connected components of size at most $\frac2{\eps}$. Therefore, after randomly sampling $\frac{3}{\eps}$ vertices, with probability at least $\frac23$ one of the randomly sampled vertices will be in one of these small connected components. Since all vertices in this component must have degree at most $\frac2{\eps}$, we can run BFS algorithm to explore the entire connected component with $O(1/\eps^2)$ random distinct neighbor queries and verify that this connected component is indeed small, proving that the input graph is $\eps$-far from being connected. This can be easily formalized to obtain a one-sided error tester for connectivity with query complexity $O(1/\eps^3)$ in the random distinct neighbor oracle model. However, this task cannot be efficiently performed in our random neighbor oracle model (since we can never confirm with a finite number of queries a degree of a given vertex, even if its degree is constant, even if it is 1), and indeed, connectivity testing cannot be reduced to testing for a finite family of forbidden subgraphs and is not is a semi-subgraph-free graph property, even in planar graphs. (This is in contrast to other characterizations presented earlier in the literature, e.g., in \cite{AS08}, where the tester for the dense graphs model reduces to testing for forbidden \emph{induced} subgraphs, giving a complete characterization of properties testable with one-sided error in terms of hereditary properties.) And so, even for planar graphs, \emph{testing connectivity in the random neighbor oracle model is impossible with one-sided error}!\footnote{To see this, consider two \emph{planar} graphs: a cycle $C_n$ on $n$ vertices, which is connected, and a perfect matching $M_n$ on $n$ vertices, which is $\eps$-far from connected (for $\eps < \frac12$). Any tester should reject $M_n$ with probability at least $\frac23$. But at the same time, if we consider the tester on $C_n$ (which must be accepted) then after performing $q$ queries, with probability at least $2^{-q}$, and so with positive probability, it will see only a subgraph of $M_n$. Therefore, since we consider one-sided error testers which must accept $C_n$, we conclude that no \emph{one-sided error} tester \emph{can reject} $M_n$.} \subsection{Organization of the paper} We begin in Section \ref{sec:testable-implies-forbidden-subgraphs} with a formal analysis showing the necessary part of our characterization of testable properties, that any testable property is semi-subgraph-free (cf. Theorem \ref{thm:main-1-sided-reduces-to-H-freeness} in Section \ref{subsec:canonican-tester-and-reduction}). Then, in Sections \ref{sec:outline-proof}--\ref{sec:final-proof}, we present the \emph{main technical contribution} of this paper, a complete analysis showing the sufficient part of our characterization of testable properties in planar graphs, that for any finite graph $H$, testing $H$-freeness is testable in planar graphs. The analysis here is split into several sections, with some auxiliary and technical results deferred to the appendix (Appendix \ref{sec:condition-a-prime}--\ref{sec:proof-lemma:small-vertices-new}). We begin in Section \ref{sec:outline-proof} with an outline of the proof of testing $H$-freeness, focusing on connected $H$. Then, in Section \ref{sec:exploration-testing-H-free}, we present our tester and define our framework. Section \ref{subsec:constructing-H1} gives the first (and easiest) step in our transformation and show that any graph that is $\eps$-far from $H$-free has a linear number of edge-disjoint copies of $H$. Then, in Section \ref{subsec:Ui->Ui+1}, we show how the contractions (cf. Section \ref{subsubsec:sufficient-cond-testing}) can be performed in hypergraphs, to ensure existence of a sought set $\DCH$ of edge-disjoint copies of $H$ in which we can detect a copy of $H$. The analysis is then completed in Section \ref{sec:final-proof}. Finally, in Section \ref{sec:dics-many} we discuss the extension to families of arbitrary finite graphs and in Section \ref{sec:minor-free} we discuss the extension to minor-free graphs. Some final conclusions are in Section \ref{sec:conclusions}. \SArtur{Do we want to have any additional section about the characterization? Or does Section \ref{Intro-characterization} suffice?} \section{Any testable property can be reduced to testing for forbidden subgraphs} \label{sec:testable-implies-forbidden-subgraphs} \SArtur{Of course, one could change the title to the more precise: \textbf{``Any testable property is semi-subgraph-free''} but to me, such title would sound less informative. But maybe I'm wrong. In this section we provide a formal proof of the necessary (and easier) condition in our characterization, Theorem \ref{thm:main-1-sided-reduces-to-H-freeness}, that any one-sided-error testable property for arbitrary graphs can be reduced to testing for forbidden subgraphs of constant size (this claims holds for any finite family of graphs, not only for planar graphs). It should be noted that each graph in the family of forbidden graphs may have size depending on $\eps$, the proximity parameter of the tester.\SArtur{Note: in principle, our tester have forbidden graphs depending on $n$, even if their sizes are upper bounded by $O_{\eps}(1)$.} Our analysis critically relies on a recently developed in \cite{CFPS19} canonical tester that shows that to test any testable graph property we can assume that the tester at hand is ``oblivious'' and works non-adaptively. This will allow us later to obtain a clean characterization of forbidden subgraphs for any given testable property~$\mathcal{P}$. \subsection{Bounded-breadth bounded-depth graph exploration and bounded-discs} \label{subsec:BFS-like-search-bounded-discs} Our analysis relies on a random (BFS-like) bounded-breadth bounded-depth search, \Traverse{} below, an exploration algorithm similar to BFS of depth $\ld$. The algorithm runs from a given vertex a random BFS-like exploration of breadth $\dg$ and of depth $\ld$ using the random neighbor oracle (i.e., every vertex selects $\dg$ of its neighbors i.u.r. and recursively continues the process from them, until depth $\ld$ is reached). The main difference is that instead of visiting all neighbors of every vertex, like in the standard BFS algorithm, we \emph{visit only $\dg$ neighbors chosen i.u.r.}, to limit the complexity of the search algorithm. \begin{algo}\label{alg:traverse} \Traverse\,${(G,v,\dg,\ld)}$: \begin{itemize} \item Let $L_0 = \{v\}$. \item For $\ell = 1$ to $\ld$ do: \begin{itemize}[$\diamond$] \item Let $L_{\ell} = \emptyset$ and $\mathcal{E}_{\ell} = \emptyset$. \item For every $u \in L_{\ell-1}$ do: \begin{itemize}[$\circ$] \item Choose $\dg$ neighbors of $u$ using $\dg$ \emph{random neighbor queries}; call them $\Gamma_u$. \item Let $\mathcal{E}_u = \{ (u,x): x \in \Gamma_u\}$. \item Set $L_{\ell} = L_{\ell} \cup \Gamma_u$ and $\mathcal{E}_{\ell} = \mathcal{E}_{\ell} \cup \mathcal{E}_u$. \end{itemize} \item $L_{\ell} = L_{\ell} \setminus \bigcup_{i=0}^{\ell-1} L_i$. \end{itemize} \item \textbf{Return} the subgraph of $G$ induced by the edges $\bigcup_{\ell=1}^{\ld} \mathcal{E}_{\ell}$. \end{itemize} \end{algo} We use the notion of bounded-breadth/depth search \Traverse{} to define bounded discs. \begin{definition}\textbf{($(\dg,\ld)$-bounded disc)}\it \label{def:bounded-disc} For given $\dg, \ld \in \NATURAL$, graph $G = (V,E)$, and vertex $v \in V$, a \textbf{$(\dg,\ld)$-bounded disc} of $v$ in $G$ is any subgraph $U$ of $G$ that can be returned by \Traverse\,${(G,v,\dg,\ld)}$. \junk{ satisfying the following properties: \begin{itemize} \item the maximum distance from $v$ to any other vertex in $U$ is at most $\ld$; \item there exists an ordering $u_0 = v, u_1, \cdots, u_{|V(U)|}$ of vertices in $U$, and for each vertex $u_i$, there exists a subset $F_i$ of the set of all edges incident to $u_i$ with $|F_i| \le \max\{q, \deg(u_i)\}$, such that \begin{itemize}[$\diamond$] \item one can run \Traverse\,${(G,\dg,\ld)}$ starting at vertex $v$ with respect to the vertex ordering and for each $u_i$ uses edges in $F_i$ to exactly recover $U$. \end{itemize} \end{itemize} } Vertex $v$ is called a \textbf{root} of the $(\dg,\ld)$-bounded disc $U$. \end{definition} Let us observe that, assuming that $\dg \ge 2$, \Traverse\,${(G,v,\dg,\ld)}$ performs $\sum_{i=1}^{\ld} \dg^i \le 2 \dg^{\ld}$ queries to the input graphs. Accordingly, for $\dg \ge 2$, any $(\dg,\ld)$-bounded disc has at most $\sum_{i=0}^{\ld} \dg^i \le 2 \dg^{\ld}$ vertices and at most $\sum_{i=1}^{\ld} \dg^i \le 2 \dg^{\ld}$ edges. \subsection{Rooted graphs, their basic properties, and semi-rooted-subgraph-freeness} In our analysis it will be sometimes useful to consider also \emph{rooted} graphs, that is, graphs with some number of vertices distinguished as special vertices called \emph{roots}. (For example, bounded discs from Definition \ref{def:bounded-disc} are rooted graphs.) To analyze similarities between rooted graphs, we will use the following definition. \begin{definition}\textbf{(Root-preserving isomorphism)} \it \label{def:root-preserving-isomorphism} Let $Q = (V(Q), E(Q))$ and $Q' = (V(Q'), E(Q'))$ be two rooted graphs. A \textbf{root-preserving isomorphism} between $Q$ and $Q'$, denoted $Q \cong_r Q'$, is a bijection $f: V(Q) \rightarrow V(Q')$ such that $u$ is the root of $V(Q)$ if and only if $f(u)$ is the root of $V(Q')$, and $(u,v) \in E(Q)$ if and only if $(f(u),f(v)) \in E(Q')$. If $Q \cong_r Q'$, then we say that $Q$ is \textbf{root-preserving isomorphic} to $Q'$. \end{definition} We will extend this definition to compare a rooted graph with its occurrences (in a sense of root-preserving isomorphisms) in a large graph (which does not necessarily have to be rooted). \begin{definition}\it \label{def:root-preserving-copies} Let $G$ be an undirected graph and let $Q$ be a rooted graph. A \textbf{rooted copy of $Q$ in $G$} is a subgraph $U$ of $G$ such that one can assign the roots to $U$ so that there is a root-preserving isomorphism between $Q$ and the rooted version of $U$. For an arbitrary set $\mathcal{Q}$ of rooted graphs, we say that \textbf{$G$ is $\mathcal{Q}$-rooted-free} if for every $Q \in \mathcal{Q}$, there is no rooted copy of $Q$ in $G$. \end{definition} With these definitions, we are ready to present our auxiliary graph property notion. \begin{definition}\textbf{(Semi-rooted-subgraph-freeness)}\it \label{def:semi-H-rfreeness} A graph property $\mathcal{P}$ is \textbf{\emph{semi-rooted-subgraph-free}} if for every $\eps$, $0 < \eps < 1$, and every $n \in \NATURAL$, there is a finite family $\mathcal{H}$ of finite graphs such that the following hold: \begin{enumerate}[(i)] \item any graph $G$ satisfying $\mathcal{P}_n$ is $\mathcal{H}$-rooted-free, and \item any graph $G$ which is $\eps$-far from satisfying $\mathcal{P}_n$, is not $\mathcal{H}$-rooted-free. \end{enumerate} \end{definition} Similarly as in Definition \ref{def:semi-H-freeness}, the notion of a family $\mathcal{H}$ of \emph{finite graphs} means that every graph $H \in \mathcal{H}$ is finite, i.e., $|V(H)| = O_{\eps}(1)$. \subsection{Modeling forbidden subgraphs in rooted graphs} While our analysis uses rooted graphs, their use is purely auxiliary because of the following simple fact. \begin{lemma} \label{lemma:semi-rooted-subgraph-free-yields-semi-subgraph-free} If a graph property $\mathcal{P}$ is semi-rooted-subgraph-free then $\mathcal{P}$ is also semi-subgraph-free. \end{lemma} \begin{proof} This follows easily from the definitions of semi-rooted-subgraph-free and semi-subgraph-free properties. For any rooted graph $H$, let $\overline{H}$ denote the same graph with removed roots (that is, we remove the labels defining the roots); similarly, for any family $\mathcal{H}$ of rooted graphs, let $\overline{\mathcal{H}} = \{\overline{H}: H \in \mathcal{H}\}$. Then we claim that for any graph $G$ be an arbitrary graph and any family $\mathcal{H}$ of rooted graphs, \begin{enumerate}[\it \ \ \ \ \ \ \ \ (a)] \item if $G$ is $\mathcal{H}$-rooted-free then $G$ is also $\overline{\mathcal{H}}$-free, and \item if $G$ is not $\mathcal{H}$-rooted-free, then $G$ is also not $\overline{\mathcal{H}}$-free. \end{enumerate} Indeed, to see part \emph{(a)}, suppose, by contradiction, that $G$ is not $\overline{\mathcal{H}}$-free, that is, there is $\overline{H}$ with $H \in \mathcal{H}$ such that $\overline{H}$ is a subgraph of $G$. But then $G$ has a rooted copy of $H$, since we can take the roots of $H$ and assign them to $\overline{H}$, so that there is a root-preserving isomorphism between $H$ and the rooted version of $\overline{H}$. Since $G$ has a rooted copy of $H$, we conclude that $G$ is not $\mathcal{H}$-rooted-free, which is contradiction. To see part \emph{(b)}, suppose, by contradiction, that $G$ is $\overline{\mathcal{H}}$-free, that is, there is no $\overline{H} \in \overline{\mathcal{H}}$ such that $G$ has a copy of $\overline{H}$. But then, clearly, $G$ is $\mathcal{H}$-rooted-free, since otherwise, there would be $H \in \mathcal{H}$ such that $G$ had a rooted copy of $H$, which would imply that $\overline{H}$ was a subgraph $G$; contradiction. Now, we are ready to complete the proof of Lemma \ref{lemma:semi-rooted-subgraph-free-yields-semi-subgraph-free}. By Definition \ref{def:semi-H-rfreeness}, if $\mathcal{P}$ is semi-rooted-subgraph-free then there exists a finite family $\mathcal{H}$ of finite rooted graphs such that \begin{inparaenum}[(i)] \item any graph $G$ satisfying $\mathcal{P}$ is $\mathcal{H}$-rooted-free, and \item any graph $G$ which is $\eps$-far from satisfying $\mathcal{P}$, is not $\mathcal{H}$-rooted-free. \end{inparaenum} If we combine these properties with our claim above, then we obtain that for the finite family of finite graphs $\overline{\mathcal{H}} = \{\overline{H}: H \in \mathcal{H}\}$, \begin{enumerate}[\it (i')] \item any graph $G$ satisfying $\mathcal{P}$ is $\mathcal{H}$-rooted-free, and thus (by \emph{(a)}) also $\overline{\mathcal{H}}$-free, and \item any graph $G$ which is $\eps$-far from satisfying $\mathcal{P}$, is not $\mathcal{H}$-rooted-free, and thus (by \emph{(b)}) also not $\overline{\mathcal{H}}$-free. \end{enumerate} Therefore $\mathcal{P}$ is semi-subgraph-free (cf. Definition \ref{def:semi-H-freeness}). \end{proof} \subsection{Canonical testers and reduction to testing for forbidden subgraphs} \label{subsec:canonican-tester-and-reduction} Next, our analysis follows the framework described in Section \ref{subsubsec:necessary-cond-testing}. We rely on the following Theorem~3.6 from \cite{CFPS19} describing a \emph{canonical way of designing any tester in the random neighbor oracle model}.\SArtur{A generic comment about the analysis below: I have taken \emph{some} version of the Canonical Tester from \cite{CFPS19}, and it's possible that one will have to revise the formulation of Theorem \ref{thm:canonical-tester} (I hope though, not the statement).} \begin{theorem}[\textbf{Canonical tester \cite{CFPS19}}] \label{thm:canonical-tester} Let $\mathcal{P} = (\mathcal{P}_n)_{n \in \NATURAL}$ be a graph property that can be tested in the random neighbor oracle model with query complexity $q = q(\eps)$ and error probability at most~$\frac13$. Then for every $\eps$, there exists $q' = \Theta(q)$, and an infinite sequence $\mathcal{Q} = (\mathcal{Q}_{n})_{n \in \NATURAL}$ such that for every $n \in \NATURAL$, \begin{itemize} \item $\mathcal{Q}_{n}$ is a set of rooted graphs such that each $Q \in \mathcal{Q}_{n}$ is the union of $q'$ many $(q',q')$-bounded discs; \item the property $\mathcal{P}_n$ on $n$-vertex graphs can be tested with error probability at most $\frac13$ by the following canonical tester (with query complexity $q^{O(q)}$): \begin{itemize}[$\diamond$] \item sample a set (possibly, a multiset) $S$ of $q'$ vertices chosen i.u.r.; \item for each sampled vertex $v$, run \Traverse\,${(G,v,q',q')}$ to get a $(q',q')$-bounded disc~$U_v$; \item reject if and only if there exists a root-preserving isomorphism between the union of the explored $(q',q')$-bounded discs and some element $Q \in \mathcal{Q}_{n}$, that is, there is $Q \in \mathcal{Q}_{n}$ with $\bigcup_{v \in S}U_v \cong_r Q$. \end{itemize} \end{itemize} Furthermore, if $\mathcal{P} = (\mathcal{P}_n)_{n \in \NATURAL}$ can be tested in the random neighbor oracle model with query complexity $q(\eps)$ with one-sided error, then the resulting canonical tester for $\mathcal{P}$ has one-sided error too. \end{theorem} Theorem \ref{thm:canonical-tester} from \cite{CFPS19} shows that without loss of generality, we can assume that any testable graph property can be tested by a canonical tester with constant query complexity. With Theorem \ref{thm:canonical-tester}, Lemma \ref{lemma:semi-rooted-subgraph-free-yields-semi-subgraph-free}, and Definitions \ref{def:semi-H-freeness} and \ref{def:semi-H-rfreeness} at hand, we are now ready to present the main result of this section. \begin{theorem} \label{thm:main-1-sided-reduces-to-H-freeness} If a graph property $\mathcal{P}$ is testable with one-sided error in the random neighbor oracle model then $\mathcal{P}$ is semi-subgraph-free. \end{theorem} \begin{proof} First, notice that thanks to Lemma \ref{lemma:semi-rooted-subgraph-free-yields-semi-subgraph-free}, it is enough to show that if a graph property $\mathcal{P}$ is testable with one-sided error in the random neighbor oracle model then $\mathcal{P}$ is semi-\emph{rooted}-subgraph-free (cf. Definition~\ref{def:semi-H-rfreeness}). \junk{ (Our analysis follows similar arguments as those used for oblivious one-sided-error testing of semi-hereditary properties for the dense graph model, due to Alon and Shapira \cite{AS08}.) } Let us fix $n \in \NATURAL$ and $\eps$, and suppose that $\mathcal{P}_n$ is a graph property on $n$-vertex graphs that can be tested in the random neighbor oracle model with query complexity $q(\eps)$ and one-sided error. By Theorem \ref{thm:canonical-tester} from \cite{CFPS19}, we can assume that $\mathcal{P}_n$ is tested by a canonical tester $\mathfrak{T}$ that satisfies the conditions of Theorem \ref{thm:canonical-tester}. In particular, let $\mathcal{Q}_{n}$ be the family of forbidden rooted graphs for $\mathcal{P}_n$ (union of $q'$ many $(q', q')$-bounded discs) whose existence follows from Theorem \ref{thm:canonical-tester}. We will show that so defined family of rooted graphs satisfies the conditions in Definition~\ref{def:semi-H-rfreeness}, proving that $\mathcal{P}$ is semi-subgraph-free. Let us first notice that each rooted graph $\mathcal{Q}_{n}$ has at most $2 (q')^{q'}$ vertices and at most $2 (q')^{q'}$ edges, and so $\mathcal{Q}_{n}$ is a finite family of finite rooted graphs. Let us next show item {\it (i)} of Definition \ref{def:semi-H-rfreeness}, that any $n$-vertex graph $G$ satisfying $\mathcal{P}_n$ is $\mathcal{Q}_n$-rooted-free (cf. Definition~\ref{def:root-preserving-copies}). The proof is by contradiction and so suppose that there is a graph $G$ satisfying $\mathcal{P}_n$ which contains a rooted copy of $Q \in \mathcal{Q}_n$. Then, with a positive probability the canonical tester $\mathfrak{T}$ on $G$ will take that copy of $Q \in \mathcal{Q}_n$, and by the definition, it will reject $G$. This means that the tester has a nonzero probability of rejecting $G$, contradicting our assumption that the tester $\mathfrak{T}$ is one-sided. Now, we want to prove item {\it (ii)} of Definition \ref{def:semi-H-rfreeness}. Let $G$ be an $n$-vertex graph that is $\eps$-far from satisfying $\mathcal{P}_n$. Any tester for $\mathcal{P}_n$ should reject $G$ with nonzero probability. By definition of our canonical tester $\mathfrak{T}$, $G$ is rejected by $\mathfrak{T}$ only if $G$ contains a rooted subgraph $U$ such that if the tester $\mathfrak{T}$ gets $U$ from the oracle, then $U \cong_r Q$. By definition of $\mathfrak{T}$ and $\mathcal{Q}_n$ this means that $Q \in \mathcal{Q}_n$, which proves item {\it (ii)} of Definition \ref{def:semi-H-rfreeness}. We have shown that if a graph property $\mathcal{P}$ is testable with one-sided error in the random neighbor oracle model then $\mathcal{P}$ is semi-rooted-subgraph-free. By Lemma \ref{lemma:semi-rooted-subgraph-free-yields-semi-subgraph-free}, this yields that $\mathcal{P}$ is semi-subgraph-free, completing the proof. \end{proof} \begin{remark} While Theorem \ref{thm:main-1-sided-reduces-to-H-freeness} is presented for any general graphs, it is straightforward to extend it to hold also for infinite classes of graphs, for example, for planar graphs, or for the family of minor-closed graphs.\SArtur{Do we need more comments here?} \end{remark} \subsection{Uniform characterization using oblivious testers and forbidden subgraphs} \label{subsec:uniform-characterization} While Theorem \ref{thm:canonical-tester} from \cite{CFPS19} allows to simplify the analysis of testable properties, the analysis as in Theorem \ref{thm:main-1-sided-reduces-to-H-freeness} obtains non-uniform testers, in the sense of the dependency on $n$. We could make our result uniform by considering a special class of uniform testers, which we call \emph{oblivious testers}, that capture the essence of testers of testable properties in the flavor of Theorem \ref{thm:canonical-tester} (see \cite{AS08} for a similar notion in the context of testing dense graphs). We will discuss this characterization in Appendix \ref{sec:uniform-characterization}. \section{Testing $H$-freeness: high-level view} \label{sec:outline-proof} We begin our analysis with fixing an arbitrary finite, \emph{connected}, undirected, simple graph $H = (V(E),E(H))$.\footnote{While our analysis here assumes that $H$ is connected, this is clearly not required for the main result. If $H$ is disconnected then with the coloring trick (cf. Section \ref{subsubsec:coloring-H}), one could have identical analysis and consider all connected components one by one, extending the results to arbitrary, not necessarily connected $H$. We will discuss this in details in Section \ref{sec:dics-many}.} Our tester of $H$-freeness relies on a simple graph exploration. We first describe our algorithm for testing $H$-freeness of planar graphs with arbitrary degrees and provide the high level structure of its analysis. We defer most of technical details to Sections \ref{sec:exploration-testing-H-free}-- \ref{sec:final-proof} and Appendix. Our algorithm relies on a random bounded-breadth bounded-depth search, \RLBFS{} below, which uses \Traverse\,${(G,v,\dg,\ld)}$ from Section \ref{subsec:BFS-like-search-bounded-discs}. (Let us remind, cf. page~\pageref{alg:traverse}, that \Traverse\,${(G,v,\dg,\ld)}$ is similar to BFS of depth $\ld$ starting at vertex $v$, though instead of visiting all neighbors of every vertex, one visits only $\dg$ neighbors chosen i.u.r., to limit the complexity of the algorithm.) \begin{algo}\label{alg:RLBFS} \RLBFS\,${(G,\dg,\ld)}$: \begin{itemize} \item Pick a random vertex $v \in V$ i.u.r. and run \Traverse\,${(G,v,\dg,\ld)}$. \end{itemize} \junk{ \begin{itemize} \item Pick a random vertex $v \in V$; let $L_0 = \{v\}$. \item For $\ell = 1$ to $\ld$ do: \begin{itemize}[$\diamond$] \item Let $L_{\ell} = \emptyset$ and $\mathcal{E}_{\ell} = \emptyset$. \item For every $u \in L_{\ell-1}$ do: \begin{itemize}[$\circ$] \item Choose $\dg$ edges incident to $u$ in $G$ i.u.r.; call them $\mathcal{E}_u$. \item Let $\Gamma_u$ be the set of vertices in $\mathcal{E}_u$. \item Set $L_{\ell} = L_{\ell} \cup \Gamma_u$ and $\mathcal{E}_{\ell} = \mathcal{E}_{\ell} \cup \mathcal{E}_u$. \end{itemize} \item $L_{\ell} = L_{\ell} \setminus \bigcup_{i=0}^{\ell-1} L_i$. \end{itemize} \item \textbf{Return} the edges $\bigcup_{\ell=1}^{\ld} \mathcal{E}_{\ell}$. \end{itemize} } \end{algo} Our tester \RBE\, runs $f(\eps,H)$ times our search algorithm \RLBFS{} with parameters $\dg = h(\eps,H)$, $\ld = g(\eps,H)$, each time checking if the graph induced by the visited edges contains a copy of $H$, or does not. The algorithm accepts $G$ as $H$-free if and only if all calls found no copy of $H$ in~$G$. \medskip \begin{walgo} \emph{\textbf{Tester:}} \RBE\,$(G,H,\eps)$: \hfill{\small\it (with three implicit parameters, integer functions $f,g,h$)} \begin{itemize} \item Repeat $f(\eps,H)$ times: \begin{itemize}[$\diamond$] \item Run \RLBFS\,${(G,h(\eps,H),g(\eps,H))}$ and let $\mathcal{E}$ be the resulted set of edges. \item If the subgraph of $G$ induced by the edges $\mathcal{E}$ contains a copy of $H$, then \textbf{reject}. \end{itemize} \item If every subgraph explored is $H$-free, then \textbf{accept}. \end{itemize} \end{walgo} The following main theorem describes key properties of our tester. \begin{theorem} \label{thm:main-H-freeness} Let $H$ be connected. There are positive functions $f$, $g$, $h$, such that for any planar graph $G$: \begin{itemize} \item if $G$ is $H$-free, then \RBE$(G,H,\eps)$ accepts $G$, and \item if $G$ is $\eps$-far from $H$-free, then \RBE$(G,H,\eps)$ rejects $G$ with probability at least $0.99$. \end{itemize} \end{theorem} It is obvious that the first claim holds: if $G$ is $H$-free, then so is every subgraph of $G$, and therefore \RBE{} always accepts. Therefore, to prove our main result, Theorem \ref{thm:main-H-freeness}, it suffices to show that if $G$ is $\eps$-far from $H$-free, then \RBE{} rejects $G$ with probability at least $0.99$. In view of that, from now on, we assume that the input graph $G$ is $\eps$-far from $H$-free for some constant $\eps>0$. We note that it is enough to show that a \emph{single} instance of the random bounded-breadth bounded-depth search (\RLBFS) of breadth $O_{\eps,H}(1)$ and depth $O_{\eps,H}(1)$ finds a copy of $H$ with probability $\Omega_{\eps,H}(1)$. Indeed, for any functions $f$, $g$, and $h$, if \RLBFS\,${(G,\dg,\ld)}$ with $h(\eps,H) = O_{\eps,H}(1)$ and $g(\eps,H) = O_{\eps,H}(1)$ finds a copy of $H$ with probability at least $5/f(\eps,H) = \Omega_{\eps,H}(1)$, then this implies that $f(\eps,H) = O_{\eps,H}(1)$ independent calls to \RLBFS\,${(G,\dg,\ld)}$ detect at least one copy of $H$ with probability at least $1-(1-5/f(\eps,H))^{f(\eps,H)} \ge 1-e^{-5} \ge 0.99$. Therefore, in the remainder of the paper, we analyze the following algorithm \RLBD$(G,H,\dg,\ld)$. \begin{walgo} \RLBD\,${(G,H,\dg,\ld)}$: \begin{itemize} \item Run \RLBFS\,${(G,\dg,\ld)}$ and let $\mathcal{E}$ be the resulted set of edges. \item If the subgraph of $G$ induced by the edges $\mathcal{E}$ contains a copy of $H$, then \textbf{reject}. \item If not, then \textbf{accept}. \end{itemize} \end{walgo} We will show the following central technical theorem. \begin{theorem} \label{thm:main-H-freeness-single-call} Let $H$ be a connected undirected graph. There are positive functions $\dg = \dg(\eps,H) = O_{\eps,H}(1)$ and $\ld = \ld(\eps,H) = O_{\eps,H}(1)$ such that for any planar graph $G$ that is $\eps$-far from $H$-free, \RLBD$(G,H,\dg,\ld)$ finds a copy of $H$ with probability $\Omega_{\eps,H}(1)$. The query complexity of \RLBD$(G,H,\dg,\ld)$ is $O(\dg^{\ld}) = O_{\eps,H}(1)$. \end{theorem} Since by our discussion above Theorem \ref{thm:main-H-freeness-single-call} yields Theorem \ref{thm:main-H-freeness}, we will focus on proving Theorem \ref{thm:main-H-freeness-single-call}. We also notice that the query complexity of the tester follows directly from its definition, and so we will concentrate on showing that for $\dg = O_{\eps,H}(1)$ and $\ld = O_{\eps,H}(1)$, \RLBD$(G,H,\dg,\ld)$ finds a copy of $H$ with probability $\Omega_{\eps,H}(1)$. \SArtur{ \begin{remark} While in our analysis we did not try to optimize the complexity of the tester, focusing on the task of obtaining the query complexity of $O_{\eps,H}(1)$, let us mention that in fact, with the analysis as it is now, without any optimization efforts, the complexity of our tester is $2^{2^{\text{poly}(\Hsize/\eps)}}$. \end{remark} } \subsection{Outline of the proof of testing $H$-freeness} \label{subsec:outline-proof} In this subsection we outline the key ideas behind our proof of testing $H$-freeness. Since the proof is long and complex, we will give here mostly some underlying intuitions, leaving the details to Sections \ref{sec:exploration-testing-H-free}--\ref{sec:final-proof}. \SArtur{I feel there are too many repetitions, especially since the overview presented in this section is often repeated in the section when one discusses that specific claim/framework. I'm not sure (yet) if it's good or not.}By our discussion above, it suffices to focus on the case when the input graph $G$ is $\eps$-far from $H$-free. Our analysis relies on the following result (shown in Lemma \ref{lemma:ExistenceOfH}) that every simple planar graph $G$ that is $\eps$-far from $H$-free has a subgraph $\U$ satisfying the following: \begin{enumerate}[(a)] \item if \RLBD{($\U,H,\dg,\ld$)} finds a copy of $H$ in $\U$ with probability $\Omega_{\eps,H}(1)$, then \RLBD{($G,H,\dg,\ld$)} finds a copy of $H$ in $G$ with probability $\Omega_{\eps,H}(1)$, and \item \RLBD{($\U,H,\dg,\ld$)} finds a copy of $H$ in $\U$ with probability $\Omega_{\eps,H}(1)$. \end{enumerate} Our first (and easy) step towards proving this property is to show that $G$ contains a linear number of edge-disjoint copies of $H$ (see Lemma \ref{lemma:edge-disjoint-copies-H-free}). This follows by iteratively removing copies of $H$ and observing that by the definition of being $\eps$-far from $H$-free, we have to remove $\eps n$ edges to make $G$ free of copies of $H$. In the following we will use $\DCH$ to denote a set (of linear size) of edge-disjoint copies of $H$ in $G$. We continue by showing that given $\DCH$, we can compute a subset $\DCH'$ of linear size such that the graph $G[\DCH']$ (subgraph of $G$ on vertex set $V$ and with edge set being the union of the edges of the subgraphs in $\DCH'$) satisfies the first property above. The proof essentially shows that one can remove copies from $\DCH'$ until every vertex in $G[\DCH']$ has degree either $0$ or a small positive constant times its degree in $G$. Next, we would like to define a sequence of sets $\DCH = \DDCH{0} \supseteq \DDCH{1} \supseteq \dots \supseteq \DDCH{\Hsize}$ with associated hypergraphs with the following interpretation. The hyperedges will be labelled in such a way that we are able to recover the set $\DDCH{i}$ from it. We will use hyperedges to replace certain subgraphs of $H$ and their corresponding part in $G$. \paragraph{Hyperedges.} We will now describe the use of hyperedges as replacements for copies of subgraphs of $H$ in $G$. Let $G^*$ be a subgraph of $G$ that has a copy of $H$. Consider a subgraph $H_1$ of $H$ and let $u_1, \dots, u_{\ell}$ be the vertices in the copy of $H_1$ in $G^*$ that separate $G \setminus H_1$ from $H_1$, so that (cf. Figure \ref{fig:ex-gadgets-1}): \begin{compactenum}[\sl \qquad (a)] \item every vertex from $\{u_1, \dots, u_{\ell}\}$ is adjacent in $G^*$ to some vertex $H_1 \setminus \{u_1, \dots, u_{\ell}\}$, \item every vertex in $H_1 \setminus \{u_1, \dots, u_{\ell}\}$ is adjacent in $G^*$ only to vertices from $H_1$, and \item $\{u_1, \dots, u_{\ell}\}$ forms an independent set in $H_1$. \end{compactenum} Then, we can construct a gadget to represent that copy of $H_1$ by removing from $H_1$ all vertices and edges from $H_1 \setminus \{u_1, \dots, u_{\ell}\}$ and replacing them by a single \emph{hyperedge} $\{u_1, \dots, u_{\ell}\}$. \begin{figure}[t] \centerline {(a) \includegraphics[width=.3\textwidth]{example-gadgets-I-1a} (b) \includegraphics[width=.3\textwidth]{example-gadgets-I-2a} (c) \includegraphics[width=.3\textwidth]{example-gadgets-I-3a} } \caption{\small (a) Consider a part of the input graph $G$ with numbered vertices corresponding to the colored vertices in a copy of $H$ in $G$ and thick edges corresponding to the edges in that copy of $H$. (b) We have a subgraph $H_1$ of $H$ consisting of the vertices and edges marked by the grey area, with vertices $\{2,3,4,6,7\}$ separating $H_1$ from the rest of $G$. (c) The gadget obtained by removing internal vertices $\{1,5\}$ and replacing $H_1$ by a hyperedge connecting vertices $\{2,3,4,6,7\}$.} \label{fig:ex-gadgets-1} \end{figure} We will encode the structural information of the subgraph replaced by the hyperedge in a label, so that it may happen that we have parallel hyperedges with different labels. In addition to the above structural role we recall from the previous section that the idea of hyperedges was to encode that whenever (a hypergraph version of) \RLBFS\ enters the hyperedge then it will reach all its vertices. Our final goal will be to construct a hypergraph that only consists of selfloops, so that we can argue easily that our tester finds a copy of $H$ by finding a corresponding set of labelled selfloops. \paragraph{Vertex coloring.} A major difficultly in applying our approach is to find subgraphs that can be replaced. One way to simplify this question is to color both the vertices of $H$ and the vertices of $G$ with $\Hsize$ colors, such that every vertex of $H$ receives a distinct color and every copy of $H$ in $\DCH$ has the same coloring as $H$. We show in Lemma \ref{lemma:edge-disjoint-copies-H-free} that there is a coloring $\chi$ of $G$ and $H$ such that $G$ contains a set $\DCH$ containing a linear number of such edge-disjoint colored copies of $H$. An important feature of this coloring, which will be very useful in finding vertices that can be replaced by hyperedges, is that \emph{every vertex has the same role in all subgraphs from $\DCH$} it is contained in. \paragraph{Getting from $\DDCH{i}$ to $\DDCH{i+1}$.} Next we describe how we move from the set $\DDCH{i}$ to $\DDCH{i+1}$. This is the main step in our reduction and it will be partitioned in a number of substeps. We start with an overview. In each round we perform the following high level process: \begin{walgo}\vspace*{-0.3in} \begin{itemize}[$\bullet$] \item Select a vertex $v_i \in V(H)$. \item Simultaneously, contract every vertex $u \in V(\HQ_i(\DDCH{i}))$ with $\chi(u) = \chi(v_i)$ as follows: \begin{itemize}[$\diamond$] \item for every colored copy $\h$ of $H$ in $\DDCH{i+1}$ that contains vertex $u$: \begin{itemize}[$\circ$] \item add a new hyperedge consisting of vertices in $\N_i^{\h}\langle u \rangle$, where $\N_i^{\h}\langle u \rangle$ is the set of neighbors of $u$ in $\h$ (in the corresponding hypergraph) other than $u$ (that is, $u \notin \N_i^{\h}\langle u \rangle$); \end{itemize} \item remove vertex $u$ (with all incident edges from $\HQ_i(\DDCH{i})$). \end{itemize} \end{itemize} \end{walgo} We remark that our algorithm above ensures that no neighboring vertices are contracted since the coloring $\chi$ has no monochromatic edges. This follows from the fact that every edge in $G[\DCH]$ belongs to some copy of $H$ and the coloring of $H$ has no monochromatic edge. Thus, we can perform the contractions independently. In our construction we will require that the contracted vertices additionally satisfy some stronger properties. This is to maintain (approximately) some basic properties of planar graphs. \begin{itemize} \item We want to ensure that all contractions in $\HQ_i(\DDCH{i})$ corresponding to the contraction of $v_i$ are \emph{consistent}, that is, the contraction of $u$ is the same in every colored copy of $H$ that contains~$u$ (that is, for every vertex $u$ in with $\chi(u) = \chi(v_i)$, for any two colored copies $\h_1,\h_2$ of $H$ in $\DDCH{i+1}$ containing vertex $u$, we have $\N_i^{\h_1}\langle u \rangle = \N_i^{\h_2}\langle u \rangle$). \end{itemize} The required property is captured in the following definition (see also Definition \ref{def:safe-vertices}). \begin{definition}\textbf{(Safe vertices])} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\DCH \subseteq \DDCH{i}$. We call a vertex $u$ \textbf{\emph{safe}} if for all colored copies $\h \in \DCH$ of $H$ that contain $u$, the sets $\N_i^{\h}\langle u\rangle$ are the same. \end{definition} \paragraph{Finding safe vertices.} Our next challenge is to show that we can find many (a linear number) safe vertices of the same color. In order to do so, we will delete elements from the current set $\DDCH{i}$ in a controlled way until we can guarantee that many safe vertices of the same color exist. An important concept that we define here is that of a \emph{shadow graph}. A shadow graph is a union of $\Hsize$ planar graphs and it models the neighborhood relation of our hypergraph, such that two vertices are adjacent in the shadow graph if and only if they belong to the same edge in the hypergraph. The main use of shadow graphs is to show in the upcoming construction that our hypergraph still satisfies some near-planar properties that will be useful in the analysis. The concept of shadow graphs and the proof of their existence is one of the main new ideas in this paper. Using the existence of shadow graphs, we can properly implement the process of contractions via hyperedges, proceed similarly as in an earlier paper about testing of bipartiteness in planar graphs \cite{CMOS11}, where the shadow graphs guarantee that we still approximately satisfy the properties of planar graphs that were used the previous paper \cite{CMOS11}: We first prove that we can construct a subset $\DCH$ of $\DDCH{i}$ of linear size such that every copy of $H$ in $\DCH$ has a vertex of constant degree in $G[\DCH]$. Then we use this claim in the proof of Lemma \ref{lemma:many-safe} to show how to construct a subset $\DCH^*$ of $\DDCH{i}$ such that every copy of $H$ in $\DCH^*$ contains a safe vertex. \paragraph{Wrapping things up.} What remains to do is to prove that our construction satisfies the second required property of our tester: \begin{algo}\vspace*{-0.25in} \begin{itemize}[$\otimes$] \item \RLBD{($\G[\DCH],H,\dg,\ld$)} finds a copy of $H$ in $\G[\DCH]$ with probability $\Omega_{\eps,H}(1)$. \end{itemize} \end{algo} We define $\DCH$ to be the set $\DDCH{\Hsize}$ obtained in the final round of our reduction. We will then prove $\otimes$ by showing the following two properties (proven in Claims \ref{claim:final-prop1} and \ref{claim:final-prop2}), where, informally, \HRLBD\ is an extension of \RLBD\ to hypergraphs, $\HQ_{i}(\DCH)$ denotes the hypergraph corresponding to $\DDCH{i}$, $\M_i$ is the hypergraph corresponding to $H$ in round $i$, and $\P_i$ corresponds to the function assigning vertices contracted in the process to their representatives in the hypergraph $\HQ_{i}(\DCH)$ \begin{walgo}\vspace*{-0.2in} \begin{enumerate}[1.] \item the probability that \HRLBD\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \M_{\Hsize}, \Hsize^2, 1)}$ finds a copy of $\M_{\Hsize}$ is $\Omega_{\eps,H}(1)$, and \item for every $i$, $1 \le i < \Hsize$, \begin{itemize} \item if the probability that \HRLBD\,${(\HQ_{i+1}(\DCH),\P_{i+1},\M_{i+1},\dg,\ld)}$ finds a copy of $\M_{i+1}$ is $\Omega_{\eps,H}(1)$, \item then the probability that \HRLBD\,${(\HQ_i(\DCH),\P_i,\M_i,\Hsize \cdot \dg, 2 \ld)}$ finds a copy of $\M_i$ is $\Omega_{\eps,H}(1)$. \end{itemize} \end{enumerate} \end{walgo} The proof of Claim \ref{claim:final-prop1} now exploits that $\M_{\Hsize}$ only consists of selfloops, which can easily be found and the proof of Claim \ref{claim:final-prop2} formalizes our idea that if our random walk enters a hyperedge in $\HQ_{i+1}(\DCH)$ then we perform with constant probability the same operation in $\HQ_{i+1}(\DCH)$ in two steps of our randomized process. Combining the results with our previous considerations yields our main statement: $H$-freeness in planar graphs is constant query-time testable. \junk{ \Artur{Notation: \begin{compactitem} \item \texttt{$\backslash$eps} denotes $\eps$ \item \texttt{$\backslash$RBE} denotes \RBE \item \texttt{$\backslash$RLBFS} denotes \RLBFS \item \texttt{$\backslash$RLBD} denotes \RLBD \item \texttt{$\backslash$ld} denotes $\ld$ (depth of BFS) \item \texttt{$\backslash$dg} denotes $\dg$ (breadth of BFS) \end{compactitem} } } \section{Analysis of \RLBD{} when $G$ is $\eps$-far from $H$-free} \label{sec:exploration-testing-H-free} \junk{ \Artur{Notation: \begin{compactitem} \item \texttt{$\backslash$G[X]} denotes $\G[X]$, the subgraph of $G$ induced by $X$ \item \texttt{$\backslash$U} denotes $\U$ (also in $\U_1, \dots, \U_k$, with $G \supseteq \U_1 \supseteq \U_2 \supseteq \dots \supseteq \U_k$); note that $\U_i = \G[\DDCH{i}]$ \item \texttt{$\backslash$DDCH\{i\}} denotes $\DDCH{i}$ (edge-disjoint copies of $H$ in $G$, $\DDCH{1} \supseteq \DDCH{2} \supseteq \dots \supseteq \DDCH{k}$) \item \texttt{$\backslash$HQ} denotes $\HQ$ (also in $\HQ_i$, which is a hypergraph constructed from $\DDCH{i}$ by contracting vertices of $H$ in a specific, consistent way (cf. Section \ref{subsec:shrinking-copies-of-H})) \item \texttt{$\backslash$M} denotes $\M$ (also in $\M_1, \M_2, \dots, \M_{\Hsize}$, which is a sequence of hypergraphs that are ``shrunk'' copies of $H$, each $\M_i$ with $\Hsize-i+1$ vertices) \item \texttt{$\backslash$Hsize} denotes $\Hsize$ \end{compactitem} } } Because of the arguments from the previous section, the remainder of the paper deals with the main technical challenge of our result: proving Theorem \ref{thm:main-H-freeness-single-call} that in any simple planar graph $G=(V,E)$ that is $\eps$-far from $H$-free, our algorithm \RLBD{} finds with sufficient probability a copy of $H$. Our analysis relies on the following lemma showing the existence of a special subgraph $\U$ of~$G$: \begin{lemma} \label{lemma:ExistenceOfH} For every $\eps \in (0,1)$, there are $\dg = \dg(\eps,H)$ and $\ld = \ld(\eps,H)$, such that for every simple planar graph $G = (V,E)$ that is $\eps$-far from $H$-free, there is a subgraph $\U$ of $G$ with the following properties: \begin{enumerate}[(a)] \item if \RLBD{($\U,H,\dg,\ld$)} finds a copy of $H$ in $\U$ with probability $\Omega_{\eps,H}(1)$, then \RLBD{($G,H,\dg,\ld$)} finds a copy of $H$ in $G$ with probability $\Omega_{\eps,H}(1)$, and \label{part-a-lemma:ExistenceOfH} \item \RLBD{($\U,H,\dg,\ld$)} finds a copy of $H$ in $\U$ with probability $\Omega_{\eps,H}(1)$. \label{part-b-lemma:ExistenceOfH} \end{enumerate} \end{lemma} Observe that if such a subgraph $\U$ as promised in Lemma \ref{lemma:ExistenceOfH} always exists, then these properties immediately imply that \RLBD{$(G,H,\dg,\ld)$} finds a copy of $H$ in $G$ with probability $\Omega_{\eps,H}(1)$ and therefore, by the discussion above, Theorems \ref{thm:main-H-freeness} and \ref{thm:main-H-freeness-single-call} follow. In order to prove Lemma \ref{lemma:ExistenceOfH}, we will show that for any simple planar graph $G$ that is $\eps$-far from $H$-free, there exists a set $\DCH$ of edge-disjoint copies of $H$ in $G$ for which $\G[\DCH]$, the subgraph of $G$ induced by the edges of $\DCH$, satisfies the properties of graph $\U$ in Lemma \ref{lemma:ExistenceOfH}. The construction of the set $\DCH$ and the analysis of its properties form the main technical contribution of our paper. While part (\ref{part-a-lemma:ExistenceOfH}) in Lemma \ref{lemma:ExistenceOfH} is rather easy to achieve and to analyze (thanks to Lemma \ref{lemma:transformation} in Section \ref{subsubsec:condition-a-prime}), the main challenge of our construction is in ensuring part (\ref{part-b-lemma:ExistenceOfH}) in Lemma \ref{lemma:ExistenceOfH}. For that, we use a rather elaborate construction to gradually find a sequence $\DDCH{1} \supseteq \DDCH{2} \supseteq \dots \supseteq \DDCH{\Hsize}$ of sets of edge-disjoint copies of $H$ in $G$, with $|\DDCH{\Hsize}| = \Omega_{\eps,H}(|V|)$, such that the final set $\DDCH{\Hsize}$ is the set $\DCH$ that defines $\U = \G[\DDCH{\Hsize}]$ in Lemma~\ref{lemma:ExistenceOfH}. The construction of the sequence $\DDCH{1} \supseteq \DDCH{2} \supseteq \dots \supseteq \DDCH{\Hsize}$ of sets of edge-disjoint copies of $H$ in $G$, with $|\DDCH{\Hsize}| = \Omega_{\eps,H}(|V|)$, for which we could easily argue that \RLBD{($\G[\DDCH{\Hsize}],H,\dg,\ld$)} finds a copy of $H$ in $\G[\DDCH{\Hsize}]$ with probability $\Omega_{\eps,H}(1)$, is the most challenging and technical contribution of our paper. We begin with a simple construction of $\DDCH{1}$ which is a set of $\Omega_{\eps,H}(|V|)$ edge-disjoint copies of $H$ in $G$ (cf. Lemma \ref{lemma:edge-disjoint-copies-H-free}). Then our construction is iterative: we design a reduction that takes set $\DDCH{i}$ of $\Omega_{\eps,H}(n)$ edge-disjoint copies of $H$ and we construct from it another set $\DDCH{i+1} \subseteq \DDCH{i}$ with $|\DDCH{i+1}| = \Omega_{\eps,H}(|\DDCH{i}|)$ for which we simplify the structure of $\G[\DDCH{i+1}]$ with respect to that of $\G[\DDCH{i}]$. To guide our process, we associate with each $\DDCH{i}$ a certain \emph{hypergraph} $\HQ_i(\DDCH{i})$ that is constructed from $\DDCH{i}$ by contracting vertices of $H$ in a specific, consistent way (cf. Section \ref{subsec:shrinking-copies-of-H}). \emph{The purpose of $\HQ_i(\DDCH{i})$ is to model the copies of $H$ by a hypergraph on a smaller number of vertices, by contracting vertices (and incident edges) which are known to be visited by \RLBFS{} via other means.} We will construct a sequence of hypergraphs $\HQ_1(\DDCH{1}), \HQ_2(\DDCH{2}), \dots, \HQ_{\Hsize}(\DDCH{\Hsize})$ that correspond to sets $\DDCH{1}, \DDCH{2}, \dots, \DDCH{\Hsize}$, and a sequence of hypergraphs $\M_1, \M_2, \dots, \M_{\Hsize}$ that are ``shrunk'' copies of $H$, each $\M_i$ with $\Hsize-i+1$ vertices, such that, informally, for our algorithm of selecting $\DDCH{1}, \DDCH{2}, \dots, \DDCH{\Hsize}$, the following conditions holds: \begin{itemize} \item the probability of finding by \RLBFS{} a copy of $H$ in $\G[\DDCH{1}]$ is the same as the probability of finding by \RLBFS{} a copy of $\M_1$ in $\HQ_1(\DDCH{1})$, \item the probability of finding by \RLBFS{} a copy of $\M_{i+1}$ in $\HQ_{i+1}(\DDCH{i+1})$ is similar to the probability of finding by \RLBFS{} a copy of $\M_i$ in $\HQ_i(\DDCH{i})$, and \item using the fact that $\M_{\Hsize}$ has a single vertex, one can easily estimate the probability of finding by \RLBFS{} a copy of $\M_{\Hsize}$ in $\HQ_{\Hsize}(\DDCH{\Hsize})$. \end{itemize} With these three properties at hand, the main theorem will follow. One central feature of our analysis via the study of hypergraphs is to ensure that the underlying hypergraphs have some basic planar graphs-like properties. (In particular, informally, in our analysis we would like to argue that there is always a constant fraction of low-degree vertices.) While we do not have a useful characterization of planar hypergraphs, we will be able to model some planarity-like properties of the hypergraphs using some special graph reduction (via \emph{shadow graphs}), see Lemma \ref{lemma:central-small-degrees} and Appendix \ref{subsec:planarization-of-hypergraphs}. In the following sections we will develop this framework in details, finalizing it in Section \ref{sec:final-proof} that proves the desired properties above. \subsection{Auxiliary technical tools} \label{subsec:auxiliary-tools} We begin with three auxiliary tools in our analysis, the study of the problem of finding \emph{colored} copies of $H$ in $G$ (Section \ref{subsubsec:coloring-H}), a reduction simplifying condition (a) of Lemma \ref{lemma:ExistenceOfH} (Section \ref{subsubsec:condition-a-prime}), and extension of the testing and graph exploration framework to hypergraphs (Section \ref{sec:exploration-in-hypergraphs}). \subsubsection{Auxiliary tools: Finding \emph{colored copies} of $H$ in $G$} \label{subsubsec:coloring-H} To simplify the analysis, we will consider colored copies of $H$ in $G$. Let us \emph{color} all vertices of $H$ using $\Hsize$ colors, one color for each vertex (without loss of generality, the colors are $\{1, 2, \dots, \Hsize\}$). While the coloring is not needed by the algorithm, it will simplify the analysis. With this in mind, instead of showing that our algorithm \RLBD{} finds with sufficient probability a copy of $H$, we will show (cf. Lemma~\ref{lemma:edge-disjoint-copies-H-free}) that there is a coloring $\chi$ of vertices of $G$ such that \RLBD{} finds (with sufficient probability) a colored copy of $H$, that is, a copy of $H$ in $G$ with colors of the vertices in the copy consistent with the coloring $\chi$. (While this statement sounds trivial, since once we found a copy of $H$ in $G$ we can always color vertices of $G$ to be consistent with the coloring of $H$, the colors will be helpful in our analysis.) Therefore, from now on, whenever we will aim to find a copy of $H$ we will mean to find a colored copy of $H$ consistent with given coloring~$\chi$. Let us notice one immediate implication of this assumption: if $\DDCH{i}$ and $\chi$ are fixed, then one can think about every edge $e$ as a \emph{labeled edge}, since the colors of its endpoints define a unique edge in $H$ that $e$ corresponds too. We will use this property implicitly throughout the paper, without mentioning it anymore. \subsubsection{Auxiliary tools: Simplifying condition (\ref{part-a-lemma:ExistenceOfH}) of Lemma \ref{lemma:ExistenceOfH}: (via edge-disjoint copies of $H$)} \label{subsubsec:condition-a-prime} We show that one can simplify condition (\ref{part-a-lemma:ExistenceOfH}) of Lemma \ref{lemma:ExistenceOfH} for the special case when the subgraph $\U$ of $G$ is a union of a linear number of edge-disjoined colored copies of $H$ (a similar approach has been also used in \cite{CMOS11}). That is, if there is a graph $\G[\DCH]$ with a \emph{linear number of edge-disjoint colored copies of $H$}, then Lemma \ref{lemma:transformation} shows that there is always a subset $\DCH' \subseteq \DCH$ with cardinality $|\DCH'| = \Omega_{\eps,H} (|\DCH|)$ such that the graph $\G[\DCH']$ satisfies property (\ref{part-a-lemma:ExistenceOfH}). \begin{restatable}{lemma}{LPaI} \emph{\textbf{(Transformation to obtain property (\ref{part-a-lemma:ExistenceOfH}))}} \label{lemma:transformation} Let $G = (V,E)$ be a simple planar graph. Let $\DCH$ be a set of $\Omega_{\eps,H}(|V|)$ edge-disjoint colored copies of $H$ in $G$. Then there exists a subset $\DCH' \subseteq \DCH$, $|\DCH'| = \Omega_{\eps,H}(|V|)$, such that the graph $\G[\DCH']$ satisfies condition (\ref{part-a-lemma:ExistenceOfH}) of Lemma \ref{lemma:ExistenceOfH}. \end{restatable} The proof of Lemma \ref{lemma:transformation}, as a natural extension of the approach from \cite{CMOS11}, is deferred to Appendix \ref{sec:condition-a-prime}. \subsubsection{Traversing hypergraphs and testing hypergraph $\M$-freeness} \label{sec:exploration-in-hypergraphs} \junk{ \Artur{Notation: \begin{compactitem} \item \texttt{$\backslash$HRLBFS} denotes \HRLBFS \item \texttt{$\backslash$HRLBD} denotes \HRLBD \item \texttt{$\backslash$P} denotes representative function $\P: V \rightarrow V$ \end{compactitem} } } In Section \ref{sec:exploration-testing-H-free}, we described two central algorithms used for testing $H$-freeness: \RLBFS, and \RLBD. Both these algorithms were presented in a form required to test $H$-freeness in a graph. However, in our transformations we will apply the same algorithms to hypergraphs, to test whether a hypergraph $\HQ$ (in a form of $\HQ_i(\DDCH{i})$, as defined in Section \ref{subsec:shrinking-copies-of-H}) is $\M$-free, where $\M$ is a fixed hypergraph (which in our applications will be $\M_i$, as defined in Section \ref{subsec:shrinking-H}). While the modifications are rather straightforward, for the sake of completeness, we will describe below these algorithms to be run on a hypergraph. Furthermore, in our algorithms for hypergraphs we will have one additional parameter, a \emph{representative function} $\P: V \rightarrow V$, which describes the way how the edges have been contracted (cf. Definition \ref{def:canonical-representative-function} and Appendix~\ref{subsec:planarization-of-hypergraphs}). The idea behind the representative function $\P$ is that any vertex $u$ that either is in the hypergraph $\HQ$ or which does not belong to any set of copies of $H$ has $\P(u) = u$, but any other vertex $u$ from $G$ that has been contracted and now does not appear in $\HQ$, has $\P(u)$ equal to its representative in $\HQ$. In the latter case, the intuition is that the representative is a vertex in $\HQ$ that with probability $\Omega_{\eps,H}(1)$ can be reached from $u$ in $O_{\eps,H}(1)$ steps, if \RLBFS{} (run in $G$) started at~$u$. \begin{remark}\label{remark:use-of-V-in-H} Let us remark that in \HRLBD{} and \HRLBFS{} below we use the input graph $G$ implicitly, since in \HRLBFS{} we directly refer here to the set $V$, which is the vertex set of $G$, and we do so indirectly via the use of $\P$, whose domain and range are $V$. Further, in our applications we will always have that $V(\HQ) \subseteq V$. \end{remark} \begin{walgo} \HRLBFS\,${(\HQ,\P,\dg,\ld)}$: \begin{itemize} \item Pick a vertex $v \in V$ i.u.r., and let $L_0 = \{\P(v)\}$ \\ {\small (i.e., $L_0$ has a randomly selected vertex, such that any $u \in V$ is chosen with probability $\frac{|\P^{(-1)}(u)|}{|V|}$)}. \item If $v$ is a vertex of $\HQ$ then for $\ell = 1$ to $\ld$ do: \begin{itemize}[$\diamond$] \item Let $L_{\ell} = \emptyset$ and $\mathcal{E}_{\ell} = \emptyset$. \item For every $u \in L_{\ell-1}$ do: \begin{itemize}[$\circ$] \item Choose $\dg$ edges incident to $u$ in $\HQ$ i.u.r.; call them $\mathcal{E}_{\ell,u}$. \item Let $\Gamma_u$ be the set of vertices in $\mathcal{E}_{\ell,u}$. \item Set $L_{\ell} = L_{\ell} \cup \Gamma_u$ and $\mathcal{E}_{\ell} = \mathcal{E}_{\ell} \cup \mathcal{E}_{\ell,u}$. \end{itemize} \item $L_{\ell} = L_{\ell} \setminus \bigcup_{i=0}^{\ell-1} L_i$. \end{itemize} \item \textbf{Return} the edges $\bigcup_{\ell=1}^{\ld} \mathcal{E}_{\ell}$. \end{itemize} \end{walgo} \begin{walgo} \HRLBD\,${(\HQ,\P,\M,\dg,\ld)}$: \begin{itemize} \item Run \HRLBFS\,${(\HQ,\P,\dg,\ld)}$ and let $\mathcal{E}$ be the resulted set of edges. \item If the sub-hypergraph of $\HQ$ induced by the edges $\mathcal{E}$ contains a copy of $\M$, then \textbf{reject}. \item If not, then \textbf{accept}. \end{itemize} \end{walgo} \section{Finding the first set $\DDCH{1}$ of edge-disjoint colored copies of $H$} \label{subsec:constructing-H1} We now proceed with a simple construction that for a given graph $G$ that is $\eps$-far from $H$-free, finds a set $\DDCH{1}$ of $\Omega_{\eps,H}(|V|)$ edge-disjoint colored copies of $H$ in $G$. \begin{lemma} \label{lemma:edge-disjoint-copies-H-free} If $G$ is $\eps$-far from $H$-free, then one can color vertices of $G$ with $\Hsize$ colors $\chi$ such that $G$ has a set $\DCH$ of at least $\frac{\eps}{|E(H)| \cdot \Hsize^{\Hsize}} \cdot |V|$ edge-disjoint colored copies of $H$. \end{lemma} \begin{proof} We first find the copies of $H$ without considering the coloring of $V$ and $V(H)$, and then we will prove the existences of the relevant coloring~$\chi$. We find edge-disjoint copies of $H$ in $G$ one by one. Suppose that we have already found in $G$ a set of $k$ edge-disjoint copies of $H$, where $k < \frac{\eps |V|}{|E(H)|}$. Then, since $G$ is $\eps$-far from $H$-free, the graph obtained from $G$ by removal of the $k$ copies of $H$ found already (which removes $k |E(H)| < \eps |V|$ edges from $G$) cannot be $H$-free, and hence $G$ must contain a copy of $H$. This copy would be edge-disjoint with all copies found before, what by induction shows that $G$ has at least $\frac{\eps \cdot |V|}{|E(H)|}$ edge-disjoint copies of $H$. Let $H_1, \dots, H_{\ell}$ be the edge-disjoint copies of $H$ in $G$, with $\ell \ge \frac{\eps \cdot |V|}{|E(H)|}$. Let us consider a uniformly random coloring of vertices of $G$ (with $\Hsize$ colors) and let $X_i$ be the indicator random variable that $H_i$ has all vertices of the same color as in $H$; let $X = \sum_{i=1}^{\ell} X_i$. Clearly, for every $i$, $\Pr{X_i = 1} = \Ex{X_i} = \frac{1}{\Hsize^{\Hsize}}$. Therefore, $\Ex{X} = \Ex{\sum_{i=1}^{\ell} X_i} = \sum_{i=1}^{\ell} \Ex{X_i} = \frac{\ell}{\Hsize^{\Hsize}}$. This implies that there is a coloring of vertices of $G$ that has at least $\frac{\ell}{\Hsize^{\Hsize}} \ge \frac{\eps \cdot |V|}{|E(H)| \cdot \Hsize^{\Hsize}}$ edge-disjoint colored copies of $H$. Therefore, there is a coloring $\chi$ with this property, that is, after we color vertices of $G$ using $\chi$, then $G$ will have at least $\frac{\eps \cdot |V|}{|E(H)| \cdot \Hsize^{\Hsize}}$ edge-disjoint colored copies of $H$ that form the required set $\DCH$. \end{proof} Using the result from Lemma \ref{lemma:edge-disjoint-copies-H-free}, from now on, we will assume that the vertices of $G$ are colored using $\chi$ (the coloring from Lemma \ref{lemma:edge-disjoint-copies-H-free}) so that $G$ has at least $\Omega_{\eps,H}(|V|)$ edge-disjoint colored copies of~$H$. \section{Constructing $\DDCH{i+1}$ from $\DDCH{i}$} \label{subsec:Ui->Ui+1} \junk{\Artur{Some random text that could be used here: As we said above, in our construction we will gradually shrink in $G$ all copies of $H$ into smaller sub-hypergraphs $\HQ_1(\DDCH{1}), \HQ_2(\DDCH{2}), \dots$. Each shrinking will follow the same rule in all copies of $H$, and will choose vertex $v_i$ (to be contracted, as defined in Section \ref{subsec:shrinking-H}) on the basis of the current structure of $\DDCH{i}$. Our key property (cf. Lemma \ref{lemma:small-vertices-new}) is that \emph{for every $i$, hypergraph $\HQ_i(\DDCH{i})$ is consistent for $\DDCH{i}$}. We will prove this claim by showing that assuming that $\HQ_i(\DDCH{i})$ is consistent for $\DDCH{i}$, there is always a subset $\DCH \subseteq \DDCH{i}$ of linear size (with $|\DCH| = \Omega_{\eps,H}(|\DDCH{i}|)$) for which there is a color $\cc$ such that every vertex of color $\cc$ in $V(\HQ_i(\DDCH{i}))$ is safe with respect to $\DDCH{i}$ and $\HQ_i(\DDCH{i})$. Using this claim, we will be able to perform an appropriate construction of the hypergraph $\HQ_{i+1}(\DDCH{i+1})$ by first setting $\DDCH{i+1} := \DCH$ and then taking $v_i$ with $\chi(v_i) = \cc$, and contracting (as $v_i$ in $\M_i$) all vertices of color $\cc$ in all copies of $H$ in $\DDCH{i+1}$. \\ As we described in Section \ref{subsec:shrinking-copies-of-H}, the central idea behind our analysis is to study the relation between random exploration algorithms in hypergraphs $\HQ_i(\DDCH{i})$ vs $\HQ_i(\DDCH{i+1})$. In this context, one key task in our analysis is the choice of the order of vertices in $H$, $v_1, \dots, v_{\Hsize}$, and another is the selection of $\DDCH{i+1}$ as a subset of $\DDCH{i}$. Given $\DDCH{i}$ and assuming that $\HQ_i(\DDCH{i})$ is a hypergraph consistent for $\DDCH{i}$, we will be able to determine $v_i$ and to find a large set $\DDCH{i+1} \subseteq \DDCH{i}$, such that the hypergraph $\HQ_i(\DDCH{i+1})$ will be consistent for $\DDCH{i+1}$ (see Lemma \ref{lemma:small-vertices-new}). The proof of this claim relies on some planarity properties of the original graph $G$, and hence, indirectly, of the hypergraphs considered. However, since the notion of planar hypergraphs is not very suitable in our context, we will rely on some planar graph representation of them. \\ In what follows, we will consider a set $\DDCH{i}$ of edge-disjoint colored copies of $H$ in $G$ and the corresponding hypergraph $\HQ_i(\DDCH{i})$. We will show in Lemma \ref{lemma:small-vertices-new} that if $\HQ_i(\DDCH{i})$ is consistent for $\G[\DDCH{i}]$, then a constant fraction of non-isolated vertices in $\HQ_i(\DDCH{i})$ will have a small number of distinct neighbors. Our proof uses some basic transformation of $\HQ_i(\DDCH{i})$ (as it has been constructed by the algorithm above) into planar graphs. }} The construction of $\DDCH{1}$ from Section \ref{subsec:constructing-H1} is rather simple, but it is significantly more complex to define $\DDCH{2}$, and then $\DDCH{3}, \dots, \DDCH{\Hsize}$. In what follows, we will first present key intuitions in Section \ref{subsubsec:gadgets}, then describe our framework in Sections \ref{subsec:shrinking-H} and \ref{subsec:shrinking-copies-of-H}, and present details of the construction of $\DDCH{i+1}$ in Section \ref{subsec:main-reduction}. While our main focus is on the sets $\DDCH{i}$ of edge-disjoint colored copies of $H$ in $G$, in our analysis we will analyze these sets and the relevant graphs $\G[\DDCH{i}]$ via their suitable \emph{hypergraph representation}. Indeed, to prove that \RLBFS\ finds a copy of $H$, we will consider a hypergraph induced by ``shrunk'' copies of $H$ defining $\DDCH{i}$. The idea of this construction is two-folded \begin{itemize} \item on one hand, using the hypergraph representation it will be easier to argue a lower bound for the probability that a copy of $H$ is found, and \item on the other hand, the hypergraph representation will allow us to combine distinct colored copies of $H$ (or the subgraph of $H$) that are undistinguishable to \RLBFS. \end{itemize} \subsection{Overview: Gadgets, hypergraph representation and their use} \label{subsubsec:gadgets} Our analysis relies on special structures (gadgets) in the input graph and then representing these gadgets in a succinct way using \emph{hypergraphs}. Let $G^*$ be a subgraph of $G$ that has a copy of $H$. Consider a subgraph $H_1$ of $H$ and let $u_1, \dots, u_{\ell}$ be the vertices in the copy of $H_1$ in $G^*$ that separate $G \setminus H_1$ from $H_1$, so that (cf. Figure \ref{fig:ex-gadgets-1}): \begin{compactenum}[\sl \qquad (a)] \item every vertex from $\{u_1, \dots, u_{\ell}\}$ is adjacent in $G^*$ to some vertex $H_1 \setminus \{u_1, \dots, u_{\ell}\}$, \item every vertex in $H_1 \setminus \{u_1, \dots, u_{\ell}\}$ is adjacent in $G^*$ only to vertices from $H_1$, and \item $\{u_1, \dots, u_{\ell}\}$ forms an independent set in $H_1$. \end{compactenum} Then, we can construct a gadget to represent that copy of $H_1$ by removing from $H_1$ all vertices and edges from $H_1 \setminus \{u_1, \dots, u_{\ell}\}$ and replacing them by a single \emph{hyperedge} $\{u_1, \dots, u_{\ell}\}$. \junk{ \begin{figure}[t] \centerline {(a) \includegraphics[width=.3\textwidth]{example-gadgets-I-1a} (b) \includegraphics[width=.3\textwidth]{example-gadgets-I-2a} (c) \includegraphics[width=.3\textwidth]{example-gadgets-I-3a} } \caption{\small (a) Consider a part of the input graph $G$ with numbered vertices corresponding to the colored vertices in a copy of $H$ in $G$ and thick edges corresponding to the edges in that copy of $H$. (b) We have a subgraph $H_1$ of $H$ consisting of the vertices and edges marked by the grey area, with vertices $\{2,3,4,6,7\}$ separating $H_1$ from the rest of $G$. (c) The gadget obtained by removing internal vertices $\{1,5\}$ and replacing $H_1$ by a hyperedge connecting vertices $\{2,3,4,6,7\}$.} \label{fig:ex-gadgets-1} \end{figure} } We will be using this construction of gadgets to model the following scenario: \begin{itemize} \item \emph{when entering (in \RLBFS) $H_1$ via any single edge incident to any vertex from the separator $u_1, \dots, u_{\ell}$ is sufficient to visit (with constant probability) all edges in $H_1$.} \end{itemize} Therefore, for the analysis, this will correspond to the situation that \begin{itemize} \item there is a hyperedge $\{u_1, \dots, u_{\ell}\}$, and by visiting this hyperedge (in the hypergraph), the algorithm will visit (with constant probability) all edges in $H_1$ (in the original graph), and will be able to continue the search from \emph{all} separating vertices $u_1, \dots, u_{\ell}$. \end{itemize} Furthermore, the gadgets can be also helpful in the analysis of ``substitutable'' copies of a subgraph of $H$. Suppose that for a subgraph $H_1$ of $H$, the separator (as defined above) is identical in multiple copies, that is, vertices $u_1, \dots, u_{\ell}$ form the separator in multiple edge-disjoint copies of $H_1$. Then, we have multiple hyperedges $\{u_1, \dots, u_{\ell}\}$ and their multiplicity represents the fact that \emph{to find a copy of $H_1$ it is enough to visit just one of the hyperedges $\{u_1, \dots, u_{\ell}\}$}. In particular, if $u_1$ is incident to multiple copies of the identical hyperedge $\{u_1, \dots, u_{\ell}\}$, then the probability that the process will visit $H_1$ starting from $u_1$ increases with this multiplicity. And so, if the multiplicity is of order $\deg_G(u_1)$, then after reaching vertex $u_1$, the \HRLBFS\ algorithm (cf. Section \ref{sec:exploration-in-hypergraphs}) will visit the entire $H_1$ with a constant probability. The central idea behind the gadgets as described above is to use them repeatedly to transform a subgraph of $G$ into a sub-hypergraph representing a smaller subgraph of $G$ for which we can easily analyze the \HRLBFS\ algorithm. \subsection{The process of shrinking $H$ and hypergraph representation of $H$ by $\M_i$} \label{subsec:shrinking-H} \junk{\Artur{Notation: \begin{compactitem} \item \texttt{$\backslash$e} denotes $\e$, an edge/hyperedge \item \texttt{$\backslash$N\_i} denotes $\N_i$, the set of all neighbors of $v_i$ in $\M_i$ \item \texttt{$\backslash$mathcal\{E\}\_i} denotes $\mathcal{E}_i$, the set of edges/hyperedges incident to vertex $v_i$ in $\M_i$ \item \texttt{$\backslash$lab} denotes $\lab$, label of an edge/hyperedge, $\lab(\e)$ \item \texttt{$\backslash$clab} denotes $\clab$, colored label of an edge/hyperedge, $\clab(\e)$ (note that $\clab(\e) = \{\chi(u): u \in \lab(\e)\}$) \end{compactitem} }} We will begin with an iterative procedure that gradually shrinks $H$ into a single vertex. This procedure processes $H$ and its contractions in a form of a \emph{hypergraph}. (See also Figures \ref{fig:ex-hypergraph-1}--\ref{fig:ex-hypergraph-3}.) \begin{figure}[t] \centerline {(a) \includegraphics[width=.3\textwidth]{ex-hypergraph-I-0} (b) \includegraphics[width=.3\textwidth]{ex-hypergraph-I-1} (c) \includegraphics[width=.3\textwidth]{ex-hypergraph-I-2} } \caption{\small Consider the input graph $G$ in Figure (a) and consider the process of shrinking $G$, as described in Section \ref{subsec:shrinking-H}. (b) presents contraction of vertex 1 and adding of hyperedge $\{5,7,8,9\}$ (with label $\{1\}$). (c) After contracting vertex 2 and adding hyperedge $\{3,4\}$ (with label $\{2\}$). } \label{fig:ex-hypergraph-1} \end{figure} Let us consider an arbitrary numbering of the vertices of $H$, $v_1, v_2, \dots, v_{\Hsize}$; this order is not known in advance and is independent of the coloring of $H$ (in fact, the order will be determined by the structure of $G$, and finding the right order $v_1, v_2, \dots, v_{\Hsize}$ is the central part of our analysis in the next sections, finalized in Lemma \ref{lemma:defining-Qi+1}). In our analysis, we will perform a sequence of transformations on $H$, each transformation converting some hypergraph $\M_i$ corresponding to $H$ into some other hypergraph $\M_{i+1}$ corresponding to $H$, $1 \le i \le \Hsize-1$ (cf. Figures \ref{fig:ex-hypergraph-1}--\ref{fig:ex-hypergraph-3}), such that: \begin{walgo}\vspace*{-0.3in} \begin{itemize} \item $\M_1 := H$, and \item $\M_{i+1}$ is obtained from $\M_i$ by contracting vertex $v_i$ to its neighbors as follows: \begin{itemize}[$\diamond$] \item let $\N_i$ be the set of all neighbors of $v_i$ in $\M_i$; contract $v_i$ to its neighbors by removing $v_i$ from $\M_i$ and then adding a new hyperedge consisting of vertices in $\N_i$. \end{itemize} \end{itemize} \end{walgo} \begin{figure}[t] \centerline { (d) \includegraphics[width=.3\textwidth]{ex-hypergraph-I-3} (e) \includegraphics[width=.3\textwidth]{ex-hypergraph-I-4} (f) \includegraphics[width=.3\textwidth]{ex-hypergraph-I-5} } \caption{\small Continuing the example from Figure \ref{fig:ex-hypergraph-1}: (d) After contracting vertex 3 and adding hyperedge $\{4,8,10\}$ (with label $\{2,3\}$). (e) After contracting vertex 4 and adding hyperedge $\{8,10\}$ (with label $\{2,3,4\}$). (f) After contracting vertex 5 and adding hyperedge $\{6,7,8,9\}$ (with label $\{1,5\}$). } \label{fig:ex-hypergraph-2} \end{figure} \begin{figure}[t] \centerline {(g) \includegraphics[width=.21\textwidth]{ex-hypergraph-I-6} (h) \includegraphics[width=.21\textwidth]{ex-hypergraph-I-7} (i) \includegraphics[width=.21\textwidth]{ex-hypergraph-I-8} (j) \includegraphics[width=.21\textwidth]{ex-hypergraph-I-9} } \caption{\small Continuing the example from Figures \ref{fig:ex-hypergraph-1} and \ref{fig:ex-hypergraph-2}: (g) After contracting vertex 6 and adding hyperedge $\{7,8,9\}$ (with label $\{1,5,6\}$). (h) After contracting vertex 7 and adding hyperedge $\{8,9\}$ (with label $\{1,5,6,7\}$; note that as the result, we have two parallel edges between 8 and 9, but each of these edges is different, one corresponds to a direct edge between 8 and 9 with label $\emptyset$, and another corresponds to the gadget with separator $\{8,9\}$ and internal vertices $\{1,5,6,7\}$ (as shown by the label)). (i) After contracting vertex 8 and adding hyperedge $\{9,10\}$ (with label $\{1,2,3,4,5,6,7,8\}$). (j) After contracting vertex 9 and hyperedge $\{10\}$ (with label $\{1,2,3,4,5,6,7,8,9\}$). } \label{fig:ex-hypergraph-3} \end{figure} We will want to maintain information about all vertices which have been contracted to create a given hyperedge (e.g., in Figure~\ref{fig:ex-gadgets-1}, these would be vertices $\{1,5\}$) and so we will \emph{label} the hyperedges. We will denote the label of an edge $\e$ by $\lab(\e)$. A regular edge $e$ (original edge from $E(H)$) has an empty label, i.e., $\lab(e) = \emptyset$, and if $\mathcal{E}_i$ denotes the set of edges/hyperedges incident to vertex $v_i$ in $\M_i$, then the new hyperedge $\N_i$ obtained by contraction of $v_i$ will have label $\lab(\N_i) = \{v_i\} \cup \bigcup_{\e \in \mathcal{E}_i} \lab(\e)$ (i.e., its label is the union of $\{v_i\}$ and the union of the labels of the edges in $\mathcal{E}_i$). Furthermore, we will also have \emph{colored label} $\clab$ of any edge $\e$, defined as the set of the colors of the vertices defining the label of $\e$, that is, $\clab(\e) = \{\chi(u): u \in \lab(\e)\}$. (Note that if $\lab(\e) = \emptyset$ then $\clab(\e) = \emptyset$.) We will also use the following notion. \begin{definition} \label{def:modeling-hyperedge-in-Mi+1} If in our construction, in $\M_i$, we had edges $\e_1, \dots, \e_{\ell}$ incident to $v_i$, then we will say that the newly created \emph{hyperedge $\N_i$ in $\M_{i+1}$ is modeled by edges $\e_1, \dots, \e_{\ell}$ in $\M_i$}. \end{definition} \medskip In Appendix \ref{proofs-subsec:shrinking-H} we will present some basic properties of the process of shrinking $H$ and hypergraph representation of $H$ by $\M_i$, as defined in this section \begin{figure}[t] \centerline {(a) \includegraphics[width=.22\textwidth]{ex-hypergraph-II-1} (b) \includegraphics[width=.22\textwidth]{ex-hypergraph-II-2} (c) \includegraphics[width=.22\textwidth]{ex-hypergraph-II-3} (d) \includegraphics[width=.22\textwidth]{ex-hypergraph-II-4} } \caption{\small Construction of hypergraphs (a) $\M_1$, (b) $\M_2$, (c) $\M_3$, (d) $\M_4$, with multiple hyperedges~$\{4,5\}$.} \label{fig:ex-hypergraph-parallel} \end{figure} Let us note that the construction above allows ``\emph{selfloops},'' that is, hyperedges consisting of a single vertex, and that it allows multiple copies of hyperedges on the same vertex set (see, e.g., Figure \ref{fig:ex-hypergraph-3} (h) or Figure \ref{fig:ex-hypergraph-parallel}, and one could have many copies of hyperedges even with more than two vertices). An important feature of the latter case is that all these hyperedges will be considered as different hyperedges, since they correspond to different subgraphs of $H$ and have different labels. Note also that all labels are disjoint (i.e., $\lab(\e_1) \cap \lab(\e_2) = \emptyset$ for any distinct hyperedges $\e_1, \e_2$ in $\M_i$). \subsection{Shrinking copies of $H$ in $G$ (via safe vertices and consistent hypergraphs)} \label{subsec:shrinking-copies-of-H} \junk{ \Artur{\textbf{This section requires revision.} It's possibly the most important section in the paper that the readers must understand in details, and it seems to me that the text and presentation require some more efforts.} } \junk{ \Artur{Notation: \begin{compactitem} \item \texttt{$\backslash$HQ} denotes $\HQ$ (also in $\HQ_i(\DDCH{i})$, which is a hypergraph constructed from $\DDCH{i}$ by contracting vertices of $H$) \item \texttt{$\backslash$N} denotes $\N$ (like in $\N_i^{\h}\langle u \rangle$, which is the set of neighbors of $u$ in $\h$ in the hypergraph $\HQ_i(\DDCH{i})$) \end{compactitem} } } The central idea of our analysis is to mimic the corresponding transformation of $H$ (as described in Section \ref{subsec:shrinking-H}) in all relevant copies of $H$ in sets $\DDCH{1}, \DDCH{2}, \dots$, and then, instead of searching for a copy of $H$ in $\G[\DDCH{1}], \G[\DDCH{2}], \dots$, to search for copies of $\M_1, \M_2, \dots$ in the corresponding shrunk hypergraphs $\HQ_1(\DDCH{1}), \HQ_2(\DDCH{2}), \dots$. Then, we will argue that finding a copy of $H$ in $G$ is (almost) as easy as finding a copy of $\M_1$ in $\HQ_1(\DDCH{1})$, which in turn can be reduced (by paying a small price) to finding a copy of $\M_2$ in $\HQ_2(\DDCH{2})$, and so on, reducing everything to finding a copy of $\M_{\Hsize}$ in $\HQ_{\Hsize}(\DDCH{\Hsize})$. And then, since $\M_{\Hsize}$ has only a single vertex, we would hope that finding its copy in $\HQ_{\Hsize}(\DDCH{\Hsize})$ is easy. In order to incorporate this approach, we will transform appropriate subgraphs of $G$ into a sequence of hypergraphs, such that after $i$ transformations, every relevant copy of $H$ is shrunk into $\M_{i+1}$. (Let us emphasize that this step relies on the choice of vertex $v_i$ --- which is the same in all copies of $H$ --- to be determined by the structure of $\DDCH{i}$, as described in Lemma \ref{lemma:defining-Qi+1}.) In particular, we will mimic the corresponding transformation on $\DDCH{1}, \DDCH{2}, \dots$ as follows. We consider a hypergraph, denoted by $\HQ_i(\DDCH{i})$, corresponding to $\DDCH{i}$, which has \begin{itemize} \item vertex set $V(\HQ_i(\DDCH{i})) = V \setminus \{ u \in V: \chi(u) \in \{\chi(v_j): j < i\}\}$ (vertices\footnote{Let us first remind that we are assuming that the vertices of $G$ are colored using $\chi$ so that $G$ has at least $\Omega_{\eps,H}(|V|)$ edge-disjoint colored copies of $H$, as promised by Lemma \ref{lemma:edge-disjoint-copies-H-free}.} in $G$ that have colors of vertices $\{v_i, \dots, v_{\Hsize}\}$, that is, that have not been contracted in $\M_i$ yet), and \item edge set formed by an edge-disjoint collection of copies of $\M_i$ (we allow hyperedges to have some multiplicity). \end{itemize} Then, for some carefully chosen set $\DDCH{i+1} \subseteq \DDCH{i}$, a new hypergraph $\HQ_{i+1}(\DDCH{i+1})$ is obtained from $\HQ_i(\DDCH{i})$ by \begin{itemize} \item removing all hyperedge corresponding to the edge-disjoint copies of $H$ in $\DDCH{i} \setminus \DDCH{i+1}$ and \item then taking the set $\DDCH{i+1}$ of copies of $H$ and shrinking them, in the same way as $\M_i$ is transformed into $\M_{i+1}$ \begin{walgo}\vspace*{-0.3in} \begin{itemize}[$\bullet$] \item Select a vertex $v_i \in V(H)$. \item Simultaneously, contract every vertex $u \in V(\HQ_i(\DDCH{i}))$ with $\chi(u) = \chi(v_i)$ as follows: \begin{itemize}[$\diamond$] \item for every colored copy $\h$ of $H$ in $\DDCH{i+1}$ that contains vertex $u$: \begin{itemize}[$\circ$] \item add a new hyperedge consisting of vertices in $\N_i^{\h}\langle u \rangle$, where $\N_i^{\h}\langle u \rangle$ is the set of neighbors of $u$ in $\h$ (in the hypergraph $\HQ_i(\DDCH{i})$) other than $u$ (that is, $u \notin \N_i^{\h}\langle u \rangle$); \end{itemize} \item remove vertex $u$ (with all incident edges from $\HQ_i(\DDCH{i})$). \end{itemize} \end{itemize} \end{walgo} \end{itemize} Notice that in our construction of $\HQ_{i+1}(\DDCH{i+1})$ we are removing all vertices $u \in V$ with color $\chi(u) = \chi(v_i)$. And so, in particular, $V(\HQ_{i+1}(\DDCH{i+1})) = V \setminus \{ u \in V: \chi(u) \in \{\chi(v_j): j \le i\}\}$. \begin{figure}[t] \centerline {(a) \includegraphics[width=.3\textwidth]{ex-hyp-contract-1} (b) \includegraphics[width=.3\textwidth]{ex-hyp-contract-2} (c) \includegraphics[width=.3\textwidth]{ex-hyp-contract-3} } \caption{\small Operation of contracting vertex of color 13 (numbers depicted correspond here to the colors) to define new hypergraph $\HQ_{14}(\DDCH{14})$. (a) Describes the edges of a \emph{single copy} of $\M_{13}$ incident to vertex of color 13 (in the center) in $\HQ_{13}(\DDCH{13})$. (b) Describes the edges of \emph{two copies} of $\M_{13}$ incident to vertex of color 13 in $\HQ_{13}(\DDCH{13})$. (Notice that in this case, vertex of color 13 is not safe.) (c) Describes the situation of contracting vertex of color 13, which creates two new hyperedges, and removal of vertex of color 13 and all incident edges. This defines $\HQ_{14}(\DDCH{14})$. } \label{fig:contraction} \end{figure} Furthermore, since we contract only vertices of color $\chi(v_i)$ and since these vertices are independent in $\G[\DDCH{i+1}]$ (indeed, since $\DDCH{i+1}$ is the set of edge-disjoint colored copies of $H$, $\G[\DDCH{i+1}]$ does not have monochromatic edges), the operation above is well defined and the contractions of all vertices of color $\chi(v_i)$ can be performed independently in all copies of $H$ in $\DDCH{i+1}$. This yields an equivalent definition: \begin{remark} \label{remark:independent-shrinking} The following is an equivalent definition of $\HQ_{i+1}(\DDCH{i+1})$: \begin{itemize} \item Start with graph $\G[\DDCH{i+1}]$. \item For every copy $\h$ of $H$ in $\DDCH{i+1}$, perform the shrinking of $H$ into hypergraph $\M_{i+1}$. \item Combine all copies of $\M_{i+1}$ obtained in that way. \item Remove all vertices $u$ with $\chi(u) = \chi(v_j)$ for $j \le i$ that do not belong to any copy of $\DDCH{i+1}$. \end{itemize} The fact that this description is correct follows from the fact that the shrinking of different copies of $H$ can be performed independently because of vertex coloring, which ensures that if we contract a vertex $u$ with $\chi(u) = \chi(v_j)$ and create a new edge $\N_j^{\h}\langle u \rangle$, then this construction can be performed independently for different copies of $H$. Notice that (as formally proven in Claim~\ref{claim:final-hypergraph-invariant} in Appendix \ref{subsec:properties-of-consistent-hypergraphs}) because of the construction above, to define $\HQ_{i+1}(\DDCH{i+1})$, we do not need to consider the constructions of $\HQ_{1}(\DDCH{1}), \HQ_{2}(\DDCH{2}), \dots, \HQ_{i}(\DDCH{i})$ one after another, but we could do it with the constructions of $\HQ_{1}(\DDCH{i+1}), \HQ_{2}(\DDCH{i+1}), \dots, \HQ_{i}(\DDCH{i+1})$, and from $\HQ_{i}(\DDCH{i+1})$ to build $\HQ_{i+1}(\DDCH{i+1})$. (Note that the vertex set of $\HQ_{i+1}(\DDCH{i+1})$ is $V(\HQ_{i+1}(\DDCH{i+1})) = V \setminus \{ u \in V: \chi(u) \in \{\chi(v_j): j \le i\}\}$. Further, observe that $\HQ_{i+1}(\DDCH{i+1})$ may have (isolated) vertices $u$ that do not belong to any copy of $\DDCH{i+1}$.) \end{remark} The construction above maintains a relationship between edges in $\HQ_{i}(\DDCH{i})$ and edges in $\M_i$. \begin{definition} \textbf{(Corresponding edges)} \label{def:corresponding-edges} If $\e$ is an edge in $\HQ_{i}(\DDCH{i})$ then the \emph{corresponding edge to $\e$ in $\M_i$} is edge $\e'$ in $\M_i$ such that the colors of vertices in $\e$ are the same as the colors of vertices in $\e'$ (i.e., $\{\chi(x): x \in \e\} = \{\chi(v_j): v_j \in \e'\}$), and the colored labels of $\e$ and $\e'$ are the same too (i.e., $\clab(\e) = \clab(\e^*)$). \end{definition} Notice that every edge in $\HQ_{i}(\DDCH{i})$ has a unique corresponding edge in $\M_i$. Furthermore, for any edge $\e'$ in $\M_i$, the number of edges in $\HQ_{i}(\DDCH{i})$ corresponding to edge $\e'$ in $\M_i$ is exactly $|\DDCH{i}|$. Next, we can also mimic Definition \ref{def:modeling-hyperedge-in-Mi+1} in the context of our construction here as follows: \begin{definition} \textbf{(Modeling edges in $\HQ_{i+1}(\DDCH{i+1})$ by edges in $\HQ_i(\DDCH{i})$)} \label{def:modeling-hyperedge-in-Hi+1} Let $u$ be a vertex in $\HQ_i(\DDCH{i})$ with $\chi(u) = \chi(v_i)$. Let $\h$ be a colored copy of $H$ in $\DDCH{i+1}$ that contains vertex $u$. Let $\e_1, \dots, e_{\ell}$ be the edges incident to $u$ $\HQ_i(\DDCH{i})$ corresponding to the copy $\h$. Then, we will say that the newly created hyperedge $\N_i^{\h}\langle u \rangle$ in $\HQ_{i+1}(\DDCH{i+1})$ is \emph{modeled by edges $\e_1, \dots, \e_{\ell}$} in $\HQ_i(\DDCH{i})$. \end{definition} \medskip Now, we are ready to formalize the process of finding a colored copy of $\M_i$ in a hypergraph. \begin{definition} \textbf{(Finding a colored copy of $\M_i$)} \label{def:finding-colored-copies-of-Mi} Let $v_i, \dots, v_{\Hsize}$ be the vertices in $\M_i$. We say that \HRLBD\,${(\HQ,\P,\M_i,\dg,\ld)}$ finds a colored copy of $\M_i$ in $\HQ$ if the corresponding algorithm \HRLBFS\,${(\HQ,\P,\dg,\ld)}$ returns a set of edges $\mathcal{E}$, such that \begin{itemize} \item the sub-hypergraph of $\HQ$ induced by the edges $\mathcal{E}$ contains vertices $x_i, \dots, x_{\Hsize}$ such that for every edge/hyperedge $\e$ in $\M_i$, $\mathcal{E}$ contains an edge corresponding to $\e$, or equivalently, \begin{compactitem}[$\diamond$] \item $\chi(x_j) = \chi(v_j)$ for every $j$, $i \le j \le \Hsize$, and \item for every edge $\{v_{j_1}, \dots, v_{j_r}\}$ in $\M_i$, $\mathcal{E}$ contains edge $\{x_{j_1}, \dots, x_{j_r}\}$. \end{compactitem} \end{itemize} \end{definition} \subsubsection{Adjusting for planar graphs: safe vertices and consistent hypergraphs} \label{subsubsec:safe-vertices-and-consistent-hypergraphs} In our construction we will require more properties from the contractions defining $\HQ_{i+1}(\DDCH{i+1})$. To maintain \emph{some basic properties of planar graphs} (which are required by our analysis), we will want to model the operation of contraction of a vertex $u$ as the standard vertex contraction of $u$ to one of its neighbors, cf. Appendix \ref{subsec:planarization-of-hypergraphs}. For that, we will need an additional, \emph{stronger property}: \begin{itemize} \item we want to ensure that all contractions in $\HQ_i(\DDCH{i})$ corresponding to the contraction of $v_i$ in $\M_i$ are \emph{consistent}, that is, the contraction of $u$ is the same in every colored copy of $H$ that contains~$u$ (that is, for every vertex $u$ in with $\chi(u) = \chi(v_i)$, for any two colored copies $\h_1,\h_2$ of $H$ in $\DDCH{i+1}$ containing vertex $u$, we have $\N_i^{\h_1}\langle u \rangle = \N_i^{\h_2}\langle u \rangle$). \end{itemize} \begin{figure}[t] \centerline {(a) \includegraphics[width=.35\textwidth]{ex-hyp-contract-4} \qquad (b) \includegraphics[width=.35\textwidth]{ex-hyp-contract-5} } \caption{\small Operation of contracting safe vertex of color 13 (numbers depicted in the vertices correspond to the colors, and number depicted next to the edges correspond to the colored labels of the edges) to define new hypergraph $\HQ_{14}(\DDCH{14})$. (a) Describes the edges of a single copy of $\M_{13}$ incident to vertex of color 13 (in the center) in $\HQ_{13}(\DDCH{13})$. Since we want vertex of color 13 to be safe, it is possible there are many more copies of $\M_{13}$ incident to that vertex, in which case all of them use identical edges as in the depicted single copy (here identical means: on the same vertex set, with the same colored labels, but with distinct labels). (b) Describes the situation after contracting vertex of color 13 in $\HQ_{14}(\DDCH{14})$. Notice that the new edge in $\HQ_{14}(\DDCH{14})$ has colored label $\{1,2,3,5,6,8,9,11,13\}$ and is modeled by five edges in $\HQ_{13}(\DDCH{13})$. } \label{fig:contraction-safe} \end{figure} To facilitate this property, we will use the following definitions \begin{definition}\textbf{(Safe vertices)} \label{def:safe-vertices} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\DCH \subseteq \DDCH{i}$. We call a vertex $u \in V(\HQ_i(\DDCH{i}))$ \textbf{\emph{safe}} (with respect to $\DCH$ and $\HQ_i(\DDCH{i})$) if for all colored copies $\h \in \DCH$ of $H$ that contain $u$, the sets $\N_i^{\h}\langle u\rangle$ are the same. \end{definition} \begin{remark} \label{remark-properties-of-safe-vertices} Note that Definition \ref{def:safe-vertices} means that for every safe vertex $u$ with respect to $\DCH$ and $\HQ_i(\DDCH{i})$, not only all edges incident to $u$ correspond to the edges from $\M_i$ incident to vertex $v$ in $\M_i$ with $\chi(u) = \chi(v)$, but also, if $u$ is incident to $r$ edges in $\HQ_i(\DDCH{i})$ and $v$ is incident to edges $\e_1, \dots, \e_{\ell}$ in $\M_i$, then \begin{compactenum}[\it (i)] \item we can partition the edges incident to $u$ into $\ell$ groups, each group corresponding to one of the edges $\e_1, \dots, \e_{\ell}$ in $\M_i$, each group of the same size $r / \ell$, such that two edges $\e', \e''$ from the same group have the same colored label (i.e., $\clab(\e') = \clab(\e'')$) and are defined by the same vertices (i.e., for every vertex $x$, $x \in \e'$ iff $x \in \e''$); \item $|\N_i^{\h}\langle u \rangle| = |\bigcup_{j=1}^{\ell} \e_j \setminus \{v\}|$, that is, $u$ has as many neighbors in $\HQ_i(\DDCH{i})$ as $v$ has in $\M_i$; \item $\{\chi(x): x \in \N_i^{\h}\langle u \rangle\} = \{\chi(x): x \in \bigcup_{j=1}^{\ell} \e_j \setminus \{v\} \}$. \end{compactenum} \end{remark} Our next iterative definition extends the notion of safe vertices to the entire hypergraph. \begin{definition}\textbf{(Consistent hypergraphs)} \label{def:consistent-hypergraphs} For any set $\DDCH{1}$ of edge-disjoint colored copies of $H$ in $G$, the hypergraph $\HQ_1(\DDCH{1})$ (which is equal to the graph $\G[\DDCH{1}]$) is called \textbf{\emph{consistent}} (for $\DDCH{1}$). Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\DDCH{i+1} \subseteq \DDCH{i}$. If hypergraph $\HQ_i(\DDCH{i})$ is consistent for $\DDCH{i}$, then hypergraph $\HQ_{i+1}(\DDCH{i+1})$ obtained from $\HQ_i(\DDCH{i})$ is called \textbf{\emph{consistent}} (for $\DDCH{i+1}$) if every vertex $u \in V(\HQ_i(\DDCH{i}))$ with $\chi(u) = \chi(v_i)$ is safe with respect to $\DDCH{i+1}$ and $\HQ_i(\DDCH{i})$. \end{definition} In Appendix \ref{subsec:properties-of-consistent-hypergraphs} we will show some basic properties of consistent hypergraphs used later in our analysis. \subsubsection{Central property of consistent hypergraphs via shadow graphs} With the notion of safe vertices and consistent hypergraphs, we can now present the following central lemma that shows that the neighborhood of vertices in consistent hypergraphs can be modeled by some semi-planar structures, which we will call \emph{shadow graphs}, that are a union of at most $\Hsize$ simple planar graphs. \begin{restatable}{lemma}{LSG} \label{lemma:central-small-degrees} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\HQ_i(\DDCH{i})$ be a hypergraph consistent for $\DDCH{i}$. Then, there is a simple graph $\Gi$, \begin{compactenum}[\quad (a)] \item with the vertex set equal to the set of all non-isolated vertices in $\HQ_i(\DDCH{i})$, \item that is a union of at most $\Hsize$ simple planar graphs, and \item such that for any distinct $x, y \in V(\HQ_i(\DDCH{i}))$, $x$ is adjacent to $y$ in $\HQ_i(\DDCH{i})$ if and only if $x$ is adjacent to $y$ in $\Gi$. \end{compactenum} \end{restatable} The simple graph $\Gi$ in Lemma \ref{lemma:central-small-degrees} will be called the \emph{shadow graph} of $\HQ_i(\DDCH{i})$. We consider the characterization provided in Lemma \ref{lemma:central-small-degrees} to be one of the most interesting and highly non-trivial contributions of this paper. This is the key tool that allows us to facilitate the approach presented in the paper. To simply the flow of the paper though, the proof of Lemma \ref{lemma:central-small-degrees} is deferred to Appendix \ref{subsec:planarization-of-hypergraphs}. \subsubsection{Finding many safe vertices of the same color} \label{subsec:lemma-many-safe-vertices} The main use of Lemma \ref{lemma:central-small-degrees} is to show that even though the use of the hypergraphs $\HQ_1(\DDCH{1}), \HQ_2(\DDCH{2}),$ $\dots$ looses some basic properties of planar graphs, our use of consistent hypergraphs allows us to apply Lemma \ref{lemma:central-small-degrees} to maintain some weaker, but still similar properties of the hypergraphs $\HQ_1(\DDCH{1}), \HQ_2(\DDCH{2}), \dots$. We begin with the following lemma that shows that the hypergraphs will have a constant fraction of vertices of low degrees. The proof of our next Lemma \ref{lemma:small-vertices-new} extends the approach used earlier in the context of planar graphs from \cite{CMOS11}; we defer the proof to Appendix \ref{sec:proof-lemma:small-vertices-new}. \begin{restatable}{lemma}{LSV} \label{lemma:small-vertices-new} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\HQ_i(\DDCH{i})$ be a hypergraph consistent for $\DDCH{i}$. Then, there is a set $\DCH \subseteq \DDCH{i}$ of size at least $\frac{|\DDCH{i}|}{4\Hsize+2}$ such that in the hypergraph $\HQ_i(\DCH)$, every copy of $H$ in $\DCH$ has a vertex with at most $6 \Hsize$ distinct neighbors. \end{restatable} Our next lemma follows the arguments used in a related proof from \cite{CMOS11} and shows that if there is a color with all vertices having a small number of neighbors in $\HQ_i(\DCH)$ for $\DCH \subseteq \DDCH{i}$, then we can always find a large subset of $\DCH$ with all vertices of that color being safe. \begin{lemma} \label{lemma:if-low-deg-then-many-safe} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ such that $\HQ_i(\DDCH{i})$ is a hypergraph consistent for $\DDCH{i}$. Let $\cc$ be a color of a vertex in $\{1, \dots, \Hsize\} \setminus \{\chi(v_j): j < i\}$. Let $\DCH \subseteq \DDCH{i}$ such that every colored copy of $H$ in $\DCH$ has vertex of color $\cc$ with at most $6 \Hsize$ distinct neighbors in $\HQ_i(\DCH)$. Then there is a subset $\DCH' \subseteq \DCH$, $|\DCH'| \ge \frac{|\DCH|}{(6 \Hsize)^{\Hsize}}$, such that every colored copy $\h$ of $H$ in $\DCH'$ has vertex of color $\cc$ safe with respect to $\DCH'$ and $\HQ_i(\DDCH{i})$. \end{lemma} \begin{proof} Let $\cc_1, \dots, \cc_{\ell}$ be the colors of vertices adjacent to vertex of color $\cc$ in $\M_i$ (notice that $\cc$ may be among these colors). For each non-isolated vertex $u$ in $\HQ_i(\DCH)$ of color $\cc$, for every color $\cc_s$, $1 \le s \le \ell$, select i.u.r. one of its neighbors $u_{\langle s \rangle}$ in $\HQ_i(\DCH)$ of color $\cc_s$. Next, remove from $\DCH$ every copy of $\h$ of $H$ in $\HQ_i(\DCH)$ containing vertex $u$ unless the vertices from this copy incident to $u$ are the selected $\ell$ neighbors $u_{\langle 1 \rangle}, u_{\langle 2 \rangle}, \dots, u_{\langle \ell \rangle}$. Let $\DCH'$ be the set of remaining copies of $H$ in $\HQ_i(\DCH)$. Our construction ensures that every remaining non-isolated vertex $u$ of color $\cc$ is safe with respect to $\DCH'$ and $\HQ_i(\DDCH{i})$. Furthermore, since every vertex of color $\cc$ has at most $6 \Hsize$ distinct neighbors (taking into account self-loops) in $\HQ_i(\DCH)$, the probability that a fixed copy of $\h$ in $\DCH$ is not deleted by the process above is at least $(6 \Hsize)^{-\ell}$. Therefore the expected size of $\DCH'$ is at least $(6 \Hsize)^{-\ell} \cdot |\DCH|$, and therefore, there exists a set $\DCH'$ of that size that satisfies the lemma. \end{proof} With Lemmas \ref{lemma:small-vertices-new} and \ref{lemma:if-low-deg-then-many-safe} at hand, we are now ready to present the main result of this section. \begin{lemma} \label{lemma:many-safe} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\HQ_i(\DDCH{i})$ be a hypergraph consistent for $\DDCH{i}$. Then, there is color $\cc$ in $\{1, \dots, \Hsize\} \setminus \{\chi(v_j): j < i\}$ and a set $\DCH^* \subseteq \DDCH{i}$ of size at least $\frac{|\DDCH{i}|}{(6 \Hsize)^{\Hsize+2}}$ such that every colored copy $\h$ of $H$ in $\DCH^*$ has vertex of color $\cc$ safe with respect to $\DCH^*$ and $\HQ_i(\DDCH{i})$. \end{lemma} \begin{proof} By Lemma \ref{lemma:small-vertices-new}, there is a set $\widehat{\DCH} \subseteq \DDCH{i}$, $|\widehat{\DCH}| \ge \frac{|\DDCH{i}|}{4\Hsize+2}$, such that every colored copy of $H$ in $\widehat{\DCH}$ has a vertex with at most $6 \Hsize$ distinct neighbors in $\HQ_i(\widehat{\DCH})$. For a color $\cc^* \in \{1, \dots, \Hsize\} \setminus \{\chi(v_j): j < i\}$, let $\widehat{\DCH}_{\cc^*}$ be the subset of $\widehat{\DCH}$ such that every copy of $H$ in $\widehat{\DCH}_{\cc^*}$ has a vertex of color $\cc^*$ with at most $6 \Hsize$ distinct neighbors in the hypergraph $\HQ_i(\widehat{\DCH})$. Since $\bigcup_{\cc^ } \widehat{\DCH}_{\cc^*} = \widehat{\DCH}$, there is one color $\cc \in \{1, \dots, \Hsize\} \setminus \{\chi(v_j): j < i\}$ such that $|\widehat{\DCH}_{\cc}| \ge \frac{1}{\Hsize} \cdot |\widehat{\DCH}| \ge \frac{|\DDCH{i}|}{(4\Hsize+2) \cdot \Hsize} \ge \frac{|\DDCH{i}|}{(6\Hsize)^2}$ and every copy of $H$ in $\widehat{\DCH}_{\cc}$ has a vertex of color $\cc$ with at most $6 \Hsize$ distinct neighbors in $\HQ_i(\widehat{\DCH})$, and hence also in $\HQ_i(\widehat{\DCH}_{\cc})$. Therefore, we can take such set $\widehat{\DCH}_{\cc}$ as set $\DCH$ in Lemma \ref{lemma:if-low-deg-then-many-safe}, to conclude that there is a subset $\DCH' \subseteq \widehat{\DCH}_{\cc}$, $|\DCH'| \ge \frac{|\widehat{\DCH}_{\cc}|}{(6 \Hsize)^{\Hsize}} \ge \frac{|\DDCH{i}|}{(6 \Hsize)^{\Hsize+2}}$, such that every colored copy $\h$ of $H$ in $\DCH'$ has vertex of color $\cc$ safe with respect to $\DCH'$ and $\HQ_i(\DDCH{i})$. \end{proof} \subsection{Constructing set $\DDCH{i+1}$ of edge-disjoint colored copies of $H$ and $\HQ_{i+1}(\DDCH{i+1})$} \label{subsec:main-reduction} Now we are ready to define our construction of the set $\DDCH{i+1}$ of edge-disjoint colored copies of $H$ obtained as a subgraph of $\DDCH{i}$, and with this, to define the hypergraph $\HQ_{i+1}(\DDCH{i+1})$ from $\HQ_i(\DDCH{i})$. Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$, where $\HQ_i(\DDCH{i})$ is a hypergraph consistent for $\DDCH{i}$. We apply Lemma \ref{lemma:many-safe} to choose color $\cc$ in $\{1, \dots, \Hsize\} \setminus \{\chi(v_j): j < i\}$ and a set $\DCH^* \subseteq \DDCH{i}$ of size at least $\frac{|\DDCH{i}|}{(6 \Hsize)^{\Hsize+2}}$ such that every colored copy $\h$ of $H$ in $\DCH^*$ has vertex of color $\cc$ safe with respect to $\DCH^*$ and $\HQ_i(\DDCH{i})$ (that is, for every vertex $u$ with $\chi(u) = \cc$, all colored copies $\h \in \DDCH{i+1}$ of $H$ that contain $u$ have identical sets $\N_i^{\h}\langle u\rangle$ in $\HQ_i(\DDCH{i})$). Then, we define $\DDCH{i+1} := \DCH^*$ and select vertex $v_i$ to be the vertex of color $\cc$ in $H$. With so defined vertex $v_i$, we can immediately construct the hypergraph $\HQ_{i+1}(\DDCH{i+1})$ (from the hypergraph $\HQ_i(\DDCH{i})$). The details of the construction have been presented in Section \ref{subsec:shrinking-copies-of-H}, and it required the choice of set $\DDCH{i+1}$ and of vertex $v_i$ among the vertices in $V(H) \setminus \{v_1, \dots, v_{i-1}\}$. By Lemma \ref{lemma:many-safe} (cf. Definition \ref{def:consistent-hypergraphs} of consistent hypergraphs), this immediately gives the following lemma. \begin{lemma} \label{lemma:defining-Qi+1} Let $\DDCH{i}$ be a set of edge-disjoint colored copies of $H$ in $G$ and let $\HQ_i(\DDCH{i})$ be a hypergraph consistent for $\DDCH{i}$. Then, the choice of the set $\DDCH{i+1}$ with the vertex $v_i$, as described above, will ensure that $|\DDCH{i+1}| \ge \frac{|\DDCH{i}|}{(6 \Hsize)^{\Hsize+2}}$ and that $\HQ_{i+1}(\DDCH{i+1})$ obtained from $\HQ_i(\DDCH{i})$ is consistent for~$\DDCH{i+1}$. \end{lemma} \subsubsection{Representatives $\P_i$ for $\DCH$ and $\HQ_i(\DCH)$} \label{subsubsec:reps} In our analysis, we will be also using the concept of representatives to describe the scenario that a vertex from $V$ has been contracted to some other vertices during the construction of $\HQ_i(\DCH)$ (in some moment, it has been deleted from $\HQ_j(\DCH)$, $1 \le j < i$, and new hyperedges containing all neighbors of this vertex has been formed, in which case of these neighbors is used as a proxy). The canonical representative function plays an important role in our analysis and it is used explicitly in algorithms \HRLBD{} and \HRLBFS. (For the following definition, let us recall the construction of the hypergraph $\HQ_i(\DDCH{i})$ from Section \ref{subsec:shrinking-copies-of-H}. Let us also notice that the notion of canonical representatives is used solely in the analysis at the end of the process, and since it is not used for the construction of sets $\DDCH{1}, \DDCH{2}, \dots, \DDCH{\Hsize}$ and hypergraphs $\HQ_1(\DDCH{1}), \HQ_2(\DDCH{2}), \dots, \HQ_{\Hsize}(\DDCH{\Hsize})$ and is used only to model their behavior, it does rely on the final order $v_1, \dots, v_{\Hsize}$ of the vertices in $H$.) \begin{definition}\textbf{(Canonical representatives)} \label{def:canonical-representative-function} Let $\DCH$ be a set of edge-disjoint colored copies of $H$ in $G$. Let $v_1, \dots, v_{\Hsize}$ be an arbitrary order of vertices of $H$ such that for each $i$, $1 \le i \le \Hsize$, the hypergraph $\HQ_i(\DCH)$ is consistent for $\DCH$. A \textbf{\emph{canonical representative function}} is a sequence of functions $\P_1, \P_2, \dots, \P_{\Hsize}: V \rightarrow V$ such that for every $i$, $1 \le i \le \Hsize$: \begin{itemize} \item if $u$ is an isolated vertex in $\G[\DCH]$, then $\P_i(u) = u$ for every $i$; \item otherwise, if $u$ is a vertex in $\HQ_i(\DCH)$ {\small (i.e., $\chi(u) \notin \{\chi(v_j): 1 \le j < i\}$)}, then $\P_i(u) = u$; \item otherwise, $\P_i(u) = x$, where \begin{inparaenum}[\it (i)] \item $x \in \bigcup_{\e: u \in \lab(\e)} \e$ and \item for any $x, y \in \bigcup_{\e: u \in \lab(\e)} \e$, if $x \ne y$, $\chi(x) = \chi(v_{j_1})$, and $\chi(y) = \chi(v_{j_2})$, then $j_1 < j_2$. \end{inparaenum} \end{itemize} We will denote any single $\P_i$ as a \emph{representative function}. \junk{EQUIVALENT DEFINITION, BUT POSSIBLY LESS INTUITIVE \begin{itemize} \item if $u$ is a vertex in $\HQ_i(\DCH)$\footnote{That is, $\chi(u) \notin \{\chi(v_j): 1 \le j < i\}$.}, then $\P_i(u) = u$; \item if $u$ is not a vertex in $\HQ_i(\DCH)$\footnote{That is, $\chi(u) \in \{\chi(v_j): 1 \le j < i\}$.} and no edge in $\HQ_i(\DCH)$ has $u$ in its label\footnote{That is, $u \notin \lab(\e)$ for every edge $\e$ in $\HQ_i(\DCH)$. Equivalently, it's easy to see that $\chi(u) \in \{\chi(v_j): 1 \le j < i\}$ and $u$ is isolated in $\G[\DCH]$. (In fact, \emph{for every $u \in V$ that is isolated in $\G[\DCH]$, we will have $\P_i(u) = u$ for every $i$}.)}, then $\P_i(u) = u$; \item otherwise\footnote{That is, $u$ is a not vertex in $\HQ_i(\DCH)$ and there is an edge $\e$ in $\HQ_i(\DCH)$ with $u \in \lab(\e)$.} $\P_i(u) = x$, where \begin{inparaenum}[\it (i)] \item $x \in \bigcup_{\e: u \in \lab(\e)} \e$ and \item for any $x, y \in \bigcup_{\e: u \in \lab(\e)} \e$, if $x \ne y$, $\chi(x) = \chi(v_{j_1})$, and $\chi(y) = \chi(v_{j_2})$, then $j_1 < j_2$.\end{inparaenum} \end{itemize} } \end{definition} The notion of the canonical representative function $\P_1, \P_2, \dots, \P_{\Hsize}: V \rightarrow V$ describes the dependencies between the vertices from $G$ in the construction of the sequence of the hypergraphs $\HQ_1(\DCH), \HQ_2(\DCH), \dots, \HQ_{\Hsize}(\DCH)$. And so, $\P_i(u) = u$ unless vertex $u$ has been contracted during the construction of $\HQ_j(\DCH)$ for $j < i$. If $u$ has been contracted during the construction of $\HQ_j(\DCH)$, then for some colored copy $\h$ of $H$ in $\DCH$ containing $u$, we first added a new hyperedge consisting of vertices in $\N_j^{\h}\langle u \rangle$, and then removed vertex $u$ (with all incident edges from $\HQ_j(\DCH)$). In that case, we will define $\P_j(u) = x$, \footnote{Notice that this notion is well defined only since $u$ is a safe vertex with respect to $\DCH$ and $\HQ_j(\DCH)$, because in that case the neighbors of $u$ in $\HQ_j(\DCH)$ do not depend on the choice of the copy $\h$ of $H$ in $\DCH$ containing $u$ we consider.}where $x$ is the vertex in $\N_j^{\h}\langle u \rangle$ that will be contracted first among all vertices in $\N_j^{\h}\langle u \rangle$ (that is, if $x, y \in \N_j^{\h}\langle u \rangle$ and $\chi(x) = \chi(v_{r_1})$ and $\chi(y) = \chi(v_{r_2})$, then $r_1 \le r_2$). Furthermore, if in some future iteration $s>j$ vertex $x = \P_j(u)$ is contracted, then we will not only set $\P_s(x)$, but we will also update $\P_s(u)$ to be the same as $\P_s(x)$. In fact, we will maintain that for all $k > j$, if $\P_j(u) = x$ then $\P_k(u) = \P_k(x)$.\footnote{Note that function $\P_i$ defines a \emph{forest} on $V$, where in each ``tree'' the root is a vertex $u$ with $\P_i(u) = u$, and the ``leaves'' are formed by vertices $u$ with $\P_i^{(-1)}(u) \ne u$ (that is, for which there is no $v$ with $\P_i(v) = u$).} \begin{remark} \label{remark:canonical-representative-function} Equivalently, one can define $\P_1, \P_2, \dots, \P_{\Hsize}: V \rightarrow V$ recursively as follows: \begin{itemize} \item if $u$ is an isolated vertex in $\G[\DCH]$, then $\P_i(u) = u$ for every $i$; \item otherwise: \begin{itemize}[$\diamond$] \item $\P_1(u) = u$ for every vertex $u \in V$; \item for any $i$, $2 \le i \le \Hsize$, for every $u \in V$: \begin{itemize}[$\star$] \item if $u$ is a vertex in $\HQ_i(\DCH)$, then $\P_i(u) = u$; \item otherwise, \begin{itemize}[$\ast$] \item if $\P_{i-1}(u)$ has color different than $\chi(v_{i-1})$\footnote{That is, $\P_{i-1}(u)$ is not in $\HQ_{i-1}(\DCH)$.}, then $\P_i(u) = \P_{i-1}(u)$; \item else, $\P_i(u)$ is equal to the neighbor of vertex $\P_{i-1}(u)$ in $\HQ_{i-1}(\DCH)$ with the lowest color (that is, $\P_i(u)$ is the neighbor $x$ of $\P_{i-1}(u)$ in $\HQ_{i-1}(\DCH)$ that minimizes $j$ with $\chi(x) = \chi(v_j)$). \end{itemize} \end{itemize} \end{itemize} \end{itemize} Let us explain the choice of vertex $x$ in the last case of the definition of $\P_i(u)$. First of all, the choice of $\P_i(u)$ to be a neighbor of vertex $\P_{i-1}(u)$ in $\HQ_{i-1}(\DCH)$ is to ensure that $u$ will belong to the label of the newly created edge incident to that neighbor in $\HQ_{i}(\DCH)$. The choice of the neighbor with the ``lowest color'' is to ensure that that vertex will be the first to be contracted in the later procedure of shrinking $\HQ_j(\DCH)$, and thus, during that construction, the edge containing vertex $u$ will be replaced by another edge. Therefore, our choosing $x$ ensures that if $\chi(u) = \chi(v_r)$, then \begin{compactitem} \item for every $i \le r$, $\P_i(u) = u$, and \item for every $i > r$, $\P_i(u)$ is a vertex in $\HQ_{i}(\DCH)$ and there is a hyperedge $\e$ incident to vertex $\P_i(u)$ such that $u \in \e$. \end{compactitem} \end{remark} \section{Completing the proof of Lemma \ref{lemma:ExistenceOfH}, and of Theorems \ref{thm:main-H-freeness} and \ref{thm:main-H-freeness-single-call}} \label{sec:final-proof} We are now ready to complete the proof of Lemma \ref{lemma:ExistenceOfH}, and with this of Theorems \ref{thm:main-H-freeness} and \ref{thm:main-H-freeness-single-call}. Let $G = (V,E)$ be a simple planar graph that is $\eps$-far from $H$-free. By our analysis in the previous sections (see Lemma \ref{lemma:defining-Qi+1}), we know that we can order the vertices of $H$ \ $v_1, \dots, v_{\Hsize}$ to define the hypergraphs $\M_1, \dots, \M_{\Hsize}$, so that there are sets $\DDCH{1}, \DDCH{2}, \dots, \DDCH{\Hsize}$ of edge-disjoint colored copies of $H$ in $G$ with $\DDCH{\Hsize} \subseteq \DDCH{\Hsize-1} \subseteq \dots \subseteq \DDCH{1}$ and $|\DDCH{\Hsize}| = \Omega_{\eps,H}(|V|)$, such that for each $i$, $1 \le i \le \Hsize$, the hypergraph $\HQ_i(\DDCH{i})$ is consistent for $\DDCH{i}$. Let us first apply Lemma \ref{lemma:transformation} to the set $\DDCH{\Hsize}$ of edge-disjoint colored copies of $H$ in $G$ to obtain a subset $\DCH \subseteq \DDCH{\Hsize}$ with $|\DCH| = \Omega_{\eps,H}(|V|)$, such that the graph $\G[\DCH]$ satisfies condition (\ref{part-a-lemma:ExistenceOfH}) of Lemma \ref{lemma:ExistenceOfH}. Therefore, we only have to show that condition (\ref{part-b-lemma:ExistenceOfH}) of Lemma \ref{lemma:ExistenceOfH} holds too, that is, we have to show that if $G = (V,E)$ is a simple planar graph that is $\eps$-far from $H$-free, then \begin{algo}\vspace*{-0.25in} \begin{itemize}[$\otimes$] \item \RLBD{($\G[\DCH],H,\dg,\ld$)} finds a copy of $H$ in $\G[\DCH]$ with probability $\Omega_{\eps,H}(1)$. \end{itemize} \end{algo} $\DCH$ is a set of edge-disjoint colored copies of $H$ in $G$ such that $|\DCH| = \Omega_{\eps,H}(|V|)$, and (by Claim \ref{claim:consistent-for-subset}) such that for each $i$, $1 \le i \le \Hsize$, the hypergraph $\HQ_i(\DCH)$ is consistent for $\DCH$. Let us take the canonical representative function $\P_1, \P_2, \dots, \P_{\Hsize}: V \rightarrow V$, cf. Definition \ref{def:canonical-representative-function}. We will prove $\otimes$ by showing the following two properties (proven below as Claims \ref{claim:final-prop1} and \ref{claim:final-prop2}): \begin{walgo}\vspace*{-0.2in} \begin{enumerate}[1.] \item the probability that \HRLBD\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \M_{\Hsize}, \Hsize^2, 1)}$ finds a copy of $\M_{\Hsize}$ is $\Omega_{\eps,H}(1)$, and \label{final-prop1} \item for every $i$, $1 \le i < \Hsize$, \begin{itemize} \item if the probability that \label{final-prop2} \HRLBD\,${(\HQ_{i+1}(\DCH),\P_{i+1},\M_{i+1},\dg,\ld)}$ finds a copy of $\M_{i+1}$ is $\Omega_{\eps,H}(1)$, \item then the probability that \HRLBD\,${(\HQ_i(\DCH),\P_i,\M_i,\Hsize \cdot \dg, 2 \ld)}$ finds a copy of $\M_i$ is $\Omega_{\eps,H}(1)$. \end{itemize} \end{enumerate} \end{walgo} Indeed, if Property \ref{final-prop1} holds, then by iterating Property \ref{final-prop2}, we have that for some $\dg^*, \ld^* = \Omega_{\eps,H}(1)$, the probability that \HRLBD\,${(\HQ_1(\DCH),\P_1,\M_1,\dg^*,\ld^*)}$ finds a copy of $\M_1$ is $\Omega_{\eps,H}(1)$. Since $\P_1$ is the identity function $\P_1(u) = u$ for every $u \in V$, and since $\HQ_1(\DCH) \equiv \G[\DCH]$, the behavior of \HRLBFS\,${(\HQ_1(\DCH),\P_1,\dg^*,\ld^*)}$ is identical to the behavior of \RLBFS\,${(\G[\DCH],\dg^*,\ld^*)}$, and further, since $\M_1 \equiv H$, the behavior of \HRLBD\,${(\HQ_1(\DCH),\P_1,\M_1,\dg^*,\ld^*)}$ is identical to the behavior of \RLBD\,${(\G[\DCH],H,\dg^*,\ld^*)}$. Therefore, we obtain that the probability that \RLBD\,${(\G[\DCH],H,\dg^*,\ld^*)}$ finds a copy of $H$ is $\Omega_{\eps,H}(1)$, what yields $\otimes$. What remains is to prove that Properties \ref{final-prop1} and \ref{final-prop2} hold, what we do in the following two central claims, whose proofs are deferred to Section \ref{sec:claim:final-prop1-2} below. \begin{restatable}{claim}{CFI} \label{claim:final-prop1} The probability that \HRLBD\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \M_{\Hsize}, \Hsize^2, 1)}$ finds a copy of $\M_{\Hsize}$ is $\Omega_{\eps,H}(1)$. \end{restatable} \begin{restatable}{claim}{CFII} \label{claim:final-prop2} Let $1 \le i < \Hsize$, $\dg = \dg(\eps,H) \ge \Hsize$, $\ld = \ld(\eps,H)$, $\dg^* = \Hsize \cdot \dg$ and $\ld^* = 2 \ld$. If the probability that \HRLBD\,${(\HQ_{i+1}(\DCH),\P_{i+1},\M_{i+1},\dg,\ld)}$ finds a copy of $\M_{i+1}$ is $\Omega_{\eps,H}(1)$, then the probability that \HRLBD\,${(\HQ_i(\DCH),\P_i,\M_i,\dg^*,\ld^*)}$ finds a copy of $\M_i$ is $\Omega_{\eps,H}(1)$. \end{restatable} With Claims \ref{claim:final-prop1} and \ref{claim:final-prop2} at hand, we obtain that Properties \ref{final-prop1} and \ref{final-prop2} hold, and therefore we can conclude the proof of the proof of Lemma \ref{lemma:ExistenceOfH}, and with this of Theorems \ref{thm:main-H-freeness} and \ref{thm:main-H-freeness-single-call}. \qed \subsection{Proofs of central Claims \ref{claim:final-prop1} and \ref{claim:final-prop2} --- completing the proof of Lemma \ref{lemma:ExistenceOfH}} \label{sec:claim:final-prop1-2} In this section we give proofs of two our central results on which relies our proof of Lemma \ref{lemma:ExistenceOfH} (and with this of Theorems \ref{thm:main-H-freeness} and \ref{thm:main-H-freeness-single-call}): Claims \ref{claim:final-prop1} and \ref{claim:final-prop2}. \medskip We begin with the proof of Claim \ref{claim:final-prop1}. \CFI* \junk{ \begin{claim} \label{claim:final-prop1} The probability that \HRLBD\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \M_{\Hsize}, \Hsize^2, 1)}$ finds a copy of $\M_{\Hsize}$ is $\Omega_{\eps,H}(1)$. \end{claim} } \begin{proof} \newcommand{\ind}{\ensuremath{\mathfrak{ind}}} \newcommand{\sis}{\ensuremath{\mathfrak{s}}} Our construction (see Section \ref{subsec:shrinking-H}) ensures that $\M_{\Hsize}$ has some number $\sis$ of hyperedges $\e_1, \dots, \e_{\sis}$, each $\e_j$ consisting of a single vertex $v_{\Hsize}$, and with the labels of edges $\e_1, \dots, \e_{\sis}$ defining a partition of $\{v_1, \dots, v_{\Hsize - 1}\}$ (that is, $\bigcup_{j=1}^{\sis} \lab(\e_j) = \{v_1, \dots, v_{\Hsize - 1}\}$ and $\lab(\e_{j_1}) \cap \lab(\e_{j_2}) = \emptyset$ for any $j_1 \ne j_2$). Similarly, our construction (see Section \ref{subsec:shrinking-copies-of-H}) ensures that $\HQ_{\Hsize}(\DCH)$ contains $\sis \cdot |\DCH|$ hyperedges, each hyperedge $\e$ in $\HQ_{\Hsize}(\DCH)$ consisting of a single vertex of color $\chi(v_{\Hsize})$. Furthermore, each such hyperedge $\e$ corresponds (cf. Definition \ref{def:corresponding-edges}) to a copy of one of the hyperedges $\e_1, \dots, \e_{\sis}$ from $\M_{\Hsize}$; let us denote by $\ind(\e)$ the index of the copy $\e_{\ind(\e)}$ corresponding to $\e$. Notice that $\clab(\e) = \clab(\e_{\ind(\e)})$ and $|\{\e \text{ in } \HQ_{\Hsize}(\DCH): \ind(\e) = j\}| = |\DCH|$ for any $j$, $1 \le j \le \sis$. Let $\dg^* = \Hsize^2$. In view of the comments and the construction above, by Definition \ref{def:finding-colored-copies-of-Mi}, \HRLBD\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \M_{\Hsize}, \dg^*, 1)}$ finds a copy of $\M_{\Hsize}$ if, \begin{enumerate}[(1)] \item in the call to \HRLBFS\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \dg^*, 1)}$, it selects the starting vertex $u = \P_{\Hsize}(v)$ to be non-isolated in $\HQ_{\Hsize}(\DCH)$, and \item vertex $u$ chooses among its $\dg^*$ random incident edges all copies of $\e_1, \dots, \e_{\sis}$. \end{enumerate} Our definition of $\P$ ensures that $\P_{\Hsize}(x)$ is a non-isolated vertex in $\HQ_{\Hsize}(\DCH)$ if and only if $x$ is a non-isolated vertex in $\G[\DCH]$. Therefore we only have to show that $\G[\DCH]$ has $\Omega_{\eps,H}(|V|)$ non-isolated vertices. Let $G^*[\DCH]$ be the subgraph of $\G[\DCH]$ induced by non-isolated vertices. Since $G^*[\DCH]$ consists of $|\DCH|$ edge-disjoint copies of $H$, $G^*[\DCH]$ has $|\DCH| \cdot |E(H)|$ edges. Since $G^*[\DCH]$ is a subgraph of a simple planar graph, $G^*[\DCH]$ is a simple planar graph too, and thus must have at least $\frac13 |\DCH| \cdot |E(H)|$ vertices (cf. Fact \ref{fact:planar_limited_edges}). Therefore, since $|\DCH| = \Omega_{\eps,H}(|V|)$, we conclude that $G^*[\DCH]$ has $\Omega_{\eps,H}(|V|)$ vertices, or equivalently, that $\G[\DCH]$ has $\Omega_{\eps,H}(|V|)$ non-isolated vertices. Therefore, with probability $\Omega_{\eps,H}(1)$ \HRLBFS\,${(\HQ_{\Hsize}(\DCH), \P_{\Hsize}, \dg^*, 1)}$ selects a non-isolated as the starting vertex. Next, let us condition on the fact that the starting vertex $u = \P_{\Hsize}(v)$ is non-isolated in $\HQ_{\Hsize}(\DCH)$. Analogously to the classic coupon collector's problem, we can argue that if $u$ selects at least $\sis^2$ (in fact, $\sis \ln (1+\sis)$ would suffice too) times incident edges i.u.r., then with probability $\Omega_{\eps,H}(1)$, the set $\mathcal{E}_{\ell,u}$ will contain $\sis$ hyperedges $\e'_1, \dots, \e'_{\sis}$ with $\ind(\e'_j)=j$ for every $j$, $1 \le j \le \sis$. In this case, the set $\mathcal{E}_{\ell,u}$ will contain a copy of $\M_{\Hsize}$. By our arguments above, this yields the claim. \end{proof} We now move to the proof of Claim \ref{claim:final-prop2}. \CFII* \junk{ \begin{claim} \label{claim:final-prop2} Let $1 \le i < \Hsize$, $\dg = \dg(\eps,H) \ge \Hsize$, $\ld = \ld(\eps,H)$, $\dg^* = \Hsize \cdot \dg$ and $\ld^* = 2 \ld$. If the probability that \HRLBD\,${(\HQ_{i+1}(\DCH),\P_{i+1},\M_{i+1},\dg,\ld)}$ finds a copy of $\M_{i+1}$ is $\Omega_{\eps,H}(1)$, then the probability that \HRLBD\,${(\HQ_i(\DCH),\P_i,\M_i,\dg^*,\ld^*)}$ finds a copy of $\M_i$ is $\Omega_{\eps,H}(1)$. \end{claim} } \begin{proof} \newcommand{\sis}{\ensuremath{\mathfrak{s}}} \newcommand{\ris}{\ensuremath{\mathfrak{r}}} Let us refer to Definition \ref{def:finding-colored-copies-of-Mi} for the meaning of algorithm \HRLBD\,${(\HQ_{s}(\DCH),\P_{s},\M_{s},\dg',\ld')}$ (and thus also of \HRLBFS\,${(\HQ_{s}(\DCH),\P_{s},\dg',\ld')}$) finding a colored copy of $\M_{r}$. The proof relies on two basic properties that hold with probability $\Omega_{\eps,H}(1)$: \begin{itemize} \item that a single step of \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ can be simulated by 2 steps of \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ with $\dg^* = \Hsize \cdot \dg$ and $\ld^* = 2 \ld$, and \item that if \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ starts at a vertex $u$, then the same vertex $u$ will be processed by \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ in $L_0 \cup L_1$ {\small (i.e., in one of the first two rounds)}. \end{itemize} Once these two claims hold, the proof of Claim \ref{claim:final-prop2} follows immediately. We begin with showing that a single step of \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ can be simulated by 2 steps of \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$. We begin with two auxiliary definitions. For any pair of edges $\e$ and $\e'$, we say \emph{$\e$ and $\e'$ are semi-equivalent} if their vertex sets are the same and their colored labels are the same. Let $\e$ be an edge in $\HQ_{i+1}(\DCH)$ that is modeled by edges $\e_1, \dots, e_{\ris}$ in $\HQ_{i}(\DCH)$ (cf. Definition \ref{def:modeling-hyperedge-in-Hi+1}). Then any $\ris$ edges $\e_1', \dots, e_{\ris}'$ in $\HQ_{i}(\DCH)$ are called \emph{sub-equivalent to $\e$} if for every $1 \le j \le \ris$, edges $\e_j$ and $\e_j'$ are semi-equivalent. The first definition relates to the scenario when \HRLBD\,${(\HQ,\P,\M_j,\dg,\ld)}$ finds a colored copy of $\M_j$ in $\HQ$ that contains edge $\e$ in $\HQ$. In that case, we claim that the algorithm would have found a copy of $\M_j$ also if instead of using edge $\e$, it used any edge semi-equivalent to $\e$. The second definition is used to describe the scenario when \HRLBD\,${(\HQ_{i+1}(\DCH),\P_{i+1},\M_{i+1},\dg,\ld)}$ finds a colored copy of $\M_{i+1}$ by finding edges $\mathcal{E}$ in $\HQ_{i+1}(\DCH)$ matching $\M_{i+1}$. In that case, to find a colored copy of $\M_{i}$, it is enough that \HRLBD\,${(\HQ_{i}(\DCH),\P_{i},\M_{i},\dg^*,\ld^*)}$ finds only edges $\mathcal{E}'$ such that for every $\e \in \mathcal{E}$, $\mathcal{E}'$ contains edges $\e_1', \dots, e_{\sis}'$ in $\HQ_{i}(\DCH)$ that are sub-equivalent to $\e$. Let us consider a step of creating set $L_{\ell}$ in \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$, and let $u$ be a vertex in $L_{\ell-1}$ with incident edge $\e$. Let $\e$ belong to a copy $\h_{\e}$ of $\M_{i+1}$ in $\HQ_{i+1}(\DCH)$ and let $\widehat{\e}$ be the corresponding edge in $\M_{i+1}$. By our construction, edge $\e$ was either already present in $\HQ_{i}(\DCH)$, or is a result of a contraction in $\HQ_{i}(\DCH)$ of a vertex $x$ with $\chi(x) = \chi(v_i)$. In the latter case, $\e$ is equal to $\N_i^{\h_{\e}}\langle x \rangle$, the set of neighbors of $x$ in $\h_{\e}$ (in $\HQ_i(\DDCH{i})$) other than $x$. In \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$, when vertex $u$ selects $\dg$ incident edges i.u.r., the probability that $u$ chooses $\e$ among its $\dg$ incident edges in \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ is $\mathfrak{p}_{u,\e} = 1 - (1 - 1/\deg_{\HQ_{i+1}(\DCH)}(u))^{\dg}$, where $\deg_{\HQ_{i+1}(\DCH)}(u)$ is the number of edges incident to vertex $u$ in $\HQ_{i+1}(\DCH)$. If edge $\e$ was already present in $\HQ_{i}(\DCH)$, then the probability that $u$ chooses $\e$ among its $\dg$ incident edges in \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ is equal to $1 - (1 - 1/\deg_{\HQ_{i}(\DCH)}(u))^{\dg^*}$. Next, we notice that for any vertex $x$ in $\HQ_{i+1}(\DCH)$, $\deg_{\HQ_{i+1}(\DCH)}(u) \le \deg_{\HQ_{i}(\DCH)}(u) \le \Hsize \deg_{\HQ_{i+1}(\DCH)}(u)$. (Indeed, for any colored copy $\h$ of $H$ in $\DCH$ that contains vertex $x$, if we contract in $\h$ a neighbor of $x$ in $\HQ_{i}(\DCH)$, then we remove up to $\Hsize$ edges from $\HQ_{i}(\DCH)$ and add exactly one new edge.) This implies that with our setting $\dg^* = \Hsize \cdot \dg$, we have $1 - (1 - 1/\deg_{\HQ_{i}(\DCH)}(u))^{\dg^*} \ge 1 - (1 - 1/(\Hsize \cdot \deg_{\HQ_{i+1}(\DCH)}(u)))^{\Hsize \cdot \dg} = \Omega_{\eps,H}(1 - (1 - 1/\deg_{\HQ_{i+1}(\DCH)}(u))^{\dg})$. \footnote{To see this, think about the following experiment. Choosing $\e$ in $\HQ_{i+1}(\DCH)$ is like choosing one out of $\deg_{\HQ_{i+1}(\DCH)}(u)$ incident edges, and repeating it $\dg$ times; choosing $\e$ in $\HQ_{i}(\DCH)$ is like choosing one out of up to $\Hsize \cdot \deg_{\HQ_{i+1}(\DCH)}(u)$ incident edges, and repeating it $\dg^*$ times. Now, to choose $\e$ in $\HQ_{i}(\DCH)$ we can also split all edges incident to $u$ in $\HQ_{i}(\DCH)$ into $\deg_{\HQ_{i+1}(\DCH)}(u)$ groups, each group of size approximately $\deg_{\HQ_{i}(\DCH)}(u)/\deg_{\HQ_{i+1}(\DCH)}(u)$. Then, the probability that we will choose an edge from the same group as $\e$ is $\mathfrak{p}_{u,\e}$ (approximately, because of rounding) the same as the probability that we will choose edge $\e$ in $\HQ_{i+1}(\DCH)$. Therefore, with probability at most $1/\Hsize$, we would then choose edge $\e$ in $\HQ_{i}(\DCH)$. If we repeat this $\Hsize$ time, we will get probability $\Omega_{\eps,H}(\mathfrak{p}_{u,\e})$. (Notice that we could also be happy with the probability $\mathfrak{p}_{u,\e}/\Hsize$, since this is $\Omega_{\eps,H}(\mathfrak{p}_{u,\e})$.)} Therefore, we can conclude that: \begin{itemize}[\textbf{Case~1:}] \item if edge $\e$ is present in $\HQ_{i}(\DCH)$ and in \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$, vertex $u$ selects $\e$ among its $\dg$ incident edges with probability $\mathfrak{p}_{u,\e}$, then in \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$, vertex $u$ selects $\e$ among its $\dg^*$ incident edges with probability $\Omega_{\eps,H}(\mathfrak{p}_{u,\e})$. \end{itemize} The case when edge $\e$ is not present in $\HQ_{i}(\DCH)$ and has been obtained as a contraction of vertex $x$ with $\chi(x) = \chi(v_i)$, with $\e = \N_i^{\h_{\e}}\langle x \rangle$, is more complicated. Since $\HQ_{i+1}(\DCH)$ is consistent for $\DCH$, vertex $x$ is safe with respect to $\DCH$ and $\HQ_{i}(\DCH)$. Let $x$ be incident to $\deg_{\HQ_{i}(\DCH)}(x)$ edges in $\HQ_i(\DDCH{i})$ and note that $\chi(x) = \chi(v_i)$. By Remark \ref{remark-properties-of-safe-vertices}, we can group edges incident to $x$ in $\HQ_i(\DDCH{i})$ into $\ris$ groups of \emph{the same size} each (equal to $\deg_{\HQ_{i}(\DCH)}(x)/\ris$), each group corresponding to a copy of one of the $\ris$ edges incident to $v_i$ in $\M_i$, any two edges from the same group being semi-equivalent. After contracting vertex $x$, we will create $\sis = \deg_{\HQ_{i}(\DCH)}(x)/\ris$ new edges $\e_1, \dots, \e_{\sis}$ in $\HQ_{i+1}(\DCH)$, each new edge with the same vertex set $\N_i\langle x\rangle$ that correspond to the set of neighbors of $x$ in $\HQ_i(\DDCH{i})$, and having the same colored label. Thus all new edges $\e_1, \dots, \e_{\sis}$ are semi-equivalent. Furthermore, any $\e_1', \dots, \e_{\ris}'$ incident to $x$ in $\HQ_i(\DDCH{i})$ that are from $\ris$ different groups are sub-equivalent to every edge in $\e_1, \dots, \e_{\sis}$. We will compare the probability that after arriving at vertex $u$, \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ visits any of the edges $\e_1, \e_2, \dots, \e_{\sis}$, with the probability that after arriving at $u$, algorithm \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ visits in $\HQ_{i}(\DCH)$ \ $\ris$ edges that are incident to $x$ in $\HQ_i(\DDCH{i})$ and that are from $\ris$ different groups (and hence are sub-equivalent to every edge in $\e_1, \dots, \e_{\sis}$). In \HRLBFS, when vertex $u$ selects $\dg$ incident edges i.u.r., the probability that it chooses at least one of the edges $\e_1, \dots, \e_{\sis}$ among its $\dg$ incident edges in \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ is equal to $\mathfrak{p}_{i+1} = 1 - (1-\sis/\deg_{\HQ_{i+1}(\DCH)}(u))^{\dg}$ Let us compare it to the probability that in \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$, when vertex $u$ selects $\dg$ incident edges i.u.r. then one of these edges is incident to vertex $x$, \emph{and} when in \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ vertex $x$ selects $\dg$ incident edges i.u.r. then at least one edge from each of the $\ris$ groups of edges incident to $x$ in $\HQ_{i}(\DCH)$ is chosen\footnote{Let us notice that we do not assume that $x$ will be processed in the \emph{next round} in \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$, after vertex $u$ is processed. This is because it is possible that vertex $x$ has been processed before vertex $u$, for example, as the very first vertex in the call to \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$. Our arguments imply that both $u$ and $x$ will be processed (in the way we want them to be processed) \emph{not later} than in the next round.}. The first probability, that one of the incident edges selected by $u$ is incident to $x$, is equal to $\mathfrak{p}_i \ge 1 - (1-\sis/\deg_{\HQ_{i}(\DCH)}(u))^{\dg^*}$, since the number of edges containing both $u$ and $x$ in $\HQ_{i}(\DCH)$ is at least $\sis$. To estimate the second probability, similarly as we were already arguing in the proof of Claim \ref{claim:final-prop1} and analogously to the classic coupon collector's problem, if $x$ selects at least $\ris^2$ (in fact, $\ris \ln (1+\ris)$ would suffice too) times incident edges i.u.r. (and we have $\dg^* \ge \Hsize^2$), then with probability $\Omega_{\eps,H}(1)$, the corresponding set $\mathcal{E}_{\cdot,x}$ will contain at least one edge from each of the $\ris$ groups of edges incident to $x$ in $\HQ_{i}(\DCH)$. Therefore, in summary, with probability $\Omega_{\eps,H}(\mathfrak{p}_i)$, if \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ visits vertex $u$, then the algorithm will visit (until at most two rounds later) edges $\e_1', \dots, \e_{\ris}'$ that are sub-equivalent to edges $\e_1, \dots, \e_{\sis}$. Now we only have to match the probabilities of these events in \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ and in \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$. Since, as we were arguing above, $\deg_{\HQ_{i+1}(\DCH)}(u) \le \deg_{\HQ_{i}(\DCH)}(u) \le \Hsize \deg_{\HQ_{i+1}(\DCH)}(u)$, we note that with our setting $\dg^* = \Hsize \cdot \dg$, we have $\mathfrak{p}_{i+1} = 1 - (1 - \sis/\deg_{\HQ_{i+1}(\DCH)}(u))^{\dg} = \Omega_{\eps,H}(\mathfrak{p}_i)$, using the same arguments as before. This gives the following: \begin{itemize}[\textbf{Case~2:}] \item if edge $\e$ is not in $\HQ_{i}(\DCH)$, when \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ arrives at vertex $u$, if $\mathfrak{p}_{i+1}$ is the probability that $u$ selects an edge semi-equivalent to $\e$ among its $\dg$ incident edges, then when \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$ arrives at $u$ (with $u \in L_{\ell}$), then with probability $\Omega_{\eps,H}(\mathfrak{p}_{i+1})$ the set $\bigcup_{j=1}^{\ell+2}\mathcal{E}_j$ of selected edges until at most two rounds later contains edges $\e_1', \dots, \e_{\ris}'$ that are sub-equivalent to~$\e$. \end{itemize} Therefore, in summary, our analysis of Case 1 and Case 2 above implies our claim that a single step of algorithm \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ can be simulated by 2 steps of algorithm \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$, with the success probability loss of $O_{\eps,H}(1)$. That is, if one arrives at vertex $u$ in step $k$ of \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ and the probability that one selects an edge semi-equivalent to $\e$ is $\mathfrak{p}_{i+1}$, then if one arrives at vertex $u$ in step $\ell$ of \HRLBFS\,${(\HQ_{i}(\DCH),\P_{i},\dg^*,\ld^*)}$, then with probability $\Omega_{\eps,H}(\mathfrak{p}_{i+1})$, either $\mathcal{E}_{\ell+1}$ contains an edge semi-equivalent to $\e$, or $\bigcup_{j=1}^{\ell+2}\mathcal{E}_j$ contains edges $\e_1', \dots, \e_{\ris}'$ that are sub-equivalent to~$\e$. \paragraph{Choosing starting vertex.} Let us recall that the probability to choose $u \in V(\HQ_{i+1}(\DCH))$ as a starting vertex $\P_{i+1}(v)$ in \HRLBFS\,${(\HQ_{i+1}(\DCH), \P_{i+1}, \dg, \ld)}$ is $\mathfrak{p}_{i+1} = \frac{|\P_{i+1}^{(-1)}(u)|}{|V|}$. Since we may contract many vertices into $u$ during our construction, the probability of choosing $u$ as a starting vertex in \HRLBFS\,${(\HQ_{i+1}(\DCH),\P_{i+1},\dg,\ld)}$ can be significantly larger than the probability of choosing $u$ in \HRLBFS\,${(\HQ_{i}(\DCH), \P_{i}, \dg^*, \ld^*)}$, which is $\mathfrak{p}_i = \frac{|\P_{i}^{(-1)}(u)|}{|V|}$. However, our definition of $\P_{i+1}$ ensures that \begin{displaymath} |\P_{i+1}^{(-1)}(u)| = |\P_{i}^{(-1)}(u)| + \sum_{\text{$x$ adjacent to $u$ in $\HQ_{i}(\DCH)$}: \chi(x) = \chi(v_i)} |\P_{i}^{(-1)}(x)| \enspace. \end{displaymath} Let us notice that if a vertex $x$ of color $\chi(v_i)$ that is adjacent to $u$ in $\HQ_{i}(\DCH)$ is selected as the starting vertex in \HRLBFS\,${(\HQ_i(\DCH), \P_i, \dg^*, \ld^*)}$, which happens with probability $\frac{|\P_{i}^{(-1)}(x)|}{|V|}$, then since (cf. Lemma \ref{lemma:defining-Qi+1}) $x$ is a safe vertex with respect to $\DCH$ and $\HQ_i(\DCH)$, each copy of $\M_i$ in $\HQ_i(\DCH)$ containing vertex $x$ has at least one edge containing also vertex $u$. Therefore, in \HRLBFS\,${(\HQ_i(\DCH), \P_i, \dg^*, \ld^*)}$, we will not only have $x \in L_0$, but also if $\dg = \Omega_{\eps,H}(1)$ is sufficiently large ($\dg > \Hsize$ will suffice), then with probability at least $\frac12$ we will have $u \in L_1$. Summing up over all starting vertices (including $u$), we obtain that $u$ is in $L_0 \cup L_1$ with probability at least $\frac12 \mathfrak{p}_{i+1}$. Now we are ready to complete the analysis and prove Claim \ref{claim:final-prop2}. Let us consider the random process \HRLBFS\,${(\HQ_{i+1}(\DCH), \P_{i+1}, \dg, \ld)}$ selecting vertices and edges to define $L_j$ and $\mathcal{E}_{j+1}$ for $0 \le j \le \ld$. Similarly, let us consider the random process of \HRLBFS\,${(\HQ_i(\DCH), \P_i, \dg^*, 2\ld)}$ selecting vertices and edges to define $L'_j$ and $\mathcal{E}'_{j+1}$ for $0 \le j \le 2\ld$. Notice that $|\bigcup_{j=0}^{\ld} L_j| = \Omega_{\eps,H}(1)$, $|\bigcup_{j=1}^{\ld} \mathcal{E}_j| = \Omega_{\eps,H}(1)$, $|\bigcup_{j=0}^{2\ld} L'_j| = \Omega_{\eps,H}(1)$, $|\bigcup_{j=1}^{2\ld} \mathcal{E}'_j| = \Omega_{\eps,H}(1)$. Suppose that \HRLBD\,${(\HQ_{i+1}(\DCH), \P_{i+1}, \M_{i+1}, \dg, \ld)}$ starts at a vertex $u = \P_{i+1}(v)$ and finds a copy of $\M_{i+1}$ consisting of edges $\e_1, \dots, \e_k$ in $\HQ_{i+1}(\DCH)$, where $k = \Hsize - i$. Then, our analysis above gives that with at most a constant-factor probability loss, \HRLBD\,${(\HQ_{i}(\DCH), \P_{i}, \M_{i}, \dg^*, 2\ld)}$ will have $u$ in $L'_0 \cup L'_1$, and then, for every edge $\e_j$, $1 \le j \le k$, will either have $\e_j \in \bigcup_{t=1}^{2\ld} \mathcal{E}'_t$ or $\e'_{j_1}, \dots, \e'_{j_\ris} \in \bigcup_{t=1}^{2\ld} \mathcal{E}'_t$, where $\e'_{j_1}, \dots, \e'_{j_\ris}$ are sub-equivalent to edges $\e_j$ (this defines a proper coupling, properly taking care of multiple edges equivalent to $\e_j$). Now, since every edge $\e_j$ \begin{compactenum}[\sl (i)] \item either corresponds to an edge in both $\M_{i+1}$ and $\M_i$, or \item corresponds to an edge $\widehat{\e}$ in $\M_{i+1}$ that is modeled by $\widehat{\e'_{j_1}}, \dots, \widehat{\e'_{j_\ris}}$ in $\M_i$, and edges $\e'_{j_1}, \dots, \e'_{j_\ris}$ correspond to the edges $\widehat{\e'_{j_1}}, \dots, \widehat{\e'_{j_\ris}}$, \end{compactenum} we can argue that in that case, \HRLBD\,${(\HQ_{i}(\DCH), \P_{i}, \M_{i}, \dg^*, 2\ld)}$ will find a copy of $\M_i$ (cf. Definition~\ref{def:finding-colored-copies-of-Mi}). Therefore, with only a constant-factor probability loss, if \HRLBD\,${(\HQ_{i+1}(\DCH), \P_{i+1}, \M_{i+1}, \dg, \ld)}$ finds a copy of $\M_{i+1}$ then \HRLBD\,${(\HQ_{i}(\DCH), \P_{i}, \M_{i}, \Hsize \dg, 2\ld)}$ finds a copy of $\M_i$. \end{proof} \section{Extension to families of arbitrary (not necessarily connected) finite graphs} \label{sec:dics-many} Our result in Theorem \ref{thm:main-H-freeness} can be easily extended to allow the \emph{forbidden finite graphs $H$ to be arbitrary}, that is, not necessarily connected. Furthermore, the analysis extends in a straightforward way to the case when one wants to \emph{test if for a given arbitrary finite family $\mathcal{H}$ of finite graphs, the input planar graph $G$ is $\mathcal{H}$-free}, that is, contain no copy of any graph from $\mathcal{H}$. \paragraph{Disconnected $H$.} Notice that when $H$ is not connected, \RLBD\,${(G,H,\dg,\ld)}$ may not be able to find a copy of $H$ in $G$ since it explores only a small connected neighborhood of the randomly sampled starting vertex $v$. However, one can easily extend the tester to be run separately on each connected component of $H$ to do the job. Let us assume that $H$ consists of connected components $\mathfrak{h}_1, \mathfrak{h}_2, \dots, \mathfrak{h}_r$. As in Section \ref{subsubsec:coloring-H}, we color the vertices of $H$ arbitrarily, using $\Hsize$ distinct colors $\{1, 2, \dots, \Hsize\}$, one color for each vertex. Our analysis in Section \ref{sec:exploration-testing-H-free} starts with (an existential) Lemma \ref{lemma:edge-disjoint-copies-H-free} that if $G$ is $\eps$-far from $H$-free, then one can color vertices of $G$ with $\Hsize$ colors $\chi$ such that $G$ has a set of $\Omega_{\eps,H}(|V|)$ edge-disjoint colored copies of $H$. It is easy to see that Lemma \ref{lemma:edge-disjoint-copies-H-free} holds also for disconnected $H$. And so, in particular, for every connected component $\mathfrak{h}_i$ of $H$, there are $\Omega_{\eps,H}(|V|)$ edge-disjoint colored copies of $\mathfrak{h}_i$ with colors of the vertices consistent with the coloring $\chi$ of $G$. Furthermore, since all connected components $\mathfrak{h}_1, \mathfrak{h}_2, \dots, \mathfrak{h}_r$ use distinct colors in $H$, these copies will be edge-disjoint between the copies of $\mathfrak{h}_1, \mathfrak{h}_2, \dots, \mathfrak{h}_r$. Then, for every connected component $\mathfrak{h}_i$ of $H$, we run \RLBD\,${(G,\mathfrak{h}_i,\dg_i,\ld_i)}$, and the identical analysis as in Sections \ref{sec:exploration-testing-H-free} -- \ref{sec:final-proof} concludes that Theorem \ref{thm:main-H-freeness-single-call} holds in the following way: there are positive functions $\dg_i = \dg_i(\eps,\mathfrak{h}_i) = O_{\eps,H}(1)$ and $\ld_i = \ld(\eps,\mathfrak{h}_i) = O_{\eps,H}(1)$, such that for any planar graph $G$ that is $\eps$-far from $H$-free, \RLBD$(G,\mathfrak{h}_i,\dg_i,\ld_i)$ finds a colored copy of $\mathfrak{h}_i$ with probability $\Omega_{\eps,H}(1)$. Since the colored copies of connected components $\mathfrak{h}_1, \mathfrak{h}_2, \dots, \mathfrak{h}_r$ are pairwise disjoint in $G$, this implies that if we run \RLBD\,${(G,\mathfrak{h}_i,\dg_i,\ld_i)}$ for $1 \le i \le r$, with appropriate $\dg_i = O_{\eps,H}(1)$ and $\ld_i = O_{\eps,H}(1)$, then for any planar graph $G$ that is $\eps$-far from $H$-free, we find a colored copy of $H$ with probability $\Omega_{\eps,H}(1)$. Therefore, if we repeat this process $O_{\eps,H}(1)$ many times, we can amplify the error probability and obtain that for any planar graph $G$ that is $\eps$-far from $H$-free, we find a colored copy of $H$ with probability at least $\frac23$. \paragraph{Forbidden family.} Next, we extend our study to test if a given planar graph contains no copy of any forbidden graph from a given finite family of finite graphs. Let $\mathcal{H}$ be an arbitrary finite family of finite graphs (for a given $\eps>0$, we allow the size to be $O_{\eps}(1)$). We say a simple graph $G$ is \emph{$\mathcal{H}$-free} if it is $H$-free for every $H \in \mathcal{H}$; $G$ is \emph{$\eps$-far from $\mathcal{H}$-free} if one has to delete more than $\eps |V|$ edges from $G$ to obtain an $\mathcal{H}$-free graph. This definition implies that since $\mathcal{H}$ is finite, if $G$ is $\eps$-far from $\mathcal{H}$-free, then there is $H \in \mathcal{H}$ such that $G$ is $\eps/|\mathcal{H}|$-far from $H$-free. Let us suppose that $\mathcal{H}$ is an arbitrary finite family of finite graphs. (Note that since $\mathcal{H}$ is a finite family of finite graphs, $|\mathcal{H}| = O_{\eps}(1)$.) Then our analysis above can be easily extended to test with a constant number of queries if a planar graph is $\mathcal{H}$-free. Indeed, let us run a constant query-time $\eps/|\mathcal{H}|$-tester for every $H \in \mathcal{H}$, and reject if any of the tests rejects. Notice that if $G$ is $\mathcal{H}$-free then this tester will accept, and if $G$ is $\eps$-far from $\mathcal{H}$-free then since there is $H \in \mathcal{H}$ such that $G$ is $\eps/|\mathcal{H}|$-far from $H$, the tester will reject $G$ with probability at least $\frac23$. The discussion above can be summarized in the following theorem. \begin{theorem} \label{thm:main-extension} Let $\mathcal{H}$ be an arbitrary collection of (not necessarily connected) finite graphs. Then there is a one-sided error property tester that for any simple planar graph $G$ performs a constant number of queries to the random neighbor oracle and accepts if $G$ is $\mathcal{H}$-free, and with probability at least $\frac23$ rejects if $G$ is $\eps$-far from $\mathcal{H}$-free. \end{theorem} Theorem \ref{thm:main-extension} holds also if $\mathcal{H}$ varies with different $\eps$. That is, if for a given $\eps > 0$, the goal is to test if $G$ is $\mathcal{H}$-free or is $\eps$-far from $\mathcal{H}$-free, for a finite family of graphs $\mathcal{H}$ that may depend on $\eps$. \section{Extending the analysis to minor-free graphs} \label{sec:minor-free} While throughout the paper we focused on testing $H$-freeness of \emph{planar graphs}, our techniques can easily be extended to any \emph{class of minor-free graphs}. Recall that a graph $L$ is called a \emph{minor} of a graph $G$ if $L$ can be obtained from $G$ via a sequence of vertex and edge deletions, and edge contractions. For any graph $L$, a graph $G$ is called \emph{$L$-minor-free} if $L$ is not a minor of $G$. (For example, by Kuratowski's Theorem, a graph is planar if and only if it is $K_{3,3}$-minor-free and $K_5$-minor-free.) Let us fix a graph $L$ and consider the input graph $G$ to be an $L$-minor-free graph. We now argue now that entire analysis presented in the previous sections easily extends to testing $H$-freeness of $G$. The key observation is that our analysis in Sections \ref{sec:outline-proof}--\ref{sec:final-proof} relies only on the following two properties of planar graphs: \begin{enumerate}[\it (i)] \item every minor of a planar graph is planar (cf. Fact \ref{fact:planar_minor_planar}), \item the number of edges in a planar graph is $O(n)$, where $n$ is the number of vertices (cf. Fact \ref{fact:planar_limited_edges}). \end{enumerate} It is known that these two properties hold for any class of $L$-minor-free graphs (that is, the first property would be that every minor of an $L$-minor-free graph is $L$-minor-free). Therefore, we can proceed with nearly identical analysis for $L$-minor-free graphs and arrive at the following version of Theorem \ref{thm:main-H-freeness}. \begin{theorem} \label{thm:main-H-minor-free} Let $L$ be a fixed graph. There are positive functions $f$, $g$, and $h$ such that for any $L$-minor-free-graph $G$: \begin{itemize} \item if $G$ is $H$-free, then \RBE\,$(G,H,\eps)$ accepts $G$, and \item if $G$ is $\eps$-far from $H$-free, then \RBE$(G,H,\eps)$ rejects $G$ with probability at least $0.99$. \end{itemize} \end{theorem} Furthermore, in the same way as in Section \ref{sec:dics-many}, we can extend Theorem \ref{thm:main-extension} to obtain the following. \begin{theorem} \label{thm:main-H-minor-free-extension} Let $L$ be a fixed graph. Let $\mathcal{H}$ be an arbitrary collection of (not necessarily connected) finite graphs. Then there is a one-sided error property tester that for any $L$-minor-free-graph $G$ performs a constant number of queries to the random neighbor oracle and accepts if $G$ is $\mathcal{H}$-free, and with probability at least $\frac23$ rejects if $G$ is $\eps$-far from $\mathcal{H}$-free. \end{theorem} \begin{remark} It should be noted that while our main focus is on the random neighbor oracle model, it is straightforward to extend our testers (and their analysis) for $\mathcal{H}$-freeness to the other three oracle access model presented in Section \ref{subsubsec:oracle}. Indeed, since each of these models can trivially simulate the random neighbor oracle model without any loss in the query complexity, Theorem \ref{thm:main-H-minor-free-extension} (and also Theorems \ref{thm:main-H-freeness} and \ref{thm:main-extension}) holds also for all these oracle access models. However, our main result, the characterization of testable properties in planar graphs, as well as our reduction in Theorem \ref{thm:main-1-sided-reduces-to-H-freeness}, cannot be extended to the other models (see Section \ref{subsubsec:sensitivity-of-the-models}). \end{remark} \section{Conclusions} \label{sec:conclusions} The fundamental problem in the area of property testing is to understand the complexity of testing graph properties in all natural models. One of the central questions here is to provide characterizations of testable graph properties in these models, that is, to determine which graph properties can be tested with constant query complexity. While we have characterizations of graph properties testable in the dense graph model, and some understanding of testable graph properties in the bounded-degree graph model, finding such a characterization in a very natural case of general graphs, without any bounds for their maximum degrees, remains a challenging and elusive open problem. The main result of this paper, Theorem \ref{thm:characterization}, resolves an important natural special case of this open problem, which concerns property testers for planar graphs and for minor-closed graphs with one-sided error in the random neighbor oracle model. \medskip Our main technical, algorithmic contribution significantly extend the approach from \cite{CMOS11} to prove that $H$-freeness is testable with a constant number of queries for general planar graphs. Our result was proven via a new type of analysis of random exploration of planar graphs and their combination of the study of hypergraph representations of contractions in planar graphs. Our analysis easily carries over to classes of graphs defined by general fixed forbidden minors. \medskip Our work is a continuation of our efforts to understand the complexity of testing basic graph properties in graphs with no bounds for the degrees. Indeed, while major efforts in the property testing community have been put to study dense graphs and bounded degree graphs (cf. \cite[Chapter~8-9]{Gol17}), we have seen only limited advances in the study of general graphs, in particular, sparse graphs but without any bounds for the maximum degrees. We believe that this model is one of the most natural models, and it is also most relevant to computer science applications. Similarly as it has been done in \cite[Chapter~10.5.3]{Gol17}, we would advocate further study of this model because of its importance, its applications, and the variety (and beauty) of techniques used to advance this topic. \newcommand{\Proc}{Proceedings of the~} \newcommand{\ALENEX}{Workshop on Algorithm Engineering and Experiments (ALENEX)} \newcommand{\BEATCS}{Bulletin of the European Association for Theoretical Computer Science (BEATCS)} \newcommand{\CCCG}{Canadian Conference on Computational Geometry (CCCG)} \newcommand{\CIAC}{Italian Conference on Algorithms and Complexity (CIAC)} \newcommand{\COCOON}{Annual International Computing Combinatorics Conference (COCOON)} \newcommand{\COLT}{Annual Conference on Learning Theory (COLT)} \newcommand{\COMPGEOM}{Annual ACM Symposium on Computational Geometry} \newcommand{\DCGEOM}{Discrete \& Computational Geometry} \newcommand{\DISC}{International Symposium on Distributed Computing (DISC)} \newcommand{\ECCC}{Electronic Colloquium on Computational Complexity (ECCC)} \newcommand{\ESA}{Annual European Symposium on Algorithms (ESA)} \newcommand{\FOCS}{IEEE Symposium on Foundations of Computer Science (FOCS)} \newcommand{\FSTTCS}{Foundations of Software Technology and Theoretical Computer Science (FSTTCS)} \newcommand{\ICALP}{Annual International Colloquium on Automata, Languages and Programming (ICALP)} \newcommand{\ICCCN}{IEEE International Conference on Computer Communications and Networks (ICCCN)} \newcommand{\ICDCS}{International Conference on Distributed Computing Systems (ICDCS)} \newcommand{\IJCGA}{International Journal of Computational Geometry and Applications} \newcommand{\INFOCOM}{IEEE INFOCOM} \newcommand{\IPCO}{International Integer Programming and Combinatorial Optimization Conference (IPCO)} \newcommand{\ISAAC}{International Symposium on Algorithms and Computation (ISAAC)} \newcommand{\ISTCS}{Israel Symposium on Theory of Computing and Systems (ISTCS)} \newcommand{\JACM}{Journal of the ACM} \newcommand{\LNCS}{Lecture Notes in Computer Science} \newcommand{\PODS}{ACM SIGMOD Symposium on Principles of Database Systems (PODS)} \newcommand{\RANDOM}{International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM)} \newcommand{\RSA}{Random Structures and Algorithms} \newcommand{\SICOMP}{SIAM Journal on Computing} \newcommand{\SODA}{Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)} \newcommand{\SPAA}{Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA)} \newcommand{\STACS}{Annual Symposium on Theoretical Aspects of Computer Science (STACS)} \newcommand{\STOC}{Annual ACM Symposium on Theory of Computing (STOC)} \newcommand{\SWAT}{Scandinavian Workshop on Algorithm Theory (SWAT)} \newcommand{\TALG}{ACM Transactions on Algorithms} \newcommand{\UAI}{Conference on Uncertainty in Artificial Intelligence (UAI)} \newcommand{\WADS}{Workshop on Algorithms and Data Structures (WADS)} \newcommand{\TCS}{Theory of Computing Systems} \renewcommand{\Proc}{{\rm In} Proceedings of the~} \bibliographystyle{IEEEtranS}
\section{Introduction} \label{sec:Introduction} As discussed by Hietarinta \cite{ref:Hietarinta2018} in volume 1 of this book series, Nijhoff and Capel \cite{ref:NijhoffCapel1995}, and Bridgman \cite{ref:Bridgman2018}, nonlinear partial ``discrete or lattice" equations (P$\mathrm{\Delta}$Es), arise in various contexts. They appeared early on in papers by Hirota \cite{ref:HirotaI} covering a soliton preserving discretization of the direct (bilinear) method for nonlinear PDEs (see, e.g., \cite{ref:Hirota2004}). In addition, Miura \cite{ref:Miura1968} and Wahlquist \& Estabrook \cite{ref:Wahlquist1973} indirectly contributed to the development of the theory of P$\mathrm{\Delta}$Es\ through their work on B{\"a}cklund transformations. A major contribution to the study of P$\mathrm{\Delta}$Es\ came from Nijhoff and colleagues \cite{ref:Nijhoff1991,ref:Nijhoff1983,ref:Nijhoff1982}. Under the supervision of Capel, the Dutch research group used a direct linearization method and B{\"a}cklund transformations, in connection with a discretization of the plane wave factor, to derive several P$\mathrm{\Delta}$Es. For a detailed discussion of these methods as well as the seminal classification of scalar P$\mathrm{\Delta}$Es\ by Adler {\em et al.} \cite{ref:Adler2003,ref:BobenkoSuris2002} we refer to recent books on the subject \cite{ref:BobenkoSuris2008,ref:HietarintaJoshiNijhoff2016,ref:Hydon2014,ref:Levietal2011,ref:Levietal2017}. To settle on notation, let us first consider a single {\it scalar} P$\mathrm{\Delta}$E, \begin{equation} \label{eq:PDeltaE_Fu} {\mathcal{F}}(u_{n,m}, u_{n+1,m}, u_{n,m+1}, u_{n+1,m+1}; p, q) = 0, \end{equation} which is defined on a 2-dimensional quad-graph as shown in Fig.~\ref{fig:square} (left). \begin{figure}[h] \centering \centerline{ \includegraphics[width=120mm]{Figure1-CRC-Book-Bridgman-Hereman-2019.pdf} } \caption{The P$\mathrm{\Delta}$E\ is defined on the simplest quadrilateral (a square). single equation or scalar case (left), system or vector case (right).} \label{fig:square} \end{figure} \vskip 1pt \indent The one field variable $x \equiv u_{n,m}$ depends on lattice variables $n$ and $m.$ A shift of $x$ in the horizontal direction (the one-direction) is denoted by $x_1 \equiv u_{n+1,m}$. A shift in the vertical or two-direction by $x_2 \equiv u_{n,m+1}$ and a shift in both directions by $x_{12} \equiv u_{n+1,m+1}.$ Furthermore, the nonlinear function ${\mathcal{F}}$ depends on the lattice parameters $p$ and $q$ which correspond to the edges of the quadrilateral. In our simplified notation \eqref{eq:PDeltaE_Fu} is replaced by \begin{equation} \label{eq:PDeltaE_Fx} {\mathcal{F}}(x, x_{1}, x_{2}, x_{12}; p, q) = 0. \end{equation} Alternate notations are used in the literature. For instance, many authors denote $(x, x_1, x_2, x_{12})$ by $(x, {\tilde{x}},{\hat{x}},{\hat{\tilde{x}}})$ while others use $(x_{00}, x_{10}, x_{01}, x_{11})$. As a well-studied example, consider the integrable lattice version of the potential Korteweg-de Vries equation \cite{ref:NijhoffCapel1995}, written in the various notations: \begin{subequations} \label{eq:intropKdV} \begin{align} (p - q + u_{n,m+1} - u_{n+1,m})(p + q - u_{n+1,m+1} + u_{n,m}) &= p^2 - q^2, \\ (p - q + u_{01} - u_{10})(p + q - u_{11} + u_{00}) &= p^2 - q^2, \\ (p - q + {\hat{u}} - {\tilde{u}})(p + q - {\hat{\tilde{u}}} + u) &= p^2 - q^2,\\ \intertext{or, in the notation used throughout this chapter,} (p - q + x_2 - x_1)(p + q - x_{12} + x) &= p^2 - q^2. \label{eq:simpleKdV} \end{align} \end{subequations} When dealing with systems of P$\mathrm{\Delta}$Es, instead of having one field variable $u_{n,m}$, there are multiple field variables, e.g., $u_{n,m}, v_{n,m},$ and $w_{n,m},$ which we will denote by $x, y, z$. Consequently, the scalar equation \eqref{eq:PDeltaE_Fx} is replaced by a multi-component system involving a {\it vector} function ${\mathbfcal{F}}$ which depends on field variable ${\bf x} \equiv (x, y, z)$ and its shifts denoted by ${\bf x}_1, {\bf x}_2,$ and ${\bf x}_{12}.$ Again, we restrict ourselves to equations defined on the quadrilateral depicted in Fig.~\ref{fig:square} (right) which is the ``vector" version of the figure on the left. We assume that the initial values (indicated by solid circles) for ${\bf x}, {\bf x}_1$ and ${\bf x}_2$ can be specified and that the value of ${\bf x}_{12}$ (indicated by an open circle) can be uniquely determined. To achieve this we require that ${\mathbfcal{F}}$ is {\it affine linear} (multi-linear) in the field variables. Eq.\ \eqref{eq:intropKdV} is an example of a class \cite{ref:Adler2003} of scalar P$\mathrm{\Delta}$Es\ which are consistent around the cube, a property that plays an important role in this chapter. As an example of a system of P$\mathrm{\Delta}$Es, consider the Schwarzian Boussinesq system \cite{ref:Hietarinta2011,ref:Nijhoff1997,ref:Nijhoff1999}, \begin{subequations} \label{E:sBouss} \begin{gather} z y_1 - x_1 + x = 0, \;\; z y_2 - x_2 + x = 0, \;\; \text{ and } \label{E:sBoussE} \\ (z_1 - z_2) z_{12} - \frac{z}{y} \left(p y_1 z_2 - q y_2 z_1\right) = 0, \label{E:sBoussF} \end{gather} \end{subequations} where, for simplicity of notation, $p^3$ and $q^3$ were replaced with $p$ and $q,$ respectively. Eq.\ \eqref{E:sBoussF} is relating the four corners of the quadrilateral. Both equations in \eqref{E:sBoussE} are not defined on the full quadrilateral. Each is restricted to a single edge of the quadrilateral. The first equation is defined on the edge connecting ${\bf x}$ and ${\bf x}_1$; the second on the edge connecting ${\bf x}$ and ${\bf x}_2.$ As we will see in Section~\ref{sec:sBoussLaxPairs}, equations like \eqref{eq:intropKdV} and \eqref{E:sBouss} are very special. Indeed, they are multi-dimensionally consistent; a property which is inherently connected to the existence and derivation of Lax pairs. As in the case of nonlinear partial differential equations (PDEs), one of the fundamental characterizations of {\em integrable} nonlinear P$\mathrm{\Delta}$Es\ is the existence of a Lax pair, i.e., an associated matrix system of two {\em linear} difference equations for an auxiliary vector-valued function. The original nonlinear P$\mathrm{\Delta}$E\ then arises by expressing the compatibility condition of that linear system via a commutative diagram. Lax pairs for P$\mathrm{\Delta}$Es\ first appeared in work by Ablowitz and Ladik \cite{ref:AblowitzLadik1976,ref:AblowitzLadik1977} for a discrete nonlinear Schr\"{o}dinger equation, and subsequently in \cite{ref:Nijhoff1983} for other equations. The existence (and construction) of a Lax pair is closely related to the so-called {\em consistency around the cube} (CAC) property which was (much later) proposed independently by Nijhoff \cite{ref:Nijhoff2002} and Bobenko and Suris \cite{ref:BobenkoSuris2002}. CAC is a special case of {\em multi-dimensional consistency} which is nowadays used as a key criterion to define integrability of P$\mathrm{\Delta}$Es. In contrast to the PDE case, there exists a straightforward, algorithmic approach to derive Lax pairs \cite{ref:BobenkoSuris2002,ref:Nijhoff2002} for scalar P$\mathrm{\Delta}$Es\ that are consistent around the cube, i.e., 3D consistent. The algorithm was presented in \cite{ref:Bridgman2018,ref:Bridgmanetal2013} and has been implemented in {\sc Mathematica} \cite{ref:Bridgman2015}. The implementation of the algorithm for systems of P$\mathrm{\Delta}$Es\ \cite{ref:Bridgman2018,ref:Bridgmanetal2013} is more subtle, in particular, when edge equations are present in the systems. In the latter case, the algorithm produces gauge equivalent Lax matrices which depend on the way the edge constraints are dealt with. As illustrated for \eqref{E:sBouss}, incorporating the edge constraints into the calculation of Lax pairs produces $3$ by $3$ matrices. Not using the edge constraints also leads to valid Lax pairs involving $4$ by $4$ matrices which are gauge-like equivalent with their $3$ by $3$ counterparts. This was first observed \cite{ref:BridgmanHereman2018} when computing Lax pairs for systems of P$\mathrm{\Delta}$Es\ presented in Zhang {\em et al.} \cite{ref:Zhangetal2012}. Using the so-called direct linearization method, Zhang and collaborators have obtained $4$ by $4$ Lax matrices for generalizations of Boussinesq systems derived by Hietarinta \cite{ref:Hietarinta2011}. In Section~\ref{sec:sBoussApplic} we show the gauge-like transformations that connect these Lax matrices with the smaller size ones presented in \cite{ref:Bridgman2018,ref:BridgmanHereman2018}. To keep the article self-contained, in the next section we briefly discuss the concept of {\em gauge-equivalent Lax pairs} for nonlinear PDEs and draw the analogy between the continuous and discrete cases. The rest of the chapter is organized as follows. Section~\ref{sec:Boussinesqsystems} has a detailed discussion of the algorithm to compute Lax pairs with its various options. The leading example is the Schwarzian Boussinesq system for which various Lax pairs are computed. The gauge and gauge-like equivalences of these Lax matrices is discussed in Section~\ref{sec:sBoussGauge}. In Section~\ref{sec:sBoussApplic} the algorithm is applied to the generalized Hietarinta systems featured in \cite{ref:Zhangetal2012}. A summary of the results is given in Section~\ref{sec:sBoussSummary}. The chapter ends with a brief discussion of the software implementation and conclusions in Section~\ref{sec:DiscussionConclusions}. \section{Gauge equivalence of Lax pairs for PDEs and P$\mathrm{\Delta}$Es\ } \label{sec:gaugeequivalence} In this section we show the analogy between Lax pairs for continuous equations (PDEs) and lattice equations (P$\mathrm{\Delta}$Es). We also introduce the concept of gauge equivalence in both cases. \subsection{Lax pairs for nonlinear PDEs} \label{sec:gaugeequivalencePDEs} A completely integrable nonlinear PDE can be associated with a system of linear PDEs in an auxiliary function $\Phi.$ The compatibility of these linear PDEs requires that the original nonlinear PDE is satisfied. Using the matrix formalism described in \cite{ref:AKNS1974}, we can replace a given nonlinear PDE with a linear system, \begin{equation} \label{E:LPcont} \Phi_x = {\bf{X}} \Phi \; \text{ and } \; \Phi_t = {\bf{T}} \Phi, \end{equation} with vector function $\Phi(x,t)$ and unknown matrices ${\bf{X}}$ and ${\bf{T}}.$ Requiring that the equations in \eqref{E:LPcont} are compatible, that is requiring that $\Phi_{xt} = \Phi_{tx},$ readily \cite{ref:Hickmanetal2012} leads to the (matrix) {\it Lax equation} (also known as the zero curvature condition) to be satisfied by the {\it Lax pair} $({\bf{X}}, {\bf{T}})$: \begin{equation} \label{matLaxEq} {\mathbf{X}}_t - {\mathbf{T}}_x + [{\mathbf{X}}, {\mathbf{T}}] \;\;\dot{=}\;\; {\mathbf{0}}, \end{equation} where $[{\mathbf{X}}, {\mathbf{T}}] := {\mathbf{X}} {\mathbf{T}} - {\mathbf{T}} {\mathbf{X}}$ is the matrix commutator and $\dot{=}$ denotes that the equation holds for solutions of the given nonlinear PDE. Finding the {\em Lax matrices} ${\bf{X}}$ and ${\bf{T}}$ for a nonlinear PDE (or system of PDEs) is a nontrivial task for which to date no algorithm is available. Consider, for example, the ubiquitous Korteweg-de Vries (KdV) equation \cite{ref:AblowitzClarkson1991}, \begin{equation} \label{E:kdv} u_t + \alpha \, u u_x + u_{xxx} = 0, \end{equation} where $\alpha$ is any non-zero real constant. It is well known (see, e.g., \cite{ref:Hickmanetal2012}) that \begin{subequations} \label{E:kdvLAX1} \begin{equation} \label{M:kdvX1} {\bf{X}} = \begin{bmatrix} \ 0 & 1 \ \\ & \\ \ \lambda - \frac{1}{6} \alpha \, u & 0 \ \end{bmatrix} \end{equation} and \begin{equation} \label{M:kdvT1} {\bf{T}} = \begin{bmatrix} \ \frac{1}{6} \alpha \, u_x & -4 \lambda - \frac{1}{3} \alpha \, u \ \\ & \\ \ -4\lambda^2 + \frac{1}{3} \alpha \, \lambda \, u + \frac{1}{18} \alpha^2 \, u^2 + \frac{1}{6} \alpha \, u_{xx} & -\,\frac{1}{6}\alpha \, u_x \ \end{bmatrix} \end{equation} \end{subequations} form a Lax pair for \eqref{E:kdv}. In this example $ \Phi = \begin{bmatrix} \psi & \psi_x \end{bmatrix}^{\rm T} $, where ${\rm T}$ denotes the transpose, and $\psi(x,t)$ is the scalar eigenfunction of the Schr\"{o}dinger equation, \begin{equation} \label{KdVLpsi} \psi_{xx} - (\lambda - \tfrac{1}{6} \alpha \, u) \psi = 0, \end{equation} with eigenvalue $\lambda$ and potential proportional to $u(x,t).$ It has been shown \cite[p.\ 22]{ref:FaddeevTakhtajan1987} that if $({\bf{X}},{\bf{T}})$ is a Lax pair, then so is $({\tilde{\bf X}}, {\tilde{\bf T}})$ where \begin{equation} \label{E:PDE-Lax-Eq} \atdm{X} = {\bf{G}}{\bf{X}} {\bf{G}}^{-1} + {\bf{G}}_x {\bf{G}}^{-1} \; \text { and } \; \atdm{T} = {\bf{G}}{\bf{T}} {\bf{G}}^{-1} + {\bf{G}}_t {\bf{G}}^{-1}, \end{equation} for an arbitrary invertible matrix ${\bf{G}}$ of the correct size. The above transformation comes from changing $\Phi$ in \eqref{E:LPcont} into $\tilde{\Phi} = {\bf{G}} \Phi$ and requiring that $ \tilde{\Phi}_x = {\tilde{\bf{X}}} \tilde{\Phi}$ and $ \tilde{\Phi}_t = {\tilde{\bf{T}}} \tilde{\Phi}.$ In physics, transformations like \eqref{E:PDE-Lax-Eq} are called {\em gauge transformations}. Obviously, a Lax pair for a given PDE is not unique. In fact, there exists an infinite number of Lax pairs which are {\em gauge equivalent} through \eqref{E:PDE-Lax-Eq}. In the case of the KdV equation, for example using the gauge matrix \begin{equation} \label{M:PDE-Lax-G} {\bf{G}} = \begin{bmatrix} \ -i k & 1 \ \\ & \\ \ -1 & 0 \ \end{bmatrix}, \end{equation} we see that \eqref{E:kdvLAX1} is gauge equivalent to the Lax pair, \begin{subequations} \label{E:kdvLAX2} \begin{equation} \label{M:kdvX2} {\bf{\tilde{X}}} = \begin{bmatrix} \ -i k & \frac{1}{6}\alpha \, u \ \\ & \\ \ -1 & i k \ \end{bmatrix} \end{equation} and \begin{equation} \label{M:kdvT2} {\bf{\tilde{T}}} = \begin{bmatrix} \ -4 i k^3 + \frac{1}{3} i \alpha \, k \, u - \frac{1}{6} \alpha \, u_x \;\; & \frac{1}{3} \alpha \left( 2 k^2\, u - \frac{1}{6} \alpha \, u^2 + i k \, u_x - \frac{1}{2} u_{xx} \right) \;\; \\ & \\ \ -4 k^2 + \frac{1}{3} \alpha \, u \;\; & 4 i k^3 - \frac{1}{3} i \alpha \, k \, u + \frac{1}{6} \alpha \, u_x \ \end{bmatrix}, \end{equation} \end{subequations} where $\lambda = - k^2.$ The latter Lax matrices are complex matrices. However, in \eqref{M:kdvX2} the eigenvalue $k$ appears in the diagonal entries which is advantageous if one applies the Inverse Scattering Transform (IST) to solve the initial value problem for the KdV equation. \subsection{Lax pairs for nonlinear P$\mathrm{\Delta}$Es\ } \label{sec:gaugeequivalencePDeltaEs} Analogous with the definition of Lax pairs (in matrix form) for PDEs, a Lax pair for a nonlinear P$\mathrm{\Delta}$E\ is a pair of matrices, $(L, M),$ such that the compatibility of the linear system, \begin{equation} \label{LP:matrix} \psi_1 = L \psi \; \text{ and } \; \psi_2 = M \psi, \end{equation} for an auxiliary vector function $\psi$, requires that the nonlinear P$\mathrm{\Delta}$E\ is satisfied. The crux is to find suitable {\em Lax matrices} $L$ and $M$ so that the nonlinear P$\mathrm{\Delta}$E\ can be replaced by \eqref{LP:matrix}. \vspace*{-4mm} \noindent \begin{figure*}[h] \centering \centerline{ \includegraphics[width=50mm]{Figure2-CRC-Book-Bridgman-Hereman-2019.pdf} } \vspace*{-3mm} \caption{Commutative diagram resulting in the Lax equation.} \label{fig:commdiag} \end{figure*} \vspace*{-1mm} \noindent As shown in the (Bianchi-type) commutative diagram depicted in Fig.~\ref{fig:commdiag}, the compatibility of \eqref{LP:matrix} can be readily expressed by shifting both sides of $\psi_1 = L \psi$ in the two-direction, i.e., $\psi_{12} = L_2 \psi_2 = L_2 M \psi$, and shifting $ \psi_2 = M \psi$ in the one-direction, i.e., $\psi_{21} = \psi_{12} = M_1 \psi_1 = M_1 L \psi$, and equating the results. Hence, \begin{equation} \label{matLaxEqdiffeqs} L_2 M - M_1 L \;\; \dot{=} \;\; {0}, \end{equation} where $\dot{=}$ denotes that the equation holds for {\em solutions} of the P$\mathrm{\Delta}$E. In other words, the left-hand side of \eqref{matLaxEqdiffeqs} should generate the P$\mathrm{\Delta}$E\ and not be satisfied automatically as this would result in a ``fake" Lax pair. In analogy to \eqref{matLaxEq}, equation \eqref{matLaxEqdiffeqs} is called the Lax equation (or zero-curvature condition). As in the continuous case, there is an infinite number of Lax matrices, all equivalent to each other under gauge transformations \cite{ref:Bridgmanetal2013}. Specifically, if $(L,M)$ is a Lax pair then so is $({\tilde{L}},{\tilde{M}})$ where \begin{equation} \label{E:DDE-Gauge-Eq} {\tilde{L}} = \mc{G}_1 L \mc{G}^{-1} \; \text{ and } \; {\tilde{M}} = \mc{G}_2 M \mc{G}^{-1}, \end{equation} for any arbitrary invertible matrix $\mc{G}$. Gauge transformation \eqref{E:DDE-Gauge-Eq} comes from setting ${\tilde{\psi}} = \mc{G} \psi$ and requiring that ${\tilde{\psi}}_1 = {\tilde{L}} {\tilde{\psi}}$ and ${\tilde{\psi}}_2 = {\tilde{M}} {\tilde{\psi}}.$ Although \eqref{E:DDE-Gauge-Eq} insures the existence of an infinite number of Lax matrices, it does not say how to find $\mc{G}$ of any two Lax matrices (which might have been derived with different methods). As we shall see, there are systems of P$\mathrm{\Delta}$Es\ with Lax matrices whose gauge equivalence is presently unclear. \section{Derivation of Lax pairs for Boussinesq systems} \label{sec:Boussinesqsystems} \subsection{Derivation of Lax Pairs for the Schwarzian Boussinesq System} \label{sec:sBoussLaxPairs} \vskip 1pt \noindent {\bf Consistency around the cube} \vskip 5pt \noindent The key idea of multi-dimensional consistency is to (i) extend the planar quadrilateral (square) to a cube by artificially introducing a third direction (with lattice parameter $k$) as shown in Fig.~\ref{fig:cube}, (ii) impose copies of the same system, albeit with different lattice parameters, on the different faces and edges of the cube, and (iii) view the cube as a three-dimensional commutative diagram for ${\bf x}_{123}.$ Although not explicitly shown in Fig.~\ref{fig:cube}, parallel edges carry the same lattice parameter. \vspace*{-4mm} \noindent \begin{figure*}[h] \centering \centerline{ \includegraphics[width=60mm]{Figure3-CRC-Book-Bridgman-Hereman-2019.pdf} } \vspace*{-2mm} \caption{The system of P$\mathrm{\Delta}$Es\ holds on each face of the cube.} \label{fig:cube} \end{figure*} \vskip 0.001pt \indent As shown in Fig.~\ref{fig:cube}, the planar quadrilateral is extended into the third dimension where $k$ is the lattice parameter along the edge connecting ${\bf x}$ and ${\bf x}_3.$ Although not explicitly shown in Fig.~\ref{fig:cube}, all parallel edges carry the same lattice parameters. With regard to \eqref{E:sBouss}, we impose that the same equations hold on all faces of the cube. The equations on the {\em{bottom}} face follow from a rotation of the {\em{front}} face along the horizontal axis connecting ${\bf x}$ and ${\bf x}_1.$ Therefore, applying the substitutions ${\bf x}_2 \rightarrow {\bf x}_3, \; {\bf x}_{12} \rightarrow {\bf x}_{13}, \text{ and } q \rightarrow k$ to \eqref{E:sBouss}, yields \begin{subequations} \label{E:sBoussbottom} \begin{gather} z y_1 - x_1 + x = 0, \;\; z y_3 - x_3 + x = 0, \;\; \text{ and } \label{E:sBoussEbottom} \\ (z_1 - z_3) z_{13} - \frac{z}{y} \left(p y_1 z_3 - k y_3 z_1 \right) = 0, \label{E:sBoussFbottom} \end{gather} \end{subequations} which visually corresponds to ``folding" the front face down into the bottom face. Likewise, the equations on the {\em{left}} face can be obtained via a rotation of the {\rm{front}} face along the vertical axis connecting ${\bf x}$ and ${\bf x}_2$ (over ninety degrees counterclockwise from a bird's eye view). This amounts to applying the substitutions ${\bf x}_1 \rightarrow {\bf x}_3, \; {\bf x}_{12} \rightarrow {\bf x}_{23}, \text{ and } p \rightarrow k$ to \eqref{E:sBouss}, yielding \begin{subequations} \label{E:sBoussleft} \begin{gather} z y_3 - x_3 + x = 0, \;\; z y_2 - x_2 + x = 0, \;\; \text{ and } \label{E:sBoussEleft} \\ (z_3 - z_2) z_{23} - \frac{z}{y} \left(k y_3 z_2 - q y_2 z_3 \right) = 0. \label{E:sBoussFleft} \end{gather} \end{subequations} The equations on the {\em{back}} face follow from a shift of \eqref{E:sBouss} in the third direction letting ${\bf x} \rightarrow {\bf x}_3, \; {\bf x}_1 \rightarrow {\bf x}_{13}, \; {\bf x}_2 \rightarrow {\bf x}_{23}, \text{ and } {\bf x}_{12} \rightarrow {\bf x}_{123}.$ Likewise, the equations on the {\em{top}} and {\em{right}} faces follow from \eqref{E:sBoussbottom} and \eqref{E:sBoussleft} by shifts in the two- and one-directions, respectively. Gathering the equations (from all six faces) yields a system of 15 equations (after removing the three duplicates). For example, the five equations that reside on the {\it bottom} face (with corners ${\bf x}, {\bf x}_1, {\bf x}_3$, and ${\bf x}_{13})$ are \begin{subequations} \label{E:sBoussfloorall} \begin{align} & z y_1 - x_1 + x = 0, \label{E:sBoussflooralla} \\ & z y_3 - x_3 + x = 0, \label{E:sBoussfloorallb} \\ & z_3 y_{13} - x_{13} + x_3 = 0, \label{E:sBoussfloorallc} \\ & z_1 y_{13} - x_{13} + x_1 = 0, \label{E:sBoussflooralld} \\ &(z_1 - z_3) z_{13} - \frac{z}{y}\left(p y_1 z_3 - k y_3 z_1 \right) = 0, \label{E:sBoussflooralle} \end{align} \end{subequations} yielding the components of ${\bf x}_{13}$, namely, \begin{subequations} \label{E:sBouss13} \begin{align} x_{13} &= \frac{x_3z_1 - x_1z_3}{z_1 - z_3}, \;\; y_{13} = \frac{x_3 - x_1}{z_1 - z_3}, \; \text{ and } \\ z_{13} &= \frac{z}{y}\left(\frac{p y_1z_3 - k y_3z_1}{z_1 - z_3}\right). \end{align} \end{subequations} Likewise, solving the equations on the front face yields the components of ${\bf x}_{12}$ and the equations on the left face yield the components of ${\bf x}_{23}.$ The components of ${\bf x}_{123}$ can be computed using either the equations on the top face or those on the right or back faces. Multi-dimensional consistency around the cube of the P$\mathrm{\Delta}$E\ system requires that one can uniquely determine ${\bf x}_{123} = (x_{123}, y_{123}, z_{123})$ and that all expressions coincide, no matter which face is used (or, equivalently, no matter which path along the cube is taken to get to the corner ${\bf x}_{123}$). Using straightforward, yet tedious algebra, one can show \cite{ref:Bridgmanetal2013} that \eqref{E:sBouss} is multi-dimensionally consistent around the cube. As discussed in \cite{ref:BobenkoSuris2008}, three-dimensional consistency of a system of P$\mathrm{\Delta}$Es\ establishes its complete integrability for it allows one to algorithmically compute a Lax pair. \vskip 5pt \noindent {\bf Computation of Lax pairs} \vskip 5pt \noindent The derivation of a Lax pair for \eqref{E:sBouss} starts with introducing {\em projective} variables $\fnum{x}, \fnum{y}, \fnum{z}, \fden{x}, \fden{y},$ and $\fden{z}$ by \begin{equation} \label{E:xyzSubs} x_3 = \frac{\fnum{x}}{\fden{x}}, \;\; y_3 = \frac{\fnum{y}}{\fden{y}}, \; \text{ and } \; z_3 = \frac{\fnum{z}}{\fden{z}}. \end{equation} Note that the numerators and denominators of \eqref{E:sBouss13} are linear in $x_3, y_3,$ and $z_3.$ The above fractional transformation allows one to make the top and bottom of $x_{13}, y_{13},$ and $z_{13}$ linear in the projective variables (in the same vein as using fractional transformation to linearize Riccati equations). Substitution of \eqref{E:xyzSubs} into \eqref{E:sBouss13} yields \begin{subequations} \label{E:sBouss13projvars} \begin{align} x_{13} &= \frac{z_1 H f - x_1 F h }{F (z_1 H - h)}, \;\; y_{13} = -\, \frac{H (x_1 F - f)}{F (z_1 H - h)}, \; \text{ and } \\ z_{13} &= -\, \frac{z}{y}\left(\frac{k z_1 H g - p y_1 G h}{G (z_1 H - h)}\right). \end{align} \end{subequations} Achieving the desired linearity requires $F = G = H.$ Then, \eqref{E:sBouss13projvars} becomes \begin{subequations} \label{E:sBouss13projvarssimp} \begin{align} x_{13} &= \frac{z_1\fnum{x} - x_1\fnum{z}}{z_1\fden{x} - \fnum{z}}, \;\; y_{13} = -\, \frac{x_1\fden{x} - \fnum{x}}{z_1\fden{x} - \fnum{z}}, \; \text{ and } \\ z_{13} &= -\, \frac{z}{y}\left(\frac{k z_1\fnum{y} - p y_1\fnum{z}}{z_1 \fden{x} - \fnum{z}}\right), \end{align} \end{subequations} with \begin{equation} \label{E:xyzSubs3} x_3 = \frac{\fnum{x}}{\fden{x}}, \;\; y_3 = \frac{\fnum{y}}{\fden{x}}, \; \text{ and } \; z_3 = \frac{\fnum{z}}{\fden{x}}. \end{equation} How one deals with the remaining variables $f, g, h,$ and $F,$ leads to various alternatives for Lax matrices. \subsubsection{The first alternative} \label{sec:firstAlt1} {\bf Choice 1.}$\;$ Note that the edge equation \eqref{E:sBoussfloorallb} imposes an additional constraint on \eqref{E:xyzSubs3}. Indeed, solving \eqref{E:sBoussfloorallb} for $x_3$ in terms of $y_3$ yields \begin{equation} \label{E:x3y3rel1} x_3 = z y_3 + x. \end{equation} Using $x_3 = \frac{\fnum{x}}{\fden{x}}$ and $y_3 = \frac{\fnum{y}}{\fden{x}}$ one can eliminate $\fnum{x}$ since $\fnum{x} = x \fden{x} + z \fnum{y}$. Eqs.\ \eqref{E:xyzSubs3} and \eqref{E:sBouss13projvarssimp} then become \begin{equation} \label{E:xyzSubsx3} x_3 = \frac{x \fden{x} + z \fnum{y}}{\fden{x}}, \;\; y_3 = \frac{\fnum{y}}{\fden{x}}, \; \text{ and } \; z_3 = \frac{\fnum{z}}{\fden{x}}, \end{equation} and \begin{subequations} \label{E:sBouss13projA} \begin{align} x_{13} & = \frac{\fnum{x}_1}{\fden{x}_1} = \frac{x_1 \fden{x}_1 + z_1\fnum{y}_1}{\fden{x}_1} = \frac{x z_1\fden{x} + z z_1\fnum{y} - x_1\fnum{z}}{z_1\fden{x} - \fnum{z}}, \label{E:sBoussPx13} \\ y_{13} & = \frac{\fnum{y}_1}{\fden{x}_1} = \frac{(x - x_1)\fden{x} + z\fnum{y}}{z_1\fden{x} - \fnum{z}}, \label{E:sBoussPy13} \\ z_{13} & = \frac{\fnum{z}_1}{\fden{x}_1} = -\, \frac{z (k z_1\fnum{y} - p y_1\fnum{z})}{y (z_1\fden{x} - \fnum{z})}, \label{E:sBoussPz13} \end{align} \end{subequations} where $\fden{x}, \fnum{y},$ and $\fnum{z}$ are independent (and remain undetermined). Then, \eqref{E:sBoussPy13} and \eqref{E:sBoussPz13} can be split by setting \begin{subequations} \label{E:sBoussf1a} \begin{align} \fden{x}_1 =\ & t \, ( z_1\fden{x} - \fnum{z} ), \\ \fnum{y}_1 =\ & t \, \big( (x - x_1)\fden{x} + z\fnum{y} \big), \\ \fnum{z}_1 =\ & t \left(- \frac{z}{y} \,(k z_1\fnum{y} - p y_1\fnum{z})\right), \end{align} \end{subequations} where $t({\bf x}, {\bf x}_1; p, k)$ is a scalar function still to be determined. One can readily verify that \eqref{E:sBoussPx13} is identically satisfied. If we define $ \psi_{\rm a} := \begin{bmatrix} \fden{x} & \fnum{y} & \fnum{z} \end{bmatrix}^{\rm T}$, then $\left(\psi_{\rm a} \right)_1 = \begin{bmatrix} \fden{x}_1 & \fnum{y}_1 & \fnum{z}_1 \end{bmatrix}^{\rm T}$, we can write \eqref{E:sBoussf1a} in matrix form $ \left( \psi_{\rm a} \right)_1 = L_{\rm a} \psi_{\rm a},$ with \begin{equation} \label{M:sBoussLa} L_{\rm a} = t \, L_{{\rm a}, {\rm core}} := t \begin{bmatrix} z_1 & 0 & -1 \\ & & \\ x - x_1 & z & 0 \\ & & \\ 0 & -\,\frac{k zz_1}{y} & \frac{p zy_1}{y} \end{bmatrix}. \end{equation} The partner matrix $M_{\rm a}$ of the Lax pair, \begin{equation} \label{M:sBoussMa} M_{\rm a} = s \, M_{{\rm a}, {\rm core}} := s \begin{bmatrix} z_2 & 0 & -1 \\ & & \\ x - x_2 & z & 0 \\ & & \\ 0 & -\,\frac{k zz_2}{y} & \frac{q zy_2}{y} \end{bmatrix}, \end{equation} comes from substituting \eqref{E:xyzSubsx3} into the five equations (similar to \eqref{E:sBoussfloorall}) for the left face of the cube. Formally, this amounts to replacing all indices $1$ by $2$ and $p$ by $q$ in $L_{{\rm a}, {\rm core}}$ (see, e.g., \cite{ref:Bridgmanetal2013} for details). In subsequent examples, the partner matrices $(M)$ will no longer be shown. Using the same terminology as in \cite{ref:Bridgmanetal2013}, $L_{{\rm a}, {\rm core}}$ and $M_{{\rm a}, {\rm core}}$ are the ``core'' of the Lax matrices $L_{\rm a}$ and $M_{\rm a},$ respectively. The label ``a" on $\psi_{\rm a}, L_{\rm a},$ and $M_{\rm a}$ is added to differentiate the entries within each family of Lax matrices (up to trivial permutations of the components). In what follows, alternative choices will be labeled with ``b," ``A", ``B," etc. These matrices come from alternate ways of treating the edge equations. The functions $t({\bf x}, {\bf x}_1; p, k)$ and $s({\bf x}, {\bf x}_2; q, k)$ can be computed algorithmically as shown in \cite{ref:Bridgmanetal2013} or by using the Lax equation \eqref{matLaxEqdiffeqs} directly, as follows, \begin{equation} \label{E:laxEQLM1} \left( t L_{\rm core} \right)_2 (s M_{\rm core}) - \left( s M_{\rm core} \right)_1 (t L_{\rm core}) \!=\! (s\, t_2) \left( L_{\rm core} \right)_2 M_{\rm core} - (t \, s_1) \left( M_{\rm core} \right)_1 L_{\rm core} \,\dot{=}\, 0, \end{equation} which implies that \begin{equation} \label{E:laxEQLM2} \frac{s \, t_2}{t \, s_1} \left( L_{\rm core} \right)_2 M_{\rm core} \;\;\dot{=}\;\; \left( M_{\rm core} \right)_1 L_{\rm core}. \end{equation} After replacing $L_{\rm core}$ and $M_{\rm core}$ by $L_{{\rm a},{\rm core}}$ and $M_{{\rm a},{\rm core}}$ from \eqref{M:sBoussLa} and \eqref{M:sBoussMa}, respectively, in \eqref{E:laxEQLM2}, one gets \begin{equation} \label{E:sBoussst} \frac{s \, t_2}{t \, s_1} \;\; \dot{=}\;\; \frac{z_1}{z_2}, \end{equation} which has an infinite family of solutions. Indeed, the left-hand side of \eqref{E:sBoussst} is invariant under the change \begin{equation} \label{E:stChange} t \rightarrow \frac{i_1}{i} \, t, \quad s \rightarrow \frac{i_2}{i} \, s, \end{equation} where $i({\bf x})$ is an arbitrary function and $i_1$ and $i_2$ denote the shifts of $i$ in the one- and two-direction, respectively. One can readily verify that \eqref{E:sBoussst} is satisfied by, for example, $ s = t = \frac{1}{z}. $ Then, for $\psi_{\rm a} = \begin{bmatrix} \fden{x} & \fnum{y} & \fnum{z} \end{bmatrix}^{\rm T}$, the Lax matrix $L_{\rm a}$ in \eqref{M:sBoussLa} becomes \begin{equation} \label{M:sBoussLaxPairA} L_{\rm a} = \frac{1}{z} \begin{bmatrix} z_1 & 0 & -1 \\ & & \\ x - x_1 & z & 0 \\ & & \\ 0 & -\,\frac{k zz_1}{y} & \frac{p zy_1}{y} \end{bmatrix}. \end{equation} {\bf Choice 2.}$\;$ Solving the edge equation \eqref{E:sBoussfloorallb} for $y_3$, \begin{equation} \label{E:x3y3rel2} y_3 = \frac{x_3 - x}{z}, \end{equation} and using \eqref{E:xyzSubs3} yields $\fnum{y} = -\, \frac{x\fden{x} - \fnum{x}}{z}.$ Then \eqref{E:xyzSubs3} becomes \begin{equation} \label{E:xyzSubsOpt2} x_3 = \frac{\fnum{x}}{\fden{x}}, \;\; y_3 = -\, \frac{x \fden{x} - \fnum{x} }{z\fden{x}}, \; \text{ and } \; z_3 = \frac{\fnum{z}}{\fden{x}}, \end{equation} where $\fden{x}, \fnum{x},$ and $\fnum{z}$ are now independent. Eqs.\ \eqref{E:sBouss13} now become \begin{subequations} \label{E:sBouss13projB} \begin{align} x_{13} &= \frac{\fnum{x}_1}{\fden{x}_1} = \frac{z_1\fnum{x} - x_1\fnum{z}}{z_1\fden{x} - \fnum{z}}, \label{E:sBouss13Bx} \\ y_{13} &= \frac{\fnum{y}_1}{\fden{x}_1} = -\, \frac{x_1\fden{x}_1 - \fnum{x}_1 }{z_1 \fden{x}_1} = -\, \frac{x_1\fden{x} - \fnum{x} }{z_1\fden{x} - \fnum{z}}, \label{E:sBouss13By} \\ z_{13} &= \frac{\fnum{z}_1}{\fden{x}_1} = \frac{k xz_1\fden{x} - k z_1\fnum{x} + p zy_1\fnum{z}}{y(z_1\fden{x} - \fnum{z})}, \label{E:sBouss13Bz} \end{align} \end{subequations} which can be split by selecting \begin{subequations} \label{E:sBoussf1b} \begin{align} \fden{x}_1 =\ & t \, ( z_1\fden{x} - \fnum{z} ), \\ \fnum{x}_1 =\ & t \, ( z_1\fnum{x} - x_1\fnum{z} ), \\ \fnum{z}_1 =\ & t \left( \frac{1}{y} \, (k xz_1\fden{x} - k z_1\fnum{x} + p zy_1\fnum{z}) \right), \end{align} \end{subequations} where $t({\bf x}, {\bf x}_1; p, k)$ is a scalar function still to be determined. Note that \eqref{E:sBouss13By} is identically satisfied. If we define $ \psi_{\rm b} := \begin{bmatrix} \fden{x} & \fnum{x} & \fnum{z} \end{bmatrix}^{\rm T}$, then $\left(\psi_{\rm b} \right)_1 = \begin{bmatrix} \fden{x}_1 & \fnum{x}_1 & \fnum{z}_1 \end{bmatrix}^{\rm T}$, we can write \eqref{E:sBoussf1b} in matrix form, $\left( \psi_{\rm b} \right)_1 = L_{\rm b} \psi_{\rm b},$ with \begin{equation} \label{M:sBoussLb} L_{\rm b} = t \, L_{{\rm b}, {\rm core}} := \frac{1}{z} \begin{bmatrix} z_1 & 0 & -1 \\ & & \\ 0 & z_1 & -x_1 \\ & & \\ \frac{k xz_1}{y} & -\,\frac{k z_1}{y} & \frac{p zy_1}{y} \end{bmatrix}, \end{equation} where we substituted $t = \frac{1}{z}$ which was computed the same way as in Choice 1. Thus, within this first alternative, the two choices of representing the edge constraint result in minimally-sized Lax matrices which we call \textit{representative} Lax matrices for the P$\mathrm{\Delta}$E. \subsubsection{The second alternative} \label{sec:firstAlt2} As a second alternative in the algorithm, we do not use the edge equations to replace \eqref{E:xyzSubs3} by \eqref{E:xyzSubsx3} or \eqref{E:xyzSubsOpt2}. Instead, we incorporate the edge equations \eqref{E:sBoussEbottom} into {\it all three} equations of \eqref{E:sBouss13}. Using \eqref{E:sBoussEbottom}, we replace $x_3$ and $x_1$ in $x_{13}$ and $y_{13}$, and $y_1$ and $y_3$ in $z_{13},$ yielding \begin{subequations} \label{E:xyz13m} \begin{align} \tilde{x}_{13} &= x + \frac{z(y_3z_1 - y_1z_3)}{z_1 - z_3} = \frac{x(z_1 - z_3) + z(y_3z_1 - y_1z_3)}{z_1 - z_3}, \\ \tilde{y}_{13} &= \frac{z(y_3 - y_1)}{z_1 - z_3}, \;\; \text{ and } \;\; \tilde{z}_{13} = \frac{k z_1 (x - x_3) - p z_3 (x - x_1)}{y(z_1 - z_3)}. \end{align} \end{subequations} Note that each of the above expressions has the same denominator $z_1 - z_3$ as in \eqref{E:sBouss13}. Thus, in principle, any equation from \eqref{E:sBouss13} could be replaced by the matching equation from \eqref{E:xyz13m}. \vskip 10pt \noindent {\bf Choice 1.}$\;$ If we take $x_{13}$, $\tilde{y}_{13}$ and $z_{13}$, then substitution of \eqref{E:xyzSubs3} yields \begin{subequations} \label{E:sBouss13projC} \begin{align} x_{13} &= \frac{\fnum{x}_1}{\fden{x}_1} = \frac{z_1\fnum{x} - x_1\fnum{z}}{z_1\fden{x} - \fnum{z}}, \;\; \tilde{y}_{13} = \frac{\fnum{y}_1}{\fden{x}_1} = -\, \frac{z(y_1\fden{x} - \fnum{y})}{z_1\fden{x} - \fnum{z}}, \;\; \text{ and } \\ z_{13} &= \frac{\fnum{z}_1}{\fden{x}_1} = -\, \frac{z (k z_1\fnum{y} - p y_1 \fnum{z})}{y (z_1\fden{x} - \fnum{z})}. \end{align} \end{subequations} Hence, we set \begin{subequations} \label{E:sBoussf1c} \begin{align} \fden{x}_1 =\ & t \, ( z_1\fden{x} - \fnum{z} ), \\ \fnum{x}_1 =\ & t \, ( z_1\fnum{x} - x_1\fnum{z} ), \\ \fnum{y}_1 =\ & t \, \big( -(zy_1\fden{x} - z\fnum{y}) \big), \\ \fnum{z}_1 =\ & t \left( -\frac{z}{y}\,\big(k z_1 \fnum{y} - p y_1\fnum{z}\big) \right), \end{align} \end{subequations} where $t({\bf x}, {\bf x}_1; p, k)$ is a scalar function still to be determined. Defining $\psi := \begin{bmatrix} \fden{x} & \fnum{x} & \fnum{y} & \fnum{z} \end{bmatrix}^{\rm T}$, yields $\psi_1 = \begin{bmatrix} \fden{x}_1 & \fnum{x}_1 & \fnum{y}_1 & \fnum{z}_1 \end{bmatrix}^{\rm T}$. So, we can write \eqref{E:sBoussf1c} as $\psi_1 = L_A \psi,$ with \begin{equation} \label{M:sBoussLc} L_{\rm A} = t \, L_{\rm core} := \frac{1}{z} \, \begin{bmatrix} z_1 & 0 & 0 & -1 \\ & & \\ 0 & z_1 & 0 & -x_1 \\ & & \\ -zy_1 & 0 & z & 0 \\ & & \\ 0 & 0 & -\,\frac{k zz_1}{y} & \frac{p zy_1}{y} \end{bmatrix}, \end{equation} where we have used \eqref{E:laxEQLM1} to get $t = \frac{1}{z}$. Though not obvious at first glance, $L_{\rm a}$ in \eqref{M:sBoussLa} follows from $L_{\rm A}$ after removing the second row and second column and replacing $z y_1$ by $x_1 - x$ using \eqref{E:sBoussEbottom}. Matrices \eqref{M:sBoussLc} and $M_{\rm A}$ (obtained from $L_{\rm A}$ by replacing indices $1$ by $2$ and $p$ by $q$ in $L_{\rm A}$) are a valid Lax pair despite being of larger size than $(L_{\rm a}, M_{\rm a}).$ We refer to these larger-sized Lax matrices as \textit{extended} Lax matrices of P$\mathrm{\Delta}$Es. \vskip 10pt \noindent {\bf Choice 2.}$\;$ If we work with $x_{13}$, $\tilde{y}_{13}$ and $\tilde{z}_{13}$ then substitution of \eqref{E:xyzSubs3} yields \begin{subequations} \label{E:sBouss13projD} \begin{align} x_{13} &= \frac{\fnum{x}_1}{\fden{x}_1} = \frac{z_1\fnum{x} - x_1\fnum{z}}{z_1\fden{x} - \fnum{z}}, \;\; \tilde{y}_{13} = \frac{\fnum{y}_1}{\fden{x}_1} = -\, \frac{zy_1\fden{x} - z\fnum{y}}{z_1\fden{x} - \fnum{z}}, \;\; \text{ and } \\ \tilde{z}_{13} &= \frac{\fnum{z}_1}{\fden{x}_1} = \frac{k xz_1\fden{x} - k z_1\fnum{x} - p (x - x_1)\fnum{z}}{y(z_1\fden{x} - \fnum{z})}. \end{align} \end{subequations} Setting \begin{subequations} \label{E:sBoussf1d} \begin{align} \fden{x}_1 =\ & t \, ( z_1\fden{x} - \fnum{z} ), \\ \fnum{x}_1 =\ & t \, ( z_1\fnum{x} - x_1\fnum{z} ), \\ \fnum{y}_1 =\ & t \, \big( -(zy_1\fden{x} - z\fnum{y}) \big), \\ \fnum{z}_1 =\ & t \left( \frac{1}{y} \,\big( k xz_1\fden{x} - k z_1\fnum{x} - p (x - x_1) \fnum{z} \big) \right), \end{align} \end{subequations} and defining $\psi$ as in Choice 1, yields \begin{equation} \label{M:sBoussLd} L_{\rm B} = t \, L_{\rm core} := \frac{1}{z} \, \begin{bmatrix} z_1 & 0 & 0 & -1 \\ & & \\ 0 & z_1 & 0 & -x_1 \\ & & \\ -zy_1 & 0 & z & 0 \\ & & \\ \frac{k xz_1}{y} & -\,\frac{k z_1}{y} & 0 & -\,\frac{p (x - x_1)}{y} \end{bmatrix}, \end{equation} since $t = \frac{1}{z}$. Thus, $L_{\rm B}$ is another extended Lax pair for the Schwarzian Boussinesq system. Note that $L_{\rm B}$ reduces to $L_{\rm b}$ in \eqref{M:sBoussLb} by removing the third row and third column and replacing $x_1 - x$ by $z y_1$ based on \eqref{E:sBoussEbottom}. \vskip 10pt \noindent {\bf Choices 3 and 4.}$\;$ Repeating the process with other combinations of solutions from \eqref{E:sBouss13} and \eqref{E:xyz13m} results in the following Lax matrices, \begin{equation} \label{M:sBoussXY} L_{\rm C} = \frac{1}{z} \, \begin{bmatrix} z_1 & 0 & 0 & -1\\ xz_1 & 0 & zz_1 & -(x + zy_1)\\ -zy_1 & 0 & z & 0\\ 0 & 0 & -\,\frac{k zz_1}{y} & \frac{p zy_1}{y} \end{bmatrix}, \end{equation} and \begin{equation} \label{M:sBoussZ} L_{\rm D} = \frac{1}{z} \, \begin{bmatrix} z_1 & 0 & 0 & -1\\ 0 & z_1 & 0 & -x_1\,\\ -x_1 & 1 & 0 & 0\\ \frac{k xz_1}{y} & -\,\frac{k z_1}{y} & 0 & \frac{p (x_1 - x)}{y} \end{bmatrix},\\ \end{equation} from working with $\tilde{x}_{13}, \tilde{y}_{13}, z_{13}$ and $x_{13}, y_{13}, \tilde{z}_{13}$, respectively. Obviously $L_{\rm C}$ and $L_{\rm D}$ are trivially related to $L_{\rm a}$ and $L_{\rm b}$, respectively. Indeed, remove the second row and second column in $L_{\rm C}$ and the third row and third column in $L_{\rm D}$ and use $z y_1 = x_1 - x$ to get $L_{\rm a}$ and $L_{\rm b}$, respectively. All other combinations of pieces of \eqref{E:sBouss13} and \eqref{E:xyz13m} do {\it not} lead to matrices that satisfy the defining equation \eqref{matLaxEqdiffeqs}. The second alternative leads to extended Lax matrices but they are not always trivial extensions of the representative Lax matrices. In other words, smaller-size matrices do not necessarily follow from the larger-size matrices by simply removing rows and columns. Furthermore, if the representative Lax matrices were not known it would not be obvious which rows and columns should be removed. As shown in Section \ref{sec:sBoussSummary}, some edge-constrained systems have extended Lax matrices whose ``equivalence" to a representative Lax matrix is non-trivial. In the next section we carefully investigate the connections between the Lax matrices computed with the two alternatives and various choices above. \section{Gauge and gauge-like equivalences of Lax pairs} \label{sec:sBoussGauge} As discussed in Section \ref{sec:gaugeequivalence}, if there exists {\it one} pair of Lax matrices for a given system of P$\mathrm{\Delta}$Es\ then there is an {\it infinite} number of such pairs, all equivalent to each other under discrete gauge transformations of type \eqref{E:DDE-Gauge-Eq} involving a square matrix $\mc{G}.$ Given two distinct Lax pairs with matrices of the same size (no matter how they were computed), it has yet to be shown if there exists a gauge transformation relating them. For edge-constrained systems, the derivation of the gauge transformation between {\it representative} Lax matrices is straightforward. However, the derivation of a gauge-like transformation between Lax matrices of different sizes (resulting from the application of different methods) is nontrivial. In this section we look at gauge and gauge-like transformations in more detail. \subsection{Gauge equivalence} \label{sec:GaugeEquiv} In Section~\ref{sec:firstAlt1} we obtained \eqref{M:sBoussLaxPairA} and \eqref{M:sBoussLb}, resulting from Choices 1 and 2 of dealing with the edge constraints. \vskip 8pt \noindent {\bf Example 1.}$\;$ With regard to \eqref{E:DDE-Gauge-Eq}, computing the gauge matrix $\mc{G}$ such that \begin{equation} \label{E:altGauge1} L_{\rm b} = \mc{G}_1 L_{\rm a} \mc{G}^{-1} \end{equation} is straightforward if we consider the implications of the gauge relationship. Indeed, multiplying \eqref{E:altGauge1} by $\psi_{\rm b},$ and using \eqref{LP:matrix} yields \begin{subequations} \begin{equation} \label{E:altGauge2} \left(\psi_{\rm b} \right)_1 = L_{\rm b} \psi_{\rm b} = (\mc{G}_1 L_{\rm a} \mc{G}^{-1}) \psi_{\rm b}.\\ \end{equation} \end{subequations} Hence, if we set $\displaystyle \psi_{\rm a} = \mc{G}^{-1} \psi_{\rm b},$ we obtain $ \left( \psi_{\rm b} \right)_1 = \mc{G}_1 L_{\rm a} \psi_{\rm a} = \mc{G}_1 \left( \psi_{\rm a} \right)_1 = \left( \mc{G} \psi_{\rm a} \right)_1.$ Thus, $\displaystyle \psi_{\rm b} = \mc{G} \psi_{\rm a}$ determines $\mc{G}$. Not surprisingly, the gauge matrix $\mc{G}$ depends on how we selected the components of $\psi$ which, in turn, depends on how the edge equation \eqref{E:sBoussfloorallb} was treated. Recall that $ \psi_{\rm a} := \begin{bmatrix} \fden{x} & \fnum{y} & \fnum{z} \end{bmatrix}^{\rm T}$ and $ \psi_{\rm b} := \begin{bmatrix} \fden{x} & \fnum{x} & \fnum{z} \end{bmatrix}^{\rm T}.$ Using \eqref{E:xyzSubsx3}, we get \begin{equation} \label{M:sB-GaugeAB} \mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ x & z & 0 \\ 0 & 0 & 1 \end{bmatrix} \;\; \text{ and } \;\; \mc{G}^{-1} = \begin{bmatrix} 1 & 0 & 0 \\ -\,\frac{x}{z} & \frac{1}{z} & 0 \\ 0 & 0 & 1 \end{bmatrix}. \end{equation} Indeed, \begin{equation} \label{M:sB-GaugeEquiv} \mc{G} \psi_{\rm a} = \begin{bmatrix} 1 & 0 & 0 \\ x & z & 0 \\ 0 & 0 & 1 \end{bmatrix} \begin{bmatrix} \fden{x} \\ \fnum{y} \\ \fnum{z} \end{bmatrix} = \begin{bmatrix} \fden{x} \\ x\fden{x} + z\fnum{y} \\ \fnum{z} \end{bmatrix} = \begin{bmatrix} \fden{x} \\ \fnum{x}\\ \fnum{z} \end{bmatrix} = \psi_{\rm b} \end{equation} confirms that $\displaystyle \psi_{\rm b} = \mc{G} \psi_{\rm a}.$ Thus, the representative Lax matrices, \eqref{M:sBoussLaxPairA} and \eqref{M:sBoussLb}, are gauge equivalent, as in \eqref{E:altGauge1}, with $\mc{G}$ in \eqref{M:sB-GaugeAB}. In essence, for Lax matrices of the same sizes, $\mc{G}$ ``represents" the edge constraint in the system of P$\mathrm{\Delta}$Es. Of course, \eqref{E:altGauge1} may also be represented as $ L_{\rm a} = \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, $ where $\displaystyle \bar{\mc{G}} = \mc{G}^{-1}$. \subsection{Gauge-like equivalence} \label{sec:GaugeLikeEquiv} In as much as gauge transformations between the representative Lax matrices of a given system of P$\mathrm{\Delta}$Es\ are straightforward to derive and defined by the corresponding edge equation, the relationship between representative and extended matrices, though still dependent upon the edge equation, is not so obvious. Consider the Schwarzian Boussinesq system \eqref{E:sBouss} which we have shown to have representative Lax matrices, $L_{\rm a}$ and $L_{\rm b}$ (derived in Section~\ref{sec:firstAlt1}) and extended Lax matrices, $L_{\rm A}$, $L_{\rm B}$, $L_{\rm C},$ and $L_{\rm D}$ derived in Section~\ref{sec:firstAlt2}. To determine a relationship between extended Lax matrices (like $L_{\rm A}$) and representative Lax matrices (like $L_{\rm a}$), \eqref{E:altGauge1} must be generalized because the matrices do not have the same sizes. We therefore introduce transformations involving non-square matrices $\mc{H}$ and $\bar{\mc{H}}$ satisfying one of the relationships, \begin{subequations} \label{E:sB-GaugeLikeEq} \begin{align} L_{\rm ext} &= \mc{H}_1 L_{\rm rep} \mc{H}_{{\footnotesize {\rm Left}}}^{-1}, \label{E:sB-GaugeR2E} \\ L_{\rm rep} &= \bar{\mc{H}}_1 L_{\rm ext} \bar{\mc{H}}^{-1}_{{\footnotesize {\rm Right}}}, \label{E:sB-GaugeE2R} \end{align} \end{subequations} where $L_{\rm rep}$ is a representative Lax pair, $L_{\rm ext}$ is an extended Lax pair, and $\mc{H}$ and $\bar{\mc{H}}$ are suitable matrices of appropriate sizes. Furthermore, the labels ``{\rm Left}" and ``{\rm Right}" refer to left and right inverses. In deriving $\mc{H}$ and $\bar{\mc{H}}$ we find that the edge equations again provide guidance. Obviously, matrices like $\mc{H}$ and $\bar{\mc{H}}$ play the role of the gauge matrices but since they are no longer square we call them {\em gauge-like} matrices. Likewise, any of the transformations in \eqref{E:sB-GaugeLikeEq} are called {\em gauge-like} transformations. \vskip 8pt \noindent {\bf Example 2.}$\;$ To illustrate \eqref{E:sB-GaugeR2E}, consider an extended Lax pair with associated vector $\psi$. If we consider the edge constraint expressed as in \eqref{E:xyzSubsOpt2}, then the linearity of $\fnum{y} = -\, \frac{x \fden{x} - \fnum{x}}{z}$ in variables $\fden{x}$ and $\fnum{x}$ allows us to express $\psi$ in terms of $\psi_{\rm b}$ in a simple (unique) way \begin{equation} \label{E:sB-GEquivLa2Lay} \psi = \begin{bmatrix} \fden{x}\\ \fnum{x}\\ \fnum{y}\\ \fnum{z}\end{bmatrix} = \begin{bmatrix} \fden{x}\\ \fnum{x}\\ -\, \frac{x}{z}\fden{x} + \frac{1}{z}\fnum{x}\\ \fnum{z}\end{bmatrix} = \begin{bmatrix} 1&0&0\\ 0&1&0\\ -\frac{x}{z}&\frac{1}{z}&0\\ 0&0&1\end{bmatrix} \begin{bmatrix} \fden{x}\\ \fnum{x}\\ \fnum{z}\end{bmatrix} := \mc{H} \psi_{\rm b}, \end{equation} defining the matrix $\mc{H}.$ Since rank $\mc{H} = 3$, matrix $\mc{H}$ has a 3-parameter family of left inverses, \begin{equation} \mc{H}_{{\footnotesize {\rm Left}}, all}^{-1} = \begin{bmatrix} 1-\alpha x & \alpha & -\alpha z & 0 \\ (1-\beta) x & \beta & (1-\beta) z & 0 \\ -\gamma x & \gamma & -\gamma z & 1 \end{bmatrix}, \end{equation} where $\alpha$, $\beta$ and $\gamma$ are free parameters (which could depend on ${\bf{x}}$). Now we take a specific member of the family (denoted by $\mc{H}_{{\footnotesize {\rm Left}}}^{-1})$ so that \begin{equation} \label{E:G-B2AxyNew1} L_{\rm C} \;\;\dot{=}\;\; \mc{H}_1 L_{\rm b} \mc{H}_{{\footnotesize {\rm Left}}}^{-1}, \end{equation} where, as before, $\dot{=}$ indicates equality when evaluated against the given P$\mathrm{\Delta}$Es. More precisely, equality only holds when edge equation \eqref{E:sBoussflooralla} is used. A straightforward matrix multiplication shows that \eqref{E:G-B2AxyNew1} holds if $\alpha = \beta = \gamma = 0$. Hence, \begin{equation} \label{E:G-B2AxyNew2} \mc{H}_{{\footnotesize {\rm Left}}}^{-1} = \begin{bmatrix} 1&0&0&0\\ x&0&z&0\\ 0&0&0&1\end{bmatrix}. \end{equation} Instead of \eqref{E:altGauge1} we now have \eqref{E:G-B2AxyNew1}, i.e., a transformation of type \eqref{E:sB-GaugeR2E}, which can readily be verified. Indeed, repeatedly using \eqref{E:G-B2AxyNew1}, \eqref{E:sB-GEquivLa2Lay}, and \eqref{LP:matrix}, yields \begin{equation} \label{E:altGaugeAC} \psi_1 = L_{\rm C} \psi = \mc{H}_1 L_{\rm b} \mc{H}^{-1}_{\rm Left} \mc{H} \psi_{\rm b} = \mc{H}_1 L_{\rm b} \psi_{\rm b} = \mc{H}_1 \left( \psi_{\rm b} \right)_1 = \Big( \mc{H} \psi_{\rm b} \Big)_1, \end{equation} confirming \eqref{E:sB-GEquivLa2Lay}. \vskip 8pt \noindent {\bf Example 3.}$\;$ After similar calculations involving $\psi_{\rm a} = \begin{bmatrix} \fden{x} & \fnum{y} & \fnum{z} \end{bmatrix}^{\rm T}$ and $\psi$, and with the edge constraint expressed as in \eqref{E:xyzSubsx3}, i.e., $\fnum{x} = x \fden{x} + z \fnum{y}$, we find that \begin{equation} \label{M:G-A2Bz} L_{\rm D} \;\;\dot{=}\;\; \mc{H}_1 L_{\rm a} \mc{H}_{{\footnotesize {\rm Left}}}^{-1}, \end{equation} where \begin{equation} \label{M:G-A2BzH} \mc{H} = \begin{bmatrix} 1&0&0\\ x&z&0\\ 0&1&0\\ 0&0&1\end{bmatrix} \;\;\text{ and }\;\; \mc{H}_{{\footnotesize {\rm Left}}}^{-1} = \begin{bmatrix} 1&0&0&0\\ -x/z&1/z&0&0\\ 0&0&0&1\end{bmatrix}. \end{equation} \vskip 8pt \noindent {\bf Example 4.}$\;$ A first gauge-like relationship between $L_{\rm a}$ and $L_{\rm A}$ is simple to derive. As mentioned in Choice 1 in Section~\ref{sec:firstAlt2}, removing the second row and second column from $L_{\rm A}$ gives $L_{\rm a}$. Formally, \begin{equation} \label{E:sB-gaugeP2Pa-1bis} L_{\rm a} \;\;\dot{=}\;\; \mc{B} L_{\rm A} \mc{B}^{\rm T}, \end{equation} with $z y_1 = x_1 - x$ and \begin{equation} \label{E:matB} \mc{B} = \begin{bmatrix} 1&0&0&0\\ 0&0&1&0\\ 0&0&0&1 \end{bmatrix}. \end{equation} Continuing with $L_{\rm a}$ and $L_{\rm A}$, we derive a second gauge-like transformation to illustrate \eqref{E:sB-GaugeE2R}. To find a matrix $\bar{\mc{H}}$, consider the edge constraint $\fnum{y} = -\, \frac{x \fden{x} - \fnum{x}}{z}$ expressed in \eqref{E:xyzSubsOpt2}. Thus, \begin{equation} \label{E:sB-gaugeP2Pa-2} \psi_{\rm a} = \begin{bmatrix} \fden{x}\\ \fnum{y}\\ \fnum{z}\end{bmatrix} = \begin{bmatrix} \fden{x}\\ -\frac{x}{z}\fden{x} + \frac{1}{z}\fnum{x} \\ \fnum{z}\end{bmatrix} = \begin{bmatrix} 1 & 0 & 0 & 0\\ -\,\frac{x}{z} & \frac{1}{z} & 0 & 0\\ 0 & 0 & 0 & 1 \\ \end{bmatrix} \begin{bmatrix} \fden{x}\\ \fnum{x}\\ \fnum{y}\\ \fnum{z}\end{bmatrix} := \bar{\mc{H}}\psi. \end{equation} The inverse transformation, \begin{equation} \label{E:sB-gaugePa2P} \psi = \begin{bmatrix} \fden{x}\\ \fnum{x}\\ \fnum{y}\\ \fnum{z}\end{bmatrix} = \begin{bmatrix} \fden{x} \\ x \fden{x} + z \fnum{y}\\ \fnum{y}\\ \fnum{z} \end{bmatrix} = \begin{bmatrix} 1 & 0 & 0 \\ x & z & 0 \\ 0 & 1 & 0\\ 0 & 0 & 1 \end{bmatrix} \begin{bmatrix} \fden{x}\\ \fnum{y}\\ \fnum{z}\end{bmatrix} := \bar{\mc{H}}_{{\footnotesize {\rm Right}}}^{-1} \psi_{\rm a}, \end{equation} determines a suitable right inverse of $\bar{\mc{H}}.$ Thus, \begin{equation} \label{M:sB-GaugeEquivCB} L_{\rm a} = \bar{\mc{H}}_1 L_{\rm A} \bar{\mc{H}}^{-1}_{{\footnotesize {\rm Right}}} \;\;\text{ for }\;\; \bar{\mc{H}} = \begin{bmatrix} 1&0&0&0\\ -\, \frac{x}{z} & \frac{1}{z} &0&0\\ 0&0&0&1 \end{bmatrix}, \end{equation} without having to use the edge equation \eqref{E:sBoussflooralla}. To show that \eqref{M:sB-GaugeEquivCB} is correct, use \eqref{LP:matrix} repeatedly, together with \eqref{E:sB-gaugePa2P} and \eqref{M:sB-GaugeEquivCB}, yielding \begin{equation} \label{E:altGaugeACalter} \left( \psi_{\rm a} \right)_1 = L_{\rm a} \psi_{\rm a} = {\bar{\mc{H}}}_1 L_{\rm A} {\bar{\mc{H}}}^{-1}_{\rm Right} \psi_{\rm a} = {\bar{\mc{H}}}_1 L_{\rm A} \psi = {\bar{\mc{H}}}_1 \psi_1 = \Big( {\bar{\mc{H}}} \psi \Big)_1, \end{equation} confirming \eqref{E:sB-gaugeP2Pa-2}. \vskip 8pt \noindent {\bf Example 5.}$\;$ Interestingly, gauge transformations between two distinct extended Lax matrices for a P$\mathrm{\Delta}$E\ are not as straightforward. For example, a gauge transformation has not yet been found for Lax matrices $L_{\rm A}$ and $L_{\rm B}$ given in \eqref{M:sBoussLc} and \eqref{M:sBoussLd}. Thus, even though we have shown that the corresponding representative Lax matrices are gauge equivalent, we have not been able to show the same for the corresponding extended matrices. \section{Application to generalized Hietarinta systems} \label{sec:sBoussApplic} In \cite{ref:Hietarinta2011}, Hietarinta presented the results of a search of multi-component equations which are edge-constrained and obey the property of multidimensional consistency. That search led to various generalized Boussinesq-type systems, nowadays called the Hietarinta A-2, B-2, C-3, and C-4 systems. Bridgman {\em et al.} \cite{ref:Bridgmanetal2013} derived their corresponding Lax pairs using \cite{ref:Bridgman2015}. Simultaneously, Zhang {\em et al.} \cite{ref:Zhangetal2012} showed that each of the lattice systems presented in \cite{ref:Hietarinta2011} can be further generalized based on a direct linearization scheme \cite{ref:Nijhoffetal1992} in connection with a more general dispersion law. The systems considered in \cite{ref:Hietarinta2011} are then shown to be special cases. In fact, they are connected to the more general cases through point transformations. As a by-product of the direct linearization method, Zhang {\em et al.} \cite{ref:Zhangetal2012} obtained the Lax pairs of each of these generalized Boussinesq systems. No doubt, they are all valid Lax pairs but some of the matrices have larger than needed sizes. Using the algorithmic CAC approach discussed in Section~\ref{sec:Boussinesqsystems}, we were able to derive Lax pairs of minimal matrix sizes for these systems and unravel the connections with the Lax matrices presented in \cite{ref:Zhangetal2012}. Full details of that investigation will be published elsewhere \cite{ref:BridgmanHereman2018} but their Lax matrices are given in the next section. \section{Summary of results} \label{sec:sBoussSummary} \subsection{Lattice Boussinesq system} \label{sec:BoussGaugeEquivalence} The lattice Boussinesq system \cite{ref:Tongas2005} is given by \begin{equation} \label{E:Bouss} \begin{aligned} & z_1 - xx_1 + y = 0, \;\; z_2 - xx_2 + y = 0, \; \text{ and } \\ & (x_2 - x_1)(z - xx_{12} + y_{12}) - p + q = 0. \end{aligned} \end{equation} Edge constraint $\displaystyle x_1 = \frac{z_1 + y}{x}$ implies that $\displaystyle x_3 = \frac{z_3 + y}{x}$. Here, \begin{equation} \label{E:Bouss13cc} \begin{aligned} x_{13} &= \frac{y_1 - y_3}{x_1 - x_3}, \;\; y_{13} = \frac{x(y_1 - y_3) - z(x_1 - x_3) + k - p}{x_1 - x_3}, \;\; \text{ and } \\ z_{13} &= \frac{x_3y_1 - x_1y_3}{x_1 - x_3}. \end{aligned} \end{equation} Variants of \eqref{E:Bouss13cc} may be derived by incorporating edge constraints yielding \begin{equation} \label{E:Bouss13A} \begin{aligned} \tilde{x}_{13} &= \frac{x(y_1 - y_3)}{z_1 - z_3}, \;\; \tilde{y}_{13} = \frac{x\Big(k - p + x(y_1 - y_3)\Big) - z(z_1 - z_3)}{z_1 - z_3}, \; \text{ and } \\ \tilde{z}_{13} &= \frac{y(y_1 - y_3) + (y_1z_3 - y_3z_1)}{z_1 - z_3}. \end{aligned} \end{equation} Using the algorithm of Section~\ref{sec:Boussinesqsystems}, we computed $3$ by $3$ Lax matrices which are presented in Table 1 together with the gauge transformations. For $L_{\rm a}$ one has $\frac{s \, t_2}{t \, s_1} \;\dot{=}\; 1,$ which is satisfied for $t = s = 1.$ For $L_{\rm b}$ one obtains $\frac{s \, t_2}{t \, s_1} \;\dot{=}\; \frac{x_1}{x_2},$ hence, $t = s = \frac{1}{x}.$ Using only \eqref{E:Bouss13cc} with \eqref{E:xyzSubs} yields a $4$ by $4$ Lax matrix (not shown) that is trivially associated with $L_{\rm a}$. Similarly, using only \eqref{E:Bouss13A} again with \eqref{E:xyzSubs} gives a $4$ by $4$ Lax matrix (not shown) which is trivially associated with $L_{\rm b}$. \vfill \newpage \begin{longtable}{lcl} \caption{Boussinesq system Lax pairs and gauge matrices} \label{T:Bouss}\\ \toprule[1pt] Substitutions & $\psi$ & Matrices $L$ of Lax pair \\ \midrule \multicolumn{3}{l}{Writing the edge constraint as $\displaystyle z_3 = xx_3 - y$ yields}\\ \addlinespace[1em] \parbox{4.5cm}{ $\begin{aligned} x_3 &= \frac{f}{F},\ \ y_3 = \frac{g}{F}, \\ z_3 &= -\frac{y F - x f}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm a} = \begin{bmatrix} F\\ f\\ g\end{bmatrix}$ } & \parbox{5.5cm}{ $\hfill \displaystyle L_{\rm a} = \begin{bmatrix} -x_1 & 1 & 0\\ -y_1 & 0 & 1\\ \ell_{31} & -z & x \end{bmatrix}$,}\\ \addlinespace[1em] \multicolumn{3}{l}{ where $\ell_{31} = zx_1 - xy_1 + p - k$.} \\ \addlinespace[0.9em] \midrule \multicolumn{3}{l}{Writing the edge constraint as $x_3 = \frac{z_3 + y}{x}$ yields}\\ \parbox{4.5cm}{ $\begin{aligned} x_3 &= \frac{y F + h }{xF}, \\ y_3 &= \frac{g}{F},\ \ z_3 = \frac{h}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm b} = \begin{bmatrix} F\\ g\\ h\end{bmatrix}$ } & \parbox{5.5cm}{ $\hfill \displaystyle L_{\rm b} = \frac{1}{x}\, \begin{bmatrix} y - xx_1 & 0 & 1\\ \ell_{21} & x^2 & -z\\ -yy_1 & xx_1 & -y_1 \end{bmatrix}$, } \\ \addlinespace[1em] \multicolumn{3}{l}{ where $\ell_{21} = x(p - k - xy_1) - z(y - xx_1)$. } \\ \addlinespace[0.9em] \midrule \multicolumn{3}{l}{Gauge transformations for $L_{\rm a}$ and $L_{\rm b}$ are given by }\\ \addlinespace[1em] \multicolumn{3}{l}{\parbox{12.5cm}{ \begin{tabular}{p{5.5cm} p{3.5cm} p{3.5cm}} $\begin{aligned} L_{\rm b} &= \mc{G}_1 L_{\rm a} \mc{G}^{-1}, \psi_{\rm b} = \mc{G} \psi_{\rm a}, \\ L_{\rm a} &= \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, \psi_{\rm a} = \bar{\mc{G}} \psi_{\rm b}, \end{aligned}$ & $\mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ 0 & 0 & 1 \\ -y & x & 0 \end{bmatrix} $ & \hfill $\bar{\mc{G}} = \begin{bmatrix} 1 & 0 & 0 \\ \frac{y}{x} & 0 & \frac{1}{x} \\ 0 & 1 & 0 \end{bmatrix}. $ \\ \multicolumn{3}{l}{where $\bar{\mc{G}} = \mc{G}^{-1}$.} \end{tabular} } } \\ \addlinespace[0.8em] \bottomrule[1pt] \end{longtable} \vspace*{1mm} \noindent \subsection{Schwarzian Boussinesq system} \label{sec:SBoussGaugeEquivalence} The Schwarzian Boussinesq system \cite{ref:Hietarinta2011,ref:Nijhoff1997,ref:Nijhoff1999} is given by \begin{equation} \label{E:SBouss} \begin{aligned} &z y_1 - x_1 + x = 0,\;\; z y_2 - x_2 + x = 0, \;\; \text{ and } \\ & (z_1 - z_2) z_{12} - \frac{z}{y}\left(p y_1 z_2 - q y_2 z_1\right) = 0. \end{aligned} \end{equation} Edge constraint $\displaystyle x_1 = z y_1 + x$ leads to $\displaystyle x_3 = z y_3 + x$. Hence, \begin{equation} \label{E:SBouss13cc} \begin{aligned} x_{13} &= \frac{x_3z_1 - x_1z_3}{z_1 - z_3}, \;\; y_{13} = \frac{x_3 - x_1}{z_1 - z_3}, \; \text{ and } \\ z_{13} &= \frac{z}{y}\left(\frac{p y_1z_3 - k y_3z_1}{z_1 - z_3}\right). \end{aligned} \end{equation} After incorporating edge constraints, variants of \eqref{E:SBouss13cc} are \begin{equation} \label{E:SBouss13sA} \begin{aligned} \tilde{x}_{13} &= \frac{x(z_1 - z_3) + z(y_3z_1 - y_1z_3)}{z_1 - z_3}, \;\; \tilde{y}_{13} = \frac{z(y_3 - y_1)}{z_1 - z_3}, \;\; \text{ and } \\ \tilde{z}_{13} &= \frac{k z_1(x - x_3) - p z_3(x - x_1)}{y(z_1 - z_3)}. \end{aligned} \end{equation} % The $3$ by $3$ matrices computed in Section~\ref{sec:Boussinesqsystems} are summarized in Table 2 together with the gauge transformations that connect them. For the representative and extended Lax matrices given below we obtained $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; \frac{z_1}{z_2},$ which holds when $t = s = \frac{1}{z}.$ \begin{longtable}{lcl} \caption{Schwarzian Boussinesq system Lax pairs and gauge matrices} \label{T:SBouss}\\ \toprule[1pt] Substitutions & $\psi$ & Matrices $L$ of Lax pair \\ \midrule \multicolumn{3}{l}{Writing the edge constraint as $x_3 = zy_3 + x$ yields}\\ \addlinespace[1em] \parbox{4cm}{ $\begin{aligned} x_3 &= \frac{xF + zg}{F}, \\ y_3 &= \frac{g}{F}, \ \ z_3 = \frac{h}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm a} = \begin{bmatrix} F\\ g\\ h\end{bmatrix}$ } & \parbox{6cm}{ \hfill $\displaystyle L_{\rm a} = \frac{1}{z}\begin{bmatrix} z_1 & 0 & -1\\ x - x_1 & z & 0\\ 0 & -\,\frac{k zz_1}{y} & \frac{p zy_1}{y} \end{bmatrix}$.} \\ \addlinespace[1em] \midrule \multicolumn{3}{l}{Writing the edge constraint as $y_3 = \frac{x_3 - x}{z}$ yields}\\ \addlinespace[1em] \parbox{4cm}{ $\begin{aligned} x_3 &= \frac{f}{F},\ \ z_3 = \frac{h}{F}, \\ y_3 &= -\frac{xF - f}{zF}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm b} = \begin{bmatrix} F\\ f\\ h\end{bmatrix}$ } & \parbox{6cm}{\hfill $\displaystyle L_{\rm b} = \frac{1}{z}\begin{bmatrix} z_1 & 0 & -1\\ 0 & z_1 & -x_1\\ \frac{k xz_1}{y} & -\,\frac{k z_1}{y} & \frac{p zy_1}{y} \end{bmatrix}$.} \\ \addlinespace[1em] \midrule \multicolumn{3}{l}{Gauge transformations for $L_{\rm a}$ and $L_{\rm b}$ are given by}\\ \multicolumn{3}{l}{\parbox{12.5cm}{ \begin{tabular}{p{5.5cm} p{3.5cm} p{3.5cm}} $\begin{aligned} L_{\rm b} &= \mc{G}_1 L_{\rm a} \mc{G}^{-1}, \psi_{\rm b} = \mc{G} \psi_{\rm a}, \\ L_{\rm a} &= \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, \psi_{\rm a} = \bar{\mc{G}} \psi_{\rm b}, \end{aligned}$ & $\mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ x & z & 0 \\ 0 & 0 & 1 \end{bmatrix} $ & \hfill $\bar{\mc{G}} = \begin{bmatrix} 1 & 0 & 0 \\ -\,\frac{x}{z} & \frac{1}{z} & 0 \\ 0 & 0 & 1 \end{bmatrix}, $ \\ \multicolumn{3}{l}{where $\bar{\mc{G}} = \mc{G}^{-1}$.} \end{tabular} } } \\ \addlinespace[1em] \bottomrule[1pt] \end{longtable} \vskip 3pt \noindent System \eqref{E:SBouss} also admits the extended Lax matrices, \begin{equation} \!\!\!\!L_{\rm A} \!=\! \frac{1}{z}\! \begin{bmatrix}\! z_1 & 0 & 0 & -1\\ 0 & z_1 & 0 & -x_1\\ -zy_1 & 0 & z & 0\\ 0 & 0 & -\frac{k zz_1}{y} & \frac{p zy_1}{y}\!\! \end{bmatrix} \,\text{ and }\, L_{\rm B} \!=\! \frac{1}{z}\! \begin{bmatrix}\! z_1 & 0 & 0 & -1\\ 0 & z_1 & 0 & -x_1\\ -zy_1 & 0 & z & 0\\ \frac{k xz_1}{y} & -\frac{k z_1}{y} & 0 & -\frac{p (x-x_1)}{y}\!\! \end{bmatrix}\!\!, \end{equation} when considering the edge-modified forms of $y_{13}$, and of $y_{13}$ and $z_{13}$, respectively; and \begin{equation} \!\!\!\!L_{\rm C} \!=\! \frac{1}{z}\!\! \begin{bmatrix}\! z_1 & 0 & 0 & -1\\ xz_1 & 0 & zz_1 & -(x + z y_1)\!\\ -zy_1 & 0 & z & 0\\ 0 & 0 & -\frac{k zz_1}{y} & \frac{p zy_1}{y}\!\! \end{bmatrix}\! \text{ and } L_{\rm D} \!=\! \frac{1}{z}\!\! \begin{bmatrix}\! z_1 & 0 & 0 & -1\\ 0 & z_1 & 0 & -x_1\\ -x_1 & 1 & 0 & 0\\ \frac{k xz_1}{y} & -\frac{k z_1}{y} & 0 & \frac{p (x_1 - x)}{y}\!\! \end{bmatrix}\!\!, \end{equation} when considering the edge-modified forms of $x_{13}$ and $y_{13}$, and of $z_{13}$, respectively. All other combinations of \eqref{E:SBouss13cc} and \eqref{E:SBouss13sA} result in matrices which do not satisfy the defining equation \eqref{matLaxEqdiffeqs}. \subsection{Generalized Hietarinta systems} \label{sec:genHietsys} In \cite{ref:Zhangetal2012}, the authors introduced generalizations of Hietarinta's systems \cite{ref:Hietarinta2011} by considering a general dispersion law, \begin{equation} \label{E:disprel} \mathbb{G}(\omega, \kappa) := \omega^3 - \kappa^3 + \alpha_2(\omega^2 - \kappa^2) + \alpha_1(\omega - \kappa), \end{equation} where $\alpha_1$ and $\alpha_2$ are constant parameters. For example, for the special case $a = \alpha_1 = \alpha_2 = 0,$ one gets $\mathbb{G}(-p, -a) = -p^3$ and $\mathbb{G}(-q, -a) = -q^3.$ Then \eqref{E:gHA2} (below) reduces to Hietarinta's original A-2 system in \cite[p.\ 95]{ref:HietarintaJoshiNijhoff2016}. The term with coefficient $b_0$ could be removed by a simple transformation \cite{ref:Hietarinta2011}. We will keep it to cover the most general case. In \cite{ref:Bridgmanetal2013,ref:Hietarinta2011}, $p^3$ and $q^3$ are identified with $p$ and $q,$ respectively. The explicit form of $\mathbb{G}(\omega, \kappa)$ in \eqref{E:disprel} is not needed \cite{ref:BridgmanHereman2018} to compute Lax pairs. However, for the B-2 system the condition \begin{equation} \label{E:dispRelConstB2} \mathbb{G}(-p, -k) + \mathbb{G}(-k, -q) = \mathbb{G}(-p, -q) \end{equation} {\it must hold} for 3D consistency and, consequently, for the computation of Lax pairs. Zhang {\em et al.} \cite{ref:Zhangetal2012} computed $4$ by $4$ Lax matrices for these generalized systems with the direct linearization method. By incorporating the edge equations (as shown in Section~\ref{sec:Boussinesqsystems}), we were able to find $3$ by $3$ matrices which are presented in this section. Computational details will appear in a forthcoming paper \cite{ref:BridgmanHereman2018}. \subsubsection{Generalized Hietarinta A-2 system} \label{sec:gHA2GaugeEquivalence} The generalized Hietarinta A-2 system \cite{ref:Zhangetal2012} is given by \begin{equation} \label{E:gHA2} \begin{aligned} &z x_1 - y_1 - x = 0, \;\; z x_2 - y_2 - x = 0, \;\;\text{ and } \\ &y - x z_{12} + b_0 x + \frac{\mathbb{G}(-p,-a) x_1 - \mathbb{G}(-q, -a) x_2}{z_2 - z_1} = 0. \end{aligned} \end{equation} From edge constraint $\displaystyle x_1 = \frac{x + y_1}{z}$ one gets $\displaystyle x_3 = \frac{x + y_3}{z}$. Here, \begin{equation} \label{E:gHA213cc} \begin{aligned} x_{13} &= \frac{x_1 - x_3}{z_1 - z_3}, \;\; y_{13} = \frac{x_1 z_3 - x_3 z_1}{z_1 - z_3}, \;\; \text{ and} \\ z_{13} &= \frac{(y + b_0 x) (z_1 - z_3) + \mathbb{G}(-k,-a) x_3 - \mathbb{G}(-p,-a) x_1}{x (z_1 - z_3)}. \end{aligned} \end{equation} The $3$ by $3$ Lax matrices are presented in Table 3, together with the gauge transformations that connect them. For $L_{\rm a}$ one has $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; \frac{z_1}{z_2},$ hence, $t = s = \frac{1}{z}$. For $L_{\rm b}$ we set $t = s = 1$ since $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; 1$. Alternative forms of \eqref{E:gHA213cc} (after incorporating edge constraints) are \begin{equation} \label{E:gHA213sA} \begin{aligned} \tilde{x}_{13} &= \frac{y_1 - y_3}{z(z_1 - z_3)}, \;\; \tilde{y}_{13} = - \left( \frac{x}{z} + \frac{y_3 z_1 - y_1 z_3}{z(z_1 - z_3)} \right), \;\; \text{ and} \\ \tilde{z}_{13} &= \frac{y + b_0x}{x} + \frac{ \mathbb{G}(-k,-a)(x + y_3) - \mathbb{G}(-p,-a)(x + y_1)}{xz(z_1 - z_3)}. \end{aligned} \end{equation} Using only \eqref{E:gHA213cc} with \eqref{E:xyzSubs} leads to a $4$ by $4$ Lax matrix (not shown) that is trivially associated with $L_{\rm a}$. Similarly, as shown in \cite{ref:Zhangetal2012}, using only \eqref{E:gHA213sA} with \eqref{E:xyzSubs} results in a $4$ by $4$ Lax matrix (not shown) which is trivially associated with $L_{\rm b}$. \vfill \newpage \begin{longtable}{lcl} \caption{$\!$Generalized Hietarinta A-2 system Lax pairs and gauge matrices$\!$} \label{T:gHA2}\\ \toprule[1pt] Substitutions & $\psi$ & Matrices $L$ of Lax pair \\ \midrule \multicolumn{3}{l}{Writing the edge constraint as $x_3 = \frac{y_3 + x}{z}$ yields} \\ \parbox{3.5cm}{ $\begin{aligned} x_3 &= \frac{xF + g}{zF}, \\ y_3 &= \frac{g}{F},\ \ z_3 = \frac{h}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm a} = \begin{bmatrix} F\\ g\\ h\end{bmatrix}$ } & \parbox{6.5cm}{ $\displaystyle L_{\rm a} = \frac{1}{z}\begin{bmatrix} -zz_1 & 0 & z \\ xz_1 & z_1 & -zx_1 \\ \ell_{31} & -\,\frac{\mathbb{G}(-k,-a)}{x} & \frac{(y + b_0x)z}{x} \end{bmatrix}$,\\ } \\ \addlinespace[1em] \multicolumn{3}{l}{where $\ell_{31} = \frac{1}{x}\big(\mathbb{G}(-p,-a)zx_1 - \mathbb{G}(-k,-a)x - (y + b_0x)zz_1\big)$.}\\ \addlinespace[0.70em] \midrule \multicolumn{3}{l}{Writing the edge constraint as $\displaystyle y_3 = zx_3 - x$ yields}\\ \parbox{3.5cm}{ $\begin{aligned} x_3 &= \frac{f}{F},\ \ z_3 = \frac{h}{F}, \\ y_3 &= -\frac{xF - zf}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm b} = \begin{bmatrix} F\\ f\\ h\end{bmatrix}$ } & \parbox{6.5cm}{ \hfill $\displaystyle L_{\rm b} = \begin{bmatrix} - z_1 & 0 & 1\\ - x_1 & 1 & 0\\ \tilde{\ell}_{31} & -\,\frac{\mathbb{G}(-k, -a)}{x} & \frac{y + b_0x}{x} \end{bmatrix}$,} \\ \addlinespace[1em] \multicolumn{3}{l}{where $\tilde{\ell}_{31} = \frac{1}{x}\big(\mathbb{G}(-p,-a)x_1 - (y + b_0x)z_1\big)$.}\\ \addlinespace[0.70em] \midrule \multicolumn{3}{l}{Gauge transformations for $L_{\rm a}$ and $L_{\rm b}$ are given by}\\ \multicolumn{3}{l}{\parbox{12.5cm}{ \begin{tabular}{p{5.5cm} p{3.5cm} p{3.5cm}} $\begin{aligned} L_{\rm b} &= \mc{G}_1 L_{\rm a} \mc{G}^{-1}, \psi_{\rm b} = \mc{G} \psi_{\rm a}, \\ L_{\rm a} &= \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, \psi_{\rm a} = \bar{\mc{G}} \psi_{\rm b}, \end{aligned}$ & $\mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ \frac{x}{z} & \frac{1}{z} & 0 \\ 0 & 0 & 1 \end{bmatrix} $ & \hfill $\bar{\mc{G}} = \begin{bmatrix} 1 & 0 & 0 \\ -x & z & 0 \\ 0 & 0 & 1 \end{bmatrix}, $\\ \multicolumn{3}{l}{where $\bar{\mc{G}} = \mc{G}^{-1}$.} \end{tabular} } } \\ \addlinespace[0.450em] \bottomrule[1pt] \end{longtable} \vspace*{-4mm} \noindent \subsubsection{Generalized Hietarinta B-2 system} \label{sec:gHB2GaugeEquivalence} The generalized Hietarinta B-2 system \cite{ref:Zhangetal2012}, \begin{equation} \label{E:gHB2} \begin{aligned} &x x_1 - z_1 - y = 0, \;\; x x_2 - z_2 - y = 0, \;\; \text{ and } \\ &y_{12} + \alpha_1 + z + \alpha_2(x_{12} - x) - x x_{12} + \frac{\mathbb{G}(-p,-q)}{x_2 - x_1} = 0, \end{aligned} \end{equation} has edge constraint $\displaystyle x_1 = \frac{z_1 + y}{x}$ which yields $\displaystyle x_3 = \frac{z_3 + y}{x}.$ Here, \begin{equation} \label{E:gHB213cc} \begin{aligned} x_{13} &= \frac{y_1 - y_3}{x_1 - x_3}, \;\; z_{13} = \frac{x_3y_1 - x_1y_3}{x_1 - x_3}, \;\; \text{ and } \\ y_{13} &= (\alpha_2x - \alpha_1 - z) + \frac{(x - \alpha_2)(y_1 - y_3) + \mathbb{G}(-p,-k)}{x_1 - x_3}. \end{aligned} \end{equation} The $3$ by $3$ Lax matrices with their gauge transformations are listed in Table 4. For $L_{\rm a}$ one has $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; \frac{x_1}{x_2},$ hence, $t = s = \frac{1}{x}$. For $L_{\rm b}$ we set $t = s = 1$ since $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; 1$. Other forms of \eqref{E:gHB213cc} by incorporating edge constraints are \begin{equation} \label{E:gHB213sA} \begin{aligned} \tilde{x}_{13} &= \frac{x(y_1 - y_3)}{z_1 - z_3}, \;\; \tilde{z}_{13} = -\, \frac{y(y_3 - y_1) + y_3 z_1 - y_1 z_3}{z_1 - z_3}, \;\; \text{ and } \\ \tilde{y}_{13} &= (\alpha_2x - \alpha_1 - z) + \frac{x\Big((x - \alpha_2)(y_1 - y_3) + \mathbb{G}(-p,-k)\Big)}{z_1 - z_3}. \end{aligned} \end{equation} As shown in \cite{ref:Zhangetal2012}, using only \eqref{E:gHB213sA} with \eqref{E:xyzSubs} leads to a $4$ by $4$ Lax matrix (not shown) that is trivially associated with $L_{\rm b}$. Using only \eqref{E:gHB213cc} with \eqref{E:xyzSubs} results in a $4$ by $4$ Lax matrix (not shown) which is trivially associated with $L_{\rm a}$ when evaluated against the given system. \begin{longtable}{lcl} \caption{$\!$Generalized Hietarinta B-2 system Lax pairs and gauge matrices$\!$} \label{T:gHB2}\\ \toprule[1pt] Substitutions & $\psi$ & Matrices $L$ of Lax pair \\ \midrule \multicolumn{3}{l}{Writing the edge constraint as $x_3 = \frac{y + z_3}{x}$ yields}\\ \addlinespace[1em] \parbox{4cm}{ $\begin{aligned} x_3 &= \frac{yF + h}{xF}, \\ y_3 &= \frac{g}{F}, \ \ z_3 = \frac{h}{F}. \end{aligned}$ } & \parbox{2cm}{ $\psi_{\rm a} = \begin{bmatrix} F\\ g\\ h\end{bmatrix}$ } & \parbox{6.5cm}{ $\displaystyle L_{\rm a} = \frac{1}{x}\begin{bmatrix} y - xx_1 & 0 & 1\\ \ell_{21} & x(x - \alpha_2) & \ell_{23}\\ -yy_1 & xx_1 & -y_1 \end{bmatrix}$,} \\ \addlinespace[0.8em] \multicolumn{3}{l}{ \parbox{12cm}{where $\ell_{21} = (\alpha_2x - \alpha_1 - z)(y - xx_1) + x\big( (\alpha_2 - x)y_1 - \mathbb{G}(-p,-k) \big)$ and $\ell_{23} = \alpha_2x - \alpha_1 - z$.} }\\ \addlinespace[1em] \midrule \multicolumn{3}{l}{Writing the edge constraint as $z_3 = xx_3 - y$ yields}\\ \addlinespace[1em] \parbox{4cm}{ $\begin{aligned} x_3 &= \frac{f}{F}, \ \ y_3 = \frac{g}{F}, \\ z_3 &= - \,\frac{yF - xf}{F} \end{aligned}$ } & \parbox{2cm}{ $\psi_{\rm b} = \begin{bmatrix} F\\ f\\ g\end{bmatrix}$ } & \parbox{6.5cm}{ $\displaystyle L_{\rm b} = \begin{bmatrix} -x_1 & 1 & 0\\ -y_1 & 0 & 1\\ \ell_{31} & \alpha_2x - \alpha_1 - z & x - \alpha_2 \end{bmatrix}$,} \\ \addlinespace[1em] \multicolumn{3}{l}{where $\ell_{31} = -(\alpha_2x - \alpha_1 - z) x_1 + (\alpha_2 - x) y_1 - \mathbb{G}(-p,-k)$.}\\ \addlinespace[1em] \midrule \multicolumn{3}{l}{Gauge transformations for $L_{\rm a}$ and $L_{\rm b}$ are given by}\\ \multicolumn{3}{l}{\parbox{12.5cm}{ \begin{tabular}{p{5.5cm} p{3.5cm} p{3.5cm}} $\begin{aligned} L_{\rm b} &= \mc{G}_1 L_{\rm a} \mc{G}^{-1}, \psi_{\rm b} = \mc{G} \psi_{\rm a}, \\ L_{\rm a} &= \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, \psi_{\rm a} = \bar{\mc{G}} \psi_{\rm b}, \end{aligned}$ & $\mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ \frac{y}{x} & 0 & \frac{1}{x} \\ 0 & 1 & 0 \end{bmatrix} $ & \hfill $\bar{\mc{G}} = \begin{bmatrix} 1 & 0 & 0 \\ 0 & 0 & 1 \\ -y & x & 1 \end{bmatrix}, $\\ \multicolumn{3}{l}{where $\bar{\mc{G}} = \mc{G}^{-1}$.} \end{tabular} } } \\ \addlinespace[0.8em] \bottomrule[1pt] \end{longtable} \vspace*{-4mm} \noindent \subsubsection{Generalized Hietarinta C-3 system} \label{sec:gHC3GaugeEquivalence} The generalized Hietarinta C-3 system \cite{ref:Zhangetal2012}, \begin{equation} \label{E:gHC3} \begin{aligned} &z y_1 + x_1 - x = 0, \;\; z y_2 + x_2 - x = 0, \;\;\text{ and } \\ &\mathbb{G}(-a,-b)x_{12} - yz_{12} + z\left(\frac{\mathbb{G}(-q,-b) y_2 z_1 - \mathbb{G}(-p, -b) y_1 z_2}{z_1 - z_2}\right) = 0, \end{aligned} \end{equation} has edge constraint $\displaystyle x_1 = x - z y_1$ leading to $\displaystyle x_3 = x - z y_3$. Here, \begin{equation} \label{E:gHC313cc} \begin{aligned} x_{13} &= \frac{x_3z_1 - x_1z_3}{z_1 - z_3}, \;\; y_{13} = \frac{x_1 - x_3}{z_1 - z_3}, \text{ and } \\ z_{13} &= \frac{\mathbb{G}(-a,-b)(x_3z_1 - x_1z_3) + z\Big(\mathbb{G}(-k,-b)y_3z_1 - \mathbb{G}(-p,-b)y_1z_3\Big)}{y(z_1 - z_3)}. \end{aligned} \end{equation} The $3$ by $3$ Lax matrices with their gauge transformations are given in Table 5. For $L_{\rm a}$ and $L_{\rm b}$ we set $t = s = \frac{1}{z}$ since $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; \frac{z_1}{z_2} $. \begin{longtable}{lcl} \caption{$\!$Generalized Hietarinta C-3 system Lax pairs and gauge matrices$\!$} \label{T:gHC3}\\ \toprule[1pt] Substitutions & $\psi$ & Matrices $L$ of Lax pair \\ \midrule \multicolumn{3}{l}{Writing the edge constraint as $x_3 = x - z y_3$ yields}\\ \parbox{3.5cm}{ $\begin{aligned} x_3 &= \frac{xF - zg}{F}, \\ y_3 &= \frac{g}{F},\ \ z_3 = \frac{h}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm a} = \begin{bmatrix} F\\ g\\ h\end{bmatrix}$ } & \parbox{6.5cm}{ \hfill $\displaystyle L_{\rm a} = \frac{1}{z}\begin{bmatrix} -z_1 & 0 & 1\\ x - x_1 & -z & 0\\ -\mathbb{G}(-a,-b)\frac{x z_1}{y} & \ell_{32} & \ell_{33} \end{bmatrix}$,} \\ \addlinespace[0.5em] \multicolumn{3}{l}{\parbox{12.75cm}{with $\ell_{32} \!=\! \big( \mathbb{G}(-a,-b) -\! \mathbb{G}(-k,-b) \big)\frac{z z_1}{y}, \ell_{33} \!=\! \big( \mathbb{G}(-a,-b)x_1 +\! \mathbb{G}(-p,-b) z y_1 \big)\frac{1}{y}$.}} \\ \addlinespace[0.75em] \midrule \multicolumn{3}{l}{Writing the edge constraint as $y_3 = \frac{x - x_3}{z}$ yields}\\ \parbox{3.5cm}{ $\begin{aligned} x_3 &= \frac{f}{F},\ \ z_3 = \frac{h}{F}, \\ y_3 &= \frac{xF - f}{zF}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm b} = \begin{bmatrix} F\\ f\\ h\end{bmatrix}$ } & \parbox{6.5cm}{ \hfill $\displaystyle L_{\rm b} = \frac{1}{z}\begin{bmatrix} -z_1 & 0 & 1\\ 0 & -z_1 & x_1\\ -\mathbb{G}(-k,-b)\frac{x z_1}{y} & \tilde{\ell}_{32} & \tilde{\ell}_{33} \end{bmatrix}$,} \\ \addlinespace[0.5em] \multicolumn{3}{l}{\parbox{12.85cm}{with $\tilde{\ell}_{32} \!=\! \big(\mathbb{G}(-k,-b) -\! \mathbb{G}(-a,-b)\big)\frac{z_1}{y}, \tilde{\ell}_{33} \!=\! \big( \mathbb{G}(-a, -b) x_1 + \mathbb{G}(-p, -b) z y_1 \big)\frac{1}{y}$.}} \\ \addlinespace[0.75em] \midrule \multicolumn{3}{l}{Gauge transformations for $L_{\rm a}$ and $L_{\rm b}$ are given by}\\ \multicolumn{3}{l}{\parbox{12.5cm}{ \begin{tabular}{p{5cm} p{3.5cm} p{4cm}} $\begin{aligned} L_{\rm b} &= \mc{G}_1 L_{\rm a} \mc{G}^{-1}, \psi_{\rm b} = \mc{G} \psi_{\rm a}, \\ L_{\rm a} &= \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, \psi_{\rm a} = \bar{\mc{G}} \psi_{\rm b}, \end{aligned}$ & $\mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ x & -z & 0 \\ 0 & 0 & 1 \end{bmatrix} $ & \hfill $\bar{\mc{G}} = \begin{bmatrix} 1 & 0 & 0 \\ \frac{x}{z} & -\,\frac{1}{z} & 0 \\ 0 & 0 & 1 \end{bmatrix}. $\\ \multicolumn{3}{l}{where $\bar{\mc{G}} = \mc{G}^{-1}$.} \end{tabular} } } \\ \addlinespace[0.75em] \bottomrule[1pt] \end{longtable} \vspace*{-1mm} \noindent Incorporating edge constraints into \eqref{E:gHC313cc} yields \begin{equation} \label{E:gHC313sA} \begin{aligned} \tilde{x}_{13} &= x + \frac{z(y_1 z_3 - y_3 z_1)}{z_1 - z_3}, \;\; \tilde{y}_{13} = \frac{z(y_3 - y_1)}{z_1 - z_3}, \;\;\text{ and } \\ \tilde{z}_{13} &= \frac{\mathbb{G}(-a,-b)\big(x(z_1 - z_3) + z(y_1 z_3 - y_3 z_1)\big)}{y(z_1 - z_3)} \\ & \;\;\;\; + \frac{z\Big(\mathbb{G}(-k,-b) y_3 z_1 - \mathbb{G}(-p,-b) y_1 z_3 \Big)}{y(z_1 - z_3)}. \end{aligned} \end{equation} \vskip 1pt \noindent System \eqref{E:gHC3} also admits extended Lax matrices: \begin{equation} \label{M:C3Lyz} L_{\rm A} = \frac{1}{z} \begin{bmatrix} -z_1 & 0 & 0 & 1\\ 0 & -z_1 & 0 & x_1\\ zy_1 & 0 & -z & 0\\ - \mathbb{G}(-a,-b) \frac{xz_1}{y} & 0 & \big(\mathbb{G}(-a,-b) - \mathbb{G}(-k,-b)\big)\frac{zz_1}{y} & \ell_{44} \end{bmatrix}, \end{equation} when considering the edge-modified solutions for $y_{13}$ and $z_{13}$ and where \\ $\ell_{44} = \left( \mathbb{G}(-a,-b) x - \big( \mathbb{G}(-a,-b) - \mathbb{G}(-p,-b) \big) z y_1 \right) \frac{1}{y} $; and \begin{equation} \label{M:C3Lxyz} L_{\rm B} = \frac{1}{z} \begin{bmatrix} -z_1 & 0 & 0 & 1\\ -x z_1 & 0 & z z_1 & x - z y_1 \\ zy_1 & 0 & -z & 0\\ -\mathbb{G}(-a,-b)\frac{xz_1}{y} & 0 & \big(\mathbb{G}(-a,-b) - \mathbb{G}(-k,-b)\big)\frac{zz_1}{y} & \ell_{44} \end{bmatrix}, \end{equation} when considering the edge-modified solutions \eqref{E:gHC313sA} and with $\ell_{44}$ as above; and \begin{equation} \label{M:C3Ly} L_{\rm C} = \frac{1}{z} \begin{bmatrix} -z_1 & 0 & 0 & 1\\ 0 & -z_1 & 0 & x_1\\ zy_1 & 0 & -z & 0\\ 0 & - \mathbb{G}(-a,-b)\frac{z_1}{y} & -\mathbb{G}(-k,-b)\frac{zz_1}{y} & \tilde{\ell}_{44} \end{bmatrix}, \end{equation} when considering the edge-modified solutions for $y_{13}$ and where $\tilde{\ell}_{44} \!=\! \left( \mathbb{G}(-a,-b)x_1 \right.$ \newline $ \left. + \mathbb{G}(-p,-b) z y_1 \right)\frac{1}{y} $. The matrix $L_{\rm C}$ was derived in \cite[eq.\ (95)]{ref:Zhangetal2012} using $\tilde{y}_{13}$. All other combinations of \eqref{E:gHC313cc} and \eqref{E:gHC313sA} result in matrices which do not satisfy the defining equation \eqref{matLaxEqdiffeqs}. \subsubsection{Generalized Hietarinta C-4 system} \label{sec:HC4GaugeEquivalence} The generalized Hietarinta C-4 system \cite{ref:Zhangetal2012} is given by \begin{equation} \label{E:HC4} \begin{aligned} &z y_1 + x_1 - x = 0, \;\; z y_2 + x_2 - x = 0, \;\text{ and } \\ &y z_{12} - z\left(\frac{\mathscr{G}(p) y_1 z_2 - \mathscr{G}(q) y_2 z_1}{z_1 - z_2}\right) - x x_{12} + \frac{1}{4}\mathbb{G}(-a,-b)^2 = 0, \end{aligned} \end{equation} where \begin{equation} \label{E:calGHC4} \displaystyle \mathscr{G}(\tau) := -\,\frac{1}{2}\big(\mathbb{G}(-\tau,-a) + \mathbb{G}(-\tau,-b)\big). \end{equation} Edge constraint $\displaystyle x_1 = x - z y_1$ yields $\displaystyle x_3 = x - z y_3$. Here, \begin{equation} \label{E:gHC413cc} \begin{aligned} x_{13} &= \frac{x_3z_1 - x_1z_3}{z_1 - z_3}, \;\; y_{13} = \frac{x_1 - x_3}{z_1 - z_3}, \;\; \text{ and }\\ z_{13} &= \frac{x(x_3z_1 - x_1z_3) - z\big(\mathscr{G}(k) y_3 z_1 - \mathscr{G}(p) y_1 z_3\big) }{y(z_1 - z_3)} - \frac{\mathbb{G}(-a,-b)^2}{4y}. \end{aligned} \end{equation} \noindent Variants of \eqref{E:gHC413cc} obtained by incorporating edge constraints are \begin{equation} \label{E:gHC413sA} \begin{aligned} \tilde{x}_{13} &= \frac{x(z_1 - z_3) - z(y_3 z_1 - y_1 z_3)}{z_1 - z_3}, \;\; \tilde{y}_{13} = -\, \frac{z(y_1 - y_3)}{z_1 - z_3}, \;\; \text{ and } \\ \tilde{z}_{13} &= \frac{x z (y_1 z_3 - y_3 z_1) - z\big(\mathscr{G}(k) y_3 z_1 - \mathscr{G}(p) y_1 z_3\big) }{y(z_1 - z_3)} + \frac{4x^2 - \mathbb{G}(-a,-b)^2}{4y}. \end{aligned} \end{equation} The $3$ by $3$ Lax matrices and the gauge transformations are given in Table 6. For $L_{\rm a}$ and $L_{\rm b}$ we take $t = s = \frac{1}{z}$ since $\frac{s \, t_2}{t \, s_1} \; \dot{=}\; \frac{z_1}{z_2} $. \begin{longtable}{lcl} \caption{$\!$Generalized Hietarinta C-4 system Lax pairs and gauge matrices$\!$} \label{T:gHC4}\\ \toprule[1pt] Substitutions & $\psi$ & Matrices $L$ of Lax pair \\ \midrule \multicolumn{3}{l}{Writing the edge constraint as $x_3 = x - zy_3$ yields}\\ \addlinespace[1em] \parbox{3.5cm}{ $\begin{aligned} x_3 &= \frac{xF - zg}{F}, \\ y_3 &= \frac{g}{F}, \hspace{3mm} z_3 = \frac{h}{F}. \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm a} = \begin{bmatrix} F\\ g\\ h\end{bmatrix}$ } & \parbox{6.5cm}{ $\displaystyle L_{\rm a} = \frac{1}{z}\begin{bmatrix} -z_1 & 0 & 1\\ x - x_1 & -z & 0\\ \ell_{31} & \frac{z z_1}{y}\left(x + \mathscr{G}(k)\right) & \ell_{33} \end{bmatrix}$,} \\ \addlinespace[1em] \multicolumn{3}{l}{ \parbox{13.25cm}{with $\ell_{31} \!=\! -\frac{z_1}{y}\big(x^2 - \frac{1}{4}\mathbb{G}(-a,-b)^2\big),\, \ell_{33} \!=\!\frac{1}{y} \big( x x_1 -\! \frac{1}{4}\mathbb{G}(-a,-b)^2 -\! \mathscr{G}(p) z y_1 \big)$.} }\\ \addlinespace[0.75em] \midrule \multicolumn{3}{l}{Writing the edge constraint as $y_3 = \frac{x - x_3}{z}$ yields}\\ \parbox{3.5cm}{ $\begin{aligned} x_3 &= \frac{f}{F},\hspace{3mm} z_3 = \frac{h}{F}\\ y_3 &= \frac{xF - f}{zF}. \\ \end{aligned}$ } & \parbox{2.5cm}{ $\psi_{\rm b} = \begin{bmatrix} F\\ f\\ h\end{bmatrix}$ } & \hfill \parbox{6.5cm}{ \hfill $\displaystyle L_{\rm b} = \frac{1}{z}\begin{bmatrix} -z_1 & 0 & 1\\ 0 & -z_1 & x_1\\ \tilde{\ell}_{31} & - \frac{z_1}{y}\left(x + \mathscr{G}(k)\right) & \tilde{\ell}_{33} \end{bmatrix}$.} \\ \addlinespace[0.75em] \multicolumn{3}{l}{ \parbox{13.5cm}{with $\tilde{\ell}_{31} \!=\! \frac{z_1}{y}\big( \frac{1}{4}\mathbb{G}(-a,-b)^2 +\! \mathscr{G}(k) x \big), \tilde{\ell}_{33} \!=\! \frac{1}{y}\big(x x_1 -\! \frac{1}{4} \mathbb{G}(-a,-b)^2 -\! \mathscr{G}(p) z y_1 \big)$.} }\\ \addlinespace[0.75em] \midrule \multicolumn{3}{l}{Gauge transformations for $L_{\rm a}$ and $L_{\rm b}$ are given by}\\ \multicolumn{3}{l}{\parbox{12.5cm}{ \begin{tabular}{p{5cm} p{3.5cm} p{4cm}} $\begin{aligned} L_{\rm b} &= \mc{G}_1 L_{\rm a} \mc{G}^{-1}, \psi_{\rm b} = \mc{G} \psi_{\rm a}, \\ L_{\rm a} &= \bar{\mc{G}}_1 L_{\rm b} \bar{\mc{G}}^{-1}, \psi_{\rm a} = \bar{\mc{G}} \psi_{\rm b}, \end{aligned}$ & $ \mc{G} = \begin{bmatrix} 1 & 0 & 0 \\ x & -z & 0 \\ 0 & 0 & 1 \end{bmatrix} $ & \hfill $ \bar{\mc{G}} = \begin{bmatrix} 1 & 0 & 0 \\ \frac{x}{z} & -\,\frac{1}{z} & 0 \\ 0 & 0 & 1 \end{bmatrix}.$ \\ \multicolumn{3}{l}{where $\bar{\mc{G}} = \mc{G}^{-1}$.} \end{tabular} } } \\ \addlinespace[0.50em] \bottomrule[1pt] \end{longtable} \vspace*{3mm} \noindent System \eqref{E:HC4} has the following extended Lax matrices: \begin{equation} \label{M:C4Lyz} L_{\rm A} = \frac{1}{z} \begin{bmatrix} -z_1 & 0 & 0 & 1\\ 0 & -z_1 & 0 & x_1\\ zy_1 & 0 & -z & 0\\ \ell_{41} & 0 & \frac{z z_1}{y}\big(x + \mathscr{G}(k)\big) & \ell_{44} \end{bmatrix}, \end{equation} when considering edge-modified $y_{13}$ and $z_{13},$ and where $\ell_{41} \!=\! -\frac{z_1}{y}\big(x^2 - \frac{1}{4}\mathbb{G}(-a,-b)^2\big)$ and $\ell_{44} = \frac{1}{y}\big( x^2 - \frac{1}{4}\mathbb{G}(-a,-b)^2 - z y_1(x + \mathscr{G}(p))\big)$; \begin{equation} \label{M:C4Lxyz} L_{\rm B} = \frac{1}{z} \begin{bmatrix} - z_1 & 0 & 0 & 1\\ - xz_1 & 0 & zz_1 & x - zy_1 \\ zy_1 & 0 & -z & 0\\ \ell_{41} & 0 & \frac{z z_1}{y}\big(x + \mathscr{G}(k)\big) & \ell_{44} \end{bmatrix}, \end{equation} by taking the edge-modified expression of \eqref{E:gHC413sA}, with $\ell_{41}$ and $\ell_{44}$ as above; and \begin{equation} \label{M:C4Ly} L_{\rm C} = \frac{1}{z} \begin{bmatrix} -z_1 & 0 & 0 & 1\\ 0 & -z_1 & 0 & x_1\\ zy_1 & 0 & -z & 0\\ \frac{z_1 \mathbb{G}(-a,-b)^2}{4y} & -\frac{x z_1}{y} & \frac{z z_1}{y} \mathscr{G}(k) & \tilde{\ell}_{44} \end{bmatrix} \end{equation} when using the edge-modified expression for $y_{13}$ and with $\tilde{\ell}_{44} \!=\! \frac{1}{y} \big( x x_1 -\frac{1}{4}\mathbb{G}(-a,-b)^2 - \mathscr{G}(p) z y_1 \big) $. All other combinations of \eqref{E:gHC413cc} and \eqref{E:gHC413sA} result in matrices that fail to satisfy the defining equation \eqref{matLaxEqdiffeqs}. \section{Software implementation and conclusions} \label{sec:DiscussionConclusions} The method to find Lax pairs of P$\mathrm{\Delta}$Es\ based on multi-dimensional consistency is being implemented in {\sc Mathematica}. Using our prototype {\sc Mathematica} package \cite{ref:Bridgman2015} we derived Lax matrices of minimal sizes for various Boussinesq-type equations. In turn, the research done for this chapter helped us improve and extend the capabilities of the software under development \cite{ref:BridgmanHereman2019}. The way we symbolically compute (and verify) Lax pairs might slightly differ from the procedure used by other authors (by hand or interactively with a computer algebra system). Indeed, for a system of P$\mathrm{\Delta}$Es, the software generates all equations (and solutions) necessary to define a full face of the quadrilateral. That is, for a system of P$\mathrm{\Delta}$Es\ including full-face expressions (involving at least 3 corners of the quadrilateral) and edge equations (involving two adjacent corners of the quadrilateral), the software will first augment the given system with the additional edge equations necessary to complete the set of equations for a particular face of the cube. For example, the Schwarzian Boussinesq system \eqref{E:sBouss} discussed in Section~\ref{E:sBouss} is augmented with two additional edge equations, \begin{equation} \label{E:a2HietFrontExtraEdges} z_2 y_{12} - x_{12} + x_2 = 0, \;\; z_1 y_{12} - x_{12} + x_1 = 0, \end{equation} to generate the full set of equations for the front face of the cube. Then, using lexicographical ordering ($x \prec y \prec z$) and an index ordering (double-subscripts $\prec$ no-subscripts $\prec$ single-subscripts), the software solves \eqref{E:sBouss} and \eqref{E:a2HietFrontExtraEdges} yielding \begin{subequations} \label{E:sBoussfrontfacesols} \begin{align} x_{12} &= \frac{x_2 z_1 - x_1 z_2}{z_1 - z_2}, \;\; y_{12} = \frac{x_2 - x_1}{z_1 - z_2}, \;\; z_{12} = \frac{z}{y} \left( \frac{p y_1z_2 - q y_2z_1}{z_1 - z_2} \right), \; \text{ with } \label{E:sBoussfrontfacesolsx12y12} \\ x &= x_1 - z y_1, \; \text{ and } \; z = \frac{x_1 - x_2}{y_1 - y_2}. \label{E:sBoussfrontfacesolsz12xy} \end{align} \end{subequations} This process is then repeated for the left and bottom faces of the cube, always substituting solutions such as \eqref{E:sBoussfrontfacesols} to enforce consistency and remove redundancies. The complete front-corner system (i.e., front, left and bottom faces connected at corner ${\bf x}$, see Fig.~\ref{fig:cube}) is used to simplify the Lax equation when a Lax pair is finally tested. If all works as planned, the evaluation of the Lax equation then automatically results in a zero matrix. For verification of consistency about the cube, the equations for the faces connected at the back-corner (where ${\bf x}_{123}$ is located as shown in Fig.~\ref{fig:cube}) are computed and then solved (adhering to the above ordering). Next, these solutions are then checked for consistency with the front-corner system. Finally, if the system is 3D consistent, the multiple expressions obtained for ${\bf x}_{123}$ should be equal when reduced using \eqref{E:sBoussfrontfacesols} augmented with like equations for ${\bf x}_{13}$ and ${\bf x}_{23}.$ Why would one care about different Lax matrices, in particular, if they are gauge equivalent? In the PDE case, application of the IST is easier if one selects a Lax pair of a specific form (i.e., the eigenvalues should appear in the diagonal entries), chosen from the infinite number of gauge equivalent pairs. Thus, for the KdV equation one may prefer to work with \eqref{E:kdvLAX2} instead of \eqref{E:kdvLAX1}. Similar issues arise for P$\mathrm{\Delta}$Es. Among the family of gauge-equivalent Lax matrices for P$\mathrm{\Delta}$Es, which one should be selected so that, for example, the IST or staircase method \cite{ref:vanderKampQuispel2010} could be applied? (The latter method is used to find first integrals for periodic reductions of integrable P$\mathrm{\Delta}$Es). In addition, one has to select an appropriate (separation) factor $t({\bf x}, {\bf x}_1; p, k)$ (see Sec.~\ref{sec:firstAlt1}). These issues are not addressed in this chapter for they require further study. \vspace*{-3mm} \section*{Acknowledgments} \label{sec:Acknowledgements} This material is based in part upon research supported by the National Science Foundation (NSF) under Grant No.\ CCF-0830783. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. \vspace*{-3mm}
\section{Introduction} \label{sec:intro} Decision lists are a model to represent boolean functions, first introduced by Rivest \cite{rivest1987learning}. A decision list is given by a list of rules $(C_1,v_1),\ldots,(C_m,v_m)$. A rule is composed of a condition, given by a term $C_i$, which is a conjunction of literals (variables or their negations); and an output value $v_i$ in some set $V$. A decision list computes a function $f:\{0,1\}^n \to V$ as follows: \begin{center} \begin{minipage}{0.5\textwidth} \textbf{If $C_1(x)=\texttt{True}$ then} output $v_1$,\\ \textbf{else if $C_2(x)=\texttt{True}$ then} output $v_2$,\\ \ldots, \\ \textbf{else if $C_{m}(x)=\texttt{True}$ then} output $v_{m}$. \end{minipage} \end{center} The last rule is the \emph{default value}, where we assume that $C_m \equiv \texttt{True}$. Decision lists generalize both CNFs and DNFs. For example, a DNF is a decision list with $v_1=\cdots=v_{m-1}=1$ and $v_m=0$, and a CNF is a decision list with $v_1=\cdots=v_{m-1}=0$ and $v_m=1$. It can be shown that decision lists are a strict generalization of both DNFs and CNFs \cite{rivest1987learning,kohavi1993research}. Following Rivest's original work, decision lists have been studied both in complexity theory \cite{blum1992rank,turan1997linear,guijarro2001monotone,eiter2002decision,krause2006computational,arvind2015isomorphism,abs-1901-05911} and in learning theory \cite{kearns1987learnability,bagallo1990boolean,hancock1996lower,ehrenfeucht1989general,nevo2002online,wang2015falling,witten2016data}. \paragraph{Complexity measures of decision lists.} There are two natural complexity measures of decision lists: \emph{size} and \emph{width}. Let $L=((C_i,v_i))_{i\in[m]}$ be a decision list. Its \emph{size} is the number of rules in it (namely $m$), and its \emph{width} is the maximal number of variables in a term $C_i$. \paragraph{Decision list approximation.} A decision list $L$ $\varepsilon$-approximates another decision list $L'$ if the two agree on a $(1-\varepsilon)$ fraction of the inputs. It is straightforward to see that small-size decision lists can be approximated by small-width decision lists, by removing rules of large width. Concretely, a decision list of size $m$ can be $\varepsilon$-approximated by a decision list of width $w=\log(m/\varepsilon)$, simply by removing all rules with terms of width more than $w$. The reverse direction is the main focus of this work. We prove the following result, which provides sharp bounds on approximating small-width decision lists by small-size decision lists. \begin{theorem}[Main result]\label{thm:main} Let $w \ge 1, \varepsilon>0$. Any width-$w$ decision list $L$ can be $\varepsilon$-approximated by a decision list $L'$ of width $w$ and size $s=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}$. Moreover, $L'$ is a sub-decision list of $L$, obtained by keeping $s$ rules in $L$ and removing the rest. The bound on $s$ is optimal, up to the unspecified constant in the $O(w)$ term. \end{theorem} The proof of \Cref{thm:main} appears in \Cref{sec:upper}. We note that the size bound can be simplified, depending on whether the required error $\varepsilon$ is below or above $2^{-w}$: $$ \pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}=\begin{cases} 2^{O(w)}&\varepsilon \ge 2^{-w}\\ \pbra{\frac2w\log\frac1\varepsilon}^{O(w)}&\varepsilon \le 2^{-w}. \end{cases} $$ In both cases, the bound we obtain is sharp, up to the unspecified constant in the $O(w)$ term. We give examples demonstrating this in \Cref{sec:lower}. \subsection{Random restrictions} Random restrictions are an essential ingredient of the proof of \Cref{thm:main}. H{\aa}stad's switching lemma \cite{Hastad87,razborov1995bounded,beame1994switching} is based on the fact that small-width DNFs simplify under random restrictions. More concretely, a random restriction that fixes a $1-O(1/w)$ fraction of the inputs simplifies a width-$w$ DNF to a small-depth decision tree. In this work, we study random restrictions where a small constant fraction of the variables is fixed. A good example to keep in mind is the TRIBES function: a read-once DNF with $2^w$ terms of width $w$ on disjoint variables. The TRIBES function does not simplify significantly under a random restriction, unless one really fixes a $1-O(1/w)$ fraction of the inputs. For example, if we randomly fix $50\%$ of the inputs, say, then the TRIBES function simplifies to what is essentially a smaller TRIBES function (more formally, it simplifies with high probability to a read-once DNF of width $\Omega(w)$). However, we show that this is in essence the worst possible example. The following lemma is a special case of \Cref{lemma:expectedusenum} applied to DNFs (the full lemma deals with decision lists). Given a DNF $f:\{0,1\}^n \to \{0,1\}$, let $\rho \in \{0,1,*\}^n$ be a restriction, and let $f\restriction_{\rho}$ be the restricted DNF. Clearly, some terms in $f$ might become redundant in $f\restriction_{\rho}$. For example, they could be false, or they could be implied by other terms. A term that is not redundant is called \emph{useful}. We show that after fixing even a small fraction of the variables (say, $1\%$), a width-$w$ DNF simplifies to have at most $2^{O(w)}$ useful terms, and hence cannot be ``too complicated''. \begin{lemma}[DNFs simplify after mild random restrictions] \label{lemma:dnf_useful} Let $f$ be a width-$w$ DNF, and let $f\restriction_{\rho}$ be a restriction of $f$ obtained by restricting each variable with probability $\beta$, where the restricted variables take values 0 and 1 with equal probability. Then the expected number of useful terms in $f\restriction_{\rho}$ is at most $(4/\beta)^w$. \end{lemma} \subsection{Applications} We discuss some applications of \Cref{thm:main} below. \subsubsection{DNF sparsification} This decision list compression problem is a natural generalization of the \emph{DNF sparsification} problem, introduced by Gopalan, Meka and Reingold \cite{GopalanMR13} as a means to obtain pseudorandom generators fooling small-width DNFs. Their main structural result can be summarized as follows. \begin{theorem}[\cite{GopalanMR13}] \label{thm:GMR} Any width-$w$ DNF can be $\varepsilon$-approximated by a DNF of width $w$ and size $(w\log(1/\varepsilon))^{O(w)}$. \end{theorem} They conjectured that a better bound is possible. \begin{conjecture}[\cite{GopalanMR13}] \label{conj:GMR} Any width-$w$ DNF can be $\varepsilon$-approximated by a DNF of width $w$ and size $s(w,\varepsilon)$, where: \begin{itemize} \item \emph{Weak version:} $s(w,\varepsilon)=c(\varepsilon)^w$ for some function $c$. \item \emph{Strong version:} $s(w,\varepsilon)=(\log(1/\varepsilon))^{O(w)}$. \end{itemize} \end{conjecture} The weak version was resolved by Lovett and Zhang \cite{LovettZ19}, where they showed that $c(\varepsilon)=(1/\varepsilon)^{O(1)}$ suffices. Our main result, \Cref{thm:main}, verifies the strong version of their conjecture (and in fact, proves a sharper bound than the one conjectured). \begin{corollary}[This work]\label{cor:dnfsparsification} Any width-$w$ DNF can be $\varepsilon$-approximated by a DNF of width $w$ and size $\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}$. \end{corollary} We remark that \Cref{cor:dnfsparsification} is also tight, up to the unspecified constant in the $O(w)$ term. The proof is very similar to the proof in \Cref{sec:lower} that \Cref{thm:main} is tight. We sketch the proof here: \begin{itemize} \item For $2^{-2w}\leq\varepsilon\leq1/3$, \Cref{lem:approxlowerbound} shows the existence of a function $f:\{0,1\}^w \to \{0,1\}$ that cannot be $(1/3)$-approximated by any decision list of width $w$ and size $O(2^w/w)$. In particular, $f$ cannot be approximated by a DNF of width $w$ and size $O(2^w / w)$. Note that $f$ can trivially be computed by a DNF of width $w$ and size $2^w$, and that $2^{\Omega(w)}=\pbra{2+\frac1w\log\frac1\varepsilon}^{\Omega(w)}$ in this regime. \item For $\varepsilon\leq2^{-2w}$, consider exactly computing the Threshold-$w$ function on $\log(1/\varepsilon)$ variables, which amounts to approximation with any error $<\varepsilon$. This requires a width-$w$ DNF of size $\binom{\log(1/\varepsilon)}w=\pbra{2+\frac1w\log\frac1\varepsilon}^{\Omega(w)}$. \end{itemize} \subsubsection{Junta theorem} A $k$-junta is a function depending on at most $k$ variables. Friedgut's junta theorem \cite{friedgut1998boolean} shows that boolean functions of small influence can be approximated by juntas. For the relevant definitions see for example \cite{o2014analysis}. \begin{theorem}[Friedgut's junta theorem \cite{friedgut1998boolean}] \label{thm:friedgut} Let $f:\{0,1\}^n \to \{0,1\}$ be a boolean function with total influence $I$. Then for any $\varepsilon>0$, $f$ can be $\varepsilon$-approximated by a $k$-junta for $k=2^{O(I/\varepsilon)}$. \end{theorem} It is well known that width-$w$ DNFs have total influence $I=O(w)$, which implies by \Cref{thm:friedgut} that width-$w$ DNFs can be $\varepsilon$-approximated by $2^{O(w/\varepsilon)}$-juntas. Since a width-$w$ size-$s$ decision list is a $(sw)$-junta, as a corollary of \Cref{thm:main}, we improve the bound, and generalize it to decision lists. \begin{corollary}[This work] Any width-$w$ decision list can be $\varepsilon$-approximated by a $k$-junta for $k=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}$. \end{corollary} This improves previous bounds, even when restricted to DNFs or CNFs. By combining the results in \cite{GopalanMR13,LovettZ19} one gets the bound $k=\min\cbra{w\log(1/\varepsilon),1/\varepsilon}^{O(w)}$ for width-$w$ DNFs or CNFs. It can be verified that our new result is indeed better; for example for $\varepsilon=w^{-w}$ we obtain $(\log w)^{O(w)}$ instead of $w^{O(w)}$. It is also worthwhile noting that the result of \cite{LovettZ19}, which obtained the bound $(1/\varepsilon)^{O(w)}$, can be extended to decision lists with minimal changes. \subsubsection{Learning small-width DNFs} A class of boolean functions is said to be $(\varepsilon,\delta)$-PAC learnable using $q$ queries if there exists a learning algorithm that, given query access to an unknown function in the class, returns with probability $(1-\delta)$ a function which $\varepsilon$-approximates the unknown function, while making at most $q$ queries. In our context we consider membership queries, where the learning algorithm can query the value of the unknown function on any chosen input. A celebrated result of Jacskson \cite{jackson1997efficient} shows that polynomial-size DNFs can be PAC learned under the uniform distribution using membership queries. \begin{theorem}[Jackson's harmonic sieve \cite{jackson1997efficient}] The class of $n$-variate DNFs of size $s$ is $(\varepsilon,\delta)$-PAC learnable under the uniform distribution with $q=\text{poly}(s,n,1/\varepsilon,\log(1/\delta))$ membership queries. \end{theorem} Using \Cref{thm:main}, we can extend Jackson's result to small-width DNFs. Note that the DNF sparsification bound from \cite{GopalanMR13,LovettZ19} also works here, if we replace the bound on $s$ with their corresponding bound. \begin{corollary}[This work] The class of $n$-variate DNFs of width $w$ is $(\varepsilon,\delta)$-PAC learnable under the uniform distribution with $q=\text{poly}(s,n,1/\varepsilon,\log(1/\delta))$ membership queries, where $s=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}$. \end{corollary} \begin{proof}[Proof Sketch] Jackson's algorithm combines a weak learner based on Fourier analysis and a boosting algorithm that converts this weak learner to a strong learner. Let $f(x)$ be the target DNF that we are trying to learn. The weak learner solves the following problem: given a distribution $D$ on $\{0,1\}^n$, output a set $S$ such that the parity $\chi_S(x)=\bigoplus_{i \in S} x_i$ is correlated with $f$ under the distribution $D$. Initially $D$ is the uniform distribution, but the boosting algorithm keeps adapting $D$ to focus on inputs where it made many mistakes. In Jackson's algorithm, the existence of such $S$ is shown by observing that for a size-$s$ DNF, at least one of the terms must be $1/s$ correlated to the function; and each term's contribution can be attributed to the parities supported on it. For width-$w$ terms, this leads to at most a $2^{-w}$ decrease in the correlation. Assume now that $f(x)$ is a width-$w$ DNF with too many terms, so we cannot apply the previous argument directly. Apply \Cref{thm:main} with error $\gamma$ (to be determined soon), to obtain an approximate width-$w$ DNF $g(x)$ which $\gamma$-approximates $f(x)$, where $g$ has at most $s=\pbra{2+\frac1w\log\frac1{\gamma}}^{O(w)}$ terms. Crucially, we obtain $g(x)$ by removing some of the terms in $f(x)$, and hence $g(x) \le f(x)$ for all inputs $x$. In particular, $\Pr_{x \sim D}[f(x)=1] \ge \Pr_{x \sim D}[g(x)=1]$. Assume that we know that the distribution $D$ is not too far from uniform. Concretely, that $D(x) \le K 2^{-n}$ for some parameter $K$. This implies that $$ \Pr_{x \sim D}[f(x)=1] \le \Pr_{x \sim D}[g(x)=1] + \gamma K. $$ We will choose $\gamma=1/12K$. We may assume that $\Pr_{x \sim D}[f(x)=1] \in [1/3,2/3]$, otherwise the constant $1$ function correlates with $f$ under $D$. Thus $\Pr_{x \sim D}[g(x)=1] \in [1/4,3/4]$. This implies, by the same argument as in the original paper of Jackson, there there is a term $C$ of $g$ which is $\Omega(1 / s)$-correlated with $g$. One can verify that as $g(x) \le f(x)$, $C$ is also $\Omega(1 / s)$-correlated with $f$. Finally, we need to bound $K$. It is known (see for example \cite{klivans2003boosting}) that boosting algorithms can be restricted to have $K=\varepsilon^{-O(1)}$, which completes the proof. \end{proof} \subsection{Proof overview} We give a high-level overview of the proof of \Cref{thm:main}. Let $L=((C_i,v_i))$ be a decision list of width $w$ and size $m$. \paragraph{General Framework.} Given a subset $J \subset [m]$, we denote by $L|_J$ the decision list restricted to the rules in $J$, where we delete the rest. Our goal is to find a small subset $J \subset [m]$ such that $L|_J$ approximates $L$. We say that a rule $(C_i,v_i)$ of $L$ is \emph{hit} by an input $x$ if $C_i(x)=1$ and $C_j(x)=0$ for $j<i$; in this case, $L(x)=v_i$. The main intuition underlying our approach is: \begin{center}\it If a rule is rarely hit by random inputs, then we can safely remove it. \end{center} Armed with this intuition, our approach is to choose $J$ to be the set of rules with the highest probability of being hit. We show that in order to get an $\varepsilon$-approximation, it suffices to keep the top $\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}$ rules. Our general approach follows that of Lovett and Zhang \cite{LovettZ19}. They combined two central results in the analysis of boolean functions: \emph{random restrictions} and \emph{noise stability}. The main innovation in the current work is that we apply random restrictions that fix only a small fraction of the inputs; this is in contrast to the common use of random restrictions, such as in the proof of H{\aa}stad's switching lemma \cite{Hastad87}, where most variables are fixed. The ability to handle random restrictions which fix only a small fraction is what allows us to obtain improved bounds. \paragraph{Mild random restrictions.} An index $i \in [m]$ is said to be \emph{useful} if there exists an assignment $x$ such that the evaluation of $L(x)$ hits the $i$-th rule (and hence outputs $v_i$). We denote the number of useful indices in $L$ by $\usenum{L}$. This notion is natural, as we can always discard rules if no assignment hits them. The main point is that restrictions can render some rules in a decision list useless. Let $\rho$ be a random restriction that keeps each variable alive with probability $\alpha$. We show that on average, the restricted decision list $L\restriction_{\rho}$ has a small number of useful indices: $$ \E_{\rho}\sbra{\usenum{L\restriction_\rho}}\leq \pbra{\frac{4}{1-\alpha}}^w. $$ The proof is based on an encoding argument. Let $\rho$ be a restriction for which $L\restriction_{\rho}$ has $T$ useful indices. Let $t \in [T]$ be uniformly chosen. We construct a new restriction $\rho'$ by further restricting the variables in the $t$-th useful rule so that this rule is satisfied. Then from $\rho'$ and some small additional information $a$, we can recover both $\rho$ and $t$. This shows that the probability of $T$ being too large is very low, as the entropy of $(\rho',a)$ is much lower than that of $(\rho,t)$. \paragraph{Noise Stability.} Since there is no guarantee about the value on each rule of the decision list, it is convenient to consider the following index function. Let $L=((C_i,v_i))_{i\in[m]}$ be a decision list on $n$ variables. The index function of $L$ outputs for an input $x$ the index $i$ of the first term in $L$ satisfied by $x$. Equivalently, $\text{Ind} L$ is given by the decision list $\text{Ind} L =((C_i,i))_{i\in[m]}$. We make two important definitions. What we \emph{want} to analyze are the quantities $$ p_L(i):=\Pr_x\sbra{\text{Ind} L(x)=i}, $$ where $x$ is taken from the uniform distribution of the input. In particular, we want to show that there is a small set of indices $J$ such that $\sum_{i \in J} p_L(i) \ge 1-\varepsilon$. What we \emph{can} analyze using random restrictions are the quantities $$ q_L(\alpha,i)=\Pr_{\rho}\sbra{\text{index }i\text{ is useful in }L\restriction_\rho}, $$ since it holds that $$ \sum_iq_L(\alpha,i)=\E_{\rho}\sbra{\usenum{L\restriction_\rho}} \le \pbra{\frac{4}{1-\alpha}}^w. $$ We use noise stability to bridge between the two. Let $\beta=1-\alpha$. For any $x\in\{0,1\}^n$, the noise distribution $y\sim\mathcal{N}_\beta(x)$ is sampled by taking $\Pr\sbra{y_i=x_i}=\frac{1+\beta}2$ independently for $i\in[n]$. Consider sampling $x \in \{0,1\}^n$ uniformly and $y\sim\mathcal{N}_\beta(x)$. We can equivalently sample the pair $(x,y)$ by first sampling a common restriction $\rho$, where each variables stays alive with probability $\alpha$, and then sample its completion for $x$ and $y$ independently. Let $$ \text{Stab}_L(\beta,i):=\Pr_{x,y}\sbra{\text{Ind} L(x)=\text{Ind} L(y)=i}. $$ We show that $p_L(i)$ and $q_L(\alpha,i)$ are both polynomially related, by relating them to $\text{Stab}_L(\beta,i)$: $$ \frac{p_L(i)^2}{q_L(1-\beta,i)}\leq\text{Stab}_L(\beta,i)\leq p_L(i)^{\frac2{1+\beta}}. $$ The upper bound is proven by hypercontrativity, and the lower bound by a somewhat delicate Cauchy-Schwarz inequality. This allows us to obtain that $$ p_L(i)\leq q_L(1-\beta,i)^{\frac{1+\beta}{2\beta}}. $$ Finally, we put everything together by optimizing the value of $\beta$. \paragraph{Related works.} We already discussed the works of Gopalan, Meka and Reingold \cite{GopalanMR13} and Lovett and Zhang \cite{LovettZ19} which gave weaker bounds for DNF sparsification than those in \Cref{thm:main}. There have been previous works studying how small-width DNFs simplify under mild random restrictions that fix a small fraction of the variables (say, $1\%$). Segerlind, Buss and Impagliazzo's work \cite{segerlind2004switching}, improved by Razborov \cite{razborov2015pseudorandom}, show that width-$w$ DNFs simplify to a decision tree of depth $2^{O(w)}$. We obtain bounds on size (namely, number of useful terms) in \Cref{thm:main}, which are better than bounds on depth. However, we only bound the first moment (that is, expected number of useful terms), while \cite{razborov2015pseudorandom} bounds higher moments as well. So to some extent, the results are incomparable. We believe that with some further work, one can improve our techniques to obtain bounds on higher moments as well (this was unnecessary for the current work). Finally, it is also worthwhile to mention the work by the authors and Alweiss \cite{alweiss2019improved}, where mild random restrictions (of a somewhat different flavor) were used to obtain improved bounds for the sunflower lemma in combinatorics. \paragraph{Paper Organization.} In \Cref{sec:upper}, we prove the upper bound on decision list compression. In \Cref{sec:lower}, we give the lower bounds to show the tightness of our result. \paragraph{Acknowledgements.} We thank Ben Rossman for invaluable discussions. We also thank Ryan Alweiss and the anonymous reviewers for helpful suggestions on an earlier version of this paper. \section{Upper bounds} \label{sec:upper} We start by make some definitions formal. We denote $[n]=\cbra{1,2,\ldots,n}$, variables are $x_1,\ldots,x_n$, and literals are $x_1,\neg x_1,\ldots,x_n,\neg x_n$. A \emph{term} is a conjunction of literals. \begin{definition}[Decision list] A width-$w$ size-$m$ decision list is a list $L=((C_i,v_i))_{i\in[m]}$ of rules. A rule is a pair $(C_i,v_i)$, where $C_i$ is a term containing at most $w$ literals and each $v_i$ is a value in some finite set $V$. We assume $C_m \equiv 1$, and $(C_m,v_m)$ is the final default rule. For any $J\subseteq[m]$ with $m\in J$, we denote by $L|_J=((C_{j},v_{j}))_{j \in J}$ the restriction of $L$ to the rules in $J$, where elements of $J$ are taken in ascending order. \end{definition} The evaluation of $L$ given assignment $x$ is to find the first index $i$ such that $C_i(x)=1$ and then to output $L(x)=v_i$. We make additional remarks for the decision list to avoid potential pitfalls. \begin{itemize} \item If $m\notin J$, we will consider $L|_J$ invalid, as it does not have a default rule at the end. \item No variable appears in any single term more than once, which rules out $x_1\land x_1$ and $x_1\land\neg x_1$. \end{itemize} Our goal in this section is to prove the following theorem, which is the upper bound part in \Cref{thm:main}. \begin{theorem}\label{thm:compress} Let $L=((C_i,v_i))_{i\in[m]}$ be a width-$w$ decision list. Then for every $\varepsilon>0$, there exists $J\subseteq[m],m\in J$ of size $|J|=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}$ such that $\Pr\sbra{L(x)\neq L|_J(x)}\leq\varepsilon$. \end{theorem} \subsection{Useful indices} Since there is no guarantee about the value on each rule of the decision list, it is convenient to consider the index function. Let $L=((C_i,v_i))_{i\in[m]}$ be a decision list on $n$ variables. The index function of $L$ is a function $\text{Ind} L:\{0,1\}^n\to[m]$, given by $$ \text{Ind} L(x)=\min\cbra{i\in[m]\mid C_i(x)=1}. $$ Equivalently, $\text{Ind} L$ is given by the decision list $\text{Ind} L =((C_i,i))_{i\in[m]}$. Using the index function, it suffices to discard some rules of $L$ and show it still approximates the index function. \begin{claim}\label{clm:transfertoindex} Let $L=((C_i,v_i))_{i\in[m]}$ be a decision list. Then for any $J\subseteq[m],m\in J$, we have $$ \Pr\sbra{L(x)\neq L|_J(x)}\leq\Pr\sbra{\text{Ind} L(x)\notin J}. $$ \end{claim} \begin{proof} This follows as if $\text{Ind} L(x)=j\in J$, then $L(x)=L|_J(x)=v_j$. \end{proof} Obviously, if a rule of a decision list is covered by some previous rules, then we can safely remove it. For example, in $(x_1,1),(x_1\land x_2,2)$ the second rule is useless. To make this more formal, we introduce the following notion of a \emph{useful index}. \begin{definition}[Useful index] Given size-$m$ decision list $L$, an index $i\in[m]$ is said to be \emph{useful} if there exists an assignment $x$ such that $\text{Ind} L(x)=i$. We denote by $\usenum L$ the number of useful indices in $L$. \end{definition} \begin{example} Assume $L=((x_1,a),(x_1\land\neg x_2,b),(1,c),(x_1,d),(1,e))$. Then indices $1,3$ are useful, but indices $2,4,5$ are not. So $\usenum L=2$. \end{example} The main intuition underlying our approach is that rules that are hardly hit by random inputs can be removed. Motivated by this, we define \emph{hit probability} $$ p_L(i):=\Pr\sbra{\text{Ind} L(x)=i}. $$ \begin{claim}\label{clm:hitprobsum} For any size-$m$ decision list $L$, we have $\sum_{i=1}^mp_L(i)=1$. \end{claim} \begin{proof} This follows as the events $[\text{Ind} L(x)=i]$ are a partition of the probability space. \end{proof} The following is our main technical lemma. \begin{lemma}\label{lem:compress} Let $L=((C_i,v_i))_{i\in[m]}$ be a width-$w$ decision list. Sort $[m]=\{j_1,\ldots,j_m\}$ such that $p_L(j_1)\geq p_L(j_2)\geq\cdots\geq p_L(j_m)$. For any $\varepsilon>0$, let $$ t=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}. $$ Then for $J=\{j_1,\ldots,j_t,m\}$ it holds that $\Pr\sbra{\text{Ind} L(x)\notin J}\leq\varepsilon$. \end{lemma} The proof of \Cref{thm:compress} follows immediately, by combining \Cref{lem:compress} and \Cref{clm:transfertoindex}. \subsection{Random restrictions and encoding} A \emph{restriction} on $n$ variables is $\rho\in\cbra{0,1,*}^n$. An $(n,k)$-random restriction is the uniform distribution over restrictions $\rho\in\cbra{0,1,*}^n$ with exactly $k$ stars, which we denote by $\mathscr{R}(n,k)$. An $(n,\alpha)$-random restriction, which we denote by $\mathscr{U}(n,\alpha)$, assigns independently each bit of the restriction $\rho$ to $0,1,*$ with probability $\frac{1-\alpha}2,\frac{1-\alpha}2,\alpha$ respectively. Given a decision list $L:\{0,1\}^n\to V$, its restriction under $\rho$ is $L\restriction_\rho:\{0,1\}^{\rho^{-1}(*)}\to V$. \begin{definition}[Useful probability] Given size-$m$ decision list $L$ and $\alpha\in(0,1)$, the useful probability of an index $i\in[m]$ is $$ q_L(\alpha,i):=\Pr_{\rho\sim\mathscr{U}(n,\alpha)}\sbra{\text{index }i\text{ is useful in }L\restriction_\rho}. $$ \end{definition} Note that we assume $L$ initially does not contain useless rules, so for any $\alpha$ and $i$, we always have $q_L(\alpha,i)>0$. We also have the following simple fact regarding useful probability. \begin{claim}\label{clm:usefulprobsum} For any size-$m$ decision list $L$, we have $\sum_{i=1}^mq_L(\alpha,i)=\E_{\rho\sim\mathscr{U}(n,\alpha)}\sbra{\usenum{L\restriction_\rho}}$. \end{claim} \begin{proof} Let $1_{\rho,i}$ be the indicator of index $i$ being useful in $L\restriction_\rho$. Then $$ \E_{\rho\sim\mathscr{U}(n,\alpha)}\sbra{\usenum{L\restriction_\rho}}=\E_\rho\sbra{\sum_{i=1}^m 1_{\rho,i}}=\sum_{i=1}^m\E_\rho\sbra{1_{\rho,i}}=\sum_{i=1}^m q_L(\alpha,i). $$ \end{proof} Now we present an encoding/decoding scheme for random restriction and analyze the expectation in \Cref{clm:usefulprobsum} explicitly. Let $\alpha \in (0,1)$ be such that $\alpha n$ is an integer. Define: \begin{align*} &\mathcal{U}:=\cbra{(\rho,s)\bigg|\rho\in\mathscr{R}(n,\alpha n),s \in \{1,\ldots,\usenum{L\restriction_\rho}\}}\\ &\mathcal{V}:=\cbra{(\rho',a)\bigg|\rho'\in\bigcup_{k=0}^w\mathscr{R}(n,\alpha n-k),a\in\cbra{\textsc{Old},\textsc{New}}^w}. \end{align*} We define two deterministic algorithms $\text{Enc}:\mathcal{U}\to\mathcal{V}$ and $\text{Dec}:\text{Enc}(\mathcal{U})\subseteq\mathcal{V}\to\mathcal{U}$ such that $\text{Dec}(\text{Enc}(\rho,s))=(\rho,s)$ holds for any $(\rho,s)\in\mathcal{U}$. \begin{algorithm}[H] \caption{Encoding algorithm $\text{Enc}(\rho,s)$}\label{alg:singleEnc} \DontPrintSemicolon \LinesNumbered \KwIn{restriction and index $(\rho,s)\in\mathcal{U}$} \KwOut{restriction and string $(\rho',a)\in\mathcal{V}$} $I\gets\cbra{i\mid i\text{ is a useful index in }L\restriction_\rho}$\; $j\gets\text{the $s$-th element in }I$\; $\rho'\gets\rho,a\gets\varnothing$\; \tcc{Assume $C_j=\bigwedge_{k=1}^cy_{j_k},y_{j_k}\in\cbra{x_{j_k},\neg x_{j_k}},c\leq w$} \For{$k=1$ \KwTo $c$}{ \eIf{$\rho(x_{j_k})\in\{0,1\}$}{ Append $a$ with $\textsc{Old}$\tcc*{$x_{j_k}$ is already set by $\rho$} }{ Append $a$ with $\textsc{New}$\tcc*{$x_{j_k}$ is newly set to satisfy this term} \leIf{$y_{j_k}=x_{j_k}$}{Update $\rho'(x_{j_k})\gets1$}{Update $\rho'(x_{j_k})\gets0$} } Complete $a$ arbitrarily to length $w$\; } \Return{$(\rho',a)$} \end{algorithm} \begin{algorithm}[ht] \caption{Decoding algorithm $\text{Dec}(\rho',a)$}\label{alg:singleDec} \DontPrintSemicolon \LinesNumbered \KwIn{restriction and string $(\rho',a)\in\text{Enc}(\mathcal{U})\subseteq\mathcal{V}$} \KwOut{restriction and index $(\rho,s)\in\mathcal{U}$} $j\gets\text{index of the first satisfied term in }L\restriction_{\rho'}$\; $\rho\gets\rho'$\; \tcc{Assume $C_j=\bigwedge_{k=1}^cy_{j_k},y_{j_k}\in\cbra{x_{j_k},\neg x_{j_k}},c\leq w$} \For{$k=1$ \KwTo $c$}{ \If(\tcc*[f]{$x_{j_k}$ was not set by $\rho$}){$a_k=\textsc{New}$}{ Update $\rho(x_{j_k})\gets*$\; } } $I\gets\cbra{i\mid i\text{ is a useful index in }L\restriction_\rho}$\; $s\gets\text{rank of $j$ in $I$}$\; \Return{$(\rho,s)$} \end{algorithm} The following claim proves the correctness of the encoding and decoding algorithms. \begin{claim}\label{claim:singleEncDec} $\text{Dec}(\text{Enc}(\rho,s))=(\rho,s)$ holds for any $(\rho,s)\in\mathcal{U}$. \end{claim} \begin{proof} Sort literals in each term of $L=((C_i,v_i))_{i\in[m]}$ arbitrarily. To justify the correctness, let $(\rho',a)=\text{Enc}(\rho,s)$, then we need to ensure: \begin{itemize} \item $\text{Dec}(\rho',a)$ obtains the same $j$ in line 1 as $\text{Enc}(\rho,s)$ does in line 2: During $\text{Enc}(\rho,s)$, index $j$ is useful in $L\restriction_\rho$, thus setting unfixed variables to satisfy $C_j$ will not make any term $C_i$ for $i<j$ satisfied. Hence the first satisfied term in $L\restriction_{\rho'}$ is $C_j$. \item $\text{Dec}(\rho',a)$ in line 8 obtains the correct $\rho$: Since each term is sorted in advance, and $a$ encodes which variable in $C_j$ is set by $\text{Enc}(\rho,s)$ rather than $\rho$, the loop in $\text{Dec}(\rho',a)$ will set these variables back to $*$ and recover $\rho$. \end{itemize} \end{proof} \begin{corollary} \label{cor:UV} $|\mathcal{U}| \le |\mathcal{V}|$. \end{corollary} \begin{proof} $\text{Enc}$ is an injection from $\mathcal{U}$ to $\text{Enc}(\mathcal{U}) \subset \mathcal{V}$. \end{proof} \begin{lemma}\label{lemma:expectedusenum} Let $L$ be a width-$w$ decision list on $n$ variables and let $\alpha\in(0,1)$. Then $$ \E_{\rho\sim\mathscr{U}(n,\alpha)}\sbra{\usenum{L\restriction_\rho}}\leq\pbra{\frac4{1-\alpha}}^w. $$ \end{lemma} \begin{proof} We first prove the bound for $\rho\sim\mathscr{R}(n,\alpha n)$ and then increase the number of variables to infinity, by adding dummy variables. This proves the desired bound as for $n' \to \infty$, the restriction of $\mathscr{R}(n',\alpha n')$ to the first $n$ variables converges to $\mathscr{U}(n,\alpha)$. We have \begin{align*} &\E_{\rho\sim\mathscr{R}(n,\alpha n)}\sbra{\usenum{L\restriction_\rho}}=\frac1{\abs{\mathscr{R}(n,\alpha n)}}\sum_{\rho\in\mathscr{R}(n,\alpha n)}\usenum{L\restriction_\rho}\\ =&\frac{|\mathcal{U}|}{\abs{\mathscr{R}(n,\alpha n)}}\leq\frac{|\mathcal{V}|}{\abs{\mathscr{R}(n,\alpha n)}}\leq\frac{\pbra{\sum_{k=0}^w\binom{n}{\alpha n-k}2^{(1-\alpha)n+k}}\times2^w}{\binom n{\alpha n}2^{(1-\alpha)n}}\\ \leq&\frac{\pbra{\sum_{k=0}^w\binom{n}{\alpha n-k}}\times4^w}{\binom n{\alpha n}}\leq\frac{\binom{n+w}{\alpha n}\times4^w}{\binom n{\alpha n}}\leq\pbra{\frac4{1-\alpha}}^w. \end{align*} \end{proof} \subsection{Noise stability} We use noise stability as a bridge between $p_L(i)$ and $q_L(\alpha,i)$. \begin{definition}[Noisy distribution] Given $x\in\{0,1\}^n$ and a noise parameter $\beta\in(0,1)$, we denote by $\mathcal{N}_\beta(x)$ the distribution over $y\in\{0,1\}^n$, where $\Pr\sbra{y_i=x_i}=\frac{1+\beta}2,\Pr\sbra{y_i\neq x_i}=\frac{1-\beta}2$ independently for all $i\in[n]$. \end{definition} \begin{definition}[Stability] Let $g:\{0,1\}^n\to\{0,1\}$ be a boolean function. The $\beta$-stability of $g$ is $$ \text{Stab}_\beta(g)=\Pr_{x \in \{0,1\}^n, y\sim\mathcal{N}_\beta(x)}\sbra{g(x)=g(y)=1}. $$ \end{definition} The hypercontractive inequality (see for example \cite{o2014analysis}, page 259) allows us to bound the stability of a boolean function by its acceptance rate. \begin{fact}\label{fct:hypercontractivity} Let $g:\{0,1\}^n \to \{0,1\}$ and $\beta\in(0,1)$. Then $\text{Stab}_\beta(g)\leq\pbra{\Pr\sbra{g(x)=1}}^{\frac2{1+\beta}}$. \end{fact} Next, we define index stability and relate it to useful probability $q_L(\cdot,\cdot)$ and hit probability $p_L(\cdot)$. \begin{definition}[Index stability] Given a size-$m$ decision list $L$ on $n$ variables, the $\beta$-stability of index $i\in[m]$ is $$ \text{Stab}_L(\beta,i):=\Pr_{x \in \{0,1\}^n, y\sim\mathcal{N}_\beta(x)}\sbra{\text{Ind} L(x)=\text{Ind} L(y)=i}. $$ \end{definition} \begin{lemma}[Bridging lemma]\label{lem:bridging} Let $L$ be a size-$m$ width-$w$ decision list on $n$ variables. Then for any index $i\in[m]$ and $\beta\in(0,1)$, we have $$ \frac{p_L(i)^2}{q_L(1-\beta,i)}\leq\text{Stab}_L(\beta,i)\leq p_L(i)^{\frac2{1+\beta}}. $$ \end{lemma} \begin{proof} We first prove the upper bound. Let $g:\{0,1\}^n\to\{0,1\}$ be an indicator boolean function for $\text{Ind} L(x)=i$. Then using \Cref{fct:hypercontractivity}, we have $$ \text{Stab}_L(\beta,i)=\text{Stab}_\beta(g)\leq\pbra{\Pr\sbra{g(x)=1}}^{\frac2{1+\beta}}=\pbra{\Pr\sbra{\text{Ind} L(x)=i}}^{\frac2{1+\beta}}=p_L(i)^{\frac2{1+\beta}}. $$ We now turn to prove the lower bound. Let $\alpha=1-\beta$. Observe that we can sample $(x,y)$ where $x \in \{0,1\}^n,y\sim\mathcal{N}_\beta(x)$ as follows: \begin{itemize} \item Sample restriction $\rho\sim\mathscr{U}(n,\alpha)$; \item Sample uniform $x'\in\{0,1\}^{\rho^{-1}(*)}$ and complete stars in $\rho$ with it as $x$; \item Sample uniform $y'\in\{0,1\}^{\rho^{-1}(*)}$ and complete stars in $\rho$ with it as $y$. \end{itemize} We thus have $$ \text{Stab}_L(\beta,i)=\Pr_{\rho,x',y'}\sbra{\text{Ind} L\restriction_\rho(x')=\text{Ind} L\restriction_\rho(y')=i}. $$ We now make a seemingly redundant, but surprisingly useful, conditioning. Let $\mathcal{E}(\rho,i)$ denote the event $$ \mathcal{E}(\rho,i) := \sbra{i \text{ is useful in }L\restriction_\rho}. $$ Then we can equivalently write $$ \text{Stab}_L(\beta,i)=\Pr_{\rho,x',y'}\sbra{\text{Ind} L\restriction_\rho(x')=\text{Ind} L\restriction_\rho(y')=i \wedge \mathcal{E}(\rho,i)}. $$ For any fixed $\rho$, define $$ r_{\rho}(i):=\Pr_{x'}\sbra{\text{Ind} L\restriction_{\rho}(x')=i}. $$ Since $x',y'$ are independent for any fixed restriction, we have \begin{align*} \text{Stab}_L(\beta,i) =&\Pr_{\rho}[\mathcal{E}(\rho,i)] \cdot \Pr_{\rho,x',y'} \sbra{\text{Ind} L\restriction_\rho(x')=\text{Ind} L\restriction_\rho(y')=i\bigg|\mathcal{E}(\rho,i)}\\ =&q_L(\alpha,i) \cdot \E_{\rho}\sbra{r_{\rho}(i)^2\bigg|\mathcal{E}(\rho,i)}\\ \geq&q_L(\alpha,i) \cdot \pbra{\E_{\rho}\sbra{r_{\rho}(i)\bigg|\mathcal{E}(\rho,i)}}^2\tag{Cauchy-Schwarz inequality}\\ =&\frac1{q_L(\alpha,i)}\pbra{q_L(\alpha,i) \cdot \E_{\rho}\sbra{r_{\rho}(i)\bigg|\mathcal{E}(\rho,i)}}^2\\ =&\frac1{q_L(\alpha,i)}\pbra{\Pr_{\rho,x'}\sbra{\text{Ind} L\restriction_\rho(x')=i\wedge\mathcal{E}(\rho,i)}}^2\\ =&\frac1{q_L(\alpha,i)}\pbra{\Pr_{\rho,x'}\sbra{\text{Ind} L\restriction_\rho(x')=i}}^2\\ =&\frac1{q_L(\alpha,i)}\pbra{\Pr_{x}\sbra{\text{Ind} L(x)=i}}^2 =\frac{p_L(i)^2}{q_L(\alpha,i)}. \end{align*} \end{proof} \begin{corollary}\label{cor:bridging} Let $L$ be a size-$m$ width-$w$ decision list. Then for any index $i\in[m]$ and $\beta\in(0,1)$, we have $$ p_L(i)\leq q_L(1-\beta,i)^{\frac{1+\beta}{2\beta}}. $$ \end{corollary} As a remark, we note that \Cref{lem:bridging} can be generalized to arbitrary boolean functions with a similar proof. \begin{lemma}\label{lem:general_bridging} Let $g:\{0,1\}^n\to\{0,1\}$ be a boolean function which is not identically zero. Set $|g|=\Pr\sbra{g(x)=1}$. Then for any $\beta\in(0,1)$, we have $$ \frac{|g|^2}{\displaystyle\Pr_{\rho\sim\mathscr{U}(n,1-\beta)}[g\restriction_\rho\not\equiv0]}\leq\text{Stab}_\beta(g)\leq|g|^{\frac2{1+\beta}}. $$ \end{lemma} \subsection{Putting everything together} Now we put everything together and give the proof of \Cref{lem:compress}. \begin{proof}[Proof of \Cref{lem:compress}] Recall that we sorted $[m]=\{j_1,\ldots,j_m\}$ such that $p_L(j_1)\geq p_L(j_2)\geq\cdots\geq p_L(j_m)$. Let $J=\{j_1,\ldots,j_t,m\}$ for $t$ to be optimized later. Next, let $\beta\in(0,1)$ to be optimized later and set $\alpha=1-\beta$. Sort $[m]=\{i_1,\ldots,i_m\}$ such that $q_L(\alpha,i_1)\geq q_L(\alpha,i_2)\geq\cdots\geq q_L(\alpha,i_m)$. By \Cref{clm:usefulprobsum} and \Cref{lemma:expectedusenum}, we have $$ \sum_{k=1}^mq_L(\alpha,i_k)=\E_{\rho\sim\mathscr{U}(n,\alpha)}\sbra{\usenum{L\restriction_\rho}}\leq\pbra{\frac4{1-\alpha}}^w=\pbra{\frac4\beta}^w. $$ Note that we have sorted $q_L$ in decreasing order, so $$ q_L(\alpha,i_k)\leq\frac1k\pbra{\frac4\beta}^w. $$ Observe that $j_1,\ldots,j_t$ have the largest hit probability, and apply \Cref{cor:bridging}, then \begin{align*} \sum_{j\notin J}p_L(j)&\leq\sum_{k=t+1}^mp_L(j_k)\leq\sum_{k=t+1}^mp_L(i_k)\leq \sum_{k=t+1}^m q_L(\alpha,i_k)^{\frac{1+\beta}{2\beta}}\\ &\leq\pbra{\frac4\beta}^{w\times\frac{1+\beta}{2\beta}}\sum_{k \ge t+1}\pbra{\frac1k}^{\frac{1+\beta}{2\beta}}\\ &\leq\pbra{\frac4\beta}^{w\times\frac{1+\beta}{2\beta}}\times\frac{2\beta}{1-\beta}\times t^{-\frac{1-\beta}{2\beta}}. \end{align*} If we restrict $\beta\leq1/2$ and choose $$ t=\pbra{\frac1\varepsilon}^{\frac{2\beta}{1-\beta}}\pbra{\frac4\beta}^{w\times\frac{1+\beta}{1-\beta}}\pbra{\frac{2\beta}{1-\beta}}^{\frac{2\beta}{1-\beta}}\leq4\pbra{\frac1\varepsilon}^{4\beta}\pbra{\frac4\beta}^{3w}, $$ then $$ \Pr\sbra{\text{Ind} L(x)\notin J}=\sum_{j\notin J}p_L(j)\leq\varepsilon. $$ Now we divide $\varepsilon$ into two cases. Assume $\varepsilon=2^{-\ell w}$. Then: \begin{itemize} \item If $\ell \le 2$ we set $\beta=1/2$ and get $t=2^{O(w)}$. \item If $\ell \ge 2$ we set $\beta=1/\ell$ and get $t=\ell^{O(w)}$. \end{itemize} One can verify that in either case we get $$ t=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}. $$ \end{proof} \section{Lower bounds} \label{sec:lower} In this section, we prove two lower bounds for decision list compression, which show that the bounds in \Cref{thm:main} are tight up to constants. \begin{claim}\label{lem:approxlowerbound} For any $w$, there is a width-$w$ decision list $L:\{0,1\}^w\to\{0,1\}$ such that $$ \Pr\sbra{L(x)\neq L'(x)}>1/3 $$ for any width-$w$ decision list $L'$ of size at most $2^w/100w$. \end{claim} \begin{proof} Since any boolean function on $w$ variables can be expressed as some width-$w$ decision list, there are $2^{2^w}$ possible $L$. On the other hand, for any fixed $L'$, it can approximate at most $$ \binom{2^w}{2^w/3}\times2^{2^w/3}\leq2^{0.97\times2^w} $$ different boolean functions within distance $1/3$; and for fixed size $m$, there are at most $\pbra{3^w\times 2}^m$ distinct size-$m$ width-$w$ decision lists. As small-size decision lists can be embedded in larger ones, when restricted to size at most $2^w/100w$, width-$w$ decision lists only approximate at most $$ \pbra{3^w\times 2}^{\frac{2^w}{100w}}\times2^{0.97\times2^w}<2^{2^w} $$ different boolean functions on $w$ variables. \end{proof} \begin{claim}\label{lem:exactlowerbound} For any $w$ and $n>2w$, there is a width-$w$ decision list $L:\{0,1\}^n\to\{0,1\}$ which is not equivalent to any width-$w$ decision list $L'$ of size smaller than $\binom nw/n^2$. \end{claim} \begin{proof} Let $m=\binom nw$ and sort all $\binom nw$ subsets of $[n]$ with size $w$ as $\cbra{S_1,\ldots,S_m}$ arbitrarily. For any $i\in[m]$, define $C_i=\bigwedge_{j\in S_i}x_j$. For any $v\in\{0,1\}^m$, let $L_v=((C_1,v_1),\ldots,(C_m,v_m),(1,0))$ be a size-$(m+1)$ width-$w$ decision list. As small-size decision lists can be embedded in larger ones, assume towards a contradiction that any $L_v$ is equivalent to some size-$(m/n^2)$ width-$w$ decision list $L_v'$. Given $L_v'$, we can recover $L_v$ by enumerating all assignments, since all rules in $L_v$ are useful. Thus, by counting argument, the number of possible $L_v'$ is upper bounded by $$ \pbra{2\times\sum_{k=0}^w2^k\binom nk}^{\binom nw/n^2}\leq\binom nw^{2m/n^2}<2^m. $$ \end{proof} Now the general lower bound follows immediately. \begin{corollary}\label{cor:lowerbound} For any $w$ and $\varepsilon\leq1/3$, there is a width-$w$ decision list $L$ such that $$ \Pr\sbra{L(x)\neq L'(x)}>\varepsilon $$ holds for any width-$w$ decision list $L'$ of size at most $$ \pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}. $$ \end{corollary} \begin{proof} For $\varepsilon\geq2^{-2w}$, let $L$ be the decision list in \Cref{lem:approxlowerbound}. Then it cannot be approximated within $\varepsilon<1/3$ by a decision list $L'$ of size at most $$ \frac{2^w}{100w}=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}. $$ For $\varepsilon<2^{-2w}$, let $L$ be the decision list in \Cref{lem:exactlowerbound} with $n=\log(1/\varepsilon)$. Since now $\varepsilon=2^{-n}$, the desired $L'$ must be equivalent to $L$. Thus it cannot be realized by a decision list $L'$ of size at most $$ \frac{\binom nw}{n^2}=\binom{\log\frac1\varepsilon}w^{O(1)}=\pbra{2+\frac1w\log\frac1\varepsilon}^{O(w)}. $$ \end{proof} \bibliographystyle{abbrv}
\section{Conclusion} \label{sec:conclusion} Our results with DEER show that a single-stage retrieval approach for entities from mentions is highly effective: without any domain-specific tuning, it performs at least as well as the best comparable two-stage systems. While our bag-of-ngrams encoders provided a strong proof of concept, we can almost certainly improve results with more sophisticated encoders, using a BERT architecture \cite{devlin2018bert}, for example. Further, by virtue of approximate search techniques, it can be used for very fast retrieval, and is likely to scale reasonably to much larger knowledge bases. We also note that the dual encoder approach allows for interesting extensions beyond traditional entity linking. For example, the context encodings provide a natural model for building entity expectations during text processing, such that entities relevant to the context can be retrieved and used for reference resolution as a document is processed incrementally. We expect this will be useful for collective entity resolution as well as modeling coherence. Finally, while we focus on training with English Wikipedia, \citet{sil:etal:aaai2018} show that using cross-lingual datasets can help to refine the context information more effectively. Since English constitutes only a fraction of the total Wikipedia, and entity IDs are (mostly) language-independent, there is great opportunity to extend this work to far more training examples across far more languages. \section{Credits} This document has been adapted from the instructions for earlier ACL, EMNLP, and NAACL proceedings. It represents a recent build from \url{https://github.com/acl-org/acl-pub}, with modifications by Miikka Silfverberg and Sebastian Ruder, based on the EMNLP 2019 instructions by Fei Liu and Pontus Stenetorp, EMNLP 2018 instructions by Micha Elsner and Preethi Raghavan, NAACL 2018 instructions by Margaret Michell and Stephanie Lukin, 2017/2018 (NA)ACL bibtex suggestions from Jason Eisner, ACL 2017 by Dan Gildea and Min-Yen Kan, NAACL 2017 by Margaret Mitchell, ACL 2012 by Maggie Li and Michael White, those from ACL 2010 by Jing-Shing Chang and Philipp Koehn, those for ACL 2008 by Johanna D. Moore, Simone Teufel, James Allan, and Sadaoki Furui, those for ACL 2005 by Hwee Tou Ng and Kemal Oflazer, those for ACL 2002 by Eugene Charniak and Dekang Lin, and earlier ACL and EACL formats. Those versions were written by several people, including John Chen, Henry S. Thompson and Donald Walker. Additional elements were taken from the formatting instructions of the {\em International Joint Conference on Artificial Intelligence} and the \emph{Conference on Computer Vision and Pattern Recognition}. \section{Introduction} The following instructions are directed to authors of papers submitted to \confname{} or accepted for publication in its proceedings. All authors are required to adhere to these specifications. Authors are required to provide a Portable Document Format (PDF) version of their papers. \textbf{The proceedings are designed for printing on A4 paper.} \section{General Instructions} Manuscripts must be in two-column format. Exceptions to the two-column format include the title, authors' names and complete addresses, which must be centered at the top of the first page, and any full-width figures or tables (see the guidelines in Subsection~\ref{ssec:first}). {\bf Type single-spaced.} Start all pages directly under the top margin. See the guidelines later regarding formatting the first page. The manuscript should be printed single-sided and its length should not exceed the maximum page limit described in Section~\ref{sec:length}. Pages are numbered for initial submission. However, {\bf do not number the pages in the camera-ready version}. By uncommenting {\small\verb|\aclfinalcopy|} at the top of this document, it will compile to produce an example of the camera-ready formatting; by leaving it commented out, the document will be anonymized for initial submission. The review process is double-blind, so do not include any author information (names, addresses) when submitting a paper for review. However, you should maintain space for names and addresses so that they will fit in the final (accepted) version. The \confname{} \LaTeX\ style will create a titlebox space of 2.5in for you when {\small\verb|\aclfinalcopy|} is commented out. The author list for submissions should include all (and only) individuals who made substantial contributions to the work presented. Each author listed on a submission to \confname{} will be notified of submissions, revisions and the final decision. No authors may be added to or removed from submissions to \confname{} after the submission deadline. \subsection{The Ruler} The \confname{} style defines a printed ruler which should be presented in the version submitted for review. The ruler is provided in order that reviewers may comment on particular lines in the paper without circumlocution. If you are preparing a document without the provided style files, please arrange for an equivalent ruler to appear on the final output pages. The presence or absence of the ruler should not change the appearance of any other content on the page. The camera ready copy should not contain a ruler. (\LaTeX\ users may uncomment the {\small\verb|\aclfinalcopy|} command in the document preamble.) Reviewers: note that the ruler measurements do not align well with lines in the paper -- this turns out to be very difficult to do well when the paper contains many figures and equations, and, when done, looks ugly. In most cases one would expect that the approximate location will be adequate, although you can also use fractional references ({\em e.g.}, the first paragraph on this page ends at mark $108.5$). \subsection{Electronically-available resources} \conforg{} provides this description in \LaTeX2e{} ({\small\tt conll-2019.tex}) and PDF format ({\small\tt conll-2019.pdf}), along with the \LaTeX2e{} style file used to format it ({\small\tt conll-2019.sty}) and an ACL bibliography style ({\small\tt acl\_natbib.bst}) and example bibliography ({\small\tt conll-2019.bib}). These files are all available at {\small \url{http://conll.org/downloads/conll-2019-latex.zip}}; a Microsoft Word template file ({\small\tt http://conll.org/downloads/conll-2019-word.zip}) and example submission pdf ({\small\tt conll-2019-word.pdf}) is available at {\small \url{http://conll.org/downloads/conll-2019-word.zip}}. We strongly recommend the use of these style files, which have been appropriately tailored for the \confname{} proceedings. \subsection{Format of Electronic Manuscript} \label{sect:pdf} For the production of the electronic manuscript you must use Adobe's Portable Document Format (PDF). PDF files are usually produced from \LaTeX\ using the \textit{pdflatex} command. If your version of \LaTeX\ produces Postscript files, you can convert these into PDF using \textit{ps2pdf} or \textit{dvipdf}. On Windows, you can also use Adobe Distiller to generate PDF. Please make sure that your PDF file includes all the necessary fonts (especially tree diagrams, symbols, and fonts with Asian characters). When you print or create the PDF file, there is usually an option in your printer setup to include none, all or just non-standard fonts. Please make sure that you select the option of including ALL the fonts. \textbf{Before sending it, test your PDF by printing it from a computer different from the one where it was created.} Moreover, some word processors may generate very large PDF files, where each page is rendered as an image. Such images may reproduce poorly. In this case, try alternative ways to obtain the PDF. One way on some systems is to install a driver for a postscript printer, send your document to the printer specifying ``Output to a file'', then convert the file to PDF. It is of utmost importance to specify the \textbf{A4 format} (21 cm x 29.7 cm) when formatting the paper. When working with {\tt dvips}, for instance, one should specify {\tt -t a4}. Or using the command \verb|\special{papersize=210mm,297mm}| in the latex preamble (directly below the \verb|\usepackage| commands). Then using {\tt dvipdf} and/or {\tt pdflatex} which would make it easier for some. Print-outs of the PDF file on A4 paper should be identical to the hardcopy version. If you cannot meet the above requirements about the production of your electronic submission, please contact the publication chairs as soon as possible. \subsection{Layout} \label{ssec:layout} Format manuscripts two columns to a page, in the manner these instructions are formatted. The exact dimensions for a page on A4 paper are: \begin{itemize} \item Left and right margins: 2.5 cm \item Top margin: 2.5 cm \item Bottom margin: 2.5 cm \item Column width: 7.7 cm \item Column height: 24.7 cm \item Gap between columns: 0.6 cm \end{itemize} \noindent Papers should not be submitted on any other paper size. If you cannot meet the above requirements about the production of your electronic submission, please contact the publication chairs above as soon as possible. \subsection{Fonts} For reasons of uniformity, Adobe's {\bf Times Roman} font should be used. In \LaTeX2e{} this is accomplished by putting \begin{quote} \begin{verbatim} \usepackage{times} \usepackage{latexsym} \end{verbatim} \end{quote} in the preamble. If Times Roman is unavailable, use {\bf Computer Modern Roman} (\LaTeX2e{}'s default). Note that the latter is about 10\% less dense than Adobe's Times Roman font. \begin{table}[t!] \begin{center} \begin{tabular}{|l|rl|} \hline \bf Type of Text & \bf Font Size & \bf Style \\ \hline paper title & 15 pt & bold \\ author names & 12 pt & bold \\ author affiliation & 12 pt & \\ the word ``Abstract'' & 12 pt & bold \\ section titles & 12 pt & bold \\ document text & 11 pt &\\ captions & 10 pt & \\ abstract text & 10 pt & \\ bibliography & 10 pt & \\ footnotes & 9 pt & \\ \hline \end{tabular} \end{center} \caption{\label{font-table} Font guide. } \end{table} \subsection{The First Page} \label{ssec:first} Center the title, author's name(s) and affiliation(s) across both columns. Do not use footnotes for affiliations. Do not include the paper ID number assigned during the submission process. Use the two-column format only when you begin the abstract. {\bf Title}: Place the title centered at the top of the first page, in a 15-point bold font. (For a complete guide to font sizes and styles, see Table~\ref{font-table}) Long titles should be typed on two lines without a blank line intervening. Approximately, put the title at 2.5 cm from the top of the page, followed by a blank line, then the author's names(s), and the affiliation on the following line. Do not use only initials for given names (middle initials are allowed). Do not format surnames in all capitals ({\em e.g.}, use ``Mitchell'' not ``MITCHELL''). Do not format title and section headings in all capitals as well except for proper names (such as ``BLEU'') that are conventionally in all capitals. The affiliation should contain the author's complete address, and if possible, an electronic mail address. Start the body of the first page 7.5 cm from the top of the page. The title, author names and addresses should be completely identical to those entered to the electronical paper submission website in order to maintain the consistency of author information among all publications of the conference. If they are different, the publication chairs may resolve the difference without consulting with you; so it is in your own interest to double-check that the information is consistent. {\bf Abstract}: Type the abstract at the beginning of the first column. The width of the abstract text should be smaller than the width of the columns for the text in the body of the paper by about 0.6 cm on each side. Center the word {\bf Abstract} in a 12 point bold font above the body of the abstract. The abstract should be a concise summary of the general thesis and conclusions of the paper. It should be no longer than 200 words. The abstract text should be in 10 point font. {\bf Text}: Begin typing the main body of the text immediately after the abstract, observing the two-column format as shown in the present document. Do not include page numbers. {\bf Indent}: Indent when starting a new paragraph, about 0.4 cm. Use 11 points for text and subsection headings, 12 points for section headings and 15 points for the title. \begin{table} \centering \small \begin{tabular}{cc} \begin{tabular}{|l|l|} \hline {\bf Command} & {\bf Output}\\\hline \verb|{\"a}| & {\"a} \\ \verb|{\^e}| & {\^e} \\ \verb|{\`i}| & {\`i} \\ \verb|{\.I}| & {\.I} \\ \verb|{\o}| & {\o} \\ \verb|{\'u}| & {\'u} \\ \verb|{\aa}| & {\aa} \\\hline \end{tabular} & \begin{tabular}{|l|l|} \hline {\bf Command} & {\bf Output}\\\hline \verb|{\c c}| & {\c c} \\ \verb|{\u g}| & {\u g} \\ \verb|{\l}| & {\l} \\ \verb|{\~n}| & {\~n} \\ \verb|{\H o}| & {\H o} \\ \verb|{\v r}| & {\v r} \\ \verb|{\ss}| & {\ss} \\\hline \end{tabular} \end{tabular} \caption{Example commands for accented characters, to be used in, {\em e.g.}, \BibTeX\ names.}\label{tab:accents} \end{table} \subsection{Sections} {\bf Headings}: Type and label section and subsection headings in the style shown on the present document. Use numbered sections (Arabic numerals) in order to facilitate cross references. Number subsections with the section number and the subsection number separated by a dot, in Arabic numerals. Do not number subsubsections. \begin{table*}[t!] \centering \begin{tabular}{lll} output & natbib & previous \conforg{} style files\\ \hline \citep{Gusfield:97} & \verb|\citep| & \verb|\cite| \\ \citet{Gusfield:97} & \verb|\citet| & \verb|\newcite| \\ \citeyearpar{Gusfield:97} & \verb|\citeyearpar| & \verb|\shortcite| \\ \end{tabular} \caption{Citation commands supported by the style file. The citation style is based on the natbib package and supports all natbib citation commands. It also supports commands defined in previous \conforg{} style files for compatibility. } \end{table*} {\bf Citations}: Citations within the text appear in parentheses as~\cite{Gusfield:97} or, if the author's name appears in the text itself, as Gusfield~\shortcite{Gusfield:97}. Using the provided \LaTeX\ style, the former is accomplished using {\small\verb|\cite|} and the latter with {\small\verb|\shortcite|} or {\small\verb|\newcite|}. Collapse multiple citations as in~\cite{Gusfield:97,Aho:72}; this is accomplished with the provided style using commas within the {\small\verb|\cite|} command, {\em e.g.}, {\small\verb|\cite{Gusfield:97,Aho:72}|}. Append lowercase letters to the year in cases of ambiguities. Treat double authors as in~\cite{Aho:72}, but write as in~\cite{Chandra:81} when more than two authors are involved. Collapse multiple citations as in~\cite{Gusfield:97,Aho:72}. Also refrain from using full citations as sentence constituents. We suggest that instead of \begin{quote} ``\cite{Gusfield:97} showed that ...'' \end{quote} you use \begin{quote} ``Gusfield \shortcite{Gusfield:97} showed that ...'' \end{quote} If you are using the provided \LaTeX{} and Bib\TeX{} style files, you can use the command \verb|\citet| (cite in text) to get ``author (year)'' citations. If the Bib\TeX{} file contains DOI fields, the paper title in the references section will appear as a hyperlink to the DOI, using the hyperref \LaTeX{} package. To disable the hyperref package, load the style file with the \verb|nohyperref| option: \\ {\small \verb|\usepackage[nohyperref]{conll-2019}|}\\ \textbf{Digital Object Identifiers}: As part of our work to make ACL materials more widely used and cited outside of our discipline, ACL has registered as a CrossRef member, as a registrant of Digital Object Identifiers (DOIs), the standard for registering permanent URNs for referencing scholarly materials. As of 2017, we are requiring all camera-ready references to contain the appropriate DOIs (or as a second resort, the hyperlinked ACL Anthology Identifier) to all cited works. Thus, please ensure that you use References that contain DOI or URLs for any of the ACL materials that you reference. Appropriate records should be found for most materials in the current ACL Anthology at \url{http://aclanthology.info/}. As examples, we cite \cite{P16-1001} to show you how papers with a DOI will appear in the bibliography. We cite \cite{C14-1001} to show how papers without a DOI but with an ACL Anthology Identifier will appear in the bibliography. \textbf{Anonymity:} As reviewing will be double-blind, the submitted version of the papers should not include the authors' names and affiliations. Furthermore, self-references that reveal the author's identity, {\em e.g.}, \begin{quote} ``We previously showed \cite{Gusfield:97} ...'' \end{quote} should be avoided. Instead, use citations such as \begin{quote} ``\citeauthor{Gusfield:97} \shortcite{Gusfield:97} previously showed ... '' \end{quote} Preprint servers such as arXiv.org and workshops that do not have published proceedings are not considered archival for purposes of submission. However, to preserve the spirit of blind review, authors are encouraged to refrain from posting until the completion of the review process. Otherwise, authors must state in the online submission form the name of the workshop or preprint server and title of the non-archival version. The submitted version should be suitably anonymized and not contain references to the prior non-archival version. Reviewers will be told: ``The author(s) have notified us that there exists a non-archival previous version of this paper with significantly overlapping text. We have approved submission under these circumstances, but to preserve the spirit of blind review, the current submission does not reference the non-archival version.'' \textbf{Please do not use anonymous citations} and do not include when submitting your papers. Papers that do not conform to these requirements may be rejected without review. \textbf{References}: Gather the full set of references together under the heading {\bf References}; place the section before any Appendices, unless they contain references. Arrange the references alphabetically by first author, rather than by order of occurrence in the text. By using a .bib file, as in this template, this will be automatically handled for you. See the \verb|\bibliography| commands near the end for more. Provide as complete a citation as possible, using a consistent format, such as the one for {\em Computational Linguistics\/} or the one in the {\em Publication Manual of the American Psychological Association\/}~\cite{APA:83}. Use of full names for authors rather than initials is preferred. A list of abbreviations for common computer science journals can be found in the ACM {\em Computing Reviews\/}~\cite{ACM:83}. The \LaTeX{} and Bib\TeX{} style files provided roughly fit the American Psychological Association format, allowing regular citations, short citations and multiple citations as described above. \begin{itemize} \item Example citing an arxiv paper: \cite{rasooli-tetrault-2015}. \item Example article in journal citation: \cite{Ando2005}. \item Example article in proceedings, with location: \cite{borsch2011}. \item Example article in proceedings, without location: \cite{andrew2007scalable}. \end{itemize} See corresponding .bib file for further details. Submissions should accurately reference prior and related work, including code and data. If a piece of prior work appeared in multiple venues, the version that appeared in a refereed, archival venue should be referenced. If multiple versions of a piece of prior work exist, the one used by the authors should be referenced. Authors should not rely on automated citation indices to provide accurate references for prior and related work. {\bf Appendices}: Appendices, if any, directly follow the text and the references (but see above). Letter them in sequence and provide an informative title: {\bf Appendix A. Title of Appendix}. \subsection{URLs} URLs can be typeset using the \verb|\url| command. However, very long URLs cause a known issue in which the URL highlighting may incorrectly cross pages or columns in the document. Please check carefully for URLs too long to appear in the column, which we recommend you break, shorten or place in footnotes. Be aware that actual URL should appear in the text in human-readable format; neither internal nor external hyperlinks will appear in the proceedings. \subsection{Footnotes} {\bf Footnotes}: Put footnotes at the bottom of the page and use 9 point font. They may be numbered or referred to by asterisks or other symbols.\footnote{This is how a footnote should appear.} Footnotes should be separated from the text by a line.\footnote{Note the line separating the footnotes from the text.} \subsection{Graphics} {\bf Illustrations}: Place figures, tables, and photographs in the paper near where they are first discussed, rather than at the end, if possible. Wide illustrations may run across both columns. Color illustrations are discouraged, unless you have verified that they will be understandable when printed in black ink. {\bf Captions}: Provide a caption for every illustration; number each one sequentially in the form: ``Figure 1. Caption of the Figure.'' ``Table 1. Caption of the Table.'' Type the captions of the figures and tables below the body, using 11 point text. \subsection{Accessibility} \label{ssec:accessibility} In an effort to accommodate people who are color-blind (as well as those printing to paper), grayscale readability for all accepted papers will be encouraged. Color is not forbidden, but authors should ensure that tables and figures do not rely solely on color to convey critical distinctions. A simple criterion: All curves and points in your figures should be clearly distinguishable without color. \section{Translation of non-English Terms} It is also advised to supplement non-English characters and terms with appropriate transliterations and/or translations since not all readers understand all such characters and terms. Inline transliteration or translation can be represented in the order of: original-form transliteration ``translation''. \section{Length of Submission} \label{sec:length} The \confname{} main conference accepts submissions of long papers only. Long papers may consist of up to eight (8) pages of content plus unlimited pages for references. Upon acceptance, final versions of long papers will be given one additional page -- up to nine (9) pages of content plus unlimited pages for references -- so that reviewers' comments can be taken into account. All illustrations and tables that are part of the main text must be accommodated within these page limits, observing the formatting instructions given in the present document. Supplementary material in the form of appendices does not count towards the page limit; see appendix A for further information. However, note that supplementary material should be supplementary (rather than central) to the paper, and that reviewers may ignore supplementary material when reviewing the paper (see Appendix \ref{sec:supplemental}). Papers that do not conform to the specified length and formatting requirements are subject to be rejected without review. Workshop chairs may have different rules for allowed length and whether supplemental material is welcome. As always, the respective call for papers is the authoritative source. \section*{Acknowledgments} The acknowledgments should go immediately before the references. Do not number the acknowledgments section. Do not include this section when submitting your paper for review. \\ \noindent {\bf Preparing References:} \\ Include your own bib file like this: {\small\verb|\bibliographystyle{acl_natbib}| \verb| \section{Data} \label{sec:data} As a whole, the entity linking research space is fairly fragmented, including many task variants that make fair comparisons difficult. Some tasks include named entity recognition (mention span prediction) as well as entity disambiguation, while others are concerned only with disambiguation (the former is often referred to as \textit{end-to-end}. Some tasks include the problem of predicting a \textit{NIL} label for mentions that do not correspond to any entity in the KB, while others ignore such cases. Still other tasks focus on \textit{named} or proper noun mentions, while others include disambiguation of concepts. These variations and the resulting fragmentation of evaluation is discussed at length by \citet{ling2015design} and \citet{hachey2013evaluating}, and partially addressed by attempts to consolidate datasets \cite{cornolti2013framework} and metrics \cite{usbeck2015gerbil}. Since our primary goal is to demonstrate the viability of our unified modeling approach for entity retrieval, we choose to focus on just the disambiguation task, ignoring NIL mentions, where our set of entity candidates includes every entry in the English Wikipedia. In addition, some tasks include relevant training data, which allows a model trained on Wikipedia (for example) to be tuned to the target domain. We save this fine-tuning for future work. \begin{figure*} \centering \includegraphics[width=\textwidth]{images/full_de_arch_v5.pdf} \caption{Architecture of the dual encoder model for retrieval (a). Common component architectures are shown for (b) text input, (c) sparse ID input, and (d) compound input joining multiple encoder outputs. Note that all text encoders share a common set of embeddings.\label{fig:architecture}} \end{figure*} \paragraph{Training data} Wikipedia is an ideal resource for training entity resolution systems because many mentions are resolved via internal hyperlinks (the mention span is the anchor text). We use the 2018-10-22 English Wikipedia dump, which includes 5.7M entities and 112.7M linked mentions (labeled examples). We partition this dataset into 99.9\% for training and the remainder for model selection. Since Wikipedia is a constantly growing an evolving resource, the particular version used can significantly impact entity linking results. For example, when the TACKBP-2010 evaluation dataset was published, Wikipedia included around 3M entities, so the number of retrieval candidates has increased by nearly two times. While this does mean new contexts are seen for many entities, it also means that retrieval gets more difficult over time. This is another factor that makes fair comparisons challenging. \paragraph{Evaluation data} There are a number of annotated datasets available for evaluating entity linking systems. Given the choices discussed above, the \textbf{TACKBP-2010} dataset\footnote{\url{https://tac.nist.gov/}} is the most widely used evaluation that matches our constraints and allows us to compare to a reasonable variety of prior work. It includes 1020 annotated mention/entity pairs derived from 1013 original news and web documents. While there is a related development set associated with this evaluation set, we do not use it for any fine-tuning, as explained above. To further validate our results, we also include a new evaluation set called \textbf{Wikinews}, which includes news pages from Wikinews\footnote{\url{https://en.wikinews.org}} in English for the year 2018. It includes 2263 annotated mention/entity pairs derived from 1801 original documents. Because we pulled these documents at the same time as the Wikipedia dump, the entity annotations are consistent with our training set and have not been subject to the kind of gradual rot that befalls older evaluation data as the updated KB diverges from the annotations. This data is available here: \url{https://github.com/google-research/google-research/tree/master/dense_representations_for_entity_retrieval/}. \section{Experiments} \label{sec:experiments} \subsection{Evaluation setup} We demonstrate our model performance as compared to a baseline alias table. As is standard, it is built by counting all (mention span, entity) pairs in the training data. The counts are used to estimate prior probabilities $P(e|m)$ of an entity given a mention span (alias); for each entity, the aliases are ordered according to these priors and limited to the top 100 candidates. \begin{equation} P(e|m) = \frac{count(e,m)}{\sum\limits_{e' \in E}{count(e',m)}} \end{equation} \noindent Here, $count(e,m)$ is the number of occurrences of mention $m$ linked to entity $e$, and $E$ is the set of all entities appearing in the data. Since alias table construction is often extended with various heuristics, we also include a variant that includes unigrams and bigrams of the mention text as additional aliases. This can help when the entities (specifically person names) are referenced as last/first name at inference time. Finally, since we are primarily concerned with demonstrating performance of a retrieval system (as opposed to a re-ranking system) or a combination of the two, we include results using the standard BM25 retrieval algorithm (the \textit{Gensim} implementation\footnote{\url{https://radimrehurek.com/gensim/summarization/bm25.html}}). We found that indexing each entity using its title gave much better results than indexing with the first paragraph text (or the full document text). We measure recall@k (R@k), defined as the proportion of instances where the true entity is in the top $k$ retrieved items. We report R@1 (accuracy of the top retrieved result), which is standard for TAC/KBP-2010, as well R@100, which better captures overall retrieval performance. We refer to the models with these abbreviations: \begin{itemize} \item \textbf{\atprior}: The alias table ordered by $P(e|m)$. \item \textbf{\atext}: The heuristically extended alias table. \item \textbf{\bm}: The BM25 retrieval algorithm, where each entity is indexed using its title. \item \textbf{\deer}: Our Dual Encoder for Entity Resolution, as described in section \ref{sec:model}. \end{itemize} \subsection{Results} \begin{table} \centering \begin{tabular}{c|c|c} \textbf{System} & \textbf{R@1} & \textbf{Entities}\\ \hline AT-Prior & 71.9 & 5.7M\\ AT-Ext & 73.3 & 5.7M \\ \hline \citet{chisholm2015entity} & 80.7 & 800K \\ \citet{he-EtAl:2013:Short} & 81.0 & 1.5M \\ \citet{sun2015modeling} & 83.9 & 818K \\ \citet{yamada2016joint} & 85.2 & 5.0M \\ \citet{nie:etal:aaai2018} & 86.4 & 5.0M \\ \citet{barrena2018learning} & 87.3 & 523K \\ \textbf{\deer \: (this work)} & 87.0 & 5.7M\\ \end{tabular} \caption{Comparison of relevant TACKBP-2010 results using Recall@1 (accuracy). While we cannot control the candidate entity set sizes, we attempt to approximate them here. \label{tab:tac2010}} \end{table} Table \ref{tab:tac2010} provides a comparison against the most relevant related work. While there are some reported improvements due to collective (\textit{global}) resolution of all mentions in a document (\citet{globerson2016} report 87.2\% and \citet{nie:etal:aaai2018} report 89.1\%), we limit comparisons to \textit{local} resolution. We also limit comparisons to systems that ignore NIL mentions (referred to as \textit{in-KB} accuracy), so all those reported in the table evaluate precisely the same set of mentions. As noted earlier, we cannot control the candidate sets used in each of these experiments, and we are at some disadvantage given our larger set of candidates. \paragraph{Retrieval performance} Table \ref{tab:r@100} provides the percent of mentions for which the correct entity is found in the top 100 retrieved results, using the different baselines and the \deer\ model. The learned representations deliver superior performance and do not require special handling for unigrams versus bigram lookups, counts for entity prominence, and so on. \paragraph{Resolution performance} To put \deer's architecture and performance in context, we compare it with prior work in some more detail here. \citet{he-EtAl:2013:Short} use a dual encoder setup to train a re-ranker, but start with unsupervised training to build representations of contexts and entities using Denoising Autoencoders. They use an alias table for candidate generation, and then train a ranking model using mention-specific batching to obtain hard in-batch negatives. Our results suggest that the autoencoder pretraining is not necessary and that our unsupervised negative mining can outperform heuristic selection of negatives. \citet{sun2015modeling} also use a dual encoder that has similar structure to ours. Like \citet{he-EtAl:2013:Short}, they use it to score entries from an alias table rather than directly for retrieval. Their mention encoder is a considerably more complex combination of mention and context rather than the simple compounding strategy in our architecture. Their alias table method not only maps mentions to entities, but also uses additional filters to reduce the set of candidate entities based on words in the mention's context. They report that this method has a recall of 91.2\% on TACKBP 2010, while our direct retrieval setup gives Recall@100 of 96.3\% (see Table \ref{tab:r@100}). They train their representations for each true mention-entity pair against a single random negative entity for the mention, whereas our method takes advantage of the entire batch of random negatives as well further refinement through hard negative mining. \begin{table} \centering \begin{tabular}{c|c|c} \textbf{System} & \textbf{TACKBP-2010} & \textbf{Wikinews} \\ \hline \atprior & 89.5 & 93.8 \\ \atext & 91.7 & 94.0 \\ \bm & 68.9 & 83.2 \\ \textbf{\deer} & \textbf{96.3} & \textbf{97.9} \\ \end{tabular} \caption{Retrieval evaluation comparison for TACKBP-2010 and Wikinews using Recall@100. \label{tab:r@100}} \end{table} \citet{yamada2016joint} use an alias table derived from the December 2014 Wikipedia dump, restricted to the fifty most popular entities per mention. They tune their model on the TACKBP 2010 training set. Architecturally, they include features that capture the alias table priors and string similarities, both of which are not feasible in a dual encoder configuration that precludes direct comparison between mention- and entity-side features. \deer's better results indicate that learned representations of mentions and entities can be powerful enough for entity retrieval even without any cross-attention. \citet{nie:etal:aaai2018} define a complex model that uses both entity type information and attention between the mention string and the entity description. To augment the small 1500 example training data in TACKBP, they also collected 55k mentions found in Wikipedia that were active in TACKBP 2010 to train this model. \deer\ is simply trained over all entities in Wikipedia and uses no cross-attention or explicit type information, yet delivers better resolution performance. Most standard entity linking models build a single ranking model on top of the candidate set provided by an alias table. \citet{barrena2018learning} instead train 523k mention-specific deep classifiers---effectively treating entity linking as a special form of word sense disambiguation. They do this by pre-training a single LSTM that predicts among 248k mentions, and then the parameters of this model are used to warm start each of the 523k mention-specific models. In doing so, they learn an effective context encoding, and can then fine-tune each mention model to discriminate among the small set of popular candidate entities for the mention (their alias table uses a cutoff of the thirty most popular entities for each mention). \deer\, in contrast, has a single mention encoder that is simple and fast, and performs nearly equivalently while retrieving from a much larger set of entities. \begin{table}[] \centering \begin{tabular}{c|cc} \textbf{Method} & \textbf{\shortstack{Mean \\ search time (ms)}} & \textbf{\shortstack{Wikinews \\ R@100}} \\ \hline Brute force & 291.9 & 97.88 \\ AH & 22.6 & 97.22 \\ AH+Tree & 3.3 & 94.73 \\ \end{tabular} \caption{Comparison of nearest-neighbor search methods using the \deer\ model. The benchmark was conducted on a single machine. AH indicates quantization-based asymmetric hashing; AH+Tree adds an initial tree search to further reduce the search space.\label{tab:approx}} \end{table} \paragraph{Approximate search} \label{subsec:approx} Tables \ref{tab:tac2010} and \ref{tab:r@100} report performance using brute force nearest-neighbor search. That is, we score each mention against all 5.7M entities to get the top $k$ neighbors. However, a major motivation for using a single-stage retrieval model is that it can allow scaling to much larger knowledge bases by reducing retrieval time via approximate search. To estimate performance in a real-world setting, we repeat the evaluation of \deer\ using the quantization-based approaches described by \citet{guo2016quantization}. Table~\ref{tab:approx} shows the trade-off between search time and recall on Wikinews. Compared to brute force, search time can be reduced by an order of magnitude with a small loss in R@100, or by two orders of magnitude while losing less than 3 points. This is crucial for scaling the approach to even larger KBs and supporting the latency requirements of real-world applications. \paragraph{Impact of hard negative mining} Figure~\ref{fig:iterative_hn} shows the improvement in Recall@1 from each round of hard negative mining. The first iteration gives a large improvement over the initial round of training with only random negatives. Successive iterations yield further gains, eventually flattening out. Our strategy of appending each new set of hard negatives to the previously mined ones means that each new set has proportionately less influence---this trades off some opportunity for improving the model in favor of stability. \begin{figure} \centering {\includegraphics[width=7cm]{images/hn_r1_new.pdf}} \caption{Recall@1 improvement for successive iterations of hard negative mining for Wikinews (solid) and TACKBP-2010 (dashed).} \label{fig:iterative_hn} \end{figure} \subsection{Qualitative analysis} Here, we show a variety of examples to elucidate how DEER effectively models context, and to provide intuition for the learned entity representations. First, we compare entities retrieved by DEER with those retrieved by the alias table baseline. Table~\ref{tab:retrieval_examples} shows some instances where the alias table does not contain the correct entity for a given mention text (in the top 100 neighbors) or it fails to return any entity at all. In all of these cases, it is clear that context is essential. While a scoring stage is intended to leverage context, it is limited by the set of retrieved entities; our approach uses context directly. \begin{table} \centering \begin{tabular}{p{0.1\textwidth}|p{0.33\textwidth}} \textbf{Entity} & \textbf{Nearest neighbors} \\ \hline Jorge Costa & Jos\'e Alberto Costa, Eduardo Costa, Peter Shilton, Rui Costa, Nuno Gomes, Ricardo Costa (Portuguese footballer), Andr\'e Gomes, Bruno Ribeiro, Diego Costa \\ \hline Costa Cruises & MSC Cruises, P\&O Cruises, Princess Cruises, Island Cruises, AIDA Cruises, Silversea Cruises, Carnival Corporation \& plc, Costa Concordia, Celebrity Cruises \\ \hline Arctic sea ice decline & Arctic ice pack, Measurement of sea ice, Arctic geoengineering, Arctic sea ice ecology and history, Climate Change Science Program, Abrupt climate change, Sea ice thickness, Antarctic sea ice, Marine ice sheet instability \\ \hline Pink Floyd & Led Zeppelin, The Who, Duran Duran, Syd Barrett, The Velvet Underground, Eddie Floyd, The Beatles, The Australian Pink Floyd Show, Roger Waters \\ \end{tabular} \caption{Nearest neighbors retrieved by \demn\ for a sample of entities.} \label{tab:nearest_neighbors} \end{table} For example, mentions like \textit{Costa} and \textit{Justin} are linked to the correct entities in the alias table, but with such low prior probability that we would need to retrieve far more than the top 100 entities to consider them. At the other extreme, mentions like \textit{Refoundation Communists} and \textit{European EADS} are missed by the baseline because they don't have direct string matches in the alias table. Additional extensions to our alias table allowing token re-ordering could help catch the former (though this might reduce precision too much), but it's unlikely that any alias table could connect \textit{European EADS} with \textit{Airbus} in the absence of an explicit anchor-text link. This example helps highlight how a fully learned retrieval model can generalize to new data. Second, Table~\ref{tab:context_effect_on_nn} shows more directly how modifying the context around a mention span changes the retrieved entities. For example, the model correctly differentiates between Phoenix the city, Phoenix the band, and Phoenix in mythology based on the sentence surrounding an identical mention span. \begin{table*} \centering \small \begin{tabular}{p{0.4\textwidth}|p{0.27\textwidth}|p{0.27\textwidth}} \textbf{Mention} & \textbf{Baseline predictions} & \textbf{Model predictions} \\ \hline \textbf{Costa} has not played since being struck by the AC Milan forward & Costa Coffee, Paul Costa Jr, Comstock-Needham system, Costa Cruises, Achille Costa & Ricardo Costa (Portuguese footballer), Fernando Torres, Pedro (footballer born 1987), \textbf{Jorge Costa} \\ \hline Australia beat West Indies by five wickets in a \textbf{World Series} limited overs match & World Series, ATP International Series, 2010 World Series & \textbf{World Series Cricket}, The University Match (cricket), Australian Tri-Series \\ \hline \textbf{Justin} made his second straight start for Harbaugh, who has a knee injury & Justin (historian), Justin Martyr, Justin (consul 540) & \textbf{Paul Justin}, Joe Montana, Dale Steyn \\ \hline plays for the Cape Town-based \textbf{Cobras} franchise & Cobra, AC Cobra, Indian Cobra & Cobra, Snake, \textbf{Cape Cobras} \\ \hline \textbf{OSI} reports profit on overseas cancer drug sales & Open Systems Interconnection, Open Source Initiative, OSI (band) & Health Insurance Portability and Accountability Act, \textbf{OSI Pharmaceuticals}, James L. Jones \\ \hline EVN imposed \textbf{rotating power cuts} earlier this year as the worst drought in a century dropped water levels & no matches & Cogeneration, \textbf{Power outage}, Scram \\ \hline warned Franco Giordano, secretary of the \textbf{Refoundation Communists} following a coalition meeting late Wednesday & no matches & League of Communists of Yugoslavia, \textbf{Communist Refoundation Party}, Communist Party of Spain \\ \hline The \textbf{European EADS} consortium, which makes the Eurofighter Typhoon, said it was not comfortable with the NATO-member countries' bidding process & no matches & \textbf{Airbus}, Airbus A400M Atlas, NATO \\ \hline such as the record California wildfires, high temperature extremes, retreating glaciers, and melting snow cover, the \textbf{decline of sea ice}, rising sea levels with increasing ocean acidification and coastal flooding & no matches & Moskstraumen, \textbf{Arctic sea ice decline}, Glacier, Sea ice \\ \end{tabular} \caption{Examples of test mentions that require making use of context, where the alias table does not retrieve the correct entity. We show the top entities returned by both systems, with the correct entity in bold.} \label{tab:retrieval_examples} \end{table*} \begin{table*} \centering \small \begin{tabular}{p{0.65\textwidth}|p{0.3\textwidth}} \textbf{Mention} & \textbf{Model predictions} \\ \hline From 1996, \textbf{Cobra} was brewed under contract by Charles Wells Ltd and experienced strong growth in sales for the next ten years. & The Cobra Group, \textbf{Cobra Beer}, Cobra (Tivoli Friheden) \\ \hline Guys fondly remembered \textbf{Cobra} - the band from Memphis featuring Jimi Jamison and Mandy Meyer who released one Album - Frist Strike - before the Band split! & \textbf{Cobra (American band)}, Wadsworth Jarrell, Cobra Records, Cobra (Japanese band) \\ \hhline{==} Since the late 18th century, \textbf{Paris} has been famous for its restaurants and haute cuisine, food meticulously prepared and artfully presented. & \textbf{Paris}, Nice, Bucharest \\ \hline Kim Kardashian may be a household name now, but that wasn’t always the case - and it may all be because of pal \textbf{Paris}. & Paris, \textbf{Paris Hilton}, Paris syndrome \\ \hline Rory and \textbf{Paris} are the only two people on Gilmore Girls who share the same goals. & Paris, Paris (mythology), \textbf{Paris Geller} \\ \hhline{==} \textbf{Texas} was finally annexed when the expansionist James K. Polk won the election of 1844 who ordered General Zachary Taylor south to the Rio Grande on January 13, 1846. & \textbf{Texas}, Texas annexation, Texas in the American Civil War \\ \hline Fronted by Sharleen Spiteri, \textbf{Texas} have released eight studio albums and are known for songs such as 'I Don't Want a Lover', 'Say What You Want', 'Summer Son' and 'Inner Smile' & \textbf{Texas (band)}, Texas, Tich (singer) \\ \hhline{==} There is an amazing piece of historic architecture set in downtown \textbf{Phoenix} that was build in 1929 in the Spanish Baroque style and features intricate murals and moldings. & \textbf{Phoenix, Arizona}, Prescott, Arizona \\ \hline \textbf{Phoenix} once again played another late night show, now they have Late Night with Jimmy Fallon where they played a great rendition of 'Lisztomania' & \textbf{Phoenix (band)}, Joaquin Phoenix, Phoenix, Arizona \\ \hline According to Greek mythology, the \textbf{Phoenix} lived in Arabia next to a well where the Greek sun-god Apollo stopped his chariot in order to listen to its song. & Phoenix (mythology), Phoenix (son of Amyntor), \textbf{Phoenix (son of Agenor)} \\ \hline \end{tabular} \caption{Changing the context around a mention span changes the mention encoding, and thus the set of retrieved neighbors.} \label{tab:context_effect_on_nn} \end{table*} Third, since our model produces encodings for all 5.7M entities, we can retrieve nearest neighbors for any entity. Some examples are shown in Table~\ref{tab:nearest_neighbors}. The model tends to prefer related entities of the same type, and often ones that share portions of their names, probably because entity titles are so important to linking with mentions. The nearest neighbors for \textit{Jorge Costa}, our running example, include a variety of retired Portuguese football players, many of whom have \textit{Costa} in their names. Finally, Figure~\ref{fig:citybands} is a t-SNE projection of the entity encodings for a selection of cities, bands, and people (nobel literature winners). The cities and bands were chosen to have high word overlap, e.g. \textit{Montreal (city)} and \textit{Of Montreal (band)}, to demonstrate how our entity embeddings differ from standard word embeddings. Note also the sub-clusters that form within each type cluster. Latin American authors cluster together, as do the Existentialists; the cities have some geographical proximity, though Brazil and Portugal are neighbors, presumably because of shared language and culture. \begin{figure*} \centering \includegraphics[width=14cm,clip]{images/citybandswriters36_v2.pdf} \vspace*{-12mm} \caption{A 2D projection of cities, bands, and people embeddings (using t-SNE), color coded by their category.} \label{fig:citybands} \end{figure*} \section{Introduction} \label{sec:intro} A critical part of understanding natural language is connecting specific textual references to real world entities. In text processing systems, this is the task of \textit{entity resolution}: given a document where certain spans of text have been recognized as \textit{mentions} referring to entities, the goal is to link them to unique entries in a knowledge base (KB), making use of textual context around the mentions as well as information about the entities. (We use the term \textit{mention} to refer to the target span along with its context in the document.) Real world knowledge bases are large (e.g., English Wikipedia has 5.7M articles), so existing work in entity resolution follows a two-stage approach: a first component nominates candidate entities for a given mention and a second one selects the most likely entity among those candidates. This parallels typical \textit{information retrieval} systems that consist of an index and a re-ranking model. In entity resolution, the index is a table mapping \textit{aliases} (possible names) to entities. Such tables need to be built ahead of time and are typically subject to arbitrary, hard cutoffs, such as only including the thirty most popular entities associated with a particular mention. We show that this configuration can be replaced with a more robust model that represents both entities and mentions in the same vector space. Such a model allows candidate entities to be directly and efficiently retrieved for a mention, using nearest neighbor search. To see why a retrieval approach is desirable, we need to consider how alias tables are employed in entity resolution systems. In the following example, \textit{Costa} refers to footballer \textit{Jorge Costa}, but the entities associated with that alias in existing Wikipedia text are {\it Costa Coffee}, {\it Paul Costa Jr}, {\it Costa Cruises}, and many others---while excluding the true entity. \begin{displayquote} \textit{\textbf{Costa} has not played since being struck by the AC Milan forward...} \end{displayquote} \noindent The alias table could be expanded so that last-name aliases are added for all person entities, but it is impossible to come up with rules covering all scenarios. Consider this harder example: \begin{displayquote} \textit{...warned Franco Giordano, secretary of the \textbf{Refoundation Communists} following a coalition meeting late Wednesday...} \end{displayquote} \noindent It takes more sophistication to connect the colloquial expression \textit{Refoundation Communists} to the \textit{Communist Refoundation Party}. Alias tables cannot capture all ways of referring to entities in general, which limits recall. Alias tables also cannot make systematic use of context. In the \textit{Costa} example, the context (e.g., \textit{AC Milan forward, played}) is necessary to know that this mention does not refer to a company or a psychologist. An alias table is blind to this information and must rely only on prior probabilities of entities given mention spans to manage ambiguity. Even if the correct entity is retrieved, it might have such a low prior that the re-ranking model cannot recover it. A retrieval system with access to both the mention span and its context can significantly improve recall. Furthermore, by pushing the work of the alias table into the model, we avoid manual processing and heuristics required for matching mentions to entities, which are often quite different for each new domain. This work includes the following contributions: \begin{itemize} \item We define a novel dual encoder architecture for learning entity and mention encodings suitable for retrieval. A key feature of the architecture is that it employs a modular hierarchy of sub-encoders that capture different aspects of mentions and entities. \item We describe a simple, fully unsupervised \textit{hard negative mining} strategy that produces massive gains in retrieval performance, compared to using only random negatives. \item We show that approximate nearest neighbor search using the learned representations can yield high quality candidate entities very efficiently. \item Our model significantly outperforms discrete retrieval baselines like an alias table or BM25, and gives results competitive with the best reported accuracy on the standard TACKBP-2010 dataset. \item We provide a qualitative analysis showing that the model integrates contextual information and world knowledge even while simultaneously managing mention-to-title similarity. \end{itemize} We acknowledge that most of the components of our work are not novel in and of themselves. Dual encoder architectures have a long history \cite{bromley1994signature,chopra2005learning,yih2011learning}, including for retrieval \cite{Gillick:2018:DualEncoders}. Negative sampling strategies have been employed for many models and applications, e.g. \citet{shrivastava2016training}. Approximate nearest neighbor search is its own sub-field of study \cite{andoni2008near}. Nevertheless, to our knowledge, our work is the first combination of these ideas for entity linking. As a result, we demonstrate the first accurate, robust, and highly efficient system that is actually a viable substitute for standard, more cumbersome two-stage retrieval and re-ranking systems. In contrast with existing literature, which reports multiple seconds to resolve a single mention, we can provide strong retrieval performance across all 5.7 million Wikipedia entities in around 3ms per mention. \section*{Acknowledgements} The authors would like to thank Ming-Wei Chang, Jan Botha, Slav Petrov, and the anonymous reviewers for their helpful comments. \nocite{zhang2018generative} \nocite{globerson2016} \nocite{DBLP:journals/corr/abs-1708-00781} \nocite{DBLP:journals/corr/GaneaH17} \section{Entity retrieval model} \label{sec:model} We use nearest neighbor search to retrieve entities based on a mention in context, after learning dense, fixed-length vector representations of each. \subsection{Dual Encoder model} The \textit{dual encoder} is a two-tower architecture suitable for retrieval \cite{Gillick:2018:DualEncoders}. It has one network structure for encoding mentions (including their contexts), a second for encoding entities (including KB features), and a cosine function to compute similarity between representations (which must be the same dimension). A key property of this architecture is that there is no direct interaction between the encoders on each side. This enables efficient retrieval, but constrains the set of allowable network structures. The dual encoder learns a mention encoder $\phi$ and an entity encoder $\psi$, where the score of a mention-entity pair $(m, e)$ defined as: \begin{equation} s(m, e) = \cos(\phi(m), \psi(e)) \end{equation} Figure~\ref{fig:architecture} shows the full model architecture and the feature inputs to each encoder. We use a \textit{compound encoder} (Figure \ref{fig:architecture}d) to add useful sub-structure to each tower. The mention-side encoder first combines the context features, and then combines the result with the mention span encoding. Similarly, the entity-side encoder first combines the entity paragraph and categories, and then combines the result with the entity title encoding. The mention encoder uses four text features to capture both the span text and the textual context surrounding it. The context features include the five tokens immediately to the left and right of the span. In the sentence feature, the mention span is replaced by a special symbol. The entity encoder uses the entity's title and the first paragraph of its Wikipedia page as text features. It additionally incorporates the unedited user-specified categories associated with the entity. We do not use the entity IDs as features so that the model generalizes more easily to new entities unseen at training time. In fact, more than 1M candidate entities available at retrieval time have no associated training examples, but this architecture allows these to be encoded using their feature representations. A shared embedding look-up is used for all text features (Figure \ref{fig:architecture}b). Specifically, we embed all unigrams and bigrams to get 300-dimensional averaged unigram embeddings and 300-dimensional averaged bigram embeddings for each text feature. Unigram embeddings are initialized from GloVe vectors \cite{Pennington14glove:global}, and we use 5M hash buckets for out-of-vocabulary unigrams and bigrams\cite{ganchev2008small}. These averaged embeddings are concatenated and then passed through a feed-forward layer. For the category features, each entity category name is treated as a sparse input, and the embeddings for all categories for an entity are averaged to produce a 300-dimensional representation, which in turn is passed through a feed-forward layer (Figure \ref{fig:architecture}c). Our experiments show that this architecture is highly effective for both retrieval and resolution. Nevertheless, we expect that additional modeling ideas will further improve performance, especially for resolution. Recent work such as \citet{DurrettKlein2014} has shown improvements derived from better, longer-range, context features; similarly, there are many more potentially useful KB-derived features. More complex encoder architectures that use some form of attention over the input tokens and features could also be beneficial. \subsection{Training} Our training data is described in Section \ref{sec:data}. The inputs to the entity encoder are constructed from the true entity referred by the landing page. The inputs to the mention encoder are constructed from the source page, using the mention span and surrounding context. These pairs constitute only positive examples, so we use \textit{in-batch random negatives} \cite{henderson2017efficient,Gillick:2018:DualEncoders}: for each mention-entity pair in a training batch, the other entities in the batch are used as negatives. Computationally, this amounts to building the all-pairs similarity matrix for all mentions and entities in a batch. We optimize softmax loss on each row of the matrix, so that the model is trained to maximize the score of the correct entity with respect to random entities. This is a version of the sampled softmax \cite{jozefowicz2016exploring}, which we use in place of the full softmax because the normalization term is intractable to compute over all 5.7M entities. The softmax loss is not directly applied to the raw cosine similarities. Instead, a scalar multiplier $a$ is learned to map the similarities (in the range $[-1,1]$) to unbounded \textit{logits}. For each training pair $(m_i, e_i)$ in a batch of $B$ pairs, the loss is computed as: \begin{equation} L(m_i, e_i) = -f(m_i, e_i) + \log\sum_{j = 1}^{B} \exp(f(m_i, e_j)) \end{equation} where \begin{equation} f(m_i, e_j) = a \cdot s(m_i, e_j) \end{equation} We track in-batch recall@1 (accuracy) on the held out set during training. For each instance, the model gets a score of 1 if the correct entity is ranked above all in-batch random negatives, 0 otherwise. We stop training after the metric flattens out (about 40M steps). For all experiments, we use a batch size of 100, standard SGD with Momentum of 0.9 and a fixed learning rate 0.01. Our aim here is to demonstrate a pure retrieval system, so we train our models solely from Wikipedia and refrain from tuning them explicitly on in-domain documents from the evaluation tasks. \subsection{Hard negative mining} \label{subsec:hardnegs} Random negatives alone are not enough to train an accurate entity resolution model because scoring the correct entity above random alternatives can typically be achieved just by comparing the mention text and entity title. More challenging negative examples must be introduced to force the model to exploit context. This strategy is somewhat akin to Importance Sampling \cite{bengio2003quick}, for example. After learning an initial model using random negatives, we identify hard negatives via the following steps: \begin{enumerate} \item Encode all mentions and entities found in training pairs using the current model. \item For each mention, retrieve the most similar 10 entities (i.e., its nearest neighbors). \item Select all entities that are ranked above the correct one for the mention as negative examples. \end{enumerate} \noindent This yields new negative mention/entity pairs for which the model assigns a high score. It crucially relies on the fact that there is just one correct entity, unlike other tasks that consider general similarity or relatedness (and which are well served by random negatives). For example, negatives mined in this way for paraphrasing or image captioning tasks could actually turn out to be positives that were not explicitly labeled in the data. It is precisely because the distribution over candidate entities that match a contextualized mention tends to have such low entropy that makes negative mining such a good fit for this task. After merging these with the original positive pairs to construct a classification task, we resume training the initial dual encoder model using logistic loss on this new set of pairs. To retain good performance on random negatives, the new task is mixed with the original softmax task in a multi-task learning setup in which the two loss functions are combined with equal weight and optimized together. For a pair $(m, e)$ with label $y \in \{0,1\}$, the hard negative loss is defined as: \begin{equation} \begin{aligned} L_h(m, e; y) = & -y \cdot \log{f(m, e)} \\ & -(1-y) \cdot \log(1-f(m, e)) \end{aligned} \end{equation} where \begin{equation} f(m, e) = g(a_h \cdot s(m, e) + b_h) \end{equation} \noindent Here, $g(x) = 1/(1+e^{-x})$ is the logistic function, and $a_h$ and $b_h$ are learned scalar parameters to transform the cosine similarity into a logit.\footnote{The additive parameter is only needed for the logistic loss component, as the softmax function is invariant to translation.} For the hard negatives task, we track \textit{Area Under the ROC curve} (AUC) on a held out set of pairs. We stop training when the average of the evaluation metrics for the two tasks stabilizes (about 5M steps). Finally, we iteratively apply this negative mining procedure. For each round, we mine negatives from the current model as described above and then append the new hard examples to the classification task. Thus each subsequent round of negative mining adds fewer and fewer new examples, which yields a stable and naturally convergent process. As we show in our experiments, iterative hard negative mining produces large performance gains. \subsection{Inference} Once the model is trained, we use the entity encoder to pre-compute encodings for all candidate entities (including those that do not occur in training). At prediction time, mentions are encoded by the mention encoder and entities are retrieved based on their cosine similarity. Since our focus is on model training, we use brute-force search in our evaluation. However, for online settings and larger knowledge bases, an approximate search algorithm is required. In Section~\ref{subsec:approx} we show that, when using approximate search, the system retains its strong performance while obtaining a nearly 100x speedup on an already fast retrieval. \section{Related work} \label{sec:related} Most recent work on entity resolution has focused on training neural network models for the candidate re-ranking stage \cite{francislandau-durrett-klein:2016:N16-1,eshel-EtAl:2017:CoNLL,DBLP:journals/tacl/YamadaSTT17,DBLP:conf/emnlp/GuptaSR17,sil:etal:aaai2018}. In general, this work explores useful context features and novel architectures for combining mention-side and entity-side features. Extensions include joint resolution over all entities in a document \cite{Ratinov:2011:LGA:2002472.2002642,globerson2016,DBLP:journals/corr/GaneaH17}, joint modeling with related tasks like textual similarity \cite{DBLP:journals/corr/YamadaS0T17,barrena2018learning} and cross-lingual modeling \cite{sil:etal:aaai2018}, for example. By contrast, since we are using a two-tower or dual encoder architecture \cite{Gillick:2018:DualEncoders,Serban:2018:DualEncoders}, our model cannot use any kind of attention over both mentions and entities at once, nor feature-wise comparisons as done by \citet{francislandau-durrett-klein:2016:N16-1}. This is a fairly severe constraint -- for example, we cannot directly compare the mention span to the entity title -- but it permits retrieval with nearest neighbor search for the \textit{entire} context against a single, all encompassing representation for each entity.
\section{Introduction} Nano-scale pores in cellular membranes have the ability to sense and control the passage of ions through the cell walls. The capability to artificially mimic this behaviour is highly desirable since it forms the basis for chemical- and bio-sensing at the molecular level. The ion track etching method can be used to create artificial uniform and parallel narrow channels with controlled openings as small as just a few nanometres \cite{Apel2001a, Siwy2006} in a variety of materials including polymers and ionic crystals \cite{Fleischer1975, Trautmann2009, Trautmann1996, Ferain2000}, various glasses, minerals and inorganic insulators \cite{Siwy2006, Vlassiouk2009, Afra2013, Dallanora2008, Dekker2007, Hadley2019, Kaniukov2016}. Ion track etched pores in polymers are extensively used in commercial applications such as filtration and laboratory cell culture (for example, see \cite{Sterlitech2019}) and as sensors \cite{Han2011, Perez2017, Perez2018} and templates for nanowire growth \cite{Toimil2012}. Artificial solid state pores fabricated in inorganic materials such as SiO$_2$ and Si$_3$N$_4$ are very interesting for sensing applications since they are chemically and thermally stable, and have the potential to be able to be integrated with standard electronic device processing \cite{Dekker2007}. Irradiation with swift heavy ions induces damage along the ion's trajectory that is confined to a region of around 5 nm radially along the track. The resulting cylindrical ion tracks can be up to tens of micrometres long, depending on the ion energy and the thickness of the irradiated material. Each individual ion produces an ion track. The number of tracks is thus controlled by the number of ions the material is exposed to. In most materials the damage created along the ion path can be preferentially dissolved by chemical etching converting the ion track into an open channel. These pores have the potential to be tailored for specific applications by controlling the pore shape and number density, as well as their surface chemistry. However, to realise these promising applications a better understanding of the ion track etching process on the initial track damage is needed. Many studies have been conducted on etched ion tracks in polymers whereas information on track etching in SiO$_2$ is somewhat limited \cite{Dallanora2008, Kaniukov2016, Jensen2006, Vlasukova2014}, and almost exclusively for the purpose of identifying tracks in this material and determination of the track formation threshold. Systematic studies of the resulting etched pore morphology in SiO$_2$ and its dependence upon irradiation and etching conditions are needed to reliably reproduce ion track etched pores tailored for specific applications. Typically their geometry and size are estimated from cross section scanning electron microscopy (SEM) images \cite{Apel2001a, Apel2014, Perez2018a} or from electrodeposited metal replicas \cite{Duan2016, Karim2009} and can be very difficult to characterise accurately. Our study addresses these issues by using small-angle x-ray scattering (SAXS) as the main method for characterising the etched ion track channels. SAXS has previously been used to characterize unetched cylindrical ion tracks \cite{Bierschenk2013, Engel2009, Kluth2008a, Kluth2008b, Kuttich2013} and to a lesser extent etched ion tracks in SiO$_2$ and the mineral apatite \cite{Hadley2019, Cornelius2010, Nadzri2017}, but an appropriate model for SAXS of conical etched ion tracks has not been realised. In this paper we present the analytical techniques we developed for accurately reconstructing the size and shapes of conical etched pores and apply them to two different material systems. The first example is the analysis of SAXS data from etched conical ion tracks in SiO$_2$ with aspect ratios around 6 to 1. The second example is the application to very high aspect ratio (around 1000 to 1) narrow conical etched channels in polycarbonate (PC) foil membranes. Application of the analysis techniques to these two very different material systems illustrates the respective advantages of the analytical approaches which were developed. The intensity pattern resulting from a scattering experiment contains information about the morphology and size distribution of the etched ion tracks. In contrast to most other types of structures measured by SAXS (such as biological molecules, proteins etc.) the ion track etched nanopores are well aligned with each other and have very narrow size distributions, as they result from the etching of ion tracks generated by monoenergetic ions \footnote{the relative energy precision is estimated to be better than 0.1\% {\citep{Skorka1981, Lobanov2018}}} with well-defined ion beam direction \footnote{The maximum beam deflection due to the geometry of our experimental set-up is estimated to be less than 0.08\ensuremath{^\circ}}. The uniformity of etched ion tracks has been confirmed in many previous studies \citep{Dallanora2008, Jensen2006}. Toimil-Molares {\textit{et al.} \cite{Toimil2001} confirmed the uniformity and alignment of etched ion tracks in polycarbonate by performing x-ray diffraction (XRD) on electrodeposited nanowires inside an ion etched template to asses the alignment of the pores with each other within the template. The XRD independently confirmed the high degree of alignment of the pores. The polydispersity of the track radii for cylindrical ion tracks has previously been modelled and for ion tracks in amorphous SiO$_2$ irradiated with 185 MeV Au ions has been found experimentally to be less than 2\% \citep{Kluth2008b}. With an appropriate geometric model for the etched tracks, we can thus determine the average size parameters from the scattering image recorded by the detector with high precision. Once data has been collected by SAXS, several steps must be followed to extract the parameters which describe the morphology of the structures being measured. This procedure usually involves data reduction, background subtraction, and fitting of the scattering images. In previously published work \cite{Hadley2019} a systematic study of the dependence upon irradiation and etching conditions of ion track etching in a-SiO$_2$ was conducted. In \cite{Hadley2019} the SAXS technique combined with chemical etching allowed us to determine ion track etch rates in both the axial and radial directions, as well as the cone opening angles, for a range of ion energies and etchant concentrations. Data was analyzed using an average of the results obtained for a tilt sequence of measurements for each sample from an ion energy/etchant concentration series. In the present work we show in detail how this analysis technique was applied and extend it by developing three distinct analysis techniques to quantitatively analyze the size and shape of the conical etched channels. Briefly, the three analysis techniques are; (i) 2-D fit: Opening angle, length and radii of the cones are determined by the application of a 2-D fitting process on the anisotropic SAXS images recorded by the detector. The 2-D fitting routine allows simultaneous fits of two images to determine the sample tilt angles accurately. (ii) 1-D data fit: Fit of 1-D detector image slices to determine the cone dimensions, and (iii) Angle fit function: a geometric relationship between the cone opening angle, the sample tilt angle and the angle between features in the scattering images was developed to determine the cone angles and any offset in the tilt angles directly from the detected scattering images without the need to analyze the intensities. \begin{figure} \includegraphics[width=8.5cm]% {Fig1} \caption{(a) Cross-section SEM image of conical etched ion tracks in a-SiO$_2$, (b) Schematic diagram of etched cones including a cross-section of a cone, showing the paths of the ions in red.} \label{fig:Fig1} \end{figure} The general shape of the etched channels in SiO$_2$ is conical as shown by SEM micrograph in Fig.~\ref{fig:Fig1}(a) and by the schematic view in Fig.~\ref{fig:Fig1}(b). In Fig.~\ref{fig:Fig1}(a) the sample has been cleaved through the centre of two cones to reveal close to their full depth. The cone on the right is slightly set back from the cleaved edge and has not cleaved through its centre. The openings of two more cones on the upper surface of the sample can be seen at the upper left of the image. In Fig.~\ref{fig:Fig1}(b) the paths of the normally incident swift heavy ions along the cone axes are indicated in red. SEM imaging was used to confirm the general shape of the etched pores, thereby informing our choice of analytic model. The general shape of the high aspect ratio conical etched pores in polycarbonate membranes can be seen in the SEM images shown in \cite{Perez2018, Duan2016}. Reference \cite{Duan2016} shows electrodeposited Cu replicas formed inside conical channels etched under similar conditions to some of the samples analyzed in the present work. The studies performed so far on etched ion tracks in SiO$_2$ used SEM, transmission electron microscopy (TEM) or atomic force microscopy (AFM) as the primary means for determining the etched pore morphologies \cite{Dallanora2008, Kaniukov2016, Jensen2006, Vlasukova2014}. While these techniques are useful, they can potentially introduce measurement artefacts due to sample preparation, generally suffer from poor statistics due to the limited number of channels imaged and have limited accuracy in quantifying the pore dimensions. SAXS is a powerful tool for the characterisation of ion tracks \cite{Kluth2008a} and nano-sized channels \cite{Hadley2019, Engel2009, Hossain2017, Pepy2007} in many materials. It has several advantages over other characterisation techniques such as electron microscopy. The SAXS technique provides superior statistics since scattering from many structures is measured at once. For an x-ray beam spot size of 25 x 100 $\upmu$m$^2$ and an ion fluence of 1 x 10$^8$ ions cm$^{-2}$, approximately 2.5 x 10$^5$ structures are measured simultaneously. The results so deduced are an excellent statistical representation of the whole population. SAXS is a non-destructive technique that does not introduce any measurement artefacts due to sample preparation and measures the entire pore volume. These attributes are particularly advantageous for high aspect ratio nanopores, as not only is it possible to resolve the small changes in the pore sizes across the sample population, but changes along the pore length can also be resolved. Data acquisition times are short (in the order of 1 to 10 seconds) and the samples are measured in air so it is possible to conduct a variety of time-resolved \textit{in situ} studies (for examples see \cite{Afra2011, Schauries2013}). \section{Experimental} \subsection{SiO$_2$ samples} SiO$_2$ samples were prepared from 2 $\upmu$m thick thermally grown thin films using swift heavy ion irradiation followed by chemical etching as described in \cite{Hadley2019}. Irradiation with 54, 89, 185 MeV (ANU Heavy Ion Accelerator Facility) and 1.1 GeV (UNILAC linear accelerator of the GSI Helmholz Centre) Au ions was carried out at room temperature normal to the sample surface with applied ion fluences between 1x10$^{8}$ to 1x10$^{9}$ ions cm$^{-2}$ to avoid significant overlap of the etched pores. The samples were subsequently chemically etched in dilute (2.5\% or 5\% by volume) HF, yielding parallel, almost mono-disperse conical etched channels with their axes along the trajectory of the ion tracks as shown in Fig.~\ref{fig:Fig1}(b). SEM images were used to directly confirm the general morphology of the etched channels was conical, and data representative of the measured samples was chosen to illustrate the analysis techniques which were developed to characterise the etched cones and applied in \cite{Hadley2019}. \subsection{Polycarbonate samples} Polycarbonate (PC) foils (Makrofol N, Bayer AG, 30 $\upmu$m thick) were irradiated with 2.2 GeV Au ions at the GSI UNILAC accelerator with a fluence of 10$^6$ ions cm$^{-2}$. The samples were etched in a solution of 9M sodium hydroxide (NaOH) and methanol at a temperature of 50\ensuremath{^\circ}{} C for a range of etching times from 7 to 80 minutes. To produce conically shaped pores, asymmetric etching was performed by placing the etchant on one side of the irradiated PC foil and water on the other, as described in \cite{Karim2009}. The current flow across the membrane was monitored and etching was stopped by flushing with water after an increase in current flow was detected, indicating that the pores had etched through the PC foil. It has previously been shown that the addition of methanol to NaOH affects the ratio of the bulk etch rate to the track etch rate in PC, resulting in conically shaped etched channels \cite{Duan2016, Karim2009}. A series of samples was etched with varying methanol concentrations, from 0 to 95 volume per cent and the effect of methanol concentration on the cone opening angles was studied by SAXS. \subsection{SAXS measurements} SAXS measurements were performed at the SAXS/WAXS beamline of the Australian Synchrotron in Melbourne, Australia. They were performed in transmission mode with a photon energy of 12 keV and a sample to detector length of approximately 7200 mm. The images were recorded using a two dimensional (2-D) Pilatus 1M hybrid pixel detector using exposure times between 0.5 and 5 seconds. Accurate calibration of the q range was done for each group of measurements using a Silver Behenate (AgBeh) standard following the instructions given in \cite{Scatterbrain2019}. Calibration is based on the first order AgBeh ring. At the long camera length of approximately 7200 mm and an x-ray photon energy of 12 keV the q range is 0.002 to 0.100 \AA$^{-1}$. The detector is mounted on a horizontal and vertical motorized stage. To avoid gaps in the images resulting from the gaps between detector modules, three images are obtained by an automated system which moves the detector between three exposure positions and assembles a composite image. Specific details of the Pilatus 2-1M detector are given in \citep{Kirby2013}. Samples were mounted on a three axis goniometer, as shown in Fig.~\ref{fig:Fig2}, to enable alignment of the etched channels with the x-ray beam. The three directions of rotation of the goniometer motors, Pitch around the X axis, Yaw around the Y axis and Roll around the Z axis, are shown in the schematic at the right of the figure. The Z axis is parallel to the direction of the incident x-ray beam. The image on the left of Fig.~\ref{fig:Fig2} shows the sample stage with the sample holder just below the position of the x-ray beam. The sample is mounted on a holder with a separate small rotating motor behind it (not shown), allowing 360\ensuremath{^\circ}{} Pitch rotation about the X axis. The inset below is a close-up view of the sample holder which is almost vertical in the image. In practice, the alignment is done by adjusting the position of the sample in the Pitch and Yaw directions until a uniform set of concentric rings appears in the scattering pattern. This indicates that the pore axis is close to parallel to the direction of the x-ray beam. A tilt sequence of measurements is then performed by adjusting the Pitch motor by an angle $\gamma$ from 0\ensuremath{^\circ}{} to 50\ensuremath{^\circ}{} in 5\ensuremath{^\circ}{} increments (or 1\ensuremath{^\circ}{} increments for selected samples). The relative accuracy of the tilt angle with respect to the initial alignment position is accurate to better than 0.25\ensuremath{^\circ}. The $\gamma$ tilt sequence enables us to determine if any offset in the initial alignment of the sample was introduced, therefore allowing more accurate determination of the extracted parameters. \begin{figure} \includegraphics[width=8.5cm]% {Fig2} \caption{Photographs of sample positioning in the SAXS/WAXS beamline at the Australian Synchrotron. The photograph on the left shows the rotating sample holder, with an enlarged view below. The three axes of rotation are shown in schematic view on the right.} \label{fig:Fig2}% \end{figure} To account for the effect of background scattering from air, an air shot (no sample in the path of the x-ray beam) which is taken during calibration was subtracted when analyzing the 1-D data. When using the 2-D fitting routine to fit the 2-D data a constant background is included as one of the fitting parameters. \subsection{SAXS image analysis} Figure~\ref{fig:Fig3}(a) shows a schematic of a conically shaped scattering object coaxially aligned with the direction of the x-ray beam. The scattering intensity pattern obtained resembles that of a pin-hole scattering experiment, appearing as a series of concentric rings related to the dimensions of the real space object by its Fourier transform, as shown by the example experimental image to the right of Fig. \ref{fig:Fig3}(a). When the cones are tilted by an angle $\gamma$ with respect to the x-ray beam as depicted in the schematic diagram in Fig. \ref{fig:Fig3}(b), the scattering intensity pattern develops two sets of streaks, as shown by the example experimental image given to the right of Fig. \ref{fig:Fig3}(b). Due to the rotational symmetry of the conical pores, a cylindrical coordinate system fixed on the axis of a radially symmetric cone of height H and base radius R$_0$ is chosen. For a cone of height H, H/4 indicates the position of the cone centroid which was arbitrarily chosen as the pivot point of the cones in Fig. \ref{fig:Fig3}(b). The choice of pivot point does not affect the result, since the amplitude of the Fourier transform is translationally invariant \citep{Sivia2011}. The angle between the streaks in the scattering patterns from the tilted samples is related to the half cone opening angle $\beta$ and the tilt angle $\gamma$, while the intensity oscillations along the streaks contain information related to the cone size over the entire length of the cone. Our model assumes a monodisperse system with randomly distributed and well separated scattering objects. The fact that the model fits the experimental data very well indicates that the size distributions of R$_0$, H and $\beta$ are very low and that there is no order between the etched cones. \begin{figure} \includegraphics[width=8.5cm]% {Fig3} \caption{(a) Experimental configuration for conical pores coaxially aligned with the direction of the x-ray beam, and example of resulting experimentally measured isotropic scattering image. (b) Experimental configuration for conical pores tilted by an angle $\gamma$ with respect to the direction of the x-ray beam, and example of resulting experimentally measured non-isotropic scattering image.} \label{fig:Fig3}% \end{figure} To analyze the data, a step-wise approach was adopted. Both 1-D and 2-D fits were performed to allow a comparison of both methods; (i) The conical shape of the etched ion tracks was confirmed by SEM. An example is shown in Fig. \ref{fig:Fig1}(a). (ii) A model for conically shaped scattering objects was developed and implemented as a numerical least squares fit of the 2-D scattering images. This method provides accurate information on the cone length, radius and opening angle. (iii) 1-D data was extracted and fit using a hard cylinder model, revealing accurate information on the cone radii. (iv) Relationship between $\gamma$, $\beta$, and the angle between the streaks in the scattering image $\phi$. This method provides an independent and accurate way to measure $\beta$ without needing to analyze the intensities in the scattering images. \subsubsection{Cone model} Interference from x-ray scattering occurs wherever there is a change in electron density in the material being studied. The detected interference pattern contains information about the size and shape of the scattering objects. The scattering vector \textbf{q} is given by \begin{equation} \textbf{q} = \textbf{k$_0$} \; - \; \textbf{k} % \label{eqn:Scq}, \end{equation} where \textbf{k$_0$} is the incident x-ray wave vector and \textbf{k} is the wave vector of the scattered photons. Mathematically the scattering amplitude, which is related to the form factor, is a Fourier transform of the three-dimensional variation in electron density, or volume of the scattering objects. For a three-dimensional real space scattering object, the general expression for the scattering amplitude is \begin{equation} f(\textbf{q}) = \iiint \; \rho(\textbf{r}) \, \mathrm{exp}(-i(\textbf{q.r})) \, d^{3}r % \label{eqn:eqn1}. \end{equation} For monodisperse and parallel conical etched ion tracks a reference frame co-axial with the axis of the cones is chosen as shown by the dotted line labelled Z and the angle of rotation about the Z axis $\psi$ in Fig.~\ref{fig:Fig3}(a) and (b). The scattering amplitude may then be given as \begin{equation} f(\textbf{q}) = \int^\infty_{-\infty} \int^\pi_{-\pi} \int^\infty_{-\infty} \; \rho(r,z)\; \mathrm{exp}(-i(\textbf{q.r}))r\,dr\; d\psi \; dz \label{eqn:eqn2}, \end{equation} where $\rho$ is the electron density of the material. We assume that the density inside the etched cones is constant. This assumption is realistic since the conical structures are hollow after track etching. For conical scattering objects of height H, \begin{equation} \rho = \biggr\lbrace ^{\Delta\rho, \;\; for \; r \; \leq \; r_z \; and \;0 \, \leq \, z \, \leq \, H}_{0 \;\;\;\; otherwise} \label{eqn:eqn3}, \end{equation} where r$_z$ is the value of the radius at any position along the Z axis and may be calculated by \begin{equation} r_{z} = z \, \mathrm{tan} \, \beta, \label{eqn:eqn4} \end{equation} where $\beta$ is the half cone opening angle and $\Delta\rho$ is the density difference between the etched region of the ion track (i.e. density of air) and the surrounding un-etched material. It is assumed that there is an abrupt boundary from the interior of the etched cones to the surrounding material. In the reference frame of the real space cones the radial component of the vectors \textbf{q} and \textbf{r} may be expressed as \begin{equation} r = \sqrt{x^{2} + y^{2}}, \; q_{r} = \sqrt{q_{x}^{2} + q_{y}^{2}} \label{eqn:sqrr} . \end{equation} The product $\textbf{r.q}$ is therefore given by \begin{equation} \textbf{r.q}=r q_{r} \mathrm{cos}\varphi + q_{z}z \label{eqn:eqn7} , \end{equation} where $\varphi$ is the azimuthal angle between $\textbf{r}$ and $\textbf{q}$. The scattering amplitude may now be given by \begin{equation} f(\textbf{q}) = \int^H_{0} \int^{r_z}_{0} \int^{2\pi}_{0} \Delta \rho \,r\, \mathrm{exp}(-i(q_{r}r \mathrm{cos} \varphi + q_{z}z)) d\varphi \, dr \, dz \label{eqn:eqn8}. \end{equation} Because we have assumed rotational symmetry about the Z axis of the cones, the integral in the angular dimension can be solved to give \begin{equation} f(q_{r},q_{z}) = \int^H_0\int^{r_z}_0 2\pi\Delta\rho \; J_0 (rq_{r})\;r\; \mathrm{exp}(-izq_{z})dr\;dz \label{eqn:eqn9} \end{equation} where $J_0$ is the Bessel function of the zero$^{th}$ order. Evaluating the integral in the radial direction, Equation~\ref{eqn:eqn9} simplifies to \begin{equation} f(q_{r},q_{z}) = 2\pi \Delta\rho \int^H_0 \; J_1 (r_{z} q_{r})\;\frac{r_z}{q_r}\; \mathrm{exp}(-izq_{z})\,dz \label{eqn:eqn10} \end{equation} where J$_1$ is the Bessel function of the first order. This expression for the scattering amplitude for conical scattering objects accounts for the Z dependence of the radius along the length of the cones. The reference frame that we choose for our real space objects (the cones) is the axis of the cones, shown in Fig. \ref{fig:Fig3} denoted Z, which is fixed to the cones and moves with them. The experimentally accessible parameters are the scattering angle $\theta$, the magnitude of the scattering vector $\vert \textbf{q} \vert$ and the azimuth angle $\alpha$, which are recorded on the 2-D detector in the detector or laboratory coordinate system x$^\prime$, y$^\prime$, z$^\prime$. $\alpha$ is defined as positive when rotating in a clockwise direction from the y$^\prime$ axis ($\alpha$ = 0\ensuremath{^\circ}) towards the negative x$^\prime$ axis. A rotation of the sample by an angle $\gamma$ about the x$^\prime$ axis in the lab-coordinate system is equivalent to a rotation of the $\textbf{q}$ vector in the reference frame of the real space cone. Choosing a left-handed coordinate system by convention, equations~\ref{eqn:eqn11}(a) - (c) enable translation between the 2-D reference frame of the detector (Fourier space) and that of the real space objects \cite{Engel2009}, \begin{subequations} \begin{align} q_{x} &= -\;|\textbf{q}| \;\mathrm{sin}\alpha\;\mathrm{cos}\theta \\ q_{y} &= |\textbf{q}|\;(\mathrm{cos}\alpha\;\mathrm{cos}\gamma\;\mathrm{cos}\theta\;+\;\mathrm{sin}\gamma\;\mathrm{sin}\theta) \\ q_{z} &= |\textbf{q}|\;(\mathrm{cos}\alpha\;\mathrm{sin}\gamma\;\mathrm{cos}\theta\;-\;\mathrm{cos}\gamma\;\mathrm{sin}\theta) \, . \end{align} \label{eqn:eqn11} \end{subequations} We numerically calculate Equation~\ref{eqn:eqn10} and use an open-source Python implementation of a least squares fitting routine (LMFIT \cite{Newville2014}, \footnote{available from http://doi.org/10.5281/zenodo.3588521}, as reported in \cite{Hadley2019}) to fit it to the experimental data. Experimental misalignments of the cone axis in the direction orthogonal to $\gamma$ were implemented by applying a rotation matrix to Equation~\ref{eqn:eqn11} (a)-(c), representing a rotation around the y$^\prime$ axis. The radius at the base of the cone, $R_0$ may be calculated using Equation~\ref{eqn:eqn4} \begin{equation} R_{0}=H \, \mathrm{tan} \, \beta \label{eqn:eqn12}. \end{equation} \subsubsection{1-D cylinder model} For the case of cylindrically shaped scattering objects of length L and with a constant radius R, in the limit of $q_{z}\rightarrow0$, Equation~\ref{eqn:eqn10} may be solved analytically to yield \begin{equation} f(q_{r}) = \frac {2\pi\,L\,R\,\Delta\rho}{q_{r}} \; J_1 (Rq_{r}) \label{eqn:eqn13} \end{equation} where $J_{1}$ is the Bessel function of the first order \cite{Kluth2008a}. Along the streaks the condition $q_{z}\rightarrow0$ is satisfied. The total scattering intensity I(q$_r$) for N scattering objects is given by \begin{equation} I(q_r) \propto N \, \vert \, f(q_{r})\vert^2 \label{eqn:eqn14}. \end{equation} For the case of cylindrical etched ion tracks, it is appropriate to model the change of density in the radial direction as an abrupt increase at the interface between the etched region and the remaining un-etched material \cite{Nadzri2017}, as for conically shaped etched tracks. To include slight variations in the density profile of the radii of an actual sample, a narrow Gaussian distribution is convoluted with the radius. The scattering intensity from an ensemble of N etched ion tracks of radius R is then given by \begin{equation} I(q_r,R,\sigma) = \frac{N}{\sqrt{2\pi}\sigma} \int^\infty_{-\infty}\vert f(q_{r}) \vert^{2} \mathrm{exp} \left( \frac{-(r-R)^2}{(2\sigma_r)^2} \right) \; dr \label{eqn:eqn15} . \end{equation} This one dimensional cylinder model has successfully been used to characterise both un-etched ion tracks \citep{Bierschenk2013, Kluth2008b, Afra2011} and cylindrical etched ion tracks \cite{Nadzri2017, Hossain2017} in a variety of materials. For the case of a simple cylinder the total intensity I(q) is the incoherent sum (Equation~\ref{eqn:eqn15}) of the scattering contributions from all of the cylindrical pores being measured simultaneously \cite{Cornelius2010}. The 1-D cylinder model can be used as an approximation to analyse data from very small or very high aspect ratio cones which show very weak oscillations ($R\leq20$ nm) and are therefore difficult to fit using the 2-D data fitting method described above. To provide an appropriate approximation in the model of the variation of the cone radii along their length, a box shaped distribution is convoluted with the radius values along the length of the conical etch channels using the box distribution function $\Theta$, \begin{equation} \Theta(r, r_0, W) = \biggr\lbrace ^{1, \;\; for \;|r\; - \; r_0| \; \leq \; W}_{0,\;\; otherwise} \label{eqn:eqn16}, \end{equation} where W is the width of the radius distribution and r$_0$ is the average radius. This provides a more realistic approximation of the variation of the cone radii along the length of the cones. The radius value extracted by the 1-D fit corresponds to the volume weighted average radius, confirmed by comparison with the radius values obtained using the 2-D fitting model. As the radius variation along the length of each cone is more dominant than the radius variation between cones, the distribution is taken as the coherent sum of all the scattering contributions and the scattering intensity is given as \begin{equation} I(q_r,r_0,W) \propto \; \biggr\vert \frac{N}{2W} \int^\infty_{-\infty} f(q_{r}) \; \Theta(r, r_0, W) \; dr \biggr\vert^{2} \label{eqn:eqn17}. \end{equation} \subsubsection{Relationship between the angles $\gamma,\, \beta$ and $\phi$} As is apparent from Fig.~\ref{fig:Fig4}, the angle between the two streaks in the scattering image is dependent on the sample tilt angle $\gamma$. Using the following empirical relationship, \begin{equation} \mathrm{tan} \, \beta = \mathrm{tan} \, \phi \, \mathrm{sin} \, \gamma \label{eqn:eqn18}, \end{equation} the cone opening angle $\beta$ may be deduced from a tilt sequence of scattering intensity images, where $\phi$ is the angle between the streaks measured directly from the image as shown in Fig.~\ref{fig:Fig5}. The detector image is the Fourier transform of the physical cones through which the angles are preserved, therefore we can directly determine the value of $\beta$ from any of the scattering images provided we know the exact value of $\gamma$. Equation~\ref{eqn:eqn18} can be derived from the geometrical projection of the cone dimensions onto a plane perpendicular to the x-ray beam with its origin at the apex of the cone, as shown in the supplementary information. Using this relationship it is possible to determine $\beta$ without the need to analyse the intensity versus scattering vector data which is an advantage, particularly where the intensity values are weak and don't show any oscillations. \begin{figure} \includegraphics[width=1\textwidth] {Fig4} \caption{$\gamma$ tilt sequence of experimental detector images for a 2 $\upmu$m a-SiO$_{2}$ sample irradiated with 89 MeV Au ions and etched in 2.5 volume per cent HF for 12 minutes. } \label{fig:Fig4} \end{figure} \begin{figure} \includegraphics[width=8.5cm]% {Fig5} \caption{Example of measurement of the angle $\phi$ between the streaks of a scattering pattern.} \label{fig:Fig5}% \end{figure} Because the physical cones are three dimensional, there are two directions they could rotate with respect to the x-ray beam (Pitch and Yaw shown in Fig.~\ref{fig:Fig2}) which will affect the detected scattering image. Our model assumes radial symmetry about the etched cones. For etched ion tracks in amorphous SiO$_2$ this is a reasonable assumption which has been verified experimentally in our previous work \cite{Hadley2019} and in other studies (for example, see \cite{Dallanora2008, Jensen2006}). Rotation in the Roll direction does not have any effect on the scattering image when the cones are axially aligned with the x-ray beam. Tilting the sample in the direction of the Yaw angle $\xi$ will give identical results to tilting the sample by the Pitch angle $\gamma$, but the resulting scattering pattern will be rotated by 90\ensuremath{^\circ}. This has been both simulated (see the attached supplementary information at URL XXXX) and verified experimentally. Because we have greater freedom of movement in the $\gamma$ direction (360\ensuremath{^\circ}{} for $\gamma$ compared with about $\pm$ 12\ensuremath{^\circ}{} for $\xi$), experimentally we choose to tilt the sample in the $\gamma$ direction. Choosing which angle to vary does not affect the subsequent analysis, but the effect of rotation of both angles together may be significant. No rotation is applied in the Roll direction once the sample is aligned. To accurately determine the value of $\beta$ it is important to be able to accurately determine the tilt angle since a potential source of error, albeit very small, may be introduced during the initial sample alignment with the x-ray beam. A rotation around any arbitrary axis in the XY plane can be decomposed into Yaw and Pitch rotations. Therefore, Equation~\ref{eqn:eqn18} can be reformulated to include both Yaw and Pitch. Provided $\xi$ is small, the decomposition of $\gamma$ into Pitch and Yaw can be approximated to $\frac{1}{2}(1+\mathrm{cos}\xi)\mathrm{sin}\gamma$ and substituted into Equation~\ref{eqn:eqn18} to yield Equation~\ref{eqn:eqn19}: \begin{equation} \mathrm{tan}\,\phi\, =\, \frac{2 \, \mathrm{tan} \,\beta}{(1 + \mathrm{cos} \,\xi_{offset}) \, \mathrm{sin} \,(\gamma + \gamma_{offset})} \label{eqn:eqn19} \, . \end{equation} A tilt sequence of measurements can be performed to determine any offset in the initial alignment. The $\gamma$ values may be plotted against the values of $\phi$ measured directly from the corresponding scattering images as shown for the example given in Fig.~\ref{fig:Fig5}. The fit of the plotted data may then be obtained using Equation~\ref{eqn:eqn19}. For the data presented the values of $\xi_{offset}$ were small and had no influence on the fit so it was set to zero. The fit of the plotted experimental data yields the cone half opening angle $\beta$, as well as any offset in the initial sample alignment in both possible directions ($\gamma_{offset}$ and $\xi_{offset}$). Note that the evaluation of the experimental images using Equation~\ref{eqn:eqn18}, and therefore Equation~\ref{eqn:eqn19}, is naturally restricted to images where streaks begin to appear, which is at values of $\gamma$ slightly larger than the cone angle (e.g. for the experimental data plotted in Fig.~\ref{fig:Fig7}, $\gamma \simeq$ 17-45\ensuremath{^\circ}, and up to 90\ensuremath{^\circ}{} for the simulations shown in the video). \section{Results} The analysis methods developed for accurate characterisation of conical nanopores were applied to two different types of samples. (i) An example representative of the series of data presented in \cite{Hadley2019}, with R $\approx$ 124 nm and H $\approx$ 550 nm, and (ii) a series of very high aspect ratio conical channels with very small opening angles ($<$ 3\ensuremath{^\circ}{}) in 30 $\upmu$m thick polycarbonate film. Because the pores are etched completely through the PC foil, they resemble truncated cones, however this has no impact on the results. \subsection{Conical pores in SiO$_2$} Figure~\ref{fig:Fig4} shows an example of an experimental $\gamma$ tilt sequence for a representative sample irradiated with 89 MeV Au ions and etched in 2.5\% HF for 12 minutes. The scattering pattern obtained for the aligned image ($\gamma$ = 0\ensuremath{^\circ}{}) shows a series of concentric rings, similar to a pinhole scattering experiment \cite{Guinier1955}. As the real space scattering objects are tilted by an angle $\gamma$ with respect to the x-ray beam, the scattering pattern in Fourier space starts to elongate until two opposite pairs of streaks begin to appear (at $\gamma \simeq$ 15\ensuremath{^\circ}{} for this measurement sequence). As $\gamma$ is increased further, the angle between the arms of the streaks on the detector image begins to decrease. By substituting $\gamma$ = 90\ensuremath{^\circ}{} into Equation \ref{eqn:eqn18} and assuming $\xi$ = 0\ensuremath{^\circ}{} we can see that if we could rotate our sample to $\gamma$ = 90\ensuremath{^\circ}{}, the angle between the arms of the streaks in the scattering pattern would be equal to the half cone opening angle, \cite{Guinier1955}, i.e. $\beta=\phi$. The tilted scattering images contain information about the size and shape of the conical scattering objects. While the angle between the streaks is related to the cone opening angle, the oscillations in the streaks contain information about the cone radii. Figure \ref{fig:Fig6} shows two images selected from the tilt sequence in Fig.~\ref{fig:Fig4}, and their calculated fits obtained with our 2-D data analysis program. The fits reproduce the experimental images very well, with even the small secondary maxima between the streaks visible. \begin{figure} \includegraphics[width=8.5cm]% {Fig6} \caption{Example of a 2-D fit for two experimental images from the $\gamma$ tilt sequence shown in Fig.~\ref{fig:Fig4}. Masks used to extract 1-D data are indicated in white on the two experimental images on the left.} \label{fig:Fig6}% \end{figure} To accurately extract the parameters from the scattering images there are two options when analyzing the 2-D data. One approach is to fit each image from the whole $\gamma$ tilt sequence individually using our 2-D data model (using Equation~\ref{eqn:eqn10}) and average the results over the whole sequence of measurements. This was done for the data presented in \cite{Hadley2019}. The errors were obtained from averaging the measured values over the whole tilt sequence, rather than a single measurement, to provide a better estimate of the confidence in our measurements. An average over the tilt sequence allows for uncertainty introduced by factors like physical positioning in the x-ray beam, as well as the statistical variation in the fitting procedure. For the example shown in Fig.~\ref{fig:Fig4} using this method the value obtained for $\beta$ was 12.69 $\pm$ 0.12\ensuremath{^\circ}{}, with the base radius R$_0$ = 124 $\pm$ 5 nm and the cone height H = 551 $\pm$ 18 nm. This method works well provided the initial alignment of the sample with the x-ray beam is accurate and any initial misalignment is small. However, for samples with wide opening angles it can be difficult to determine how well they are aligned because the isotropic aligned pattern does not change significantly until the cones are tilted by an angle approaching the size of $\beta$, as can be seen by the first three tilted images in Fig.~\ref{fig:Fig4}. The second approach enables us to determine whether there is an initial offset in the tilt angle $\gamma$. To determine the possible offset, we fit one image using an approximation for the value of $\gamma$. The best approximation is the nominal tilt angle relative to the aligned position in the experimental set-up. Because none of the parameters change apart from the tilt angle we can then fix all of the parameters except $\gamma$ and subsequently fit two images simultaneously. We also know the difference between the two $\gamma$ values for both images very accurately. This gives us the actual value of $\gamma$ including any offset angle due to the initial alignment, as well as any rotation offset in the orthogonal direction ($\xi_{offset}$). An increase in the value of $\xi$ has the effect of rotating the image. Two experimental images shown in Fig.~\ref{fig:Fig5}. were chosen from the tilt sequence from the SiO$_2$ sample shown in Fig.~\ref{fig:Fig4}, where $\gamma$ = 25\ensuremath{^\circ}{} and 35\ensuremath{^\circ}{}. The tilt angle difference is $\Delta\gamma$ = 10 $\pm$ 0.1\ensuremath{^\circ}{}. The measured parameters obtained from the fit were $\beta$ = 12.82 $\pm$ 0.01\ensuremath{^\circ}{}, $\gamma$ = 34.91 $\pm$ 0.02\ensuremath{^\circ}{}, $\xi$ = 0.42 $\pm$ 0.01\ensuremath{^\circ}{} and the cone height H = 549.8 $\pm$ 0.5 nm. The nominal value of $\gamma$ was 35\ensuremath{^\circ}{}, so $\gamma_{offset}$ = 0.09\ensuremath{^\circ}{}. Using Equation~\ref{eqn:eqn12} the base radius calculated is R$_0$ = 125.1 $\pm$ 0.5 nm. This compares well with the value of R$_0$ obtained with the first approach by averaging over the whole tilt sequence of images (R$_0$ = 124 $\pm$ 5 nm), however the uncertainty is improved by an order of magnitude suggesting the two image fit approach is more accurate when compared to the first approach of averaging over the whole tilt sequence. To independently determine the value of $\beta$ from the scattering images of the $\gamma$ tilt sequence shown in Fig.~\ref{fig:Fig4}, the angle $\phi$ between the streaks in each of the scattering images was measured as shown in the example given in Fig.~\ref{fig:Fig5} using Fiji, an open source distribution of ImageJ \cite{Schindelin2012}. For clear streaks to appear the sample must be tilted by a critical angle slightly greater than the half cone opening angle $\beta$. In Fig.~\ref{fig:Fig4} streaks are beginning to appear when $\gamma$=15\ensuremath{^\circ}, and are quite clear when $\gamma$=17\ensuremath{^\circ}. The measured values of $\phi$ were then plotted for each corresponding value of $\gamma$ as shown in Fig.~\ref{fig:Fig7}. At lower tilt angles the streaks become broader which is reflected in the larger error estimates shown for $\phi$. Equation~\ref{eqn:eqn19} was used to fit the experimental data sequence, yielding the cone half opening angle $\beta$, the tilt angle offset $\gamma_{offset}$, and any offset in the orthogonal tilt angle $\xi_{offset}$. For the sample analysed in this example which were well aligned, $\xi_{offset}$ was set to zero. The measured values were $\beta$ = 12.87\ensuremath{^\circ}{} $\pm$ 0.21\ensuremath{^\circ}{} and $\gamma_{offset}$ = -2.03\ensuremath{^\circ}{} $\pm$ 0.38\ensuremath{^\circ}{}. The uncertainties given are the fitting uncertainty. For this sample the value obtained for $\beta$ agrees very well with the value obtained by the 2-D numerical fitting method. \begin{figure} \includegraphics[width=8.5cm]% {Fig7} \caption{Plot of $\phi$ vs $\gamma$ for the $\gamma$ tilt sequence of images shown in Fig.~\ref{fig:Fig4}. The solid line is the fit obtained using Equation~\ref{eqn:eqn19}.} \label{fig:Fig7}% \end{figure} The uncertainty in the measured value of $\xi_{offset}$ could most likely be improved by performing a $\xi$ tilt sequence of measurements as well as the $\gamma$ tilt sequence, however the value of $\xi_{offset}$ is very small and very little improvement would be gained. Our experimental set-up did not allow us to perform a complete measurement tilt sequence in both the $\gamma$ and $\xi$ directions because of physical limitations of the movement of the goniometer (restricted to 12\ensuremath{^\circ}{} in the Yaw direction). To visualise the effect of tilting the sample in both directions, we performed a simulation of the scattering intensity patterns as a function of the tilt angles. An example of the simulated effect of rotation of the sample with respect to the direction of the x-ray beam in both directions can be seen in the video, included as Supplemental Material at [URL XXXXX], where the movement of the real space cone is shown together with its corresponding scattering image. Information about the size of the cones is contained in the oscillations along the streaks. Analysis of a 1-D data slice through a streak of the experimentally obtained image provides an alternative means for determining the pore dimensions. The 1-D data fit is computationally much easier, which can be useful in some circumstances. A narrow mask (indicated by the white rectangle) is used to extract the data, as shown for the two examples of experimental images on the left of Fig. \ref{fig:Fig6}. An air shot was used for background subtraction, and the intensity oscillations along the streaks become apparent when the data is plotted as a function of the scattering vector (as shown in Fig.~\ref{fig:Fig8}), for selected tilt angles from the $\gamma$ tilt sequence shown in Fig.~\ref{fig:Fig4}. To fit the data plotted in Fig.~\ref{fig:Fig8}, the hard cylinder model was used as an approximation for the cones with Equation~\ref{eqn:eqn13} representing the scattering amplitude and using the square distribution coherently summed (Equation~\ref{eqn:eqn17}), the model effectively fits a series of cylinders with radii corresponding to the cone radii varying as a function of $\beta$ along the cone's length. The reason why the data for $\gamma$=0\ensuremath{^\circ}{} was not fit is that accurate alignment of the pores with the x-ray beam is required to yield good 1-D data when integrated. Any misalignment skews the data. The data and fits plotted in Fig.~\ref{fig:Fig8} show that this model provides a very good fit for the tilted samples. \begin{figure} \includegraphics[width=8.5cm]% {Fig8} \caption{1-D data plots from selected images from the $\gamma$ tilt sequence shown in Fig.~\ref{fig:Fig4}. The fits to the data were obtained using Equation 13 and a box shaped distribution for the radius variation (Equation 17). To enable comparison, the data are offset on the intensity axis for clarity.} \label{fig:Fig8}% \end{figure} The values obtained for the cone radius and distribution width from the data plotted in Fig.~\ref{fig:Fig8} for each tilt angle are given in Table~\ref{tab:table1}. The radius values measured correspond to the volume weighted average radius (R$^{\prime}$) of the cones, which is the value of the radius at $1/4$ of the height (or centroid) of the cone. To check this is correct we can compare the experimental results for the radius obtained by fitting the 1-D data (R$^{\prime}$ = 92.2 $\pm$ 1.0 nm) with the radius value obtained from the 2-D data fit (R$_0$ = 124 $\pm$ 5 nm, or R$_{0}$ = 125.1 $\pm$ 0.5 nm in the case of the two image simultaneous fit). In both cases the average radius values over the tilt sequence was used. The value of $\beta$ obtained by fitting the tilt sequence of Fig. 4 using the 2-D fitting procedure was 12.97 $\pm$ 0.07\ensuremath{^\circ}{}. Because we have measured the cone angle to a very high degree of certainty, we can use Equation 11 to confirm that 92.2 $\pm$ 1.0 nm corresponds to the radius value at the cone centroid, with a calculated base cone radius of R$_{0}$ = 123 $\pm$ 1 nm. This compares very well with the base cone radius measured by the 2-D fit which was R$_{0}$ = 124 $\pm$ 5 nm, or R$_{0}$ = 125.1 $\pm$ 0.5 nm for the two image fit. These results are summarised in Table~\ref{tab:table2}. \begin{table}[h] \caption{Parameters extracted from 1-D fits plotted in Fig.~\ref{fig:Fig8}.} \label{tab:table1} \begin{ruledtabular} \begin{tabular}{l l l} $\gamma$(\ensuremath{^\circ}) & R$^{\prime}$ (nm) & W (nm) \\ \hline 25 & 89.6$\pm$0.1 & 38.7$\pm$4.4 \\ 30 & 91.2$\pm$1.6 & 40.0$\pm$1.6 \\ 35 & 94.5$\pm$1.1 & 38.6$\pm$0.9 \\ 41 & 92.5$\pm$0.1 & 45.3$\pm$1.5 \\ 46 & 93.3$\pm$1.2 & 45.6$\pm$1.2 \\ \hline Average radius = & 92.2$\pm$1.0 & \\ \end{tabular} \end{ruledtabular} \end{table} \begin{table}[h] \caption{Comparison of results obtained by each analysis method.} \label{tab:table2} \begin{ruledtabular} \begin{tabular}{l l l l l} Parameter & 2-D fit & 2-D 2 image fit & Angle fit function & 1-D fit \\ \hline $\beta$(\ensuremath{^\circ}) & 12.69$\pm$0.12 & 12.82$\pm$0.01 & 12.87$\pm$0.21 & 12.82$\pm$0.01 \\ $R_0$ (nm) & 124$\pm$5 & 125.1$\pm$0.5 & & 123$\pm$1 \\ H (nm) & 551$\pm$18 & 549.8$\pm$0.5 & & 540$\pm$1 \\ $\gamma$ (\ensuremath{^\circ}) & 35 (nominal) & 34.91$\pm$0.02 & \\ $\gamma_{offset}$ (\ensuremath{^\circ}) & & 0.09$\pm$0.02 & -1.76$\pm$0.07 & \\ $\xi_{offset}$ (\ensuremath{^\circ}) & & 0.42$\pm$0.01 & 0.7$\pm$13.6 & \\ R$^{\prime}$ (nm) & & & & 92$\pm$1 \\ \end{tabular} \end{ruledtabular} \end{table} \subsection{High aspect ratio etched cones in polycarbonate} Figure~\ref{fig:Fig9} shows scattering images from SAXS data obtained from a series of approximately 30 $\upmu$m long conical etched ion tracks in polycarbonate (PC) foil. A $\gamma$ tilt sequence of scatting intensity images for a sample etched in 9M NaOH with 30\% methanol added is shown in Fig.~\ref{fig:Fig9}(a). Figure~\ref{fig:Fig9}(b) shows the scattering images for the whole series of six samples etched with varying methanol concentration (including 0$\%$) all tilted by the same amount ($\gamma$ = 10\ensuremath{^\circ}{}). The effect of varying the methanol concentration in the etchant is clearly apparent from the difference of the angles between the streaks (Fig.~\ref{fig:Fig9}(b)). \begin{figure} \includegraphics[width=12.5cm]% {Fig9} \caption{Scattering intensity images for (a) $\gamma$ tilt sequence for conical etched ion tracks in PC with 30\% methanol added and (b) six samples etched using different methanol concentrations measured at a constant tilt angle ($\gamma$ = 10\ensuremath{^\circ}{}).} \label{fig:Fig9}% \end{figure} Figure~\ref{fig:Fig10} compares the 1-D data extracted from the streak of a sample etched with 0\% methanol and 30\% methanol added to the etchant both tilted by $\gamma$ = 10\ensuremath{^\circ}{}. The sample etched with 0\% methanol is expected to have practically cylindrical pores. This is reflected in the scattering image since there is only one pair of streaks. The plotted 1-D data shows some intensity oscillations. Assuming cylindrical geometry, the hard cylinder model yielded a radius value of 54.7 $\pm$ 2.4 nm. In contrast, the 1-D data plotted for the sample with conical channels shows no oscillations, so fitting using the cylinder model will yield results with large uncertainties. Although just one example of the 1-D data was plotted in Fig.~\ref{fig:Fig11}, the streaks for all the conical samples are similar as they also do not show any oscillations. The reason why there are no oscillations for the conical samples is because the detected scattering intensity is the sum of the scattering over the entire length of these very long cones. The length (~30 $\upmu$m) by far exceeds the coherence length ($\sim$500 nm) of the x-ray beam, effectively incoherently summing contributions from pore segments with a large size distribution. This flattens out the oscillations that are characteristic in scattering from monodisperse samples. For almost cylindrical channels (0\% methanol) there is only a very small variation in the radius of the cones along their length, so the oscillations are still apparent. \begin{figure} \includegraphics[width=8.5cm]% {Fig10} \caption{1-D data comparison for an almost cylindrical sample etched in 9M NaOH with no methanol, compared with conical pores etched with 30\% methanol showing the effect of the conical pore shape on the oscillations in the data.} \label{fig:Fig10}% \end{figure} Figure~\ref{fig:Fig11} is a plot of the angle $\phi$ between the streaks measured directly from the scattering intensity patterns for each sample, plotted against the tilt angle $\gamma$. The solid lines are fits to the data obtained using Equation~\ref{eqn:eqn19}. The values of $\beta$ deduced from the fits are given in Table~\ref{tab:table3}. Although it is not possible to make a direct comparison because the etching conditions are not exactly the same, the results obtained for $\beta$ from the data fits suggest the etched ion tracks have a similar shape to the Cu cone replicas produced by electrodeposition in ion track membranes etched under similar conditions and analysed by electron microscopy in \cite{Duan2016}. The method used in our work takes advantage of superior statistics, since a single SAXS measurement at a fluence of 10$^{6}$ ions cm$^{-2}$ simultaneously measures around 2 x 10$^{4}$ etched tracks. The effect of increasing methanol concentration on the cone opening angle can be seen in the plot shown in Fig. \ref{fig:Fig12}, where the solid line shows the data trend. The addition of methanol affects the ratio of the ion track etch rate to the bulk etch rate ($\nu_{t}/\nu_{b}$). The higher the methanol concentration, the lower this ratio resulting in a larger value of $\beta$. \begin{figure} \includegraphics[width=8.5cm] {Fig11} \caption{Plot of $\phi$ against $\gamma$ for the series of samples etched with varying concentrations of methanol. The solid lines are fits to the data using Equation 19 which yield the cone half opening angle $\beta$.} \label{fig:Fig11} \end{figure} \begin{figure} \includegraphics[width=8.5cm] {Fig12} \caption{Plot of $\beta$ against etchant methanol concentration showing the increase in the cone opening angle with increased methanol concentration. The dashed line is to show the trend in the data.} \label{fig:Fig12} \end{figure} \begin{table}[h] \caption{Half cone opening angles ($\beta$) deduced from fits to the data plotted in Fig. \ref{fig:Fig11}.} \label{tab:table3} \begin{ruledtabular} \begin{tabular}{l l l} Methanol (\%) & Etching time (min) & $\beta$(\ensuremath{^\circ}) \\ \hline 0 & 7 & N/A \\ 10 & 7.5 & 0.44$\pm$0.09 \\ 30 & 8.5 & 1.69$\pm$0.04 \\ 50 & 11 & 2.29$\pm$0.11 \\ 70 & 19.5 & 2.65$\pm$0.04 \\ 95 & 80 (approx) & 2.96$\pm$0.06 \end{tabular} \end{ruledtabular} \end{table} \section{conclusions} In this paper we present new techniques for the analysis of SAXS results obtained from conical mono-disperse nanochannels. These techniques are well suited to accurately extract parameters for conical etched ion tracks in a-SiO$_2$ as well as for very high aspect ratio conical etched ion tracks in polycarbonate. The two material systems studied were very different from the perspective of the aspect ratios of the conical etched channels in each, demonstrating that the analysis techniques would be applicable to pores in many other materials. The 2-D fitting routine we developed enables us to measure the axial and radial track etch rates and the cone opening angles with high precision. The 2-D fits reproduce the experimental images very well, with even the very fine secondary features between the streaks visible. By analysing a tilt sequence of SAXS measurements, we were able to determine if there was any tilt angle offset introduced by the experimental set-up, making sure that the deduced values of the cone opening angles were accurate to better than $\pm$ 0.1\ensuremath{^\circ}. As well as the 2-D fitting, we developed an independent technique to measure the cone opening angles from a tilt sequence of measurements. By exploiting the relationship between the cone opening angle and the angle between the streaks in the scattering pattern, we can determine the cone opening angle very accurately directly from the scattering images without needing to analyse the intensities. From the measurement tilt sequence using this method we can also measure and allow for any offset in the tilt angle, providing very high confidence in the measured values for the cone opening angles. Even if the scattering image was weak or there were no oscillations present in the streaks, we were still able to determine $\beta$ with very high confidence directly from the scattering intensity images. Fitting a slice of the 1-D data through the streak using the hard cylinder model provides an alternative method for analyzing the data. With this method we could deduce the average cone radius and compare it with the radius values obtained with the 2-D fit. This method was useful for providing a good starting point for estimates of parameters for the 2-D fit, ensuring it returned accurate results and is also well suited for automated quick analysis given the short fitting times. \begin{acknowledgments} \section{Acknowledgements} Part of the research was undertaken at the SAXS/WAXS beamline at the Australian Synchrotron, part of ANSTO, and we thank the beamline scientists for their technical assistance. Irradiation was conducted at the ANU Heavy Ion Accelerator Facility (HIAF), and we also thank the ANU HIAF staff for their technical assistance. Operations of the ANU HIAF is financially supported by the National Collaborative Research Infrastructure Strategy (NCRIS) HIA capability. The results presented here are based in part on UMAT experiments, which were performed at the X0-beamline of the UNILAC at the GSI Helmholtzzentrum fuer Schwerionenforschung, Darmstadt (Germany), in the frame of FAIR Phase-0. This work was also performed in part at the Canberra node of the Australian National Fabrication Facility, a company established under the NCRIS to provide nano and micro-fabrication facilities for Australia's researchers. This research is supported by an Australian Government Research Training Program (RTP) Scholarship. The authors also acknowledge financial support from the Australian Research Council (ARC) and the German Research Foundation (DFG). A.H. irradiated and etched the SiO$_2$ samples, conducted the SAXS measurements and simulations, analyzed the SAXS data, and drafted the manuscript. C.N. wrote the 2-D SAXS data analysis software, assisted with the SiO$_2$ irradiation and SAXS measurements and reviewed the manuscript. P.M.S. assisted with the SiO$_2$ irradiation and SAXS measurements and reviewed the manuscript. S.D. generated the 3-D cone images, assisted with the SiO$_2$ irradiation and SAXS measurements. M.A.C.S. assisted with etching the PC samples, M.E.T.M. and C.T. irradiated the PC samples and reviewed the manuscript. S.M. assisted with the SAXS measurements. P.K. assisted with the SAXS measurements and data analysis, etched the PC samples and helped draft the manuscript. P.K. conceived and directed the research. \end{acknowledgments}
\section{Introduction} Observations over the past years have revealed the existence of massive black holes, with $M_{BH} \sim 10^9 M_{\odot}$, at very high redshifts of $z \sim 6-7$ \citep{Mortlock_et_2011, Wu_et_2015, Banados_et_2018}. To date, more than hundred quasars are known at $z > 6$ \citep[][]{Gallerani_et_2017, Wang_et_2018, Yang_et_2018}. The recent discovery of ULAS J1342+0928 sets the current distance record at a redshift of $z = 7.5$ \citep{Banados_et_2018}. The very existence of such massive black holes in the early Universe, when its age was less than $\lesssim 1$ Gyr, poses severe challenges to black hole formation models. A number of scenarios have been proposed for the formation of black hole seeds and their early growth. Three main pathways have been discussed in the literature: as the remnants of the first generation of Population III stars with primordial gas composition ($M_{BH,0} \sim 10^2-10^3 M_{\odot}$), as the result of runaway collisions in nuclear star clusters ($M_{BH,0} \sim 10^3-10^4 M_{\odot}$), and as the outcome of direct collapse of gas without fragmentation or DCBH ($M_{BH,0} \sim 10^4-10^6 M_{\odot}$) \citep[][and references therein]{Volonteri_2010, Valiante_et_2017, Smith_et_2017, Wise_2018}. In the case of light seeds, a continuous growth at the Eddington rate and/or several super-Eddington accretion episodes are required, while the constraints may be slightly relaxed in the case of heavy seeds. In any case, a rapid and efficient black hole growth is required at early times in order to account for the billion-solar mass objects observed at $z \gtrsim 6$. The highest-redshift quasars are characterised by high bolometric luminosities ($L \gtrsim 10^{47}$erg/s) and high accretion rates, possibly accreting close to the Eddington limit ($L/L_E \sim 1$) \citep{Banados_et_2018, Mazzucchelli_et_2017}. Recent observations have also revealed, somewhat unexpectedly, that the host galaxies of the first quasars are chemically evolved systems containing metal-enriched gas with super-solar metallicity \citep[][and references therein]{Calura_et_2014, Valiante_et_2017}. Indeed, a significant amount of dust, of the order of $M_{dust} \gtrsim 10^8 M_{\odot}$, is detected in the most distant quasar at $z = 7.5$ \citep{Venemans_et_2017}. ALMA observations of a sample of quasars at $z \gtrsim 6$ also indicate dust masses in the range $M_{dust} \sim (10^7-10^9) M_{\odot}$ \citep{Venemans_et_2018}. This suggests that considerable quantities of dust are already present in the quasar host galaxies at very high redshifts, and thus early enrichment must be common. Combining the above two observational facts, i.e. the high luminosity output of the first quasars and the presence of large amounts of dust in their host galaxies, we expect AGN radiative feedback, due to radiation pressure on dust, to play a major role in the early black hole growth phase. We have previously discussed how AGN radiative feedback may drive powerful outflows on galactic scales, and how the observed outflow dynamics and energetics may be accounted for, by including radiation trapping \citep{Ishibashi_Fabian_2015, Ishibashi_et_2018}. More recently, we have also analysed the effects of AGN luminosity decay on the inferred outflow energetics \citep{Ishibashi_Fabian_2018}. Here we investigate for the first time the impact of AGN radiative feedback on the early growth of massive black holes, by considering a physically motivated luminosity output (powered by an exponentially growing black hole) and analyse the resulting outflow dynamics and energetics. \section{Radiative dusty feedback driven by Eddington-limited growth} We consider AGN radiative feedback driven by radiation pressure on dust \citep[cf.][]{Ishibashi_Fabian_2015, Ishibashi_et_2018}. Radiation pressure sweeps up the surrounding dusty gas into an outflowing shell. The equation of motion of the shell is given by: \begin{equation} \frac{d}{dt} [M_{g}(r) v] = \frac{L(t)}{c} (1 + \tau_{IR} - e^{-\tau_{UV}} ) - \frac{G M(r) M_{g}(r)}{r^2} \end{equation} where $L(t)$ is the central luminosity evolution, $M(r)$ is the total mass distribution, $M_g(r)$ is the gas mass, and $\tau_\mathrm{IR,UV}$ are the infrared (IR) and ultraviolet (UV) optical depths. Assuming Eddington-limited accretion, the black hole mass grows exponentially as $M_\mathrm{BH}(t) \cong M_0 e^{t/t_\mathrm{S}}$, where $M_0$ is the initial mass and $t_\mathrm{S} = \frac{\epsilon \sigma_T c}{4 \pi G m_p} \sim 5 \times 10^7$yr is the Salpeter time. As a consequence, the luminosity output also grows exponentially as \begin{equation} L(t) \cong L_0 e^{t/t_\mathrm{S}} \end{equation} where $L_0$ is the initial luminosity. We assume the simple case of an isothermal potential: \begin{equation} M(r) = \frac{2 \sigma^2 r}{G} \end{equation} where $\sigma$ is the velocity dispersion. The ambient gas density distribution can be parameterised as a power-law of radius: $n(r) = n_0 (\frac{r}{R_0})^{-\alpha}$, where $\alpha$ is the power-law exponent, $n_0$ is density of the external medium, and $R_0$ is the initial radius. The corresponding shell mass is given by: $M_g(r) = 4 \pi m_p n_0 R_0^{\alpha} \frac{r^{3-\alpha}}{3-\alpha}$. We consider here an isothermal gas distribution, corresponding to the case $\alpha = 2$: \begin{equation} M_g(r) = 4 \pi m_p n_0 R_0^2 r \label{Eq_gas_mass} \end{equation} The associated IR and UV optical depths are given by: \begin{equation} \tau_\mathrm{IR}(r) = \frac{\kappa_\mathrm{IR} M_g(r)}{4 \pi r^2} = \frac{\kappa_\mathrm{IR} m_p n_0 R_0^2}{r} \end{equation} \begin{equation} \tau_\mathrm{UV}(r) = \frac{\kappa_\mathrm{UV} M_g(r)}{4 \pi r^2} = \frac{\kappa_\mathrm{UV} m_p n_0 R_0^2}{r} \end{equation} where $\kappa_\mathrm{IR}$ and $\kappa_\mathrm{UV}$ are the IR and UV opacities, respectively. In the following, we take as fiducial parameters: $L_0 = 10^{44}$ erg/s, $n_0 = 10^4 cm^{-3}$, $\sigma = 50$ km/s, $R_0 = 3$ pc, $\kappa_\mathrm{IR} = 5 \, \mathrm{cm^2 g^{-1} f_{dg, MW}}$, $\kappa_\mathrm{UV} = 10^3 \, \mathrm{cm^2 g^{-1} f_{dg, MW}}$, with the dust-to-gas ratio normalised to the Milky Way value. We note that the fiducial initial luminosity would correspond to an initial black hole mass of $\sim 10^6 M_{\odot}$ radiating at the Eddington limit. \subsection{Radiative and gravitational forces} The evolution of the shell is governed by the balance between the radiative and gravitational forces. The outward force due to radiation pressure is given by: \begin{equation} F_\mathrm{rad} = \frac{L(t)}{c} (1 + \tau_\mathrm{IR} - e^{-\tau_\mathrm{UV}} ) \end{equation} \begin{equation} = \frac{L_0 \exp(t/t_\mathrm{S})}{c} (1 + \frac{\kappa_\mathrm{IR} m_p n_0 R_0^2}{r} - \exp(-\frac{\kappa_\mathrm{UV} m_p n_0 R_0^2}{r})) \end{equation} The inward force due to gravity is given by: \begin{equation} F_\mathrm{grav} = \frac{G M(r) M_{g}(r)}{r^2} = 8 \pi m_p n_0 R_0^2 \sigma^2 \end{equation} which is a constant, independent of radius. \begin{figure} \begin{center} \includegraphics[angle=0,width=0.4\textwidth]{plot_fid_FradFgrav_t_rev.jpg} \caption{ Radiative force (red solid) and gravitational force (blue dashed) as a function of time. } \label{Fig_FradFgrav_t} \end{center} \end{figure} In Fig. $\ref{Fig_FradFgrav_t}$, we plot the radiative and gravitational forces as a function of time. At early times ($t \ll t_\mathrm{S}$), the luminosity can be approximated as a constant $L(t) \cong L_0$; while at late times ($t \gtrsim t_\mathrm{S}$), the exponential term takes over and the luminosity grows as $L(t) \propto \exp(t/t_\mathrm{S})$. As a result, the radiative force reaches a minimum around the Salpeter time ($t \lesssim t_\mathrm{S}$), and then increases exponentially. A critical luminosity can be defined by equating the outward force due to radiation pressure to the inward force due to gravity ($F_{rad} = F_{grav}$): \begin{equation} L_{c,0} = \frac{1}{\exp(t/t_\mathrm{S})} \frac{8 \pi c m_p n_0 R_0^2 \sigma^2}{(1 + \tau_\mathrm{IR} - e^{-\tau_\mathrm{UV}} ) } \, , \end{equation} with the corresponding temporal evolution $L_{c,0} \exp(t/t_\mathrm{S})$. Alternatively, one may also define another critical luminosity based on the condition that the shell velocity crosses zero (v=0): $L_{c,v0}$. In Fig. $\ref{Fig_Lc0_t}$, we show the different critical luminosities as a function of time. We see that the critical luminosity $L_{c,0}$ reaches a maximum around $t \lesssim t_\mathrm{S}$ (green solid line), corresponding to the minimum in $F_\mathrm{rad}$ (cf. Fig. $\ref{Fig_FradFgrav_t}$). Provided that this minimum radiative force exceeds the gravitational force ($F_\mathrm{rad,min} > F_\mathrm{grav}$), a steady outflow can develop on large scales. \begin{figure} \begin{center} \includegraphics[angle=0,width=0.4\textwidth]{plot_fid_Lc0_t_rev.jpg} \caption{ Critical luminosities as a function of time: $L_{c,0}$ (green solid), $L_{c,0} \exp(t/t_S)$ (violet dashed), $L_{c,v0}$ (orange dotted). } \label{Fig_Lc0_t} \end{center} \end{figure} \section{Outflow dynamics and energetics} We next consider the propagation of radiation pressure-driven outflows powered by exponentially growing black holes, and the resulting outflow dynamics and energetics. \subsection{Outflow dynamics} In Fig. $\ref{Fig_r_t}$, we plot the evolution of the shell radius as a function of time. At early times ($t \ll t_\mathrm{S}$), the temporal evolution of the shell radius is equivalent to the case of a constant luminosity output ($L(t) = L_0$). At late times ($t > t_\mathrm{S}$), the exponential term takes over, and the shell evolution becomes purely exponential: $r(t) \propto \exp(t/3t_\mathrm{S})$. We note that the shell expansion has an e-folding time of 3 times the Salpeter time, and is thus slower than the luminosity output ($L(t) \propto \exp(t/t_\mathrm{S})$). \begin{figure} \begin{center} \includegraphics[angle=0,width=0.4\textwidth]{plot_r_t_cst_analytic_fin.jpg} \caption{Shell radius (black solid) as a function of time, radius evolution for a constant luminosity output (blue dashed), and analytic exponential trend (green dotted). } \label{Fig_r_t} \end{center} \end{figure} The corresponding shell velocity as a function of time is shown in Fig. $\ref{Fig_v_t}$. At early times, the velocity evolution is the same as in the case of a constant luminosity output. The shell speed reaches a minimum around the Salpeter time ($t \gtrsim t_\mathrm{S}$), and then increases exponentially as $v(t) \propto \exp(t/3t_\mathrm{S})$. We note that the shell velocity has the same exponential dependence as the shell radius, corresponding to a linear increase in radius: $v \propto r$. \begin{figure} \begin{center} \includegraphics[angle=0,width=0.4\textwidth]{plot_v_t_cst_analytic_fin.jpg} \caption{Shell velocity (black solid) as a function of time, velocity evolution for a constant luminosity output (blue dashed), and analytic exponential trend (green dotted). } \label{Fig_v_t} \end{center} \end{figure} \subsection{Outflow energetics} \begin{figure*} \begin{multicols}{3} \includegraphics[width=\linewidth]{plot_fid_Mdot_t_analytic_bis_rev.jpg}\par \includegraphics[width=\linewidth]{plot_fid_pdot_t_analytic_bis_fin.jpg}\par \includegraphics[width=\linewidth]{plot_fid_Ekdot_t_analytic_bis_fin.jpg}\par \end{multicols} \caption{ Outflow energetics as a function of time (black solid): mass outflow rate $\dot{M}$ (left panel), momentum flux $\dot{p}$ (middle panel), and kinetic power $\dot{E}_{k}$ (right panel), with analytic exponential trends (green dotted). } \label{Fig_MpEkdot_t} \end{figure*} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.4\textwidth]{plot_fid_xi_t_analytic_bis_fin.jpg} \caption{ Momentum ratio versus time (black solid), with analytic exponential trend (green dotted). } \label{Fig_xi_t} \end{center} \end{figure} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.4\textwidth]{plot_fid_K_t_analytic_bis_fin.jpg} \caption{ Energy ratio versus time (black solid), with constant trend (green dotted). } \label{Fig_K_t} \end{center} \end{figure} In observational studies, three physical parameters are generally used to quantify the outflow energetics: the mass outflow rate ($\dot{M}$), the momentum flux ($\dot{p}$), and the kinetic power ($\dot{E}_k$). In the so-called thin shell approximation \citep[e.g.][]{Gonzalez-Alfonso_et_2017}, they are given by: \begin{equation} \dot{M} = \frac{M_{g}}{t_{flow}} = M_{g} \frac{v}{r} = 4 \pi m_p R_0^2 n_0 v \label{Eq_Mdot} \end{equation} \begin{equation} \dot{p} = \dot{M} v= M_{g} \frac{v^2}{r} = 4 \pi m_p R_0^2 n_0 v^2 \label{Eq_pdot} \end{equation} \begin{equation} \dot{E}_k = \frac{1}{2} \dot{M} v^2 = \frac{1}{2} M_{g} \frac{v^3}{r} = 2 \pi m_p R_0^2 n_0 v^3 \label{Eq_Ekdot} \end{equation} where we introduce our assumption for the gas mass (Eq. \ref{Eq_gas_mass}) in the last equalities. In Fig. $\ref{Fig_MpEkdot_t}$, we show the corresponding temporal evolution of the outflow energetics. We see that all three outflow parameters reach a minimum around the Salpeter time ($t \gtrsim t_\mathrm{S}$), corresponding to the minimum in the shell velocity (cf. Fig. $\ref{Fig_v_t}$), and then start to grow exponentially. In fact, the outflow energetics scale with velocity as: $\dot{M} \propto v \propto \exp(t/3t_\mathrm{S})$, $\dot{p} \propto v^2 \propto \exp(2t/3t_\mathrm{S})$, $\dot{E}_k \propto v^3 \propto \exp(t/t_\mathrm{S})$. We note that the kinetic luminosity has the steepest dependence, equalling the luminosity output, whereas both the mass outflow rate and the momentum flux display a slower growth. Two derived quantities, the momentum ratio ($\zeta$) and the energy ratio ($\epsilon_k$), are also often used in quantifying the observed outflow energetics: \begin{equation} \zeta = \frac{\dot{p}}{L/c} = \frac{4 \pi c m_p n_0 R_0^2 v^2}{L_0 \exp(t/t_S)} \label{momentum_ratio} \end{equation} \begin{equation} \epsilon_k = \frac{\dot{E}_k}{L} = \frac{2 \pi m_p n_0 R_0^2 v^3}{L_0 \exp(t/t_S)} \label{energy_ratio} \end{equation} where our assumptions are introduced in the last equalities. In Figs. $\ref{Fig_xi_t}$ and $\ref{Fig_K_t}$, we show the corresponding temporal evolution of the momentum ratio and energy ratio. We see that the momentum ratio falls off at late times, as $\zeta \propto \frac{exp(2t/3t_\mathrm{S})}{exp(t/t_\mathrm{S})} \propto exp(-t/3t_\mathrm{S})$. On the other hand, since the outflow kinetic power $\dot{E}_k(t)$ has the same dependence as the luminosity output $L(t)$ (both scaling as $\propto \exp(t/t_\mathrm{S})$), the energy ratio remains roughly constant in the exponential regime: $\epsilon_k \propto \frac{exp(t/t_\mathrm{S})}{exp(t/t_\mathrm{S})} \sim cst$. \subsection{Dependence on the underlying physical parameters and comparison with observations} In Fig. \ref{Fig_energetics_t_model_obs} we show the effects of varying the different physical parameters on the global outflow energetics. We observe that the momentum ratio is mostly lower than unity ($\zeta \lesssim 1$) on $\sim$kpc-scales, scaling as $\zeta \propto n_0 \kappa_{UV} r^{-1}$ in the exponential regime. Similarly, the energy ratio is mostly smaller than $\epsilon_k \lesssim 10^{-3}$ on galactic scales, scaling as $\epsilon_k \propto n_0 \kappa_{UV}$. We note that both $\zeta(r)$ and $\epsilon_k(r)$ directly scale with the external density and the dust-to-gas ratio: $\propto n_0 f_{dg}$. This suggests that more powerful outflows can be driven in more extreme environments, characterised by high densities and large dust content, such as ULIRG-like sources \citep[cf.][]{Ishibashi_Fabian_2018}. On the observational side, a number of quasar-driven outflows have been detected at very high redshifts. The prototype is the luminous quasar SDSS J1148+5251 at $z = 6.4$, in which a high-velocity outflow extending on large scales (up to $r \sim 30$ kpc) has been traced by the broad wings of the [CII] emission line \citep{Maiolino_et_2012, Cicone_et_2015}. The associated momentum rate and kinetic power are of the order of $\dot{p} \sim L/c$ and $\dot{E}_{k} \sim 10^{-3} L$. Most recently, quasar-driven outflows have been uncovered in a large sample of QSOs at $4.5 < z < 7.1$, through a stacking analysis of the broad but weak [CII] wings \citep{Bischetti_et_2018}. These outflows, with a typical spatial extent of $r \sim 3.5$ kpc, are characterised by momentum rates in the range $\sim(0.1-1) L/c$, and kinetic powers in the range $\sim(0.01-0.1)\%$ of $L$, respectively. For comparison, we plot in Fig. \ref{Fig_energetics_t_model_obs} the observational values of the outflow energetics for SDSS J1148+5251 (black star symbol) and the high-redshift QSO sample (black diamond symbol), as well as the typical range of momentum rates and kinetic powers reported in \citet{Bischetti_et_2018}. \begin{figure*} \begin{multicols}{3} \includegraphics[width=\linewidth]{plot_Mdot_r_model_obs_rev_again.jpg}\par \includegraphics[width=\linewidth]{plot_xi_r_model_obs_rev_again.jpg}\par \includegraphics[width=\linewidth]{plot_K_r_model_obs_rev_again.jpg}\par \end{multicols} \caption{ Outflow energetics as a function of radius: mass outflow rate $\dot{M}$ (left panel), momentum ratio $\zeta$ (middle panel), and energy ratio $\epsilon_k$ (right panel). Variations in the model parameters: $L_0 = 10^{44}$ erg/s, $n_0 = 3 \times 10^3 cm^{-3}$, $f_{dg} = 5 \times f_\mathrm{dg,MW}$ (violet dash-dot-dot); $L_0 = 5 \times 10^{44}$ erg/s, $n_0 = 10^4 cm^{-3}$, $f_{dg} = 10 \times f_\mathrm{dg,MW}$ (blue dash-dot); $L_0 = 10^{45}$ erg/s, $n_0 = 10^5 cm^{-3}$, $f_{dg} = 15 \times f_\mathrm{dg,MW}$ (green dashed). Observational data: SDSS J1148+5251 (black star), the high-redshift QSO sample (black diamond), with typical ranges of momentum rate $(0.1-1) L/c$ and kinetic power $(0.005-0.1)\% L$ from \citet{Bischetti_et_2018} (orange fine dotted). } \label{Fig_energetics_t_model_obs} \end{figure*} \section{Discussion} Recent observations confirm the existence of massive black holes ($M_{BH} \sim 10^9 M_{\odot}$), accreting at rates close to the Eddington limit, in the early Universe \citep{Banados_et_2018, Mazzucchelli_et_2017, Gallerani_et_2017}. The host galaxies of the luminous quasars at $z \sim 6-7$ contain considerable amounts of gas and dust, with dust masses in the range $M_{dust} \sim (10^7 - 10^9) M_{\odot}$ \citep{Venemans_et_2017, Venemans_et_2018}. The observed combination of high luminosity output and large dust content form favourable conditions for AGN radiative feedback, due to radiation pressure on dust. Here we explicitly analyse the evolution of AGN radiation pressure-driven outflows powered by Eddington-limited accretion with exponential luminosity output ($L \propto \exp(t/t_\mathrm{S})$). We find that such AGN radiative feedback can drive outflows on galactic scales, with the shell radius and velocity both following an exponential evolution of the form $\propto \exp(t/3t_\mathrm{S})$ at late times. The resulting outflow energetics are quite modest during the early growth phase, with typical values not exceeding $\zeta < 1$ and $\epsilon_k < 10^{-3}$. Observational measurements of the outflow energetics in the highest-redshift quasars yield typical values in the range: $\sim (0.1-1) L/c$ and $\sim (0.01-0.1)\%$ of $L$ \citep{Bischetti_et_2018}. Interestingly, the momentum rates and kinetic powers measured in the early quasars tend to be significantly lower than the values reported for sources at lower redshifts. In fact, the momentum fluxes and kinetic powers of local quasars typically span the range $\sim (1-30) L/c$ and $\sim (0.1-5)\%$ of $L$ \citep{Fiore_et_2017, Fluetsch_et_2019}. Moreover, the inferred energetics of early quasars are also much lower compared to predictions of wind-driven models, which suggest typical values of $\sim 20 L/c$ and $\sim 0.05 L$ in the wind energy-driven regime \citep{Zubovas_King_2012}. Considering the temporal evolution of the AGN luminosity output in the framework of the wind model, \citet{Zubovas_2018} shows that a power-law luminosity decay can adequately reproduce the observed range of momentum and energy loading factors, and at the same time preserve the correlations between outflow properties and AGN luminosity. Analysis of wind-driven outflows, powered by exponentially growing black holes, suggests that QSO-driven outflows are closer to the energy-driven limit than to the momentum-driven limit \citep{Gilli_et_2017}. It has also been argued that outflows, powered by tidal disruption events around massive black hole seeds, can noticeably affect the evolution of the host dwarf galaxies \citep{Zubovas_2019}. In the case of AGN radiative feedback, we naturally obtain low values of the momentum ratio and energy ratio during the early black hole growth phase, in agreement with observations of quasar-driven outflows at very high redshifts \citep{Bischetti_et_2018}. In fact, the modest outflow energetics observed in the early quasars may be easily accounted for in the framework of AGN radiative feedback. We note that our feedback model, based on radiation pressure on dust, is only effective at redshifts $z < z_{dust}$, once abundant dust production has occurred in the first galaxies. Early enrichment is suggested by the unexpectedly large amounts of dust observed in quasar host galaxies at $z > 6$, with a dust mass of $M_{dust} \gtrsim 10^8 M_{\odot}$ detected in the most distant quasar at $z = 7.5$ \citep{Venemans_et_2017}. It has been argued that the timescale for dust production in asymptotic giant branch (AGB) stars may be too slow compared to the young age of the Universe (e.g. $\sim 690$ Myr in the case of ULAS J1342+0928), and that other sources of dust are required at early times. In this context, dust production in supernova (SN) explosions has been often invoked, due to their shorter evolution timescales (typically a few $\sim$ Myr). Recent observations indicate that substantial quantities of dust can be released in core-collapse supernovae \citep{Owen_Barlow_2015, Wesson_et_2015}. Rapid dust formation by early supernovae ($z \gtrsim 7$) is required in order to account for the early dust enrichment observed near the reionization era \citep{Michalowski_2015, Watson_et_2015, Lesniewska_Michalowski_2019}. On the other hand, the presence of large amounts of dusty gas imply heavy obscuration in the first quasar host galaxies, suggesting that the early growth phase of massive black holes may be hidden from view. Indeed, the bulk of the AGN population is known to be obscured \citep{Fabian_1999}, and there could exist a whole population of highly accreting but heavily obscured quasars in the early Universe that currently elude detection \citep[][and references therein]{Hickox_Alexander_2018}. It is even possible that the outflows currently observed at very high $z$ \citep[e.g.][]{Bischetti_et_2018} only form the tip of the iceberg, and such quasar-driven outflows might be common in the early Universe. In our picture, AGN radiative feedback, which directly acts on the obscuring dusty gas, may help in clearing out the dusty gas from the early quasars, through the development of radiation pressure-driven outflows. However, the outflow energetics observed in the first quasars are significantly lower compared to typical values measured in local quasars. Taken at face value, the modest outflow energetics suggest that early radiative feedback may be less effective in clearing the entire host galaxy. In other words, the gas reservoir may not be completely disrupted, and the accretion process can potentially be resumed, allowing further black hole growth. \section*{Acknowledgements } WI acknowledges support from the University of Zurich. \bibliographystyle{mn2e}
\section{Introduction} The study of point processes is one of the central topics in stochastic processes and has been widely used to model discrete events in continuous time. In particular, the Poisson process, a common point process, has the most applications \cite{Chiang-etal2005, kolaczyk99, nowak_timmermann1998}. Classical examples include the arrivals of park patrons at an amusement park over a period of time, the goals scored in an association football match, and the clicks on a particular web link in a given time period. Recently, Poisson processes have been used to characterize spiking activity in various neural systems \cite{brown1998, brockwell2004}. In order to use a Poisson process in applications, one key step is to estimate its intensity function from a given sequence of observed events. The estimation of the intensity function of a Poisson process has been studied extensively and various estimation methods have been proposed. If the intensity can be assumed to have a known parametric form, then likelihood-based methods can be used to estimate the model parameters. However, in many cases, the shape of the intensity is unknown and estimation requires the implementation of non-parametric methods. Non-parametric estimation methods provide more flexibility than parametric methods and can better characterize the underlying intensity function. A number of approaches have been proposed over the past three decades, including wavelet-based methods \cite{donoho93, kolaczyk99, rb2010} and kernel-based methods \cite{Bartoszynski-etal1981, Chiang-etal2005, diggle1985}. In the case where prior knowledge about the process or shape of the intensity is known, Bayesian methods can be adopted and they often lead to a more accurate estimation \cite{arjas-gasbarra1994, guida-etal1989, timmermann-nowak1997}. Treating a neural spike train as a realization of Poisson process, one can consider the example depicted in Fig. \ref{fig:spikexintro}. In this case, the neural spiking activity, which is associated with certain movement behavior \cite{WuSrivastavaJCNS11}, was recorded (see detail of the data in Sec. \ref{subsec:spike1}). The process was repeated for 30 trials and the resulting spike trains are shown in Fig. \ref{fig:spikexintro}A. Notice that in each repetition of the same movement, there is a gap in the spikes that occurs at slightly different times with variable lengths. This time shift in the gap in spikes is indeed an example of the notion of phase variability or compositional noise, a central topic in functional data analysis. The observed gap in spikes should be reflected in the underlying Poisson intensity estimate. However, using kernel-based estimation methods without accounting for phase variability results in an intensity estimate (shown in red in Fig. \ref{fig:spikexintro}B) that does not capture this gap in spiking activity. The method introduced later in this paper does consider the presence of phase variability and yields an estimate of the underlying intensity of the spike train that clearly depicts the observed gap in the spiking activity (shown in blue in Fig. \ref{fig:spikexintro}B). Therefore, it is important to develop estimation procedures that consider the presence of phase variability in repeated observations of the same process, and that is the goal of this paper. \begin{figure}[ht] \begin{center} \begin{tabular}{cc} \textbf{A} & \textbf{B} \\ \includegraphics[height=1.7in]{figures/rawspikes.eps}& \includegraphics[height=1.7in]{figures/spike_ex2.eps} \end{tabular} \caption{Intensity estimation example. \textbf{A}. 30 spike trains. \textbf{B}. Estimated intensities by considering (solid blue) and not considering (dashed red) compositional noise.} \label{fig:spikexintro} \end{center} \end{figure} One key concept in functional data analysis where phase variability plays the central role is the notion of function registration, or alignment. Indeed, function registration is an important topic in functional data analysis and a significant amount of research progress has been made over the past two decades \cite{ramsay-li-RSSB:98, gervini-gasser-RSSB:04, muller-biometrika:2008, james:10, TuckerCSDA13}. In order to properly register functions, one must consider two types of variability present in data: phase and amplitude variability. Phase variability describes the degree of ``unalignment'' in the data, and amplitude variability is the remaining variability in the vertical axis after alignment. The goal of function registration is to align the functions by removing phase variability. If analysis (such as principal component analysis or regression) is conducted on data which are not well aligned, one may obtain poor or undesired results. While function registration has been extensively studied, the notion of aligning point processes with compositional noise has not been well studied -- all aforementioned intensity estimation methods are based on the assumption there is no phase variability in the observed processes. However, as indicated in the above spike train example, that is not always a reasonable assumption. To understand the phase variability in point process observations, recent studies on intensity estimation in Poisson process have begun to identify and remove compositional noise during the estimation procedure. For example, Bigot and colleagues examined the estimation of the underlying intensity function for a set of linearly shifted Poisson processes \cite{bigot13}. They assumed that the intensity function is periodic and each realization of the process is warped according to a linear shift in time that follows a known distribution. Under the stated assumptions, the authors derived a wavelet-based estimator. They argued that the assumption of a linear shift in the observed processes is a reasonable assumption, particularly in an example of DNA Chip-Seq data. However, there are many other cases where it is not reasonable to assume that the phase variability is a simple linear shift such as examples in the literature of functional registration \cite{ramsay-li-RSSB:98, TuckerCSDA13}. As a result, restricting the warping function to be strictly linear shifts may limit the general applicability of their method. In another recent study, Panaretos and Zemel proposed to separate amplitude and phase variation in order to align point processes \cite{panaretos16}. Basically, they extended the notion of the separation of phase and amplitude variation in functions to that of point processes. While the work of Panaretos and Zemel applies generally to point processes, the goal of their work is fundamentally different from the goal of the work in this project. Their goal is estimation of the probability measure and they comment that their work is not to be used for density estimation (see Section 3.4 of \cite{panaretos16}). The goal of the work in this project is intensity estimation, which will be shown reduces to density estimation. In this paper we propose a new framework for intensity estimation of a Poisson process with compositional noise. We show that the noise is only encoded in the normalized intensity, or density, function. The estimation is based on our proposed metric which measures the phase difference between two density functions so the notion of the Karcher mean can be applied in the given framework. Since the only parameter in the method is the bandwidth for the kernel density estimate, the proposed method is a mostly non-parametric method that yields a consistent estimator of the underlying intensity function. The rest of this paper is organized as follows. In Section \ref{sec:method}, we present the new framework for positive intensity estimation and discuss its mathematical and computational properties. Consistency theory on the estimation algorithm is given in Section \ref{sec:theory}. In Section \ref{sec:nonnegdf}, we extend the estimation to nonnegative intensity functions. The estimations on positive and nonnegative intensity are illustrated with two simulations, respectively, in Section \ref{sec:results}. We then show the application of intensity estimation in a real dataset of neural spike trains. Section \ref{sec:diss} summarizes the work. Finally, all mathematical details are given in the Appendix. \section{Method}\label{sec:method} In this section, we present the new framework for positive intensity estimation of a Poisson process with non-linear time warping. Compositional noise is represented with time warping functions and, since the intensity of a Poisson process is a function, the representation of time warping is studied in the function space. The notation and representation in the function space that is given here is consistent to that in \cite{kurtek-wu-srivastava-NIPS:2011, srivastava-etal-FisherRao:11}. First, we will review the basics of Poisson processes \cite{ross10} and the representation of time warping in function space \cite{kurtek-wu-srivastava-NIPS:2011}. \subsection{Review of Poisson Process and Time Warping Representation}\label{sec:pp} A Poisson process on the time domain $[0, 1]$ is a special type of counting process $N(t), t \in [0,1]$. For simplification of notation, we only examine the domain $[0,1]$ in this paper, and the framework can be easily adapted to any finite time interval. In the classical theory of point processes, a Poisson process is defined based on an intensity function $\lambda(t) \ge 0$ and satisfies the following two conditions \cite{ross10}: \begin{enumerate} \item Disjoint intervals have counts that are independent. In other words, the number of events occurring in the interval $(a, b)$ is independent of the number of events occurring in the interval $(c, d)$ if these two intervals are not overlapping. \item The number of events in an interval $(a, b) \subset [0,1]$ follows a Poisson distribution with mean $\int_a^b \lambda(t)dt$. In other words, $$P(N(b) - N(a)=n) = \exp\left(-\int_a^b \lambda(t)dt\right)\dfrac{\left(\int_a^b \lambda(t)dt\right)^n}{n!}.$$ \end{enumerate} We denote a Poisson process with intensity $\lambda(t)$ as $PP(\lambda(t))$. For distinction, a Poisson distribution with mean $\mu$ is denoted as $Poisson(\mu)$, and a Poisson probability mass function with mean $\mu$ at $k$ is denoted as $Poisson(k; \mu) = e ^{-\mu} \mu^k / k!$. We represent compositional noise with time warping functions. Since the intensity of a Poisson process is a function, we study the representation of time warping in the function space. Let $\Gamma$ be the set of all warping functions, where time warping is defined as an orientation-preserving diffeomorphism of the domain $[0, 1]$. That is, $$\Gamma = \{\gamma: [0,1] \to [0,1] | \gamma(0) = 0,\ \gamma(1)=1,\ 0 < \dot \gamma < \infty\}.$$ Elements of $\Gamma$ form a {\em group} with function composition as the group action, and the identity in this group is the self-mapping $\gamma_{id}(t) = t$. For any function $h$, we will use $\Vert h \Vert$ to denote its $\ensuremath{\mathbb{L}^2}$ norm $(\int_0^1 h(t)^2 dt)^{1/2}$. There are three different types of {\em (right) group actions} about time warping that can occur in the function space: \begin{enumerate} \item Amplitude-preserved: $f \rightarrow f \circ \gamma$, \item Area ($\mathbb L^1$ norm)-preserved: $f\rightarrow \left(f \circ \gamma\right)\dot{\gamma}:=\left(f; \gamma\right)$, \item Energy ($\mathbb L^2$ norm)-preserved: $f\rightarrow \left(f \circ \gamma\right)\sqrt{\dot{\gamma}}:=\left(f, \gamma\right)$, \end{enumerate} where $\circ$ denotes the conventional function composition. The properties on associativity and isometry of these three group actions are summarized in Table \ref{tab:props}. In particular, the amplitude-preserved group action is the conventional registration for functions with phase variability and has been extensively studied over the past two decades \cite{ramsay1998, kneipetal2000, kneip-ramsay:2008}. The enery-preserved group action plays an essential role in the Fisher-Rao registration framework \cite{srivastava-etal-FisherRao:11}, where this action is applied in the Square-Root Velocity Function (SRVF) space (note: it is critical that in the Fisher-Rao framework there is a one-to-one correspondence between the energy-preserved SRVF space and the amplitude-preserved observational function space). In the following sections of this manuscript, we will show that the compositional noise in the Poisson process intensity function is properly characterized by the area-preserved group action. \begin{table}[ht] \begin{center} \caption{Properties of the three group actions}\label{tab:props} \begin{tabular}{|c|c|c|c|} \hline Group Action & Associativity & Isometry \\ \hline Amplitude-preserved & $ (f \circ \gamma_1) \circ \gamma_2 = f \circ (\gamma_1 \circ \gamma_2) $ & $\| f_1 \circ \gamma - f_2 \circ \gamma \|_{\mathbb{L}^\infty} = \|f_1 - f_2\|_{\mathbb{L}^\infty} $ \\ \hline Area-preserved & $ ((f; \gamma_1); \gamma_2) = (f; (\gamma_1 \circ \gamma_2)) $ & $\| (f_1; \gamma) - (f_2; \gamma)\|_{\mathbb{L}^1} = \|f_1 - f_2\|_{\mathbb{L}^1} $\\ \hline Energy-preserved & $ ((f, \gamma_1), \gamma_2) = (f, (\gamma_1 \circ \gamma_2) )$ & $\| (f_1, \gamma) - (f_2, \gamma)\|_{\mathbb{L}^2} = \|f_1 - f_2\|_{\mathbb{L}^2} $ \\ \hline \end{tabular} \end{center} \end{table} \subsection{Poisson Process with Compositional Noise} Before formally stating the main problem, we review the classical estimation problem in Poisson processes: Given a set of independent realizations from a Poisson process on $[0, 1]$, how can we estimate the underlying intensity function? By notation, the set of realizations are given in the following form, $$ R^i = (r_1^i, \cdots, r_{k_i}^i) \sim PP(\lambda(t)),$$ where $k_i \sim Poisson\left(\int_0^1\lambda(t)dt\right), \, i=1,2,\dots,n$. Various computational approaches have been developed to address this problem, which include penalized projection estimators \cite{rb2003}, wavelet methods \cite{willett2007, donoho93}, and estimators based upon thresholding rules \cite{rb2010}. In this paper, we assume the observed data are not $\{R^i\}$, but a warped version in the form $$S_i = (s_1^i, \cdots, s_{k_i}^i) = \gamma_i^{-1}(R^i) = (\gamma_i^{-1}(r_1^i), \cdots, \gamma_i^{-1}(r_{k_i}^i)),$$ where $\gamma_i$ is a random time warping in $\Gamma$, $i = 1, \cdots, n$. That is, \begin{equation} S_i = \gamma_i^{-1}(R^i), \ \mbox{with } \ R^i \sim PP(\lambda(t)), \gamma_i \in \Gamma. \label{eq:warping} \end{equation} {\em Given observations $\{S_i\}$, our goal is still to estimate the underlying intensity $\lambda(t)$}. To make the model identifiable, we add the constraint that the mean of $\{\gamma_i\}$ needs to be a scaled version of $\gamma_{id}$ (The detail on assumptions is clearly provided in Sec. \ref{sec:theory}). Note that since the time warping can be in any nonlinear form, this estimation problem is a significant challenge. A recent study only examines the case when the warping is a simple linear shift along the time axis \cite{bigot13}. As the warping function $\gamma_i$ is random, the warped process $\gamma_i^{-1}(R_i)$ is no longer a Poisson process, but a Cox process. Here we study, ``Conditional on $\gamma_i$, is $\gamma_i^{-1}(R^i)$ still a Poisson process? If this is true, what is the intensity function of that Poisson process?'' Our answer is yes to the first question and the intensity function of the new Poisson process is given as follows. \begin{lemma} \label{lem:int_warp} Suppose $R$ is a Poisson process with intensity $\lambda(t)$ on $[0,1]$ and $\gamma\in\Gamma$ is a given time warping function. Then $\gamma^{-1}(R)$ is also a Poisson process with intensity $\lambda\left(\gamma(t)\right)\dot{\gamma}(t).$ \end{lemma} \begin{proof} If $R$ is a Poisson process, then the number of events of $R$ in the time interval $(a,b)$ is independent of the number of events of $R$ in the time interval $(c,d$) if $(a,b)\cap (c,d)=\emptyset$. Since $\gamma(t)$ is strictly increasing, \\ $$(a,b)\cap (c,d)=\emptyset\Leftrightarrow (\gamma(a),\gamma(b))\cap (\gamma(c),\gamma(d))=\emptyset. $$ Hence, the number of events in $(\gamma(a),\gamma(b))$ is also independent of the number of events in $(\gamma(c),\gamma(d))$. \\ For any $k \in \{0, 1, , \cdots\}$ and sub-interval $[t, t+\Delta t] \subset [0, 1]$, \begin{eqnarray*} & & P(k \mbox{ events of } \gamma^{-1}(R) \mbox{ are in } [t,t+\Delta t]) \\ &=& P(k \mbox{ events of } R \mbox{ are in } [\gamma(t),\gamma(t+\Delta t)]) \\ &=& Poisson \left(k;\displaystyle\overset{\gamma(t+\Delta t)}{\underset{\gamma(t)}{\int}} \lambda(v)dv\right) \\ &=& Poisson \left(k;\displaystyle\overset{t+\Delta t}{\underset{t}{\int}} \lambda(\gamma(u)) \dot \gamma(u)du\right).\\ \end{eqnarray*} The last equality holds simply by the change of variable $v = \gamma(u)$. Therefore, $$\gamma^{-1}(R) \sim PP\left(\lambda(\gamma(u))\dot{\gamma}(u)\right).$$ \end{proof} A direct result from Lemma \ref{lem:int_warp} is that given $\gamma_i$, $S_i$ is also a Poisson process and $$ S_i | \gamma_i = \gamma_i^{-1}(R^i) | \gamma_i \sim PP(\lambda(\gamma_i(t)) \dot \gamma_i(t)). $$ Based on the theory of Poisson processes, the intensity function $\lambda(t)$ can be decomposed into the product of the total intensity $\Lambda$ and the density function $f(t)$, where $$ \Lambda=\int_0^1 \lambda(t)dt \ \ \mbox{and} \ \ f(t) = \lambda(t)/\Lambda.$$ Therefore, the intensity estimation problem can be reduced to density estimation and scalar total intensity estimation. Note that for $i = 1, \cdots, n$, $$ \int_0^1 \lambda_i(t)dt = \int_0^1 \lambda(\gamma_i(t))\dot \gamma(t) dt = \int_0^1 \lambda(s)ds = \Lambda.$$ That is, $\Lambda$ is constant with respect to time warping. Hence, the density of the events in $S_i$, given $\gamma_i$, can be written as $f_i(t) = \lambda_i(t) / \Lambda=\lambda(\gamma_i(t))\dot{\gamma}_i(t)/\Lambda$. This expression indicates that the time warping is encoded in the density function, and independent of total intensity. By the theory of Poisson processes, the number of events in each process follows a Poisson distribution with mean $\Lambda$. For a set of given observations $\{S_i\}$, $\Lambda$ can be easily estimated using a conventional maximum likelihood estimate. Therefore, the intensity estimation problem reduces to estimating the underlying density $f$. Given $\{S_i\}$, we propose a modified kernel method to estimate density functions $\{f_i\}$, and then use these densities to estimate $f$. This whole procedure is described in detail in Section \ref{sec:estimation}. \subsection{Phase Distance Between Positive Probability Density Functions} \label{sec:distances} In this paper, we focus on a metric-based method to estimate the underlying density $f$. Metric distances between density functions is a classical topic and a number of measures have been proposed, for example, the Bhattacharyya Distance \cite{bhattacharyya-43}, the Hellinger Distance \cite{hellinger1909}, the Wasserstein Distance \cite{wasserstein69} and the elastic distance beween densities based upon the Fisher-Rao metric \cite{srivastava-etal-Fisher-Rao-CVPR:2007}. Suppose $f_1$ and $f_2$ are two density functions on [0,1] with cumulative distribution functions $F_1$ and $F_2$, respectively. Then, these metrics are defined as: \begin{itemize} \item Wasserstein Distance: $d_{W}(f_1,f_2)=\Vert F_1^{-1}-F_2^{-1}\Vert$ \item Bhattacharyya Distance: $d_{B}(f_1,f_2)=-\log\left(\int \sqrt{f_1(t)f_2(t)}dt\right)$ \item Hellinger Distance: $d_{H}(f_1,f_2)=\frac{1}{\sqrt{2}}\Vert \sqrt{f_1}-\sqrt{f_2}\Vert$ \item Fisher-Rao Distance: $d_{FR}(f_1,f_2)=\cos^{-1}\left(\int_0^1 \sqrt{f_1(t)}\sqrt{f_2(t)}dt\right)$ \end{itemize} Note that the Fisher-Rao metric between two density functions is similar to the Hellinger Distance (arc length vs. chord length) \cite{srivastava-etal-Fisher-Rao-CVPR:2007}. Based on the generative model in Eqn. \ref{eq:warping}, the difference between the true underlying density function and the noise-contaminated density is the time warping along the time axis. Such a difference is characterized as the {\it phase difference} and we expect that a metric measuring phase difference will be purely based on the warping function between two densities. That is, the distance between $f_1$ and $f_2$ will only depend on $\gamma$ if $f_1=(f_2; \gamma)$. However, none of the above metrics purely measure this phase difference between two density functions. We aim to find a metric that can properly characterize such phase difference. In this paper, we will define a new distance between positive densities which properly measures their phase difference. The set of all positive density functions on $[0, 1]$ is denoted as $\mathbb P$. We note that for any densities $f_1, f_2 \in \mathbb P$, their cumulative distribution functions $F_1, F_2$ are warping functions in $\Gamma$. By the group structure of $\Gamma$, it is straightforward to find that the optimal warping function between $f_1$ and $f_2$ (i.e. $\gamma^* \in \Gamma$ such that $f_1=(f_2\circ\gamma^*)\dot{\gamma}^*$ or $F_1=F_2\circ \gamma^*$), is unique and has a closed-form solution given by \begin{equation} \gamma^*=F_2^{-1}\circ F_1. \label{eq:optwarp} \end{equation} Based on this result, it is natural to define a distance that measures the phase difference by measuring how far the warping function is from the identity warping function, $\gamma_{id}$. In other words, the smaller the distance between the warping function and $\gamma_{id}$, the less warping that is required between the two densities. One definition of the distance metric is given as follows. \begin{definition} For any two functions $f_{1}, f_{2} \in \mathbb P$, we define an intrinsic distance, $d_{int}$, between them as: \begin{equation} d_{int}(f_1,f_2)=\arccos \inner{1}{\sqrt{\dot{\gamma}}}\label{eq:disint} \end{equation} where $\gamma$ is the optimal time warping between $f_1$ and $f_2$ (i.e. $f_1=(f_2\circ\gamma)\dot{\gamma}$). \end{definition}\label{def:distint} This definition of phase distance has been used in the Fisher-Rao framework \cite{TuckerCSDA13}. This distance is intrinsic which measures the arc-length between ${\sqrt{\dot{\gamma}}}$ and 1 in the unit sphere $S^\infty$ (SRVF space of $\Gamma$). Note that the definition of phase distance in $\mathbb P$ is not unique. We can also define an {\em extrinsic} distance as follows: \begin{definition} For any two functions $f_{1}, f_{2} \in \mathbb P$, we define an extrinsic distance, $d_{ext}$, between them as: \begin{equation} d_{ext}(f_1,f_2)=\Vert 1-\sqrt{\dot{\gamma}}\Vert \label{eq:dis} \end{equation} where $\gamma$ is the optimal time warping between $f_1$ and $f_2$ (i.e. $f_1=(f_2\circ\gamma)\dot{\gamma}$). \end{definition}\label{def:dist} Notice that $d_{ext}(f_1, f_2) $ can also be written as $\Vert 1-\sqrt{F_2^{-1}\dot{\circ} F_1} \Vert=\Vert \sqrt{\dot{F}_1^{-1}}-\sqrt{\dot{F}_2^{-1}}\Vert$. To simplify the notation, we use $\gamma_f$ denote the cumulative distribution function of $f \in \mathbb P$. Then $$ d_{ext}(f_1, f_2) = \Vert \sqrt{\dot{\gamma}_{f_1}^{-1}}-\sqrt{\dot{\gamma}_{f_2}^{-1}} \Vert = \Vert (1, {\gamma}_{f_1}^{-1}) - (1, {\gamma}_{f_2}^{-1}) \Vert $$ where the operator $(f,\gamma)=\left(f \circ \gamma\right)\sqrt{\dot{\gamma}}$ for $f \in \mathbb P$ and $\gamma \in \Gamma$. Also notice that because the optimal warping function $\gamma = F_2^{-1} \circ F_1$, the distance $d_\gamma(f_1, f_2) $ can also be written as $\Vert 1-\sqrt{F_2^{-1}\dot{\circ} F_1} \Vert=\Vert \sqrt{\dot{F}_1^{-1}}-\sqrt{\dot{F}_2^{-1}}\Vert$. The commonly-used Wasserstein distance $d_W$ is \begin{align*} d_W(f_1,f_2) &=\left\Vert F_1^{-1} - {F}_2^{-1} \right\Vert \le 2 \left\Vert \sqrt{\dot{F}_1^{-1}}-\sqrt{\dot{F}_2^{-1}}\right\Vert = 2 d_\gamma(f_1,f_2) \end{align*} This shows that the consistency results that hold for $d_\gamma$ will also hold for $d_W$, but the reverse is not true in general. Similar to the Wasserstein and Hellinger distances, this $d_\gamma$ metric is also a proper distance. The detailed proof in given in Appendix A. While $d_\gamma$ is not isometric like Bhattcharya and Hellinger, it is the only metric (within these four) that characterizes the phase difference between $f_1$ and $f_2$. Either $d_{int}$ or $d_{ext}$ can be used to estimate the underlying density $f$. In this paper, we choose to focus on the extrinsic distance $d_{ext}$ for two reasons: 1. Computational algorithms based upon the extrinsic distance are usually more efficient than those based on the intrinsic distance. 2. The extrinsic distance provides a closed-form Karcher mean representation (see definition next), which plays an essential role in developing the asymptotic theory for our estimator in Sec. \ref{sec:theory}. \subsection{Karcher Mean}\label{sec:km} The notion of a Karcher mean was used on the set of warping functions where an extrinsic distance between warping functions is adopted \cite{WuSrivastavaJCNS11}. That is, assuming $\gamma_1, \cdots, \gamma_n \in \Gamma$ is a set of warping functions, their Karcher mean $\bar \gamma$ can be defined as $$\bar \gamma = \mathop{\rm argmin}_{\gamma \in \Gamma} \sum_{i=1}^{n} ||\sqrt{\dot \gamma} - \sqrt{\dot \gamma_i}||^2.$$ It was shown in \cite{WuSrivastavaJCNS11} that this Karcher mean has a closed-form solution: $$\sqrt{\dot {\bar \gamma}}=\dfrac{ \sum_{i=1}^n\sqrt{\dot{\gamma}_i}}{\Vert \sum_{i=1}^n\sqrt{\dot{\gamma}_i}\Vert},$$ where $\sqrt{\dot {\bar \gamma}}$ is the SRVF of $\bar \gamma$. \\ Similar to the Karcher mean of a set of warping functions in $\Gamma$, we can define the Karcher mean of a set of density functions in $\mathbb P$. This definition is based on the newly-defined phase distance $d_{ext}$ in Eqn. \ref{eq:dis}. \begin{definition} We define the Karcher mean $\mu_n$ of a set of functions $f_1, \cdots, f_n \in \mathbb P$ as the minimum of the sum of squares of distances in the following form: \begin{equation} \mu_n = \mathop{\rm argmin}_{\mu \in \mathbb P} \sum_{i=1}^{n} d_{ext}(\mu, f_{i})^{2}. \label{eq:karcher} \end{equation} \end{definition} Based on the closed-form solution for the Karcher mean of a set of warping functions, we can efficiently compute the Karcher mean in Eqn. \ref{eq:karcher} using the following algorithm. \subsubsection*{Algorithm 1: Karcher Mean Computation} \label{sec:kmalg} Given a set of density functions $f_1, \dots,f_n \in \mathbb P$, and their cumulative distribution functions $F_1, \dots,F_n$, respectively. \begin{enumerate} \item Initialize $f_0=f_j$ for any $j=1,2,\dots,n$. \item Find $\gamma_j^*=F_0^{-1}\circ F_j,\,j=1,2,\dots,n.$ \label{item:gam} \item Compute the Karcher mean $\bar \gamma$ of $\lbrace{\gamma_i^*}^{-1}\rbrace_{j=1}^n$, with formula $$\sqrt{\dot {\bar \gamma}}=\dfrac{ \sum_{j=1}^n\sqrt{\dot{\gamma_j^*}^{-1}}}{\Vert \sum_{j=1}^n\sqrt{\dot{\gamma_j^*}^{-1}}\Vert}.$$ \item $\hat f =(f_0\circ\bar{\gamma}^{-1})\dot{\bar{\gamma}}^{-1}$ is the Karcher mean of $f_1, \dots,f_n$. \end{enumerate} The algorithm for computing the Karcher mean of functions in $\mathbb P$ is illustrated with a simple example in Fig. \ref{fig: betaex}. The 10 gold lines in the figure denote the density functions of Beta distribution on the domain $[0,1]$ in the form $f(x; \alpha, \beta) \propto x^{\alpha-1} (1-x)^{\beta-1}$. Here the parameters $\alpha$ takes value 1, 1, 1.5, 2, 2, 2.5, 3, 3, 4, 5, and $\beta$ takes value 4, 3, 3, 2.5, 2, 2, 1.5, 1, 1, 2 for the 10 functions, respectively. The Karcher mean of these functions was computed using Algorithm 1 and the result is shown as the thick red line in Fig. \ref{fig: betaex}. \begin{figure}[ht] \begin{center} \includegraphics[width=3.0in]{figures/km_examplenew.eps} \caption{Karcher mean of 10 Beta density functions}\label{fig: betaex} \end{center} \end{figure} \subsection{Intensity Estimation Method} \label{sec:estimation} Since the Karcher mean of a set of density functions (computed under $d_\gamma$) is itself a density function, we use the Karcher mean as an estimate of the underlying density of the process. In our proposed estimation method, the Karcher mean, as computed using Algorithm 1, is used in conjunction with the MLE of the total intensity of the process to produce an estimate of the intensity function. Note that the computation for Karcher mean using Algorithm 1 is based on the assumption that each warped density $f_i(t)$ is already known, but practical data are only Poisson process realizations. In this section, we propose a kernel estimation procedure to estimate $f_i(t)$. \subsubsection{Modified Kernel Density Estimation}\label{sec:mkde} Kernel density estimation has been well studied in statistics literature and it is well known that the standard kernel density estimator has good asymptotic properties when the domain is the real line. However, when the domain is a compact set such as [0, 1] in this paper, the standard kernel density estimator cannot be directly used. We adopt here a reflection-based method to address this issue \cite{clinehart91, schuster85, silverman86}. Suppose $x_1,\dots , x_m$ are observations in $[0,1]$ whose density is given by $f \in \mathbb P$. The standard kernel density estimator is given by $\tilde{f}(t)=\frac{1}{mh}\sumton{j=1}{m}K\left(\frac{t-x_j}{h}\right)$, where $K(\cdot)$ is a kernel function and $h$ denotes the kernel width. Note that this estimated density is defined on the real line $(-\infty, \infty)$, and the section within $[0, 1]$ in general is not a density function itself. To simplify the estimation procedure, we can choose kernel functions with compact support within $[-1, 1]$. That is, $K(t) = 0$ for $|t| > 1$. Here we propose a two-step modification of the estimate $\tilde f(t)$. At first, we wrap around $\tilde f$ within the domain $[0, 1]$, and denote the new function as $\tilde {\tilde f}$, a density function on $[0, 1]$. Secondly, we add a small positive constant to $\tilde {\tilde f}$, and then normalize the sum to be a density function. This step is to assure that the normalized function is positive on $[0, 1]$, a necessary condition for the existence of the warping functions used in the distance $d_{ext}$. The modified kernel density estimation can be summarized in the following algorithm. \subsubsection*{Algorithm 2: Modified Kernel Estimation} \label{sec:fialg} Suppose $x_1,\dots , x_m$ are observations in $[0,1]$ whose density is given by $f$. \begin{enumerate} \item Calculate the standard kernel-based estimate, $\tilde{f}(t)=\dfrac{1}{mh}\sumton{j=1}{m}K\left(\dfrac{t-x_j}{h}\right)$, $t\in \ensuremath{\mathbb{R}}$, using an appropriate bandwidth, $h$, and a kernel function $K$ with compact support (e.g. a Beta density function). \item Update the estimate by $\tilde{\tilde{f}}(t)=\tilde{f}(t)+\tilde{f}(-t)+\tilde{f}(2-t)$. The updated estimate is defined only for $t\in [0,1]$. \item $\hat{f}(t)= \tilde{\tilde{f}}(t)\dfrac{m}{m+1}+\dfrac{1}{m+1}, t \in [0, 1]$ is the modified estimate. \end{enumerate} \subsubsection{Estimation Algorithm} Estimation of the intensity of the process occurs in two independent components. First, the total intensity $\Lambda$ can be easily computed with a standard MLE procedure. Second, the Karcher mean of the estimated densities is used to estimate $f(t)$. This estimation algorithm is given as follows. \subsubsection*{Algorithm 3: Intensity Estimation Algorithm } Given a set of observed processes $S_i$ with number of events being $k_i, i=1,\dots,n$, \begin{enumerate} \item Estimate $\Lambda$ by its MLE: $\hat{\Lambda}=\frac{1}{n}\sumton{i=1}{n}{k_i}$. \item Use Algorithm 2 to estimate the density of each observed process, $\hat f_i(t), i = 1, \cdots, n$. \item Estimate the intensity function of each process by the formula $\hat \lambda_i(t) = \hat \Lambda \hat f_i(t), i = 1, \cdots, n$. \item Use Algorithm 1 to estimate the overall underlying density, $\hat f(t)$, as the Karcher mean of $\{\hat{f_i}\}$. \item Estimate the underlying intensity $\lambda(t)$ in the original process using: \begin{center} $\hat{\lambda}(t)=\hat{\Lambda} \hat{f}(t)$. \end{center} \end{enumerate} \section{Asymptotic Theory on Consistency} \label{sec:theory} Asymptotical properties of estimators are often of interest since these properties can give reasonable certainty that the ground-truth parameters are appropriately estimated by the given algorithms. In this section, we provide asymptotic theory on the density estimator $\hat f$ in Algorithm 3. Our estimation is based on the model $$\lambda_i = (\lambda \circ \gamma_i) \dot \gamma_i, \ \ i = 1, \cdots, n,$$ where $\lambda$ is the underlying intensity function and $\gamma_i \in\Gamma,\, i=1,\dots,n,$ are a set of warping functions. By Lemma \ref{lem:int_warp}, each observation $S_i$ is a Poisson process realization with intensity $\lambda_i$. Given $\{S_i\}$, Algorithm 3 provides an estimation procedure for $\lambda$. As the total intensity $\Lambda$ is independent of time warpings, our asymptotical theory will focus on the normalized intensity, i.e. intensity function $f = \lambda/\Lambda$. We mathematically prove that the proposed algorithm provides a consistent estimator for $f$. The asymptotic theory is based on sample size $n$ as well as the total intensity $\Lambda$. Here we only provide result on the main theorem. All lemmas that lead to the theorem can be found in Appendix B. Before we state the main theorem, we list all assumptions as follows: \begin{enumerate} \item The observations are a sequence of Possion process realizations $\{S_i\}$, and $S_i$ follows intensity function $\lambda_i = (\lambda \circ \gamma_i) \dot \gamma_i$. $\Lambda = \int_0^1 \lambda(t)dt$ is the total intensity. $f = \lambda/\Lambda$ and $f_i = \lambda_i/\Lambda = (f; \gamma_i)$. \item The density function $f$ is continuous on [0,1]. Also, there exist $m_f, M_f > 0$ such that $f(t) \in [m_f, M_f]$, for any $t \in [0,1]$. \item $\gamma_i(t), t \in [0, 1], i = 1, \cdots, n$ are a set of independent warping functions. The SRVFs of their inverses $\sqrt {\dot \gamma_i^{-1}(t)}$ distribute around $\sqrt {\dot \gamma_{id}} = 1$ on the Hilbert unit sphere $H^\infty$. In particular, $E(\sqrt {\dot \gamma_i(t)}) \equiv \beta > 0$ and there exist $m_\gamma, M_\gamma > 0$ such that $\sqrt {\dot \gamma_i^{-1}(t)} \in [m_\gamma, M_\gamma]$, for any $t \in [0, 1]$. It is important to note that $\sqrt{\dot{\gamma}_i^{-1}(t)}$ is a point on the Hilbert unit sphere. As a result, it is easy to show that assuming $\mathbb{E}\left(\sqrt{\dot{\gamma}_i^{-1}(t)}\right)=\beta>0$ is equivalent to assuming that the extrinsic mean of $\{\sqrt{\dot{\gamma}_i^{-1}(t)}\}$ is 1. \item The total intensity $\Lambda$ can vary in the form of a sequence $\{\Lambda_m\}_{m = 1}^\infty$. We assume the sequence goes to $\infty$ with $\Lambda_m \ge \alpha \log(m), \alpha > 1$ for sufficiently large $m$. \item The bandwidth of the kernel density estimator in Algorithm 2 is chosen optimally. That is, for a sequence of $r$ events, the bandwidth $h_r$ satisfies $h_r \rightarrow 0$ and $r h_r \rightarrow \infty$ when $r \rightarrow \infty$. \end{enumerate} \begin{theorem} Given the four conditions listed above, let $\hat f$ be the density function estimated with Algorithm 3. Then we have $$ \lim_{n \rightarrow \infty} \lim_{m \rightarrow \infty} d_{ext}(\hat f, f) = 0 \ \ \ a.s. $$ \end{theorem} \begin{proof} By the basic property of a Poisson process, the event times in the observation $S_i$ are an i.i.d. sequence with density function $f_i = (f; \gamma_i), i = 1, \cdots, n$. Denote $\hat f_i$ as the estimated density function by the modified kernel estimation method. Then $\hat f_i(t) > 0$ for any $t \in [0, 1]$. Based on the group structure of $\Gamma$, there exists a unique $\hat \gamma_i \in \Gamma$ such that $\hat f_i = (f; \hat \gamma_i)$. Here we compute the Karcher mean of $\{\hat f_i\}$. For any density function $g$, we have \begin{eqnarray*} \sum_{i=1}^{n}{d_{ext}^2(\hat f_i,g)} & = & \sum_{i=1}^{n}{d_{ext}^2((f;\hat \gamma_i),g)} = \sumton{i=1}{n}{\left\Vert \left(1, \gamma_{(f; \hat \gamma_i)}^{-1} \right) - \left(1, \gamma_{g}^{-1}\right) \right\Vert^2} \\ & = & \sumton{i=1}{n}{\left\Vert \left(1, \hat \gamma_i^{-1} \circ \gamma_{f}^{-1} \right) - \left(1, \gamma_{g}^{-1}\right) \right\Vert^2} \\ &=& \sumton{i=1}{n}{\left\Vert \left(1, \hat \gamma_i^{-1} \right) - \left(1, \gamma_{g}^{-1} \circ \gamma_{f} \right) \right\Vert^2} \end{eqnarray*} Denote the Karcher mean of $\{\hat \gamma_i^{-1}\}$ as $\hat {\bar{\gamma}}$. Then the above sum of squares is minimized when $\gamma_{g}^{-1} \circ \gamma_{f} = \hat {\bar \gamma}$. That is, $\gamma_{\hat f}^{-1} = \hat {\bar \gamma} \circ \gamma_f^{-1}.$ By isometry on time warping functions and the triangular inequality, \begin{eqnarray*} d_{ext}(\hat f, f) & = & {\left\Vert \left(1, \gamma_{\hat f}^{-1} \right) - \left(1, \gamma_{f}^{-1}\right) \right\Vert} = {\left\Vert \left(1, \hat {\bar \gamma} \circ \gamma_f^{-1} \right) - \left(1, \gamma_{f}^{-1}\right) \right\Vert} \\ & = & {\left\Vert \left(1, \hat {\bar \gamma} \right) -1 \right\Vert} \le {\left\Vert \left(1, \hat {\bar \gamma} \right) - \left(1, \bar \gamma \right)\right \Vert} + {\left\Vert \left(1, \bar \gamma \right) -1 \right \Vert} \end{eqnarray*} By Lemma \ref{lem:karcher}, we have shown that ${\left\Vert \left(1, \bar \gamma \right) -1 \right\Vert} \xrightarrow{a.s.} 0$ when $n \rightarrow \infty$. Note that ${\Vert \left(1, \hat {\bar \gamma} \right) - \left(1, \bar \gamma \right) \Vert}$ depends on the total intensity $\Lambda_m$ and sample size $n$. We will show that this term also converges to 0 when $m$ is large (for any fixed $n$). To simplify the notation, we denote $a_i = \sqrt{\dot \gamma_i^{-1}}$, $\hat a_i = \sqrt{\dot {\hat\gamma}_i^{-1}}, i = 1, \cdots, n.$ Let the number of events in $S_i$ be $n_i$. Then $n_i$ is a random variable following Poisson distribution with mean $\Lambda_m$. By Lemma \ref{lem:poisson}, $n_i \xrightarrow{a.s.} \infty$ when $m \rightarrow \infty$. Using Lemma \ref{lem:inverse}, \begin{eqnarray*} \left\Vert\hat a_i - a_i\right \Vert &=& \left\Vert (1, \hat \gamma_i^{-1}) - (1, \gamma_i^{-1})\right \Vert = \left\Vert (1, \hat \gamma_i^{-1} \circ \gamma_f^{-1}) - (1, \gamma_i^{-1} \circ \gamma_f^{-1}) \right \Vert \\% \mbox{ (by isometry)}\\ &=& \left\Vert (1, \gamma_{(f; \hat \gamma_i)}^{-1} ) - (1, \gamma_{(f; \gamma_i)}^{-1} ) \right \Vert = \left\Vert (1, \gamma_{\hat f_i}^{-1} ) - (1, \gamma_{f_i}^{-1} ) \right \Vert \xrightarrow{a.s.} 0 \end{eqnarray*} when $n_i \rightarrow \infty$. Therefore, $||\hat a_i - a_i|| \xrightarrow{a.s.} 0, \ i = 1, \cdots, n,$ when $m \rightarrow \infty$. Let $\bar {\hat a} = \frac{1}{n}\sum_{i=1}^n \hat a_i$ and $\bar a = \frac{1}{n}\sum_{i=1}^n a_i$. Then, $||\bar {\hat a} - \bar a|| \xrightarrow{a.s} 0$ when $m \rightarrow \infty$. Hence, \begin{eqnarray*} {\left\Vert \left(1, \hat {\bar \gamma} \right) - \left(1, \bar \gamma \right) \right \Vert} &=& \left\Vert \frac{\bar {\hat a}}{\left\Vert\bar {\hat a}\right \Vert} - \frac{\bar { a}}{\left\Vert\bar {a}\right \Vert} \right \Vert \le \left\Vert \frac{\bar {\hat a}}{\left\Vert\bar {\hat a}\right \Vert} - \frac{\bar {\hat a}}{\left\Vert\bar { a}\right \Vert} \right \Vert + \left\Vert \frac{\bar {\hat a}}{\left\Vert\bar { a}\right \Vert} - \frac{\bar { a}}{\left\Vert\bar {a}\right \Vert} \right \Vert \\ &\le& 2 \left\Vert \bar {\hat a} - \bar {a} \right \Vert / \left\Vert\bar {a}\right \Vert \xrightarrow{a.s.} 0 \ \ (\mbox{when } m \rightarrow \infty) \end{eqnarray*} Note that the convergence of ${\Vert \left(1, \hat {\bar \gamma} \right) - \left(1, \bar \gamma \right) \Vert}$ is for any sample size $n$. Finally, we have proved that $$ \lim_{n \rightarrow \infty} \lim_{m \rightarrow \infty} d_{ext}(\hat f, f) = 0 \ \ \ a.s. $$ \end{proof} \section{Extension to Nonnegative Intensity Functions} \label{sec:nonnegdf} The method developed thus far applies only to strictly positive density functions. In practice, this may be a quite restrictive condition and it is desired to extend the method to non-negative density functions. Our estimation is still based on the model $$\lambda_i = (\lambda \circ \gamma_i) \dot \gamma_i, \ \ i = 1, \cdots, n,$$ where $\lambda \ge 0$ is the underlying intensity function and $\gamma_i \in\Gamma,\, i=1,\dots,n,$ are a set of warping functions. In this section, we propose to extend Algorithm 3 to estimate this nonnegative $\lambda$ with Poisson process observations. \subsection{Representation of Nonnegative Intensities} For estimation, our focus is still on the density function $f = \lambda/\Lambda$ as the total intensity $\Lambda$ is independent of the time warping. Let $F$ denote the CDF of $f$. Then $F(0) = 0, F(1)= 1.$ However, as $f$ is nonnegative, $F$ may not be strictly increasing on the domain $[0,1]$. To simplify the representation, we assume that $F$ is strictly increasing except being constant on a finite number, $K$, of non-overlapping intervals (This finiteness assumption would be sufficient for nonnegative intensities in practical use). Let $\mathcal F = \{F \circ \gamma | \gamma \in \Gamma\}$ denote the set of CDFs which are warped versions of $F$, and $F_i$ be the CDF of $f_i = \lambda_i/\Lambda$. Then $F_i = F \circ \gamma_i \in \mathcal F$ will also be constant on corresponding intervals. In general, let $h, g$ be two density functions whose CDFs $H, G$ are in $\mathcal F$. Then $H$ and $G$ are strictly increasing except being constant on $K$ non-overlapping intervals. We define $\Gamma_{h, g}=\{\gamma\in \Gamma | h = ( g\circ\gamma)\dot{\gamma}\}=\{\gamma\in \Gamma|H=G\circ\gamma\}$. By construction, $\Gamma_{h,g} \neq \emptyset$. We denote the $K$ constant intervals for $H$ and $G$ are $[a_1,\,b_1],\cdots,[a_K,\,b_K]$ and $[c_1,\,d_1],\cdots,[c_K,\,d_K]$, respectively. For any $\gamma\in \Gamma_{h,\,g}$, we must have $\gamma(a_k)=c_k$ and $\gamma(b_k)=d_k$ for $k=1,\cdots,K$. To include the boundary points, we denote $b_0=d_0=0$ and $a_{K+1}=c_{K+1}=1$. It is our goal to characterize all warping functions in $\Gamma_{h,\,g}$. Note that the function $G$ is strictly increasing on each interval $[d_k,\,c_{k+1}], k = 0, 1, \cdots, K$. Now we define a mapping $G_k:[d_k,\,c_{k+1}]\rightarrow\ensuremath{\mathbb{R}}$ as follows, $$ G_k(s) = G(s), s \in [d_k, c_{k+1}]. $$ It is apparent that $G_k$ is strictly increasing on its domain $[d_k, c_{k+1}], k = 0, 1, \cdots, K$. For any $\gamma \in \Gamma_{h,g}$ and $t \in [b_k, a_{k+1}]$, $\gamma(t)$ is in $[d_k, c_{k+1}]$. Hence, $H(t) = G(\gamma(t)) = G_k(\gamma(t))$, and $\gamma(t) = G_k^{-1} \circ H(t)$. We then focus on the regions $[c_k,\,d_k],\,k=1,\cdots,K$ where $G$ is constant (note: $G^{-1}$ does not exist). Note that $H(a_k) = G(\gamma(a_k)) = G(c_k) = G(d_k) = G(\gamma(b_k)) = H(b_k)$. Hence, any $\gamma \in \Gamma$ with $\gamma(a_k) = c_k, \gamma(b_k) = d_k$ satisfies that $H(t) = G(\gamma(t))$ for any $t \in [a_k, b_k]$. Finally, we have shown that the set $\Gamma_{h,g}$ can be characterized as follows, \begin{eqnarray*} & & \Gamma_{h,g} = \{\gamma \in \Gamma | \gamma(t) = G_k^{-1} \circ H(t), t \in [b_k, a_{k+1}], k = 0, \cdots, K, \\ & & \hspace{3cm} \gamma(a_k) = c_k, \gamma(b_k) = d_k, k = 1, \cdots, K\}. \end{eqnarray*} \subsection{Estimation of Nonnegative Intensities} In Sec. \ref{sec:method}, we defined a phase distance $d_{ext}$ between two positive density functions. Here we generalize the distance to nonnegative densities. \begin{definition} Let $h, g$ be two density functions whose CDFs $H, G$ are in $\mathcal F$. We define the distance between $h$ and $g$ as \begin{equation} D(h,\,g)= \underset{\gamma\in\Gamma_{h,g}}{\inf}\Vert 1-\sqrt{\dot{\gamma}}\Vert \label{eq:D} \end{equation} \end{definition} We present three properties of this distance below. \begin {enumerate} \item $D$ is a generalization of the distance $d_{ext}$ -- for strictly positive densities $h, g$, the set $\Gamma_{h, g}$ has single element $G^{-1}\circ H$, and therefore $D(g, h) = d_{ext}(g, h)$. \item $D$ is a proper distance. The proof of this property is similar to that for the distance $d_{ext}$ (see Appendix A) and is, therefore, omitted here. \item Denote the constant intervals for $H$ and $G$ as $[a_1,\,b_1],\cdots,[a_K,\,b_K]$ and $[c_1,\,d_1],\cdots,[c_K,\,d_K]$, respectively. Then the infimum of $\Vert 1-\sqrt{\dot{\gamma}}\Vert$ over $\Gamma_{h,g}$ can be \textit{uniquely} reached. Specifically, let \[\gamma^*(t) = \underset{\gamma\in\Gamma_{h,g}}{\mathop{\rm arginf}} \Vert 1-\sqrt{\dot{\gamma}}\Vert \] Then, \begin{equation} \gamma^*(t) = \left\{ \begin{array}{lr} G_k^{-1}\circ H(t) & t\in [b_k,\,a_{k+1}],\,k=0,1,\cdots,K\\ \left(\dfrac{d_k-c_k}{b_k-a_k}\right)(t-a_k)+c_k & t\in [a_k,\,b_k], \, k=1,\cdots,K \end{array} \right. \label{eq:opt} \end{equation} The proof of this property is based on the following fact (shown in \cite{spikemeanwu}): Assume $\gamma$ is a mapping in $\Gamma_0 = \{\gamma: [a,b] \rightarrow [c,d] | \gamma(a) = c, \gamma(b) = d, \dot \gamma(t) > 0, t \in [a,b]\}$. Then, the distance $\Vert 1-\sqrt{\dot{\gamma}}\Vert$ is minimized over $\Gamma_0$ when $\gamma$ is a linear function from $[a,b]$ to $[c,d]$. \end {enumerate} {\bf Estimation Method:} The estimation of nonnegative intensities follows the same procedure as in the Intensity Estimation Algorithm (Algorithm 3), where Algorithm 1 calls for the Karcher mean computation. However, in this case we need to update the second step of Algorithm 1 (computation of optimal warping between $F_0$ and $F_j$), the new optimal form in Eqn. \ref{eq:opt} is adopted. Analogous to the proof in Sec. \ref{sec:theory}, one can demonstrate that the estimated nonnegative intensity is also an consistent estimator (under the metric $D$ in Eqn. \ref{eq:D}). We omit the details in this manuscript to avoid repetition. \section{Experimental Results}\label{sec:results} In this section we will demonstrate the proposed intensity estimation using two simulations -- one is for a strictly positive intensity, and the other is for an intensity with zero-valued sub-regions. We will also apply the new method in a real spike train dataset and evaluate the classification performance using the estimated intensities. \subsection{Simulations for Illustration} \subsubsection{Poisson Process with a Positive Intensity Function} Twenty independent realizations of a non-homogeneous Poisson process were simulated with the intensity function $\lambda(t)=100(3 + 2\sin((8t-1/2)\pi))$ on [0, 1]. This intensity function and these 20 original processes are shown in Fig. \ref{fig:intest}A. Because of the non-constant intensity, there is a higher concentration of events during intervals with high intensity and fewer events during intervals with low intensity. This pattern is easily seen in the simulated processes. \begin{figure}[ht] \begin{center} \begin{tabular}{ccc} \hspace{-24pt} \textbf{A} & \hspace{-24pt} \textbf{B} & \hspace{-24pt} \textbf{C}\\ \hspace{-24pt} \includegraphics[height=1.4in]{figures/intensity.eps}& \hspace{-24pt} \includegraphics[height=1.4in]{figures/warping.eps}& \hspace{-24pt} \includegraphics[height=1.4in]{figures/observed.eps} \end{tabular} \caption{Simulation of Poisson process with compositional noise. \textbf{A}. Intensity function of a Poisson process (top panel) and 20 independent realizations (bottom panel). \textbf{B}. 20 time warping functions. \textbf{C}. 20 observed processes, which are warped version of the original 20 Poisson process realizations.} \label{fig:intest} \end{center} \end{figure} We then generate 20 warping functions $\{\gamma_i\}_{i = 1}^{20}$ in the following form: $\gamma_i(t) = {e^{a_i t} -1 \over e^{a_i} - 1}$. Here $a_i$ are equally spaced between $-2$ and $2$, $i = 1, \cdots, 20$. These warping functions are shown in Fig. \ref{fig:intest}B. We then warp the 20 independent Poisson process using these 20 warping functions, respectively, by the formula in Eqn. \ref{eq:warping}. The resulting warped processes are shown in Fig. \ref{fig:intest}C. Comparing these processes with those in Fig. \ref{fig:intest}A, we can see that the clear link between number of events in each sub-region and the intensity value no longer exists. Given these noisy Poisson process observations, we aim to reconstruct the underlying intensity function $\lambda(t)$. The individual estimated density functions for the warped processes are shown in the top panel of Figure \ref{fig:simintenest}A. The true warped density functions are shown in the bottom panel of Figure \ref{fig:simintenest}A. The underlying intensity function was estimated for two different cases. In the first case, time warping is present and ignored during estimation. In the second case, time warping is present and accounted for in the estimation using the proposed method. Both of these estimates are displayed with the true intensity function for comparison in Figure \ref{fig:simintenest}B. When time warping is present and ignored, the estimated intensity function underestimates the true intensity in the middle two-thirds of the curve and the true pattern is not revealed. However, when the warping is accounted for during the estimation process, the estimate is a much better estimate of the true intensity function. When the warping functions are more severe (shown in Figure \ref{fig:simintenest}C; $a_i\in [-4,4]$), the performance decreases in all methods (Figure \ref{fig:simintenest}D). The $\ensuremath{\mathbb{L}^1}$-, $\ensuremath{\mathbb{L}^2}$-, and $\mathbb{L}^\infty$- norms were all used to measure the error in estimating the true intensity for each method (Table \ref{table:kmerrors}). However, the proposed method consistently has the lowest error regardless of which norm is used to measure the error. \begin{figure}[ht!] \begin{center} \begin{tabular}{cc} \textbf{A.} & \textbf{B.} \\ \includegraphics[height=2.0in]{figures/intensityftns.eps}& \includegraphics[height=2.0in]{figures/km_intensity_nocs.eps}\\ \textbf{C.} & \textbf{D.} \\ \includegraphics[height=2.0in]{figures/ipp_warp_new.eps}& \includegraphics[height=2.0in]{figures/km_intensity_nocs_worse.eps}\\ \end{tabular} \caption{Warped Poisson Process. \textbf{A.} Top panel: estimated individual density functions for warped processes. Bottom panel: True warped density functions. \textbf{B.} Estimated intensity functions computed under four methods. \textbf{C.} Warping functions for second simulation. \textbf{D.} Updated intensity estimates computed under four methods with more severe warping functions from panel \textbf{C}.} \label{fig:simintenest} \end{center} \end{figure} \begin{table}[ht] \begin{center} \caption{Three types of errors for each method under 2 sets of time warping functions}\label{table:kmerrors} \begin{tabular}{cc|ccc} Time & Norm & Proposed & Fisher-Rao & Wasserstein \\ Warping & & & & \\ \hline \multirow{3}{*}{1} & \ensuremath{\mathbb{L}^1} & \bf{81177.1} & 84372.9 & 105504.9 \\ & \ensuremath{\mathbb{L}^2} & \bf{2876.0} & 3369.6 & 3715.9 \\ & $\mathbb{L}^\infty$ & \bf{166.1} & 243.1 & 207.5 \\ \hline \multirow{3}{*}{2} & \ensuremath{\mathbb{L}^1} & \bf{117991.4} & 129957.4 & 155215.8\\ & \ensuremath{\mathbb{L}^2} & \bf{4184.3} & 5377.5 & 5504.3 \\ & $\mathbb{L}^\infty$ & \bf{228.0} & 381.7 & 301.5 \\ \hline \end{tabular} \end{center} \end{table} \subsubsection{Poisson Process with a Nonnegative Intensity Function} In this second example, we illustrate the estimation method for non-negative intensity functions in Sec. \ref{sec:nonnegdf}. The underlying intensity function is defined on $[0,\,1]$ and given in the following form: \[\lambda(t) = \left\{ \begin{array}{lr} -16000|t-0.5|+4000 & t\in [0.25, \, 0.75]\\ \qquad \quad 0 & \mathrm{otherwise} \end{array} \right. \] This intensity, shown in Fig. \ref{fig:trisim}A, has a trianglar shape with two flat sub-regions, $[0,\,0.25]$ and $[0.75,\,1]$, which occur on either side of the triangle whose peak is located at $t=0.5$. \begin{figure}[ht!] \begin{center} \begin{tabular}{ccc} \hspace{-24pt} \textbf{A} & \hspace{-24pt} \textbf{B} & \hspace{-24pt} \textbf{C}\\ \hspace{-24pt} \includegraphics[height=1.3in]{figures/triangle_true.eps}& \hspace{-24pt} \includegraphics[height=1.3in]{figures/triangle_warp.eps}& \hspace{-24pt} \includegraphics[height=1.3in]{figures/triangle_int.eps}\\ \hspace{-24pt} \textbf{D} & \hspace{-24pt} \textbf{E} & \hspace{-24pt} \textbf{F}\\ \hspace{-24pt} \includegraphics[height=1.3in]{figures/triangle_data.eps}& \hspace{-24pt} \includegraphics[height=1.3in]{figures/triangle_estwarp.eps} & \hspace{-24pt} \includegraphics[height=1.3in]{figures/triangle_est.eps} \end{tabular} \caption{Non-Negative Intensity Estimation. \textbf{A.} True intensity function. \textbf{B.} 11 warping functions. \textbf{C.} (top panel) True warped intensity functions and (bottom panel) estimated intensities with modified kernel method. \textbf{D.} 11 simulated processes with respect to the warped intensities. \textbf{E.} Estimated warping functions. \textbf{F.} Estimated (blue) and true (red) intensity functions} \label{fig:trisim} \end{center} \end{figure} We then generate 11 warping functions $\{\gamma_i\}_{i = 1}^{11}$ in the following two steps: At first, we define $\tilde{\gamma}_i \in \Gamma$ on [0, 1] as: \begin{equation} \tilde{\gamma}_i(t)=\dfrac{\mathrm{sign}(2t-1)|2t-1|^{e_i}+1}{2} \end{equation} where \[e_i = \left\{ \begin{array}{lr} \dfrac{1}{2-0.2(i-1)} & i=1,\dots,6\\ 0.2(i-6)+1 & i=7,\dots,11. \end{array} \right. \] Then, each $\gamma_i(t)$ is defined by linearizing $\tilde{\gamma}_i(t)$ at the value points $t=[0, 0.25, 0.5$, $0.75,1]$. These warping functions are shown in Fig. \ref{fig:trisim}B. The warped intensity functions, $\lambda_i(t) = \lambda (\gamma_i(t))\dot \gamma(t)$, are shown in the top panel of Fig. \ref{fig:trisim}C. We then simulate 11 independent Poisson processes using these 11 intensity functions, respectively, and the results are shown in Fig. \ref{fig:trisim}D. We can see that these realizations clearly display the warped intensity functions along the time axis. Given these noisy Poisson process observations, we aim to reconstruct the underlying intensity function $\lambda(t)$. To estimate $\lambda(t)$, we first estimate the warped intensity functions using modified kernel method on the 11 observed realizations. We fitted a truncated Gaussian kernel with bandwidth $h=0.01$ to estimate the intensities. The result is shown in the lower panel of Fig. \ref{fig:trisim}C. Comparing with the true intensities in the corresponding upper panel, we can see the kernel method provides a reasonable estimation. In spite of the phase shift along the time axis, the kernel method estimates the flat subregions in the underlying intensity appropriately. Once the individual intensities are estimated, we then compute their Karcher mean to get the the warping functions with formula in Eqn. \ref{eq:opt}. These warping functions were then used to estimate of the underlying intensity function for the process and the result is shown in Fig. \ref{fig:trisim}F. Comparing the result with the true intensity function, we find that the proposed method provides a very accurate reconstruction. \subsection{Application in Spike Train Data} \label{subsec:spike1} \begin{figure}[ht] \begin{center} \includegraphics[height=4.5in]{figures/training_spikes.eps} \caption{30 spike trains in each of the four movement paths. } \label{fig:data} \end{center} \end{figure} \begin{figure}[ht] \begin{center} \includegraphics[height=4.5in]{figures/km_spike_path.eps} \caption{Estimated intensity function in each path.} \label{fig:sp_mean} \end{center} \end{figure} In this section the proposed intensity estimation method will be applied to a benchmark spike train dataset. This dataset was first used in a metric-based analysis of spike trains \cite{WuSrivastavaJCNS11}, and was also used as a common data set in a workshop on function registration, {\em CTW: Statistics of Time Warpings and Phase Variations} in Mathematical Bioscience Institute in 2012. It is publicly available from {\it http://mbi.osu.edu/2012/stwdescription.html} and is the same dataset used in Chapter 1. For completeness, a brief summary is given again. The spiking activity of one neuron in primary motor cortex was recorded in a juvenile female macaque monkey. In the experimental setting, a subject monkey was trained to perform a closed Squared-Path (SP) task by moving a cursor to targets via contralateral arm movements in the horizontal plane. Basically, the targets in the SP task are all fixed at the four corners of a square and the movement is stereotyped. In each trial the subject reached a sequence of 5 targets which were the four corners of the square with the first and last targets overlapping. Each sequence of 5 targets defined a path, and there were four different paths in the SP task (depending on the starting point). In this experiment, 60 trials for each path were recorded, and the total number of trials was 240. To fix a standardized time interval for all data, the spiking activity in each trial is normalized to 5 seconds. For the purpose of intensity estimation, a modified Gaussian kernel (width = 41.67$ms$) was adopted to estimate the underlying density of each of the point process spike trains. Thirty smoothed spike trains in each path are shown in Fig. \ref{fig:data}B. From these data, observe that the densities have a similar pattern within each class; for example, they have similar number of peaks and the locations of these peaks are only slightly different. However, the peak locations across different paths are significantly different. For the 60 trials in each path, the first 30 of them were chosen as the training data and the other 30 as the test data. The proposed intensity estimation method is tested here to decode neural signals with respect to different movement paths. In general, there are two types of decoding methods: i) classification based on pairwise distance between training and test data, and ii) classification using distance from test data to the Karcher mean in the training data. Note that the pairwise method has a quadratic efficiency (Cost is $O(N^2)$, where $N$ is the number of spike trains in training and testing set), but distance-to-the-mean is in the linear order \cite{WuSrivastavaJCNS11}. In this chapter, the decoding result is reported using the efficient mean-based method. Once an estimate for the density of each of the spike trains was obtained, the Karcher mean for each path was calculated using Algorithm 1 with one minor change to overcome numerical issues. In step 2, instead of directly using the CDF and inverse CDF of the two densities, the individual warping functions are found using Dynamic Programming \cite{srivastava-etal-Fisher-Rao-CVPR:2007}. The penalty coefficient used in the Dynamic Programming was 0.01, although the results are robust to the choice of this penalty coefficient. The computed Karcher means in each path are shown in Fig. \ref{fig:sp_mean}. Comparing with the original spike trains, all of the mean spike trains appropriately represent the firing patterns in the corresponding movement. For example, the spiking frequency is relatively higher when the hand moves upward, which is apparent in all four means. For the 120 test trains, each train is labeled by the shortest distance over the distances to the four means in the training set. This computation is apparently more efficient (only $120 \times 4 = 480$ distances need to be computed). It is found that the classification accuracy using the proposed estimation method is 82.5\%(99/120) whereas the classification accuracies using the naive cross-sectional method and the Fisher-Rao registration method are 77.5\%(93/120) and 55.0\%(66/120), respectively. This result shows the proposed method can better differentiate neural signals with respect to different movement behaviors. The lower accuracy in the naive method indicates that the proposed method improves classification results. \section{Discussion}\label{sec:diss} Intensity estimation has been a classical problem in Poisson process methods. The problem is significantly challenging if the observed data are corrupted with compositional noise, i.e. there is time warping noise in each realization. In the paper, we have proposed a novel alignment-based algorithm for positive intensity estimation. The method is based on a key fact that the intensity function is area-preserved with respect to compositional noise. Such a property implies that the time warping is only encoded in the normalized intensity, or density, function. Based on this finding, we decompose the estimation of intensity by the product of estimated total intensity and estimated density. Our investigation on asymptotics shows that the proposed estimation algorithm provides a consistent estimator for the underlying density. We further extend the method to all nonnegative intensity functions, and provide simulation examples to illustrate the success of the estimation algorithms. While results from this method show promising improvements over previous methods, it is important to note that the method is dependent upon the kernel density estimates of the observed processes. In general, kernel density estimates are highly dependent upon the chosen bandwidth $h$ \cite{ramsay-silverman-2005, ferraty-vieu-2006}. In this paper, we have used a simple plug-in method to determine an appropriate bandwidth. In future work, we will consider the development of an algorithm that can automatically choose the optimal bandwidth for the modified kernel density estimator. Additionally, future work will examine the asymptotic variability of this estimator and an extension to general Cox processes for conditional intensity estimation. \section*{Appendix} \subsection*{A. Proof on proper metric $d_{ext}$} \begin{proof} We prove that $d_{ext}$ is a proper metric by verifying three properties: \begin{enumerate} \item (Positive Definiteness) It is apparent that $d_{ext}(f_1, f_2) \ge 0$. By Theorem 1, there exists $\gamma_{12}$, such that $f_1 = (f_2; \gamma_{12})$. Therefore, $d_{ext}(f_1,f_2)=0 \Leftrightarrow \Vert 1 - \sqrt{\dot{\gamma}_{12}} \Vert=0 \Leftrightarrow \gamma_{12}(t)=\gamma_{id}$. Hence, $f_1=f_2$. \item (Symmetry) $\Vert 1-\sqrt{\dot{\gamma}_{21}}\Vert^2=\Vert 1-\sqrt{\dot{\gamma}_{12}^{-1}}\Vert^2 = \int_0^1 \left( 1-\sqrt{\dot{\gamma}_{12}^{-1}(s)}\right)^2 ds = \int_0^1 \left(1-\dfrac{1}{\sqrt{\dot{\gamma}_{12}(t)}}\right)^2\dot{\gamma}_{12}(t)dt = \Vert 1-\sqrt{\dot{\gamma}_{12}(t)}\Vert^2.$ Therefore, $d_{ext}(f_1,f_2)=d_{ext}(f_2,f_1)$. \item (Triangle Inequality) Let $f_2=f_1\left( \gamma_{12}(t)\right)$, $f_3=f_2\left(\gamma_{23}(t)\right)$, $\gamma_{13}=\gamma_{12}\circ\gamma_{23}$. Then, $d_{ext}(f_1, f_3) = \Vert 1-\sqrt{\dot{\gamma}_{13}} \Vert = \Vert 1-\sqrt{\left(\dot{\gamma}_{12}\circ \gamma_{23}\right)\dot{\gamma}_{23}} \Vert \le \Vert 1-\sqrt{\dot{\gamma}_{23}}\Vert+\Vert\sqrt{\dot{\gamma}_{23}}-\sqrt{\dot{\gamma}_{13}}\Vert = \Vert 1-\sqrt{\dot{\gamma}_{23}}\Vert+\Vert 1 - \sqrt{\dot{\gamma}_{12}}\Vert$. Note that $\Vert\sqrt{\dot{\gamma}_{23}}-\sqrt{\dot{\gamma}_{13}}\Vert = \Vert \left(1,\gamma_{23}\right)-\left(1,\gamma_{13}\right)\Vert = \Vert \left(1,\gamma_{23}\right)-\left(1,\gamma_{12}\circ\gamma_{23}\right)\Vert = \Vert 1 - \sqrt{\dot{\gamma}_{12}}\Vert$ (by isometry) Thus, $d_{ext}(f_1, f_3) \le d_{ext}(f_1, f_2) + d_{ext}(f_2, f_3)$. \end{enumerate} \end{proof} \subsection*{B. Proof on the consistency of $\hat f$} \begin{lemma} \label{lem:kernel} Let $g$ be a probability density function on [0, 1]. $\{X_i\}_{i=1}^n$ are a set of i.i.d. random variables with density $g$. If $\hat g_n$ is a modified kernel estimate with optimal bandwidth given in Algorithm 2, then $$ \int_0^1 |\hat g_n(t) - g(t)|dt \xrightarrow{a.s.} 0 \ (\mbox{when } n \rightarrow \infty) $$ \end{lemma} \begin{proof} Let $\tilde g_n(t) = \frac{1}{nh_n} \sum_{i=1}^n K(\frac{t-X_i}{h_n})$ be the classical kernel estimator with kernel function $K$ and optimal bandwidth $h_n$ (i.e. $h_n \rightarrow 0$ and $nh_n \rightarrow \infty$). Then, we can obtain from Equation 3.84 of \cite{silverman86} that $\int_0^1 |\tilde g_n(t) - g(t)|dt \xrightarrow{a.s.} 0$. As $K(t) = 0$ when $|t| < 1$, we have \begin{eqnarray} & & \int_0^1 |\hat g_n(t) - \tilde g_n(t)|dt \nonumber \\ &=& \int_0^{h_n} |\hat g_n(t) - \tilde g_n(t)|dt + \int_{1-h_n}^1 |\hat g_n(t) - \tilde g_n(t)|dt + \int_{h_n}^{1-h_n} |\frac{1}{n+1}\tilde g_n(t) + \frac{1}{n+1}|dt \nonumber \\ &\le& \int_0^{h_n} \hat g_n(t)dt + \int_0^{h_n} \tilde g_n(t) dt + \int_{1-h_n}^1 \hat g_n(t) dt + \int_{1-h_n}^1 \tilde g_n(t) dt + \frac{2}{n+1}. \label{eq:kernel} \end{eqnarray} Here we will show that the first term goes to 0 (a.s.). Indeed, \begin{eqnarray*} \int_0^{h_n} \hat g_n(t)dt &=& \int_0^{h_n} \frac{1}{nh_n} \sum_{i=1}^n K(\frac{t-X_i}{h_n}) dt = \int_0^{h_n} \frac{1}{nh_n} \sum_{X_i \le 2h_n} K(\frac{t-X_i}{h_n}) dt \\ & \le & \int_0^{1} \frac{1}{nh_n} \sum_{X_i \le 2h_n} K(\frac{t-X_i}{h_n}) dt = \frac{1}{n} \sum_{X_i \le 2h_n} 1 = \frac{1}{n} \sum_{i=0}^1 \mathbf{1}_{\{{X_i \le 2h_n}\}} \end{eqnarray*} where $\mathbf{1_{\{\cdot\}}}$ is the indicator function. By the Strong Law of Large Numbers on triangular arrays \cite{wangwu11}, $$\frac{1}{n} \sum_{i=0}^n (\mathbf{1}_{\{{X_i \le 2h_n}\}} - E \mathbf{1}_{\{{X_i \le 2h_n}\}}) \rightarrow 0. (a.s.)$$ As $ E \mathbf{1}_{\{{X_i \le 2h_n}\}} = \int_0^{2h_n} f(t)dt \rightarrow 0,$ we have $\int_0^{h_n} \hat g_n(t)dt \xrightarrow{a.s.} 0$. The convergence to 0 for the second to fourth terms on the RHS of Eqn. \ref{eq:kernel} can be similarly proven, and therefore $\int_0^1 |\hat g_n(t) - \tilde g_n(t)|dt \xrightarrow{a.s.} 0. $ Finally, we have $$\int_0^1 |\hat g_n(t) - g(t)|dt \le \int_0^1 |\hat g_n(t) - \tilde g_n(t)|dt + \int_0^1 |\tilde g_n(t) - g(t)|dt \xrightarrow{a.s} 0.$$ \end{proof} \begin{lemma} \label{lem:inverse} Let $G$ and $\hat G_n$ denote the cumulative distribution functions of $g$ and $\hat g_n$ in Lemma \ref{lem:kernel}, respectively. Assume the density $g$ is continuous and for any $t \in [0,1]$, $0 < m \le g(t) \le M <\infty$ (Condition 2 in Sec. \ref{sec:theory}). If $G$ and $\hat G_n$ are invertible and the inverse functions are differentiable, then $$ \int_0^1 (\sqrt{{\dot {\hat G}}_n^{-1} (t)} - \sqrt{{\dot G}^{-1}(t)})^2dt \xrightarrow{a.s.} 0 \ (\mbox{when } n \rightarrow \infty) $$ \end{lemma} \begin{proof} To simplify notation, we let $F = G^{-1}$, $\hat F_n = \hat G_n^{-1}$, $f = \dot F = {\dot G}^{-1}$, and $\hat f_n = {\dot {\hat F}}_n = {\dot {\hat G}}_n^{-1} $. For any $t \in [0, 1], |\hat G_n (t) - G(t)| \le \int_0^1 |\hat g_n(t) - g(t)| dt \xrightarrow{a.s.} 0$ (by Lemma 3). That is, $\hat G_n \rightrightarrows G$ (uniform convergence) almost surely. By the theory on convergence of inverse functions \cite{wangwu11}, we also got that $\hat F_n \rightrightarrows F \ (a.s.)$. By definition, $G(F(t)) = t$ and $ \hat G_n (\hat F_n (t)) = t$. Using the chain rule, we have $g(F(t)) f(t) = 1$ and $\hat g_n(\hat F_n(t)) \hat f_n(t) = 1$. Therefore, \begin{eqnarray*} & &\int_0^1 |\hat f_n (t) - f(t)|dt \\ &=& \int_0^1 |\frac{1}{\hat g_n(\hat F_n(t))} - \frac{1}{g(F(t))} | dt \\ &\le& \int_0^1 |\frac{1}{\hat g_n(\hat F_n(t))} - \frac{1}{g(\hat F_n(t))} | dt + \int_0^1 |\frac{1}{g(\hat F_n(t))} - \frac{1}{g(F(t))} | dt \\ \end{eqnarray*} Here we will show that each integration in the right-hand side indeed converges to 0 (a.s.). By Lemma \ref{lem:kernel}, \begin{eqnarray*} & & \int_0^1 |\frac{1}{\hat g_n(\hat F_n(t))} - \frac{1}{g(\hat F_n(t))} | dt \\ &=& \int_0^1 |\frac{1}{\hat g_n(s)} - \frac{1}{g(s)} | \hat g_n(s) ds \ \mbox{ (by change of variable)} \\ &=& \int_0^1 \frac{1}{g(s)} |{\hat g_n(s)} - {g(s)} | ds \le \frac{1}{m} \int_0^1 |{\hat g_n(s)} - {g(s)} | ds \xrightarrow{a.s.} 0 \end{eqnarray*} By assumption, $g$ is continuous and positively bounded. Hence, $1/g$ is also continuous. This continuity is uniform because the domain $[0,1]$ is compact. That is, for any $\epsilon > 0$, there exists $\delta >0$, such that for all $a,b \in [0,1]$ with $|a-b| < \delta, |1/g(a) - 1/g(b)| < \epsilon$. We have shown that $\hat F_n \rightrightarrows F \ (a.s.)$. Hence, with probability 1, there exists an integer $N$ such that for any $n > N$ and $t \in [0, 1]$, we have $|\hat F_n(t) - F(t)| < \delta.$ $\int_0^1 |\frac{1}{g(\hat F_n(t))} - \frac{1}{g(F(t))} | dt \le \int_0^1 \epsilon dt = \epsilon. $ Therefore, we have shown that \begin{eqnarray*} \int_0^1 |\frac{1}{g(\hat F_n(t))} - \frac{1}{g(F(t))} | dt \xrightarrow{a.s.} 0. \end{eqnarray*} Finally, based on the simple inequality $(\sqrt{a} - \sqrt{b})^2 \le |a-b|$, we have $$ \int_0^1 (\sqrt{\hat f_n (t)} - \sqrt{f(t)})^2dt \le \int_0^1 |\hat f_n (t) - f(t)|dt \xrightarrow{a.s.} 0. $$ \end{proof} \begin{lemma} \label{lem:karcher} Let $\{\gamma_i\}$ be a sequence of warping functions that satisfy Condition 3 in Sec. \ref{sec:theory}, and $\bar \gamma$ be the Karcher mean of $\{\gamma_i^{-1}\}$. Then $\bar \gamma$ converges to $\gamma_{id}$ almost surely. That is, $$ || (1, \bar \gamma) - 1|| \xrightarrow{a.s.} 0 \ \ \ (\mbox{when } n \rightarrow \infty)$$ \end{lemma} \begin{proof} By assumption, $E(\sqrt {\dot \gamma_i^{-1}(t)}) \equiv \beta > 0, i = 1, \cdots, n.$ Let $S_n = n \bar \gamma = \sum_{i=1}^n \sqrt {\dot \gamma_i^{-1}}$. As $\{\sqrt {\dot \gamma_i^{-1}}\}$ are i.i.d., \begin{eqnarray*} & &E\left(\left\Vert S_n -n \beta\right\Vert ^4\right) = E\left(\left\Vert\sum_{i=1}^n \left(\sqrt {\dot \gamma_i^{-1}} - \beta\right)\right\Vert^4\right) \\ &=& nE\left(\left\Vert\sqrt {\dot \gamma_1^{-1}} - \beta\right\Vert^4\right) + n(n-1) \left(E\left(\left\Vert\sqrt {\dot \gamma_1^{-1}} - \beta\right\Vert^2\right)\right)^2 \\ & & + 2n(n-1) \left(E\left(\int_0^1\left(\sqrt {\dot \gamma_1^{-1}(t)} - \beta\right) \left(\sqrt{\dot \gamma_2^{-1}(t)} - \beta\right)dt\right)^2\right) \end{eqnarray*} As $||\sqrt {\dot \gamma_1^{-1}}|| = 1$, there exist positive constants $C$ and $N$, such that $E(|| S_n -n \beta||^4) < Cn$ when $n > N$. Using the generalized Chebyshev inequality, for any $\epsilon > 0$ and $n > N$, $$ P\left(\left\Vert\frac{S_n - n\beta}{n}\right\Vert > \epsilon\right) \le \frac{1}{(n\epsilon)^4} E(|| S_n -n \beta||^4) \le \frac{C}{\epsilon^4 n^2}. $$ This indicates that $\sum_{n=1}^\infty P(||S_n-n\beta|| \ge n\epsilon) < \infty$. By the Borel-Cantelli lemma, $P(||S_n-n\beta|| \ge n\epsilon \ \ i.o.) = 0$. Therefore, $ || \frac{1}{n}\sum_{i=1}^n \sqrt {\dot \gamma_i^{-1}} - \beta || \xrightarrow{a.s.} 0. $ Finally, we have \begin{eqnarray*} || (1, \bar \gamma) - 1|| &=& || \sqrt {\dot {\bar \gamma}} - 1 || = \left\Vert \frac{\frac{1}{n}\sum_{i=1}^n \sqrt {\dot {\gamma}_i^{-1}}} {\frac{1}{n}||\sum_{i=1}^n \sqrt {\dot {\gamma}_i^{-1}} ||} - 1 \right\Vert \xrightarrow{a.s.} 0. \end{eqnarray*} \end{proof} \begin{lemma} \label{lem:poisson} Assume $Y_m$ is a random variable following a Poisson distribution with mean $\Lambda_m$. If $\lambda_m \ge \alpha \log(m), \alpha > 1$ for sufficiently large $m$ (Condition 4 in Sec. \ref{sec:theory}), then $Y_m \rightarrow \infty \ (a.s.)$ when $m \rightarrow \infty$. \end{lemma} \begin{proof} Based on the Poisson density formula, for any $K = 1, 2, \cdots,$ $P(Y_m \le K) = e^{-\lambda_m} \sum_{k=0}^K \frac{\lambda_m^k}{k!}$. By assumption, $\lambda_m \ge \alpha \log(m), \alpha > 1$ for sufficiently large $m$. It is apparent that when $m$ is sufficiently large, $e^{-\frac{\alpha/2}{1+\alpha}\lambda_m} \sum_{k=0}^K \frac{\lambda_m^k}{k!} < 1.$ Hence, \begin{eqnarray*} m^{1+\alpha/2} P(Y_m\le K) &=& m^{1+\alpha/2} e^{-\lambda_m} \sum_{k=0}^K \frac{\lambda_m^k}{k!} \\ &=& e^{-\frac{1+\alpha/2}{1+\alpha}\lambda_m +(1+\alpha/2) \log m} \left(e^{-\frac{\alpha/2}{1+\alpha}\lambda_m}\sum_{k=0}^K \frac{\lambda_m^k}{k!}\right) \\ &\le& 1 \cdot 1 = 1. \end{eqnarray*} Consequently, for sufficiently large $m$, $P(Y_m\le K) \le \frac{1}{m^{1+\alpha/2}}$. Hence, $\sum_{m=1}^\infty P(Y_m\le K) < \infty$. By the Borel-Cantelli lemma, $$ P(\limsup \{Y_m \le K\}) = P(Y_m \le K \ \ i.o.) = 0.$$ Equivalently, we have $P(Y_m > K \ \ \mbox{eventually}) = 1,$ for any $K = 1, 2, ...$. Therefore, $$ \lim_{m \rightarrow \infty} Y_m = \infty. \ \ (a.s.)$$ \end{proof} \bibliographystyle{apa}
\section{Introduction}\label{intro} Following the seminal work of \cite{BENDSOE1988}, topology optimization has become, over the last decades, a reliable and efficient design tool in various application fields, see \cite{SIGMUND2013} and \cite{DEATON2014}. In general, an optimization problem is formulated to find the optimal material distribution, within a design domain, that maximizes a given objective while satisfying some given constraints on the geometry and/or the physical response. In specific regions of the design domains, the state variable fields may exhibit large gradients or discontinuities. Additionally, the design variable fields may have to resolve complex shapes, intricate material arrangements, or extremely thin features. In these cases, an increased mesh resolution is necessary to achieve a sufficient accuracy of both the physical responses and the geometry description. Most topology optimization approaches operate on uniformly refined meshes, for which extreme resolution requirements can lead to a drastic increase in computational cost since the number of design and state degrees of freedom (DOFs) is increased. Hence there is a need for efficient adaptive strategies in topology optimization. In the 1980s, \cite{BENNET1985} and \cite{KIKUCHI1986} explored mesh adaptation in combination with shape optimization. Their objective was to avoid the distortions of the finite element mesh arising from shape modifications and thus to control the quality of the finite element solution. Later \cite{MAUTE1995, MAUTE1998} and \cite{SCHLEUPEN2000} performed topology optimization and used separate models for the design and the analysis to allow for more flexibility in the optimization process. In these works, the effective design space is adapted at each optimization step with respect to the current material distribution, to both decrease the number of finite elements in the analysis model and the number of design variables used for the geometry description. Ever since, adaptive topology optimization has been an active research topic, as it can provide both precise geometry representations and accurate mechanical responses at a reduced computational cost, substantially speeding up the design process. Working with density-based approaches and solving compliance minimization problems, several adaptive strategies for topology optimization have been proposed. \cite{COSTA2003} carried out a refinement only approach based on a density criterion. After a given number of optimization steps, the material and boundary elements are refined using \textit{h}-adaptivity, i.e., the elements are split into smaller ones, see \cite{YSERENTANT1986, KRYSL2003}. As no coarsening is introduced in the void regions and as no regularization is used, the optimization leads to mesh dependent designs that differ from the ones obtained with uniformly refined meshes. \cite{STAINKO2006} developed a refinement criterion based on a regularization filter indicator that locates the material interface. In this case, \textit{h}-refinement is only applied around the interface and a reduced number of elements are generated during the optimization process. Extending the previous approaches, \cite{WANG2010} introduced mesh coarsening in the void regions, allowing for further cost reduction and achieving designs that only slightly differs from uniform ones. A similar approach is adopted in \cite{NANA2016} using unstructured meshes and in \cite{NGUYEN2017} using polygonal elements. Also exploiting \textit{h}-refinement, \cite{BRUGGI2011} trigger mesh adaptivity based on error estimators; one related to the geometric error and one to the analysis error. In the previous approaches, the geometry description and the analysis are strongly coupled, as both the state and the design variables are defined on the same mesh. Following the initial idea by \cite{MAUTE1995}, \cite{GUEST2010} exploited the separation of the geometry and the analysis fields using Heaviside projection methods. After projection, multiple elements are influenced by a single design variable, introducing a redundancy in the design. The latter can be exploited to reduce the number of design variables, and therefore enhance computational performance. \cite{WANG2013, WANG2014} also refined the state and design fields separately by using two distinct meshes adapted by \textit{h}-refinement and resorting to independent geometric and analysis error estimator criteria. Later on, adaptive mesh refinement strategies were extended to other optimization techniques, see for example \cite{WALLIN2012} in the context of phase-fields and \cite{PANESAR2017} for Bi-directional Evolutionary Structural Optimization (BESO). Adaptive mesh refinement has also been used to address stress-based optimization problems. \cite{SALAZAR2018} used a density-based approach and adapted the mesh following a stress error estimator, while \cite{ZHANG2018} used moving morphable voids described explicitly by B-splines and refined regions located around the design boundaries. So far, most topology optimization approaches have been implemented within the framework of classical finite element, i.e., relying on low order Lagrange interpolation functions. Nonetheless, using B-splines or NURBS as basis functions has become an increasingly popular approach, along with the development of isogeometric analysis (IGA), see \cite{HUGHES2005, COTTRELL2009}. B-splines are used to both describe the geometry of a structure and to solve for its mechanical responses in IGA. From a geometry point of view, using B-splines and NURBS facilitates compatibility with Computer Aided Design (CAD) software, that are based on this type of basis functions. From an analysis point of view, using smooth and higher order bases, such as quadratic and cubic B-splines, leads to more accurate structural responses per DOF than classical $C^0$ finite element approaches, see \cite{HUGHES2008, EVANS2009, HUGHES2014}. For topology optimization, B-splines can offer additional advantages. They tend to promote smoother designs, prevent the development of spurious features and limit the need for filtering techniques. Several works successfully apply topology optimization in combination with IGA, see for example \cite{DEDE2012} for a phase field approach, \cite{QIAN2013} for a density approach, \cite{WANG2016} or \cite{JAHANGIRY2017} for a level set approach, \cite{WANG2017} for lattice structure designs or \cite{LIEU2017} for multi-material designs. A comprehensive review is presented in \cite{WANGY2018}. Classical B-splines approaches do not allow for local refinement, as their tensor product structure inherently enforces global refinement. However, in solving topology optimization problems, local mesh adaptivity is key to achieve both a precise description of the design boundaries and accurate mechanical response computations while maintaining a reasonable computational cost. Hierarchical B-splines (HB-splines), as introduced by~\cite{FORSEY1988}, naturally support local refinement, but do not form a partition of unity (PU), a beneficial property for numerical purposes. Therefore, the concept was extended to so-called truncated hierarchical B-splines (THB-splines) to recover the PU and other advantageous properties, see \cite{GIANNELLI2012}. Local adaptive mesh refinement relying on HB-splines or THB-splines was implemented by \cite{SCHILLINGER2012} and \cite{GARAU2018}. Recently research efforts have been dedicated to the exploitation of B-spline refinement in conjunction with level set topology optimization. Solving compliance minimization problems, \cite{BANDARA2016} used B-spline shape functions for both the geometry representation and the analysis with immersed boundary techniques. They proposed a global mesh refinement and coarsening strategy based on Catmull-Clark subdivision surfaces. \cite{WANG2019} focused on cellular structures and used B-spline shape functions to represent the geometry of each representative cell. In their approach, local refinement, i.e., cell subdivision, is achieved by knot insertion. This paper proposes an adaptive mesh refinement strategy using HB-splines to perform level set topology optimization. We use a level set function (LSF) to describe the design geometry implicitly. The structural analysis relies on an immersed boundary technique to predict the system responses, here the eXtended Finite Element Method (XFEM) with a generalized Heaviside enrichment strategy. We discretize both the design and the state variable fields, i.e., the level set and the displacement fields, with HB-splines. Contrary to most approaches relying on lower order basis functions, we interpolate the design variables with higher order B-splines. For simplicity, the interpolation of the displacement field is restricted to first order functions. For local refinement we consider truncated B-splines. Although not widely used in the literature so far, THB-splines satisfy the PU and form a convex hull, allowing us to conveniently impose bounds on the design variables. Refinement is triggered according to a user-defined criterion, here the location of the design boundaries, and the mesh is refined along the interfaces and coarsened in the solid and void phases. As the design and state variable fields are defined on the same mesh, they are refined or coarsened simultaneously, which allows for a sufficiently accurate resolution of both the geometry and the physical response. Two approaches to handle the design space in level set topology optimization are considered: (i) seeding an initial hole pattern and (ii) nucleating holes during the optimization process using a combined level set/density approach. We solve the optimization problems with mathematical programming techniques and in particular the Globally Convergent Method of Moving Asymptotes (GCMMA), see \cite{SVANBERG2002}. The required sensitivity analysis is carried out with an adjoint formulation. The ability of the proposed approach to generate complex geometries at a reduced computational cost starting from initial coarse meshes is assessed with two- and three-dimensional topology optimization problems. By varying the adaptive strategy and the underlying B-spline discretization, we can characterize the influence of the mesh adaptivity on the optimization results and the computational cost. Our numerical study results in interesting findings. First the mesh adaptivity strategy influences the optimization process. Finer initial meshes and more frequent refinement operations lead to the development of more complex geometries exhibiting thin structural members. The properties of B-splines have an impact on the generated designs and an educated choice of the B-splines features can lead to advantageous behaviors for topology optimization. Higher order B-splines promote smoother geometries and tend to eliminate small spurious features from the design. Truncation allows us to conveniently handle enforcement of bounds on the design variables. The numerical examples also reveal that hole nucleation is crucial for the computational efficiency of the adaptive strategy, as it allows for starting the optimization process on coarser meshes. The remainder of the paper is organized as follows. Section~\ref{GeoDescription} presents the level set description of the geometry using B-splines. Section~\ref{Hole} discusses the strategies adopted to achieve a sufficiently rich design space working with level set topology optimization. Section~\ref{meshAdaptivity} details the mesh refinement and coarsening strategies, while Section~\ref{HBSplineBasis} focuses on the construction of hierarchical B-spline bases. The structural analysis is described in Section~\ref{StructAnalysis}; governing equations are detailed and the basic principles of XFEM are recalled. Section~\ref{optProblem} is devoted to the optimization problem formulation, the used regularization schemes and the sensitivity analysis implementation. Section~\ref{numExample} studies the proposed approach with 2D and 3D solid/void design examples. Finally Section~\ref{Conclusions} summarizes the work and draws some conclusions. \section{Geometry description}\label{GeoDescription} Since the development of the level set method (LSM) by \cite{OSHER1988}, it has been extensively used in combination with shape and topology optimization to implicitly describe the geometry of the design, see \cite{VANDIJK2013} and~\cite{SIGMUND2013}. A general description of the two-phase problems addressed in this paper is given in Fig.~\ref{fig_designDomain}. Two material phases, $A$ and $B$, are distributed over a $d$-dimensional design domain $\Omega \subset \mathbb{R}^d$. Material subdomains are non-overlapping, i.e., $\Omega = \Omega^A \cup \Omega^B$. The boundaries of material subdomains $A$ and $B$ are denoted $\partial \Omega^A$ and $\partial \Omega^B$. Dirichlet and Neumann boundary conditions are applied to $\Gamma^I_{D} = \partial \Omega^I \cap \partial \Omega_D$ and $\Gamma^I_{N} = \partial \Omega^I \cap \partial \Omega_N$ respectively, with $I = A, B$. The material phases are separated by an interface $\Gamma^{AB} = \partial \Omega^A \cap \partial \Omega^B$. \begin{figure}[ht]\center \includegraphics[scale=0.9]{figures/fig_designDomain} \caption{Design domain description.} \label{fig_designDomain} \end{figure} A LSF is used to describe the material distribution within the design domain $\Omega$. At a given point $\mathbf{x}$ in space, the design geometry is defined as: \begin{equation} \renewcommand*{\arraystretch}{1.25} \begin{array}{llll} \phi(\mathbf{x}) & < & 0, & \forall \mathbf{x} \in \Omega^{A},\\ \phi(\mathbf{x}) & > & 0, & \forall \mathbf{x} \in \Omega^{B},\\ \phi(\mathbf{x}) & = & 0, & \forall \mathbf{x} \in \Gamma^{AB}. \end{array} \end{equation} The LSF is interpolated using B-spline shape functions $B_i(\mathbf{x})$ as: \begin{equation} \phi^h(\mathbf{x}) = \sum_i B_i(\mathbf{x})\ \phi_i, \end{equation} where $\phi_i$ are the B-spline coefficients. In this work, the B-spline coefficients and corresponding shape functions are used to evaluated nodal level set values on the integration mesh, that is the mesh over which the weak form of the governing equations are integrated. These nodal values are used to interpolate the level set field linearly within an integration element. The linear approximation within an element simplifies the construction of the intersection of the LSF with the element edges and does not affect the accuracy of the analysis, as linear interpolation functions are used for the state variable field. Further explanations about the level set field interpolation on the analysis mesh are provided in Section~\ref{HBSplineBasis}. Contrary to classical approaches by \cite{WANG2003} or~\cite{ALLAIRE2004}, where the level set is updated in the optimization process by solving Hamilton-Jacobi-type equations, the coefficients of the LSF are here defined as explicit functions of the design variables. They are updated by mathematical programming techniques driven by shape sensitivity computations. It should be noted that, in this work, no filter is used to widen the zone of influence of the design variables and thus enhance the convergence of the optimization problem, as proposed in \cite{KREISSL2012}. Proceeding this way, the B-spline basis function support is not altered and its influence on the optimization process and the obtained designs can be emphasized and compared for different B-Spline orders. \section{Seeding of inclusions}\label{Hole} The design updates in level set topology optimization is solely driven by shape sensitivities, see \cite{VANDIJK2013}. To allow for a sufficient freedom in the design, level set optimization techniques require either seeding inclusions in the initial design or introducing inclusions during the optimization process. In the context of solid/void problem, the inclusion represents a hole. Seeding inclusions in the initial design domain is a commonly used strategy and has been successfully implemented in level set topology optimization, see for example \cite{VILLANUEVA2014}. Nonetheless, this strategy leads to several difficulties. First finding a hole pattern that satisfies the design constraints is not a trivial task. Moreover, this strategy requires a sufficiently fine mesh able to resolve both the physics and the design of the initial layout, as the initial hole pattern can easily constitute the most geometrically complex configuration over the entire optimization process. Thus, as will be show in Section~\ref{numExample}, seeding initial holes limits the computational effectiveness of the proposed adaptive discretization strategy. Therefore, allowing for hole seeding during the optimization process proves to be advantageous in the context of mesh adaptivity. Topological derivatives constitute a systematic approach to seed new holes in the design domain during the optimization process, see \cite{NOVOTNY2013} for a detailed introduction. The basic concept of evaluating the influence, i.e., the sensitivity, of introducing an infinitesimal hole on the objective and constraint functions was introduced by \cite{ESCHENAUER1994}. A finite size hole is inserted at a location where the topological derivative field associated to an objective or considered cost function is minimal. The shape of the new hole is then optimized along with existing domain boundaries. The reader is referred to \cite{SIGMUND2013} or \cite{MAUTE2017} for further details. Although proven useful, topological derivatives only provide information about where to place an infinitesimal hole and it remains unclear what the size and shape of a finite sized hole should be. Alternatively, hole seeding during the optimization process can be achieved by combining level set and density-based techniques, as explored recently in \cite{KANG2013,GEISS2019a,BURMAN2019} or \cite{JANSEN2019}. Following the single-field ap\-proach of \cite{BARRERA2019}, an abstract design variable field, $s(\mathbf{x})$, is introduced with $s \in \mathbb{R}$, $0 \leq s(\mathbf{x}) \leq 1$, to define both the level set field, $\phi$, and spatially variable material properties, such as the density $\rho$ and the Young's modulus $E$, using a Solid Isotropic Material with Penalisation (SIMP) interpolation scheme: \begin{equation} \phi( \mathbf{x} ) = \phi_{\scale} \left( \phi_{\thres} - s( \mathbf{x} ) \right), \end{equation} \begin{equation} \rho( \mathbf{x} ) = \left\{ \renewcommand*{\arraystretch}{1.25} \begin{array}{ll} 0, & \forall\ s( \mathbf{x} ) < \phi_{\thres},\\ \rho_{\shift} + \left( \rho_{0} - \rho_{\shift} \right) \frac{\left( s(\mathbf{x}) - \phi_{\thres} \right)}{\left( 1 - \phi_{\thres} \right)}, & \forall\ s( \mathbf{x} ) \geq \phi_{\thres}, \end{array} \right. \end{equation} \begin{equation} E( \mathbf{x} ) = E_0\ \rho^{\beta_{\SIMP}}, \end{equation} where $\phi_{\scale}$ is a scaling parameter that accounts for the mesh size $h$ and is set to $\phi_{\scale} \simeq 3h \dots 5h$, $\phi_{\thres}$ is a threshold that defines the void/solid phases in terms of $s(\mathbf{x})$ and $\rho_{\shift}$, a parameter that controls the minimum density in the solid domain. The properties of the bulk material are denoted by $\rho_0$ and $E_0$, and $\beta_{\SIMP}$ is the SIMP exponent. The resulting interpolation scheme is illustrated in Fig.~\ref{fig_combinedScheme}. Throughout the optimization process, the parameter $\phi_{\thres}$ is kept constant and equal to $\phi_{\thres} = 0.5$, while $\rho_{\shift}$ is a continuation parameter and is gradually increased to $\rho_{\shift} = 1$ during the process. To avoid ill-conditioning, its initial value is set to $\rho_{\shift} \simeq 0.1 \dots 0.2$, unless a smaller value is required to satisfy an initial mass or volume constraint. Contrary to classical density-based approaches, the density here is used primarily for hole seeding and for convergence acceleration. A $0-1$ material distribution is achieved through continuation on the parameter $\rho_{\shift}$. A low SIMP exponent, e.g., $\beta_{\SIMP} = 2.0$, is used to reduce the bias of the density method to rapidly separate the material distribution into a solid and void phase. For the proposed mesh adaptation strategy, we have observed that using a low SIMP exponent promotes the formation of fine features, especially when starting from coarse meshes. \begin{figure}[h]\center \includegraphics[scale=1]{figures/LSDensity/fig_combinedScheme2.pdf} \caption{Interpolation of the level set $\phi(\mathbf{x})$ and the density $\rho(\mathbf{x})$ for the combined level set/density scheme.} \label{fig_combinedScheme} \end{figure} In this paper, both approaches, i.e., the seeding of holes in the initial design and the combined level set/density scheme, are considered and compared. \section{Mesh adaptivity}\label{meshAdaptivity} This section focuses on the strategies used to perform hierarchical mesh refinement. First, we introduce the notion of a hierarchical mesh. We recall the basic concepts of mesh refinement and detail our implementation of the refinement strategy. Finally, the considered user-defined criteria, used to trigger mesh adaptation, are explained in detail. \subsection{Hierarchical mesh}\label{hierarchicalMesh} In this work, a regular background tensor grid is used to build hierarchical meshes. The elements of the background grid do not carry any notion of interpolation, i.e., an element of the background grid is not associated with B-spline bases or Lagrange nodes. Starting from a uniform background grid with a refinement level $l^{0}$ and subdividing its elements, elements with a higher refinement level $l > l^{0}$ are created. Formally to define a hierarchical mesh of depth $n$, a sequence of subdomains $\Omega^{l}$ is introduced: \begin{equation} \Omega^{n-1} \subseteq \Omega^{n-2} \subseteq \dots \subseteq \Omega^{0} = \Omega, \end{equation} where each subdomain $\Omega^l$ is the subregion of $\Omega$ selected to be refined at the level $l$ and is the union of elements on the level $l-1$. The creation of such a refinement pattern is illustrated in Fig.~\ref{fig_hierarchicalRefinedMesh}. \begin{figure}[ht]\center \includegraphics[width=0.25\columnwidth]{figures/BSpline/fig_hMesh2}\hspace{0.25cm} \includegraphics[width=0.175\columnwidth]{figures/BSpline/fig_hMesh} \caption{Hierarchical refined mesh.} \label{fig_hierarchicalRefinedMesh} \end{figure} In Section~\ref{HBSplineBasis}, these subdomains $\Omega^{l}$, refined to a level $l$, are used to create hierarchical B-spline bases to interpolate the design and state variable fields. \subsection{Local refinement strategies}\label{refinementStrategies} This subsection focuses on the refinement strategies used in this paper and explains their implementation. Before refinement is carried out by element subdivision, elements need to be flagged for adaptation. Elements can be flagged based on one or several user-defined criteria and on additional mesh regularity requirements. A complete refinement step proceeds as stated in Algorithm~\ref{alg_refinement}. Initially, elements are flagged for refinement based on user-defined criteria, as further explained in Section~\ref{userDefinedCriteria}. Additionally, elements are flagged within a so-called buffer region, around the previously flagged elements, so that the obtained refined mesh complies with specific regularity requirements, as further detailed in Section~\ref{bufferCriterion}. Finally, a minimum refinement level $l_{\min}$ is enforced and elements with $l< l_{\min}$ are flagged and refined. To increase performance, flagged elements are collected in a refinement queue first and refined afterwards. \begin{algorithm}[ht]\center \begin{algorithmic}[1] \State{Apply refinement strategy in Algorithm~\ref{Alg_refinementStrategy} } \State{Collect flagged elements into queue for refinement} \While{change in refinement queue} \For{all elements in queue for refinement} \State{Apply refinement buffer in Algorithm~\ref{alg_refinementBuffer}} \State{Collect flagged elements in queue for refinement} \EndFor \EndWhile \State{Refine elements in refinement queue} \For{all elements} \If{element refinement level $l< l_{\min}$} \State{Flag element for refinement} \State{Refine element in refinement queue} \EndIf \EndFor \end{algorithmic} \caption{Refinement algorithm.} \label{alg_refinement} \end{algorithm} In this paper, design and state variables are defined on a common mesh, although the interpolation order may differ. Thus, the discretization of both fields are adapted simultaneously. While the proposed framework allows for separately refining state and design variable fields, this option is not considered here for the sake of simplicity. After each adaptation of the mesh, the design variable field used for the geometry description is mapped to the new refined mesh through an $L^{2}$ projection. This projection step requires an additional linear solve for a system which size depends on the number of design DOFs. \subsubsection{User-defined refinement criteria}\label{userDefinedCriteria} Refinement can be triggered by one or several user-defined criteria, including geometry criteria or finite element error indicators, although the latter are not considered here. In this paper, refinement is applied after a given number of optimization steps using a purely geometric criterion, i.e., the distance to the solid-void interfaces. During each refinement step, an element is flagged for refinement or for keeping its current refinement level by the Algorithm~\ref{Alg_refinementStrategy}. Each element mesh is flagged for refinement depending on its nodal level set values $\phi$. The parameter $\phi_{\bw}$ defines the bandwidth around the interface which is refined. This allows fine-tuning the zone of refinement in addition to the buffer introduced in Section~\ref{bufferCriterion}. Over the course of the optimization process, at the solid-void boundary, the mesh is refined up to a maximum refinement level defined for the interface $l_{\ifc,\max}$. Within the solid phase, the mesh is refined up to a maximum refinement level $l_{\solid,\max}$, that is usually equal or smaller than the interface one, $l_{\solid,\max} \leq l_{\ifc,\max}$. The void phase is never flagged for refinement. However, by applying an initial minimum refinement level, which is lowered to the lowest allowable level of refinement $l_{\min}$ throughout the mesh adaptive process, a coarsening effect is achieved. \begin{algorithm}[ht]\center \begin{algorithmic}[1] \State{Step 0. Set $l_{\ifc}$, $l_{\solid}$, and $l_{\void}$ to an initial mesh refinement level $l_{0}$, where $l_{\min} \leq l_{0} \leq \min(l_{\solid,\max}, l_{\ifc,\max})$.} \State{Step 1. Flag elements} \For{all elements} \If{$- \phi_{\bw} \leq \phi \leq + \phi_{\bw}$} \If{$l_{\current} < l_{\ifc}$} \State{Refine} \Else \State{Keep} \EndIf \EndIf \If{$\phi < -\phi_{\bw}$} \If{$l_{\current} < l_{\solid}$} \State{Refine} \Else \State{Keep} \EndIf \EndIf \If{$\phi > + \phi_{\bw}$} \If{$l_{\current} > l_{\void}$} \State{Do nothing} \Else \State{Keep} \EndIf \EndIf \EndFor \State{Step 2. Increase/reduce refinement levels} \State{$l_{\ifc} = \min(l_{\ifc+1}, l_{\ifc,\max})$} \State{$l_{\solid} = \min(l_{\solid+1}, l_{\solid,\max})$} \State{$l_{\void} = \max(l_{\void -1}, l_{\min})$} \end{algorithmic} \caption{Refinement strategy.} \label{Alg_refinementStrategy} \end{algorithm} In the course of the optimization process, the shape of the solid-void interface changes and the interface may intersect elements previously not refined. In this study, the mesh is adapted to maintain a uniform refinement level for all intersected elements. Although not required by the proposed framework, this strategy is used here as it simplifies the XFEM enrichment, see Section~\ref{XFEM}. The same enrichment algorithm can be used for all intersected elements, as is the case for uniformly refined meshes. To this end, Algorithm~\ref{alg_refinement} is executed, omitting Step 2 of Algorithm~\ref{Alg_refinementStrategy}. \subsubsection{Mesh regularity requirements}\label{bufferCriterion} In this paper, we limit the size difference between adjacent elements in the refined mesh, i.e., a refinement of more than a factor 4 in 2D and 8 in 3D is not allowed. Although not mandatory, see studies by \cite{JENSEN2016} and \cite{PANESAR2017}, this rule is adopted in most works dedicated to adaptivity as it promotes accurate analysis results. This requirement can be achieved by enforcing a so-called buffer zone around elements primarily flagged for refinement. The width of the buffer zone $d_{\buffer}$ for a particular flagged element is calculated by multiplying its size with a user-defined buffer parameter $b_{\buffer}$. The width of the buffer zone must be larger than the support size of the considered interpolation functions. Using B-splines, it means that $b_{\buffer} \geq p$, where $p$ is the polynomial degree of the used B-spline basis. The mesh refinement procedure for building a buffer zone is summarized in Algorithm~\ref{alg_refinementBuffer}. Within a refined mesh, coarse elements are called parents and refined elements, children. The algorithm is applied to each flagged element and starts by determining its parent element. The refinement status of the parent's neighbors, i.e., elements lying within the buffer range of the considered parent, is checked. If these neighbors are neither refined nor flagged for refinement, the distance $d_{\max}$ between the considered parent element and its neighbors is calculated. If the distance $d_{\max}$ is smaller than the buffer size $d_{\buffer}$, the neighbor elements are flagged for refinement. The algorithm is then applied recursively to all newly flagged neighbor elements, until no extra element are flagged. An easy and efficient access to hierarchical mesh information, such as neighborhood relationships, is provided by using a quadtree and an octree data structure in 2D and 3D respectively. \begin{algorithm}[ht]\center \begin{algorithmic}[1] \State{Get parent} \State{Get parent's neighbors in buffer range $d_{\buffer}$} \If{neighbor is not refined and not flagged for refinement} \State{Calculate distance $d_{\max}$ between the flagged element and the neighbor} \If{$d_{\max} < d_{\buffer}$} \State{Flag neighbor for refinement} \State{Apply refinement buffer Algorithm~\ref{alg_refinementBuffer} for neighbor} \EndIf \EndIf \end{algorithmic} \caption{Refinement buffer algorithm.} \label{alg_refinementBuffer} \end{algorithm} \section{Hierarchical B-splines}\label{HBSplineBasis} This section focuses on hierarchical B-splines for adaptively discretizing design variable and state variable fields. First the basic concepts of B-splines in one and multiple dimensions are recalled. Then the principle of B-spline refinement and the construction of truncated and non-truncated hierarchical B-spline bases are briefly described. \subsection{Univariate B-spline basis functions}\label{uniBSpline} Starting from a knot vector $\Xi = \{ \xi_{1},\xi_{2}, \dots ,\xi_{n+p+1} \}$, for which $\xi \in \mathbb{R}$ and $\xi_{1} \leq \xi_{2} \leq \dots \leq \xi_{n+p+1}$, a univariate B-spline basis function $N_{i,p}(\xi)$ of degree $p$ is constructed recursively starting from the piecewise constant basis function: \begin{equation} N_{i,0}(\xi) = \begin{cases} 1, & \text{if}\ \xi_{i} \leq \xi \leq\xi_{i+1},\\ 0, & \text{otherwise}, \end{cases} \end{equation} and using the Cox de Boor recursion formula (\cite{DEBOOR1972}) for higher degrees, $p > 0$: \begin{equation} \begin{split} N_{i,p}(\xi) = & \frac{\xi - \xi_{i}}{\xi_{i+p} - \xi{i}}\ N_{i,p-1}(\xi)\\ & \hspace{1.25cm} + \frac{\xi_{i+p+1} - \xi}{\xi_{i+p+1} - \xi{i+1}}\ N_{i+1,p-1}(\xi). \end{split} \end{equation} A knot is said to have a multiplicity $k$ if it is repeated in the knot vector. The corresponding B-spline basis exhibits a $C^{p-k}$ continuity at that specific knot, while it is $C^{\infty}$ in between the knots. A knot span is defined as the half open interval $[\xi_i, \xi_{i+1})$. Within this context, an element is defined as a nonempty knot span. \subsection{Tensor-product B-spline basis functions}\label{tensorBSplines} Tensor-product B-spline basis functions $B_{i,p}(\xi)$ are obtained by applying the tensor product to univariate B-spline basis functions. Denoting the parametric space dimension as $d_{p}$, a tensor-product B-spline basis is constructed starting from $d_{p}$ knot vectors $\Xi^{m} = \{\xi_{1}^{m},\xi_{2}^{m},\-\dots,\-\xi_{n_{m}+p_{m}+1}^{m}\}$ with $p_{m}$ donating the polynomial degree and $n_{m}$ the number of basis functions in the parametric direction $m = 1, \dots, d_{p}$. A tensor-product B-spline basis function is generated from $d_{p}$ univariate B-splines $N_{i_{m},p_{m}}^{m}(\xi^{m})$ in each parametric direction $m$ as: \begin{equation} B_{\mathbf{i},\mathbf{p}}(\boldsymbol{\xi}) = \prod_{m=1}^{d_{p}} N_{i_{m},p_{m}}^{m}(\xi^{m}), \label{Eq_multiTensorProd} \end{equation} where the position in the tensor product structure is given by the index $\mathbf{i} =\{ i_{1}, \dots, i_{d_{p}} \}$ and $\mathbf{p} = \{ p_{1}, \dots, p_{d_{p}} \}$ is the polynomial degree. Similar to the univariate case, an element is defined as the tensor product of $d_{p}$ nonempty knot spans. Additionally, a B-spline space $\mathcal{V}$ is defined as the span of B-spline basis functions. \subsection{B-spline refinement}\label{BSplineRefinement} Hierarchical refinement of uniform B-splines can be a\-chieved by subdivision. A univariate B-spline basis function can be expressed as a linear combination of $p+2$ contracted, translated and scaled copies of itself: \begin{equation} N_{p}(\xi) = 2^{-p}\sum_{j=0}^{p+1}\binom{p+1}{j}N_{p}(2\xi-j), \end{equation} where the binomial coefficient is defined as: \begin{equation} \binom{p+1}{j} = \frac{(p+1)!}{j!(p+1-j)!}. \end{equation} Figure~\ref{fig_BSplineSubdivision} shows the refinement of a quadratic univariate B-spline basis function obtained by subdivision. \begin{figure}[h]\centering \includegraphics[width=0.45\columnwidth]{figures/BSpline/fig_BsplineRefinement} \caption{Subdivision of a quadratic B-spline basis function (black) into $p+2$ contracted B-spline basis functions of half the knot span width (blue).} \label{fig_BSplineSubdivision} \end{figure} The extension of the subdivision property in Eq.~\eqref{Eq_multiTensorProd} to tensor-product B-spline basis functions $B_{p}$ is straightforward as they exhibit a tensor product structure: \begin{equation} B_{\mathbf{p}}(\boldsymbol{\xi}) = \sum_{\mathbf{j}} \left( \prod_{m=1}^{d} 2^{-p_{m}}\ \binom{p_{m}+1}{j_{m}}\ N_{p_{m}}(2\xi^{m}-j_{m}) \right), \end{equation} where the indices $\mathbf{j} = \{i_{1}, \dots, i_{d_{p}}\}$ indicate the position in the tensor product structure. \subsection{Hierarchical B-splines}\label{HBSpline} To build a hierarchical B-spline basis a sequence of tensor product B-spline spaces is introduced: \begin{equation} \mathcal{V}^{0} \subset \mathcal{V}^{1} \subset \mathcal{V}^{2} \subset \mathcal{V}^{3} \subset \dots \end{equation} Each B-spline space $\mathcal{V}^{l}$ has a corresponding basis $\mathcal{B}^{l}$. A hierarchical B-spline basis $\mathcal{H}$ can be constructed recursively based on the sequence of B-spline bases $\mathcal{B}^{l}$ that span the domains $\Omega^{l}$. In an initial step, the basis functions defined on the coarsest level, $l=0$, are collected and assigned to $\mathcal{H}^{0}$. The hierarchical B-spline basis $\mathcal{H}^{l+1}$ is constructed by taking the union of all basis functions $B$ in $\mathcal{H}^{l}$ whose support is not fully enclosed in $\Omega^{l+1}$ and all basis functions $B$ in $\mathcal{B}^{l+1}$ whose support lies in $\Omega^{l+1}$. The recursive algorithm reads (\cite{GARAU2018}): \begin{equation} \left\{ \begin{array}{lll} \mathcal{H}^0 & =: & \mathcal{B}^0\\[5pt] \mathcal{H}^{l+1} & =: & \{ B \in \mathcal{H}^{l}\ |\ \supp(B) \not\subseteq \Omega^{l+1}\}\ \cup \\[5pt] &&\{ B \in \mathcal{B}^{l+1}\ |\ \supp(B) \subseteq \Omega^{l+1}\},\\[5pt] &&\mbox{for}\ l = 0, \dots, n-2,\\ \end{array} \right. \label{Eq_recursiveAlgorithm} \end{equation} where the index $l$ gives the level of refinement. Basis functions collected in $\mathcal{H}$, where $\mathcal{H} = \mathcal{H}^{n-1}$, are called active, while basis functions in $\mathcal{B}^{l}$ not present in $\mathcal{H}$ are said to be inactive. A hierarchical B-spline basis $\mathcal{H}$ is illustrated for a one dimensional example in Fig.~\ref{fig_MeshRefinement1D}. The top row shows a one dimensional hierarchical refined mesh. Following Algorithm~\ref{Eq_recursiveAlgorithm}, a B-spline basis $\mathcal{H}$ is created through an initialization step with all bases in the subdomain $\Omega^{0}$ refined to a level $l=0$. Recursively all bases in the subdomain $\Omega^{l+1}$ with higher refinement level $l+1$ are added, while existing basis functions of level $l$ fully enclosed in $\Omega^{l+1}$ are discarded. \begin{figure}\center \includegraphics[width=0.5\columnwidth]{figures/BSpline/fig_3LevelRefinement} \caption{Three levels of refinement on a given mesh. The refined mesh is depicted in the top figure. The three underlying figures present the three levels of refinement considered here. Within these three levels, the active B-spline basis $\mathcal{H}$ is displayed in black, while the inactive B-spline basis functions are displayed in gray.} \label{fig_MeshRefinement1D} \end{figure} Contrary to \textit{h}-refinement in classical finite element where extra treatments, such as the introduction of multi-point constraints, are necessary, hanging nodes in hierarchical refined meshes are naturally handled by the B-spline basis. \subsection{Truncated B-splines}\label{TBSpline} A major drawback of hierarchical B-spline bases is the loss of the PU property. The truncated hierarchical B-spline basis constitutes an extension of the hierarchical B-spline basis, aiming at recovering the PU principle and at reducing the number of overlapping functions on adjacent hierarchical levels, see \cite{GIANNELLI2012}. Considering a basis function $B^{l}$, part of $\mathcal{B}^{l}$ and defined on the domain $\Omega^{l}$, its representation in terms of the finer basis of level $l+1$ is given as: \begin{equation} B^{l} = \sum_{B^{l+1}\ \in\ \mathcal{B}^{l+1}} c_{B^{l+1}}^{l+1} \left( B^{l} \right)\ B^{l+1}, \end{equation} where $c_{B^{l+1}}^{l+1}$ is the coefficient associated to a basis function $B^{l+1}$. The truncation of this basis function $B^{l}$, whose support overlaps with the support of finer basis functions $B^{l+1}$, part of $\mathcal{B}^{l+1}$ and defined on $\Omega^{l+1}$, is expressed as (\cite{GIANNELLI2012, GARAU2018}): \begin{equation} \begin{array}{lll} \trunc^{l+1}(B^{l}) & = &\displaystyle \sum_{ \begin{array}{c} \scalebox{0.75}{$B^{l+1} \in \mathcal{B}^{l+1},$}\\ \scalebox{0.75}{$\supp(B^{l+1}) \not\subseteq \Omega^{l+1}$} \end{array}} c_{B^{l+1}}^{l+1} \left( B^{l} \right)\ B^{l+1},\\[40pt] & = & \displaystyle B^{l} - \sum_{\supp(B^{l+1}) \subseteq \Omega^{l+1}} c_{B^{l+1}}^{l+1} \left( B^{l} \right)\ B^{l+1}.\\ \end{array} \label{Eq_truncatedBSpline} \end{equation} Similar to the creation of a hierarchical B-spline basis $\mathcal{H}$, a truncated hierarchical B-spline basis $\mathcal{T}$ is constructed recursively, but by additionally applying the truncation, see Eq.~\eqref{Eq_truncatedBSpline}, at each iteration (\cite{GIANNELLI2012, GARAU2018}): \begin{equation} \left\{ \begin{array}{lll} \mathcal{T}^0 & =: & \mathcal{B}^0\\[5pt] \mathcal{T}^{l+1} & =: & \{ \trunc^{l+1}(B) \ |\ B \ \mbox{in} \ \mathcal{T}^{l} \wedge \supp(B) \not\subseteq \Omega^{l+1}\}\\[5pt] && \cup\ \{ B \in \mathcal{B}^{l+1} \ |\ \supp(B) \subseteq \Omega^{l+1}\}, \\[5pt] && \mbox{for}\ l = 0, \dots, n-2. \end{array} \right. \label{Eq_truncatedRecursiveAlgorithm} \end{equation} The truncated basis $\mathcal{T}$ spans the same space as the non-truncated basis $\mathcal{H}$, but its underlying functions exhibit the following properties. They are defined on smaller supports which results in a sparser stiffness matrices in a finite element analysis. The PU property is restored which allows for the imposition of bounds on variables. In addition, truncated bases admit a strong stability property (\cite{GIANNELLI2014}), which enables the construction of optimal multi-level solvers (\cite{HOFREITHER2016}). However, this properties is not exploited in this paper, as the displacements are interpolated by linear B-splines. The effect of the truncation is illustrated in Fig.~\ref{fig_truncation1D}. A univariate truncated and non-truncated basis $\mathcal{T}$ and $\mathcal{H}$ are juxtaposed for comparison. The comparison shows the reduced support of the truncated B-splines. The effect of truncation on the support of a multivariate, two dimensional B-spline basis is shown in Fig.~\ref{fig_truncatedKidney}. Truncated multivariate B-splines present a characteristic kidney shaped support zone. \begin{figure*}[ht]\center \includegraphics[width=.45\textwidth]{figures/BSpline/fig_nonTruncatedRefinement}\hspace{0.5cm} \includegraphics[width=.45\textwidth]{figures/BSpline/fig_truncatedRefinement} \caption{Comparison of univariate HB-spline (left) and THB-spline basis functions (right). The first and second levels correspond to $\Omega^0$ and $\Omega^1$ respectively, while the bottom level represents the combination of the functions on these two levels.} \label{fig_truncation1D} \end{figure*} \begin{figure*}[ht]\center \includegraphics[width=.25\textwidth]{figures/BSpline/fig_nonTruncation_18} \hspace{0.5cm} \includegraphics[width=.25\textwidth]{figures/BSpline/fig_nonTruncation_21} \hspace{0.5cm} \includegraphics[width=.25\textwidth]{figures/BSpline/fig_nonTruncation_31}\\ \vspace{0.7cm} \includegraphics[width=.25\textwidth]{figures/BSpline/fig_truncation_18} \hspace{0.5cm} \includegraphics[width=.25\textwidth]{figures/BSpline/fig_truncation_21} \hspace{0.5cm} \includegraphics[width=.25\textwidth]{figures/BSpline/fig_truncation_31}\\ \caption{Comparison of multivariate HB-spline (top) and THB-spline (bottom) supports. While the non-truncated HB-spline basis functions show a uniform support zone, the support zone of THB-spline basis functions exhibit a characteristic kidney shape.} \label{fig_truncatedKidney} \end{figure*} \section{Structural analysis}\label{StructAnalysis} Whereas the proposed adaptive discretization scheme is not limited to any particular physics problem, in this paper, we consider solid-void problems as illustrated in Fig.~\ref{fig_designDomain}, where the material subdomain $A$ is filled with a linear elastic solid, while the material subdomain $B$ is void. In this section, we present the variational form of the governing equations for the linear elastic analysis model. As the XFEM is used to discretize the state variable fields in the solid domain, the basic principles of the method are briefly recalled. \subsection{Governing equations}\label{govEq} We solve for static equilibrium to enforce balance of linear momentum within the solid domain $\Omega^A$. In this work, the total residual $\mathcal{R}$, i.e., the weak form of the governing equations, consists of four terms which are discussed subsequently: \begin{equation} \mathcal{R} = \mathcal{R}_{\Lin} + \mathcal{R}_{\Nitsche} + \mathcal{R}_{\Ghost} + \mathcal{R}_{\Spring}. \label{Eq_RFull} \end{equation} The weak form of the linear elastic governing equation reads: \begin{equation} \displaystyle \mathcal{R}_{\Lin} = \int_{\Omega^A}\ \delta \boldsymbol{\varepsilon} : \boldsymbol{\sigma}\ d\Omega - \int_{\Gamma_N^A} \delta \mathbf{u} \cdot \mathbf{t}_{N}\ d\Gamma, \label{Eq_RLin} \end{equation} where $\mathbf{u}$ and $\delta \mathbf{u}$ are the displacement field and the test function, respectively. Traction forces, $\mathbf{t}_N$, are applied on the Neumann boundary, $\Gamma_N^A$. The Cauchy stress tensor is denoted by $\boldsymbol{\sigma} = \mathbf{D}\ \boldsymbol{\varepsilon}$ and is obtained by multiplication of the infinitesimal strain tensor $\boldsymbol{\varepsilon} = \frac{1}{2} \left( \nabla \mathbf{u} + \nabla \mathbf{u}^T \right)$ with the fourth order constitutive tensor $\mathbf{D}$, here for isotropic linear elasticity. To weakly enforce prescribed displacements on Dirichlet boundaries, the static equilibrium in Eq.~\eqref{Eq_RLin} is augmented with Nitsche's method, see \cite{NITSCHE1971}: \begin{equation} \renewcommand{\arraystretch}{2.25} \begin{array}{lll} \mathcal{R}_{\Nitsche} & = & \displaystyle - \int_{\Gamma^{AB}} \delta \mathbf{u} \cdot \left( \boldsymbol{\sigma} \cdot \mathbf{n}_{\Gamma} \right) d\Gamma\\ & & \displaystyle + \int_{\Gamma^{AB}} \delta \left( \boldsymbol{\sigma} \cdot \mathbf{n}_{\Gamma} \right) \cdot \left( \mathbf{u} - \mathbf{u}_D \right)\ d\Gamma\\ & & \displaystyle + \gamma_{N} \int_{\Gamma^{AB}} \delta \mathbf{u} \cdot \left( \mathbf{u} - \mathbf{u}_D \right)\ d\Gamma, \end{array} \label{Eq_RNitsche} \end{equation} where $\mathbf{u}_D$ are the displacement imposed on the Dirichlet boundary $\Gamma^{A}_{D}$. The parameter $\gamma_{N}$ is chosen to achieve a certain accuracy in satisfying the boundary conditions and is a multiple of the ratio $E/h$, where $E$ is the Young's modulus of the considered material and $h$ is the edge length of the intersected elements. Using immersed boundary techniques, see Sec\-tion \ref{XFEM}, numerical instabilities arise when either the contributions of the DOFs interpolating the displacement field on the residual vanish and/or these contributions become linearly dependent. These issues typically arise when the level set field intersects elements such that small material subdomains emerge. This results in an ill-conditioning of the equation system and inaccurate prediction of displacement gradients along the interface. The face-oriented Ghost stabilization proposed by \cite{BURMAN2014} is used in this work to mitigate this issue. Using a virtual work based formulation, the jump in the displacements gradients is penalized across the faces belonging to intersected elements by augmenting the residual equations with: \begin{equation} \mathcal{R}_{\Ghost} = h\ \gamma_{G}\ \sum_{F \in \mathcal{F}_{\cut}} \int_{F} \llbracket \delta \boldsymbol{\varepsilon} \cdot \mathbf{n}_F \rrbracket \llbracket \boldsymbol{\sigma} \cdot \mathbf{n}_{F} \rrbracket\ d\Gamma, \label{Eq_RGhost} \end{equation} where $F$ is a specific face belonging to $\mathcal{F}_{\cut}$, the set of element faces cut by the interface, and $\mathbf{n}_{F}$ is the outward normal to face $F$. The jump operator $\llbracket \bullet \rrbracket$ computes quantities between adjacent elements $A$ and $B$ as $\llbracket \bullet \rrbracket = \bullet^{A} -\bullet^{B}$. The Ghost penalty parameter is denoted $\gamma_{G}$ and typically takes its value in the range $0.1 \dots 0.001$. In contrast to the displacement based formulation of \cite{BURMAN2014}, Eq.~\eqref{Eq_RGhost} allows for different materials in adjacent elements. During the optimization process, isolated islands of material can emerge and develop in the design domain. This leads to a singular system of equations, as the rigid body modes associated to these free-floating material islands are not suppressed or constrained. To prevent this issue, we adopt the selective structural spring approach proposed and successfully implemented in \cite{VILLANUEVA2017, GEISS2018, GEISS2019a}. An additional stiffness term is added to the weak form of the governing equations: \begin{equation} \mathcal{R}_{\Spring} = \int_{\Omega^A}\ \gamma_{\spring}\ k_{\spring}\ \delta \mathbf{u} \cdot \mathbf{u}\ d\Omega, \label{Eq_RSpring} \end{equation} where the parameter $\gamma_{\spring}$ is set to a value ranging from 0 to 1 depending on the solution of an additional diffusion problem, so that a fictitious spring stiffness $k_{\spring}$ is only applied to solid subdomains disconnected from any mechanical boundary conditions. The spring stiffness $k_{\spring}$ is set to $E/h^2$, where $E$ is the Young's modulus of the considered material and $h$ the element edge width. \subsection{The extended finite element method (XFEM)}\label{XFEM} The XFEM was developed by \cite{MOES1999} to model crack propagation without remeshing. The me\-thod allows capturing discontinuous or singular behaviors within a mesh element by adding specific enrichment functions to the classical finite element approximation. Here, following the work by \cite{TERADA2003}, \cite{HANSBO2004}, \cite{MAKHIJA2014}, a generalized Heaviside enrichment strategy with multiple enrichment levels is used. This particular enrichment enhances the classical finite element interpolation with additional shape functions which then results in independent interpolation into disconnected subdomains. Considering a two-phase problem, the displacement field $\mathbf{u}(\mathbf{x})$ is approximated with the Heaviside enrichment: \begin{equation} \renewcommand*{\arraystretch}{1.5} \begin{array}{l} \displaystyle \mathbf{u}^h(\mathbf{x}) = \sum_{m=1}^{M} \left( H(-\phi(\mathbf{x})) \sum_{i \in I^{\star}}\ B_i(\mathbf{x})\ u_{im}^{A}\delta_{ml}^{Ai} \right.\\ \displaystyle \hspace{2.5cm} \left. +\ H(\phi(\mathbf{x})) \sum_{i \in I^{\star}}\ B_i(\mathbf{x})\ u_{im}^{B}\ \delta_{ml}^{Bi} \right), \end{array} \end{equation} where $I^{\star}$ is the set of all the B-spline coefficients in the analysis mesh, $B_i(\mathbf{x})$ is the B-spline basis function associated with the $i^{th}$ coefficient and $u^I_{im}$ is the vector of displacement DOF associated with the $i^{th}$ coefficient for material phase $I = A, B$. The number of active enrichment levels is denoted $M$ and the Kronecker delta $\delta_{ml}^{Ii}$ is used to select the active enrichment level $m$ for the $i^{th}$ coefficient and material phase $I$. This selection ensures the satisfaction of the PU principle (\cite{BABUSKA1997}), as only one set of DOFs is used to interpolate the solution at a given point $\mathbf{x}$. For simplicity, the interpolation of the displacement field is restricted to first order functions. The Heaviside function $H$ is defined as: \begin{equation} H(z) = \left\{ \begin{array}{ll} 1, & \quad \mbox{if}\ z > 0,\\ 0, & \quad \mbox{if}\ z < 0. \end{array} \right. \end{equation} Using the Heaviside enrichment, the integration of the weak form of the governing equations has to be performed separately on each material phase. Therefore, intersected elements are decomposed into integration subdomains, i.e., into triangles in two dimensions and into tetrahedra in three dimensions. For further details on the decomposition approach, the reader is referred to \cite{VILLANUEVA2014}. \section{Optimization problem}\label{optProblem} In this paper, we focus on minimum compliance designs considering mass either via a constraint or a component of the objective. The optimization problem is formulated as follows: \begin{equation} \renewcommand{\arraystretch}{1.25} \begin{array}{ccl} \displaystyle \min_{0 \leq \mathbf{s} \leq 1} & \mathcal{Z}(\mathbf{s}, \mathbf{u}(\mathbf{s}))\ &+\ c_p\ \mathcal{P}_{p}(\mathbf{s})/\mathcal{P}_0\\ &\displaystyle +\ c_{\phi}\ \left(\ \mathcal{P}_{\phi}\left( \phi(\mathbf{s}) \right) \right. &+\ \left. \mathcal{P}_{\nabla \phi} \left( \nabla \phi(\mathbf{s}) \right) \right)/\mathcal{P}_{0} \\ \mbox{s.t.} &\displaystyle \mathcal{M}^{A}(\mathbf{s})/\mathcal{M}(\mathbf{s}) - c_m & \leq 0.\\ \end{array} \label{Eq_optFormulation} \end{equation} The functional $\mathcal{Z}$ is a weighted sum of the compliance and the mass, both evaluated over the solid domain, \begin{equation} \mathcal{Z}(\mathbf{s}, \mathbf{u}(\mathbf{s})) = w_s \frac{\mathcal{S}( \mathbf{s}, \mathbf{u}(\mathbf{s}))}{\mathcal{S}_0} + w_m \frac{\mathcal{M}^{A}(\mathbf{s})}{\mathcal{M}_0}, \end{equation} where $\mathcal{S}$ is the strain energy, $\mathcal{S}_0$ is the initial strain energy value, $\mathcal{M}^{A}$ the mass of material phase $A$, $\mathcal{M}_0$ is the initial mass value and $w_s$ and $w_m$ are the weighting factors. The perimeter associated to the domain boundary is denoted by $\mathcal{P}_p$ and its initial value is $\mathcal{P}_0$. The penalty functions $\mathcal{P}_{\phi}$ and $\mathcal{P}_{\nabla \phi}$ are used to regularize the level set field around and away from the interface and are further discussed in Section~\ref{lsReg}. The parameters $c_p$ and $c_{\phi}$ are the penalties associated with the perimeter and the regularization respectively. The mass constraint ensures that the ratio of material phase $A$, $\mathcal{M}^{A}$, and the total mass, $\mathcal{M}$, is smaller or equal to $c_m$. Note that enforcing the bounds on the design variable $\mathbf{s}$ is conveniently achieved using THB-splines as they form a convex hull, while it requires extra handling when using HB-splines. On purpose, we do not consider any means to control the feature size. One goal of this paper is to study the influence of the proposed adaptive hierarchical B-spline discretization on the optimization results, including the ability to resolve fine features. To allow the emergence of such features, no feature size control is imposed. In this work, we solve the discretized optimization problem in the reduced space of only the design variables by a gradient-based algorithm. For each candidate design generated in the optimization process, the state variables are determined by solving the discretized governing equations; see Section~\ref{StructAnalysis}. \subsection{Level set regularization scheme}\label{lsReg} To ensure that the spatial gradient near the solid-void interface is approximately uniform and matches a target gradient norm over the span $[-\phi_{\vt},\ \phi_{\vt}]$, a level set regularization scheme is used. The scheme also enforces convergence to a target positive $\phi_{\up}$ or negative $\phi_{\low}$ value away from the interface, as depicted in Fig.~\ref{fig_lsReg}. \begin{figure}[h]\center \includegraphics[scale=1]{figures/LSDensity/fig_lsRegIdeal} \caption{Target level set function.} \label{fig_lsReg} \end{figure} Such a scheme requires the identification of the vicinity of the solid-void interface. The level set values are often used for this purpose. However, unless the LSF is constructed as an approximation or as an exact signed distance field, this approach lacks robustness and may lead to spurious oscillations in the level set field, see \cite{GEISS2019b}. In this study, we do not compute a signed distance field. Instead, we identify the proximity of a point to the solid-void interface by building a so-called \textit{level of neighborhood} (LoN) $\mathcal{I}(\mathbf{x})$ of a point with respect to a point belonging to an intersected element. The LoN is evaluated at the nodes of the considered mesh, providing the LoN value $\mathcal{I}_i$ at each node $i$. The approach is illustrated in Fig.~\ref{fig_lsRegNeighbor}. The process starts with identifying intersected elements and setting the LoN $\mathcal{I}$ of all nodes belonging to these elements to one; otherwise $\mathcal{I}$ is set to zero. In a recursive loop over all elements and nodes, first the elements having a node with a LoN value larger than zero are flagged and then the LoN values of nodes belonging to a flagged element are increased by one. The region with LoN values larger than zero widens with the number of times the loop, $N_{\LoN}$, is executed. Thus, the maximum LoN value $\mathcal{I}_{\max}$ equals $N_{\LoN}$. The use of these nodal LoN values is discussed below. \begin{figure*}[ht]\center \begin{tabular}{ccc} \includegraphics[scale=1]{figures/LSDensity/fig_lsRegNeighbor2D} \quad &\includegraphics[scale=1]{figures/LSDensity/fig_lsRegNeighbor2D_2} \quad &\includegraphics[scale=1]{figures/LSDensity/fig_lsRegNeighbor2D_3} \quad \\ $\mathcal{I}_{\max} = 1$ & $\mathcal{I}_{\max} = 2$ & $\mathcal{I}_{\max} = 3$ \end{tabular} \caption{Definition of the \textit{level of neighborhood} (LoN).} \label{fig_lsRegNeighbor} \end{figure*} To promote the convergence of the level set field to a target field, two penalty functions, $\mathcal{P}_{\phi}$ and $\mathcal{P}_{\nabla \phi}$, are added to the optimization problem objective, see Eq.~\eqref{Eq_optFormulation}. The first term penalizes the difference between the level set value $\phi$ and, depending on its sign, the lower or upper target value $\phi_{\target}$ away from the interface: \begin{equation} \mathcal{P}_{\phi} = \displaystyle \int_{\Omega} \alpha_1\ (1-w)\ \left( \frac{\phi(\mathbf{s})}{\phi_{\target}} - \sign(\phi) \right)^2\ d\Omega, \label{Eq_lsReg1} \end{equation} where $\phi_{\target}$ is set as a multiple of the element edge size of the initial mesh $h_{\init}$, i.e., the mesh with the initial refinement level. The second term penalizes both the difference between the norm of the spatial gradient of the level set field $\nabla \phi$ and a target gradient norm $\nabla \phi_{\target}$ near the interface and the norm of the spatial gradient of the level set field $\nabla \phi$ away from the interface: \begin{equation} \begin{array}{lll} \mathcal{P}_{\nabla \phi} & = &\displaystyle \int_{\Omega} \alpha_2\ w\ \left( \frac{\vert \vert \nabla \phi(\mathbf{s}) \vert \vert}{\vert \vert \nabla \phi_{\target} \vert \vert} - 1.0 \right)^2\ d\Omega\\[10pt] & + &\displaystyle \int_{\Omega} \alpha_3\ (1-w)\ {\vert \vert \nabla \phi \vert \vert\ }^2\ d\Omega.\\ \end{array} \label{Eq_lsReg2} \end{equation} where $\alpha_1$, $\alpha_2$ and $\alpha_3$ are weighting factors. The parameter $w$ is a measure of the distance of a point to the solid-void interface as: \begin{equation} \displaystyle w = e^{-\gamma_{I} \left( \mathcal{I}(\mathbf{x})/\mathcal{I}_{\max}-1 \right)^2}, \label{Eq_lsRegWeight} \end{equation} where $\mathcal{I}(\mathbf{x})$ is the local LoN value, interpolated by the element shape functions using the nodal $\mathcal{I}_i$ values. The parameter $\gamma_{I}$ determines the region around and away from the interface in which the integrals in~\eqref{Eq_lsReg1} and~\eqref{Eq_lsReg2} are evaluated. As the value of $\gamma_{I}$ is increased, the area considered to be in the vicinity of the interface, i.e., the area where the target slope $\vert \vert \nabla \phi_{\target} \vert \vert$ is promoted, shrinks. The parameters $\phi_{\target}$, $\nabla \phi_{\target}$, and $\gamma_{I}$ are user-defined. \subsection{Sensitivity analysis}\label{sensitivity} In this study, we compute the design sensitivities by the adjoint approach. Let us consider an objective or constraint function $\mathcal{F}(\mathbf{u}(\mathbf{s}), \mathbf{s})$ dependent on the design variables. The derivative of this response function with respect to a design variable $s_i$ is computed as follows: \begin{equation} \frac{d \mathcal{F}(\mathbf{u}(\mathbf{s}))}{d s_i} = \frac{\partial \mathcal{F}}{\partial s_i} + \frac{\partial \mathcal{F}}{\partial \mathbf{u}} \frac{d \mathbf{u}}{d s_i}, \end{equation} where the first term of the right-hand side accounts for the explicit dependency on the design variables and the second term for the implicit dependency on the design variables through the state variables. The implicit term is evaluated by the adjoint approach: \begin{equation} \frac{\partial \mathcal{F}}{\partial \mathbf{u}} \frac{d \mathbf{u}}{d s_i} = -\boldsymbol{\lambda}^{T} \frac{\partial \mathcal{R}}{\partial s_i}, \label{Eq_adjointApproach} \end{equation} where $\mathcal{R}$ is the residual defined in Eq.~\eqref{Eq_RFull} for the forward analysis and $\boldsymbol{\lambda}$ are the adjoint responses, evaluated through: \begin{equation} \boldsymbol{\lambda} = \frac{\partial \mathcal{F}}{\partial \mathbf{u}} \left[ \frac{\partial \mathcal{R}}{\partial \mathbf{u}} \right]^{-1}. \label{Eq_adjointResponse} \end{equation} As truncated B-spline basis functions have smaller support than the non-truncated ones, see Fig.~\ref{fig_truncation1D} and~\ref{fig_truncatedKidney}, the zone of influence associated to a given B-spline coefficient is also smaller. This property can be exploited to accelerate the sensitivity analysis. When computing the design sensitivities with a LSM, only the intersected elements need to be considered for evaluating Eq.~\eqref{Eq_adjointResponse}, as only the finite element residuals of these elements depend on the level set field. However, when the seeding approach presented in Section~\ref{Hole} is used, the residual contributions of non-intersected elements within the solid domain also depend on the design variables. Thus, in this case, the partial derivative $\frac{\partial \mathcal{R}}{\partial \mathbf{u}}$ needs to be integrated over all elements in the solid domain. \section{Numerical examples}\label{numExample} We study the proposed level set topology optimization with hierarchical mesh refinement with 2D and 3D examples, focusing on minimum compliance designs considering mass either via a constraint or a component of the objective, see Eq.~\eqref{Eq_optFormulation}. The state variable field, i.e., the displacement field, is discretized in space with bilinear Lagrange quadrangular elements for 2D, and with trilinear Lagrange hexahedral elements for 3D design domains. The design variable field, i.e., the level set field, is discretized with HB- and THB-splines. The design variables are the B-splines coefficients and are used to interpolate nodal values on the Lagrange analysis mesh. The optimization problems are solved by GCMMA (\cite{SVANBERG2002}) and the required sensitivity analysis is performed following the adjoint approach described in Section~\ref{sensitivity}. The parameters for the initial, lower and upper asymptote adaptation in GCMMA are set to 0.05, 0.65 and 1.05 respectively. The optimization problem is considered converged if the absolute change of the objective function relative to the mean of the objective function in the five previous optimization steps drops below $10^{-5}$ and the constraint is satisfied. The refinement strategy described in Section~\ref{refinementStrategies} is adopted and the maximum refinement level for interface and solid elements is set to $l_{\ifc,\max} = l_{\solid,\max} = l_{\max} = 4$. The minimum refinement level is set to $l_{\min} = 0$, the size of the coarsest mesh and the initial mesh refinement level are given with each example. The system of discretized governing equations and adjoint sensitivity equations are solved by the direct solver PARDISO for the 2D problems, see \cite{KOUROUNIS2018}, and by a GMRES algorithm for 3D problems, preconditioned by an algebraic multi-grid solver, see \cite{MLGUIDE}. A relative drop of the linear residual of $10^{-12}$ is required. This strict tolerance is imposed to reduce the influence of the iterative solver on the optimization results. For the first two examples, we provide detailed comparisons between designs generated on uniformly and adaptively refined meshes in terms of performance, a\-chieved geometries and computational cost. Furthermore, we investigate the influence of the B-spline interpolation by varying the interpolation order and applying or omitting truncation. It should be noted that extra treatment is required to impose bounds on the design variables when working with HB-splines, as they do not constitute a PU. Bounds are enforced by clipping the variables values with the upper or lower allowed values. The clipping operation is only applied to the combined level set/density scheme as the density values should remain between 0 and 1. Providing meaningful computational efficiency measures for the adaptive simulations is not trivial as various factors influence the computational cost. As the simulations could not be carried out on the same hardware with the exact same settings due to limited availability to dedicated computing resources, a simple wall-clock time comparison is not possible. Furthermore, different linear solvers and software implementations lead to different dependencies of the computational time on the number of finite element DOFs. Therefore, we measure the computational cost in terms of the evolution of the number of unconstrained DOFs of the finite element models during the optimization process. An efficiency factor $E_{\xfem}$ is defined as the ratio between the total number of unconstrained DOFs in the XFEM model for the most refined uniform mesh and the total number of unconstrained DOFs in the XFEM model for an adaptive mesh. This measure is indicative of the computational gains achieved for XFEM solid-void problems and is expressed as follows: \begin{equation} \displaystyle E_{\xfem} = \frac{\displaystyle \sum_{k = 1}^{N_{\opt}}\ \left( \#DOFs_{\uniform,\xfem}^{(k)} \right)^{n_s} }{\displaystyle \sum_{k=1}^{N_{\opt}}\ \left( \#DOFs_{\adaptive}^{(k)} \right)^{n_s} }, \label{Eq_compCostXFEM} \end{equation} where $\#DOFs_{\uniform,\xfem}^{(k)}$ and $\#DOFs_{\adaptive}^{(k)}$ are the number of unconstrained DOFs in the XFEM models for the uniform and the adaptive meshes at the optimization iteration $k$. $N_{\opt}$ is the number of optimization steps until convergence and is set to $N_{\opt} = \min( N_{\opt, \uniform}, N_{\opt, \adaptive})$. The parameter $n_s$ is an exponent that can be fitted to relate the number of DOFs to the computational effort in terms of floating-point operations or wall clock time, see~\cite{WOZNIAK2014}, for example when a sparse direct linear solver is used and is set to $n_s = 1$ for the 2D and $n_s = 4/3$ for the 3D cases. Alternatively, a measure of the peak resource requirement $R_{\xfem}$ is defined as the ratio between the maximum number of unconstrained DOFs in the XFEM model for the uniform mesh with highest refinement level and the maximum number of unconstrained DOFs in the XFEM model for the adaptive mesh: \begin{equation} \displaystyle R_{\xfem} = \frac{\displaystyle \max \left( \#DOFs_{\uniform,\xfem} \right)^{n_s} }{\displaystyle \max \left( \#DOFs_{\adaptive} \right)^{n_s}}. \label{Eq_maxCompCostXFEM} \end{equation} It should be noted that for an XFEM model, the number of unconstrained DOFs is changing in the course of the optimization process, even on a uniformly refined mesh. For the solid-void problems studied in this paper and because the void domain is omitted in the analysis, the XFEM model reduces the number of DOFs compared to a classical FEM model. To account for these computational gains, we define an efficiency factor $E_{\fem}$, indicative for solid-solid XFEM or solid-void FEM problems, as: \begin{equation} \displaystyle E_{\fem} = \frac{\displaystyle \sum_{k = 1}^{N_{\opt}}\ \left( \#DOFs_{\uniform,\fem}^{(k)} \right)^{n_s} }{\displaystyle \sum_{k=1}^{N_{\opt}}\ \left( \#DOFs_{\adaptive}^{(k)} \right)^{n_s} }, \label{Eq_compCostFEM} \end{equation} where $\#DOFs_{\uniform,\fem}^{(k)}$ is an approximation of the number of unconstrained DOFs for the uniform mesh with highest refinement level at the optimization iteration $k$, assuming that all DOFs are active as is the case for a classical FEM model. A corresponding measure of the peak resource need $R_{\fem}$ is defined as follows: \begin{equation} \displaystyle R_{\fem} = \frac{\displaystyle \max\ \left( \#DOFs_{\uniform,\fem} \right)^{n_s}}{\displaystyle \max\ \left( \#DOFs_{\adaptive} \right)^{n_s}}. \label{Eq_maxCompCostFEM} \end{equation} The measures given by Eq.~\eqref{Eq_compCostXFEM},~\eqref{Eq_compCostFEM},~\eqref{Eq_maxCompCostXFEM},~\eqref{Eq_maxCompCostFEM} for estimating the gains in computational efficiency are solely based on the costs for solving the linear finite element system. It does not account for the costs for building the XFEM model for initializing the linear solver, for the $L^{2}$ projection of the design variable fields, see Section~\ref{refinementStrategies}, for computing the right-hand side of the adjoint system, see Eq.~\eqref{Eq_adjointApproach}, and for the optimization algorithm. The latter computational costs are, however, small typically when compared to building and solving the system of governing equations. \subsection{Two dimensional beam}\label{2DBeam} As illustrated in Fig.~\ref{fig_2D_beam}, the first problem setup consists of a solid-void 2D beam with a length $L = 6.0$ and a height $l = 1.0$. The solid is described by a linear elastic model and an isotropic constitutive behavior, with a Young's modulus $E = 1.0$ and a Poisson's ratio $\nu = 0.3$. The beam is supported on its two lower corners over a length $l_s = 0.025$ and a pressure $p = 1.0$ is applied in the middle of its top span over a length $l_p = 2 \times 0.025$. The data are provided in self-consistent units. \begin{figure}[h]\center \includegraphics[scale=1]{figures/2DMBB/fig_2D_MBB} \caption{Two dimensional beam.} \label{fig_2D_beam} \end{figure} The structure is designed for minimum compliance with a mass constraint of $40 \%$ of the total mass of the design domain. Taking advantage of the symmetry of the problem, only one half of the design domain is considered. Table~\ref{table_2DMBB_parameter} summarizes the problem parameters. \begin{table}[h]\center \caption{Parameter list for the 2D beam optimization problem.} \label{table_2DMBB_parameter} \renewcommand{\arraystretch}{1.5} \begin{tabular}{p{0.45\columnwidth}p{0.45\columnwidth}} \hline Parameter & Value\\ \toprule $w_s$ &0.9\\ $w_m$ & 0.0\\ $c_p$ &0.025\\ $c_{\phi}$ & 0.5\\ $c_v$ &0.4\\ $S_0$ &59.12\\ $P_0$ & 6.0\\ $\phi_{\scale}$ & $5h_{\init}$\\ $V_{\max}$ & 6.0\\ $\gamma_N$ & $100E/h$\\ $\gamma_G$ & $0.005$\\ $\phi_{\target}$ &$1.5 h_{\init}$\\ $\nabla \phi_{\target}$ &0.75\\ $\mathcal{I}_{\max}$ &1\\ $\gamma_{I}$ & 4.61\\ $\alpha_1 = \alpha_2 = \alpha_3$ &0.5 \\ \hline \end{tabular} \end{table} The compliance minimization problem, defined in Eq.~\eqref{Eq_optFormulation}, is solved on uniformly and adaptively refined meshes, considering five levels of refinement $l_{\refine} = 0$, $1$, $2$, $3$ and $4$, corresponding to $30 \times 10$, $60 \times 20$, $120 \times 40$, $240 \times 80$ and $480 \times 160$ element meshes. The influence of the B-spline interpolation is investigated by solving the same design problem with linear, quadratic and cubic B-spline functions and with truncated and non-truncated B-splines. These influences are studied separately considering the two approaches for introducing inclusions, i.e., the initial hole seeding and the combined level set/density scheme. \subsubsection{Design with initial hole seeding}\label{2DMBB_initial_hole} In this subsection, the design domain is initially seeded with holes, so that the mass constraint is satisfied at the beginning of the optimization process. The initial configuration is depicted in Fig.~\ref{fig_2D_MBB_initial_hole}. The complexity of such a hole pattern requires a rather fine initial mesh and cannot be represented with the coarsest refinement levels $l_{\refine} = 0, 1$. Thus, the optimization process needs to start from a mesh with $l_{\refine} > 1$. \begin{figure}[h]\center \includegraphics[scale=1]{figures/2DMBB/initialHoles/fig_2D_MBB_initial_hole} \caption{Initial hole seeding for the 2D beam. Zoom on the hole pattern representation for the refinement levels $l_{\refine} = 2, 3,$ and $4$.} \label{fig_2D_MBB_initial_hole} \end{figure} Figure~\ref{fig_2D_MBB_uniform} shows the optimized designs generated on uniformly refined meshes with $l_{\refine} = 2, 3$ and $4$ using THB-splines and for different B-spline orders, along with the associated mechanical performance in terms of strain energy. The solid phase is depicted in black and the meshes are omitted as they are uniform. The designs generated on uniform meshes for different B-spline orders become increasingly similar as the mesh is refined. The performances of the designs are also rather similar. As expected, the results show that refining the mesh allows for a higher geometric complexity, including thinner structural members. Figure~\ref{fig_2D_MBB_adaptive} shows the optimized designs generated on adaptively refined meshes using linear, quadratic and cubic THB-splines. For each layout, the solid phase is depicted in gray and the refined mesh is shown in the void phase. The computational gains achieved with the adaptive strategy are given in Table~\ref{table_2D_MBB_compCost}. Applying hierarchical mesh refinement, the optimization process is started with an initial uniform mesh with a refinement level $l_{\refine}^{0} = 2$ and is refined up to a refinement level $l_{\refine,\max} = 4$ and coarsened to a refinement level $l_{min} = 0$. The minimum and maximum refinement levels are updated after every 10, 25 or 50 iterations. Additionally, the mesh is adapted to maintain a uniform refinement level in all intersected elements, as mentioned in Section~\ref{userDefinedCriteria}. First, the designs demonstrate the ability of the method to recover similar layouts to the ones obtained on uniform meshes with higher mesh refinement. No significant loss is observed regarding the level of details or the complexity of the geometry achieved. The strain energy values are quite similar regardless of the use of uniform or adaptive meshes. The remaining differences in the strain energy values are not only due to differences in the designs, but also arise from differences in the discretization of the finite element model. The results in Fig.~\ref{fig_2D_MBB_adaptive} show, however, that the adaptive designs are sensitive to the number of iterations after which the refinement is applied. More frequent refinement operations, specifically early in the optimization process, allow for the emergence of finer features in the design. In terms of computational efficiency, the cost reduction with the adaptive strategy remains limited as initial configurations require rather fine meshes, i.e., $l_{\refine} > 1$. The efficiency factors in Table~\ref{table_2D_MBB_compCost} show that the achieved gain slightly increases with the B-spline order. The largest factors, in terms of efficiency and peak need, are achieved when the number of iterations before refinement is increased. Performing mesh refinement and updating the minimum and maximum refinement levels every 50 iterations lead to the largest computational gains. Using XFEM alone reduces the computational cost by about 50\%. The adaptation strategy allows for a reduction of the computational cost by more than 3.5 over the uniform FEM model and by more than 1.75 over the uniform XFEM model. The peak resource needs $R_{\xfem}$ and $R_{\fem}$ follow the same trend. Considering the refined meshes in Fig.~\ref{fig_2D_MBB_adaptive}, it is noticeable that the refined bandwidth around the solid-void interfaces increases in size with the order of the B-spline interpolation. This is a direct consequence of the refined buffer zone described in Subsection~\ref{bufferCriterion}, which size depends on the interpolation order. For both, the uniform and adaptive designs the influence of the B-spline interpolation order on the designs is mainly noticeable when working with lower order B-splines. Using a linear interpolation allows for the emergence of finer members and details in the structure, at the increased risk of converging to a local minimum with inferior performance. Higher order designs tend to be smoother and to eliminate thin members. For this 2D case, it is noteworthy that working with linear B-splines does not lead to any smoothness issues or irregular shapes which might be caused by a spurious interplay between geometry and finite element prediction. \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.5cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ $l_{\refine} = 2$ &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Linear_Uniform_2} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Quadratic_Uniform_2} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Cubic_Uniform_2}\\[-5pt] $120 \times 40$ &$\mathcal{S} = 101.01$ &$\mathcal{S} = 101.25$ &$\mathcal{S} = 102.53$\\[5pt] $l_{\refine} = 3$ &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Linear_Uniform_3} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Quadratic_Uniform_3} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Cubic_Uniform_3}\\[-5pt] $240 \times 80$ &$\mathcal{S} = 100.63$ &$\mathcal{S} = 101.63$ &$\mathcal{S} = 100.61$\\[5pt] $l_{\refine} = 4$ &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Linear_Uniform_4} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Quadratic_Uniform_4} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Cubic_Uniform_4}\\[-5pt] $480 \times 160$ &$\mathcal{S} = 101.02$ &$\mathcal{S} = 100.61$ &$\mathcal{S} = 101.32$ \\ \end{tabular} \caption{2D beam using uniformly refined meshes with THB-splines and initial hole seeding.} \label{fig_2D_MBB_uniform} \end{figure*} \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.5cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ $l_{\refine}^{0} = 2$ &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Linear_Adap_10_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Quadratic_Adap_10_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Cubic_Adap_10_Start_2_mesh}\\[-5pt] $10$ iter. &$\mathcal{S} = 101.23$ &$\mathcal{S} = 99.67$ &$\mathcal{S} = 101.08$ \\[5pt] $l_{\refine}^0 = 2$ &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Linear_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Quadratic_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Cubic_Adap_25_Start_2_mesh}\\[-5pt] $25$ iter. &$\mathcal{S} = 102.03$ &$\mathcal{S} = 100.10$ &$\mathcal{S} = 101.75$ \\[5pt] $l_{\refine}^0 = 2$ &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Linear_Adap_50_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Quadratic_Adap_50_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Cubic_Adap_50_Start_2_mesh}\\[-5pt] $50$ iter. &$\mathcal{S} = 102.33$ &$\mathcal{S} = 101.22$ &$\mathcal{S} = 102.78$ \\ \end{tabular} \caption{2D beam using adaptively refined meshes with THB-splines and initial hole seeding. Initial refinement level of $l_{\refine}^{0} = 2$ and maximum refinement level of $l_{\refine,\max} = 4$.} \label{fig_2D_MBB_adaptive} \end{figure*} \begin{table*}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_2D_MBB_uniform}.} \label{table_2D_MBB_compCost} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|m{1cm}m{1cm}m{1cm}|m{1cm}m{1cm}m{1cm}|m{1cm}m{1cm}m{1cm}}\hline &\multicolumn{3}{c|}{Mesh update after 10 iter.} &\multicolumn{3}{c|}{Mesh update after 25 iter.} &\multicolumn{3}{c}{Mesh update after 50 iter.}\\ & Lin. & Quad. & Cub. & Lin. & Quad. & Cub. & Lin. & Quad. & Cub. \\ \hline $N_{\opt}$ &1648 &1158 &840 &1460 &1158 &1254 &1219 &1158 &1137\\ \hline $E_{\xfem}$ &1.85 &1.72 &1.78 &1.93 &1.85 &1.97 &2.08 &2.03 &2.23\\ $R_{\xfem}$ &1.35 &1.29 &1.26 &1.65 &1.70 &1.72 &1.81 &1.99 &2.11\\ $E_{\fem}$ &3.81 &3.56 &3.61 &3.94 &3.81 &4.05 &4.20 &4.19 &4.58\\ $R_{\fem}$ &2.38 &2.31 &2.22 &2.92 &3.03 &3.05 &3.21 &3.56 &3.74\\ \hline \end{tabular} \end{table*} The influence of the truncation operation on the B-splines is investigated by solving the 2D beam problem with HB-splines and THB-splines on an adaptive mesh with an initial refinement level $l_{\refine}^{0} = 2$ and applying the refinement operation every 25 iterations. The obtained designs and corresponding final strain energy values are given in Fig.~\ref{fig_2D_MBB_adaptive_truncation}. The linear, quadratic and cubic designs only differ slightly. The remaining differences between the designs can be explained by the support size of the HB- and THB-splines that differs, as shown in Fig.~\ref{fig_truncatedKidney}. This is further supported by the maximum stencil size recorded for each design variables, i.e., the maximum number of design coefficients affected by the change in a specific design coefficient. The stencil sizes for the HB-splines are 8, 16 and 33 for the linear, quadratic and cubic orders, against 2, 9 and 16 for the THB-splines. The efficiency factors are given in Table~\ref{table_2D_compCost_truncation} and match closely for HB- and THB-splines. \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.75cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ HB-splines &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Linear_Adap_25_Start_2_NTRC_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Quadratic_Adap_25_Start_2_NTRC_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Cubic_Adap_25_Start_2_NTRC_mesh}\\[-5pt] $l_{\refine}^{0} = 2$ &$\mathcal{S} = 101.74$ &$\mathcal{S} = 100.14$ &$\mathcal{S} = 101.51$\\[5pt] THB-splines &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Linear_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Quadratic_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Cubic_Adap_25_Start_2_mesh}\\[-5pt] $l_{\refine}^{0} = 2$ &$\mathcal{S} = 102.03$ &$\mathcal{S} = 100.10$ &$\mathcal{S} = 101.75$\\ \end{tabular} \caption{2D beam using adaptively refined meshes with initial hole seeding. Initial refinement level of $l_{\refine}^{0} = 2$, maximum refinement level of $l_{\refine,\max} = 4$. Comparison of HB- and THB-splines.} \label{fig_2D_MBB_adaptive_truncation} \end{figure*} \begin{table}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_2D_MBB_adaptive_truncation}.} \label{table_2D_compCost_truncation} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|ccc|ccc}\hline &\multicolumn{3}{c|}{HB-splines} &\multicolumn{3}{c}{THB-splines}\\ & Lin. & Quad. & Cub. & Lin. & Quad. & Cub. \\ \hline $N_{\opt}$ &1385 &1158 &1254 &1460 &1158 &1254\\ \hline $E_{\xfem}$ &1.93 &1.83 &1.97 &1.93 &1.85 &1.97\\ $R_{\xfem}$ &1.65 &1.70 &1.74 &1.65 &1.70 &1.72\\ $E_{\fem}$ &3.93 &3.78 &4.06 &3.94 &3.81 &4.05\\ $R_{\fem}$ &2.92 &3.04 &3.08 &2.92 &3.03 &3.05\\ \hline \end{tabular} \end{table} To further investigate the influence of mesh adaptivity, the optimization problem is solved starting from a uniform mesh with the highest refinement level, here $l_{\refine,\max}=4$ and using THB-splines. The mesh adaptation operation, triggered here every 25 iterations, involves coarsening of the mesh in void regions. The generated designs are shown in Fig.~\ref{fig_2D_MBB_adaptive_coarsen} along with the ones generated on the finest uniform mesh $l_{\refine}=4$. They slightly differ from the layouts obtained on uniform meshes, but present quite similar performance in terms of strain energy. These differences might result from the restart of the optimization process, as the mesh is adapted. After refinement, the level set field is mapped onto the newly generated mesh, which might result in a slight perturbation of the field values. Furthermore, the GCMMA is restarted with uniform lower and upper asymptotes for all variables which may alter the evolution of the design. Additionally, these results show that the obtained designs are dependent on the initial mesh refinement $l_{\refine}^{0}$. The efficiency factors are given in Table~\ref{table_2D_MBB_compCost_coarsening}. They show that the initial refinement level affects the computational cost. In this case, the mesh adaptivity does not provide an actual computational gain with respect to an XFEM model, as $E_{\xfem}$ and $R_{\xfem}$ are about equal to 1. \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.5cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ Uniform &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Linear_Uniform_4} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Quadratic_Uniform_4} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Uniform/Cubic_Uniform_4}\\[-5pt] $l_{\refine} = 4$ &$\mathcal{S} = 101.02$ &$\mathcal{S} = 100.61$ &$\mathcal{S} = 101.32$\\[5pt] Adaptive &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Linear_Adap_25_Start_4} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Quadratic_Adap_25_Start_4} &\includegraphics[width=4.29cm]{figures/2DMBB/levsOnly_Adaptive/Cubic_Adap_25_Start_4}\\[-5pt] $l_{\refine}^{0} = 4$ &$\mathcal{S} = 101.35$ &$\mathcal{S} = 101.55$ &$\mathcal{S} = 101.95$\\ \end{tabular} \caption{2D beam using adaptively refined meshes with THB-splines and initial hole seeding. Initial refinement level of $l_{\refine}^{0} = 4$ and maximum refinement level of $l_{\refine,\max} = 4$. Only coarsening is applied to adapt the mesh.} \label{fig_2D_MBB_adaptive_coarsen} \end{figure*} \begin{table}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_2D_MBB_adaptive_coarsen}.} \label{table_2D_MBB_compCost_coarsening} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|ccc}\hline &\multicolumn{3}{c}{$l_{\refine}^{0} = 4$}\\ & Lin. & Quad. & Cub.\\ \hline $N_{\opt}$ &1911 &1158 &1131\\ \hline $E_{\xfem}$ &0.99 &1.00 &1.00\\ $R_{\xfem}$ &1.00 &1.00 &1.00\\ $E_{\fem}$ &2.05 &2.05 &2.04\\ $R_{\fem}$ &1.77 &1.78 &1.77\\ \hline \end{tabular} \end{table} \subsubsection{Design with simultaneous hole seeding}\label{2DMBB_seeding} In this section, the combined level set/density scheme, presented in Section~\ref{Hole}, is used to nucleate holes during the optimization process. The combined scheme uses a SIMP exponent $\beta_{\SIMP} = 2.0$. The density shift parameter $\rho_{\shift}$ is initially set to $0.2$ and is increased every 25 optimization steps. In this case, the optimization process can be started with rather coarse meshes. The minimum and maximum refinement levels are updated every 25 iterations. All other parameters are kept the same as in Section~\ref{2DMBB_initial_hole}. Numerical studies have shown that the chosen strategy for updating the density shift parameter and the minimum/maximum refinement levels lead to satisfactory results. Refining this strategy or using alternate approaches may lead to improved performance and should be explored in future studies. Figure~\ref{fig_2D_MBB_uniform_seeding} shows the optimized designs generated on uniformly refined meshes with $l_{\refine} = 1, 2, 3$ and $4$ using THB-splines and considering different B-spline orders, along with the associated performance in terms of strain energy. The solid phase is depicted in black and the meshes are omitted as they are uniform. For coarse meshes, the designs exhibit different performances. The differences in the strain energy measure disappear as the meshes are refined. As expected, the complexity of the designs increases with mesh refinement. Remaining differences in both the geometry and the performance are likely caused by the non convexity of the optimization problem. Figure~\ref{fig_2D_MBB_adaptive_seeding} shows the optimized designs generated on adaptively refined meshes with initial refinement level $l_{\refine}^{0} = 1, 2$ and $3$ and using linear, quadratic and cubic THB-splines. The performance in terms of strain energy values are provided for each design. For the adaptive designs, the mesh refinement is depicted in the void phase and the solid phase is represented in gray. The gains in terms of computational cost are given in Table~\ref{table_2D_MBB_seeding_compCost}. Using the adaptive strategy, the results clearly show that, starting from coarser meshes, it is possible to recover designs rather similar, in terms of geometry and performance, to the ones obtained with finer uniform meshes, at least up to one or two refinement level higher. It is also noticeable that the layouts obtained with the refinement strategy depend on the initial mesh refinement. Finer structural members are more likely to develop and be maintained through the optimization process as the initial mesh is refined. The efficiency factors given in Table~\ref{table_2D_MBB_seeding_compCost}. They show that more significant gains are obtained when starting from coarser meshes, with lower refinement levels. The adaptation strategy allows for a reduction of the computational cost by more than a factor 3 over the uniform FEM model and by more than 1.75 over the uniform XFEM model. The achieved efficiency factors starting from the same initial refinement with different B-splines order match closely. As a direct consequence of the buffer zone definition, see Subsection~\ref{bufferCriterion}, the refined meshes in Fig.~\ref{fig_2D_MBB_adaptive_seeding} exhibit a wider refined bandwidth as the interpolation order is increases from linear to cubic. As observed in the previous section and in Fig.~\ref{fig_2D_MBB_uniform_seeding} and ~\ref{fig_2D_MBB_adaptive_seeding}, linear B-splines can resolve finer structural members, while keeping a smooth description of the geometry at least in this 2D setting. Designs obtained with quadratic and cubic B-splines are smoother and similar. \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.5cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ $l_{\refine} = 1$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Linear_Uniform_1} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Quadratic_Uniform_1} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Cubic_Uniform_1}\\[-5pt] $60 \times 20$ &$\mathcal{S} = 101.11$ &$\mathcal{S} = 101.22$ &$\mathcal{S} = 99.48$\\[5pt] $l_{\refine} = 2$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Linear_Uniform_2} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Quadratic_Uniform_2} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Cubic_Uniform_2}\\[-5pt] $120 \times 40$ &$\mathcal{S} = 100.81$ &$\mathcal{S} = 104.94$ &$\mathcal{S} = 103.77$\\[5pt] $l_{\refine} = 3$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Linear_Uniform_3} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Quadratic_Uniform_3} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Cubic_Uniform_3}\\[-5pt] $240 \times 80$ &$\mathcal{S} = 99.95$ &$\mathcal{S} = 100.94$ &$\mathcal{S} = 100.18$ \\[5pt] $l_{\refine} = 4$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Linear_Uniform_4} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Quadratic_Uniform_4} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Uniform/Cubic_Uniform_4}\\[-5pt] $480 \times 160$ &$\mathcal{S} = 99.67$ &$\mathcal{S} = 99.49$ &$\mathcal{S} = 99.86$ \\ \end{tabular} \caption{2D beam using uniformly refined meshes with THB-splines and simultaneous hole seeding.} \label{fig_2D_MBB_uniform_seeding} \end{figure*} \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.5cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ $l_{\refine}^{0} = 1$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Linear_Adap_25_Start_1_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Quadratic_Adap_25_Start_1_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Cubic_Adap_25_Start_1_mesh}\\[-5pt] $60 \times 20$ &$\mathcal{S} = 100.52$ &$\mathcal{S} = 102.25$ &$\mathcal{S} = 103.10$ \\[5pt] $l_{\refine}^{0} = 2$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Linear_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Quadratic_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Cubic_Adap_25_Start_2_mesh}\\[-5pt] $120 \times 40$ &$\mathcal{S} = 99.61$ &$\mathcal{S} = 99.73$ &$\mathcal{S} = 101.01$ \\[5pt] $l_{\refine}^{0} = 3$ &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Linear_Adap_25_Start_3_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Quadratic_Adap_25_Start_3_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Cubic_Adap_25_Start_3_mesh}\\[-5pt] $240 \times 80$ &$\mathcal{S} = 99.44$ &$\mathcal{S} = 99.61$ &$\mathcal{S} = 99.86$ \\ \end{tabular} \caption{2D beam using adaptively refined meshes with THB-splines and simultaneous hole seeding. Initial refinement levels of $l_{\refine}^{0} = 1, 2$ and $3$ and maximum refinement level of $l_{\refine,\max} = 4$.} \label{fig_2D_MBB_adaptive_seeding} \end{figure*} \begin{table*}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_2D_MBB_adaptive_seeding}.} \label{table_2D_MBB_seeding_compCost} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|ccc|ccc|ccc}\hline &\multicolumn{3}{c|}{$l_{\refine}^{0} = 1$} &\multicolumn{3}{c|}{$l_{\refine}^{0} = 2$} &\multicolumn{3}{c}{$l_{\refine}^{0} = 3$}\\ & Lin. & Quad. & Cub. & Lin. & Quad. & Cub. & Lin. & Quad. & Cub.\\ \hline $N_{\opt}$ &671 &550 &547 &941 &539 &433 &941 &484 &454\\ \hline $E_{\xfem}$ &2.91 &3.58 &3.69 &2.15 &2.54 &2.70 &1.66 &1.79 &1.82\\ $R_{\xfem}$ &4.28 &4.98 &5.04 &3.13 &3.16 &3.42 &1.76 &1.81 &1.83\\ $E_{\fem}$ &5.40 &6.52 &6.80 &4.13 &4.61 &4.80 &3.19 &3.20 &3.27\\ $R_{\fem}$ &4.28 &4.98 &5.04 &3.13 &3.16 &3.42 &1.76 &1.81 &1.83\\ \hline \end{tabular} \end{table*} The influence of the truncation is explored by solving the problem with an adaptive mesh and both HB- and THB-splines on an initial mesh with initial refinement $l_{\refine}^{0} = 2$ and applying the refinement every 25 iterations. The obtained designs and corresponding final strain energy values are given in Fig.~\ref{fig_2D_MBB_adaptive_seeding_truncation}. The designs differ more significantly for HB- and THB-splines than when working with level set only, see Fig.~\ref{fig_2D_MBB_adaptive_truncation}. These differences can be partly explained by the maximum stencil size difference between HB- and THB-splines, i.e., 7, 16, and 37 for linear, quadratic and cubic HB-splines against 2, 9 and 16 for the THB-splines. On top of the stencil size mismatch, these differences in the final designs can be explained by the clipping operation applied to the density values to keep them between 0 and 1 when working with HB-splines. Clipping yields non differentiability with respect to the clipped values which can influence the optimization process. The computational gain factors are given in Table~\ref{table_2D_MBB_compCost_truncation} and match closely for both HB- and THB-splines. \begin{figure*}[ht]\center \renewcommand*{\arraystretch}{1.75} \begin{tabular}{p{1.75cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ HB-splines &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Linear_Adap_25_Start_2_NTRC_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Quadratic_Adap_25_Start_2_NTRC_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Cubic_Adap_25_Start_2_NTRC_mesh}\\[-5pt] $l_{\refine}^{0} = 2$ &$\mathcal{S} = 99.75$ &$\mathcal{S} = 99.85$ &$\mathcal{S} = 100.20$ \\[5pt] THB-splines &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Linear_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Quadratic_Adap_25_Start_2_mesh} &\includegraphics[width=4.29cm]{figures/2DMBB/combined_Adaptive/Cubic_Adap_25_Start_2_mesh}\\[-5pt] $l_{\refine}^{0} = 2$ &$\mathcal{S} = 99.61$ &$\mathcal{S} = 99.73$ &$\mathcal{S} = 101.01$ \\ \end{tabular} \caption{2D beam using adaptively refined meshes with simultaneous hole seeding. Initial refinement level of $l_{\refine}^{0} = 2$ and maximum refinement level of $l_{\refine,\max} = 4$. Comparison of HB- and THB-splines.} \label{fig_2D_MBB_adaptive_seeding_truncation} \end{figure*} \begin{table}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_2D_MBB_adaptive_seeding_truncation}.} \label{table_2D_MBB_compCost_truncation} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|ccc|ccc}\hline &\multicolumn{3}{c|}{HB-splines} &\multicolumn{3}{c}{THB-splines}\\ & Lin. & Quad. & Cub. & Lin. & Quad. & Cub. \\ \hline $N_{\opt}$ &941 &405 &542 &941 &539 &433\\ \hline $E_{\xfem}$ &2.16 &2.71 &2.52 &2.15 &2.54 &2.70\\ $R_{\xfem}$ &3.31 &3.15 &3.29 &3.13 &3.16 &3.42\\ $E_{\fem}$ &4.14 &4.72 &4.65 &4.13 &4.61 &4.80\\ $R_{\fem}$ &3.31 &3.15 &3.29 &3.13 &3.16 &3.42\\ \hline \end{tabular} \end{table} A comparison of the results from Subsections~\ref{2DMBB_initial_hole} and~\ref{2DMBB_seeding} suggests that the ability to nucleate holes during the optimization process is crucial to increase the computational cost reduction achieved with mesh adaptation. Creating an initial hole pattern requires the use of rather fine initial meshes, which limits the computational cost savings. Comparing the efficiency ratios in Tables~\ref{table_2D_MBB_compCost} and~\ref{table_2D_MBB_seeding_compCost} shows that starting from a $120 \times 40$ initial mesh and refining every 25 iterations, an efficiency factor $E_{\xfem}$ of about $2.0$ is achieved for the initial seeding approach, while a ratio of about $2.5$ is obtained for the combined scheme. Moreover, although a dependency on the initial mesh refinement is observed in both cases, the combined level set/density scheme seems to mitigate this dependency. The 2D examples, in Fig.~\ref{fig_2D_MBB_adaptive_truncation} and~\ref{fig_2D_MBB_adaptive_seeding_truncation}, de\-mon\-strated that using THB-splines does not affect the design geometry complexity, the performance or the computational gain achieved with the proposed adaptive strategy. THB-splines offer advantageous properties; they form a PU, a desirable property when solving finite element problems. They also lead to an improved conditioning of the system of equations and offer a convenient way to impose bounds on design variables, i.e., an operation largely applied when solving optimization problems. Therefore, all subsequent optimization problems are solved using THB-splines. \subsection{Three dimensional beam}\label{3DBeam} In this section, the previous 2D beam example is extended to 3D. This example allows studying the influence of the mesh adaptivity on 3D designs in terms of geometry, performance and computational cost. In particular, we assess the ability of our approach to generate well-known three dimensional optimal members such as shear webs that usually develop when solving optimization problems on fine uniform meshes. For 3D designs, the dependency on the initial hole pattern is mitigated by the ability to develop holes in the third dimension, which might counterbalance the performance issues encountered when using the initial seeding approach with the refinement strategy. Figure~\ref{fig_3D_MBB} illustrates the setup for the solid-void 3D beam with a length $L = 6.0$, a height $l = 1.0$ and a thickness $h = 1.0$. The structural response is modeled by an isotropic linear elastic model with a Young's modulus $E = 1.0$ and a Poisson's ratio $\nu = 0.3$. The structure is supported on its two lower sides over a length $l_s = 0.025$ and a pressure $p = 1.0$ is applied in the middle of its top span over an area $l_p \times h = 2 \times 0.025 \times 1.0$. The values above are provided in self-consistent units. \begin{figure}[h]\center \includegraphics[scale=1]{figures/3DMBB/fig_3D_MBB_2} \caption{Three dimensional beam.} \label{fig_3D_MBB} \end{figure} We optimize the beam for minimum compliance under a mass constraint of $10 \%$ of the total mass of the design domain. Taking advantage of the symmetry, we only study a quarter of the design domain. A list of problem parameters is given in Table~\ref{table_3DMBB_parameter}. \begin{table}[h]\center \caption{Parameter list for the 3D beam optimization problem.} \label{table_3DMBB_parameter} \renewcommand{\arraystretch}{1.5} \begin{tabular}{p{0.45\columnwidth}p{0.45\columnwidth}}\hline Parameter & Value\\ \toprule $w_s$ & 9.0\\ $c_p$ & 1.0\\ $c_{\phi}$ & 10.0\\ $c_v$ & 0.4\\ $P_0$ & 10.0\\ $S_0$ & 59.12\\ $\phi_{\scale}$ & $3h_{init}$\\ $V_{max}$ & 3\\ $\gamma_N$ & $100E/h$\\ $\gamma_G$ & $0.01$\\ $\phi_{\target}$ &$1.5h_{\init}$\\ $\nabla \phi_{\target}$ &0.75\\ $\mathcal{I}_{\max}$ & 1\\ $\gamma_{I}$ & 4.61\\ $\alpha_1 = \alpha_2 = \alpha_3$ & 0.5\\ \hline \end{tabular} \end{table} As for the 2D case, the initial hole seeding and the combined level set/density schemes are studied. The optimization problem, in Eq.~\eqref{Eq_optFormulation}, is solved on uniformly and adaptively refined meshes considering four levels of refinements, $l_{\refine} = 0, 1, 2, 3$, corresponding to $18 \times 6 \times 3$, $36 \times 12 \times 6$, $72 \times 24 \times 12$, and $144 \times 48 \times 24$ element meshes. The influence of the B-spline interpolation order is investigated by solving the same problem with linear, quadratic and cubic B-spline functions. All the simulations are performed with THB-splines. \subsubsection{Design with initial hole seeding}\label{3DMBB_initial_hole} The initial seeding of holes in the design domain is presented in Fig.~\ref{fig_3D_MBB_initial_hole}. This configuration satisfies the mass constraint, but requires a rather fine initial mesh to resolve the hole pattern, i.e., $l_{\refine} > 1$. \begin{figure*}[ht]\center \includegraphics[width=0.4\columnwidth]{figures/3DMBB/initialHoles/InitialHoles_1_nomesh} \includegraphics[width=0.4\columnwidth]{figures/3DMBB/initialHoles/InitialHoles_1_nomesh_inverted} \caption{Initial hole seeding for the 3D beam. Representation of the solid on the left and the void on the right.} \label{fig_3D_MBB_initial_hole} \end{figure*} The optimized designs generated on uniformly and adaptively refined meshes are given in Fig.~\ref{fig_3D_MBB_uniform} and~\ref{fig_3D_MBB_adaptive}, respectively, along with their performance in terms of strain energy. Additionally, we depict vertical cross sections of the designs in blue, to visualize the layouts' internal material arrangement. The efficiency factors are summarized in Table~\ref{table_3D_MBB_compCost}. In Figure~\ref{fig_3D_MBB_uniform}, uniform meshes with levels of refinement $l_{\refine} = 2$ and $3$ are considered, as coarser meshes cannot resolve the initial hole pattern. The design geometries and their performance in terms of strain energy are quite similar for linear B-splines. Each optimized layout is characterized by two shear webs and a truss-type structure that develops under the loaded surface. For higher B-spline orders, similar designs are observed only when using a finer mesh, i.e., $l_{\refine} = 3$. For coarser meshes with refinement level $l_{\refine} = 2$, a single shear web develops in the center of the design. This behavior suggests that the obtained design depends on both the B-spline order and the refinement level. As the mesh is refined, smaller members are included in the layouts, which exhibit smoother surfaces. This can be observed in particular for the shear webs that become thin and smooth with mesh refinement. Applying the refinement strategy every 25 iterations, the optimization process is started on a uniform mesh with a refinement level $l_{\refine}^{0} = 2$, see Figure~\ref{fig_3D_MBB_adaptive}. In the course of the optimization process, the mesh is locally refined up to level $l_{\refine,\max} = 3$ or coarsened to a level $l_{\min} = 0$. The adaptive strategy generates designs that display a slightly higher geometric complexity and smoothness than the designs on corresponding initial uniform me\-shes. However, they are visibly dependent on the initial mesh refinement as the obtained design topologies, i.e., two shear webs for linear B-splines versus one shear web for higher order B-splines, are similar to the ones generated on a uniform mesh with $l_{\refine} = 2$. The efficiency ratios are given in Table~\ref{table_3D_MBB_compCost}. They show that a moderate reduction of the computational cost is achieved as the optimization process with adaptivity is started on a rather fine mesh, a reduction by a factor of about 4 over the uniform FEM model and by about 1.5 over the uniform XFEM model. It is interesting to note that, as for the 2D case, linear B-splines support the development of smaller structural features such as the beams observed for both the uniform and the adaptive designs. At the same time, using these low order B-splines leads to spurious oscillations of the level set field, which result in layouts with rough surfaces. Higher order B-splines promote the generation of smoother designs, as is the case for both quadratic and cubic B-splines. \begin{figure*}[ht]\center \begin{tabular}{lccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ \multirow{ 2}{*}{$\begin{array}{c} l_{\refine} = 2\\[5pt] 72 \times 24 \times 12\\ \end{array}$} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_LU2_nomesh} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_QU2_nomesh} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_CU2_nomesh}\\ &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_LU2_slices} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_QU2_slices} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_CU2_slices}\\ &$\mathcal{S} = 77.20$ &$\mathcal{S} = 78.12$ &$\mathcal{S} = 78.24$\\[10pt] \multirow{ 2}{*}{$\begin{array}{c} l_{\refine} = 3\\[5pt] 144 \times 48 \times 24\\ \end{array}$} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_LU3_nomesh} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_QU3_nomesh} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_CU3_nomesh}\\ &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_LU3_slices} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_QU3_slices} &\includegraphics[width=4.09cm]{figures/3DMBB/levsOnly_Uniform/LevsOnly_CU3_slices}\\ &$\mathcal{S} = 77.50$ &$\mathcal{S} = 76.99$ &$\mathcal{S} = 77.14$\\ \end{tabular} \caption{3D beam using uniformly refined meshes with THB-splines and initial hole seeding.} \label{fig_3D_MBB_uniform} \end{figure*} \begin{figure*}[ht]\center \begin{tabular}{p{1.5cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ \multirow{ 2}{*}{$\begin{array}{c} l_{\refine}^{0} = 2\\[5pt] 72 \times 24 \times 12\\ \end{array}$} &\includegraphics[width=4.29cm]{figures/3DMBB/levsOnly_Adaptive/LevsOnly_LA2_nomesh} &\includegraphics[width=4.29cm]{figures/3DMBB/levsOnly_Adaptive/LevsOnly_QA2_nomesh} &\includegraphics[width=4.29cm]{figures/3DMBB/levsOnly_Adaptive/LevsOnly_CA2_nomesh}\\ &\includegraphics[width=4.29cm]{figures/3DMBB/levsOnly_Adaptive/LevsOnly_LA2_slices} &\includegraphics[width=4.29cm]{figures/3DMBB/levsOnly_Adaptive/LevsOnly_QA2_slices} &\includegraphics[width=4.29cm]{figures/3DMBB/levsOnly_Adaptive/LevsOnly_CA2_slices}\\ &$\mathcal{S} = 77.82$ &$\mathcal{S} = 79.19$ &$\mathcal{S} = 78.41$ \\ \end{tabular} \caption{3D beam using adaptively refined meshes with THB-splines and initial hole seeding. Initial refinement levels of $l_{\refine}^{0} = 2$ and maximum refinement level of $l_{\refine,\max} = 3$.} \label{fig_3D_MBB_adaptive} \end{figure*} \begin{table}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_3D_MBB_adaptive}.} \label{table_3D_MBB_compCost} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|ccc}\hline &\multicolumn{3}{c}{$l_{\refine}^{0} = 2$}\\ & Lin. & Quad. & Cub. \\ \hline $N_{\opt}$ &501 &520 &520\\ \hline $E_{\xfem}$ &1.26 &1.64&1.43\\ $R_{\xfem}$ &2.07 &3.43 &2.32\\ $E_{\fem}$ &3.90 &5.44 &4.64\\ $R_{\fem}$ &2.72 &4.30 &2.91\\ \hline \end{tabular} \end{table} \subsubsection{Design with simultaneous hole seeding}\label{3DMBB_seeding} In this section, holes are nucleated in the design domain during the optimization process using the combined level set/density scheme presented in Section~\ref{Hole}. For the combined scheme, the SIMP exponent $\beta_{\SIMP}$ is set to $2.0$. The density shift parameter $\rho_{\shift}$ is initially set to $0.2$ and is updated every 25 optimization steps. Contrary to Section~\ref{3DMBB_initial_hole}, coarser meshes can be used as a starting point for the adaptive optimization, since the initial design geometry is not complex. The designs obtained on uniformly and adaptively refined meshes are shown in Fig.~\ref{fig_3D_MBB_uniform_seeding} and~\ref{fig_3D_MBB_adaptive_seeding} with their performance in terms of strain energy. Additionally, we depict vertical cross sections of the designs in blue, to visualize the layouts' internal material arrangement. Table~\ref{table_3D_MBB_compCost_seeding} gives the design performance in terms of computational cost. In Fig.~\ref{fig_3D_MBB_uniform_seeding}, three levels of refinement are considered $l_{\refine} = 1, 2$ and $3$. The uniform designs geometries are quite similar, as each layout is characterized by two shear webs and a truss-type structure that develops under the loaded surface. Also, the performance in terms of strain energy is quite similar for the designs obtained on meshes with refinement levels $l_{\refine} = 2$ and $3$. These results demonstrate that the combined level set/density scheme reduces the dependency on the initial design that was observed with the initial hole seeding approach. Using extremely coarse meshes with $l_{\refine} = 1$ lead to spurious oscillations of the level set field and thus a rough solid/void interface surface. This behavior is more stron\-gly pronounced when using linear B-splines. Working with an adaptive mesh, the optimization process is started on a uniformly refined mesh with the lowest level of refinement $l_{\refine}^{0} = 1$ and is refined up to $l_{\refine,\max} = 3$ or coarsened to $l_{\min} = 0$, see Fig.~\ref{fig_3D_MBB_adaptive_seeding}. The results demonstrate the ability of the adaptive optimization approach to create designs similar to the ones obtained on uniform meshes with higher level of refinement. The designs also compare well in terms of strain energy performance. The refinement strategy leads to a significant reduction of the computational cost, as the optimization is started on a coarser mesh. Table~\ref{table_3D_MBB_compCost_seeding} shows high efficiency ratios, i.e., a reduction by a factor of about 7 over the uniform FEM model and by about 3 over the uniform XFEM model. As observed in the previous section, using low order B-splines promotes the development of thinner features, which is not observed with higher polynomial orders. However, linear B-spline designs lack smoothness, even as the mesh is refined. \begin{figure*}[ht]\center \begin{tabular}{p{1.7cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ \multirow{ 2}{*}{$\begin{array}{c} l_{\refine}^{0} = 1\\[5pt] 36 \times 12 \times 6\\ \end{array}$} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_LU1_nomesh} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_QU1_nomesh} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_CU1_nomesh}\\ &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_LU1_slices} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_QU1_slices} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_CU1_slices}\\ &$\mathcal{S} = 70.84$ &$\mathcal{S} = 71.20$ &$\mathcal{S} = 71.15$ \\[10pt] \multirow{ 2}{*}{$\begin{array}{c} l_{\refine}^{0} = 2\\[5pt] 72 \times 24 \times 12\\ \end{array}$} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_LU2_nomesh} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_QU2_nomesh} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_CU2_nomesh}\\ &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_LU2_slices} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_QU2_slices} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_CU2_slices}\\ &$\mathcal{S} = 76.50$ &$\mathcal{S} = 76.44$ &$\mathcal{S} = 76.40$ \\[10pt] \multirow{ 2}{*}{$\begin{array}{c} l_{\refine}^{0} = 3\\[5pt] 144 \times 48 \times 24\\ \end{array}$} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_LU3_nomesh} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_QU3_nomesh} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_CU3_nomesh}\\ &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_LU3_slices} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_QU3_slices} &\includegraphics[width=4.19cm]{figures/3DMBB/combined_Uniform/Comb_CU3_slices}\\ &$\mathcal{S} = 76.98$ &$\mathcal{S} = 76.77$ &$\mathcal{S} = 76.84$ \\ \end{tabular} \caption{3D beam using uniformly refined meshes with THB-splines and simultaneous hole seeding.} \label{fig_3D_MBB_uniform_seeding} \end{figure*} \begin{figure*}[ht]\center \begin{tabular}{p{1.7cm}ccc} & Linear B-splines & Quadratic B-splines & Cubic B-splines\\ \multirow{ 2}{*}{$\begin{array}{c} l_{\refine}^{0} = 1\\[5pt] 36 \times 12 \times 6\\ \end{array}$} &\includegraphics[width=4.29cm]{figures/3DMBB/combined_Adaptive/Comb_LA1_nomesh} &\includegraphics[width=4.29cm]{figures/3DMBB/combined_Adaptive/Comb_QA1_nomesh} &\includegraphics[width=4.29cm]{figures/3DMBB/combined_Adaptive/Comb_CA1_nomesh}\\ &\includegraphics[width=4.29cm]{figures/3DMBB/combined_Adaptive/Comb_LA1_slices} &\includegraphics[width=4.29cm]{figures/3DMBB/combined_Adaptive/Comb_QA1_slices} &\includegraphics[width=4.29cm]{figures/3DMBB/combined_Adaptive/Comb_CA1_slices}\\ &$\mathcal{S} = 76.19$ &$\mathcal{S} = 74.94$ &$\mathcal{S} = 76.37$ \\ \end{tabular} \caption{3D beam using adaptively refined meshes with simultaneous hole seeding. Initial refinement levels of $l_{\refine}^{0} = 1$ and maximum refinement level of $l_{\refine,\max} = 3$.} \label{fig_3D_MBB_adaptive_seeding} \end{figure*} \begin{table}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_3D_MBB_adaptive_seeding}.} \label{table_3D_MBB_compCost_seeding} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|ccc}\hline &\multicolumn{3}{c}{$l_{\refine}^{0} = 1$}\\ & Lin. & Quad. & Cub. \\ \hline $N_{\opt}$ &292 &209 &275\\ \hline $E_{\xfem}$ &2.87 &4.08 &3.09\\ $R_{\xfem}$ &3.78 &3.75 &3.92\\ $E_{\fem}$ &6.70 &8.78 &7.56\\ $R_{\fem}$ &3.78 &3.75 &3.92\\ \hline \end{tabular} \end{table} The effect of hole seeding during the optimization process is not as pronounced as in 2D. In 3D holes can be created more easily by effectively changing the thickness, i.e., changing the shape in the third dimension. The main advantage of the combined scheme lies in the ability to use coarser meshes as starting point for the adaptive topology optimization, which leads to larger efficiency ratios $E_{\xfem}$, i.e., around $3$ for the combined scheme versus around $1.5$ with the initial seeding strategy when compared to uniform XFEM meshes. Both the 2D and 3D beam examples show that using linear B-splines allows for the development of thinner structural members. However, in the 3D case, the latter details develop at the cost of spurious oscillations in the level set field, leading to a rough representation of the surface. Higher order B-splines promote the development of smoother designs. In 2D and in 3D, the designs generated with quadratic and cubic B-splines match closely. Therefore, all upcoming simulations are carried out with quadratic B-splines. They lead to smooth designs without reducing the complexity of the geometry achieved. Moreover, they present smaller support and a lower level of complexity than cubic B-splines, which leads to simpler implementation and a reduced overall computational cost. \subsection{Short beam under uniform pressure}\label{TableDesign} This final example aims at demonstrating the capabilities of the proposed mesh adaptivity to generate geometrically complex designs with limited computational resources. The optimization problem formulation is modified to generate designs with increasingly lower volume fractions and show that mesh adaptation allows for the development of extremely thin structural members. We consider a short beam subject to a uniform pressure on its top. The design domain with boundary conditions is shown in Fig.~\ref{fig_table} and is defined by a rectangular cuboid with a length $L = 2.0$, a height $l = 0.6$ and a thickness $h = 1.0$. The structural response is described by an isotropic linear elastic model with a Young's modulus $E = 6.9\ 10^{10}$ and a Poisson's ratio $\nu = 0.3$. The presence of material is enforced on the top of the table, where a uniform pressure load $p = 0.67\ 10^{6}$ is applied. The structure is supported on the side at the top corners, and on the bottom at each corner with $l_s = 0.01$ and $h_s = 0.2$. \begin{figure}[h]\center \includegraphics[scale=1]{figures/3DTable/fig_table} \caption{Three dimensional short beam under uniform pressure.} \label{fig_table} \end{figure} We optimize the structure for minimum compliance and mass, no constraints are imposed. Applying the adaptive refinement strategy, we focus on the influence of the mass of the designs on the achieved computational cost reduction. Taking advantage of the symmetry, we only study a quarter of the design domain. The problem parameters are given in Table~\ref{table_3DTable_parameter} in self-consistent units. \begin{table}[h]\center \caption{Parameter list for the 3D short beam under uniform pressure design optimization problem.} \label{table_3DTable_parameter} \renewcommand{\arraystretch}{1.5} \begin{tabular}{p{0.45\columnwidth}p{0.45\columnwidth}} \hline Parameter & Value\\ \toprule $w_s^{0}$ & 0.5\\ $w_m$ & 10.0\\ $c_p$ &0.05\\ $c_{\phi}$ &5.0\\ $c_v$ & 1.0\\ $\mathcal{S}^0$ & 61.93\\ $\mathcal{M}^0$ & 0.3\\ $\mathcal{P}^0$ & 3\\ $\phi_{\scale}$ & $3h_{init}$\\ $\gamma_N$ & $100\ E/h$\\ $\gamma_G$ & $0.01$\\ $\phi_{\target}$ &$1.5\ h_{\init}$\\ $\nabla \phi_{\target}$ &0.75\\ $\mathcal{I}_{\max}$ & 1\\ $\gamma_{I}$ & 4.61\\ $\alpha_1 = \alpha_2 = \alpha_3$ & 0.5\\ \hline \end{tabular} \end{table} We investigate the effect of the designs mass on the adaptive strategy. To generate designs with various strain energy/mass ratios, we vary the compliance weighting parameter $w_s$ value. To prevent an overly aggressive removal of mass early on in the optimization process, we apply a continuation on $w_s$, which is initially set to $w_s^{0} = 0.5$ and is gradually decreased during the optimization process to the prescribed values $w_s^{\final} = 0.1, 0.05, 0.005$ and $0.0005$. We should note that the strategy for reducing $w_s$ impact the computational costs. Large $w_s$ values put more emphasis on the strain energy. Thus, stiffer structures, using more mass, are generated, which in turn requires more elements to be resolved at a particular refinement level. Based on the observations made for the 2D and 3D beam problems in Sections~\ref{2DBeam} and~\ref{3DBeam}, we study this problem with the level set/density combined scheme only, as it allows to initiate the design process on a rather coarse mesh. The SIMP exponent $\beta_{\SIMP}$ is set to $1.5$. The density shift parameter $\rho_{\shift}$ is initially set to $0.2$ and is updated every 25 optimization steps. Furthermore the design variable field is interpolated with quadratic truncated hierarchical B-splines. We consider four levels of refinement $l_{\refine} = 0, 1, 2,$ and $3$, corresponding to $24 \times 14 \times 12$, $48 \times 28 \times 24$, $96 \times 56 \times 48$ and $192 \times 112 \times 96$ element meshes. The problem is solved using adaptively refined meshes, starting from an initial mesh with a refinement level $l_{\refine}^{0} = 0$ and allowing refinement up to $l_{\refine,\max} = 3$ and coarsening to $l_{\min} = 0$. Solving the problem on uniformly refined XFEM meshes is omitted. The designs generated on adaptively refined meshes with decreasing volume fractions are shown in Fig.~\ref{fig_table_adaptive_seeding}. Additionally, we depict horizontal cross sections of the designs in blue, to visualize the layouts' internal material arrangement. The performance in terms of strain energy, mass and the volume ratios are given in Table~\ref{fig_table_seeding_objective}. As the mass of the design decreases, very thin structural members are generated. These designs demonstrate the ability of the adaptive mesh strategy to resolve fine members and details starting from rather coarse meshes. Table~\ref{table_table_seeding_compCost} gives the iteration $k_{\peak}$ at which the peak number of free DOFs is reached, the peak number of free DOFs and the number of free DOFs at the end of the optimization process. The peak number of DOFs is similar for each problem setup and is recorded around iteration 95, i.e. after the second refinement step. The final number of unconstrained DOFs show that as the mass of the designs becomes smaller, the associated number of free DOFs in the system drops, leading to a reduced computational time. Table~\ref{table_table_seeding_compCost} also provides the efficiency factors evaluated with $N_{opt}$ being the number of iterations to convergence. Here, we only consider the efficiency factors with respect to an equivalent FEM model, i.e., $E_{\fem}$ and $R_{\fem}$ considering a uniformly refined mesh with $l_{\refine} = 3$. The efficiency ratios $E_{\fem}$ increase as the mass of the designs decreases, i.e., the lower the volume fraction, the larger the computational saving. Since all cases start with $w_s = 0.5$ and since the peak DOFs count is recorded around iteration 95 for each design, the $R_{\fem}$ values are almost the same for all cases. The strategy for reducing $w_s$ could be improved to increase the computational efficiency due to mesh adaptation. \begin{figure*}[ht]\center \begin{tabular}{m{0.15\textwidth}m{0.375\textwidth}m{0.375\textwidth}} $\begin{array}{lll} w_s^{\final}& =& 0.1\\[5pt] l_{\refine}^{0} &=& 0\\ \end{array}$ &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz01_2} &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz01_slices}\\ $\begin{array}{lll} w_s^{\final}& =& 0.05\\[5pt] l_{\refine}^{0} &=& 0\\ \end{array}$ &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz005_2} &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz005_slices}\\ $\begin{array}{lll} w_s^{\final}& =& 0.005\\[5pt] l_{\refine}^{0} &=& 0\\ \end{array}$ &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz0005_2} &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz0005_slices}\\ $\begin{array}{lll} w_s^{\final}& =& 0.0005\\[5pt] l_{\refine}^{0} &=& 0\\ \end{array}$ &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz00005_2} &\includegraphics[width=6cm]{figures/3DTable/Table_Comb_cz00005_slices}\\ \end{tabular} \caption{Three dimensional short beam under uniform pressure design using adaptively refined mesh with quadratic THB-splines and simultaneous hole seeding. Initial refinement level of $l_{\refine}^{0} = 0$ and maximum refinement level of $l_{\refine,\max} = 3$.} \label{fig_table_adaptive_seeding} \end{figure*} \begin{table}[ht]\center \caption{Performance in terms of strain energy, mass and volume fraction for designs in Fig.~\ref{fig_table_adaptive_seeding}.} \label{fig_table_seeding_objective} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{c|c|c|c}\hline $w_s^{\final}$ & Strain energy & Mass & Volume fraction \\ \hline 0.1 &\ 349.38 &0.0232 &5.57\\ 0.05 &\ 469.24 &0.0189 &4.14\\ 0.005 &1442.14 &0.0115 &1.68\\ 0.0005 &4421.07 &0.0098 &1.19\\ \hline \end{tabular} \end{table} \begin{table*}[ht]\center \caption{Performance in terms of computational cost for designs in Fig.~\ref{fig_table_adaptive_seeding}.} \label{table_table_seeding_compCost} \renewcommand*{\arraystretch}{1.5} \begin{tabular}{l|c|c|c|c}\hline & $w_s^{\final} = 0.1$ & $w_s^{\final} = 0.05$ & $w_s^{\final} = 0.005$ & $w_s^{\final} = 0.0005$\\ \hline $k_{\peak}$ &95 &94 &94 &95\\ Peak \# DOFs &1910815 &1852155 &1867655 &1836490\\ End \# DOFs &1289080 &1128070 &758425 &758425\\ \hline $N_{\opt}$ &218 &220 &252 &273\\ $E_{\fem}$ &23.16 &25.56 &31.01 &32.73\\ $R_{\fem}$ &9.79 &10.21 &10.10 &10.32\\ \hline \end{tabular} \end{table*} \section{Conclusions}\label{Conclusions} This paper presents an adaptive mesh refinement strategy using hierarchical B-splines to perform level set topology optimization. The geometry of the design is described by a LSF and the analysis is performed using the XFEM, considering a generalized Heaviside enrichment strategy. The problem of simultaneously achieving a precise description of the geometry and an accurate evaluation of the physical responses at an acceptable computational cost is addressed by implementing a hierarchical mesh refinement, leading to an adaptive discretization of the design and state variable fields. While the state variable field interpolation is restricted to first order B-splines, the design variable field is interpolated with higher order B-splines, up to the third order. Truncated B-splines are considered for local refinement. After a user-specified number of optimization steps, local refinement, along with an increase/decrease of the minimum/maximum refinement level, is performed. The local mesh refinement is controlled by a user-defined geometric criterion. In this work, the mesh is refined around the solid/void interface and in the solid domain. To allow for a sufficient freedom in the design, we consider an initial hole seeding approach and a hole nucleation approach based on a combined level set/density scheme. The proposed method is applied to 2D and 3D structural solid-void topology optimization problems considering mass and strain energy. Optimized designs are generated on uniformly and adaptively refined meshes to provide a comparison in terms of complexity of the geometry achieved, performance of the designs and computational cost. The numerical experiments suggest that using higher order B-splines promotes the development of smooth designs and limits the need for filtering techniques required when using low order interpolation functions. Moreover, introducing truncation allows us to accurately impose bounds on the design variables. In this study, imposing bounds on the optimization variables is required for the combined level set/\-density scheme. Additionally, the numerical simulations show that the ability to nucleate holes during the optimization is crucial for increasing the computational advantage provided by mesh adaptation. The initial hole seeding approach limits the performance of the adaptive strategy, as rather fine meshes are required to resolve the complex initial hole pattern. Using the combined level set/density scheme, the optimization process can be initiated on coarser meshes, which leads to a more pronounced reduction of the computational cost associated with the design process. Although the choice of the initial mesh refinement level influences the generated designs, the numerical studies demonstrate that the adaptive strategy allows for the development of optimized complex features, such as thin shear webs in 3D, even when starting from rather coarse meshes. Moreover, the adaptive designs exhibit similar performance when compared to the uniform ones. The evaluation of efficiency factors in terms of the number of unconstrained DOFs shows that the adaptive strategy provides an improvement in terms of computational cost. In general, the efficiency factors increase both with the order of the B-spline interpolation and with the coarseness of the initial mesh used. For 3D problems, the achieved cost reduction strongly depends on the volume fraction of the optimized structures and increases as the mass of the design drops. Future work will focus on: (i) extending the capabilities of the mesh adaptivity, and (ii) addressing problems with more complex physics. With regards to the adaptivity, the method could be extended to handle the design and state variable fields separately. Other refinement criteria should also be considered, such as finite element error indicators. Additionally, the B-spline interpolation should be extended to higher order B-splines for the state variable field, as is the case for the design variables. Finally, as more complex physics are considered, allowing for a more dynamic refinement process could be crucial to resolve, for example, transient problems. \section*{Acknowledgements} The first, third, fourth, and fifth authors acknowledge the support for this work from the Defense Advanced Research Projects Agency (DARPA) under the TRADES program (agreement HR0011-17-2-0022). The opinions and conclusions presented in this paper are those of the authors and do not necessarily reflect the views of the sponsoring organizations.
\section{Introduction} The interactions of cosmic ray nuclei with the atmosphere evolve into extensive particle cascades, in which the decays of unstable particles produce muons and neutrinos. These so called atmospheric leptons remain as the dominant particle species at ground and can be detected by surface and underground detectors. IceCube is a cubic-kilometer neutrino detector installed in the ice at the geographic South Pole \cite{Aartsen:2016nxy} between depths of 1450 m and 2450 m, completed in 2010. It detects thousands of muon events each second and tens of neutrinos per hour, roughly corresponding to one neutrino event per hour at analysis level, and hence it is a unique laboratory to study atmospheric leptons. While the main goal of IceCube is to study astrophysical neutrino sources, the sheer number of atmospheric events constitutes a natural beam of neutrinos that makes it possible to pursue a particle physics program including measurements of standard and non-standard neutrino oscillations \cite{Aartsen:2019tjl,Aartsen:2017bap,Aartsen:2017xtt}. These measurements rely on a theoretical characterization of the energy and angular dependence of the atmospheric neutrino flux \cite{Gaisser:2002jj} in the absence of oscillations and matter effects. Theoretical uncertainties in flux calculations can impact or bias the determination of fundamental neutrino properties, constituting a significant systematic uncertainty. In this paper, we use a sample of atmospheric neutrinos collected with the densely instrumented DeepCore subarray that is embedded in the part of IceCube with the best ice properties and instrumented with high-quantum efficiency photomultiplier tubes. The surrounding standard IceCube strings are used as a veto for down-going atmospheric muons, resulting in a full sky coverage in an energy range from a few GeV up to 180 GeV. We exploit the impact of the hadronic particle production on the shape (in the energy-zenith plane) of the observed atmospheric neutrino flux to infer one of the leading uncertainties for inclusive lepton flux (integrated over cosmic ray energy) calculations - the ratio of kaon to pion multiplicities in the fragmentation region \cite{Barr:2004br}, \textit{i.e.} at large values of Feynman $x_\text{F}$, at equivalent projectile energies above that of modern fixed target facilities. \section{Spectrum-weighted moments} \label{sec:zfacs} The modeling of hadronic interactions induced by primary cosmic rays and their secondary particles is the largest source of uncertainty in atmospheric neutrino computations \cite{Barr:2004br}. In longitudinal (1D) cascade calculations, particle production is described in terms of the inclusive multiplicity spectra \begin{equation} \label{eq:diff_cs} \frac{\text{d}N_{A \to h}}{\text{d}E_h}(E_\text{CR},A_\text{CR}, E_h) = \frac{1}{\sigma_\text{prod,A-air}(E_\text{CR})} \frac{\text{d}\sigma_{A \to h}}{\text{d}E_h}(E_\text{CR}, A_\text{CR}, E_h), \end{equation} where the index $h$ denotes the hadron type, {\it i.e.}{} pion, kaon, proton, etc., $A_\text{CR}$ and $E_\text{CR}$ are the mass and the energy of the cosmic ray nucleus, and $E_h$ is the energy of the hadron, $\sigma_\text{prod}$ the interaction cross section and $\frac{\text{d}\sigma_{A \to h}}{\text{d}E_h}(E_\text{CR}, A_\text{CR}, E_h)$ the differential particle production cross section. Semi-analytical solutions for the inclusive flux $\Phi$ of leptons $\ell$ in the atmosphere are explained in detail in {\it e.g.}{} \cite{Gaisser:2016uoy} and also in a different contribution at this conference \cite{Gaisser:2019icrc}. The solutions are of the form \begin{equation} \label{eq:semi-anal} \Phi_\ell(E) = \frac{\phi_\text{N}(E)}{1 - Z_{\rm NN}}\sum_{\substack{h = \pi,\\ \text{K}, \text{K}^0_\text{L},\dots}} \frac{Z_{\text{N}h,\gamma} Z_{h \to \ell,\gamma}}{1 + B_{h\ell} E \cos\theta/\varepsilon_h}, \end{equation} with a quantity $B_{h\ell}$, that depends on the spectral index of cosmic rays and the decay kinematics of the meson $h$. The so called energy-independent spectrum weighted moments (Z-factors) \begin{equation} \label{eq:z-factor} Z_{Nh} = \int_0^1 {\mathrm d}{} x_{\rm Lab} ~ x_{\rm Lab}^{\gamma - 1} \frac{{\mathrm d} N_{\text{N} \to h}}{{\mathrm d} x_{\rm Lab}}, \end{equation} take into account the multiplicity and the spectrum of the secondary meson $h$ into account. Similarly, the decay Z-factor contains the branching ratio of $h$ into leptons of type $\ell$. In this energy-independent approach, one assumptions the scaling given in differential spectra \equ{diff_cs}, a weak energy-dependence of the interaction cross section, and a constant power-law index $\gamma$ of the primary cosmic ray flux at the top of the atmosphere. In that case it is sufficient to use the fractional energy $x_\text{Lab} = E_\text{h}/E_\text{projectile}$ in place of two-dimensional distributions in projectile and secondary energy. The critical energies $\varepsilon_h$ approximately describe the energy at which the interaction probability becomes higher than the decay probability. This leads to breaks in the spectra of secondaries, {\it i.e.}{} $\phi_\ell \sim E_\ell^{\gamma}$ at $E_\ell \ll \varepsilon_h$, and $\phi_\ell \sim E_\ell^{\gamma - 1}$ at high energies. Hence, the inclusive flux of neutrinos and muons follows the cosmic ray spectrum at low energies, and at the highest energies is a power steeper. When relaxing the scaling assumptions, a more advanced form of the Z-factor can be written down \begin{equation} \label{eq:z-factor-edep} Z_{Nh}(E_\text{pr}) = \int_0^1 {\mathrm d}{} x_{\rm Lab} ~ x_{\rm Lab}^{\gamma(E_\text{pr}) - 1} \frac{{\mathrm d} N_{\text{N} \to h}}{{\mathrm d} x_{\rm Lab}}(E_\text{pr}). \end{equation} Note, that this definition is different from the so-called energy-dependent Z-factor introduced in \cite{thunman_1996}. \begin{SCfigure}[0.6] \centering \includegraphics[width=0.65\textwidth]{E_dep_Zfac_ng.pdf} \caption{Energy dependence of Z-factors calculated according to \equ{z-factor-edep} for a single choice of the primary cosmic ray spectrum {\it GSF} from \cite{Dembinski:2017zsh}. The energy dependence originates from non-(Feynman-)-scaling of the interaction models, the cross section and the spectral index of the cosmic ray nucleon flux. Note Z-factors are independent of the atmospheric leptons flavor.} \label{fig:edep-zfac} \end{SCfigure} Figure \ref{fig:edep-zfac} demonstrates the energy dependence of the $Z_{\text{p}h}$ for different hadronic interaction models \cite{Riehn:2017mfm,Pierog:2013ria,Ostapchenko:2010vb,dpmjetIII,Fedynitch:2015kcn}. For the modeling of this measurement, we will use the iterative cascade equation solver {\sc MCEq}{} that does not make use of the above mentioned method. However, the Z-factor framework is an essential element in the definition of the $K/\pi$ ratio. \section{Atmospheric $K/\pi$ ratio} \label{sec:kpi_ratio} \begin{figure} \centering \includegraphics[width=0.85\textwidth]{flux_components.pdf} \caption{Composition of the atmospheric muon (left) and electron (right) neutrino flux from individual ``hadronic'' components for the zenith angle $\cos{\theta} = 0.5$. For more inclined angles the transition between pion and kaon dominated regimes in the muon neutrino flux moves to higher energies. While for electron neutrinos the contributions from direct pion decays is very small, charged pions indirectly affect the electron neutrino flux through the decay of secondary muons that predominantly come from pion decays at these energies. \label{fig:neutrino_components}} \end{figure} The break-down of the atmospheric neutrino flux into different hadronic components is illustrated in \figu{neutrino_components}. Neutrinos are predominantly created in weak two-body decays of the most abundant mesons - charged pions and kaons. Despite a strongly suppressed two-body decay of pions into electron neutrinos, pions contribute to low-energy electron neutrinos via decays of muons that predominantly come from pion decays. The shape of the inclusive neutrino flux is defined by the first few interactions at high altitudes with energies close to that of the initial cosmic ray projectiles \cite{Fedynitch:2018cbl}, in contrast to extensive air-showers where the pions observed by surface detectors originate from low-energy interactions of secondary pions. The method developed by \cite{Grashorn:2009ey} makes use of this fact and relates the seasonal variations of the muon rate observed by a deep underground detector to the quantity \begin{equation} \label{eq:kpi-ratio} r_{\text{K}/\pi} = \frac{Z_\text{NK}}{Z_{\text{N}\pi}}, \end{equation} that is proportional to the ratio of relative abundances of pions and kaons in the first few cascade generations. This $\text{K}/\pi$ ratio refers to the secondaries of the nucleon interaction with the atmosphere, hence it is independent of the lepton flavor (muons or neutrinos) in which it is measured. The measurements based on seasonal variations exploit the differences in the decay time of the secondary mesons, {\it i.e.}{} the ratio between interaction and absorption probability that varies according to air density fluctuations. \section{Neutrinos in IceCube DeepCore}\label{sec:atmnu} The DeepCore subarray as defined in this analysis includes 8 densely instrumented strings optimized for low energies plus 7 adjacent standard strings. All details about the event selection and the event reconstruction can be found in \cite{Aartsen:2017nmd,Aartsen:2019tjl} (referred to as Sample B). For the present analysis the sample was extended up to a reconstructed energy of 180~GeV to include more atmospheric neutrinos that originate from kaon decays. Events are classified as cascade and track-like using the likelihood ratio of reconstructions with and without a muon present. The cascade channel contains interactions from all flavors, while the track channel is dominated by charged current $\nu_\mu$ interactions. Event counts of each channel are binned in reconstructed energy (from 5~GeV to 180~GeV) and arrival zenith angle (full sky). Systematic uncertainties are included as correction functions that modify the expectation in any given bin and are correlated across all three observables. Uncertainties that have their origins in the detector response are parameterized in a multidimensional space by means of a full re-simulation of the events after varying the detector conditions. The full list of systematic uncertainties is given in Table~\ref{table:systematics}. \begin{table}[] \centering \begin{tabular}{cccc} \hline Parameter class & Description & Function & Uncertainty \\ \hline \hline \multirow{3}{*}{Cross section} & Axial mass of CCRES events & From GENIE & $\sigma_\mathrm{M_A}=20\%$ \\ \cline{2-4} & DIS NC cross section & Global scale & $\sigma_{\sigma_\mathrm{NC}}=20\%$ \\ \cline{2-4} & DIS CC cross section & $E^\gamma$ & $\sigma_\gamma=0.02$ \\ \hline Background & Atmospheric muon rate & Global scale & Ratio of two PDFs \\ \hline \multirow{3}{*}{Detector performance} & DOM forward acceptance & \multirow{3}{*}{From MC} & Flat prior \\ \cline{2-2} \cline{4-4} & DOM sideways acceptance & & From flasher data \\ \cline{2-2} \cline{4-4} & DOM global efficiency & & $\sigma_\mathrm{eff}=10\%$ \\ \hline Oscillations & $\sin^2\theta_{23}$ and $\Delta m^2_{32}$ & $\nu$ oscillations & Flat prior \\ \hline \end{tabular} \caption{Sources of uncertainty considered in the analysis. The atmospheric muon rate includes additional uncorrelated shape uncertainties from two data sidebands. Details can be found in \cite{Aartsen:2017nmd}. \label{table:systematics}} \end{table} \section{Analysis of pion and kaon relative contributions}\label{sec:analysis} As outlined in Section{\ref{sec:kpi_ratio}}, the ratio of pions to kaon abundances impacts the expected energy spectrum and angular distribution of the atmospheric neutrino spectrum. A reduction of kaons reduces the muon neutrino spectrum at high energies and vertical zenith angles. The horizontal directions remain largely unaffected. This is shown in \begin{SCfigure}[0.6] \centering \includegraphics[width=0.6\textwidth]{numu_piv3.pdf} \caption{Relative deviation of the expected atmospheric muon neutrino flux due to an increase of pion production by 20\%. The flux in the near-vertical zenith bins increases at high energy, while the horizontal directions are unaffected.} \label{fig:example_kaons} \end{SCfigure} \figu{example_kaons} that also demonstrates the quantitative impact on the effect on the two-dimensional flux map from an increase of kaon production by 20\% at all interaction energies. For this measurement we exploit the impact on the flux shape instead of the seasonal variation method as in previous measurements \cite{Adamson:2009zf,Desiati:2011hea,Agostini:2018fnx}. We compute the flux expectation and the correction functions (Jacobians) using the code {\sc MCEq}{} \cite{Fedynitch:2015zma,Fedynitch:2018cbl,Fedynitch:2018vfe}. Using the tabulated inclusive particle spectra (\equ{diff_cs}) stored in {\sc MCEq}{}, we compute the energy-dependent $Z$-factors from \equ{z-factor-edep} (see Fig.~\ref{fig:edep-zfac}) and derive a model-dependent expectation value of $r_{\text{K}/\pi}$. The two weights, $w_\pi$ and $w_k$, scale the inclusive particle production spectrum, for instance for $w_k$ \begin{equation} \label{eq:kpi-definition} Z^\star_{NK} = \int_0^1 {\mathrm d}{} x_{\rm Lab} ~ x_{\rm Lab}^{\gamma - 1} w_k\frac{{\mathrm d} N_{\text{N} \to k}}{{\mathrm d} x_{\rm Lab}} = w_k Z_{NK}, \end{equation} where the impact on the spectrum and zenith distribution is handled self-consistently by {\sc MCEq}{}. These parameters translate to a modified $r^\star_{K/\pi}$ \begin{equation} r^\star_{\text{K}/\pi} = \frac{Z^{\star}_\text{NK}}{Z^\star_{\text{N}\pi}} = \frac{w_k\, Z_\text{NK, HI}}{w_\pi\, Z_{\text{N}\pi,\text{HI}}} = \frac{w_k}{w_\pi}r_{\text{K}/\pi,\text{HI}}, \end{equation} where HI denotes the specific hadronic interaction model used. Simulation studies show that the proposed re-scaling method is insufficient to fully accommodate all the differences between modern hadronic interaction models. Additional effects come from the cosmic ray model used as an initial condition for the calculation. In order to test these dependencies, we perform the measurement starting from six different neutrino flux maps, comprised of combinations of two hadronic interaction models, DPMJET III 19.1 \cite{Fedynitch:2015kcn} and SIBYLL2.3c \cite{Riehn:2017mfm}, and three different cosmic ray models; Global Spline Fit \cite{Dembinski:2017zsh}, H3a \cite{Gaisser:2012em} and GH \cite{Gaisser:2002jj}. The resulting $r^\star_{K/\pi}$ for each combination is reported together with the $\Delta \chi^2$ with respect to the global best fit. Using simulation, we verified that assuming the data to follow one model combination different from the one used in the fit, the value of $r^\star_{K/\pi}$ is retrieved within the expected errors of the measurement. \section{Results and discussion}\label{sec:results} \begin{figure} \centering \includegraphics[width=0.8\textwidth]{Summary_TwoNu_scan_simple.pdf} \caption{The best fit $r_{\text{K}/\pi}$ for each combination of cosmic ray and hadronic model. The obtained values of $r_{\text{K}/\pi}$ agree within the uncertainties of the measurement, irrespective of the model combination used as an initial assumption. The best description of the neutrino flux is achieved with the Global Spline Fit (GSF) primary flux and the {\sc DPMJET-III 19.1} interaction model.} \label{fig:results-all} \end{figure} \begin{figure} \centering \includegraphics[width=0.8\textwidth]{Kpi_ratio_DC_vs_exp.pdf} \caption{Measurements and theoretical expectation of the atmospheric $K/\pi$ ratio. Our result (black data point) covers a new energy range between several hundred GeV and 6~TeV and is the first result using neutrinos. The other data points from MINOS \cite{Adamson:2009zf}, IceCube \cite{Desiati:2011hea} and Borexino \cite{Agostini:2018fnx} use a method based on the seasonal variations of the atmospheric muon rate. While all measurements are compatible within their experimental errors, the tendency is for lower values compared to the theoretical expectations.} \label{fig:results-best} \end{figure} The $r^\star_{\text{K}/\pi}$ results for each of the six model combinations are shown in~\figu{results-all}. The best fit to the data is obtained with $r^\star_{\text{K}/\pi} = 0.076^{+0.016}_{-0.015}$ from the combination of the Global Spline Fit and {\sc DPMJET-III 19.1}. The best fit value is consistent across all the six model combinations. \figu{results-best} compares our result with previous measurements that use seasonal variations of the atmospheric muon rate and the temperature correlation coefficient method \cite{Grashorn:2009ey}. The energy range covered by this measurement was determined by finding the relevant cosmic ray energies that contribute to the central 68\% of the neutrino sample. We find the relative kaon contribution to be between 1.5$\sigma$ and 2$\sigma$ lower than expected. Multiple tests were performed neglecting regions of the observable space where the simulation could be modeling the data poorly. The numerical value was found to change within the uncertainties quoted above. The study will be updated in the near future using more years of data, as well as a sample extending to higher reconstructed energy, into a region of the space where neutrinos from kaons should dominate. \newpage \providecommand{\href}[2]{#2}\begingroup\raggedright
\section{ \section{Introduction} \label{sec:intro} \subsection{Neutrino Production in Solar Flare} A solar flare is an explosive event at the surface of the Sun and is characterized by a rapid increase in the radiative flux. Through a process of magnetic reconnection, a solar flare converts its magnetic energy into thermal and kinetic energies of charged particles~\citep{parker_connection}. A typical solar flare is estimated to release $10^{26}$--$10^{32}$~erg~\citep{ellison}. On the basis of optical observations, a typical energy release time scale is $100$--$1,000$~s depending on the wavelength range~\citep{kane}. The occurrence rate of flares is also well studied, as it is the frequency distribution as a function of energy released. This distribution can be described by an inverse power-law in the energy range above $10^{27}~$erg~\citep{occur1, occur2}. Solar flares accelerate charged particles, such as electrons and protons, and carry non-thermal energy from the acceleration site to the energy loss site in the chromosphere. These accelerated particles reach relativistic velocities in a short time, becoming so-called energetic particles. Additional counterparts, such as high energy particles~\citep{explorer1, oso1, masuda_flare} and electromagnetic waves, have been observed and recorded in several satellites, for example, the {\it Orbiting Solar Observatory} series~\citep{oso2}, the {\it Geostationary Operational Environmental Satellite}~(GOES)~series~\citep{goes_tech}, the {\it International Sun-Earth Explorer 3}~(ISEE 3)~\citep{isee3}, the {\it Solar Maximum Mission} (SMM)~\citep{smm}, the {\it Reuven Ramaty High Energy Solar Spectroscopic Imager} (RHESSI)~\citep{rhessi, rhessi_det}, the {\it Compton Gamma Ray Observatory}~\citep{cgro}, HINOTORI~\citep{hinotori_flare}, Yohkoh~\citep{yohkoh}, Konus-Wind~\citep{konus_det}, and the Fermi-LAT~({\it Large Area Telescope}) satellite~\citep{fermi_lat}. Although several models have been proposed to explain the particle acceleration associated with solar flares~\citep{model1, model2, model3}, the acceleration mechanism remains unknown. As neutral particles, such as neutrons, neutrinos, X-ray photons, and $\gamma$-ray photons, are not affected by magnetic field between the Sun and the Earth, these particles have an important role to play in our understanding of both the location and the time profile of particle acceleration during solar flares. In particular, neutrinos associated with solar flares~(hereafter solar flare neutrinos) attract significant attention in the field of astrophysics. If protons are accelerated during solar flares to sufficiently high energies~(more than $300$~MeV), pions are produced by collisions with other nuclei in the solar atmosphere~\citep{pi02,pi03}. Finally, neutrinos are generated via the decay of those charged pions such as atmospheric neutrinos. Because of this hadronic origin, solar flare neutrinos give information about the acceleration of protons as well as subsequent interactions in the solar chromosphere. \subsection{Brief History of Neutrinos Associated with Solar Flare} Because the process of neutrino production is the same as that of atmospheric neutrinos, the energy range of solar flare neutrinos overlaps with that of atmospheric neutrinos. Hence, a technical difficulty arises in separating atmospheric neutrinos from solar flare neutrinos in neutrino experiments such as Super-Kamiokande (Super-K)~\citep{sk_det}, IceCube~\citep{icecube}, and so on. For the last 60~years, neutrinos from solar flares have been experimentally sought by Homestake~\citep{homestake}, Kamiokande~\citep{kam_flare}, SNO~\citep{sno_flare} and Borexino experiments~\citep{borexino} but remain unidentified. In 1988, the Homestake experiment reported an excess of neutrino events when energetic solar flares occurred. This observation suggested a relation between solar flares and the neutrino capture rate on $\mathrm{^{37}Cl}$~\citep{bahcall1, bahcall2} and proposed neutrino magnetic moment spin precession to explain the time variation of the capture rate~\citep{right1, right2}. However, the Kamiokande, SNO and Borexino experiments searched for neutrino signals using different solar flare samples and found no candidate signal related to solar flares. Last several decades, some emission models of solar flare neutrinos have been theoretically discussed~\citep{wilson, boya1,boya2, farg1, farg2, kocha, take}. For example, \citealp{farg1} and \citealp{farg2} predicted a possibility of observing neutrinos from a large solar flare of energy greater than $10^{32}$~erg using Super-K and IceCube. On the other hand, \citealp{take} predicted no possibility of observing neutrinos in Hyper-Kamiokande~\citep{hk} by numerical simulations. \subsection{Time Window for Neutrino Search} As explained above, the separation of atmospheric neutrinos from solar flare neutrinos is technically difficult. Although atmospheric neutrinos are constantly generated, solar flare neutrinos are expected to be released only during the time scale of particle acceleration. Therefore, the signal-to-noise ratio for observing solar flare neutrinos can be improved by setting an appropriate search window. The National Oceanic and Atmospheric Administration~(NOAA) maintains a list of solar flares observed by the GOES satellite. This list summarizes the date of each solar flare, its location, its class, its start and end times, and so on. This information can be used to estimate the time scale of solar flares. However it is questionable whether this time window is appropriate for solar flare neutrino searches, because the GOES satellite provides data relating only to the intensity of soft X-rays produced by thermal electrons. For this reason, the GOES data are not particularly useful in identifying the production time scale of solar flare neutrinos. In the previous study, \citealp{window} proposed a method for determining the search window for solar flare neutrinos using $\gamma$-rays above $70$~MeV for neutral pion decays ($\pi^{0}\to2\gamma$) observed by the Fermi-LAT satellite~\cite{fermi_flare}. The appearance of neutral pions implies the generation of neutrinos in solar flares, because neutral pions in solar flares are produced simultaneously with the charged pions. Therefore, it is natural to set the search window for solar flare neutrinos based on occurrence time frame of $\gamma$-ray emission caused by neutral pions. However, as the Fermi-LAT satellite was launched only in 2008, the earlier period is not covered and the observation of such $\gamma$-ray emission is rare~\citep{kuz}. Notably, this restriction prevents the use of this method for the largest solar flare on record November 04, 2003, class X$28.0$~\citep{x28}. For the above reasons, the appropriate time window for searching for solar flare neutrinos must be set using an alternative method. In this study, we analyzed not only soft X-rays but also $\gamma$-rays and hard X-rays because an accelerated proton during a solar flare also has a chance of generating $\gamma$-rays and neutrons. As mentioned above, $\gamma$-rays indicate the timing of proton interactions in the solar atmosphere, with neutrinos expected to be produced simultaneously. Therefore, timing information recorded by either $\gamma$-ray or X-ray instruments allows neutrino detectors to set the appropriate time window for solar flare neutrino searches. This paper is organized as follows. In Section~\ref{sec:over}, we provide a brief overview of X-rays and $\gamma$-rays for solar flares. In Section~\ref{sec:method}, we describe a method for determining the time window to search for neutrinos from solar flares. In Section~\ref{sec:result}, we present the analysis result. In the final section, we discuss the conclusions and future prospects. \section{Overview of Electromagnetic Observations Related to Accelerated Particles} \label{sec:over} The measurement of electromagnetic wave energy allows the identification of its production and origin. The different mechanisms generate different kinds of brightening or dimming in the energy flux~\citep{kane}. Several observations of neutrons and electromagnetic waves associated with solar flares have been performed by space satellites since the 1960s. Alothough there are electromagnegic observations in Extreme Ultraviolet, radio and visible light range, we focus on X-ray and $\gamma$-ray observations to discuss neutrino emission in solar flares. \subsection{Soft X-rays} Soft X-rays are originally produced by bremsstrahlung from electrons in thermal motion. Because the energy of a particle accelerated by a solar flare is ultimately converted into thermal energy, the total intensity of the soft X-ray is used to represent the total energy released by the solar flare. A peak value for the soft X-ray flux in the range of $1$--$8~\mathrm{\AA}$~($1.5$--$12$~keV) observed by GOES is widely used as an indicator in the classification of solar flares. On the Basis of this classification, a solar flare whose peak value exceeds $1.0\times10^{-4}~\mathrm{W/m^{2}}$~(X1.0 class) is considered to be the largest order~\citep{goes_tech2}. \subsection{Hard X-rays} Hard X-rays are produced by bremsstrahlung from non-thermal electrons and the energy ranges from a few keV to MeV. Such non-thermal electrons are accelerated by the solar flare; hence they provide information about the energy distribution of the non-thermal electrons. Non-thermal electrons lose their energy by scattering in the solar atmosphere and eventually generate thermal bremsstrahlung. In contrast with soft X-rays, hard X-rays provide information about the electron acceleration site and its time frame \citep{Fletcher2011, Holman, kontar2011}. \citet{neupert} found that the timing of the soft X-ray derivative maximum is almost the same as the peak time of the non-thermal microwave emissions in the impulsive phase of solar flares and interpreted that the heating may be the result of collisional losses by energetic accelerated electrons. This is called the Neupert effect and can be applied in the case of non-thermal hard X-rays emissions instead of microwave emission~\citep{neupert_stat, goes_neupert}. Using this effect, we can extract information about electron acceleration from soft X-ray data because a light curve of soft X-rays differentiated by time is expected to be similar to a light curve of hard X-rays. This method is useful to estimate a time profile of electron acceleration even when hard X-ray data are not available during a solar flare. \subsection{$\gamma$-rays} Because neutrinos are produced via hadronic decay, the timing of these interactions should be identified in order to determine the search window. The time profile of $\gamma$-rays is the most important in this study because an observation of $\gamma$-rays implies the acceleration and nuclear reactions of protons. In a solar flare, there are several different reactions produce $\gamma$-rays; $\gamma$-rays due to bremsstrahlung from high energy electrons, $\gamma$-rays due to electron-positron annihilation, line $\gamma$-rays due to neutron capture on hydrogen nuclei, and $\gamma$-rays due to de-excitation from nuclei, such as carbon~($\mathrm{^{12}C}$) and oxygen~($\mathrm{^{16}O}$)~\citep{carbon1, carbon}. Among these, line $\gamma$-rays due to neutron capture on hydrogen nuclei are the most important channel and are discussed below, along with $\gamma$-ray emission due to neutral pions. \subsubsection{Line $\gamma$-ray from Neutron} High energy protons accelerated by a solar flare collide with helium in the solar chromosphere and finally produce neutrons. Such neutrons undergo thermalization and ultimately produce $2.223$~MeV of $\gamma$-rays, so called line $\gamma$-rays, when they are captured on hydrogen nuclei. A line $\gamma$-ray is an indirect evidence of hadronic interactions including neutrons and high energy protons in a solar flare. Therefore, the determination of the search window should include analysis of the timing of line $\gamma$-rays, as their appearance indicates the acceleration of protons. However, in so doing we must take into account the delay time of about $100$~s from the generation of line $\gamma$-rays to the capture of produced neutrons on hydrogen~\citep{gan}. As explained above, hard X-rays are produced by the acceleration of electrons, and line $\gamma$-rays are produced by hadronic interactions after the acceleration of protons~(i.e. ions). Shih {\it et al.,} 2009 found a linear correlation between the fluence of the $2.223$~MeV $\gamma$-ray and the fluence of the hard X-ray above $300$~keV in a large solar flare. Although it is unclear whether each acceleration happens at the same time and at the same location, this correlation implies a close relationship between the acceleration process of electrons and that of protons. Assuming this correlation, a timing delay due to neutron capture is expected in the line $\gamma$-ray flux in comparison with the hard X-ray flux. \subsubsection{$\gamma$-rays from Pions} Neutral pions~($\pi^{0}$) appear in proton-proton collisions when their energies exceed $300$~MeV. The observation of $\gamma$-ray between $70$~MeV and $100$~MeV produced via neutral pion decays~($\pi^{0}\to2\gamma$) implies the production of neutrinos during solar flares because neutral pions are produced simultaneously with the charged pions~\citep{kurt}. In fact, the Fermi-LAT satellite and Coronal-F satellite's SONG detector have both provided examples of $\gamma$-ray observations from neutral pions. In the case of the solar flare on October 28, 2003, SONG recorded a sharp $\gamma$-ray increase due to $\gamma$-ray emission from neutral pions. In this case, the emission lasted for at least $8$--$9$~min~\citep{kurt2, kuz}. On the contrary, Fermi-LAT reported that the $\pi^{0}$ emission after the solar flare on September 10, 2017 lasted for about 12 h~\citep{omodei}. On the basis of these observations, the expected solar flare neutrino rate at the Earth's surface may be estimated by numerical calculation. However, this estimation is beyond the scope of this paper, because the time profile of $\gamma$-ray emission remains unclear. \section{Analysis Method} \label{sec:method} To search for solar flare neutrinos, we used public data from solar satellites and computational resources of the Center for Integrated Data Science~(CIDAS) at Nagoya University. In this study, we analyzed the data recorded by three satellites; GOES, RHESSI and GEOTAIL. The main~(sub) targets for each satellite are summarized in Table~\ref{tbl:satellite}. \begin{table} \caption{Observation targets for each solar satellite. Circles~($\bigcirc$) show the main target whose energy and timing can be measured by the satellite's devices. Triangles~($\bigtriangleup$) indicate secondary target, hardly detectable by the satellite as direct measurements; the counting rate alone can indirectly imply target existence. Details are described in the later sections.} \label{tbl:satellite} \begin{tabular}{ccccccc} \hline Satellite &Launch year & End year& Soft X-ray & Hard X-ray & Line $\gamma$-ray & $\gamma$-ray \\ \hline GOES & 1975 & -- & $\bigcirc$ & $\bigtriangleup$ & -- & -- \\ RHESSI & 2002 & 2018 & $\bigcirc$ & $\bigcirc$ & $\bigcirc$ & $\bigcirc$ \\ GEOTAIL &1992 & -- & -- & $\bigtriangleup$ & $\bigtriangleup$ & $\bigtriangleup$ \\ \hline \end{tabular} \end{table} Using CIDAS, we analyzed the GOES satellite's soft X-ray data, as well as the RHESSI satellite's hard X-ray and $\gamma$-ray data, as summarized in Table~\ref{tbl:energy_range}. For the analysis of GEOTAIL data, we checked the public data in CIDAS and then analyzed the corresponding raw data in order to recover hard X-rays above $50$~keV including soft $\gamma$-rays. \begin{table} \caption{Summary of satellites and energy ranges in this study. As described in the main text, GEOTAIL cannot measure the energy of neutral charged particles above $50$~keV. } \label{tbl:energy_range} \begin{tabular}{ccc} \hline Type & Satellite & Energy range~(wave length) \\ \hline Soft X-ray & GOES & $1.5$--$12$~keV~($1$--$8$~$\mathrm{\AA}$) \\ Hard X-ray & RHESSI & $100$--$800$~keV \\ Line $\gamma$-ray & RHESSI & $2.218$--$2.228$~MeV \\ Hard X-ray and soft $\gamma$-ray & GEOTAIL & Above $50$~keV \\ \hline \end{tabular} \end{table} \subsection{Soft X-rays~(GOES)} \label{subsec:soft} We used data obtained by the GOES satellite to determine the search window, because the GOES satellite series have continually monitored solar flares since 1975. Its long operation permits the use of the same indicator in comparisons between older and more recent flares. For this study, we first registered all solar flares occurring from 1996 to 2018 in the NOAA list. Then, we selected the 23 solar flares whose peak soft X-ray intensity exceeds $5.0\times10^{-4}~\mathrm{W/m^{2}}$~(X5.0 class). The date, class, and location on the Sun~(active region, so called AR) for each selected flare are summarized in Table~\ref{table:flares}. \begin{table} \caption{List of solar flares selected for this study. The data, class and active region~(AR) location are taken from a National Oceanic and Atmospheric Administration source~(NOAA, https:\slash{}\slash{}www.ngdc.noaa.gov\slash{}stp\slash{}space-weather\slash{}solar-data\slash{}solar-features\slash{}solar-flares\slash{}x-rays\slash{}goes\slash{}xrs\slash{}).} \label{table:flares} \begin{tabular}{ccc} \hline Date&Class&AR location \\ \hline 1997 Nov. 6 & X9.5 & S18W63\\ 2000 Jul. 14& X5.7 & N22W07 \\ 2001 Apr. 2 & X20.0& S21E83 \\ 2001 Apr. 6 & X5.6 & S21E31 \\ 2001 Apr. 15& X14.4& S20W85 \\ 2001 Aug. 25& X5.8 & S17E34 \\ 2001 Dec. 13& X5.3 & N16E09 \\ 2002 Jul. 23& X5.1 & S13E72 \\ 2003 Oct. 23& X5.4 & S21E88 \\ 2003 Oct. 28& X17.2& S16E08 \\ 2003 Oct. 29& X10.0& S15W02 \\ 2003 Nov. 2 & X9.2 & S14W56 \\ 2003 Nov. 4 & X28.0& S19W83 \\ 2005 Jan. 20& X7.1 & N14W61 \\ 2005 Sep. 7 & X18.2& S11E77 \\ 2005 Sep. 8 & X5.4 & S12E75 \\ 2005 Sep. 9 & X6.2 & S12E67 \\ 2006 Dec. 5 & X9.0 & S07E68 \\ 2006 Dec. 6 & X6.5 & S05E64 \\ 2011 Aug. 9 & X7.4 & N14W69 \\ 2012 Mar. 7 & X5.4 & N22E12 \\ 2017 Sep. 6 & X9.4 & S09W34 \\ 2017 Sep. 10& X8.3 & S08W88 \\ \hline \end{tabular} \end{table} A typical soft X-ray light curve observed by the GOES satellite is shown in the top panel of Figure~\ref{fig:soft}. In the NOAA list, the timing at which four consecutive flux increases occur was determined as the start time of each solar flare. The flare end time was typically determined as the timing at which the event's flux decline to half the value of its peak. However, this end time depends on the flare class which make unsuitable for our analysis. We therefore set the flare end time as the timing at which the flux declines to $1.0\times10^{-4}~\mathrm{W/m^{2}}$~(X1.0~class). \begin{figure} \centerline{\includegraphics[width=0.8\textwidth,clip=]{./fig1.eps}} \caption{An example solar flare occurring on October 28, 2003, showing the soft X-ray light curve~(top) observed by the GOES satellite and the derivative of the flux of soft X-rays~(bottom). In the top panel, the horizontal axis is universal time and the vertical axis is the flux of soft X-rays. The black dotted horizontal~(vertical) line shows the flux of $1.0\times10^{-4}~\mathrm{W/m^{2}}$~(the peak timing of this channel). The region drawn in gray shows the time window selected in this study. In the bottom panel, the horizontal axis is universal time and the vertical axis is the derivative of the flux of soft X-rays with respect to time. The blue dots and the green region depict the data and their error, respectively. The red curve is the result of the Gaussian fitting and the vertical dotted line shows the peak timing of this channel. The gray region shows the time window selected by this study.}\label{fig:soft} \end{figure} To extract information about light curve brightening correlated with particle acceleration, we took a calculation of the time derivative of the light curve as shown in the bottom panel of Figure~\ref{fig:soft}. In this analysis, we used the $1$--$8$~$\mathrm{\AA}$ band the same as used by \citealp{kurt}. For setting the time window, we first fitted the light curve with a Gauss function~($A\exp\{(t-t_{\mathrm{peak}})^{2}/\sigma^{2}\}$). We then selected the region of $[t_{\mathrm{peak}}-3\sigma,~t_{\mathrm{peak}}+3\sigma]$ as the search window. \subsection{Hard X-ray~(RHESSI)} \label{subsec:hard} The RHESSI satellite was launched on February 2002 to monitor solar flares. It records electromagnetic waves in the range of $3$~keV to $17$~MeV and measures continuous spectra from bremsstrahlung of high energy electrons, line $\gamma$-rays of 2.223 MeV, and $\gamma$-rays from $\mathrm{^{12}C}$ and $\mathrm{^{16}O}$ nuclei~\citep{rhessi}. Owing to its wide energy range, the RHESSI satellite provides important information for extracting acceleration time scales for electrons, protons, and ions. In this study, we integrated the energy spectrum in the range of $100$--$800$~keV for hard X-ray analysis as shown in the top panel of Figure~\ref{fig:rhessi}a. We then determined the count rate within this energy range using the front detector on the RHESSI because the front detectors are sensitive to $100$--$300$~keV emission and they are dominant in the range of $100$--$800$~keV. To set the search window, we fitted the light curve via a combination of basic functions. For the fitting, we used constant value for the background before the brightening, a linear function for the impulsive phase of the light curve, and an exponential function for the gradual phase. The start time~($t_{\mathrm{start}}$) is defined as the time when the liner function intersects the background constant. The time window was determined by selecting the region where the exponential function is $2\sigma$ above the background constant. The standard deviation~($\sigma$) is obtained as standard deviation of constant background fitting. The end time~($t_{\mathrm{end}}$) is the last point satisfying this condition. In this way, the search window by hard X-ray is determined as [$t_{\mathrm{start}},~t_{\mathrm{end}}$]. \subsection{Line $\gamma$-rays~(RHESSI)} For line $\gamma$-ray analysis, we first scanned the energy spectrum recorded by the rear detector of RHESSI in quiet period of the Sun and during each solar flare as exampled in the top panel of Figure~\ref{fig:rhessi}a. During solar flare, we selected the time interval corresponding to the time window determined by GOES soft X-rays. On the other hand, we selected the time interval of quiet period one month before a solar flare and then removed the time period when C (or larger) class flare occurred. Then, we took a ratio between them as shown in the bottom panel of Figure~\ref{fig:rhessi}a. When we confirmed an excess of the line $\gamma$-ray in the spectrum during the solar flare, we plotted the light curve using the energy range of $2.218$--$2.228$~MeV after subtracting its sideband of both $2.213$--$2.218$~keV and $2.228$--$2.233$~keV in order to remove bremsstrahlung from high energy electrons as shown in Figure~\ref{fig:rhessi}b. To determine the search window, we used the same method described above for hard X-rays. However, because of the neutron capture time delay~\citep{gan}, we ultimately selected the region of [$t_{\mathrm{start}}-100~\mathrm{sec},~t_{\mathrm{end}}$] as the time window for line $\gamma$-ray. \begin{figure} \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig2a.eps}} \end{minipage} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig2b.eps}} \end{minipage} } \caption{(a) Energy spectra of $\gamma$-rays associated with the solar flare occurring on November 2, 2003 as recorded by the RHESSI detectors (front 4--8 and rear 1--9). The blue solid and pink dotted lines shows the energy spectrum in quiet period and during solar flare~($17:03:00$--$18:07:03$ UTC). The horizontal axis shows energy in keV and the vertical axis in the top panel shows the flux of $\gamma$-rays in units of $\mathrm{cm^{-2} sec^{-1} keV^{-1}}$. The vertical axis in the bottom panel shows the ratio between fluxes. The vertical dashed line in top and bottom panel indicates $800$~keV. For hard X-ray analysis, we used $100$--$800$~keV. Above this energy region, we searched for line $\gamma$-rays due to neutron captures. (b)~Light curve of the line $\gamma$-rays in this solar flare shown in (a). The horizontal axis shows universal time and the vertical axis shows the count rate in units of count per 4~s. The blue points and green bars depict the data and their error, respectively. The red lines show the fitting results and the shaded region shows the time window determined by this method.}\label{fig:rhessi} \end{figure} \subsection{GEOTAIL Satellite Hard X-ray Events} \label{subsec:neutron} The GEOTAIL satellite was launched in July 1992 to observe the Earth's magnetosphere. Its main targets are electrical field, magnetic field, plasma and high energy particles in the magnetosphere. The LEP~(low energy particle) instrument mounted on the satellite, can measure counts of ions and electrons independently based on energy-per-charge separation~\citep{mukai}. The LEP detector consists of an electrostatic analyzer and particle counters: microchannel plates for ions, and channel electron multipliers for electrons. GEOTAIL has occasionally been exposed to the intense fluxes of energetic ions ${>}50$~MeV and photons of ${>}50$~keV after strong solar flares or giant flares of magnetars~\citep{terasawa,geo3,geo2}. These energetic ions and photons do not follow the the electrostatic analyzer's energy-per-charge regulation, but rather penetrate through the satellite wall and hit the particle counters directly. For the solar flare case, energetic photons include hard X-ray photons from bremsstrahlung by high energy electrons, as well as line $\gamma$-ray photons from nuclear interactions. Figure~\ref{fig:geotail} shows an example of this situation. During the interval 10:35:00--11:35:00 UTC on October 28, 2003, GEOTAIL was in the solar wind upstream of the Earth's bow shock and continued to measure solar wind particles as well as nonthermal ions~($10$--$40$ $\mathrm{keV/q}$) accelerated by the bow shock. However, during the interval 11:01:40--11:15:30 UTC, GEOTAIL was hit the solar flare hard X-ray photons, which produced the energy-independent stripes in the first to three panels of Figure 3. It is noted that tailward-flowing solar wind ions~(less than ${\sim}20~\mathrm{keV/q}$ colored with yellow-red-black) overwrapped with the hard X-ray stripes as shown in the fourth panel of Figure 3. The penetration depth for hard X-ray photons from the satellite wall to the counter depends on the satellite spin phase, so that the colors of the energy-independent differ stripes slightly sector by sector. The electron detector (not shown) responded to the solar flare hard X-ray photons similarly. However, because the form factor of the electron detectors is two orders of magnitude smaller than that of the ion detectors, the apparent contribution of solar flare hard X-ray photons is much weaker. In the present study, we estimated the time profiles of particle acceleration by selecting data from the four sectors and the energy range that was not ``contaminated'' by ions, taking count averages every $12$~s. Figure~\ref{fig:geotail_fit} shows the photon counts from 10:50:00 to 11:20:00 UTC, as calculated from the data in the dawnward, sunward, and duskward sectors in Figure~\ref{fig:geotail}. Finally, the time window for GEOTAIL was determined using the same method as that used in the analysis for line $\gamma$-ray above, because a component of the GEOTAIL signal contains line $\gamma$-rays. In order to avoid confusion with the term hard X-ray by RHESSI, we use the term hard X-ray~(${>}50$~keV, or above $50$~keV) to refer this channel by GEOTAIL even if the actual signals contain soft $\gamma$-ray as listed in Table~\ref{tbl:energy_range}. \begin{figure} \centerline{\includegraphics[width=0.85\textwidth,clip=]{./fig3.eps}} \caption{Count rates recorded by the LEP detector when this solar flare occurred on October, 28, 2003 are color-coded (white-blue-green-yellow-red-black). The horizontal axis shows the universal time (HH:MM) of particle detection. The vertical axis shows the energy of nonthermal ions in unis of energy-per-charge ($5$--$40~\mathrm{keV/q}$). Four panels, top to bottom, show ion counts in the four sectors pointed dawnward, sunward, duskward, and tailward, respectively, where the ion flow directions are defined with respect to the relative magnetosphere geometry of the Sun and Earth.}\label{fig:geotail} \end{figure} \begin{figure} \centerline{\includegraphics[width=0.8\textwidth,clip=]{./fig4.eps}} \caption{Light curve associated with the solar flare occurring on October, 28, 2003 as recorded by the GEOTAIL satellite. The horizontal axis shows the universal time, and the vertical axis shows count rate in units of counts/detector/$12$~s). Red points show the data, and blue lines show the fitting results. This flare is the same flare shown in Figure 3.}\label{fig:geotail_fit} \end{figure} \section{Results and Discussion} \label{sec:result} \subsection{Results} \label{subsec:result} Because all satellite data are available for the solar flare occurring on November 2, 2003, we used this example to illustrate the method for the time window determination developed in this study as shown in Figure~\ref{fig:light_curves}. \begin{figure} \centerline{\includegraphics[width=0.8\textwidth,clip=]{./fig5.eps}} \caption{Light curves of the solar flare occurring on November 2, 2003. Gray regions show the time windows extracted by the analysis methods developed in this study. From top to bottom, the panels show the light curves for soft X-rays, derivative of soft X-rays, hard X-rays~($100$--$800$~keV), line $\gamma$-rays~($2.223$~MeV), and hard X-rays~(GEOTAIL, above $50$~keV), respectively. The vertical lines show the peak timing of each channel. For the hard X-ray light curve ~(above $50$~keV), the count rate gradually increased from 17:40 onward because protons in the range of $30$--$50$~MeV were observed. These protons masked other counts due to plasma particles and hard X-ray photons.}\label{fig:light_curves} \end{figure} The analysis results for $23$ solar flares selected in this study are summarized in Tables~\ref{table:window1} and~\ref{table:window2}. It is noted that we failed to obtain the time window determined by derivative of soft X-ray for the solar flare occurred on September 9, 2005, because the brightening of its soft X-ray light curve was relatively slow and derivative of soft X-ray was not large enough. Except for this flare, we determined the time window for $22$ of $23$ solar flares by using derivative of the soft X-ray. In addition to this, we also determined the time window for five flares by hard X-ray~($100$--$800$~keV), three flares by line $\gamma$-ray, and seven flares by hard X-ray~(${>}50$~keV). It is noted that the time profile of the flare occurring on October 29, 2003 is not similar to those of the other flares, because a signal whose origin is not solar flare contaminated the solar flare signal. We did not determine the time windows for this flare by hard X--ray and line $\gamma$--ray channel. An alternative method, imaging method developed in \citealp{Liu_2009}, allows us to confirm non-solar flare signal causes this contamination. The hard X-ray light curve of this solar flare measured by this imaging method is shown in appendix. It is noted that there is not the line $\gamma$--ray light curve with the imaging method, because its flux was not large ehough. The line $\gamma$--ray time profile of this solar flare was investigated in \citealp{kurt2017}. Figure~\ref{fig:time_dist} summarizes the distribution of timing window duration for each channel. On the basis of these results, the average time duration for each channel is as follows; $4,178$~s for soft X-rays, $700$~s for derivative of soft X-rays, $944$~s for hard X-rays~($100$--$800$~keV), $1,586$~s for line $\gamma$-rays from neutron capture, and $776$~s for hard X-rays~(${>}50$~keV). The shortest time window among these is the derivative of soft X-rays. \begin{landscape} \begin{table} \caption{Time windows determined for soft X-rays, derivative of soft X-rays and hard X-rays. The time is described in units of UTC ([HH:MM:SS]).} \label{table:window1} \begin{tabular}{c|ccc|ccc|ccc} \hline Date&\multicolumn{3}{c|}{Soft X-rays~(GOES)}&\multicolumn{3}{c|}{Derivative of soft X-rays~(GOES)}&\multicolumn{3}{c}{Hard X-rays~(RHESSI)}\\ & $t_{\rm{start}}$&$t_{\rm{end}}$&$\Delta t$~[s]&$t_{\rm{start}}$&$t_{\rm{end}}$&$\Delta t$~[s]&$t_{\rm{start}}$&$t_{\rm{end}}$&$\Delta t$~[s]\\ \hline 1997 Nov. 6 & 11:49:00 & 12:12:21 &1,401 & 11:52:13&11:54:58&165&--&--&--\\ 2000 Jul. 14& 10:03:00 & 11:05:03 &3,723 & 10:08:44&10:28:31&1,187&--&--&--\\ 2001 Apr. 2& 21:32:00 & 22:56:12 &5,052 & 21:35:10&21:52:57&1,067&--&--&--\\ 2001 Apr. 6& 19:10:00 & 19:43:15 &1,995 & 19:12:32&19:21:31&539&--&--&-- \\ 2001 Apr. 15& 13:19:00 & 14:23:39 &3,879 & 13:43:48&13:51:03 &435&--&--&-- \\ 2001 Aug. 25& 16:23:00 & 17:36:18 &4,398 & 16:28:36&16:33:38&302&--&--&--\\ 2001 Dec. 13& 14:20:00 & 14:41:57 &1,317 & 14:24:25&14:31:05&400&--&--&-- \\ 2002 Jul. 23& 00:18:00 & 01:08:27 &3,027 & 00:25:08&00:31:36&388&00:25:44&00:36:46&562 \\ 2003 Oct. 23& 08:19:00 & 09:13:9 &3,249 & 08:20:32&08:36:03&931&--&--&-- \\ 2003 Oct. 28& 09:51:00 & 12:36:54 &9,954 & 10:59:30&11:10:57&687&--&--&-- \\ 2003 Oct. 29& 20:37:00 & 21:23:39 &2,799 & 20:38:46&20:50:07&681&--&--&-- \\ 2003 Nov. 2& 17:03:00 & 18:07:03 &3,843 & 17:12:01&17:26:03&842&17:15:41&17:39:22&1421 \\ 2003 Nov. 4& 19:29:00 & 21:10:12 &6,072 & 19:36:59&19:56:03&1,144&--&--&-- \\ 2005 Jan. 20& 06:36:00 & 08:05:48 &5,388 & 06:39:22&06:57:12&1,070&06:43:27&06:57:57&870 \\ 2005 Sep. 7& 17:17:00 & 18:48:57 &5,517 & 17:23:34&17:39:48&974&--&--&-- \\ 2005 Sep. 8& 20:52:00 & 21:31:48 &2,388 & 21:00:27&21:08:05&458&--&--&-- \\ 2005 Sep. 9& 19:13:00 & 21:20:36 &7,656 & --&--&--&--&--&--\\ 2006 Dec. 5& 10:18:00 & 10:56:09 &2,289 & 10:24:18&10:35:43&685&--&--&-- \\ 2006 Dec. 6& 18:29:00 & 19:16:30 &2,850 & 18:41:29&18:47:06&337&18:42:33&18:49:19&406 \\ 2011 Aug. 9& 07:48:00 & 08:11:47 &1,427& 08:00:50&08:05:40&290&--&--&-- \\ 2012 Mar. 7& 00:02:00 & 01:31:34 &5,374 & 00:04:21&00:25:16&1,255&--&--&--\\ 2017 Sep. 6& 11:53:00 & 13:30:00 &5,820 & 11:54:39&12:03:20&521&--&--&-- \\ 2017 Sep. 10& 15:35:00 & 17:26:06 &6,666 & 15:49:12&16:06:32&1,040&15:54:42&16:19:03&1,461\\ \hline \end{tabular} \end{table} \end{landscape} \begin{table}[h] \caption{Time windows determined for line $\gamma$-rays~(RHESSI) and hard X-rays~(GEOTAIL). Time is described in units of UTC ([HH:MM:SS]).} \label{table:window2} \begin{tabular}{c|ccc|ccc} \hline Date&\multicolumn{3}{c|}{Line $\gamma$-ray~(RHESSI)}&\multicolumn{3}{c}{Hard X-ray~(GEOTAIL)} \\ &$t_{\rm{start}}$&$t_{\rm{end}}$&$\Delta t$~[s]&$t_{\rm{start}}$&$t_{\rm{end}}$&$\Delta t$~[s]\\ \hline 1997 Nov. 6&--&--&--&11:50:55&11:57:04&369\\ 2000 Jul. 14&--&--&--&--&--&--\\ 2001 Apr. 2&--&--&--&--&--&--\\ 2001 Apr. 6&--&--&--&--&--&-- \\ 2001 Apr. 15&--&--&--&13:43:42&13:51:58&469 \\ 2001 Aug. 25&--&--&--&16:28:29&16:34:54&385\\ 2001 Dec. 13&--&--&--&--&--&-- \\ 2002 Jul. 23&00:26:28&00:56:22&1,794&--&--&-- \\ 2003 Oct. 23&--&--&--&--&--&-- \\ 2003 Oct. 28&--&--&--&10:59:45&11:17:36&1,071 \\ 2003 Oct. 29&--&--&--&--&--&-- \\ 2003 Nov. 2&17:14:14&17:36:41&1,347&17:13:08&17:37:11&1,443 \\ 2003 Nov. 4&--&--&--&19:38:35&19:53:32&897 \\ 2005 Jan. 20&06:42:54&07:09:52&1,618&--&--&-- \\ 2005 Sep. 7&--&--&--&17:32:44&17:45:32&7678\\ 2005 Sep. 8&--&--&--&--&--&-- \\ 2005 Sep. 9&--&--&--&--&--&-- \\ 2006 Dec. 5&--&--&--&--&--&-- \\ 2006 Dec. 6&--&--&--&--&--&-- \\ 2011 Aug. 9&--&--&--&--&--&-- \\ 2012 Mar. 7&--&--&--&--&--&-- \\ 2017 Sep. 6&--&--&--&--&--&-- \\ 2017 Sep. 10&--&--&--&--&--&-- \\ \hline \end{tabular} \end{table} \begin{figure} \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig6a.eps}} \end{minipage} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig6b.eps}} \end{minipage} } \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig6c.eps}} \end{minipage} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig6d.eps}} \end{minipage} } \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig6e.eps}} \end{minipage} } \caption{Distributions of the time window determined by each method: (a)~light curve of soft X-rays, (b)~derivative of the light curve of soft X-rays, (c)~hard X-rays~($100$--$800$~keV), (d)~line $\gamma$-rays, and (e)~hard X-rays~(${>}50$~keV). The horizontal axis shows duration of the time window and the vertical axis shows the number of entry.} \label{fig:time_dist} \end{figure} Figure~\ref{fig:time_range} shows the time duration of search windows as a function of the maximum value of the soft X-ray peak. The correlation coefficients between the maximum value of the soft X-ray peak and the time duration of search windows are $0.436$ for soft X-rays, $0.341$ for soft X-rays~(derivative), $0.236$ for hard X-rays~(100--800~keV), $-0.344$ for line $\gamma$-rays, and $0.307$ for hard X-rays~(${>}50$~keV). Therefore, no strong correlation is found among them, as summarized in Table~\ref{tbl:comp_time}. \begin{figure} \centerline{\includegraphics[width=0.8\textwidth,clip=]{./fig7.eps}} \caption{Time duration as a function of the peak intensity of soft X-ray. Black dot, red square, green up-triangle, blue down-triangle, and light blue star show soft X-ray, derivative of soft X-ray, hard X-ray~($100$--$800$~keV), line $\gamma$-ray, and hard X-ray~(${>}50$~keV), respectively.} \label{fig:time_range} \end{figure} \begin{table} \caption{Summary of timing information obtained in this study. Average time durations are calculated from the distributions shown in Figure~\ref{fig:time_dist}. Correlation coefficients are calculated from the distribution shown in Figure~\ref{fig:time_range}. The differences in peak timing are calculated at a soft X-ray peak time of $0$~(Figure~\ref{fig:diff_peak}).} \label{tbl:comp_time} \begin{tabular}{ccccc} \hline & Entries &Average duration & Correlation & Peak timing \\ & & [s] & coefficient & difference [s] \\ \hline Soft X-ray &$23$ & $4,178$ & $0.436$ & -- \\ Soft X-ray~(derivative) &$22$& $700$ & $0.341$ & $-320$ \\ Hard X-ray~($100$--$800$~keV) & $5$ & $944$ & $0.236$ & $-482$ \\ Line $\gamma$-ray &$3$& $1,586$ & $-0.344$ & $-471$ \\ Hard X-ray~(${>}50$~keV) &$7$& $776$ & $0.307$ & $-342$ \\ \hline \end{tabular} \end{table} To investigate the difference in time profile between channels, we calculated the time elapsed between the peak timing of a given channel and the peak timing of soft X-rays as shown in Figure~\ref{fig:diff_peak}, because the peak timing of each channel is earlier than that of soft X-rays. The mean differences are $-320$~s for the derivative of soft X-rays, $-482$~s for hard X-rays~($100$--$800$~keV), $-471$~s for line $\gamma$-rays, and $-342$~s for hard X-rays~(${>}50$~keV). \begin{figure} \centerline{\includegraphics[width=0.8\textwidth,clip=]{./fig8.eps}} \caption{Time difference distribution after subtracting the peak timing of soft X-rays. The horizontal axis shows the time difference in units of seconds and the vertical axis shows the entry per $50$~s.} \label{fig:diff_peak} \end{figure} Each panel in Figure~\ref{fig:time_peak_diff} shows the time correlation between two variables: on the x-axis, the peak timing of soft X-rays; on the y-axis, a given channel after subtracting the peak timing of soft X-rays. To extract the difference between peak timings, the plots are fitted with a linear function; the fitting results are summarized in Table~\ref{tbl:summary_fit}. The y-intercept of the linear function gives the difference in peak timings. In Figure~\ref{fig:time_peak_diff}c, the fitting results are $0.9\pm0.1$ for the slope and $7\pm55$~s for the y-intercept. We found a good timing correlation between the derivative of soft X-rays and hard X-rays because the y-intercept is close to the origin of coordinates~($0,0$), thus confirming the Neupert effect between them. Notably, this confirmation takes place by comparing the peak timing without considering the shape of light curves. In Figure~\ref{fig:time_peak_diff}d, the y-intercept is $141\pm285$~s, suggesting that the peak timing of line $\gamma$-rays is delayed from that of hard X-rays~($100$--$800$~keV). If the acceleration of both electrons and ions occurs simultaneously, this difference between their timings is explained by considering neutron capture~\citep{gan,hard-line}. Figure~\ref{fig:time_peak_diff}e overlays the plots shown in Figure~\ref{fig:time_peak_diff}a and Figure~\ref{fig:time_peak_diff}b. We found that the peak timing of hard X-rays is earlier than that of line $\gamma$-rays, where their difference is about $100$~s. \begin{figure} \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig9a.eps}} \end{minipage} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig9b.eps}} \end{minipage} } \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig9c.eps}} \end{minipage} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig9d.eps}} \end{minipage} } \centerline{\hspace*{0.015\textwidth} \begin{minipage}{0.49\hsize} \centerline{\includegraphics[width=1.0\textwidth,clip=]{./fig9e.eps}} \end{minipage} } \caption{Relationship between each channel's peak timing after subtracting the peak time of soft X-rays. The fitting results are summarized in Table~\ref{tbl:summary_fit}. For (e), the plots shown in both (a) and (b) are overlaid. } \label{fig:time_peak_diff} \end{figure} \begin{table} \caption{Summary of results from fits in Figure~\ref{fig:time_peak_diff}. Each axis in Figure~\ref{fig:time_peak_diff} represents the time elapsed between the peak timing of a given channel and that of soft X-rays.} \label{tbl:summary_fit} \begin{tabular}{ccccc} \hline Figure~\ref{fig:time_peak_diff} & x-axis & y-axis & Fitting result & $\chi^{2}/\mathrm{d.o.f}$ \\ \hline (a) & Soft X-ray& Hard X-ray & $(1.1\pm0.4)x$ & $1.0/3$ \\ & (derivative) & ($100$--$800$~keV) & $+(41\pm166)$ & \\ \hline (b) & Soft X-ray & Line $\gamma$-ray & $(1.4\pm1.1)x$ & $0.3/1$ \\ & (derivative) & & $+(331\pm548)$ & \\ \hline (c) & Soft X-ray & Hard X-ray & $(0.9\pm0.1)x$ & $0.3/4$ \\ & (derivative) & (${>}50$~keV) & $+(7\pm55)$ & \\ \hline (d) & Hard X-ray& Line $\gamma$-ray & $(1.0\pm0.5)x$ & $0.1/1$ \\ & ($100$--$800$~keV) & & $(141\pm286)$ & \\ \hline \end{tabular} \end{table} \subsection{Applications to Neutrino Detectors} On the basis of our results, the longest time window, averaging $4,178$~s, can be set using soft X-rays. It is expected that all processes (acceleration of charged particles, energy release of (non)~thermal electrons, etc) occurring during a solar flare complete within this time window. Therefore, this window is advantageous for estimating the time scale of physics processes during solar flares. Despite its uselessness for identifying the time of solar flare neutrinos, the continuous monitoring by GOES allows us to set the search window for every solar flare even if other satellites miss the signals. The time derivative of soft X-rays allows the setting of the shortest time window, with an average of $700$~s. This time window is advantageous for searching for solar flare neutrinos, because it has the best chance of improving the signal-to-noise ratio. In the case of Super-K, the average observing rate of atmospheric neutrinos is $8.3$~events/day~\citep{atm_sk}. Assuming this time window, the expected background rate can be reduced to $0.067$~events/flare. If three events are observed within this time window, the Super-K detector can reject the null hypothesis of neutrinos not from solar flares at $95\%$ confidence level (C.L.). On the contrary, the derivative of soft X-rays does not provide us with information on the acceleration of protons or ionized particles, which produces neutrinos via hadronic interactions. Therefore, it is questionable whether this window is entirely appropriate for a comprehensive solar flare neutrino search. The line $\gamma$-ray observation is crucial in this study because such signals indicate the acceleration of protons and hadronic interactions including charged pions that produce neutrinos. The search window for solar flare neutrinos should therefore be determined by this channel. In the present study, four solar flares include $\gamma$-ray observation by RHESSI. One of these is shown in Figure~\ref{fig:light_curves}. The light curves of the other three flares are shown in Figures~\ref{fig:light_10}--\ref{fig:light_12} in the appendix. According to our study, hard X-ray~($100$--$800$~keV) light curve shape looks similar to that of line $\gamma$-rays. Their time profiles are also similar after subtracting the peak timing of soft X-rays in Figure~\ref{fig:time_peak_diff}c. Therefore, we suggest that the search window determined by hard X-ray~($100$--$800$~keV) information is useful in the search for solar flare neutrinos even if no line $\gamma$-ray data are available. \section{Conclusions and Future Prospects} Solar flare neutrinos attract significant attention because the detection of such neutrinos can extract information about particle acceleration during solar flares. Hence, we have developed a method for determining the search window for solar flare neutrinos. The longest search window, based on soft X-ray light curve, is estimated to last for $4,178$~s. On the contrary, the shortest search window, based on the derivative of soft X-rays, is estimated to last for $700$~s. The method developed in this study is useful for adoption by other space satellites, such as HINOTORI, Yohkoh, Hinode~\citep{hinode}, and several future planned satellites, for example the {\it Spectrometer/Telescope for Imaging X-rays} on board the {\it ESA Solar Orbiter}~\citep{stix,stix2}, the {\it Focusing Optics X-ray Solar Imager}~\citep{foxsi}, and {\it Physics of Energetic and Nonthermal plasmas in the X region}~(PhoENiX), proposed in Japan. This adoption will permit the extraction of information about both the neutrino production timing and particle acceleration during solar flares. Using the method in this study, a search for solar flare neutrinos above the X5 class undertaken from 1996 to 2018 by neutrino detectors, such as Super-K, SNO~\citep{sno}, IceCube, ANTARES~\citep{antares}, KamLAND~\citep{kamland} and Borexino~\citep{bore}. Assuming the shortest time window of derivative of soft X-ray, the expected background rate can be reduced to $0.067$~events/flare in the case of Super-K. If three events are observed within this time window, the Super-K detector can reject the null hypothesis of neutrinos not from solar flares at $95\%$~C.L. This method can also be used for future large solar flares and can improve sensitivity in the next generation of neutrino experiments, such as Hyper-Kamiokande, IceCube-Gen2~\citep{icegen2}, SNO${+}$~\citep{sno_p}, DUNE~\citep{dune}, LENA~\citep{lena}, and JUNO~\citep{juno}. \begin{acks} This work was carried out by the joint research program of the Institute for Space-Earth Environmental Research~(ISEE), Nagoya University. A part of this study was carried using the computational resources of the Center for Integrated Data Science, Institute for Space-Earth Environmental Research, Nagoya University, through the joint research program. We thank Y.~Saito from JAXA and I.~Shinohara from JAXA for reproducing GEOTAIL satellite data. We thank S.~Krucker for his careful reading of this manuscript and for his insightful comments and suggestions. This work is supported by MEXT KAKENHI Grant Numbers 17K17880, 18H05536, 18J00049 and 19J21344. \end{acks} \section*{Disclosure of Potential Conflicts of Interest} The authors declare that they have no conflicts of interest.
\section{Outline} \section{Introduction} Alibaba has China's largest e-commerce platform. To support its diverse businesses, Alibaba has its own large-scale data centers providing the computing foundation for a wide variety of software applications. Among these applications, deep learning (DL) has been playing an important role in delivering services like image recognition, objection detection, text recognition, recommendation, and language processing. To build more efficient data centers that deliver higher performance for these DL applications, it is important to understand their computational needs and use that information to guide the design of future computing infrastructure. An effective way to achieve this is through benchmarks that can fully represent Alibaba's DL applications. A number of DL benchmarks already exist or are under development, such as MLPerf \cite{mlperf}, DeepBench \cite{deepbench}, Training Benchmark for DNNs (TBD) \cite{dnnbench}, DAWNBench \cite{dawnbench}, Fathom \cite{fathom}, AI Benchmark \cite{aibench}, BenchIP \cite{benchip}, and synthetic benchmarks \cite{aimatrix}. However, these benchmarks are not good representations of Alibaba's DL workloads, for three reasons. First, some of these benchmarks, such as MLPerf, TBD, and DAWNBench, are too general-purpose and target the most typical DL applications that are interesting to a broad range of users. Thus, they cannot represent the workloads that are specific to Alibaba's e-commerce environment. Second, many of the benchmarks, such as TBD, DAWNBench, Fathom, and BenchIP, have outdated and narrow collections that cannot catch up with the fast development of DL models and cover the diversity of DL applications in the e-commerce environment. Third, some of these benchmarks, such as DeepBench, AI Benchmark, BenchIP, and synthetic benchmarks, aim at testing specific tasks, e.g., the performance of specific operators, model layers, or Android systems. None of these aforementioned benchmarks satisfy the needs of fully characterizing the DL workloads in Alibaba's e-commerce environment, which motivates the development of Alibaba's in-house DL benchmark - AI Matrix. AI Matrix results from a full investigation of the DL applications used inside Alibaba and aims to cover the typical DL applications that account for more than 90\% of the GPU usage in Alibaba data centers. This benchmark suite collects DL models that are either directly used or closely resemble the models used in the company's real e-commerce applications. It also collects the real e-commerce applications if no similar DL models are not available. Through the high coverage and close resemblance to real applications, AI Matrix fully represents the DL workloads on Alibaba data centers. The collected benchmarks mainly fall into three categories: computer vision, recommendation, and language processing, which consist of the most majority of DL applications in Alibaba. AI Matrix serves a number of important purposes. It aids the selection of new hardware from outside vendors to build Alibaba's future data centers. Through performance analysis, it helps identify the bottleneck of the current DL software and hardware systems and provides guidance on improving application performance and designing future hardware. We believe that such a benchmark suite that fully characterizes the DL applications on China's largest e-commerce platform is of equal interest to the public, so we made the majority of the AI Matrix benchmarks open to the public, 17 out of 20, hoping it can benefit the hardware vendors, industrial and research organizations. More information of AI Matrix are available on the benchmark website \textit{https://aimatrix.ai/en-us/} and on GitHub \textit{https://github.com/alibaba/ai-matrix}. \section{Collection of Models} The model collection in AI Matrix mainly covers three categories: computer vision for image content understanding, recommendation for personalized feed, ranking, advertisement, etc, and language processing for translation, question and answer, searching, opinion analysis, etc. An overview of the model collection is shown in Table \ref{tab:overview}. \subsection{Computer Vision} Computer vision is an important application category on Alibaba e-commerce platform. With hundreds of millions of new pictures emerging every day, it is important to understand the content of these pictures. DL models are used to classify image content, detect objects, and recognize texts in images. \textbf{Image Classification} classifies images into classes. The models collected for this task include GoogLeNet \cite{googlenet}, ResNet50 and ResNet101 \cite{resnet}, and DenseNet \cite{densenet}. These models are used as the backbone in many image classification applications in Alibaba. \textbf{Object Detection} identifies specific regions that contain objects of interest and classifies them into classes. They use image classification models as backbone to extract features from the input image. The collected object detection models include SSD \cite{ssd}, DSSD \cite{dssd}, Mask RCNN \cite{maskrcnn}, Faster R-CNN \cite{fasterrcnn}, and Cascaded Pyramid Network (CPN) \cite{cpn}. The collected SSD and DSSD models include VGG \cite{vgg}, ResNet18, ResNet50, and ResNet101 as variants of the backbone network. SSD and DSSD are used in Alibaba's smart city application to optimize city traffic. The CPN is a model for human pose estimation, which is used in Taobao, an online shopping website. \begin{table*}[t] \centering \begin{tabular}{ p{0.9cm}|p{1.2cm}|p{1.5cm}|p{1.2cm}|p{2.4cm}|p{0.6cm}|p{1.3cm}|p{1.4cm}|p{1cm}|p{1cm}|p{1.3cm} } \hlineB{2} \multicolumn{2}{c|}{\textbf{Category}} & \textbf{Model} & \textbf{Framework} & \textbf{Dataset} &\textbf{Batch Size} & \textbf{FLOPs} & \textbf{Memory Read (Bytes)} & \textbf{Arith. Intensity} & \textbf{Time/ Batch (s)} & \textbf{FLOPs/s} \\ \hlineB{2} \multirow{10}{*}{} & \multirow{3}{*}{Classification} & GoogLeNet & Tensorflow \& Caffe & ImageNet \& Synthetic & 32 & $7.78\times10^{10}$ & $2.46\times10^{9}$ & 32 & 0.014 & $5.69\times10^{12}$ \\ \cline{3-11} & & ResNet50 & Tensorflow \& Caffe & ImageNet \& Synthetic & 32 & $2.14\times10^{11}$ & $7.72\times10^{9}$ & 28 & 0.029 & $7.33\times10^{12}$ \\ \cline{3-11} & & DenseNet121 & Tensorflow \& Caffe & ImageNet \& Synthetic & 32 & $9.19\times10^{10}$ & $8.09\times10^{9}$ & 11 &0.029 & $3.21\times10^{12}$ \\ \cline{2-11} & \multirow{5}{*}{Detection} & SSD & Tensorflow \& Caffe & PASCAL VOC & 16 & $1.13\times10^{12}$ & $2.69\times10^{10}$ & 42 & 0.250 & $4.53\times10^{12}$ \\ \cline{3-11} Computer & & DSSD & Caffe & PASCAL VOC & 2 & $5.38\times10^{11}$ & $9.52\times10^{09}$ & 57 & 0.091 & $5.92\times10^{12}$ \\ \cline{3-11} Vision & & Mask RCNN & Tensorflow & MS COCO & 1 & $4.87\times10^{11}$ & $1.65\times10^{10}$ & 30 & 0.138 & $3.52\times10^{12}$ \\ \cline{3-11} & & Faster R-CNN & Caffe & PASCAL VOC & 1 & $3.91\times10^{11}$ & $1.04\times10^{10}$ & 37 & 0.071 & $5.48\times10^{12}$ \\ \cline{3-11} & & CPN & Tensorflow & MS COCO & 8 & $6.34\times10^{11}$ & $1.62\times10^{10}$ & 39 & 0.444 & $1.43\times10^{12}$ \\ \cline{2-11} & \multirow{3}{*}{Text} & SegLink & Tensorflow & SynthText \& ICDAR15 & 8 & $2.75\times10^{12}$ & $1.02\times10^{11}$ & 27 & 0.421 & $6.53\times10^{12}$ \\ \cline{3-11} & & CRNN & Tensorflow & Synth 90k & 256 & $5.23\times10^{11}$ & $8.48\times10^{9}$ & 62 & 0.086 & $6.09\times10^{12}$ \\ \hlineB{2} \multicolumn{2}{c|}{\multirow{4}{*}{Recommendation}} & DIN & Tensorflow & Amazon Dataset & 512 & $4.01\times10^{09}$ & $2.60\times10^{08}$ & 15 & 0.004 & $1.02\times10^{12}$ \\ \cline{3-11} \multicolumn{2}{c|}{} & DIEN & Tensorflow & Amazon Dataset & 512 & $1.13\times10^{11}$ & $5.10\times10^{09}$ & 22 & 0.051 & $2.24\times10^{12}$ \\ \cline{3-11} \multicolumn{2}{c|}{} & Wide\&Deep & Tensorflow & Census Income & 2048 & $1.30\times10^{08}$ & $3.20\times10^{07}$ & 4 & 0.057 & $2.29\times10^{9}$ \\ \cline{3-11} \multicolumn{2}{c|}{} & GCN & Tensorflow & Citation Network & 1 & $2.72\times10^{07}$ & $2.15\times10^{06}$ & 13 & N/A & N/A \\ \cline{3-11} \multicolumn{2}{c|}{} & NCF & Tensorflow & Movielens & 256 & $1.66\times10^{08}$ & $3.34\times10^{06}$ & 50 & 0.001 & $1.57\times10^{11}$ \\ \hlineB{2} \multicolumn{2}{c|}{\multirow{2}{*}{Language Processing}} & NMT & Tensorflow & WMT German-English & 128 & $2.59\times10^{12}$ & $7.34\times10^{10}$ & 35 & 0.676 & $3.84\times10^{12}$ \\ \cline{3-11} \multicolumn{2}{c|}{} & BERT & Tensorflow & Wikipedia, BooksCorpus, SQuAD & 2 & $5.39\times10^{11}$ & $8.27\times10^{9}$ & 65 & 0.056 & $9.66\times10^{12}$ \\ \hlineB{2} \end{tabular} \caption{Overview of AI Matrix benchmarks. FLOPs is the number of FLOPs performed for executing one batch. Memory read is the total bytes read from DRAM to L2 cache for executing one batch. Arithmetic intensity is calculated using one batch.} \vspace{-0.6cm} \label{tab:overview} \end{table*} \textbf{Text Recognition} detects and extracts texts in images, which consists of a large fraction of the computer vision tasks in Alibaba. It has different challenges than the general objection detection. Text line bounding boxes usually have much larger aspect ratios and orientations than those of general objects. Faster R-CNN or SSD style detectors suffer from the difficulty of producing such boxes, due to its default box design. The collected text recognition models include SegLink \cite{seglink} and Convolutional Recurrent Neural Network (CRNN) \cite{crnn}. SegLink is used to identify the bounding boxes of texts. CRNN combines a convolutional network and a recurrent network to tackle the recognition of very long shaped texts. \begin{figure}[t] \centering \vspace{-0.2cm} \includegraphics[keepaspectratio, width=9cm]{roofline.pdf} \vspace{-0.6cm} \caption{Roofline model of AI Matrix inference benchmarks on NVIDIA V100 GPU with peak FP32 performance of 14 TFLOPS and memory bandwidth of 900 GB/s. Precision is FP32 and no tensor core is used.} \label{fig:arithmeticintensity} \vspace{-0.8cm} \end{figure} \subsection{Recommendation} Recommendation accounts for a large fraction of the DL applications in the e-commerce platform, with many use cases like advertisement, feed, and search. The collected recommendation models include Deep Interest Network (DIN) \cite{din}, Deep Interest Evolution Network (DIEN) \cite{dien}, Wide \& Deep \cite{widedeep}, Graph Convolutional Network (GCN) \cite{gcn}, and NCF \cite{ncf}. A commonly used scenario in advertisement is to predict the probability that a user will click a certain item if it is recommended to the user. DIEN is an important model used in Alibaba for this click-through rate prediction task. DIEN is an improved version of the DIN. GCN is a model used by Taobao to capture high-order similarities in users' billion-scale behavior sequences. These models combines a sparse embedding layer and a number of densely connected layers. The embedding layer transforms the sparse input of user features and history into a dense vector that can be handled by the densely connected layers. In real applications, the embedding size can be to hundreds of Gigabytes, while the fully-connected layers have a modest number of parameters. \subsection{Language Processing} Language processing is another important application category on Alibaba e-commerce platform and accomplishes tasks like translation, question \& answer, sentiment analysis, etc. The collected language models include Neural machine translation (NMT) \cite{gnmt} and Bidirectional Encoder Representations from Transformers (BERT) \cite{bert}. NMT has become the dominant approach to machine translation. It uses an encoder to encode the input sentence, and then uses a decoder to decode the encoding into the target output sentence. BERT is a new method of pre-training language representations which obtains state-of-the-art results on a wide array of language processing tasks. NMT and BERT are used as the backbone networks in many of the language processing tasks in Alibaba. \section{Model Characteristics} To understand the computation needs of AI Matrix benchmarks, it is important to look at their compute and memory intensities. Table \ref{tab:overview} shows the arithmetic intensity of these benchmarks for executing one batch. The majority of the benchmarks have high arithmetic intensity. Usually, the recommendation models, such as Wide \& Deep and DIN, have lower arithmetic intensity, because they mainly consist of fully-connected layers with high parameter count. On the other hand, the computer vision tasks like DSSD and CRNN have high arithmetic intensity, because they mainly consist of convolutional layers. The language processing models like NMT and BERT also have high arithmetic intensity because of the RNN layers used. The roofline model of AI Matrix benchmarks is shown in Figure \ref{fig:arithmeticintensity}. Surprisingly, even for those benchmarks with high arithmetic intensity, their performance are still far away from the roofline. This indicates that the compute resources on the GPU are not fully utilized. The reason why they are underutilized remains to be investigated, but one possibility is that the applications are not designed efficiently to fully utilize the GPU and its resources. \section{Conclusion and Future Work} The collection of models may be updated in the future based on the advancement of DL applications in Alibaba. In the short term, development will be done to support low-precision inference (FP16 and INT8), mixed-precision training (FP32 and FP16) on NVIDIA GPUs, training on single machine with multiple GPUs and on distributed machines. \bibliographystyle{IEEEtran}
\section{Introduction} As the nearest collections of young and very metal-poor stars in the universe, local star-forming dwarf galaxies represent a crucial testbed for models of stellar populations at low metallicity. Nebular emission lines from highly-ionized gas provide a window onto the shape of the ionizing spectra of these systems in the extreme ultraviolet (EUV, 10--100 eV). The EUV potentially contains contributions from both the hottest stars and emission from gas heated by compact object accretion and shocks, all of which are highly uncertain at very low-metallicity. The promise of obtaining quantitative constraints on these processes with deep spectroscopy is alluring, but physically interpreting this nebular emission has proved challenging. In particular, the presence of nebular \hbox{He\,{\sc ii}}{} emission in nearby star-forming regions remains a puzzle three decades after it was first noted \citep[][and references therein]{garnettHeIIEmission1991}. The difficulty in understanding this emission is rooted in the very high energy of the photons necessary to doubly-ionize helium ($>54.4$ eV, or $>4$ Ryd) and thus power the recombination spectrum of \hbox{He\,{\sc ii}}{}; most notably, \hbox{He\,{\sc ii}}{}$\lambda 4686$ \AA{} and $\lambda 1640$ \AA{}. Theoretical stellar atmosphere models generally predict very little emergent flux beyond 54.4 eV, as $\mathrm{He^+}$ ionization in the atmosphere and expanding winds of massive stars introduces a strong absorption edge at this energy \citep[e.g.][]{gablerUnitifiedNLTEModel1989,pauldrachRadiationdrivenWindsHot2001,lanzGridNonLTELineblanketed2003,pulsAtmosphericNLTEmodelsSpectroscopic2005}. In order to account for this apparent excess in flux at the $\mathrm{He}^+$-ionizing edge relative to the stellar models, \citet{garnettHeIIEmission1991} proposed two alternative non-stellar sources of ionizing radiation: radiative shocks and X-ray binaries. Massive progress has since been made in expanding the sample of nebular \hbox{He\,{\sc ii}}{} detections both in the local Universe \citep[e.g.][]{thuanHighIonizationEmissionMetaldeficient2005,kehrigGeminiGMOSSpectroscopy2011,shiraziStronglyStarForming2012,kehrigExtendedHeII2015,senchynaUltravioletSpectraExtreme2017,kehrigExtendedHeII2018,bergIntenseIVHe2019} and at $z\sim 1$--4 \citep[e.g.][]{erbPhysicalConditionsYoung2010,cassataHeIIEmitters2013a,bergWindowEarliestStar2018,nanayakkaraExploringHeII2019}. This body of observational evidence has made clear that nebular \hbox{He\,{\sc ii}}{} is strongly metallicity-dependent, and is likely ubiquitous among star-forming systems at metallicities $12+\log\mathrm{O/H}<7.7$ \citep[equivalently, $Z/Z_\odot<0.1$; e.g.][]{senchynaPhotometricIdentificationMMT2019a,senchynaExtremelyMetalpoorGalaxies2019}. Yet despite commensurate advances in stellar modeling, including state-of-the-art treatments of atmospheres, binarity, and rotation \citep[e.g.][]{,szecsiLowmetallicityMassiveSingle2015,gotbergIonizingSpectraStars2017,eldridgeBinaryPopulationSpectral2017,gotbergSpectralModelsBinary2018,stanwayInitialMassFunction2019,kubatovaLowmetallicityMassiveSingle2019}, there is as-yet no clear solution to the apparent modeling deficit of hard ionizing photons. In recent years, the \textit{Chandra}{} X-ray Observatory has revolutionized our understanding of X-ray binaries, enabling a reappraisal of their possible role in providing the missing ionizing photons. High-mass X-ray binaries (HMXBs), which power hard X-ray emission via accretion from a massive stellar companion onto a compact object (black hole or neutron star), have been shown to power nebular \hbox{He\,{\sc ii}}{} in cases where they act as the sole ionizing source in a nebula \citep{pakullDetectionXrayionizedNebula1986a,kaaretHighresolutionImagingHe2004,gutierrezOpticalStudyHyperluminous2014}. While it has long been established that HMXBs dominate the hard X-ray flux ($\gtrsim 1$ keV) of actively star-forming galaxies in the local Universe \citep[e.g.][]{grimmHighmassXrayBinaries2003,mineoXrayEmissionStarforming2012}, early studies largely ignored very low-metallicity galaxies due to their faintness. Now, strong evidence has arisen that the X-ray luminosity per unit of star formation rate increases by nearly an order of magnitude in extremely metal-poor galaxies ($Z/Z_\odot \lesssim 0.1$) relative to those at near-solar metallicity \citep{mapelliUltraluminousXraySources2010a,prestwichUltraluminousXRaySources2013,basu-zychEvidenceElevatedXRay2013,brorbyXrayBinaryFormation2014,dounaMetallicityDependenceHighmass2015,brorbyEnhancedXrayEmission2016,brorbyXraysGreenPea2017}. Theoretical models reproduce this general trend, suggesting that it is likely driven by the weaker stellar winds driven at low metallicity \citep[e.g.][]{drayMetallicityDependenceHighmass2006,lindenEffectStarburstMetallicity2010,fragosXRAYBINARYEVOLUTION2013}. In particular, weaker winds lead to both more massive black holes and a higher incidence of HMXB systems undergoing Roche lobe overflow accretion, which both tend to produce more luminous X-ray binary populations. The similarity of the metallicity dependence of HMXBs to that of nebular \hbox{He\,{\sc ii}}{} motivated \citet{schaererXrayBinariesOrigin2019} to revisit the possibility that HMXBs may be solely responsible for this emission line in metal-poor star-forming galaxies. By assuming that the nebular \hbox{He\,{\sc ii}}{} in IZw18 NW is entirely powered by the X-ray source observed in that cluster \citep[c.f.][]{lebouteillerNeutralGasHeating2017}, \citet{schaererXrayBinariesOrigin2019} derive a scaling relationship between \hbox{He\,{\sc ii}}{} flux and hard X-ray luminosity. Applying this to the population synthesis models of \citet{fragosXRAYBINARYEVOLUTION2013,fragosEnergyFeedbackXRay2013a}, the authors demonstrate that the metallicity-dependent HMXB population produces a trend in the strength of \hbox{He\,{\sc ii}}{} relative to H$\beta$ similar to that observed. Though suggestive, the model presented by \citet{schaererXrayBinariesOrigin2019} has yet to clear two critical hurdles. First, it has yet to be demonstrated through full photoionization modeling that an HMXB spectrum can successfully power nebular \hbox{He\,{\sc ii}}{} when combined with stellar ionizing flux. Second, a detailed galaxy-by-galaxy investigation of both \hbox{He\,{\sc ii}}{} and X-ray constraints has not yet been conducted for more than a handful of systems \citep[e.g.][]{thuanHighIonizationEmissionMetaldeficient2005,kehrigExtendedHeII2018}. In this paper, we will test the hypothesis that HMXBs dominate the production of \hbox{He\,{\sc ii}}{} in star-forming galaxies from both a theoretical and observational perspective. First, we produce a grid of photoionization models with input SEDs reflecting the joint impact of young stellar populations and a variable HMXB contribution, and examine the impact of the latter on the predicted nebular line spectrum (Section~\ref{sec:model}). Then, leveraging recent work targeting metal-poor galaxies with both \textit{Chandra}{} and high-resolution optical spectroscopy including data from Keck and new measurements from the MMT 6.5m telescope, we assemble a sample of eleven star-forming regions with robust constraints on both X-ray emission and nebular \hbox{He\,{\sc ii}}{} in Section~\ref{sec:obs}. In Section~\ref{sec:datajointres} we examine these observational constraints in the context of the photoionization model results, providing a stringent empirical test of the claim that HXMBs dominate production of $\mathrm{He^+}$-ionizing photons in these systems. We conclude in Section~\ref{sec:summary}. \section{Modeling Gas Photoionized by Stars and HMXBs} \label{sec:model} In order to investigate the possibility that \hbox{He\,{\sc ii}}{} or other high-ionization emission lines are powered by high-mass X-ray binaries, we construct a semi-empirical framework to model this scenario explicitly. This requires us first to construct a model SED representing the combined ionizing spectrum of both massive stars and the emission from HMXB accretion disks. Then, we use a photoionization modeling framework to simulate the reprocessing of this ionizing spectrum through surrounding gas, producing predictions about the resultant nebular emission. We describe these two steps below in Section~\ref{subsec:modelmeth}, then discuss the results and predictions of this modeling in Section~\ref{subsec:modelres}. \subsection{Methodology} \label{subsec:modelmeth} Our primary goal in this section is to assess the magnitude of the effect on nebular emission lines introduced by adding a HMXB spectrum to a stellar population model. While there are many existing prescriptions for full galaxy SED modeling in the literature \citep[see e.g.][]{charlotNebularEmissionStarforming2001,gutkinModellingNebularEmission2016,chevallardModellingInterpretingSpectral2016,lejaDerivingPhysicalProperties2017,bylerNebularContinuumLine2017,fiocPEGASECodeModeling2019}, none yet account explicitly for the impact of HMXBs on nebular gas emission. We describe out methodology in this subsection with comparison to other approaches in the literature where relevant. \subsubsection{Construction of the Spectral Energy Distribution} First, we describe how we construct the joint SED representing the ionizing flux emitted by massive stars and HMXBs. Since strong interstellar absorption precludes the direct observation of the EUV spectrum of massive stars or HMXBs, we must rely on models calibrated at higher or lower energies to predict the SED in this energy regime. There are a variety of stellar population synthesis frameworks in the literature designed to predict the emergent flux from stars themselves \citep[for a review, see][]{conroyModelingPanchromaticSpectral2013}. As we will discuss further later in the paper, the shape of model stellar spectra in the EUV beyond the Lyman limit is highly uncertain, as these photons cannot be directly observed for any individual hot OB stars. In particular, the emergent flux from stars at and just beyond the $\mathrm{He}^+$-ionizing edge (54.4 eV, or 228 \AA{}) is subject to substantial systematic uncertainties from both atmosphere and evolutionary models, and varies significantly between different population synthesis prescriptions. For instance, mass transfer can strip the donor star of its outer hydrogen layers, and potentially spin-up the acceptor star sufficiently to change its evolution, both of which can enhance the escape rate for $\mathrm{He}^+$-ionizing photons which are easily blocked by the outer layers or dense winds of `typical' massive stars \citep[e.g.][]{eldridgeEffectStellarEvolution2012,szecsiLowmetallicityMassiveSingle2015,gotbergSpectralModelsBinary2018,stanwayInitialMassFunction2019,gotbergImpactStarsStripped2019a}. Accounting for high ZAMS rotation rates can also boost stellar flux in the EUV \citep[e.g.][]{maederEvolutionRotatingStars2000,vazquezModelsMassiveStellar2007,levesqueEffectsStellarRotation2012,bylerNebularContinuumLine2017}. Significant uncertainties remain in the specific treatment of all of these factors, and they have not yet been considered simultaneously in a full population synthesis prescription. For the purposes of this paper, we are primarily interested in constraining the potential impact of HMXBs on nebular emission when added to a stellar population. Thus, we focus solely on the latest version of the BPASS models accounting for binary evolutionary effects \cite[2.2, described in][]{stanwayReevaluatingOldStellar2018}. These models incorporate prescriptions for some binary mass transfer processes which can have a substantial impact on emergent hard ionizing flux. It is important to note that modifications to our treatment of the stellar population that tend to increase the stellar contribution to flux at the $\mathrm{He^+}$-ionizing edge will decrease the relative impact of the HMXB spectrum. The BPASS flux predictions in the EUV are fairly representative of the state-of-the-art population synthesis codes, and in particular are lower than the newest results from the modified \citet{bruzualStellarPopulationSynthesis2003} models (Charlot \& Bruzual, in-prep.) incorporating newer theoretical stellar atmospheres for massive main-sequence and Wolf-Rayet stars \citep[see][]{stanwayInitialMassFunction2019,platConstraintsProductionEscape2019}. The ionizing flux of of a purely-stellar SED depends strongly on the assumed IMF, star formation history, and stellar metallicity. Since we are interested primarily in the HMXB contribution, we will make reasonable assumptions about the IMF and star formation history while leaving metallicity as a free parameter. We assume the fiducial BPASS IMF, which consists of a broken power-law with a \citet{salpeterLuminosityFunctionStellar1955} slope ($-2.35$) over the mass range 0.5--300 $M_\odot$. Extreme IMFs can enhance the $\mathrm{He^+}$-ionizing flux achieved, though not sufficiently to alone explain the strongest \hbox{He\,{\sc ii}}{} emission observed \citep{stanwayInitialMassFunction2019}. We assume a constant star formation history that has proceeded for sufficiently long for the SED to stabilize ($100$ Myr), noting that instead adopting younger ages or adding young bursts will act to enhance the relative flux beyond 54.4 eV per unit SFR by increasing the number of early O and Wolf-Rayet stars \citep[e.g.][]{shiraziStronglyStarForming2012,chisholmConstrainingMetallicitiesAges2019a}. Adopting a more extreme IMF or a star formation history weighted to younger ages would both increase the amount of hard ionizing flux from the stellar population at fixed SFR and reduce the relative impact of the HMXB spectrum on nebular line emission. Our relatively conservative assumptions about the stellar population synthesis prescription, IMF, and star formation history are chosen to provide a reasonable first estimate of the effect on nebular lines of adding HMXBs to a stellar ionizing spectrum. With the stellar model prescription, IMF, and star formation history fixed, the most important variable affecting the ionizing flux of the stars themselves is then the stellar metallicity. As the bulk metallicity of a stellar population is lowered, reduced opacities in the stellar interior and atmosphere lead to both hotter temperature evolution for massive main-sequence stars and dramatically weakened stellar winds. These factors both directly lead to harder ionizing spectra for individual metal-poor stars, and the reduced impact of stellar wind mass loss at low metallicity can result in rotational and binary evolutionary effects playing a more prominent role in producing very hot stars. Models of these evolutionary stages are still highly uncertain and are not uniformly included in population synthesis predictions \citep[e.g.][and references therein]{szecsiLowmetallicityMassiveSingle2015,stanwayStellarPopulationEffects2016,gotbergImpactStarsStripped2019a}. We allow the stellar metallicity to vary from $Z=0.020$ (solar, $Z_\odot$) to $Z=0.001$ ($Z/Z_\odot = 5\%$), the lowest metallicity provided by the BPASSv2.2 grids. We note that adopting lower stellar metallicities would harden the stellar spectrum and further increase the maximal nebular \hbox{He\,{\sc ii}}{} flux powered by the stars alone. However, this metallicity range encompasses the full range of gas-phase oxygen abundances in our observational sample (assuming solar $\alpha$/Fe; Table~\ref{tab:obssumm}); and as already discussed, such lower metallicities would further diminish the relative impact of HMXBs to \hbox{He\,{\sc ii}}{}. In contrast to the stellar ionizing spectrum which drops-off at energies above 54.4 eV due to absorption in stellar winds, the spectra of high-mass X-ray binaries are dominated by extremely hot accretion disks and peak at hard X-ray energies in the 1--10 keV range (Figure~\ref{fig:sedcomp}). Their spectra can be approximated with a multi-color disk (MCD) model \citep{mitsudaEnergySpectraLowmass1984a}, which produces a modified blackbody spectrum representing gas at a range of temperatures in the accretion disk. This model is parameterized by the mass of the accreting black hole \ensuremath{\rm M_{\mathrm{BH}}}{} and the maximum radius of the disk \ensuremath{\rm R_{\mathrm{max}}}{} \citep[in this work, we compute this spectrum using code from the \textsc{ARES} package\footnote{\url{https://bitbucket.org/mirochaj/ares}};][]{mirochaDecodingXrayProperties2014}. For black hole masses in the range of 10--100 $M_\odot$ and radii of $10^3$--$10^5$ cm, 54.4 eV remains solidly in the Rayleigh-Jeans tail of this spectrum, with flux far lower than at the SED peak in the keV range. Over this range, the black hole mass has the largest impact on flux at 54.4 eV for a fixed total luminosity, with more massive black holes yielding a softer spectrum and more flux at 54.4 eV. Increasing \ensuremath{\rm R_{\mathrm{max}}}{} from $10^3$ to $10^4$ cm increases the flux at 54.4 eV by $\lesssim 25\%$ for black hole masses in this range, and essentially no change is seen when \ensuremath{\rm R_{\mathrm{max}}}{} is increased further to $10^5$ cm. Accordingly, we fix $\ensuremath{\rm R_{\mathrm{max}}}{}=10^4$ cm for our grid. HMXBs are known to undergo spectral transitions, though generally their spectrum is found to harden relative to an MCD spectrum likely due to Compton up-scattering during a super-Eddington accretion event \citep[e.g.][]{kaaretStateTransitionLuminous2013,brorbyTransitionXrayBinary2015}, decreasing the flux at low ($\ll 1$ keV) energies. A more sophisticated model including Comptonization would thus cause the HMXB spectrum to be less efficient at producing photons at the \ensuremath{\rm He^+}{}-ionizing edge. For simplicity in this analysis, we adopt a single MCD model to represent the HMXB contribution to the total SED. While in massive galaxies we expect the X-ray spectrum to be a composite of several active HMXBs, the total unresolved X-ray luminosity of most nearby dwarf galaxies studied in \citet[][$10^{38}$--$10^{40}$ erg/s]{brorbyXrayBinaryFormation2014,brorbyEnhancedXrayEmission2016} is actually suggestive of the luminosity of individual HMXBs resolved in larger spiral galaxies \cite[e.g.][]{mineoXrayEmissionStarforming2012}, so this assumption may actually be more appropriate for the study of \hbox{He\,{\sc ii}}{} in the lowest-metallicity, lowest-mass galaxies found locally. We are interested in the impact of explicitly varying the HMXB contribution on high-ionization nebular emission. Thus, we incorporate as an additional parameter the X-ray luminosity measured in a broad \textit{Chandra}{} band (erg/s) produced per unit of star formation ($\mathrm{M_\odot/yr}$), hereafter referred to as the X-ray production efficiency: \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/SFR. Previous observations with \textit{Chandra}{} provide guidance as to the range of values of this parameter attained in local galaxies. For the purposes of this study, we allow this quantity to vary over a broad range bracketing the values typically measured in nearby dwarf galaxies \citep[e.g.][]{brorbyEnhancedXrayEmission2016} by several orders of magnitude: $10^{40}$--$10^{44}\mathrm{erg/s/(M_\odot/yr)}$. Figure~\ref{fig:sedcomp} compares these two SED components for a representative model in our grid. We plot here a BPASS model computed with the above assumptions (constant star formation history at 1 $\mathrm{M_\odot/yr}$ and fiducial IMF) at $Z=0.004$ ($Z/Z_\odot=0.2$). Next to this, we plot an MCD spectrum assuming $\ensuremath{\rm R_{\mathrm{max}}}{}=10^4$ cm for $\ensuremath{\rm M_{\mathrm{BH}}}{}=10$--100 $\rm M_\odot$, in each case normalized in the 0.5--8 keV band to the median X-ray production efficiency in our grid: $10^{42} \mathrm{erg/s/(M_\odot/yr)}$. This particular X-ray production efficiency is chosen such that the HMXB spectrum begins to impact significantly on the total EUV flux. At this X-ray luminosity per unit of star formation, the Rayleigh-Jeans tail of the MCD spectrum approaches the stellar contribution to the SED at the \ensuremath{\rm He^+}{}-ionizing edge as the black hole mass is increased. \begin{figure} \includegraphics[width=0.5\textwidth]{sedpub.pdf} \caption{ Representative SEDs for a model stellar population (BPASS v2.2, constant star formation at $1 \mathrm{M_\odot/yr}$, $Z=0.004$) and a model HMXB (multi-color disk spectrum, $\ensuremath{\rm R_{\mathrm{max}}}{}=10^4$ cm, with $\ensuremath{\rm M_{\mathrm{BH}}}{}/\mathrm{M_\odot}=10$--100). The HXMB spectrum is normalized in the 0.5--8 keV range (shaded grey) to the median X-ray production efficiency adopted in our grid: $\ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/\mathrm{SFR}=10^{42} \mathrm{erg/s/(M_\odot/yr)}$. At this X-ray normalization, the Rayleigh-Jeans tail of the HMXB spectrum is within an order of magnitude of the stellar SED at the \ensuremath{\rm He^+}{}-ionizing edge (black dashed line). } \label{fig:sedcomp} \end{figure} \subsubsection{Photoionization Modeling} Accurately predicting the nebular emission powered by HMXBs requires photoionization modeling, taking into account the joint effects of both HMXBs and stars in heating and ionizing their surrounding gas. We use the code \textsc{cloudy}{} \citep[version 17.1, detailed in][]{ferland2017ReleaseCloudy2017} to perform this part of the analysis. This photoionization code natively handles the processing of X-rays by nebular gas, including accounting for secondary ionizations. Following the standard methodology for modeling integrated light from star-forming galaxies \citep[e.g.][]{bylerNebularContinuumLine2017}, we assume a closed radiation-bounded spherical geometry consisting of a shell of material located sufficiently far from the central source ($10^{19}$ cm) to be essentially plane-parallel. We allow the computation to iterate to convergence up to 5 times (typically only 3 are required), and stop the calculation once the temperature drops below 100 K or the edge of the hydrogen ionization front is reached (beyond either of which nebular line emission will be minimal). We run the \textsc{cloudy}{} models with a separate high-resolution input file for each SED, and measure the strength of the emission lines we are interested in directly from the saved output. To organize and analyze the grid, we utilize a modified version of the grid construction tools developed as part of \textsc{cloudyfsps} \citep{nellbylerNellbylerCloudyfspsInitial2018}. Our approach is appropriate for our model of radiation-bounded \hbox{H\,{\sc ii}}{} regions surrounding recently-formed young stellar populations, but modeling more massive galaxies with several dominant generations of stars generally benefits from more complex approaches \citep[e.g.][]{charlotNebularEmissionStarforming2001}. Considering density-bounded model conditions is also beyond the scope of this paper, but \citet{platConstraintsProductionEscape2019} demonstrate that the suppression of lower-ionization emission that these conditions introduce is generally inconsistent with the nebular properties of a broader sample of local \hbox{He\,{\sc ii}}{}-emitters. There are several other important variables describing the gas to consider in this modeling scheme. We fix the gas density to $n_\mathrm{H}=10^2$ \unit{cm^{-2}} to approximate the typical values measured from [\ion{S}{ii}] in nearby star-forming galaxies, including those which power strong high-ionization line emission \citep[e.g.][]{brinchmannNewInsightsStellar2008,senchynaUltravioletSpectraExtreme2017,bergChemicalEvolutionCarbon2019a}. While typical \hbox{H\,{\sc ii}}{} region densities may be somewhat higher in galaxies in the early universe \citep[e.g.][]{shiraziStarsWereBorn2014,sandersMOSDEFSurveyElectron2016}, this is unlikely to significantly affect recombination lines such as \hbox{He\,{\sc ii}}{} \citep[e.g.][]{platConstraintsProductionEscape2019}. Since in this work we focus on metal-poor star-forming dwarf galaxies with low dust extinction measurements, we do not consider the effects of extinction or depletion onto dust in this analysis \citep[though these effects are very important for general galaxy modeling; see e.g.][]{gutkinModellingNebularEmission2016}. The attenuation introduced by dust extinction is minimal for X-ray photons \citep[dominated by small-angle forward scattering;][]{drainePhysicsInterstellarIntergalactic2011} and we only consider observed optical line ratios after correction for extinction according to the Balmer decrement (Section~\ref{sec:obs}). Next, we must consider the gas-phase metallicity and chemical abundance patterns, which directly impact upon both metal line strengths and thereby the gas cooling efficiency and thus temperature. We fix the gas abundance patterns to those adopted by \citet{dopitaTheoreticalRecalibrationExtragalactic2000}, which is based upon the solar abundances found by \citet{andersAbundancesElementsMeteoritic1989} with an additional empirically-motivated scaling of $\mathrm{N/O}$ with $\mathrm{O/H}$ imposed to account for the secondary production of nitrogen. In this first analysis, we scale the gas-phase metal abundances directly with the metallicity $Z$ of the stellar population, while noting that allowing for an offset in this ratio could enhance the contribution of stellar ionizing flux to the production of high-ionization metal lines \citep[e.g.][]{steidelReconcilingStellarNebular2016,senchynaExtremelyMetalpoorGalaxies2019}. Finally, we also allow the gas ionization parameter $U$ to vary. This dimensionless quantity parametrizes the relative density of hydrogen-ionizing photons to the gas density: \begin{equation} U = \frac{Q_\mathrm{H}}{4\pi R^2 n_\mathrm{H} c} , \end{equation} where $Q_\mathrm{H}$ is the total number of hydrogen-ionizing photons emitted by the source spectrum per second, $c$ is the speed of light, and $R$ is the radius of the ionized region. In this effectively plane-parallel case, the Str\"{o}mgren sphere radius is approximately equal to the inner radius of the shell, and their distinction is unimportant \citep[e.g.][]{charlotNebularEmissionStarforming2001,bylerNebularContinuumLine2017}. Nebular line ratios are typically insensitive to changes in $R$ and $Q_\mathrm{H}$ that preserve $\log U$ \citep[e.g.][]{evansTheoreticalModelsII1985,mccallChemistryGalaxiesNature1985}. Since we fix the radius, specifying the ionization parameter implicitly normalizes the input spectrum. We allow this parameter to vary between $-3<\log U < -1$, which spans the range typically observed in galaxies dominated by recent star formation. \subsection{Modeling Results and Predictions} \label{subsec:modelres} The framework described above results in a model for a composite stellar and HMXB spectrum with four free parameters. These are metallicity $Z$ (of both the stars and the gas, which we couple); the ionization parameter of the gas $\log U$; the X-ray production efficiency, $\ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}/\mathrm{SFR}$; and the black hole mass for our MCD model, $M_\mathrm{BH}$. We construct a grid of models while varying these parameters, and extract the CLOUDY predicted line fluxes for each point therein, allowing us to investigate the relative impact of these variables on nebular line emission. \begin{figure} \includegraphics[width=0.5\textwidth]{heiinev_all.pdf} \caption{ Line fluxes for \hbox{He\,{\sc ii}}{} $\lambda 4686$ and \hbox{Ne\,{\sc v}}{} $\lambda 3426$ (top and bottom panels, respectively) relative to H$\beta$ for all points in our model grid, plotted as a function of the X-ray luminosity per unit of star formation. The individual photoionization model grid points are displayed as black circles, and we outline in grey the flux range spanned by the models at each value of $\ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}/\mathrm{SFR}$. In the top panel for \hbox{He\,{\sc ii}}{}, we shade in red the range of values observed for this line in low-metallicity nearby star-forming galaxies \citep[e.g.][]{shiraziStronglyStarForming2012,senchynaUltravioletSpectraExtreme2017,senchynaExtremelyMetalpoorGalaxies2019}. \hbox{He\,{\sc ii}}{} is only boosted into the observed range of values for this line by the addition of the HMXB spectrum for systems with very high X-ray production efficiencies ($\ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/\mathrm{SFR}>10^{42}\, \unit{erg\, s^{-1} / (M_\odot \, yr^{-1})}$, marked by a vertical black dashed line). } \label{fig:heiinevnv_all} \end{figure} We are particularly interested in how varying the HMXB contribution to the spectrum impacts the high-ionization nebular lines. In Figure~\ref{fig:heiinevnv_all}, we plot the predicted line fluxes for \hbox{He\,{\sc ii}}{} $\lambda 4686$ and \hbox{Ne\,{\sc v}}{} $\lambda 3426$ relative to H$\beta$ for our entire grid as a function of the X-ray production efficiency. These two species have ionization potentials of 54 eV and 97 eV (respectively). As the X-ray production efficiency is increased from $10^{40}$--$10^{44}$ \unit{erg/s} at a star formation rate of 1 \unit{M_\odot/year}, we find that the range of flux in \hbox{He\,{\sc ii}}{} relative to H$\beta$ is increased by 2 orders of magnitude. The effect on \hbox{Ne\,{\sc v}}{} is even more dramatic, increasing from essentially unobservable at $<10^{-5}$ times the flux of H$\beta$ to uniformly greater than this limit for the highest X-ray productions rates. At the highest X-ray luminosities per SFR tested, both lines approach the flux of H$\beta$, indicating that the composite spectrum is effectively dominated by the hard Rayleigh-Jeans tail of the HMXB model. If we assume HMXBs provide the photons necessary to power \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{}, then our models suggest we should observe a trend between enhanced flux in these lines relative to H$\beta$ and the X-ray production efficiency. However, \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{} are only substantially affected by the HMXB spectrum for systems with very large X-ray output relative to their star formation rate. As the X-ray production efficiency is increased from $10^{40}$ to $10^{41}$ erg/s per unit SFR, the ratio of \hbox{He\,{\sc ii}}{} $\lambda 4686$/H$\beta$ remains in the range observed for the BPASSv2.2 models alone, with the maximum achieved value increasing only from $\hbox{He\,{\sc ii}}{}/\mathrm{H}\beta = 0.20 \%$ to $0.23\%$. This is an order of magnitude below measurements in metal-poor dwarf galaxies, which span 1--5\% \citep[the red band in Figure~\ref{fig:heiinevnv_all}, e.g.][]{shiraziStronglyStarForming2012,senchynaExtremelyMetalpoorGalaxies2019}. None of the models exceed 1\% flux in \hbox{He\,{\sc ii}}{} or \hbox{Ne\,{\sc v}}{} relative to H$\beta$ until $\ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}/\mathrm{SFR}$ exceeds $10^{42} \, \unit{erg\, s^{-1}}$ at $1 \; \mathrm{M_\odot \, yr^{-1}}$ (marked with a dashed black line in Figure~\ref{fig:heiinevnv_all}). That is, galaxies with HMXB populations less luminous per SFR than this cutoff do not produce sufficient flux in the EUV to power \hbox{He\,{\sc ii}}{} at the level observed locally. \begin{figure} \includegraphics[width=0.5\textwidth]{heiinev_bhmass.pdf} \caption{ Same as Figure~\ref{fig:heiinevnv_all}, but displaying a subset of the models with metallicity and ionization parameter fixed to $Z=0.004$ and $\log U=-2$ to illustrate the dependence of the nebular lines on $M_\mathrm{BH}$. Increasing the black hole mass from 1--100 $M_\odot$ can effectively boost the prominence of \hbox{He\,{\sc ii}}{} by up to nearly an order of magnitude, but this only has a modest effect at low $\ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}/\mathrm{SFR}$ values where the the stellar spectrum dominates the EUV. } \label{fig:heiinevnv_bhmass} \end{figure} \begin{figure} \includegraphics[width=0.5\textwidth]{heiinev_logu.pdf} \caption{ Same as Figure~\ref{fig:heiinevnv_all}, but with metallicity and black hole mass fixed to $Z=0.004$ and $M_\mathrm{BH}/M_\odot=10$ to investigate the dependence of the various lines on $\log U$. The relative strength of \hbox{Ne\,{\sc v}}{} to H$\beta$ is strongly dependent on $\log U$, increasing with this quantity by up to more than five orders of magnitude with other parameters fixed. However, \hbox{He\,{\sc ii}}{} is only modestly affected by an increase in the ionization parameter (especially at low \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}), due to the fact that both \hbox{He\,{\sc ii}}{} and H$\beta$ are recombination lines. } \label{fig:heiinevnv_logu} \end{figure} \begin{figure} \includegraphics[width=0.5\textwidth]{heiinev_met.pdf} \caption{ Same as Figure~\ref{fig:heiinevnv_all}, but with the ionization parameter and black hole mass fixed to $\log U=-2$ and $M_\mathrm{BH}/M_\odot=10$, while the metallicity $Z$ is allowed to vary. At low X-ray production efficiencies where the stellar SED dominates (left of the dashed line), \hbox{He\,{\sc ii}}{} is substantially more affected by decreasing metallicity than by $\log U$ or $M_\mathrm{BH}$, increasing by nearly an order of magnitude as the metallicity is decreased. \hbox{Ne\,{\sc v}}{} shows a more complicated behavior, due to the competing effects of increased gas temperature and diminishing neon abundances with decreasing metallicity. } \label{fig:heiinevnv_met} \end{figure} Though both \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{} increase in strength relative to H$\beta$ as the X-ray production efficiency is increased, the dispersion in their flux at fixed \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/SFR evident in Figure~\ref{fig:heiinevnv_all} illustrates that they are also sensitive to the other model parameters ($M_\mathrm{BH}$, $\log U$, and $Z$). We now investigate the impact of these variables in-turn, starting with the model black hole mass. In Figure~\ref{fig:heiinevnv_bhmass}, we fix the metallicity and ionization parameter to $Z=0.004$ and $\log U=-2$ while allowing $M_\mathrm{BH}$ to vary over our full grid range (1--100 $M_\odot$). At X-ray production efficiencies below $10^{42}$ erg/s at 1 \unit{M_\odot/year}, the modeled black hole mass has essentially no effect, since the EUV is still largely dominated by the stellar SED. At higher values of \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/SFR where the HMXB spectrum begins to impact significantly on the EUV, we see that increasing the black hole mass boosts both \hbox{Ne\,{\sc v}}{} and especially \hbox{He\,{\sc ii}}{} (since it is produced at lower energies). This is because a higher black hole mass yields a softer MCD spectrum (Figure~\ref{fig:sedcomp}), allowing the HMXB flux to play a larger role in the ionization structure of the nebula. The gas geometry can also significantly affect the prominence of \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{} with the input spectrum fixed (Figure~\ref{fig:heiinevnv_logu}). Increasing $\log U$ from $-3$ to $-1$ can increase $\hbox{Ne\,{\sc v}}{}/\mathrm{H\beta}$ by nearly 3 orders of magnitude, by effectively expanding the size of the highest-ionization part of the \hbox{H\,{\sc ii}}{} region. However, $\log U$ has a smaller effect on the flux of \hbox{He\,{\sc ii}}{} relative to H$\beta$ ($\lesssim 0.2$ dex). Since \hbox{He\,{\sc ii}}{} and H$\beta$ are recombination lines, their ratio is fixed to first-order by the hardness of the input ionizing spectrum \citep[e.g.][]{hummerRecombinationlineIntensitiesHydrogenic1987,drainePhysicsInterstellarIntergalactic2011,senchynaUltravioletSpectraExtreme2017}. The metallicity also plays a role in modulating the strength of \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{}. In the regime where the stellar SED dominates \hbox{He\,{\sc ii}}{} production (left of the dashed line in Figure~\ref{fig:heiinevnv_met}), \hbox{He\,{\sc ii}}{} is most strongly affected by metallicity, increasing by nearly an order of magnitude as metallicity drops from $Z=0.02$ to $0.001$. As mentioned in Section~\ref{subsec:modelmeth}, this is due to the hardening of the stellar SED with decreasing metallicity. At high X-ray production efficiencies (right of the dashed line), \hbox{He\,{\sc ii}}{}/H$\beta$ decreases modestly with decreasing metallicity, due to the lowering of the recombination rate with increasing gas temperature \citep{hummerRecombinationlineIntensitiesHydrogenic1987}. In contrast, \hbox{Ne\,{\sc v}}{}/H$\beta$ displays a very different behavior; at all but the highest X-ray production efficiencies, \hbox{Ne\,{\sc v}}{}/H$\beta$ peaks at $Z=0.01$ before dropping at lower metallicity. Since the adopted stellar SED is too soft to contribute effectively to these lines, this behavior is due primarily to gas physics, with a competition between the diminishing abundance of neon and the increasing electron temperature (due to less efficient cooling). At the lowest metallicities ($Z<0.01$), the diminishing neon abundance dominates, and \hbox{Ne\,{\sc v}}{} become less prominent with decreasing metallicity. At the highest X-ray production efficiencies, gas heating is far more efficient, and this line simply decreases in strength with decreasing abundance over the entire metallicity range. While $M_\mathrm{BH}$, $\log U$, and $Z$ all impact on \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{} to some degree, our full set of photoionization models suggest two testable observational predictions independent of these variables if we assume that HMXBs dominate \hbox{He\,{\sc ii}}{} production. First, strong \hbox{He\,{\sc ii}}{} emission should be associated with very high X-ray production efficiencies: that is, X-ray luminosities in-excess of $10^{42}$ erg/s for a galaxy forming stars at 1 \unit{M_\odot/year}. And second, stronger \hbox{He\,{\sc ii}}{} relative to H$\beta$ (and, with greater dispersion due to gas physics, \hbox{Ne\,{\sc v}}{}/H$\beta$) should positively correlate with higher X-ray luminosities per unit star formation rate. In the remainder of this paper, we will test whether these predictions hold in a sample of local star-forming galaxies with both high-quality \textit{Chandra}{} and optical line constraints. \section{Observations} \label{sec:obs} Through photoionization modeling, we have established an observational test of the scenario in which HMXBs dominate the production of \hbox{He\,{\sc ii}}{} in star-forming galaxies (Section~\ref{sec:model}). To investigate this, we have collated archival \textit{Chandra}{} ACIS-S imaging of nearby $z<0.2$ star-forming dwarf galaxies and assembled both ESI and new MMT spectra covering \hbox{He\,{\sc ii}}{} $\lambda 4686$ and (in several cases) \hbox{Ne\,{\sc v}}{} $\lambda 3426$. Though X-ray detections have previously been published for several of the targets in our sample, the absence of reported coordinates for these X-ray sources and the fact that several of our collected datasets are unpublished requires that we reanalyze these X-ray data. We present the sample in Sections~\ref{sec:sample} and \ref{subsec:basicprop}; the optical spectroscopy in Section~\ref{sec:optspec}; the \textit{Chandra}{} data in Section~\ref{sec:chandra}; and describe the results of this joint optical and X-ray analysis in Section~\ref{subsec:casebycaseres}. \subsection{Selection of the Sample} \label{sec:sample} In order to test whether HMXBs are responsible for \hbox{He\,{\sc ii}}{}, we need an observational sample with high-quality constraints on both X-ray emission and nebular \hbox{He\,{\sc ii}}{}. In particular, the X-ray imaging must have sufficiently high spatial resolution ($\lesssim 1\arcsec$) to confidently associate X-ray point sources with the spectroscopic targets, which is presently only attained by \textit{Chandra}{}. In addition, the optical spectra must have sufficiently high spectral resolution and signal-to-noise to confidently deblend the narrow ($<500$ km/s) nebular \hbox{He\,{\sc ii}}{}$\lambda 4686$ recombination line from the broad ($>1000$ km/s) component originating in the winds of WR or very massive O stars, which is generally not possible with SDSS spectra \citep[see e.g.][]{senchynaUltravioletSpectraExtreme2017}. In the past several years, we have acquired high resolution optical spectra for a total of eleven star-forming dwarf galaxies which have \textit{Chandra}{} X-ray imaging observations available in the archive (Table~\ref{tab:obssumm}). Though selected in different ways initially, all are actively star-forming galaxies at subsolar metallicity and thus potential hosts for metal-poor HMXB populations. Eight of these eleven are galaxies targeted with \textit{HST}/COS{} ultraviolet spectroscopy in \citet{senchynaUltravioletSpectraExtreme2017} and \citet{senchynaExtremelyMetalpoorGalaxies2019} for which we also obtained deep echellette optical spectra (we will subsequently refer to these papers as \citetalias{senchynaUltravioletSpectraExtreme2017} and \citetalias{senchynaExtremelyMetalpoorGalaxies2019}, respectively). These galaxies were originally selected on the basis of either a detection of optical \hbox{He\,{\sc ii}}{} emission in an SDSS spectrum \citepalias{senchynaUltravioletSpectraExtreme2017} and as having gas-phase metallicity measurements placing them in the regime of extremely metal-poor galaxies \citepalias[XMPs, $12+\log\mathrm{O/H}<7.7$, $Z/Z_\odot \lesssim 0.1$;][]{senchynaExtremelyMetalpoorGalaxies2019}. All are compact regions of active star formation dominated by the light from young (typically $<50$ Myr) stellar populations. We cross-matched the entire sample of sixteen presented in these publications with publicly-available observations in the \textit{Chandra}{} Observation Catalog accessed via ChaSeR to obtain the subsample of eight with \textit{Chandra}{} coverage discussed here\footnote{Note that while SB198 from \citetalias{senchynaUltravioletSpectraExtreme2017} falls within the standard 10\arcmin{} search radius employed by ChaSeR, the optical target falls outside the footprint of the ACIS-S3 chip.}. We refer the reader to these previous papers for a more thorough discussion of the sample properties. We also obtained new deep optical spectra for three additional galaxies previously studied with \textit{Chandra}{}. In particular, we targeted three galaxies classified as Lyman Break Analogues \citep[LBAs;][]{heckmanPropertiesUltravioletluminousGalaxies2005} and studied in X-rays using \textit{Chandra}{} by \citet{basu-zychEvidenceElevatedXRay2013} and \citet[][hereafter \citetalias{brorbyEnhancedXrayEmission2016}]{brorbyEnhancedXrayEmission2016} with the MMT Blue Channel spectrograph: SHOC042, J2251+1427, and SHOC595. These spectra provide coverage of both \hbox{He\,{\sc ii}}{} $\lambda 4686$ and \hbox{Ne\,{\sc v}}{} $\lambda 3426$. We will discuss the reduction and analysis of these observations in Section~\ref{sec:optspec} below. \subsection{Star Formation Rates and General Characterization} \label{subsec:basicprop} \begin{table*} \centering \caption{\label{tab:obssumm} Basic properties of the eleven galaxies analyzed in this work, ordered by right ascension. Redshifts are measured from the strong optical lines in SDSS spectra \citep[or, in the case of two of the XMPs, from an MMT spectrum;][]{senchynaExtremelyMetalpoorGalaxies2019}, and the corresponding distances computed using the local velocity flow model presented by \citet{tonrySurfaceBrightnessFluctuation2000} as described in \citep{senchynaUltravioletSpectraExtreme2017,senchynaExtremelyMetalpoorGalaxies2019}. We also present gas-phase metallicities measured using the direct-$T_e$ method and star formation rates measured using the Balmer lines. } \begin{tabular}{lccccccccc} \hline Name & RA & Dec & Sample & z & Distance & $12+\log\mathrm{O/H}$ & $W_{0,\mathrm{H\beta}}$ & $\log_{10} \mathrm{SFR(H\beta)} / (M_\odot/\mathrm{yr})$\\ & (J2000) & (J2000) & & & (Mpc) & (direct-$T_e$) & (\AA{}) & \\ \hline SHOC042& 00:55:27.46& -00:21:48.7& \citetalias{brorbyEnhancedXrayEmission2016}& 0.1674& 805& $8.21 \pm 0.09$& $47 \pm 4$& $0.77 \pm 0.03$\\ J0940+2935& 09:40:12.87& +29:35:30.2& \citetalias{senchynaExtremelyMetalpoorGalaxies2019}& 0.0024& 8& $7.63 \pm 0.14$& $37 \pm 1$& $-3.58 \pm 0.10$\\ SB80& 09:42:56.74& +09:28:16.2& \citetalias{senchynaUltravioletSpectraExtreme2017}& 0.0109& 46& $8.24 \pm 0.06$& $243 \pm 17$& $-0.90 \pm 0.02$\\ SB2& 09:44:01.87& -00:38:32.2& \citetalias{senchynaUltravioletSpectraExtreme2017}& 0.0048& 19& $7.81 \pm 0.07$& $274 \pm 17$& $-1.61 \pm 0.02$\\ J1119+5130& 11:19:34.37& +51:30:12.0& \citetalias{senchynaExtremelyMetalpoorGalaxies2019}& 0.0045& 22& $7.51 \pm 0.07$& $50 \pm 1$& $-2.31 \pm 0.04$\\ SBSG1129+576& 11:32:02.64& +57:22:36.4& \citetalias{senchynaExtremelyMetalpoorGalaxies2019}& 0.0050& 25& $7.47 \pm 0.06$& $81 \pm 3$& $-2.45 \pm 0.05$\\ SB191& 12:15:18.60& +20:38:26.7& \citetalias{senchynaUltravioletSpectraExtreme2017}& 0.0028& 10& $8.30 \pm 0.07$& $392 \pm 23$& $-2.20 \pm 0.02$\\ SB111& 12:30:48.60& +12:02:42.8& \citetalias{senchynaUltravioletSpectraExtreme2017}& 0.0042& 16& $7.81 \pm 0.08$& $102 \pm 5$& $-2.37 \pm 0.02$\\ HS1442+4250& 14:44:11.46& +42:37:35.6& \citetalias{senchynaExtremelyMetalpoorGalaxies2019}& 0.0023& 11& $7.65 \pm 0.04$& $113 \pm 4$& $-3.03 \pm 0.05$\\ J2251+1327& 22:51:40.32& +13:27:13.4& \citetalias{brorbyEnhancedXrayEmission2016}& 0.0621& 279& $8.29 \pm 0.06$& $56 \pm 1$& $0.22 \pm 0.02$\\ SHOC595& 23:07:03.76& +01:13:11.2& \citetalias{brorbyEnhancedXrayEmission2016}& 0.1258& 589& $8.07 \pm 0.10$& $61 \pm 4$& $0.49 \pm 0.04$\\ \hline \end{tabular} \end{table*} Before advancing to the high-quality optical spectra and \textit{Chandra}{} data available for the galaxies in our sample, we will first discuss their bulk properties. All but one of the targeted systems (HS1442+4250) has an SDSS spectrum available as of the latest data release \citep[DR15;][]{aguadoFifteenthDataRelease2019}, and the other (HS1442+4250) has an MMT spectrum described in \citetalias{senchynaExtremelyMetalpoorGalaxies2019}. We derive distance estimates by comparing the redshifts measured in these spectra to the local flow model presented by \citet{tonrySurfaceBrightnessFluctuation2000} with $H_0=70$ km/s/Mpc, with this simply reverting to the cosmological distances for the most distant objects. We present these distances in Table~\ref{tab:obssumm}, along with gas-phase metallicities and the references to their derivation. Since the higher-resolution spectra discussed in Section~\ref{sec:optspec} do not all provide access to both H$\beta$ and H$\alpha$, we obtain uniformly-calibrated measurements of the strong optical lines from the SDSS spectra for reddening correction and SFR estimation. We follow the procedure outlined in \citetalias{senchynaUltravioletSpectraExtreme2017,senchynaExtremelyMetalpoorGalaxies2019}: in particular, we measure line fluxes using a custom \textsc{python} routine based on MCMC fits \citep{foreman-mackeyEmceeMCMCHammer2013} with a linear continuum plus Gaussian line model, and correct for extinction by comparing the observed Balmer decrement to that predicted from our direct determination of $T_e$ with \textsc{PyNeb} \citep{luridianaPyNebNewTool2015}, assuming an SMC extinction curve \citep{gordonQuantitativeComparisonSmall2003} after correction for Galactic extinction \citep{schlaflyMeasuringReddeningSloan2011,fitzpatrickCorrectingEffectsInterstellar1999}. We follow the procedure described in \citetalias{senchynaUltravioletSpectraExtreme2017} using \textsc{PyNeb} to derive direct temperature metallicities (with [\hbox{O\,{\sc iii}}{}]$\lambda 4363$) for the three LBAs from the \citetalias{brorbyEnhancedXrayEmission2016} sample, yielding uniform metallicity measurements for the entire sample (Table~\ref{tab:obssumm}). In the case of HS1442+4250, we use an MMT Blue Channel spectrum obtained with the 300 lines/mm grating on January 25, 2017 \citepalias[described in][]{senchynaExtremelyMetalpoorGalaxies2019}. To correct for aperture differences between this MMT spectrum and the other SDSS spectra, we derive an effective aperture correction by comparing the measured fluxes of the strong lines of H and O in MMT spectra taken in the same configuration and on the same night for SBSG1129+576 and J1119+5130 to their SDSS spectra. This yields consistent correction factors of $0.58$ and $0.57$ for SBSG1129+576 and J1119+5130 with a scatter of $\sim 3\%$ among the different lines, respectively; we adopt a value of $0.57$ and add an additional statistical uncertainty of 10\% in this conversion. These measurements of H$\alpha$ and H$\beta$ provide a direct estimate of the current star formation rate in the spectral aperture where \hbox{He\,{\sc ii}}{} is constrained. Following the standard methodology, we convert the dust-corrected Balmer line luminosities into SFR estimates using a conversion factor derived from the same BPASS v2.2 models employed in the photoionization modeling (Section~\ref{sec:model}). In particular, we assume $Z=0.003$ (corresponding to the mean metallicity of our sample, $12+\log\mathrm{O/H}=7.9$, assuming solar abundances) and the fiducial BPASS IMF (Salpeter slope). For each galaxy, we derive an SFR conversion factor appropriate for the effective age of the dominant stellar population by choosing the constant star formation rate model with predicted H$\beta$ equivalent width closest to that observed. The uncertainty in the resulting estimates (Table~\ref{tab:obssumm}) represents the statistical uncertainties in the flux measurement and determination of $Q(\mathrm{Lyc})/L_{\mathrm{H}\alpha}$. These estimates only account for star formation within the spectroscopic aperture, and thus represent lower limits to the total star formation rate of the target galaxies. These bulk measurements reveal a diverse set of actively star-forming galaxies. They range in distance from $\sim 10$ to 800 Mpc, with all but the relatively distant LBAs from \citetalias{brorbyEnhancedXrayEmission2016} residing at $<50$ Mpc (redshifts $z\lesssim 0.01$). Their gas-phase metallicities span from the extremely metal-poor regime $12+\log\mathrm{O/H}= 7.5$--$7.7$ up to over half solar metallicity at $12+\log\mathrm{O/H}=8.3$. Though they are all dominated by young stars, their absolute star formation rates span over four orders of magnitude, from $10^{-3.6}$ to $10^{0.77}$ \unit{M_\odot/year}. \subsection{Optical Spectroscopy} \label{sec:optspec} Here, we collate and summarize the deep optical spectral constraints available for the systems under study. As demonstrated in \citetalias{senchynaUltravioletSpectraExtreme2017}, nebular and broader stellar \hbox{He\,{\sc ii}}{} can be confused at the signal-to-noise and resolution typically attained in SDSS fiber spectra. We have specifically selected galaxies for which we have additional optical spectral constraints that can separate nebular from stellar \hbox{He\,{\sc ii}}{} and in some cases provide constraints on \hbox{Ne\,{\sc v}}{} $\lambda 3426$, which probes even higher-energy photons. We obtained optical echelle spectra covering \hbox{He\,{\sc ii}}{} and H$\beta$ (but not \hbox{Ne\,{\sc v}}{}) for eight of the systems with the Echellette Spectrograph and Imager \citep[ESI;][]{sheinisESINewKeck2002} on Keck II in 2016--2017 as part of an ongoing joint optical and ultraviolet spectroscopic campaign \citepalias{senchynaUltravioletSpectraExtreme2017,senchynaExtremelyMetalpoorGalaxies2019}. We refer the reader to these previous publications for a detailed description of the Keck/ESI observations and analysis, and present the measurements of dust-corrected \hbox{He\,{\sc ii}}{}/H$\beta$ derived from these spectra in Table~\ref{tab:optspec}. We have also obtained several new spectra with the Blue Channel Spectrograph on the 6.5m MMT (MMT/BC) specifically targeting \hbox{Ne\,{\sc v}}{} and \hbox{He\,{\sc ii}}{} (Table~\ref{tab:newmmtspec}). We observed J2251+1327, SHOC595, and SHOC042 \citepalias[LBAs from][]{brorbyEnhancedXrayEmission2016} on the night of September 10, 2018 with the 800 lines/mm grating and the $1.0''\times 180''$ slit ($0.75$ \AA{}/pixel dispersion), at central wavelengths chosen to span the rest-wavelength range from \hbox{Ne\,{\sc v}}{} $\lambda 3426$ to H$\beta$ at the SDSS redshift of each target. The standard stars G24-9, Feige 110, and LB 227 (respectively) and a HeAr/Ne comparison lamp were observed either before or after each target object with the same spectrograph configuration for flux and wavelength calibration. In addition, on April 15 2018 we used the 300 lines/mm grating to observe an optical point-source identified in SDSS imaging as coincident with an X-ray source in the ACIS-S image of HS1442+4250 (see Section~\ref{sec:datajointres} for more details). All spectra were reduced using standard longslit techniques with a custom \textsc{python} pipeline. \begin{table} \centering \caption{\label{tab:newmmtspec} A summary of the new MMT Blue Channel observations presented in this work. } \begin{tabular}{cccc} \hline Target & Airmass & Configuration & Exposure \\ & & Grating (slit) & (hours) \\ \hline \multicolumn{4}{c}{10 September 2018} \\ \hline \hline J2251+1327 & 1.2 & 800gpm ($1.0''\times 180''$) & 2.3 \\ SHOC595 & 1.3 & 800gpm ($1.0''\times 180''$) & 1.6 \\ SHOC042 & 1.4 & 800gpm ($1.0''\times 180''$) & 1.6 \\ \hline \multicolumn{4}{c}{15 April 2018} \\ \hline \hline \begin{tabular}{@{}l@{}} HS1442+4250 \\X-ray source \end{tabular} & 1.1 & 300gpm ($1.0''\times 180''$) & 0.17 \\ \hline \end{tabular} \end{table} To measure nebular \hbox{He\,{\sc ii}}{} confidently in these MMT/BC spectra, we follow the same technique adopted with the Keck/ESI data. In order to distinguish the nebular contribution from the broad $>500$ km/s FWHM stellar component, we fit two Gaussians simultaneously to the \hbox{He\,{\sc ii}}{} $\lambda 4686$ line, with one constrained to narrow width comparable to that measured for the strong nebular lines ($\mathrm{FWHM} < 7$ \AA{}) and the other forced to be broader than this cutoff. The results of these fits are displayed in Figure~\ref{fig:mmtheii}. We detect a distinct narrow component in J2251+1327 and SHOC042 at a relative strength of \hbox{He\,{\sc ii}}{}/H$\beta =0.0070\pm0.0034$ and $0.0046\pm0.0021$ (respectively), and place a $3\sigma$ upper limit on the nebular component of \hbox{He\,{\sc ii}}{}/H$\beta<0.0068$ for SHOC595. These relatively weak detections (\hbox{He\,{\sc ii}}{}/H$\beta<0.01$) are consistent with the metallicities of these systems ($12+\log\mathrm{O/H}>8.0$) in the context of the trend towards stronger \hbox{He\,{\sc ii}}{} at low metallicity \citep[e.g.\ Figure~7 of][which includes the other systems discussed in this paper]{senchynaExtremelyMetalpoorGalaxies2019}. In addition, these MMT spectra place strong constraints on the presence of nebular \hbox{Ne\,{\sc v}}{} $\lambda 3426$ (\hbox{Ne\,{\sc v}}{}/H$\beta<0.8$ in all three cases). These line measurements and dereddened $3\sigma$ upper limits where appropriate are reported in Table~\ref{tab:optspec}. We also include the measurement of \hbox{Ne\,{\sc v}}{}/H$\beta=0.79\pm0.36$ for SB111 (or J1230+1202) reported by \citet{izotovDetectionNeEmission2012}. We discuss these measurements in the context of the \textit{Chandra}{} constraints in the following section. \begin{figure} \includegraphics[width=0.5\textwidth]{heiihb_comp.pdf} \caption{ The \hbox{He\,{\sc ii}}{} $\lambda 4686$ complex for each of the LBAs observed with Blue Channel (green). We overplot models drawn from the fit posterior distribution, decomposed into the broad (black) and narrow (purple) components atop the fit linear continuum. A narrow component is detected at $>2\sigma$ for J2251+1327 and SHOC042, whereas the profile for SHOC 595 appears to be completely dominated by a line profile with width significantly larger than the strong nebular lines. } \label{fig:mmtheii} \end{figure} \begin{table*} \centering \caption{\label{tab:optspec} Optical spectroscopic constraints on nebular \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{} for our target galaxies (including $3\sigma$ upper limits where appropriate). All measurements have been dereddened using an SMC extinction curve and the Balmer decrement measured in the corresponding SDSS spectrum. } \begin{tabular}{ccccc} \hline Name & \hbox{He\,{\sc ii}}{} $\lambda 4686$/H$\beta$ & Source & \hbox{Ne\,{\sc v}}{} $\lambda 3426$ / H$\beta$ & Source \\ & $\times 100$ & (\hbox{He\,{\sc ii}}{}) & $\times 100$ & (\hbox{Ne\,{\sc v}}{}) \\ \hline SHOC042 & $0.46\pm0.21$ & MMT/BC (2018-09-10) & $<0.79$ & MMT/BC (2018-09-10) \\ J0940+2935 & $<1.17$ & Keck/ESI (2017-02-21, \citetalias{senchynaExtremelyMetalpoorGalaxies2019}) & & \\ SB80 & $0.31 \pm 0.03$ & Keck/ESI (2017-01-21, \citetalias{senchynaUltravioletSpectraExtreme2017}) & & \\ SB2 & $1.30 \pm 0.06$ & Keck/ESI (2017-01-20, \citetalias{senchynaUltravioletSpectraExtreme2017}) & & \\ J1119+5130 & $2.64\pm0.26$ & Keck/ESI (2017-02-21, \citetalias{senchynaExtremelyMetalpoorGalaxies2019}) & & \\ SBSG1129+576 & $<0.42$ & Keck/ESI (2017-02-21, \citetalias{senchynaExtremelyMetalpoorGalaxies2019}) & & \\ SB191 & $<0.14$ & Keck/ESI (2016-03-29, \citetalias{senchynaUltravioletSpectraExtreme2017}) & & \\ SB111 & $3.94 \pm 0.13$ & Keck/ESI (2017-01-20, \citetalias{senchynaUltravioletSpectraExtreme2017}) & $0.79\pm0.36$ & \citet{izotovDetectionNeEmission2012} \\ HS1442+4250 & $3.58 \pm 0.06$ & Keck/ESI (2017-02-21, \citetalias{senchynaExtremelyMetalpoorGalaxies2019}) & & \\ J2251+1327 & $0.70 \pm 0.34$ & MMT/BC (2018-09-10) & $<0.60$ & MMT/BC (2018-09-10) \\ SHOC595 & $<0.68$ & MMT/BC (2018-09-10) & $<0.62$ & MMT/BC (2018-09-10) \\ \hline \end{tabular} \end{table*} \subsection{\textit{Chandra}{} X-ray Imaging} \label{sec:chandra} All objects in our sample have publicly available \textit{Chandra}{} ACIS-S imaging observations. While detections have been published for several of these systems in the past, these prior studies generally do not include the coordinates of the identified X-ray sources and our sample also includes several galaxies covered by unpublished \textit{Chandra}{} datasets. This requires that we reanalyze the \textit{Chandra}{} data in a uniform way. We compare to these literature measurements where available in Appendix~\ref{appendix:casebycaseres}. We first reprocessed the level 1 event files for these observations using the latest version of CIAO \citep[4.11, CALDB version 4.8.2][]{fruscioneCIAOChandraData2006}, focusing on the back-illuminated S3 chip which all targets were placed on. We used \textsc{fluximage} to produce a clipped exposure map in the broad \textit{Chandra}{} band, which we then used for source detection with a significance threshold of $10^{-6}$ run on the $\sqrt{2}$ series of pixel scales \citep[see e.g.][]{mineoXrayEmissionStarforming2012,brorbyXrayBinaryFormation2014}. The spatial resolution afforded by \textit{Chandra}{} is a key advantage in conducting a study connecting X-ray observations to optical data. The astrometry of \textit{Chandra}{} detections on the ACIS-S detector is accurate to $<1.4''$ in 99\% of cases in comparisons with ICRS optical counterparts\footnote{CIAO manual: \url{http://cxc.cfa.harvard.edu/cal/ASPECT/celmon/}.}. Since we are concerned in this work with the potential impact of HMXBs on nebular line emission measured on spatial scales of $\sim 1''$ (Section \ref{sec:optspec}), we are not interested in X-ray sources significantly offset from the optical galaxy. This is in contrast to much of the previous work on these galaxies, where significantly offset sources were included to account for the fact that HMXBs may be kicked up to hundreds of parsecs from their birthplace \citep[e.g.][]{kaaretDisplacementXraySources2004,zuoDisplacementXrayBinaries2010,brorbyXrayBinaryFormation2014}. It is important to note that even with this resolution, we cannot unambiguously associate X-ray sources with the gas in which the observed \hbox{He\,{\sc ii}}{} is excited. At the distances of our targets, $1''$ corresponds to comoving physical distances of 50 pc to 3 kpc, larger than the sizes of individual star clusters in the local universe \citep[e.g.][]{meurerStarburstsStarClusters1995}. We adopt the 99\% confidence positional accuracy limit of $1.4''$ as a limiting radius to establish association between the X-ray sources and the observed optical line emission, and consider separations between 1.4$''$--5$''$ on an individual basis (see Section~\ref{subsec:casebycaseres} and Appendix~\ref{appendix:casebycaseres}). To compute net count rates, fluxes, and 68\% uncertainties for these detected sources in the 0.5--8.0 keV band, we ran \textsc{srcflux} on the filtered level 2 event files assuming an absorbed power law model with photon index $\Gamma= 1.7$ and a neutral absorbing column with density $N_H$ set to the Galactic value towards each system in the NRAO dataset of \citet{dickeyGalaxy1990} accessed by \textsc{colden}. This photon power law is a reasonable approximation of the shape of the assumed intrinsic MCD spectrum over the 0.3--8.0 keV band, and is commonly assumed in flux measurements for similar samples \citep[e.g.][]{dounaMetallicityDependenceHighmass2015}. Adopting a steeper index of $\Gamma=2.0$ \citep[corresponding to a softer spectrum, as in][]{mineoXrayEmissionStarforming2012,fabbianoPopulationsXRaySources2006a} would decrease the inferred fluxes by $12^{+1}_{-2}$\%. If no sources were detected within 1.4\arcsec{} from the SDSS ICRS coordinates on which the optical spectra were centered, we consider the target undetected in X-rays. In this case, we compute a 95\% confidence upper limit to the count rate and flux using \textsc{srcflux}. In both cases, we convert the observed fluxes to luminosities in the same band using the distance to each galaxy (Table~\ref{tab:obssumm}). These measurements and upper limits are presented in Table~\ref{tab:chandra}. One concern in computing the X-ray fluxes is the possibility that uncertainties in the absorbing column density of neutral gas towards each source might impact on the inferred X-ray luminosities. We do not have a robust way to estimate this internal absorption for these galaxies without X-ray spectral information or Ly$\alpha$ constraints \citep[e.g.][]{thuanChandraObservationsThree2004}, so we follow the standard procedure for such data and correct only for Galactic $N_H$ as described above. Fortunately, the galactic absorbing column density towards our sources is uniformly low ($N_H<10^{21} \unit{cm^{-2}}$). Increasing the assumed value of $N_H$ by a factor of five in the above-described \textsc{srcflux} measurements increases the resulting \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{} values by a median factor of only 1.15, suggesting that the effect of accounting for additional absorption internal to the target galaxies would likely be small. This procedure yields \textit{Chandra}{} detections of seven of the galaxies in X-rays (Figure~\ref{fig:sdsschandra} and Table~\ref{tab:chandra}). We discuss the results in more detail in Section~\ref{subsec:casebycaseres} and Appendix~\ref{appendix:casebycaseres}. \begin{figure*} \includegraphics[width=1.0\textwidth]{sdss_chandra_montage.pdf} \caption{ Optical and X-ray imaging for the eleven galaxies in our sample. The bluescale background image is a linear-scaled display of the SDSS $u$-band image probing light from recently-formed stars, and in red we overplot contour lines at count levels [0.25, 0.5, 1, 2] from the primary \textit{Chandra}{} image after smoothing by a normalized $\sigma=1''$ Guassian. A purple circle with radius $2''$ centered on the optical spectral target (the brightest region in the $u$-band) is drawn in each case. \textit{Chandra}{} X-ray sources are confidently detected within this optical radius in five cases, where it is possible for them to contribute to the observed nebular emission. } \label{fig:sdsschandra} \end{figure*} \begin{table*} \centering \caption{\label{tab:chandra} Summary of the \textit{Chandra}{} ACIS-S observations analyzed in this work. We highlight the program ID and PI and the observation time for each. The separation between the nearest detected X-ray source and the optical spectroscopic target is given in both arcseconds and comoving kpc. We provide the galactic column density $N_H$ towards each source, and the count rate and derived luminosity if the target is detected with \textit{Chandra}{} or the 95\% confidence upper limits if not (see Section~\ref{sec:chandra} and Appendix~\ref{appendix:casebycaseres}). } \begin{tabular}{lccccccc} \hline Name & Chandra & Date & Exposure & $r_{\mathrm{sep}}$ & $N_H$ & Net count rate & \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}\\ & ObsID (PI) & & ks & arcsec (comoving kpc) & $10^{20} \;\mathrm{cm^{-2}}$ & $\mathrm{s^{-1}}$ & $10^{38}\; \mathrm{erg \, s^{-1}}$\\ \hline SHOC042& 16019 (Kaaret)& 2014-01-31& 22.7& 0.2 (0.72)& 2.67& $0.00089\pm0.00022$& $6.55 \pm 1.61 \times 10^3$\\ J0940+2935& 11301 (Prestwich)& 2010-01-16& 5.0& 60.3 (2.34)& 1.78& $<0.00054$ & $<0.34$\\ SB80& 19164 (Chandra)& 2018-01-03& 46.8& 0.2 (0.05)& 3.13& $0.00015\pm0.00007$& $4.94 \pm 2.23$\\ SB2& 19463 (Mezcua)& 2017-03-11& 14.9& 0.3 (0.03)& 4.25& $0.00078\pm0.00033$& $4.00 \pm 1.65$\\ J1119+5130& 11287 (Prestwich)& 2009-11-07& 11.7& 2.2 (0.24)& 1.16& $0.00847\pm0.00093$& $38.97 \pm 4.29$($<1.09$) \textdagger\\ SBSG1129+576& 11283 (Prestwich)& 2010-07-06& 14.8& 0.8 (0.09)& 1.00& $0.00177\pm0.00038$& $10.69 \pm 2.28$\\ SB191& 7092 (Swartz)& 2006-04-02& 2.0& 46.5 (2.25)& 2.46& $<0.00137$ & $<1.33$\\ SB111& 11290 (Prestwich)& 2010-07-26& 12.0& 11.1 (0.86)& 2.54& $<0.00023$ & $<0.59$\\ HS1442+4250& 11296 (Prestwich)& 2009-11-26& 5.2& 8.3 (0.44)& 1.54& $<0.00053$ & $<0.62$\\ J2251+1327& 13013 (Basu-Zych)& 2011-01-17& 19.6& 0.4 (0.53)& 4.75& $0.00216\pm0.00037$& $1.77 \pm 0.30 \times 10^3$\\ SHOC595& 17418 (Kaaret)& 2014-09-24& 13.6& 1.3 (3.59)& 4.72& $0.00076\pm0.00026$& $3.24 \pm 1.12 \times 10^3$\\ \hline \end{tabular} \vspace{3mm} \begin{flushleft} \footnotesize{\textdagger The X-ray detection in this system is $>2''$ away from the optical spectroscopic target and likely does not contribute to the observed \hbox{He\,{\sc ii}}{}, but is clearly associated with the galaxy; see Appendix~\ref{appendix:casebycaseres}. We consider this galaxy detected for the purposes of this paper, but note the 95\% confidence upper limit to the luminosity derived with \textsc{srcflux} centered on the spectroscopic target and note this caveat in Figure~\ref{fig:heiixr} as well.} \end{flushleft} \end{table*} \subsection{Results} \label{subsec:casebycaseres} With both optical and X-ray data in-hand, we can now build a picture of the X-ray properties of the galaxies in our sample. For a detailed discussion of the results for each system, we refer the reader to Appendix~\ref{appendix:casebycaseres}. Following the procedure described in Section~\ref{sec:chandra}, we detect X-ray emission cospatial with the star-forming clump targeted with optical spectroscopy in seven of the eleven galaxies in our sample (Table~\ref{tab:chandra} and Figure~\ref{fig:sdsschandra}). The resulting measurements of \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{} range over three orders of magnitude, with the nearest sources revealing X-ray luminosities of 1--40$\times 10^{38}\; \mathrm{erg/s}$ and the more distant LBAs residing at 2--7$\times 10^{41} \; \mathrm{erg/s}$. The available observations place strong upper limits on the X-ray luminosities of the undetected systems, constraining their luminosities to $\lesssim 10^{38}$ erg/s. We find good agreement with the X-ray luminosities measured by \citet{brorbyXrayBinaryFormation2014,brorbyEnhancedXrayEmission2016} for the subset of our \textit{Chandra}{} observations previously analyzed in these works, but our more stringent matching of the X-ray and optical coordinates reveals two key differences with earlier analysis. The undetected systems include two galaxies previously reported as HMXB hosts based upon the same \textit{Chandra}{} data. For both SB111 and HS1442+4250 \citep{brorbyXrayBinaryFormation2014}, we identified a nearby X-ray source, but found that it resided at a distance of 11\arcsec{} and 8\arcsec{} (respectively) from the center of the star-forming region targeted with ESI (Figure~\ref{fig:sdsschandra}). This offset is far larger than the uncertainty associated with the \textit{Chandra}{} coordinates ($<1.4\arcsec{}$ at 99\% confidence). Even assuming the X-ray source resides at the same redshift, this places the object at a significant distance from the \hbox{H\,{\sc ii}}{} region in which we observe nebular \hbox{He\,{\sc ii}}{} (0.9 and 0.4 comoving kpc). In the case of SB111, the nearest X-ray source has no SDSS optical counterpart. However, the X-ray emission near HS1442+4250 is clearly associated with a faint $i=21$ point source in the SDSS image (Figure~\ref{fig:sdsschandra}). As detailed in Appendix~\ref{appendix:casebycaseres}, we obtained an MMT/BC spectrum of this source and discovered broad emission lines consistent with Ly$\alpha${} and \hbox{C\,{\sc iv}}{} at $z=2.4$ (Figure~\ref{fig:hs1442xr}). Thus, in this case the X-ray emission previously thought to belong to an ejected HMXB is actually associated with a background quasar. In both cases, we conclude the X-ray emission cannot be physically associated with the observed nebular \hbox{He\,{\sc ii}}{}. \begin{figure} \includegraphics[width=0.45\textwidth]{hs1442+4250_xrsource.pdf} \caption{ Follow-up spectroscopy of the X-ray source near HS1442+4250. The \textit{Chandra}{} contours (red; same as Fig.~\ref{fig:sdsschandra}) correspond precisely to a faint point source visible in the SDSS $r$-band (background bluescale image) $8''$ away from the optical star-forming region in HS1442+4250 studied with previous deep spectroscopy (outlined with a purple $2''$-radius circle). A 10-minute MMT/BC spectrum (inset, red) reveals strong broad emission at 4130 and 5470 \AA{} (observed-frame), which we interpret as Ly$\alpha$ and \hbox{C\,{\sc iv}}{} at $z=2.4$. In this case, the observed X-ray emission appears to be associated with a background AGN rather than an ejected HMXB associated with HS1442+4250. } \label{fig:hs1442xr} \end{figure} Combined with the aperture SFR estimates from the Balmer lines (Section~\ref{subsec:basicprop}), these \textit{Chandra}{} detections provide a measurement of the X-ray production efficiency of these galaxies. These systems power luminosities \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{} ranging from $4\e{39}$ to $8\e{41}$ erg/s at a fixed SFR of 1 \unit{M_\odot/year} (Appendix~\ref{appendix:casebycaseres}). Crucially, none of the galaxies exceeds $10^{42}$ erg/s per \unit{M_\odot/year}. We discuss the implications of these measurements in the context of our photoionization model predictions in the following section. \section{Discussion} \label{sec:datajointres} With the assembled set of eleven metal-poor galaxies with optical and X-ray constraints, we can test whether HMXBs are a plausible explanation for the observed nebular \hbox{He\,{\sc ii}}{}. In particular, we derived two key observational predictions from our photoionization modeling adopting the assumption that HMXBs provide the extra EUV ionizing radiation necessary to power \hbox{He\,{\sc ii}}{} (Section~\ref{sec:model}). First, we found that the HMXB spectrum could only boost the \hbox{He\,{\sc ii}}{} luminosity relative to H$\beta$ to $\gtrsim 1\%$ at extraordinarily large X-ray luminosities per star formation rate of $>10^{42}$ erg/s at 1 \unit{M_\odot/year} (Figure~\ref{fig:heiinevnv_all}). And second, our models indicate that this scenario should create a positive correlation between high X-ray luminosities at fixed SFR and strong high-ionization emission relative to H$\beta$ (especially high \hbox{He\,{\sc ii}}{}/H$\beta$). First, we compare the X-ray production efficiencies attained by the galaxies in our sample to the results of our model grid. In Figure~\ref{fig:heiixr}, we plot the flux ratio of \hbox{He\,{\sc ii}}{} to H$\beta$ as a function of the X-ray luminosity per unit star formation rate measured for these eleven galaxies, alongside our full set of photoionization models. Our targets with \hbox{He\,{\sc ii}}{} detections are entirely disjoint from the photoionization modeling, powering \hbox{He\,{\sc ii}}{} up to an order of magnitude stronger relative to H$\beta$ than expected. For instance, consider SB2, in which we detect \hbox{He\,{\sc ii}}{} at a high flux ratio with H$\beta$ of $0.0130\pm0.0004$. This system is detected in X-rays as well, but at an X-ray production efficiency of only $1.47\pm 0.61 \e{40}$ erg/s for a star formation rate of $1\, \mathrm{M_\odot/year}$, two orders of magnitude lower than we estimate is required for the HMXB spectrum to reach the level of the stellar SED at the \ensuremath{\rm He^+}{}-ionizing edge. Seven of our target systems are detected in \hbox{He\,{\sc ii}}{}, including some of the highest values of \hbox{He\,{\sc ii}}{}/H$\beta$ yet measured locally (up to 0.04), and yet all are found to be relatively inefficient producers of X-ray flux. None reach an X-ray production efficiency of $10^{42}$ erg/s for a star formation rate of 1 $\mathrm{M_\odot/year}$, which we predict is the minimum required for HMXBs to begin powering strong \hbox{He\,{\sc ii}}{}. This indicates that HMXBs (with a standard MCD spectrum) in these galaxies do not produce sufficient flux at the $\mathrm{He^+}$-ionizing edge to account for the observed \hbox{He\,{\sc ii}}{} emission. Our photoionization models also make a clear prediction that if HMXBs are primarily responsible for $\mathrm{He^+}$-ionization, we should observe a correlation between \hbox{He\,{\sc ii}}{}/H$\beta$ and the SFR-normalized X-ray luminosity, with the strongest \hbox{He\,{\sc ii}}{} emission expected in galaxies most efficient in X-ray production. Our observational results show no evidence for a relationship between these features. In particular, the six galaxies with the strongest X-ray emission (exceeding $10^{41}$ erg/s in \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{} for a SFR of 1 $\mathrm{M_\odot/year}$) include only three \hbox{He\,{\sc ii}}{} detections, with all but one revealing relatively-weak \hbox{He\,{\sc ii}}{} (\hbox{He\,{\sc ii}}{}/H$\beta \lesssim 0.01$). The most prominent cases of \hbox{He\,{\sc ii}}{} emission in our sample (\hbox{He\,{\sc ii}}{}/H$\beta>0.025$, among the highest observed in any star-forming galaxies) occur in three systems: J1119+5130, SB111, and HS1442+4250. The latter two of these are both confidently undetected in X-rays, with limiting X-ray production efficiencies as low as $<1.2\e{40}$ erg/s at $1\, \mathrm{M_\odot/year}$. In the third case (J1119+5130), it is highly unlikely that the X-ray emission associated with the galaxy is capable of powering the observed \hbox{He\,{\sc ii}}{} due to the sizable spatial offset from the spectroscopic aperture (Section~\ref{subsec:casebycaseres}). Analogously to \hbox{He\,{\sc ii}}{}, our models also suggest that the relative strength of \hbox{Ne\,{\sc v}}{} should correlate with higher X-ray production efficiencies if it is also powered by HMXBs. While only three of our systems have \hbox{Ne\,{\sc v}}{} constraints, none of these three reveal detections of both X-ray emission and \hbox{Ne\,{\sc v}}{}. The X-ray output of these systems appears entirely decoupled from the strength of high-ionization emission, contrary to our expectations assuming the two are physically related. \begin{figure} \includegraphics[width=0.5\textwidth]{heii_xr.pdf} \caption{ Observed and predicted \hbox{He\,{\sc ii}}{}/H$\beta$ line ratios versus \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/SFR for our observational sample and our photoionization model grid. The observed galaxies detected in \hbox{He\,{\sc ii}}{} lie uniformly in-excess of the maximal predictions of our photoionization model grid over the inferred range of X-ray production efficiencies. In addition, the most intense \hbox{He\,{\sc ii}}{}-emitters show no indication of enhanced X-ray emission relative to galaxies with less extreme \hbox{He\,{\sc ii}}{}. This comparison suggests that HMXBs are not the dominant source of \hbox{He\,{\sc ii}}{} production in this sample of galaxies. } \label{fig:heiixr} \end{figure} A potential source of concern in this analysis is HMXB variability, which could plausibly cause scatter relative to the models in Figure~\ref{fig:heiixr} if systems were observed with optical spectroscopy during an outburst and in X-rays during a period of quiescence. Due to their nature as accretion-driven systems, HMXBs exhibit variability in both spectral shape and normalization during outbursts \citep[e.g.][]{mineoXrayEmissionStarforming2012,kaaretStateTransitionLuminous2013,brorbyTransitionXrayBinary2015}. We see tentative possible evidence for variability in the X-rays in the multiple observations of SB80 and SHOC595 (Section~\ref{subsec:casebycaseres}). However, the strongest nebular \hbox{He\,{\sc ii}}{} emission in our sample (in SB111) was found at nearly identical strength relative to H$\beta$ in our 2017 Keck/ESI spectrum and in a 2011 MMT/BC spectrum \citep{izotovDetectionNeEmission2012,senchynaUltravioletSpectraExtreme2017}, suggesting that in contrast to the emission from HMXBs, the \hbox{He\,{\sc ii}}{} emission in this object is not significantly variable. In addition, in this scenario we would expect to see with equal likelihood observations of systems with enhanced \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{} due to being caught in an outburst and relatively low \hbox{He\,{\sc ii}}{}/H$\beta$ (i.e.\ residing to the right of the models in Figure~\ref{fig:heiixr}), which we do not observe. This argument applies also to the similar concern that geometrical beaming \citep[as we see some evidence for in ultraluminous X-ray sources, e.g.][]{kingUltraluminousXRaySources2001,kaaretUltraluminousXRaySources2017} may lead some systems to appear under-luminous in X-rays while still producing strong \hbox{He\,{\sc ii}}{}; in this scenario we would also expect some systems to appear unexpectedly bright in X-rays relative to their \hbox{He\,{\sc ii}}{} emission when observed down the beam, which we do not. Even examining the larger sample of X-ray detected galaxies presented by \citetalias{brorbyEnhancedXrayEmission2016}, there are no instances of a measurement of an X-ray production efficiency in-excess of $10^{42}$ erg/s per $1 \, \mathrm{M_\odot/year}$ SFR in any local dwarf galaxy. Thus, HMXB variability or beaming cannot readily explain the discrepancies we have discussed. With HMXBs effectively ruled-out as the dominant source of \hbox{He\,{\sc ii}}{} in these galaxies, we consider the possibility that the model stellar ionizing spectra may simply be underestimating the flux at the \ensuremath{\rm He^+}{}-ionizing edge. Even with the latest generation of models for the expanding outer atmospheres and winds of massive stars incorporating line-blanketing and NLTE effects, the estimation of emergent flux beyond the \ensuremath{\rm He^+}{}-ionizing edge for a given star remains significantly uncertain \citep[e.g.][]{gablerUifiedNLTEModel1992,pulsAtmosphericNLTEmodelsSpectroscopic2005}. In addition, there are large systematic uncertainties in predictions of the evolutionary tracks taken by stars at low metallicity, especially for those which undergo binary mass transfer. In particular, stars stripped by binary mass transfer or structurally reshaped by high rotation rates can potentially provide substantial ionizing flux beyond 54.4 eV even at relatively low initial mass \citep[e.g.][]{szecsiLowmetallicityMassiveSingle2015,vinkWindsStrippedLowmass2017,gotbergIonizingSpectraStars2017,gotbergSpectralModelsBinary2018,kubatovaLowmetallicityMassiveSingle2019}. Such stars have only recently been included in any form in population synthesis predictions \citep[][]{eldridgeEffectStellarEvolution2012,gotbergImpactStarsStripped2019a}, and may provide a natural explanation for both the strong metallicity dependence and lack of correlation with high specific star formation rates found for \hbox{He\,{\sc ii}}{} in dwarf galaxies \citep[e.g.][]{senchynaPhotometricIdentificationMMT2019a,platConstraintsProductionEscape2019} as well as some of the peculiar \hbox{He\,{\sc ii}}{} nebulae lacking coincident massive stars in the Local Group \citep[e.g.][]{pakullHighexitationNebulaeMagellanic2009,kehrigGeminiGMOSSpectroscopy2011}. While some constraints can be placed on such stars from resolved work in the Local Group \citep[e.g.][]{smithExtremeIsolationWN32018}, extending calibrations of stellar models below the metallicity of the SMC in this way is challenging with current facilities given the limited number of appropriate resolved stellar populations \citep[e.g.][]{bouretNoBreakdownRadiatively2015,garciaOngoingStarFormation2019,evansFirstStellarSpectroscopy2019a}. The study of nebular \hbox{He\,{\sc ii}}{} in large samples of dwarf galaxies in the context of improved stellar population synthesis models may provide some of our only insight into and constraints on such stars, which are likely to exist but challenging to directly observe. It is still possible that other non-stellar ionizing sources contribute to the $\mathrm{He^+}$-ionizing photon budget. Fast radiative shocks driven by supernovae and stellar winds are another candidate origin for \hbox{He\,{\sc ii}}{} and \hbox{Ne\,{\sc v}}{} emission \citep[e.g.][]{dopitaSpectralSignaturesFast1996,thuanHighIonizationEmissionMetaldeficient2005,izotovDetectionNeEmission2012,platConstraintsProductionEscape2019}. While galaxies with strong \hbox{He\,{\sc ii}}{} emission often lack clear signatures of significant shock-ionized gas \citep[e.g.][]{senchynaUltravioletSpectraExtreme2017,kehrigExtendedHeII2018,bergWindowEarliestStar2018}, a small shock contribution can boost \hbox{He\,{\sc ii}}{} while keeping the other high-ionization UV lines consistent with observations in some cases \citep{platConstraintsProductionEscape2019}. However, no predictive model of this shock contribution can yet account for the strong observed metallicity dependence in nebular \hbox{He\,{\sc ii}}{} \citep[though a metallicity-dependent IMF or sSFR scaling could help explain this;][]{platConstraintsProductionEscape2019}. In addition, soft and supersoft X-ray sources such as accreting white dwarfs identified in the Local Group can have effective temperatures $T_\mathrm{eff} \simeq 10^5$--$10^6$ K (corresponding to $\sim 40$--$400$ eV) and can potentially contribute to $\mathrm{He}^+$ ionization if they reside in a sufficiently dense ISM \citep[e.g.][]{remillardIonizationNebulaeSurrounding1995,distefanoLuminousSupersoftXRay2003,distefanoDiscoveryQuasisoftSupersoft2004,liuPuzzlingAccretionBlack2013a,woodsWhereAreAll2016,craccoSupersoftXRaySources2018a}. Accreting intermediate-mass or supermassive black holes $>10^3 \unit{M_\odot}$ produce more flux at low energies than the $\leq 100$ \unit{M_\odot} black holes we consider here, and are potentially required to explain some of the most luminous soft X-ray sources discovered nearby \citep[e.g.][and references therein]{fabbianoPopulationsXRaySources2006a,kaaretUltraluminousXRaySources2017}. Observations provide strong evidence that accreting massive black holes do reside in low-mass galaxies \citep[e.g.][]{reinesDwarfGalaxiesOptical2013,baldassareTilde50000Sun2015,sartoriSearchActiveBlack2015} and in some cases, even in galaxies classified as star-forming by optical emission line diagnostics \citep{reinesNewSampleWandering2020}. Detailed study of many of these candidates in unresolved dwarf galaxies directly in the X-rays is challenging, however, due to their distance and relatively low luminosities \citep[though see e.g.][]{baldassareXrayUltravioletProperties2017a}. Deeper investigation of fainter high ionization lines like \hbox{Ne\,{\sc v}}{} which probe photons at higher energies than 54.4 eV may provide new insight into these softer sources of EUV radiation, as well as stringently constraining their potential impact on \hbox{He\,{\sc ii}}{}. Regardless of their impact on \hbox{He\,{\sc ii}}{}, X-ray binaries likely played a dominant role in shaping the thermal history of the very early universe. Accurate calibration of models for HMXB populations at low metallicities will prove crucial for accurate interpretation of the 21-cm signal of reionization \citep[e.g.][]{furlanettoCosmologyLowFrequencies2006,pritchardConstrainingUnexploredPeriod2010, mesingerSignaturesXraysEarly2013,fragosEnergyFeedbackXRay2013a,fialkovObservableSignatureLate2014,mirochaDecodingXrayProperties2014,mirochaWhatDoesFirst2019}. While much progress has been made in establishing the X-ray luminosity of low-metallicity stellar populations \citep{brorbyXrayBinaryFormation2014,dounaMetallicityDependenceHighmass2015,brorbyEnhancedXrayEmission2016,bluemEnhancedXrayEmission2019}, our results underscore the importance of expanding the sample of local galaxies with \textit{Chandra}{} constraints. Of the 8 XMPs with \textit{Chandra}{} detections thus far \citep{brorbyXrayBinaryFormation2014}, we have shown that the X-ray source in one (HS1442+4250) actually corresponds to a background quasar, and another (SB111/[RC2] A1228+12) is offset enough to make association fairly unlikely. Additional X-ray observations are needed to more confidently constrain the X-ray binary populations at the extremely low metallicities relevant for modeling the first galaxies. \section{Summary} \label{sec:summary} Nebular spectroscopy promises powerful insight into the physical conditions and stellar populations of galaxies, and the origin of nebular \hbox{He\,{\sc ii}}{} remains one of the most significant sources of tension in such analyses of nearby galaxies. Since the first statement of this problem \citep{garnettHeIIEmission1991}, HMXBs have remained a popular proposed solution. In order to assess the potential impact of HMXBs on \hbox{He\,{\sc ii}}{} and high-ionization nebular line emission more generally, we constructed a photoionization model grid using a joint SED incorporating both stellar light and a model HMXB spectrum with variable normalization (Section~\ref{sec:model}). To test the predictions of this grid observationally, we assembled a sample of eleven $z<0.2$ star-forming galaxies with both \textit{Chandra}{} ACIS-S X-ray constraints and deep optical spectra capable of resolving nebular \hbox{He\,{\sc ii}}{} (Section~\ref{sec:obs}). Our main conclusions are summarized as-follows: \begin{enumerate} \item Due to their typically high disk temperatures, HMXBs are relatively inefficient producers of $\mathrm{He}^+$-ionizing photons even compared to typical stellar populations with a strong break at the 54.4 eV ionizing edge (Figure~\ref{fig:sedcomp}). Our photoionization modeling reveals that the low-energy tail of a HMXB spectrum can contribute significantly to \hbox{He\,{\sc ii}}{} production only for galaxies with very large X-ray luminosities for their star formation rate, exceeding $10^{42}$ erg/s for a $1\, \mathrm{M_\odot/year}$ SFR (Figure~\ref{fig:heiinevnv_all}). Our results also indicate that if HMXBs power \hbox{He\,{\sc ii}}{}, we should find a positive correlation between \hbox{He\,{\sc ii}}{}/H$\beta$ and the X-ray production efficiency \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{}/SFR among local galaxies. \item Significant care must be taken in establishing physical association between X-ray emission and dwarf galaxies. We find several instances in which X-ray emission which could be associated with ejected HMXBs is nevertheless too spatially-offset from the optical regions under study spectroscopically to be physically related to the measured high-ionization emission. In addition, we find one instance in which an offset X-ray source previously identified as an HMXB actually corresponds to a background object which we identify spectroscopically as a quasar at redshift $z=2.4$ (Figure~\ref{fig:hs1442xr}). \item Among our sample of nearby \hbox{He\,{\sc ii}}{}-emitters, we find X-ray production is far less efficient than we predict is required for HMXBs to power \hbox{He\,{\sc ii}}{}. In particular, our galaxies are uniformly less efficient at producing X-rays than the $10^{42}$ erg/s in \ensuremath{\rm L_{\mathrm{X, 0.5-8\, keV}}}{} normalized to $1\, \mathrm{M_\odot/year}$ lower limit that we find is required to power strong \hbox{He\,{\sc ii}}{} (i). This indicates that the HMXBs present in these systems are too faint to produce significant power at the \ensuremath{\rm He^+}{}-ionizing edge relative to the stellar SED. \item We find no correlation between higher X-ray production efficiencies and stronger \hbox{He\,{\sc ii}}{}/H$\beta$ in our sample. Of the three strongest \hbox{He\,{\sc ii}}{}-emitters in our sample, only one is detected in X-rays, and even in this case the X-ray emission is likely too spatially offset to be related to the observed nebular emission. \end{enumerate} Our results suggest that HMXBs are not responsible for the nebular \hbox{He\,{\sc ii}}{} emission detected in the metal-poor galaxies in our sample. Continued observations and modeling of nebular emission from higher-ionization emission lines such as \hbox{Ne\,{\sc v}}{} will be necessary to further constrain the potential impact of other non-stellar sources such as shocks or softer accretion systems (Section~\ref{sec:datajointres}). However, the possibility remains that \hbox{He\,{\sc ii}}{} is indeed powered by very metal-poor stellar populations. Both stellar evolutionary and atmosphere models below the metallicity of the SMC ($Z/Z_\odot<0.2$) remain entirely theoretical, and population synthesis predictions especially at the highest energies are subject to substantial systematic uncertainties. Detailed spectroscopic observations of large samples of nearby metal-poor galaxies may provide one of our best opportunities to study the physics of low-metallicity stars. \section*{Acknowledgments} The authors would like to thank Kevin Hainline and Juna Kollmeier for helpful conversations and comments. This research has made use of data obtained from the Chandra Data Archive and the Chandra Source Catalog, and software provided by the Chandra X-ray Center (CXC) in the application package CIAO. Some of the observations reported here were obtained at the MMT Observatory, a joint facility of the University of Arizona and the Smithsonian Institution. Some of the data presented herein were obtained at the W.M. Keck Observatory, which is operated as a scientific partnership among the California Institute of Technology, the University of California and the National Aeronautics and Space Administration. The Observatory was made possible by the generous financial support of the W.M. Keck Foundation. The authors wish to recognize and acknowledge the very significant cultural role and reverence that the summit of Mauna Kea has always had within the indigenous Hawaiian community. We are most fortunate to have the opportunity to conduct observations from this mountain. D.\ P.\ S.\ acknowledges support from the National Science Foundation through the grant AST-1410155. J.\ M.\ acknowledges support from a CITA National Fellowship. An allocation of computer time from the UA Research Computing High Performance Computing (HPC) at the University of Arizona is gratefully acknowledged. This research made use of \textsc{Astropy}, a community-developed core \textsc{python} package for Astronomy \citep{astropycollaborationAstropyCommunityPython2013}; Matplotlib \citep{hunterMatplotlib2DGraphics2007}; \textsc{Numpy} and \textsc{SciPy} \citep{jonesSciPyOpenSource2001}; the SIMBAD database, operated at CDS, Strasbourg, France; and NASA's Astrophysics Data System. \bibliographystyle{mnras}
\section{Introduction} Topological QFT's introduced by Witten \cite{WittenCS,WittenTFT} have been approached from various viewpoints. A particularly insightful connection has been to realize these within string theory. In this setup, topological amplitudes can naturally be realized by low energy degrees of freedom living on supersymmetric branes \cite{BSV}. A nice set of examples are 3d Chern-Simons theories viewed as theories living on A-branes of topological strings \cite{Witten:1992fb}. In this setup, one considers the local CY 3-fold string geometry to be $T^*\mspace{-1mu}M^3$ and wraps a D-brane around $M^3$. Realizing this theory in M-theory \cite{GV,OV}, where M5 branes are wrapped around $M^3\times R^3$, has led to interesting predictions about the integral structure of knot invariants, as well as its extension \cite{GSV} to Khovanov invariants. Motivated by the connection between superstrings and M-theory, where the strings are mapped to M2 branes, an uplift of topological strings to M-theory, called `topological M-theory' \cite{Dijkgraaf:2004te} was proposed, which replaces CY manifolds with $G_2$ manifolds. In this theory one would consider M2 branes wrapping associative 3-cycles instead of holomorphic curves. Indeed, viewing CY times a circle as a special case of a $G_2$ manifold, the associative cycles are nothing but holomorphic curves times an extra circle. One can also consider the lift of Lagrangian D-branes to topological M-theory. The Lagrangian cycles of topological strings map to co-associative 4-cycles for a $G_2$ manifold. The worldsheet ending on D-branes in topological strings gets mapped to associative subspaces ending on co-associative cycles. It is natural to ask whether this story has any connections with topological field theory, such as 3d CS theory. If so it is natural to expect it to be related to a 4d TQFT as 3d Lagrangian subspaces are being replaced by 4d co-associative cycles. Given the success of 3d TQFT and its relation to topological strings it is natural to ask whether a similar idea would work for 4d TQFT. In particular it is natural to ask whether the computation of Seiberg-Witten invariants \cite{Witten:1994cg}, which for symplectic manifolds get related to Gromov invariants by Taubes \cite{tau2,tau3}, can be understood from this perspective (see also \cite{TaubesGrSW}). To obtain a topological theory, as in the 3d case, we need $X$ to be a supersymmetric 4-cycle in a supersymmetric background. As discussed in \cite{BSV} the natural options are supersymmetric 4-cycles in CY 4-folds, or co-associative cycles in $G_2$ holonomy manifolds, or Cayley 4-cycles in \textsf{spin(7)} manifolds. However, if we wish to use M5 branes then to get an $\cn=2$ supersymmetric theory on $X$ we need to wrap them in two extra directions, that is, on a Riemann surface $C$. $C$ must be part of a supersymmetric manifold; for arbitrary $C$ the smallest-dimensional ambient space in which $C$ is calibrated is $T^*\mspace{-1mu}C$. So the only possibility, given that the dimension of M-theory is 11, is that the 4-cycle $X$ is part of a $G_2$ manifold. The local structure of the $G_2$ manifold is obtained by considering the space of self-dual 2-forms on $X$ which leads to a 7-fold $W$. We would then consider M-theory on the 11-dimensional manifold $W\times T^*C$ and wrap M5 branes around $X\times C$. The low energy, supersymmetric partition function of this theory is naturally captured by ${\cal N}=2$ TQFT of the $4d$ QFT labeled by the curve $C$ on the 4-manifold $X$. Precisely this geometric realization of 4d TQFT in M-theory, using the $G_2$ structure has already been constructed and studied in \cite{gukov2}. Indeed many elements of what we encounter in this paper have been considered there as well.\footnote{A different embedding of 4d TQFT in string theory which has led to insight about their structure was recently considered in \cite{gukov3}.} The case of the Seiberg-Witten geometry near the monopole point is captured in this setup by the curve $C: x y -a=0$, with $x,y\in \C$, where the monopole point corresponds to $a=0$. The light monopole, as $a\rightarrow 0$, is realized in M-theory as a M2 brane whose boundary ends on the vanishing cycle as in the setup studied in \cite{KLMVW}. However, at $a=0$ a new possibility arises: The curve $C$ splits in two parts and they can be separated. This corresponds to deforming the $U(1)$ gauge theory by an FI D-term for each harmonic form in $X$. If the harmonic form has no zeros, as is the case with symplectic $X$, it Higgses\footnote{For the mathematically minded readers, the mechanism of gauge symmetry breaking is nicely explained in \cite{WittenHiggs}.} the $U(1)$. In particular the co-associative cycle splits into two: $\{x=0\} \times X \cup \{ y=0\} \times X^4$ separated by the harmonic form in the normal direction to $X$. The supersymmetric partition function in this case receives contributions only from supersymmetric M2-branes which are in the limit of small separation, when $X$ is symplectic, the same as pseudo-holomorphic curves times an interval along the normal direction as has been shown in \cite{counting}. Thus the contributions to the partition function of the topological theory become equivalent to studying Gromov-Witten invariants on $X$. Even if $X$ is not symplectic, this deformation (which is possible only if $b^{+}_2>0$) is still useful, and in this case we will separate the two sides except over the zeros of the harmonic form where the two pieces intersect. From the physics setup it is clear that we still should be able to compute the partition function in this case, but there would be extra configurations to take into account. This is in accord with recent results in \cite{gerig1,gerig2} which show that one needs to include pseudo-holomorphic curves which end on the zeros. This is natural because this still gives rise to the M2 branes ending on the M5 branes. Even if $b^{2+}=0$ and we could not deform the curves, this setup is still valid, but does not lead to any simple way to compute it as the light modes are no longer localized to pseudo-holomorphic curves in $X$. This setup naturally extends to Gaiotto $\cn=2$ theories where we wrap $N$ M5 branes over the Seiberg-Witten (SW) curve. To apply this setup we need a family of non-compact SW curves $C_u$, parametrized by the $\cn=2$ Coulomb branch $\cu$, such that there are points $u_\star\in\cu$ where $C_{u_\star}$ degenerates into nodal genus 0 curves touching at points. Along this degenerating locus the topological amplitudes typically diverge. However, in such cases the local theory would have $U(1)^k$ global symmetry where $k$ is the number of double points in $C_{u_\star}$. If in addition we gauge this symmetry, we can introduce FI D-terms in the corresponding $U(1)$'s which removes the singularities, which would correspond to separating $C$ into disconnected genus 0 pieces, and the above Seiberg-Witten geometry applies locally to all such points and leads to computation of the corresponding topological amplitudes. The organization of this paper is as follows: In section 2 we introduce the geometric setup. In section 3 we explain the physical interpretation of the setup and the deformation. Finally, in section 4 we end with some conclusions. \section{The geometric setup}\label{setup} In this note we consider M-theory on a Euclidean 11-fold of the form \be M_{11}= W\times H, \ee where $W$ is a 7-fold of $G_2$ holonomy with parallel 3-form $\Phi_3$ \cite{g21,g22}, and $H$ a hyperK\"ahler 4-fold; neither space is supposed to be compact or complete. This geometric compactification of M-theory has been considered in \cite{gukov2}. This geometry preserves two supersymmetries. Let $L_0$ be a calibrated submanifold of the form \be L_0\cong X\times C\subset W\times H \ee where $X\subset W$ is a compact co-associative submanifold (i.e.\! $\Phi_3|_X=0$) \cite{g22} and $C\subset H$ a special Lagrangian submanifold which is a holomorphic curve in complex structure $I$. Let $U\subset X$ be a coordinate patch\footnote{\ To the best of our knowledge, it is not known if there exist \emph{global} obstructions to the isometric embedding of an arbitrary orientable Riemannian 4-manifold $X$ as a co-associative submanifold of some (non-complete) $G_2$-manifold; if present, they are expected to be quite mild \cite{bryant}.} in any real-analytic Riemannian 4-fold $X$; we can always find a (non-complete) $G_2$ manifold $W_U$ with an anti-$G_2$ involution $r$ (i.e.\! $r^*\Phi_3=-\Phi_3$) so that $U$ embeds isometrically in $W_U$ as the co-associative submanifold $\mathsf{Fix}(r)$ of the fixed points of $r$, in fact we may even choose $W_U$ so that the embedding is totally geodesic \cite{bryant}. We are interested in the local physics near $L_0$, and we may replace $W\times H$ by a tubular neighborhood of $L_0$ which is isomorphic to the total space of the bundle \cite{lean} \be W\mspace{-2mu}X\times T^*\mspace{-1mu}C\to L_0 \ee where $W\mspace{-2mu}X\to X$ is the vector bundle of self-dual 2-forms and $T^*\mspace{-1mu}C\to C$ the canonical bundle. We identify $X$ with the zero section $s_0\colon X\to W\mspace{-2mu}X$, and write $g$ for the genus of $C$. The $G_2$-structure along $X\subset W\mspace{-2mu}X$ is modeled on the 3-form \be \Phi_3=\upsilon- \eta^a_{\ \mu\nu}\, dw_a\wedge dx^\mu\wedge dx^\nu \ee where $w_a$ ($a=1,2,3$) are coordinates along the fiber, $x^\mu$ local coordinates in $X$, $\upsilon$ the volume form of the fiber, and $\eta^a_{\ \mu\nu}$ the 't Hooft tensor \cite{tHooft:1976snw}. The map $\xi\mapsto s_0^*(i_\xi\Phi_3)$ identifies isomorphically the tangent space to the fiber of $W\mspace{-2mu}X$ with the space of self-dual 2-forms on $X$. The form $\Phi_3$ together with the $G_2$ metric $G$ define a vector cross product $\times$ on the tangent bundle $TW\mspace{-2mu}X$ preserved by parallel transport \be\label{vcp} \times\colon TW\mspace{-2mu}X \wedge TW\mspace{-2mu}X\to TW\mspace{-2mu}X,\qquad G(u\times v,w)=\Phi_3(u,v,w). \ee We start by wrapping a M5-brane on the 6-dimensional space \be\label{jjjx} L=X\times \big\{y^N-y^{N-2}\phi_2+y^{N-3}\phi_3+\cdots\pm\phi_N=0\big\}\subset W\mspace{-2mu}X\times T^*\mspace{-1mu}C,\qquad N\geq 2 \ee where $y$ is a fiber coordinate for $T^*\mspace{-1mu}C$ and $\phi_k$ a meromorphic $k$-differential on $C$. If $X$ is flat and very large, the 4d IR world-volume theory on $X$ is just the class-$\cs$ 4d $\cn=2$ Gaiotto theory \cite{Gaiotto:2009hg,Gaiotto:2009we} defined by the data $(C,\{\phi_k\})$ quantized in the Euclidean 4-manifold $X$ (plus a decoupled free theory for the center of mass d.o.f.). In the flat case the 4d theory preserves 8 supercharges in the representation $(\boldsymbol{2},\boldsymbol{1},\boldsymbol{2})_{+1}\oplus (\boldsymbol{1},\boldsymbol{2},\boldsymbol{2})_{-1}$ of the $\text{(Lorentz)}\times\text{(R-symmetry)}$ group \be SU(2)_+\times SU(2)_-\times SU(2)_R\times U(1)_r. \ee The symmetry $SU(2)_R$ is geometrically identified with the rotations of the $\R^3$ fiber of the bundle $W\mspace{-2mu}X\to X$. The $G_2$-structure identifies the fiber $W\mspace{-2mu}X_x$ with the vector space of self-dual 2-forms at the point $x\in X$, and hence $SU(2)_R$ with the self-dual factor $SU(2)_+$ in the 4d Euclidean Lorentz group. The supercharge $\cq$ invariant under $SU(2)_\text{diag}\subset SU(2)_+\times SU(2)_R$ is the topological supersymmetry of the $\cn=2$ theory topologically twisted \emph{\'a la} Witten \cite{WittenTFT} (for a nice survey see the book \cite{Marino}, and for the geometric setup relevant for our discussion see \cite{gukov}). The supersymmetry $\cq$ remains unbroken even when $X$ is curved. More generally, the topological supersymmetry $\cq$ is preserved by all deformations of the 4-manifold $X$ inside $W\mspace{-2mu}X$ as long as the deformed space $X_\text{def}$ is a co-associative submanifold of $W\mspace{-2mu}X$ since the $G_2$-structure identifies the $SU(2)_+$ and $SU(2)_R$ connections on $X_\text{def}$ and one covariantly constant susy parameter $\epsilon$ is still present. $\cq$ is nilpotent, $\cq^2=0$, and the topological states/operators are $\cq$-cohomology classes. Each observable $\co$ has a $k$-form version $\co^{(k)}$ for all $k$ so that their integrals on $k$-cycles $\co(\Gamma_k)\equiv \int_{\Gamma_k}\co^{(k)}$ are $\cq$-closed \cite{WittenTFT,Marino}. The quantities of main interest are the topological correlation functions \be\label{hhasqw} \Big\langle \co_{i_1}(\Gamma_{k_1})\, \co_{i_2}(\Gamma_{k_2})\cdots \co_{i_\ell}(\Gamma_{k_\ell})\Big\rangle_{\!X} \ee which are topological invariants of the smooth 4-manifold $X$. \medskip Under certain geometric conditions (to be specified in a moment) the M5 brane configuration \eqref{jjjx} admits an interesting deformation which preserves the topological supersymmetry $\cq$. The goal of the present note is to give a novel interpretation of this deformation and study some of its implications. We shall proceed by steps. \subparagraph{The deformation of $X$ in $W\mspace{-2mu}X$.} Let us deform $X$ to a nearby 4-fold $X_\text{def}\subset W\mspace{-2mu}X$ specified locally by the equation \be\label{kkkz10i} w_a=\varepsilon\, \phi_a(x)+O(\varepsilon^2). \ee One has \be \Phi_3\big|_{X_{\text{def}}}=\varepsilon\, d\big(\eta^a_{\ \mu\nu}\, \phi_a(x)\,dx^\mu\wedge dx^\nu\big)+O(\varepsilon^2)=0 \ee so, to the first order in $\varepsilon$, a deformed co-associative submanifold $X_\text{def}$ is just the graph $X_\omega$ of a closed self-dual, hence harmonic, 2-form \be \omega=\eta^a_{\ \mu\nu}\, \phi_a(x)\,dx^\mu\wedge dx^\nu. \ee One shows\footnote{\ See e.g.\! \S4 of \cite{lean} or \S12.3.1 of \cite{g22}.} that this deformation is not obstructed to higher order, so it make sense to speak of the deformation \be\label{defff} X\leadsto X_\omega \ee by a finite\footnote{\ At least as long as $\|\omega\|^2$ is not too large.} self-dual harmonic 2-form $\omega$: the 4-fold $X_\omega\subset W\mspace{-2mu}X$ is compact and co-associative. The deformation space of $X$ is smooth of real dimension \be b_2^+(X)=\dim_\R H^{2}(X,\R)^+. \ee To have non-trivial deformations, in this paper we shall always assume $b_2^+(X)\geq1$. To get a simpler theory it is sometimes convenient to assume the stronger condition $b_2^+(X)>1$.\footnote{ Since the theory is topological, in fact, partially topological since the topological correlation functions depend on non-normalizable complex deformations of non-compact $C$ which corresponds to masses, we may as well consider the opposite limit, namely $X$ small and $C$ very large. From this alternative point of view we get the 2d TFT on $C$ obtained by twisting the 2d $(2,0)$ model associated to the 4-fold $X$, see refs.\!\cite{gukov,gukov2}. However the deformation we are interested in seems more naturally described from the perspective of TFT on the space-time $X$.} \medskip \subparagraph{The factorization locus $\cu_\circ\subset\cu$.} The coefficients $\phi_k$ of the Seiberg-Witten (SW) curve for the underlying 4d $\cn=2$ model \eqref{jjjx} \be\label{swccc} y^N-y^{N-2}\phi_2+y^{N-3}\phi_3+\cdots\pm\phi_N=0 \ee depends on fixed parameters, such as the masses, as well as on the point $u$ in the Coulomb branch $\cu$ over which one has to integrate because the Euclidean space-time $X$ is compact. Contrary to the usual treatment \cite{integration,Marino}, we require the fixed parameters to have \emph{non-generic} values such that there is a non-empty sub-locus $\cu_\circ\subset \cu$ where the SW curve is maximally reducible into $N$ distinct components, i.e.\! it splits into linear factors \be\label{kasqwz} y^N-y^{N-2}\phi_2\big|_{\cu_\circ}+y^{N-3}\phi_3\big|_{\cu_\circ}+\cdots\pm\phi_N\big|_{\cu_\circ}=\prod_{\ell=1}^N(y-\lambda_\ell),\qquad \sum_{\ell=1}^N\lambda_\ell=0, \ee where $\lambda_\ell$ are meromorphic differentials on $C$ ($\lambda_\ell\not\equiv\lambda_{\ell^\prime}$ for $\ell^\prime\neq\ell$). Formulae simplify in the $N=2$ case where eqn.\eqref{kasqwz} reduces to \be\label{sqqare} \phi_2\big|_{\cu_\circ}=\lambda^2 \ee for some meromorphic differential $\lambda$, and $\cu_\circ\neq\varnothing$ iff $(C,\phi_2)$ satisfies two conditions: \begin{itemize} \item[C1.] $\phi_2$ has poles of \emph{even} order $2n_i$ at finitely many punctures $z_i\in C$ ($i=1,\dots,p$), i.e. \be\label{res1} \sqrt{\phi_2(u;z)}=\pm\sum_{s=1}^{n_i} \frac{\Lambda_{i,s}}{(z-z_i)^s}\,dz+\text{regular as }z\to z_i,\qquad \Lambda_{i,n_i}\neq0. \ee The positive integers $n_i$ are restricted by the condition that the dimension $k$ of the Coulomb branch $\cu$ of the 4d $\cn=2$ theory is non-negative \be k\equiv\dim_\C\cu= 3(g-1)+\sum_{i=1}^pn_i\geq0. \ee $\lambda$ has poles of order $n_i$ at $z_i$ whose principal parts are as in eqn.\eqref{res1}; \item[C2.] for some choice of $\epsilon_i=\pm1$, the mass parameters $m_i\equiv \Lambda_{i,1}$ satisfy \be\label{res2} \sum_{i=1}^p\epsilon_i\, m_i=0. \ee Eqn.\eqref{res2} reflects the fact that the total residue of the meromorphic 1-form $\lambda$ vanishes. \end{itemize} In the $N=2$ case, when $\phi_2$ is holomorphic the 6-fold $L$ in \eqref{jjjx} has the form $X\times \text{(compact)}$. We are mainly interested in the opposite situation where the SW curve $\{y^2=\phi_2\}$ is non-compact: this requires at least one puncture to be present. $\cu_\circ=\cup_i\,\cu_i$ decomposes in finitely many irreducible components such that \be \cu_i\cong \C^g\ \text{as complex manifolds}. \ee In particular for $g=0$ the locus $\cu_\circ\subset \cu$ consists of finitely many points. \medskip The class-$\cs[A_1]$ QFT specified by the datum $(C,\phi_2)$ has a Lagrangian formulation when $C=\bP^1$ and $\phi_2$ has a single pole with $n_1=3$, or for $C$ arbitrary and $n_i\in\{1,2\}$ \cite{Gaiotto:2009we,Cecotti:2011rv}. In the second case the flavor symmetry is at least\footnote{\ There are 5 special cases where the symmetry enhances to a larger group of the same rank \cite{Cecotti:2011rv}.} $ SU(2)^p $. The masses $m_i$ take value in the Cartan subalgebra $\mathfrak{h}$ of the flavor symmetry. \begin{exe} For instance, if the underlying class-$\cs[A_1]$ model is SQCD with $N_f=2$ (which corresponds to $(n_1,n_2)=(2,2)$) with quark masses $m_1=\pm m_2=m$, we have \be \phi_2(u;z)=\left(\frac{\Lambda^2}{z^4}+\frac{2\Lambda m}{z^3}+\frac{4u}{z^2}\pm\frac{2\Lambda m}{z}+\Lambda^2\right)\!dz^2, \ee and $\cu_\circ$ consists of the single point $u_\circ=(m^2\pm 2\Lambda^2)/4$. At $u_\circ$ eqn.\eqref{sqqare} holds with \be \lambda=\left(\frac{\Lambda}{z^2}+\frac{m}{z} \pm \Lambda\right)\!dz. \ee \end{exe} \subparagraph{Co-associative deformations of the M5 branes.} We return to the general case of a SW curve satisfying the maximal factorization property \eqref{kasqwz} (but otherwise generic). On the locus $\cu_\circ\subset\cu$ the M5 support $L$, eqn.\eqref{jjjx}, becomes reducible \be L=\bigcup_{\ell=1}^NL_\ell,\qquad L_\ell\equiv X\times \big\{y=\lambda_\ell\big\}\subset W\mspace{-2mu}X\times T^*\mspace{-1mu}C, \ee and we can separate the various irreducible components in the $W\mspace{-2mu}X$ direction \be L\leadsto \bigcup_{\ell=1}^N L_{\ell,\omega_\ell},\qquad L_{\ell,\omega_\ell}\equiv X_{\omega_\ell}\times \big\{y=\lambda_\ell\big\}\subset W\mspace{-2mu}X\times T^*\mspace{-1mu}C, \ee where $\omega_\ell\in \Omega_2^+(X)$ are distinct self-dual harmonic forms. This is the deformed M5 brane configuration we are interested in. By construction it still preserves the topological supersymmetry $\cq$. \medskip For ease of presentation, from now on we focus on the $N=2$ case, the extension to general $N$ being clear. The underlying 4d $\cn=2$ QFT is then of class-$\cs[A_1]$. For $N=2$ the support of the M5 branes is simply \be\label{brannessup} L=L_\omega\cup L_-,\quad\text{where}\quad L_\omega= X_\omega\times \big\{y=\lambda\big\},\quad L_-=X\times \big\{y=-\lambda\big\}. \ee The intersection $\{y=\lambda\}\cap\{y=-\lambda\}$ generically consists of \be h=2(g-1)+\sum_i n_i \ee distinct points ($\equiv$ double zeros of $\phi_2$). \medskip In a general class-$\cs[A_1]$ QFT, when we approach a point $u\in\cu$ where $\phi_2(u)$ has a zero of order 2 (which may be thought of as the result of the collision of two simple zeros), a hypermultiplet becomes massless and we need to insert it in the IR description. Approaching a zero of higher order the massless hypermultiplet gets replaced by a strongly interacting Argyres-Douglas (AD) SCFT \cite{AD} which also becomes part of the IR physics. In our setup, as we approach the special locus $\cu_\circ\subset\cu$, all zeros of $\phi_2$ get of even order. Approaching a generic point in $\cu_\circ$, $h$ mutually-local hypermultiplets get massless. In codimension 1 in $\cu_\circ$, interacting AD systems also enter in the IR description. The emergence of AD SCFT's is then generic for $g\geq1$. For $g=0$ with general masses satisfying \eqref{res2} no AD system appears anywhere in the Coulomb branch $\cu$. To further simplify the discussion, we focus on $g=0$ with arbitrarily many punctures satisfying C1, C2. Then $\cu_\circ\subset \cu$ is a finite collection of points. As we approach a factorization point $u_\circ\in \cu_\circ$, $h\equiv \sum_in_i-2$ mutually-local hypers get light; since we have only $k\equiv \sum_i n_i-3$ photons, a Higgs branch of quaternionic dimension 1 opens up at each $u_\circ\in\cu_\circ$. \begin{exe}\label{nnnzxa1} The simplest possible instance is $C=\bP^1$ with a single pole with $n_1=3$, that is, $\phi_2= z^2 dz^2$. In this case $h=1$ and $k=0$, so the underlying $\cn=2$ QFT is just a free massless hypermultiplet. The two M5 branes have support \be\label{nnn67we} X_\omega\times \{x-y=0\}\quad \text{and}\quad X\times \{x+y=0\}.\ee \end{exe} \subsection{Some useful geometric facts} \subsubsection{$\omega$ symplectic}\label{se:sym} In the special case that the self-dual harmonic form $\omega$ is actually a symplectic form (i.e.\! it vanishes nowhere) the supports of the two M5 branes \eqref{brannessup} are completely separated \be\label{jjaqw} L_\omega\cap L_-=\varnothing. \ee We write $\omega= t\, \Omega$, $t\in \R$, where the self-dual symplectic form $\Omega$ is normalized so that $\|\Omega\|^2=2$. There exists a compatible almost complex structure $J\colon TX\to TX$, $J^2=-1$, such that the Riemannian metric $G$ has the form \cite{salamon} \be\label{jdefff} G(v,w)=\Omega(v, Jw). \ee When $J$ is integrable the metric $G$ is K\"ahler with K\"ahler form $\Omega$. In general, $J$ decomposes the complexified differential forms into $(p,q)$-type \be \wedge^k T^*\mspace{-2mu}X\otimes\C=\bigoplus_{p+q=k} T^{(p,q)},\quad T^{(p,q)}=\wedge^p T^{(1,0)}\otimes \wedge^q T^{(0,1)},\quad T^*\mspace{-2mu}X\otimes \C=T^{(1,0)}\oplus T^{(0,1)}. \ee The canonical line bundle is $K=T^{(2,0)}$ and we write $c$ for its Chern class $c_1(K)$. A compact 2-dimensional submanifold $\Sigma\subset X$ is called a \textit{pseudo-holomorphic curve} iff $J$ preserves $T\Sigma$. In this case $J$ induces on $\Sigma$ the structure of a complex curve, the inclusion $i\colon \Sigma\to X$ is a pseudo-holomorphic map in the sense of Gromov \cite{gro}, and $\Omega|_{\Sigma}$ is the induced volume form on $\Sigma$. We write $e=e(\Sigma)$ for the 2-form Poincar\'e dual to the fundamental class of $\Sigma$; the volume of the pseudo-holomorphic curve $\Sigma$ is \be\label{vooolw} \mathrm{vol}(\Sigma)=\int_X \Omega\wedge e(\Sigma). \ee If $\Sigma$ is connected, its genus is \be g(\Sigma)= 1+\frac{1}{2}\big(e\cdot e+c\cdot e\big), \ee while the formal dimension of the deformation space of $\Sigma$ in $X$ is \cite{tau1,tau2} \be 2d= e\cdot e-c\cdot e. \ee \subsubsection{$\omega$ near-symplectic} For a generic metric on a compact 4-fold $X$ with $b_2^+(X)\geq1$, the zero set of a self-dual harmonic 2-form $\omega$ is a finite collection of non-intersecting codimension-3 circles $\amalg_\alpha S^1_\alpha\subset X$ \cite{circles,thesis}, so that the intersection between the two M5's takes the form \be\label{ccircles} L_\omega\cap L_-=\coprod_{\alpha,a} S^1_\alpha\times\{q_a\}\subset X\times C, \ee where $\{q_a\}\subset C$ are the zeros of $\lambda$. We shall refer to this situation as the \emph{near-symplectic} case. One shows that for a generic metric one can choose the self-dual harmonic form $\omega$ so that it has a single circle of zeros \cite{taubeszero}. To fix the ideas, we assume this choice. We cut out a tubular neighborhood $T_\epsilon$ of the zero set $S^1\subset X$ of radius $\epsilon$. We remain with a symplectic 4-manifold $\mathring{X}_\epsilon=X\setminus T_\epsilon$ with boundary $\partial\mathring{X}_\epsilon\cong S^1\times S^2_\epsilon$. The boundary $\partial\mathring{X}_\epsilon$ inherits a contact structure from the symplectic structure in the bulk \cite{taubes4}. The symplectic geometry of the manifold $\mathring{X}_\epsilon$ with boundary $\partial\mathring{X}_\epsilon$ contains a new interesting class of pseudo-holomorphic curves $\Sigma$, namely the ones with boundaries on $\partial\mathring{X}_\epsilon$ which have finite area and satisfy some good boundary conditions \cite{taubes5,gerig2}. Each component of the boundary $\partial\Sigma\subset\partial\mathring{X}_\epsilon$ is a (multiple cover of a) closed curve $\gamma$ in the contact 3-fold $\partial\mathring{X}_\epsilon$: the appropriate boundary condition is that, as $\epsilon\to0$, the curve $\gamma$ approaches an orbit of the Reeb vector field for the induced contact structure \cite{taubes5,gerig2}. One shows that if the Seiberg-Witten invariants of the 4-manifold $X$ are not zero, there must be such finite-area pseudo-holomorphic curves with Reeb orbit boundaries. In fact, one may recover the Seiberg-Witten invariants by a suitable count of such curves \cite{gerig2}. \section{Physical interpretation of the deformation} \subsection{Generalities}\label{phint} When the differential $\lambda$ is holomorphic, the deformation $L\leadsto L_\omega$ is normalizable and the deformation parameter $\omega$ is a dynamical field from the viewpoint of the 4d QFT on $X$. If $\lambda$ has non-trivial poles (as is automatically the case for $g=0$) the deformation is non-compact and $\omega$ becomes a frozen parameter from the 4d perspective. Formally we may still consider $\omega$ as a component of a (non-dynamical) background supermultiplet in the same $\cn=2$ susy representation as its compact-case counterpart. Since $\omega\neq0$ does not break the topological supersymmetry, $\omega$ should be the v.e.v. of the lowest component in its supermultiplet. In geometric engineering of $\cn=2$ theories, the R-symmetry is identified with the group of automorphisms of the normal bundle to the world-brane; it follows that $\omega$ transforms as a triplet under $SU(2)_R$ (identified with $SU(2)_+$ by the topological twist). The obvious $\cn=2$ supermultiplet whose first component is a $SU(2)_R$ triplet is the linear one, i.e.\! the supermultiplet containing a conserved flavor current $J_f^\mu$. The first component of the linear supermultiplet is the triplet of hyperK\"ahler moment maps of the corresponding flavor symmetry. The linear supermultiplet contains a 2-form gauge field $B$, related to the flavor current by $J_f=\ast dB$. The 2-form $B$ may be identified with a non-normalizable mode of the 2-form living on the M5 world-volume. An $\cn=2$ susy-preserving coupling which may be interpreted as a background linear multiplet is nothing else than an $\cn=2$ Fayet-Iliopoulos (FI) term for an abelian vector-multiplet which may be made of fundamental fields, composite operators, or non-dynamical degrees of freedom. We are thus led to consider FI terms of abelian gauge theories. The FI deformation of topological theory under consideration has also been considered in \cite{gukov2}. \subsection{Topological FI terms}\label{fififi} We recall that, after the topological twist, the components of a $\cn=2$ vector-multiplet are: a gauge vector $A_\mu$, a complex scalar $\phi$, an auxiliary field $D$ which is a real self-dual 2-form, a one-form fermion $\psi$, a self-dual 2-form fermion $\chi$, and a scalar fermion $\eta$ (all fields being in the adjoint of the gauge group). We write $\delta$ for the action of the topological supersymmetry. In particular we have\footnote{\ These formulae hold modulo gauge transformations \cite{Marino}.} \be\label{deeelt} \delta\phi=0,\qquad \delta\chi=D-iF^+, \ee where $F^+$ stands for the self-dual projection of the field strength $F=dA+A^2$. \medskip Let $S$ be the action of a topologically twisted 4d $\cn=2$ theory which contains an abelian vector-multiplet $(\phi, \psi, \chi, \eta, D, A_\mu)$. We may add to $S$ a $\delta$-exact term of the form \be\label{oop0} S\to S(\omega)\equiv S+\delta\!\!\int_X\omega \wedge \chi, \ee where $\omega$ is a closed self-dual 2-form. The modification \eqref{oop0} does not change the topological correlations \eqref{hhasqw} which then are $\omega$-independent. We call the new term in the \textsc{rhs} of \eqref{oop0} a topological FI coupling. The topological FI term may be generalized to the non-abelian case \be\label{kiqwaer} S\to S+\delta\!\!\int_X\omega \wedge \mathrm{tr}\big(P^\prime(\phi)\chi\big) \ee where $\phi$ is the scalar of a non-abelian vector multiplet, $\chi$ its self-dual 2-form fermion and $\mathrm{tr}\,P(\phi)$ stands for any ad-invariant symmetric polynomial. Using eqns.\eqref{deeelt}, eqn.\eqref{oop0} becomes \be\label{oop1} \begin{aligned} S\to &S+\int_X \omega \wedge D-i\!\int_X\omega\wedge F=\\ &= S+\int_X \omega \wedge D+2\pi\! \int_X\omega\wedge c_1(\cl), \end{aligned} \ee where $\cl$ is the line bundle associated to the abelian gauge field and we used \be \int_X \omega\wedge F^-=0 \ee since $\omega$ is self-dual. Then, up to the topological term $2\pi \int_X \omega\wedge c_1(\cl)$, the $\cq$-exact deformation \eqref{oop0} just adds to the action the FI term \be \int_X \omega\; D. \ee Therefore the topologically trivial modification \eqref{oop0} has two effects: \begin{itemize} \item[a)] it multiplies the topological path integral in each topological sector by the constant \be e^{-2\pi [\omega]\cdot c_1(\cl)}, \ee \item[b)] it modifies the equation of motions of the auxiliary field $D$ with the effect of shifting its on-shell value: $D_\text{on-sh}\to D_\text{on-sh}-e^2\omega$ where $e$ is the abelian gauge coupling. \end{itemize} The statement that the combined effect of a) and b) is to leave the smooth invariants \eqref{hhasqw} unchanged is equivalent to the well-established validity of the usual deformation \cite{Witten:1994cg}\!\!\cite{tau1,tau2} used to simplify the computation of the Seiberg-Witten invariants \cite{Witten:1994cg}\!\!\cite{Marino} when $b^+_2(X)>1$. (For $b^+_2(X)=1$ the situation is a bit subtler, and some more care is needed \cite{tau1,tau2}). \medskip \noindent In the non-abelian case one may write the last term in \eqref{kiqwaer} as the topological observable\footnote{\ Here $[\omega]$ stands for the 2-cycle Poincar\'e dual to $\omega$.} \be \int_{[\omega]} \mathrm{tr}\,P(\phi)^{(2)}, \ee plus a bilinear in the one-form fermion $\psi$ of the vector-multiplet. \medskip The discussion in \S\ref{phint} suggests that the deformation $L\leadsto L_\omega$ has the effect of modifying the topologically twisted IR effective theory by adding a FI term of the general form \be\label{kazqwcx} S\to S-\delta\!\!\int_X \omega\wedge \sum_a \kappa_a\, \chi^a+2\pi \sum_a \kappa_a \int_X\omega\wedge c_1(\cl^a), \ee where the sum is over all the light photons and $\kappa_a$ are numerical coefficients which depend on the SW curve and the point $u_\circ\in \cu$. The new action \eqref{kazqwcx} is still topologically invariant. We shall make precise applications of this idea in the following subsections to the theories under consideration. \medskip \subsection{M2 branes wrapped on associative cycles}\label{m2wap} To compute topological correlation functions from our geometric setup we have to sum over all $\cq$-invariant configurations describing finite-action instantons of our system of M5 branes wrapped on $L_\omega\cup L_-$. In the $N=2$ case these instantons are finite-volume BPS M2 branes suspended between the two M5 supported on $L_\omega$ and $L_-$. Such a M2 brane does not break the topological supersymmetry iff each connected component $M\subset W\mspace{-2mu}X\times T^*\mspace{-1mu}C$ of its support is calibrated. In particular, the projection of $M$ on the first factor space, $W\mspace{-2mu}X$, should be either a point or a connected associative 3-manifold $A$. Saying that $A$ is associative is equivalent to saying that its tangent space $TA$ is closed under the vector cross-product $\times$ \eqref{vcp} or, equivalently, that is calibrated by $\Phi_3$ i.e. \be \Phi_3\big|_A=\upsilon_A\equiv \text{(induced volume form)}. \ee We distinguish two cases. \subsubsection{$\omega$ symplectic} For $\omega$ symplectic $X_\omega\cap X=\varnothing$, so the projection of $M$ on $W\mspace{-2mu}X$ cannot be a point, hence it must be an associative 3-fold $A\subset W\mspace{-2mu}X$. Then the projection of each connected component of the M2 brane on $T^*\mspace{-1mu}C$ is a point and \be\label{supM} M= A\times \{q\}, \qquad q\in \{y=\lambda\}\cap\{y=-\lambda\}\subset T^*\mspace{-1mu}C. \ee It follows that the projection of $M$ on the second space $T^*\mspace{-1mu}C$ must be a zero of the differential $\lambda$. These zeros are in one-to-one correspondence with the hypers which get light as $u\to u_\circ\in \cu_\circ$, so to each connected BPS M2 there is associated a particular massless hyper. \medskip As before, for $\omega$ symplectic we write $\omega=t\Omega$ with $\|\Omega\|^2=2$. We claim that for small $t$ the boundary of $A$ in $X$ (as well as in $X_{t\Omega}$) is a pseudo-holomorphic curve $\Sigma$ with respect to the almost complex structure $J$ defined by the self-dual symplectic form $\Omega$, cfr.\! eqn.\eqref{jdefff}. Indeed, in a neighborhood of $X$ the associative 3-fold has the form \be A=\Big\{\big(x+O(s), w_a=s\,\phi_a(x)+O(s^2)\big),\quad x\in\Sigma,\ s\geq 0\Big\}\subset W\mspace{-2mu}X \ee where $\phi_a(x)$ is as in eqn.\eqref{kkkz10i}. The vertical subbundle $V_A\subset TA$ is spanned by $\partial_s$ and \be G(\partial_s \times u, v)=\Phi_3(\partial_s, u, v)=\Omega(u, v)=G(J u, v)\qquad u,v\in TX, \ee that is, $J u= \partial_s \times u$ so that $TA$ closed under $\times$ implies that $T\Sigma\simeq TA/V_A$ is closed under $J$, i.e.\! the boundary $\Sigma=\partial A\cap X$ is pseudo-holomorphic. Vice-versa, if we have a pseudo-holomorphic curve $\Sigma\subset X$ we may construct an associative 3-fold $A\subset W\mspace{-2mu}X$ such that $\partial A\cap X=\Sigma$. We conclude that associative 3-folds suspended between $X$ and $X_{t\Omega}$ and pseudo-holomorphic curves in $X$ are in one-to-one correspondence (for small $t$ and $X$ symplectic), and counting associative 3-folds $A$ with boundaries on $X$ and $X_\omega$ in a given topological class is equivalent to counting pesudo-holomorphic curves with given homology class $e(\Sigma)$ (see \cite{counting} for a precise mathematical treatment). \medskip As a check, let us compute the volume of the associative submanifold $A$ (to the first order in $t$), cfr.\! eqn.\eqref{vooolw} \be \mathrm{vol}(A) =t\cdot \mathrm{vol}(\Sigma)= t\!\int_X\Omega\wedge e(\Sigma)=\int_X\omega\wedge e(\Sigma). \ee Since the Euclidean M2 branes wrapped on an associative manifold $A$ with boundaries in the co-associative spaces $X_\omega$, $X$ are BPS, we expect that they give a contribution to the topological action of the form \be\label{qahhawr} T\,\mathrm{vol}(A)+\delta\text{-exact}\equiv T\!\int_X\omega\wedge e(\Sigma)+\delta\text{-exact}, \ee where $T$ is the M2 tension in the appropriate units. Eqn.\eqref{qahhawr} matches with the expression we found for the topological FI terms \eqref{kazqwcx} (say with one vector-multiplet) provided the following identifications hold \be\label{kasqwer} e(\Sigma)=c_1(\cl),\qquad\quad T=2\pi \kappa. \ee The second condition may be taken to be the definition of $\kappa$. To understand the validity of the first identification we will first consider the situation for a $U(1)$ $\cn=2$ theory with a massless charged field, as in the monopole point of the Seiberg-Witten geometry, and then explain how the generalization works for the case in consideration\footnote{For a review of work by Taubes \cite{tau1,tau2,tau3} on the Seiberg-Witten monopole equations \cite{Witten:1994cg} and their relation with the Gromov invariants \cite{gro} when $X$ is symplectic and $b_2^+(X)>1$, see the appendix.}. \subsubsection{The $U(1)$ monopole point and its deformation} In this section let us focus on the original Seiberg-Witten monopole point (example \ref{nnnzxa1} of \S2). The geometry in this case is represented by $C: \ \ xy =0$. The $U(1)$ gauge field on the M5 brane arises from the $B$-field on the M5 brane as follows: Consider a generic Coulomb branch point deformation, given by $xy=\mu$. In this case we have a non-trivial 1-cycle on $C$ and a dual one form $\eta$. The $U(1)$ gauge field $A$ on $X$ arises from the M5 brane by decomposing it in the direction of this 1-form: $B=A(x)\wedge \eta$. Note that the mass of the charged field is $\mu$ which goes to zero as $\mu\rightarrow 0$. If we turn on the FI term for the $U(1)$ the Coulomb branch is automatically pushed to $0$ to allow the condensation of a v.e.v. for the massless fields to preserve supersymmetry. This corresponds to $\mu =0$ and then pulling the $xy=0$ curve to two disconnected curves in the full $G_2$ geometry given by $x=0$ and $y=0$ with different transverse positions. Now there is no compact cycle on $C$ and this corresponds to Higgsing the $U(1)$ via the FI term. Let us see how the situation changes in presence of a M2 instanton with world-volume $\Sigma \times I$ where $I$ is the unit interval whose two ends are, respectively, at the point $x=0$ on the curve $\{y=0\}$ and at the point $y=0$ on $\{x=0\}$. From the point of view of the world-volume theory on each M5 brane, this instanton is a topological defect with support on the intersection of the M5 with the M2 along the surface $\Sigma$. The M5 world-volume theory gives rise to a Gaiotto-like field theory living on the 4-manifold $X$, and the M2 instanton is then realized as a topological configurations of the corresponding 4d degrees of freedom having support on the surface $\Sigma\subset X$. Along $X$, away from $\Sigma$ we have the same local physics as in absence of the M2: the $U(1)$ is Higgsed. We claim that the 4d $U(1)$ gauge symmetry is restored along $\Sigma$. Indeed, the intersection with the M2 has a description as a topological defect in terms of the degrees of freedom living on $X$, and conversely all topologically non-trivial configurations of the 4d fields should have a geometric engineering in terms of branes. The 4d theory is a supersymmetric version of the Abelian Higgs model; in the broken $U(1)$ phase its topological defects are the well-known superconducting vortices \cite{WittenHiggs}. Let $z$ be a local complex coordinate so that the surface $\Sigma$ is locally given by $z=0$. As $z\to0$ the gauge field behaves, in a holomorphic gauge, as $dz/z$ and the Higgs field goes to zero. Therefore the $U(1)$ gauge symmetry is restored along $\Sigma$. This is most easily understood from the geometric picture: the M2 brane has the effect of making the two complex planes $\{x=0\}$ and $\{y=0\}$ into planes \emph{punctured} at the respective origins, so that a new compact 1-cycle emerges, namely the difference of the cycles around the two punctures in the respective planes. From the viewpoint of the field theory on the 4-manifold $X$ the gauge field associated to this 1-cycle appears to be the same one present in the original unbroken phase, before the deformation. The compact cycle has support at the M2 brane. Moreover since the boundary of M2 brane sources the B-field on the M5 brane, we have \be dH=F\wedge d\eta =2\pi\,\delta_{[\Sigma]} \ee on the M5 brane which implies $F=2\pi\,\delta_{[\Sigma]}\big|_X$. In other words the first equation in \eqref{kasqwer} now follows: $e(\Sigma)=c_1(\cl)$. \subsubsection{Application to ${\cal{S}}[A_1]$ Theory} Now we are ready to apply this setup to the Gaiotto theories. We will mainly focus on the $N=2$ case, but the generalization to all $N$ is straightforward. As we already discussed there is a locus where the curve $C$ factorizes into two pieces. This can be done after we adjust some of the masses of the gauge theory appropriately. Moreover, in this limit we have $U(1)^{n-1}$ gauge factors with $n$ nodal points, i.e.\! with $n$ charged fields where $[n-2] $ is the divisor of the one form $\lambda$ where the curve $C$ is given by $y^2= \lambda^2$. This theory is different from the Seiberg-Witten case discussed: We have one extra matter field compared to the number of $U(1)$'s and we can have a Higgs branch without even turning on the FI term. However, this means that the topological theory, as the masses are tuned to allow factorization will leads to the moduli space of Seiberg-Witten equations which is not compact and which would lead to divergencies. To avoid this divergence we can gauge an extra $U(1)$ flavor symmetry, which is available only when the masses satisfy $\sum_i\epsilon_i m_i=0$, as already discussed. Once we gauge this $U(1)$ we will have a situation very similar to the Seiberg-Witten case discussed, namely now we have $n$, $U(1)$ gauge factors and $n$ massless charged fields, one for each nodal point. So in this context we can repeat the exact analysis we did above for the Seiberg-Witten case, show that topological amplitudes for this weakly gauged Gaiotto theory can be captured as in the Seiberg-Witten case by pseudo-holomorphic vortices. Roughly speaking, we get $Z_{X}=Z_{SW}^{n}$, although we expect the actual relation to involve also contributions from contact terms and finite counterterms. It would be interesting to interpret the resulting amplitude for the topological theory considered here, in which one gauges an extra $U(1)$ flavor symmetry, in terms of the topological invariants computed in the original TFT without this gauging. As we discussed, at the point in mass parameters where $\sum \epsilon_i m_i = 0$ the original theory is divergent (as the Seiberg-Witten equations will have non-compact moduli of solutions) and develops an extra $U(1)$ global symmetry which we gauged. It is natural to expect that the result of the gauging the extra $U(1)$ is related to the residue of the pole in topological amplitudes in the original theory as $\sum \epsilon_i m_i \rightarrow 0$. This may have a simple interpretation in the set-up \cite{gukov2} where one takes the viewpoint of the 2d topological field theory living on the curve $C$, and defines the invariants of the 4-manifold in terms of correlation functions for this 2d theory. The singularity as $\sum \epsilon_i m_i \rightarrow 0$ gets reinterpreted as due to the collision $\lim_{z_1\to z_2}\phi_1(z_1)\phi_2(z_2)$ inside the relevant correlation. The residue is obtained by replacing the product $\phi_1(z_1)\phi_2(z_2)$ with the operator $\phi$ in the singular part of the OPE: it is a 4d topological invariant, as it is the finite part of the correlation with the pole subtracted. The operator $\phi$ looks to have the general structure one would expect to arise in this context when we gauge the extra $U(1)$ to get our modified topological field theory. It would be worthwhile developing this further. \subsubsection{Extension to general $N$} The situation when the underlying 4d $\cn=2$ QFT is of class $\cs[A_{N-1}]$ is similar. At a point $u_\circ\in \cu_\circ$ where the SW curve decomposes into $N$ linear curves, $\prod_{\ell=1}^N(y-\lambda_\ell)$ we get a set of massless hypermultiplets in one-to-one correspondence with the zeros of \be \lambda_\ell-\lambda_{\ell^\prime}=0\qquad 1\leq \ell <\ell^\prime\leq N. \ee Let $q_{\ell,\ell^\prime}$ be such a zero. One considers the M2 branes with supports of the form \be A_{\ell,\ell^\prime}\times \{q_{\ell,\ell^\prime}\}\subset W\mspace{-2mu}X\times T^*\mspace{-1mu}C, \ee where $A_{\ell,\ell^\prime}\subset W\mspace{-2mu}X$ is an associative submanifold with boundaries on $X_{\omega_\ell}\cup X_{\omega_{\ell^\prime}}$. At a generic point in $\cu_\circ$ a Higgs branch of quaternionic dimension $N-1$ opens up, and we introduce $N-1$ abelian vector-multiplets; the corresponding $N-1$ topological $D$-terms that can be added to the action describe the independent deformations deformations $X\to X_{\omega_\ell}$ ($\sum_\ell\omega_\ell=0$) of the co-associative supports of the branes. At a generic point in $\cu_\circ$ we again get several copies of the Seiberg-Witten-(Taubes) equations. \subsection{The near-symplectic case}\label{nonsym} For simplicity we focus on the $N=2$ case. If our 4-manifold $X$ with $b_2^+(X)\ge1$ does not admit a symplectic form, we may deform the metric so that there is a self-dual harmonic form $\Omega$ whose zero-locus $Z=\{\Omega=0\}\subset X$ is a single embedded circle $S^1$ \cite{taubeszero}. Then the two M5 branes $L_{t\Omega}$ and $L_-$ intersect in a collection of non-intersecting circles $S^1$ one for each zero of the differential $\lambda$. More generally, for a generic metric, the intersection $L_\omega\cap L_-$ consists of a set of non-intersecting embedded circles, each circle being localized at a distinct zero of $\lambda$. The story is similar to the symplectic case. The new ingredient of the analysis is the existence of additional TFT instantons of a different kind. They are given by M2 branes whose support has the form $A\times \{\text{(a zero of $\lambda$)}\}$ with $A\subset W\mspace{-2mu}X$ an associative submanifold such that $A\cap X_\omega\equiv \Sigma_\omega$ and $A\cap X\equiv \Sigma$ are pseudo-holomorphic curves with boundary on the zero set of $\omega$ \be \partial\Sigma = Z= -\partial \Sigma_\omega, \ee and finite volume \be \mathrm{vol}(\Sigma)=\int_\Sigma \Omega <\infty, \ee a condition which may be shown to be equivalent to having finite action in the sense of the effective Seiberg-Witten theory \cite{taubes3}. Since the co-associative deformations are trivial at the level of the 4d TFT, the computation of the usual Donaldson/Seiberg-Witten invariants should also localize around the TFT instantons of this kind. In particular, if the Seiberg-Witten invariant of the 4-manifold $X$ is not zero, one expects the presence of non-trivial TFT instantons of the above form. That they indeed exist is a theorem by Taubes \cite{taubes3} (see also a related theorem by Gerig \cite{gerig2}). In fact, one expects that the full Seiberg-Witten invariants are reproduced in this way by an appropriate count of the various TFT instantons for the near-symplectic case as was the case for symplectic manifolds. The correct count is discussed from the mathematical viewpoint in ref.\!\cite{gerig2}, where agreement is checked mod 2, but it is expected to work even by dropping the mod 2 condition.\footnote{To be clear, in ref.\!\cite{gerig1} the relevant count of (punctured) pseudo-holomorphic curves is defined over the integers, and in ref.\!\cite{gerig2} it is shown that there is a correspondence between the relevant moduli spaces of such curves and Seiberg-Witten solutions.} From the physics side it is also clear that it should work, and it would be interesting to flesh out the details of the physics that is involved in this counting. In particular the relevant counting of the curves should be as counting embedded objects in $X$ (with multiplicities) and not as maps into $X$. In other words, we expect the relevant invariants are the analogs of the Gopakumar-Vafa invariants rather than the Gromov-Witten invariants. \section{Discussion} In this paper we have shown that embedding the ${\cal N}=2$ topological field theory on 4-manifolds into M-theory can be helpful in shedding light on the connection of Taubes' work and the Seiberg-Witten invariants, as inquired by Taubes at the end of ref.\cite{TaubesGrSW}. In particular we find that $G_2$ geometry on the space of self-dual 2-forms over the 4-manifold $X$ is necessary for this realization. The M2 branes suspended between M5 branes realizes the Taubes' realization of Seiberg-Witten invariants as Gromov invariants for symplectic manifolds. This setup naturally generalizes to the case of near-symplectic manifolds, where M-theory ingredients guarantee that there should be an extension for this picture, which mirrors what has been found mathematically. Namely one ends up considering M2 branes which project to Riemann surfaces ending on zero loci of self-dual 2-forms. It would be interesting to further study the physics of this theory, as it involves superconducting vortices ending on defects. \section*{Acknowledgments} We thank Edward Witten for drawing our attention to this question, and to Sergei Gukov, Marcos Mari\~no and Pavel Putrov for helpful discussions and clarifications. The research of CV is supported in part by the NSF grant PHY-1719924 and by a grant from the Simons Foundation (602883, CV). The research of CG is supported by the National Science Foundation under Award \#1803136.
\section{Introduction} \label{sec:intro} Young Stellar Objects (YSOs) in Spectral Energy Distribution (SED) classes I and II, i.e. stars in their late accretion phase, often show substantial variability due to instabilities in the accretion process. The accretion characteristics of young stars have recently been reviewed by \citet{Hartmann.2016.ARA&A.54.135H} and we follow their general line of discussion and the references therein. Traditionally, the photometric outbursts caused by increased accretion rates were divided by \citet{Herbig.1977.ApJ.217.693H} into two classes: FU Orionis objects (FUor) and EX Lupi objects (EXor). The outburst amplitude is similar for both classes, but the FUor outbursts last for decades to centuries, while EXor outbursts last from months to maybe a few years. The first known outburst of a young stellar object, FU Orionis, still remains the most substantial of these accretion instability events, having hardly declined in brightness from its maximum as first discussed by \citet{Herbig.1977.ApJ.217.693H}. For a recent comparison of FUor-type light curves see \citet{Hillenbrand.2019.ApJ.874.82H}, who compare the recently discovered FUor PTF14jg with the classical examples, and the comprehensive review of eruptive YSOs by \citet{Audard.2014.prpl.conf.387A}. EXors, on the other hand, are typically repetitive on timescales of a few years to decades, as illustrated in the case of the deeply embedded EXor V1647 Ori in a series of papers by \citet{Reipurth.2004.ApJ.606L.119R}, \citet{Aspin.2006.AJ.132.1298A}, \citet{Aspin.2008.AJ.135.423A}, \citet{Aspin.2009.AJ.138.1137A}, \citet{Aspin.2009.ApJ.692L.67A}, \citet{Aspin.2009.AJ.137.2968A}, and \citet{Aspin.2011.AJ.142.135A}, and more broadly reviewed by \citet{Audard.2014.prpl.conf.387A}. While most EXors have shown repeated outbursts on timescales of many years to decades, repetitive accretion instabilities on timescales from weeks down to hours have been found \edit1{in many other YSOs}, e.g. the YSOVAR studies of NGC~2264 by \citet{Cody.2014.AJ.147.82C} and \citet{Stauffer.2014.AJ.147.83S} and the Kepler-2 variability study by \citet{Cody.2017.ApJ.836.41C}. In many young stars still surrounded by substantial disks, both accretion instabilities (outbursts) and extinction variations (dipper events) are observed, and in some cases it can be difficult to discern which of the two mechanisms dominates. The two classical types of YSO outburst are also distinct spectroscopically. EXors show a rich emission line spectrum probably produced in optically thin funnel flows in a magnetospheric accretion scenario and veiling of photospheric absorption lines by an UV and optical continuum produced in high-temperature shocks. The more substantial FUor outbursts show a low-gravity absorption line spectrum reminiscent of a supergiant photosphere thought to be caused by a self-luminous optically thick accretion disk in a scenario where the accretion rate from that disk has overwhelmed the stellar magnetosphere and pushed it back to the stellar surface \citep{Hartmann.2016.ARA&A.54.135H}. However, FUor spectra are distinct from those of supergiant photospheres with their characteristic shift of the spectral type with wavelength. Spectra in the near-infrared are classified as a later (cooler) spectral type than the optical spectra. \edit1{ The original prototypical objects FU Orionis and EX Lupi used by \citet{Herbig.1977.ApJ.217.693H} were discovered using photographic methods best suited for bright and blue objects. } As more and more YSO outbursts have been observed thanks to better all-sky monitoring \edit1{and infrared surveys} these newer objects begin to fill a continuum of light curve characteristics such as amplitude, rise time, and rate of decline. Also, some YSO outbursts defy classification into the FUor or EXor types, either because their outburst duration or spectrum falls between that of the classical classes, or because the spectrum defies classification. Examples of such outbursts with intermediate characteristics between classical FUor and EXor outbursts are V1647 Ori \citep[and references therein]{Aspin.2011.AJ.142.135A}, ASASSN-13db \citep{SiciliaAguilar.2017.AA.607A.127S.ASASSN13db} and PV~Cep \citep{Lorenzetti.2011.ApJ.732.69L, Lorenzetti.2015.ATel.7935.1L, Kun.2011.MNRAS.413.2689K}. \edit1{ Such outbursts with intermediate characteristics, in particular more deeply embedded than EX Lupi itself, being associated with reflection nebulosity and outflow features, and being more luminous than EX Lupi, have been called ``Newest EXors'' by \citet{Lorenzetti.2012.ApJ.749.188} and ``MNors'' by \citet{ContrerasPena.2017.MNRAS.465.3011C, ContrerasPena.2017.MNRAS.465.3039C} However, even more extreme transition objects exist that call into question whether we know enough about the properties of young eruptive variables to properly define new classes of this phenomenon. } For example, the deeply embedded YSO SVS~13 = V512 Per that shows an emission-line spectrum was \edit1{originally} listed as an EXor \citep{Aspin.1994.A&A.288.803A, Eisloeffel.1991.ApJ.383L.19E}. However, the light curve differs from that of typical EXors, since it has not returned to the pre-outburst brightness 25 years after the outburst \citep{Hodapp.2014.ApJ.794.169H}. As an extreme case one outburst with a duration of decades and with a completely line-free dust continuum spectrum, OO~Ser, was observed by \citet{1996ApJ...468..861H,2012ApJ...744...56H} \edit1{and originally labelled a ``deeply embedded outburst star (DEOS)''.} The total number of known YSO outburst objects is still quite small, at most a few dozen objects of the FUor, EXor, and intermediate cases combined, even though the discovery rate has been improving in recent years thanks to several all-sky \edit1{and infrared} monitoring projects. Every newly discovered object therefore deserves careful analysis. We report here on the preliminary characterization of ESO-H$\alpha$ 99, \edit2{ also listed as \object{IRAS08370$-$4030}, } located at 08:38:55.17 -40:41:17.34 (J2000.0) in the Vela Molecular Ridge, whose outburst was first noted by Gaia alert Gaia18dvz on 2018 Dec. 19 \footnote[1] {http://gsaweb.ast.cam.ac.uk/alerts/alert/Gaia18dvz/}. \section{ESO-H$\alpha$~99: Context and Pre-outburst Properties} \subsection{Context} The Vela Molecular Ridge (VMR) is a massive molecular cloud complex straddling the border of Vela and Puppis along the Galactic plane between Galactic longitudes 259$^\circ$ and 272$^\circ$. It was first noted by \citet{Dame.1987.ApJ.322.706} and \citet{May.1988.AAS.73.51}. \citet{Murphy.1991.AA.247.202} identified four separate clouds, which they called A, B, C, and D. A detailed CO survey of the entire VMR was presented by \citet{Yamaguchi.1999.APSJ.51.775}. The distance to the VMR is poorly known, over the years numerous estimates have been made to individual regions in the VMR, ranging from 0.7~kpc to 2~kpc \citep{Pettersson.2008}. \edit1{ The Gaia-DR2 parallax of ESO-H$\alpha$~99 \edit2{ is ``1.2518 $\pm$ 0.3176 mas'' ($\approx$ 800 $\pm$ 300 pc), } not a very precise value due to the faintness of this object.} Here we adopt a newly determined distance to VMR-D of 1007$\pm$30~pc determined by Pettersson and Reipurth (in preparation) based on Gaia-DR2 \edit1{ parallax data of all H$\alpha$ emitting stars in this region.} This new distance measurement places the VMR between the foreground Gum Nebula and the background Carina-Sagittarius arm \citep{Pettersson.2008}, producing a complex line-of-sight. In particular it should be noted that the VMR is seen behind the OB association Trumpler~10. Star formation is abundant all along the VMR as was pointed out by \citet{Liseau.1992.AA.265.577}, \citet{Giannini.2007.ApJ.671.470}, and \citet{Massi.2007.AA.466.1013}. \begin{figure}[h] \begin{center} \includegraphics[angle=0.,scale=0.45]{f1.eps} \caption{ Overview of the region containing ESO-H$\alpha$~99 at optical (ESO Red) and infrared (Spitzer IRAC4) wavelengths. The features of the foreground extinction visible in the red image is uncorrelated to the PAH emission dominating the IRAC4 image, illustrating the complicated line of sight. ESO-H$\alpha$ stars are marked and numbered. ESO-H$\alpha$~99 and IRAS08370$-$4030 are the same object, with the caveat of possible beam contamination in the IRAS data. } \end{center} \end{figure} The northwestern part of the ridge is VMR-D, which is dominated by three HII regions, RCW~27, 32, and 33 \citep{Rodgers.1960.MNRAS.121.103}. All of these regions are actively forming stars, which have been studied at multiple wavelengths, e.g., by \citet[and references therein]{Strafella.2010.ApJ.719.9, Strafella.2015.ApJ.798.A104}. It appears that RCW~27 is a particularly fertile star-forming region. \citet{Pettersson.1994.AAS.104.233} carried out a large survey for H$\alpha$ emission stars towards RCW~27, 32, and 33, many of which have subsequently been identified as T~Tauri stars, e.g., by \citet{Prizinzano.2018.AA.617.A63}. One of these young emission-line stars is ESO-H$\alpha$~99, the object of this paper. ESO-H$\alpha$~99 was detected by IRAS and is the dominant flux source of IRAS~08370-4030. This star is partly embedded in the dense high-extinction cloud Sandqvist~1, which is seen against the RCW~27 HII region \citep{Sandqvist.1976.AA.53.179}. Prominent bright rims are seen in the infrared Spitzer image (Figure 1, bottom panel), which are likely excited by the OB star in RCW~27. In contrast, no bright rims are seen in the red optical image (Figure 1 top panel) suggesting that we are seeing the Sandquist~1 cloud from the un-illuminated back side. \subsection{Pre-outburst SED} Figure~2 shows the spectral energy distribution (SED) of ESO-H$\alpha$~99 based on ground-based and space-based survey data obtained from VizieR. The infrared and far-infrared data are from the compilation of catalog data by \citet[and references therein]{Abrahamyan.2015.AC.10.99A} and include data from WISE, MSX, AKARI, and IRAS. The 2MASS data are from the point source catalog \citep{Skrutskie2006}. The photographic data points (DSS) are from the guide-star catalog of \citet{Lasker.2008.AJ.136.735L}. Gaia data are from data release DR~1 and DR~2 \citep{Gaia.2016.A&A.595A.2G,Gaia.2018.A&A.616A.1G}. Other optical data are from \citet[and references therein]{Prizinzano.2018.AA.617.A63}. \edit1{ Note that the SED in Figure~2 does not include the IRAS 100 $\mu$m data point because of the low spatial resolution of that data point and likely possible contamination from neighboring far-infrared sources, the closest bright one being IRAS08367-4028. } \edit1{ The most important unsubstantiated assumption in this SED is that all the measurements refer to the quiescent state of the object. We do not have a well measured light curve of this object prior to the start of regular monitoring by Gaia and ATLAS to place any of the SED data points into the context of a light curve. It is quite possible that the substantial scatter in the flux measurements at optical wavelengths, well above the errors indicated in Figure~2, is due to variability. } The SED is a typical ``flat spectrum'' distribution \citep{Greene.1994ApJ...434..614G}. The flat part of the SED extends from the near-infrared $K$ band at 2.15 $\mu$m out to 160 $\mu$m, characterizing ESO-H$\alpha$~99 as a YSO in transition from a deeply embedded infrared object (Class I) to a moderately embedded classical T Tauri star. \edit1{At optical and near-infrared wavelengths, the SED rises steeply, indicating substantial dust obscuration in the line of sight.} The integral pre-outburst luminosity of ESO-H$\alpha$~99 from optical wavelengths to the AKARI 160 $\mu$m data point, a lower limit to the bolometric luminosity \edit1{since we do not have sub-mm data to complete the SED}, is 34 {$L_\odot$}, adopting again the distance of 1007 pc (Pettersson \& Reipurth, in preparation). \edit1{ This pre-outburst luminosity is high compared to most other T Tauri stars, which are thought to be the precursors of EXor and FUor outbursts, and instead is up in the range of some Herbig Ae/Be stars, specifically the ``group 2'', the flat-spectrum objects as defined by \citet{Hillenbrand.1992.ApJ.397.613H}. } \begin{figure}[h] \begin{center} \includegraphics[angle=0.,scale=0.45]{f2.eps} \caption{ Pre-outburst spectral energy distribution (SED) of ESO-H$\alpha$ 99 from catalog data available in the VizieR data base. Individual references are in the text. The SED longward of the $K_s$ band is remarkably flat. } \end{center} \end{figure} \section{Observations and Results} We first noted the rise in brightness of ESO-H$\alpha$~99 in data from the Asteroid Terrestial-Impact Last Alert System (ATLAS) project, and soon realized that this object had already been noted in Gaia \citep{Gaia-2016A&A...595A...1G} alert Gaia18dvz posted on 2018 Dec. 19 by the Photometric Science Alerts Team (http://gsaweb.ast.cam.ac.uk/alerts) with the description ``Candidate YSO brightens by more than 1 mag''. The Gaia unfiltered (G-band) photometry covers the years from 2015 to 2019, but has a long gap from 2016 April 27 to 2017 Nov. 2. \subsection{UKIRT Imaging} \edit1{ Deep infrared images were obtained in the $J$ and $H$ bands with the Wide-Field Camera (WFCAM) described by \citet{Casali2007} on UKIRT in March and April of 2019. The source reached $K_s\approx$~8 mag near maximum brightness, leading to saturation in the $K$-band in the shortest integration times possible with WFCAM on UKIRT. We used the saturated UKIRT $K$-band images primarily to show the reflection nebula in Figure 3. We also used UKIRT for deep imaging in the $1-0~S(1)$ filter to search for shock-excited outflow features and the one emission knot that we found is indicated in Figure~3. } \begin{figure}[h] \begin{center} \includegraphics[angle=0.,scale=0.45]{f3.eps} \caption{ UKIRT color composite of $H$, $S(1)$ and $K$-band images of ESO~H$\alpha$~99 } \end{center} \end{figure} Figure~3 shows a $H$, $S(1)$, and $K$ RGB color composite image obtained with UKIRT. The star ESO-H$\alpha$~99 is associated with a reflection nebula that outlines what appears to be the walls of an outflow cavity. Farther to the north, 72\arcsec~from the star at P.A. 14\arcdeg, a single small patch of $S(1)$ emission with vaguely indicated bow-shock shape, lying roughly on the axis of the reflection nebula, strongly suggests a shock-excited bow shock in a well-collimated outflow. This feature is clearly seen in the UKIRT $S(1)$ images and was confirmed by $S(1)$ images with lower resolution from the IRIS telescope. The emission feature is also present on Digital Sky Survey red plates, but not on B and I plates. An association of this emission feature with ESO-H$\alpha$~99 cannot be conclusively proven without proper motion data, but is strongly suggested based on its morphology and location on the symmetry axis of the reflection nebula. This shock front has now been included in the catalog of Molecular Hydrogen Objects \citep{Davis..2010A&A...511A..24D} as MHO~1520. \footnote[2] {The MHO catalog is now hosted by D. Froebrich at the University of Kent, U.K.} \edit2{ About 50$\arcsec$ to the south of ESO-H$\alpha$~99 a separate reflection nebula and some $S(1)$ emission associated with the 2MASS source 08385506$-$4042062 are visible in Figure~3. } \edit1{ 2MASS 08385506$-$4042062 } is not visible at optical wavelengths, and is fainter than ESO-H$\alpha$~99 at all wavelengths shown here, indicating relatively low luminosity. It contributes to the flux of the far-infrared source IRAS08370$-$4030 but is only a minor contribution at any wavelength. \subsection{ATLAS} Most of the optical light curve of ESO-H$\alpha$~99 is based on archival data from the ATLAS project described by \citet{Tonry.2018PASP..130f4505T}. Photometry in the ATLAS ``Orange'' ($O$) filter is shown in Figures~4 and 5. ATLAS usually takes more than one image of any given region of the sky in each suitable night to follow fast-moving asteroids. For the light curves in Figures~4 and 5, we have median-combined the individual measurements for each night when the photometric zero points and sky brightness were stable. \begin{figure*}[h] \begin{center} \includegraphics[angle=0.,scale=0.8]{f4.eps} \caption{ The lightcurve of ESO-H$\alpha$~99 based on archival ATLAS $O$ data, Gaia archival photometry, and TESS photometry. The top panel shows the full light curve from the beginning of the Gaia mission. The outburst amplitude in the ATLAS $O$ band from the pre-outburst typical magnitude ($O$ $\approx$ 19.1 ) to the maximum of $O$ = 14.69 mag is indicated by an arrow. The middle panel shows the outburst light curve with better resolution. The green arrows indicate the times and light curve points when the two optical spectra (Figures 4 and 7) were obtained. The lower panel shows the TESS photometry calibrated against four coinciding ATLAS data points. } \end{center} \end{figure*} \begin{figure*}[h] \begin{center} \includegraphics[angle=0.,scale=0.65]{f5.eps} \caption{ The lightcurve of ESO-H$\alpha$~99 at and after the maximum. based on archival ATLAS $C$ and $O$ data, Gaia archival photometry, and post discovery optical and infrared photometry from BMT, IRIS, and UKIRT described in more detail in the text. The left-pointing arrows indicate the pre-outburst magnitudes from the 2MASS point source catalog. The green arrows indicate the times and light curve points when the two optical spectra (Figures 7 and 8) were obtained. As in Figure 4, orange circles are ATLAS $O$ magnitudes, and red circles are Gaia G magnitudes. } \end{center} \end{figure*} \subsection{TESS Photometry} During its Cycle 1 Sector 8 observations, the Transiting Exoplanet Survey Satellite (TESS) described by \citet{Ricker.2015.JATIS.1a4003R} observed the ESO-H$\alpha$~99 outburst from 2019-Feb-02 to 2019-Feb-28 with Camera 3. We have reduced these observations using an image subtraction pipeline optimized for TESS Full-Frame Images. This pipeline has previously been applied successfully to TESS observations of supernovae \citep{Vallely.2019.MNRAS.1385V, Fausnaugh.2019.arXiv190402171F} and of the tidal disruption event ASASSN-19bt \citep{Holoien.2019.arXiv190409293H}. Because the reference image was constructed from images containing a considerable amount of flux from the EXor, fluxes in the raw difference light curve are systematically lower than their intrinsic values. We correct for this discrepancy by scaling and shifting the differential flux levels to match four ATLAS photometry points obtained concurrently with the TESS observations. The TESS photometry, as well as these ATLAS observations, are shown in the lower panel of Figure 4. It covered the second interim minimum in the rise of ESO-H$\alpha$~99 to preliminary brightness maximum. \subsection{IRIS, BMT and UKIRT} We obtained $J$, $H$, and $K_s$ band imaging photometry of ESO-H$\alpha$~99 with the IRIS 0.8m telescope \citep{Hodapp2010} and 1024$\times$1024 2.5~$\mu$m IRIS infrared camera of the Universit\"atssternwarte Bochum on Cerro Armazones, Chile. In addition to the monitoring with IRIS, we have also obtained deeper images with better spatial resolution were obtained in the $J$ and $H$ bands with the Wide-Field Camera (WFCAM) as described above. The WFCAM filters conform to the ``MKO'' standard described by \citet{Tokunaga2002} and further characterized in \citet{Tokunaga..MKO.filters..2005PASP..117..421T}. Both the UKIRT and IRIS data were calibrated against the 2MASS point source catalog \citep{Skrutskie2006} by the Cambridge Astronomical Survey Unit (CASU) using the procedures described by \citet{Hodgkin.2009.MNRAS.394.675H}. The source reached $K_s\approx$~8 mag near maximum brightness, leading to saturation in the $K$-band in the shortest integration times possible with WFCAM on UKIRT. In $J$ and $H$, both the UKIRT and IRIS photometry were used, while the $K_s$-band photometry is only based on IRIS data. The infrared photometry is shown as light curves in Figure~5 and is the basis for the color-color diagram in Figure~6 \edit2{ Infrared photometry only started in March of 2019 after the optical outburst had been noted by ATLAS. The $J$, $H$, and $K_s$ light curve essentially started at the maximum brightness and shows one interim minimum. The total outburst amplitude in the infrared can only be determined in comparison with the DENIS \citep{Epchtein.1997.Msngr.87.27E} and 2MASS \citep{Skrutskie2006} catalog values: DENIS gives the following magnitudes: $I$=15.938, $J$=13.063, $K_s$=9.681 obtained on JD 2450099.72 and $I$=15.810, $J$=13.028, $K_s$=9.581 obtained on JD 2451207.69 while 2MASS gives $J$=13.099, $H$=11.085, and $K_s$=9.414 obtained on JD 2451236.55 The USNOA2.0 red photographic magnitude is 16.40 \citep{Monet.1998.USNOA2.0}, consistent with our pre-outburst brightness in the ATLAS $O$ filter. The DENIS and 2MASS near-infrared pre-outburst magnitudes are consistent with each other, and the two DENIS measurements are consistent over an interval of 1108 days, so we assume that all these measurements represent the quiescent state of ESO-H$\alpha$ 99. In Figure~5 the -- presumably quiescent -- 2MASS catalog magnitudes, whose filter bandpasses match the IRIS photometry, are indicated by left-pointing arrows. } We have also obtained $V$-band photometry with the 40cm Bochum Monitoring Telescope (BMT) on Cerro Armazones \citep{Ramolla.2013.AN.334.1115R}, where the object remained observable longer than from Hawaii. The photometry was calibrated against a set of in-field non-variable stars from the APASS all-sky catalog \citep{Munari.APASS.2014AJ....148...81M} and is included as green triangle symbols in Figure~4. \subsection{IRTF Infrared and Faulkes Telescope Optical Spectroscopy} Finally, on 2019 March 16, UT, we obtained a near-infrared spectrum of ESO-H$\alpha$~99 using the NASA Infrared Telescope Facility (IRTF) with the SPEX instrument \citep{Rayner.2003.PASP.115.362} in short cross-dispersed (SXD) mode with a 0\farcs3 slit, giving a spectral resolution of R=2000. Low-resolution optical spectra of ESO-H$\alpha$~99 were obtained with the Faulkes Telescope North on Haleakala, Maui, on 2019 March 17 (UT) and 2019 April 5 (UT) using a slit width of 1\farcs6 and 30\arcsec~slit length of the FLOYDS spectrograph. This resulted in a FWHM of the [\ion{O}{1}] night sky lines of 14~{\AA} and a spectral resolution of R = 425 at the wavelength of the \ion{Na}{1} doublet. The optical and infrared spectra from March 17 and 16 (UTC), respectively, were merged into Figure~7. It turned out that these spectra were obtained close to the maximum brightness reached by ESO-H$\alpha$~99 during this outburst. The spectrum \edit2{near maximum brightness} in Figure 7, combining optical data from the Faulkes telescope and near-infrared data from the IRTF/SPEX, \edit2{ shows prominent \ion{H}{1}, \ion{He}{1}, \ion{Ca}{2}, and CO bandhead emission, the only noticeable exception being \ion{Na}{1} D line in absorption. Note, however, that \ion{Na}{1} is in emission in the near-infrared. Besides the emission lines, a continuum is present, but at the spectral resolution of our data, we cannot detect absorption lines that could be used for spectral classification. The H$_2$ 1--0 S(1) line is weakly detected in emission at the position of the star itself, indicating shock-excitation of H$_2$ near the star. } \subsection{The pre-outburst spectrum} As part of a spectroscopic survey of the brighter stars of the sample of H$\alpha$ emission line stars in the VMR-D region of \citet{Pettersson.1994.AAS.104.233} a spectrum of ESO-H$\alpha$~99 was obtained on February 22, 1993 at the ESO 3.6m telescope with the OPTOPUS multi-object spectrograph and an exposure time of 2 $\times$ 30 min. The original data are no longer available, but a plot of the spectrum is. For the analysis in this paper, we have digitized this plot. Although we do not know the photometric brightness of the star at the time this spectrum was taken, absent any indication of a prior outburst at that time, we assume that the spectrum represents the quiescent state. \edit1{ The pre-outburst spectrum is the one shown in red in the comparison of spectra in Figure~8. } \section {Discussion} \edit1{ Our goal is to compare the newly discovered and on-going outburst of ESO-H$\alpha$~99 to well-studied cases and to place it into the context of the ensemble of eruptive events in young stars. In our discussion, we will use the term ``EXor'' in the broadest sense describing a young eruptive variable with an emission-line spectrum. Our use of that term is not intended to imply a close similarity of the newly discovered object with specifically the prototype EX Lupi. } \subsection{Classification of Outburst} The observed outburst amplitude is strongly wavelength dependent, being much larger at optical wavelengths than in the near-infrared. The optical light curve in the ATLAS $O$ filter of ESO-H$\alpha$~99 (Figure~4) shows a rise of about 4.4 magnitudes from the quiescent brightness \edit2{($\approx$ 19.1 mag)} up to the maximum of brightness observed until now \edit2{($O$ = 14.69 mag)}. Just prior to the rise, around MJD 58185, both the ATLAS and Gaia data indicate a brief ($\approx$30 day) dip in brightness of about 1.3 mag in ATLAS $O$ \edit2{below the quiescent brightness}. The immediately following rise in brightness to the maximum is not steady, rather, the ATLAS data show three \edit1{interim} minima superposed on the overall \edit1{rise of the} outburst light curve. As we will discuss below in the context of the spectroscopy, at least one of these interim minima in ESO-H$\alpha$~99 is associated with spectral changes. We can exclude that these are merely caused by extinction variations. \edit2{ The few sparse Gaia data obtained after ESO-H$\alpha$~99 became observable again in July of 2019 show variations of about 0.5 mag again, similar to the interim minima observed earlier with both Gaia and ATLAS data. We conclude that the semi-periodic fluctuations with typical periods of about one month are continuing now superposed on a fairly stable plateau near maximum brightness. } \edit2{ Quasi-periodicity on the order of one month as observed in ESO-H$\alpha$~99 superposed on the outburst is too long for the expected rotational period of a still rapidly rotating young star and the magnetically coupled accretion flows, but must be related to regions of the rotating disk farther away from the star. } \edit1{ Similar, though shorter period fluctuation superposed on the years-long outburst have been observed by \citet{SiciliaAguilar.2017.AA.607A.127S.ASASSN13db} in ASASSN 13db and interpreted as rotational modulation of starspots that are coming and fading on timescales of months. } About 2 years before the 2019 major outburst, the ATLAS data indicate a minor maximum around MJD 57800 (2017 Feb. 16) The coverage of this prior maximum by ATLAS is poor, \edit1{ and there are no confirming Gaia measurements.} We can only state that this maximum has lasted for at least a few months, and that the amplitude above the quiescent brightness was about 2.5 mag in ATLAS $O$ filter, substantially less than the present maximum. Despite the limitations of the available data, \edit1{we note that} this smaller prior maximum is entirely consistent with the characteristics of other EXors, as was reviewed in the Section 1, and in particular appears similar to the sporadic outbursts of the prototypical EX Lupi \citep{McLaughlin.1946.AJ.52.109M, Herbig.2001.PASP.113.1547H, Herbig.2007.AJ.133.2679H}, where \citet{2010ApJ...719L..50A} distinguish ``characteristic'' and ``extreme'' outbursts. In this terminology, the present 2019 outburst of ESO-H$\alpha$~99 \edit1{ qualifies as an ``extreme'' outburst, while the smaller 2017 outburst would be ``characteristic''.} \subsection{Accretion Instability on Timescales of Days} The outburst of ESO-H$\alpha$ 99 was fortuitously observed by TESS. The data come from the Full Frame Images and give photometry on a 30 min cadence. The resulting finely resolved light curve during the 28 days of observations is shown in the lower panel of Figure~4. The TESS observations covered the second of the three minor \edit1{($\approx$ month-long)} interim minima superposed on the overall rise to maximum brightness. The TESS light curve shows multiple local maxima and minima with typical rise and fall time of order of one day. A period analysis using the Lomb-Scargle algorithm developed by \citet{Lomb1976} and \citet{Scargle1982}, and implemented in the Period Analysis Software (PERANSO) written by T. Vanmunster did not find any strict periodicity of these short term variations, rather, there is significant power in periods ranging from 2 to 10 days, after ``whitening'' out the power associated with the overall minor minimum. These variations on timescales of several days on top of the longer term features of the light curve are similar to the variations during quiescence found by \citet{Cody.2017.ApJ.836.41C} using K2 data for YSOs with less substantial disks and ``bursts`` (rather than major ``outbursts'') of order of tens of percent in flux relative to the quiescent, low accretion state. Variability of FU Ori during its on-going outburst was studied by \citet{Siwak.2013.MNRAS.432.194S.FU.Ori, Siwak.2018.AA.618A.79S.FU.Ori} and attributed to a small number of unstable accretion ''tongues'' (referred to as ``funnels'' here) and their associated hotspots, revolving around the star. \edit2{ Stable accretion funnels and stationary hotspots would lead to rotationally modulated periodic variability on timescales of the rotation of the star, i.e., of order of a few days. This is not what we observe, however. The short term variations observed by TESS cannot be described as quasi-perodic. At best, they indicate that ``every few days, something changes''. This is best understood if we assume that we observe several active accretion funnels at any given time and their varying accretion rates, coupled with some rotational modulation of this complex scenery. } \subsection{Near-Infrared Colors and SED} Figure~6 shows the near-infrared $J-H/H-K$ color-color diagram of ESO-H$\alpha$ 99 in both quiescence and outburst. We included similar objects observed by \citet{Lorenzetti.2012.ApJ.749.188} and V2492 Cyg, studied in detail by \citet{Aspin.2011.AJ.141..196A} for comparison, as it is the most reddened EXor known to date. \begin{figure}[h] \begin{center} \includegraphics[angle=0.,scale=0.65]{f6.eps} \caption{ Color-Color diagram ($J-H$ vs. $H-K_s$) of ESO-H$\alpha$~99 in quiescence and outburst (orange symbols). Larger symbols represent the bright state of the EXor. For comparison we have included the same known EXors as used in \citet{Herbig.2008.AJ.135.637H}. We have added additional data on V1647 from \citet[and references therein]{Aspin.2011.AJ.142.135A} and data on V1118 Ori from \citet{Giannini.2017.ApJ.839.112}. The blue filled circles represent the locus of unreddenend class III stars from \citet{Wegner.2014.AcA.64.261W} and the dashed line represents the reddening vector due to interstellar extinction based on the data by \citet{Straizys.2008.BaltA.17.125}. } \end{center} \end{figure} Figure 6 shows that ESO-H$\alpha$ 99 shares the colors of the other two deeply embedded EXor objects, V1647 Ori and V2492 Cyg, and shows similar color changes from the quiescent state to the outburst maximum. \edit1{ In general, all EXors get ``bluer'' during outburst and the color-color path from quiescent to outburst location is roughly parallel to the interstellar reddening vector, if anything slightly less steep. While the color changes are therefore consistent with a clearing of obscuring material during outburst, this is certainly not the only mechanism at work in ESO-H$\alpha$~99 since we are also seeing major changes in the line ratios in the spectrum. Those spectral changes cannot be explained simply by a varying amount of line-of-sight extinction. Some contribution from changing extinction, possibly caused by irregularities in the inner disk orbiting in and out of the line of sight is quite possible, but cannot be confirmed with the available data. } We have compared the pre-outburst spectral energy distribution of ESO-H$\alpha$~99 (Figure~2) with the SEDs of other EXors and FUors using the VizieR database and its Photometry Viewer. This database is readily available, so we do not show all SEDs here. The wavelength coverage of those SEDs is quite heterogeneous, so we will not discuss the similarities and differences quantitatively. The SEDs of most classical, \edit1{i.e., low extinction} EXors, some of which are included in the near-infrared color-color diagram in Figure~6 and occupy the low-color-value area of this diagram, have the peak of their SED at near-infrared wavelengths, and decline from there to the long-wavelength limit of the available data. Only the deeply embedded EXors show flat or nearly flat SEDs: NY Ori is flat from 1 to 20 $\mu$m, but has no data beyond that. Deeply embedded, very red EXors such as V2492 Cyg, PV Cep, and V1647 Ori have essentially flat SEDs out to 100 $\mu$m. The SED of ESO-H$\alpha$~99 is very similar to those three deeply embedded flat SED EXors. This flat 10 - 100 $\mu$m SED also puts ESO-H$\alpha$~99 in the same SED class as OO~Ser, the "deeply embedded outburst star" \citep{1996ApJ...468..861H} that falls outside of the classical FUor vs. EXor classification scheme. We also note that the classical FUors FU Ori and V1057 Cyg have SED peaks at near-infrared wavelengths. The FUor V2775 Ori, however, \citep{Fischer.2012.ApJ.756.99F} has a flat SED similar to the one discussed here. Deeply embedded FUor-like objects, i.e., objects spectroscopically similar to a FUor but no historically observed outburst, such as L1551 IRS5, have SEDs rising throughout the 10 - 100 $\mu$m range. While EX Lupi, the prototypical EXor, is not associated with much nebulosity and is not deeply embedded, ESO-H$\alpha$ 99 is highly reddened and is associated with a reflection nebula with a bubble-like morphology, probably light scattered off the walls of an outflow cavity. Both its red colors and the presence of a reflection nebula support the fact that ESO-H$\alpha$~99 is a very young object, still deeply embedded in its parent molecular cloud, and surrounded by a substantial gas and dust disk. We have found one small region of shock-excited $H_2~1-0~S(1)$ emission with indication of a bow-shock morphology near the symmetry axis of the reflection nebula, strongly suggesting that this feature is the result of a highly collimated outflow from ESO-H$\alpha$ 99. Such highly collimated outflows are frequently found in YSOs, but are not typical of EXors or FUors. We interpret this as additional evidence that ESO-H$\alpha$~99 is, within the \edit1{broad} EXor class of outbursts, one of the youngest of this class of objects. \begin{figure*}[ht!] \begin{center} \includegraphics[angle=0.,scale=0.50]{f7.eps} \caption{ The IRTF/SPEX spectrum from 2019/3/16 UT combined with the optical spectrum (green) taken on 2019/3/17 UT with the FLOYDS spectrograph on the Faulkes Telescope North on Haleakala. The optical spectrum has not been corrected for telluric absorption, while the infrared spectrum has. The spectrum shows strong emission lines, indicating that the outburst is broadly an EXor type. } \end{center} \end{figure*} \subsection{Spectral Changes During Outburst} We compare low-resolution optical spectra of ESO-H$\alpha$~99 at three epochs: the pre-outburst spectrum from 1993 Feb. 22, presumably during a quiescent phase, the spectrum taken very close to the maximum of the current outburst on 2019 March 17 \edit2{shown in Figure 7}, and the spectrum taken on 2019 April 5 when the ATLAS $O$ magnitude was 0.8 mag lower than at the maximum. \edit1{ We do not have coincident photometry for the pre-outburst spectrum from 1993 Feb. 22. From Figure 4 it is clear that ESO-H$\alpha$~99 had shown some variability prior to the present outburst. On the other hand, none of the pre-outburst data (POSS, 2MASS etc.) give any indication of a prior large outburst. Our measured quiescent pre-outburst brightness in the ATLAS ``Orange'' filter is about $O$ = 19.1 mag } \edit2{ We therefore make the assumption that at the time of the 1993 spectrum, the brightness was $O$ $\approx$ 19 mag. } \edit1{ For the two epochs in 2019, we have closely coincident ATLAS ``Orange'' filter photometry. For 2019 03 17, ATLAS obtained photometry in the same night, about 1.25 hours after the spectrum. For the 2019 04 05 spectrum, the closests ATLAS photometry is from the following night, 25.7 hours after the spectrum. } The epochs of the recent spectra are indicated by blue arrows in Figures 4 and 5 and place those spectra in context of the light curve. Of the two 2019 optical spectra, the first was obtained near the maximum of the observed light curve during this ongoing outburst, and the second in the following minor interim minimum in the light curve, after which the object brightened again. \edit1{ In the middle panel of Figure 4 and in Figure 5, the brightness maximum at the time of the first spectrum and the interim minimum on 2019 April 5 are documented by ATLAS $O$, and infrared $J$, $H$, and $K$ photometry. } \edit1{ Table 1 lists the dates, ATLAS $O$ magnitudes, and the equivalent width of four spectral lines, both permitted and forbidden. } \begin{deluxetable}{lrrr} \tabletypesize{\scriptsize} \tablecaption{Optical Spectroscopy} \tablewidth{0pt} \tablehead{ \colhead{ } & \colhead{1993 02 22} & \colhead{2019 03 17} & \colhead{2019 04 05} } \startdata Magnitude ($O$) & $\sim$ 19 & 14.76 & 15.55\\ Rel. Flux & 0.02 & 1.00 & 0.48\\ Color in Fig. 8 & red & blue & green\\ $[$\ion{O}{1}$]$ 6300 EW [\AA] & -29.3 & -2.2 & -4.7 \\ $[$\ion{O}{1}$]$ 6364 EW [\AA] & -11.5 & low S/N & -1.4 \\ \ion{H}{1} 6563 EW [\AA] & -75.1 & -36.5 & -58.9\\ $[$\ion{S}{2}$]$ 6716+6731 EW [\AA] & -19.4 & -0.9 & -1.8 \\ \ion{Ca}{2} 8498 EW [\AA] & no data & -35.0 & -47.7\\ \ion{Ca}{2} 8542 EW [\AA] & no data & -37.2 & -52.2\\ \ion{Ca}{2} 8662 EW [\AA] & no data & -41.9 & -54.0\\ \enddata \end{deluxetable} For now, we can leave the question open whether March 17 marked the overall maximum on the current outburst, or whether it is merely a preliminary interim maximum. \edit1{After it reemerged from behind the Sun in August 2019, we have obtained a few new Gaia data points indicating that ESO-H$\alpha$ 99 has experienced another high point near the magnitude of the March 2019 maximum and is otherwise staying within a magnitude of the maximum brightness with some variations. } The important point is that changes in \edit1{broadband photometry} are associated with changes in the \edit1{emission line} spectrum. The early 1993 optical spectrum of ESO-H$\alpha$~99 offers some insight into what we assume is the quiescent state of the star: First, the 26-year old spectrum shows the forbidden lines of [\ion{O}{1}] at 6300 and 6363~{\AA}~and \edit2{blended} [\ion{S}{2}] 6716/6731~{\AA}, which together with strong H$\alpha$ emission are characteristic of Herbig-Haro shocks. The molecular hydrogen shock front MHO~1520 approximately along the line defined by the outflow cavity associated with ESO-H$\alpha$~99 (Figure~3) shows that outflow activity must have occurred in the more distant past, certainly prior to the present outburst. Second, a forest of permitted \ion{Fe}{2} and forbidden [\ion{Fe}{2}] lines is seen in the 5000-5500~{\AA} region. These lines are only seen in the most active T~Tauri stars \citep{Herbig.1962.AdA&A.1.47H}, and the spectrum shows a strong semblance to that of the HH~32 driving source AS~353A \citep{Eisloeffel.1990.A&A.237.369E} and the HH~46/47 driving source \citep{Reipurth.1991.AA.246.511}. Third, the \ion{Na}{1} doublet at $\lambda$5890/5896~{\AA} is in absorption, fairly weak and unresolved in the 1993 spectrum as well as in the 2019 spectra. The \ion{Na}{1} absorption blends with the \ion{He}{1} line at 5876~{\AA}. Helium emission lines have been observed in several other EXors, e.g., NY Ori, V1118 Ori, and V350 Ori by \citet{Herbig.2008.AJ.135.637H}. \edit1{ Altogether, the 1993 \edit1{quiescent} spectrum is indicative of a highly active, strongly accreting YSO star that is driving a shocked outflow. } \begin{figure}[ht!] \begin{center} \includegraphics[angle=0.,scale=0.45]{f8.eps} \caption{ A comparison of \edit2{the optical} spectra at three epochs: pre-outburst (1993 Feb. 22, red), maximum brightness (2019 March 17, blue), and declining phase (2019 April 5, green). The spectra are shown qualitatively in the sequence of increasing integrated flux, but are scaled for clarity and not in proportion to the integrated flux. Table 1 gives dates, photometric magnitudes and relative flux for the three spectra. The timing of the two recent spectra relative to the light curve is indicated by green arrows in Figures 4 and 5. } \end{center} \end{figure} \edit1{ During the present outburst, the spectrum has changed substantially. } Referring to Table I, the equivalent width of \edit1{ all the emission lines was much higher in quiescence (1993) than during the outburst. } H$\alpha$ line was much higher ($\sim$75~{\AA}) than in the 2019 March 17 spectrum ($\sim$37~{\AA}). On 2019 April 5, \edit1{at a time when the broadband integrated flux was only about one half of that at maximum, } the spectrum has an H$\alpha$ equivalent width between those two extreme points: EW $\sim$62~{\AA}. The spectral changes observed between those two \edit2{2019} spectra clearly indicate that this interim minimum was not just caused by changing amounts of obscuring dust in the line of sight, which should not affect the equivalent width of H$\alpha$. Rather, the photometric and spectral variations show real changes in the components of the accretion flow: inner disk, accretion funnels, and possibly a surface hot spot on the star. \edit1{ Comparing the change of H$\alpha$ equivalent width to the change in broadband flux in Table 1, it is clear that the flux of the H$\alpha$ line does increase with increasing brightness, but that the continuum rises disproportionately more strongly, so that the equivalent width is reduced by about a factor of two between quiescence and the brightness maximum. Similarly, for the two recent epochs that we have a measured brightness for, the H$\alpha$ equivalent width increases by a factor of 1.6 during a decline on a factor 0.48 in broadband brightness, showing again that the continuum changes disproportionally more than the H$\alpha$ line flux. } \edit2{ The disproportionate rise of the continuum is even more pronounced for the forbidden lines, } \edit1{ the brighest of which is [\ion{O}{1}] at 6300~{\AA}. From quiescence to the maximum, a factor of $\approx$ 50 in broadband flux, the equivalent width is reduced by a factor of $\approx$ 13. So while the line flux in [\ion{O}{1}] 6300~{\AA} does increase somewhat during maximum, the broadband flux increases 13 times more, showing that during maximum, the conditions are less favorable for the emission of forbidden lines, probably because of higher densities in the emitting regions. } \edit2{ Given the uncertainty of our assumption for the pre-outburst brightness when the 1993 Feb. 22 spectrum was taken, the ESO-H$\alpha$ 99 spectral evolution is consistent with the flux in those forbidden lines being unchanged during the outburst, and simply being diluted by increased continuum or that line flux increasing by much less than the continuum. } \edit1{ Comparing just the 2019 March 17 (maximum) and 2019 April 05 (post maximum) equivalent widths of [\ion{O}{1}]6300~{\AA} and the blended [\ion{S}{2}] lines, we clearly note that the equivalent width changes inversely proportional to the broadband flux, i.e., the absolute line flux stays constant. The accretion sensitive \citep{Muzerolle.1998.AJ.116.455M} permitted CaII triplet lines show an increase of a factor 1.3 during the decline by a factor of 0.48, meaning that the absolute line flux has diminished, but not proportional to the continuum flux. } \edit2{ We are now comparing the spectral evolution of ESO-H$\alpha$~99 with several other EXor objects and one higher luminosity eruptive variable. } \edit1{ The optical spectrum of ESO-H$\alpha$~99 and its changes during the outburst are quite different from those observed in the 2008 outburst of the prototypical EX Lupi. \citet{ Kospal.2008.IBVS.5819.1K, SiciliaAguilar.2012AA.544A.93S.EXLupi, SiciliaAguilar.2015AA.580A.82S.EXLupi} observed a } \edit2{ very rich emission line spectrum, compared to other T Tauri stars, and } a substantial increase in the number of metal emission lines during outburst, more than most other EXor-type outbursts, but note the absence of forbidden lines. \edit2{ As a caveat to the latter statement, in high resolution spectra, emission of [\ion{O}{1}] was detected in EX Lupi by \citet{2019ApJ...870...76B} both in quiescence and, more strongly, during the 2008 outburst. } Similary, \citet{Holoien.2014.ApJ.785L.35H.ASASSN13db} observed in the case of the 2013 EXor eruption of ASASSN13db that ``during the outburst, the spectra are dominated by a forest of emission lines, mostly neutral metallic lines from \ion{Fe}{1}''. The longer duration 2014-2017 outburst of this object was studied by \citet{SiciliaAguilar.2017.AA.607A.127S.ASASSN13db} and they note again the similarity of the outburst spectrum to that of EX Lupi. \edit2{ The spectral changes in these two objects are clearly different } \edit1{ from the eruption of ESO-H$\alpha$ 99 where we observe a reduction in the prominence of the \ion{Fe}{1} line forest, and a substantial reduction in the equivalent width, i.e. the importance relative to the continuum, for the forbidden lines of [\ion{O}{1}] and [\ion{S}{2}]. } \edit2{ In contrast, } \edit1{ the evolution of the spectral lines during the outburst of ESO-H$\alpha$ 99 has more similarities to the higher luminosity case PV Cep. \citet{Kun.2011.MNRAS.413.2689K} found nearly constant flux, i.e. strongly increasing equivalent widths, in forbidden lines during the fading. However, they also noted little change in the equivalent width of H$\alpha$ in the fading phase different from what we observe in ESO-H$\alpha$ 99. } \edit2{ We conclude that during the ESO-H$\alpha$ 99 outburst, its spectrum has changed substantially. The H$\alpha$ line changes less than the continuum during the outburst, and the forbidden [\ion{O}{1}] and [\ion{S}{2}] lines change substantially less that the continuum, and are, in fact, consistent with these forbidden line fluxes being constant}. \edit2{ We conclude that in ESO-H$\alpha$ 99, the region emitting the forbidden lines may not be affected at all by the processes leading to the continuum outburst. The increase in the optical and near-infrared continuum is qualitatively similar to the appearance of a strong continuum during FUor outbursts. We speculate that in in ESO-H$\alpha$ 99, the rise in the continuum is less than in typical FUor outbursts, leaving the most prominent emission lines observable. } \section{Summary and Conclusions} The optical (ATLAS $O$) light curve of ESO-H$\alpha$~99 shows a rise of about 4.4 magnitudes from the pre-outburst average. We also have indications for a previous small maximum of 2.5 mag amplitude in 2016, and for a brief dip in brightness by 1.3 mag just prior to the rise to the present maximum. The high-cadence TESS light curve during a minor interim dip in brightness just prior to reaching maximum light shows fluctuations of order 10\% in flux and typical durations of a few days, but without clear periodicity. ESO-H$\alpha$~99 is associated with an optical and near-infrared reflection nebula. There is one knot of line emission (MHO 1520) found in the H$_2~1-0~S(1)$ emission line, but also indicated in the optical R band. This is most likely a Herbig-Haro object associated with collimated outflow activity. \edit1{ The H$_2$ 1--0 S(1) emission line is also seen at the position of the star. } \edit2{ ESO-H$\alpha$~99 shares the NIR colors and mid-to-far IR SED of the most deeply embedded EXors. ESO-H$\alpha$~99 is a YSO of fairly high quiescent luminosity (34 {$L_\odot$}), much higher than typical EXors, and may be an intermediate mass star. } Two spectra during the present outburst shows many emission lines, in particular H$\alpha$, \ion{Ca}{2}, and CO bandhead emission, making ESO-H$\alpha$~99 spectroscopically \edit1{similar} to other \edit1{deeply embedded} EXor outburst. Comparison with a pre-outburst spectrum from 1993 shows, however, that several emission lines that had been present during quiescence are partly diluted by continuum emission. The H$\alpha$ equivalent width is largest in quiescence, smallest near the light curve maximum and intermediate a few weeks after the maximum. The rise in overall brightness during this EXor event is largely due to the disproportionate rise of the continuum compared to the emission lines. \edit1{ This effect is particularly strong for the forbidden [\ion{O}{1}] and [\ion{S}{2}] lines.} If the light curve does indeed show the typical evolution of an EXor, the next observing season in late 2019 may show the decline of brightness back to the pre-outburst level. \acknowledgments This work has made use of data from the European Space Agency (ESA) mission {\it Gaia} \footnote[3]{\url{https://www.cosmos.esa.int/gaia}} and processed by the {\it Gaia} Data Processing and Analysis Consortium (DPAC, \footnote[4]{\url{https://www.cosmos.esa.int/web/gaia/dpac/consortium}}. Funding for the DPAC has been provided by national institutions, in particular the institutions participating in the {\it Gaia} Multilateral Agreement. ATLAS observations and this work were supported by NASA grant NN12AR55G. The AAVSO Photometric All-Sky Survey (APASS) was funded by the Robert Martin Ayers Sciences Fund. Infrared photometric data on ESO-H$\alpha$~99 were obtained at the IRIS telescope of the Universit\"atssternwarte Bochum on Cerro Armazones, which is operated under a cooperative agreement between the "Astronomisches Institut, Ruhr Universit\"at Bochum", Germany and the Institute for Astronomy, University of Hawaii, USA. Construction of the IRIS infrared camera was supported by the National Science Foundation under grant AST07-04954. This work makes use of observations from the LCOGT network. \edit1{ This paper uses data collected under the ESO/RUB – USB agreement at the Paranal Observatory. } This paper includes data collected by the TESS mission. Funding for the TESS mission is provided by the NASA Explorer Program. This work is based in part on archival data obtained with the Spitzer Space Telescope, which is operated by the Jet Propulsion Laboratory, California Institute of Technology under a contract with NASA, and on archival data from AKARI, a JAXA project with the participation of ESA. The infrared spectrum was obtained with the SPEX instrument at the Infrared Telescope Facility, which is operated by the University of Hawaii under contract NNH14CK55B with the National Aeronautics and Space Administration. Near-infrared imaging data from the WFCAM at the UKIRT observatory operated by the University of Hawaii were used in this paper. PJV is supported by the National Science Foundation Graduate Research Fellowship Program Under Grant No. DGE-1343012. \edit1{ CSK is supported by NSF grants AST-1515876, AST-1515927 and AST-181440. This work made use of the ADS, Simbad, and VieziR. We wish to thank the referee for constructive comments that helped improve this paper. } \vspace{5mm} \facilities{ATLAS, FTN, Gaia, OCA:IRIS, IRTF, TESS, UKIRT}
\section{Introduction} With increasing urbanization, traffic congestion is a significant and costly problem \cite{guerrini2014traffic,mcnew2014}. While early works proposed to optimize traffic light controllers based on expert knowledge and traditional model-based planning \cite{porche1999adaptive,gershenson2004self,cools2013self}, there are promising recent results on applying flexible model-free methods in reinforcement learning (RL) \cite{sutton2018reinforcement} and deep RL, such as DQN in particular \cite{mnih2015human}, to find optimal policies for traffic light controllers that dynamically respond to real-time traffic conditions \cite{abdulhai2003reinforcement,genders2016using,li2016traffic,wei2018intellilight}. These works model a single traffic light as a Markov decision process (MDP) equipped with a discrete action space (e.g. signal phase change) and a continuous state space (e.g. vehicle waiting time, queue length), and train a policy to optimize the expected return of an expert-designed reward function. However, the single-agent RL perspective on traffic control optimization fails to account for the fundamental issue that optimizing global traffic flow over a densely connected road network is a cooperative multi-agent problem, where independently-learning agents face difficulty in finding global optimal solutions. For example, if an intersection with low vehicle density in the North-South direction selfishly lets East-West traffic flow with little interruption to maximize its own performance, it will cause severe issues for any adjacent intersection that has heavy North-South traffic. Instead, all traffic light agents must act cooperatively to optimize the global traffic condition while optimizing their own individual reward based on local observations. On the other hand, existing work that adopt the multi-agent perspective on traffic signal optimization either fall back to independent learning \cite{liu2017cooperative} or resort to centralized optimization of coordinated agents \cite{arel2010reinforcement,van2016coordinated}. Independent learners \cite{tan1993multi} only optimize their own reward based on local observations, cannot optimize for global criteria (e.g., different priorities for different intersections), and they face a nonstationary environment due to other learning agents, which violates stationarity assumptions of RL algorithms. While centralized training can leverage global information, it requires maximization over a combinatorially-large joint action space and hence is difficult to scale. Motivated by these challenges, our paper focuses on deep multi-agent reinforcement learning (MARL) for traffic signal control with the following specific contributions: \begin{figure}[t] \centering \includegraphics[scale=0.7]{method/MATL_architecture.pdf} \caption[one figure.]{QCOMBO architecture combining independent learning of $Q^n(o^n,a^n)$ with centralized training of $Q(s,\abf)$ via a novel consistency loss $L(Q,\lbrace Q^n \rbrace_n)$} \label{Fig:QCOMBO} \end{figure} \textbf{1. Novel objective function combining independent and centralized training.} We propose QCOMBO, a Q-learning based method with a new objective function that combines the benefits of both independent and centralized learning (\Cref{Fig:QCOMBO}). The key insight is to learn a global action-value function using the global reward, employ agent-specific observations and local rewards for fast independent learning of local utility functions, and enforce consistency between local and global functions via a novel regularizer. Global information shapes the learning of local utility functions that are used for efficient action selection. \textbf{2. Evaluation of state-of-the-art MARL algorithms on traffic signal optimization.} Recent cooperative MARL algorithms specifically tackle the case when all agents share a single global reward \cite{foerster2018counterfactual,sunehag2017value,rashid2018a}. However, as these methods were not designed for settings with individual rewards, it is open as to whether their performance can be surpassed by leveraging such agent-specific information. While they have shown promise on video game tasks, to the best of our knowledge they have not been tested on the important real-world problem of optimizing traffic signal over a network. Hence we conducted extensive experiments comparing our algorithm versus independent Q-learning (IQL), independent actor-critic (IAC), COMA \cite{foerster2018counterfactual}, VDN \cite{sunehag2017value} and QMIX \cite{rashid2018a} on a variety of road networks with varying traffic conditions. \textbf{3. Generalizability of traffic light control policies.} To the best of our knowledge, we conduct the first investigation on the generalizability and transferability of deep MARL policies for traffic signal control. Reinforcement learning methods are especially suitable for dynamic traffic light control since the transfer of a policy learned in simulation to real-world execution is arguably more feasible than in other domains (e.g. robotics). Similar to domains where deep RL excels \cite{mnih2015human}, each traffic light has a small set of discrete actions for a signal phase change, which poses negligible issues for sim-to-real transfer. Given improvements in sensor technology, measurements of traffic conditions can be increasingly accurate and real-world measurements can approach ideal simulated data. Powerful model-free RL methods also do not require an accurate transition model that predicts traffic flow. Hence, there is strong motivation to investigate whether a decentralized policy trained with simulated traffic approximating real-world conditions can be transferred to larger networks and different traffic conditions without loss of performance. \section{Related Work} Early work demonstrated the application of RL to single traffic light control \cite{abdulhai2003reinforcement}. The success of deep RL has spurred recent works that incorporate high dimensional state information into a more realistic problem definition \cite{genders2016using,mousavi2017traffic,wei2018intellilight,liang2018deep}, which we further extend to define the observation and action spaces of our new multi-agent setting. Various choices of the reward function were proposed for training a single traffic light agent \cite{balaji2010urban,chin2011q,mousavi2017traffic}. We extended the definition of a single-agent reward \cite{wei2018intellilight} by defining the global reward as a weighted sum of individual rewards using the PageRank algorithm \cite{page1999pagerank}. Previous work on multi-agent traffic light control mostly relied on independent Q-learning (IQL) with heuristics to account for nonstationarity and coordination, such as: single-agent Q-learning for a central intersection surrounded by non-learning agents \cite{arel2010reinforcement}; applying a Q function learned on a sub-problem to the full problem with max-plus action-selection \cite{van2016coordinated}; training only one agent during each episode while fixing other agents' policies \cite{liu2017cooperative}; sharing information among neighboring Q-learning agents \cite{el2013multiagent,liu2017intelligent}. These approaches do not account for the importance of macroscopic measures of traffic flow \cite{geroliminis2007macroscopic}. In contrast, our formulation explicitly shapes the learning of individual agents via a global reward. Recent work proposed more sophisticated deep MARL algorithms for cooperative multi-agent problems with a global reward \cite{sunehag2017value,foerster2018counterfactual,rashid2018a}, under the paradigm of centralized training with decentralized execution \cite{bernstein2002complexity}. However, these methods only learn from a global reward without using available individual rewards, which motivates our proposal for a simple yet effective way to combine individual and centralized training. To the best of our knowledge, these algorithms have yet to be evaluated and compared in the real-world problem of multi-agent traffic light control, which we do as part of our main contributions. \section{Markov game model of multi-agent traffic light control} We formulate the multi-agent traffic light control problem as a partially-observed Markov game $\langle S, \lbrace O \rbrace^n, \lbrace A \rbrace^n, P, R, N, \gamma \rangle$, consisting of $N$ agents labeled by $n = [1..N]$, defined as follows: \textbf{Agents} $n \in [1..N]$. Each agent controls the phase of one traffic light at an intersection. \textbf{Observation space} $O^n$. Since all traffic lights have the same measurement capabilities, all agents' observation \textit{spaces} $O := O^1 = \dotsm = O^N$ have the same definition. Each agent's individual observation \textit{vector} $o^n \in O$ depends on its own local traffic flow, with the following components: $q^n\in\R^l$, $v^n\in\R^l$, $wt^n\in\R^l$, $delay^n\in\R^l$ (for $l$ incoming lanes at a traffic light), $ph^n\in\R^2$, and $d^n\in\R$, defined as: \begin{itemize}[leftmargin=*] \item $q^n$: the length of queue on incoming lanes, defined as the total number of halting vehicles (speed less than 0.1m/s); \item $v^n$, the number of vehicles on each incoming lane; \item $wt^n$, the average waiting time of all vehicles on each incoming lane; defined as the time in minutes a vehicle spent with a speed below 0.1m/s since the last time it was faster than 0.1m/s \item $delay^n$, the average delay of all vehicles on each incoming lane, the delay of a lane is equal to 1 - (average vehicle speed)/(maximum allowed vehicle speed); \item $ph^n$: the traffic light's current phase, indicating the status of the east-west and north-south directions, represented by a one-hot variable $ph^n: EW\times NS\mapsto \lbrace 0, 1 \rbrace^2$; \item $d^n$: phase duration in seconds since the last phase change. \end{itemize} Prior work used an image representation of positions of all vehicles near a traffic light and required convolutional networks \citet{wei2018intellilight}. In contrast, we show this is not necessary and hence significantly reduce computational cost. \textbf{Global state space} $S$ contains all global information including every route and traffic light. Global state $s \in S$ is the concatenation of all local observation vectors. \textbf{Action space} $A^n$. Traffic controllers with the same capabilities means $A := A^1 = \dotsm = A^N$. Extension to controllers with different types is easily done by learning separate $Q$ functions for each type. The action $a^n$ of each agent is a binary variable to indicate whether or not the traffic light will keep the current phase or switch to another phase. This definition is sufficient for policy learning because the agent's current phase is included in its own observation vector. The game has joint action space $\A \equiv A^1\times...\times A^n$. Agents produce joint action $\abf := (a^1,\dotsc,a^N) \in \A$ at each time step. Let $\abf^{-n}$ denote all actions \textit{except} that of agent $n$. \textbf{Individual reward} $R^n(s,\abf) : S \times \A \mapsto \R$. We base our individual reward on previous work that used weighted route features as the reward for the single-agent traffic light setting \cite{van2016coordinated,wei2018intellilight} There are seven features used to calculate the individual reward (\Cref{app:reward-definition}). The individual reward is a combination of these meaningful features that capture many intuitive metrics of desirable and undesirable traffic conditions. \textbf{Global reward} $R^g$, defined as a weighted sum of individual rewards. We explored different methods to compute these weights. We used the PageRank algorithm to compute weights on each individual reward \cite{page1999pagerank}, since traffic intersections with higher risk of congestion are generally located in the central areas of the map that have higher interactions with surrounding traffic, and therefore should receive higher priority. Hence $R^g(s,\abf) := \sum_{n=1}^N k_n R^n(s,\abf)$, where $k_n = \text{PageRank}(n)$. While we considered using the traffic flow conditions under a fixed control policy to compute the weights for each traffic light, this is not a good choice since an arbitrary suboptimal nominal policy may produce a bad estimation of weights. In contrast, the PageRank algorithm accounts for the topological structure of the transportation network, addresses the connectivity and interaction between agents, and assigns higher weights to the rewards of highly-connected traffic lights. \textbf{Evaluation criteria.} Given a reward function designed with sufficient expert domain knowledge and specified with enough precision to disambiguate different traffic states, we can investigate the performance of state-of-the-art MARL algorithms by directly evaluating them using the cumulative reward and components of the reward. Hence we do not resort to manual inspection of policy behavior, in contrast to previous work where certain states were aliased (i.e. produce the same reward) and manual inspection of the policy was required \citet{wei2018intellilight}. \section{Multi-agent Reinforcement Learning Algorithms} In this section, we give an overview of early and recent MARL algorithms, focusing on their respective strengths and weaknesses, with details in \Cref{app:algs}. We use them as baselines for our experiments. \textbf{IQL and IAC.} Independent Q-learning (IQL) and independent actor-critic (IAC) have demonstrated surprisingly strong performance in complex multi-agent systems \cite{tan1993multi,tampuu2017multiagent,foerster2018counterfactual,rashid2018a}. For each agent $n$, IQL directly applies single-agent Q-learning to learn a local utility function $Q^n(o^n,a^n)$, which is not a true action-value function because the presence of other learning agents result in a nonstationary environment from any single agent's perspective. Similarly, IAC directly applies the single-agent policy gradient \cite{sutton2000policy} to train an actor-critic pair for each agent, resulting in actors $\pi^n(a^n|o^n)$ and critics $Q^n(o^n,a^n)$. While IQL and IAC agents display strong ability to optimize individual rewards \cite{tan1993multi,yang2018cm3}, the lack of global information and a mechanism for cooperation means they are likely to settle for sub-optimal solutions. \textbf{COMA.} In cooperative MARL with a single global reward, COMA \cite{foerster2018counterfactual} estimates a centralized action-value function $Q^{\pibf}(s,\abf)$ to compute a counterfactual advantage function for a multi-agent policy gradient. Their formulation is a low variance gradient estimate, as the advantage function evaluates the contribution of an agent's chosen action $a^n$ versus the average of all possible counterfactuals $\hat{a}^n$, keeping other agents' $a^{-n}$ fixed. However, since the only learning signal comes from the global reward and individual agents are not directly trained to improve local performance, COMA may exhibit slower training in cooperative traffic light control. \textbf{VDN.} While IQL agents cannot learn to cooperate for a global reward, it is also not feasible to learn a single optimal action-value function $Q^*(s,\abf)$ since the maximization step requires searching over $|\Acal|^N$ joint actions. Instead, VDN \cite{sunehag2017value} learns a joint action-value function that decomposes as $Q^{\text{VDN}}(s,\abf) := \sum_{n=1}^N Q^n(o^n,a^n)$, so that agents act greedily with respect to their own utility functions, while global reward is used for overall training. However, there is no guarantee in general settings that the true optimal $Q^*(s,\abf)$ can be decomposed as a linear combination of individually-optimized utilities, which could limit VDN's performance. \textbf{QMIX.} QMIX \cite{rashid2018a} generalizes VDN by representing the optimal action-value function as a nonlinear function $Q^*(s,\abf) = F(Q^1,\dotsc,Q^N)$ of individual utility functions, while ensuring that the combination of individual $\argmax$ on each $Q^n$ yields the same joint action as a global $\argmax$ on $Q^*(s,\abf)$. This is achieved by enforcing positive weights in the nonlinear mixing network $F$. Despite being a more expressive model than VDN, the stability of QMIX depends on appropriate choices of mixing network architecture, for which there is little theoretical guidance, and QMIX also relies on global reward without using local reward for training. \section{Method} We propose QCOMBO, a novel combination of centralized and independent learning with coupling achieved via a new consistency regularizer. We optimize a composite objective consisting of three parts: an individual term based on the loss function of independent DQN, a global term for learning a global action-value function, and a shaping term that minimizes the difference between the weighted sum of individual Q values and the global Q value. This algorithm ensures that agents cooperate to maximize the global reward, which is difficult for independent learning agents to achieve, and also maintain the ability to optimize their individual performance using agent-specific observations and rewards, which is more efficient than a purely centralized approach. \subsection{Individual Part} Using individual observations and rewards for each agent is computationally efficient, since local observations generally have lower dimension than global state information, and also algorithmically efficient, since it avoids the difficult credit assignment problem of decomposing a single global reward signal for each agent to learn. Furthermore, by optimizing individual utility functions $Q^n$ instead of a global optimal Q function, we reduce the maximization problem at each step of Q-learning from $O(|\Acal|^N)$ to $O(N|\Acal|)$. Parameterizing the local utility function for agent $n$ with parameter $\theta^n$, we minimize the loss \begin{align} \mathcal{L}(\theta^n) &= \frac{1}{N} \sum_{n=1}^N \E_{\pibf} \Bigl[ \frac{1}{2}(y^n_t - Q^n(o^n_{t}, a^n_t; \theta^n))^2 \Bigr] \label{eq:loss-Q-individual} \\ y^n_t &= r^n_t + \gamma \max_{\ahat^n}Q^n(o^n_t,\ahat^n,\theta'^n) \label{eq:td-target-individual} \end{align} Since the agent population is homogeneous (i.e. all agents have the same observation and action spaces), we improve memory and computational efficiency by employing \textit{parameter-sharing} \cite{foerster2018counterfactual} among all agents, which means $\theta := \theta^n, \forall n \in [1..N]$. Agents still act differently since they receive different observations, and we further give an agent indicator as input for agent disambiguation. $\hat{\theta}$ are parameters of a target network \citet{mnih2015human}. \subsection{Global Part} Without global information, independently learning agents face a nonstationary environment due to the presence of other learning agents, and they may have insufficient information to find cooperative optima. On the other hand, training an optimal global Q function is not scalable, since the Q-learning step would require maximization over $|\Acal|^N$ possible joint actions for $N$ agents. To address this dilemma, our key insight is that we can learn the global Q function \textit{under the joint policy induced by all agents' local utility functions}, rather than learn the \textit{optimal} global Q function, and use it to shape the learning of individual agents via information in global state $s$ and global reward $R^g$. Specifically, the joint policy defined by $\abf \sim \pibf(\abf|s) = \lbrace \argmax_{a^n} Q^n(o^n,a^n) \rbrace_{n=1}^N$ is associated with a global action-value function (letting $R^g_t := R^g_t(s,\abf)$): \begin{align} Q^{\pibf}(s,\abf) := \Ebb_{\pibf} \Bigl[ \sum_{t=0}^{\infty} \gamma^t R^g \mid s_0=s,\abf_0=\abf \Bigr] \end{align} Parameterizing $Q^{\pibf}_w(s,\abf)$ with $w$, we minimize the loss: \begin{align} &\Lcal(w) = \Ebb_{\pibf} \Bigl[ \frac{1}{2}\bigl( y_t - Q^{\pibf}_w(s_t,\abf_t) \bigr)^2 \Bigr] \label{eq:loss-Q-global} \\ &y_t = R^g_t + \gamma Q^{\pibf}_{\hat{w}}(s', \abf')\vert_{a'^n = \argmax_{a^n} Q^n_{\hat{\theta}}(o'^n,a^n)} \label{eq:td-target-global} \end{align} where we let $(\cdot)' := (\cdot)_{t+1}$. Crucially, action selection for computing the TD target \eqref{eq:td-target-global} uses the greedy action from local utility functions and does not use the global Q function. The collection of local utility functions induce a joint policy $\pibf$ that generates data for off-policy learning of the global action-value function $Q^{\pibf}$. $\hat{w}$ are target network parameters. \subsection{Combined objective} If each agent greedily optimizes its own local utility function, the global return can be suboptimal. For example, if agent $n$ (with low weight $k^n$) has no flow in the N-S direction while adjacent agent $m$ (with high weight $k^m$) has heavy flow in the N-S direction, the individual optimal policy for $n$ is to let W-E traffic flow continuously to $m$, which negatively impacts conditions at $m$ and leads to low global reward. This is supported by experimental results in a 1x2 network. To address the suboptimality of independent learning, we propose a new consistency regularization loss \begin{align}\label{eq:regularizer} \Lcal_{reg} := \Ebb_{\pibf} \Bigl[ \frac{1}{2}\bigl( Q^{\pibf}_w(s,\abf) - \sum_{n=1}^N k^n Q^n_{\theta}(o^n,a^n) \bigr)^2 \Bigr] \end{align} between global $Q^{\pibf}_w$ and individual utility functions $Q^n_{\theta}$. Since $Q^{\pibf}_w$ is the true global action-value function with respect to the induced joint policy, this regularization brings the weighted sum of individual utility functions closer to global expected return, so that the optimization of individual utility functions is influenced by the global objective rather than purely determined by local information. Hence the regularizer prevents any individual agent from attaining high individual performance at the cost of collective performance. The complete QCOMBO architecture (\Cref{Fig:QCOMBO}) combines the individual loss \eqref{eq:loss-Q-individual}, global loss \eqref{eq:loss-Q-global}, and consistency regularizer \eqref{eq:regularizer} into the overall objective: \begin{equation}\label{eq:overall} \begin{split} \Lcal_{tot}(w, \theta) &= \Lcal(w) + \Lcal(\theta) + \lambda \Lcal_{reg} \end{split} \end{equation} where $\lambda$ controls the extent of regularization. Whenever any agent learns to attains high individual reward at the cost of global performance, which is likely when minimizing the individual loss, the consistency loss will increase to reflect inconsistency between individual and global performance; it will then decrease once global information influences the learning of individual $Q^n$. Our experiments provide evidence of this dynamic learning process that balances individual and global learning (\Cref{fig:consistency-loss}). Since the third term is a regularizer, which in general is not necessarily zero at convergence, \eqref{eq:overall} does not force $Q^{\pibf}_w$ to equal the weighted sum of all $Q_{\theta}$. Even at equality, agents still retain cooperation and are not independent because $Q^{\pibf}_w$ is trained using the total reward and \eqref{eq:regularizer} weighs each agent by $k^n$. Optimizing $\Lcal(w)$ by itself does not enable action selection due to combinatorial explosion of the joint action space; optimizing $\Lcal(\theta)$ alone amounts to IQL; and, crucially, removing our novel regularization term from \eqref{eq:overall} would decouple the global and individual losses and reduce \eqref{eq:overall} to IQL. At each training step, we interleave the updates to $\theta$ and $w$ to exchange information between the global and individual parts, allowing each agent to learn a policy that considers the effects of other agents' learning. The parameters $w$ and $\theta$ are updated by gradient descent (derived in \Cref{app:gradients}): \begin{equation} \begin{split} &\nabla_{w}\mathcal{L}_{tot} = -E_{\pibf} \Bigl[ \bigl[ Y -(1 + \lambda)Q^{\pibf}_w(s_t, \abf_t) \\ &+ \lambda \sum_{n}k^{n}Q^{n}_{\theta}(o^n_t,a^n_t) \bigr] \nabla_{w} Q^{\pibf}_w(s_t, \abf_t) \Bigr] \\ &Y := R^g + \gamma Q^{\pibf}_{\hat{w}}(s', \abf')\vert_{\abf' = \lbrace \argmax_{a^n} Q_{\hat{\theta}}(o'^n,a^n) \rbrace} \end{split} \end{equation} \begin{equation} \begin{split} & \nabla_{\theta}\mathcal{L}_{tot} = -\Ebb_{\pibf} \Bigl[ \sum_{n=1}^N \Bigl( Z_1 + \lambda k^n Z_2 \Bigr) \nabla_{\theta} Q^n_{\theta}(o^n_t,a^n_t) \Bigr] \\ &Z_1 := \frac{1}{N} \left( R^n_t + \gamma \max_{\ahat^n} Q^n_{\hat{\theta}}(o'^n,\ahat^n) - Q^n_{\theta}(o^n_t,a^n_t) \right) \\ &Z_2 := Q^{\pibf}_w(s_t,\abf_t) - \sum_{m=1}^N k^m Q^m_{\theta}(o^m_t,a^m_t) \end{split} \end{equation} \section{Experimental Setup} We evaluated the performance of our method against a large set of baselines (described in \Cref{app:algs}) on multiple road networks under a variety of traffic conditions in the SUMO simulator \cite{wu2017flow,SUMO2018}. We describe all key experimental setup details in this section. \Cref{sec:results} provides detailed analysis of each algorithm's performance. For each algorithm, we report the mean of five independent runs, with standard deviation reported in \Cref{table_conditions}. \subsection{Environment} We used the Flow framework \citet{wu2017flow} with the SUMO simulator. We used homogeneous vehicles of the same type and size in all experiments. Extension to heterogeneous vehicles requires no modification to our algorithm, but only redefinition of observation vectors (e.g., a longer vehicle takes up two units in queue length). Road networks are defined as the intersection of $m$ horizontal and $n$ vertical roads (e.g. a $1\times2$ network has one horizontal route intersecting two vertical routes.). Each traffic light situated at an intersection is a learning agent. Each road between two intersections is 400m long and has two lanes with opposite directions of travel. Hence each agent has one incoming and one outgoing lane for each edge. Vehicles are emitted at the global outer boundaries of each edge with random starting lane and fixed entering speed. We used different traffic flow programs which vary in the number of vehicles per hour in the specific period to show our findings. \Cref{table:config} contains all traffic configurations. At each time step, the traffic light is green exclusively for either the horizontal or the vertical direction. \begin{figure} \begin{minipage}[c]{0.44\textwidth} \minipage{0.4\textwidth} \subfigure[][]{ \label{fig:intersection} \includegraphics[width=\linewidth,height=1.2in]{figures/exps/1.png}} \endminipage\hfill \minipage{0.4\textwidth} \subfigure[][]{ \label{fig:1by2} \includegraphics[width=\linewidth,height=1.2in]{figures/exps/1-2.png}} \endminipage\hspace{0.1cm} \vfill \minipage{0.4\textwidth} \subfigure[][]{ \label{fig:2by2} \includegraphics[width=\linewidth,height=1.2in]{figures/exps/2-2.png}} \endminipage\hfill \minipage{0.4\textwidth} \subfigure[][]{ \label{fig:6by6} \includegraphics[width=\linewidth,height=1.2in]{figures/exps/6-6.png}} \endminipage\hspace{0.05cm} \caption[A set of three subfigures.]{Grid topology used : \subref{fig:intersection} 1 traffic light example; \subref{fig:1by2} 2 traffic lights; \subref{fig:2by2} $2\times2$ traffic lights; \subref{fig:6by6} $6\times6$ traffic lights;}% \label{Fig:duel}% \end{minipage} \hfill \begin{minipage}[c]{0.53\textwidth}% \begin{tabular}[c]{@{}c@{}|@{}c@{}|@{}c@{}@{}c@{}} \hline Program&Time Period& \multicolumn{2}{c}{Num Vehicles/Hour}\\ And Topology&A:train&Horizontal&Vertical\\ &B:test&(Bot to Top)&(Left to Right)\\\hline $1\times2$ two Agents & A:0-12000 & 700 & 10, 620 \\ \hline $2\times2$ Same State & A:0-12000 & 700, 700 & 700, 700 \\ \hline Generalization & A:0-12000 & 700, 280 & 10, 620 \\ different flow 1 & B:0-2000 & 700, 280 & 10, 620 \\ $2\times2$ & B:2000-4000 & 1000, 800 & 900, 700 \\ & B:4000-6000 & 1400, 1000 & 400, 900 \\ \hline Generalization & A:0-12000 & 1000, 580 & 110, 920 \\ different flow 2 & B:0-2000 & 1000, 580 & 110, 920 \\$2\times2$ & B:2000-4000 & 1000, 800 & 900, 700 \\ & B:4000-6000 & 1400, 1000 & 400, 900 \\ \hline Generalization & A:0-12000 & 700, 700 & 700, 700 \\ different flow 3 & B:0-2000 & 700, 700 & 700, 700 \\ $2\times2$ & B:2000-4000 & 1000, 800 & 900, 700 \\ & B:4000-6000 & 1400, 1000 & 400, 900 \\ \hline Train on $2\times2$ & A:0-12000 & 700, 700 & 700, 700 \\ test on $6\times6$ & B:0-12000 & 700,280, & 10,620, \\ & &260,240,&620,50,\\ & &780,200&90,700\\ \hline \end{tabular}\\ {\captionof{table}{Network topologies, flow schedules and flow \\rates in all training and testing configurations} \label{table:config}} \end{minipage} \vspace{-7pt} \end{figure} \textbf{Uniform flow on symmetric $2\times2$ network.} The first road network is a symmetric environment with $N=4$ traffic light agents defined by a $2\times2$ network \Cref{fig:2by2}. Vehicle emissions from all route boundaries are equal and uniform throughout the entire training horizon. Due to symmetry, all agents' rewards are weighted equally, and all agents should learn the same policy or value functions. \textbf{Non-uniform traffic flow on $1\times2$ network.} The second traffic control scenario has more challenging traffic dynamics. One horizontal route and two vertical routes form two interactions (\Cref{fig:1by2}). The horizontal route has 700 vehicles/hour, one vertical route on the left has only 10 vehicles/hour, while the second vertical route on the right has 600 per hour. This is a common real-world scenario where one main arterial road with dense traffic is adjacent and parallel to a smaller local road with sparse traffic. The greedy strategy for the left traffic light is to let vehicles in the E-W direction pass almost all the time, which would lead to high incoming E-W traffic for the second traffic light that already has heavy N-S traffic. Hence cooperative learning is necessary for the left light to close the E-W route to some extent, to optimize global performance. \textbf{Generalization To Different Flows.} We investigated how well policies learned by each algorithm in one traffic condition generalize to different traffic conditions without further training. This is crucial for real-world applicability since training on every possible traffic condition is not feasible. In the first experiment, we trained a policy under a \textit{static} traffic flow in the $2\times2$ network, but tested it on three consecutive equal-duration time periods with \textit{different vehicle densities}. Denoting the flow as a vector $f:=(\text{bot, up, left, right}) \in \Rbb^4$ specifying the number of vehicles per hour on each vertical and horizontal route, traffic flows in the second and third test periods are $f_{t_2}:= (1000,800,900,700)$ $f_{t_3}:=(1400,1000,400,900)$ (\Cref{table:config} third row). The first test period has the same traffic flow as the training phase. We further investigated the extent to which generalization performance is affected by the specific traffic condition used in training. Specifically, we trained separate QCOMBO policies with \textit{different flows} in the same network topology (with one policy per training flow), and test all policies under the \textit{same} flow. We denote the $i$-th train-test combination ($i = 1,2,3$) as 4-component sequence $F^i = \lbrace f^i_{t_0},f^i_{t_1},f_{t_2},f_{t_3} \rbrace$, where the first flow is the training flow followed by three test flows, and $f_{t_2}$ and $f_{t_3}$ are shared by all train-test combinations. Then the three train-test programs are: $F^1= \lbrace f^1_{t_0},f^1_{t_1}, f_{t_2},f_{t_3} \rbrace$, $F^2=\lbrace f^2_{t_0}, f^2_{t_1},f_{t_2},f_{t_3}\rbrace$, $F^3=\lbrace f^3_{t_0},f^3_{t_1},f_{t_2},f_{t_3}\rbrace$, where $f^1_{t_0}= f^1_{t_1}:=(700,280,10,620)$, $f^2_{t_0}= f^2_{t_1}:=(1000,580,110,920)$, $f^3_{t_0}= f^3_{t_1}:=(700,700,700,700)$ are training flows and the testing flow in the first $1/3$ period. Three programs use the same testing flow for the second and third periods ($f_{t_2}, f_{t_3}$), specified in \Cref{table:config}. Time periods $t_0,t_1,t_2,t_3$ are 10000,1000,1000,1000 steps, respectively. \textbf{Generalization to larger networks.} Directly training on simulations of large real-world traffic networks may not be computationally practical due to the combinatorially-large state and joint-action spaces, regardless of independent or centralized training. Previous approaches first formulated simple models for regional traffic and then realigned to the whole system \citet{esser2000large}, or relied on transfer planning \citet{van2016coordinated}. In contrast, we investigated the feasibility of training on a sub-network and directly transferring the learned policies without further training into a larger network. Direct deployment in a larger systems is possible as QCOMBO learns decentralized policies. We constructed a $6\times6$ traffic network with 36 traffic lights (\Cref{fig:6by6}) and nonuniform traffic flows, which severely reduces the possibility that any traditional hand-designed traffic control plan can be the optimal policy. Policies trained via QCOMBO in the $2\times2$ network were directly tested on the $6\times6$ network. \subsection{Algorithm implementations} We implemented all algorithms using deep neural networks as function approximators. We ensure that all policy, value, and action-value functions have the same neural network architecture among all algorithms---to the extent allowed by each algorithm (e.g. hypernetwork architecture required by QMIX)---for fair comparison. The individual utility functions $Q^n$ of IDQN, VDN, QMIX, and QCOMBO are represented by fully-connected three-layer neural networks, where the last layer has $|A|$ output nodes. QMIX has a two level hypernetwork that generates the weight matrix and bias vector from the global state $s$, to compute the inner product with each $Q^n$ and produce one state action value $Q(s,\abf)$. VDN takes the sum of $Q^n$ to calculate the total $Q$, which is minimized by the squared error loss. The critic of IAC is a value function $V$, which is used to estimate the TD error. The COMA uses a centralized $Q$ minus a counterfactual baseline to compute the COMA policy gradient. The critics of COMA and IAC have the same three-layer neural network structure, similar to the Q-functions in IDQN, VDN, QMIX. Both IAC and COMA use the same actor network to approximate $\pi(a_t|o_t)$, which is also a three-layer fully connected neural network that takes the agent's observation, with a softmax activation in the last layer. We give the agent's observations, last actions, and one-hot vector of agent labels as input to utility functions ($Q^n$ of IDQN, QMIX, and VDN, $V^n$ of IAC) We give the global state, all other agents' actions, and agent labels as inputs to $Q$ of COMA. Motivated by the possibility of periodic behavior of traffic, we also experimented with RNN and GRU cells for $Q^n$ of IDQN, VDN, QMIX and QCOMBO, and the $\pi(a_t|o_t)$ of IAC and COMA. \Cref{app:architecture} contains more architecture details. \section{Results} \label{sec:results} \begin{figure*}[t] \hspace*{0.7cm}% \minipage[c]{0.4\textwidth} \includegraphics[scale=0.7]{figures/exps/label.png} \endminipage\vfill \minipage{0.25\textwidth} \subfigure[][$2\times2$]{% \label{fig:reward_four_agents}% \includegraphics[width=\linewidth,height=1.2in]{figures/exps/Train_2,2_Test_2,2_train_global_rewards.png}}% \endminipage\hfill% \minipage{0.25\textwidth} \subfigure[][2 traffic lights]{% \label{fig:reward_two_agents}% \includegraphics[width=\linewidth,height=1.2in]{figures/exps/Train_1,2_Test_1,2_train_global_rewards.png}}% \endminipage\hfill% \minipage{0.25\textwidth} \subfigure[][$2\times2$ using RNN]{% \label{fig:reward_four_agents_rnn}% \includegraphics[width=\linewidth,height=1.2in]{figures/exps/Train_2,2_Test_2,2_rnn_train_global_rewards.png}}% \endminipage\hfill% \minipage{0.25\textwidth} \subfigure[][2 lights using RNN]{% \label{fig:reward_two_agents_rnn}% \includegraphics[width=\linewidth,height=1.2in]{figures/exps/Train_1,2_Test_1,2_rnn_train_global_rewards.png}} % \endminipage\hfill \vspace{-10pt} \caption[]{ \subref{fig:reward_four_agents}-\subref{fig:reward_two_agents_rnn} show rewards under different topology among algorithms}% \label{fig:rewards}% \end{figure*} To analyze differences in algorithms, we show full learning curves for all algorithms in addition to reporting final performance. This is crucial because previous work on deep RL for traffic signal control noted the potential for instability during training \cite{van2016coordinated}. Our learning curves were generated by conducting evaluation measurements periodically during training (i.e. test the current policy for 400 steps). Since it takes time to populate the road networks, our learning curves start after 1000 simulation time steps. For every experiment, we ran a static policy (change light phase every 30s), and a random policy (keep or change the current phase every 5s) so that improvements due to learning can be clearly seen. \begin{table*}[t] \centering \captionof{table}{ Final Traffic Condition After Learning} \label{table_conditions} \begin{tabular}{c|@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}@{}c@{}} \hline \multicolumn{1}{l}{} & \multicolumn{3}{c}{$2\times2$ balanced} & \multicolumn{3}{c}{$1\times2$ unbalanced} \\ \cline{2-7} \multicolumn{1}{l}{} & Queue Length& Wait Time& Vehicle Delay & Queue Length& Wait Time& Vehicle Delay\\ \hline QCOMBO & \textbf{1.80}(0.05) & \textbf{0.03}(0.00) & 3.30(0.01) & \textbf{1.12} (0.96) & \textbf{0.14}(0.20) & \textbf{2.08} (0.11) \\ IDQN & 23.92(24.98) & 191.98(270.65) & 3.44(0.29) & 29.78(22.97) & 44.63(52.58) & 2.37 (0.95) \\ IAC & 41.89(1.71) & 9.16 (1.29) & 3.45(0.02) & 34.37 (33.20) & 42.13 (78.92) & 2.27 (1.14) \\ COMA & 2.10(0.30) & 0.05 (0.01) & \textbf{3.26}(0.03) & 7.72(8.53) & 0.84 (1.06) & 2.19(1.25) \\ QMIX & 25.10(32.10) & 115.72(163.57) & 3.57(0.31) & 16.91(19.11) & 40.57 (58.34) & 2.82 (0.12) \\ VDN & 38.12(29.13) & 106.34(105.83) & 3.45(0.30) & 10.29(15.08) & 16.13 (34.09) & 2.91 (0.47) \\ Random & 26.57(0.00) & 2.49(0.00) & 3.65 (0.00) & 25.15(7.77) & 4.96(1.37) & 2.81(0.49) \\ Static & 36.14(0.00) & 6.90(0.00) & 3.51 (0.00) & 27.59(4.51) & 4.18(1.60) & 2.83(0.02) \\ \hline \end{tabular} \vspace{-10pt} \end{table*} \subsection{Static Traffic Flows} \Cref{fig:rewards} shows the global reward in both the $2\times2$ and $1\times2$ road networks using both fully-connected and RNN neural networks. Over all flow and network configurations, QCOMBO attained the global optimal performance and is most stable among all algorithms. Policy-based methods COMA and IAC, which mitigate issues with state aliasing and are more robust to small changes of observation, show lower variance and higher average reward than other value-based methods (IDQN, VDN and QMIX). In the $2\times2$ environment \Cref{fig:reward_four_agents}, QCOMBO and COMA converged to global optimal policies. Both two maintain good traffic condition throughout learning, as reflected by queue length, waiting time, and delay time of vehicles in \Cref{table_conditions}. VDN performed better than the random and static policies, but worse than QCOMBO and COMA, as it can only learn a restricted set of linearly-combined Q functions. IDQN and IAC were not stable and failed to reach a global optimum, showing that learning cooperation from the global reward is necessary. QMIX diverged possibly due to the difficulty of stabilizing its hypernetwork. All algorithms (with the exception of QMIX) improved with the use of RNN for policy or value functions (\Cref{fig:reward_four_agents_rnn}), giving strong evidence that RNNs are especially suitable for handling history information and periodicity of traffic. Performance differences between algorithms are more apparent in the $1\times2$ environment with non-uniform traffic flow (\Cref{fig:reward_two_agents}). QCOMBO converged to the optimal policy, exceeding the performance of all other algorithms. VDN began with high performance but struggled to maintain a good policy as more vehicles enter the road. QCOMBO's higher performance and stability over IDQN shows that the new regularization loss in QCOMBO helps to stabilize learning of independent utility functions by limiting their deviation from the centralized action-value function. The benefit of centralized learning (e.g. QCOMBO and COMA) over independent learning (e.g. IDQN, IDQN) is more apparent than in the $2\times2$ environment, since the non-uniform flow increases the impact of each agent on other agents' performance, resulting in the need for cooperation. IDQN, VDN and IAC exhibits oscillation, similar to behavior reported in \cite{van2016coordinated}. QMIX suffers from convergence issues when using a fully-connected network (RNN results shown in \Cref{fig:reward_two_agents_rnn}). We further explain differences in algorithm performance in $1 \times 2$ by analyzing actions (E-W or N-S phase) selected by the learned policies. In order to achieve cooperation, the left traffic light should open N-S and close E-W periodically to reduce incoming E-W traffic for the right light, who already experiences heavy N-S traffic. \Cref{fig:phases} shows that QCOMBO and COMA achieve cooperation by turning off E-W traffic periodically (with low frequency, since it receives higher E-W than N-S traffic). However, IDQN greedily keeps E-W open for long durations, which is not globally optimal; IAC switches between the two phases almost equally; VDN switches to N-S too often than necessary; QMIX incorrectly chooses N-S more frequently than E-S. \subsection{Generalizing To Dynamic Traffic Flows} \begin{figure*}[t] \minipage{0.16\textwidth} \label{fig:policy_qcombo}% \includegraphics[scale=0.25]{figures/exps/Train_1,2_Test_1,2_train_cur_Model-QCombo_center-0.png} \endminipage\hfill \minipage{0.16\textwidth} \label{fig:policy_coma}% \includegraphics[scale=0.25]{figures/exps/Train_1,2_Test_1,2_train_cur_Model-COMA_center-0.png} \endminipage\hfill \minipage{0.16\textwidth} \label{fig:policy_iqdn}% \includegraphics[scale=0.25]{figures/exps/Train_1,2_Test_1,2_train_cur_Model-IDQN_center-0.png} \endminipage\hfill \minipage{0.16\textwidth} \label{fig:policy_iac}% \includegraphics[scale=0.25]{figures/exps/Train_1,2_Test_1,2_train_cur_Model-IAC_center-0.png} \endminipage\hfill \minipage{0.16\textwidth} \label{fig:policy_vdn}% \includegraphics[scale=0.25]{figures/exps/Train_1,2_Test_1,2_train_cur_Model-VDN_center-0.png} \endminipage\hfill \minipage{0.16\textwidth} \label{fig:policy_qmix}% \includegraphics[scale=0.25]{figures/exps/Train_1,2_Test_1,2_train_cur_Model-QMix_center-0.png} \endminipage\hfill \vspace{-7pt} \caption[A set of six subfigures.]{Traffic light phase selected by the left agent in the $1\times2$ topology} \label{fig:phases}% \end{figure*} \begin{figure}[t] \centering \minipage{0.33\textwidth} \subfigure[][]{ \label{fig:algos_flows} \includegraphics[width=\linewidth,height=1.4in]{figures/exps/Train_2,2_Test_2,2_test_global_rewards.png}} \endminipage\hfill \minipage{0.33\textwidth} \subfigure[][]{\label{fig:QCOMB_flows} \includegraphics[width=\linewidth,height=1.4in]{figures/exps/Train_2,2_Test_2,2_test_different_flows.png}} \endminipage\hfill \minipage{0.33\textwidth} \subfigure[][]{\label{fig:largesystem} \includegraphics[width=\linewidth,height=1.4in]{figures/exps/Train_6,6_Test_6,6_Sub_test_global_rewards.png}} \endminipage \vspace{-10pt} \caption[]{More Generalization Results, \subref{fig:algos_flows} generalization to different traffic flows among algorithms; \subref{fig:QCOMB_flows} Impact of training conditions on performance in new test condition; \subref{fig:largesystem} Policy trained in $2\times2$ network generalizes to $6\times6$ network}% \label{fig:generalization}% \end{figure} QCOMBO displayed the highest generalization performance, when trained on one traffic condition and deployed on two different test conditions \Cref{fig:algos_flows}. As reflected by the decrease in performance of all policies when traffic flow changes at time step 2000, the test conditions were more difficult. While COMA and QCOMBO have equal performance on the training flow (first 1000 steps), QCOMBO generalized much more gracefully to the test conditions as the consistency regularizer prevents overfitting to local training conditions. VDN perform worse on the training flow than COMA but generalized better, despite experiencing a large drop in the second test flow when the vehicle density increases. IAC shows high variance on the test condition, while IDQN and QMIX could not adapt to new flows due to low training performance. \Cref{fig:QCOMB_flows} shows results of the second generalization experiment, where we evaluated QCOMBO policies trained on three different traffic flows, using the same test program. The first 1000 steps have the same flow as during training, while the new flows appear at $t=2000$ and $t=3000$. QCOMBO policies show flow invariance during the $t_2$ and $t_3$ period: trained on different traffic conditions, generalization performance on new unseen conditions exhibit only small variability. This gives evidence that performance of QCOMBO on test conditions does not heavily depend on specific choices of training conditions. \subsection{Generalization To Larger Traffic Topology} We directly applied the QCOMBO policy trained in the $2\times2$ traffic network to the $6\times6$ network with 36 traffic light agents, which poses a significant generalization challenge due to the decreased observability for any particular agent and the different traffic flow induced by the different network topology. \Cref{fig:largesystem} shows that QCOMBO's policy is able to maintain high and stable test performance, with almost negligible difference from its training performance. Surprisingly, it sometimes attains higher reward even than a policy that was trained specifically on the $6\times6$ environment. This shows that centralized training with few agents can still produce policies that generalize well to larger settings, mitigating concerns about scalability of centralized training. This is strong evidence that a policy trained on a subset of a city road network can be deployed with little loss of performance at a larger scale. \subsection{Conclusion} We proposed QCOMBO, a novel MARL algorithm for traffic light control. QCOMBO combines the benefits of independent and centralized training, with a novel objective function that enforces consistency between a global action-value function and the weighted sum of individual optimal utility functions. We conducted detailed empirical evaluation of state-of-the-art MARL algorithms (IDQN, IAC, VDN, COMA, and QMIX) on network traffic light control under different map topologies and traffic flows, and showed that QCOMBO is a simple yet competitive approach to this real-world problem. Experiments also indicate that QCOMBO can be generalized with limited loss of performance to large traffic networks. Our work gives strong evidence for the feasibility of training cooperative policies for generalizable, scalable and intelligent traffic light control. \bibliographystyle{natbib}